As the code stands right now, after DomU has enabled #VE using
HVMOP_altp2m_vcpu_enable_notify, all its pages have the #VE suppress bit
cleared, generating #VEs for any EPT violation. There is currently no
way to change the value of the #VE suppress bit for a page from a
domain; it can only be
Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a
privileged domain to change the value of the #VE suppress bit for a
page.
Add a libxc wrapper for invoking this hvmop.
Signed-off-by: Adrian Pop
Acked-by: Wei Liu
---
changes in v3:
-
From: Vlad Ioan Topan
The default value for the "suppress #VE" bit set by set_mem_access()
currently depends on whether the call is made from the same domain (the
bit is set when called from another domain and cleared if called from
the same domain). This patch changes
On Tue, Jul 18, 2017 at 3:37 AM, Petre Pircalabu
wrote:
> If case of a vm_event with the emulate_flags set, if the instruction
> cannot be emulated, the monitor should be notified instead of directly
> injecting a hw exception.
> This behavior can be used to re-execute
On 07/05/2017 10:05 AM, Juergen Gross wrote:
> Commit dc6416f1d711eb4c1726e845d653235dcaae12e1 ("xen/x86: Call
> cpu_startup_entry(CPUHP_AP_ONLINE_IDLE) from xen_play_dead()")
> introduced an error leading to a stack overflow of the idle task when
> a cpu was brought offline/online many times: by
Implement reading from PV console. Making use of polling.
Signed-off-by: Felix Schmoll
---
common/console.c | 22 ++
include/xtf/console.h | 2 ++
2 files changed, 24 insertions(+)
diff --git a/common/console.c b/common/console.c
index
On Tue, Jul 18, 2017 at 03:23:45PM +0100, Andrew Cooper wrote:
> This hypercall is unused by guests these days, but there was no prevention of
> usable subops. The following ops have been restricted, as there is no
> suitable structure in the evntchn_op union.
>
> EVTCHNOP_reset
>
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl.h | 9 +++-
tools/libxl/libxl_checkpoint_device.c | 7 ++-
tools/libxl/libxl_create.c| 3 +-
tools/libxl/libxl_disk.c
From: Oleksandr Grytsov
Due to changes in device framework setdefault function
should have same format. Otherwise calling devicetype
set_default causes segfault.
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_internal.h | 1 -
From: Oleksandr Grytsov
Add libxl__device_add to simple write XenStore device conifg
and libxl__device_add_async to update domain configuration
and write XenStore device config asynchroniously.
Almost all devices have similar libxl__device__add function.
This
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl.h | 9 +-
tools/libxl/libxl_checkpoint_device.c | 9 +-
tools/libxl/libxl_colo_save.c | 4 +-
tools/libxl/libxl_dm.c
From: Oleksandr Grytsov
Changes since V3:
* libxl__device_add renamed to libxl__device_add_async and reworked
to match the former design;
* libxl__device_add used for devices which don't require updating domain
config but simple write to Xen Store (9pfs,
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_9pfs.c | 67 +++-
tools/libxl/libxl_create.c | 2 +-
tools/libxl/libxl_internal.h | 7 +
From: Oleksandr Grytsov
Add commands: vdispl-attach, vdispl-list, vdispl-detach
and domain config vdispl parser
Signed-off-by: Oleksandr Grytsov
---
tools/xl/Makefile | 1 +
tools/xl/xl.h | 3 +
tools/xl/xl_cmdtable.c |
From: Oleksandr Grytsov
Add libxl__device_list and libxl__device_list_free
functions to handle device list using the device
framework.
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_device.c | 66
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl.h | 12 ++-
tools/libxl/libxl_vtpm.c | 231 +--
tools/xl/xl_vtpm.c | 3 +-
3 files changed, 73
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_device.c | 6 ++---
tools/libxl/libxl_disk.c | 5 +++--
tools/libxl/libxl_internal.h | 52 +++-
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_console.c | 79
tools/libxl/libxl_create.c | 5 +--
tools/libxl/libxl_dm.c | 3 +-
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/Makefile | 2 +-
tools/libxl/libxl.h | 24 +++
tools/libxl/libxl_create.c | 1 +
tools/libxl/libxl_internal.h
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
docs/man/xl.cfg.pod.5.in | 49
docs/man/xl.pod.1.in | 42 +
2 files changed, 91
From: Oleksandr Grytsov
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl_console.c | 74
tools/libxl/libxl_create.c | 3 +-
tools/libxl/libxl_dm.c | 3 +-
This hypercall is unused by guests these days, but there was no prevention of
usable subops. The following ops have been restricted, as there is no
suitable structure in the evntchn_op union.
EVTCHNOP_reset
EVTCHNOP_init_control
EVTCHNOP_expand_array
EVTCHNOP_set_priority
Signed-off-by:
Hi Julien,
After our discussion during the summit, I have revised my plan, but
I'm still working on it and haven't sent it to the ML yet.
I'm planning to send a new version of my proposal together with the
parsing code later so that I could reference the
proposal in the commit message.
But here
Hi,
I am using R-Car H3 hardware. ie. R-Car H3 Salvator-X. I am running Xen with Poky linux as Dom0 and DomU. Would i be able to run Xen with the same setup on R-Car H3 Starter Kit?
What all should i look in a Hardware to run XEN in it?
regards,
Ajeesh
On 7/18/2017 7:03 AM, Thomas Gleixner wrote:
On Mon, 17 Jul 2017, Tom Lendacky wrote:
This patch series provides support for AMD's new Secure Memory Encryption (SME)
feature.
SME can be used to mark individual pages of memory as encrypted through the
page tables. A page of memory that is
On 18/07/2017, 14:53, "Wei Liu" wrote:
>On Tue, Jul 18, 2017 at 12:21:42PM +0100, Lars Kurth wrote:
>> Wei,
>> I attached the list output from xsa-list-send starting from 206
>> If you look at
>>
>>https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-4
On Tue, Jul 18, 2017 at 01:45:45PM +0100, Julien Grall wrote:
> Hi Wei,
>
> Thank you for writing down the document :).
>
> On 17/07/17 16:09, Wei Liu wrote:
> > It is agreed during the summit we should write down such document. Here
> > is my attempt of doing so.
> >
> > We should probably
On Tue, Jul 18, 2017 at 12:21:42PM +0100, Lars Kurth wrote:
> Wei,
> I attached the list output from xsa-list-send starting from 206
> If you look at
> https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-481
> .html, you may want to start using from 213+
[$]> ./match-xsa
On Fri, Jul 07, 2017 at 10:00:01AM -0400, Konrad Rzeszutek Wilk wrote:
> >
> > 1. PV PCI passthrough is done via pciback, which means the physical
> >device is assigned to the driver domain. All events to / from the
> >guest / device are handled by the driver domain -- which includes
> >
On Wed, Jul 12, 2017 at 07:13:34PM +0300, Oleksandr Grytsov wrote:
> On Tue, Jul 4, 2017 at 12:41 PM, Oleksandr Grytsov wrote:
> >>> >> > > I don't see exiting device ported to the new framework, why?
> >>> >> >
> >>> >> > Good question. I think it is a little dangerous and may
On Mon, Jul 17, 2017 at 06:36:52PM +0530, Bhupinder Thakur wrote:
> This patch finally adds the support for vuart console. It adds
> two new fields in the console initialization:
>
> - optional
> - prefer_gnttab
>
> optional flag tells whether the console is optional.
>
> prefer_gnttab tells
On Mon, Jul 17, 2017 at 06:36:51PM +0530, Bhupinder Thakur wrote:
> This patch adds the support for multiple consoles and introduces the iterator
> functions to operate on multiple consoles.
>
> This patch is in preparation to support a new vuart console.
>
> Signed-off-by: Bhupinder Thakur
On 30/06/17 16:15, Julien Grall wrote:
Now, looking at the documentation for ISS for SMC32 trap (D7-2271 and
G6-4957 in ARM DDI 0487B.a), compare to other conditional instruction
the ISS has an extra field CCKNOWNPASS (bit 19) to tell you whether CV
and COND are valid.
But on ARMv7, the ISS
On Mon, Jul 17, 2017 at 06:36:50PM +0530, Bhupinder Thakur wrote:
> This patch introduces a console_close_evtchn console_cleanup function. This
> function
> closes the console event channel.
>
> Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
On Mon, Jul 17, 2017 at 06:36:48PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_cleanup function. This function
> frees up the console resources.
>
> Signed-off-by: Bhupinder Thakur
> ---
> CC: Ian Jackson
> CC: Wei
On Mon, Jul 17, 2017 at 06:36:47PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new handle_console_tty function. This function
> performs read/write from/to console tty.
>
> Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
This run is configured for baseline tests only.
flight 71701 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71701/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5fc3889bb3c64f8cd81d7d387f829f146a1998fd
baseline
On Mon, Jul 17, 2017 at 06:36:46PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new handle_console_ring function. This function
> reads the data from the ring buffer on receiving an event.
>
> Signed-off-by: Bhupinder Thakur
> ---
> CC: Ian Jackson
Hi Wei,
Thank you for writing down the document :).
On 17/07/17 16:09, Wei Liu wrote:
It is agreed during the summit we should write down such document. Here
is my attempt of doing so.
We should probably commit something like this into xen.git so that it
gets updated regularly.
Comments are
flight 111978 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111978/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13
flight 111957 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111957/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-rumprun-amd64 17 rumprun-demo-xenstorels/xenstorels.repeat
fail in 111912 pass in 111957
The function p2m_mem_access_check_and_get_page in mem_access.c
translates a gva to an ipa by means of the hardware functionality of the
ARM architecture. This is implemented in the function gva_to_ipa. If
mem_access is active, hardware-based gva to ipa translation might fail,
as gva_to_ipa uses
This commit adds functionality to walk the guest's page tables using the
long-descriptor translation table format for both ARMv7 and ARMv8.
Similar to the hardware architecture, the implementation supports
different page granularities (4K, 16K, and 64K). The implementation is
based on ARM DDI
This commit renames the function vgic_access_guest_memory to
access_guest_memory_by_ipa. As the function name suggests, the functions
expects an IPA as argument. All invocations of this function have been
adapted accordingly. Apart from that, we have adjusted all printk
messages for cleanup and to
This commit moves the function vgic_access_guest_memory to guestcopy.c
and the header asm/guest_access.h. No functional changes are made.
Please note that the function will be renamed in the following commit.
Signed-off-by: Sergej Proskurin
Acked-by: Julien Grall
Hi all,
The function p2m_mem_access_check_and_get_page is called from the function
get_page_from_gva if mem_access is active and the hardware-aided translation of
the given guest virtual address (gva) into machine address fails. That is, if
the stage-2 translation tables constrain access to the
This commit introduces a new helper that checks whether the target PTE
holds a page mapping or not. This helper will be used as part of the
following commits.
Signed-off-by: Sergej Proskurin
Reviewed-by: Julien Grall
---
Cc: Stefano Stabellini
The current implementation of GENMASK is capable of creating bitmasks of
32-bit values on AArch32 and 64-bit values on AArch64. As we need to
create masks for 64-bit values on AArch32 as well, in this commit we
introduce the GENMASK_ULL bit operation. Please note that the
GENMASK_ULL
This commit adds functionality to walk the guest's page tables using the
short-descriptor translation table format for both ARMv7 and ARMv8. The
implementation is based on ARM DDI 0487B-a J1-6002 and ARM DDI 0406C-b
B3-1506.
Signed-off-by: Sergej Proskurin
Acked-by:
The following commits introduce a software guest page table walk
software implementation that supports varying guest page size
granularities. This commit moves already existing
PAGE_(SHIFT|SIZE|MASK|ALIGN)_(4K|64K) and introduces corresponding
defines for 16K page granularity to a common place in
This commit adds (TCR_|TTBCR_)* defines to simplify access to the
respective register contents. At the same time, we adjust the macros
TCR_T0SZ and TCR_TG0_* by using the newly introduced TCR_T0SZ_SHIFT and
TCR_TG0_SHIFT instead of the hardcoded values.
Signed-off-by: Sergej Proskurin
In this commit, we make use of the gpt walk functionality introduced in
the previous commits. If mem_access is active, hardware-based gva to ipa
translation might fail, as gva_to_ipa uses the guest's translation
tables, access to which might be restricted by the active VTTBR. To
side-step
We introduce the BIT_ULL macro to using values of unsigned long long as
to enable setting bits of 64-bit registers on AArch32. In addition,
this commit adds a define holding the register width of 64 bit
double-word registers. This define simplifies using the associated
constants in the following
We extend the current implementation by an additional permission,
GV2M_EXEC, which will be used to describe execute permissions of PTE's
as part of our guest translation table walk implementation.
Signed-off-by: Sergej Proskurin
Acked-by: Julien Grall
The current implementation does not provide appropriate types for
short-descriptor translation table entries. As such, this commit adds new
types, which simplify managing the respective translation table entries.
Signed-off-by: Sergej Proskurin
Acked-by: Julien Grall
AArch64 supports pages with different (4K, 16K, and 64K) sizes. To
enable guest page table walks for various configurations, this commit
extends the defines and helpers of the current implementation.
Signed-off-by: Sergej Proskurin
Reviewed-by: Julien Grall
On 17/07/2017, 16:09, "Wei Liu" wrote:
>It is agreed during the summit we should write down such document. Here
>is my attempt of doing so.
>
>We should probably commit something like this into xen.git so that it
>gets updated regularly.
>
>Comments are welcome.
Just to
On 07/18/2017 02:12 PM, Julien Grall wrote:
>
>
> On 18/07/17 12:59, Sergej Proskurin wrote:
>> Hi Julien,
>>
>>
>> On 07/18/2017 12:43 PM, Julien Grall wrote:
>>>
>>>
>>> On 18/07/17 10:49, Sergej Proskurin wrote:
Hi Julien,
>>>
>>> Hello Sergej,
>>>
On 07/17/2017 05:38 PM, Julien
Hi all,
these are my notes from http://sched.co/AjES
These are a little crude and I may have missed some things or misrepresented
ACTIONS for
* Wei Liu
* Julien Grall
* Lars Kurth
* Ian Jackson
Feel free to correct
Lars
Releases Lessons learned
Process issues in 4.9.0
On 18/07/17 12:59, Sergej Proskurin wrote:
Hi Julien,
On 07/18/2017 12:43 PM, Julien Grall wrote:
On 18/07/17 10:49, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 07/17/2017 05:38 PM, Julien Grall wrote:
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
This commit
Hi,
On 20/06/17 18:18, Zhongze Liu wrote:
1. Motivation and Description
Virtual machines use grant table hypercalls to setup a share page for
inter-VMs communications. These hypercalls are
On Mon, 17 Jul 2017, Tom Lendacky wrote:
> This patch series provides support for AMD's new Secure Memory Encryption
> (SME)
> feature.
>
> SME can be used to mark individual pages of memory as encrypted through the
> page tables. A page of memory that is marked encrypted will be automatically
>
Hi Julien,
On 07/18/2017 12:43 PM, Julien Grall wrote:
>
>
> On 18/07/17 10:49, Sergej Proskurin wrote:
>> Hi Julien,
>
> Hello Sergej,
>
>>
>> On 07/17/2017 05:38 PM, Julien Grall wrote:
>>> Hi Sergej,
>>>
>>> On 06/07/17 12:50, Sergej Proskurin wrote:
This commit moves the function
Wei Liu writes ("A document for Xen release management"):
> When you think all pending issues are fixed and Xen is ready to be released
> from the last RC:
Mostly LGTM. Thanks!
[Items numbered in quoted text so I can refer to them.]
> 1. Send out commit moratorium emails to committers@.
>
>
On Mon, Jul 17, 2017 at 06:36:45PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_evtchn_unmask function. This function
> unmasks the console event channel if it is masked for some timeout
> period.
>
> Signed-off-by: Bhupinder Thakur
> ---
>
On Mon, Jul 17, 2017 at 06:36:43PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new add_console_evtchn_fd function. This
> function adds the console event channel FD to list of polled FDs.
>
> Signed-off-by: Bhupinder Thakur
> ---
> CC: Ian Jackson
On Mon, Jul 17, 2017 at 06:36:44PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new add_console_tty_fd function. This function
> adds the tty fd to the list of polled fds.
>
> Signed-off-by: Bhupinder Thakur
> ---
> CC: Ian Jackson
flight 71699 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71699/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-amd64-daily-netboot-pygrub 11 guest-start fail REGR. vs. 71679
On Mon, Jul 17, 2017 at 06:19:09PM +0200, Sergej Proskurin wrote:
> Hi Julien,
>
>
> On 07/17/2017 03:53 PM, Julien Grall wrote:
> > (+Wei and Ian)
> >
> > Hi Sergej
> >
> > On 17/07/17 13:04, Sergej Proskurin wrote:
> >> Hi all,
> >>
> >> My setup comprises an ARMv7 (Arndale, Linux kernel
From: Vijaya Kumar K
CONFIG_NUMA is defined in xen/drivers/acpi/Kconfig.
Move to common/Kconfig and enabled by default.
Also, NUMA feature uses PDX for physical address to
memory node mapping. Hence make HAS_PDX dependent
for NUMA.
Signed-off-by: Vijaya Kumar K
From: Vijaya Kumar K
Parse distance-matrix and fetch node distance information.
Store distance information in node_distance[].
Register dt_node_distance() function pointer with
the ARM numa code. This approach can be later used for
ACPI.
Signed-off-by: Vijaya Kumar K
From: Vijaya Kumar K
Add CONFIG_ACPI_NUMA to xen/drivers/acpi/Kconfig and
drop CONFIG_ACPI_NUMA set in asm-x86/config.h.
Signed-off-by: Vijaya Kumar K
---
xen/drivers/acpi/Kconfig | 4
xen/include/asm-x86/config.h | 1 -
2 files
From: Vijaya Kumar K
Parse CPU node and fetch numa-node-id information.
For each node-id found, update nodemask_t mask.
Refer to Documentation/devicetree/bindings/numa.txt
in linux kernel.
Signed-off-by: Vijaya Kumar K
---
v3: - Parse cpu nodes
From: Vijaya Kumar K
Move code from xen/arch/x86/srat.c to xen/common/numa.c
so that it can be used by other archs.
Apart from moving the code the following changes are done
- Coding style of code moved to numa.c is changed to xen style
-
From: Vijaya Kumar K
Implement arch_sanitize_nodes_memory() which looks at all banks
in bootinfo.mem, update nodes[] with corresponding nodeid.
Call numa_scan_nodes() generic function with ram start and
end address, which takes care of further computing memnodeshift
and
From: Vijaya Kumar K
Register SRAT entry handler for type
ACPI_SRAT_TYPE_GICC_AFFINITY to parse SRAT table
and extract proximity for all CPU IDs.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/acpi/boot.c | 2 +
From: Vijaya Kumar K
SRAT's X2APIC_CPU_AFFINITY and CPU_AFFINITY types are not used
by ARM. Hence move handling of this SRAT types to arch specific
file and handle them under arch_table_parse_srat().
Signed-off-by: Vijaya Kumar K
---
From: Vijaya Kumar K
Call ACPI NUMA initialization under CONFIG_ACPI_NUMA.
Signed-off-by: Vijaya Kumar
---
xen/arch/arm/numa/acpi_numa.c | 27 ++-
xen/arch/arm/numa/numa.c | 15 +--
xen/common/numa.c
From: Vijaya Kumar K
Parse MADT table and extract MPIDR for all
CPU IDs in MADT ACPI_MADT_TYPE_GENERIC_INTERRUPT entries
and store in cpuid_to_hwid_map[]
This mapping is used by SRAT table parsing to extract MPIDR
of the CPU ID.
MADT table is also parsed in
From: Vijaya Kumar K
For each cpu, update cpu_to_node[] with node id from
the numa-node-id DT property. Also, initialize cpu_to_node[]
with node 0.
Add macros to access cpu_to_node[] information.
Signed-off-by: Vijaya Kumar K
---
v3: - Dropped
From: Vijaya Kumar K
Delete numa-node-id and distance map from DOM0 DT
so that NUMA information is not exposed to DOM0.
This helps particularly to boot Node 1 devices
as if booting on Node0.
However this approach has limitation where memory allocation
for the devices
From: Vijaya Kumar K
Introduce new api device_tree_type_matches() to check for
device type. Also export device_tree_get_u32() and
device_tree_node_compatible()
These functions are later used for parsing NUMA information.
Signed-off-by: Vijaya Kumar K
From: Vijaya Kumar K
Parse memory node and fetch numa-node-id information.
For each memory range, store in node_memblk_range[]
along with node id.
When booting in UEFI mode, UEFI passes memory information
to Dom0 using EFI memory descriptor table and deletes the
memory
From: Vijaya Kumar K
Right now CONFIG_NUMA is not enabled for ARM and
existing code in asm-arm/numa.h is for !CONFIG_NUMA.
Hence put this code under #ifndef CONFIG_NUMA.
This help to make this changes work when CONFIG_NUMA
is not enabled. Though CONFIG_NUMA is enabled
From: Vijaya Kumar K
Move SRAT handling code which is common across
architectures is moved to new file xen/drivers/acpi/srat.c
from xen/arch/x86/srat.c file. New header file srat.h is
introduced.
Other major changes are:
- Coding style of code moved is changed.
- Moved
From: Vijaya Kumar K
Introduce NR_NODES config option to specify number
of NUMA nodes supported. By default value is set at
64 for x86 and 8 for arm. Dropped NODES_SHIFT macro.
Also move NR_NODE_MEMBLKS from asm-x86/acpi.h to xen/numa.h
Signed-off-by: Vijaya Kumar K
From: Vijaya Kumar K
With this RFC patch series, NUMA support is added for ARM platform.
Both DT and ACPI based NUMA support is added.
Only Xen is made aware of NUMA platform. NUMA awareness to DOM0 is not
added.
As part of this series, the code under x86 architecture
From: Vijaya Kumar K
The common code allows numa initialization only when
ACPI_NUMA config is enabled. Allow initialization when
NUMA config is enabled for DT.
In this patch, along with acpi_numa, check for acpi_disabled
is added.
Signed-off-by: Vijaya Kumar K
From: Vijaya Kumar K
Change u{8,32,64} to uint{8,32,64}_t, u64 to paddr_t
wherever applicable.
Fix attributes coding styles.
Also changed
- Some variables from int to unsigned int
- Used pfn_to_paddr/paddr_to_pfn whereever required.
- Alloc memnodemap[] of size
From: Vijaya Kumar K
memnode_shift variable is changed from int to unsigned int.
With this change, compute_memnode_shift() returns error value
instead of returning shift value. The memnode_shift is updated inside
compute_memnode_shift().
Also, following changes are made
From: Vijaya Kumar K
Add accessors for nodes[] and other static variables and
use those accessors. These variables are later accessed
outside the file when the code made generic in later
patches. However the coding style is not changed.
Signed-off-by: Vijaya Kumar K
From: Vijaya Kumar K
Move code from xen/arch/x86/numa.c to xen/common/numa.c
so that it can be used by other archs.
The following changes are done:
- Few generic static functions in x86/numa.c is made
non-static common/numa.c
- The generic contents of header file
From: Vijaya Kumar K
Fix coding style, trailing spaces, tabs in NUMA code.
Also drop unused macros and functions.
There is no functional change.
Signed-off-by: Vijaya Kumar K
Reviewed-by: Wei Liu
---
v3: - Change commit
From: Vijaya Kumar K
Rename some function in ACPI code as follow
- Rename setup_node to acpi_setup_node
- Rename bad_srat to numa_failed
- Rename nodes_cover_memory to arch_sanitize_nodes_memory
and changed return type to bool
- Rename acpi_scan_nodes to
On Mon, Jul 17, 2017 at 06:36:42PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new buffer_available function to check if
> more data is allowed to be buffered.
>
> Signed-off-by: Bhupinder Thakur
Acked-by: Wei Liu
On Mon, Jul 17, 2017 at 06:36:41PM +0530, Bhupinder Thakur wrote:
> This patch introduces a new console_init function. This function
> initializes the console structure.
>
> Signed-off-by: Bhupinder Thakur
I don't think this patch compiles, because ...
> ---
> CC:
I added Jan because I think we should probably add a section for point
releases, which I assume would be a subset of the steps in this document
Lars
I will post the notes of the design session also. I am doing the ones
first that I moderated and where I took notes in handwriting and/or photos
of
CC x86 maintainers
On Tue, Jul 18, 2017 at 12:19:19PM +0100, Julien Grall wrote:
> >
> > ("arch_arm", Struct(None, [("gic_version", libxl_gic_version),
> > + ("vuart", libxl_vuart_type),
>
> ... here it is ARM specific. I am not convinced that we should tie
On Tue, Jul 18, 2017 at 04:43:53PM +0530, ajmalmalib4u wrote:
>Hi,
>
>I am trying to learn how Passthrough works in xen. As an initial step I
>have tried to do PCI passthrough in my PC with Ubuntu 16.04 LTS (Xenial
>Xerus) as Dom0 and DomU. For that I had to rebuild the kernel
Wei,
I attached the list output from xsa-list-send starting from 206
If you look at
https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-481
.html, you may want to start using from 213+
Lars
On 17/07/2017, 12:40, "Wei Liu" wrote:
>On Mon, Jul 17, 2017 at
101 - 200 of 260 matches
Mail list logo