>>> On 04.02.15 at 01:48, wrote:
> So as I see it XEN_BALLOON should depend on XEN_PV || XEN_PVH -- not
> sure how ballooning would be used on HVM only domains although right
> now ballooning would indeed be initialized in such situations, should
> it not? If it should not then the above check sho
>>> On 03.02.15 at 19:41, wrote:
> On Tue, Feb 03, Andrew Cooper wrote:
>
>> A release date is part of the SMBIOS spec, and the change below results
>> in a malformed smbios table (stale p->release_date_str = 3; pointer)
>
> Good point. Thanks for review. Do you have a pointer to that spec?
htt
On Mon, Feb 02, 2015 at 04:06:06PM +0800, Chao Peng wrote:
> Changes from v8:
> * Merge event mask patch to MBM enabling patch;
> * Address comments from Ian Campbell(Detail in patch itself).
Any comments on this revision?
Thanks,
Chao
___
Xen-devel mai
On Wed, Feb 04, Jan Beulich wrote:
> http://dmtf.org/sites/default/files/standards/documents/DSP0134_2.8.0.pdf
> (in particular section 7.1 and table 5)
"The date string, if supplied, is in either mm/dd/yy or mm/dd/ format."
To me it sounds like an optional thing. An empty string is as
infor
>>> On 04.02.15 at 04:28, wrote:
> --- a/xen/arch/x86/hvm/mtrr.c
> +++ b/xen/arch/x86/hvm/mtrr.c
> @@ -791,7 +791,7 @@ HVM_REGISTER_SAVE_RESTORE(MTRR, hvm_save_mtrr_msr,
> hvm_load_mtrr_msr,
>
> void memory_type_changed(struct domain *d)
> {
> -if ( iommu_enabled && d->vcpu && d->vcpu[0]
>>> On 04.02.15 at 09:39, wrote:
> On Mon, Feb 02, 2015 at 04:06:06PM +0800, Chao Peng wrote:
>> Changes from v8:
>> * Merge event mask patch to MBM enabling patch;
>> * Address comments from Ian Campbell(Detail in patch itself).
>
> Any comments on this revision?
Please be a little more patient
On 03/02/2015 17:14, Daniel Kiper wrote:
> On Mon, Feb 02, 2015 at 09:28:49AM +, Jan Beulich wrote:
> On 30.01.15 at 18:54, wrote:
>>> - xen.efi build will not so strongly depend
>>> on a given GCC and binutils version.
>> While I can see the possibility of making the binutils versio
>>> On 04.02.15 at 09:42, wrote:
> On Wed, Feb 04, Jan Beulich wrote:
>
>> http://dmtf.org/sites/default/files/standards/documents/DSP0134_2.8.0.pdf
>> (in particular section 7.1 and table 5)
>
> "The date string, if supplied, is in either mm/dd/yy or mm/dd/ format."
>
> To me it sounds li
>>> On 29.01.15 at 22:46, wrote:
> +static int hvm_event_traps(long parameters, vm_event_request_t *req)
> +{
> +int rc;
> +struct vcpu *curr = current;
> +struct domain *currd = curr->domain;
> +
> +if ( !(parameters & HVMPME_MODE_MASK) )
> +return 0;
> +
> +rc = vm_ev
>>> On 29.01.15 at 22:46, wrote:
> --- /dev/null
> +++ b/xen/arch/x86/monitor.c
> @@ -0,0 +1,197 @@
> +/*
> + * This program is free software; you can redistribute it and/or
> + * modify it under the terms of the GNU General Public
> + * License v2 as published by the Free Software Foundation.
> +
When a guest change it's MTRR MSRs, ajusting EPT table and flushing
cache are needed only when guest has IOMMU device, using need_iommu(d)
can minimize the impact to guest with device assigned, since a guest
may be hot plugged with a device thus there may be dirty cache lines
before need_iommu(d) b
On 20 January 2015 at 10:52, Ian Campbell wrote:
> A few folks have been caught out by OSes which call e.g.
> HYPERVISOR_event_channel_op_compat which has been deprecated since
> 3.2.2 (i.e. long before Xen on ARM). Existing x86 code can still
> safely and quietly using those calls, waiting for an
flight 34128 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34128/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-libvirt 9 guest-start fail never pass
test-armhf-armhf-libvirt 9 guest-start
>>> On 29.01.15 at 22:46, wrote:
> --- a/xen/common/Makefile
> +++ b/xen/common/Makefile
> @@ -52,9 +52,10 @@ obj-y += tmem_xen.o
> obj-y += radix-tree.o
> obj-y += rbtree.o
> obj-y += lzo.o
> +obj-y += vm_event.o
> +obj-y += monitor.o
Please make the (not) sorting situation worse than it alre
>>> On 29.01.15 at 22:46, wrote:
> The flag is only used for debugging purposes, thus it should be only checked
> for in debug builds of Xen.
So this should be where the respective conditional I just complained
about should get added.
> --- a/xen/common/mem_access.c
> +++ b/xen/common/mem_acces
>>> On 04.02.15 at 10:04, wrote:
> On 03/02/2015 17:14, Daniel Kiper wrote:
>> On Mon, Feb 02, 2015 at 09:28:49AM +, Jan Beulich wrote:
>> On 30.01.15 at 18:54, wrote:
- xen.efi build will not so strongly depend
on a given GCC and binutils version.
>>> While I can see the
At least /var/log/libvirt/libvirtd.log is 0600 on the target machine
and this gets preserved in the captured logfile, eventually meaning
that apache on the log server cannot read the file to serve it ("You
don't have permission to access...").
There seems to be no harm in setting all log files to
On Wed, 2015-02-04 at 09:41 +, Ard Biesheuvel wrote:
> On 20 January 2015 at 10:52, Ian Campbell wrote:
> > A few folks have been caught out by OSes which call e.g.
> > HYPERVISOR_event_channel_op_compat which has been deprecated since
> > 3.2.2 (i.e. long before Xen on ARM). Existing x86 code
On Wed, 2015-02-04 at 09:34 +0800, Chen, Tiejun wrote:
> >
> >> "-machine xxx,igd-passthru=on", to enable/disable that feature.
> >> And we also remove that old option, "-gfx_passthru", just from
> >> the case of LIBXL_DEVICE_MODEL_VERSION_QEMU_XEN since actually
> >> no any
On 16/12/14 16:21, Juergen Gross wrote:
> Hi,
>
> This is a design proposal for a rework of the config options on the
> Linux kernel which are related to Xen.
>
> The need to do so arose from the fact that it is currently not
> possible to build the Xen frontend drivers for a non-pvops kernel,
>
Add xen-devel back on Cc list.
And please don't top-post.
On Tue, Feb 03, 2015 at 09:26:20PM +0100, ronald pina wrote:
> Thanks Wei, it was useful, my primary goal is to contribute on improving
> the latency and jitter on xen, that is my purpose not to implement a
> general QoS linux scheduler,
On 03/02/15 09:45, Jan Beulich wrote:
On 19.01.15 at 18:52, wrote:
>> On 19/01/15 15:41, Jan Beulich wrote:
>>> ... to reduce padding holes. While doing this I noticed vtsc_usercount
>>> is a PV-only thing, so it gets moved straight to struct pv_domain.
>> The vtsc_{user,kernel}count split is
Hi all,
seems the overwhelming majority has chosen - Option 2: April 28-29 - I will
work with Intel on the details and send these out as soon as I have final
confirmation
Best Regards
Lars
On 28 Jan 2015, at 10:09, Lars Kurth wrote:
> Dear community members,
>
> Intel has volunteered to host
Caused by:
> commit 3b36d1f55a08e1849ccd5424afb0fbe29647bd6c
> Author: Martin Lucina
> Date: Mon Feb 2 18:00:36 2015 +0100
>
> Remove even older rumpxen-app-* variants of app-tools
>
> Signed-off-by: Martin Lucina
bash: line 14:
/home/osstest/build.34129.build-amd64-rumpuserxen
On Wed, 2015-02-04 at 12:21 +0100, Martin Lucina wrote:
> Caused by:
>
> > commit 3b36d1f55a08e1849ccd5424afb0fbe29647bd6c
> > Author: Martin Lucina
> > Date: Mon Feb 2 18:00:36 2015 +0100
> >
> > Remove even older rumpxen-app-* variants of app-tools
> >
> > Signed-off-by: Martin
ian.campb...@citrix.com said:
> On Wed, 2015-02-04 at 12:21 +0100, Martin Lucina wrote:
> > Caused by:
> >
> > > commit 3b36d1f55a08e1849ccd5424afb0fbe29647bd6c
> > > Author: Martin Lucina
> > > Date: Mon Feb 2 18:00:36 2015 +0100
> > >
> > > Remove even older rumpxen-app-* variants of app
Hi,
On 03/02/15 19:55, ronald pina wrote:
Thanks Zoli for your clear and very helpfull answer, my idea is to
prioritize traffic that comes from different guest, for example if
guest_1 is used for a voip server than it would be reasonable to
schedule first the vif guest_1 before other guests. The
Ian Campbell writes ("[PATCH OSSTEST] ts-logs-capture: ensure captured log
files are readable."):
> At least /var/log/libvirt/libvirtd.log is 0600 on the target machine
> and this gets preserved in the captured logfile, eventually meaning
> that apache on the log server cannot read the file to ser
On Wed, Feb 04, 2015 at 08:53:28AM +, Jan Beulich wrote:
> >>> On 04.02.15 at 09:39, wrote:
> > On Mon, Feb 02, 2015 at 04:06:06PM +0800, Chao Peng wrote:
> >> Changes from v8:
> >> * Merge event mask patch to MBM enabling patch;
> >> * Address comments from Ian Campbell(Detail in patch itself
At least /var/log/libvirt/libvirtd.log is 0600 on the target machine
and this gets preserved in the captured logfile, eventually meaning
that apache on the log server cannot read the file to serve it ("You
don't have permission to access...").
Set all logfiles to 0666, modified by umask.
Signed-o
On Wed, 2015-02-04 at 12:36 +0100, Martin Lucina wrote:
> ian.campb...@citrix.com said:
> > On Wed, 2015-02-04 at 12:21 +0100, Martin Lucina wrote:
> > > Caused by:
> > >
> > > > commit 3b36d1f55a08e1849ccd5424afb0fbe29647bd6c
> > > > Author: Martin Lucina
> > > > Date: Mon Feb 2 18:00:36 2015
On Tue, 2015-02-03 at 14:11 +, Paul Durrant wrote:
> How about this as a slightly hacky solution that I think may work in both
> cases?
>
> If Xen finds no emulator at all for an HVM guest then it waits around
> for at least one to show up before processing an emulation request.
> Until one d
The xen event channel for the ioreq server must be targeted at the appropriate
vcpu, so the correct one can be unpaused when IO is completed.
Signed-off-by: Andrew Cooper
CC: Jan Beulich
---
The cosmetic tweaks were not completely cosmetic.
---
xen/arch/x86/hvm/hvm.c |2 +-
1 file changed
>>> On 04.02.15 at 13:35, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -638,7 +638,7 @@ static int hvm_ioreq_server_add_vcpu(struct
> hvm_ioreq_server *s,
> {
> struct domain *d = s->domain;
>
> -rc = alloc_unbound_xen_event_channel(v->domain,
> -Original Message-
> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
> boun...@lists.xen.org] On Behalf Of Andrew Cooper
> Sent: 04 February 2015 12:35
> To: Xen-devel
> Cc: Andrew Cooper; Jan Beulich
> Subject: [Xen-devel] [PATCH] x86/hvm: Fix HVM guest regression introduced
> b
> -Original Message-
> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
> boun...@lists.xen.org] On Behalf Of Jan Beulich
> Sent: 04 February 2015 12:46
> To: Andrew Cooper
> Cc: Xen-devel
> Subject: Re: [Xen-devel] [PATCH] x86/hvm: Fix HVM guest regression
> introduced by c58ba78c8
On 04/02/15 12:45, Jan Beulich wrote:
On 04.02.15 at 13:35, wrote:
>> --- a/xen/arch/x86/hvm/hvm.c
>> +++ b/xen/arch/x86/hvm/hvm.c
>> @@ -638,7 +638,7 @@ static int hvm_ioreq_server_add_vcpu(struct
>> hvm_ioreq_server *s,
>> {
>> struct domain *d = s->domain;
>>
>> -r
> -Original Message-
> From: Ian Campbell
> Sent: 04 February 2015 12:30
> To: Paul Durrant
> Cc: Wei Liu; xen-devel@lists.xen.org; Ian Jackson; Jan Beulich; Andrew
> Cooper; Stefano Stabellini
> Subject: Re: Stubdom breakage in 4.5
>
> On Tue, 2015-02-03 at 14:11 +, Paul Durrant wrote
>>> On 04.02.15 at 13:56, wrote:
> Something between d0b2caa..c58ba78 has broken HVM guests to point at
> which HVMloader doesn't reliably function.
And no crash (with register state dumped) or any other hint as to
what's going wrong?
Jan
___
Xen-dev
On 04/02/15 13:00, Jan Beulich wrote:
On 04.02.15 at 13:56, wrote:
>> Something between d0b2caa..c58ba78 has broken HVM guests to point at
>> which HVMloader doesn't reliably function.
> And no crash (with register state dumped) or any other hint as to
> what's going wrong?
PV guests are all
From: Iurii Konovalenko
Signed-off-by: Iurii Konovalenko
Reviewed-by: Julien Grall
---
xen/arch/arm/platforms/Makefile | 1 +
xen/arch/arm/platforms/rcar2.c | 71 +
2 files changed, 72 insertions(+)
create mode 100644 xen/arch/arm/platforms/rcar2.c
d
Changes in v5:
1. Rename UART stuff (RCAR2 -> SCIF)
2. Rename board stuff (SHMOBILE -> RCAR2)
Changes in v4:
No changes.
Changes in v3:
1. Rewrite uart driver code to use start_tx/stop_tx callbacks.
2. Uncomment udelay after setup desired baudrate.
3. Call platform_get_irq() before ioremap_nocach
Signed-off-by: Oleksandr Tyshchenko
Signed-off-by: Iurii Konovalenko
Reviewed-by: Julien Grall
---
config/arm32.mk | 1 +
xen/drivers/char/Makefile| 1 +
xen/drivers/char/scif-uart.c | 367 +++
3 files changed, 369 insertions(+)
crea
Add support for the "Lager" development board based on R-Car H2 SoC
which has SCIF compatible UART.
Signed-off-by: Oleksandr Tyshchenko
Reviewed-by: Julien Grall
---
docs/misc/arm/early-printk.txt| 1 +
xen/arch/arm/Rules.mk | 4 ++
xen/arch/arm/arm32/debug-scif.inc | 49 ++
Instead of manual calls of device_create_file() and
device_remove_files(), assign the static attribute groups to netdev
groups array. This simplifies the code and avoids the possible
races.
Signed-off-by: Takashi Iwai
---
drivers/net/xen-netfront.c | 62 -
flight 34127 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34127/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64 11 rumpuserxen-demo-xenstorels/xenstorels
fail REGR. vs. 33815
R
On 04/02/15 13:38, Takashi Iwai wrote:
> Instead of manual calls of device_create_file() and
> device_remove_files(), assign the static attribute groups to netdev
> groups array. This simplifies the code and avoids the possible
> races.
Acked-by: David Vrabel
David
On Thu, Jan 29, 2015 at 1:01 PM, Oleksandr Dmytryshyn
wrote:
>
> This is ABI for the two halves of a Para-virtual
> sound driver to communicate with each to other.
>
> Signed-off-by: Oleksandr Dmytryshyn
> Signed-off-by: Iurii Konovalenko
> ---
> Changes since v1:
> * removed __attribute__((__p
From: Naresh Bhat
Configure and build numa, pmstate for x86 architecture only.
Signed-off-by: Naresh Bhat
---
xen/drivers/acpi/Makefile | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/drivers/acpi/Makefile b/xen/drivers/acpi/Makefile
index bbb06a7..009fe5a 100644
--
From: Parth Dixit
This patch series adds ACPI support for arm64.
Xen reads static tables described by ACPI standard (5.1) from uefi
and configures timer, gic and uart. ACPI tables are modified to
enable PSCI, HVC and xen specific information (grant table and
event channel interrupts) and mapped
From: Naresh Bhat
xen hypervisor will use ACPI for initialisation in the same manner that
current x86/x86_64 ones do. Add the calls to initialise the ACPI tables
and load devices using the xen/drivers/acpi subsytem.
Signed-off-by: Naresh Bhat
---
xen/common/sysctl.c | 2 +
From: Naresh Bhat
This patch introduce arm-core.c and its related header file
- asm/acpi.h for arch specific variables and functions needed by
ACPI driver core;
- arm-core.c for ARM64 related ACPI implementation for ACPI driver
core;
acpi_boot_table_init() will be called in setup_arch()
to
From: Naresh Bhat
The Power State Coordination Interface (PSCI) defines an API that
can be used to coordinate power control amongst the various supervisory
systems concurrently running on a device. ACPI support for this
technology would require the addition of two flags: PSCI_COMP
From: Naresh Bhat
There are two flags: PSCI_COMPLIANT and PSCI_USE_HVC. When set,
the former signals to the OS that the hardware is PSCI compliant.
The latter selects the appropriate conduit for PSCI calls by
toggling between Hypervisor Calls (HVC) and Secure Monitor Calls
(SMC).
FADT table cont
From: Naresh Bhat
Add new features for MADT which introduced by ACPI 5.1:
-comment on the GIC ID field of the GIC structure which is replaced
by CPU Interface Number.
-add new fields: Redistributor Base Address, GICV, GICH, and MPIDR.
-add new structures for GIC MSI frame and GICR.
-add flag def
From: Naresh Bhat
Add Generic Interrupt and Distributor (ACPI 5.0) structure.
Signed-off-by: Naresh Bhat
---
xen/include/acpi/actbl1.h | 29 -
1 file changed, 28 insertions(+), 1 deletion(-)
diff --git a/xen/include/acpi/actbl1.h b/xen/include/acpi/actbl1.h
index 9
From: Naresh Bhat
Introduce cputype.h file for arm
Signed-off-by: Naresh Bhat
---
xen/include/asm-arm/cputype.h | 83 +++
1 file changed, 83 insertions(+)
create mode 100644 xen/include/asm-arm/cputype.h
diff --git a/xen/include/asm-arm/cputype.h b/xen
From: Naresh Bhat
Introduce and use cpumask_next_zero, set_cpu_present and set_cpu_possible.
Signed-off-by: Naresh Bhat
---
xen/common/cpu.c | 18 ++
xen/include/xen/cpumask.h | 40
2 files changed, 58 insertions(+)
diff --git
From: Naresh Bhat
Initialization of cpu_logical_map(0) before acpi_boot_init()
Signed-off-by: Hanjun Guo
Signed-off-by: Naresh Bhat
---
xen/arch/arm/setup.c | 5 +
1 file changed, 5 insertions(+)
diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index 3531d47..569b2da 100644
--- a
From: Naresh Bhat
Needed because ARM64 uses GIC which is defined in ACPI 5.0 spec.
Signed-off-by: Al Stone
Signed-off-by: Hanjun Guo
Signed-off-by: Naresh Bhat
---
xen/arch/arm/arm64/acpi/arm-core.c | 6 ++-
xen/drivers/acpi/tables.c | 95 --
2 f
From: Naresh Bhat
When MADT is parsed, print GIC information to make the boot
log look pretty.
Signed-off-by: Hanjun Guo
Signed-off-by: Tomasz Nowicki
Signed-off-by: Naresh Bhat
---
xen/drivers/acpi/tables.c | 39 +++
1 file changed, 39 insertions(+)
diff
From: Naresh Bhat
Parse GTDT (Generic Timer Descriptor Table) to initialize timer.
Using the information presented by GTDT to initialize the arch
timer (not momery-mapped).
Signed-off-by: Naresh Bhat
Signed-off-by: Parth Dixit
---
xen/arch/arm/setup.c | 6 +
xen/arch/arm/time.c| 66
From: Naresh Bhat
Parse ACPI SPCR (Serial Port Console Redirection table) table and
initialize the serial port pl011.
Signed-off-by: Naresh Bhat
Signed-off-by: Parth Dixit
---
xen/arch/arm/setup.c | 6 +
xen/drivers/char/pl011.c | 69 +++
From: Parth Dixit
set edge/level type information for an interrupt
Signed-off-by: Parth Dixit
---
xen/arch/arm/irq.c| 19 +++
xen/include/asm-arm/irq.h | 4
2 files changed, 23 insertions(+)
diff --git a/xen/arch/arm/irq.c b/xen/arch/arm/irq.c
index 25ecf1d..ae4e
From: Naresh Bhat
This patch prepare a DT from scratch for DOM0 for
ACPI-case only. Basically the DT contains minmal
required informations such as DOM0 bootargs, memory
and ACPI RSDP informations only.
Signed-off-by: Naresh Bhat
---
xen/arch/arm/domain_build.c | 67
From: Naresh Bhat
ACPI on Xen hypervisor uses MADT table for proper GIC initialization.
It needs to parse GIC related subtables, collect CPU interface and distributor
addresses and call driver initialization function (which is hardware
abstraction agnostic). In a similar way, FDT initialize GICv1
From: Naresh Bhat
Create a chosen node for DOM0 with
- bootargs
- rsdp
Signed-off-by: Naresh Bhat
Signed-off-by: Parth Dixit
---
xen/arch/arm/domain_build.c | 41 +
1 file changed, 41 insertions(+)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/
From: Parth Dixit
Xen environment table is ACPI table that is used to pass grant table
and event channel interrupt information to dom0.
Signed-off-by: Parth Dixit
---
xen/include/acpi/actbl2.h | 16
1 file changed, 16 insertions(+)
diff --git a/xen/include/acpi/actbl2.h b/xen
From: Parth Dixit
Status override table is used to hide devices from DOM0
that are used by xen
Signed-off-by: Parth Dixit
---
xen/include/acpi/actbl2.h | 14 ++
1 file changed, 14 insertions(+)
diff --git a/xen/include/acpi/actbl2.h b/xen/include/acpi/actbl2.h
index 6aad200..38e35
From: Naresh Bhat
Create a memory node for DOM0.
Signed-off-by: Naresh Bhat
---
xen/arch/arm/domain_build.c | 48 +
1 file changed, 48 insertions(+)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index bb7f043..30bebe5 100644
From: Parth Dixit
For passing ACPI tables to dom0, UEFI memory needs to be mapped
by xen in dom0 address space. This patch adds helper functions for mapping.
Signed-off-by: Parth Dixit
---
xen/arch/arm/p2m.c| 24
xen/include/asm-arm/p2m.h | 10 ++
2 fil
From: Parth Dixit
map acpi tables described in uefi table to dom0 address space
Signed-off-by: Parth Dixit
---
xen/arch/arm/arm64/acpi/arm-core.c | 43 ++
xen/arch/arm/domain_build.c| 4
xen/include/asm-arm/acpi.h | 1 +
3 files change
From: Parth Dixit
Enable PSCI and hvc flags in FADT table so that dom0 uses PSCI to
boot vcpu's
Signed-off-by: Parth Dixit
---
xen/arch/arm/arm64/acpi/arm-core.c | 16
1 file changed, 16 insertions(+)
diff --git a/xen/arch/arm/arm64/acpi/arm-core.c
b/xen/arch/arm/arm64/acpi/
From: Parth Dixit
hide UART used by xen by indicating it in STAO table
and map it to dom0
Signed-off-by: Parth Dixit
---
xen/arch/arm/arm64/acpi/arm-core.c | 50 ++
1 file changed, 50 insertions(+)
diff --git a/xen/arch/arm/arm64/acpi/arm-core.c
b/xen/arch
From: Parth Dixit
map mmio regions described in uefi tables to dom0 address space
Signed-off-by: Parth Dixit
---
xen/arch/arm/domain_build.c | 54 +
1 file changed, 54 insertions(+)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_buil
From: Parth Dixit
XSDT table cannot be passed as is to dom0 because new tables specific to xen
need to be added to its table entries
Signed-off-by: Parth Dixit
---
xen/arch/arm/arm64/acpi/arm-core.c | 65 --
1 file changed, 63 insertions(+), 2 deletions(-)
From: Parth Dixit
efi should be enabled to fetch the root pointer from uefi
Signed-off-by: Parth Dixit
---
xen/common/efi/runtime.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/common/efi/runtime.c b/xen/common/efi/runtime.c
index c840e08..c8b8642 100644
--- a/xen/common/efi/r
From: Parth Dixit
For ACPI on arm device initialization is done by dom0 after parsing DSDT.
xen requires mmio region information described in uefi tables
for mapping it to dom0.
Signed-off-by: Parth Dixit
---
xen/arch/arm/efi/efi-boot.h | 16
xen/arch/arm/setup.c| 1 +
From: Parth Dixit
Some bugs are identified in edk2 and some of the functionality is not
yet merged. This patch contains workarounds for them
Signed-off-by: Parth Dixit
---
xen/arch/arm/domain_build.c | 82 -
xen/arch/arm/vgic.c | 16 +
From: Naresh Bhat
Add ACPI support on arm64 xen hypervisor.
Signed-off-by: Naresh Bhat
---
config/arm64.mk | 1 +
xen/include/asm-arm/config.h | 5 +
2 files changed, 6 insertions(+)
diff --git a/config/arm64.mk b/config/arm64.mk
index 6eafda2..91c1de4 100644
--- a/config/arm
From: Parth Dixit
xen environment table contains the grant table address,size and event
channel interrupt information required by dom0.
Signed-off-by: Parth Dixit
---
xen/arch/arm/arm64/acpi/arm-core.c | 52 +-
1 file changed, 51 insertions(+), 1 deletion(-)
From: Naresh Bhat
MADT contains the information for MPIDR which is essential for
SMP initialization, parse the GIC cpu interface structures to
get the MPIDR value and map it to cpu_logical_map(), and add
enabled cpu with valid MPIDR into cpu_possible_map and
cpu_present_map.
Signed-off-by: Hanju
From: Naresh Bhat
Introduce acpi_parse_entries
Signed-off-by: Naresh Bhat
---
xen/drivers/acpi/tables.c | 64 +++
xen/include/xen/acpi.h| 4 +++
2 files changed, 68 insertions(+)
diff --git a/xen/drivers/acpi/tables.c b/xen/drivers/acpi/tables.
From: Naresh Bhat
With ACPI 5.0, we got per-processor timer support in GTDT,
and ACPI 5.1 introduced the support for platform (memory-mapped)
timers: GT Block and SBSA watchdog timer, add the code needed
in this patch.
Signed-off-by: Hanjun Guo
Signed-off-by: Naresh Bhat
---
xen/include/acpi/
Ian Campbell writes ("Re: [PATCH] ts-rumpuserxen-build: Use new app-tools"):
> On Wed, 2015-02-04 at 12:36 +0100, Martin Lucina wrote:
> > Update to use the new app-tools names.
>
> I'm not sure if we need to support bisection over this change -- but I
> think we probably do (Ian?) in which case w
On Tue, 2015-01-27 at 17:09 +, Ian Campbell wrote:
> On Tue, 2015-01-27 at 16:40 +, Ian Jackson wrote:
> > Ian Campbell writes ("[PATCH v3 07/19] TestSupport: always use xl for
> > generic operations."):
> > > Unless the toolstack is xend (for compatibility with pre-xl Xen
> > > versions),
On 04/02/15 14:33, Ian Jackson wrote:
Ian Campbell writes ("Re: [PATCH] ts-rumpuserxen-build: Use new app-tools"):
On Wed, 2015-02-04 at 12:36 +0100, Martin Lucina wrote:
Update to use the new app-tools names.
I'm not sure if we need to support bisection over this change -- but I
think we pro
rumpxen-app-* has been renamed to rumprun-xen-*. We need to cope with
either, at least for the transition.
Signed-off-by: Ian Jackson
CC: Martin Lucina
---
ts-rumpuserxen-build | 11 ---
1 file changed, 8 insertions(+), 3 deletions(-)
diff --git a/ts-rumpuserxen-build b/ts-rumpuserx
Antti Kantee writes ("Re: [PATCH] ts-rumpuserxen-build: Use new app-tools"):
> On 04/02/15 14:33, Ian Jackson wrote:
> > So we need to probe. I will prepare a patch.
>
> Can the grievous-bodge grievances now be removed, or are prehistoric
> revisions still required to build?
I think we can prob
On Wed, 2015-02-04 at 14:41 +, Ian Jackson wrote:
> rumpxen-app-* has been renamed to rumprun-xen-*. We need to cope with
> either, at least for the transition.
>
> Signed-off-by: Ian Jackson
> CC: Martin Lucina
Acked-by: Ian Campbell
> ---
> ts-rumpuserxen-build | 11 ---
> 1
On 4 February 2015 at 14:02, wrote:
> From: Naresh Bhat
>
> ACPI on Xen hypervisor uses MADT table for proper GIC initialization.
> It needs to parse GIC related subtables, collect CPU interface and distributor
> addresses and call driver initialization function (which is hardware
> abstraction
Wei Liu writes ("[PATCH v2] rump kernels: use new platform macro"):
> Starting from rump kernel changeset 91d5623 ("Renaming platform macros,
> app-tools and autoconf target string"), __RUMPUSER_XEN__ and __RUMPAPP__
> are deleted. We are supposed to use __RUMPRUN__ instead.
>
> We still keep __RU
On Wed, 4 Feb 2015, David Vrabel wrote:
> On 16/12/14 16:21, Juergen Gross wrote:
> > Hi,
> >
> > This is a design proposal for a rework of the config options on the
> > Linux kernel which are related to Xen.
> >
> > The need to do so arose from the fact that it is currently not
> > possible to b
Wei Liu writes ("[PATCH v2] rump kernels: use new platform macro"):
> Starting from rump kernel changeset 91d5623 ("Renaming platform macros,
> app-tools and autoconf target string"), __RUMPUSER_XEN__ and __RUMPAPP__
> are deleted. We are supposed to use __RUMPRUN__ instead.
>
> We still keep __RU
On Wed, 2015-02-04 at 14:57 +, Stefano Stabellini wrote:
> On Wed, 4 Feb 2015, David Vrabel wrote:
> > On 16/12/14 16:21, Juergen Gross wrote:
> > > Hi,
> > >
> > > This is a design proposal for a rework of the config options on the
> > > Linux kernel which are related to Xen.
> > >
> > > The
On Mon, 2 Feb 2015, Julien Grall wrote:
> On 02/02/15 12:16, Ian Campbell wrote:
> > On Mon, 2015-02-02 at 11:40 +, Jan Beulich wrote:
> > On 02.02.15 at 12:14, wrote:
> >>> On Mon, 2015-02-02 at 12:49 +0200, Denys Drozdov wrote:
> The issue observed on credit2 scheduler is similar to
On Wed, 2015-02-04 at 15:04 +, Stefano Stabellini wrote:
> On Mon, 2 Feb 2015, Julien Grall wrote:
> > On 02/02/15 12:16, Ian Campbell wrote:
> > > On Mon, 2015-02-02 at 11:40 +, Jan Beulich wrote:
> > > On 02.02.15 at 12:14, wrote:
> > >>> On Mon, 2015-02-02 at 12:49 +0200, Denys Droz
On Wed, 4 Feb 2015, Ian Campbell wrote:
> On Wed, 2015-02-04 at 14:57 +, Stefano Stabellini wrote:
> > On Wed, 4 Feb 2015, David Vrabel wrote:
> > > On 16/12/14 16:21, Juergen Gross wrote:
> > > > Hi,
> > > >
> > > > This is a design proposal for a rework of the config options on the
> > > > L
Paul,
do you have an estimate on when it is going to be fixed?
If it is not soon, I would prefer to revert the patch for now to unbreak
tests.
Cheers,
Stefano
On Mon, 2 Feb 2015, xen.org wrote:
> branch xen-unstable
> xen branch xen-unstable
> job test-amd64-i386-freebsd10-i386
> test guest-lo
On Mon, 2015-02-02 at 20:03 +0200, Denis Drozdov wrote:
> From: denys drozdov
>
> Make Credit2 and RT schedulers to run on arm platform
> context_saved should be deferred on ARM after IRQs enabled
A better subject+message would be:
xen/arm: Call context_saved() with interrupts enabled d
1 - 100 of 194 matches
Mail list logo