flight 188043 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/188043/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 188028
test-amd64-amd64-xl-qemuu-win7-amd64
flight 188045 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/188045/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 188034
test-amd64-amd64-xl-qemut-win7-amd64
flight 188038 libvirt real [real]
flight 188050 libvirt real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/188038/
http://logs.test-lab.xenproject.org/osstest/logs/188050/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-
Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
adds a weak reverse dependency to the config XEN_PRIVCMD definition, that
dependency causes xen-privcmd can't be loaded on domU, because dependent
xen-pciback isn't always be loaded successfully on domU.
To solve above proble
flight 188049 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/188049/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d2a41d1a7a555e54336e03731c801eb93fba801d
baseline version:
ovmf 0bae161fed39d8996693e
Juergen Gross, le jeu. 10 oct. 2024 17:54:59 +0200, a ecrit:
> Today the build of Xenstore stubdoms depend on libxenguest just because
> libxenguest depends on all needed libraries. In reality there is no
> dependency on libxenguest for Xenstore stubdoms.
>
> Use the actual dependencies instead.
>
flight 188046 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/188046/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Thu, Oct 10, 2024 at 3:05 PM Ayan Kumar Halder
wrote:
>
> If the BSS section is empty, then the function can just return.
>
> Signed-off-by: Ayan Kumar Halder
> ---
> Changes from :-
>
> v1..v2 - New patch introduced in v3.
>
> xen/arch/arm/arm64/head.S | 2 ++
> 1 file changed, 2 insertions(
On Thu, Oct 10, 2024 at 6:29 PM Ayan Kumar Halder wrote:
>
> Hi Frediano,
>
> Appreciate your feedback.
>
> On 10/10/2024 15:43, Frediano Ziglio wrote:
> > On Thu, Oct 10, 2024 at 3:05 PM Ayan Kumar Halder
> > wrote:
> >> If the BSS section is empty, then the function can just return.
> >>
> >> S
On Thu, 10 Oct 2024, Michal Orzel wrote:
> The code is DT specific and as such should be placed under common
> directory for DT related files. Update MAINTAINERS file accordingly
> and drop the line with a path from a top-level comment in dt-overlay.c.
> It serves no purpose and requires being upda
On Thu, 10 Oct 2024, Jiqian Chen wrote:
> Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
> adds a weak reverse dependency to the config XEN_PRIVCMD definition, that
> dependency causes xen-privcmd can't be loaded on domU, because
> dependent xen-pciback is always not be lo
On Thu, Oct 10, 2024 at 11:43:14AM -0600, Alex Williamson wrote:
> FWIW, I think pcim_intx() and pci_intx() align better to our naming
> convention for devres interfaces. Would it be sufficient if pci_intx()
> triggered a WARN_ON if called for a pci_is_managed() device? Thanks,
>
To be honest,
flight 188044 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/188044/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Thu, 10 Oct 2024 11:11:36 +0200
Philipp Stanner wrote:
> On Thu, 2024-10-10 at 11:50 +0300, Dan Carpenter wrote:
> > On Wed, Oct 09, 2024 at 10:35:19AM +0200, Philipp Stanner wrote:
> > > pci_intx() is a hybrid function which can sometimes be managed
> > > through
> > > devres. This hybrid n
On Wed, 9 Oct 2024 10:35:07 +0200
Philipp Stanner wrote:
> pci_intx() is a hybrid function which sometimes performs devres
> operations, depending on whether pcim_enable_device() has been used to
> enable the pci_dev. This sometimes-managed nature of the function is
> problematic. Notably, it ca
flight 188034 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/188034/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-arm64-arm64-xl-credit1 13 debian-fixup fail in 188018 pass in 188034
test-amd64-amd64-xl-qemut-debian
Hi Frediano,
Appreciate your feedback.
On 10/10/2024 15:43, Frediano Ziglio wrote:
On Thu, Oct 10, 2024 at 3:05 PM Ayan Kumar Halder
wrote:
If the BSS section is empty, then the function can just return.
Signed-off-by: Ayan Kumar Halder
---
Changes from :-
v1..v2 - New patch introduced in
On 2024-10-09 13:21, Daniel P. Smith wrote:
On 10/8/24 12:13, Jason Andryuk wrote:
On 2024-10-06 17:49, Daniel P. Smith wrote:
Iterate through the unclaimed struct boot_module to see if any are an
XSM FLASK
policy. If one is located, mark it as an xsm policy.
Signed-off-by: Daniel P. Smith
Instead of letting the xenstore stubdoms depend on libxenguest and
with that on basically all Xen libraries, only let it depend on the
actually used libraries.
This is in preparation of removing the libxenctrl dependency from
Xenstore and with that the capability to use xenstore-stubdom on
multipl
Today the xenstored Makefile contains an unneeded reference to the
not used libxenguest library.
Remove it.
Signed-off-by: Juergen Gross
---
tools/xenstored/Makefile.common | 1 -
1 file changed, 1 deletion(-)
diff --git a/tools/xenstored/Makefile.common b/tools/xenstored/Makefile.common
index
Today the build of Xenstore stubdoms depend on libxenguest just because
libxenguest depends on all needed libraries. In reality there is no
dependency on libxenguest for Xenstore stubdoms.
Use the actual dependencies instead.
Signed-off-by: Juergen Gross
---
stubdom/Makefile | 6 --
1 file
Update the Mini-OS upstream revision.
Signed-off-by: Juergen Gross
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index 1a3938b6c4..6dd2f9439c 100644
--- a/Config.mk
+++ b/Config.mk
@@ -224,7 +224,7 @@ QEMU_UPSTREAM_URL ?=
https://xenbits
Hello Ayan,
I think that we have to mention in CHANGELOG.md that experimental
support of Xen with MPU for Arm is added. ( if I understand correctly
what is this patch series about ).
Thanks.
~ Oleksii
On Thu, 2024-10-10 at 15:03 +0100, Ayan Kumar Halder wrote:
> We have enabled early booting of
This patch series initializes bootinfo from dtb and then parse and
handle command line from dtb.
---
Changes in v2:
- Update the cover letter message: drop information about patch series
dependency.
- Add Acked-by for the patch 2 ( xen/riscv: parse and handle fdt command line )
- Minor chang
Receive Xen's command line passed by DTB using boot_fdt_cmdline()
and passed it to cmdline_parse() for further procesinng and setup
of Xen-specific parameters.
Signed-off-by: Oleksii Kurochko
Acked-by: Jan Beulich
---
Changes in V2:
- add Acked-by: Jan Beulich
---
xen/arch/riscv/setup.c | 6 +
Parse DTB during startup, allowing memory banks and reserved
memory regions to be set up, along with early device tree node
( chosen, "xen,domain", "reserved-memory", etc ) handling.
Signed-off-by: Oleksii Kurochko
---
Changes in V2:
- Drop local variable fdt_size as it is going to be used only
Hi Michal,
On 04/10/2024 13:22, Michal Orzel wrote:
This series contains fixes and improvements after doing some tests with DT
overlay support in Xen. I split the series so that each patch handles a separate
issue.
Michal Orzel (6):
dt-overlay: Fix NULL pointer dereference
device-tree: Re
On Thu, Oct 10, 2024 at 10:09:12AM +0200, Philipp Stanner wrote:
> On Wed, 2024-10-09 at 20:32 +0200, Heiner Kallweit wrote:
> > On 09.10.2024 10:35, Philipp Stanner wrote:
...
> > > To do so, a pci_intx() version that is always-managed, and one that
> > > is
> > > never-managed are provided. The
On Wed, Oct 09, 2024 at 10:35:08AM +0200, Philipp Stanner wrote:
> pci_intx() is a hybrid function which can sometimes be managed through
> devres. To remove this hybrid nature from pci_intx(), it is necessary to
> port users to either an always-managed or a never-managed version.
>
> hda_intel en
On Thu, 2024-03-07 at 09:39 +0100, Jan Beulich wrote:
> On 06.03.2024 18:28, Sébastien Chaumat wrote:
> > Reasoning backward (using a kernel without the pinctrl_amd driver to
> > > ensure xen only is at stake) :
> > > checking the diff in IOAPIC between bare metal and xen (IRQ7 is on
> > > pin
On Thu, Oct 10, 2024 at 3:05 PM Ayan Kumar Halder
wrote:
>
> If the BSS section is empty, then the function can just return.
>
> Signed-off-by: Ayan Kumar Halder
> ---
> Changes from :-
>
> v1..v2 - New patch introduced in v3.
>
> xen/arch/arm/arm64/head.S | 2 ++
> 1 file changed, 2 insertions(
On Wed, Oct 09, 2024 at 10:35:07AM +0200, Philipp Stanner wrote:
> pci_intx() is a hybrid function which sometimes performs devres
> operations, depending on whether pcim_enable_device() has been used to
> enable the pci_dev. This sometimes-managed nature of the function is
> problematic. Notably,
On 10.10.2024 16:03, Ayan Kumar Halder wrote:
> --- a/xen/arch/Kconfig
> +++ b/xen/arch/Kconfig
> @@ -6,11 +6,13 @@ config PHYS_ADDR_T_32
>
> config NR_CPUS
> int "Maximum number of CPUs"
> + range 1 1 if MPU
I think this "if" and ...
> range 1 16383
> default "256" if X8
From: Wei Chen
On Armv8-A, Xen has a fixed virtual start address (link address too) for all
Armv8-A platforms. In an MMU based system, Xen can map its loaded address to
this virtual start address. So, on Armv8-A platforms, the Xen start address does
not need to be configurable. But on Armv8-R pla
Secondary cpus initialization is not yet supported. Thus, we print an
appropriate message and put the secondary cpus in WFE state.
And we introduce to BUILD_BUG_ON to prevent users using from building Xen
on multiprocessor based MPU systems.
In Arm, there is no clean way to disable SMP. As of now,
If the BSS section is empty, then the function can just return.
Signed-off-by: Ayan Kumar Halder
---
Changes from :-
v1..v2 - New patch introduced in v3.
xen/arch/arm/arm64/head.S | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/arch/arm/arm64/head.S b/xen/arch/arm/arm64/head.S
index
Define enable_boot_cpu_mm() for the AArch64-V8R system.
Like boot-time page table in MMU system, we need a boot-time MPU protection
region configuration in MPU system so Xen can fetch code and data from normal
memory.
To do this, Xen maps the following sections of the binary as separate regions
(
After the regions have been created, now we enable the MPU. For this we disable
the background region so that the new memory map created for the regions take
effect. Also, we treat all RW regions as non executable and the data cache is
enabled.
Signed-off-by: Ayan Kumar Halder
---
Changes from :-
There are features in the forthcoming patches which are dependent on
MPU. For eg fixed start address.
Also, some of the Xen features (eg STATIC_MEMORY) will be selected
by the MPU configuration.
Thus, this patch introduces a choice between MMU and MPU for the type
of memory management system. By d
We have enabled early booting of R82.
Changes from v2 :-
1. Added a new patch "xen/arm: Skip initializing the BSS section when it is
empty".
2. Split "xen/arm: mpu: Create boot-time MPU protection regions" into 2 patches.
Ayan Kumar Halder (6):
xen/arm: Skip initializing the BSS section when i
On 07/10/2024 3:15 pm, Frediano Ziglio wrote:
> Signed-off-by: Frediano Ziglio
This patch looks fine now (give or take some knock-on effects from patch 3).
However it probably does need a little more in the way of commit
message. You're moving the EFI implementation, building it for both 32
and
On Thu, Oct 10, 2024 at 1:57 PM Andrew Cooper wrote:
>
> On 07/10/2024 3:15 pm, Frediano Ziglio wrote:
> > No more need to pass from assembly code.
> >
> > Signed-off-by: Frediano Ziglio
> > ---
> > Changes since v1:
> > - split the 2 variable changes into 2 commits.
> > ---
> > xen/arch/x86/boo
On 07/10/2024 3:15 pm, Frediano Ziglio wrote:
> No more need to pass from assembly code.
>
> Signed-off-by: Frediano Ziglio
This patch is fine now.
As noted in patch 5, there will be less net churn if the order was
swapped. (As it stands, there's at least one correction in this patch
as a knock
On 10/10/2024 1:49 pm, Anthony PERARD wrote:
> On Thu, Oct 10, 2024 at 01:19:46PM +0200, Juergen Gross wrote:
>> Today Mini-OS can only be configured to use all or none Xen library.
>> In order to prepare a more fine grained configuration scheme, add per
>> library config items to the Mini-OS confi
On 07/10/2024 3:15 pm, Frediano Ziglio wrote:
> No more need to pass from assembly code.
>
> Signed-off-by: Frediano Ziglio
> ---
> Changes since v1:
> - split the 2 variable changes into 2 commits.
> ---
> xen/arch/x86/boot/head.S | 13 -
> xen/arch/x86/boot/reloc.c | 9 ++---
>
On Thu, Oct 10, 2024 at 01:19:46PM +0200, Juergen Gross wrote:
> Today Mini-OS can only be configured to use all or none Xen library.
> In order to prepare a more fine grained configuration scheme, add per
> library config items to the Mini-OS config files.
>
> As some libraries pull in others, th
On Wed, Oct 09, 2024 at 03:37:06PM +0200, Roger Pau Monné wrote:
> On Wed, Oct 09, 2024 at 02:09:33PM +0200, Jan Beulich wrote:
> > On 09.10.2024 13:47, Roger Pau Monné wrote:
> > > On Wed, Oct 09, 2024 at 01:28:19PM +0200, Jan Beulich wrote:
> > >> On 09.10.2024 13:13, Roger Pau Monné wrote:
> > >
flight 188028 linux-linus real [real]
flight 188042 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/188028/
http://logs.test-lab.xenproject.org/osstest/logs/188042/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-
On Thu, Oct 10, 2024 at 12:26 PM Andrew Cooper
wrote:
>
> On 04/10/2024 9:16 am, Frediano Ziglio wrote:
> > Frediano Ziglio (19):
> > xen: Update header guards - Generic
> > xen: Update header guards - X86
> > xen: Update header guards - ACPI
> > xen: Update header guards - ARGO
> > xen:
flight 188041 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/188041/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 10.10.24 13:45, Jan Beulich wrote:
On 09.10.2024 16:05, Juergen Gross wrote:
Instead of adding all or no Xen library (controlled by CONFIG_XC),
support a dedicated config option for each library instead,
defaulting to disabled.
As it is no longer needed now, drop the CONFIG_XC support.
Sign
On 09.10.2024 16:05, Juergen Gross wrote:
> Instead of adding all or no Xen library (controlled by CONFIG_XC),
> support a dedicated config option for each library instead,
> defaulting to disabled.
>
> As it is no longer needed now, drop the CONFIG_XC support.
>
> Signed-off-by: Juergen Gross
>
On 04/10/2024 9:16 am, Frediano Ziglio wrote:
> Frediano Ziglio (19):
> xen: Update header guards - Generic
> xen: Update header guards - X86
> xen: Update header guards - ACPI
> xen: Update header guards - ARGO
> xen: Update header guards - ARM
> xen: Update header guards - Device tree
Today Mini-OS can only be configured to use all or none Xen library.
In order to prepare a more fine grained configuration scheme, add per
library config items to the Mini-OS config files.
As some libraries pull in others, the config files need to be
extended at build time to reflect those indirec
The code is DT specific and as such should be placed under common
directory for DT related files. Update MAINTAINERS file accordingly
and drop the line with a path from a top-level comment in dt-overlay.c.
It serves no purpose and requires being updated on every code movement.
Signed-off-by: Micha
On 10/10/24 04:03, Jan Beulich wrote:
On 10.10.2024 01:02, Daniel P. Smith wrote:
On 10/8/24 12:52, Jason Andryuk wrote:
On 2024-10-06 17:49, Daniel P. Smith wrote:
This commit changes create_dom0 to no longer take the individual
components and
take struct boot_info instead. Internally, it is
On 10.10.24 10:43, Chen, Jiqian wrote:
On 2024/10/10 16:39, Jürgen Groß wrote:
On 10.10.24 09:58, Jiqian Chen wrote:
Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
adds a weak reverse dependency to the config XEN_PRIVCMD definition, that
dependency causes xen-privcmd c
HI Ayan,
> On 10 Oct 2024, at 11:18, Ayan Kumar Halder wrote:
>
> Hi Bertrand,
>
> < snip>
>
>>> 4) AoU on domain - 1) Domains should not use HVC DCC registers as Xen does
>>> not emulate them.
>> Xen does not depend on that, the domain does so this is only a Xen expected
>> behaviour and we
Doing previous testing with an Alder Lake Intel machine the with
"x86/boot: Improve MBI2 structure check" commit test started to fail.
Removing the commit makes the tests succeed however there was not apparent
reason (looking at the code) for the failure.
So I instrumented code to output the struct
Tag structure should contain at least the tag header.
Entire tag structure must be contained inside MBI2 data.
Reviewed-by: Jan Beulich
Signed-off-by: Frediano Ziglio
---
Changes since v6:
- compare against total_size every time to avoid overflows.
Changes since v7:
- check for tag type being M
This series came from part of the work of removing duplications between
boot code and rewriting part of code from assembly to C.
Changes since v1, more details in specific commits:
- style updates;
- comments and descriptions improvements;
- other improvements.
Changes since v2:
- rebased on mast
Hi Bertrand,
< snip>
4) AoU on domain - 1) Domains should not use HVC DCC registers as Xen does not
emulate them.
Xen does not depend on that, the domain does so this is only a Xen expected
behaviour and we should document that Domains shall not use it.
Agreed, we need to document somewher
On Thu, 2024-10-10 at 11:03 +0200, Greg Kroah-Hartman wrote:
> On Thu, Oct 10, 2024 at 10:03:30AM +0200, Philipp Stanner wrote:
> > On Wed, 2024-10-09 at 21:41 +0200, Philipp Hortmann wrote:
> > > On 10/9/24 11:38, Greg Kroah-Hartman wrote:
> > > > On Wed, Oct 09, 2024 at 10:35:16AM +0200, Philipp
On Thu, 2024-10-10 at 11:50 +0300, Dan Carpenter wrote:
> On Wed, Oct 09, 2024 at 10:35:19AM +0200, Philipp Stanner wrote:
> > pci_intx() is a hybrid function which can sometimes be managed
> > through
> > devres. This hybrid nature is undesirable.
> >
> > Since all users of pci_intx() have by now
On Thu, Oct 10, 2024 at 10:03:30AM +0200, Philipp Stanner wrote:
> On Wed, 2024-10-09 at 21:41 +0200, Philipp Hortmann wrote:
> > On 10/9/24 11:38, Greg Kroah-Hartman wrote:
> > > On Wed, Oct 09, 2024 at 10:35:16AM +0200, Philipp Stanner wrote:
> > > > pci_intx() is a hybrid function which can some
On Wed, Oct 09, 2024 at 10:35:19AM +0200, Philipp Stanner wrote:
> pci_intx() is a hybrid function which can sometimes be managed through
> devres. This hybrid nature is undesirable.
>
> Since all users of pci_intx() have by now been ported either to
> always-managed pcim_intx() or never-managed p
On 2024/10/10 16:39, Jürgen Groß wrote:
> On 10.10.24 09:58, Jiqian Chen wrote:
>> Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
>> adds a weak reverse dependency to the config XEN_PRIVCMD definition, that
>> dependency causes xen-privcmd can't be loaded on domU, because
On 2024/10/10 16:17, Jan Beulich wrote:
> On 10.10.2024 09:58, Jiqian Chen wrote:
>> --- a/drivers/xen/acpi.c
>> +++ b/drivers/xen/acpi.c
>> @@ -125,3 +125,20 @@ int xen_acpi_get_gsi_info(struct pci_dev *dev,
>> return 0;
>> }
>> EXPORT_SYMBOL_GPL(xen_acpi_get_gsi_info);
>> +
>> +get_gsi_fro
On 10.10.2024 10:34, Frediano Ziglio wrote:
> On Wed, Oct 9, 2024 at 12:13 PM Jan Beulich wrote:
>>
>> On 09.10.2024 12:15, Frediano Ziglio wrote:
>>> On Wed, Oct 9, 2024 at 9:20 AM Jan Beulich wrote:
On 09.10.2024 10:04, Frediano Ziglio wrote:
> --- a/xen/arch/x86/efi/Makefile
> +++
On 10.10.24 09:58, Jiqian Chen wrote:
Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
adds a weak reverse dependency to the config XEN_PRIVCMD definition, that
dependency causes xen-privcmd can't be loaded on domU, because
dependent xen-pciback is always not be loaded suc
On Wed, Oct 9, 2024 at 12:13 PM Jan Beulich wrote:
>
> On 09.10.2024 12:15, Frediano Ziglio wrote:
> > On Wed, Oct 9, 2024 at 9:20 AM Jan Beulich wrote:
> >> On 09.10.2024 10:04, Frediano Ziglio wrote:
> >>> --- a/xen/arch/x86/efi/Makefile
> >>> +++ b/xen/arch/x86/efi/Makefile
> >>> @@ -11,6 +11,
flight 188039 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/188039/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 0bae161fed39d8996693e586b77f31094b61b9d7
baseline version:
ovmf da1c6dd62a19361186739
On 10.10.2024 09:58, Jiqian Chen wrote:
> --- a/drivers/xen/acpi.c
> +++ b/drivers/xen/acpi.c
> @@ -125,3 +125,20 @@ int xen_acpi_get_gsi_info(struct pci_dev *dev,
> return 0;
> }
> EXPORT_SYMBOL_GPL(xen_acpi_get_gsi_info);
> +
> +get_gsi_from_sbdf_t get_gsi_from_sbdf = NULL;
> +
> +void xe
flight 188027 qemu-upstream-4.19-testing real [real]
flight 188040 qemu-upstream-4.19-testing real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/188027/
http://logs.test-lab.xenproject.org/osstest/logs/188040/
Failures :-/ but no regressions.
Tests which are failing intermittentl
On Wed, 2024-10-09 at 20:32 +0200, Heiner Kallweit wrote:
> On 09.10.2024 10:35, Philipp Stanner wrote:
> > Hi all,
> >
> > this series removes a problematic feature from pci_intx(). That
> > function
> > sometimes implicitly uses devres for automatic cleanup. We should
> > get
> > rid of this imp
On 10.10.2024 01:42, Daniel P. Smith wrote:
> On 10/9/24 02:53, Jan Beulich wrote:
>> On 08.10.2024 21:15, Jason Andryuk wrote:
>>> On 2024-10-06 17:49, Daniel P. Smith wrote:
Any direct usages of struct mod have been transitioned, remove the
remaining
references to early_mod fields
On Wed, 2024-10-09 at 21:41 +0200, Philipp Hortmann wrote:
> On 10/9/24 11:38, Greg Kroah-Hartman wrote:
> > On Wed, Oct 09, 2024 at 10:35:16AM +0200, Philipp Stanner wrote:
> > > pci_intx() is a hybrid function which can sometimes be managed
> > > through
> > > devres. To remove this hybrid nature
On 10.10.2024 01:02, Daniel P. Smith wrote:
> On 10/8/24 12:52, Jason Andryuk wrote:
>> On 2024-10-06 17:49, Daniel P. Smith wrote:
>>> This commit changes create_dom0 to no longer take the individual
>>> components and
>>> take struct boot_info instead. Internally, it is changed to locate the
>>
Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
adds a weak reverse dependency to the config XEN_PRIVCMD definition, that
dependency causes xen-privcmd can't be loaded on domU, because
dependent xen-pciback is always not be loaded successfully on domU.
To solve above probl
On 09.10.2024 19:29, Alejandro Vallejo wrote:
> On Wed Oct 9, 2024 at 3:53 PM BST, Jan Beulich wrote:
>> On 01.10.2024 14:38, Alejandro Vallejo wrote:
>>> Implements the helper for mapping vcpu_id to x2apic_id given a valid
>>> topology in a policy. The algo is written with the intention of
>>> ext
On 09.10.2024 19:57, Alejandro Vallejo wrote:
> On Wed Oct 9, 2024 at 3:45 PM BST, Jan Beulich wrote:
>> On 01.10.2024 14:38, Alejandro Vallejo wrote:
>>> --- a/xen/lib/x86/policy.c
>>> +++ b/xen/lib/x86/policy.c
>>> @@ -2,6 +2,94 @@
>>>
>>> #include
>>>
>>> +static unsigned int order(unsigne
On 09.10.2024 19:19, Alejandro Vallejo wrote:
> On Wed Oct 9, 2024 at 3:03 PM BST, Jan Beulich wrote:
>> On 01.10.2024 14:38, Alejandro Vallejo wrote:
>>> Make it so the APs expose their own APIC IDs in a LUT. We can use that
>>> LUT to populate the MADT, decoupling the algorithm that relates CPU I
On 09.10.2024 18:44, Alejandro Vallejo wrote:
> On Wed Oct 9, 2024 at 2:28 PM BST, Jan Beulich wrote:
>> On 01.10.2024 14:38, Alejandro Vallejo wrote:
>>> If toolstack were to upload LAPIC contexts as part of domain creation it
>>
>> If it were to - yes. But it doesn't, an peeking ahead in the seri
On 09.10.2024 17:57, Alejandro Vallejo wrote:
> On Wed Oct 9, 2024 at 10:40 AM BST, Jan Beulich wrote:
>> On 01.10.2024 14:37, Alejandro Vallejo wrote:
>>> --- a/xen/lib/x86/policy.c
>>> +++ b/xen/lib/x86/policy.c
>>> @@ -15,7 +15,16 @@ int x86_cpu_policies_are_compatible(const struct
>>> cpu_poli
On 10/9/2024 2:05 PM, Philipp Stanner wrote:
pci_intx() is a hybrid function which can sometimes be managed through
devres. To remove this hybrid nature from pci_intx(), it is necessary to
port users to either an always-managed or a never-managed version.
All users of amd_mp2_pci_remove(), whe
On 10.10.24 09:01, Jan Beulich wrote:
On 10.10.2024 07:39, Jürgen Groß wrote:
On 10.10.24 00:46, Stefano Stabellini wrote:
On Wed, 9 Oct 2024, Jan Beulich wrote:
On 09.10.2024 08:20, Jiqian Chen wrote:
Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
adds a weak revers
On 10.10.24 09:07, Chen, Jiqian wrote:
On 2024/10/10 13:39, Jürgen Groß wrote:
On 10.10.24 00:46, Stefano Stabellini wrote:
On Wed, 9 Oct 2024, Jan Beulich wrote:
On 09.10.2024 08:20, Jiqian Chen wrote:
Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
adds a weak rever
On 2024/10/10 13:39, Jürgen Groß wrote:
> On 10.10.24 00:46, Stefano Stabellini wrote:
>> On Wed, 9 Oct 2024, Jan Beulich wrote:
>>> On 09.10.2024 08:20, Jiqian Chen wrote:
Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
adds a weak reverse dependency to the confi
On 10.10.2024 07:39, Jürgen Groß wrote:
> On 10.10.24 00:46, Stefano Stabellini wrote:
>> On Wed, 9 Oct 2024, Jan Beulich wrote:
>>> On 09.10.2024 08:20, Jiqian Chen wrote:
Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
adds a weak reverse dependency to the confi
89 matches
Mail list logo