Arun KS writes:
> Remove managed_page_count_lock spinlock and instead use atomic
> variables.
>
> Suggested-by: Michal Hocko
> Suggested-by: Vlastimil Babka
> Signed-off-by: Arun KS
>
> ---
> As discussed here,
> https://patchwork.kernel.org/patch/10627521/#22261253
My 2 cents. I think you s
flight 128941 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128941/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 0dab57708de64284ac83f0632daba4d9e1cb1135
baseline version:
ovmf 073891a3e74059e996258
On Mon, Oct 22, 2018 at 11:41 PM Michal Hocko wrote:
>
> On Mon 22-10-18 22:53:22, Arun KS wrote:
> > Remove managed_page_count_lock spinlock and instead use atomic
> > variables.
>
Hello Michal,
> I assume this has been auto-generated. If yes, it would be better to
> mention the script so that p
On Mon, 2018-10-22 at 22:53 +0530, Arun KS wrote:
> Remove managed_page_count_lock spinlock and instead use atomic
> variables.
Perhaps better to define and use macros for the accesses
instead of specific uses of atomic_long_
Something like:
#define totalram_pages()(unsigned
long)atomic
On 2018-10-23 09:45, Joe Perches wrote:
On Mon, 2018-10-22 at 22:53 +0530, Arun KS wrote:
Remove managed_page_count_lock spinlock and instead use atomic
variables.
Hello Joe,
Perhaps better to define and use macros for the accesses
instead of specific uses of atomic_long_
Something like:
Remove managed_page_count_lock spinlock and instead use atomic
variables.
Suggested-by: Michal Hocko
Suggested-by: Vlastimil Babka
Signed-off-by: Arun KS
---
As discussed here,
https://patchwork.kernel.org/patch/10627521/#22261253
---
---
arch/csky/mm/init.c | 4 +-
On Mon 22-10-18 22:53:22, Arun KS wrote:
> Remove managed_page_count_lock spinlock and instead use atomic
> variables.
I assume this has been auto-generated. If yes, it would be better to
mention the script so that people can review it and regenerate for
comparision. Such a large change is hard to
flight 128918 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128918/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 128880
test-armhf-armhf-libvirt-raw 13 saveresto
Introduce a new array to store the cmdline of each boot module. It is
separate from struct bootmodules. Remove the cmdline field from struct
boot_module. This way, kernels and initrds with the same address in
memory can share struct bootmodule (important because we want them to be
free'd only once)
Move the code to calculate in_fifo_level and out_fifo_level out of
vpl011_data_avail, to the caller.
This change will make it possible to reuse vpl011_data_avail with
different ring structures in a later patch.
Signed-off-by: Stefano Stabellini
Acked-by: Julien Grall
---
Changes in v3:
- remove
Xen boot modules need to account not just for Dom0 but also for a few
potential DomUs, each of them coming with their own kernel and initrd.
Increase MAX_MODULES to 32 to allow for more DomUs.
Signed-off-by: Stefano Stabellini
Reviewed-by: Doug Goldstein
---
xen/include/asm-arm/setup.h | 2 +-
To avoid mixing the output of different domains on the console, buffer
the output chars and print line by line. Unless the domain has input
from the serial, in which case we want to print char by char for a
smooth user experience.
The size of SBSA_UART_OUT_BUF_SIZE is arbitrary, choose the same si
It will be #included by a file in a xen/arch/arm subdirectory.
Signed-off-by: Stefano Stabellini
---
xen/arch/arm/domain_build.c | 2 +-
xen/arch/arm/kernel.c| 3 +-
xen/arch/arm/kernel.h| 86
xen/include/asm-arm/kernel.h | 86 +
No functional changes.
Signed-off-by: Stefano Stabellini
Acked-by: Julien Grall
---
Changes in v3:
- no change in print messages
- do not remove BUG_ON
Changes in v2:
- new patch
---
xen/arch/arm/domain_build.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/
Introduce a union in struct vpl011 to contain the console ring members.
A later patch will add another member of the union for the case where
the backend is in Xen.
Signed-off-by: Stefano Stabellini
Acked-by: Julien Grall
---
Changes in v4:
- name union "backend"
Changes in v3:
- rename ring fi
Today Ctrl-AAA is used to switch between Xen and Dom0. Extend the
mechanism to allow for switching between Xen, Dom0, and any of the
initial DomU created from Xen alongside Dom0 out of information provided
via device tree.
Rename xen_rx to console_rx to match the new behavior.
Clarify existing co
domain_build.c is too large.
Move all the ACPI specific device tree generating functions from
domain_build.c to acpi/domain_build.c.
Signed-off-by: Stefano Stabellini
---
Changes in v4:
- rename acpi_dt_build to domain_build.c
- add copyright header
- remove useless #include
- remove acpi_dt_b
Introduce an allocate_memory function able to allocate memory for DomUs
and map it at the right guest addresses, according to the guest memory
map: GUEST_RAM0_BASE and GUEST_RAM1_BASE.
This is under #if 0 as not used for now.
Signed-off-by: Stefano Stabellini
---
Changes in v5:
- improve commit
Don't add duplicate boot modules (same kind and same start address),
they are freed later, we don't want to introduce double-free errors.
Introduce a domU flag in struct bootmodule and struct bootcmdline. Set
it for kernels and ramdisks of "xen,domain" nodes to avoid getting
confused in kernel_pro
Similar to construct_dom0, construct_domU creates a barebone DomU guest.
The device tree node passed as argument is compatible "xen,domain", see
docs/misc/arm/device-tree/booting.txt.
Remove #if 0 from allocate_memory as this patch will start using it.
Signed-off-by: Stefano Stabellini
---
Cha
Move unregister_init_virtual_region to init_done. Follow the same path
as x86. It is also useful to move it later so that create_domUs can be
called before that in following patches.
Signed-off-by: Stefano Stabellini
---
xen/arch/arm/setup.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletio
Introduce functions to generate a basic domU device tree, similar to the
existing functions in tools/libxl/libxl_arm.c.
Signed-off-by: Stefano Stabellini
Acked-by: Julien Grall
---
Changes in v5:
- use d->arch.vgic.version
Changes in v4:
- code style
- two separate functions for gicv2 and gicv3
allocate_memory only deals with directly mapped memory. Rename it to
allocate_memory_11.
Signed-off-by: Stefano Stabellini
Acked-by: Julien Grall
---
Changes in v3:
- add patch
---
xen/arch/arm/domain_build.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm
also rename it to set_interrupt.
Signed-off-by: Stefano Stabellini
Reviewed-by: Julien Grall
---
xen/arch/arm/domain_build.c | 29 +++--
1 file changed, 15 insertions(+), 14 deletions(-)
diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index 4a6ed2
Introduce vpl011 support to guests started from Xen: it provides a
simple way to print output from a guest, as most guests come with a
pl011 driver. It is also able to provide a working console with
interrupt support.
The UART exposed to the guest is a SBSA compatible UART and not a PL011.
SBSA UA
Hi all,
This is first step toward "dom0less" as discussed in the various
certifications related threads and discussions.
The goal of this series is to enable Xen to boot multiple domains in
parallel, in addition to dom0, out of information found on device tree.
The device tree based boot protoco
Move generic initializations out of construct_dom0 so that they can be
reused.
Rename prepare_dtb to prepare_dtb_hwdom to avoid confusion.
No functional changes in this patch.
Signed-off-by: Stefano Stabellini
---
Changes in v5:
- rename __construct_domain to construct_domain
Changes in v4:
-
Call a new function, "create_domUs", from setup_xen to start DomU VMs.
Introduce support for the "xen,domain" compatible node on device tree.
Create new DomU VMs based on the information found on device tree under
"xen,domain". Call construct_domU for each domain.
Introduce a simple global variab
Introduce an is_console option to allow certain classes of domUs to use
the Xen console. Specifically, it will be used to give console access to
all domUs started from Xen from information on device tree.
Signed-off-by: Stefano Stabellini
Acked-by: Daniel De Graaf
CC: andrew.coop...@citrix.com
C
Make vpl011 being able to be used without a userspace component in Dom0.
In that case, output is printed to the Xen serial and input is received
from the Xen serial one character at a time.
Call domain_vpl011_init during construct_domU if vpl011 is enabled.
Introduce a new ring struct with only t
Find addresses, sizes on device tree from kernel_probe.
Find the cmdline from the bootcmdlines array.
Introduce a new boot_module_find_by_addr_and_kind function to match not
just on boot module kind, but also by address so that we can support
multiple domains.
Introduce a boot_cmdline_find_by_nam
Make sure to only look for multiboot compatible nodes only under
/chosen, not under any other paths (depth <= 3).
Signed-off-by: Stefano Stabellini
---
Changes in v5:
- add patch
- add check on return value of fdt_get_path
---
xen/arch/arm/bootfdt.c | 13 ++---
1 file changed, 10 inser
Extend the existing device tree based multiboot protocol to include
information regarding multiple domains to boot.
Signed-off-by: Stefano Stabellini
---
Changes in v4:
- memory is 64bit
Changes in v3:
- remove "xen,initial-domain" for now
- make vpl011 an empty property
- memory in KBs
Change
Add a new document to provide information on how to use dom0less related
features and their current limitations.
Signed-off-by: Stefano Stabellini
---
Changes in v5:
- convert to markdown
- move to docs/features
- add entry to docs/INDEX
Changes in v4:
- rename to .txt
- improve wording
Change
On Tue, 9 Oct 2018, Julien Grall wrote:
> On 05/10/2018 19:47, Stefano Stabellini wrote:
> > Introduce a new array to store the cmdline of each boot module. It is
> > separate from struct bootmodules. Remove the cmdline field from struct
> > boot_module. This way, kernels and initrds with the same
This run is configured for baseline tests only.
flight 75480 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75480/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
On Mon, Oct 22, 2018 at 11:27:23AM +0100, Julien Grall wrote:
> Hi Stefano,
>
> On 18/10/2018 23:10, Stefano Stabellini wrote:
> > From: Stefano Stabellini
> >
> > Introduce a device tree binding for Xen reserved-memory regions. They
> > are used to share memory across VMs from the VM config fil
On Tue, 9 Oct 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 05/10/2018 19:47, Stefano Stabellini wrote:
> > Add a new document to provide information on how to use dom0less related
> > features and their current limitations.
> >
> > Signed-off-by: Stefano Stabellini
> >
> > ---
> > Changes in
On Tue, 16 Oct 2018, Lars Kurth wrote:
> Hi Stefano,
>
> > On 9 Oct 2018, at 12:52, Julien Grall wrote:
> >
> > Hi Stefano,
> >
> > On 05/10/2018 19:47, Stefano Stabellini wrote:
> >> Add a new document to provide information on how to use dom0less related
> >> features and their current limita
On Sat, 20 Oct 2018, Julien Grall wrote:
> > > > +
> > > > +pg = alloc_domheap_pages(d, order, 0);
> > >
> > > So here you impose the memory to be contiguously allocated for a given
> > > bank.
> > > There are quite a few case where you may not have enough memory to
> > > allocate
> > > contig
On Sat, 20 Oct 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 10/20/18 12:20 AM, Stefano Stabellini wrote:
> > On Mon, 8 Oct 2018, Jan Beulich wrote:
> > > > > > On 05.10.18 at 20:47, wrote:
> > > > --- a/xen/drivers/char/console.c
> > > > +++ b/xen/drivers/char/console.c
> > > > @@ -406,6 +406,1
On 8/7/18 6:07 PM, Amit Singh Tomar wrote:
Hi,
commit message?
> Signed-off-by: Amit Singh Tomar
> ---
> docs/misc/arm/early-printk.txt | 1 +
> xen/arch/arm/Rules.mk | 1 +
> xen/arch/arm/arm64/debug-meson.inc | 50
> ++ 3 files changed, 5
On 8/7/18 6:07 PM, Amit Singh Tomar wrote:
Hi,
> This patch adds driver for UART controller present on Amlogic S905
> SoC.
> https://dn.odroid.com/S905/DataSheet/S905_Public_Datasheet_V1.1.4.pdf
>
> Signed-off-by: Amit Singh Tomar
> ---
> xen/drivers/char/Kconfig | 8 ++
> xen/drivers/c
On Mon, Oct 22, 2018 at 4:15 PM Razvan Cojocaru
wrote:
>
> With the config fixed it boots but when I run DRAKVUF on the domain I
> get the following crash:
>
> (XEN) [ Xen-4.12-unstable x86_64 debug=y Not tainted ]
> (XEN) CPU:0
> (XEN) RIP:e008:[<
With the config fixed it boots but when I run DRAKVUF on the domain I
get the following crash:
(XEN) [ Xen-4.12-unstable x86_64 debug=y Not tainted ]
(XEN) CPU:0
(XEN) RIP:e008:[<7bdb630c>] 7bdb630c
(XEN) RFLAGS: 0001028
This run is configured for baseline tests only.
flight 75479 qemu-mainline real [real]
http://osstest.xensource.com/osstest/logs/75479/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
On 10/22/18 1:31 PM, Konrad Rzeszutek Wilk wrote:
>
> Hi Jens,
>
> Please git pull the following branch:
>
> git pull git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
> stable/for-jens-4.20
>
> which has exactly one tiny patch fixing an NULL pointer issue (also has
> stable tree C
On Mon, Oct 22, 2018 at 3:22 PM Andrew Cooper wrote:
>
> On 22/10/2018 22:17, Razvan Cojocaru wrote:
> > On 10/22/18 11:48 PM, Tamas K Lengyel wrote:
> >> On Thu, Oct 18, 2018 at 3:12 PM Razvan Cojocaru
> >> wrote:
> >>> On 10/18/18 11:08 PM, Tamas K Lengyel wrote:
> On Thu, Oct 18, 2018 at
On 22/10/2018 22:17, Razvan Cojocaru wrote:
> On 10/22/18 11:48 PM, Tamas K Lengyel wrote:
>> On Thu, Oct 18, 2018 at 3:12 PM Razvan Cojocaru
>> wrote:
>>> On 10/18/18 11:08 PM, Tamas K Lengyel wrote:
On Thu, Oct 18, 2018 at 4:09 AM Razvan Cojocaru
wrote:
> Hello,
>
> This s
On 10/22/18 11:48 PM, Tamas K Lengyel wrote:
> On Thu, Oct 18, 2018 at 3:12 PM Razvan Cojocaru
> wrote:
>>
>> On 10/18/18 11:08 PM, Tamas K Lengyel wrote:
>>> On Thu, Oct 18, 2018 at 4:09 AM Razvan Cojocaru
>>> wrote:
Hello,
This series aims to prevent the display from freezin
On Thu, Oct 18, 2018 at 3:12 PM Razvan Cojocaru
wrote:
>
> On 10/18/18 11:08 PM, Tamas K Lengyel wrote:
> > On Thu, Oct 18, 2018 at 4:09 AM Razvan Cojocaru
> > wrote:
> >>
> >> Hello,
> >>
> >> This series aims to prevent the display from freezing when
> >> enabling altp2m and switching to a new
On Sat, 20 Oct 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 10/19/18 11:53 PM, Stefano Stabellini wrote:
> > On Mon, 15 Oct 2018, Julien Grall wrote:
> > > Hi,
> > >
> > > On 05/10/2018 19:47, Stefano Stabellini wrote:
> > > > Similar to construct_dom0, construct_domU creates a barebone DomU gu
Hi Linus,
Please git pull the following branch:
git://git.kernel.org/pub/scm/linux/kernel/git/konrad/swiotlb.git
stable/for-linus-4.20
which has one tiny fix for the Xen SWIOTLB mechanism that occasionally happened
with
devices that didn't allocate size in power of two but rather some odd
siz
Hi Jens,
Please git pull the following branch:
git pull git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
stable/for-jens-4.20
which has exactly one tiny patch fixing an NULL pointer issue (also has stable
tree CCed).
Thank you!
drivers/block/xen-blkfront.c | 3 +++
1 file change
flight 128937 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128937/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Mon, 22 Oct 2018, Milan Boberic wrote:
> Hi,
>
> > I think we want to fully understand how many other interrupts the
> > baremetal guest is receiving. To do that, we can modify my previous
> > patch to suppress any debug messages for virq=68. That way, we should
> > only see the other interrupt
flight 75477 distros-debian-sid real [real]
http://osstest.xensource.com/osstest/logs/75477/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-i386
On Sun, 21 Oct 2018 at 21:36, Aaron Gray wrote:
> On Fri, 19 Oct 2018 at 19:58, Aaron Gray
> wrote:
>
>> On Thu, 18 Oct 2018 at 23:42, Andrew Cooper
>> wrote:
>>
>>> On 18/10/2018 19:45, Aaron Gray wrote:
>>>
>>> On Thu, 18 Oct 2018 at 19:11, Andrew Cooper
>>> wrote:
>>>
On 18/10/2018 18:
flight 128934 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128934/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-xsm 7 xen-boot fail REGR. vs. 128884
test-armhf-a
On Mon, Oct 22, 2018 at 04:18:49PM +0100, Wei Liu wrote:
> Wei Liu (2):
> automation: add dockerfile for Ubuntu 18.04
> automation: build with Ubuntu 18.04
This is duplicate. Please ignore.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xenproject
Wei Liu (2):
automation: add dockerfile for Ubuntu 18.04
automation: build with Ubuntu 18.04
.gitlab-ci.yml| 32 +
automation/build/ubuntu/bionic.dockerfile | 48 +++
2 files changed, 80 insertions(+)
create mode 100
Signed-off-by: Wei Liu
---
automation/build/ubuntu/bionic.dockerfile | 48 +++
1 file changed, 48 insertions(+)
create mode 100644 automation/build/ubuntu/bionic.dockerfile
diff --git a/automation/build/ubuntu/bionic.dockerfile
b/automation/build/ubuntu/bionic.docke
Wei Liu (2):
automation: add dockerfile for Ubuntu 18.04
automation: build with Ubuntu 18.04
.gitlab-ci.yml| 32 +
automation/build/ubuntu/bionic.dockerfile | 48 +++
2 files changed, 80 insertions(+)
create mode 100
Signed-off-by: Wei Liu
---
automation/build/ubuntu/bionic.dockerfile | 48 +++
1 file changed, 48 insertions(+)
create mode 100644 automation/build/ubuntu/bionic.dockerfile
diff --git a/automation/build/ubuntu/bionic.dockerfile
b/automation/build/ubuntu/bionic.docke
Signed-off-by: Wei Liu
---
.gitlab-ci.yml | 32
1 file changed, 32 insertions(+)
diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
index bf6bf7d895..96d7e7f759 100644
--- a/.gitlab-ci.yml
+++ b/.gitlab-ci.yml
@@ -269,3 +269,35 @@ ubuntu-xenial-gcc-debug:
CONTAINE
Signed-off-by: Wei Liu
---
.gitlab-ci.yml | 32
1 file changed, 32 insertions(+)
diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
index bf6bf7d895..96d7e7f759 100644
--- a/.gitlab-ci.yml
+++ b/.gitlab-ci.yml
@@ -269,3 +269,35 @@ ubuntu-xenial-gcc-debug:
CONTAINE
On 22/10/18 16:09, Woodhouse, David wrote:
> Adding Stefan to Cc.
>
> Should we take this to the spexen or another mailing list?
Now that L1TF is public, so is all of this. I see no reason to continue
it in private.
~Andrew
___
Xen-devel mailing list
Adding Stefan to Cc.
Should we take this to the spexen or another mailing list?
On Mon, 2018-10-22 at 15:55 +0100, Wei Liu wrote:
> On Thu, Oct 18, 2018 at 06:46:22PM +0100, Andrew Cooper wrote:
> > Hello,
> >
> > This is an accumulation and summary of various tasks which have been
> > discusse
Hi,
> I think we want to fully understand how many other interrupts the
> baremetal guest is receiving. To do that, we can modify my previous
> patch to suppress any debug messages for virq=68. That way, we should
> only see the other interrupts. Ideally there would be none.
> diff --git a/xen/arc
On Thu, Oct 18, 2018 at 06:46:22PM +0100, Andrew Cooper wrote:
> Hello,
>
> This is an accumulation and summary of various tasks which have been
> discussed since the revelation of the speculative security issues in
> January, and also an invitation to discuss alternative ideas. They are
> x86 sp
On Wed, 12 Sep 2018 16:55:24 +0400
Marc-André Lureau wrote:
> global_props is only used for Xen xen_compat_props. It's a static
minor nit:
should be AccelClass::global_props
> array of GlobalProperty, like machine globals in SET_MACHINE_COMPAT().
> Let's register the globals the same way, withou
This run is configured for baseline tests only.
flight 75476 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75476/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
Hi Wei,
On 10/22/18 2:40 PM, Wei Liu wrote:
ARM Dom0 creation was broken by the said commit because ARM neither
provided XEN_DOMCTL_CDF_hvm_guest nor had CONFIG_PV set.
Set XEN_DOMCTL_CDF_hvm_guest flag for ARM Dom0 to fix the issue. Also
set XEN_DOMCTL_CDF_hap while at it.
Signed-off-by: Wei
On 22/10/18 14:40, Wei Liu wrote:
> ARM Dom0 creation was broken by the said commit because ARM neither
> provided XEN_DOMCTL_CDF_hvm_guest nor had CONFIG_PV set.
>
> Set XEN_DOMCTL_CDF_hvm_guest flag for ARM Dom0 to fix the issue. Also
> set XEN_DOMCTL_CDF_hap while at it.
>
> Signed-off-by: Wei L
ARM Dom0 creation was broken by the said commit because ARM neither
provided XEN_DOMCTL_CDF_hvm_guest nor had CONFIG_PV set.
Set XEN_DOMCTL_CDF_hvm_guest flag for ARM Dom0 to fix the issue. Also
set XEN_DOMCTL_CDF_hap while at it.
Signed-off-by: Wei Liu
---
xen/arch/arm/setup.c | 1 +
1 file ch
On 19/10/18 19:22, Juergen Gross wrote:
> On 19/10/2018 18:57, Andrew Cooper wrote:
>> In practice, having fine grain control of all the features like would be
>> excellent for testing purposes, because it allows you to boot two
>> otherwise-identical VMs with one configuration difference between t
flight 128910 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128910/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stopfail like 128873
test-armhf-armhf-libvirt 14 sav
This removes all use of keyhandler_scratch as a bounce-buffer for the rendered
string.
No functional change.
Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
Reviewed-by: Jan Beulich
---
v2:
* Fix %pd typo
* Use ->bits for cpumasks
---
xen/arch/x86/cpu/mcheck/mce.c | 9 ++---
xen/arch/
All callers have been convered to using %*pb[l]. In the unlikely case that
future code wants to retain this functionaly, it can be replicated in a more
convenient fashon with snprintf().
Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
Reviewed-by: Dario Faggioli
---
CC: Jan Beulich
CC: Roger P
This removes all use of keyhandler_scratch as a bounce-buffer for the rendered
string. In some cases, collapse combine adjacent printk()'s which are writing
parts of the same line.
No functional change.
Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
Acked-by: Jan Beulich
Acked-by: Juergen
I was trying to debug a cpumask problem, and got irritated with how awkard it
was to render and print the masks. Luckily, the fix is quite simple and far
nicer to use.
The overall diffstat is to patch 4 is:
add/remove: 0/4 grow/shrink: 2/11 up/down: 603/-1191 (-588)
Function
This removes all use of keyhandler_scratch as a bounce-buffer for the rendered
string. In some cases, collapse combine adjacent printk()'s which are writing
parts of the same line.
No functional change.
Signed-off-by: Andrew Cooper
Acked-by: George Dunlap
Acked-by: Dario Faggioli
---
CC: Josh
With almost all users of keyhandler_scratch gone, clean up the 3 remaining
users and drop the buffer.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Roger Pau Monné
v2:
* Use a static __initdata buffer for EFI, rather than a stack variable.
* Drop (int) casts for periodic
flight 128931 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128931/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-xsm 7 xen-boot fail REGR. vs. 128884
test-armhf-a
flight 128927 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128927/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 073891a3e74059e996258e32b56b3f0770c6fe55
baseline version:
ovmf d28daaddb3e732468e930
On Mon, Oct 22, 2018 at 01:43:53PM +0200, Juergen Gross wrote:
> On 22/10/2018 13:31, Daniel Kiper wrote:
> > On Tue, Oct 09, 2018 at 01:03:12PM +0200, Juergen Gross wrote:
> >> Add all usable memory regions to grub memory management and add the
> >> needed mmap iterate code.
> >
> > I am missing a
On Tue, Oct 09, 2018 at 01:03:17PM +0200, Juergen Gross wrote:
> Support platform i386/xenpvh in configure.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Daniel Kiper
+/- XENPVH/xenpvh play still Reviewed-by: Daniel Kiper
Daniel
___
Xen-devel mail
On Tue, Oct 09, 2018 at 01:03:16PM +0200, Juergen Gross wrote:
> Add xenpvh support to grub-install.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Daniel Kiper
+/- XENPVH play still Reviewed-by: Daniel Kiper
Daniel
___
Xen-devel mailing list
Xen-d
On Tue, Oct 09, 2018 at 01:03:15PM +0200, Juergen Gross wrote:
> Support mkimage for xenpvh.
>
> In order to avoid using plain integers for the ELF notes use the
> available Xen include instead. While at it replace the plain numbers
> for Xen PV mode, too.
>
> Signed-off-by: Juergen Gross
+/- XEN
On 22/10/2018 13:41, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:13PM +0200, Juergen Gross wrote:
>> Add the modifications to the build system needed to build a xenpvh
>> grub.
>>
>> Signed-off-by: Juergen Gross
>> Reviewed-by: Daniel Kiper
>> ---
>> gentpl.py | 4 ++--
On Tue, Oct 09, 2018 at 01:03:14PM +0200, Juergen Gross wrote:
> From: Hans van Kranenburg
>
> This solves the build failing with "Error: no symbol table and no
> .moddeps section"
>
> Also see:
> - 6371e9c10433578bb236a8284ddb9ce9e201eb59
> - https://savannah.gnu.org/bugs/?49012
>
> Signed-off-by
On 22/10/2018 13:31, Daniel Kiper wrote:
> On Tue, Oct 09, 2018 at 01:03:12PM +0200, Juergen Gross wrote:
>> Add all usable memory regions to grub memory management and add the
>> needed mmap iterate code.
>
> I am missing a few words why this patch is needed. Especially why
> grub_machine_mmap_it
On Tue, Oct 09, 2018 at 01:03:13PM +0200, Juergen Gross wrote:
> Add the modifications to the build system needed to build a xenpvh
> grub.
>
> Signed-off-by: Juergen Gross
> Reviewed-by: Daniel Kiper
> ---
> gentpl.py | 4 ++--
> grub-core/Makefile.am | 12
On Tue, Oct 09, 2018 at 01:03:12PM +0200, Juergen Gross wrote:
> Add all usable memory regions to grub memory management and add the
> needed mmap iterate code.
I am missing a few words why this patch is needed. Especially why
grub_machine_mmap_iterate() has to belong to this patch. However,
I thi
On 22/10/18 12:12, Wei Liu wrote:
> On Fri, Oct 19, 2018 at 05:09:43PM +0100, Andrew Cooper wrote:
>> On 19/10/18 15:28, Wei Liu wrote:
>>> Put the code in smpboot.c under CONFIG_PV. Not that we don't need to
>>> set up a stub here because entry.S already does that.
>>>
>>> Signed-off-by: Wei Liu
On Fri, Oct 19, 2018 at 04:50:25PM +0200, Juergen Gross wrote:
> On 19/10/2018 14:17, Daniel Kiper wrote:
> > On Tue, Oct 09, 2018 at 01:03:08PM +0200, Juergen Gross wrote:
> >> Add the code for the Xen PVH mode boot entry.
> >>
> >> Signed-off-by: Juergen Gross
> >> ---
> >> grub-core/kern/i386/
On 22/10/2018 13:16, Daniel Kiper wrote:
> On Fri, Oct 19, 2018 at 05:52:44PM +0200, Juergen Gross wrote:
>> On 19/10/2018 17:33, Roger Pau Monné wrote:
>>> On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote:
Add the hooks to current code needed for Xen PVH.
Signed-off-by:
On Fri, Oct 19, 2018 at 05:52:44PM +0200, Juergen Gross wrote:
> On 19/10/2018 17:33, Roger Pau Monné wrote:
> > On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote:
> >> Add the hooks to current code needed for Xen PVH.
> >>
> >> Signed-off-by: Juergen Gross
> >> ---
> >> grub-core/ker
On Fri, Oct 19, 2018 at 05:09:43PM +0100, Andrew Cooper wrote:
> On 19/10/18 15:28, Wei Liu wrote:
> > Put the code in smpboot.c under CONFIG_PV. Not that we don't need to
> > set up a stub here because entry.S already does that.
> >
> > Signed-off-by: Wei Liu
>
> The stub isn't the purpose of th
On Mon, Oct 22, 2018 at 11:57:17AM +0100, Andrew Cooper wrote:
> On 22/10/18 11:53, Wei Liu wrote:
> > On Fri, Oct 19, 2018 at 06:52:02PM -0400, Boris Ostrovsky wrote:
> >> On 10/19/18 11:14 AM, Andrew Cooper wrote:
> >>> diff --git a/xen/include/asm-x86/msr.h b/xen/include/asm-x86/msr.h
> >>> inde
1 - 100 of 112 matches
Mail list logo