There's no point calling xen_pcibk_config_read() here - all it'll do is
return whatever conf_space_read() returns for the field which was found
here (and which would be found there again). Also there's no point
clearing tmp_val before the call.
Signed-off-by: Jan Beulich
---
drivers/xen/xen-pcib
req_start is simply an alias of the "offset" function parameter, and
req_end is being used just once in each function. (And both variables
were loop invariant anyway, so should at least have got initialized
outside the loop.)
Signed-off-by: Jan Beulich
---
drivers/xen/xen-pciback/conf_space.c |
On 7/5/2016 8:16 PM, Razvan Cojocaru wrote:
On 07/05/16 17:28, Corneliu ZUZU wrote:
The arch_vm_event structure is dynamically allocated and freed @
vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack user
disables domain monitoring (xc_monitor_disable), which in turn effe
>>> On 05.07.16 at 20:26, wrote:
> On Fri, Apr 15, 2016 at 02:33:12PM +0200, Daniel Kiper wrote:
>> 1) We could use native EFI allocation functions (e.g. AllocatePool()
>>or AllocatePages()) to get memory chunk. However, later (somewhere
>>in __start_xen()) we must copy its contents to saf
While testing some patches for support of ballooning in Mini-OS by using
the xenstore domain I realized that each xl create/destroy pair would
increase memory consumption in Mini-OS by about 5kB. Wondering whether
this is a xenstore domain only effect I did the same test with xenstored
and oxenstor
flight 66523 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66523/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 4 capture-logs !broken
>>> On 05.07.16 at 20:37, wrote:
> +struct vm_event_regs_arm64 {
> +uint64_t x0;
> +uint64_t x1;
> +uint64_t x2;
> +uint64_t x3;
> +uint64_t x4;
> +uint64_t x5;
> +uint64_t x6;
> +uint64_t x7;
> +uint64_t x8;
> +uint64_t x9;
> +uint64_t x10;
> +uint6
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Andrew Cooper
> Sent: 05 July 2016 18:26
> To: Anthony Perard; xen-devel@lists.xen.org; Jan Beulich
> Subject: Re: [Xen-devel] [RFC] Hypervisor, x86 emulation deprivileged
>
> On 05/07/16 12:22,
On 07/06/16 10:43, Jan Beulich wrote:
On 05.07.16 at 20:37, wrote:
>> +struct vm_event_regs_arm64 {
>> +uint64_t x0;
>> +uint64_t x1;
>> +uint64_t x2;
>> +uint64_t x3;
>> +uint64_t x4;
>> +uint64_t x5;
>> +uint64_t x6;
>> +uint64_t x7;
>> +uint64_t x8;
>> +
Hi Julien,
On 07/04/2016 10:53 PM, Julien Grall wrote:
> (CC Tamas)
>
> Hello Sergej,
>
> On 04/07/2016 12:45, Sergej Proskurin wrote:
>> This commit adds the function p2m_altp2m_lazy_copy implementing the
>> altp2m paging mechanism. The function p2m_altp2m_lazy_copy lazily copies
>> the hostp2m'
Hi Julien,
On 07/04/2016 10:58 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/2016 12:45, Sergej Proskurin wrote:
>> Signed-off-by: Sergej Proskurin
>> ---
>> Cc: Stefano Stabellini
>> Cc: Julien Grall
>> ---
>> xen/arch/arm/p2m.c | 6 --
>> 1 file changed, 4 insertions(+), 2 deleti
Hi Razvan,
On 07/04/2016 03:38 PM, Razvan Cojocaru wrote:
> On 07/04/16 14:45, Sergej Proskurin wrote:
>> Signed-off-by: Sergej Proskurin
>> ---
>> Cc: Razvan Cojocaru
>> Cc: Tamas K Lengyel
>> Cc: Ian Jackson
>> Cc: Wei Liu
>> ---
>> tools/tests/xen-access/xen-access.c | 11 +--
>>
Hi Julien,
On 07/05/2016 12:19 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> +static int do_altp2m_op(XEN_GUEST_HANDLE_PARAM(void) arg)
>> +{
>> +struct xen_hvm_altp2m_op a;
>> +struct domain *d = NULL;
>> +int rc = 0;
>> +
>> +if ( !hvm
Hi,
I was searching for limiting IOPS for the disk attached to XenServer VMs. And I
couldn't find a way to limit the IOPS.
So, I was wondering whether XenServer actually supports limiting IOPS or not.
If yes, what are the ways, both user and programmatical, to do so.
Thanks & Regards,
Ganesh.
Hi!
Quoting Dirk Behme (2016-06-30 03:32:32)
> Some clocks might be used by the Xen hypervisor and not by the Linux
> kernel. If these are not registered by the Linux kernel, they might be
> disabled by clk_disable_unused() as the kernel doesn't know that they
> are used. The clock of the serial c
Hello !
I am posting Xen virtualisation bug links to this e-mail address,
because I wasn't able to find the Xen specific bugtracker list.
This bug has been discovered in 2015 and so far it hasn't been
resolved through the Debian/Kernel bug lists. I submit the
links to bug reports for you.
https:/
On 06/07/16 07:47, Jan Beulich wrote:
> The first five patches are the result of the requested split of
> "xen-pciback: clean up {bar,rom}_init()", with Boris'es R-b
> dropped despite there not being any functional change (the
> mechanical change appears too significant to retain it). The
> remaini
Hi Stefano,
On 05/07/16 18:13, Stefano Stabellini wrote:
On Thu, 23 Jun 2016, Julien Grall wrote:
On 23/06/2016 04:17, Shannon Zhao wrote:
From: Shannon Zhao
Copy all the ACPI tables to guest space so that UEFI or guest could
access them.
Signed-off-by: Shannon Zhao
---
tools/libxc/xc_do
Hi Stefano,
On 05/07/16 17:42, Stefano Stabellini wrote:
On Mon, 27 Jun 2016, Julien Grall wrote:
On 27/06/16 02:44, Shannon Zhao wrote:
On 2016/6/24 0:26, Julien Grall wrote:
On 23/06/16 04:16, Shannon Zhao wrote:
From: Shannon Zhao
Construct GTDT table with the interrupt information of t
Hi Corneliu,
On 05/07/16 15:30, Corneliu ZUZU wrote:
Minor fixes:
- remove some empty lines
- remove some unused includes
- multi-line comment fixes
- 80-columns formatting fixes
Signed-off-by: Corneliu ZUZU
Acked-by: Julien Grall
Regards,
--
Julien Grall
(CC Stefano)
Hi Boris,
On 05/07/16 20:05, Boris Ostrovsky wrote:
Add entry for ACPI tables created for PVHv2 guests to e820 map.
Signed-off-by: Boris Ostrovsky
---
New patch
tools/libxc/include/xc_dom.h |4
tools/libxl/libxl_dom.c |8
tools/libxl/libxl_x86.c
flight 96688 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96688/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 6 xen-boot fail REGR. vs. 96611
Regressions which ar
On Wed, 6 Jul 2016, Juergen Gross wrote:
> Up to now reading the stolen time of a remote cpu was not possible in a
> performant way under Xen. This made support of runqueue steal time via
> paravirt_steal_rq_enabled impossible.
>
> With the addition of an appropriate hypervisor interface this is n
On Wed, 6 Jul 2016, Julien Grall wrote:
> Hi Stefano,
>
> On 05/07/16 18:13, Stefano Stabellini wrote:
> > On Thu, 23 Jun 2016, Julien Grall wrote:
> > > On 23/06/2016 04:17, Shannon Zhao wrote:
> > > > From: Shannon Zhao
> > > >
> > > > Copy all the ACPI tables to guest space so that UEFI or gu
On Wed, 6 Jul 2016, Julien Grall wrote:
> Hi Stefano,
>
> On 05/07/16 17:42, Stefano Stabellini wrote:
> > On Mon, 27 Jun 2016, Julien Grall wrote:
> > > On 27/06/16 02:44, Shannon Zhao wrote:
> > > > On 2016/6/24 0:26, Julien Grall wrote:
> > > > > On 23/06/16 04:16, Shannon Zhao wrote:
> > > > >
On Tue, 28 Jun 2016, Julien Grall wrote:
> to avoid mixing machine frame with guest frame.
>
> Signed-off-by: Julien Grall
> Acked-by: Jan Beulich
Acked-by: Stefano Stabellini
> ---
> Cc: Stefano Stabellini
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc
On Wed, Jul 06, 2016 at 12:55:42AM -0600, Jan Beulich wrote:
> >>> On 05.07.16 at 20:33, wrote:
> > On Fri, May 27, 2016 at 02:16:09AM -0600, Jan Beulich wrote:
> >> >>> On 25.05.16 at 18:45, wrote:
> >> > On Wed, May 25, 2016 at 01:03:42AM -0600, Jan Beulich wrote:
> >> >> >>> On 15.04.16 at 14:
On Tue, 28 Jun 2016, Julien Grall wrote:
> Also take the opportunity to convert arch/x86/debug.c to the typesafe gfn.
>
> Signed-off-by: Julien Grall
For the ARM bits
Acked-by: Stefano Stabellini
> ---
> Cc: Mukesh Rathor
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: Paul Durrant
> Cc: Bor
On Tue, 28 Jun 2016, Julien Grall wrote:
> Also take the opportunity to convert arch/x86/debug.c to the typesafe
> mfn.
>
> Signed-off-by: Julien Grall
>
> ---
> Cc: Christoph Egger
> Cc: Liu Jinsong
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: Mukesh Rathor
> Cc: Paul Durrant
> Cc: Jun Nak
On Tue, 28 Jun 2016, Julien Grall wrote:
> The prototype and the declaration of p2m_lookup disagree on how the
> function should be used. One expect a frame number whilst the other
> an address.
>
> Thankfully, everyone is using with an address today. However, most of
> the callers have to convert
On Tue, 28 Jun 2016, Julien Grall wrote:
> p2m_cache_flush is expecting GFNs in parameter and not MFNs. Rename
> the variable to *gfn* and use typesafe to avoid possible misusage.
>
> Also, modify the prototype of the function to describe the range
> using the start and the number of GFNs. This wi
flight 96711 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96711/
Perfect :-)
All tests in this flight passed
version targeted for testing:
xen fea586d801f75317cb8cf593e8beba842391da62
baseline version:
xen bb4f41b3dff831faaf
On Tue, 28 Jun 2016, Julien Grall wrote:
> The parameter 'access' is used by memaccess to restrict temporarily the
> permission. This parameter should not be used for other purpose (such
> as restricting permanently the permission).
>
> The type p2m_mmio_direct will map the region Read-Write and
>
On Tue, 28 Jun 2016, Julien Grall wrote:
> The code to allocate memory when dom0 does not use direct mapping is
> relying on the presence of memory node in the DT.
>
> However, they are not present when booting using UEFI or when using
> ACPI.
>
> Rather than fixing the code, remove it because do
On Tue, 28 Jun 2016, Julien Grall wrote:
> The operation ALLOCATE is unused. If we ever need it, it could be
> reimplemented with INSERT.
>
> Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
> ---
> Changes in v4:
> - Patch added
> ---
> xen/arch/arm/p2m.c| 67
>
On Tue, 28 Jun 2016, Julien Grall wrote:
> to avoid mixing machine frame with guest frame. Also rename the
> parameters of the function and drop pointless PAGE_MASK in the caller.
>
> Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
> ---
> Changes in v4:
> - Patch added
>
On Tue, 28 Jun 2016, Julien Grall wrote:
> More the half of the arguments of INSERT and REMOVE are the same for
> each callers. Simplify the callers of apply_p2m_changes by adding new
> helpers which will fill common arguments with default values.
>
> Signed-off-by: Julien Grall
I don't see much
Juergen Gross writes ("[PATCH 0/3] libxl: add framework for device types"):
> Instead of duplicate coding for each device type (vtpms, usbctrls, ...)
> especially on domain creation introduce a framework for that purpose.
I think something like this is a jolly good idea. Thanks a lot!
The rough
On Tue, 28 Jun 2016, Julien Grall wrote:
> Most of the callers of apply_p2m_changes have a GFN, a MFN and the
> number of frame to change in hand.
>
> Rather than asking each caller to convert the frame to an address,
> rework the interfaces to pass the GFN, MFN and the number of frame.
>
> Note
(CC Stefano)
Hi Boris,
On 05/07/16 20:05, Boris Ostrovsky wrote:
diff --git a/tools/libxl/libxl_arch.h b/tools/libxl/libxl_arch.h
index 34a853c..7c6536b 100644
--- a/tools/libxl/libxl_arch.h
+++ b/tools/libxl/libxl_arch.h
@@ -62,4 +62,7 @@ int libxl__arch_domain_construct_memmap(libxl__gc *gc,
On Tue, 28 Jun 2016, Julien Grall wrote:
> Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
> Changes in v4:
> - Patch added
> ---
> xen/arch/arm/mm.c | 2 +-
> xen/arch/arm/p2m.c| 18 +-
> xen/include/asm-arm/p2m.h | 4 ++--
> 3 files cha
(CC Tamas)
On 06/07/16 11:43, Stefano Stabellini wrote:
On Tue, 28 Jun 2016, Julien Grall wrote:
The parameter 'access' is used by memaccess to restrict temporarily the
permission. This parameter should not be used for other purpose (such
as restricting permanently the permission).
The type p2
Wei Liu writes ("[PATCH v2 3/5] libxc: wrapper for log level sysctl"):
> Signed-off-by: Wei Liu
I have no objection to this new wrapper but the actual code is very
tedious. Is this really the least repetitive way of writing this ?
Ian.
___
Xen-devel
Wei Liu writes ("[PATCH v2 2/5] xen/console: allow log level threshold
adjustments"):
> ... from serial console and via sysctl so that one doesn't always need
> to reboot to see more / less messages.
>
> Note that upper thresholds driven from the serial console are sticky,
> i.e. while they get a
Wei Liu writes ("[PATCH v2 4/5] libxl: introduce APIs to get and set log
level"):
> Signed-off-by: Wei Liu
...
> +int libxl_set_log_level(libxl_ctx *ctx, bool guest,
> +char *lower_thresh, char *upper_thresh)
I think the log level names should be exposed as a list to the
On Wed, Jul 06, 2016 at 01:22:24AM -0600, Jan Beulich wrote:
> >>> On 05.07.16 at 20:26, wrote:
> > On Fri, Apr 15, 2016 at 02:33:12PM +0200, Daniel Kiper wrote:
> >> 1) We could use native EFI allocation functions (e.g. AllocatePool()
> >>or AllocatePages()) to get memory chunk. However, late
On Wed, 6 Jul 2016, Julien Grall wrote:
> (CC Tamas)
>
> On 06/07/16 11:43, Stefano Stabellini wrote:
> > On Tue, 28 Jun 2016, Julien Grall wrote:
> > > The parameter 'access' is used by memaccess to restrict temporarily the
> > > permission. This parameter should not be used for other purpose (su
On 01/07/2016 20:04, "Ian Jackson" wrote:
>David Vrabel writes ("Re: [Xen-devel] xenbits "official" repo for XTF
>(was Re: [PATCH 0/2] xtf: add launcher (+1 bugfix)"):
>> On 20/06/16 18:03, Ian Jackson wrote:
>> > Hopefully we can find one that Andrew likes and that's acceptable to
>> > the com
Hi Stefano,
On 06/07/16 11:59, Stefano Stabellini wrote:
On Tue, 28 Jun 2016, Julien Grall wrote:
More the half of the arguments of INSERT and REMOVE are the same for
each callers. Simplify the callers of apply_p2m_changes by adding new
helpers which will fill common arguments with default valu
On 06/07/16 12:17, Stefano Stabellini wrote:
On Wed, 6 Jul 2016, Julien Grall wrote:
(CC Tamas)
On 06/07/16 11:43, Stefano Stabellini wrote:
On Tue, 28 Jun 2016, Julien Grall wrote:
The parameter 'access' is used by memaccess to restrict temporarily the
permission. This parameter should not
Hi Shanker,
On 28/06/16 15:33, Shanker Donthineni wrote:
On 06/28/2016 08:51 AM, Shanker Donthineni wrote:
Hi Julien,
On 06/28/2016 05:40 AM, Julien Grall wrote:
Hello Shanker,
On 27/06/16 21:33, Shanker Donthineni wrote:
@@ -1397,6 +1408,36 @@ gic_acpi_parse_madt_distributor(struct
acp
On 06/07/16 12:22, Julien Grall wrote:
On 06/07/16 12:17, Stefano Stabellini wrote:
On Wed, 6 Jul 2016, Julien Grall wrote:
(CC Tamas)
On 06/07/16 11:43, Stefano Stabellini wrote:
On Tue, 28 Jun 2016, Julien Grall wrote:
The parameter 'access' is used by memaccess to restrict temporarily
Hi Stefano,
On 06/07/16 12:06, Stefano Stabellini wrote:
On Tue, 28 Jun 2016, Julien Grall wrote:
@@ -1146,12 +1148,14 @@ out:
if ( rc < 0 && ( op == INSERT ) &&
addr != start_gpaddr )
{
+unsigned long gfn = paddr_to_pfn(addr);
+
BUG_ON(addr == end_gpadd
>>> On 06.07.16 at 12:27, wrote:
> On Wed, Jul 06, 2016 at 12:55:42AM -0600, Jan Beulich wrote:
>> >>> On 05.07.16 at 20:33, wrote:
>> > On Fri, May 27, 2016 at 02:16:09AM -0600, Jan Beulich wrote:
>> >> >>> On 25.05.16 at 18:45, wrote:
>> >> > On Wed, May 25, 2016 at 01:03:42AM -0600, Jan Beuli
On 06/07/16 06:00, Juergen Gross wrote:
> With most recent Xen hypervisor (4.8) it is now possible to add full
> support of CONFIG_PARAVIRT_TIME_ACCOUNTING.
>
> To be applied on top of commit ed2f61fdd2356c2a1d1239aa1507ce4e2e059306
> "xen: add steal_clock support on x86" of kernel/git/xen/tip.git
On 06/07/16 13:04, Ian Jackson wrote:
> Juergen Gross writes ("[PATCH 0/3] libxl: add framework for device types"):
>> Instead of duplicate coding for each device type (vtpms, usbctrls, ...)
>> especially on domain creation introduce a framework for that purpose.
>
> I think something like this is
On 06/07/16 12:56, Julien Grall wrote:
> Hi Stefano,
>
> On 06/07/16 12:06, Stefano Stabellini wrote:
>> On Tue, 28 Jun 2016, Julien Grall wrote:
>>> @@ -1146,12 +1148,14 @@ out:
>>> if ( rc < 0 && ( op == INSERT ) &&
>>>addr != start_gpaddr )
>>> {
>>> +unsigned lon
Juergen Gross writes ("Re: [PATCH 0/3] libxl: add framework for device types"):
> On 06/07/16 13:04, Ian Jackson wrote:
> >> +for (i = 0; i < d_config->num_pcidevs; i++) {
> >> +rc = libxl__device_pci_add(gc, domid, &d_config->pcidevs[i], 1);
> >> +if (rc < 0) {
> >> +
On 06/07/16 14:47, Ian Jackson wrote:
> Juergen Gross writes ("Re: [PATCH 0/3] libxl: add framework for device
> types"):
>> On 06/07/16 13:04, Ian Jackson wrote:
+for (i = 0; i < d_config->num_pcidevs; i++) {
+rc = libxl__device_pci_add(gc, domid, &d_config->pcidevs[i], 1);
On Wed, Jul 06, 2016 at 06:00:47AM -0600, Jan Beulich wrote:
> >>> On 06.07.16 at 12:27, wrote:
> > On Wed, Jul 06, 2016 at 12:55:42AM -0600, Jan Beulich wrote:
> >> >>> On 05.07.16 at 20:33, wrote:
> >> > On Fri, May 27, 2016 at 02:16:09AM -0600, Jan Beulich wrote:
> >> >> >>> On 25.05.16 at 18:
to avoid mixing machine frame with guest frame.
Signed-off-by: Julien Grall
Acked-by: Jan Beulich
Acked-by: Stefano Stabellini
---
Cc: Stefano Stabellini
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Konrad Rzeszutek Wilk
Cc: Tim Deegan
Cc: Wei Liu
Change
The prototype and the declaration of p2m_lookup disagree on how the
function should be used. One expect a frame number whilst the other
an address.
Thankfully, everyone is using with an address today. However, most of
the callers have to convert a guest frame to an address. Modify
the interface to
Also take the opportunity to convert arch/x86/debug.c to the typesafe gfn.
Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
Acked-by: Stefano Stabellini
---
Cc: Mukesh Rathor
Cc: Jan Beulich
Cc: Paul Durrant
Cc: Boris Ostrovsky
Cc: Suravee Suthikulpanit
Cc: Jun Nakajima
Cc: Kevin T
More the half of the arguments of INSERT and REMOVE are the same for
each callers. Simplify the callers of apply_p2m_changes by adding new
helpers which will fill common arguments with default values.
Signed-off-by: Julien Grall
---
Changes in v5:
- Add missing Signed-off-by
Cha
to avoid mixing machine frame with guest frame. Also drop the prefix start_.
Signed-off-by: Julien Grall
---
Changes in v6:
- Qualify what is being mapped
- Use PRI_mfn
Changes in v4:
- Patch added
---
xen/arch/arm/mm.c | 2 +-
xen/arch/arm/p2m.c
Hello all,
Some of the ARM functions are mixing gfn vs mfn and even physical vs frame.
To avoid more confusion, this patch series makes use of the terminology
described in xen/include/xen/mm.h and the associated typesafe.
This series requires the patch [1] to be applied beforehand. I pushed a
br
A variable containing a guest frame should be compared to INVALID_GFN
and not INVALID_MFN.
Signed-off-by: Julien Grall
Reviewed-by: Jan Beulich
Reviewed-by: Andrew Cooper
---
Cc: Suravee Suthikulpanit
Changes in v6:
- Fix typo in the commit message
- Add Andrew's and Jan'
Most of the callers of apply_p2m_changes have a GFN, a MFN and the
number of frame to change in hand.
Rather than asking each caller to convert the frame to an address,
rework the interfaces to pass the GFN, MFN and the number of frame.
Note that it would be possible to do more clean-up in apply_
to avoid mixing machine frame with guest frame. Also rename the
parameters of the function and drop pointless PAGE_MASK in the caller.
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v6:
- Add Stefano's acked-by
Changes in v4:
- Patch added
---
Also take the opportunity to convert arch/x86/debug.c to the typesafe
mfn and use proper printf format for MFN/GFN when the code around is
modified.
Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
Acked-by: Stefano Stabellini
---
Cc: Christoph Egger
Cc: Liu Jinsong
Cc: Jan Beulich
Cc
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v6:
- Add Stefano's acked-by
Changes in v4:
- Patch added
---
xen/arch/arm/mm.c | 2 +-
xen/arch/arm/p2m.c| 18 +-
xen/include/asm-arm/p2m.h | 4 ++--
3 files chang
The code to allocate memory when dom0 does not use direct mapping is
relying on the presence of memory node in the DT.
However, they are not present when booting using UEFI or when using
ACPI.
Rather than fixing the code, remove it because dom0 is always direct
memory mapped and therefore the cod
The parameter 'access' is used by memaccess to restrict temporarily the
permission. This parameter should not be used for other purpose (such
as restricting permanently the permission).
Instead, we should use the default access requested by memacess. When it
is not enabled, the access will be p2m_
p2m_cache_flush is expecting GFNs in parameter and not MFNs. Rename
the variable to *gfn* and use typesafe to avoid possible misusage.
Also, modify the prototype of the function to describe the range
using the start and the number of GFNs. This will avoid to wonder
whether the end if inclusive or
The operation ALLOCATE is unused. If we ever need it, it could be
reimplemented with INSERT.
Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
---
Changes in v6:
- Add Stefano's acked-by
Changes in v4:
- Patch added
---
xen/arch/arm/p2m.c| 67 ++-
(CC Elena).
On 06/07/16 14:01, Julien Grall wrote:
Also take the opportunity to convert arch/x86/debug.c to the typesafe
mfn and use proper printf format for MFN/GFN when the code around is
modified.
Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
Acked-by: Stefano Stabellini
---
Cc:
(CC Elena)
On 06/07/16 14:01, Julien Grall wrote:
Also take the opportunity to convert arch/x86/debug.c to the typesafe gfn.
Signed-off-by: Julien Grall
Reviewed-by: Andrew Cooper
Acked-by: Stefano Stabellini
---
Cc: Mukesh Rathor
I forgot to update the CC list since GDSX maintainership
On 06/07/16 02:34, Michael Turquette wrote:
Hi!
Hello Michael,
Quoting Dirk Behme (2016-06-30 03:32:32)
Some clocks might be used by the Xen hypervisor and not by the Linux
kernel. If these are not registered by the Linux kernel, they might be
disabled by clk_disable_unused() as the kernel d
On Wed, 6 Jul 2016, Julien Grall wrote:
> On 06/07/16 02:34, Michael Turquette wrote:
> > Hi!
>
> Hello Michael,
>
> > Quoting Dirk Behme (2016-06-30 03:32:32)
> > > Some clocks might be used by the Xen hypervisor and not by the Linux
> > > kernel. If these are not registered by the Linux kernel,
On Wed, Apr 6, 2016 at 5:51 PM, Ross Philipson wrote:
> On 03/29/2016 07:26 AM, George Dunlap wrote:
>> On Fri, Mar 25, 2016 at 4:34 PM, Ross Philipson
>> wrote:
>>> On 03/25/2016 12:11 PM, Wei Liu wrote:
On Thu, Mar 17, 2016 at 06:10:59PM -0400, Ross Philipson wrote:
> It seems the logi
Hi Dirk,
On 06/07/16 07:33, Dirk Behme wrote:
Could you share the U-Boot commands how you load and esp. start Xen? For
loading you use TFTP? How do you start Xen with U-Boot, then? I think we
have to pass the device tree address in x0 and the Linux kernel image
address in x2. How do you do this
On 06/07/16 14:16, Stefano Stabellini wrote:
On Wed, 6 Jul 2016, Julien Grall wrote:
On 06/07/16 02:34, Michael Turquette wrote:
Hi!
Hello Michael,
Quoting Dirk Behme (2016-06-30 03:32:32)
Some clocks might be used by the Xen hypervisor and not by the Linux
kernel. If these are not regis
flight 96691 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96691/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 94748
test-amd64-i386-
Hello Sergej,
On 06/07/16 10:14, Sergej Proskurin wrote:
On 07/05/2016 12:19 PM, Julien Grall wrote:
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
+static int do_altp2m_op(XEN_GUEST_HANDLE_PARAM(void) arg)
+{
+struct xen_hvm_altp2m_op a;
+struct domain *d = NULL;
+int r
On 06/07/16 08:31, Juergen Gross wrote:
> While testing some patches for support of ballooning in Mini-OS by using
> the xenstore domain I realized that each xl create/destroy pair would
> increase memory consumption in Mini-OS by about 5kB. Wondering whether
> this is a xenstore domain only effect
On Wed, Jul 06, 2016 at 02:16:18PM +0100, Stefano Stabellini wrote:
> On Wed, 6 Jul 2016, Julien Grall wrote:
> > On 06/07/16 02:34, Michael Turquette wrote:
> > > Hi!
> >
> > Hello Michael,
> >
> > > Quoting Dirk Behme (2016-06-30 03:32:32)
> > > > Some clocks might be used by the Xen hypervisor
On 06/07/16 15:48, Andrew Cooper wrote:
> On 06/07/16 08:31, Juergen Gross wrote:
>> While testing some patches for support of ballooning in Mini-OS by using
>> the xenstore domain I realized that each xl create/destroy pair would
>> increase memory consumption in Mini-OS by about 5kB. Wondering wh
On 06/07/16 14:55, Juergen Gross wrote:
> On 06/07/16 15:48, Andrew Cooper wrote:
>> On 06/07/16 08:31, Juergen Gross wrote:
>>> While testing some patches for support of ballooning in Mini-OS by using
>>> the xenstore domain I realized that each xl create/destroy pair would
>>> increase memory con
On 06.07.2016 15:17, Julien Grall wrote:
Hi Dirk,
On 06/07/16 07:33, Dirk Behme wrote:
Could you share the U-Boot commands how you load and esp. start Xen? For
loading you use TFTP? How do you start Xen with U-Boot, then? I think we
have to pass the device tree address in x0 and the Linux kerne
On 06/07/16 15:03, Dirk Behme wrote:
On 06.07.2016 15:17, Julien Grall wrote:
Hi Dirk,
On 06/07/16 07:33, Dirk Behme wrote:
Could you share the U-Boot commands how you load and esp. start Xen? For
loading you use TFTP? How do you start Xen with U-Boot, then? I think we
have to pass the devic
> Looking at the above, it occurs to me that, this whole area seems to be a
> little inconsistent anyway and could do with a little house-keeping. We
> have
> - osstest.git
> - there also is osstest/*.git which seems to be odd and seems to have been
> inactive for a while (not very clear to me what
On Mon, Jul 4, 2016 at 7:06 PM, Jan Prunk wrote:
> Hello !
>
> I am posting Xen virtualisation bug links to this e-mail address,
> because I wasn't able to find the Xen specific bugtracker list.
> This bug has been discovered in 2015 and so far it hasn't been
> resolved through the Debian/Kernel b
On 06/07/16 09:33, Sergej Proskurin wrote:
On 07/04/2016 10:53 PM, Julien Grall wrote:
Can we introduce a function which return the xma, mfn, order,
attribute at once? It will avoid to browse the p2m 3 times which is
really expensive on ARMv7 because the p2m is not mapped in the virtual
addres
On 05/07/16 21:21, Sergej Proskurin wrote:
I agree on this point as well. However, we should maybe think of another
name for flush_tlb_domain. Especially, if we do not flush the entire
domain (including all currently active altp2m views). What do you think?
This function is only used within p
On 05/07/16 22:55, Sergej Proskurin wrote:
Hello Julien,
On 07/05/2016 02:49 PM, Julien Grall wrote:
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
+static inline
+int p2m_set_altp2m_mem_access(struct domain *d, struct p2m_domain *hp2m,
+ struct p2m_do
Hi Julien,
On 07/06/2016 04:28 PM, Julien Grall wrote:
>
>
> On 05/07/16 21:21, Sergej Proskurin wrote:
>> I agree on this point as well. However, we should maybe think of another
>> name for flush_tlb_domain. Especially, if we do not flush the entire
>> domain (including all currently active alt
On Tue, Jul 05, 2016 at 03:05:00PM -0400, Boris Ostrovsky wrote:
> In preparation for moving out ACPI builder make all
> BIOSes call hvmloader_acpi_build_tables() instead of
> calling ACPI code directly.
>
> No functional changes.
>
> Signed-off-by: Boris Ostrovsky
Reviewed-by: Konrad Rzeszutek
Signed-off-by: Juergen Gross
---
tools/libxl/libxl_create.c | 68 +-
1 file changed, 31 insertions(+), 37 deletions(-)
diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c
index 354c73f..828f254 100644
--- a/tools/libxl/libxl_create.c
+
Instead of duplicate coding for each device type (vtpms, usbctrls, ...)
especially on domain creation introduce a framework for that purpose.
Signed-off-by: Juergen Gross
---
V2: - add macro to fill struct libxl__device_type as suggested by
Ian Jackson
- make struct libxl__device_type v
Signed-off-by: Juergen Gross
---
tools/libxl/libxl_create.c | 54 ++--
tools/libxl/libxl_internal.h | 1 +
tools/libxl/libxl_pci.c | 32 ++
3 files changed, 40 insertions(+), 47 deletions(-)
diff --git a/tools/libxl/libxl_cr
1 - 100 of 186 matches
Mail list logo