On 08/05/15 14:30, Ian Campbell wrote:
> On Fri, 2015-05-08 at 13:54 +0100, Andrew Cooper wrote:
>> This is in preparation for supporting checkpointed streams in migration v2.
>> - For PV guests, the VCPU context is moved to end_of_checkpoint().
>> - For HVM guests, the HVM context and params are
On Fri, 2015-05-08 at 16:56 +0800, Chao Peng wrote:
> This is the xc/xl changes to support Intel Cache Allocation
> Technology(CAT).
>
> 'xl psr-hwinfo' is updated to show CAT info and two new commands
> for CAT are introduced:
> - xl psr-cat-cbm-set [-s socket]
> Set cache capacity bitmasks(C
On Fri, 2015-05-08 at 16:56 +0800, Chao Peng wrote:
> Add document to introduce basic concepts and terms in PSR family
> technologies and the xl interfaces.
>
> Signed-off-by: Chao Peng
Acked-by: Ian Campbell
___
Xen-devel mailing list
Xen-devel@lis
On Fri, 2015-05-08 at 16:56 +0800, Chao Peng wrote:
> Changes in v7:
I've now acked the last of the tools stuff.
Jan, will you pick that up along with the remaining hypervisor stuff
whenever it is ready please?
Chao, If there are any major changes to the tools bit please ping me
since I may not
On 08/05/15 14:34, Jan Beulich wrote:
> David,
>
> now that we're putting Xen 4.4.x underneath an older distro (SLE11)
> we've got to see that kexec doesn't work there. Initial investigation
> of our kexec person revealed that the destinations attempted to be
> written to by kexec_reloc()'s code fo
>>> On 08.05.15 at 14:54, wrote:
> There is no conceptual problem with setting this parameter more than once.
> Checkpointed migration streams will typically set it once per checkpoint to
> the same value.
>
> The parameter is only actually needed on early-generation VT-x which lacked
> the unres
Some version of the GIC are able so support multiple versions of the
vGIC.
For instance, some version of the GICv3 can as well support GICv2.
Signed-off-by: Julien Grall http://lists.xen.org/xen-devel
The driver only needs to know the base address of the hypervisor
register during the GIC initialization (see gicv2_init).
Signed-off-by: Julien Grall
---
Note that all the other base addresses (dbase, cbase, vbase) will be
move to a common GIC structure in a subsequent patch.
---
xen/ar
... in order to decouple the vGIC driver to the GIC driver.
Signed-off-by: Julien Grall
---
xen/arch/arm/gic-v3.c | 86 +++
xen/include/asm-arm/gic.h | 9 +
2 files changed, 51 insertions(+), 44 deletions(-)
diff --git a/xen/arch/arm/gic-v3.c
The driver only needs to know the base address of the hypervisor
register during the GIC initialization (see gicv2_init).
Signed-off-by: Julien Grall
Cc: Zoltan Kiss
---
Note that all the other base addresses (dbase, cbase, vbase) will be
move to a common GIC structure in a subsequent p
... in order to decouple the vGIC driver from the GIC driver.
Signed-off-by: Julien Grall
---
xen/arch/arm/gic-hip04.c | 34 --
1 file changed, 16 insertions(+), 18 deletions(-)
diff --git a/xen/arch/arm/gic-hip04.c b/xen/arch/arm/gic-hip04.c
index 15e096b..416ef
A platform may have a GIC compatible with previous version of the
device.
This is allow to virtualize an unmodified OS on new hardware if the GIC
is compatible with older version.
When a guest is created, the vGIC will emulate same version as the
hardware. Although, the user can specify in the co
It's not easy to understand PAGE_SIZE * 0x10 and PAGE_SIZE * 16 at the
first glance.
Signed-off-by: Julien Grall
Cc: Zoltan Kiss
---
xen/arch/arm/gic-hip04.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/xen/arch/arm/gic-hip04.c b/xen/arch/arm/gic-hip04.c
index 00e3a
... in order to decouple the vGIC driver from the GIC driver.
Signed-off-by: Julien Grall
---
xen/arch/arm/gic-v2.c | 33 +++--
xen/include/asm-arm/gic.h | 6 ++
2 files changed, 21 insertions(+), 18 deletions(-)
diff --git a/xen/arch/arm/gic-v2.c b/xen/arch
Make clear that the GIC interface is 4K and not rely on PAGE_SIZE == 4K.
Also drop the checks on the page alignment which is not really useful.
If we want to check buggy device tree we would need to do more check
such as on the size...
Although having a buggy device tree is very unlikely as devel
0 is a valid physical address and dt_device_get_address would return
an error if a problem during the retrieving happen.
Signed-off-by: Julien Grall
Cc: Zoltan Kiss
---
xen/arch/arm/gic-hip04.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/xen/arch/arm/gic-hip04.c
* Modify the GICv3 driver to recognize a such device. I wasn't able
to find a register which tell if GICv2 is supported on GICv3. The only
way to find it seems to check if the DT node provides GICC and GICV.
* Disable access to ICC_SRE_EL1 to guest using vGICv2
* The LR is slightly different
There is a global check for page alignment within this function.
Signed-off-by: Julien Grall
Cc: Zoltan Kiss
---
xen/arch/arm/gic-hip04.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/xen/arch/arm/gic-hip04.c b/xen/arch/arm/gic-hip04.c
index efdccdb..00e3abc 100644
>>> On 08.05.15 at 15:41, wrote:
> On Fri, 2015-05-08 at 16:56 +0800, Chao Peng wrote:
>> Changes in v7:
>
> I've now acked the last of the tools stuff.
>
> Jan, will you pick that up along with the remaining hypervisor stuff
> whenever it is ready please?
Sure, I'll try to remember.
Jan
___
Currently, it's hard to decide whether a part of the domain
initialization should live in gicv_setup (part of the GIC
driver) and domain_init (part of the vGIC driver).
The code to initialize the domain for a specific vGIC version is always
the same no matter the version of the GIC.
Move all the
On Tue, 2015-04-28 at 15:32 +0100, Julien Grall wrote:
> Hello all,
>
> This is the sixth version of this patch series to add support for platform
> device passthrough on ARM.
Jan,
>From my side this is all acked, and I think you've acked everything you
are interested in apart from perhaps:
On 08/05/15 14:29, Julien Grall wrote:
> Some version of the GIC are able so support multiple versions of the
> vGIC.
>
> For instance, some version of the GICv3 can as well support GICv2.
>
> Signed-off-by: Julien Grall http://lists.xen.org/xen-devel
On 08/05/15 14:46, Jan Beulich wrote:
On 08.05.15 at 14:54, wrote:
>> There is no conceptual problem with setting this parameter more than once.
>> Checkpointed migration streams will typically set it once per checkpoint to
>> the same value.
>>
>> The parameter is only actually needed on ear
On Fri, 2015-05-08 at 14:37 +0100, Andrew Cooper wrote:
> Does Remus currently function if the sending toolstack suddenly
> disappears out of the mix?
I would assume so, that's its entire purpose...
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.
On Thu, 2015-04-23 at 09:29 -0400, Konrad Rzeszutek Wilk wrote:
> We export the xc_cpumap_alloc but not the bit operations.
> One could include 'xc_bitops.h' but that is naughty - so instead
> we just export the proper functions to do it on the xc_cpumap_t
> typedef.
>
> Signed-off-by: Konrad Rzes
On 08/05/15 14:50, Ian Campbell wrote:
> On Fri, 2015-05-08 at 14:37 +0100, Andrew Cooper wrote:
>> Does Remus currently function if the sending toolstack suddenly
>> disappears out of the mix?
> I would assume so, that's its entire purpose...
But the signal to resume the domain properly involves
>>> On 08.05.15 at 15:12, wrote:
> If you agree on my plan of sending v2 of patch3, and if that will really
> be just the same of v1, but with "int ret=0",
Sounds fine to me too.
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen
My recent patch "use white-lists for HVM param guest accessibility checks"
(commit 30efda12d63ff536102ed8e580b4c09765683b44) introduced a regression
when saving and restoring Windows guests running Xen Project PV drivers.
The drivers reset the event channel ABI on resume. This has the effect of
cl
>>> On 08.05.15 at 15:48, wrote:
> On Tue, 2015-04-28 at 15:32 +0100, Julien Grall wrote:
>> This is the sixth version of this patch series to add support for platform
>> device passthrough on ARM.
>
> From my side this is all acked, and I think you've acked everything you
> are interested in apa
On Mon, 2015-04-27 at 19:31 +0100, Julien Grall wrote:
> Currently, the GICv3 drivers is only able to send an SGI when the cpumask
"driver"
> is provided. Although with the modes SGI_TARGET_OTHERS and SGI_TARGET_SELF,
> no cpumask is provided. Any usage of those modes will crash the hypersivor.
>
On 08/05/15 14:59, Paul Durrant wrote:
> My recent patch "use white-lists for HVM param guest accessibility checks"
> (commit 30efda12d63ff536102ed8e580b4c09765683b44) introduced a regression
> when saving and restoring Windows guests running Xen Project PV drivers.
>
> The drivers reset the event
On Tue, 2015-04-28 at 11:31 +0100, Julien Grall wrote:
> Hi Stefano,
>
> On 28/04/15 11:00, Stefano Stabellini wrote:
> > On Mon, 27 Apr 2015, Julien Grall wrote:
> >> diff --git a/xen/include/asm-arm/gic_v3_defs.h
> >> b/xen/include/asm-arm/gic_v3_defs.h
> >> index b8a1c2e..556f114 100644
> >> -
This is needed so Xen can properly trap 4 byte accesses to 0xcf8 in order to
keep consistency with accesses to 0xcfc. The same treatment is needed for
RTC ports.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v2:
- Trap RTC ports.
Changes since v1:
- Only
On Fri, 2015-05-08 at 14:48 +0100, Jan Beulich wrote:
> >>> On 08.05.15 at 15:41, wrote:
> > On Fri, 2015-05-08 at 16:56 +0800, Chao Peng wrote:
> >> Changes in v7:
> >
> > I've now acked the last of the tools stuff.
> >
> > Jan, will you pick that up along with the remaining hypervisor stuff
>
On Fri, 2015-05-08 at 14:55 +0100, Andrew Cooper wrote:
> On 08/05/15 14:50, Ian Campbell wrote:
> > On Fri, 2015-05-08 at 14:37 +0100, Andrew Cooper wrote:
> >> Does Remus currently function if the sending toolstack suddenly
> >> disappears out of the mix?
> > I would assume so, that's its entire
On Fri, 2015-05-08 at 14:59 +0100, Jan Beulich wrote:
> >>> On 08.05.15 at 15:48, wrote:
> > On Tue, 2015-04-28 at 15:32 +0100, Julien Grall wrote:
> >> This is the sixth version of this patch series to add support for platform
> >> device passthrough on ARM.
> >
> > From my side this is all acke
On Tue, 2015-04-28 at 15:32 +0100, Julien Grall wrote:
> From: Julien Grall
>
> The functions fdt_{fisrt,next}_subnode may not be available because:
> * It has been introduced in 2013 => Doesn't work on Wheezy
> * The prototype exists but the functions are not exposed. Don't ask
> why
On 08/05/15 15:02, Ian Campbell wrote:
> On Tue, 2015-04-28 at 11:31 +0100, Julien Grall wrote:
>> Hi Stefano,
>>
>> On 28/04/15 11:00, Stefano Stabellini wrote:
>>> On Mon, 27 Apr 2015, Julien Grall wrote:
diff --git a/xen/include/asm-arm/gic_v3_defs.h
b/xen/include/asm-arm/gic_v3_defs.
Just like it's done for shadow_track_dirty_vram allocate the temporary
buffer using non-contiguous memory.
Signed-off-by: Roger Pau Monné
Reviewed-by: Tim Deegan
Cc: Tim Deegan
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v4:
- Use vzalloc in order to allocate zeroed memory.
---
xen/
Modify shadow_track_dirty_vram to use a local buffer and then flush to the
guest without the paging_lock held. This is modeled after
hap_track_dirty_vram.
Signed-off-by: Roger Pau Monné
Reviewed-by: Tim Deegan
Cc: Tim Deegan
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v4:
- Use newly
When the caller of paging_log_dirty_op is a hvm guest Xen would choke when
trying to copy the dirty bitmap to the guest because the paging lock is
already held.
Fix this by independently mapping each page of the guest bitmap as needed
without the paging lock held.
Signed-off-by: Roger Pau Monné
Changes in this version include the removal of the red-black tree in order
to keep track of vmalloced regions, to unmap them a VA -> PA lookup is
done. Also this version introduces vzalloc.
Thanks, Roger.
___
Xen-devel mailing list
Xen-devel@lists.xen
The allocator uses independent calls to alloc_domheap_pages in order to get
the desired amount of memory and then maps all the independent physical
addresses into a contiguous virtual address space.
Signed-off-by: Roger Pau Monné
Tested-by: Julien Grall (ARM)
Cc: Stefano Stabellini
Cc: Ian Camp
Hi Ian,
On 08/05/15 15:01, Ian Campbell wrote:
> On Mon, 2015-04-27 at 19:31 +0100, Julien Grall wrote:
>> Currently, the GICv3 drivers is only able to send an SGI when the cpumask
>
> "driver"
>
>> is provided. Although with the modes SGI_TARGET_OTHERS and SGI_TARGET_SELF,
>> no cpumask is prov
On Wed, 2015-05-06 at 06:02 +0100, Wei Liu wrote:
> ... so that we can run ./configure in each subsystem.
>
> Make inclusion of Paths-*.mk mandatory. Skip generating a global
> Paths.mk since it's of no use anymore.
>
> Signed-off-by: Wei Liu
> Cc: Ian Campbell
> Cc: Ian Jackson
> Acked-by: Ia
Sorry for the late review. This series fell through the crack.
On Fri, Apr 10, 2015 at 05:21:55PM +0800, Tiejun Chen wrote:
> While building a VM, HVM domain builder provides struct hvm_info_table{}
> to help hvmloader. Currently it includes two fields to construct guest
> e820 table by hvmloader,
flight 53803 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/53803/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail blocked in 50281
test-amd64-i386-fre
On Fri, 2015-05-08 at 12:46 +, osstest service user wrote:
> flight 53768 xen-4.3-testing real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/53768/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-i386-fr
On 08/05/15 15:27, Ian Campbell wrote:
> On Tue, 2015-04-28 at 15:32 +0100, Julien Grall wrote:
>> From: Julien Grall
>>
>> The functions fdt_{fisrt,next}_subnode may not be available because:
>> * It has been introduced in 2013 => Doesn't work on Wheezy
>> * The prototype exists but the f
On 08/05/15 15:34, Roger Pau Monne wrote:
> The allocator uses independent calls to alloc_domheap_pages in order to get
> the desired amount of memory and then maps all the independent physical
> addresses into a contiguous virtual address space.
>
> Signed-off-by: Roger Pau Monné
> Tested-by: Jul
flight 53898 xen-4.3-testing running [real]
http://logs.test-lab.xenproject.org/osstest/logs/53898/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64 queued
test-amd64-i3
Hey guys,
I just noticed that the ARINC653 scheduler record in MAINTAINERS reads
as follows:
ARINC653 SCHEDULER
M: Nathan Studer
M: Robert VanVossen
S: Supported
F: xen/common/sched_arinc653.c
F: tools/libxc/xc_arinc653.c
Is that still accurate? I'm especially referrin
In latest years hvm domUs support and performance was increased but
windows boot time is still too long.
I tried out all sort of combinations (without pv, with old gplpv and new
winpv, with vnc, spice or without both, with different vgas and many
other options) with same result: strange long boo
On Wed, 2015-05-06 at 14:15 -0400, Boris Ostrovsky wrote:
> Add set_xen_guest_handle_offset() macro that can be used for setting
> xen_guest_handle to an offset into hypercall buffer.
>
> Signed-off-by: Boris Ostrovsky
> ---
> tools/libxc/include/xenctrl.h | 11 ---
> 1 files changed,
On Thu, 2015-04-23 at 09:29 -0400, Konrad Rzeszutek Wilk wrote:
> Hey George, Ian,
>
>
> Ian: I copied your comment and stuffed it in, please Ack:
> [PATCH v4.1 1/3] libxl/cpumap: Add xc_cpumap_[setcpu, clearcpu,
>
> already Acked:
> [PATCH v4.1 2/3] libxc/xentrace: Use xc_cpumap_t for
Applie
> -Original Message-
> From: win-pv-devel-boun...@lists.xenproject.org [mailto:win-pv-devel-
> boun...@lists.xenproject.org] On Behalf Of Fabio Fantoni
> Sent: 08 May 2015 15:54
> To: xen-devel; win-pv-de...@lists.xenproject.org
> Cc: Anthony Perard; Wei Liu; Ian Campbell; Stefano Stabellin
On Thu, 2015-05-07 at 10:26 +0100, Wei Liu wrote:
> On Thu, May 07, 2015 at 08:54:26AM +, Olaf Hering wrote:
> > Handle NULL pointer passed to xlu_cfg_destroy. libvirt calls it in its
> > libxlDriverConfigDispose function. If the XLU_Config was not initialized
> > yet for some reason a crash wo
On Fri, 2015-05-01 at 14:30 +0100, Ian Campbell wrote:
> On Fri, 2015-04-24 at 10:03 +0100, Wei Liu wrote:
> > Reported-by: Olaf Hering
> > Signed-off-by: Wei Liu
>
> Acked-by: Ian Campbell
Now applied, thanks.
___
Xen-devel mailing list
Xen-devel
On Wed, 2015-04-29 at 11:20 +0200, Fabio Fantoni wrote:
> Usage:
> vga="qxl"
>
> Qxl vga support many resolutions that not supported by stdvga,
> mainly the 16:9 ones and other high up to 2560x1600.
> With QXL you can get improved performance and smooth video also
> with high resolutions and high
On Fri, 2015-05-08 at 14:00 +0100, Andrew Cooper wrote:
> And of course, I meant s/quote/bracket/ in the subject.
I fixed that and applied.
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Tue, 2015-04-28 at 15:32 +0100, Julien Grall wrote:
> Hello all,
>
> This is the sixth version of this patch series to add support for platform
> device passthrough on ARM.
I've applied up to but not including "tools/libxl: Check if
fdt_{first,next}_subnode are present in libfdt" which I've re
Thanks Dario. We actually just sent out a patch this week to have josh
whitehead replace nate studer as a maintainer for the arinc653 scheduler.
Thanks,
Robbie VanVossen
Sent from my Verizon Wireless 4G LTE smartphone
Original message
From: Dario Faggioli
Date: 05/08/2015
>>> On 08.05.15 at 16:52, wrote:
> Hey guys,
>
> I just noticed that the ARINC653 scheduler record in MAINTAINERS reads
> as follows:
>
> ARINC653 SCHEDULER
> M: Nathan Studer
> M: Robert VanVossen
> S: Supported
> F: xen/common/sched_arinc653.c
> F: tools/libxc/xc_ari
>>> On 08.05.15 at 16:50, wrote:
> On 08/05/15 15:34, Roger Pau Monne wrote:
>> +
>> +void *vmalloc(unsigned long size)
>> +{
>> +unsigned long *mfn;
>> +unsigned long pages, i;
>> +struct page_info *pg;
>> +void *va = NULL;
>> +
>> +ASSERT(!in_irq());
>> +
>> +if ( size ==
>>> On 08.05.15 at 16:05, wrote:
> This is needed so Xen can properly trap 4 byte accesses to 0xcf8 in order to
> keep consistency with accesses to 0xcfc. The same treatment is needed for
> RTC ports.
I guess I'll try to remember re-wording this and the respective code
comment on commit: "The sam
Il 08/05/2015 16:59, Paul Durrant ha scritto:
-Original Message-
From: win-pv-devel-boun...@lists.xenproject.org [mailto:win-pv-devel-
boun...@lists.xenproject.org] On Behalf Of Fabio Fantoni
Sent: 08 May 2015 15:54
To: xen-devel; win-pv-de...@lists.xenproject.org
Cc: Anthony Perard; Wei
On Wed, 2015-05-06 at 14:15 -0400, Boris Ostrovsky wrote:
> .. and use this new interface to display it along with CPU topology
> and NUMA information when 'xl info -n' command is issued
>
> The output will look like
> ...
> cpu_topology :
> cpu:coresocket node
> 0: 0
On Fri, May 08, 2015 at 09:24:56AM +0800, Chen, Tiejun wrote:
> Campbell, Jackson, Wei and Stefano,
>
> Any consideration?
>
> I can follow up Jan's idea but I need you guys make sure I'm going to do
> this properly.
>
Look at my earlier reply.
1. This function seems to have bug.
2. Caller sho
On Fri, May 08, 2015 at 03:43:14PM +0100, Ian Campbell wrote:
> On Wed, 2015-05-06 at 06:02 +0100, Wei Liu wrote:
> > ... so that we can run ./configure in each subsystem.
> >
> > Make inclusion of Paths-*.mk mandatory. Skip generating a global
> > Paths.mk since it's of no use anymore.
> >
> > S
On Wed, 2015-04-22 at 23:51 -0500, Suravee Suthikulpanit wrote:
> Since fdt_begin_node() is called by all gicXX_make_dt_node() to create
> the interrupt-controller devicetree node, this patch refactors the call
> and moves it inside make_gic_node(). This also matches the fdt_end_node()
> call at th
>>> On 08.05.15 at 16:34, wrote:
> --- a/xen/common/vmap.c
> +++ b/xen/common/vmap.c
> @@ -146,7 +146,7 @@ static unsigned int vm_index(const void *va)
> test_bit(idx, vm_bitmap) ? idx : 0;
> }
>
> -static unsigned int vm_size(const void *va)
> +unsigned int vm_size(const void *va)
>>> On 08.05.15 at 16:34, wrote:
> @@ -3668,21 +3671,19 @@ int shadow_track_dirty_vram(struct domain *d,
> if ( map_sl1p )
> sh_unmap_domain_page(map_sl1p);
>
> -rc = -EFAULT;
> -if ( copy_to_guest(dirty_bitmap, dirty_vram->dirty_bitmap,
> dirty_size) == 0
On 08/05/15 16:28, Jan Beulich wrote:
On 08.05.15 at 16:34, wrote:
>> @@ -3668,21 +3671,19 @@ int shadow_track_dirty_vram(struct domain *d,
>> if ( map_sl1p )
>> sh_unmap_domain_page(map_sl1p);
>>
>> -rc = -EFAULT;
>> -if ( copy_to_guest(dirty_bitmap, d
On Wed, 2015-04-22 at 23:52 -0500, Suravee Suthikulpanit wrote:
> This patch detect and propagate the gic-v2m-frame devicetree sub-node.
"detects and propagates"
> This allows Dom0 kernel to setup and intialize GICv2m MSI frame.
"initialize"
IIRC the GICv2m is described rather briefly in an app
On 05/08/2015 10:57 AM, Ian Campbell wrote:
On Wed, 2015-05-06 at 14:15 -0400, Boris Ostrovsky wrote:
Add set_xen_guest_handle_offset() macro that can be used for setting
xen_guest_handle to an offset into hypercall buffer.
Signed-off-by: Boris Ostrovsky
---
tools/libxc/include/xenctrl.h |
On Fri, 2015-05-08 at 14:50 +, osstest service user wrote:
> flight 53898 xen-4.3-testing running [real]
> http://logs.test-lab.xenproject.org/osstest/logs/53898/
>
> Failures and problems with tests :-(
Killed, see <1431096458.2660.486.ca...@citrix.com> which was a force
push of the result o
On Fri, 2015-05-08 at 15:27 +0100, Julien Grall wrote:
> On 08/05/15 15:02, Ian Campbell wrote:
> > On Tue, 2015-04-28 at 11:31 +0100, Julien Grall wrote:
> >> Hi Stefano,
> >>
> >> On 28/04/15 11:00, Stefano Stabellini wrote:
> >>> On Mon, 27 Apr 2015, Julien Grall wrote:
> diff --git a/xen/i
On Fri, 2015-05-08 at 15:34 +0100, Julien Grall wrote:
> Hi Ian,
>
> On 08/05/15 15:01, Ian Campbell wrote:
> > On Mon, 2015-04-27 at 19:31 +0100, Julien Grall wrote:
> >> Currently, the GICv3 drivers is only able to send an SGI when the cpumask
> >
> > "driver"
> >
> >> is provided. Although wi
On Fri, 2015-05-08 at 11:41 -0400, Boris Ostrovsky wrote:
> On 05/08/2015 10:57 AM, Ian Campbell wrote:
> > On Wed, 2015-05-06 at 14:15 -0400, Boris Ostrovsky wrote:
> >> Add set_xen_guest_handle_offset() macro that can be used for setting
> >> xen_guest_handle to an offset into hypercall buffer.
>
On 08/05/15 14:34, Jan Beulich wrote:
> David,
>
> now that we're putting Xen 4.4.x underneath an older distro (SLE11)
> we've got to see that kexec doesn't work there. Initial investigation
> of our kexec person revealed that the destinations attempted to be
> written to by kexec_reloc()'s code f
On Wed, 2015-04-08 at 20:24 +0300, Andrii Anisov wrote:
I was thinking about this a little more...
> The context here is pretty simple: just a workaround of the real
> system limitations:
> 1. Renesas R-Car H2 evaluation board lager has 4GB of RAM, 2GB
> mapped under 4GB boundary and
On 05/08/2015 11:56 AM, Ian Campbell wrote:
On Fri, 2015-05-08 at 11:41 -0400, Boris Ostrovsky wrote:
On 05/08/2015 10:57 AM, Ian Campbell wrote:
On Wed, 2015-05-06 at 14:15 -0400, Boris Ostrovsky wrote:
Add set_xen_guest_handle_offset() macro that can be used for setting
xen_guest_handle to a
>>> On 06.05.15 at 19:12, wrote:
> --- a/xen/arch/x86/hvm/emulate.c
> +++ b/xen/arch/x86/hvm/emulate.c
> @@ -578,6 +578,25 @@ static int hvmemul_read(
> container_of(ctxt, struct hvm_emulate_ctxt, ctxt));
> }
>
> +static int hvmemul_read_set_context(
> +enum x86_segment seg,
> +
Hi,
On 10/04/15 10:21, Tiejun Chen wrote:
> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
> index ca0e51e..e5ba7cb 100644
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -493,6 +493,10 @@ DEFINE_XEN_GUEST_HANDLE(xen_domctl_sendtrigger_t);
> /*
>>> On 06.05.15 at 19:12, wrote:
> Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST,
Perhaps better VM_EVENT_REASON_GUEST_REQUEST?
> --- a/xen/arch/x86/hvm/event.c
> +++ b/xen/arch/x86/hvm/event.c
> @@ -167,6 +167,20 @@ void hvm_event_xsetbv(unsigned long xcr, uint64_t value)
There seems to be a pvgrub regression somewhere in the range
3a28f760508f..123c77937975 instead of booting the selected kernel I get:
Booting 'Debian GNU/Linux, kernel 3.2.0-4-amd64'
root (hd0,0)
Filesystem type is ext2fs, partition type 0x83
>>> On 06.05.15 at 19:12, wrote:
> --- a/xen/include/asm-x86/domain.h
> +++ b/xen/include/asm-x86/domain.h
> @@ -518,6 +518,11 @@ struct arch_vcpu
> struct vm_event_emul_read_data emul_read_data;
> } vm_event;
>
> +struct {
> +bool_t do_write;
> +uint64_t msr;
>
On 07/05/15 14:57, Ian Campbell wrote:
>
> DECLARE_HYPERCALL_BUFFER_SHADOW seems to currently be unused, David
> added it in 60572c972b8d, I suspect to be used by migration v2, although
> perhaps it never was (at least not in tree yet).
It's used by kexec-tools.
David
__
On Fri, 2015-05-08 at 12:05 -0400, Boris Ostrovsky wrote:
> On 05/08/2015 11:56 AM, Ian Campbell wrote:
> > On Fri, 2015-05-08 at 11:41 -0400, Boris Ostrovsky wrote:
> >> On 05/08/2015 10:57 AM, Ian Campbell wrote:
> >>> On Wed, 2015-05-06 at 14:15 -0400, Boris Ostrovsky wrote:
> Add set_xen_g
On Fri, 2015-05-08 at 12:26 +0100, Ian Campbell wrote:
> Although in principal #interrupt-cells can vary it must always be 3
> for a GIC (and we only support GIC as a guest interrupt controller),
> so putting it in common code is OK.
>
> Signed-off-by: Ian Campbell
> Reviewed-by: Julien Grall
a
From: Julien Grall
The partial device tree may contains phandle. The Device Tree Compiler
tends to allocate the phandle from 1.
Reserve the ID 65000 for the GIC phandle. I think we can safely assume
that the partial device tree will never contain a such ID.
Signed-off-by: Julien Grall
Acked-by
From: Julien Grall
The option "dtdev" will be used to passthrough a device described
in the device tree to a guest.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
Cc: Ian Jackson
Cc: Wei Liu
---
Changes in v5:
- Drop "non-PCI" in the commit message
- Add Ian's ack
Hello all,
This a resend of the last part of non-PCI passthrough after a build issue
spotted by Ian in "Check if fdt_{first,next}_subnode are present in libfdt".
Sincerely yours,
Julien Grall (6):
tools/libxl: Check if fdt_{first,next}_subnode are present in libfdt
tools/(lib)xl: Add partial
From: Julien Grall
On ARM, every non-PCI device are described in the device tree. Each of
them can be found via a path.
This patch introduces a very basic support, only the IOMMU will be set
up correctly. The user will have to:
- Describe the device in the partial device tree
- Map manua
From: Julien Grall
Note that the example is done on Midway whose SMMU driver is not
supported on Xen upstream.
Currently, I don't have other platform where I can test Device Tree
passthrough.
Signed-off-by: Julien Grall
Acked-by: Ian Campbell
---
Changes in v6:
- Typo in the doc
From: Julien Grall
The functions fdt_{fisrt,next}_subnode may not be available because:
* It has been introduced in 2013 => Doesn't work on Wheezy
* The prototype exists but the functions are not exposed. Don't ask
why...
The later has been fixed recently in the dtc repo [1]
When th
From: Julien Grall
Allow the user to pass additional nodes to the guest device tree. For
this purpose, everything in the node /passthrough from the partial
device tree will be copied into the guest device tree.
The node /aliases will be also copied to allow the user to define
aliases which can b
On 05/08/2015 07:16 PM, Jan Beulich wrote:
On 06.05.15 at 19:12, wrote:
>> Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST,
>
> Perhaps better VM_EVENT_REASON_GUEST_REQUEST?
It does sound better, I'll change it.
>> --- a/xen/arch/x86/hvm/event.c
>> +++ b/xen/arch/x86/hv
Hi Chen,
On 07/04/15 08:33, Chen Baozi wrote:
> From: Chen Baozi
>
> On arm64, either firmware or xen's smp_up_cpu gate uses WFE on secondary
> cpus to stand-by when booting. Thus, using SEV is enough for the boot
> cpu to kick other secondaries. Further more, the current implementation
> of cpu
On Tue, 2015-04-07 at 15:33 +0800, Chen Baozi wrote:
> From: Chen Baozi
>
> On arm64, either firmware or xen's smp_up_cpu gate uses WFE on secondary
> cpus to stand-by when booting. Thus, using SEV is enough for the boot
> cpu to kick other secondaries. Further more, the current implementation
>
1 - 100 of 310 matches
Mail list logo