-off-by: Juergen Gross
---
xen/common/memory.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/xen/common/memory.c b/xen/common/memory.c
index b2066db07e..87a33c0e62 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -55,7 +55,7 @@ static unsigned int __read_mostly
Modify the custom parameter parsing routines in:
xen/common/kexec.c
to indicate whether the parameter value was parsed successfully.
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/common/kexec.c | 30 ++
1 file changed, 26 insertions(+), 4 deletions
Add a new libxc function to set hypervisor parameters at runtime
similar to boot time parameters via command line.
Cc: Ian Jackson
Cc: Wei Liu
Signed-off-by: Juergen Gross
---
tools/libxc/include/xenctrl.h | 1 +
tools/libxc/xc_misc.c | 20
2 files changed, 21
Modify the custom parameter parsing routines in:
xen/arch/x86/oprofile/nmi_int.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/oprofile/nmi_int.c | 2 ++
1 file changed, 2 insertions(+)
diff
Modify the custom parameter parsing routines in:
xen/arch/x86/hvm/viridian.c
to indicate whether the parameter value was parsed successfully.
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/hvm/viridian.c | 5 +++--
1 file changed, 3
Modify the custom parameter parsing routines in:
xen/arch/x86/genapic/probe.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/genapic/probe.c | 8 ++--
1 file changed, 6 insertions(+), 2
With _cmdline_parse() now issuing error messages in case of illegal
parameters signalled by parsing functions specified in custom_param()
the message issued by apic_set_verbosity() can be removed.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/apic.c | 5
Modify the custom parameter parsing routines in:
xen/arch/x86/nmi.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/nmi.c | 20 ++--
1 file changed, 14 insertions(+), 6 deletions
Modify the custom parameter parsing routines in:
xen/arch/arm/traps.c
to indicate whether the parameter value was parsed successfully.
Cc: Stefano Stabellini
Cc: Julien Grall
Signed-off-by: Juergen Gross
---
xen/arch/arm/traps.c | 8 +---
1 file changed, 5 insertions(+), 3 deletions
With _cmdline_parse() now issuing error messages in case of illegal
parameters signalled by parsing functions specified in custom_param()
the message issued by mce_set_verbosity() can be removed.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/cpu/mcheck/mce.c
Modify the custom parameter parsing routines in:
xen/arch/x86/hvm/vmx/vmcs.c
to indicate whether the parameter value was parsed successfully.
Cc: Jun Nakajima
Cc: Kevin Tian
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/hvm/vmx/vmcs.c | 7 ++-
1 file
Modify the custom parameter parsing routines in:
xen/arch/arm/acpi/boot.c
to indicate whether the parameter value was parsed successfully.
Cc: Stefano Stabellini
Cc: Julien Grall
Signed-off-by: Juergen Gross
---
xen/arch/arm/acpi/boot.c | 8 ++--
1 file changed, 6 insertions(+), 2
Signed-off-by: Juergen Gross
---
xen/drivers/video/vesa.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/video/vesa.c b/xen/drivers/video/vesa.c
index 09d344c021..c92497e0bc 100644
--- a/xen/drivers/video/vesa.c
+++ b/xen/drivers/video/vesa.c
@@ -29,12 +29,14
Modify the custom parameter parsing routines in:
xen/arch/x86/mm.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/mm.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a
Modify the custom parameter parsing routines in:
xen/xsm/flask/flask_op.c
to indicate whether the parameter value was parsed successfully.
Cc: Daniel De Graaf
Signed-off-by: Juergen Gross
---
xen/xsm/flask/flask_op.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a
Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
Signed-off-by: Juergen Gross
---
xen/common/kernel.c | 27 ---
1 file changed, 20 insertions(+), 7 deletions(-)
diff --git a/xen/common/kernel.c b/xen/common/kernel.c
index 3fd3abe79c..0d63685c4f 100644
--- a/xen
Modify the custom parameter parsing routines in:
xen/arch/x86/cpu/vpmu.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/cpu/vpmu.c | 7 ---
1 file changed, 4 insertions(+), 3 deletions
Modify the custom parameter parsing routines in:
xen/arch/x86/dom0_build.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/dom0_build.c | 19 +++
1 file changed, 15 insertions
Modify the custom parameter parsing routines in:
xen/arch/x86/irq.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/irq.c | 9 +++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff
Modify the custom parameter parsing routines in:
xen/arch/x86/io_apic.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/io_apic.c | 7 ++-
1 file changed, 6 insertions(+), 1 deletion
Add a new xl command "set-parameters" to set hypervisor parameters at
runtime similar to boot time parameters via command line.
Cc: Ian Jackson
Cc: Wei Liu
Signed-off-by: Juergen Gross
---
docs/man/xl.pod.1.in | 5 +
tools/xl/xl.h | 1 +
tools/xl/xl_cmdta
-off-by: Juergen Gross
---
xen/common/domain.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/xen/common/domain.c b/xen/common/domain.c
index b22aacc57e..29a652268f 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -245,12 +245,14 @@ static int late_hwdom_init
Modify the custom parameter parsing routines in:
xen/drivers/passthrough/iommu.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Signed-off-by: Juergen Gross
---
xen/drivers/passthrough/iommu.c | 15 ++-
1 file changed, 10 insertions(+), 5
Modify the custom parameter parsing routines in:
xen/arch/x86/apic.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Cc: Andrew Cooper
Signed-off-by: Juergen Gross
---
xen/arch/x86/apic.c | 11 ---
1 file changed, 8 insertions(+), 3 deletions
Modify the custom parameter parsing routines in:
xen/drivers/cpufreq/cpufreq.c
to indicate whether the parameter value was parsed successfully.
Cc: Jan Beulich
Signed-off-by: Juergen Gross
---
xen/drivers/cpufreq/cpufreq.c | 18 +-
xen/include/acpi/cpufreq/cpufreq.h | 2
Modify the custom parameter parsing routines in:
xen/arch/arm/domain_build.c
to indicate whether the parameter value was parsed successfully.
Cc: Stefano Stabellini
Cc: Julien Grall
Signed-off-by: Juergen Gross
---
xen/arch/arm/domain_build.c | 4 +++-
1 file changed, 3 insertions(+), 1
On 08/08/17 16:26, Asharaf Perinchikkal wrote:
> Hi All,
>
> I am attaching xen boot log when xen fail to boot with updated kernel
> from UEFI shell.
> It show an error when kernel start booting..
>
> N) ***
> (XEN) WARNING: CONSOLE OUTPUT IS SYNCHR
On 07/08/17 22:56, Boris Ostrovsky wrote:
>
>> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
>> index 811e4ddb3f37..a3dcd83187ce 100644
>> --- a/arch/x86/xen/enlighten_pv.c
>> +++ b/arch/x86/xen/enlighten_pv.c
>> @@ -579,6 +579,71 @@ static void xen_write_ldt_entry(struct
On 28/07/17 12:23, Juergen Gross wrote:
> This patch series fixes a regression introduced in 4.13-rc1: A Xen
> HVM guest with KASLR enabled wouldn't boot any longer due to the usage
> of __va() before kernel_randomize_memory() was called.
>
> Changes in V2:
> - patch 1: t
On 04/08/17 15:57, Andrew Cooper wrote:
> On 04/08/17 14:36, Juergen Gross wrote:
>> On 04/08/17 15:23, Andrew Cooper wrote:
>>> On 04/08/17 14:20, Juergen Gross wrote:
>>>> Last year Jan posted a patch series to change hypervisor log level
>>>> thresh
On 04/08/17 15:47, Wei Liu wrote:
> On Fri, Aug 04, 2017 at 03:20:09PM +0200, Juergen Gross wrote:
>> Last year Jan posted a patch series to change hypervisor log level
>> thresholds via xl command [1]. This approach was later modified by Wei
>> resulting in patch series [
On 04/08/17 15:21, Wei Liu wrote:
> On Fri, Aug 04, 2017 at 03:02:03PM +0200, Marek Marczykowski-Górecki wrote:
>> On Fri, Aug 04, 2017 at 01:26:21PM +0100, Wei Liu wrote:
>>> On Wed, Aug 02, 2017 at 10:59:49AM +0100, Paul Durrant wrote:
A previous patch added support for priv-mapping guest re
On 04/08/17 15:23, Andrew Cooper wrote:
> On 04/08/17 14:20, Juergen Gross wrote:
>> Last year Jan posted a patch series to change hypervisor log level
>> thresholds via xl command [1]. This approach was later modified by Wei
>> resulting in patch series [2].
>>
&g
Last year Jan posted a patch series to change hypervisor log level
thresholds via xl command [1]. This approach was later modified by Wei
resulting in patch series [2].
I'd like to follow up with another approach being able to do the same,
but being much more flexible:
Instead of controlling only
The function xen_set_domain_pte() is used nowhere in the kernel.
Remove it.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/xen/page.h | 2 --
arch/x86/xen/mmu_pv.c | 20
include/trace/events/xen.h | 18 --
3 files changed, 40 deletions
Remove the last tests for XENFEAT_auto_translated_physmap in pure
PV-domain specific paths. PVH V1 is gone and the feature will always
be "false" in PV guests.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/xen/page.h | 3 ---
arch/x86/xen/p2m.c
There are some Xen specific trace functions defined in
include/trace/events/xen.h. Remove them.
Signed-off-by: Juergen Gross
---
include/trace/events/xen.h | 20
1 file changed, 20 deletions(-)
diff --git a/include/trace/events/xen.h b/include/trace/events/xen.h
index
Remove stuff no longer needed.
Juergen Gross (3):
xen: remove tests for pvh mode in pure pv paths
xen: remove unused function xen_set_domain_pte()
xen: remove not used trace functions
arch/x86/include/asm/xen/page.h | 5 -
arch/x86/xen/mmu_pv.c | 20
use the exception entry with prepended instructions,
otherwise use the entry without the Xen specific code.
Signed-off-by: Juergen Gross
---
arch/x86/entry/entry_64.S | 23 ++--
arch/x86/entry/entry_64_compat.S | 1 -
arch/x86/include/asm/paravirt.h | 5 --
arch/x86
On 02/08/17 01:52, Andy Lutomirski wrote:
> On Tue, Aug 1, 2017 at 4:38 PM, Andrew Cooper
> wrote:
>> On 01/08/2017 20:45, Andy Lutomirski wrote:
>>> Also, IMO it would be nice to fully finish the job. Remaining steps are:
>>>
>>> 1. Unsuck the SYSCALL entries on Xen PV.
>>> 2. Unsuck the SYENTE
On 03/08/17 00:43, Boris Ostrovsky wrote:
> On 08/02/2017 08:01 AM, Juergen Gross wrote:
>> On 01/08/17 16:28, PGNet Dev wrote:
>>> On 7/28/17 9:02 AM, PGNet Dev wrote:
>>>> On 7/27/17 11:23 PM, Juergen Gross wrote:
>>>>> Can you please post the d
for some functionality,
but please don't expect anyone to just do the work for you. Yes, it is
sometimes hard to find the information you are searching for, but that's
the way we all learned about the internals of Xen.
Juergen
>
> Thanks
> Amna
> _____
e minimal experience in Linux driver.
>
> Regards
> Ajmal
>
>
> On 03-Aug-2017 2:48 PM, "Ajmal M Ali" <mailto:ajeesh...@gmail.com>> wrote:
>
>
> On 21-Jul-2017 2:17 PM, "Pasi Kärkkäinen" <mailto:pa...@iki.fi>> wrote:
>
On 03/08/17 09:59, Waseem, Amna wrote:
> Thanks a lot.
>
> I assume I will use manual_node to add nodes before starting xenstore daemon
> completely.
>
> If I understand, manual_node just adds nodes and children. It doesnot add
> values.
Be careful here: manual_node() right now even can add on
On 01/08/17 16:28, PGNet Dev wrote:
> On 7/28/17 9:02 AM, PGNet Dev wrote:
>> On 7/27/17 11:23 PM, Juergen Gross wrote:
>>> Can you please post the domain's config file used to create the domain
>>> and the kernel config?
>>
>> Sure.
>>
>>
On 31/07/17 13:22, Wei Liu wrote:
> A document for the release manager.
>
> Signed-off-by: Wei Liu
With two minor corrections (see below):
Reviewed-by: Juergen Gross
> ---
> docs/process/xen-release-management.pandoc | 594
> +
> 1 file ch
On 01/08/17 21:45, Andy Lutomirski wrote:
> On Tue, Aug 1, 2017 at 3:39 AM, Juergen Gross wrote:
>> When running as Xen pv-guest the exception frame on the stack contains
>> %r11 and %rcx additional to the other data pushed by the processor.
>>
>> Instead of having a p
On 02/08/17 12:12, Waseem, Amna wrote:
> Hello All,
>
> Can anyone tell me how xenstore filesystem gets populated about information
> about Dom0.
see tools/helpers/xen-init-dom0.c
> Which function or script creates node for local domain?
see tools/libxl/ (various source files)
> I want to sta
On 01/08/17 17:23, Boris Ostrovsky wrote:
> On 07/31/2017 06:34 PM, Stefano Stabellini wrote:
>> On Thu, 27 Jul 2017, Boris Ostrovsky wrote:
+int pvcalls_front_release(struct socket *sock)
+{
+ struct pvcalls_bedata *bedata;
+ struct sock_mapping *map;
+ int req_id, noti
use the exception entry with prepended instructions,
otherwise use the entry without the Xen specific code.
Signed-off-by: Juergen Gross
---
arch/x86/entry/entry_64.S | 22 ++
arch/x86/entry/entry_64_compat.S | 1 -
arch/x86/include/asm/desc.h | 16
On 28/07/17 17:14, Boris Ostrovsky wrote:
> On 07/28/2017 10:53 AM, Juergen Gross wrote:
>> When starting the xenwatch thread a theoretical deadlock situation is
>> possible:
>>
>> xs_init() contains:
>>
>> task = kthread_run(xenwatch_thread, NU
iring before xenwatch_pid could be set and the
callback of that watch unregisters a watch, then a self-deadlock would
occur.
Avoid this by setting xenwatch_pid in xenwatch_thread().
Signed-off-by: Juergen Gross
---
drivers/xen/xenbus/xenbus_xs.c | 3 ++-
1 file changed, 2 insertions(+), 1 del
/xen-selfballoon.c| 4 ++--
drivers/xen/xenfs/super.c| 1 -
3 files changed, 5 insertions(+), 13 deletions(-)
Gustavo A. R. Silva (1):
xen: selfballoon: remove unnecessary static in frontswap_selfshrink()
Juergen Gross (1):
xen: dont fiddle with event channel masking in
Provide a hook in hypervisor_x86 called after setting up initial
memory mapping.
This is needed e.g. by Xen HVM guests to map the hypervisor shared
info page.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/hypervisor.h | 10 ++
arch/x86/mm/init.c| 3 +++
2 files
This patch series fixes a regression introduced in 4.13-rc1: A Xen
HVM guest with KASLR enabled wouldn't boot any longer due to the usage
of __va() before kernel_randomize_memory() was called.
Changes in V2:
- patch 1: test for x86_hyper being not NULL
Juergen Gross (3):
x86: provi
Instead of calling xen_hvm_init_shared_info() on boot and resume split
it up into a boot time function searching for the pfn to use and a
mapping function doing the hypervisor mapping call.
Signed-off-by: Juergen Gross
---
arch/x86/xen/enlighten_hvm.c | 45
x this use early_memremap() to get a temporary virtual
address for shared info until va() can be used safely.
Signed-off-by: Juergen Gross
---
arch/x86/xen/enlighten_hvm.c | 16 ++--
1 file changed, 14 insertions(+), 2 deletions(-)
diff --git a/arch/x86/xen/enlighten_hvm.c b/arch/x86/xen/enlig
s message does not
> provide useful information. Drop this message.
>
> Signed-off-by: Punit Agrawal
> Cc: Boris Ostrovsky
> Cc: Juergen Gross
Committed to: xen/tip.git for-linus-4.13b
Thanks,
Juergen
___
Xen-devel mailing l
On 04/07/17 20:34, Gustavo A. R. Silva wrote:
> Remove unnecessary static on local variables last_frontswap_pages and
> tgt_frontswap_pages. Such variables are initialized before being used,
> on every execution path throughout the function. The statics have no
> benefit and, removing them reduce t
On 27/07/17 20:20, PGNet Dev wrote:
> I've upgraded a Xen server's
>
> xen-4.9.0_08-517.2.x86_64
> xen-libs-4.9.0_08-517.2.x86_64
>
> kernel from 4.12x to 4.13x
>
> uname -rm
> 4.13.0-rc2-2.gb545b87-default x86_64
>
> After upgrading, I see in my Dom0-attached se
On 27/07/17 17:41, Boris Ostrovsky wrote:
> On 07/27/2017 11:31 AM, Juergen Gross wrote:
>> On 27/06/17 19:21, Venu Busireddy wrote:
>>> This patch set is part of a set of patchs that together allow containment
>>> of unrecoverable AER errors from PCIe devices assigned t
On 27/07/17 17:37, Boris Ostrovsky wrote:
> On 07/27/2017 11:11 AM, Juergen Gross wrote:
>> The macros for testing domain types are more complicated then they
>> need to. Simplify them.
>>
>> Signed-off-by: Juergen Gross
>> ---
>> include/xen/xen.h | 20 +++
passthrough mode, BIOS's bring down the server,
> thus bringing down the entire hypervisor. For this patch set to work,
> the AER error handling needs to be delegated to the host operating system.
>
> Signed-off-by: Venu Busireddy
> Signed-off-by: Elena Ufimtseva
Reviewed-by: Ju
The macros for testing domain types are more complicated then they
need to. Simplify them.
Signed-off-by: Juergen Gross
---
include/xen/xen.h | 20 +---
1 file changed, 9 insertions(+), 11 deletions(-)
diff --git a/include/xen/xen.h b/include/xen/xen.h
index 6e8b7fc79801
On 26/07/17 19:57, Andy Lutomirski wrote:
>
>
>> On Jul 26, 2017, at 11:50 AM, Juergen Gross wrote:
>>
>>> On 26/07/17 15:48, Andy Lutomirski wrote:
>>>> On Mon, Jul 24, 2017 at 7:28 AM, Juergen Gross wrote:
>>>> When running as Xen pv-guest
On 26/07/17 15:48, Andy Lutomirski wrote:
> On Mon, Jul 24, 2017 at 7:28 AM, Juergen Gross wrote:
>> When running as Xen pv-guest the exception frame on the stack contains
>> %r11 and %rcx additional to the other data pushed by the processor.
>>
>> Instead of having a p
On 26/07/17 15:48, Andy Lutomirski wrote:
> On Mon, Jul 24, 2017 at 7:28 AM, Juergen Gross wrote:
>> When running as Xen pv-guest the exception frame on the stack contains
>> %r11 and %rcx additional to the other data pushed by the processor.
>>
>> Instead of having a p
On 25/07/17 16:09, Boris Ostrovsky wrote:
> On 07/25/2017 05:50 AM, Juergen Gross wrote:
>> Provide a hook in hypervisor_x86 called after setting up initial
>> memory mapping.
>>
>> This is needed e.g. by Xen HVM guests to map the hypervisor shared
>> info pag
On 25/07/17 16:19, Boris Ostrovsky wrote:
> On 07/25/2017 05:50 AM, Juergen Gross wrote:
>>
>> -void __ref xen_hvm_init_shared_info(void)
>> +void xen_hvm_init_shared_info(void)
>
> Why are you dropping __ref?
The function no longer calls any
x this use early_memremap() to get a temporary virtual
address for shared info until va() can be used safely.
Signed-off-by: Juergen Gross
---
arch/x86/xen/enlighten_hvm.c | 16 ++--
1 file changed, 14 insertions(+), 2 deletions(-)
diff --git a/arch/x86/xen/enlighten_hvm.c b/arch/x86/xen/enlig
Provide a hook in hypervisor_x86 called after setting up initial
memory mapping.
This is needed e.g. by Xen HVM guests to map the hypervisor shared
info page.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/hypervisor.h | 10 ++
arch/x86/mm/init.c| 3 +++
2 files
Instead of calling xen_hvm_init_shared_info() on boot and resume split
it up into a boot time function searching for the pfn to use and a
mapping function doing the hypervisor mapping call.
Signed-off-by: Juergen Gross
---
arch/x86/xen/enlighten_hvm.c | 45
This patch series fixes a regression introduced in 4.13-rc1: A Xen
HVM guest with KASLR enabled wouldn't boot any longer due to the usage
of __va() before kernel_randomize_memory() was called.
Juergen Gross (3):
x86: provide an init_mem_mapping hypervisor hook
xen: spl
On 22/07/17 02:12, Stefano Stabellini wrote:
> Also add pvcalls-front to the Makefile.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> ---
> drivers/xen/Kconfig | 9 +
> drivers/xen/Makefile | 1 +
> 2 files changed, 10 insertions(+)
>
> d
On 22/07/17 02:12, Stefano Stabellini wrote:
> Implement pvcalls frontend removal function. Go through the list of
> active and passive sockets and free them all, one at a time.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
Re
On 22/07/17 02:12, Stefano Stabellini wrote:
> Send PVCALLS_RELEASE to the backend and wait for a reply. Take both
> in_mutex and out_mutex to avoid concurrent accesses. Then, free the
> socket.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> ---
>
On 22/07/17 02:12, Stefano Stabellini wrote:
> For active sockets, check the indexes and use the inflight_conn_req
> waitqueue to wait.
>
> For passive sockets, send PVCALLS_POLL to the backend. Use the
> inflight_accept_req waitqueue if an accept is outstanding. Otherwise use
> the inflight_req w
On 22/07/17 02:11, Stefano Stabellini wrote:
> Implement recvmsg by copying data from the "in" ring. If not enough data
> is available and the recvmsg call is blocking, then wait on the
> inflight_conn_req waitqueue. Take the active socket in_mutex so that
> only one function can access the ring at
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send data to an active socket by copying data to the "out" ring. Take
> the active socket out_mutex so that only one function can access the
> ring at any given time.
>
> If not enough room is available on the ring, rather than returning
> immediately
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_ACCEPT to the backend. Allocate a new active socket. Make
> sure that only one accept command is executed at any given time by
> setting PVCALLS_FLAG_ACCEPT_INFLIGHT and waiting on the
> inflight_accept_req waitqueue.
>
> sock->sk->sk_sen
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_LISTEN to the backend.
>
> Signed-off-by: Stefano Stabellini
> CC: boris.ostrov...@oracle.com
> CC: jgr...@suse.com
> ---
> drivers/xen/pvcalls-front.c | 49
> +
> drivers/xen/pvcalls-front.h
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_BIND to the backend. Introduce a new structure, part of
> struct sock_mapping, to store information specific to passive sockets.
>
> Introduce a status field to keep track of the status of the passive
> socket.
>
> Introduce a waitqueue
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send PVCALLS_CONNECT to the backend. Allocate a new ring and evtchn for
> the active socket.
>
> Introduce a data structure to keep track of sockets. Introduce a
> waitqueue to allow the frontend to wait on data coming from the backend
> on the active
On 22/07/17 02:11, Stefano Stabellini wrote:
> Send a PVCALLS_SOCKET command to the backend, use the masked
> req_prod_pvt as req_id. This way, req_id is guaranteed to be between 0
> and PVCALLS_NR_REQ_PER_RING. We already have a slot in the rsp array
> ready for the response, and there cannot be t
On 22/07/17 02:11, Stefano Stabellini wrote:
> Implement the probe function for the pvcalls frontend. Read the
> supported versions, max-page-order and function-calls nodes from
> xenstore.
>
> Introduce a data structure named pvcalls_bedata. It contains pointers to
> the command ring, the event c
On 22/07/17 02:11, Stefano Stabellini wrote:
> Introduce a xenbus frontend for the pvcalls protocol, as defined by
> https://xenbits.xen.org/docs/unstable/misc/pvcalls.html.
>
> This patch only adds the stubs, the code will be added by the following
> patches.
>
> Signed-off-by: Stefano Stabellin
On 24/07/17 18:55, Iurii Artemenko wrote:
> Hello Juergen,
>
>
> I've started to work on checkpatch-like python script. I make it based
> on clang-format-diff.py and it works as pre-commit hook.
How does this work for a patch which is perfectly fine, while not
touched parts of the patched file
use the exception entry with prepended instructions,
otherwise use the entry without the Xen specific code.
Signed-off-by: Juergen Gross
---
arch/x86/entry/calling.h | 6 ++
arch/x86/entry/entry_64.S | 19 ++-
arch/x86/entry/entry_64_compat.S
On the Xen Developer Summit 2017 in Budapest we agreed to add a
script to the Xen repository capable to test patches for style
correctness, similar to checkpatch.pl of the Linux kernel.
This is a first draft of the interface visible to users and
developers.
Problem to solve
Revi
| 3 ++-
arch/x86/xen/time.c | 1 -
drivers/xen/balloon.c | 3 +++
drivers/xen/grant-table.c | 9 -
drivers/xen/xen-balloon.c | 22 --
include/xen/balloon.h | 8
6 files changed, 33 insertions(+), 13 deletions(-)
Juergen Gross (2):
xen/x86
On 21/07/17 22:57, Linus Torvalds wrote:
> On Fri, Jul 21, 2017 at 3:17 AM, Juergen Gross wrote:
>> drivers/xen/pvcalls-back.c | 1236
>>
>
> This really doesn't look like a fix.
>
> The merge window is over.
>
&g
460595] xenfs: not registering filesystem on non-xen platform
>>>
>>> As the user chose not to boot a Xen domain, this message does not
>>> provide useful information. Drop this message.
>>>
>>> Signed-off-by: Punit Agrawal
>>> Cc: Boris Ostrovsky
(+), 13 deletions(-)
Colin Ian King (1):
xen/pvcalls: fix null pointer reference on sock_release call
Juergen Gross (3):
xen/grant-table: log the lack of grants
xen/x86: fix cpu hotplug
xen/balloon: don't online new memory initially
Stefano Stabellini (18):
xen: intr
On 21/07/17 10:28, Wei Liu wrote:
> CC Juergen and George
>
> On Thu, Jul 20, 2017 at 01:05:20PM +0530, Ajmal M Ali wrote:
>> Hi,
>>
>> I am trying to do USB passthrough in x86_64. I have Ubuntu as Dom0 and DomU.
>>
>>
>>
>> *Dom0 : Linux teltvm0881 4.8.0-58-generic #63~16.04.1-Ubuntu SMP Mon Jun
re:
>text data bss dec hex filename
>5633 3452 384946924fd drivers/xen/xen-selfballoon.o
>
> after:
>text data bss dec hex filename
>5576 3308 256914023b4 drivers
On 20/07/17 14:33, Daniel Kiper wrote:
> On Thu, Jul 20, 2017 at 11:16:39AM +0200, Greg Kroah-Hartman wrote:
>> On Thu, Jul 20, 2017 at 10:39:10AM +0200, Ingo Molnar wrote:
>>>
>>> * Daniel Kiper wrote:
>>>
Hey Greg,
On Wed, Jul 19, 2017 at 11:43:32AM +0200, Greg Kroah-Hartman wrote
On 19/07/17 17:17, Greg KH wrote:
> On Wed, Jul 19, 2017 at 04:51:02PM +0200, Juergen Gross wrote:
>> On 19/07/17 16:43, Greg KH wrote:
>>> From: Greg Kroah-Hartman
>>>
>>> It's better to be explicit and use the DRIVER_ATTR_RW() and
>>> DRIVER_AT
rt of a series to drop DRIVER_ATTR() from the tree entirely.
>
> Cc: Boris Ostrovsky
> Cc: Juergen Gross
> Signed-off-by: Greg Kroah-Hartman
Reviewed-by: Juergen Gross
I'll take this through the Xen tree, unless you want to use your tree.
Thanks,
Juergen
___
rt of a series to drop DRIVER_ATTR() from the tree entirely.
>
> Cc: Boris Ostrovsky
> Cc: Juergen Gross
> Signed-off-by: Greg Kroah-Hartman
>
> ---
> drivers/xen/xen-pciback/pci_stub.c | 44
> -
> 1 file changed, 20 inserti
uired, it should be implemented
>> in terms of XEN_SYSCTL_get_cpuid_policy to use the proper CPUID view.
>>
>> Signed-off-by: Andrew Cooper
>> ---
>> CC: Ian Jackson
>> CC: Wei Liu
>> CC: Marek Marczykowski-Górecki
>> CC: David Scott
>>
701 - 800 of 3777 matches
Mail list logo