Modify the custom parameter parsing routines in:
xen/arch/x86/oprofile/nmi_int.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
Modify the custom parameter parsing routines in:
xen/arch/x86/setup.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/arc
ed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/common/kexec.c | 5 -
1 file changed, 5 deletions(-)
diff --git a/xen/common/kexec.c b/xen/common/kexec.c
index d647a6c30e..d2fbf9eb80 100644
--- a/xen/common/kexec.c
+++ b/xen/common/kexec.c
@@ -213,7 +213,6 @@ static int __init parse_low_crashinf
Jan Beulich <jbeul...@suse.com>
Cc: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
Cc: Stefano Stabellini <sstabell...@kernel.org>
Cc: Tim Deegan <t...@xen.org>
Cc: Wei Liu <wei.l...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/common
Modify the custom parameter parsing routines in:
xen/arch/x86/hvm/viridian.c
to indicate whether the parameter value was parsed successfully.
Cc: Paul Durrant <paul.durr...@citrix.com>
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off
Modify the custom parameter parsing routines in:
xen/arch/x86/genapic/probe.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
;
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/arch/x86/apic.c | 5 +
1 file changed, 1 insertion(+), 4 deletions(-)
diff --git a/xen/arch/x86/apic.c b/xen/arch/x86/apic.c
index fdb0a99927..5ffbd8f54f 100644
--- a/xen/arch/x86/apic.c
+++ b/xen/arch/x86/apic.c
@@ -800,11 +800,8 @@
Modify the custom parameter parsing routines in:
xen/arch/x86/nmi.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/a
Modify the custom parameter parsing routines in:
xen/arch/arm/traps.c
to indicate whether the parameter value was parsed successfully.
Cc: Stefano Stabellini <sstabell...@kernel.org>
Cc: Julien Grall <julien.gr...@arm.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xe
;
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/arch/x86/cpu/mcheck/mce.c | 4
1 file changed, 4 deletions(-)
diff --git a/xen/arch/x86/cpu/mcheck/mce.c b/xen/arch/x86/cpu/mcheck/mce.c
index e577a9db11..507535b094 100644
--- a/xen/arch/x86/cpu/mcheck/mce.c
+++ b/xen/arch/x86/cpu/mche
ooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/arch/x86/hvm/vmx/vmcs.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index 2008fee280..4ddcbd7e5e 100644
--- a/xen/arc
Modify the custom parameter parsing routines in:
xen/arch/x86/mm.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen
Modify the custom parameter parsing routines in:
xen/xsm/flask/flask_op.c
to indicate whether the parameter value was parsed successfully.
Cc: Daniel De Graaf <dgde...@tycho.nsa.gov>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/xsm/flask/flask_op.c | 6 --
1 fil
Modify the custom parameter parsing routines in:
xen/arch/arm/acpi/boot.c
to indicate whether the parameter value was parsed successfully.
Cc: Stefano Stabellini <sstabell...@kernel.org>
Cc: Julien Grall <julien.gr...@arm.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
t;
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
Cc: Stefano Stabellini <sstabell...@kernel.org>
Cc: Tim Deegan <t...@xen.org>
Cc: Wei Liu <wei.l...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/drive
itrix.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
Cc: Stefano Stabellini <sstabell...@kernel.org>
Cc: Tim Deegan <t...@xen.org>
Cc: Wei Liu <wei.l...@citrix.com>
Signed-
Modify the custom parameter parsing routines in:
xen/arch/x86/cpu/vpmu.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/a
Modify the custom parameter parsing routines in:
xen/arch/x86/dom0_build.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
Modify the custom parameter parsing routines in:
xen/arch/x86/irq.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/
Modify the custom parameter parsing routines in:
xen/arch/x86/io_apic.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/
Add a new xl command "set-parameters" to set hypervisor parameters at
runtime similar to boot time parameters via command line.
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc: Wei Liu <wei.l...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
Jan Beulich <jbeul...@suse.com>
Cc: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
Cc: Stefano Stabellini <sstabell...@kernel.org>
Cc: Tim Deegan <t...@xen.org>
Cc: Wei Liu <wei.l...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/common
Modify the custom parameter parsing routines in:
xen/drivers/passthrough/iommu.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/drivers/passthrough/iommu.c | 15 ++-
Modify the custom parameter parsing routines in:
xen/arch/x86/apic.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/ar
Modify the custom parameter parsing routines in:
xen/drivers/cpufreq/cpufreq.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich <jbeul...@suse.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
xen/drivers/cpufreq/cpufreq.c | 18 +++
Modify the custom parameter parsing routines in:
xen/arch/arm/domain_build.c
to indicate whether the parameter value was parsed successfully.
Cc: Stefano Stabellini <sstabell...@kernel.org>
Cc: Julien Grall <julien.gr...@arm.com>
Signed-off-by: Juergen Gross <jgr...@suse.com>
On 08/08/17 16:26, Asharaf Perinchikkal wrote:
> Hi All,
>
> I am attaching xen boot log when xen fail to boot with updated kernel
> from UEFI shell.
> It show an error when kernel start booting..
>
> N) ***
> (XEN) WARNING: CONSOLE OUTPUT IS
On 07/08/17 22:56, Boris Ostrovsky wrote:
>
>> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
>> index 811e4ddb3f37..a3dcd83187ce 100644
>> --- a/arch/x86/xen/enlighten_pv.c
>> +++ b/arch/x86/xen/enlighten_pv.c
>> @@ -579,6 +579,71 @@ static void xen_write_ldt_entry(struct
On 28/07/17 12:23, Juergen Gross wrote:
> This patch series fixes a regression introduced in 4.13-rc1: A Xen
> HVM guest with KASLR enabled wouldn't boot any longer due to the usage
> of __va() before kernel_randomize_memory() was called.
>
> Changes in V2:
> - patch 1: test f
On 04/08/17 15:57, Andrew Cooper wrote:
> On 04/08/17 14:36, Juergen Gross wrote:
>> On 04/08/17 15:23, Andrew Cooper wrote:
>>> On 04/08/17 14:20, Juergen Gross wrote:
>>>> Last year Jan posted a patch series to change hypervisor log level
>>>> th
On 04/08/17 15:47, Wei Liu wrote:
> On Fri, Aug 04, 2017 at 03:20:09PM +0200, Juergen Gross wrote:
>> Last year Jan posted a patch series to change hypervisor log level
>> thresholds via xl command [1]. This approach was later modified by Wei
>> resulting in patch serie
On 04/08/17 15:21, Wei Liu wrote:
> On Fri, Aug 04, 2017 at 03:02:03PM +0200, Marek Marczykowski-Górecki wrote:
>> On Fri, Aug 04, 2017 at 01:26:21PM +0100, Wei Liu wrote:
>>> On Wed, Aug 02, 2017 at 10:59:49AM +0100, Paul Durrant wrote:
A previous patch added support for priv-mapping guest
On 04/08/17 15:23, Andrew Cooper wrote:
> On 04/08/17 14:20, Juergen Gross wrote:
>> Last year Jan posted a patch series to change hypervisor log level
>> thresholds via xl command [1]. This approach was later modified by Wei
>> resulting in patch series [2].
>&g
Last year Jan posted a patch series to change hypervisor log level
thresholds via xl command [1]. This approach was later modified by Wei
resulting in patch series [2].
I'd like to follow up with another approach being able to do the same,
but being much more flexible:
Instead of controlling
The function xen_set_domain_pte() is used nowhere in the kernel.
Remove it.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/include/asm/xen/page.h | 2 --
arch/x86/xen/mmu_pv.c | 20
include/trace/events/xen.h | 18 --
3
Remove the last tests for XENFEAT_auto_translated_physmap in pure
PV-domain specific paths. PVH V1 is gone and the feature will always
be "false" in PV guests.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/include/asm/xen/page.h | 3 ---
arch/x86/xen/p2m.c
Remove stuff no longer needed.
Juergen Gross (3):
xen: remove tests for pvh mode in pure pv paths
xen: remove unused function xen_set_domain_pte()
xen: remove not used trace functions
arch/x86/include/asm/xen/page.h | 5 -
arch/x86/xen/mmu_pv.c | 20
There are some Xen specific trace functions defined in
include/trace/events/xen.h. Remove them.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
include/trace/events/xen.h | 20
1 file changed, 20 deletions(-)
diff --git a/include/trace/events/xen.h b/include/trace/
use the exception entry with prepended instructions,
otherwise use the entry without the Xen specific code.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/entry/entry_64.S | 23 ++--
arch/x86/entry/entry_64_compat.S | 1 -
arch/x86/include/asm/para
On 02/08/17 01:52, Andy Lutomirski wrote:
> On Tue, Aug 1, 2017 at 4:38 PM, Andrew Cooper
> wrote:
>> On 01/08/2017 20:45, Andy Lutomirski wrote:
>>> Also, IMO it would be nice to fully finish the job. Remaining steps are:
>>>
>>> 1. Unsuck the SYSCALL entries on Xen
On 03/08/17 00:43, Boris Ostrovsky wrote:
> On 08/02/2017 08:01 AM, Juergen Gross wrote:
>> On 01/08/17 16:28, PGNet Dev wrote:
>>> On 7/28/17 9:02 AM, PGNet Dev wrote:
>>>> On 7/27/17 11:23 PM, Juergen Gross wrote:
>>>>> Can you please post the d
for some functionality,
but please don't expect anyone to just do the work for you. Yes, it is
sometimes hard to find the information you are searching for, but that's
the way we all learned about the internals of Xen.
Juergen
>
> Thanks
> Amna
> ___
e minimal experience in Linux driver.
>
> Regards
> Ajmal
>
>
> On 03-Aug-2017 2:48 PM, "Ajmal M Ali" <ajeesh...@gmail.com
> <mailto:ajeesh...@gmail.com>> wrote:
>
>
> On 21-Jul-2017 2:17 PM, "Pasi Kärkkäinen" <pa...@iki.fi
>
On 03/08/17 09:59, Waseem, Amna wrote:
> Thanks a lot.
>
> I assume I will use manual_node to add nodes before starting xenstore daemon
> completely.
>
> If I understand, manual_node just adds nodes and children. It doesnot add
> values.
Be careful here: manual_node() right now even can add
On 01/08/17 16:28, PGNet Dev wrote:
> On 7/28/17 9:02 AM, PGNet Dev wrote:
>> On 7/27/17 11:23 PM, Juergen Gross wrote:
>>> Can you please post the domain's config file used to create the domain
>>> and the kernel config?
>>
>> Sure.
>>
>>h
On 31/07/17 13:22, Wei Liu wrote:
> A document for the release manager.
>
> Signed-off-by: Wei Liu <wei.l...@citrix.com>
With two minor corrections (see below):
Reviewed-by: Juergen Gross <jgr...@suse.com>
> ---
> docs/process/xen-rele
On 01/08/17 21:45, Andy Lutomirski wrote:
> On Tue, Aug 1, 2017 at 3:39 AM, Juergen Gross <jgr...@suse.com> wrote:
>> When running as Xen pv-guest the exception frame on the stack contains
>> %r11 and %rcx additional to the other data pushed by the processor.
>>
>>
On 02/08/17 12:12, Waseem, Amna wrote:
> Hello All,
>
> Can anyone tell me how xenstore filesystem gets populated about information
> about Dom0.
see tools/helpers/xen-init-dom0.c
> Which function or script creates node for local domain?
see tools/libxl/ (various source files)
> I want to
On 01/08/17 17:23, Boris Ostrovsky wrote:
> On 07/31/2017 06:34 PM, Stefano Stabellini wrote:
>> On Thu, 27 Jul 2017, Boris Ostrovsky wrote:
+int pvcalls_front_release(struct socket *sock)
+{
+ struct pvcalls_bedata *bedata;
+ struct sock_mapping *map;
+ int req_id,
use the exception entry with prepended instructions,
otherwise use the entry without the Xen specific code.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/entry/entry_64.S | 22 ++
arch/x86/entry/entry_64_compat.S | 1 -
arch/x86/include/asm/
On 28/07/17 17:14, Boris Ostrovsky wrote:
> On 07/28/2017 10:53 AM, Juergen Gross wrote:
>> When starting the xenwatch thread a theoretical deadlock situation is
>> possible:
>>
>> xs_init() contains:
>>
>> task = kthread_run(xenwatch_thread, NU
e set and the
callback of that watch unregisters a watch, then a self-deadlock would
occur.
Avoid this by setting xenwatch_pid in xenwatch_thread().
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
drivers/xen/xenbus/xenbus_xs.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
dif
/xen-selfballoon.c| 4 ++--
drivers/xen/xenfs/super.c| 1 -
3 files changed, 5 insertions(+), 13 deletions(-)
Gustavo A. R. Silva (1):
xen: selfballoon: remove unnecessary static in frontswap_selfshrink()
Juergen Gross (1):
xen: dont fiddle with event channel masking
Provide a hook in hypervisor_x86 called after setting up initial
memory mapping.
This is needed e.g. by Xen HVM guests to map the hypervisor shared
info page.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/include/asm/hypervisor.h | 10 ++
arch/x86/mm/
This patch series fixes a regression introduced in 4.13-rc1: A Xen
HVM guest with KASLR enabled wouldn't boot any longer due to the usage
of __va() before kernel_randomize_memory() was called.
Changes in V2:
- patch 1: test for x86_hyper being not NULL
Juergen Gross (3):
x86: provide
x this use early_memremap() to get a temporary virtual
address for shared info until va() can be used safely.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/xen/enlighten_hvm.c | 16 ++--
1 file changed, 14 insertions(+), 2 deletions(-)
diff --git a/arch/x86/xen/enlighten_
Instead of calling xen_hvm_init_shared_info() on boot and resume split
it up into a boot time function searching for the pfn to use and a
mapping function doing the hypervisor mapping call.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/xen/enlighten_hvm.
this message does not
> provide useful information. Drop this message.
>
> Signed-off-by: Punit Agrawal <punit.agra...@arm.com>
> Cc: Boris Ostrovsky <boris.ostrov...@oracle.com>
> Cc: Juergen Gross <jgr...@suse.com>
Committed
On 04/07/17 20:34, Gustavo A. R. Silva wrote:
> Remove unnecessary static on local variables last_frontswap_pages and
> tgt_frontswap_pages. Such variables are initialized before being used,
> on every execution path throughout the function. The statics have no
> benefit and, removing them reduce
On 27/07/17 20:20, PGNet Dev wrote:
> I've upgraded a Xen server's
>
> xen-4.9.0_08-517.2.x86_64
> xen-libs-4.9.0_08-517.2.x86_64
>
> kernel from 4.12x to 4.13x
>
> uname -rm
> 4.13.0-rc2-2.gb545b87-default x86_64
>
> After upgrading, I see in my Dom0-attached
On 27/07/17 17:41, Boris Ostrovsky wrote:
> On 07/27/2017 11:31 AM, Juergen Gross wrote:
>> On 27/06/17 19:21, Venu Busireddy wrote:
>>> This patch set is part of a set of patchs that together allow containment
>>> of unrecoverable AER errors from PCIe devices assigned t
On 27/07/17 17:37, Boris Ostrovsky wrote:
> On 07/27/2017 11:11 AM, Juergen Gross wrote:
>> The macros for testing domain types are more complicated then they
>> need to. Simplify them.
>>
>> Signed-off-by: Juergen Gross <jgr...@suse.com>
passthrough mode, BIOS's bring down the server,
> thus bringing down the entire hypervisor. For this patch set to work,
> the AER error handling needs to be delegated to the host operating system.
>
> Signed-off-by: Venu Busireddy <venu.busire...@oracle.com>
> Signed-off-by: Elen
The macros for testing domain types are more complicated then they
need to. Simplify them.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
include/xen/xen.h | 20 +---
1 file changed, 9 insertions(+), 11 deletions(-)
diff --git a/include/xen/xen.h b/include/xen/xen.h
On 26/07/17 19:57, Andy Lutomirski wrote:
>
>
>> On Jul 26, 2017, at 11:50 AM, Juergen Gross <jgr...@suse.com> wrote:
>>
>>> On 26/07/17 15:48, Andy Lutomirski wrote:
>>>> On Mon, Jul 24, 2017 at 7:28 AM, Juergen Gross <jgr...@suse.com> wro
On 26/07/17 15:48, Andy Lutomirski wrote:
> On Mon, Jul 24, 2017 at 7:28 AM, Juergen Gross <jgr...@suse.com> wrote:
>> When running as Xen pv-guest the exception frame on the stack contains
>> %r11 and %rcx additional to the other data pushed by the processor.
>>
>>
On 26/07/17 15:48, Andy Lutomirski wrote:
> On Mon, Jul 24, 2017 at 7:28 AM, Juergen Gross <jgr...@suse.com> wrote:
>> When running as Xen pv-guest the exception frame on the stack contains
>> %r11 and %rcx additional to the other data pushed by the processor.
>>
>>
On 25/07/17 16:09, Boris Ostrovsky wrote:
> On 07/25/2017 05:50 AM, Juergen Gross wrote:
>> Provide a hook in hypervisor_x86 called after setting up initial
>> memory mapping.
>>
>> This is needed e.g. by Xen HVM guests to map the hypervisor shared
>> info p
On 25/07/17 16:19, Boris Ostrovsky wrote:
> On 07/25/2017 05:50 AM, Juergen Gross wrote:
>>
>> -void __ref xen_hvm_init_shared_info(void)
>> +void xen_hvm_init_shared_info(void)
>
> Why are you dropping __ref?
The function no longer calls any
x this use early_memremap() to get a temporary virtual
address for shared info until va() can be used safely.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/xen/enlighten_hvm.c | 16 ++--
1 file changed, 14 insertions(+), 2 deletions(-)
diff --git a/arch/x86/xen/enlighten_
Provide a hook in hypervisor_x86 called after setting up initial
memory mapping.
This is needed e.g. by Xen HVM guests to map the hypervisor shared
info page.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/include/asm/hypervisor.h | 10 ++
arch/x86/mm/
Instead of calling xen_hvm_init_shared_info() on boot and resume split
it up into a boot time function searching for the pfn to use and a
mapping function doing the hypervisor mapping call.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/xen/enlighten_hvm.
This patch series fixes a regression introduced in 4.13-rc1: A Xen
HVM guest with KASLR enabled wouldn't boot any longer due to the usage
of __va() before kernel_randomize_memory() was called.
Juergen Gross (3):
x86: provide an init_mem_mapping hypervisor hook
xen: split up
On 22/07/17 02:12, Stefano Stabellini wrote:
> Also add pvcalls-front to the Makefile.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> ---
> drivers/xen/Kconfig | 9 +
> drivers/xen/Makefile | 1 +
> 2 files changed,
> CC: jgr...@suse.com
Reviewed-by: Juergen Gross <jgr...@suse.com>
Juergen
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 22/07/17 02:12, Stefano Stabellini wrote:
> Send PVCALLS_RELEASE to the backend and wait for a reply. Take both
> in_mutex and out_mutex to avoid concurrent accesses. Then, free the
> socket.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC:
On 22/07/17 02:12, Stefano Stabellini wrote:
> For active sockets, check the indexes and use the inflight_conn_req
> waitqueue to wait.
>
> For passive sockets, send PVCALLS_POLL to the backend. Use the
> inflight_accept_req waitqueue if an accept is outstanding. Otherwise use
> the inflight_req
On 22/07/17 02:11, Stefano Stabellini wrote:
> Implement recvmsg by copying data from the "in" ring. If not enough data
> is available and the recvmsg call is blocking, then wait on the
> inflight_conn_req waitqueue. Take the active socket in_mutex so that
> only one function can access the ring
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send data to an active socket by copying data to the "out" ring. Take
> the active socket out_mutex so that only one function can access the
> ring at any given time.
>
> If not enough room is available on the ring, rather than returning
>
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_ACCEPT to the backend. Allocate a new active socket. Make
> sure that only one accept command is executed at any given time by
> setting PVCALLS_FLAG_ACCEPT_INFLIGHT and waiting on the
> inflight_accept_req waitqueue.
>
>
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_LISTEN to the backend.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> ---
> drivers/xen/pvcalls-front.c | 49
> +
>
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_BIND to the backend. Introduce a new structure, part of
> struct sock_mapping, to store information specific to passive sockets.
>
> Introduce a status field to keep track of the status of the passive
> socket.
>
> Introduce a waitqueue
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_CONNECT to the backend. Allocate a new ring and evtchn for
> the active socket.
>
> Introduce a data structure to keep track of sockets. Introduce a
> waitqueue to allow the frontend to wait on data coming from the backend
> on the
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send a PVCALLS_SOCKET command to the backend, use the masked
> req_prod_pvt as req_id. This way, req_id is guaranteed to be between 0
> and PVCALLS_NR_REQ_PER_RING. We already have a slot in the rsp array
> ready for the response, and there cannot be
On 22/07/17 02:11, Stefano Stabellini wrote:
> Implement the probe function for the pvcalls frontend. Read the
> supported versions, max-page-order and function-calls nodes from
> xenstore.
>
> Introduce a data structure named pvcalls_bedata. It contains pointers to
> the command ring, the event
On 22/07/17 02:11, Stefano Stabellini wrote:
> Introduce a xenbus frontend for the pvcalls protocol, as defined by
> https://xenbits.xen.org/docs/unstable/misc/pvcalls.html.
>
> This patch only adds the stubs, the code will be added by the following
> patches.
>
> Signed-off-by: Stefano
On 24/07/17 18:55, Iurii Artemenko wrote:
> Hello Juergen,
>
>
> I've started to work on checkpatch-like python script. I make it based
> on clang-format-diff.py and it works as pre-commit hook.
How does this work for a patch which is perfectly fine, while not
touched parts of the patched
use the exception entry with prepended instructions,
otherwise use the entry without the Xen specific code.
Signed-off-by: Juergen Gross <jgr...@suse.com>
---
arch/x86/entry/calling.h | 6 ++
arch/x86/entry/entry_64.S | 19 ++-
arch/x86
On the Xen Developer Summit 2017 in Budapest we agreed to add a
script to the Xen repository capable to test patches for style
correctness, similar to checkpatch.pl of the Linux kernel.
This is a first draft of the interface visible to users and
developers.
Problem to solve
| 3 ++-
arch/x86/xen/time.c | 1 -
drivers/xen/balloon.c | 3 +++
drivers/xen/grant-table.c | 9 -
drivers/xen/xen-balloon.c | 22 --
include/xen/balloon.h | 8
6 files changed, 33 insertions(+), 13 deletions(-)
Juergen Gross (2):
xen/x86
On 21/07/17 22:57, Linus Torvalds wrote:
> On Fri, Jul 21, 2017 at 3:17 AM, Juergen Gross <jgr...@suse.com> wrote:
>> drivers/xen/pvcalls-back.c | 1236
>>
>
> This really doesn't look like a fix.
>
> The merge window
g boot.
>>>
>>> [3.460595] xenfs: not registering filesystem on non-xen platform
>>>
>>> As the user chose not to boot a Xen domain, this message does not
>>> provide useful information. Drop this message.
>>>
>>> Signed-off-by: Punit Agrawal
(+), 13 deletions(-)
Colin Ian King (1):
xen/pvcalls: fix null pointer reference on sock_release call
Juergen Gross (3):
xen/grant-table: log the lack of grants
xen/x86: fix cpu hotplug
xen/balloon: don't online new memory initially
Stefano Stabellini (18):
xen: introduce
On 21/07/17 10:28, Wei Liu wrote:
> CC Juergen and George
>
> On Thu, Jul 20, 2017 at 01:05:20PM +0530, Ajmal M Ali wrote:
>> Hi,
>>
>> I am trying to do USB passthrough in x86_64. I have Ubuntu as Dom0 and DomU.
>>
>>
>>
>> *Dom0 : Linux teltvm0881 4.8.0-58-generic #63~16.04.1-Ubuntu SMP Mon Jun
re:
>text data bss dec hex filename
>5633 3452 384946924fd drivers/xen/xen-selfballoon.o
>
> after:
>text data bss dec hex filename
>5576 3308 256 9140 23b4 drivers/xen/xen-selfballoon.o
&g
On 20/07/17 14:33, Daniel Kiper wrote:
> On Thu, Jul 20, 2017 at 11:16:39AM +0200, Greg Kroah-Hartman wrote:
>> On Thu, Jul 20, 2017 at 10:39:10AM +0200, Ingo Molnar wrote:
>>>
>>> * Daniel Kiper wrote:
>>>
Hey Greg,
On Wed, Jul 19, 2017 at 11:43:32AM
On 19/07/17 17:17, Greg KH wrote:
> On Wed, Jul 19, 2017 at 04:51:02PM +0200, Juergen Gross wrote:
>> On 19/07/17 16:43, Greg KH wrote:
>>> From: Greg Kroah-Hartman <gre...@linuxfoundation.org>
>>>
>>> It's better to be explicit and use the DRIVER_ATTR
rning.
>
> This is part of a series to drop DRIVER_ATTR() from the tree entirely.
>
> Cc: Boris Ostrovsky <boris.ostrov...@oracle.com>
> Cc: Juergen Gross <jgr...@suse.com>
> Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.org>
Reviewed-by: Juergen Gross <jg
rning.
>
> This is part of a series to drop DRIVER_ATTR() from the tree entirely.
>
> Cc: Boris Ostrovsky <boris.ostrov...@oracle.com>
> Cc: Juergen Gross <jgr...@suse.com>
> Signed-off-by: Greg Kroah-Hartman <gre...@linuxfoundation.o
: Marek Marczykowski-Górecki <marma...@invisiblethingslab.com>
>> CC: David Scott <d...@recoil.org>
>> CC: Christian Lindig <christian.lin...@citrix.com>
>> CC: Juergen Gross <jgr...@suse.com>
>> CC: Jim Fehlig <jfeh...@suse.com>
>> CC:
701 - 800 of 3633 matches
Mail list logo