sensible to check with Julien
whether this is still fine to go in at this late stage.
I would be happy with that.
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
suse.com>
I'm sorry, Julien, I did forget to Cc you (for 4.10 inclusion).
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Cheers,
---
v2: Move from vmx_vcpu_destroy() to complete_domain_destroy().
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -794,
evel@lists.xen.org/msg123434.html
[5] https://www.mail-archive.com/xen-devel@lists.xen.org/msg123080.html
[6]
https://github.com/mjaggi-cavium/xen-wip/commit/df006d64bdbb5c8344de5a710da8bf64c9e8edd5
Cheers,
--
Julien Grall
___
Xen-devel mailin
Hi George,
On 11/21/2017 04:43 PM, George Dunlap wrote:
On 11/16/2017 03:19 PM, Julien Grall wrote:
On 13/11/17 15:41, George Dunlap wrote:
Signed-off-by: George Dunlap <george.dun...@citrix.com>
---
CC: Ian Jackson <ian.jack...@citrix.com>
CC: Wei Liu <wei.l...@citrix.com>
't yet support in Xen.
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
35657119
HU +36 13275600
IE +353 91337900
Toll Free
UK 0800 1412084
US +1 8668801148
CN +86 4006782367
IN 0008009868365
IN +918049282778
TW 08000 22065
HU 0680981587
IE 1800800022
KF +972732558877
Cheers,
On 16 November 2017 at 11:54, Julien Grall <julien.gr...@linaro.org> wrote:
&g
ix.com>
---
CC: Jan Beulich <jbeul...@suse.com>
CC: Wei Liu <wei.l...@citrix.com>
CC: Julien Grall <julien.gr...@arm.com>
This wants backporting to all stable trees, so should also be considered for
inclusion into 4.10 at this point.
Release-acked-by: Julien Grall <ju
n Beulich <jbeul...@suse.com>
CC: Ian Jackson <ian.jack...@eu.citrix.com>
CC: Wei Liu <wei.l...@citrix.com>
CC: Julien Grall <julien.gr...@arm.com>
This wants backporting to all stable trees, so should also be considered for
inclusion into 4.10 at this point.
Release-
Answering to myself.
On 16 November 2017 at 11:54, Julien Grall <julien.gr...@linaro.org> wrote:
> Hi all,
>
> Apologies I was meant to organize the call earlier.
>
> I would suggest to have the next community call on Wednesday 22nd November
> 5pm GMT. Does it sound g
Hi,
On 20/11/17 15:19, Robin Murphy wrote:
On 20/11/17 14:25, Julien Grall wrote:
[...]
+ else {
cpu_relax();
Hmmm I now see why you added cpu_relax() at the top. Well, on Xen
cpu_relax is just a barrier. On Linux it is used to yield.
And that bit is worrying me
Hi Sameer,
On 19/11/17 07:45, Goel, Sameer wrote:
On 10/12/2017 10:36 AM, Julien Grall wrote:
+
+typedef paddr_t phys_addr_t;
+typedef paddr_t dma_addr_t;
+
+/* Alias to Xen device tree helpers */
+#define device_node dt_device_node
+#define of_phandle_args dt_phandle_args
+#define
Hello,
On 15 November 2017 at 11:34, Jayadev Kumaran wrote:
>>> What defconfig are you based on? Do you have a device-tree support
>>> enabled?
> I use omap2plus_defconfig . Yes , device tree support is there and the dts
> file used is omap5-uevm.dts
Some options in
On 17 November 2017 at 12:15, Volodymyr Babchuk wrote:
> Hi Jayadev,
>
> On 17 November 2017 at 13:53, Andrii Anisov wrote:
>>>
>>> Is there a way to debug which one of the above two possibilities has lead
>>> to the issue ?
>>
>> Four years ago I
On 8 November 2017 at 14:52, Konrad Rzeszutek Wilk
wrote:
> On Wed, Nov 08, 2017 at 10:47:20AM +0530, Jayadev Kumaran wrote:
>> Hello all,
>>
>> I'm trying to implement Xen hypervisor support on OMAP5432.I have followed
>> the steps as in
>>
te by using PSCI.
Similarly, the virtual PSCI implementation for suspend is quite simple.
You could potentially use those information to decide what to do with
the pCPU (suspend, turning off...).
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lis
'size_t' [-Werror=format=]
virBufferAsprintf(, "size=%ld", nodeSize);
^
cc1: all warnings being treated as errors
I think this was introduced with 03d0959af "xenconfig: add domxml
conversions for xen-xl".
Cheers,
--
Julien Grall
___
to expose a physical device to completely untrusted guests.
+However, this feature can still confer significant security benefit
+when used to remove drivers and backends from domain 0
+(i.e., Driver Domains).
+See docs/PCI-IOMMU-bugs.txt for more information.
Where can I find this file? Is it in s
CC: Andrew Cooper <andrew.coop...@citrix.com>
CC: Jan Beulich <jbeul...@suse.com>
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Konrad Wilk <konrad.w...@oracle.com>
CC: Tim Deegan <t...@xen.org>
CC: Julien Grall <julien.gr...@arm.com>
---
SUPPORT.md | 10 +++
e.com>
CC: Tim Deegan <t...@xen.org>
CC: Julien Grall <julien.gr...@arm.com>
---
SUPPORT.md | 10 ++
1 file changed, 10 insertions(+)
diff --git a/SUPPORT.md b/SUPPORT.md
index b95ee0ebe7..8235336c41 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
@@ -412,6 +412,16 @@ Virtual Performanc
;
CC: Jan Beulich <jbeul...@suse.com>
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Konrad Wilk <konrad.w...@oracle.com>
CC: Tim Deegan <t...@xen.org>
CC: Julien Grall <julien.gr...@arm.com>
---
SUPPORT.md | 21 +
1 file changed, 21 insertions(+)
Hi Ian,
On 14/11/17 14:57, Ian Jackson wrote:
Julien Grall writes ("Re: [PATCH] tools: xentoolcore_restrict_all: Do deregistration
before close"):
I think this is 4.10 material, xentoolcore was introduced in this
release and it would be good to have it right from now. I want
Signed-off-by: Adrian Pop <a...@bitdefender.com>
Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Jan Beulich <jbeul...@suse.com>
FOAD, Requesting a release ack for this change.
Release-acked-by: Julien Grall <julien.gr...@linaro.org
n initializing the GIC CPU interface. So what is
that function trying to solve?
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 16/11/17 12:39, Manish Jaggi wrote:
On 11/16/2017 5:23 PM, Julien Grall wrote:
Hi Manish,
On 16/11/17 11:46, Manish Jaggi wrote:
On 11/16/2017 5:07 PM, Julien Grall wrote:
On 16/11/17 07:39, Manish Jaggi wrote:
On 11/14/2017 6:53 PM, Julien Grall wrote:
3. IORT for Dom0
Hi all,
Apologies I was meant to organize the call earlier.
I would suggest to have the next community call on Wednesday 22nd
November 5pm GMT. Does it sound good?
Do you have any specific topic you would like to discuss?
Cheers,
--
Julien Grall
Hi Manish,
On 16/11/17 11:46, Manish Jaggi wrote:
On 11/16/2017 5:07 PM, Julien Grall wrote:
On 16/11/17 07:39, Manish Jaggi wrote:
On 11/14/2017 6:53 PM, Julien Grall wrote:
3. IORT for Dom0
-
IORT for Dom0 is based on host iort. Few nodes could be removed or
modified
://downloads.xenproject.org/release/xen/4.10.0-rc5/xen-4.10.0-rc5.tar.gz.sig
Please send bug reports and test reports to
xen-de...@lists.xenproject.org. When sending bug reports, please CC
relevant maintainers and me (julien.gr...@linaro.org).
Thanks,
--
Julien Grall
___
Xen
On 16/11/17 07:39, Manish Jaggi wrote:
On 11/14/2017 6:53 PM, Julien Grall wrote:
3. IORT for Dom0
-
IORT for Dom0 is based on host iort. Few nodes could be removed or
modified.
For instance
- Host SMMU nodes should not be present as Xen should only touch it.
- platform
On 11/16/2017 01:36 AM, Stefano Stabellini wrote:
On Wed, 15 Nov 2017, Julien Grall wrote:
The function get_page_from_gva is used by copy_*_guest helpers to
translate a guest virtual address to a machine physical address and take
reference on the page.
There are a couple of errors path
Hi Andrew,
On 11/15/2017 07:43 PM, Andrew Cooper wrote:
On 15/11/17 19:34, Julien Grall wrote:
The function get_page_from_gva is used by copy_*_guest helpers to
translate a guest virtual address to a machine physical address and take
reference on the page.
There are a couple of errors path
.
I think the 2 patches are good candidate for Xen 4.10 as this may help fixing
a dom0 crash on the Arndale.
Cheers,
[1] https://lists.xen.org/archives/html/xen-devel/2017-11/msg00942.html
Julien Grall (2):
xen/arm: mm: Change the return value of gvirt_to_maddr
xen/arm: p2m: Add more debug
to reflect the change of the return value.
Note that with the change in gvirt_to_maddr, ma needs to be initialized
to avoid GCC been confused (i.e value may be unitialized) with the new
construction.
Signed-off-by: Julien Grall <julien.gr...@linaro.org>
---
xen/arch/arm/domain_build
error patch
only for debug-build.
This should help narrowing down the intermittent failure with the
hypercall GNTTABOP_copy (see [1]).
[1] https://lists.xen.org/archives/html/xen-devel/2017-11/msg00942.html
Signed-off-by: Julien Grall <julien.gr...@linaro.org>
---
xen/arch/arm/p2m.
:24:05.011218 [ 2157.058913] [] (cpu_startup_entry) from
[<60301c4c>] (0x60301c4c)
Nov 15 05:24:05.011257 [ 2157.066095] ---[ end Kernel panic - not syncing:
Fatal exception in interrupt
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
munity it would be nice if you can post the summary here.
However, nobody said the code was broken. IORT will be used in various
place in Xen and Manish is looking whether we can parse only once and
for all the IORT. I think it is latest design is promising for that.
Cheers,
--
Julien
Hi Wei,
On 14/11/17 13:53, Wei Liu wrote:
On Tue, Nov 14, 2017 at 12:14:14PM +, Julien Grall wrote:
Hi,
On 14/11/17 11:51, Ian Jackson wrote:
Ross Lagerwall writes ("Re: [PATCH for-4.10] libs/evtchn: Remove active handler on
clean-up or failure"):
On 11/10/2017 05:10 PM, Ju
ackson <ian.jack...@eu.citrix.com>
Acked-by: Wei Liu <wei.l...@citrix.com>
I think this is 4.10 material, xentoolcore was introduced in this
release and it would be good to have it right from now. I want to
confirm that you are both happy with that
ed in this section. The code
is available at [6].
The commit also describes the code flow and assumptions.
Which assumptions? I can't see any in the commit message.
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
;yu.c.zh...@linux.intel.com>
Reviewed-by: Jan Beulich <jbeul...@suse.com>
Please try to have a cover letter in the future when you have multiple
patches. This will make easier to give comments/release-ack for the all
the patches. Anyway for the 2 patches:
Release-acked-by: Julien Gra
Hi,
On 14/11/17 11:51, Ian Jackson wrote:
Ross Lagerwall writes ("Re: [PATCH for-4.10] libs/evtchn: Remove active handler on
clean-up or failure"):
On 11/10/2017 05:10 PM, Julien Grall wrote:
Commit 89d55473ed16543044a31d1e0d4660cf5a3f49df "xentoolcore_restrict
ch <jbeul...@suse.com>
CC: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Tim Deegan <t...@xen.org>
CC: Wei Liu <wei.l...@citrix.com>
CC: Julien Grall <julien.gr...@arm.com>
xen/drivers/char/ns16550.c | 132 ++
wrong with the code restructuring to fix the bug,
basically all HVM guests would be hosed HPET-wise.
On that basis:
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
the argument you make above. On the unlikely chance
there's a problem Travis should catch it, and someone who actually has a
clang setup can help sort it out.
I am not entirely sure whether this count for a ack or not?
I was waiting an Acked-by/Reviewed-by before c
This really should use XENLOG_ERR imo, so that the message won't
be lost if warnings are rate limited.
The patch was already merged. I guess a follow-up could be done for Xen
4.10.
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
mmand name must be specified.
The xenstore crash can only be triggered from within dom0 (there
is a check in do_control() rejecting all non-dom0 requests with
an EACCES).
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
(Added the for-4.10 tag to the Subject.)
Release-acked-by: Julien
Grall <julien.gr...@linaro.org>
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi,
On 11/13/2017 11:53 AM, Wei Liu wrote:
On Mon, Nov 13, 2017 at 11:52:12AM +, Julien Grall wrote:
Hi,
On 11/13/2017 06:44 AM, osstest service owner wrote:
flight 116118 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116118/
Failures and problems
;jbeul...@suse.com>
Reported-by: Andreas Kinzler <h...@posteo.de>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
Signed-off-by: Stefano Stabellini <sstabell...@kernel.org>
(cherry picked from commit a8036336609d
://downloads.xenproject.org/release/xen/4.10.0-rc4/xen-4.10.0-rc4.tar.gz.sig
Please send bug reports and test reports to
xen-de...@lists.xenproject.org. When sending bug reports, please CC
relevant maintainers and me (julien.gr...@linaro.org).
Thanks,
--
Julien Grall
___
Xen
Hi,
On 11/13/2017 11:06 AM, Jan Beulich wrote:
On 13.11.17 at 11:34, wrote:
Our debug showed the concerned page->count_info was already(and
unexpectedly)
cleared in free_xenheap_pages(), and the call trace should be like this:
free_xenheap_pages()
^
|
ill result to corrupt
the list of handlers and potentially crash the application later one.
Fix it by calling xentoolcore_deregister_active_handle on failure and
closure.
Signed-off-by: Julien Grall <julien.gr...@linaro.org>
---
This patch is fixing a bug introduced after
part of Xen too? If so, I can have a go at
removing completely __page_to_mfn/__mfn_to_page.
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
afe in a
neat way.
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ger@citrix.com>
Acked-by: Wei Liu <wei.l...@citrix.com>
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
pped)
Reviewed-by: Jan Beulich <jbeul...@suse.com>
What would be the risk to get this patch in Xen 4.10?
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 09/11/17 14:36, Julien Grall wrote:
Hi Roger,
On 09/11/17 09:27, Roger Pau Monné wrote:
On Thu, Nov 09, 2017 at 12:22:49AM +, Hao, Xudong wrote:
Qemu-xen didn't have commit a80363, so I report this issue to ask
for sync up
with qemu upstream. Last mail I mean I usually used Qemu Xen
happy with the backport. So:
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ix.com>
CC: Wei Liu <wei.l...@citrix.com>
CC: Julien Grall <julien.gr...@arm.com>
This is a nice-to-have for Xen 4.10. It is very low risk, as the functional
changes are restricted to debug utilities only.
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Ch
com>
Reviewed-by: Jan Beulich <jbeul...@suse.com>
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi Anthony,
On 08/11/17 12:13, Anthony PERARD wrote:
On Thu, Nov 02, 2017 at 01:49:54PM +, Julien Grall wrote:
On 27/10/17 21:16, Stefano Stabellini wrote:
On Fri, 27 Oct 2017, Julien Grall wrote:
On 27/10/17 08:27, Hao, Xudong wrote:
This bug exist much long time, there are many
Hi Wei,
On 08/11/17 11:36, Wei Liu wrote:
On Tue, Nov 07, 2017 at 05:24:32PM +, Julien Grall wrote:
Hi Wei,
On 07/11/17 15:13, Wei Liu wrote:
On Tue, Nov 07, 2017 at 03:09:07PM +, Julien Grall wrote:
Hi Wei,
On 06/11/17 14:55, Wei Liu wrote:
On Mon, Nov 06, 2017 at 01:47:56PM
tridges (see [1]).
They have x86 cartridges but also provides Arm64 one based on X-Gene 1
(APM).
Bhupinder is looking at bring up Osstest on the Arm64 cartridges.
Cheers,
[1]
https://www.anandtech.com/show/8357/exploring-the-low-end-and-micro-server
Hi Wei,
On 07/11/17 15:13, Wei Liu wrote:
> On Tue, Nov 07, 2017 at 03:09:07PM +0000, Julien Grall wrote:
>> Hi Wei,
>>
>> On 06/11/17 14:55, Wei Liu wrote:
>>> On Mon, Nov 06, 2017 at 01:47:56PM +, osstest service owner wrote:
>>>> branch xen-uns
Hi Volodymyr,
On 02/11/17 20:07, Volodymyr Babchuk wrote:
On Thu, Nov 02, 2017 at 05:49:12PM +, Julien Grall wrote:
On 02/11/17 16:53, Volodymyr Babchuk wrote:
On Thu, Nov 02, 2017 at 01:17:26PM +, Julien Grall wrote:
On 24/10/17 20:02, Volodymyr Babchuk wrote:
But parameters
m>
Acked-by: Wei Liu <wei.l...@citrix.com>
Tested-by: Julien Grall <julien.gr...@arm.com>
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
[ wei: fix stubdom build ]
Signed-off-by: Wei Liu <wei.l...@citrix.com>
This has broken pvgr
p and finish to convert all the source to MFN
typesafe. Personally, I find quite silly to have to delay that...
Cheers,
Jan
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ot now?
Cheers,
[1]
https://lists.xenproject.org/archives/html/xen-devel/2017-10/msg00986.html
Jan
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
_allowed = kvm_irqfds_enabled();
-
-qemu_add_vm_change_state_handler(vm_change_state_handler, s);
}
/**
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
People who touched revisions under test:
Andrew Cooper <andrew.coop...@citrix.com>
Julien Grall <julien.gr...@arm.com>
Wei Liu <wei.l...@citrix.com>
jobs:
build-amd64
Hi Volodymyr,
On 02/11/17 16:53, Volodymyr Babchuk wrote:
On Thu, Nov 02, 2017 at 01:17:26PM +, Julien Grall wrote:
On 24/10/17 20:02, Volodymyr Babchuk wrote:
If it is not safe, this means you have a whitelist solution and therefore
tie Xen to a specific OP-TEE version. So if you need
Hi Konrad,
On 01/11/17 18:54, Konrad Rzeszutek Wilk wrote:
On Wed, Nov 01, 2017 at 02:03:15PM +, Julien Grall wrote:
The file common/tmem_xen.c is now converted to use typesafe. This is
requiring to override the macro page_to_mfn to make it work with mfn_t.
Note that all variables
Hi Wei,
On 01/11/17 10:20, Wei Liu wrote:
Cc Julien and change tag. I think this is safe to be applied to 4.10.
I agree.
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Cheers,
On Tue, Oct 31, 2017 at 01:58:07PM -0700, Elena Ufimtseva wrote:
On Tue, Oct 31, 2017 at 03:2
ulich <jbeul...@suse.com>
CC: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Tim Deegan <t...@xen.org>
CC: Wei Liu <wei.l...@citrix.com>
CC: Julien Grall <julien.gr...@arm.com>
As with the related check_lock() pat
Hi,
On 30/10/17 02:21, Hao, Xudong wrote:
-Original Message-
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Friday, October 27, 2017 5:19 PM
To: Hao, Xudong <xudong@intel.com>
Cc: Julien Grall <julien.gr...@arm.com>; Lars Kurth <lars.ku...@citrix.com>;
xen-d
...@xen.org>
CC: Wei Liu <wei.l...@citrix.com>
CC: Julien Grall <julien.gr...@arm.com>
check_lock() only exists in debug builds, which makes this a low risk change
for 4.10.
---
xen/common/spinlock.c | 8 +++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/xen/common/
we should apply this for 4.10.
I agree. Subject line tag added.
Acked-by: Ian Jackson <ian.jack...@eu.citrix.com>
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Cheers,
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.or
Hi,
On 27/10/17 21:16, Stefano Stabellini wrote:
On Fri, 27 Oct 2017, Julien Grall wrote:
On 27/10/17 08:27, Hao, Xudong wrote:
This bug exist much long time, there are many discussion last year but not a
solution then. I call out it now because there is a fix in qemu upstream:
commit
Actually CC them...
On 02/11/17 13:44, Julien Grall wrote:
Hi,
I noticed I forgot to CC Wei and Ian for committing this patch series.
On 27/10/17 14:31, Julien Grall wrote:
Hi Juergen,
On 25/10/17 08:08, Juergen Gross wrote:
On 24/10/17 18:06, Julien Grall wrote:
Hi,
I think this is 4.10
Hi,
I noticed I forgot to CC Wei and Ian for committing this patch series.
On 27/10/17 14:31, Julien Grall wrote:
Hi Juergen,
On 25/10/17 08:08, Juergen Gross wrote:
On 24/10/17 18:06, Julien Grall wrote:
Hi,
I think this is 4.10 material (particularly patch #5). Juergen, would
Hi,
On 23/10/17 22:33, Stefano Stabellini wrote:
On Fri, 20 Oct 2017, Julien Grall wrote:
Julien, do you think we need to keep a special linux tree around for Xen
on ARM testing in OSSTest or we can start using vanilla kernel releases?
I would love to get rid of it, if you
Hi Ian,
On 02/11/17 13:27, Ian Jackson wrote:
Julien Grall writes ("Re: Commit moratorium to staging"):
Thank you for the explanation. I agree with the force push to unblock
master (and other tree I mentioned).
I will force push all the affected trees, but in a reactive way
beca
ay. I'm planning to produce first RFC for OP-TEE folks in a few
days. I'll subscribe you. In then meantime you can check out [2]
Thank you!
[1] http://markmail.org/message/tdbg5mgxjvsoj2ph
[2] https://github.com/OP-TEE/optee_os/issues/1890
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Dunlap <george.dun...@eu.citrix.com>
CC: Ian Jackson <ian.jack...@eu.citrix.com>
CC: Jan Beulich <jbeul...@suse.com>
CC: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Tim Deegan <t...@xen.org>
CC: Wei Liu <
lk <konrad.w...@oracle.com>
CC: Stefano Stabellini <sstabell...@kernel.org>
CC: Tim Deegan <t...@xen.org>
CC: Wei Liu <wei.l...@citrix.com>
CC: Julien Grall <julien.gr...@arm.com>
xen/drivers/char/ns16550.c | 57 +
xen/inc
Hi Ian,
On 11/01/2017 04:54 PM, Ian Jackson wrote:
Julien Grall writes ("Re: Commit moratorium to staging"):
Hi Ian,
Thank you for the detailed e-mail.
On 11/01/2017 02:07 PM, Ian Jackson wrote:
Furthermore, the test is not intermittent, so a force push will be
effective in the
permission), I intend to force push all affected osstest branches when
the test report shows the only blockage is ws16 and/or win10 tests
failing the "guest-stop" step.
This is not only blocking xen.git#master but also blocking other trees:
- linux-linus
page table. However, the error is not
progated resulting to the callers to retry infinitely the PoD.
Prevent the infinite loop by return false when it is not possible to
shatter the 1GB mapping.
Signed-off-by: Julien Grall <julien.gr...@linaro.org>
---
This is a potential can
The arm32 version of the function is_xen_heap_page currently define a
variable _mfn. This will lead to a compiler when use typesafe MFN in a
follow-up patch:
called object '_mfn' is not a function or function pointer
Fix it by renaming the local variable _mfn to mfn_.
Signed-off-by: Julien
Dunlap <george.dun...@eu.citrix.com>
Cc: George Dunlap <george.dun...@eu.citrix.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Julien Grall <julien.gr...@arm.com>
Cc: Jun Nakajima <jun.nakaj...@intel.com>
Cc: Kevin Tian <
it is
already quite big. So some of the files now override page_to_mfn and
mfn_to_page to avoid using mfn_t.
Lastly, domain_page_to_mfn is also converted to use mfn_t given that
most of the callers are now switched to _mfn(domain_page_to_mfn(...)).
Signed-off-by: Julien Grall <julien
was always overriden before used.
Also add a couple of missing newlines suggested by Andrew in the code.
Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Reviewed-by: Andrew Cooper <andrew.coop...@citrix.com>
---
Cc: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
Changes in
- Remove spurious ()
- Add missing spaces
- Turn 1 << to 1UL <<
- Rename spfn to smfn and switch to mfn_t
Signed-off-by: Julien Grall <julien.gr...@linaro.org>
---
Cc: Stefano Stabellini <sstabell...@kernel.org>
Changes in v2:
- Remove doubl
h-level perspective to support IORT in the hypervisor.
We can discuss about code sharing/duplication when we get to the support
IORT for the guests.
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
to re-use them than lookup the IORT.
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
a test
failure in osstest.
Tree will be re-opened once we get a push.
Cheers,
[1]
https://lists.xenproject.org/archives/html/xen-devel/2017-10/msg03351.html
[2]
https://lists.xenproject.org/archives/html/xen-devel/2017-10/msg02932.html
--
Julien Grall
Hi Paul,
On 27/10/17 16:19, Paul Durrant wrote:
-Original Message-
From: Julien Grall [mailto:julien.gr...@linaro.org]
Sent: 27 October 2017 12:46
To: Jan Beulich <jbeul...@suse.com>; Paul Durrant
<paul.durr...@citrix.com>
Cc: Julien Grall <julien.gr...@arm.com&
On 27 Oct 2017 20:59, "Stefano Stabellini" <sstabell...@kernel.org> wrote:
On Fri, 27 Oct 2017, Julien Grall wrote:
> Hi,
>
> Just answering to dom0 been 1:1 domain.
>
> On 24/10/17 22:33, Stefano Stabellini wrote:
> > On Tue, 24 Oct 2017, Volodymyr Babchuk wr
break;
}
Reviewed-by: Ian Jackson <ian.jack...@eu.citrix.com>
I think this is a bugfix which should go into 4.10. Julien ?
(Subject line changed by me.)
Yes I agree.
Release-acked-by: Julien Grall <julien.gr...@linaro.org>
Cheers,
--
Julien Grall
___
,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
1 - 100 of 6489 matches
Mail list logo