Signed-off-by: Jan Beulich
---
drivers/xen/xen-pciback/conf_space_header.c |4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
--- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_header.c
+++ 4.7-rc6-xen-pciback/drivers/xen/xen-pciback/conf_space_header.c
@@ -211,8 +211,8 @@
Other than for raw BAR values, flags are properly separated in the
internal representation.
Signed-off-by: Jan Beulich
---
drivers/xen/xen-pciback/conf_space_header.c |5 +
1 file changed, 1 insertion(+), 4 deletions(-)
--- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_he
Signed-off-by: Jan Beulich
---
drivers/xen/xen-pciback/conf_space_header.c | 33 +++-
1 file changed, 13 insertions(+), 20 deletions(-)
--- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_header.c
+++ 4.7-rc6-xen-pciback/drivers/xen/xen-pciback/conf_space_he
It is now identical to bar_init().
Signed-off-by: Jan Beulich
---
drivers/xen/xen-pciback/conf_space_header.c | 14 +-
1 file changed, 1 insertion(+), 13 deletions(-)
--- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_header.c
+++ 4.7-rc6-xen-pciback/drivers/xen/xen-p
Signed-off-by: Jan Beulich
---
drivers/xen/xen-pciback/conf_space_header.c |7 +++
1 file changed, 3 insertions(+), 4 deletions(-)
--- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_header.c
+++ 4.7-rc6-xen-pciback/drivers/xen/xen-pciback/conf_space_header.c
@@ -210,8 +210,7
>>> On 05.07.16 at 20:33, wrote:
> On Fri, May 27, 2016 at 02:16:09AM -0600, Jan Beulich wrote:
>> >>> On 25.05.16 at 18:45, wrote:
>> > On Wed, May 25, 2016 at 01:03:42AM -0600, Jan Beulich wrote:
>> >> >>> On 15.04.16 at 14:33, wrote:
>> >> > --- a/xen/arch/x86/efi/stub.c
>> >> > +++ b/xen/arc
The first five patches are the result of the requested split of
"xen-pciback: clean up {bar,rom}_init()", with Boris'es R-b
dropped despite there not being any functional change (the
mechanical change appears too significant to retain it). The
remaining two are a follow-up to the recent "xen/pcibac
Hi Andre,
On 05.07.2016 16:29, Andre Przywara wrote:
Hi,
On 05/07/16 15:22, Dirk Behme wrote:
On 05.07.2016 15:45, Andre Przywara wrote:
Hi,
On 05/07/16 14:34, Julien Grall wrote:
(CC Andre)
On 05/07/16 14:04, Dirk Behme wrote:
On 05.07.2016 14:45, Julien Grall wrote:
On 05/07/16 13:09
flight 96683 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96683/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 94856
test-
Add support for the Xen HYPERVISOR_vm_assist hypercall.
Signed-off-by: Juergen Gross
Reviewed-by: Boris Ostrovsky
Reviewed-by: Julien Grall
Reviewed-by: Stefano Stabellini
---
arch/arm/include/asm/xen/hypercall.h | 1 +
arch/arm/xen/enlighten.c | 1 +
arch/arm/xen/hypercall.S
Update some Xen headers to be able to use new functionality.
Signed-off-by: Juergen Gross
Reviewed-by: Boris Ostrovsky
Reviewed-by: Stefano Stabellini
---
include/xen/interface/vcpu.h | 24 +++-
include/xen/interface/xen.h | 17 -
2 files changed, 31 insert
With most recent Xen hypervisor (4.8) it is now possible to add full
support of CONFIG_PARAVIRT_TIME_ACCOUNTING.
To be applied on top of commit ed2f61fdd2356c2a1d1239aa1507ce4e2e059306
"xen: add steal_clock support on x86" of kernel/git/xen/tip.git
Runtime tested on x86_64, compile tested on arm6
Up to now reading the stolen time of a remote cpu was not possible in a
performant way under Xen. This made support of runqueue steal time via
paravirt_steal_rq_enabled impossible.
With the addition of an appropriate hypervisor interface this is now
possible, so add the support.
Signed-off-by: Ju
On 05/07/16 17:23, Stefano Stabellini wrote:
> On Wed, 22 Jun 2016, Juergen Gross wrote:
>> Up to now reading the stolen time of a remote cpu was not possible in a
>> performant way under Xen. This made support of runqueue steal time via
>> paravirt_steal_rq_enabled impossible.
>>
>> With the addit
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm
testid debian-hvm-install
Tree: libvirt git://xenbits.xen.org/libvirt.git
Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git
I Konrad, first, thanks for your input and your time, it is much
appreciated.
I understand that those changes are torward the linux kernel, which is used
by xen compilation. I applied the changes and i'm rebuilding Qubes with xen
4.6.1 based on a kernel-4.1.24. Will test the build in the next days
Hello Julien,
On 07/05/2016 02:49 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> +static inline
>> +int p2m_set_altp2m_mem_access(struct domain *d, struct p2m_domain *hp2m,
>> + struct p2m_domain *ap2m, p2m_access_t a,
>> +
Hi Julien,
On 07/04/2016 10:34 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/2016 12:45, Sergej Proskurin wrote:
>> diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c
>> index ce1c3c3..413125f 100644
>> --- a/xen/arch/arm/guestcopy.c
>> +++ b/xen/arch/arm/guestcopy.c
>> @@ -1
Hi Julien,
On 07/05/2016 05:37 PM, Julien Grall wrote:
>
>
> On 05/07/16 15:48, Sergej Proskurin wrote:
>> On 07/04/2016 10:32 PM, Julien Grall wrote:
>>> On 04/07/2016 12:45, Sergej Proskurin wrote:
+p2m_load_altp2m_VTTBR(n);
+else
+p2m_load_VTTBR(n->domain);
On 07/05/16 21:37, Tamas K Lengyel wrote:
> The function vm_event_monitor_traps actually belongs in the monitor subsystem.
> As part of this patch we fix the sync input's type to bool_t to match how
> the callers use it.
>
> Signed-off-by: Tamas K Lengyel
> ---
> Cc: Jan Beulich
> Cc: Andrew Coo
Add entry for ACPI tables created for PVHv2 guests to e820 map.
Signed-off-by: Boris Ostrovsky
---
New patch
tools/libxc/include/xc_dom.h |4
tools/libxl/libxl_dom.c |8
tools/libxl/libxl_x86.c | 11 +++
3 files changed, 19 insertions(+), 4 deletions(-
flight 96675 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96675/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail
REGR. vs. 94748
test-amd64-i386-
This is V1 of the series posted earlier as an RFC
The goal here is to build ACPI tables for PVHv2/HVMlite guests while reusing
existing
hvmloader's ACPI builder code. The builder is provided as a library in
tools/libacpi.
Main changes from RFC are:
* Move toolstack code that loads the tables in
Signed-off-by: Boris Ostrovsky
---
tools/firmware/hvmloader/acpi/build.c | 68 +--
tools/firmware/hvmloader/acpi/libacpi.h |1 +
tools/firmware/hvmloader/util.c |2 +-
3 files changed, 39 insertions(+), 32 deletions(-)
diff --git a/tools/firmware/h
In prepearation to moving acpi sources into generally available
libacpi:
1. Move certain x86-specific definitions into acpi's x86.h
2. Modify include files serach paths to point to acpi
3. Macro-ise include file for build.c that defines various
utilities used by that file. Users of libacpi will
This way ACPI code won't use xenstore-read() and hvm_param_set()
which are private to hvmloader.
Signed-off-by: Boris Ostrovsky
---
This is one patch that modifies config->ainfo.vm_gid_addr in build.c, with that
change
consumed by the caller (when it sets VM_PARAM_VM_GENERATION_ID_ADDR). We cou
Components that wish to use ACPI builder will need to provide their own
mem_alloc() and virt_to_phys() routines. Pointers to these routines will
be passed to the builder as memory ops.
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* Keep memory ops seprate from acpi_config, in struct acpi_co
Signed-off-by: Boris Ostrovsky
---
tools/firmware/hvmloader/acpi/build.c |9 ++---
tools/firmware/hvmloader/acpi/libacpi.h |1 +
tools/firmware/hvmloader/util.c |3 ++-
3 files changed, 9 insertions(+), 4 deletions(-)
diff --git a/tools/firmware/hvmloader/acpi/build.c
acpi_info can be initialized by hvmloader itself. Now ACPI code
doesn't need to use hvmloader-private variables/routines such as
uart_exists(), lpt_exists() etc.
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* Create libacpi.h for libacpi interface definitions
* Move RSDP struct acpi_info poi
No need for ACPI code to rely on hvm_info.
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* Pass hvm_info_table pointer in acpi_config
tools/firmware/hvmloader/acpi/build.c | 53 ---
tools/firmware/hvmloader/acpi/libacpi.h | 13 +++
tools/firmware/hvmlo
Users other than hvmloader may provide TIS address as virtual.
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* Merged 'if' conditions to make the diff smaller
tools/firmware/hvmloader/acpi/build.c |9 -
tools/firmware/hvmloader/acpi/libacpi.h |3 +++
tools/firmware/hvmloa
With that, xenstore_read() won't need to be done in ACPI code
Signed-off-by: Boris Ostrovsky
---
tools/firmware/hvmloader/acpi/build.c | 20 +++-
tools/firmware/hvmloader/acpi/libacpi.h |7 +++
tools/firmware/hvmloader/util.c | 12
3 files chang
Initialize it in hvmloader, avoiding ACPI code's use of xenstore_read()
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* Rename acpi_pt_length/addr to pt_length/addr
tools/firmware/hvmloader/acpi/build.c | 22 +++---
tools/firmware/hvmloader/acpi/libacpi.h |5 +
In preparation for moving out ACPI builder make all
BIOSes call hvmloader_acpi_build_tables() instead of
calling ACPI code directly.
No functional changes.
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* Added last sentence to commit message
tools/firmware/hvmloader/ovmf.c|2 +-
t
Non-hvmloader users may be building tables in virtual address space
and therefore we need to make sure that values that end up in tables
are physical addresses.
Signed-off-by: Boris Ostrovsky
---
tools/firmware/hvmloader/acpi/build.c | 47 +
1 files changed, 24
ACPI sources will be available to various component which will build
them according to their own rules. ACPI's Makefile will only generate
necessary source files.
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* Build ASL and C files in target's (hvmloader) directory
.gitignore
PVH guests require DSDT with only ACPI INFO (Xen-specific) and Processor
objects. We separate ASL's ACPI INFO definition into dsdt_acpi_info.asl so
that it can be included in ASLs for both HVM and PVH2.
Signed-off-by: Boris Ostrovsky
---
New patch
tools/libacpi/Makefile | 24 ++
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* More checks, in more approriate places
xen/arch/x86/hvm/vlapic.c | 12 ++--
xen/arch/x86/hvm/vpt.c|2 +-
2 files changed, 11 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arch/x86/hvm/vlapic.c
ind
Signed-off-by: Boris Ostrovsky
---
tools/firmware/hvmloader/Makefile | 14 --
.../{firmware/hvmloader/acpi => libacpi}/Makefile |2 +-
tools/{firmware/hvmloader/acpi => libacpi}/README |0
.../{firmware/hvmloader/acpi => libacpi}/acpi2_0.h |0
tools/{f
Signed-off-by: Boris Ostrovsky
---
New patch
tools/libxl/Makefile|2 ++
tools/libxl/libxl_dom.c | 22 ++
2 files changed, 20 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/Makefile b/tools/libxl/Makefile
index 9fee752..3a2d64a 100644
--- a/tools/libxl/Make
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* Move to libxl
* Added populate_acpi_pages()
* Stash location/size of tables in xc_dom_image (to be used in constructing
e820 map)
* Use libxl allocator
* Only set XEN_X86_EMU_LAPIC flag if 'apic' option is set.
* Make acpi_build_tables() return
PVHv2 guests may request LAPIC emulation (and nothing else)
Signed-off-by: Boris Ostrovsky
---
Changes in v1:
* Refer to PVHv2 (not hvmlite)
xen/arch/x86/domain.c | 26 --
1 files changed, 16 insertions(+), 10 deletions(-)
diff --git a/xen/arch/x86/domain.c b/xen/arch
flight 96662 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96662/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 15 guest-start/debian.repeat fail REGR. vs. 96611
test-amd64-amd64-xl-
Signed-off-by: Tamas K Lengyel
Acked-by: Razvan Cojocaru
Acked-by: Wei Liu
---
Cc: Ian Jackson
---
tools/tests/xen-access/xen-access.c | 45 -
1 file changed, 44 insertions(+), 1 deletion(-)
diff --git a/tools/tests/xen-access/xen-access.c
b/tools/tests/xe
The function vm_event_monitor_traps actually belongs in the monitor subsystem.
As part of this patch we fix the sync input's type to bool_t to match how
the callers use it.
Signed-off-by: Tamas K Lengyel
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Razvan Cojocaru
---
xen/arch/x86/hvm/monitor.c
Add support for monitoring ARM SMC events. This patch only adds the required
bits to enable/disable monitoring and forwarding the event through vm_event.
Signed-off-by: Tamas K Lengyel
Acked-by: Razvan Cojocaru
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/Makefile | 1
In AArch32 state, the ARMv8-A architecture permits, but does not require,
this trap to apply to conditional SMC instructions that fail their condition
code check, in the same way as with traps on other conditional instructions.
Signed-off-by: Tamas K Lengyel
Suggested-by: Julien Grall
---
Cc: St
Add support for getting/setting registers through vm_event on ARM.
The set of registers can be expanded in the future to include other registers
as well if required. The set is limited to the GPRs, PC, CPSR and TTBR0/1 in
this patch.
Signed-off-by: Tamas K Lengyel
Acked-by: Razvan Cojocaru
---
C
These are the user-space components for the new ARM SMC events.
Signed-off-by: Tamas K Lengyel
Acked-by: Wei Liu
---
Cc: Ian Jackson
---
tools/libxc/include/xenctrl.h | 3 +++
tools/libxc/xc_monitor.c | 14 ++
2 files changed, 17 insertions(+)
diff --git a/tools/libxc/includ
On Fri, May 27, 2016 at 02:16:09AM -0600, Jan Beulich wrote:
> >>> On 25.05.16 at 18:45, wrote:
> > On Wed, May 25, 2016 at 01:03:42AM -0600, Jan Beulich wrote:
> >> >>> On 15.04.16 at 14:33, wrote:
> >> > Existing solution does not allocate space for this symbol and any
> >> > references to acpi
On Fri, Apr 15, 2016 at 02:33:12PM +0200, Daniel Kiper wrote:
> There is a problem with place_string() which is used as early memory
> allocator. It gets memory chunks starting from start symbol and
> going down. Sadly this does not work when Xen is loaded using multiboot2
> protocol because start
On Tue, Jul 05, 2016 at 01:44:43PM -0400, Daniel De Graaf wrote:
> This adds a Kconfig option and support for including the XSM policy from
> tools/flask/policy in the hypervisor so that the bootloader does not
> need to provide a policy to get sane behavior from an XSM-enabled
> hypervisor. The p
On 06/24/2016 06:34 AM, Jan Beulich wrote:
Note that we can't adjust HVM_IOREQSRV_BUFIOREQ_* to properly obey
name space rules, as these constants as in use by callers of the libxc
interface.
Signed-off-by: Jan Beulich
Reviewed-by: Wei Liu
Reviewed-by: Paul Durrant
Reviewed-by: Andrew Cooper
On 06/24/2016 06:33 AM, Jan Beulich wrote:
Signed-off-by: Jan Beulich
Reviewed-by: Wei Liu
Reviewed-by: Andrew Cooper
Acked-by: Daniel De Graaf
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 06/24/2016 06:32 AM, Jan Beulich wrote:
Signed-off-by: Jan Beulich
Reviewed-by: Wei Liu
Reviewed-by: Andrew Cooper
Acked-by: Daniel De Graaf
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 06/24/2016 06:32 AM, Jan Beulich wrote:
This allows elimination of the (ab)use of the high operation number
bits for encoding continuations.
Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of
the previous 64-bit parameter got ignore so far).
Signed-off-by: Jan Beulich
Rev
On 06/24/2016 06:31 AM, Jan Beulich wrote:
Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of
the previous 64-bit parameter got ignore so far).
Signed-off-by: Jan Beulich
Reviewed-by: Wei Liu
Reviewed-by: Andrew Cooper
Acked-by: Daniel De Graaf
_
On 06/24/2016 06:31 AM, Jan Beulich wrote:
Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of
the previous 64-bit parameter got ignore so far).
Signed-off-by: Jan Beulich
Reviewed-by: Wei Liu
Reviewed-by: Andrew Cooper
Acked-by: Daniel De Graaf
_
On 06/24/2016 06:30 AM, Jan Beulich wrote:
Note that this retains the hvmop interface definitions as those had
(wrongly) been exposed to non-tool stack consumers (albeit the
operation wouldn't have succeeded when requested by a domain for
itself).
Signed-off-by: Jan Beulich
Reviewed-by: Wei Liu
On 06/24/2016 06:29 AM, Jan Beulich wrote:
Note that this retains the hvmop interface definitions as those had
(wrongly) been exposed to non-tool stack consumers (albeit the
operation wouldn't have succeeded when requested by a domain for
itself).
Signed-off-by: Jan Beulich
Reviewed-by: Wei Liu
On 06/24/2016 06:28 AM, Jan Beulich wrote:
... as a means to replace all HVMOP_* which a domain can't issue on
itself (i.e. intended for use by only the control domain or device
model).
Signed-off-by: Jan Beulich
Reviewed-by: Wei Liu
Acked-by: Daniel De Graaf
_
On 07/04/2016 11:13 AM, Wei Liu wrote:
... from serial console and via sysctl so that one doesn't always need
to reboot to see more / less messages.
Note that upper thresholds driven from the serial console are sticky,
i.e. while they get adjusted upwards when the lower threshold would
otherwise
This adds a Kconfig option and support for including the XSM policy from
tools/flask/policy in the hypervisor so that the bootloader does not
need to provide a policy to get sane behavior from an XSM-enabled
hypervisor. The policy provided by the bootloader, if present, will
override the built-in
On 05/07/16 12:22, Anthony PERARD wrote:
> Hi,
>
> I've taken over the work from Ben to have a deprivileged mode in the
> hypervisor, but I'm unsure about which direction to take.
You should begin with an evaluation of available options, identifying
which issues are mitigated, those which are not,
On Tue, Jul 05, 2016 at 01:58:16PM +0100, George Dunlap wrote:
> On Tue, Jul 5, 2016 at 12:22 PM, Anthony PERARD
> wrote:
> > Hi,
> >
> > I've taken over the work from Ben to have a deprivileged mode in the
> > hypervisor, but I'm unsure about which direction to take.
> >
> > First, after understa
On 07/05/16 17:28, Corneliu ZUZU wrote:
> The arch_vm_event structure is dynamically allocated and freed @
> vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack
> user
> disables domain monitoring (xc_monitor_disable), which in turn effectively
> discards any information tha
On Thu, 23 Jun 2016, Julien Grall wrote:
> Hi Shannon,
>
> On 23/06/2016 04:17, Shannon Zhao wrote:
> > From: Shannon Zhao
> >
> > Copy all the ACPI tables to guest space so that UEFI or guest could
> > access them.
> >
> > Signed-off-by: Shannon Zhao
> > ---
> > tools/libxc/xc_dom_arm.c | 51
On Tue, Jul 05, 2016 at 07:02:39AM -0600, Jan Beulich wrote:
> >>> On 05.07.16 at 13:22, wrote:
> > Hi,
> >
> > I've taken over the work from Ben to have a deprivileged mode in the
> > hypervisor, but I'm unsure about which direction to take.
> >
> > First, after understanding what have been don
On Mon, 27 Jun 2016, Julien Grall wrote:
> Hi Shannon,
>
> On 27/06/16 02:44, Shannon Zhao wrote:
> > On 2016/6/24 0:26, Julien Grall wrote:
> > > On 23/06/16 04:16, Shannon Zhao wrote:
> > > > From: Shannon Zhao
> > > >
> > > > Construct GTDT table with the interrupt information of timers.
> >
flight 96652 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96652/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 94856
test-
On Wed, Jun 22, 2016 at 3:52 PM, Wei Liu wrote:
>> I think the best solution is to allow the osdep code to provide the
>> implementation of xengnttab_grant_copy_segment_t, allowing the Linux
>> code to do:
>>
>> typedef ioctl_gntdev_grant_copy_segment xengnttab_grant_copy_segment_t
>>
>> You shoul
On 07/05/16 17:30, Corneliu ZUZU wrote:
> Minor fixes:
> - remove some empty lines
> - remove some unused includes
> - multi-line comment fixes
> - 80-columns formatting fixes
>
> Signed-off-by: Corneliu ZUZU
> ---
> Changed since v1:
> ---
> xen/arch/arm/domain.c | 1 -
> xen/
From: Gerd Hoffmann
Commit "8156d48 pc: allow raising low memory via max-ram-below-4g
option" causes a regression on xen, because it uses a different
memory split.
This patch initializes max-ram-below-4g to zero and leaves the
initialization to the memory initialization functions. That way
they
>>> On 05.07.16 at 17:34, wrote:
> On Thu, Jun 30, 2016 at 03:10:11AM -0600, Jan Beulich wrote:
>> >>> On 29.06.16 at 18:27, wrote:
>> > On 29/06/16 17:19, Vitaly Kuznetsov wrote:
>> >> To explain better what I'm trying to suggest here please take a look at
>> >> the attached patch. If we can gua
On 05/07/16 15:48, Sergej Proskurin wrote:
On 07/04/2016 10:32 PM, Julien Grall wrote:
On 04/07/2016 12:45, Sergej Proskurin wrote:
+p2m_load_altp2m_VTTBR(n);
+else
+p2m_load_VTTBR(n->domain);
+
isb();
if ( is_32bit_domain(n->domain) )
@@ -119,22 +154,42 @@ vo
On Fri, Jul 01, 2016 at 01:19:51AM -0600, Jan Beulich wrote:
> >>> On 30.06.16 at 17:13, wrote:
> > On Thu, Jun 30, 2016 at 10:01:18AM -0400, Daniel De Graaf wrote:
> >> On 06/30/2016 09:45 AM, Konrad Rzeszutek Wilk wrote:
> >> > On Wed, Jun 29, 2016 at 11:09:01AM -0400, Daniel De Graaf wrote:
> >
On Thu, Jun 30, 2016 at 03:10:11AM -0600, Jan Beulich wrote:
> >>> On 29.06.16 at 18:27, wrote:
> > On 29/06/16 17:19, Vitaly Kuznetsov wrote:
> >> To explain better what I'm trying to suggest here please take a look at
> >> the attached patch. If we can guarantee long term that ACPI id always
> >
On 07/05/16 17:31, Corneliu ZUZU wrote:
> Move xen/paging.h #include from hvm/monitor.h to hvm/monitor.c (include
> strictly
> where needed) and also change to asm/paging.h (include strictly what's
> needed).
>
> Signed-off-by: Corneliu ZUZU
> ---
> Changed since v1:
> * preserve alphabetical
On Wed, 22 Jun 2016, Juergen Gross wrote:
> Up to now reading the stolen time of a remote cpu was not possible in a
> performant way under Xen. This made support of runqueue steal time via
> paravirt_steal_rq_enabled impossible.
>
> With the addition of an appropriate hypervisor interface this is
On Wed, 22 Jun 2016, Juergen Gross wrote:
> Update some Xen headers to be able to use new functionality.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Stefano Stabellini
> include/xen/interface/vcpu.h | 24 +++-
> include/xen/interface/xen.h | 17 -
> 2 f
On Wed, 22 Jun 2016, Juergen Gross wrote:
> Add support for the Xen HYPERVISOR_vm_assist hypercall.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Stefano Stabellini
> arch/arm/include/asm/xen/hypercall.h | 1 +
> arch/arm/xen/enlighten.c | 1 +
> arch/arm/xen/hypercall.S
>>> On 05.07.16 at 16:35, wrote:
> On Thu, Jun 23, 2016 at 4:42 PM, Tamas K Lengyel wrote:
+if ( !atomic_read(&d->pause_count) ||
+ !atomic_read(&cd->pause_count) )
+{
+rcu_unlock_domain(cd);
+rc = -E
On Tue, Jul 5, 2016 at 8:35 AM, George Dunlap wrote:
> On Thu, Jun 23, 2016 at 4:42 PM, Tamas K Lengyel wrote:
+if ( !atomic_read(&d->pause_count) ||
+ !atomic_read(&cd->pause_count) )
+{
+rcu_unlock_domain(cd);
+
On Wed, 29 Jun 2016, Anthony PERARD wrote:
> On Wed, Jun 29, 2016 at 05:50:48PM +0200, Juergen Gross wrote:
> > The qdisk implementation is using the native xenbus protocol only in
> > case of no protocol specified at all. As using the explicit 32- or
> > 64-bit protocol is slower than the native o
Hi Julien,
On 07/04/2016 10:32 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/2016 12:45, Sergej Proskurin wrote:
>> This commit makes sure that the TLB of a domain considers flushing all
>> of the associated altp2m views. Therefore, in case a different domain
>> (not the currently active d
On 05/07/16 15:28, Corneliu ZUZU wrote:
> The arch_vm_event structure is dynamically allocated and freed @
> vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack
> user
> disables domain monitoring (xc_monitor_disable), which in turn effectively
> discards any information tha
On Tue, Jul 5, 2016 at 8:31 AM, Corneliu ZUZU wrote:
> Move xen/paging.h #include from hvm/monitor.h to hvm/monitor.c (include
> strictly
> where needed) and also change to asm/paging.h (include strictly what's
> needed).
>
> Signed-off-by: Corneliu ZUZU
Acked-by: Tamas K Lengyel
___
On Tue, 5 Jul 2016, Julien Grall wrote:
> On 05/07/16 15:04, Stefano Stabellini wrote:
> > On Tue, 5 Jul 2016, Julien Grall wrote:
> > > On 05/07/16 14:53, Stefano Stabellini wrote:
> > > > On Thu, 30 Jun 2016, Dirk Behme wrote:
> > > > > +- clocks: one or more clocks to be registered.
> > > > > +
On Thu, Jun 23, 2016 at 4:42 PM, Tamas K Lengyel wrote:
>>> +if ( !atomic_read(&d->pause_count) ||
>>> + !atomic_read(&cd->pause_count) )
>>> +{
>>> +rcu_unlock_domain(cd);
>>> +rc = -EINVAL;
>>> +goto out;
>>>
Move xen/paging.h #include from hvm/monitor.h to hvm/monitor.c (include strictly
where needed) and also change to asm/paging.h (include strictly what's needed).
Signed-off-by: Corneliu ZUZU
---
Changed since v1:
* preserve alphabetical ordering
---
xen/arch/x86/hvm/monitor.c| 1 +
xen/
Minor fixes:
- remove some empty lines
- remove some unused includes
- multi-line comment fixes
- 80-columns formatting fixes
Signed-off-by: Corneliu ZUZU
---
Changed since v1:
---
xen/arch/arm/domain.c | 1 -
xen/arch/arm/traps.c | 1 -
xen/arch/x86/hvm/hvm.c
Minor fixes:
* vm_event_register_write_resume: ASSERT on non-NULL v->arch.vm_event instead of
&v->arch.vm_event->write_data.
* add 'unlikely' in if
Signed-off-by: Corneliu ZUZU
---
xen/arch/x86/hvm/hvm.c | 2 +-
xen/arch/x86/vm_event.c | 6 --
2 files changed, 5 insertions(+), 3 deletion
VM_EVENT_REASON_MOV_TO_MSR is X86-specific, surround w/ #ifdef accordingly.
Signed-off-by: Corneliu ZUZU
Acked-by: Razvan Cojocaru
---
Changed since v1:
---
xen/common/vm_event.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c
index 75bbbab..
Hi,
On 05/07/16 15:22, Dirk Behme wrote:
> On 05.07.2016 15:45, Andre Przywara wrote:
>> Hi,
>>
>> On 05/07/16 14:34, Julien Grall wrote:
>>> (CC Andre)
>>>
>>> On 05/07/16 14:04, Dirk Behme wrote:
On 05.07.2016 14:45, Julien Grall wrote:
>
>
> On 05/07/16 13:09, Dirk Behme wrote:
The arch_vm_event structure is dynamically allocated and freed @
vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack user
disables domain monitoring (xc_monitor_disable), which in turn effectively
discards any information that was in arch_vm_event.write_data.
But this can yi
For readability:
* Add function arch_monitor_write_data (in x86/monitor.c) and separate handling
of monitor_write_data there (previously done directly in hvm_do_resume).
* Separate enabling/disabling of CPU_BASED_CR3_LOAD_EXITING for CR3 monitor
vm-events from CR0 node @ vmx_update_guest_cr(v, 0)
Minor optimization @ vmx_update_guest_cr: checks if v->arch.hvm_vmx.exec_control
was modified before actually calling vmx_update_cpu_exec_control(v).
Signed-off-by: Corneliu ZUZU
---
Changed since v1:
---
xen/arch/x86/hvm/vmx/vmx.c | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff
This patch-series makes some adjustments and fixes to the X86 vm-events code.
Summary:
1. minor optimization
2. relocate some code into added vm-event functions
Acked-by: Razvan Cojocaru
3. fix monitor_write_data behavior on domain cleanup
Acked-by: Razvan Cojocaru
On 05.07.2016 15:45, Andre Przywara wrote:
Hi,
On 05/07/16 14:34, Julien Grall wrote:
(CC Andre)
On 05/07/16 14:04, Dirk Behme wrote:
On 05.07.2016 14:45, Julien Grall wrote:
On 05/07/16 13:09, Dirk Behme wrote:
Hi Julien,
On 05.07.2016 13:39, Julien Grall wrote:
Hi Dirk,
On 05/07/16 0
On 7/5/2016 9:57 PM, Jan Beulich wrote:
On 05.07.16 at 15:37, wrote:
Hi Stefano, Andrew and Jan:
Could you give us more guides here to move forward virtual iommu
development? Thanks.
Due to ...
On 6/29/2016 11:04 AM, Tian, Kevin wrote:
Please let us know your thoughts. If no one has expl
1 - 100 of 154 matches
Mail list logo