_key_expansion_128 is an alias to _key_expansion_256a, __memcpy to
memcpy, xen_syscall32_target to xen_sysenter_target, and so on. Annotate
them all using the new SYM_FUNC_START_ALIAS, SYM_FUNC_START_LOCAL_ALIAS,
and SYM_FUNC_END_ALIAS. This will make the tools generating the
debuginfo happy.
Sign
These are all functions which are invoked from elsewhere, so we annotate
them as global using the new SYM_FUNC_START. And their ENDPROC's by
SYM_FUNC_END.
And make sure ENTRY/ENDPROC is not defined on X86_64, given these were
the last users.
Signed-off-by: Jiri Slaby
Cc: "H. Peter Anvin"
Cc: Th
All these are functions which are invoked from elsewhere, but they are
not typical C functions. So we annotate them (as global) using the new
SYM_CODE_START. All these were not balanced with any END, so mark their
ends by SYM_CODE_END, appropriatelly.
Signed-off-by: Jiri Slaby
Cc: Thomas Gleixner
There is a couple of assembly functions, which are invoked only locally
in the file they are defined. In C, we mark them "static". In assembly,
annotate them using SYM_{FUNC,CODE}_START_LOCAL (and switch their
ENDPROC to SYM_{FUNC,CODE}_END too). Whether FUNC or CODE depends on
ENDPROC/END for a pa
Use the new SYM_DATA_START_LOCAL, and SYM_DATA_END* macros:
8 OBJECT LOCAL DEFAULT6 gdt
000832 OBJECT LOCAL DEFAULT6 gdt_start
0028 0 OBJECT LOCAL DEFAULT6 gdt_end
0028 256 OBJECT LOCAL DEFAULT6 early_stack
0128 0 OBJECT LOCAL DEFAULT6
Introduce new C macros for annotations of functions and data in
assembly. There is a long-standing mess in macros like ENTRY, END,
ENDPROC and similar. They are used in different manners and sometimes
incorrectly.
So introduce macros with clear use to annotate assembly as follows:
a) Support macr
All these are functions which are invoked from elsewhere, but they are
not typical C functions. So we annotate them (as global) using the new
SYM_CODE_START. All these were not balanced with any END, so mark their
ends by SYM_CODE_END, appropriatelly.
Signed-off-by: Jiri Slaby
Cc: Boris Ostrovsky
Here, we change all code which is not marked as functions. In other
words, this code has been using END, not ENDPROC. So switch all of this
to appropriate new markings SYM_CODE_START and SYM_CODE_END.
Signed-off-by: Jiri Slaby
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc: "H. Peter Anvin"
Cc: x...@k
Hello,
It is possible for systemd services to check for dom0 detection before xenfs
gets mounted by proc-xen.mount. See this systemd bug report for an example:
https://github.com/systemd/systemd/issues/6442
Upstream systemd has accepted the patch for this:
https://github.com/systemd/systemd/p
flight 72183 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72183/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-armhf-sid-netboot-pygrub 1 build-check(1)blocked n/a
build-arm64-pvops
On Fri, 2017-09-29 at 16:01 +0100, George Dunlap wrote:
> nvmx_handle_invept() updates current's np2m just to flush it. This is
> not only wasteful, but ineffective: if several L2 vcpus share the same
> np2m base pointer, they all need to be flushed (not only the current
> one).
I don't follow th
One comment below.
On Fri, 2017-09-29 at 16:01 +0100, George Dunlap wrote:
> There is a possibility for nested_p2m to became stale between
> nestedhvm_hap_nested_page_fault() and nestedhap_fix_p2m(). At the moment
> this is handled by detecting such a race inside nestedhap_fix_p2m() and
> special
On 10/02/2017 10:37 AM, Sergey Dyasli wrote:
> On Fri, 2017-09-29 at 16:01 +0100, George Dunlap wrote:
>> nvmx_handle_invept() updates current's np2m just to flush it. This is
>> not only wasteful, but ineffective: if several L2 vcpus share the same
>> np2m base pointer, they all need to be flushe
On Fri, 2017-09-29 at 16:56 +0100, Andrew Cooper wrote:
> On 29/09/17 16:01, George Dunlap wrote:
> > @@ -4203,13 +4197,17 @@ static void lbr_fixup(void)
> > bdw_erratum_bdf14_fixup();
> > }
> >
> > -void vmx_vmenter_helper(const struct cpu_user_regs *regs)
> > +int vmx_vmenter_helper(c
From: Oleksandr Grytsov
Update documentation with virtual sound device
Signed-off-by: Oleksandr Grytsov
---
docs/man/xl.cfg.pod.5.in | 150 +++
docs/man/xl.pod.1.in | 30 ++
2 files changed, 180 insertions(+)
diff --git a/docs/man/xl.cf
From: Oleksandr Grytsov
Add config parser for virtual sound devices
Signed-off-by: Oleksandr Grytsov
---
tools/xl/xl_parse.c | 250
tools/xl/xl_parse.h | 1 +
2 files changed, 251 insertions(+)
diff --git a/tools/xl/xl_parse.c b/tools/xl/
From: Oleksandr Grytsov
Add PV sound device described in sndif.h
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/Makefile | 2 +-
tools/libxl/libxl.h | 14 ++
tools/libxl/libxl_create.c | 1 +
tools/libxl/libxl_internal.h | 1 +
tools/
From: Oleksandr Grytsov
This patch set adds PV sound device support to xl.cfg and xl.
See sndif.h for protocol implementation details.
Oleksandr Grytsov (5):
libxl: add PV sound device
libxl: add vsnd list and info
xl: add PV sound condif parser
xl: add vsnd CLI commands
docs: add PV
From: Oleksandr Grytsov
Add getting vsnd list amd info API
Signed-off-by: Oleksandr Grytsov
---
tools/libxl/libxl.h | 10 ++
tools/libxl/libxl_types.idl | 19 +++
tools/libxl/libxl_utils.h | 3 +
tools/libxl/libxl_vsnd.c| 359 +++-
4 fi
From: Oleksandr Grytsov
Add CLI commands to attach, detach and list virtual sound devices
Signed-off-by: Oleksandr Grytsov
---
tools/xl/Makefile | 2 +-
tools/xl/xl.h | 3 +
tools/xl/xl_cmdtable.c | 15
tools/xl/xl_vsnd.c | 203 ++
On 10/02/2017 10:40 AM, George Dunlap wrote:
> On 10/02/2017 10:37 AM, Sergey Dyasli wrote:
>> On Fri, 2017-09-29 at 16:01 +0100, George Dunlap wrote:
>>> nvmx_handle_invept() updates current's np2m just to flush it. This is
>>> not only wasteful, but ineffective: if several L2 vcpus share the sam
On Fri, Sep 29, 2017 at 5:39 PM, Paolo Bonzini wrote:
> On 29/09/2017 17:47, Lai Jiangshan wrote:
>> Hello, all
>>
>> An interesting (at least to me) thinking came up to me when I found
>> that the lguest was removed. But I don't have enough knowledge
>> to find out the answer nor energy to implem
On Mon, 2017-10-02 at 11:07 +0100, George Dunlap wrote:
> On 10/02/2017 10:40 AM, George Dunlap wrote:
> > On 10/02/2017 10:37 AM, Sergey Dyasli wrote:
> > > On Fri, 2017-09-29 at 16:01 +0100, George Dunlap wrote:
> > > > nvmx_handle_invept() updates current's np2m just to flush it. This is
> > >
flight 113940 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113940/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stopfail like 113933
test-amd64-i386-xl-qemut-win7-amd64
Apologies for formatting. Here is my question in plain text:
There are systemd services that check for dom0 detection before xenfs
gets mounted by proc-xen.mount. See this systemd bug report for an
example:
https://github.com/systemd/systemd/issues/6442
Upstream systemd has accepted the patch for
On Fri, Sep 29, 2017 at 10:53:07AM +0100, Roger Pau Monne wrote:
> Spotted by Coverity.
>
This now has a Coverity ID 1418831.
I will add that to commit message.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Sat, Sep 30, 2017 at 4:39 AM, Paolo Bonzini wrote:
>
> - Lai Jiangshan ha scritto:
>> On Sat, Sep 30, 2017 at 12:39 AM, Paolo Bonzini wrote:
>> > On 29/09/2017 17:47, Lai Jiangshan wrote:
>> >> Hello, all
>> >>
>> >> An interesting (at least to me) thinking came up to me when I found
>> >
On Mon, Oct 02, 2017 at 12:26:24PM +0200, Vasilis Liaskovitis wrote:
> Apologies for formatting. Here is my question in plain text:
>
> There are systemd services that check for dom0 detection before xenfs
> gets mounted by proc-xen.mount. See this systemd bug report for an
> example:
> https://gi
On Fri, Sep 29, 2017 at 04:49:23PM +0300, Oleksandr Grytsov wrote:
> From: Oleksandr Grytsov
>
> Enum always uses "x" value as input argument. In
> case of enum array "t" argument should be passed.
>
> Signed-off-by: Oleksandr Grytsov
Checking parent doesn't seem to be necessary. We already ha
On 02/10/2017 12:36, George Dunlap wrote:
>>> Although I'm not business man, I don't think the top cloud provider[s]
>>> would allow nested virtualization, however mature nested virtualization
>>> is. Even xen-pv is unable to be nested in the aws and azure.
>>
>> Check the contributors to KVM neste
From: Andrew Cooper
An access which crosses a page boundary is performed atomically by x86
hardware, albeit with a severe performance penalty. An important corner case
is when a straddled access hits two pages which differ in whether a
translation exists, or in net access rights.
The use of hvm
flight 113945 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113945/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 12 guest-start fail in 113939 pass in 113945
test-amd64-i386-freebsd10-i386 16
On Monday, October 2, 2017 11:12:42 AM CEST Jiri Slaby wrote:
> These are all functions which are invoked from elsewhere, so we annotate
> them as global using the new SYM_FUNC_START. And their ENDPROC's by
> SYM_FUNC_END.
>
> And make sure ENTRY/ENDPROC is not defined on X86_64, given these were
Hi Jan,
On 22/09/17 10:26, Jan Beulich wrote:
On 21.09.17 at 14:40, wrote:
--- a/xen/arch/x86/mm/p2m-pod.c
+++ b/xen/arch/x86/mm/p2m-pod.c
@@ -861,17 +861,19 @@ p2m_pod_zero_check(struct p2m_domain *p2m, unsigned long
*gfns, int count)
for ( i = 0; i < count; i++ )
{
p2m
flight 113948 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113948/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On 2 October 2017 at 10:12, Jiri Slaby wrote:
> There is a couple of assembly functions, which are invoked only locally
> in the file they are defined. In C, we mark them "static". In assembly,
> annotate them using SYM_{FUNC,CODE}_START_LOCAL (and switch their
> ENDPROC to SYM_{FUNC,CODE}_END too
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
Acked-by: George Dunlap
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v2:
- Add Andrew's acked-by
---
xen/arch/arm/p2m.c | 3 +--
xen/arch/x86/mm/p2m-pod.c| 20 +++
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Move the 1UL << changes in the next patch
- Add George's and Wei's reviewed-by
Changes in v
gfn_aligned is assigned 3 times with the exact same formula. All the
variables used are not modified, so consolidate in a single assignment
at the beginning of the function.
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
Reviewed-by: Wei Liu
---
Cc: George Dun
At the same time make the array gfns const has it is not modified within
the function.
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Add Wei's reviewed-by
Changes in v2:
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Add Stefano's reviewed-by
Changes in v2:
- Add Andrew's acked-by
- Variable gfn_t was renamed to gfn_ in a prev
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Kevin Tian
Acked-by: Razvan Cojocaru
Reviewed-by: Wei Liu
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Razvan Cojocaru
Cc: Tamas K Lengyel
Cc: George Dunlap
Cc: Jun Nakajima
Cc: Kevin Tian
Changes in v3:
- Add
A lot of the headers are not necessary. At the same time, order them in the
alphabetical order.
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
Acked-by: George Dunlap
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Add Wei's
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Add Wei's reviewed-by
Changes in v2:
- Add Andrew's acked-by
---
xen/arch/x86/mm/p2m-pod.c | 10 +-
1 file cha
- Switch the return type to bool
- Remove the parameter p2m_query_t q as it is not used
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Add Wei's reviewed-by
Changes
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Add George's and Wei's reviewed-by
Changes in v2:
- Add Andrew's acked-by
---
xen/arch/x86
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Add Wei's reviewed-by
Changes in v2:
- Add Andrew's acked-by
---
xen/arch/x86/mm/p2m-pod.c | 11 +--
xen/inclu
Some unboxing/boxing can be avoided by using mfn_add(...) instead.
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Add George's and Wei's reviewed-by
Also take the opportunity to:
- move from 1 << * to 1UL << *.
- use unsigned when possible
- move from unsigned int -> unsigned long for some induction
variables
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
Reviewed-by: Wei Liu
---
Cc: George
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Changes in v3:
- Replace (foo == 0) by !foo
- Remove uneeded parentheses
Changes in v2:
- Add Andrew's acked-by
---
xen/arch/x86/mm/p2m-pod.c | 10 ++
Hi all,
I have been attempting to use the PoD code on Arm (it will be sent in a
separate series) and spent sometimes to clean-up and switch to typesafe gfn
the current code.
The PoD code has been tested on Arm (the version is slightly different,
mostly renaming) and the x86 part has only been bui
Signed-off-by: Julien Grall
Acked-by: Andrew Cooper
Acked-by: Tamas K Lengyel
Reviewed-by: Wei Liu
---
Cc: George Dunlap
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Tamas K Lengyel
Changes in v3:
- Add Wei's reviewed-by
Changes in v2:
- Add Andrew & Tamas' acked-by
On Mon, Oct 2, 2017 at 3:02 PM, Wei Liu wrote:
> On Fri, Sep 29, 2017 at 04:49:23PM +0300, Oleksandr Grytsov wrote:
>> From: Oleksandr Grytsov
>>
>> Enum always uses "x" value as input argument. In
>> case of enum array "t" argument should be passed.
>>
>> Signed-off-by: Oleksandr Grytsov
>
> Ch
Hi Stefano,
On 20/09/17 00:17, Stefano Stabellini wrote:
On Tue, 12 Sep 2017, Julien Grall wrote:
Currently, all the new mappings will be read-write non-executable. Allow the
caller to use other permissions.
Signed-off-by: Julien Grall
---
Changes in v2:
- Switch the runtime ch
On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
> Enforce the distinction between an instruction not implemented by the
> emulator and the failure to emulate that instruction by defining a new
> return code, X86EMUL_UNIMPLEMENTED.
>
> This value should only be returned by the core emulator only if
On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
> - print the return code of the last failed emulator operation
> in hvm_dump_emulation_state.
> - print the return code in sh_page_fault (SHADOW_PRINTK) to make the
> distiction between X86EMUL_UNHANDLEABLE and X86EMUL_UNIMPLEMENTED.
>
> Signed-off-b
On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
> Enforce the distinction between an instruction not implemented by the
> emulator and the failure to emulate that instruction by defining a new
> return code, X86EMUL_UNIMPLEMENTED.
>
> This value should only be returned by the core emulator only if
On 10/02/2017 12:35 PM, Wei Liu wrote:
> On Mon, Oct 02, 2017 at 12:26:24PM +0200, Vasilis Liaskovitis wrote:
>> - any other options?
>
> Can we just make the unit not fail? I.e. when it detects xenfs is
> already mounted, it does nothing but reports success.
>
Unfortunately that's currently not
On 10/02/2017 02:43 PM, George Dunlap wrote:
> On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
>> Enforce the distinction between an instruction not implemented by the
>> emulator and the failure to emulate that instruction by defining a new
>> return code, X86EMUL_UNIMPLEMENTED.
>>
>> This value sh
On Fri, Sep 29, 2017 at 05:14:58PM -0700, Alistair Francis wrote:
> Replace all occurs of __FUNCTION__ except for the check in checkpatch
> with the non GCC specific __func__.
>
> One line in hcd-musb.c was manually tweaked to pass checkpatch.
>
> Signed-off-by: Alistair Francis
> Cc: Gerd Hoffm
On 10/02/2017 03:55 PM, Franck Bui wrote:
>
> I think it would be better to continue the discussion here [1], as a
> solution might require some changes on systemd side.
>
Actually I continued the discussion here:
https://github.com/systemd/systemd/pull/6662
Feel free to join !
Thanks.
__
On Wed, Sep 06, 2017 at 07:36:23PM +0200, Juergen Gross wrote:
> With virt_spin_lock() being guarded by a static key the bare metal case
> can be optimized by patching the call away completely. In case a kernel
> running as a guest it can decide whether to use paravitualized
> spinlocks, the curren
Hello Meng Xu and Dario,
On 01.09.17 18:58, Meng Xu wrote:
This series of patches make RTDS scheduler work-conserving
without breaking real-time guarantees.
VCPUs with extratime flag set can get extra time
from the unreserved system resource.
System administrators can decide which VCPUs have ext
Hi all,
To simplify things, I will forgo the requirement of release-ack until
the code freeze and leave the call to the committers.
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Lu, 2017-10-02 at 15:09 +0100, George Dunlap wrote:
> On 10/02/2017 02:43 PM, George Dunlap wrote:
> >
> > On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
> > >
> > > Enforce the distinction between an instruction not implemented by
> > > the
> > > emulator and the failure to emulate that instr
flight 113947 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113947/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 6 kernel-build fail REGR. vs. 113902
Tests which did not
flight 113949 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113949/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On 10/02/2017 03:42 PM, Petre Ovidiu PIRCALABU wrote:
> On Lu, 2017-10-02 at 15:09 +0100, George Dunlap wrote:
>> On 10/02/2017 02:43 PM, George Dunlap wrote:
>>>
>>> On 09/25/2017 01:03 PM, Petre Pircalabu wrote:
Enforce the distinction between an instruction not implemented by
the
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Kevin Tian
> Acked-by: Razvan Cojocaru
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
>
> ---
>
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: Razvan Cojocaru
> Cc: Tamas
On Mon, Oct 2, 2017 at 6:59 AM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Kevin Tian
> Acked-by: Razvan Cojocaru
> Reviewed-by: Wei Liu
Acked-by: Tamas K Lengyel
___
Xen-devel mailing list
Xen-deve
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Acked-by: Tamas K Lengyel
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.o
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
Reviewed-by: George Dunlap
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: George Dunlap
---
xen/arch/x86/smpboot.c | 31 ++-
1 file changed, 18 insertions(+), 13 deletions(-)
diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c
index 3ca716c..
Modify invalidate_shadow_ldt() to return a boolean indicating whether mappings
have been dropped, rather than taking a flush parameter. Tweak the internal
logic to be able to ASSERT() that v->arch.pv_vcpu.shadow_ldt_mapcnt matches
the number of PTEs removed.
This allows MMUEXTOP_SET_LDT to avoid
Andrew Cooper (3):
x86/smp: Rework cpu_smpboot_alloc() to cope with more than just
-ENOMEM
xen/x86: Introduce static inline wrappers for l{idt,gdt,ldt,tr}()
x86/ldt: Alter how invalidate_shadow_ldt() deals with TLB flushes
xen/arch/x86/cpu/common.c | 8
xen/arch/x86/domain.c
This avoids indirection and parameter constraint issues. Doing so relaxes the
load_LDT() constraints from %ax to any general purpose register.
The triple-fault reboot method stays as is, to avoid the int3 possibly getting
moved relative to the lidt.
Signed-off-by: Andrew Cooper
---
CC: Jan Beul
On 10/02/2017 01:59 PM, Julien Grall wrote:
> At the same time make the array gfns const has it is not modified within
> the function.
>
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
___
X
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 10/02/2017 01:59 PM, Julien Grall wrote:
> - Switch the return type to bool
> - Remove the parameter p2m_query_t q as it is not used
>
> Signed-off-by: Julien Grall
> Acked-by: Andrew Cooper
> Reviewed-by: Wei Liu
Reviewed-by: George Dunlap
On 10/02/2017 01:59 PM, Julien Grall wrote:
> Hi all,
>
> I have been attempting to use the PoD code on Arm (it will be sent in a
> separate series) and spent sometimes to clean-up and switch to typesafe gfn
> the current code.
>
> The PoD code has been tested on Arm (the version is slightly diff
When doing a live migration of a Xen guest with libxl, the images for
block devices are locked by the original QEMU process, and this prevent
the QEMU at the destination to take the lock and the migration fail.
From QEMU point of view, once the RAM of a domain is migrated, there is
two QMP command
Hi,
with Xen 4.8.2, migrated domains have wrong stats for stolen time.
For example :
root! laussor:/proc# cat stat
cpu 87957976 32463 6483874 361169794 3075806 0 937004 183086986113 0 0
cpu0 2828867 2434 226580 43754152 786651 0 42766 1778722573131 0 0
cpu1 2611496 3545 232529 42364047 594846
On 10/02/2017 05:12 AM, Jiri Slaby wrote:
> Use the new SYM_DATA_START_LOCAL, and SYM_DATA_END* macros:
> 8 OBJECT LOCAL DEFAULT6 gdt
> 000832 OBJECT LOCAL DEFAULT6 gdt_start
> 0028 0 OBJECT LOCAL DEFAULT6 gdt_end
> 0028 256 OBJECT LOCAL DEFAULT6 e
On 10/02/2017 05:12 AM, Jiri Slaby wrote:
> All these are functions which are invoked from elsewhere, but they are
> not typical C functions. So we annotate them (as global) using the new
> SYM_CODE_START. All these were not balanced with any END, so mark their
> ends by SYM_CODE_END, appropriatell
On Tue, Sep 26, 2017 at 02:43:39PM +, Owen Smith wrote:
> Writes "feature-raw-pointer" during init to indicate the backend
> can pass raw unscaled values for absolute axes to the frontend.
> Frontends set "request-raw-pointer" to indicate the backend should
> not attempt to scale absolute value
On Mon, 2017-10-02 at 17:38 +0300, Andrii Anisov wrote:
> Hello Meng Xu and Dario,
>
Hi,
> On 01.09.17 18:58, Meng Xu wrote:
> > This series of patches make RTDS scheduler work-conserving
> > without breaking real-time guarantees.
> > VCPUs with extratime flag set can get extra time
> > from the
Hi George,
On 10/02/2017 05:30 PM, George Dunlap wrote:
On 10/02/2017 01:59 PM, Julien Grall wrote:
Hi all,
I have been attempting to use the PoD code on Arm (it will be sent in a
separate series) and spent sometimes to clean-up and switch to typesafe gfn
the current code.
The PoD code has be
Currently, the flags used to update page tables (i.e PAGE_HYPERVISOR_*)
only contains the memory attribute index. Follow-up patches will add
more information in it. So document the current layout.
At the same time introduce PAGE_AI_MASK to get the memory attribute
index easily.
Signed-off-by: Jul
We should consider the early boot period to end when we stop using the
boot allocator. This is inline with x86 and will be helpful to know
whether we should allocate memory from the boot allocator or xenheap.
Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
Reviewed-by: Stefano Stabellini
Currently, it is not possible to specify the permission of a new
mapping. It would be necessary to use the function modify_xen_mappings
with a different set of flags.
Introduce a couple of new flags for the permissions (Non-eXecutable,
Read-Only) and also provides definition that combine the memor
Currently MAIRVAL is defined in term of MAIR0VAL and MAIR1VAL which are
both hardcoded value. This makes quite difficult to understand the value
written in both registers.
Rework the definition by using value of each attribute shifted by their
associated index.
Signed-off-by: Julien Grall
Review
This is based on the Linux ARMv8 naming scheme (see arch/arm64/mm/proc.S). Each
type will contain "NORMAL" or "DEVICE" to make clear whether each attribute
targets device or normal memory.
Signed-off-by: Julien Grall
---
Changes in v3:
- The ai '000' is named MT_DEVICE_nGnRnE and no
Currently, all the new mappings will be read-write non-executable. Allow the
caller to use other permissions.
Signed-off-by: Julien Grall
---
Changes in v2:
- Switch the runtime check to a BUG_ON()
---
xen/arch/arm/mm.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/arch
Hi all,
This patch series contains clean-up for the ARM memory subsystem in preparation
of reworking the page tables handling.
For all changes, see in each patch.
Cheers,
Julien Grall (9):
xen/arm: page: Use ARMv8 naming to improve readability
xen/arm: page: Clean-up the definition of MAIRV
The parameter 'ai' is used either for attribute index or for
permissions. Follow-up patch will rework that parameters to carry more
information. So rename the parameter to 'flags'.
Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
Reviewed-by: Stefano Stabellini
---
Changes in v3:
This will help to consolidate the page-table code and avoid different
path depending on the action to perform.
Signed-off-by: Julien Grall
Reviewed-by: Andre Przywara
Reviewed-by: Stefano Stabellini
---
Cc: Konrad Rzeszutek Wilk
Cc: Ross Lagerwall
arch_livepatch_secure is now the same
The description of AP[1] in Xen is based on testing rather than the ARM
ARM.
Per the ARM ARM, on EL2 stage-1 page table, AP[1] is RES1 as the
translation regime applies to only one exception level (see D4.4.4 and
G4.6.1 in ARM DDI 0487B.a).
Update the comment and also rename the field to match th
On Tue, Sep 26, 2017 at 02:43:38PM +, Owen Smith wrote:
> Avoid the unneccessary calls through the input-legacy.c file by
> using the qemu_input_handler_*() calls directly. This did require
> reworking the event and sync handlers to use the reverse mapping
> from qcode to linux using qemu_input
1 - 100 of 124 matches
Mail list logo