Hi Lars,
2015-08-05 2:54 GMT-07:00 Lars Kurth :
> Hi folks,
> this email is for people planning to attend the Xen Dev Summit in Seattle
> (Aug 17 & 18) and the Developer Meeting on the 19th.
>
Is the Developer Meeting on Aug 19th open to public?
Is it possible to "listen to" the meeting if ther
>>> On 8/7/2015 at 01:21 AM, in message <55c39796.8000...@citrix.com>, George
Dunlap wrote:
> On 08/06/2015 04:11 AM, Chun Yan Liu wrote:
> > As 4.6 goes to bug fixing stage, maybe we can pick up this thread? :-)
> >
> > Beside to call for your precious review comments and suggestions so th
Reducing the list
> Is the Developer Meeting on Aug 19th open to public?
> Is it possible to "listen to" the meeting if there is still space left?
Yes, if there is space (which there appears to be).
But then if you are asking because you want to attend, there wouldn't be an
issue even if we were
On Wed, Aug 05, 2015 at 06:51:29PM +0100, Andrew Cooper wrote:
> On 05/08/15 02:57, Shuai Ruan wrote:
> > This patch emualtes xsaves/xrstors instructions and
> > XSS msr access.
> >
> > As xsaves/xrstors instructions and XSS msr access
> > required be executed only in ring0. So emulation are
> > ne
On Wed, Aug 05, 2015 at 07:17:44PM +0100, Andrew Cooper wrote:
> On 05/08/15 02:57, Shuai Ruan wrote:
> > This patch enables xsaves for hvm guest, includes:
> > 1.handle xsaves vmcs init and vmexit.
> > 2.add logic to write/read the XSS msr.
> >
> > Signed-off-by: Shuai Ruan
> > ---
> > xen/arch/
On Wed, Aug 05, 2015 at 09:37:22AM +0100, Ian Campbell wrote:
> On Wed, 2015-08-05 at 09:57 +0800, Shuai Ruan wrote:
> > This patch exposes xsaves/xgetbv1/xsavec to hvm guest.
> > The reserved bits of eax/ebx/ecx/edx must be cleaned up
> > when call cpuid(0dh) with leaf 1 or 2..63.
> >
> > Accordi
On Wed, Aug 05, 2015 at 05:38:21PM +0100, Andrew Cooper wrote:
> On 05/08/15 02:57, Shuai Ruan wrote:
> > Detail hardware spec can be found in chapter 13 (section 13.11 13.12) of
> > the
> > Intel SDM [1].
> >
> > patch1: add xsaves/xrstors support for pv guest
> > patch2: add xsaves/xrstors supp
flight 37816 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/37816/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-amd64-sid-netboot-pygrub 13 guest-saverestore fail REGR. vs.
37766
Tests
On Thu, 6 Aug 2015, Boris Ostrovsky wrote:
> On 08/06/2015 01:04 PM, Robert Richter wrote:
> > Boris,
> >
> > we are working on acpi pci support for arm64. For this we are enabling
> > PCI_MMCONFIG on arm64 which breaks compiling drivers/xen/pci.c.
> >
> > Looking into it there is x86 code in gen
On Fri, 7 Aug 2015, Shannon Zhao wrote:
> This document is going to explain the design details of Xen booting with
> ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are
> welcome.
>
> To Xen itself booting with ACPI, this is similar to Linux kernel except
> that Xen doesn't par
On 06/08/15 20:22, Andrew Cooper wrote:
On 06/08/15 17:45, Ben Catterall wrote:
This allocation function is used by the deprivileged mode initialisation code
to allocate pages for the new page table mappings and page frames on the HAP
page heap.
Signed-off-by: Ben Catterall
This is fine for y
On Wed, Aug 5, 2015 at 11:33 PM, Wei Liu wrote:
> On Wed, Aug 05, 2015 at 11:09:41PM +0800, Lai Jiangshan wrote:
>> Hi, Liu
>>
>> Does pv or pvh guest support virtio devices?
>
> No.
>
>> If yes, how can I configure the guest?
>> If not, how can I make it support?
>>
>
> A new transport which make
This allows having different arch_setup_meminit implementations based on the
guest type. It should not introduce any functional changes.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Change
Place the calls to xc_vcpu_setcontext and the allocation of the hypercall
buffer into the arch-specific vcpu hooks. This is needed for the next patch,
so x86 HVM guests can initialize the BSP using XEN_DOMCTL_sethvmcontext
instead of XEN_DOMCTL_setvcpucontext.
This patch should not introduce any f
This series is split in the following order:
- Patch 1 is a fixup of the error paths in libxl__build_hvm and related
functions (and can go in independently of the rest of the series).
- Patches from 2 to 11 switch HVM domain contruction to use the xc_dom_*
family of functions, like they ar
Introduce a very simple (and dummy) domain loader to be used to load the
firmware (hvmloader) into HVM guests. Since hmvloader is just a 32bit elf
executable the loader is fairly simple.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Sta
This is just a preparatory change to clean up the code in setup_guest.
Should not introduce any functional changes.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Changes since v3:
- Add An
This xc_dom_arch will be used in order to build HVM domains. The code is
based on the existing xc_hvm_populate_memory and xc_hvm_populate_params
functions.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Changes since v3:
- Make sure c/s
This should not introduce any functional change.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Changes since v3:
- Add Andrew Cooper Reviewed-by.
- Add Wei Acked-by.
---
tools/libxc/incl
Unify both functions into xc_dom_p2m. Should not introduce any functional
change.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Samuel Thibault
---
Changes since v3:
- Add Andrew Cooper R
Introduce the notion of a container type into xc_dom_image. This will be
needed by later changes that will also use xc_dom_image in order to build
HVM guests.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
C
With the current code in libxl__build_hvm it is possible for the function to
fail and still return 0.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl/libxl_dom.c | 39 ++-
1 file changed, 2
On Fri, Aug 07, 2015 at 06:01:23PM +0800, Lai Jiangshan wrote:
> On Wed, Aug 5, 2015 at 11:33 PM, Wei Liu wrote:
> > On Wed, Aug 05, 2015 at 11:09:41PM +0800, Lai Jiangshan wrote:
> >> Hi, Liu
> >>
> >> Does pv or pvh guest support virtio devices?
> >
> > No.
> >
> >> If yes, how can I configure t
Hi Shannon,
Just some clarification questions.
On 07/08/15 03:11, Shannon Zhao wrote:
> 3. Dom0 gets grant table and event channel irq information
> ---
> As said above, we assign the hypervisor_id be "XenVMM" to tell Dom0 that
> it runs on
On Fri, Aug 7, 2015 at 12:33 PM, Julien Grall wrote:
> Hi Shannon,
>
> Just some clarification questions.
>
> On 07/08/15 03:11, Shannon Zhao wrote:
>> 3. Dom0 gets grant table and event channel irq information
>> ---
>> As said above, we ass
On Fri, 7 Aug 2015, Christoffer Dall wrote:
> On Fri, Aug 7, 2015 at 12:33 PM, Julien Grall wrote:
> > Hi Shannon,
> >
> > Just some clarification questions.
> >
> > On 07/08/15 03:11, Shannon Zhao wrote:
> >> 3. Dom0 gets grant table and event channel irq information
> >>
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/vpic.c | 11 ++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/vpic.c b/xen/arch/x86/hvm/vpic.c
index 7c2edc8..5938f40 100644
--- a/xen/arch/x86/hvm/vpic.c
+++ b/xen/ar
This HVM parameter is used to pass a list of loaded modules to the guest.
Right now the number of loaded modules is limited to 1 by the current
implementation, but this interface allows passing more than one module.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian C
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/rtc.c | 16
1 file changed, 16 insertions(+)
diff --git a/xen/arch/x86/hvm/rtc.c b/xen/arch/x86/hvm/rtc.c
index a9efeaf..bc93f66 100644
--- a/xen/arch/x86/hvm/rtc.c
+++ b/xen/arch/x86/hvm/rtc
This HVM parameter returns a PFN that contains the address of the memory
page where the guest command line has been placed.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Jan Beulich
Cc: Andrew Cooper
---
tools/libxc/xc_dom_x86.c
Introduce a new flag in xc_dom_image that turns on and off the emulated
devices. This prevents creating the VGA hole, the hvm_info page and the
ioreq server pages. libxl unconditionally sets it to true for all HVM
domains at the moment.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano
Signed-off-by: Roger Pau Monné
Cc: Boris Ostrovsky
Cc: Suravee Suthikulpanit
Cc: Aravind Gopalakrishnan
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Jun Nakajima
Cc: Eddie Dong
Cc: Kevin Tian
---
xen/arch/x86/hvm/svm/svm.c | 16 +---
xen/arch/x86/hvm/vlapic.c | 30
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/cpu/vpmu.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 8af3df1..d5bb77d 100644
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -439
Remove xc_hvm_build_x86.c and xc_hvm_build_arm.c since xc_hvm_build is not
longer used in order to create HVM guests.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxc/Makefile | 2 -
tools/libxc/include/xenguest
Allow xc_dom_elfloader to report a guest type as hvm-3.0-x86_32 if it's
running inside of a HVM container and has the PHYS32_ENTRY elfnote set.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Only xc_dom_elfloader has been switched to sup
Introduce a bitmap in x86 xen_arch_domainconfig that allows enabling or
disabling specific devices emulated inside of Xen for HVM guests.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v3
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/vioapic.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/xen/arch/x86/hvm/vioapic.c b/xen/arch/x86/hvm/vioapic.c
index d348235..30a4a0f 100644
--- a/xen/arch/x86/hvm/vioapic.c
+++ b/xen/ar
HVM guests have always used the emulated serial console by default, but if
the emulated serial pty cannot be fetched from xenstore try to use the PV
console instead.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Changes since v3:
- Dro
On 07/08/15 11:37, Christoffer Dall wrote:
> On Fri, Aug 7, 2015 at 12:33 PM, Julien Grall wrote:
>> Hi Shannon,
>>
>> Just some clarification questions.
>>
>> On 07/08/15 03:11, Shannon Zhao wrote:
>>> 3. Dom0 gets grant table and event channel irq information
>>>
Enable this hypercall for HVM guests in order to fetch the e820 memory
map in the absence of an emulated BIOS. The memory map is populated and
notified to Xen in arch_setup_meminit_hvm.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Jan
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and
VCPUOP_is_up hypercalls from HVM guests.
This patch introduces a new structure (vcpu_hvm_context) that should be used
in conjuction with the VCPUOP_initialise hypercall in order to initialize
vCPUs for HVM guests.
Signed-off-by:
Now that we have all the code in place HVM domain building in libxl can be
switched to use the xc_dom_* family of functions, just like they are used in
order to build PV guests.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/libxl
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/stdvga.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/arch/x86/hvm/stdvga.c b/xen/arch/x86/hvm/stdvga.c
index f50bff7..a3296bd 100644
--- a/xen/arch/x86/hvm/stdvga.c
+++ b/xen/arch/x86/hvm/std
On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote:
> With the current code in libxl__build_hvm it is possible for the function to
> fail and still return 0.
It's hard to see where the bug is when this patch also does a bunch of
refactoring.
It would be good if you can separate the b
Only allow enabling or disabling all the emulated devices inside of Xen,
right now Xen doesn't support enabling specific emulated devices only.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
di
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/hpet.c | 13 +
xen/arch/x86/hvm/hvm.c | 1 -
2 files changed, 13 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/hpet.c b/xen/arch/x86/hvm/hpet.c
index edf9a17..266b587 100644
--- a/x
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM
builder now uses the PV xc_dom_* set of functions this kernel will be parsed
and loaded inside the guest like on PV, but the container is a pure HVM
guest.
Also, if device_model_version is set to none or a device model fo
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/pmtimer.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/xen/arch/x86/hvm/pmtimer.c b/xen/arch/x86/hvm/pmtimer.c
index 07594e1..199a15e 100644
--- a/xen/arch/x86/hvm/pmtimer.c
+++ b/xen/arc
Signed-off-by: Roger Pau Monné
Cc: Suravee Suthikulpanit
Cc: Aravind Gopalakrishnan
---
xen/drivers/passthrough/amd/iommu_guest.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/passthrough/amd/iommu_guest.c
b/xen/drivers/passthrough/amd/iommu_guest.c
index e7
This new elfnote contains the 32bit entry point into the kernel. Xen will
use this entry point in order to launch the guest kernel in 32bit protected
mode with paging disabled.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
tools/xcutil
El 07/08/15 a les 12.49, Wei Liu ha escrit:
> On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote:
>> With the current code in libxl__build_hvm it is possible for the function to
>> fail and still return 0.
>
> It's hard to see where the bug is when this patch also does a bunch of
> re
El 05/08/15 a les 11.22, Lars Kurth ha escrit:
> This is one item of feedback, which I believe is a quick win for us. This is
> one piece of feedback from a list of items that have during the last few
> weeks been raised with me personally, either during face-2-face conversations
> in a private
Add back xen-devel
On Fri, Aug 07, 2015 at 06:45:10PM +0800, Lai Jiangshan wrote:
> On Fri, Aug 7, 2015 at 6:25 PM, Wei Liu wrote:
> > On Fri, Aug 07, 2015 at 06:01:23PM +0800, Lai Jiangshan wrote:
> >> On Wed, Aug 5, 2015 at 11:33 PM, Wei Liu wrote:
> >> > On Wed, Aug 05, 2015 at 11:09:41PM +08
On Fri, Aug 07, 2015 at 12:55:21PM +0200, Roger Pau Monné wrote:
> El 07/08/15 a les 12.49, Wei Liu ha escrit:
> > On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote:
> >> With the current code in libxl__build_hvm it is possible for the function
> >> to
> >> fail and still return 0.
El 07/08/15 a les 13.03, Wei Liu ha escrit:
> On Fri, Aug 07, 2015 at 12:55:21PM +0200, Roger Pau Monné wrote:
>> El 07/08/15 a les 12.49, Wei Liu ha escrit:
>>> On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote:
With the current code in libxl__build_hvm it is possible for the fu
On Fri, Aug 07, 2015 at 12:17:45PM +0200, Roger Pau Monne wrote:
> Place the calls to xc_vcpu_setcontext and the allocation of the hypercall
> buffer into the arch-specific vcpu hooks. This is needed for the next patch,
> so x86 HVM guests can initialize the BSP using XEN_DOMCTL_sethvmcontext
> ins
On Fri, Aug 07, 2015 at 01:28:32PM +0200, Roger Pau Monné wrote:
> El 07/08/15 a les 13.03, Wei Liu ha escrit:
> > On Fri, Aug 07, 2015 at 12:55:21PM +0200, Roger Pau Monné wrote:
> >> El 07/08/15 a les 12.49, Wei Liu ha escrit:
> >>> On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote:
On Fri, Aug 07, 2015 at 12:17:46PM +0200, Roger Pau Monne wrote:
> This xc_dom_arch will be used in order to build HVM domains. The code is
> based on the existing xc_hvm_populate_memory and xc_hvm_populate_params
> functions.
>
> Signed-off-by: Roger Pau Monné
> Cc: Ian Jackson
> Cc: Stefano St
El 07/08/15 a les 13.31, Wei Liu ha escrit:
> On Fri, Aug 07, 2015 at 12:17:45PM +0200, Roger Pau Monne wrote:
>> Place the calls to xc_vcpu_setcontext and the allocation of the hypercall
>> buffer into the arch-specific vcpu hooks. This is needed for the next patch,
>> so x86 HVM guests can initia
On Fri, Aug 07, 2015 at 02:04:21PM +0200, Roger Pau Monné wrote:
> El 07/08/15 a les 13.31, Wei Liu ha escrit:
> > On Fri, Aug 07, 2015 at 12:17:45PM +0200, Roger Pau Monne wrote:
> >> Place the calls to xc_vcpu_setcontext and the allocation of the hypercall
> >> buffer into the arch-specific vcpu
On Fri, Aug 07, 2015 at 12:17:47PM +0200, Roger Pau Monne wrote:
> Now that we have all the code in place HVM domain building in libxl can be
> switched to use the xc_dom_* family of functions, just like they are used in
> order to build PV guests.
>
> Signed-off-by: Roger Pau Monné
> Cc: Ian Jac
On Fri, Aug 07, 2015 at 12:17:48PM +0200, Roger Pau Monne wrote:
> Remove xc_hvm_build_x86.c and xc_hvm_build_arm.c since xc_hvm_build is not
> longer used in order to create HVM guests.
>
> Signed-off-by: Roger Pau Monné
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei
At 19:11 +0200 on 05 Aug (1438801877), Roger Pau Monné wrote:
> El 05/08/15 a les 18.46, Andrew Cooper ha escrit:
> > On 05/08/15 17:40, Roger Pau Monné wrote:
> >> El 05/08/15 a les 17.39, Andrew Cooper ha escrit:
> >>> On 05/08/15 10:53, Roger Pau Monné wrote:
> El 04/08/15 a les 20.08, Andr
On Fri, Aug 07, 2015 at 12:18:01PM +0200, Roger Pau Monne wrote:
> Introduce a new flag in xc_dom_image that turns on and off the emulated
> devices. This prevents creating the VGA hole, the hvm_info page and the
> ioreq server pages. libxl unconditionally sets it to true for all HVM
> domains at t
On Fri, Aug 07, 2015 at 12:18:02PM +0200, Roger Pau Monne wrote:
> Enable this hypercall for HVM guests in order to fetch the e820 memory
> map in the absence of an emulated BIOS. The memory map is populated and
> notified to Xen in arch_setup_meminit_hvm.
>
> Signed-off-by: Roger Pau Monné
> Cc:
On Fri, Aug 07, 2015 at 12:18:04PM +0200, Roger Pau Monne wrote:
> HVM guests have always used the emulated serial console by default, but if
> the emulated serial pty cannot be fetched from xenstore try to use the PV
> console instead.
>
> Signed-off-by: Roger Pau Monné
> Cc: Ian Jackson
> Cc:
flight 60603 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60603/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
like 60541
test-amd64-i386-r
On Fri, Aug 07, 2015 at 12:18:05PM +0200, Roger Pau Monne wrote:
> This HVM parameter returns a PFN that contains the address of the memory
> page where the guest command line has been placed.
>
> Signed-off-by: Roger Pau Monné
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc
On 06/08/15 22:24, Andrew Cooper wrote:
On 06/08/2015 17:45, Ben Catterall wrote:
Added trap handlers to catch exceptions such as a page fault, general
protection fault, etc. These handlers will crash the domain as such exceptions
would indicate that either there is a bug in deprivileged mode
On Fri, Aug 07, 2015 at 12:18:06PM +0200, Roger Pau Monne wrote:
> This HVM parameter is used to pass a list of loaded modules to the guest.
> Right now the number of loaded modules is limited to 1 by the current
> implementation, but this interface allows passing more than one module.
>
> Signed-
On 07/08/15 09:00, Shuai Ruan wrote:
>
>>> +goto skip;
>>> +}
>>> +
>>> +if ( !guest_kernel_mode(v, regs) || (regs->edi & 0x3f) )
>> What does edi have to do with xsaves? only edx:eax are special
>> according to the manual.
>>
> regs->edi is the
On 06/08/15 21:55, Andrew Cooper wrote:
On 06/08/15 17:45, Ben Catterall wrote:
The process to switch into and out of deprivileged mode can be likened to
setjmp/longjmp.
To enter deprivileged mode, we take a copy of the stack from the guest's
registers up to the current stack pointer. This al
On Fri, Aug 07, 2015 at 12:18:08PM +0200, Roger Pau Monne wrote:
> Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM
> builder now uses the PV xc_dom_* set of functions this kernel will be parsed
> and loaded inside the guest like on PV, but the container is a pure HVM
>
On 07/08/15 09:22, Shuai Ruan wrote:
>
>>> void hvm_cpuid(unsigned int input, unsigned int *eax, unsigned int *ebx,
>>> unsigned int *ecx, unsigned int *edx)
>>> {
>>> @@ -4456,6 +4460,34 @@ void hvm_cpuid(unsigned int input, unsigned int
>>> *eax, unsigned in
On 07/08/15 02:52, big strong wrote:
> Or how can I get the address of hypercall page belonging to a running
> domU?
Please do not top post.
A domain may create an arbitrary quantity of hypercall pages, at any
address of their choosing.
You have not explained why you want this information.
~And
On 07/08/15 13:51, Ben Catterall wrote:
>
> I don't know if we can make these synchronous as we need a way to
> interrupt the vcpu if it's spinning for a long time. Otherwise an
> attacker could just spin in depriv and cause a DoS. With that in mind,
> the scheduler may decide to migrate the vcpu
On 07/08/15 10:57, Ben Catterall wrote:
> On 06/08/15 20:22, Andrew Cooper wrote:
>> On 06/08/15 17:45, Ben Catterall wrote:
>>> This allocation function is used by the deprivileged mode
>>> initialisation code
>>> to allocate pages for the new page table mappings and page frames on
>>> the HAP
>>>
On 06/08/15 20:52, Andrew Cooper wrote:
On 06/08/15 17:45, Ben Catterall wrote:
The paging structure mappings for the deprivileged mode are added
to the monitor page table for HVM guests. The entries are generated by
walking the page tables and mapping in new pages. If a higher-level page tabl
On 07/08/15 13:32, Ben Catterall wrote:
>
>
> On 06/08/15 22:24, Andrew Cooper wrote:
>> On 06/08/2015 17:45, Ben Catterall wrote:
>>> Added trap handlers to catch exceptions such as a page fault, general
>>> protection fault, etc. These handlers will crash the domain as such
>>> exceptions
>>> wou
On 07/08/15 14:19, Andrew Cooper wrote:
On 07/08/15 13:32, Ben Catterall wrote:
On 06/08/15 22:24, Andrew Cooper wrote:
On 06/08/2015 17:45, Ben Catterall wrote:
Added trap handlers to catch exceptions such as a page fault, general
protection fault, etc. These handlers will crash the domai
C requires that every use of va_copy() is matched with a va_end() call.
This is especially important for x86_64 as va_{start,copy}() may need to
allocate memory to generate a va_list containing parameters which were
previously in registers.
Signed-off-by: Andrew Cooper
---
CC: Ian Campbell
CC:
The chances of an allocation failing are slim but nonzero. Assert
success of each allocation to quieten Coverity, which re-notices defects
each time the IDL changes.
Signed-off-by: Andrew Cooper
---
CC: Ian Campbell
CC: Ian Jackson
CC: Wei Liu
---
tools/libxl/gentest.py |6 ++
1 file
No functional change, but removes 48 defects which get intermittently
reflagged every time the libxl IDL is altered.
Sent for 4.6 at Ian Campbells suggestion.
Andrew Cooper (2):
tools/libxl: Assert success of memory allocation in testidl
tools/libxl: Alter the use of rand() in testidl
tools
Coverity warns for every occurrence of rand(), which is made worse
because each time the IDL changes, some of the calls get re-flagged.
Collect all calls to rand() in a single function, test_rand(), which
takes a modulo parameter for convenience. This turns 40 defects
currently into 1, which won'
On 08/07/2015 06:17 AM, Roger Pau Monne wrote:
diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
index a0a97e7..5acb246 100644
--- a/xen/arch/x86/hvm/vmx/vmcs.c
+++ b/xen/arch/x86/hvm/vmx/vmcs.c
@@ -1027,6 +1027,20 @@ static int construct_vmcs(struct vcpu *v)
ASSERT
On 07/08/15 13:51, Ben Catterall wrote:
> On 06/08/15 21:55, Andrew Cooper wrote:
>> On 06/08/15 17:45, Ben Catterall wrote:
>>> The process to switch into and out of deprivileged mode can be
>>> likened to
>>> setjmp/longjmp.
>>>
>>> To enter deprivileged mode, we take a copy of the stack from the
On Fri, Aug 07, 2015 at 02:51:59PM +0100, Andrew Cooper wrote:
> C requires that every use of va_copy() is matched with a va_end() call.
>
> This is especially important for x86_64 as va_{start,copy}() may need to
> allocate memory to generate a va_list containing parameters which were
> previousl
On Fri, Aug 07, 2015 at 03:06:23PM +0100, Andrew Cooper wrote:
> The chances of an allocation failing are slim but nonzero. Assert
> success of each allocation to quieten Coverity, which re-notices defects
> each time the IDL changes.
>
> Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
___
On Fri, Aug 07, 2015 at 03:06:24PM +0100, Andrew Cooper wrote:
> Coverity warns for every occurrence of rand(), which is made worse
> because each time the IDL changes, some of the calls get re-flagged.
>
> Collect all calls to rand() in a single function, test_rand(), which
> takes a modulo param
On Fri, Aug 07, 2015 at 03:06:22PM +0100, Andrew Cooper wrote:
> No functional change, but removes 48 defects which get intermittently
> reflagged every time the libxl IDL is altered.
>
> Sent for 4.6 at Ian Campbells suggestion.
>
> Andrew Cooper (2):
> tools/libxl: Assert success of memory al
Hi Chris,
On 06/08/15 18:54, Chris (Christopher) Brand wrote:
> setup_frametable_mappings() rounds frametable_size up to a multiple
> of 32MB. This is wasteful on systems with less than 4GB of RAM,
> although it does allow the "contig" bit to be set in the PTEs.
>
> Where the frametable is less t
On Thu, Aug 06, 2015 at 06:37:05PM +0200, Jason A. Donenfeld wrote:
> It turns out that domU also requires the Xen APIC driver. Otherwise we
> get stuck in busy loops that never exit, such as in this stack trace:
>
> (gdb) target remote localhost:
> Remote debugging using localhost:
> __xa
On Fri, Aug 7, 2015 at 4:23 PM, Konrad Rzeszutek Wilk
wrote:
> Anyhow, your patch seems to fix a regression my patch
> feb44f1f7a4ac299d1ab1c3606860e70b9b89d69
> "x86/xen: Provide a "Xen PV" APIC driver to support >255 VCPUs"
> introduced.
Ahhh, good, okay. That explains why I didn't encounter th
On Tue, Aug 04, 2015 at 10:14:32AM +0200, Roger Pau Monné wrote:
> El 30/07/15 a les 10.53, Roger Pau Monné ha escrit:
> > El 28/07/15 a les 21.47, Konrad Rzeszutek Wilk ha escrit:
> >> Hey,
> >>
> >> I launch a bunch of guests at the same time or in parallel and
> >> the scripts end up timing out
El 07/08/15 a les 16.54, Konrad Rzeszutek Wilk ha escrit:
> Ok. I hadn't run your patch yet. Do you want me to run the latest staging
> instead once more with my test-case?
Yes please, 40s in my test case seemed to be fine.
Roger.
___
Xen-devel mailin
On Thu, Aug 06, 2015 at 02:21:04PM +0800, 黄先生 wrote:
> hi all:
> My linux kernel verison is 2.6.32-15, and I make kernel with xen
> compileroptions. But when my virual machine start on AWS,it show these log:
> does anyone know how to do?
>
that is soo ancient I am sorry to say we can't hel
On Fri, Aug 07, 2015 at 12:18:08PM +0200, Roger Pau Monne wrote:
> Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM
> builder now uses the PV xc_dom_* set of functions this kernel will be parsed
> and loaded inside the guest like on PV, but the container is a pure HVM
>
On 07/08/15 14:19, Ben Catterall wrote:
> On 06/08/15 20:52, Andrew Cooper wrote:
>> On 06/08/15 17:45, Ben Catterall wrote:
>>> The paging structure mappings for the deprivileged mode are added
>>> to the monitor page table for HVM guests. The entries are generated by
>>> walking the page tables a
On 07/08/15 11:17, Roger Pau Monne wrote:
> Place the calls to xc_vcpu_setcontext and the allocation of the hypercall
> buffer into the arch-specific vcpu hooks. This is needed for the next patch,
> so x86 HVM guests can initialize the BSP using XEN_DOMCTL_sethvmcontext
> instead of XEN_DOMCTL_setv
flight 60605 qemu-upstream-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60605/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 11 guest-start fail baseline untested
Tests which did not
1 - 100 of 190 matches
Mail list logo