+++
1 file changed, 3 insertions(+), 8 deletions(-)
Juergen Gross (3):
x86/xen: fix xen_hypercall_hvm() to not clobber %rbx
x86/xen: add FRAME_END to xen_hypercall_hvm()
x86/xen: remove unneeded dummy push from xen_hypercall_hvm()
Stack alignment of the kernel in 64-bit mode is 8, not 16, so the
dummy push in xen_hypercall_hvm() for aligning the stack to 16 bytes
can be removed.
Signed-off-by: Juergen Gross
---
arch/x86/xen/xen-head.S | 6 --
1 file changed, 6 deletions(-)
diff --git a/arch/x86/xen/xen-head.S b/arch
xen_hypercall_hvm() is missing a FRAME_END at the end, add it.
Reported-by: kernel test robot
Closes:
https://lore.kernel.org/oe-kbuild-all/202502030848.htnttuo9-...@intel.com/
Fixes: b4845bb63838 ("x86/xen: add central hypercall functions")
Signed-off-by: Juergen Gross
---
arch/x
using an already saved register instead of %rbx.
Fixes: b4845bb63838 ("x86/xen: add central hypercall functions")
Signed-off-by: Juergen Gross
---
V2:
- use %rcx instead of %rbx, keeping the lea instruction (Jan Beulich)
---
arch/x86/xen/xen-head.S | 4 ++--
1 file changed, 2 insert
3 fixes of the xen_hypercall_hvm() function, with the last one being
probably more a cleanup.
Juergen Gross (3):
x86/xen: fix xen_hypercall_hvm() to not clobber %rbx
x86/xen: add FRAME_END to xen_hypercall_hvm()
x86/xen: remove unneeded dummy push from xen_hypercall_hvm()
arch/x86/xen/xen
not modifying %rbx in xen_hypercall_hvm().
Fixes: b4845bb63838 ("x86/xen: add central hypercall functions")
Signed-off-by: Juergen Gross
---
arch/x86/xen/xen-head.S | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/arch/x86/xen/xen-head.S b/arch/x86/xen/xen-he
xen_hypercall_hvm() is missing a FRAME_END at the end, add it.
Reported-by: kernel test robot
Closes:
https://lore.kernel.org/oe-kbuild-all/202502030848.htnttuo9-...@intel.com/
Fixes: b4845bb63838 ("x86/xen: add central hypercall functions")
Signed-off-by: Juergen Gross
---
arch/x
pu time of xenstored by 6% with this change applied.
Signed-off-by: Juergen Gross
---
V8:
- new patch
---
tools/xenstored/domain.c | 64 +---
1 file changed, 46 insertions(+), 18 deletions(-)
diff --git a/tools/xenstored/domain.c b/tools/xenstored/domain.c
index
Use the new unique_id of a domain in order to detect that a domain
has been replaced with another one reusing the doamin-id of the old
domain.
Signed-off-by: Juergen Gross
---
V8:
- new patch
---
tools/xenstored/domain.c | 53 +++-
tools/xenstored
In order to close a race window for Xenstore live update when using
the new unique_id of domains, the migration stream needs to contain
this unique_id for each domain known by Xenstore.
Signed-off-by: Juergen Gross
---
V8:
- new patch
---
docs/designs/xenstore-migration.md | 14
direct replacement without using the functionality
of obtaining information about domains having changed the state.
Signed-off-by: Juergen Gross
Reviewed-by: Samuel Thibault
Reviewed-by: Anthony PERARD
---
V1:
- use library instead of direct hypercall, only replace current
libxenctrl use case
this domctl stable. For stable domctls the
interface_version is always 0.
Signed-off-by: Juergen Gross
Acked-by: Daniel P. Smith
Reviewed-by: Jan Beulich
---
V1:
- use a domctl subop for the new interface (Jan Beulich)
V2:
- fix XSM hooks (Daniel P. Smith)
- remove versioning of stable sub-ops
only if the
virq in question is not bound by the current domain allowed to use it.
Currently the only user of XEN_DOMCTL_set_virq_handler in the Xen code
base is init-xenstore-domain, so changing the behavior like above will
not cause any problems.
Signed-off-by: Juergen Gross
---
V6:
- new patch
In order to have a stable interface in user land for using stable
domctl and possibly later sysctl interfaces, add a new library
libxenmanage.
Signed-off-by: Juergen Gross
Reviewed-by: Anthony PERARD
---
V1:
- new patch
V2:
- define __XEN_TOOLS__ via Makefile (Anthony PERARD)
- use SPDX in
is tightly coupled with the VIRQ_DOM_EXC
event, it is meant to be used only by a single consumer in the system,
just like the VIRQ_DOM_EXC event.
Resetting a bit will be done in a future patch.
This information is needed for Xenstore to keep track of all domains.
Signed-off-by: Juergen Gross
comment by Jan Beulich)
- rework of locking in patch 4 (Jan Beulich)
Changes in V7:
- addressed comments
- rebase
Changes in V8:
- patch 1 of v7 has gone in
- addressed comments
- new patches 7-9 using the new unique_id and xenmanage_poll_changed_domain()
Juergen Gross (9):
xen/events: don
the domain isn't set to
handle that virq. Note that this check is inside the write_lock() on
purpose, as a future patch will put a related check into
set_global_virq_handler() with the addition of using the same lock.
Signed-off-by: Juergen Gross
---
V6:
- new patch
V7:
- move handling domain chec
On 03.02.25 23:43, Stefano Stabellini wrote:
+Xen maintainers
On Mon, 3 Feb 2025, Richard Henderson wrote:
On 2/3/25 04:54, Paolo Bonzini wrote:
On 2/3/25 04:18, Richard Henderson wrote:
v1: 20250128004254.33442-1-richard.hender...@linaro.org
For v2, immediately disable 64-on-32 TCG.
I *su
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-6.14-rc1-tag
xen: branch for v6.14-rc1
It contains 3 minor fixes.
Thanks.
Juergen
arch/x86/xen/mmu_pv.c | 4
drivers/xen/pcpu.c | 2 +-
drivers/xen/pvcalls-
On 29.01.25 10:15, Harshvardhan Jha wrote:
On 29/01/25 2:34 PM, Greg KH wrote:
On Wed, Jan 29, 2025 at 02:29:48PM +0530, Harshvardhan Jha wrote:
Hi Greg,
On 29/01/25 2:18 PM, Greg KH wrote:
On Wed, Jan 29, 2025 at 02:13:34PM +0530, Harshvardhan Jha wrote:
Hi there,
On 29/01/25 2:05 PM, Gre
On 10.01.25 20:18, Stefano Stabellini wrote:
While currently there are no in-tree callers of these functions, it is
best to keep them up-to-date with the latest network API.
Signed-off-by: Stefano Stabellini
What are your future plans regarding usage of this function?
I guess you are looking
In order to have a stable interface in user land for using stable
domctl and possibly later sysctl interfaces, add a new library
libxenmanage.
Signed-off-by: Juergen Gross
Reviewed-by: Anthony PERARD
---
V1:
- new patch
V2:
- define __XEN_TOOLS__ via Makefile (Anthony PERARD)
- use SPDX in
direct replacement without using the functionality
of obtaining information about domains having changed the state.
Signed-off-by: Juergen Gross
Reviewed-by: Samuel Thibault
---
V1:
- use library instead of direct hypercall, only replace current
libxenctrl use case
Please note that this patch can
this domctl stable. For stable domctls the
interface_version is always 0.
Signed-off-by: Juergen Gross
Acked-by: Daniel P. Smith
---
V1:
- use a domctl subop for the new interface (Jan Beulich)
V2:
- fix XSM hooks (Daniel P. Smith)
- remove versioning of stable sub-ops (Jan Beulich)
- use
only if the
virq in question is not bound by the current domain allowed to use it.
Currently the only user of XEN_DOMCTL_set_virq_handler in the Xen code
base is init-xenstore-domain, so changing the behavior like above will
not cause any problems.
Signed-off-by: Juergen Gross
---
V6:
- new patch
is tightly coupled with the VIRQ_DOM_EXC
event, it is meant to be used only by a single consumer in the system,
just like the VIRQ_DOM_EXC event.
Resetting a bit will be done in a future patch.
This information is needed for Xenstore to keep track of all domains.
Signed-off-by: Juergen Gross
the domain isn't set to
handle that virq. Note that this check is inside the write_lock() on
purpose, as a future patch will put a related check into
set_global_virq_handler() with the addition of using the same lock.
Signed-off-by: Juergen Gross
---
V6:
- new patch
V7:
- move handling domain chec
r fixing a race and avoiding new races with the
added functionality (result of a comment by Jan Beulich)
- rework of locking in patch 4 (Jan Beulich)
Changes in V7:
- addressed comments
- rebase
Juergen Gross (7):
xen/events: fix race with set_global_virq_handler()
xen/events: don't allow b
r
domains")
Signed-off-by: Juergen Gross
---
V6:
- new patch
V7:
- add comment (Jan Beulich)
---
xen/common/event_channel.c | 25 ++---
1 file changed, 22 insertions(+), 3 deletions(-)
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index 8db2ca4ba2..46
On 07.01.25 18:06, Jan Beulich wrote:
On 07.01.2025 17:48, Jürgen Groß wrote:
On 07.01.25 17:28, Jan Beulich wrote:
On 07.01.2025 11:17, Juergen Gross wrote:
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -185,6 +185,76 @@ static void domain_changed_state(const struct domain *d
On 07.01.25 16:49, Jan Beulich wrote:
On 07.01.2025 16:37, Juergen Gross wrote:
On 07.01.25 16:23, Jan Beulich wrote:
On 07.01.2025 11:17, Juergen Gross wrote:
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -979,6 +979,7 @@ void send_global_virq(uint32_t virq)
int
On 07.01.25 16:23, Jan Beulich wrote:
On 07.01.2025 11:17, Juergen Gross wrote:
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -979,6 +979,7 @@ void send_global_virq(uint32_t virq)
int set_global_virq_handler(struct domain *d, uint32_t virq)
{
struct domain *old
the domain isn't set to
handle that virq.
Signed-off-by: Juergen Gross
---
V6:
- new patch
---
xen/common/event_channel.c | 20 +++-
1 file changed, 15 insertions(+), 5 deletions(-)
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index f2b64c48fb..62060dc6
direct replacement without using the functionality
of obtaining information about domains having changed the state.
Signed-off-by: Juergen Gross
Reviewed-by: Samuel Thibault
---
V1:
- use library instead of direct hypercall, only replace current
libxenctrl use case
Please note that this patch can
is tightly coupled with the VIRQ_DOM_EXC
event, it is meant to be used only by a single consumer in the system,
just like the VIRQ_DOM_EXC event.
Resetting a bit will be done in a future patch.
This information is needed for Xenstore to keep track of all domains.
Signed-off-by: Juergen Gross
In order to have a stable interface in user land for using stable
domctl and possibly later sysctl interfaces, add a new library
libxenmanage.
Signed-off-by: Juergen Gross
Reviewed-by: Anthony PERARD
---
V1:
- new patch
V2:
- define __XEN_TOOLS__ via Makefile (Anthony PERARD)
- use SPDX in
this domctl stable. For stable domctls the
interface_version is always 0.
Signed-off-by: Juergen Gross
Acked-by: Daniel P. Smith
---
V1:
- use a domctl subop for the new interface (Jan Beulich)
V2:
- fix XSM hooks (Daniel P. Smith)
- remove versioning of stable sub-ops (Jan Beulich)
- use
r fixing a race and avoiding new races with the
added functionality (result of a comment by Jan Beulich)
- rework of locking in patch 4 (Jan Beulich)
Juergen Gross (7):
xen/events: fix race with set_global_virq_handler()
xen/events: don't allow binding a global virq from any domain
xe
r
domains")
Signed-off-by: Juergen Gross
---
V6:
- new patch
---
xen/common/event_channel.c | 16 +---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/xen/common/event_channel.c b/xen/common/event_channel.c
index 8db2ca4ba2..f2b64c48fb 100644
--- a/xen/common/event_chan
only if the
virq in question is not bound by the current domain allowed to use it.
Currently the only user of XEN_DOMCTL_set_virq_handler in the Xen code
base is init-xenstore-domain, so changing the behavior like above will
not cause any problems.
Signed-off-by: Juergen Gross
---
V6:
- new patch
On 19.12.24 09:01, Jan Beulich wrote:
On 18.12.2024 08:15, Jürgen Groß wrote:
On 17.12.24 17:12, Jan Beulich wrote:
On 17.12.2024 16:55, Jürgen Groß wrote:
On 17.12.24 16:19, Jan Beulich wrote:
On 17.12.2024 15:22, Juergen Gross wrote:
Add a bitmap with one bit per possible domid indicating
On 02.01.25 11:20, Jürgen Groß wrote:
On 19.12.24 17:14, Marek Marczykowski-Górecki wrote:
Hi,
It crashes on boot like below, most of the times. But sometimes (rarely)
it manages to stay alive. Below I'm pasting few of the crashes that look
distinctly different, if you follow the links, you can
this domctl stable. For stable domctls the
interface_version is always 0.
Signed-off-by: Juergen Gross
---
V1:
- use a domctl subop for the new interface (Jan Beulich)
V2:
- fix XSM hooks (Daniel P. Smith)
- remove versioning of stable sub-ops (Jan Beulich)
- use domctl.domain for retuning domid
In order to have a stable interface in user land for using stable
domctl and possibly later sysctl interfaces, add a new library
libxenmanage.
Signed-off-by: Juergen Gross
Reviewed-by: Anthony PERARD
---
V1:
- new patch
V2:
- define __XEN_TOOLS__ via Makefile (Anthony PERARD)
- use SPDX in
is tightly coupled with the VIRQ_DOM_EXC
event, it is meant to be used only by a single consumer in the system,
just like the VIRQ_DOM_EXC event.
Resetting a bit will be done in a future patch.
This information is needed for Xenstore to keep track of all domains.
Signed-off-by: Juergen Gross
direct replacement without using the functionality
of obtaining information about domains having changed the state.
Signed-off-by: Juergen Gross
Reviewed-by: Samuel Thibault
---
V1:
- use library instead of direct hypercall, only replace current
libxenctrl use case
Please note that this patch can
Changes in V4:
- patches 1 and 3 of V3 dropped, as already committed
- addressed comments
Changes in V5:
- addressed comments
Juergen Gross (5):
tools: add a dedicated header file for barrier definitions
xen: add bitmap to indicate per-domain state changes
xen: add new domctl get_changed_doma
Instead of having to include xenctrl.h for getting definitions of cpu
barriers, add a dedicated header for that purpose.
Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h.
This is in preparation of making Xenstore independent from libxenctrl.
Signed-off-by: Juergen Gross
this domctl stable. For stable domctls the
interface_version is always 0.
Signed-off-by: Juergen Gross
---
V1:
- use a domctl subop for the new interface (Jan Beulich)
V2:
- fix XSM hooks (Daniel P. Smith)
- remove versioning of stable sub-ops (Jan Beulich)
- use domctl.domain for retuning domid
Instead of having to include xenctrl.h for getting definitions of cpu
barriers, add a dedicated header for that purpose.
Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h.
This is in preparation of making Xenstore independent from libxenctrl.
Signed-off-by: Juergen Gross
direct replacement without using the functionality
of obtaining information about domains having changed the state.
Signed-off-by: Juergen Gross
Reviewed-by: Samuel Thibault
---
V1:
- use library instead of direct hypercall, only replace current
libxenctrl use case
Please note that this patch can
In order to have a stable interface in user land for using stable
domctl and possibly later sysctl interfaces, add a new library
libxenmanage.
Signed-off-by: Juergen Gross
Reviewed-by: Anthony PERARD
---
V1:
- new patch
V2:
- define __XEN_TOOLS__ via Makefile (Anthony PERARD)
- use SPDX in
is tightly coupled with the VIRQ_DOM_EXC
event, it is meant to be used only by a single consumer in the system,
just like the VIRQ_DOM_EXC event.
Resetting a bit will be done in a future patch.
This information is needed for Xenstore to keep track of all domains.
Signed-off-by: Juergen Gross
Changes in V4:
- patches 1 and 3 of V3 dropped, as already committed
- addressed comments
Juergen Gross (5):
tools: add a dedicated header file for barrier definitions
xen: add bitmap to indicate per-domain state changes
xen: add new domctl get_changed_domain
tools/libs: add a new libxenmana
On 16.12.24 15:49, Anthony PERARD wrote:
On Fri, Dec 13, 2024 at 05:24:20PM +0100, Juergen Gross wrote:
diff --git a/tools/include/xenmanage.h b/tools/include/xenmanage.h
new file mode 100644
index 00..5d169693b0
--- /dev/null
+++ b/tools/include/xenmanage.h
@@ -0,0 +1,92 @@
+/* SPDX
On 16.12.24 11:41, Jan Beulich wrote:
On 13.12.2024 17:24, Juergen Gross wrote:
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -193,6 +193,57 @@ static void domain_changed_state(const struct domain *d)
spin_unlock(&dom_state_changed_lock);
}
+static void set_domain_state_
direct replacement without using the functionality
of obtaining information about domains having changed the state.
Signed-off-by: Juergen Gross
Reviewed-by: Samuel Thibault
---
V1:
- use library instead of direct hypercall, only replace current
libxenctrl use case
Please note that this patch can
In order to have a stable interface in user land for using stable
domctl and possibly later sysctl interfaces, add a new library
libxenmanage.
Signed-off-by: Juergen Gross
---
V1:
- new patch
V2:
- define __XEN_TOOLS__ via Makefile (Anthony PERARD)
- use SPDX in header file (Anthony PERARD
is tightly coupled with the VIRQ_DOM_EXC
event, it is meant to be used only by a single consumer in the system,
just like the VIRQ_DOM_EXC event.
Resetting a bit will be done in a future patch.
This information is needed for Xenstore to keep track of all domains.
Signed-off-by: Juergen Gross
this domctl stable. For stable domctls the
interface_version is always 0.
Signed-off-by: Juergen Gross
---
V1:
- use a domctl subop for the new interface (Jan Beulich)
V2:
- fix XSM hooks (Daniel P. Smith)
- remove versioning of stable sub-ops (Jan Beulich)
- use domctl.domain for retuning domid
igned-off-by: Juergen Gross
Reviewed-by: Jan Beulich
Reviewed-by: Alejandro Vallejo
---
V1:
- make unique_id local to function (Jan Beulich)
- add lock (Julien Grall)
- add comment (Julien Grall)
V2:
- move reading unique_id into locked section (Julien Grall)
- add comment (Alejandro Vallejo)
---
, which is the privilege really
wanted. Note that this test is still wider than the sysctl entry test,
but there is no easy way to make both domctl and sysctl happy at the
same time.
Signed-off-by: Juergen Gross
Acked-by: Daniel P. Smith
---
V2:
- new patch
---
xen/common/domctl.c | 2 +-
been Acked already, so it can go in as soon as patch
6 of this series (the one introducing libxenmanage) has been committed.
Changes in V2:
- new patch 1
- former patch 5 mover earlier, now patch 2 (can go in without the rest
of the series)
- addressed comments
Changes in V3:
- addressed comment
Instead of having to include xenctrl.h for getting definitions of cpu
barriers, add a dedicated header for that purpose.
Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h.
This is in preparation of making Xenstore independent from libxenctrl.
Signed-off-by: Juergen Gross
On 12.12.24 11:22, Jan Beulich wrote:
On 11.12.2024 19:20, Thierry Escande wrote:
Hi Jan,
On 09/12/2024 11:04, Jan Beulich wrote:
On 04.12.2024 18:14, Thierry Escande wrote:
With change 9f40ec84a797 (xen/swiotlb: add alignment check for dma
buffers), the driver mpt3sas fails to load because i
0x10/0x10
[ 3680.685657] ret_from_fork_asm+0x1a/0x30
[ 3680.685662]
[ 3680.685267] xen:grant_table: Grant tables using version 1 layout
[ 3680.685921] OOM killer enabled.
[ 3680.685934] Restarting tasks ... done.
Signed-off-by: Maksym Planeta
Reviewed-by: Juergen Gross
On 07.12.24 11:50, Julia Zhang wrote:
To implement dGPU prime feature, virtgpu needs to import/export buffer
between virtio iGPU and passthrough dGPU. Before that, virtgpu should
check if P2P is possible or not. But calling function pci_p2pdma_distance
in guest VM will only get virtual p2pdma_dis
direct replacement without using the functionality
of obtaining information about domains having changed the state.
Signed-off-by: Juergen Gross
---
V1:
- use library instead of direct hypercall, only replace current
libxenctrl use case
Please note that this patch can be committed only after the
In order to have a stable interface in user land for using stable
domctl and possibly later sysctl interfaces, add a new library
libxenmanage.
Signed-off-by: Juergen Gross
---
V1:
- new patch
V2:
- define __XEN_TOOLS__ via Makefile (Anthony PERARD)
- use SPDX in header file (Anthony PERARD
in a future patch.
This information is needed for Xenstore to keep track of all domains.
Signed-off-by: Juergen Gross
---
V2:
- use DOMID_FIRST_RESERVED instead of DOMID_MASK + 1 (Jan Beulich)
- use const (Jan Beulich)
- move call of domain_reset_states() into evtchn_bind_virq() (Jan Beulich
Instead of having to include xenctrl.h for getting definitions of cpu
barriers, add a dedicated header for that purpose.
Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h.
This is in preparation of making Xenstore independent from libxenctrl.
Signed-off-by: Juergen Gross
this domctl stable. For stable domctls the
interface_version is always 0.
Signed-off-by: Juergen Gross
---
V1:
- use a domctl subop for the new interface (Jan Beulich)
V2:
- fix XSM hooks (Daniel P. Smith)
- remove versioning of stable sub-ops (Jan Beulich)
- use domctl.domain for retuning domid
, which is the privilege really
wanted. Note that this test is still wider than the sysctl entry test,
but there is now easy way to make both domctl and sysctl happy at the
same time.
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
xen/common/domctl.c | 2 +-
xen/common/sysctl.c |
igned-off-by: Juergen Gross
Reviewed-by: Jan Beulich
Reviewed-by: Alejandro Vallejo
---
V1:
- make unique_id local to function (Jan Beulich)
- add lock (Julien Grall)
- add comment (Julien Grall)
V2:
- move reading unique_id into locked section (Julien Grall)
- add comment (Alejandro Vallejo)
---
been Acked already, so it can go in as soon as patch
6 of this series (the one introducing libxenmanage) has been committed.
Changes in V2:
- new patch 1
- former patch 5 mover earlier, now patch 2 (can go in without the rest
of the series)
- addressed comments
Juergen Gross (7):
xen/xsm: make get
On 04.12.24 11:01, Juergen Gross wrote:
On 23.10.24 15:10, Juergen Gross wrote:
Add a new domctl sub-function to get data of a domain having changed
state (this is needed by Xenstore).
The returned state just contains the domid, the domain unique id,
and some flags (existing, shutdown, dying
On 23.10.24 15:10, Juergen Gross wrote:
Add a new domctl sub-function to get data of a domain having changed
state (this is needed by Xenstore).
The returned state just contains the domid, the domain unique id,
and some flags (existing, shutdown, dying).
In order to enable Xenstore stubdom
The wbinvd paravirt hook is a leftover of lguest times. Today it is
no longer needed, as all users use the native wbinvd implementation.
Remove the hook and rename native_wbinvd() to wbinvd().
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/paravirt.h | 7 ---
arch/x86
On 03.12.24 05:09, Xin Li wrote:
On 12/2/2024 5:44 PM, Kevin Loughlin wrote:
On Mon, Dec 2, 2024 at 5:28 PM Andrew Cooper wrote:
On 03/12/2024 12:59 am, Kevin Loughlin wrote:
diff --git a/arch/x86/include/asm/paravirt.h b/arch/x86/include/asm/paravirt.h
index d4eb9e1d61b8..c040af2d8eff 10064
6c847402e1c6, but I think the
need for it went away some time later.
Cc: Juergen Gross
Cc: Stefano Stabellini
Cc: Oleksandr Tyshchenko
Cc: xen-devel@lists.xenproject.org
Cc: linux-ker...@vger.kernel.org
Signed-off-by: Sergio Miguéns Iglesias
Reviewed-by: Juergen Gross
Juergen
On 21.11.24 13:23, Dominique Martinet wrote:
Alexander Merritt wrote on Tue, Nov 19, 2024 at 09:16:33PM +:
From: Alex Zenla
Large amount of mount hangs observed during hotplugging of 9pfs devices. The
9pfs Xen driver attempts to initialize itself more than once, causing the
frontend and ba
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-6.13-rc1-tag
xen: branch for v6.13-rc1
It contains:
- a series for booting as a PVH guest, doing some cleanups after the
previous work to make PVH boot code position independent
-
On 29.10.24 13:13, Andrew Cooper wrote:
On 29/10/2024 12:02 pm, Jürgen Groß wrote:
On 29.10.24 13:01, Andrew Cooper wrote:
On 29/10/2024 11:50 am, Samuel Thibault wrote:
Juergen Gross, le mar. 29 oct. 2024 12:41:58 +0100, a ecrit:
Grub-pv needs start_info_union and phys_to_machine_mapping to
Grub-pv needs start_info_union and phys_to_machine_mapping to be
accessible. Export both symbols.
Fixes: 33411a11f848 ("Mini-OS: hide all symbols not exported via
EXPORT_SYMBOLS()")
Reported-by: Natanael Copa
Signed-off-by: Juergen Gross
---
arch/x86/mm.c| 1 +
arch/x86/setup.
On 23.10.24 16:08, Alejandro Vallejo wrote:
On Wed Oct 23, 2024 at 2:10 PM BST, Juergen Gross wrote:
Xenstore is referencing domains by their domid, but reuse of a domid
can lead to the situation that Xenstore can't tell whether a domain
with that domid has been deleted and created
Add CONFIG_LIBXENMANAGE support.
Signed-off-by: Juergen Gross
---
Please note that this patch should be committed only after the related
Xen patch "tools/libs: add a new libxenmanage library" has been Acked,
as otherwise it should either be dropped (in case the approach of
adding a n
direct replacement without using the functionality
of obtaining information about domains having changed the state.
Signed-off-by: Juergen Gross
---
V1:
- use library instead of direct hypercall, only replace current
libxenctrl use case
Please note that this patch can be committed only after the
In order to have a stable interface in user land for using stable
domctl and possibly later sysctl interfaces, add a new library
libxenmanage.
Signed-off-by: Juergen Gross
---
V1:
- new patch
---
tools/include/xenmanage.h | 98 +
tools/libs/Makefile
in a future patch.
This information is needed for Xenstore to keep track of all domains.
Signed-off-by: Juergen Gross
---
xen/common/domain.c| 21 +
xen/common/event_channel.c | 2 ++
xen/include/xen/sched.h| 2 ++
3 files changed, 25 insertions(+)
diff --git
,
thus removing any xenctrl reference from xenstored code.
Please note that the last patch can be committed only after the related
Mini-OS patch "config: add support for libxenmanage" has gone in AND
the Mini-OS commit-id has been updated in Config.mk accordingly!
Juergen Gross (6):
igned-off-by: Juergen Gross
Reviewed-by: Jan Beulich
---
V1:
- make unique_id local to function (Jan Beulich)
- add lock (Julien Grall)
- add comment (Julien Grall)
---
xen/common/domain.c | 20
xen/include/xen/sched.h | 3 +++
2 files changed, 23 insertions(+)
diff --
Instead of having to include xenctrl.h for getting definitions of cpu
barriers, add a dedicated header for that purpose.
Switch the xen-9pfsd daemon to use the new header instead of xenctrl.h.
This is in preparation of making Xenstore independent from libxenctrl.
Signed-off-by: Juergen Gross
version, but might be lower in
case the hypervisor doesn't support this version).
Signed-off-by: Juergen Gross
---
V1:
- use a domctl subop for the new interface (Jan Beulich)
---
tools/flask/policy/modules/dom0.te | 2 +-
xen/common/domain.c
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-6.12a-rc4-tag
xen: branch for v6.12-rc4
It contains just a single fix for a build failure introduced with a
patch in the 6.12 merge window.
Thanks.
Juergen
drivers/xen/Kconfig
domctl.h and sysctl.h have an interface version, which needs to be
bumped in case of incompatible modifications of the interface.
In order to avoid misunderstandings, add a comment to both headers
specifying in which cases a bump is needed.
Signed-off-by: Juergen Gross
---
xen/include/public
ned-off-by: Juergen Gross
---
xen/include/public/domctl.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
index e1028fc524..54cc9a06db 100644
--- a/xen/include/public/domctl.h
+++ b/xen/include/public/domctl.h
@@ -
, 4 insertions(+)
Juergen Gross (1):
x86/xen: mark boot CPU of PV guest in MSR_IA32_APICBASE
On 11.10.24 05:42, Jiqian Chen wrote:
Commit 2fae6bb7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
adds a weak reverse dependency to the config XEN_PRIVCMD definition, that
dependency causes xen-privcmd can't be loaded on domU, because dependent
xen-pciback isn't always be loaded succ
b7be32 ("xen/privcmd: Add new syscall to get gsi from dev")
Reported-by: Marek Marczykowski-Górecki
Signed-off-by: Jiqian Chen
Reviewed-by: Juergen Gross
Juergen
OpenPGP_0xB0DE9DD628BF132F.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
On 11.10.24 12:10, Jan Beulich wrote:
On 11.10.2024 11:33, Chen, Jiqian wrote:
On 2024/10/11 17:20, Chen, Jiqian wrote:
On 2024/10/11 16:54, Jan Beulich wrote:
On 11.10.2024 05:42, Jiqian Chen wrote:
@@ -1757,11 +1756,19 @@ static int __init xen_pcibk_init(void)
bus_register_n
1 - 100 of 4466 matches
Mail list logo