>>> On 01.08.16 at 22:11, wrote:
> On Fri, Jul 29, 2016, at 09:03 AM, Konrad Rzeszutek Wilk wrote:
>> It may very well be added.
>>
>> But having extra test-confirmation is always good.
>
> looking at the patch
>
> diff --git a/include/linux/efi.h b/include/linux/efi.h
> index c2db3
On Mon, Jul 25, 2016 at 1:03 PM, Razvan Cojocaru
wrote:
> On 07/25/2016 11:29 AM, sepanta s wrote:
> > Hi,
> > Is there an API in Xen to get the page content of a known gfn ?
> > I want to calculate the checksum of the content of the page and wanna
> > see if it
> > is possible ?
>
> You can map
There are two functions with name xen_pmu_init() in the kernel. Rename
the one in drivers/xen/sys-hypervisor.c to avoid shadowing the one in
arch/x86/xen/pmu.c
To avoid the same problem in future rename some more functions.
Signed-off-by: Juergen Gross
---
V2: rename more *_init() functions as s
The default for the Xen hypervisor is to not enable VPMU in order to
avoid security issues. In this case the Linux kernel will issue the
message "Could not initialize VPMU for cpu 0, error -95" which looks
more like an error than a normal state.
Change the message to something less scary in case t
>>> On 27.07.16 at 01:32, wrote:
> I'm running Xen-4.7.0_08-452 + linux kernel 4.7.0-4.g89a2ada-default on
> X86_64 UEFI hardware.
>
> If I boot without Xen hypervisor enabled it boots fine.
>
> If I boot with Xen enabled it PANICs:
>
> (XEN) [2016-07-26 22:05:33] Hardware Dom0 cra
Instead of calling xen_be_register() for each supported backend type
for hvm and pv guests in their machine init functions use a common
function in order not to have to add new backends twice.
This at once fixes the error that hvm domains couldn't use the qusb
backend.
Signed-off-by: Juergen Gros
On Sat, Jul 23, 2016 at 3:49 PM, sepanta s wrote:
>
>>> Hi,
>>> Is there any sample code which I can undestand how to capture the events
>>> on the gfns which have p2m_ram_shared enabled ?
>>> I couldn't find any ... .
>>> I would be grateful if any help , as there is not any documents through
>>
>>> On 02.08.16 at 01:19, wrote:
> On Monday 01 August 2016 07:19:51 Jan Beulich wrote:
>> >>> On 01.08.16 at 04:52, wrote:
>> > @@ -4412,6 +4412,7 @@ x86_emulate(
>> > case 0x7f: /* movq mm,mm/m64 */
>> > /* {,v}movdq{a,u} xmm,xmm/m128 */
>> > /* vmovdq{a,u
>>> On 01.08.16 at 19:11, wrote:
> On 01/08/16 17:06, Jan Beulich wrote:
> On 01.07.16 at 18:51, wrote:
>>> How about a different example, from the second hunk
>>>
>>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>>> @@ -832,8 +832,19 @@ static
On 08/01/16 19:27, Tamas K Lengyel wrote:
> On Mon, Aug 1, 2016 at 10:15 AM, Julien Grall wrote:
>>
>>
>> On 01/08/16 16:59, Tamas K Lengyel wrote:
>>>
>>> On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote:
>>> IMHO we should just pause the domain while mem_access permissions are
>>> being chang
flight 99892 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99892/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-xsm 3 host-install(3) broken in 99889 pass in 99892
test-armhf-armhf-xl-credit2 6 x
On Fri, 29 Jul 2016, Juergen Gross wrote:
> When a Xenstore watch fires indicating a backend has to be removed
> don't remove all backends for that domain with the specified device
> index, but just the one which has the correct type.
>
> The easiest way to achieve this is to use the already deter
This run is configured for baseline tests only.
flight 66881 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66881/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 3 host-install(3)
flight 99891 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99891/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-rumpuserxen 6 xen-buildfail like 99886
build-i386-rumpuserxen
On Monday 01 August 2016 07:19:51 Jan Beulich wrote:
> >>> On 01.08.16 at 04:52, wrote:
> > @@ -4412,6 +4412,7 @@ x86_emulate(
> > case 0x7f: /* movq mm,mm/m64 */
> > /* {,v}movdq{a,u} xmm,xmm/m128 */
> > /* vmovdq{a,u} ymm,ymm/m256 */
> > +case 0xd6: /*
On 01/08/2016 19:15, Julien Grall wrote:
> On 01/08/16 18:10, Sergej Proskurin wrote:
>>
>> Hello all,
>
> Hello Sergej,
>
>> The following patch series can be found on Github[0] and is part of my
>> contribution to this year's Google Summer of Code (GSoC)[1]. My
>> project is
>> managed by the org
Horse is already WAY out of the barn on this, but just realizing the
instructions say to
> Please tag your subject line with a '[BUG]' prefix.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Mon, Aug 1, 2016 at 1:55 PM, Julien Grall wrote:
>
>
> On 01/08/2016 20:20, Tamas K Lengyel wrote:
>>
>> On Mon, Aug 1, 2016 at 12:15 PM, Julien Grall
>> wrote:
>>>
>>> On 01/08/16 18:10, Sergej Proskurin wrote:
Hello all,
>>>
>>>
>>>
>>> Hello Sergej,
>>>
The followin
Hi Julien,
On 08/01/2016 09:55 PM, Julien Grall wrote:
>
>
> On 01/08/2016 20:20, Tamas K Lengyel wrote:
>> On Mon, Aug 1, 2016 at 12:15 PM, Julien Grall
>> wrote:
>>> On 01/08/16 18:10, Sergej Proskurin wrote:
Hello all,
>>>
>>>
>>> Hello Sergej,
>>>
The following patch ser
On Fri, Jul 29, 2016, at 09:03 AM, Konrad Rzeszutek Wilk wrote:
> It may very well be added.
>
> But having extra test-confirmation is always good.
looking at the patch
diff --git a/include/linux/efi.h b/include/linux/efi.h
index c2db3ca..f196dd0 100644
--- a/include/linu
On 01/08/2016 20:20, Tamas K Lengyel wrote:
On Mon, Aug 1, 2016 at 12:15 PM, Julien Grall wrote:
On 01/08/16 18:10, Sergej Proskurin wrote:
Hello all,
Hello Sergej,
The following patch series can be found on Github[0] and is part of my
contribution to this year's Google Summer of Code
On Mon, Aug 1, 2016 at 12:15 PM, Julien Grall wrote:
> On 01/08/16 18:10, Sergej Proskurin wrote:
>>
>>
>> Hello all,
>
>
> Hello Sergej,
>
>> The following patch series can be found on Github[0] and is part of my
>> contribution to this year's Google Summer of Code (GSoC)[1]. My project is
>> man
Hello Everyone,
I am one of the students selected under FreeBSD for Google Summer of Code
this year.
My project was to implement a user-space grant table device for FreeBSD and
add the appropriate bindings for the device in Xen, to enable the qdisk
backends. (More details:
http://akshayjaggi.me/
flight 99889 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99889/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-xsm 3 host-install(3) broken REGR. vs. 99872
test-armhf-armhf-xl
This run is configured for baseline tests only.
flight 66880 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66880/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm3 ho
flight 99890 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99890/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
Hi,
I realised I made a confusing mistake in my last reply; clarification below.
On Mon, Aug 01, 2016 at 06:26:54PM +0100, Mark Rutland wrote:
> On Mon, Aug 01, 2016 at 05:57:50PM +0100, Julien Grall wrote:
> > however we only need one TLBI instruction (assuming there is
> > no superpage shatteri
flight 99886 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99886/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 15 guest-start/debian.repeatfail like 99864
build-amd64-rumpuserxen
On 01/08/16 18:10, Sergej Proskurin wrote:
Hello all,
Hello Sergej,
The following patch series can be found on Github[0] and is part of my
contribution to this year's Google Summer of Code (GSoC)[1]. My project is
managed by the organization The Honeynet Project. As part of GSoC, I am being
Add support for getting/setting registers through vm_event on ARM. Only
TTB/CR/R0/R1, PC and CPSR are sent as part of a request and only PC is set
as part of a response. The set of registers can be expanded in the future to
include other registers as well if necessary.
Signed-off-by: Tamas K Lengy
Hi Andrew,
On 08/01/2016 07:21 PM, Andrew Cooper wrote:
> On 01/08/16 18:10, Sergej Proskurin wrote:
>> diff --git a/xen/include/asm-arm/altp2m.h b/xen/include/asm-arm/altp2m.h
>> index 0711796..d47b249 100644
>> --- a/xen/include/asm-arm/altp2m.h
>> +++ b/xen/include/asm-arm/altp2m.h
>> @@ -22,6
On 01/08/16 18:10, Sergej Proskurin wrote:
> diff --git a/xen/include/asm-arm/altp2m.h b/xen/include/asm-arm/altp2m.h
> index 0711796..d47b249 100644
> --- a/xen/include/asm-arm/altp2m.h
> +++ b/xen/include/asm-arm/altp2m.h
> @@ -22,6 +22,8 @@
>
> #include
>
> +#define altp2m_enabled(d) ((d)-
On Mon, Aug 01, 2016 at 05:57:50PM +0100, Julien Grall wrote:
> On 01/08/16 17:34, Mark Rutland wrote:
> >On Mon, Aug 01, 2016 at 04:40:50PM +0100, Julien Grall wrote:
> >>After I read again multiple time the ARM ARM (D4-1732 in ARM DDI
> >>0487A.i) and spoke with various ARM folks, changing the pe
Signed-off-by: Sergej Proskurin
Acked-by: Razvan Cojocaru
---
Cc: Razvan Cojocaru
Cc: Tamas K Lengyel
Cc: Ian Jackson
Cc: Wei Liu
---
tools/tests/xen-access/xen-access.c | 27 +--
1 file changed, 17 insertions(+), 10 deletions(-)
diff --git a/tools/tests/xen-access/x
Currently mem-sharing can be performed on a page-by-page basis from the control
domain. However, this process is quite wasteful when a range of pages have to
be deduplicated.
This patch introduces a new mem_sharing memop for range sharing where
the user doesn't have to separately nominate each pag
This run is configured for baseline tests only.
flight 66878 linux-4.1 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66878/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-
The function get_page_from_gva uses ARM's hardware support to translate
gva's to machine addresses. This function is used, among others, for
memory regulation purposes, e.g, within the context of memory ballooning.
To ensure correct behavior while altp2m is in use, we use the host's p2m
table for t
The struct vttbr introduces a simple way to precisely access the
individual fields of the vttbr.
---
xen/arch/arm/p2m.c | 8
xen/arch/arm/traps.c| 2 +-
xen/include/asm-arm/p2m.h | 2 +-
xen/include/asm-arm/processor.h | 16
4 files chang
This commit changes the prototype of the following functions:
- p2m_alloc_vmid
- p2m_free_vmid
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/p2m.c | 12 +---
1 file changed, 5 insertions(+), 7 deletions(-)
diff --git a/xen/arch/arm/p2m.c
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v2: Substituted the call to tlb_flush for p2m_flush_table.
Added comments.
Cosmetic fixes.
---
xen/arch/arm/altp2m.c| 50
xen/arch/arm/hvm.c |
This commit adds the function "altp2m_lazy_copy" implementing the altp2m
paging mechanism. The function "altp2m_lazy_copy" lazily copies the
hostp2m's mapping into the currently active altp2m view on 2nd stage
translation violations on instruction or data access. Every altp2m
violation generates a
This commit changes the prototype of the following functions:
- apply_p2m_changes
- apply_one_level
- p2m_insert_mapping
- p2m_remove_mapping
These changes are required as our implementation reuses most of the
existing ARM p2m implementation to set page table attributes of the
individual altp2m vi
This commit extends xen-access by a simple test of the functionality
provided by "xc_altp2m_change_gfn". The idea is to dynamically remap a
trapping gfn to another mfn, which holds the same content as the
original mfn.
Signed-off-by: Sergej Proskurin
---
Cc: Razvan Cojocaru
Cc: Tamas K Lengyel
The HVMOP HVMOP_altp2m_set_mem_access allows to set gfn permissions of
(currently one page at a time) of a specific altp2m view. In case the
view does not hold the requested gfn entry, it will be first copied from
the hostp2m table and then modified as requested.
Signed-off-by: Sergej Proskurin
-
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v2: Dump p2m information of the hostp2m and all altp2m views.
---
xen/arch/arm/p2m.c | 20
1 file changed, 20 insertions(+)
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index 2f4751b..8
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/altp2m.c| 32
xen/arch/arm/hvm.c | 2 +-
xen/include/asm-arm/altp2m.h | 4
3 files changed, 37 insertions(+), 1 deletion(-)
diff --git a/xen/ar
This commit introduces the function "altp2m_propagate_change" that is
responsible to propagate changes applied to the host's p2m to a specific
or even all altp2m views. In this way, Xen can in-/decrease the guest's
physmem at run-time without leaving the altp2m views with
stalled/invalid entries.
This commit extends the functionality of the function "__p2m_lookup".
The function "__p2m_lookup" performs the necessary steps gathering
information concerning memory attributes and the p2m table level a
specific gfn is mapped to. Thus, we extend the function's prototype so
that the caller can opti
This commit extends the function "p2m_mem_access_check" to consider
altp2m. Also, the new implementation fills the request buffer to hold
altp2m-related information.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/p2m.c | 17 +++--
1 fil
On 01/08/16 17:06, Jan Beulich wrote:
On 01.07.16 at 18:51, wrote:
>> How about a different example, from the second hunk
>>
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -832,8 +832,19 @@ static int read_ulong(
>> static bool_t mul_dbl
The initially named function "p2m_alloc_table" allocated pages solely
required for the host's p2m. The new implementation leaves p2m
allocation related parts inside of this function to generally initialize
p2m/altp2m tables. This is done generically, as the host's p2m and
altp2m tables are allocate
This commit moves the altp2m-related code from x86 to ARM. Functions
that are no yet supported notify the caller or print a BUG message
stating their absence.
Also, the struct arch_domain is extended with the altp2m_active
attribute, representing the current altp2m activity configuration of the
do
The current implementation differentiates between flushing and
destroying altp2m views. This commit adds the function altp2m_flush,
which allows to flush all or individual altp2m views without destroying
the entire table. In this way, altp2m views can be reused at a later
point in time.
Signed-off
This commit adopts the x86 HVMOP_altp2m_get_domain_state implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c | 9 -
xen/include/asm-arm/altp2m.h | 2 ++
2 files changed, 10 insertions(+), 1 deletion(-)
diff --git
Hello all,
The following patch series can be found on Github[0] and is part of my
contribution to this year's Google Summer of Code (GSoC)[1]. My project is
managed by the organization The Honeynet Project. As part of GSoC, I am being
supervised by the Xen developer Tamas K. Lengyel , George
D. W
This commit pulls out generic init/teardown functionality out of
p2m_init and p2m_teardown into p2m_init_one, p2m_free_one, and
p2m_flush_table functions. This allows our future implementation to
reuse existing code for the initialization/teardown of altp2m views.
Signed-off-by: Sergej Proskurin
This commit adapts the function "p2m_restore_state" in a way that the
currently active altp2m table is considered during state restoration.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/p2m.c | 4 +++-
xen/include/asm-arm/altp2m.h | 3 ++
The current implementation allows to set the parameter HVM_PARAM_ALTP2M.
This parameter allows further usage of altp2m on ARM. For this, we
define an additional, common altp2m field as part of the
libxl_domain_type struct. This field can be set on x86 and on ARM systems
through the "altp2m" switch
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
v2: Cosmetic fixes.
---
xen/arch/arm/altp2m.c| 23 +++
xen/arch/arm/hvm.c | 3 ++-
xen/include/asm-arm/altp2m.h | 4
3 files changed, 29 insertions(+), 1 deletion(-)
dif
The HVMOP_altp2m_set_domain_state allows to activate altp2m on a
specific domain. This commit adopts the x86
HVMOP_altp2m_set_domain_state implementation. Note that the function
altp2m_flush is currently implemented in form of a stub.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc
This commit adds the functionality to change mfn mappings for specified
gfn's in altp2m views. This mechanism can be used within the context of
VMI, e.g., to establish stealthy debugging.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/altp2m.c
The p2m initialization now invokes initialization routines responsible
for the allocation and initialization of altp2m structures. The same
applies to teardown routines. The functionality has been adopted from
the x86 altp2m implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabelli
I want to run Xen+Linux Dom0 host on server-grade UEFI hardware.
I want to use current stable releases of Xen (4.7) and Linux kernel (4.7).
I prefer to use distro packages when possible, but the current distro packages
I use crash on Xen boot.
I can't keep having things down for days or weeks a
Introduce and use the nonnull attribute to help the compiler catch NULL
parameters being passed to function which require their parameters not to be
NULL. Experimentally, GCC 4.9 on Debian Jessie only warns of non-NULL-ness
from immediate callers, so propagate the attributes out to all helpers.
A
On 01/08/16 17:34, Mark Rutland wrote:
Hi Julien,
Hi Mark,
On Mon, Aug 01, 2016 at 04:40:50PM +0100, Julien Grall wrote:
Hi Razvan,
On 28/07/16 16:04, Razvan Cojocaru wrote:
On 07/28/2016 05:51 PM, Julien Grall wrote:
The function p2m_set_mem_access can be re-implemented using the gener
The two functions monitor_traps and mem_access_send_req duplicate some of the
same functionality. The mem_access_send_req however leaves a lot of the
standard vm_event fields to be filled by other functions.
Remove mem_access_send_req() completely, making use of monitor_traps() to put
requests int
On Mon, Aug 1, 2016 at 10:33 AM, Julien Grall wrote:
>
>
> On 01/08/16 17:27, Tamas K Lengyel wrote:
>>
>> On Mon, Aug 1, 2016 at 10:15 AM, Julien Grall
>> wrote:
>>>
>>>
>>>
>>> On 01/08/16 16:59, Tamas K Lengyel wrote:
On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall
wrote:
>>>
Hi Julien,
On Mon, Aug 01, 2016 at 04:40:50PM +0100, Julien Grall wrote:
> Hi Razvan,
>
> On 28/07/16 16:04, Razvan Cojocaru wrote:
> >On 07/28/2016 05:51 PM, Julien Grall wrote:
> >>The function p2m_set_mem_access can be re-implemented using the generic
> >>functions p2m_get_entry and __p2m_set
uintptr_t is specified as unsigned int in 32bit, not unsigned long. This is
why, when copying inttypes.h from GCC, the use of PRIxPTR and similar is
broken for 32bit builds.
Use __attribute__((__mode__(__pointer__))) to get the compilers default
pointer type, which matches the pre-existing inttyp
On 01/08/16 17:27, Tamas K Lengyel wrote:
On Mon, Aug 1, 2016 at 10:15 AM, Julien Grall wrote:
On 01/08/16 16:59, Tamas K Lengyel wrote:
On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote:
IMHO we should just pause the domain while mem_access permissions are
being changed. On x86 it is n
On Mon, Aug 1, 2016 at 10:15 AM, Julien Grall wrote:
>
>
> On 01/08/16 16:59, Tamas K Lengyel wrote:
>>
>> On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote:
>> IMHO we should just pause the domain while mem_access permissions are
>> being changed. On x86 it is not necessary as the mem_access
>>
A OS could decide to not pass arguments or any environment variables to
hotplug scripts, and this will trigger a bug in device_hotplug logic, since
it expects both the argument and the environment arrays to exist. Allow
both args or env to be NULL.
Signed-off-by: Roger Pau Monné
---
Cc: Wei Liu
>>> On 01.08.16 at 18:08, wrote:
> On 01/08/16 16:51, Jan Beulich wrote:
> On 01.08.16 at 15:14, wrote:
>>> uintptr_t is specified as unsigned int in 32bit, not unsigned long. This is
>>> why, when copying inttypes.h from GCC, the use of PRIxPTR and similar is
>>> broken for 32bit builds.
>>
On 01/08/16 16:59, Tamas K Lengyel wrote:
On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote:
IMHO we should just pause the domain while mem_access permissions are
being changed. On x86 it is not necessary as the mem_access
bookkeeping is kept in the ept pte entries but since on ARM the two
th
On Mon, Aug 1, 2016 at 4:33 AM, Julien Grall wrote:
> Hello Tamas,
>
> On 29/07/16 23:26, Tamas K Lengyel wrote:
>>
>> However, as this patch really only touches
>> things that belong to mem_access/monitor components maybe we should
>> split these from the generic ARM code altogether to avoid such
On 01/08/16 16:51, Jan Beulich wrote:
On 01.08.16 at 15:14, wrote:
>> uintptr_t is specified as unsigned int in 32bit, not unsigned long. This is
>> why, when copying inttypes.h from GCC, the use of PRIxPTR and similar is
>> broken for 32bit builds.
> I don't think this is strictly the case,
>>> On 01.07.16 at 18:51, wrote:
> How about a different example, from the second hunk
>
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -832,8 +832,19 @@ static int read_ulong(
> static bool_t mul_dbl(unsigned long m[2])
> {
> bool_t rc;
On 01/08/16 17:46, Boris Ostrovsky wrote:
> On 08/01/2016 11:44 AM, Juergen Gross wrote:
>> On 01/08/16 16:10, Boris Ostrovsky wrote:
>>> On 08/01/2016 07:40 AM, Juergen Gross wrote:
There are two functions with name xen_pmu_init() in the kernel. Rename
the one in drivers/xen/sys-hypervis
On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote:
> Hi Razvan,
>
> On 28/07/16 16:04, Razvan Cojocaru wrote:
>>
>> On 07/28/2016 05:51 PM, Julien Grall wrote:
>>>
>>> The function p2m_set_mem_access can be re-implemented using the generic
>>> functions p2m_get_entry and __p2m_set_entry.
>>>
>>>
>>> On 01.08.16 at 15:14, wrote:
> Suggested-by: Jan Beulich
> Signed-off-by: Andrew Cooper
Just like before, in case it's not implied:
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 01.08.16 at 15:14, wrote:
> uintptr_t is specified as unsigned int in 32bit, not unsigned long. This is
> why, when copying inttypes.h from GCC, the use of PRIxPTR and similar is
> broken for 32bit builds.
I don't think this is strictly the case, i.e. doing it this way still ties
us to in
On 08/01/2016 11:48 AM, Juergen Gross wrote:
> On 01/08/16 16:11, Konrad Rzeszutek Wilk wrote:
>> On Mon, Aug 01, 2016 at 01:41:20PM +0200, Juergen Gross wrote:
>>> The default for the Xen hypervisor is to not enable VPMU in order to
>>> avoid security issues. In this case the Linux kernel will iss
On 01/08/16 16:11, Konrad Rzeszutek Wilk wrote:
> On Mon, Aug 01, 2016 at 01:41:20PM +0200, Juergen Gross wrote:
>> The default for the Xen hypervisor is to not enable VPMU in order to
>> avoid security issues. In this case the Linux kernel will issue the
>> message "Could not initialize VPMU for c
Hi Razvan,
On 28/07/16 16:04, Razvan Cojocaru wrote:
On 07/28/2016 05:51 PM, Julien Grall wrote:
The function p2m_set_mem_access can be re-implemented using the generic
functions p2m_get_entry and __p2m_set_entry.
Note that because of the implementation of p2m_get_entry, a TLB
invalidation ins
On 08/01/2016 11:44 AM, Juergen Gross wrote:
> On 01/08/16 16:10, Boris Ostrovsky wrote:
>> On 08/01/2016 07:40 AM, Juergen Gross wrote:
>>> There are two functions with name xen_pmu_init() in the kernel. Rename
>>> the one in drivers/xen/sys-hypervisor.c to avoid shadowing the one in
>>> arch/x86/
This run is configured for baseline tests only.
flight 66879 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66879/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd
>>> On 01.08.16 at 15:14, wrote:
> As xen/stdbool.h is included, the typedef should use bool rather than _Bool.
>
> Suggested-by: Jan Beulich
I think this implies it, but just in case you think it doesn't ...
> Signed-off-by: Andrew Cooper
...:
Acked-by: Jan Beulich
__
On 01/08/16 16:10, Boris Ostrovsky wrote:
> On 08/01/2016 07:40 AM, Juergen Gross wrote:
>> There are two functions with name xen_pmu_init() in the kernel. Rename
>> the one in drivers/xen/sys-hypervisor.c to avoid shadowing the one in
>> arch/x86/xen/pmu.c
>>
>> Signed-off-by: Juergen Gross
>
>
>>> On 01.08.16 at 12:05, wrote:
> * Use _PAGE_AVAIL_HIGH and _PAGE_NX instead of opencoding them
> * Drop further remenants of the 32bit hypervisor build
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-de
>>> On 27.07.16 at 20:08, wrote:
> --- a/xen/include/xen/compiler.h
> +++ b/xen/include/xen/compiler.h
> @@ -62,6 +62,8 @@
>
> #define __must_check __attribute__((__warn_unused_result__))
>
> +#define __nonnull(...) __attribute__((nonnull (__VA_ARGS__)))
May I ask to use __nonnull__ here, to
>>> On 28.07.16 at 17:58, wrote:
> On 27/07/16 19:08, Andrew Cooper wrote:
>> Introduce and use the nonnull attribute to help the compiler catch NULL
>> parameters being passed to function which require their parameters not to be
>> NULL. Experimentally, GCC 4.9 on Debian Jessie only warns of non
>>> On 26.07.16 at 18:15, wrote:
> --- a/xen/arch/x86/hvm/mtrr.c
> +++ b/xen/arch/x86/hvm/mtrr.c
> @@ -814,10 +814,17 @@ int epte_get_entry_emt(struct domain *d, unsigned long
> gfn, mfn_t mfn,
> if ( gmtrr_mtype == -EADDRNOTAVAIL )
> return -1;
>
> -gmtrr_mtype = is_hvm_domai
flight 99888 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/99888/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 07783fdd67e40fa7cff3ebf34399c1ab65937802
baseline version:
ovmf 3d8fab5719a52d67cd4666b
>>> On 26.07.16 at 17:45, wrote:
> Change the message so that it mentions running from the top level directory
> and using '-C xen' in order to call the 'menuconfig' target inside of the
> xen directory (there's no top-level menuconfig target).
Well, I'm not convinced whether this end up clarifyi
On Mon, 1 Aug 2016 16:22:18 +0200
"Jan Beulich" wrote:
> >>> On 01.08.16 at 16:15, wrote:
>[...]
> > But let me repeat: if PV kexec works, then it has always had priority
> > over the hypercall. If it doesn't work, then it has always been broken.
> > For the latter case, I agree that the kernel
>>> On 18.07.16 at 20:39, wrote:
First of all, for the title: Is what you do really similar to Linux? Iirc
there System.map is simply output from nm.
> Also note that during runtime one can do:
> 82d080104920 t domain.c#do_domain_pause
I can't seem to make sense of this.
> @@ -307,6 +308,1
On Monday 01 August 2016 15:53:56 Andrew Cooper wrote:
> On 01/08/16 15:48, Mihai Donțu wrote:
> > > I'd rather pick a fixed register and update the regs->... field from that
> > > after the stub was executed. E.g. using rAX and treating it just like a
> > > return value of the "call". But maybe I'
On 01/08/16 15:59, Jan Beulich wrote:
On 01.08.16 at 16:55, wrote:
>> On Monday 01 August 2016 17:48:33 Mihai Donțu wrote:
>>> On Monday 01 August 2016 07:43:20 Jan Beulich wrote:
>>> Your suggestion makes sense, but I'm starting to doubt my initial
>>> patch. :-) I'm testing "movq xm
>>> On 01.08.16 at 16:55, wrote:
> On Monday 01 August 2016 17:48:33 Mihai Donțu wrote:
>> On Monday 01 August 2016 07:43:20 Jan Beulich wrote:
>> > > > > Your suggestion makes sense, but I'm starting to doubt my initial
>> > > > > patch. :-) I'm testing "movq xmm1, xmm1" and noticing that it take
>>> On 01.08.16 at 16:48, wrote:
> On Monday 01 August 2016 07:43:20 Jan Beulich wrote:
>> > > > Your suggestion makes sense, but I'm starting to doubt my initial
>> > > > patch. :-) I'm testing "movq xmm1, xmm1" and noticing that it takes the
>> > > > GPR-handling route and I can't seem to be abl
1 - 100 of 196 matches
Mail list logo