On 01/07/2017 12:37 AM, Stefano Stabellini wrote:
On Fri, 6 Jan 2017, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
---
xen/include/public/io/kbdif.h | 228 ++
1 file changed, 228 insertions(+)
On 17-01-09 10:08:04, Wei Liu wrote:
> On Mon, Jan 09, 2017 at 09:24:54AM +0800, Yi Sun wrote:
> > On 17-01-06 12:04:43, Wei Liu wrote:
> > > On Wed, Dec 14, 2016 at 12:08:02PM +0800, Yi Sun wrote:
> > > > diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> > > > index a32c751.
This patch implements get HW info flow in tools for MBA.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 7 +++
tools/libxc/xc_psr.c | 14 +
tools/libxl/libxl_psr.c | 12 ++-
tools/libxl/libxl_types.idl | 6 ++
tools/libxl/xl_cmdimpl.c
This patch implements get HW info flow for MBA including its callback
function and sysctl interface.
Signed-off-by: Yi Sun
---
xen/arch/x86/psr.c | 15 +++
xen/arch/x86/sysctl.c | 16
xen/include/asm-x86/psr.h | 3 +++
xen/include/public/sysctl.h |
This patch implements get value flow in tools for MBA.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 1 +
tools/libxc/xc_psr.c | 3 ++
tools/libxl/libxl.h | 3 ++
tools/libxl/libxl_psr.c | 21 +
tools/libxl/libxl_types.idl | 1 +
tools/libx
This patch implements set value flow in tools for MBA.
Signed-off-by: Yi Sun
---
tools/libxc/xc_psr.c | 3 +++
tools/libxl/libxl.h | 3 +++
tools/libxl/libxl_psr.c | 33
tools/libxl/xl.h | 1 +
tools/libxl/xl_cmdimpl.c | 55 +
This patch implements init flow for MBA including its callback
functions.
Signed-off-by: Yi Sun
---
xen/arch/x86/psr.c| 83 ++-
xen/include/asm-x86/psr.h | 1 +
2 files changed, 83 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/psr.c
This patch refactors some codes in tools/ to make set value
be more general.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 6 +++---
tools/libxc/xc_psr.c | 6 +++---
tools/libxl/libxl_psr.c | 4 ++--
3 files changed, 8 insertions(+), 8 deletions(-)
diff --git a/tools/
This patch implements get value callback function and domctl
interface for MBA.
Signed-off-by: Yi Sun
---
xen/arch/x86/domctl.c | 7 +++
xen/arch/x86/psr.c | 15 +++
xen/include/public/domctl.h | 1 +
3 files changed, 23 insertions(+)
diff --git a/xen/arch/x86/d
This patch refactors some codes in tools/ to make get value
be more general.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 12 +++
tools/libxc/xc_psr.c | 8 ++---
tools/libxl/libxl_psr.c | 80 +++
3 files changed, 75 inserti
This patch implements set value flow for MBA including its callback
function and domctl interface.
Signed-off-by: Yi Sun
---
xen/arch/x86/domctl.c | 6 ++
xen/arch/x86/psr.c | 152 +---
xen/include/asm-x86/msr-index.h | 1 +
xen/incl
This patch parses MBA parameters in configuration file. The parameter
means whether MBA is supported.
Signed-off-by: Yi Sun
---
xen/arch/x86/psr.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c
index 58d3555..eca9c43 100644
--- a/xen/arch/x86/psr.c
++
This patch adds MBA description in related documents.
Signed-off-by: Yi Sun
---
docs/man/xl.pod.1.in | 35 +++
docs/misc/xl-psr.markdown | 60 +++
2 files changed, 95 insertions(+)
diff --git a/docs/man/xl.pod.1.in b/docs/
This patch changes some interfaces in tools/ to make get hw info be
general but not only for CAT.
Add 'LIBXL_HAVE_PSR_MBA' to indicate interface change.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 23 +++--
tools/libxc/xc_psr.c | 32 +++---
tools/libxl
This patch implements main data structures of MBA.
Like CAT features, MBA HW info has cos_max which means the max cos
registers number, and thrtl_max which means the max throttle value
(delay value). It also have a flag to represent if the throttle
value is linear or not.
One COS register of MBA
This patch changes 'cbm_type' to 'psr_val_type' to make it general.
Then, we can reuse this for every psr allocation feature.
Signed-off-by: Yi Sun
---
xen/arch/x86/domctl.c | 16 +-
xen/arch/x86/psr.c| 80 +++
xen/arch/x86/sysctl.c
This patch renames sysctl/domctl interfaces and related xsm policy to
make them general but not only for CAT. Then, we can resuse the
interfaces for all allocation features.
Signed-off-by: Yi Sun
---
tools/flask/policy/modules/dom0.te | 4 ++--
tools/flask/policy/modules/xen.if | 2 +-
tool
This run is configured for baseline tests only.
flight 68348 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68348/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 10 guest-start
Hi, all,
We plan to bring a new PSR (Platform Shared Resource) feature called
Intel Memory Bandwidth Allocation (MBA) to Xen.
Besides the MBA enabling, we change some interfaces to make them more
general but not only for CAT.
The implementation bases on below patch set which is being reviewed.
This patch creates MBA feature document in doc/features/. It
describes details for MBA.
Signed-off-by: Yi Sun
---
docs/features/intel_psr_mba.pandoc | 226 +
1 file changed, 226 insertions(+)
create mode 100644 docs/features/intel_psr_mba.pandoc
diff --git a
On 01/07/2017 12:20 AM, Stefano Stabellini wrote:
On Fri, 6 Jan 2017, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
---
xen/include/public/io/kbdif.h | 249 +-
1 file changed, 222 insertions(+),
On 01/05/2017 10:53 PM, Jan Beulich wrote:
On 31.12.16 at 06:45, wrote:
Expose vlapic_read_aligned and vlapic_reg_write() to be used by AVIC.
Signed-off-by: Suravee Suthikulpanit
Reviewed-by: Konrad Rzeszutek Wilk
Generally I dislike functions being non-static when all their callers
live
Jan,
On 01/05/2017 10:51 PM, Jan Beulich wrote:
On 31.12.16 at 06:45, wrote:
--- a/xen/include/asm-x86/hvm/domain.h
+++ b/xen/include/asm-x86/hvm/domain.h
@@ -72,6 +72,67 @@ struct hvm_ioreq_server {
bool_t bufioreq_atomic;
};
+struct hvm_pi_ops {
+/*
+ * To hand
AVX512_VPOPCNTDQ: Vector POPCNT instructions for word and qwords.
variable precision.
Signed-off-by: He Chen
---
xen/include/public/arch-x86/cpufeatureset.h | 1 +
xen/tools/gen-cpuid.py | 3 ++-
2 files changed, 3 insertions(+), 1 deletion(-)
diff --git a/xen/include/publi
On 09/01/17 22:17, Boris Ostrovsky wrote:
> On 01/06/2017 10:05 AM, Juergen Gross wrote:
>> Handling of multiple concurrent Xenstore accesses through xenbus driver
>> either from the kernel or user land is rather lame today: xenbus is
>> capable to have one access active only at one point of time.
flight 104090 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104090/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 4 host-build-prep fail in 104084 REGR. vs. 104078
Tests which are fa
Hi Andrew,
On 1/2/17 23:37, Andrew Cooper wrote:
+ma = d->avic_phy_apic_id_table_mfn;
+vmcb->avic_phy_apic_id = (ma << PAGE_SHIFT) & AVIC_HPA_MASK;
+vmcb->avic_phy_apic_id |= AVIC_PHY_APIC_ID_MAX;
Surely this should be some calculation derived from d->max_vcpus?
This is actually s
On 12/5/16 4:25 PM, Daniel Kiper wrote:
> Every multiboot protocol (regardless of version) compatible image must
> specify its load address (in ELF or multiboot header). Multiboot protocol
> compatible loader have to load image at specified address. However, there
> is no guarantee that the request
On 12/5/16 4:25 PM, Daniel Kiper wrote:
> This way Xen can be loaded on EFI platforms using GRUB2 and
> other boot loaders which support multiboot2 protocol.
>
> Signed-off-by: Daniel Kiper
> ---
> v10 - suggestions/fixes:
> - replace ljmpl with lretq
> (suggested by Andrew Cooper),
>
On 12/7/16 7:18 AM, Jan Beulich wrote:
On 05.12.16 at 23:25, wrote:
>> ..nor EFI platforms with runtime services enabled.
>
> Btw, was the title meant to read "... neither on non-EFI platforms ..."?
>
> Jan
>
Could we reduce the amount of negatives?
"disallow EFI reboot method on EFI pla
On 12/5/16 4:25 PM, Daniel Kiper wrote:
> Add multiboot2 protocol support. Alter min memory limit handling as we
> now may not find it from either multiboot (v1) or multiboot2.
>
> This way we are laying the foundation for EFI + GRUB2 + Xen development.
>
> Signed-off-by: Daniel Kiper
> Reviewed
This run is configured for baseline tests only.
flight 68347 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68347/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7ecfa0aa38a3601c958a81dc36f69b5e04e40584
baseline v
flight 104086 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104086/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 104073
test-armhf-armhf-libvirt
On 01/09/2017 06:03 AM, Andrew Cooper wrote:
> This avoids calling into hvm_cpuid() to obtain information which is directly
> available. In particular, this avoids the need to overload flag_dr_dirty
> because of hvm_cpuid() being unavailable in svm_save_dr().
>
> flag_dr_dirty is returned to a boo
On 01/09/2017 06:03 AM, Andrew Cooper wrote:
> Longterm, pv_cpuid() and hvm_cpuid() will be merged into a single
> guest_cpuid(), which is also capable of working outside of current context.
>
> To aid this transtion, introduce guest_cpuid() with the intended API, which
> simply defers back to pv_c
On Sun, Jan 08, 2017 at 02:31:15PM +0100, MasterPrenium wrote:
> Hello,
>
> Replies below + :
> - I don't know if this can help but after the crash, when the system
> reboots, the Raid 5 stack is re-synchronizing
> [ 37.028239] md10: Warning: Device sdc1 is misaligned
> [ 37.028541] created bi
flight 104087 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104087/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7ecfa0aa38a3601c958a81dc36f69b5e04e40584
baseline version:
ovmf 133834858a3ab5ba61ca1
flight 104084 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104084/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 4 host-build-prep fail REGR. vs. 104078
Regressions which
This run is configured for baseline tests only.
flight 68346 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68346/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 20 leak-check/chec
On 01/06/2017 10:05 AM, Juergen Gross wrote:
> Handling of multiple concurrent Xenstore accesses through xenbus driver
> either from the kernel or user land is rather lame today: xenbus is
> capable to have one access active only at one point of time.
>
> Rewrite xenbus to handle multiple requests
On Mon, 9 Jan 2017, Konrad Rzeszutek Wilk wrote:
> On Mon, Jan 09, 2017 at 10:42:41AM -0500, Dan Streetman wrote:
> > On Mon, Jan 9, 2017 at 9:59 AM, Boris Ostrovsky
> > wrote:
> > > On 01/06/2017 08:06 PM, Konrad Rzeszutek Wilk wrote:
> > >> On Thu, Jan 05, 2017 at 02:28:56PM -0500, Dan Streetman
On Mon, Jan 9, 2017 at 5:04 AM, Andrew Cooper
wrote:
> On 09/01/17 11:52, Jan Beulich wrote:
> On 09.01.17 at 12:36, wrote:
> >> We've come across a weird phenomenon: an Ubuntu 16.04.1 LTS HVM guest
> >> running kernel 4.4.0 installed via XenCenter in XenServer Dundee seems
> >> to eat up a
On Mon, 2017-01-09 at 19:12 +0200, Andy Shevchenko wrote:
> On Mon, 2017-01-09 at 18:27 +0200, Andy Shevchenko wrote:
> > On Mon, 2017-01-09 at 06:58 -0800, Luis R. Rodriguez wrote:
> > > The only architecture that was not tested was avr32 and that is
> > > because
> > > linux-next fails to compile
On Mon, 9 Jan 2017, Paul Durrant wrote:
> > Wouldn't it be better to introduce the new memcpy based scheme for RX
> > only?
>
> It would certainly be reasonable to tackle RX first. But I don't want to
> force a copy in the TX path when it may be possible to avoid it.
>
> >
> > This suggestion i
flight 104083 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104083/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 15 guest-start/debian.repeat fail REGR. vs. 104065
Regressions which
On Mon, 9 Jan 2017, Andrew Cooper wrote:
> On 09/01/17 11:03, Andrew Cooper wrote:
> > diff --git a/xen/arch/arm/domctl.c b/xen/arch/arm/domctl.c
> > index 09d9959..fee4b17 100644
> > --- a/xen/arch/arm/domctl.c
> > +++ b/xen/arch/arm/domctl.c
> > @@ -115,6 +115,11 @@ long arch_do_domctl(struct xen
On 09/01/17 17:40, Ian Jackson wrote:
> Juergen Gross writes ("[PATCH v4 05/12] xenstore: add support for reading
> directory with many children"):
>> Output is the generation count of the node (which will change each time
>> the node is being modified) and a list of child names starting with
>> t
On Mon, 2017-01-09 at 18:27 +0200, Andy Shevchenko wrote:
> On Mon, 2017-01-09 at 06:58 -0800, Luis R. Rodriguez wrote:
> > The only architecture that was not tested was avr32 and that is
> > because
> > linux-next fails to compile on it. I'd like to greatly thank Guenter
> > Roeck for
> > his hel
On Fri, Jan 06, 2017 at 01:12:44PM -0800, Stefano Stabellini wrote:
> On Fri, 6 Jan 2017, Edgar E. Iglesias wrote:
> > On Thu, Dec 29, 2016 at 02:04:15PM +, Julien Grall wrote:
> > > Hi all,
> > >
> > > The document below is an early version of a design
> > > proposal for PCI Passthrough in Xe
On Mon, Jan 9, 2017 at 11:12 AM, Shevchenko, Andriy
wrote:
> On Mon, 2017-01-09 at 18:27 +0200, Andy Shevchenko wrote:
>> On Mon, 2017-01-09 at 06:58 -0800, Luis R. Rodriguez wrote:
>
>> > The only architecture that was not tested was avr32 and that is
>> > because
>> > linux-next fails to compile
>>> On 09.01.17 at 17:58, wrote:
> Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
> adjustments"):
>> Right, I had been thinking of this too, but then wasn't sure to
>> suggest such a mixture. Perhaps the first two options could
>> even remain completely nameless then (I th
Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
adjustments"):
> Right, I had been thinking of this too, but then wasn't sure to
> suggest such a mixture. Perhaps the first two options could
> even remain completely nameless then (I think those are the
> ones which had been t
>>> On 09.01.17 at 17:34, wrote:
> Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
> adjustments"):
>> See e.g. the cpufreq=, i.e. we're talking of
>>
>> com1=:,:,...
>
> I think we will have to use `=', so
> com1==,=,...
>
> Since we already have BDFs which I think con
>>> On 09.01.17 at 12:03, wrote:
> @@ -396,12 +403,47 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf,
> case 0x8000 ... 0x8000 + CPUID_GUEST_NR_EXTD - 1:
> if ( leaf > p->extd.max_leaf )
> return;
> -break;
> +goto legacy;
>
> defa
Juergen Gross writes ("[PATCH v4 05/12] xenstore: add support for reading
directory with many children"):
> Output is the generation count of the node (which will change each time
> the node is being modified) and a list of child names starting with
> the specified index. The end of the list is in
>>> On 09.01.17 at 12:03, wrote:
> Clamp the toolstack-providied max_leaf values in recalculate_cpuid_policy(),
> causing the per-domain policy to have guest-accurate data.
>
> Have guest_cpuid() exit early if a requested leaf is out of range, rather than
> falling into the legacy path.
>
> Sign
On 09/01/17 16:31, Jan Beulich wrote:
On 09.01.17 at 12:03, wrote:
>> --- a/xen/include/asm-x86/cpuid.h
>> +++ b/xen/include/asm-x86/cpuid.h
>> @@ -92,6 +92,10 @@ struct cpuid_policy
>> * Everything else should be considered inaccurate, and not necesserily
>> 0.
>> */
>>
>> +#d
On Mon, Jan 09, Ian Jackson wrote:
> Olaf Hering writes ("[PATCH qemu-xen-traditional 2/2] xen_platform: SUSE
> xenlinux unplug for emulated PCI"):
> > From: Olaf Hering
> >
> > Implement SUSE specific unplug protocol for emulated PCI devices
> > in PVonHVM guests. Its a simple 'outl(1, (ioaddr
Eric DeVolder writes ("[PATCH] convert tabs into spaces; preserving
indentation"):
> Convert tabs into spaces; preserving indentation
>
> No functional changes
>
> Signed-off-by: Eric DeVolder
Acked-by: Ian Jackson
Although did you mean to send it twice ?
Thanks,
Ian.
_
>>> On 09.01.17 at 12:03, wrote:
> This avoids calling into hvm_cpuid() to obtain information which is directly
> available. In particular, this avoids the need to overload flag_dr_dirty
> because of hvm_cpuid() being unavailable in svm_save_dr().
>
> flag_dr_dirty is returned to a boolean (as i
Anthony PERARD writes ("[PATCH v2] get_maintainer.pl: Teach brace expansion"):
> It is done by using two different regex, the first one will take care of
> converting ',' inside '{}' to a '|', one by one, as long as there is at
> least two commas. The second regex will do the final convertion of '{
t be compiled either.
You mean an avr32 board ?
>> The debug patch which force enables the test driver is not submitted
>> for
>> upstream inclusion but is kept as part of the public tree for those
>> curious,
>> its the last patch [1]. This tree is based on linux-next tag
>>> On 09.01.17 at 17:28, wrote:
> On 09/01/17 16:21, Jan Beulich wrote:
> On 09.01.17 at 12:03, wrote:
>>> --- a/xen/arch/x86/cpuid.c
>>> +++ b/xen/arch/x86/cpuid.c
>>> @@ -346,7 +346,10 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf,
>>> case 0x4000 ... 0x40ff:
>>>
Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
adjustments"):
> See e.g. the cpufreq=, i.e. we're talking of
>
> com1=:,:,...
I think we will have to use `=', so
com1==,=,...
Since we already have BDFs which I think contain `:', and that would
be more confusing than the
>>> On 09.01.17 at 12:03, wrote:
> --- a/xen/include/asm-x86/cpuid.h
> +++ b/xen/include/asm-x86/cpuid.h
> @@ -92,6 +92,10 @@ struct cpuid_policy
> * Everything else should be considered inaccurate, and not necesserily
> 0.
> */
>
> +#define DECL_BITFIELD(word) _DECL_BITFIELD(FEATUR
On 09/01/17 16:21, Jan Beulich wrote:
On 09.01.17 at 12:03, wrote:
>> --- a/xen/arch/x86/cpuid.c
>> +++ b/xen/arch/x86/cpuid.c
>> @@ -346,7 +346,10 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf,
>> case 0x4000 ... 0x40ff:
>> if ( is_viridian_domain(d) )
>>
On 09/01/17 17:10, Jan Beulich wrote:
On 09.01.17 at 17:02, wrote:
>> On 09/01/17 15:38, Jan Beulich wrote:
>> On 05.12.16 at 08:48, wrote:
--- a/tools/xenstore/include/xenstore_lib.h
+++ b/tools/xenstore/include/xenstore_lib.h
@@ -44,6 +44,7 @@ struct xs_permissions
d either.
>
> The debug patch which force enables the test driver is not submitted
> for
> upstream inclusion but is kept as part of the public tree for those
> curious,
> its the last patch [1]. This tree is based on linux-next tag next-
> 20170109.
>
> [0] https://
On 09/01/17 15:39, Jan Beulich wrote:
> Commit 9e49dcf67f ("xenstore: add per-node generation counter) changed
> the TDB layout, which - in order to not break older xenstored running
> on the same system - need to be accompanied by a version bump.
>
> Signed-off-by: Jan Beulich
Acked-by: Juergen
>>> On 09.01.17 at 12:03, wrote:
> --- a/xen/arch/x86/cpuid.c
> +++ b/xen/arch/x86/cpuid.c
> @@ -346,7 +346,10 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf,
> case 0x4000 ... 0x40ff:
> if ( is_viridian_domain(d) )
> return cpuid_viridian_leaves(v, leaf
>>> On 09.01.17 at 17:08, wrote:
> On 09/01/17 15:15, Jan Beulich wrote:
> On 09.01.17 at 12:03, wrote:
>>> +/* Extended leaves. */
>>> +cpuid_leaf(0x8000, &p->extd.raw[0]);
>>> +for ( i = 1; i < min(ARRAY_SIZE(p->extd.raw),
>>> + p->extd.max_leaf + 1 -
>>> On 09.01.17 at 17:02, wrote:
> On 09/01/17 15:38, Jan Beulich wrote:
> On 05.12.16 at 08:48, wrote:
>>> --- a/tools/xenstore/include/xenstore_lib.h
>>> +++ b/tools/xenstore/include/xenstore_lib.h
>>> @@ -44,6 +44,7 @@ struct xs_permissions
>>>
>>> /* Header of the node record in tdb. *
On 09/01/17 15:15, Jan Beulich wrote:
On 09.01.17 at 12:03, wrote:
>> @@ -67,6 +80,58 @@ static void __init sanitise_featureset(uint32_t *fs)
>>(fs[FEATURESET_e1d] & ~CPUID_COMMON_1D_FEATURES));
>> }
>>
>> +static void __init calculate_raw_policy(void)
>> +{
>>
On 09/01/17 15:38, Jan Beulich wrote:
On 05.12.16 at 08:48, wrote:
>> --- a/tools/xenstore/include/xenstore_lib.h
>> +++ b/tools/xenstore/include/xenstore_lib.h
>> @@ -44,6 +44,7 @@ struct xs_permissions
>>
>> /* Header of the node record in tdb. */
>> struct xs_tdb_record_hdr {
>> +u
>>> On 09.01.17 at 16:40, wrote:
> On 01/09/2017 02:10 AM, Jan Beulich wrote:
>
> On 06.01.17 at 19:34, wrote:
>>> Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
>>> adjustments"):
On 06.01.17 at 17:24, wrote:
Well, as you may have seen, things are getting c
On Mon, Jan 09, 2017 at 10:42:41AM -0500, Dan Streetman wrote:
> On Mon, Jan 9, 2017 at 9:59 AM, Boris Ostrovsky
> wrote:
> > On 01/06/2017 08:06 PM, Konrad Rzeszutek Wilk wrote:
> >> On Thu, Jan 05, 2017 at 02:28:56PM -0500, Dan Streetman wrote:
> >>> Do not read a pci device's msi message data t
On 09/01/17 15:40, Jan Beulich wrote:
On 09.01.17 at 16:09, wrote:
>> On 09/01/17 15:04, Jan Beulich wrote:
>> On 09.01.17 at 12:03, wrote:
@@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t
>> feature)
return NULL;
}
+void guest_cpui
On Mon, Jan 9, 2017 at 9:59 AM, Boris Ostrovsky
wrote:
> On 01/06/2017 08:06 PM, Konrad Rzeszutek Wilk wrote:
>> On Thu, Jan 05, 2017 at 02:28:56PM -0500, Dan Streetman wrote:
>>> Do not read a pci device's msi message data to see if a pirq was
>>> previously configured for the device's msi/msix,
Convert tabs into spaces; preserving indentation
No functional changes
Signed-off-by: Eric DeVolder
---
tools/libxc/xc_kexec.c | 16
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/tools/libxc/xc_kexec.c b/tools/libxc/xc_kexec.c
index 989e225192..59e2f076f4 10064
>>> On 09.01.17 at 16:09, wrote:
> On 09/01/17 15:04, Jan Beulich wrote:
> On 09.01.17 at 12:03, wrote:
>>> @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t
> feature)
>>> return NULL;
>>> }
>>>
>>> +void guest_cpuid(const struct vcpu *v, uint32_t leaf,
>>> +
On 01/09/2017 02:10 AM, Jan Beulich wrote:
On 06.01.17 at 19:34, wrote:
Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
adjustments"):
On 06.01.17 at 17:24, wrote:
Well, as you may have seen, things are getting complicated here:
The two currently-last elements are permi
Convert tabs into spaces; preserving indentation
No functional changes
Signed-off-by: Eric DeVolder
---
tools/libxc/xc_kexec.c | 16
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/tools/libxc/xc_kexec.c b/tools/libxc/xc_kexec.c
index 989e225192..59e2f076f4 10064
On 1/9/17 9:22 AM, Anthony PERARD wrote:
> Simpler non-nested brace expansion.
>
> Some entries in the MAINTAINER are not understood by the script, the
> ones that contain {,}. This patch fixes it.
>
> This will convert brace expansion style use in MAINTAINER into a regex
> that get_maintainer.pl
>>> On 09.01.17 at 12:03, wrote:
> ... rather than from the legacy path. Update the API to match guest_cpuid(),
> and remove its dependence on current.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@
>>> On 09.01.17 at 12:03, wrote:
> @@ -67,6 +80,58 @@ static void __init sanitise_featureset(uint32_t *fs)
>(fs[FEATURESET_e1d] & ~CPUID_COMMON_1D_FEATURES));
> }
>
> +static void __init calculate_raw_policy(void)
> +{
> +struct cpuid_policy *p = &raw_policy;
> +
On Mon, Jan 09, 2017 at 07:39:32AM -0700, Jan Beulich wrote:
> Commit 9e49dcf67f ("xenstore: add per-node generation counter) changed
> the TDB layout, which - in order to not break older xenstored running
> on the same system - need to be accompanied by a version bump.
>
> Signed-off-by: Jan Beul
Simpler non-nested brace expansion.
Some entries in the MAINTAINER are not understood by the script, the
ones that contain {,}. This patch fixes it.
This will convert brace expansion style use in MAINTAINER into a regex
that get_maintainer.pl can use to match a path again a maintainer
section.
I
>>> On 09.01.17 at 12:03, wrote:
> --- a/xen/arch/x86/domctl.c
> +++ b/xen/arch/x86/domctl.c
> @@ -51,6 +51,30 @@ static int gdbsx_guest_mem_io(domid_t domid, struct
> xen_domctl_gdbsx_memio *iop)
> static void update_domain_cpuid_info(struct domain *d,
> co
flight 104082 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104082/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Often all is needed is these small helpers, instead of compiler.h
or a full kprobes.h. This is important for asm helpers, in fact even
some asm/kprobes.h make use of these helpers... instead just keep a
generic asm file with helpers useful for asm code with the least amount
of clutter as possible.
On 09/01/17 15:04, Jan Beulich wrote:
On 09.01.17 at 12:03, wrote:
>> @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t
>> feature)
>> return NULL;
>> }
>>
>> +void guest_cpuid(const struct vcpu *v, uint32_t leaf,
>> + uint32_t subleaf, struct cpu
>>> On 09.01.17 at 12:03, wrote:
> @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t
> feature)
> return NULL;
> }
>
> +void guest_cpuid(const struct vcpu *v, uint32_t leaf,
> + uint32_t subleaf, struct cpuid_leaf *res)
> +{
> +const struct vcpu *c
Start off with just __ref -- we enalbe you to override, if you do
that then you can define your own. The way you'd use this, if you
do override, is define your own __ref and then use include_next.
Signed-off-by: Luis R. Rodriguez
---
tools/include/linux/init.h | 9 +
1 file changed, 9 in
This will be used later by the userspace linker-tables sandbox.
As a convenience, include bug.h on kernel.h -- this is not done
on upstream kernel.h, however most header files do include bug.h
eventually, if we were to only add the ones that need it we'd
need to copy a lot of headers to tools for t
This v3 only modifies the tools sandbox to adjust for the linker tables
macro renames suggested by Andy Shevchenko. It applies after the kernel
changes, a public tree is available with both series applied [0] based on
linux-next tag next-20170109, if you pull from there please drop the last
patch
This will be used later by the linker-table userspace sandbox.
Signed-off-by: Luis R. Rodriguez
---
tools/include/linux/export.h | 22 ++
1 file changed, 22 insertions(+)
diff --git a/tools/include/linux/export.h b/tools/include/linux/export.h
index d07e586b9ba0..cb7d6b490e0
This will be used later by the userspace linker table.
Signed-off-by: Luis R. Rodriguez
---
tools/include/linux/compiler.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/include/linux/compiler.h b/tools/include/linux/compiler.h
index 556c991de212..6321265df00a 100644
--- a/tools/inc
This adds __used, to be used later in the userspace linker-tables
sandbox. If any userspace applicaiton wants to override they can
add their own definition and then use include_next.
This definition should probably suffice for most uses cases though.
Signed-off-by: Luis R. Rodriguez
---
tools/i
Add a test drivers for linker tables.
v6: rename table macro as suggested by Andy Shevchenko
v5: added this commit for the first time in this series.
Signed-off-by: Luis R. Rodriguez
---
lib/Kconfig.debug| 6 +
lib/Makefile | 1 +
lib/test
kprobe makes use of two custom sections, each custom section
is folded into one of the standard Linux sections types as follows,
it currently relies on the linker script to fold the custom section
onto the respective Linux section:
type Linux-section custom section name begin
1 - 100 of 181 matches
Mail list logo