>>> On 01.07.16 at 18:42, wrote:
> On 01/07/16 17:18, Jan Beulich wrote:
> On 24.06.16 at 12:28, wrote:
>>> ... as a means to replace all HVMOP_* which a domain can't issue on
>>> itself (i.e. intended for use by only the control domain or device
>>> model).
>>>
>>> Signed-off-by: Jan Beulich
>>> On 01.07.16 at 18:51, wrote:
> On 01/07/16 17:10, Jan Beulich wrote:
> On 01.07.16 at 17:38, wrote:
>>> As for interleaving inside the asm statement itself, we already have
>>> precedent for that with the HAVE_GAS_* predicates. It would make the
>>> patch rather larger, but might end up
flight 66512 distros-debian-stretch real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66512/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 4 capture-logs !broken
On Jul 2, 12:40pm, Wei Liu wrote:
} On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote:
} > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for
} > use with NetBSD. I have it mostly done; however, when I try to
} > create a domU, libxl goes into an infinite loop calling the sc
>>> On 01.07.16 at 19:52, wrote:
> If a VMLAUNCH/VMRESUME fails due to invalid control or host state, dump the
> VMCS before crashing the domain.
>
> Signed-off-by: Andrew Cooper
Good idea:
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-de
From: Quan Xu
these patches fix current timeout concern and also allow limited ATS support.
these patches are the rest ones:
1. move the domain crash logic up to the generic IOMMU layer
2. If Device-TLB flush timed out, we hide the target ATS device
immediately. By hiding the device, we make
From: Quan Xu
If Device-TLB flush timed out, we hide the target ATS device
immediately. By hiding the device, we make sure it can't be
assigned to any domain any longer (see device_assigned).
Signed-off-by: Quan Xu
CC: Jan Beulich
CC: Kevin Tian
CC: Feng Wu
---
v14: release the lock before
Instead of a Linux kernel based implementation use one from freeBSD.
As a result some of the printings will change due to more posix like
behavior of %p format (omitting leading zeroes, prepending "0x").
Signed-off-by: Juergen Gross
---
V2: remove include/lib-gpl.h as requested by Samuel Thibaul
From: Quan Xu
Add domain crash logic to the generic IOMMU layer to benefit
all platforms.
No spamming of the log can occur. For DomU, we avoid logging any
message for already dying domains. For Dom0, that'll still be more
verbose than we'd really like, but it at least wouldn't outright
flood the
From: Quan Xu
A struct pci_dev* instead of SBDF is stored inside struct
pci_ats_dev and parameter to *_ats_device().
Also use ats_dev for "struct pci_ats_dev" variable, while
pdev (_pdev, if there is already a pdev) for "struct pci_dev"
in the scope of IOMMU.
Signed-off-by: Quan Xu
Acked-by: K
On 22/06/16 09:03, Juergen Gross wrote:
> Add support for the Xen HYPERVISOR_vm_assist hypercall.
>
> Signed-off-by: Juergen Gross
Stefano, could you please comment?
Juergen
> ---
> arch/arm/include/asm/xen/hypercall.h | 1 +
> arch/arm/xen/enlighten.c | 1 +
> arch/arm/xen/hyper
For ongoing stable releases.
Signed-off-by: Ian Jackson
CC: Jan Beulich
[already applied, following discussion in irc -iwj]
---
README | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/README b/README
index 6380a79..9b69d91 100644
--- a/README
+++ b/README
@@ -1,
This run is configured for baseline tests only.
flight 66494 linux-3.10 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/66494/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt4 capture-logs
>>> On 30.06.16 at 20:43, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -475,8 +475,6 @@ void hvm_do_resume(struct vcpu *v)
>
> if ( unlikely(v->arch.vm_event) )
> {
> -struct monitor_write_data *w = &v->arch.vm_event->write_data;
> -
> if (
On 21/06/16 16:24, Juergen Gross wrote:
> Instead of duplicate coding for each device type (vtpms, usbctrls, ...)
> especially on domain creation introduce a framework for that purpose.
>
> I especially found it annoying that e.g. the vtpm callback issued the
> error message for a failed attach of
On 12/05/16 07:35, Juergen Gross wrote:
> Gentle ping...
Okay, now 4 months since posting the last version. Could it please be
included in a more timely manner?
Juergen
>
> On 03/03/16 10:38, Juergen Gross wrote:
>> The Xen hypervisor supports starting a dom0 with large memory (up to
>> the TB
Forwarding to xen-devel to see if anyone has any ideas...
-George
-- Forwarded message --
From: Alex Wakizashi
Date: Tue, Jun 28, 2016 at 11:38 PM
Subject: [Xen-users] Adaptec (PMC Sierra) RAID controller is not
working under XEN
To: xen-us...@lists.xen.org
Hello, all,
Have o
On Mon, Jul 04, 2016 at 12:33:17PM +0200, Juergen Gross wrote:
> On 12/05/16 07:35, Juergen Gross wrote:
> > Gentle ping...
>
> Okay, now 4 months since posting the last version. Could it please be
> included in a more timely manner?
Juergen and others, please be patient a bit longer. GNU, current
Hi Jan,
On 7/4/2016 1:22 PM, Jan Beulich wrote:
On 30.06.16 at 20:43, wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -475,8 +475,6 @@ void hvm_do_resume(struct vcpu *v)
if ( unlikely(v->arch.vm_event) )
{
-struct monitor_write_data *w = &v->arch.vm_
Add back xen-devel. Please reply to all recipients in the future.
On Mon, Jul 04, 2016 at 01:11:04AM -0700, John Nemeth wrote:
> On Jul 2, 12:35pm, Wei Liu wrote:
> }
> } This basically replicates the same logic in libxl_linux.c. Without this
> } libxl will loop indefinitely trying to execute hotp
(CC Wei for the release part)
Hi Dirk,
On 04/07/16 07:51, Dirk Behme wrote:
Signed-off-by: Dirk Behme
Thank you for adding support of a new board in Xen.
During the last hackathon, we discussed about improving pre-release
testing on ARM hardware [1] and helping users to boot Xen on support
On Mon, Jul 04, 2016 at 01:07:51AM -0700, John Nemeth wrote:
> On Jul 2, 12:40pm, Wei Liu wrote:
> } On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote:
> } > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for
> } > use with NetBSD. I have it mostly done; however, when I try
Hi Juergen,
On 22/06/16 08:03, Juergen Gross wrote:
Add support for the Xen HYPERVISOR_vm_assist hypercall.
Signed-off-by: Juergen Gross
Reviewed-by: Julien Grall
Regards,
---
arch/arm/include/asm/xen/hypercall.h | 1 +
arch/arm/xen/enlighten.c | 1 +
arch/arm/xen/hyperca
Also CC Roger since he authored the original code.
Feel free to correct me misunderstanding on this issue.
On Mon, Jul 04, 2016 at 12:09:30PM +0100, Wei Liu wrote:
> Add back xen-devel. Please reply to all recipients in the future.
>
> On Mon, Jul 04, 2016 at 01:11:04AM -0700, John Nemeth wrote:
On Wed, Jun 29, 2016 at 5:27 PM, PGNet Dev wrote:
> In summary, there's a problem
>
> An indication of the guest trying to allocate more memory that the
> host admin has allowed.
>
> that's filling logs with 10s of thousands of redundant log entries, with a
> suspicion that it's 'balloonin
On Mon, Jul 04, 2016 at 01:07:51AM -0700, John Nemeth wrote:
> On Jul 2, 12:40pm, Wei Liu wrote:
> } On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote:
> } > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for
> } > use with NetBSD. I have it mostly done; however, when I try
This commit changes the prototype of the following functions:
- apply_p2m_changes
- apply_one_level
- p2m_shatter_page
- p2m_create_table
- __p2m_lookup
- __p2m_get_mem_access
These changes are required as our implementation reuses most of the
existing ARM p2m implementation to set page table attr
The initially named function "p2m_alloc_table" allocated pages solely
required for p2m. The new implementation leaves p2m allocation related
parts inside of this function (which is made static) and provides an
overlay function "p2m_table_init" that can be called from extern to
generally initialize
Signed-off-by: Sergej Proskurin
---
Cc: Razvan Cojocaru
Cc: Tamas K Lengyel
Cc: Ian Jackson
Cc: Wei Liu
---
tools/tests/xen-access/xen-access.c | 11 +--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/tools/tests/xen-access/xen-access.c
b/tools/tests/xen-access/xen-acc
The HVMOP_altp2m_set_domain_state allows to activate altp2m on a
specific domain. This commit adopts the x86
HVMOP_altp2m_set_domain_state implementation. The function
p2m_flush_altp2m is currently implemented in form of a stub.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Jul
The initially named function "p2m_alloc_table" allocated pages solely
required for p2m. The new implementation leaves p2m allocation related
parts inside of this function (which is made static) and provides an
overlay function "p2m_table_init" that can be called from extern to
generally initialize
This commit adapts get_page_from_gva to consider the currently mapped
altp2m view during address translation. We also adapt the function's
prototype (provide "struct vcpu *" instead of "struct domain *"). This
change is required, as the function indirectly calls the function
gva_to_ma_par, which re
The HVMOP HVMOP_altp2m_set_mem_access allows to set gfn permissions of
(currently one page at a time) of a specific altp2m view. In case the
view does not hold the requested gfn entry, it will be first copied from
the hostp2m table and then modified as requested.
Signed-off-by: Sergej Proskurin
-
This commit changes the prototype of the following functions:
- apply_p2m_changes
- apply_one_level
- p2m_shatter_page
- p2m_create_table
- __p2m_lookup
- __p2m_get_mem_access
These changes are required as our implementation reuses most of the
existing ARM p2m implementation to set page table attr
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/p2m.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index 96892a5..de97a12 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm/p2m.c
@@
The current implementation differentiates between flushing and
destroying altp2m views. This commit adds the functions
p2m_flush_altp2m, and p2m_flush_table, which allow to flush all or
individual altp2m views without destroying the entire table. In this
way, altp2m views can be reused at a later p
The HVMOP HVMOP_altp2m_set_mem_access allows to set gfn permissions of
(currently one page at a time) of a specific altp2m view. In case the
view does not hold the requested gfn entry, it will be first copied from
the hostp2m table and then modified as requested.
Signed-off-by: Sergej Proskurin
-
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c| 2 +-
xen/arch/arm/p2m.c| 32
xen/include/asm-arm/p2m.h | 3 +++
3 files changed, 36 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/hvm
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c| 2 +-
xen/arch/arm/p2m.c| 32
xen/include/asm-arm/p2m.h | 3 +++
3 files changed, 36 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/hvm
The Xen altp2m subsystem is currently supported only on x86-64 based
architectures. By utilizing ARM's virtualization extensions, we intend
to implement altp2m support for ARM architectures and thus further
extend current Virtual Machine Introspection (VMI) capabilities on ARM.
With this commit, X
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c| 2 +-
xen/arch/arm/p2m.c| 32
xen/include/asm-arm/p2m.h | 3 +++
3 files changed, 36 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/hvm
This commit adapts get_page_from_gva to consider the currently mapped
altp2m view during address translation. We also adapt the function's
prototype (provide "struct vcpu *" instead of "struct domain *"). This
change is required, as the function indirectly calls the function
gva_to_ma_par, which re
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/p2m.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index 96892a5..de97a12 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm/p2m.c
@@
This commit adopts the x86 HVMOP_altp2m_get_domain_state implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c | 9 -
1 file changed, 8 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index
This commit moves the altp2m-related code from x86 to ARM. Functions
that are no yet supported notify the caller or print a BUG message
stating their absence.
Also, the struct arch_domain is extended with the altp2m_active
attribute, represeting the current altp2m activity configuration of the
dom
This commit makes sure that the TLB of a domain considers flushing all
of the associated altp2m views. Therefore, in case a different domain
(not the currently active domain) shall flush its TLBs, the current
implementation loops over all VTTBRs of the different altp2m mappings
per vCPU and flushes
This commit adds the function p2m_altp2m_lazy_copy implementing the
altp2m paging mechanism. The function p2m_altp2m_lazy_copy lazily copies
the hostp2m's mapping into the currently active altp2m view on 2nd stage
instruction or data access violations. Every altp2m violation generates
a vm_event.
Signed-off-by: Sergej Proskurin
---
Cc: Razvan Cojocaru
Cc: Tamas K Lengyel
Cc: Ian Jackson
Cc: Wei Liu
---
tools/tests/xen-access/xen-access.c | 11 +--
1 file changed, 9 insertions(+), 2 deletions(-)
diff --git a/tools/tests/xen-access/xen-access.c
b/tools/tests/xen-access/xen-acc
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c| 2 +-
xen/arch/arm/p2m.c| 32
xen/include/asm-arm/p2m.h | 3 +++
3 files changed, 36 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/hvm
The current implementation allows to set the parameter HVM_PARAM_ALTP2M.
This parameter allows further usage of altp2m on ARM. For this, we
define an additional altp2m field for PV domains as part of the
libxl_domain_type struct. This field can be set only on ARM systems
through the "altp2m" switch
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c| 3 ++-
xen/arch/arm/p2m.c| 23 +++
xen/include/asm-arm/p2m.h | 3 +++
3 files changed, 28 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/hvm.c b/xen
The Xen altp2m subsystem is currently supported only on x86-64 based
architectures. By utilizing ARM's virtualization extensions, we intend
to implement altp2m support for ARM architectures and thus further
extend current Virtual Machine Introspection (VMI) capabilities on ARM.
With this commit, X
Hello together,
Since this is my first contribution to the Xen development mailing list, I
would like to shortly introduce myself. My name is Sergej Proskurin. I am a PhD
Student at the Technical University of Munich. My research areas focus on
Virtual Machine Introspection, Hypervisor/OS Security
This commit adopts the x86 HVMOP_altp2m_get_domain_state implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c | 9 -
1 file changed, 8 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c
index
This commit moves the altp2m-related code from x86 to ARM. Functions
that are no yet supported notify the caller or print a BUG message
stating their absence.
Also, the struct arch_domain is extended with the altp2m_active
attribute, represeting the current altp2m activity configuration of the
dom
The HVMOP_altp2m_set_domain_state allows to activate altp2m on a
specific domain. This commit adopts the x86
HVMOP_altp2m_set_domain_state implementation. The function
p2m_flush_altp2m is currently implemented in form of a stub.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Jul
This commit adds the function p2m_altp2m_lazy_copy implementing the
altp2m paging mechanism. The function p2m_altp2m_lazy_copy lazily copies
the hostp2m's mapping into the currently active altp2m view on 2nd stage
instruction or data access violations. Every altp2m violation generates
a vm_event.
The p2m intialization now invokes intialization routines responsible for
the allocation and intitialization of altp2m structures. The same
applies to teardown routines. The functionality has been adopted from
the x86 altp2m implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellin
The current implementation differentiates between flushing and
destroying altp2m views. This commit adds the functions
p2m_flush_altp2m, and p2m_flush_table, which allow to flush all or
individual altp2m views without destroying the entire table. In this
way, altp2m views can be reused at a later p
This commit makes sure that the TLB of a domain considers flushing all
of the associated altp2m views. Therefore, in case a different domain
(not the currently active domain) shall flush its TLBs, the current
implementation loops over all VTTBRs of the different altp2m mappings
per vCPU and flushes
The p2m intialization now invokes intialization routines responsible for
the allocation and intitialization of altp2m structures. The same
applies to teardown routines. The functionality has been adopted from
the x86 altp2m implementation.
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellin
Signed-off-by: Sergej Proskurin
---
Cc: Stefano Stabellini
Cc: Julien Grall
---
xen/arch/arm/hvm.c| 3 ++-
xen/arch/arm/p2m.c| 23 +++
xen/include/asm-arm/p2m.h | 3 +++
3 files changed, 28 insertions(+), 1 deletion(-)
diff --git a/xen/arch/arm/hvm.c b/xen
The current implementation allows to set the parameter HVM_PARAM_ALTP2M.
This parameter allows further usage of altp2m on ARM. For this, we
define an additional altp2m field for PV domains as part of the
libxl_domain_type struct. This field can be set only on ARM systems
through the "altp2m" switch
1: use consistent exit mechanism
2: drop pointless and add useful default cases
3: fold local variables
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Similar code should use similar exit mechanisms (return vs goto).
Signed-off-by: Jan Beulich
---
v2: Use "goto" instead of "return", making things consistent right away
instead of only after a (series of) future patch(es) converting
more code to "return".
--- a/xen/arch/x86/x86_emulate/x
Declare some variables to they can be used by multiple pieces of code,
allowing some figure braces to be dropped (which don't align nicely
when used inside of case labeled statements).
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/a
On Jul 4, 12:23pm, Wei Liu wrote:
}
} Also CC Roger since he authored the original code.
}
} Feel free to correct me misunderstanding on this issue.
}
} On Mon, Jul 04, 2016 at 12:09:30PM +0100, Wei Liu wrote:
} > Add back xen-devel. Please reply to all recipients in the future.
Oops, I usu
There's no point in having default cases when all possible values have
respective case statements, or when there's just a "break" statement.
Otoh the two main switch() statements better get default cases added,
just to cover the case of someone altering one of the two lookup arrays
without suitabl
On Sat, Jul 02, 2016 at 12:40:43PM +0100, Wei Liu wrote:
> On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote:
> > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for
> > use with NetBSD. I have it mostly done; however, when I try to
> > create a domU, libxl goes into an infin
On Mon, Jul 04, 2016 at 04:56:33AM -0700, John Nemeth wrote:
> On Jul 4, 12:23pm, Wei Liu wrote:
> } On Mon, Jul 04, 2016 at 12:09:30PM +0100, Wei Liu wrote:
> } > On Mon, Jul 04, 2016 at 01:11:04AM -0700, John Nemeth wrote:
> } > > On Jul 2, 12:35pm, Wei Liu wrote:
> } > > } +/*
> } > > }
On Mon, Jul 04, 2016 at 01:57:20PM +0200, Roger Pau Monné wrote:
> On Sat, Jul 02, 2016 at 12:40:43PM +0100, Wei Liu wrote:
> > On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote:
> > > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for
> > > use with NetBSD. I have it mostly
ARM allows the use of concatenated root (first-level) page tables (there
are P2M_ROOT_PAGES consecutive pages that are used for the root level
page table. We need to prevent freeing one of these concatenated pages
during the process of flushing in p2m_flush_table (simply because new
pages might be
This basically replicates the same logic in libxl_linux.c but with one
change -- only test num_exec == 0 in nic hotplug case because NetBSD let
QEMU call a script itself. Without this patch libxl will loop
indefinitely trying to execute hotplug script.
Reported-by: John Nemeth
Signed-off-by: Wei
On 04/07/16 12:45, Sergej Proskurin wrote:
> The Xen altp2m subsystem is currently supported only on x86-64 based
> architectures. By utilizing ARM's virtualization extensions, we intend
> to implement altp2m support for ARM architectures and thus further
> extend current Virtual Machine Introspect
flight 96611 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96611/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-arndale 16 guest-start.2 fail in 96558 pass in 96611
test-armhf-armhf-xl-credit2 15 gue
On 07/04/2016 01:45 PM, Sergej Proskurin wrote:
> This commit makes sure that the TLB of a domain considers flushing all
> of the associated altp2m views. Therefore, in case a different domain
> (not the currently active domain) shall flush its TLBs, the current
> implementation loops over all VT
flight 96626 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/96626/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
>>> On 30.06.16 at 20:44, wrote:
> After trapping a control-register write vm-event and -until- deciding if that
> write is to be permitted or not (VM_EVENT_FLAG_DENY) and doing the actual
> write,
> there cannot and should not be another trapped control-register write event.
Is that true even f
On 7/4/2016 3:37 PM, Jan Beulich wrote:
On 30.06.16 at 20:44, wrote:
After trapping a control-register write vm-event and -until- deciding if that
write is to be permitted or not (VM_EVENT_FLAG_DENY) and doing the actual
write,
there cannot and should not be another trapped control-register wri
>>> On 30.06.16 at 20:45, wrote:
> The arch_vm_event structure is dynamically allocated and freed @
> vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack
> user
> disables domain monitoring (xc_monitor_disable), which in turn effectively
> discards any information that was
On 04/07/16 12:45, Sergej Proskurin wrote:
> Hello together,
>
> Since this is my first contribution to the Xen development mailing list, I
> would like to shortly introduce myself. My name is Sergej Proskurin. I am a
> PhD
> Student at the Technical University of Munich. My research areas focus o
On 04/07/16 12:55, Jan Beulich wrote:
> Similar code should use similar exit mechanisms (return vs goto).
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 04/07/16 12:55, Jan Beulich wrote:
> There's no point in having default cases when all possible values have
> respective case statements, or when there's just a "break" statement.
>
> Otoh the two main switch() statements better get default cases added,
> just to cover the case of someone alteri
On 07/04/2016 02:15 PM, Andrew Cooper wrote:
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> The Xen altp2m subsystem is currently supported only on x86-64 based
>> architectures. By utilizing ARM's virtualization extensions, we intend
>> to implement altp2m support for ARM architectures and thus
On 07/04/2016 02:52 PM, Andrew Cooper wrote:
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> Hello together,
>>
>> Since this is my first contribution to the Xen development mailing list, I
>> would like to shortly introduce myself. My name is Sergej Proskurin. I am a
>> PhD
>> Student at the Te
On 7/4/2016 3:47 PM, Jan Beulich wrote:
On 30.06.16 at 20:45, wrote:
The arch_vm_event structure is dynamically allocated and freed @
vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack user
disables domain monitoring (xc_monitor_disable), which in turn effectively
discar
>>> On 04.07.16 at 14:47, wrote:
> On 7/4/2016 3:37 PM, Jan Beulich wrote:
> On 30.06.16 at 20:44, wrote:
>>> After trapping a control-register write vm-event and -until- deciding if
>>> that
>>> write is to be permitted or not (VM_EVENT_FLAG_DENY) and doing the actual
>>> write,
>>> there c
>>> On 04.07.16 at 15:03, wrote:
> On 7/4/2016 3:47 PM, Jan Beulich wrote:
> On 30.06.16 at 20:45, wrote:
>>> The arch_vm_event structure is dynamically allocated and freed @
>>> vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack
>>> user
>>> disables domain monitorin
On 7/4/2016 4:07 PM, Jan Beulich wrote:
On 04.07.16 at 14:47, wrote:
On 7/4/2016 3:37 PM, Jan Beulich wrote:
On 30.06.16 at 20:44, wrote:
After trapping a control-register write vm-event and -until- deciding if that
write is to be permitted or not (VM_EVENT_FLAG_DENY) and doing the actual
wr
On 07/04/16 13:22, Jan Beulich wrote:
On 30.06.16 at 20:43, wrote:
>> --- a/xen/arch/x86/hvm/hvm.c
>> +++ b/xen/arch/x86/hvm/hvm.c
>> @@ -475,8 +475,6 @@ void hvm_do_resume(struct vcpu *v)
>>
>> if ( unlikely(v->arch.vm_event) )
>> {
>> -struct monitor_write_data *w = &v->
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
The Xen altp2m subsystem is currently supported only on x86-64 based
architectures. By utilizing ARM's virtualization extensions, we intend
to implement altp2m support for ARM architectures and thus further
extend current Virtual Machine I
On 7/4/2016 4:11 PM, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
On 7/4/2016 3:47 PM, Jan Beulich wrote:
On 30.06.16 at 20:45, wrote:
The arch_vm_event structure is dynamically allocated and freed @
vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack user
disables
Hello Sergej,
On 04/07/16 12:45, Sergej Proskurin wrote:
This commit moves the altp2m-related code from x86 to ARM.
Looking at the code in the follow-up patches, I have the impression that
the code is very similar (if not exactly) to the x86 code. If so, we
should move the HVMOP for altp2m i
On 07/04/16 14:45, Sergej Proskurin wrote:
> Signed-off-by: Sergej Proskurin
> ---
> Cc: Razvan Cojocaru
> Cc: Tamas K Lengyel
> Cc: Ian Jackson
> Cc: Wei Liu
> ---
> tools/tests/xen-access/xen-access.c | 11 +--
> 1 file changed, 9 insertions(+), 2 deletions(-)
Fair enough, looks li
Hello Julien,
On 07/04/2016 03:25 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> The Xen altp2m subsystem is currently supported only on x86-64 based
>> architectures. By utilizing ARM's virtualization extensions, we intend
>> to implement altp2m support
Hello Julien,
On 07/04/2016 03:36 PM, Julien Grall wrote:
> Hello Sergej,
>
> On 04/07/16 12:45, Sergej Proskurin wrote:
>> This commit moves the altp2m-related code from x86 to ARM.
>
> Looking at the code in the follow-up patches, I have the impression that
> the code is very similar (if not e
On 07/04/16 16:11, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
>> On 7/4/2016 3:47 PM, Jan Beulich wrote:
>> On 30.06.16 at 20:45, wrote:
The arch_vm_event structure is dynamically allocated and freed @
vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolst
On 7/4/2016 4:50 PM, Razvan Cojocaru wrote:
On 07/04/16 16:11, Jan Beulich wrote:
On 04.07.16 at 15:03, wrote:
On 7/4/2016 3:47 PM, Jan Beulich wrote:
On 30.06.16 at 20:45, wrote:
The arch_vm_event structure is dynamically allocated and freed @
vm_event_cleanup_domain. This cleanup is trigg
>>> On 04.07.16 at 15:22, wrote:
> On 07/04/16 13:22, Jan Beulich wrote:
> On 30.06.16 at 20:43, wrote:
>>> @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr)
>>> return test_bit(msr, bitmap);
>>> }
>>>
>>> +static void write_ctrlreg_adjust_traps(struct domain
>>> On 04.07.16 at 15:21, wrote:
> On 7/4/2016 4:07 PM, Jan Beulich wrote:
> On 04.07.16 at 14:47, wrote:
>>> On 7/4/2016 3:37 PM, Jan Beulich wrote:
>>> On 30.06.16 at 20:44, wrote:
> After trapping a control-register write vm-event and -until- deciding if
> that
> write is
1 - 100 of 207 matches
Mail list logo