Am Tue, 27 Nov 2018 17:19:06 +
schrieb Wei Liu :
> The other option -- to call atexit right after -- looks plausible to me.
After looking through main(), moving the atexit() seems safe to me.
Olaf
pgpYhWjmpbrZl.pgp
Description: Digitale Signatur von OpenPGP
On Wed, Nov 28, 2018 at 08:52:24AM +0100, Juergen Gross wrote:
> paging_max_paddr_bits() has an invalid use of IS_ENABLED(): instead of
> IS_ENABLED(CONFIG_BIGMEM) it is using IS_ENABLED(BIGMEM). Fix that.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Roger Pau Monné
__
On Wed, Nov 28, 2018 at 12:25:23AM +0100, andrei.seme...@bertin.fr wrote:
> Hi all,
>
> I have some troubles to start xen when using dom0 in HVM mode on X86 Intel
> nuc7i5bnh
> board. After some investigation it seems that "domheap" memory allocator is
> out of memory while
> constructing the
Hi Devs:
I have a big confusion about cpu configurations in virt-manager -> CPUs
-> configuration (Refer to attachment)
There are 3 type of model : copy host cpu configuration (like
passthrough of kvm ); Application default; Hypervisor default. I can
not find any difference amount of them.
Hi Devs:
I have a big confuse about cpu configurations in virt-manager -> CPUs
-> configuration
There are 3 type of model : copy host cpu configuration (like
passthrough of kvm ); Application default; Hypervisor default. I can
not find any . Anyone
--
Thanks
APACII QA
John(XiaoGen Wang)
Hi all,
I used git bisect and found the following error occurred from commit:
4d4a8c96e3593d76fe7b025665ccdecc70a53c1f.
Such error in loader/arm64/xen_boot.c has been fixed, bur the error in
loader/i386/xen.c hasn't been fixed, do you have any idea?
Thanks a lot!
...
loader/i386/xen.c: In f
On Thu, Nov 01, 2018 at 09:18:14AM +, Andrew Cooper wrote:
> On 01/11/2018 00:40, Tian, Kevin wrote:
> >> From: Tian, Kevin
> >> Sent: Tuesday, October 30, 2018 3:00 PM
> >>
> >>> From: Jan Beulich [mailto:jbeul...@suse.com]
> >>> Sent: Thursday, October 25, 2018 9:58 PM
> >>>
> >> On 25.10
flight 75624 distros-debian-squeeze real [real]
http://osstest.xensource.com/osstest/logs/75624/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-amd64-squeeze-netboot-pygrub 10 debian-di-install fail like
75616
test-amd64-i386-i386-squeeze-n
The page merging logic makes use of bits 1-8 and bit 63 of a PTE, which
used to be specified as 'ignored'. However, bits 5 and 6 are now specified
as 'accessed' and 'dirty' bits and their use only remains safe as long as
the DTE 'Host Access Dirty' bits remain unused by Xen, or by hardware
before t
Some prototypes in include/asm-x86/hvm/vmx/vmx.h have no related
implementation. Remove them.
Signed-off-by: Juergen Gross
---
xen/include/asm-x86/hvm/vmx/vmx.h | 4
1 file changed, 4 deletions(-)
diff --git a/xen/include/asm-x86/hvm/vmx/vmx.h
b/xen/include/asm-x86/hvm/vmx/vmx.h
index b11
Hello,
While doing the recent vPCI fixes and also working on SR-IOV support
I've been thinking about how vPCI handles writes to PCI registers that
imply modifications to the p2m for PVH Dom0.
When memory decoding or ROM BARs are enabled Xen performs the
following flow:
1. Create a rangeset with
On Wed, Nov 28, 2018 at 06:52:04AM +0100, Juergen Gross wrote:
> On 27/11/2018 19:44, Wei Liu wrote:
> > It is agreed that tmem can be removed from xen.git. See the thread starting
> > from .
> >
> > Wei Liu (3):
> > xen: remove tmem from hypervisor
> > tools: remove tmem code and commands
> >
On Tue, Nov 27, 2018 at 06:44:08PM +, Wei Liu wrote:
> This patch removes all tmem related code and CONFIG_TMEM from the
> hypervisor. Also remove tmem hypercalls from the default XSM policy.
>
> It is written as if tmem is disabled and tmem freeable pages is 0.
>
> Signed-off-by: Wei Liu
M
On Wed, Nov 28, 2018 at 11:05:58AM +0100, Juergen Gross wrote:
> Some prototypes in include/asm-x86/hvm/vmx/vmx.h have no related
> implementation. Remove them.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Roger Pau Monné
___
Xen-devel mailing list
This email only tracks big items for xen.git tree. Please reply for items you
would like to see in 4.12 so that people have an idea what is going on and
prioritise accordingly.
You're welcome to provide description and use cases of the feature you're
working on.
= Timeline =
We now adopt a fixed
flight 130846 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130846/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
coverity-amd647 coverity-upload fail REGR. vs. 130392
version t
Sorry, this one is missing some updates. Will resend soon.
Juergen
On 28/11/2018 11:15, Juergen Gross wrote:
> This email only tracks big items for xen.git tree. Please reply for items you
> would like to see in 4.12 so that people have an idea what is going on and
> prioritise accordingly.
>
>
On Wed, Nov 28, 2018 at 05:13:22PM +0800, John Wang wrote:
> Hi Devs:
>
> I have a big confusion about cpu configurations in virt-manager -> CPUs ->
> configuration (Refer to attachment)
>
> There are 3 type of model : copy host cpu configuration (like passthrough of
> kvm ); Application default
>>> On 27.11.18 at 19:17, wrote:
> I would be surprised if someone ever used the HDLCD driver after it was
> merged. I am not even sure if it even works.
>
> Furthermore, this driver only targets development platform (i.g Juno) or
> the models were pretty much everyone tends to use serial conso
This email only tracks big items for xen.git tree. Please reply for items you
would like to see in 4.12 so that people have an idea what is going on and
prioritise accordingly.
You're welcome to provide description and use cases of the feature you're
working on.
= Timeline =
We now adopt a fixed
> -Original Message-
[snip]
>
> * PV-IOMMU (v7)
> - Paul Durrant
>
There's no way this is going to make 4.12 now.
Paul
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On 28/11/2018 10:26, Juergen Gross wrote:
> = Projects =
>
> == Hypervisor ==
>
> * Improvements to domain creation (v2)
> - Andrew Cooper
Made a bit more progress. Still plenty to do.
> === x86 ===
>
> * Fixes to #DB injection
> - Andrew Cooper
Quickly turning into a rats nest. Next
On 28/11/2018 09:55, Paul Durrant wrote:
> The page merging logic makes use of bits 1-8 and bit 63 of a PTE, which
> used to be specified as 'ignored'. However, bits 5 and 6 are now specified
> as 'accessed' and 'dirty' bits and their use only remains safe as long as
> the DTE 'Host Access Dirty' b
On 28/11/2018 10:15, Roger Pau Monné wrote:
> On Wed, Nov 28, 2018 at 11:05:58AM +0100, Juergen Gross wrote:
>> Some prototypes in include/asm-x86/hvm/vmx/vmx.h have no related
>> implementation. Remove them.
>>
>> Signed-off-by: Juergen Gross
> Reviewed-by: Roger Pau Monné
Acked-by: Andrew Coop
flight 130804 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130804/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
On Wed, Nov 28, 2018 at 01:34:11PM +0800, Chao Gao wrote:
> to a more generic function. The benefit is that this function can be
> used to check whether a microcode is newer than another as well. We
> rely on this function to decide to perform a replacement or an add when
> updating the global micr
On Tue, Nov 27, 2018 at 09:31:10PM +0100, Daniel Kiper wrote:
> On Wed, Nov 21, 2018 at 03:28:46PM +0100, Juergen Gross wrote:
> > Add the needed code to setup the hypercall page for calling into the
> > Xen hypervisor.
> >
> > Import the XEN_HVM_DEBUGCONS_IOPORT define from Xen unstable into
> > i
On Wed, Nov 21, 2018 at 03:28:36PM +0100, Juergen Gross wrote:
> In order to support grub2 in Xen PVH environment some additional Xen
> headers are needed as grub2 will be started in PVH mode requiring to
> use several HVM hypercalls and structures.
>
> Add the needed headers from Xen 4.10 being th
On Tue, Nov 06, 2018 at 09:41:07AM +, Wei Liu wrote:
> On Fri, Nov 02, 2018 at 05:01:07PM +, Ian Jackson wrote:
> > Signed-off-by: Ian Jackson
>
> Acked-by: Wei Liu
I have applied patch 1 and 2 in this series to reduce the length of your
patch queue.
Wei.
_
On 28/11/2018 12:28, Daniel Kiper wrote:
> On Tue, Nov 27, 2018 at 09:31:10PM +0100, Daniel Kiper wrote:
>> On Wed, Nov 21, 2018 at 03:28:46PM +0100, Juergen Gross wrote:
>>> Add the needed code to setup the hypercall page for calling into the
>>> Xen hypervisor.
>>>
>>> Import the XEN_HVM_DEBUGCON
On 28/11/2018 12:31, Daniel Kiper wrote:
> On Wed, Nov 21, 2018 at 03:28:36PM +0100, Juergen Gross wrote:
>> In order to support grub2 in Xen PVH environment some additional Xen
>> headers are needed as grub2 will be started in PVH mode requiring to
>> use several HVM hypercalls and structures.
>>
On 27/11/2018 22:17, Daniel Kiper wrote:
> On Wed, Nov 21, 2018 at 03:28:50PM +0100, Juergen Gross wrote:
>> Add the modifications to the build system needed to build a xen_pvh
>> grub.
>>
>> Signed-off-by: Juergen Gross
>> Reviewed-by: Daniel Kiper
>> ---
>> V3: sorted some filenames (Daniel Kip
On Wed, Nov 28, 2018 at 01:34:12PM +0800, Chao Gao wrote:
> ... and search caches to find a suitable one when loading.
Why do you need to save all of them? You are only going to load a
single microcode, so I don't understand the need to cache them all.
> With this cache, the existing 'uci->mc' st
Every invocation of xl via valgrind will show three leaks.
Since libxl_bitmap_alloc uses NOGC, the caller has to free the memory
after use. And since xl_ctx_free might be called before
parse_global_config, also move the libxl_bitmap_init calls into
xl_ctx_alloc.
Also move the call to atexit() afte
Several public header files have trailing spaces in them. This is
rather annoying when importing them into other projects as they might
be rejected not complying to coding style.
Remove the trailing spaces in all headers below xen/include/public/.
Signed-off-by: Juergen Gross
---
I have omitted
On Wed, Nov 28, 2018 at 01:24:34PM +0100, Olaf Hering wrote:
> Every invocation of xl via valgrind will show three leaks.
> Since libxl_bitmap_alloc uses NOGC, the caller has to free the memory
> after use. And since xl_ctx_free might be called before
> parse_global_config, also move the libxl_bitm
On Wed, Nov 28, 2018 at 01:34:13PM +0800, Chao Gao wrote:
> diff --git a/xen/arch/x86/microcode_intel.c b/xen/arch/x86/microcode_intel.c
> index c4f812f..1857332 100644
> --- a/xen/arch/x86/microcode_intel.c
> +++ b/xen/arch/x86/microcode_intel.c
> @@ -296,9 +296,8 @@ static int get_matching_microc
On Wed, Nov 28, 2018 at 01:32:36PM +0100, Juergen Gross wrote:
> Several public header files have trailing spaces in them. This is
> rather annoying when importing them into other projects as they might
> be rejected not complying to coding style.
>
> Remove the trailing spaces in all headers belo
On 28/11/2018 12:36, Wei Liu wrote:
> On Wed, Nov 28, 2018 at 01:32:36PM +0100, Juergen Gross wrote:
>> Several public header files have trailing spaces in them. This is
>> rather annoying when importing them into other projects as they might
>> be rejected not complying to coding style.
>>
>> Remo
flight 130810 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130810/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
freebsd 8894b8e317520c031636fdfab98fc0557a0e1f4c
baseline version:
freebsd 23174883ee9
>>> On 28.11.18 at 13:32, wrote:
> Several public header files have trailing spaces in them. This is
> rather annoying when importing them into other projects as they might
> be rejected not complying to coding style.
>
> Remove the trailing spaces in all headers below xen/include/public/.
>
> S
On Wed, Nov 28, 2018 at 05:52:57AM -0700, Jan Beulich wrote:
> >>> On 28.11.18 at 13:32, wrote:
> > Several public header files have trailing spaces in them. This is
> > rather annoying when importing them into other projects as they might
> > be rejected not complying to coding style.
> >
> > Re
>>> On 28.11.18 at 09:41, wrote:
> On Wed, Nov 28, 2018 at 08:52:24AM +0100, Juergen Gross wrote:
>> paging_max_paddr_bits() has an invalid use of IS_ENABLED(): instead of
>> IS_ENABLED(CONFIG_BIGMEM) it is using IS_ENABLED(BIGMEM). Fix that.
>>
>> Signed-off-by: Juergen Gross
>
> Reviewed-by:
>>> On 28.11.18 at 11:09, wrote:
> Hello,
>
> While doing the recent vPCI fixes and also working on SR-IOV support
> I've been thinking about how vPCI handles writes to PCI registers that
> imply modifications to the p2m for PVH Dom0.
>
> When memory decoding or ROM BARs are enabled Xen performs
>>> On 28.11.18 at 13:57, wrote:
> On Wed, Nov 28, 2018 at 05:52:57AM -0700, Jan Beulich wrote:
>> >>> On 28.11.18 at 13:32, wrote:
>> > Several public header files have trailing spaces in them. This is
>> > rather annoying when importing them into other projects as they might
>> > be rejected no
On 28/11/2018 13:52, Jan Beulich wrote:
On 28.11.18 at 13:32, wrote:
>> Several public header files have trailing spaces in them. This is
>> rather annoying when importing them into other projects as they might
>> be rejected not complying to coding style.
>>
>> Remove the trailing spaces in
Hi Matthew,
On 28/11/2018 06:43, Matthew Daley wrote:
> On Mon, 26 Nov 2018 at 14:07, Matthew Daley wrote:
>>
>> On Fri, 23 Nov 2018 at 09:51, Julien Grall wrote:
>>>
>>> Hi Matthew,
>>>
>>> Sorry for the late answer and thank you for testing the patch.
>>>
>>> On 11/13/18 10:43 PM, Matthew Dale
On Wed, Nov 28, 2018 at 06:09:25AM -0700, Jan Beulich wrote:
> >>> On 28.11.18 at 13:57, wrote:
> > On Wed, Nov 28, 2018 at 05:52:57AM -0700, Jan Beulich wrote:
> >> >>> On 28.11.18 at 13:32, wrote:
> >> > Several public header files have trailing spaces in them. This is
> >> > rather annoying wh
On Wed, Nov 28, 2018 at 02:17:55PM +0100, Juergen Gross wrote:
> On 28/11/2018 13:52, Jan Beulich wrote:
> On 28.11.18 at 13:32, wrote:
> >> Several public header files have trailing spaces in them. This is
> >> rather annoying when importing them into other projects as they might
> >> be rej
In order to support grub2 in Xen PVH environment some additional Xen
headers are needed as grub2 will be started in PVH mode requiring to
use several HVM hypercalls and structures.
Add the needed headers from Xen 4.10 being the first Xen version with
full (not only experimental) PVH guest support.
Initialize the grant tab in a dedicated function. This will enable
using it for PVH guests, too.
Call the new function from grub_machine_init() as this will later
be common between Xen PV and Xen PVH mode.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: update commit message (Dan
Some common code needs to be special cased for Xen PVH mode. This hits
mostly Xen PV mode specific areas.
Split include/grub/i386/pc/int_types.h off from
include/grub/i386/pc/int.h to support including this file later from
xen_pvh code without the grub_bios_interrupt definition.
Move definition o
Add the modifications to the build system needed to build a xen_pvh
grub.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: sorted some filenames (Daniel Kiper)
V4: add bus/pci.c to xen_pvh
---
gentpl.py | 4 ++--
grub-core/Makefile.am | 12
gr
grub_xen_ptr2mfn() returns the machine frame number for a given pointer
value. For Xen-PVH guests this is just the PFN. Add the PVH specific
variant.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V5: new patch (Daniel Kiper)
---
grub-core/kern/xen/init.c | 2 ++
1 file changed, 2 i
Initialize the needed Xen specific data. This is:
- the Xen start of day page containing the console and Xenstore ring
page PFN and event channel
- the grant table
- the shared info page
Write back the possibly modified memory map to the hypervisor in case
the guest is reading it from there aga
include/grub/offsets.h needs some defines for Xen PVH mode.
Add them. While at it line up the values in the surrounding lines to
start at the same column.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: XENPVH->XEN_PVH (Daniel Kiper)
---
include/grub/offsets.h | 21 -
From: Hans van Kranenburg
This solves the build failing with "Error: no symbol table and no
.moddeps section"
Also see:
- 6371e9c10433578bb236a8284ddb9ce9e201eb59
- https://savannah.gnu.org/bugs/?49012
Signed-off-by: Hans van Kranenburg
Reviewed-by: Daniel Kiper
---
V2: new patch
Signed-off-b
Add xen_pvh support to grub-install.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
include/grub/util/install.h | 1 +
util/grub-install-common.c | 1 +
util/grub-install.c | 7 +++
3 files changed, 9 insertions(+)
diff --git a/include/grub/util/install.h b/include/gru
Add the code for the Xen PVH mode boot entry.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: clear %fs and %gs, too (Daniel Kiper)
use GRUB_MEMORY_MACHINE_PROT_STACK_SIZE for stack size (Daniel Kiper)
V5: reorder clearing segment regs (Daniel Kiper)
---
grub-core/kern/i386/x
With Xen PVH mode adding a new machine type the machine related headers
need to be present for the build to succeed. Most of the headers just
need to include the related common i386 headers. Add those to the tree.
Note that xen_pvh/int.h needs to include pc/int_types.h instead of
pc/int.h in order
Xen PVH guests will have the RSDP at an arbitrary address. Support that
by passing the RSDP address via the boot parameters to Linux.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: add oring 0x8000 to version field
V3: move including machine/kernel.h to patch 8 (Daniel Kiper)
V5:
Rearrange grub-core/kern/xen/init.c to prepare adding PVH mode support
to it. This includes putting some code under #ifdef GRUB_MACHINE_XEN
as it will not be used when running as PVH.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
grub-core/kern/xen/init.c | 60 +
Add all usable memory regions to grub memory management and add the
needed mmap iterate code, which will be used by grub core (e.g.
grub-core/lib/relocator.c or grub-core/mmap/mmap.c).
As we are running in 32-bit mode don't add memory above 4GB.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel K
Add the hooks to current code needed for Xen PVH. They will be filled
with code later when the related functionality is being added.
loader/i386/linux.c needs to include machine/kernel.h now as it needs
to get GRUB_KERNEL_USE_RSDP_ADDR from there.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel
Support mkimage for xen_pvh.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: some style adjustments (Daniel Kiper)
use defines for elf-notes (Daniel Kiper)
V5: move elf-note define usage into new patch (Daniel Kiper)
I didn't replace the 4096 by a PAGE_SIZE macro as requested
Retrieve the memory map from the hypervisor and normalize it to contain
no overlapping entries and to be sorted by address.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: use grub_e820_mmap_entry instead of own struct (Daniel Kiper)
---
grub-core/kern/i386/xen/pvh.c | 94 +++
Support platform i386/xen_pvh in configure.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
configure.ac | 3 +++
1 file changed, 3 insertions(+)
diff --git a/configure.ac b/configure.ac
index 5e63c4af3..81a19afd5 100644
--- a/configure.ac
+++ b/configure.ac
@@ -151,6 +151,7 @@ case
This patch series adds support for booting Linux as PVH guest.
Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh
platform grub is booted as a standalone image directly by Xen.
For booting Linux kernel it is using the standard linux kernel
loader. The only modification of the linux
In order to avoid using plain integers for the ELF notes use the
available Xen include instead.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V5: new patch (Daniel Kiper)
---
util/grub-mkimagexx.c | 14 --
1 file changed, 8 insertions(+), 6 deletions(-)
diff --git a/ut
Add the needed code to setup the hypercall page for calling into the
Xen hypervisor.
Import the XEN_HVM_DEBUGCONS_IOPORT define from Xen unstable into
include/xen/arch-x86/xen.h
Signed-off-by: Juergen Gross
Reviewed-by: Roger Pau Monné
---
V3: grub_xen_early_halt->grub_xen_panic (Roger Pau Monn
Signed-off-by: Wei Liu
---
docs/man/xl.conf.pod.5 | 9 +-
docs/man/xl.pod.1.in| 68
docs/misc/tmem-internals.html | 789
docs/misc/xen-command-line.markdown | 6 -
docs/misc/xsm-flask.txt | 36 --
5 fil
It is agreed that tmem can be removed from xen.git. See the thread starting
from .
In this version:
1. Remove some residuals from previous version and fix all build errors
discovered by Gitlab CI.
2. Swap the o
Remove all tmem related code in libxc.
Leave some stubs in libxl in case anyone has linked to those functions
before the removal.
Remove all tmem related commands in xl, all tmem related code in other
utilities we ship.
Signed-off-by: Wei Liu
---
tools/libxc/Makefile|
flight 130848 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130848/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
>>> On 28.11.18 at 14:58, wrote:
> @@ -250,7 +249,7 @@ static void populate_physmap(struct memop_args *a)
>
> if ( unlikely(!page) )
> {
> -if ( !tmem_enabled() || a->extent_order )
> +if ( a->extent_order )
>
On Wed, Nov 28, 2018 at 07:43:25AM -0700, Jan Beulich wrote:
> >>> On 28.11.18 at 14:58, wrote:
> > @@ -250,7 +249,7 @@ static void populate_physmap(struct memop_args *a)
> >
> > if ( unlikely(!page) )
> > {
> > -if ( !tmem_enabled() || a->ex
On Wed, Nov 28, 2018 at 02:47:32PM +, Wei Liu wrote:
> On Wed, Nov 28, 2018 at 07:43:25AM -0700, Jan Beulich wrote:
> > >>> On 28.11.18 at 14:58, wrote:
> > > @@ -250,7 +249,7 @@ static void populate_physmap(struct memop_args *a)
> > >
> > > if ( unlikely(!page) )
> > >
On Wed, 2018-08-22 at 09:19 +0200, gre...@linuxfoundation.org wrote:
> This is a note to let you know that I've just added the patch titled
>
> x86/entry/64: Remove %ebx handling from error_entry/exit
>
> to the 4.9-stable tree which can be found at:
>
> http://www.kernel.org/git/?p=linu
On Wed, Nov 28, 2018 at 01:34:14PM +0800, Chao Gao wrote:
> cpu_request_microcode() will only parse microcode file and save
> suitable microcodes to microcode_cache. To update microcode,
> apply_microcode() should be invoked explicitly.
>
> On AMD side, svm_host_osvw_init() is supposed to be calle
On Wed, Nov 28, 2018 at 01:34:15PM +0800, Chao Gao wrote:
> Microcode pointer and size is passed to other cpu to parse microcode
> locally. Now, parsing microcode is done on one CPU. Others just
> find a suitable microcode stored in microcode_cache.
>
> Signed-off-by: Chao Gao
> ---
> xen/arch/x
>>> On 22.11.18 at 17:40, wrote:
> Instead of parsing the dom0_mem command line parameter as custom
> parameter do that only when building dom0. This will enable a later
> addition of specifying the memory size by fractions of the host memory
> size, which isn't known when doing custom parameter p
>>> On 22.11.18 at 17:40, wrote:
> @@ -777,13 +777,20 @@ The amount of memory will be at least the minimum but
> never more than
> the maximum (i.e., `max` overrides the `min` option). If there isn't
> enough memory then as much as possible is allocated.
>
> -`max:` also sets the maximum res
On Fri, Nov 23, 2018 at 05:14:54PM +, George Dunlap wrote:
> This exact same line is duplicated further on without being used or
> modified in between.
>
> Signed-off-by: George Dunlap
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.
>>> On 22.11.18 at 17:40, wrote:
> --- a/xen/arch/x86/Kconfig
> +++ b/xen/arch/x86/Kconfig
> @@ -176,6 +176,15 @@ config PV_SHIM_EXCLUSIVE
> firmware, and will not function correctly in other scenarios.
>
> If unsure, say N.
> +
> +config DOM0_MEM
> + string "Default value fo
On Fri, Nov 23, 2018 at 05:14:55PM +, George Dunlap wrote:
> To reliably kill an untrusted devicemodel, we need to know not only
> its pid, but its uid. In preparation for this, move the userid
> determination logic into a helper function.
>
> Create a new field, `dm_runas`, in libxl__domain_
On Wed, Nov 28, 2018 at 01:34:16PM +0800, Chao Gao wrote:
> This patch ports microcode improvement patches from linux kernel.
>
> Before you read any further: the early loading method is still the
> preferred one and you should always do that. The following patch is
> improving the late loading me
Am Donnerstag, 15. November 2018, 16:45:30 CET schrieb Souptick Joarder:
> Previouly drivers have their own way of mapping range of
> kernel pages/memory into user vma and this was done by
> invoking vm_insert_page() within a loop.
>
> As this pattern is common across different drivers, it can
> b
On Wed, Nov 28, 2018 at 2:26 AM Juergen Gross wrote:
>
> = Projects =
>
> == Hypervisor ==
>
> * Argo (inter-VM communication)
I have a patch series for this that is approaching readiness to post.
It does touch ARM (slightly) so will be posted this week to meet the
ARM deadline.
Christopher
__
On 28/11/2018 16:12, Jan Beulich wrote:
On 22.11.18 at 17:40, wrote:
>> Instead of parsing the dom0_mem command line parameter as custom
>> parameter do that only when building dom0. This will enable a later
>> addition of specifying the memory size by fractions of the host memory
>> size, wh
On Fri, Nov 23, 2018 at 05:14:56PM +, George Dunlap wrote:
> QEMU_USER_BASE allows a user to specify the UID to use when running
> the devicemodel for a specific domain number. Unfortunately, this is
> not really practical: It requires nearly 32,000 entries in
> /etc/passwd. QEMU_USER_RANGE_B
flight 130807 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130807/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64-xsm
On Fri, Nov 23, 2018 at 05:14:57PM +, George Dunlap wrote:
> A number of subsequent patches rely on as-yet undefined behavior for
> what the `device_model_user` parameter does. Rather than implement it
> incorrectly (or randomly), or remove the feature, describe an expected
> usage for the fea
On 28/11/2018 16:17, Jan Beulich wrote:
On 22.11.18 at 17:40, wrote:
>> @@ -777,13 +777,20 @@ The amount of memory will be at least the minimum but
>> never more than
>> the maximum (i.e., `max` overrides the `min` option). If there isn't
>> enough memory then as much as possible is alloc
On 28/11/2018 16:18, Jan Beulich wrote:
On 22.11.18 at 17:40, wrote:
>> --- a/xen/arch/x86/Kconfig
>> +++ b/xen/arch/x86/Kconfig
>> @@ -176,6 +176,15 @@ config PV_SHIM_EXCLUSIVE
>>firmware, and will not function correctly in other scenarios.
>>
>>If unsure, say N.
>> +
>> +c
On Wed, Nov 28, 2018 at 06:01:12AM -0700, Jan Beulich wrote:
> >>> On 28.11.18 at 11:09, wrote:
> > Hello,
> >
> > While doing the recent vPCI fixes and also working on SR-IOV support
> > I've been thinking about how vPCI handles writes to PCI registers that
> > imply modifications to the p2m for
On Wed, Nov 28, 2018 at 02:56:32PM +, David Woodhouse wrote:
On Wed, 2018-08-22 at 09:19 +0200, gre...@linuxfoundation.org wrote:
This is a note to let you know that I've just added the patch titled
x86/entry/64: Remove %ebx handling from error_entry/exit
to the 4.9-stable tree which c
On Wed, 28 Nov 2018, Julien Grall wrote:
> Hi Matthew,
>
> On 28/11/2018 06:43, Matthew Daley wrote:
> > On Mon, 26 Nov 2018 at 14:07, Matthew Daley wrote:
> >>
> >> On Fri, 23 Nov 2018 at 09:51, Julien Grall wrote:
> >>>
> >>> Hi Matthew,
> >>>
> >>> Sorry for the late answer and thank you for
On 11/28/18 8:58 AM, Wei Liu wrote:
This patch removes all tmem related code and CONFIG_TMEM from the
hypervisor. Also remove tmem hypercalls from the default XSM policy.
It is written as if tmem is disabled and tmem freeable pages is 0.
We will need to keep public/tmem.h around forever to avoi
On 11/28/18 8:58 AM, Wei Liu wrote:
Signed-off-by: Wei Liu
Acked-by: Daniel De Graaf
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Fri, Nov 23, 2018 at 05:18:59PM +, George Dunlap wrote:
> On 11/23/18 5:15 PM, George Dunlap wrote:
> Does libxl__qmp_cleanup() need to be called after the kill() happens?
> If not, we could put this before the kill() and avoid having two call sites.
QEMU is supposed to create monitor socke
1 - 100 of 214 matches
Mail list logo