On Wed, Jan 8, 2025 at 1:23 PM Andrew Cooper wrote:
> Seeing as this is the only issue, I'm happy to fix on commit?
Fine by me!
P.
On Tue, Jan 7, 2025 at 5:46 PM Jan Beulich wrote:
> Hmm ... Instead of you touching the bit in every one of the case blocks,
> I was expecting you to clear the bit ahead of the switch(), accepting a
> double update in the p2m_access_r_pw case.
I did consider it, but ultimately didn't like the dou
From: Petr Beneš
The EPT Paging-write feature (when enabled by the
TERTIARY_EXEC_EPT_PAGING_WRITE bit) uses bit 58 of the EPT entry to indicate
that guest paging may update the page, even if the W access is not set.
This patch is a preparation for the EPT Paging-write feature.
Signed-off-by
From: Petr Beneš
This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is
similar to XENMEM_access_r, but for processors with
TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later),
it also permits the CPU to write to the page during guest page
From: Petr Beneš
Changes since v2:
- Reset entry->pw in all cases in p2m_set_entry, except for p2m_access_r_pw
Changes since v1:
- Added signed-off-by tags
This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is
similar to XENMEM_access_r, but for processors w
On Fri, Dec 20, 2024 at 2:09 PM Jan Beulich wrote:
>
> To avoid the flag becoming "sticky", I think you need to clear it ahead of
> this switch() (or right at the start of the function).
>
> Jan
When thinking about it now, wouldn't it make sense to only reset it in
the p2m_ram_rw case above? I me
From: Petr Beneš
The EPT Paging-write feature (when enabled by the
TERTIARY_EXEC_EPT_PAGING_WRITE bit) uses bit 58 of the EPT entry to indicate
that guest paging may update the page, even if the W access is not set.
This patch is a preparation for the EPT Paging-write feature.
Signed-off-by
From: Petr Beneš
Changes since v1:
- Added signed-off-by tags
This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is
similar to XENMEM_access_r, but for processors with
TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later),
it also permits the
From: Petr Beneš
This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is
similar to XENMEM_access_r, but for processors with
TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later),
it also permits the CPU to write to the page during guest page
From: Petr Beneš
This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is
similar to XENMEM_access_r, but for processors with
TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later),
it also permits the CPU to write to the page during guest page
From: Petr Beneš
This patch introduces a new XENMEM_access_r_pw permission. Functionally, it is
similar to XENMEM_access_r, but for processors with
TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later),
it also permits the CPU to write to the page during guest page
From: Petr Beneš
The EPT Paging-write feature (when enabled by the
TERTIARY_EXEC_EPT_PAGING_WRITE bit) uses bit 58 of the EPT entry to indicate
that guest paging may update the page, even if the W access is not set.
This patch is a preparation for the EPT Paging-write feature.
---
xen/arch
On Wed, Oct 16, 2024 at 12:10 PM Jan Beulich wrote:
> While the first two patches did go in, the rest is still pending afaict. If
> the series is still deemed relevant, would you please either chase the
> missing but necessary acks, or re-submit with review comments addressed (if
> any)? If instea
On Thu, Jun 20, 2024 at 9:25 AM Jan Beulich wrote:
> Not exactly. You may not assert on idx. The assertion, if any, wants to
> check d->nr_altp2m against MAX_EPTP.
In addition to the check in arch_sanitize_domain? As a safeguard?
> You're again comparing cases where we control the index (in the
On Thu, Jun 13, 2024 at 2:03 PM Jan Beulich wrote:
> > @@ -510,13 +526,13 @@ int p2m_change_altp2m_gfn(struct domain *d, unsigned
> > int idx,
> > mfn_t mfn;
> > int rc = -EINVAL;
> >
> > -if ( idx >= min(ARRAY_SIZE(d->arch.altp2m_p2m), MAX_EPTP) ||
> > +if ( idx >= d->nr_altp2
On Tue, Jun 11, 2024 at 11:36 AM Jan Beulich wrote:
>
> On 11.06.2024 11:34, Petr Beneš wrote:
> > On Tue, Jun 11, 2024 at 11:14 AM Jan Beulich wrote:
> >> On 11.06.2024 10:00, Petr Beneš wrote:
> >>> On Tue, Jun 11, 2024 at 8:41 AM Jan Beulich wrote:
>
On Tue, Jun 11, 2024 at 11:14 AM Jan Beulich wrote:
>
> On 11.06.2024 10:00, Petr Beneš wrote:
> > On Tue, Jun 11, 2024 at 8:41 AM Jan Beulich wrote:
> >>
> >> On 10.06.2024 19:10, Petr Beneš wrote:
> >>> From: Petr Beneš
> >>>
> >&g
On Tue, Jun 11, 2024 at 8:41 AM Jan Beulich wrote:
>
> On 10.06.2024 19:10, Petr Beneš wrote:
> > From: Petr Beneš
> >
> > Encapsulate the altp2m options within a struct. This change is preparatory
> > and sets the groundwork for introducing additional para
From: Petr Beneš
Update manual pages to include detailed information about the altp2m_count
configuration parameter.
Signed-off-by: Petr Beneš
---
docs/man/xl.cfg.5.pod.in | 14 ++
1 file changed, 14 insertions(+)
diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
From: Petr Beneš
Encapsulate the altp2m options within a struct. This change is preparatory
and sets the groundwork for introducing additional parameter in subsequent
commit.
Signed-off-by: Petr Beneš
Acked-by: Julien Grall # arm
Reviewed-by: Jan Beulich # hypervisor
---
tools/libs/light
From: Petr Beneš
This commit activates the previously introduced altp2m_count parameter,
establishing the connection between libxl and Xen.
Signed-off-by: Petr Beneš
---
tools/libs/light/libxl_create.c | 4
1 file changed, 4 insertions(+)
diff --git a/tools/libs/light/libxl_create.c b
From: Petr Beneš
No functional change.
Signed-off-by: Petr Beneš
Acked-by: Christian Lindig
---
tools/ocaml/libs/xc/xenctrl_stubs.c | 18 +-
1 file changed, 9 insertions(+), 9 deletions(-)
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c
b/tools/ocaml/libs/xc
From: Petr Beneš
Allow developers using the OCaml bindings to set the altp2m_count parameter.
Signed-off-by: Petr Beneš
Acked-by: Christian Lindig
---
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools/ocaml/libs/xc/xenctrl_stubs.c | 19
From: Petr Beneš
This commit introduces the ability to configure the maximum number of altp2m
views for the domain during its creation. Previously, the limits were hardcoded
to a maximum of 10. This change allows for greater flexibility in environments
that require more or fewer altp2m views
From: Petr Beneš
Since libxl finally sends the altp2m.nr value, we can remove the previously
introduced temporary workaround.
Creating domain with enabled altp2m while setting altp2m.nr == 0 doesn't
make sense and it's probably not what user wants.
Signed-off-by: Petr Beneš
Ack
From: Petr Beneš
This series introduces the ability to configure the maximum number of altp2m
tables during domain creation. Previously, the limits were hardcoded to a
maximum of 10. This change allows for greater flexibility in environments that
require more or fewer altp2m views.
This
From: Petr Beneš
Fixes: 0291089f6ea8 ("xen: enable altp2m at create domain domctl")
Signed-off-by: Petr Beneš
Acked-by: Christian Lindig
---
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools/ocaml/libs/xc/xenctrl_stubs.c | 9 ++--
From: Petr Beneš
Introduce a new altp2m_count parameter to control the maximum number of altp2m
views a domain can use. By default, if altp2m_count is unspecified and altp2m
is enabled, the value is set to 10, reflecting the legacy behavior.
This change is preparatory; it establishes the
> (when booted with altp2m=1)
Sorry, forgot to remove this statement before sending the email, it's
not really true.
I wanted to add that as I wrote in a previous email exchange - altp2m
should be ideally initialized only when it's requested - as opposed to
the current situation, when it's initia
On Mon, Jun 10, 2024 at 1:21 PM Jan Beulich wrote:
>
> On 10.06.2024 12:34, Petr Beneš wrote:
> > On Mon, Jun 10, 2024 at 12:16 PM Jan Beulich wrote:
> >>
> >> On 10.06.2024 11:10, Petr Beneš wrote:
> >>> On Mon, Jun 10, 2024 at 9:30 AM Jan Beulich wrot
On Mon, Jun 10, 2024 at 12:16 PM Jan Beulich wrote:
>
> On 10.06.2024 11:10, Petr Beneš wrote:
> > On Mon, Jun 10, 2024 at 9:30 AM Jan Beulich wrote:
> >>
> >> On 09.06.2024 01:06, Petr Beneš wrote:
> >>> On Thu, Jun 6, 2024 at 9:24 AM Jan Beulic
On Mon, Jun 10, 2024 at 9:30 AM Jan Beulich wrote:
>
> On 09.06.2024 01:06, Petr Beneš wrote:
> > On Thu, Jun 6, 2024 at 9:24 AM Jan Beulich wrote:
> >>> @@ -122,7 +131,12 @@ int p2m_init_altp2m(struct domain *d)
> >>> struct p2m
The flag isn't bool. It can hold one of 3 values (besides 0).
P.
On Thu, Jun 6, 2024 at 9:57 AM Jan Beulich wrote:
>
> On 02.06.2024 22:04, Petr Beneš wrote:
> > From: Petr Beneš
> >
> > Since libxl finally sends the altp2m.nr value, we can remove the previo
On Thu, Jun 6, 2024 at 9:24 AM Jan Beulich wrote:
> > @@ -122,7 +131,12 @@ int p2m_init_altp2m(struct domain *d)
> > struct p2m_domain *hostp2m = p2m_get_hostp2m(d);
> >
> > mm_lock_init(&d->arch.altp2m_list_lock);
> > -for ( i = 0; i < MAX_ALTP2M; i++ )
> > +d->arch.altp2m_p2m =
From: Petr Beneš
Allow developers using the OCaml bindings to set the altp2m_count parameter.
Signed-off-by: Petr Beneš
---
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools/ocaml/libs/xc/xenctrl_stubs.c | 19 +++
3 files changed, 17
From: Petr Beneš
This patch introduces a set of accessor functions for altp2m array operations,
and refactoring direct array accesses with them.
This approach aims on improving the code clarity and also future-proofing the
codebase against potential speculative execution attacks.
Signed-off-by
From: Petr Beneš
Introduce a new altp2m_count parameter to control the maximum number of altp2m
views a domain can use. By default, if altp2m_count is unspecified and altp2m
is enabled, the value is set to 10, reflecting the legacy behavior.
This change is preparatory; it establishes the
From: Petr Beneš
Since libxl finally sends the altp2m.nr value, we can remove the previously
introduced temporary workaround.
Creating domain with enabled altp2m while setting altp2m.nr == 0 doesn't
make sense and it's probably not what user wants.
Signed-off-by: Petr Beneš
---
xe
From: Petr Beneš
No functional change.
Signed-off-by: Petr Beneš
---
tools/ocaml/libs/xc/xenctrl_stubs.c | 18 +-
1 file changed, 9 insertions(+), 9 deletions(-)
diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c
b/tools/ocaml/libs/xc/xenctrl_stubs.c
index c6da9bb091
From: Petr Beneš
Fixes: 0291089f6ea8 ("xen: enable altp2m at create domain domctl")
Signed-off-by: Petr Beneš
---
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools/ocaml/libs/xc/xenctrl_stubs.c | 9 ++---
3 files changed, 8 insert
From: Petr Beneš
This commit activates the previously introduced altp2m_count parameter,
establishing the connection between libxl and Xen.
Signed-off-by: Petr Beneš
---
tools/libs/light/libxl_create.c | 4
1 file changed, 4 insertions(+)
diff --git a/tools/libs/light/libxl_create.c b
From: Petr Beneš
Update manual pages to include detailed information about the altp2m_count
configuration parameter.
Signed-off-by: Petr Beneš
---
docs/man/xl.cfg.5.pod.in | 14 ++
1 file changed, 14 insertions(+)
diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
From: Petr Beneš
This series introduces the ability to configure the maximum number of altp2m
tables during domain creation. Previously, the limits were hardcoded to a
maximum of 10. This change allows for greater flexibility in environments that
require more or fewer altp2m views.
This
From: Petr Beneš
Encapsulate the altp2m options within a struct. This change is preparatory
and sets the groundwork for introducing additional parameter in subsequent
commit.
Signed-off-by: Petr Beneš
---
tools/libs/light/libxl_create.c | 6 +++---
tools/ocaml/libs/xc/xenctrl_stubs.c | 4
From: Petr Beneš
x86: Make the maximum number of altp2m views configurable
This commit introduces the ability to configure the maximum number of altp2m
views for the domain during its creation. Previously, the limits were hardcoded
to a maximum of 10. This change allows for greater flexibility
On Mon, May 27, 2024 at 8:19 AM Jan Beulich wrote:
>
>
> This is suspicious: You compare against one value but log another. This
> isn't EPT-specific, so shouldn't use MAX_EPTP.
Sorry, I copy-pasted a snippet and didn't edit it correctly. Of
course, it should have been:
if ( config->nr_altp2m >
On Tue, May 21, 2024 at 12:59 PM Jan Beulich wrote:
>
> The compared entities don't really fit together. I think we want a new
> MAX_NR_ALTP2M, which - for the time being - could simply be
>
> #define MAX_NR_ALTP2M MAX_EPTP
>
> in the header. That would then be a suitable replacement for the
> min
From: Petr Beneš
This commit activates the previously introduced altp2m_count parameter,
establishing the connection between libxl and Xen.
Signed-off-by: Petr Beneš
---
tools/libs/light/libxl_create.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/libs/light/libxl_create.c b/tools
From: Petr Beneš
Allow developers using the OCaml bindings to set the altp2m_count parameter.
Signed-off-by: Petr Beneš
Acked-by: Christian Lindig
---
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools/ocaml/libs/xc/xenctrl_stubs.c | 11
From: Petr Beneš
This series introduces the ability to configure the maximum number of altp2m
tables during domain creation. Previously, the limits were hardcoded to a
maximum of 10. This change allows for greater flexibility in environments that
require more or fewer altp2m views.
Adjustments
From: Petr Beneš
No functional change.
Signed-off-by: Petr Beneš
Reviewed-by: Stefano Stabellini
---
xen/arch/x86/mm/p2m.c | 4
1 file changed, 4 insertions(+)
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index 4a4620e870..db5d9b6c2a 100644
--- a/xen/arch/x86/mm/p2m.c
From: Petr Beneš
Introduce a new altp2m_count parameter to control the maximum number of altp2m
views a domain can use. By default, if altp2m_count is unspecified and altp2m
is enabled, the value is set to 10, reflecting the legacy behavior.
This change is preparatory; it establishes the
From: Petr Beneš
Update manual pages to include detailed information about the altp2m_count
configuration parameter.
Signed-off-by: Petr Beneš
---
docs/man/xl.cfg.5.pod.in | 14 ++
1 file changed, 14 insertions(+)
diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
From: Petr Beneš
This commit introduces the ability to configure the maximum number of altp2m
views for the domain during its creation. Previously, the limits were hardcoded
to a maximum of 10. This change allows for greater flexibility in environments
that require more or fewer altp2m views
On Sat, May 18, 2024 at 3:18 AM Tamas K Lengyel wrote:
>
> > -ap2m = array_access_nospec(d->arch.altp2m_p2m, altp2m_idx);
> > +ap2m = d->arch.altp2m_p2m[altp2m_idx];
>
> Why is it no longer necessary to use array_access_nospec?
>
> Tamas
I was under the impression that when the do
From: Petr Beneš
This commit introduces the ability to configure the maximum number of altp2m
views for the domain during its creation. Previously, the limits were hardcoded
to a maximum of 10. This change allows for greater flexibility in environments
that require more or fewer altp2m views
From: Petr Beneš
Allow developers using the OCaml bindings to set the altp2m_count parameter.
Signed-off-by: Petr Beneš
Acked-by: Christian Lindig
---
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools/ocaml/libs/xc/xenctrl_stubs.c | 11
From: Petr Beneš
No functional change.
Signed-off-by: Petr Beneš
Reviewed-by: Stefano Stabellini
---
xen/arch/x86/mm/p2m.c | 4
1 file changed, 4 insertions(+)
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index ce742c12e0..eb7996170d 100644
--- a/xen/arch/x86/mm/p2m.c
From: Petr Beneš
Introduce a new altp2m_count parameter to control the maximum number of altp2m
views a domain can use. By default, if altp2m_count is unspecified and altp2m
is enabled, the value is set to 10, reflecting the legacy behavior.
This change is preparatory; it establishes the
From: Petr Beneš
This commit activates the previously introduced altp2m_count parameter,
establishing the connection between libxl and Xen.
Signed-off-by: Petr Beneš
---
tools/libs/light/libxl_create.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/libs/light/libxl_create.c b/tools
From: Petr Beneš
Update manual pages to include detailed information about the altp2m_count
configuration parameter.
Signed-off-by: Petr Beneš
---
docs/man/xl.cfg.5.pod.in | 14 ++
1 file changed, 14 insertions(+)
diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
From: Petr Beneš
This series introduces the ability to configure the maximum number of altp2m
tables during domain creation. Previously, the limits were hardcoded to a
maximum of 10. This change allows for greater flexibility in environments that
require more or fewer altp2m views.
Adjustments
On Wed, May 8, 2024 at 9:38 PM Andrew Cooper wrote:
> Both fields can reasonably share uint32_t, but could you work with Petr
> to make both halfs of this land cleanly.
Hi, I think creating a new anonymous struct "altp2m" within `struct
domain` would be a good fit. uint16_t for my MAX_ALTP2M repl
On Thu, May 2, 2024 at 8:36 AM Jan Beulich wrote:
>
> On 30.04.2024 17:40, Petr Beneš wrote:
> > On Tue, Apr 30, 2024 at 4:47 PM Jan Beulich wrote:
> >>
> >> On 28.04.2024 18:52, Petr Beneš wrote:
> >>> From: Petr Beneš
> >>>
> >>&
On Tue, Apr 30, 2024 at 4:27 PM Jan Beulich wrote:
>
> > --- a/xen/arch/x86/domain.c
> > +++ b/xen/arch/x86/domain.c
> > @@ -685,6 +685,12 @@ int arch_sanitise_domain_config(struct
> > xen_domctl_createdomain *config)
> > return -EINVAL;
> > }
> >
> > +if ( config->max_altp2m >
On Tue, Apr 30, 2024 at 4:47 PM Jan Beulich wrote:
>
> On 28.04.2024 18:52, Petr Beneš wrote:
> > From: Petr Beneš
> >
> > This change anticipates scenarios where `max_altp2m` is set to its maximum
> > supported value (i.e., 512), ensuring sufficient memo
On Mon, Apr 29, 2024 at 9:07 AM Jan Beulich wrote:
>
> On 28.04.2024 18:52, Petr Beneš wrote:
> > From: Petr Beneš
> >
> > No functional change.
> >
> > Signed-off-by: Petr Beneš
>
> Where did Stefano's R-b go?
>
> Jan
Oh no, I missed that one. Should I do v3?
From: Petr Beneš
Introduce a new max_altp2m parameter to control the maximum number of altp2m
views a domain can use. By default, if max_altp2m is unspecified and altp2m is
enabled, the value is set to 10, reflecting the legacy behavior.
This change is preparatory; it establishes the groundwork
From: Petr Beneš
Allow developers using the OCaml bindings to set the max_altp2m parameter.
Signed-off-by: Petr Beneš
Acked-by: Christian Lindig
---
Changed since v1:
* Moved this commit AFTER Xen changes (where
xen_domctl_createdomain::max_altp2m field
is introduced) to avoid breaking
From: Petr Beneš
This series introduces the ability to configure the maximum number of altp2m
tables during domain creation. Previously, the limits were hardcoded to a
maximum of 10. This change allows for greater flexibility in environments that
require more or fewer altp2m views.
Adjustments
From: Petr Beneš
This commit activates the previously introduced max_altp2m parameter,
establishing the connection between libxl and Xen.
Signed-off-by: Petr Beneš
---
Changed since v1:
* This is a new commit in the series
tools/libs/light/libxl_create.c | 1 +
1 file changed, 1 insertion
From: Petr Beneš
This change anticipates scenarios where `max_altp2m` is set to its maximum
supported value (i.e., 512), ensuring sufficient memory is allocated upfront
to accommodate all altp2m tables without initialization failure.
The necessity for this increase arises from the current
From: Petr Beneš
This commit introduces the ability to configure the maximum number of altp2m
tables during domain creation. Previously, the limits were hardcoded to a
maximum of 10. This change allows for greater flexibility in environments that
require more or fewer altp2m views.
The maximum
From: Petr Beneš
No functional change.
Signed-off-by: Petr Beneš
---
xen/arch/x86/mm/p2m.c | 4
1 file changed, 4 insertions(+)
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index ce742c12e0..eb7996170d 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
From: Petr Beneš
Update manual pages to include detailed information about the max_altp2m
configuration parameter.
Signed-off-by: Petr Beneš
---
docs/man/xl.cfg.5.pod.in | 14 ++
1 file changed, 14 insertions(+)
diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
On Thu, Apr 25, 2024 at 8:19 AM Jan Beulich wrote:
>
> On 24.04.2024 22:42, Petr Beneš wrote:
> > Introduce a new max_altp2m parameter to control the maximum number of altp2m
> > views a domain can use. By default, if max_altp2m is unspecified and altp2m
> > is
> >
On Thu, Apr 25, 2024 at 8:21 AM Jan Beulich wrote:
>
> On 24.04.2024 22:41, Petr Beneš wrote:
> > From: Petr Beneš
> >
> > No functional change.
> >
> > Signed-off-by: Petr Beneš
>
> Hmm. I don't really mind the extra braces, but I also don'
From: Petr Beneš
This commit introduces the ability to configure the maximum number of altp2m
tables during domain creation. Previously, the limits were hardcoded to a
maximum of 10. This change allows for greater flexibility in environments that
require more or fewer altp2m views.
Signed-off
From: Petr Beneš
Introduce a new max_altp2m parameter to control the maximum number of altp2m
views a domain can use. By default, if max_altp2m is unspecified and altp2m is
enabled, the value is set to 10, reflecting the legacy behavior.
Signed-off-by: Petr Beneš
---
tools/golang/xenlight
From: Petr Beneš
Allow developers using the OCaml bindings to set the max_altp2m parameter.
Signed-off-by: Petr Beneš
---
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools/ocaml/libs/xc/xenctrl_stubs.c | 17 ++---
3 files changed, 12
From: Petr Beneš
No functional change.
Signed-off-by: Petr Beneš
---
xen/arch/x86/mm/p2m.c | 4
1 file changed, 4 insertions(+)
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index ce742c12e0..eb7996170d 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
From: Petr Beneš
No functional change.
Signed-off-by: Petr Beneš
---
xen/arch/x86/mm/hap/hap.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/mm/hap/hap.c b/xen/arch/x86/mm/hap/hap.c
index 9f964c1d87..d2011fde24 100644
--- a/xen/arch/x86/mm/hap/hap.c
From: Petr Beneš
This change anticipates scenarios where `max_altp2m` is set to its maximum
supported value (i.e., 512), ensuring sufficient memory is allocated upfront
to accommodate all altp2m tables without initialization failure.
Signed-off-by: Petr Beneš
---
tools/tests/paging-mempool
From: Petr Beneš
Update manual pages to include detailed information about the max_altp2m
configuration parameter.
Signed-off-by: Petr Beneš
---
docs/man/xl.cfg.5.pod.in | 14 ++
1 file changed, 14 insertions(+)
diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in
From: Petr Beneš
This series introduces the ability to configure the maximum number of altp2m
tables during domain creation. Previously, the limits were hardcoded to a
maximum of 10. This change allows for greater flexibility in environments that
require more or fewer altp2m views.
Adjustments
From: Petr Beneš
Reorder the condition checks within the HVM_MONITOR_SINGLESTEP_BREAKPOINT
case to enable fast singlestepping independently of the singlestep monitor
being enabled. Previously, fast singlestepping required the singlestep
monitor to be explicitly enabled through
On Wed, Feb 14, 2024 at 8:12 AM Jan Beulich wrote:
>
> On 08.02.2024 10:13, Christian Lindig wrote:
> >> On 7 Feb 2024, at 22:04, Petr Beneš wrote:
> >> Add the missing `vmtrace_buf_kb` field to the OCaml bindings to match the
> >> vm.cfg configuration, correct
> On Tue, Feb 13, 2024 at 4:02 PM Jan Beulich wrote:
>
> On 13.02.2024 15:56, Petr Beneš wrote:
> > From: Petr Beneš
> >
> > It's located in libxl_domain_build_info, not libxl_domain_create_info.
> >
> > Signed-off-by: Petr Beneš
> > Acked-by:
From: Petr Beneš
It's located in libxl_domain_build_info, not libxl_domain_create_info.
Signed-off-by: Petr Beneš
Acked-by: Anthony PERARD
---
tools/include/libxl.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
> On Fri, Feb 9, 2024 at 3:58 PM Andrew Cooper
> wrote:
>
> On 08/02/2024 9:20 pm, Petr Beneš wrote:
> > From: Petr Beneš
> >
> > This patch addresses an issue where the fast singlestep setting would
> > persist
> > despite
> On Thu, Feb 8, 2024 at 10:14 AM Christian Lindig
> wrote:
>
> > On 7 Feb 2024, at 22:04, Petr Beneš wrote:
> >
> >
> > Add the missing `vmtrace_buf_kb` field to the OCaml bindings to match the
> > vm.cfg configuration, correcting an oversight from its i
From: Petr Beneš
This patch addresses an issue where the fast singlestep setting would persist
despite xc_domain_debug_control being called with
XEN_DOMCTL_DEBUG_OP_SINGLE_STEP_OFF.
Specifically, if fast singlestep was enabled in a VMI session and that session
stopped before the MTF trap
From: Petr Beneš
Add the missing `vmtrace_buf_kb` field to the OCaml bindings to match the
vm.cfg configuration, correcting an oversight from its initial introduction.
Signed-off-by: Petr Beneš
---
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools
From: Petr Beneš
It's located in libxl_domain_build_info, not libxl_domain_create_info.
---
tools/include/libxl.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 907aa0a330..14f69823e0 100644
--- a/tools/include/li
From: Petr Beneš
This commit introduces the ability to configure the maximum number of altp2m
and nestedp2m tables through boot-time parameters. Previously, the limits were
hardcoded to a maximum of 10 for both. This change allows for greater
flexibility in environments that require more or
From: Petr Beneš
This patch addresses a behavior discrepancy in the handling of altp2m views,
where upon the creation and subsequent EPT violation, the page access
permissions were incorrectly inherited from the hostp2m instead of respecting
the altp2m default_access.
Previously, when a new
96 matches
Mail list logo