This run is configured for baseline tests only.
flight 72178 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72178/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf aa57c0f096e2e0d555038fc63caea34398f219e6
baseline v
flight 113921 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113921/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c46bced224b42d5a03bc8b207167829aa4e7bc5b
baseline version:
ovmf aa57c0f096e2e0d555038
On Sat, Sep 30, 2017 at 12:39 AM, Paolo Bonzini wrote:
> On 29/09/2017 17:47, Lai Jiangshan wrote:
>> Hello, all
>>
>> An interesting (at least to me) thinking came up to me when I found
>> that the lguest was removed. But I don't have enough knowledge
>> to find out the answer nor energy to imple
Hello, all
An interesting (at least to me) thinking came up to me when I found
that the lguest was removed. But I don't have enough knowledge
to find out the answer nor energy to implement it in some time.
Is it possible to implement kvm-pv which allows kvm to run on
the boxes without hardware vi
flight 113916 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113916/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stopfail REGR. vs. 113387
Tests which did not succeed
flight 113917 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113917/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf aa57c0f096e2e0d555038fc63caea34398f219e6
baseline version:
ovmf 27daa8658e518902bf281
- Lai Jiangshan ha scritto:
> On Sat, Sep 30, 2017 at 12:39 AM, Paolo Bonzini wrote:
> > On 29/09/2017 17:47, Lai Jiangshan wrote:
> >> Hello, all
> >>
> >> An interesting (at least to me) thinking came up to me when I found
> >> that the lguest was removed. But I don't have enough knowledge
This patch creates MBA feature document in doc/features/. It describes
key points to implement MBA which is described in details in Intel SDM
"Introduction to Memory Bandwidth Allocation".
Signed-off-by: Yi Sun
---
CC: Jan Beulich
CC: Andrew Cooper
CC: Wei Liu
CC: Ian Jackson
CC: Daniel De Gr
This patch implements the new libxl get hw info interface,
'libxl_psr_get_hw_info', which is suitable to all psr allocation
features. It also implements corresponding list free function,
'libxl_psr_hw_info_list_free' and makes 'libxl_psr_cat_get_info' call
'libxl_psr_get_hw_info' to avoid redundant
This patch implements set value flow for MBA including its callback
function and domctl interface.
It also changes the memebers in 'cos_write_info' to transfer the
feature array, feature properties array and value array. Then, we
can write all features values on the cos id into MSRs.
Because mult
This patch implements get HW info flow for MBA including its callback
function and sysctl interface.
Signed-off-by: Yi Sun
---
CC: Jan Beulich
CC: Andrew Cooper
CC: Wei Liu
CC: Roger Pau Monné
CC: Chao Peng
v5:
- use ASSERT in 'mba_get_feat_info'.
(suggested by Roger Pau Monné)
This patch implements get value domctl interface for MBA.
Signed-off-by: Yi Sun
Reviewed-by: Roger Pau Monné
Acked-by: Jan Beulich
---
CC: Andrew Cooper
CC: Wei Liu
CC: Chao Peng
v5:
- use newly defined macro to get MBA thrtl.
(suggested by Roger Pau Monné)
v4:
- remove 'ALLOC
This patch creates general interfaces in libxl to support all psr
allocation features.
Add 'LIBXL_HAVE_PSR_GENERIC' to indicate interface change.
Please note, the functionality cannot work until later patches
are applied.
Signed-off-by: Yi Sun
---
CC: Wei Liu
CC: Ian Jackson
CC: Roger Pau Mon
This patch implements generic get value interfaces in libxc and libxl.
It also refactors the get value flow in xl to make it be suitable for all
allocation features. Based on that, a new MBA get value command is added in xl.
Signed-off-by: Yi Sun
Acked-by: Wei Liu
---
CC: Ian Jackson
CC: Roger
Hi, all,
We plan to bring a new PSR (Platform Shared Resource) feature called
Intel Memory Bandwidth Allocation (MBA) to Xen.
Besides the MBA enabling, we change some interfaces to make them more
general but not only for CAT.
Any comments are welcome!
You can find this series at:
https://github
This patch implements a new libxc get hw info interface and corresponding
data structures. It also changes libxl_psr.c to call this new interface.
Signed-off-by: Yi Sun
---
CC: Wei Liu
CC: Ian Jackson
CC: Roger Pau Monné
CC: Chao Peng
v5:
- directly define 'xc_psr_hw_info' as union type.
This patch renames 'cbm_type' to 'psr_type' to generalize it.
Then, we can reuse this for all psr allocation features.
Signed-off-by: Yi Sun
Reviewed-by: Wei Liu
Reviewed-by: Roger Pau Monné
Acked-by: Jan Beulich
---
CC: Andrew Cooper
CC: Chao Peng
v5:
- correct character of reviewer's
This patch implements new generic set value interfaces in libxc and libxl.
These interfaces are suitable for all allocation features. It also adds a
new MBA set value command in xl.
Signed-off-by: Yi Sun
---
CC: Wei Liu
CC: Ian Jackson
CC: Roger Pau Monné
CC: Chao Peng
v5:
- move xc_type
This patch adds MBA description in related documents.
Signed-off-by: Yi Sun
Acked-by: Wei Liu
Reviewed-by: Roger Pau Monné
---
CC: Ian Jackson
CC: Chao Peng
v5:
- remove 'closed-loop' in 'xl-psr.markdown'
(suggested by Roger Pau Monné)
v4:
- modify description of MBA in 'xl.pod
This patch renames 'xc_psr_cat_type' to 'xc_psr_type' so that
the structure name is common for all allocation features.
Signed-off-by: Yi Sun
Acked-by: Wei Liu
Reviewed-by: Chao Peng
Reviewed-by: Roger Pau Monné
---
CC: Ian Jackson
v5:
- remove a duplicated ';'.
(suggested by Roger
This patch implements main data structures of MBA.
Like CAT features, MBA HW info has cos_max which means the max thrtl
register number, and thrtl_max which means the max throttle value
(delay value). It also has a flag to represent if the throttle
value is linear or non-linear.
One thrtl registe
This patch refines psr codes:
1. Change type of 'cat_init_feature' to 'bool' to remove the pointless
returning of error code.
2. Move printk in 'cat_init_feature' to reduce a return path.
3. Define a local variable 'ebx' in 'psr_cpu_init' to reduce calling of
'cpuid_count_leaf()'.
4. Change t
This patch renames PSR sysctl/domctl interfaces and related xsm policy to
make them be general for all resource allocation features but not only
for CAT. Then, we can resuse the interfaces for all allocation features.
Basically, it changes 'psr_cat_op' to 'psr_alloc', and remove 'CAT_' from some
m
This patch implements a new xl get HW info interface. A new argument
is added for psr-hwinfo command to get and show MBA HW info.
Signed-off-by: Yi Sun
Reviewed-by: Roger Pau Monné
---
CC: Wei Liu
CC: Ian Jackson
CC: Chao Peng
v3:
- change the format string of printf in 'psr_mba_hwinfo'.
flight 113913 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113913/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 16 guest-localmigrate/x10 fail REGR. vs.
113902
Regressions
This fixes hitting this BUG_ON():
xen/common/sched_credit2.c:3452
rqd = c2rqd(ops, cpu);
BUG_ON(!cpumask_test_cpu(cpu, &rqd->active));
when Credit2 is used as default scheduler, and a
cpupool, also using Credit2, is created.
The bug hit because c2rqd() accesses
rqd[per_cpu(runq_map,cpu)]->acti
flight 113914 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113914/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
flight 113909 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113909/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm 6 xen-build fail in 113899 REGR. vs. 113387
Tests which are fa
On Fri, 29 Sep 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 09/29/2017 09:10 PM, Stefano Stabellini wrote:
> > On Wed, 27 Sep 2017, Bhupinder Thakur wrote:
> > > DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
> > > xencons_queued() to tell the current size of the ring buff
Hi Stefano,
On 09/29/2017 09:10 PM, Stefano Stabellini wrote:
On Wed, 27 Sep 2017, Bhupinder Thakur wrote:
DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
xencons_queued() to tell the current size of the ring buffer,
xencons_mask() to mask off the index, which are useful h
DO NOT MERGE
This patch contains test code for programming stream tables for PCIe devices
seen by DOM0. This change can be used on top of [1].
[1] [RFC v2 0/7] SMMUv3 driver and the supporting framework
---
xen/arch/arm/physdev.c| 41 +--
xen/drive
flight 113912 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113912/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On 9/29/2017 10:20 AM, John P. McDermott (USN Civilian) wrote:
>
>> On Sep 29, 2017, at 11:57 AM, John P. McDermott (USN Civilian)
>> wrote:
>>
>>
>>> On Sep 29, 2017, at 11:31 AM, John P. McDermott (USN Civilian)
>>> wrote:
>>>
>>>
On Sep 29, 2017, at 11:25 AM, Roger Pau Monné wrote:
On Wed, 27 Sep 2017, Bhupinder Thakur wrote:
> DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
> xencons_queued() to tell the current size of the ring buffer,
> xencons_mask() to mask off the index, which are useful helper functions.
> pl011 emulation code will use these helpe
On 29/09/17 19:32, Boris Ostrovsky wrote:
> On 09/29/2017 01:53 PM, Andrew Cooper wrote:
>> On AMD processors which support SMEP (Some Fam16h processors) and SMAP (Zen,
>> Fam17h), a guest which is running with shadow paging and clears CR0.PG while
>> keeping CR4.{SMEP,SMAP} set will livelock, as h
On Fri, 29 Sep 2017, Bhupinder Thakur wrote:
> This patch fixes the wrong range check done in cmp_mmio_handler().
>
> This function returns -1 , 0 or 1 based on whether the key value
> is below the range, in the range or above the range where the range is
> (start, start+size). However, it should
flight 113902 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113902/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl 6 xen-install fail in 113896 pass in 113902
test-amd64-i386-xl-qemut-win7-amd
An update to CR4 following a CR0 update can be done easily by falling
through into the CR4 case. This avoids unnecessary passes through
vmx_vmcs_{enter,exit}() and unnecessary stack usage (as the compiler
cannot optimise this use to a tailcall).
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
On 09/29/2017 01:53 PM, Andrew Cooper wrote:
> On AMD processors which support SMEP (Some Fam16h processors) and SMAP (Zen,
> Fam17h), a guest which is running with shadow paging and clears CR0.PG while
> keeping CR4.{SMEP,SMAP} set will livelock, as hardware raises #PF which the
> shadow pagetable
This rearanges the logic to avoid the double !hvm_paging_enabled(v) check, but
is otherwise identical.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Jun Nakajima
CC: Kevin Tian
---
xen/arch/x86/hvm/vmx/vmx.c | 37 -
1 file changed, 28 insertions(+),
This series is mostly cleanup, base on code observations when working on my
comprehensive XTF pagetable test, running in unpaged modes. I've double
checked the behaviour HAP and Shadow modes, with and without the unrestricted
guest feature, on Haswell and Skylake-S hardware.
Andrew Cooper (3):
* Drop trailing whitespace
* Fix indendation and newlines
* Use bool where appropriate
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Jun Nakajima
CC: Kevin Tian
---
xen/arch/x86/hvm/vmx/vmx.c | 25 +++--
1 file changed, 15 insertions(+), 10
On Wed, Sep 20, 2017 at 08:23:20AM +, Paul Durrant wrote:
> > -Original Message-
> > From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> > Sent: 19 September 2017 20:08
> > To: Xen-devel
> > Cc: Wei Liu ; Paul Durrant ;
> > Konrad Rzeszutek Wilk ; Joao Martins
> >
> > Subject: [PA
On AMD processors which support SMEP (Some Fam16h processors) and SMAP (Zen,
Fam17h), a guest which is running with shadow paging and clears CR0.PG while
keeping CR4.{SMEP,SMAP} set will livelock, as hardware raises #PF which the
shadow pagetable concludes shouldn't happen.
This occurs because har
> Joao Martins (1):
> public/io/netif.h: add gref mapping control messages
>
> xen/include/public/io/netif.h | 115
> ++
> 1 file changed, 115 insertions(+)
> ---
Could you include the following pandoc document in docs/misc? And change only
one thing:
On 09/29/2017 09:15 AM, bharat gohil wrote:
Hello
Hi,
Please avoid top-posting.
The patch didn't work in my case.
The patch will be useful only if the compatible string in the DT of your
UART is "snps,dw-apb-uart". What is the compatible string for it?
Cheers,
Thanks,
Bharat
On Mon
On 09/29/2017 01:07 PM, Roger Pau Monné wrote:
> On Fri, Sep 29, 2017 at 05:02:48PM +, Boris Ostrovsky wrote:
>> On 09/29/2017 11:51 AM, Roger Pau Monné wrote:
>>> On Fri, Sep 29, 2017 at 03:33:58PM +, Juergen Gross wrote:
On 29/09/17 17:24, Roger Pau Monné wrote:
> On Fri, Sep 29,
flight 113903 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113903/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 6 kernel-build fail REGR. vs. 113896
build-armhf-libvirt
Roger Pau Monné writes ("Re: [PATCH 1/2] osstest: fix PVH DomU tests"):
> On Fri, Sep 29, 2017 at 03:35:24PM +, Ian Jackson wrote:
> > I think it might stop the pvh tests from working in those branches.
>
> This change will just turn the PVH tests into PV test on old branches,
> because type=p
flight 113910 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113910/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf e294710f590cda22c88319641b14ab8f5916c888
baseline version:
xtf 9d53bd3275bb408881d438
This run is configured for baseline tests only.
flight 72177 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72177/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 27daa8658e518902bf281b07993c2d60af1913c3
baseline v
On Fri, Sep 29, 2017 at 05:02:48PM +, Boris Ostrovsky wrote:
> On 09/29/2017 11:51 AM, Roger Pau Monné wrote:
> > On Fri, Sep 29, 2017 at 03:33:58PM +, Juergen Gross wrote:
> >> On 29/09/17 17:24, Roger Pau Monné wrote:
> >>> On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
>
On 09/29/2017 11:51 AM, Roger Pau Monné wrote:
> On Fri, Sep 29, 2017 at 03:33:58PM +, Juergen Gross wrote:
>> On 29/09/17 17:24, Roger Pau Monné wrote:
>>> On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
>>> Then, I also wonder whether it would make sense for this grub to load
>
flight 113911 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113911/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On Fri, 29 Sep 2017, Lars Kurth wrote:
> Dear committers,
>
> in accordance with https://www.xenproject.org/governance.html, I need the
> leadership teams of the two mature projects – the Hypervisor and the XAPI
> project – to vote on this proposal.
>
> The Advisory Board is endorsing the propo
On 29/09/2017 17:47, Lai Jiangshan wrote:
> Hello, all
>
> An interesting (at least to me) thinking came up to me when I found
> that the lguest was removed. But I don't have enough knowledge
> to find out the answer nor energy to implement it in some time.
>
> Is it possible to implement kvm-pv
Hi,
On 09/28/2017 03:49 PM, Andre Przywara wrote:
Hi,
On 09/28/2017 01:03 PM, Julien Grall wrote:
Hi,
On 09/26/2017 10:37 AM, Awais Masood wrote:
This patch adds support for Allwinner H5/sun50i SoC.
Makefile updated to enable ARM64 compilation for sunxi.c.
...
--- a/xen/arch/arm/platfor
> On Sep 29, 2017, at 11:57 AM, John P. McDermott (USN Civilian)
> wrote:
>
>
>> On Sep 29, 2017, at 11:31 AM, John P. McDermott (USN Civilian)
>> wrote:
>>
>>
>>> On Sep 29, 2017, at 11:25 AM, Roger Pau Monné wrote:
>>>
>>> On Fri, Sep 29, 2017 at 02:57:11PM +, John P. McDermott (US
> On Sep 29, 2017, at 11:31 AM, John P. McDermott (USN Civilian)
> wrote:
>
>
>> On Sep 29, 2017, at 11:25 AM, Roger Pau Monné wrote:
>>
>> On Fri, Sep 29, 2017 at 02:57:11PM +, John P. McDermott (USN Civilian)
>> wrote:
>>> (XEN) Xen BUG at page_alloc.c:738
>>
>> Do you have XSA-245 a
On 29/09/17 16:01, George Dunlap wrote:
> @@ -4203,13 +4197,17 @@ static void lbr_fixup(void)
> bdw_erratum_bdf14_fixup();
> }
>
> -void vmx_vmenter_helper(const struct cpu_user_regs *regs)
> +int vmx_vmenter_helper(const struct cpu_user_regs *regs)
What are the semantics of this call?
On Fri, Sep 29, 2017 at 03:33:58PM +, Juergen Gross wrote:
> On 29/09/17 17:24, Roger Pau Monné wrote:
> > On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
> > Then, I also wonder whether it would make sense for this grub to load
> > the kernel using the PVH entry point or the nat
On Fri, Sep 29, 2017 at 03:35:24PM +, Ian Jackson wrote:
> Roger Pau Monne writes ("[PATCH 1/2] osstest: fix PVH DomU tests"):
> > The pvh=1 xl option was removed, so switch the PVH tests to use
> > type='pvh' instead.
>
> What will be the effect of this on old Xen branches ?
PVHv1 is also re
On 09/29/2017 01:07 PM, Lars Kurth wrote:
> Dear committers,
>
> in accordance with https://www.xenproject.org/governance.html, I need the
> leadership teams of the two mature projects – the Hypervisor and the XAPI
> project – to vote on this proposal.
>
> The Advisory Board is endorsing the pr
> -Original Message-
> From: Andrew Cooper
> Sent: 29 September 2017 16:35
> To: Paul Durrant ; xen-de...@lists.xenproject.org
> Cc: Jan Beulich
> Subject: Re: [PATCH v8 01/11] x86/hvm/ioreq: maintain an array of ioreq
> servers rather than a list
>
> On 29/09/17 15:51, Paul Durrant wrote
Roger Pau Monne writes ("[PATCH 1/2] osstest: fix PVH DomU tests"):
> The pvh=1 xl option was removed, so switch the PVH tests to use
> type='pvh' instead.
What will be the effect of this on old Xen branches ?
I think it might stop the pvh tests from working in those branches.
Ian.
_
Roger Pau Monne writes ("[PATCH 2/2] osstest: use type='hvm' for HVM guests"):
> The previous builder='hvm' is also kept for compatibility with older
> Xen releases. Note that the type option is ignored in previous Xen
> versions.
Acked-by: Ian Jackson
___
On 29/09/17 15:51, Paul Durrant wrote:
> A subsequent patch will remove the current implicit limitation on creation
> of ioreq servers which is due to the allocation of gfns for the ioreq
> structures and buffered ioreq ring.
>
> It will therefore be necessary to introduce an explicit limit and, si
On Fri, Sep 29, 2017 at 4:24 PM, Roger Pau Monné wrote:
> On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
>> I'm thinking about to add support for Xen PVH guests to grub2.
>>
>> Basically I see two options how to do it:
>>
>> a) add PVH support to current grub.xen (both, 32- and 64-
On 29/09/17 17:24, Roger Pau Monné wrote:
> On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
>> I'm thinking about to add support for Xen PVH guests to grub2.
>>
>> Basically I see two options how to do it:
>>
>> a) add PVH support to current grub.xen (both, 32- and 64-bit), in
>>
> On Sep 29, 2017, at 11:25 AM, Roger Pau Monné wrote:
>
> On Fri, Sep 29, 2017 at 02:57:11PM +, John P. McDermott (USN Civilian)
> wrote:
>> (XEN) Xen BUG at page_alloc.c:738
>
> Do you have XSA-245 applied?
>
> http://xenbits.xen.org/xsa/advisory-245.html
>
> Roger.
No, just the vanil
On Fri, Sep 29, 2017 at 02:57:11PM +, John P. McDermott (USN Civilian)
wrote:
> (XEN) Xen BUG at page_alloc.c:738
Do you have XSA-245 applied?
http://xenbits.xen.org/xsa/advisory-245.html
Roger.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 29/09/17 16:17, Roger Pau Monné wrote:
> On Thu, Sep 28, 2017 at 08:41:28AM +, Jan Beulich wrote:
>> Segment bases (and limits) aren't being cleared by the loading of a nul
>> selector into a segment register on AMD CPUs. Therefore, if an
>> outgoing vCPU has a non-zero base in FS or GS and
On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
> I'm thinking about to add support for Xen PVH guests to grub2.
>
> Basically I see two options how to do it:
>
> a) add PVH support to current grub.xen (both, 32- and 64-bit), in
>order to use the same grub binary for either pv-
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.14c-rc3-tag
xen: fixes for 4.14-rc3
It contains 3 fixes:
- avoid a warning when compiling with clang
- consider read-only bits in xen-pciback when writing to a BAR
- fix a boot cra
On Thu, Sep 28, 2017 at 08:41:28AM +, Jan Beulich wrote:
> Segment bases (and limits) aren't being cleared by the loading of a nul
> selector into a segment register on AMD CPUs. Therefore, if an
> outgoing vCPU has a non-zero base in FS or GS and the subsequent
> incoming vCPU has a non-zero b
On Fri, Sep 29, 2017 at 10:57:11AM -0400, John P. McDermott (USN Civilian)
wrote:
> Xen Developers,
>
> Trying to run Xen ARM64 on HiKey 960. Following the guidance on the wiki,
> building on Ubuntu 17, everything works as expected until Xen boots. The
> interesting tail of the serial console o
On Fri, Sep 29, 2017 at 3:46 PM, Juergen Gross wrote:
> I'm thinking about to add support for Xen PVH guests to grub2.
>
> Basically I see two options how to do it:
>
> a) add PVH support to current grub.xen (both, 32- and 64-bit), in
>order to use the same grub binary for either pv-domains or
From: Sergey Dyasli
Now that np2m sharing is implemented, there can be only one np2m object
with the same np2m_base. Break from loop if the required np2m was found
during np2m_flush_eptp().
Signed-off-by: Sergey Dyasli
Reviewed-by: George Dunlap
---
CC: Andrew Cooper
CC: Jan Beulich
---
xen
From: Sergey Dyasli
At the moment, nested p2ms are not shared between vcpus even if they
share the same base pointer.
Modify p2m_get_nestedp2m() to allow sharing a np2m between multiple
vcpus with the same np2m_base (L1 np2m_base value in VMCX12).
If the current np2m doesn't match the current b
nvmx_handle_invept() updates current's np2m just to flush it. This is
not only wasteful, but ineffective: if several L2 vcpus share the same
np2m base pointer, they all need to be flushed (not only the current
one).
Introduce a new function, np2m_flush_base() which will flush all
shadow p2m's tha
From: Sergey Dyasli
Remove np2m_base parameter as it should always match the value of
np2m_base in VMCX12.
Signed-off-by: Sergey Dyasli
Reviewed-by: George Dunlap
---
CC: Andrew Cooper
CC: Jan Beulich
CC: Jun Nakajima
CC: Kevin Tian
---
xen/arch/x86/hvm/svm/nestedsvm.c | 6 +-
xen/arc
There is a possibility for nested_p2m to became stale between
nestedhvm_hap_nested_page_fault() and nestedhap_fix_p2m(). At the moment
this is handled by detecting such a race inside nestedhap_fix_p2m() and
special-casing it.
Instead, introduce p2m_get_nestedp2m_locked(), which will returned a
st
At the moment, the shadow EPTP value is written unconditionally in
ept_handle_violation().
Instead, write the value on vmentry to the guest; but only write it if
the value needs updating.
To detect this, add a flag to the nestedvcpu struct, stale_np2m, to
indicate when such an action is necessary
Flush IPIs are sent to all cpus in a shadow p2m's dirty_cpumask when
updated. This mask however is far to broad. A pcpu's bit is set in
the cpumask when a vcpu runs on that pcpu, but is only cleared when a
flush happens. This means that the IPI includes the current pcpu of
vcpus that are not cur
From: Sergey Dyasli
Remove some code duplication.
Suggested-by: George Dunlap
Signed-off-by: Sergey Dyasli
Reviewed-by: George Dunlap
---
CC: Andrew Cooper
CC: Jan Beulich
---
xen/arch/x86/mm/p2m.c | 25 ++---
1 file changed, 10 insertions(+), 15 deletions(-)
diff --gi
On 09/04/2017 09:14 AM, Sergey Dyasli wrote:
> Nested p2m (shadow EPT) is an object that stores memory address
> translations from L2 GPA directly to L0 HPA. This is achieved by
> combining together L1 EPT with L0 EPT during L2 EPT violations.
>
> In the usual case, L1 uses the same EPTP value in
From: Sergey Dyasli
1. Add a helper function assign_np2m()
2. Remove useless volatile
3. Update function's comment in the header
4. Minor style fixes ('\n' and d)
Signed-off-by: Sergey Dyasli
Reviewed-by: George Dunlap
---
CC: Andrew Cooper
CC: Jan Beulich
---
xen/arch/x86/mm/p2m.c | 31
A previous patch added support for priv-mapping guest resources directly
(rather than having to foreign-map, which requires P2M modification for
HVM guests).
This patch makes use of the new API to seed the guest grant table unless
the underlying infrastructure (i.e. privcmd) doesn't support it, in
This patch allows grant table frames to be mapped using the
XENMEM_acquire_resource memory op.
Signed-off-by: Paul Durrant
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
v8:
- The functi
Xen Developers,
Trying to run Xen ARM64 on HiKey 960. Following the guidance on the wiki,
building on Ubuntu 17, everything works as expected until Xen boots. The
interesting tail of the serial console output is
...
Xen 4.10-unstable (c/s Tue Sep 12 14:45:13 2017 +0200 git:16b1414de9) EFI loade
On Fri, Sep 29, 2017 at 12:07:47PM +, Lars Kurth wrote:
> Dear committers,
>
> in accordance with https://www.xenproject.org/governance.html, I need the
> leadership teams of the two mature projects – the Hypervisor and the XAPI
> project – to vote on this proposal.
>
> The Advisory Board i
flight 113905 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113905/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 27daa8658e518902bf281b07993c2d60af1913c3
baseline version:
ovmf 4c34a8ea191155f438901
By using a static inline stub in private.h for OS where this functionality
is not implemented, the various duplicate stubs in the OS-specific source
modules can be avoided.
Signed-off-by: Paul Durrant
Reviewed-by: Roger Pau Monné
Acked-by: Wei Liu
---
Cc: Ian Jackson
v4:
- Removed extraneous
A previous patch introduced a new HYPERVISOR_memory_op to acquire guest
resources for direct priv-mapping.
This patch adds new functionality into libxenforeignmemory to make use
of a new privcmd ioctl [1] that uses the new memory op to make such
resources available via mmap(2).
[1]
http://xenbit
A subsequent patch will introduce a new scheme to allow an emulator to
map ioreq server pages directly from Xen rather than the guest P2M.
This patch lays the groundwork for that change by deferring mapping of
gfns until their values are requested by an emulator. To that end, the
pad field of the
This patch adjusts the ioreq server code to use type-safe gfn_t values
where possible. No functional change.
Signed-off-by: Paul Durrant
Reviewed-by: Roger Pau Monné
Reviewed-by: Wei Liu
Acked-by: Jan Beulich
---
Cc: Andrew Cooper
---
xen/arch/x86/hvm/ioreq.c | 44 +++
This patch re-works much of the ioreq server initialization and teardown
code:
- The hvm_map/unmap_ioreq_gfn() functions are expanded to call through
to hvm_alloc/free_ioreq_gfn() rather than expecting them to be called
separately by outer functions.
- Several functions now test the validity o
A subsequent patch will remove the current implicit limitation on creation
of ioreq servers which is due to the allocation of gfns for the ioreq
structures and buffered ioreq ring.
It will therefore be necessary to introduce an explicit limit and, since
this limit should be small, it simplifies th
...to allow the calling domain to prevent translation of specified l1e
value.
Despite what the comment in public/xen.h might imply, specifying a
command value of MMU_NORMAL_PT_UPDATE will not simply update an l1e with
the specified value. Instead, mod_l1_entry() tests whether foreign_dom
has PG_tr
This series introduces support for direct mapping of guest resources.
The resources are:
- IOREQ server pages
- Grant tables
v8:
- Re-ordered series and dropped two patches that have already been
committed.
v7:
- Fixed assertion failure hit during domain destroy.
v6:
- Responded to misse
1 - 100 of 154 matches
Mail list logo