On 12.02.2025 09:33, Oleksii Kurochko wrote:
>
> On 2/11/25 7:39 PM, Roger Pau Monné wrote:
>> On Tue, Feb 11, 2025 at 12:02:04PM +0100, Roger Pau Monne wrote:
>>> Hello,
>>>
>>> The following series aims to prevent local APIC errors from stalling the
>>> shtudown process. On XenServer testing we
Hi all,
in order to build Xen for Arm64 with MPU support, there are few changes to
support the compilation of Arm code without HAS_PASSTHROUGH and some refactoring
around the start_xen for Arm.
Luca Fancellu (2):
xen/passthrough: Provide stub functions when !HAS_PASSTHROUGH
xen/arm: Move earl
Currently start_xen() is performing some early operations using
the boot page tables that are configured during early asm boot,
before setting up the runtime page tables that might also use
the cache coloring feature.
On an MPU system the cache coloring feature is not applicable,
also before using
When Xen is built without HAS_PASSTHROUGH, there are some parts
in arm and x86 where iommu_* functions are called in the codebase,
but their implementation is under xen/drivers/passthrough that is
not built.
So provide some stub for these functions in order to build Xen
when !HAS_PASSTHROUGH, whic
On 12.02.25 07:53, Jan Beulich wrote:
On 11.02.2025 13:04, Juergen Gross wrote:
When mapping a buffer for DMA via .map_page or .map_sg DMA operations,
there is no need to check the machine frames to be aligned according
to the mapped areas size. All what is needed in these cases is that the
buff
On 12.02.25 08:38, Jan Beulich wrote:
On 11.02.2025 13:04, Juergen Gross wrote:
In case xen_swiotlb_alloc_coherent() needed to create a contiguous
region only for other reason than the memory not being compliant with
the device's DMA mask, there is no reason why this contiguous region
should be
On 2/10/25 5:32 PM, Jan Beulich wrote:
On 07.02.2025 14:13, Oleksii Kurochko wrote:
--- a/xen/arch/riscv/pt.c
+++ b/xen/arch/riscv/pt.c
@@ -185,6 +185,57 @@ static int pt_next_level(bool alloc_tbl, pte_t **table,
unsigned int offset)
return XEN_TABLE_NORMAL;
}
+/*
+ * _pt_walk() pe
Hi
On 12.02.25 11:14, Roger Pau Monné wrote:
On Tue, Feb 11, 2025 at 02:33:08PM -0800, Stefano Stabellini wrote:
Hi Oleksandr,
This morning, we had a discussion among maintainers, and the suggested
approach moving forward is as follows:
- First, it would be helpful to see a sample of the prop
On 12.02.25 02:30, Stefano Stabellini wrote:
On Tue, 11 Feb 2025, Juergen Gross wrote:
In case xen_swiotlb_alloc_coherent() needed to create a contiguous
region only for other reason than the memory not being compliant with
the device's DMA mask, there is no reason why this contiguous region
sho
On 12.02.2025 12:11, Jürgen Groß wrote:
> On 12.02.25 08:38, Jan Beulich wrote:
>> On 11.02.2025 13:04, Juergen Gross wrote:
>>> In case xen_swiotlb_alloc_coherent() needed to create a contiguous
>>> region only for other reason than the memory not being compliant with
>>> the device's DMA mask, th
On 2/12/25 12:27 PM, Jan Beulich wrote:
On 12.02.2025 12:13, Oleksii Kurochko wrote:
On 2/10/25 5:32 PM, Jan Beulich wrote:
On 07.02.2025 14:13, Oleksii Kurochko wrote:
--- a/xen/arch/riscv/pt.c
+++ b/xen/arch/riscv/pt.c
@@ -185,6 +185,57 @@ static int pt_next_level(bool alloc_tbl, pte_t **ta
On 11 Feb 2025, at 18:54, Marek Marczykowski-Górecki
wrote:
>
> On Tue, Feb 11, 2025 at 03:06:08PM +0100, Roger Pau Monné wrote:
>> On Tue, Feb 11, 2025 at 11:19:23AM +0100, Jan Beulich wrote:
>>> On 11.02.2025 10:10, Luca Fancellu wrote:
>> 3) The size of the patch after applying clang-form
On 12.02.25 11:04, Julien Grall wrote:
Hi,
On 11/02/2025 15:14, Grygorii Strashko wrote:
On 11.02.25 14:32, Julien Grall wrote:
On 11/02/2025 11:57, Orzel, Michal wrote:
On 11/02/2025 12:18, Grygorii Strashko wrote:
The dt_device_for_passthrough() is called many times during Xen
ini
On 12/02/2025 10:16, Grygorii Strashko wrote:
Also, I agree with Michal, if this is a concern for
dt_device_device_for_passthrough(). Then it would be a concern for a
few others calls using dt_find_property(). Are you going to modify
all of them?
I follow the rule one patch one functional
Hi Andrew,
thanks for your review,
> On 12 Feb 2025, at 11:50, Andrew Cooper wrote:
>
> On 12/02/2025 9:18 am, Luca Fancellu wrote:
>> When Xen is built without HAS_PASSTHROUGH, there are some parts
>> in arm and x86 where iommu_* functions are called in the codebase,
>> but their implementatio
ARM Architecture Reference Manual states that EL field of ESR_EL1
register should be 1 when EC is 0b00 aka HSR_EC_UNKNOWN.
Section D24.2.40, page D24-7337 of ARM DDI 0487L:
IL, bit [25]
Instruction Length for synchronous exceptions. Possible values of this bit
are:
[...]
0b1 - 32-b
On 12/02/2025 9:18 am, Luca Fancellu wrote:
> When Xen is built without HAS_PASSTHROUGH, there are some parts
> in arm and x86 where iommu_* functions are called in the codebase,
> but their implementation is under xen/drivers/passthrough that is
> not built.
>
> So provide some stub for these func
Description: this session will focus on discussing the current state and
key challenges of Nested Virtualization in Xen.
---
I'm going to reference this message to the mailing list in the related
Gitlab epic:
https://gitlab.com/groups/xen-project/-/epics/25
References: George Dunlap's two part
On 2/12/25 10:25 AM, Roger Pau Monné wrote:
On Wed, Feb 12, 2025 at 09:51:16AM +0100, Jan Beulich wrote:
On 12.02.2025 09:33, Oleksii Kurochko wrote:
On 2/11/25 7:39 PM, Roger Pau Monné wrote:
On Tue, Feb 11, 2025 at 12:02:04PM +0100, Roger Pau Monne wrote:
Hello,
The following series aims
Hi everyone,
Olivier Lambert published a detailed recap of the meetup that occurred
in Grenoble, France, a bit less than two weeks ago.
Those interested can read it at:
https://xcp-ng.org/blog/2025/02/11/xen-winter-meetup-2025-a-recap/
Best regards,
Samuel Verschelde | Vates XCP-ng Lead Main
Hi Salvatore,
On 12/02/25 00:56, Salvatore Bonaccorso wrote:
Hi Harshit,
On Sun, Feb 09, 2025 at 01:45:38AM +0530, Harshit Mogalapalli wrote:
Hi Salvatore,
On 08/02/25 21:26, Salvatore Bonaccorso wrote:
Hi Juergen, hi all,
Radoslav Bodó reported in Debian an issue after updating our kernel
On 11/02/2025 16:14, Grygorii Strashko wrote:
>
>
> On 11.02.25 14:32, Julien Grall wrote:
>>
>>
>> On 11/02/2025 11:57, Orzel, Michal wrote:
>>> On 11/02/2025 12:18, Grygorii Strashko wrote:
The dt_device_for_passthrough() is called many times during Xen
initialization and
On Tue, Feb 11, 2025 at 02:33:08PM -0800, Stefano Stabellini wrote:
> Hi Oleksandr,
>
> This morning, we had a discussion among maintainers, and the suggested
> approach moving forward is as follows:
>
> - First, it would be helpful to see a sample of the proposed changes
> applied to a single
On Wed, Feb 12, 2025 at 09:51:16AM +0100, Jan Beulich wrote:
> On 12.02.2025 09:33, Oleksii Kurochko wrote:
> >
> > On 2/11/25 7:39 PM, Roger Pau Monné wrote:
> >> On Tue, Feb 11, 2025 at 12:02:04PM +0100, Roger Pau Monne wrote:
> >>> Hello,
> >>>
> >>> The following series aims to prevent local A
Hi,
On 11/02/2025 15:14, Grygorii Strashko wrote:
On 11.02.25 14:32, Julien Grall wrote:
On 11/02/2025 11:57, Orzel, Michal wrote:
On 11/02/2025 12:18, Grygorii Strashko wrote:
The dt_device_for_passthrough() is called many times during Xen
initialization and Dom0 creation. On every cal
On 12.02.2025 12:13, Oleksii Kurochko wrote:
>
> On 2/10/25 5:32 PM, Jan Beulich wrote:
>> On 07.02.2025 14:13, Oleksii Kurochko wrote:
>>> --- a/xen/arch/riscv/pt.c
>>> +++ b/xen/arch/riscv/pt.c
>>> @@ -185,6 +185,57 @@ static int pt_next_level(bool alloc_tbl, pte_t
>>> **table, unsigned int off
On Wed, Feb 12, 2025 at 01:14:20PM +0200, Grygorii Strashko wrote:
> Hi
>
> On 12.02.25 11:14, Roger Pau Monné wrote:
> > On Tue, Feb 11, 2025 at 02:33:08PM -0800, Stefano Stabellini wrote:
> > > Hi Oleksandr,
> > >
> > > This morning, we had a discussion among maintainers, and the suggested
> >
From: Michal Orzel
The current placement of fields in struct dt_device_node is not optimal and
introduces holes due to fields alignment.
Checked with "'pahole xen-syms -C dt_device_node"
ARM64 size 144B, 16B holes:
/* size: 144, cachelines: 3, members: 15 */
/* sum members: 128,
Xen currently prevents dom0 from creating CPU or IOMMU page-table mappings
into the interrupt address range [0xfee0, 0xfeef]. This range has
two different purposes. For accesses from the CPU is contains the default
position of local APIC page at 0xfee0. For accesses from devices
it's
On 06.02.2025 09:32, Penny Zheng wrote:
> --- a/docs/misc/xen-command-line.pandoc
> +++ b/docs/misc/xen-command-line.pandoc
> @@ -515,7 +515,7 @@ If set, force use of the performance counters for
> oprofile, rather than detectin
> available support.
>
> ### cpufreq
> -> `= none | {{ | xen } {
On 06.02.2025 09:32, Penny Zheng wrote:
> From: Penny Zheng
>
> amd-cppc on active mode bypasses the scaling governor layer, and
> provides its own P-state selection algorithms in hardware. Consequently,
> when it is used, the driver's -> setpolicy() callback is invoked
> to register per-CPU util
Hello everyone,
During the installation of Xen on an ARM server machine from the source code,
I found that the wrong release candidate (rc) is being used:
$ make install
install -m0644 -p xen //boot/xen-4.20-rc
install: cannot remove ‘//boot/xen-4.20-rc’: Permission denied
make[1]:
On 13.02.2025 03:00, Stefano Stabellini wrote:
> On Wed, 12 Feb 2025, Stefano Stabellini wrote:
>> On Thu, 13 Feb 2025, Andrew Cooper wrote:
>>> On 13/02/2025 1:25 am, Stefano Stabellini wrote:
Hi all,
I am looking through the few remaining MISRA violations that we have
left. O
On 13.02.2025 01:51, Andrew Cooper wrote:
> On 12/02/2025 9:52 pm, Stefano Stabellini wrote:
>> On Wed, 12 Feb 2025, Oleksii Kurochko wrote:
>>> Hello everyone,
>>>
>>> During the installation of Xen on an ARM server machine from the source
>>> code,
>>> I found that the wrong release candidate (r
Hi, Grygorii,
On 12.02.25 13:14, Grygorii Strashko wrote:
Hi
On 12.02.25 11:14, Roger Pau Monné wrote:
On Tue, Feb 11, 2025 at 02:33:08PM -0800, Stefano Stabellini wrote:
Hi Oleksandr,
This morning, we had a discussion among maintainers, and the suggested
approach moving forward is as follow
On 13.02.2025 00:58, dm...@proton.me wrote:
> Add Xen version printout via keyhandler mechanism.
>
> That is useful for debugging systems that have been left intact for a long
> time.
>
> Signed-off-by: Denis Mukhin
First, +1 to what Andrew said.
> --- a/xen/drivers/char/console.c
> +++ b/xen/
On 13.02.2025 02:34, Andrew Cooper wrote:
> On 13/02/2025 1:25 am, Stefano Stabellini wrote:
>> Hi all,
>>
>> I am looking through the few remaining MISRA violations that we have
>> left. One of them is R11.2:
>>
>> https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ecdf/xen-project/ha
Supported ISA extensions are specified in the device tree within the CPU
node, using two properties: `riscv,isa-extensions` and `riscv,isa`.
Currently, Xen does not support the `riscv,isa-extensions` property and
will be added in the future.
The `riscv,isa` property is parsed for each CPU, and th
Based on riscv,isa property of device tree file parse extenstions which are
available in CPU.
As a part of this feature, drop CONFIG_RISCV_ISA_RV64G and explicitly use
extensions 'i', 'm', 'a', 'zicsr', 'zifencei' as they are necessary for a work
if Xen and it should be true not only for RISC-V 64
Introduce pt_walk(), which does software page table walking to resolve the
following issues:
1. vmap_to_mfn() uses virt_to_maddr(), which is designed to work with VA
from either the direct map region or Xen's linkage region (XEN_VIRT_START),
thereby an assertion will occur if it is used with
On 2/11/25 14:32, Borislav Petkov wrote:
> On Tue, Feb 11, 2025 at 09:43:23AM -0800, Sean Christopherson wrote:
>> It conflates two very different things: host/bare metal support for memory
>> encryption, and SEV guest support. For kernels that will never run in a VM,
>> pulling in all the SEV gue
RISC-V doesn't have hardware feature to ask MMU to translate
virtual address to physical address ( like Arm has, for example ),
so software page table walking is implemented.
Signed-off-by: Oleksii Kurochko
---
Changes in v4:
- Update the comment message above _pt_walk(): add information that
'G' stands for "imafd_zicsr_zifencei".
Extensions 'f' and 'd' aren't really needed for Xen, and allowing floating
point registers to be used can lead to crashes.
Extensions 'i', 'm', 'a', 'zicsr', and 'zifencei' are necessary for the
operation of Xen, which is why they are used explicitly (uncond
When pt_update() is called with arguments (..., INVALID_MFN, ..., 0 or 1),
it indicates that a mapping is being destroyed/modifyed.
In the case when modifying or destroying a mapping, it is necessary to
search until a leaf node is found, instead of searching for a page table
entry based on the pre
I've noticed the following failure in XenServer's build environment
> make[6]: Leaving directory
> '/builddir/build/BUILD/xen-4.19.1/tools/tests/x86_emulator'
> In file included from /usr/include/features.h:535,
> from /usr/include/bits/libc-header-start.h:33,
> f
On Wed, 12 Feb 2025, Jürgen Groß wrote:
> On 12.02.25 02:30, Stefano Stabellini wrote:
> > On Tue, 11 Feb 2025, Juergen Gross wrote:
> > > In case xen_swiotlb_alloc_coherent() needed to create a contiguous
> > > region only for other reason than the memory not being compliant with
> > > the device'
The Arm Xen allocates memory to place Dom0 following the logic described in
allocate_memory_11() function which is a bit complicated with major
requirement to place Dom0 within the first 128MB of RAM and below 4G. But
this doesn't guarantee it will be placed at the same physical base address
even b
Hello, everybody!
On 12.02.25 00:33, Stefano Stabellini wrote:
Hi Oleksandr,
This morning, we had a discussion among maintainers, and the suggested
approach moving forward is as follows:
Great news!!
- First, it would be helpful to see a sample of the proposed changes
applied to a single
From: Sean Christopherson Sent: Monday, February 10, 2025
8:22 AM
>
> On Sat, Feb 08, 2025, Michael Kelley wrote:
> > From: Sean Christopherson Sent: Friday, February 7,
> > 2025 9:23 AM
> > >
> > > Dropping a few people/lists whose emails are bouncing.
> > >
> > > On Fri, Jan 31, 2025, Sean C
Add new CONRING_SIZE Kconfig parameter to specify the boot console buffer size
in bytes. The value is rounded to the nearest power of 2 to match existing
conring_size= behavior.
The supported range is [16KiB..128MiB].
Bump default size to 32 KiB.
Link: https://gitlab.com/xen-project/xen/-/issues
Hi,
On 12/02/2025 09:19, Luca Fancellu wrote:
Currently start_xen() is performing some early operations using
the boot page tables that are configured during early asm boot,
before setting up the runtime page tables that might also use
the cache coloring feature.
On an MPU system the cache colo
On 2/11/25 7:39 PM, Roger Pau Monné wrote:
On Tue, Feb 11, 2025 at 12:02:04PM +0100, Roger Pau Monne wrote:
Hello,
The following series aims to prevent local APIC errors from stalling the
shtudown process. On XenServer testing we have seen reports of AMD
boxes sporadically getting stuck in a
Hi Andrew,
On 10/02/2025 22:41, Andrew Cooper wrote:
On 10/02/2025 9:31 pm, Julien Grall wrote:
On 10/02/2025 09:21, Oleksii Kurochko wrote:
On 2/8/25 1:02 AM, Andrew Cooper wrote:
Right now, run_in_exception_handler() takes an input in an arbitrary
register,
and clobbers BUG_FN_REG. This
Add Xen version printout via keyhandler mechanism.
That is useful for debugging systems that have been left intact for a long
time.
Signed-off-by: Denis Mukhin
---
xen/common/version.c | 2 --
xen/drivers/char/console.c | 31 ++-
2 files changed, 26 insertions
On Wed, 12 Feb 2025, Julien Grall wrote:
> Hi Stefano,
>
> On 11/02/2025 01:56, Stefano Stabellini wrote:
> > We have received requests to introduce Dom0less vCPU affinity bindings
> > to allow configuring which pCPUs a given vCPU is allowed to run on.
> >
> > After considering different approach
On 13/02/2025 1:25 am, Stefano Stabellini wrote:
> Hi all,
>
> I am looking through the few remaining MISRA violations that we have
> left. One of them is R11.2:
>
> https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ecdf/xen-project/hardware/xen/ECLAIR_normal/staging/X86_64/9118578464
On Thu, 13 Feb 2025, Andrew Cooper wrote:
> On 13/02/2025 1:25 am, Stefano Stabellini wrote:
> > Hi all,
> >
> > I am looking through the few remaining MISRA violations that we have
> > left. One of them is R11.2:
> >
> > https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ecdf/xen-proj
On Thu, 13 Feb 2025, Marek Marczykowski-Górecki wrote:
> This will be useful for later tests not using generic domU (unit tests,
> xtf etc).
>
> Signed-off-by: Marek Marczykowski-Górecki
Reviewed-by: Stefano Stabellini
> ---
> automation/scripts/qubes-x86-64.sh | 50 +++--
On Wed, 12 Feb 2025, Stefano Stabellini wrote:
> On Thu, 13 Feb 2025, Andrew Cooper wrote:
> > On 13/02/2025 1:25 am, Stefano Stabellini wrote:
> > > Hi all,
> > >
> > > I am looking through the few remaining MISRA violations that we have
> > > left. One of them is R11.2:
> > >
> > > https://saas.
On Thu, 13 Feb 2025, Marek Marczykowski-Górecki wrote:
> There are a bunch of tests in tools/tests/, let them run in CI.
> For each subdirectory expect "make run" will run the test, and observe
> its exit code. This way, adding new tests is easy, and they will be
> automatically picked up.
>
> For
Hi all,
I am looking through the few remaining MISRA violations that we have
left. One of them is R11.2:
https://saas.eclairit.com:3787/fs/var/local/eclair/xen-project.ecdf/xen-project/hardware/xen/ECLAIR_normal/staging/X86_64/9118578464/PROJECT.ecd;/by_service/MC3A2.R11.2.html#{%22select%22:tru
There are a bunch of tests in tools/tests/, let them run in CI.
For each subdirectory expect "make run" will run the test, and observe
its exit code. This way, adding new tests is easy, and they will be
automatically picked up.
For better visibility, log test output to junit xml format, and let
gi
Debugging sometimes involves running specific jobs on different
versions. It's useful to easily avoid running all of the not interesting
ones (for given case) to save both time and CI resources. Doing so used
to require changing the yaml files, usually in several places.
Ease this step by adding SE
This will be useful for later tests not using generic domU (unit tests,
xtf etc).
Signed-off-by: Marek Marczykowski-Górecki
---
automation/scripts/qubes-x86-64.sh | 50 +++
1 file changed, 31 insertions(+), 19 deletions(-)
diff --git a/automation/scripts/qubes-x86-64
- Add some more test jobs
- Allow selecting individual jobs, without editing yaml files
I don't think it needs to be included in 4.20, but may be considered later for
backporting.
Marek Marczykowski-Górecki (3):
automation: skip building domU if there is no test defined for it
automation: add
Xen console driver has vpl011-related logic which shall belong vpl011 emulator
code (Arm port). Move vpl011-related code from arch-independent console driver
to Arm's vpl011.c.
Use rate-limiting guest_printk() for error logging in console driver in case
vpl011 cannot handle the console input.
Sig
> On 12 Feb 2025, at 12:37, Luca Fancellu wrote:
>
> Hi Andrew,
>
> thanks for your review,
>
>> On 12 Feb 2025, at 11:50, Andrew Cooper wrote:
>>
>> On 12/02/2025 9:18 am, Luca Fancellu wrote:
>>> When Xen is built without HAS_PASSTHROUGH, there are some parts
>>> in arm and x86 where iomm
From: Bjorn Helgaas
The Mediatek MT7922 WiFi device advertises FLR support, but it apparently
does not work, and all subsequent config reads return ~0:
pci :01:00.0: [14c3:0616] type 00 class 0x028000 PCIe Endpoint
pciback :01:00.0: not ready 65535ms after FLR; giving up
After an FL
On Wed, 12 Feb 2025, Grygorii Strashko wrote:
> The Arm Xen allocates memory to place Dom0 following the logic described in
> allocate_memory_11() function which is a bit complicated with major
> requirement to place Dom0 within the first 128MB of RAM and below 4G. But
> this doesn't guarantee it w
On Wed, 12 Feb 2025, dm...@proton.me wrote:
> Xen console driver has vpl011-related logic which shall belong vpl011 emulator
> code (Arm port). Move vpl011-related code from arch-independent console driver
> to Arm's vpl011.c.
>
> Use rate-limiting guest_printk() for error logging in console drive
vmap_to_mfn() uses virt_to_maddr(), which is designed to work with VA from
either the direct map region or Xen's linkage region (XEN_VIRT_START).
An assertion will occur if it is used with other regions, in particular for
the VMAP region.
Since RISC-V lacks a hardware feature to request the MMU to
On Wed, 12 Feb 2025, Oleksii Kurochko wrote:
> Hello everyone,
>
> During the installation of Xen on an ARM server machine from the source code,
> I found that the wrong release candidate (rc) is being used:
> $ make install
> install -m0644 -p xen //boot/xen-4.20-rc
> install: canno
On Wed, 12 Feb 2025, Volodymyr Babchuk wrote:
> ARM Architecture Reference Manual states that EL field of ESR_EL1
> register should be 1 when EC is 0b00 aka HSR_EC_UNKNOWN.
>
> Section D24.2.40, page D24-7337 of ARM DDI 0487L:
>
> IL, bit [25]
> Instruction Length for synchronous exceptio
On Wed, 12 Feb 2025, Grygorii Strashko wrote:
> From: Michal Orzel
>
> The current placement of fields in struct dt_device_node is not optimal and
> introduces holes due to fields alignment.
>
> Checked with "'pahole xen-syms -C dt_device_node"
>
> ARM64 size 144B, 16B holes:
> /* size: 1
On 12/02/2025 9:52 pm, Stefano Stabellini wrote:
> On Wed, 12 Feb 2025, Oleksii Kurochko wrote:
>> Hello everyone,
>>
>> During the installation of Xen on an ARM server machine from the source code,
>> I found that the wrong release candidate (rc) is being used:
>> $ make install
>> install
On 12/02/2025 11:58 pm, dm...@proton.me wrote:
> Add Xen version printout via keyhandler mechanism.
>
> That is useful for debugging systems that have been left intact for a long
> time.
>
> Signed-off-by: Denis Mukhin
Hmm, it's a good point, but can't we add this to the top of the 'h'
(help) key
Hi Andrew,
On 11/02/2025 12:54, Andrew Cooper wrote:
While fixing some common/arch boundaries for UBSAN support on other
architectures, the following debugging patch:
diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
index c1f2d1b89d43..58d1d048d339 100644
--- a/xen/arch/arm/set
On Wed, Feb 12, 2025, Michael Kelley wrote:
> From: Sean Christopherson Sent: Monday, February 10, 2025
> 8:22 AM
> > On Sat, Feb 08, 2025, Michael Kelley wrote:
> > > But I would be good with some restructuring so that setting the sched
> > > clock
> > > save/restore hooks is more closely tied
On Tuesday, January 28th, 2025 at 11:53 PM, Jan Beulich
wrote:
>
>
> On 29.01.2025 04:04, Denis Mukhin wrote:
>
> > On Tuesday, January 28th, 2025 at 8:32 AM, Jan Beulich jbeul...@suse.com
> > wrote:
> >
> > > On 04.01.2025 02:58, Denis Mukhin via B4 Relay wrote:
> > >
> > > > From: Denis
On Wed, Feb 12, 2025 at 01:35:16PM -0600, Bjorn Helgaas wrote:
> From: Bjorn Helgaas
>
> The Mediatek MT7922 WiFi device advertises FLR support, but it apparently
> does not work, and all subsequent config reads return ~0:
>
> pci :01:00.0: [14c3:0616] type 00 class 0x028000 PCIe Endpoint
Hi Stefano,
On 11/02/2025 01:56, Stefano Stabellini wrote:
We have received requests to introduce Dom0less vCPU affinity bindings
to allow configuring which pCPUs a given vCPU is allowed to run on.
After considering different approaches, I am thinking of using the
following binding format:
On Wed, Feb 12, 2025 at 06:07:37PM -0800, Stefano Stabellini wrote:
> On Thu, 13 Feb 2025, Marek Marczykowski-Górecki wrote:
> > There are a bunch of tests in tools/tests/, let them run in CI.
> > For each subdirectory expect "make run" will run the test, and observe
> > its exit code. This way, ad
82 matches
Mail list logo