Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.10-rc4-tag
It contains a fix for Xen running in nested virtualization environment.
Thanks.
Juergen
drivers/xen/platform-pci.c | 71 ++
On 18/01/17 21:14, Boris Ostrovsky wrote:
> On 01/16/2017 09:15 AM, Juergen Gross wrote:
>> +
>> +static uint32_t xs_request_enter(struct xb_req_data *req)
>> +{
>> +uint32_t rq_id;
>> +
>> +req->type = req->msg.type;
>> +
>> +spin_lock(&xs_state_lock);
>> +for (;;) {
>> +
Add tools/tests/xenstore for a framework to do tests of xenstore.
The aim is to test for correctness and performance.
Add a test program containing some tests meant to be run against any
xenstore implementation (xenstored, oxenstored, xenstore-stubdom).
It is using libxenstore for access to xenst
On 17-01-18 10:11:15, Dario Faggioli wrote:
> On Wed, 2017-01-18 at 10:02 +0800, Yi Sun wrote:
> > This patch creates L2 CAT feature document in doc/features/.
> > It describes details of L2 CAT.
> >
> > Signed-off-by: Yi Sun
> > ---
> >
> Hey,
>
> it is very very useful to put _RIGHT_HERE_ a su
This patch implements L2 CAT set value related callback functions
and domctl interface.
Signed-off-by: Yi Sun
---
v5:
- remove type check in callback function.
- modify return value of callback functions because we do not need them
to return number of entries the feature uses. In ca
This patch implements the xl/xc changes to support set CBM
for L2 CAT.
The new level option is introduced to original CAT setting
command in order to set CBM for specified level CAT.
- 'xl psr-cat-cbm-set' is updated to set cache capacity
bitmasks(CBM) for a domain according to input cache level
This patch implements get HW info flow for CDP including L3 CDP callback
function.
It also changes sysctl function to make it work for CDP.
With this patch, 'psr-hwinfo' can work for L3 CDP.
Signed-off-by: Yi Sun
---
v5:
- rename 'dat[]' to 'data[]'
- remove type check in callback funct
As set value flow is the most complicated one in psr, it will be
divided to some patches to make things clearer. This patch
implements the set value framework to show a whole picture firstly.
It also changes domctl interface to make it more general.
To make the set value flow be general and can s
This patch implements changes in xl/xc changes to support
showing CBM of L2 CAT.
The new level option is introduced to original CAT showing
command in order to show CBM for specified level CAT.
- 'xl psr-cat-show' is updated to show CBM of a domain
according to input cache level.
Examples:
root
This patch implements get HW info flow for L2 CAT including L2 CAT callback
function.
Signed-off-by: Yi Sun
---
v5:
- rename 'dat[]' to 'data[]'
- remove type check in callback function.
---
xen/arch/x86/psr.c | 16
xen/arch/x86/sysctl.c | 15 +
This patch implements L3 CDP set value related callback functions.
With this patch, 'psr-cat-cbm-set' command can work for L3 CDP.
Signed-off-by: Yi Sun
---
v5:
- remove type check in callback function.
- modify return value of callback functions because we do not need them
to retu
This patch implements L2 CAT get value callback function and
interface in domctl.
Signed-off-by: Yi Sun
---
v5:
- remove type check in callback function.
---
xen/arch/x86/domctl.c | 7 +++
xen/arch/x86/psr.c | 12
xen/include/public/domctl.h | 1 +
3 files c
This patch adds L2 CAT description in related documents.
Signed-off-by: He Chen
Signed-off-by: Yi Sun
---
docs/man/xl.pod.1.in | 25 ++---
docs/misc/xl-psr.markdown | 10 --
2 files changed, 30 insertions(+), 5 deletions(-)
diff --git a/docs/man/xl.pod.1.in b/d
This patch implements xl/xc changes to support get HW info
for L2 CAT.
'xl psr-hwinfo' is updated to show both L3 CAT and L2 CAT
info.
Example(on machine which only supports L2 CAT):
Cache Monitoring Technology (CMT):
Enabled : 0
Cache Allocation Technology (CAT): L2
Socket ID : 0
M
This patch implements L3 CDP get value callback function.
With this patch, 'psr-cat-show' can work for L3 CDP.
Signed-off-by: Yi Sun
---
v5:
- remove type check in callback function.
---
xen/arch/x86/psr.c | 16
1 file changed, 16 insertions(+)
diff --git a/xen/arch/x86/ps
This patch implements the CPU init and free flow for CDP including L3 CDP
initialization callback function.
Signed-off-by: Yi Sun
---
v5:
- remove 'feat_l3_cdp' free in 'free_feature'.
- Encapsulate cpuid registers into 'struct cpuid_leaf_regs'.
- Print socket info when 'opt_cpu_info'
The current cache allocation codes in psr.c do not consider
future features addition and are not friendly to extend.
To make psr.c be more flexible to add new features and fulfill
the program principle, open for extension but closed for
modification, we have to refactor the psr.c:
1. Analyze cache
Continue with patch:
'x86: refactor psr: set value: assemble features value array'
We can try to find if there is a COS ID on which all features' COS registers
values are same as the array assembled before.
Signed-off-by: Yi Sun
---
v5:
- modify commit message to provide exact patch name to
This patch implements the Domain init/free and schedule flows.
Signed-off-by: Yi Sun
---
v5:
- define macro 'PSR_ASSOC_REG_POS' to replace integer 32.
- rename 'l3_cat_get_max_cos_max' to 'l3_cat_get_cos_max'.
- modify variables names to make them better, e.g. 'feat_tmp' to 'feat'.
--
This patch implements the CPU init and free flow for L2 CAT including
L2 CAT initialization callback function.
Signed-off-by: Yi Sun
---
v5:
- remove 'feat_l2_cat' free in 'free_feature'.
- Encapsulate cpuid registers into 'struct cpuid_leaf_regs'.
- Print socket info when 'opt_cpu_in
To construct an extendible framework, we need analyze PSR features
and abstract the common things and feature specific things. Then,
encapsulate them into different data structures.
By analyzing PSR features, we can get below map.
+--+--+--+
->| Dom0 | Dom
Continue with previous patch:
'x86: refactor psr: set value: implement cos id picking flow.'
We have got all features values and COS ID to set. Then, we write MSRs of all
features except the setting value is same as original value.
Till now, set value process is completed.
Signed-off-by: Yi Sun
This patch implements get HW info flow including L3 CAT callback
function.
It also changes sysctl interface to make it more general.
With this patch, 'psr-hwinfo' can work for L3 CAT.
Signed-off-by: Yi Sun
---
v5:
- add function 'psr_cbm_type_to_feat_type' to covert 'cbm_type' to
'psr
Continue with previous patch:
'x86: refactor psr: set value: implement cos finding flow.'
If fail to find a COS ID, we need pick a new COS ID for domain. Only COS ID
that ref[COS_ID] is 1 or 0 can be picked to input a new set feature values.
Signed-off-by: Yi Sun
---
v5:
- modify commit mess
This patch implements the CPU init and free flow including L3 CAT
initialization and feature list free.
Signed-off-by: Yi Sun
---
v5:
- modify commit message beacuse of code changes.
- add 'struct cpuid_leaf_regs' to save cpu registers value to reduce
parameters of init_feature func
This patch implements get value flow including L3 CAT callback
function.
It also changes domctl interface to make it more general.
With this patch, 'psr-cat-show' can work for L3 CAT.
Signed-off-by: Yi Sun
---
v5:
- rename 'dat[]' to 'data[]'
- modify variables names to make them better
Only can one COS ID be used by one domain at one time. That means all enabled
features' COS registers at this COS ID are valid for this domain at that time.
When user updates a feature's value, we need make sure all other features'
values are not affected. So, we firstly need assemble an array whi
This patch creates L2 CAT feature document in doc/features/.
It describes details of L2 CAT.
Signed-off-by: Yi Sun
---
docs/features/intel_psr_l2_cat.pandoc | 347 ++
1 file changed, 347 insertions(+)
create mode 100644 docs/features/intel_psr_l2_cat.pandoc
diff
Hi all,
We plan to bring a new PSR (Platform Shared Resource) feature called
Intel L2 Cache Allocation Technology (L2 CAT) to Xen.
Besides the L2 CAT implementaion, we refactor the psr.c to make it more
flexible to add new features and fulfill the principle, open for extension
but closed for modi
The only call to have_wrcomb() was always to the generic implementation.
positive_have_wrcomb() was unused.
Signed-off-by: Doug Goldstein
Acked-by: Jan Beulich
---
Retaining ACK from <57b480fd027800106...@prv-mh.provo.novell.com>
---
---
xen/arch/x86/cpu/mtrr/generic.c | 5 -
xen/arch/x
These weren't used so drop them.
Signed-off-by: Doug Goldstein
Reviewed-by: Jan Beulich
---
Retained R-b from <57b48184027800106...@prv-mh.provo.novell.com>
---
xen/arch/x86/cpu/mtrr/mtrr.h | 15 ---
1 file changed, 15 deletions(-)
diff --git a/xen/arch/x86/cpu/mtrr/mtrr.h b/xe
This field is always only 1 currently but may allow 0 in the future so
convert it to a bool to provide proper range checking by the compiler.
Signed-off-by: Doug Goldstein
---
xen/arch/x86/cpu/mtrr/generic.c | 2 +-
xen/arch/x86/cpu/mtrr/mtrr.h| 4 ++--
2 files changed, 3 insertions(+), 3 de
Retained the parts that were not objected to by plans to disable mtrrs on
PVH containers.
Doug Goldstein (3):
x86/mtrr: drop positive_have_wrcomb()
x86/mtrr: drop unused func prototypes and struct
x86/mtrr: convert use_intel_if u32 to bool
xen/arch/x86/cpu/mtrr/generic.c | 7 +--
xen/
Hi Julien,
On 12/29/2016 07:34 PM, Julien Grall wrote:
> Hi all,
>
> The document below is an early version of a design
> proposal for PCI Passthrough in Xen. It aims to
> describe from an high level perspective the interaction
> with the different subsystems and how guest will be able
> to disco
From: Vineeth Remanan Pillai
During an OOM scenario, request slots could not be created as skb
allocation fails. So the netback cannot pass in packets and netfront
wrongly assumes that there is no more work to be done and it disables
polling. This causes Rx to stall.
The issue is with the retry
This run is configured for baseline tests only.
flight 68391 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68391/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-i3863 host-install(3) broken bas
On 1/18/17 2:40 PM, Andrew Cooper wrote:
> With accurate vendor information available, the shared bits can be sorted out
> during recalculation, rather than at query time in the legacy cpuid path.
>
> This means that:
> * Duplication can be dropped from the automatically generated cpuid data.
>
On 1/18/17 2:40 PM, Andrew Cooper wrote:
> Leaves 0x8002 through 0x8004 are plain ASCII text, and require no
> specific recalculation.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Doug Goldstein
--
Doug Goldstein
signature.asc
Description: OpenPGP digital signature
___
On 1/18/17 2:40 PM, Andrew Cooper wrote:
> The calculations for p->extd.max_leaf are reworked to force a value of at
> least 0x8000, and to take the domains chosen vendor into account when
> clamping maximum value.
>
> The high short vendor information is clobbered or duplicated according to t
On 1/18/17 2:40 PM, Andrew Cooper wrote:
> Calculate a domains x86_vendor early in recalculate_cpuid_policy(); subsequent
> patches need to make other recalculation decisions based on it.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Doug Goldstein
--
Doug Goldstein
signature.asc
Descripti
On 1/18/17 2:40 PM, Andrew Cooper wrote:
> Include a min() against the appropriate ARRAY_SIZE(), and ASSERT() that
> max_subleaf is within ARRAY_SIZE().
>
> This is more robust to unexpected problems in a release build of Xen.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Doug Goldstein
--
D
On 1/18/17 2:40 PM, Andrew Cooper wrote:
> The VT-x/SVM features are hidden from PV dom0 by the pv_featureset[] upper
> mask, but nothing thusfar has prevented the features being visible in
thus far? Could be the difference between British English and American
English.
> HVM-based control domains
From: Daniel Kiper
Build xen.gz with EFI code. We need this to support multiboot2
protocol on EFI platforms.
If we wish to load non-ELF file using multiboot (v1) or multiboot2 then
it must contain "linear" (or "flat") representation of code and data.
This is requirement of both boot protocols. C
This is a series based on v11 of Daniel Kiper's
"x86: multiboot2 protocol support" series. It aims to collect up all the
fixes and changes that Andrew Cooper, Jan Beulich and myself discovered in
code review and testing on actual hardware. I've had problems with the
relocation portion of the series
This should be squashed into the 4/4 patch 'x86: add multiboot2 protocol
support for EFI platforms'.
- fix incorrect assembly (identified by Andrew Cooper)
- fix issue where the trampoline size was left as 0 and the
way the memory is allocated for the trampolines we would go to
the end of an a
From: Daniel Kiper
There is a problem with place_string() which is used as early memory
allocator. It gets memory chunks starting from start symbol and goes
down. Sadly this does not work when Xen is loaded using multiboot2
protocol because then the start lives on 1 MiB address and we should
not
From: Daniel Kiper
This way Xen can be loaded on EFI platforms using GRUB2 and
other boot loaders which support multiboot2 protocol.
Signed-off-by: Daniel Kiper
Reviewed-by: Doug Goldstein
Tested-by: Doug Goldstein
---
Doug v2 - dropped all my changes and moved them into their own patch
Doug
From: Daniel Kiper
Add multiboot2 protocol support. Alter min memory limit handling as we
now may not find it from either multiboot (v1) or multiboot2.
This way we are laying the foundation for EFI + GRUB2 + Xen development.
Signed-off-by: Daniel Kiper
Reviewed-by: Jan Beulich
Reviewed-by: Do
On 1/18/17 4:25 PM, Daniel Kiper wrote:
> On Wed, Jan 18, 2017 at 07:52:44AM -0700, Jan Beulich wrote:
>>
>> ... the comment style here fixed (which could be done upon commit
>> or when Daniel merges this back into his series).
>
> Hmmm... Why this patch and #0 was not CC-ed to me?
>
You say thi
flight 68390 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68390/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 3 host-install(3) broken RE
flight 104261 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104261/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 88fd27e5b2cae68ff5a11cd5560ef5f98d001c42
baseline version:
ovmf 7be6e6776253d3638f033
flight 104251 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104251/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 103795
test-armhf-armhf-libvirt
flight 104276 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104276/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On Wed, Jan 18, 2017 at 11:10:32PM +0100, Dario Faggioli wrote:
> Hey,
>
> I'm afraid I can't comment on nothing, as I'm not at all into go.
>
> But there's a thing that I've noticed while skipping the patch out of
> curiosity...
>
> On Wed, 2017-01-18 at 14:56 -0500, Ronald Rojas wrote:
> > dif
This run is configured for baseline tests only.
flight 68389 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68389/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-armhf-xsm 3 host-install(3) br
On Wed, Jan 18, 2017 at 03:47:26PM -0600, Eric DeVolder wrote:
> This contains the two corrections pointed out by Jan Beulich
> for the kexec STATUS call just introduced.
>
> Note: In kexec_status(), the use of test_bit() can also return
> EPERM, so the return value from test_bit() must be checked
On Wed, Jan 18, 2017 at 03:47:28PM -0600, Eric DeVolder wrote:
> The use of test_bit() can also return EPERM, so the
> return value from test_bit() must be checked to
> ensure that kexec_status() always returns 0, 1 or
> -1, per the public header description.
>
> Signed-off-by: Eric DeVolder
Revi
On Wed, Jan 18, 2017 at 03:47:27PM -0600, Eric DeVolder wrote:
> This blank line was accidentally removed during
> the insertion of the kexec_status() declarations.
>
> Signed-off-by: Eric DeVolder
Reviewed-by: Daniel Kiper
Daniel
___
Xen-devel maili
On Wed, 2017-01-18 at 14:56 -0500, Ronald Rojas wrote:
> Create error type Errorxl for throwing proper xenlight
> errors.
>
> Update Ctx functions to throw Errorxl errors.
>
> Signed-off-by: Ronald Rojas
> ---
> tools/golang/xenlight/xenlight.go | 77
> +--
>
Hey,
I'm afraid I can't comment on nothing, as I'm not at all into go.
But there's a thing that I've noticed while skipping the patch out of
curiosity...
On Wed, 2017-01-18 at 14:56 -0500, Ronald Rojas wrote:
> diff --git a/tools/Makefile b/tools/Makefile
> index 77e0723..fd49e7f 100644
> --- a/
This blank line was accidentally removed during
the insertion of the kexec_status() declarations.
Signed-off-by: Eric DeVolder
---
xen/include/public/kexec.h | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/include/public/kexec.h b/xen/include/public/kexec.h
index c200e8c..74ea981 100644
The use of test_bit() can also return EPERM, so the
return value from test_bit() must be checked to
ensure that kexec_status() always returns 0, 1 or
-1, per the public header description.
Signed-off-by: Eric DeVolder
---
xen/common/kexec.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
This contains the two corrections pointed out by Jan Beulich
for the kexec STATUS call just introduced.
Note: In kexec_status(), the use of test_bit() can also return
EPERM, so the return value from test_bit() must be checked to
ensure that kexec_status() always returns 0, 1 or -1, per the
public
flight 104250 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104250/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-amd 13 xen-boot/l1 fail REGR. vs. 103850
Regressions whi
On Wed, 18 Jan 2017, Julien Grall wrote:
> >From the GICv3 spec (IHI069C) section 4.1.1:
> "The effects of reading ICC_IAR0_EL1 and ICC_IAR1_EL1 on the state of a
> returned INTID are not guaranteed to be visible until after the execution
> of a DSB".
>
> Because of the GIC is an external componen
On Wed, Jan 18, 2017 at 07:52:44AM -0700, Jan Beulich wrote:
> >>> On 18.01.17 at 15:17, wrote:
> > This should be squashed into the 4/4 patch 'x86: add multiboot2 protocol
> > support for EFI platforms'.
> >
> > - fix incorrect assembly (identified by Andrew Cooper)
> > - fix issue where the tram
On Wed, Jan 18, 2017 at 12:01:06PM -0600, Eric DeVolder wrote:
> This contains the two corrections pointed out by Jan Beulich
> for the kexec STATUS call just introduced.
>
> Note: In kexec_status(), the use of test_bit() can also return
> EPERM, so the return value from test_bit() must be checked
On Wed, 18 Jan 2017, Oleksandr Andrushchenko wrote:
> On 01/12/2017 08:36 AM, Oleksandr Andrushchenko wrote:
> > On 01/12/2017 12:50 AM, Dario Faggioli wrote:
> > > On Wed, 2017-01-11 at 20:40 +0200, Oleksandr Andrushchenko wrote:
> > > > On 01/11/2017 07:35 PM, Dario Faggioli wrote:
> > > > > It
On 01/18/2017 12:10 PM, David Miller wrote:
This v2 never made it into patchwork. I don't know why, so please resend it to
netdev with the accumulated reviewed-by etc. tags added.
Thanks.
Sorry about that. Will resend as a separate thread right away.
Thanks
On Wed, 18 Jan 2017, Andrii Anisov wrote:
> Dear Stefano,
>
>
> > Only one suggestion more. For this to work correctly, we are assuming
> > that no foreging pages are involved here, which is a very reasonable
> > assumption given that mmap should be called on memory returned by
> > dma_alloc_cohe
On 01/16/2017 09:15 AM, Juergen Gross wrote:
> +
> +static uint32_t xs_request_enter(struct xb_req_data *req)
> +{
> + uint32_t rq_id;
> +
> + req->type = req->msg.type;
> +
> + spin_lock(&xs_state_lock);
> + for (;;) {
> + if (req->msg.tx_id != 0)
> +
From: Igor Druzhinin
Date: Tue, 17 Jan 2017 20:49:36 +
> Just split the initial patch in two as proposed by Wei.
>
> Since the approach for locking netdev statistics is inconsistent (tends not
> to have any locking at all) accross the kernel we'd better to rely on our
> internal lock for thi
This v2 never made it into patchwork. I don't know why, so please resend it to
netdev with the accumulated reviewed-by etc. tags added.
Thanks.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
From: Vineeth Remanan Pillai
Date: Wed, 18 Jan 2017 09:02:17 -0800
>
> On 01/15/2017 10:24 PM, Juergen Gross wrote:
>> On 13/01/17 18:55, Remanan Pillai wrote:
>>> From: Vineeth Remanan Pillai
>>>
>>> During an OOM scenario, request slots could not be created as skb
>>> allocation fails. So the
On 1/18/17 2:51 PM, Andrew Cooper wrote:
> On 18/01/17 14:17, Doug Goldstein wrote:
>> diff --git a/xen/arch/x86/boot/head.S b/xen/arch/x86/boot/head.S
>> index d423fd8..ac93df0 100644
>> --- a/xen/arch/x86/boot/head.S
>> +++ b/xen/arch/x86/boot/head.S
>> @@ -89,6 +89,13 @@ multiboot2_header_start:
On Thu, Jan 12, 2017 at 04:44:42AM -0700, Jan Beulich wrote:
> >>> On 10.01.17 at 23:57, wrote:
> > Changes in v13:
> > - Implement feedback from Kevin Tian.
> >
> > https://lists.xenproject.org/archives/html/xen-devel/2015-10/msg03169.html
> >
> > https://lists.xenproject.org/archives/h
Include both constants and a Stringification for libxl_scheduler.
Signed-off-by: George Dunlap
Signed-off-by: Ronald Rojas
---
tools/golang/xenlight/xenlight.go | 72 +++
1 file changed, 72 insertions(+)
diff --git a/tools/golang/xenlight/xenlight.go
b/tool
Create error type Errorxl for throwing proper xenlight
errors.
Update Ctx functions to throw Errorxl errors.
Signed-off-by: Ronald Rojas
---
tools/golang/xenlight/xenlight.go | 77 +--
1 file changed, 73 insertions(+), 4 deletions(-)
diff --git a/tools/golan
Create a basic Makefile to build and install libxenlight Golang
bindings. Also add a stub package which only opens libxl context.
Include a global xenlight.Ctx variable which can be used as the
default context by the entire program if desired.
For now, return simple errors. Proper error handling
Implement Bitmap type, along with helper functions.
The Bitmap type is implemented interllay in a way which makes it
easy to copy into and out of the C libxl_bitmap type.
Signed-off-by: George Dunlap
Signed-off-by: Ronald Rojas
---
tools/golang/xenlight/xenlight.go | 167 ++
Add calls for the following host-related functionality:
- libxl_domain_info
- libxl_domain_unpause
Include Golang version for the libxl_domain_info as
DomainInfo.
Signed-off-by: George Dunlap
Signed-off-by: Ronald Rojas
---
tools/golang/xenlight/xenlight.go | 91 +++
On 18/01/17 14:17, Doug Goldstein wrote:
> This should be squashed into the 4/4 patch 'x86: add multiboot2 protocol
> support for EFI platforms'.
>
> - fix incorrect assembly (identified by Andrew Cooper)
> - fix issue where the trampoline size was left as 0 and the
> way the memory is allocated
On 18/01/17 14:17, Doug Goldstein wrote:
> diff --git a/xen/arch/x86/boot/head.S b/xen/arch/x86/boot/head.S
> index d423fd8..ac93df0 100644
> --- a/xen/arch/x86/boot/head.S
> +++ b/xen/arch/x86/boot/head.S
> @@ -89,6 +89,13 @@ multiboot2_header_start:
> 0, /* Number of the lines
Leaves 0x8002 through 0x8004 are plain ASCII text, and require no
specific recalculation.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpuid.c| 3 +++
xen/include/asm-x86/cpuid.h | 4 ++--
2 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/xen/ar
Include a min() against the appropriate ARRAY_SIZE(), and ASSERT() that
max_subleaf is within ARRAY_SIZE().
This is more robust to unexpected problems in a release build of Xen.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpuid.c | 5 +++--
1 file changed, 3 insertions(+)
Calculate a domains x86_vendor early in recalculate_cpuid_policy(); subsequent
patches need to make other recalculation decisions based on it.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpuid.c| 13 -
xen/arch/x86/domctl.c | 10 ++
xen/in
The VT-x/SVM features are hidden from PV dom0 by the pv_featureset[] upper
mask, but nothing thusfar has prevented the features being visible in
HVM-based control domains (where there is no toolstack decision to hide the
features).
As a side effect of calling nestedhvm_enabled() earlier during dom
The following series (with any luck) is sufficient to allow PVH-dom0's to
function without any CPUID policy hackary during construction.
Andrew Cooper (6):
x86/cpuid: Hide VT-x/SVM from HVM-based control domains
x86/cpuid: Remove BUG_ON() condition from guest_cpuid()
x86/cpuid: Handle leaf 0
The calculations for p->extd.max_leaf are reworked to force a value of at
least 0x8000, and to take the domains chosen vendor into account when
clamping maximum value.
The high short vendor information is clobbered or duplicated according to the
chosen vendor.
Signed-off-by: Andrew Cooper
--
On 01/12/2017 08:36 AM, Oleksandr Andrushchenko wrote:
On 01/12/2017 12:50 AM, Dario Faggioli wrote:
On Wed, 2017-01-11 at 20:40 +0200, Oleksandr Andrushchenko wrote:
On 01/11/2017 07:35 PM, Dario Faggioli wrote:
It's indeed a repetition, but a good one, IMO: it helps the reader,
as
she won'
With accurate vendor information available, the shared bits can be sorted out
during recalculation, rather than at query time in the legacy cpuid path.
This means that:
* Duplication can be dropped from the automatically generated cpuid data.
* The toolstack need not worry about setting them app
On 01/18/2017 08:52 PM, Stefano Stabellini wrote:
On Wed, 18 Jan 2017, Ughreja, Rakesh A wrote:
-Original Message-
From: Stefano Stabellini [mailto:sstabell...@kernel.org]
Sent: Wednesday, January 18, 2017 5:41 AM
To: Ughreja, Rakesh A
Cc: xen-devel@lists.xen.org; oleksandr_andrushche..
On 01/17/2017 12:29 PM, Paul Durrant wrote:
The handle type passed to the underlying shadow and hap functions is
changed for compatibility with the new hypercall buffer.
NOTE: This patch also modifies the type of the 'nr' parameter of
xc_hvm_track_dirty_vram() from uint64_t to uint32_t. In
On Wed, Jan 18, 2017 at 10:31:32AM -0500, Sowmini Varadhan wrote:
> As I was playing around with pf_packet, I accidentally wrote
> a buggy application program that bzero'ed the msghdr, then set
> up the msg_name, msg_namelen correctly, and then did a sendmsg
> on the pf_packet/SOCK_RAW fd.
>
> Thi
On Wed, 18 Jan 2017, Andrii Anisov wrote:
> Stefano,
>
> About this piece:
>
> >
> > - if (__generic_dma_ops(dev)->get_sgtable)
> > +
> > + if (__generic_dma_ops(dev)->get_sgtable) {
> > + /* We can't handle foreign pages here. */
> > +#ifdef CONFIG_ARM
> > +
On 01/17/2017 12:29 PM, Paul Durrant wrote:
NOTE: This patch also modifies the types of the 'vector', 'type' and
'insn_len' arguments of xc_hvm_inject_trap() from uint32_t to
uint8_t. In practice the values passed were always truncated to
8 bits.
Suggested-by: Jan Beulich
Sign
On 01/17/2017 12:29 PM, Paul Durrant wrote:
This patch removes the need for handling HVMOP restarts, so that
infrastructure is removed.
NOTE: This patch also modifies the type of the 'nr' argument of
xc_hvm_set_mem_type() from uint64_t to uint32_t. In practice the
value passed was al
On 01/17/2017 12:29 PM, Paul Durrant wrote:
This patch introduces code to handle DMOP continuations.
NOTE: This patch also modifies the type of the 'nr' argument of
xc_hvm_modified_memory() from uint64_t to uint32_t. In practice the
value passed was always truncated to 32 bits.
Sugg
On 01/17/2017 12:29 PM, Paul Durrant wrote:
... HVMOP_set_pci_link_route
These HVMOPs were exposed to guests so their definitions need to be
preserved for compatibility. This patch therefore updates
__XEN_LATEST_INTERFACE_VERSION__ to 0x00040900 and makes the HVMOP
defintions conditional on __XE
On 01/17/2017 12:29 PM, Paul Durrant wrote:
The definitions of HVM_IOREQSRV_BUFIOREQ_* have to persist as they are
already in use by callers of the libxc interface.
Suggested-by: Jan Beulich
Signed-off-by: Paul Durrant
Acked-by: Daniel De Graaf
_
1 - 100 of 236 matches
Mail list logo