flight 144515 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144515/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4f47eaf9456e1a4f22553fe0c97587c2124e2fba
baseline version:
ovmf 4d613feee57ebd4680f3c
On 03.12.2019 18:10, Andrew Cooper wrote:
> --- a/xen/include/public/hvm/dm_op.h
> +++ b/xen/include/public/hvm/dm_op.h
> @@ -324,7 +324,7 @@ struct xen_dm_op_inject_event {
> /* IN - error code (or ~0 to skip) */
> uint32_t error_code;
> uint32_t pad1;
> -/* IN - CR2 for page fa
On 03.12.2019 23:30, Andrew Cooper wrote:
> VT-x updates RF before vmexit, so eflags written into the outgoing TSS happens
> to be correct. SVM does not update RF before vmexit, and instead provides it
> via a bit in exitinfo2.
>
> In practice, needing RF set in the outgoing state occurs when a t
On 04.12.2019 00:56, Igor Druzhinin wrote:
> If the feature is not present Xen will try to force X86_BUG_FPU_PTRS
> feature at CPU identification time. This is especially noticeable in
> PV-shim that usually hotplugs its vCPUs. We either need to restrict this
> action for boot CPU only or allow sec
On Tue, Dec 03, 2019 at 04:14:46PM +0100, Jan Beulich wrote:
> On 29.11.2019 12:38, Roger Pau Monné wrote:
> > On Fri, Nov 29, 2019 at 12:28:49PM +0100, Roger Pau Monne wrote:
> >> Cluster mode can only be used with interrupt remapping support, since
> >> the top 16bits of the APIC ID are filled w
From: James Dingwall
Add a new command line argument -Y / --trace-syslog which toggles the
boolean tracesyslog variable.
---
tools/xenstore/xenstored_core.c | 10 --
tools/xenstore/xenstored_core.h | 1 +
2 files changed, 9 insertions(+), 2 deletions(-)
diff --git a/tools/xenstore/xens
From: James Dingwall
stderr is not available in a xenstore domain. Add a new implementation of
default_xprintf() which sends the message to vsyslog() at LOG_ERROR.
---
tools/xenstore/utils.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/tools/xenstore/utils.c b/tools/xenst
Hi,
When xenstore is run as a domain there is no way to get log messages from the
process. This small series adds a new --trace-syslog option which will copy
trace() and xprintf() messages to syslog, in the MiniOS case this directs to
the kernel printk(). When it is enabled in the xenstore domai
From: James Dingwall
Add a new xenstore control command which allows the tracesyslog boolean to be
changed at run time.
---
tools/xenstore/xenstored_control.c | 18 ++
1 file changed, 18 insertions(+)
diff --git a/tools/xenstore/xenstored_control.c
b/tools/xenstore/xenstored_co
On Tue, 3 Dec 2019 16:52:45 +
Julien Grall wrote:
Hi,
> On 03/12/2019 14:38, Andre Przywara wrote:
> > On Tue, 3 Dec 2019 11:39:58 +
> > Julien Grall wrote:
> >
> > Hi,
> >
> >> (+Andre)
> >>
> >> Hi,
> >>
> >> @Andre, IIRC you originally added the support for sunxi in Xen. Could
>
On 04.12.2019 10:17, Roger Pau Monné wrote:
> On Tue, Dec 03, 2019 at 04:14:46PM +0100, Jan Beulich wrote:
>> On 29.11.2019 12:38, Roger Pau Monné wrote:
>>> On Fri, Nov 29, 2019 at 12:28:49PM +0100, Roger Pau Monne wrote:
Cluster mode can only be used with interrupt remapping support, since
From: James Dingwall
Unconditionally openlog() since we allow tracesyslog to be changed at runtime.
Modify the trace() call to send messages to vsyslog() when tracesyslog is
enabled.
Note some trace() messages come in several calls before the '\n'. This works
well when the output is a file stre
Various bits of cleanup stemming from the recent TASK_SWITCH fixes.
This series depends on both
x86/svm: Correct vm_event API for descriptor accesses
x86/svm: Fix handling of EFLAGS.RF on task switch
posted separately due to their bugfix nature, but neither are overly important
for review pur
The vmcb is zeroed on allocate - drop all explicit writes of 0. Move
hvm_update_guest_efer() to co-locate it with the other control register
updates.
Move the BUILD_BUG_ON() into build_assertions(), and add some offset checks
for fields after the large blocks of reserved fields (as these are the
The type name is poor because the type is also used for the IDT vectoring
field, not just for the event injection field. Rename it to intinfo_t which
is how the APM refers to the data.
Rearrange the union to drop the .fields infix, and rename bytes to the more
common raw.
While adjusting all cal
The local variable eventinj is set to the value of vmcb->exitintinfo which is
confusing considering that it isn't vmcb->eventinj. The variable isn't
necessary to begin with, so drop it to avoid confusion.
A local rc variable is shadowed in the CPUID, #DB and #BP handlers.
There is a mix of spell
Introduce vmcb.e1.* and vmcb.e2.* to provide names to fields in exitinfo{1,2}
respectively. Implement the task switch names for now, and clean up the
TASK_SWITCH handler.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Roger Pau Monné
---
xen/arch/x86/hvm/svm/svm.c |
flight 144512 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144512/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 7 xen-boot fail REGR. vs. 144503
Tests which did not succeed
flight 144519 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144519/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen d7c3e6c9e9dabbba0b8dc0ddb0fc38811ae0915f
baseline version:
xen f2ae
On 04.12.2019 10:43, Andrew Cooper wrote:
> The vmcb is zeroed on allocate - drop all explicit writes of 0. Move
> hvm_update_guest_efer() to co-locate it with the other control register
> updates.
>
> Move the BUILD_BUG_ON() into build_assertions(), and add some offset checks
> for fields after
On 04.12.2019 10:43, Andrew Cooper wrote:
> The local variable eventinj is set to the value of vmcb->exitintinfo which is
> confusing considering that it isn't vmcb->eventinj. The variable isn't
> necessary to begin with, so drop it to avoid confusion.
>
> A local rc variable is shadowed in the C
On 04.12.2019 10:43, Andrew Cooper wrote:
> --- a/xen/arch/x86/hvm/svm/intr.c
> +++ b/xen/arch/x86/hvm/svm/intr.c
> @@ -43,15 +43,13 @@ static void svm_inject_nmi(struct vcpu *v)
> {
> struct vmcb_struct *vmcb = v->arch.hvm.svm.vmcb;
> u32 general1_intercepts = vmcb_get_general1_intercep
flight 144517 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144517/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 144501
test-armhf-armhf-libvirt-raw 13 saveresto
On 04.12.2019 10:43, Andrew Cooper wrote:
> Introduce vmcb.e1.* and vmcb.e2.* to provide names to fields in exitinfo{1,2}
> respectively. Implement the task switch names for now, and clean up the
> TASK_SWITCH handler.
"e1" and "e2" look overly short - and hence possibly ambiguous -
to me. Make t
On 02.12.19 12:41, Paul Durrant wrote:
To prevent a PV driver module being removed whilst attached to its other
end, and hence xenbus calling into potentially invalid text, take a
reference on the module before calling the probe() method (dropping it if
unsuccessful) and drop the reference after
On 02.12.19 12:41, Paul Durrant wrote:
Add a module_exit() to perform the necessary clean-up.
Signed-off-by: Paul Durrant
Reviewed-by: "Roger Pau Monné"
Reviewed-by: Juergen Gross
Pushed to xen/tip.git for-linus-5.5b
Juergen
___
Xen-devel maili
flight 144518 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144518/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c8ff8e05afb6a20b1ae66aa80bb8636b664be0b2
baseline version:
ovmf 4f47eaf9456e1a4f22553
When using global pages a full tlb flush can only be performed by
toggling the PGE bit in CR4, which is usually quite expensive in terms
of performance when running virtualized. This is specially relevant on
AMD hardware, which doesn't have the ability to do selective CR4
trapping, but can also be
On Tue, Dec 03, 2019 at 04:11:07PM +0100, Jan Beulich wrote:
> On 29.11.2019 12:28, Roger Pau Monne wrote:
> > --- a/xen/arch/x86/io_apic.c
> > +++ b/xen/arch/x86/io_apic.c
> > @@ -562,7 +562,7 @@ set_ioapic_affinity_irq(struct irq_desc *desc, const
> > cpumask_t *mask)
> >
> > dest = set_d
On Wed, Dec 04, 2019 at 10:34:14AM +0100, Jan Beulich wrote:
> On 04.12.2019 10:17, Roger Pau Monné wrote:
> > On Tue, Dec 03, 2019 at 04:14:46PM +0100, Jan Beulich wrote:
> >> On 29.11.2019 12:38, Roger Pau Monné wrote:
> >>> On Fri, Nov 29, 2019 at 12:28:49PM +0100, Roger Pau Monne wrote:
>
flight 144514 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144514/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail like 144495
test-amd64-amd64-xl-qemuu-win7-amd6
On 04.12.2019 11:44, Roger Pau Monne wrote:
> When using global pages a full tlb flush can only be performed by
> toggling the PGE bit in CR4, which is usually quite expensive in terms
> of performance when running virtualized. This is specially relevant on
> AMD hardware, which doesn't have the ab
Each `blkif` has a free pages pool for the grant mapping. The size of
the pool starts from zero and be increased on demand while processing
the I/O requests. If current I/O requests handling is finished or 100
milliseconds has passed since last I/O requests handling, it checks and
shrinks the poo
From: SeongJae Park
Each `blkif` has a free pages pool for the grant mapping. The size of
the pool starts from zero and be increased on demand while processing
the I/O requests. If current I/O requests handling is finished or 100
milliseconds has passed since last I/O requests handling, it chec
From: SeongJae Park
As discussed by the previous commit ("xen/blkback: Aggressively shrink
page pools if a memory pressure is detected"), the aggressive pool
shrinking duration should be carefully selected:
``If it is too long, free pages pool shrinking overhead can reduce the
I/O performance. I
> -Original Message-
> From: Xen-devel On Behalf Of
> SeongJae Park
> Sent: 04 December 2019 11:34
> To: konrad.w...@oracle.com; roger@citrix.com; ax...@kernel.dk
> Cc: sj38.p...@gmail.com; xen-devel@lists.xenproject.org; linux-
> bl...@vger.kernel.org; linux-ker...@vger.kernel.org; Pa
On Wed, Dec 04, 2019 at 12:05:35PM +0100, Jan Beulich wrote:
> On 04.12.2019 11:44, Roger Pau Monne wrote:
> > When using global pages a full tlb flush can only be performed by
> > toggling the PGE bit in CR4, which is usually quite expensive in terms
> > of performance when running virtualized. Th
On 04.12.19 12:52, Durrant, Paul wrote:
>> -Original Message-
>> From: Xen-devel On Behalf Of
>> SeongJae Park
>> Sent: 04 December 2019 11:34
>> To: konrad.w...@oracle.com; roger@citrix.com; ax...@kernel.dk
>> Cc: sj38.p...@gmail.com; xen-devel@lists.xenproject.org; linux-
>> bl...@vg
flight 144521 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144521/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 04.12.2019 08:14, Jeremi Piotrowski wrote:
> I'm able to repro, and I isolated the code from xc_dom_bzimageloader.c,
> xc_dom_decompress_lz4.c and /xen/common/lz4/decompress.c such that I can
> test more easily (I'm using code from 4.12.1). I'm testing with
> vmlinuz-5.3.0-23-generic installed i
On 04.12.2019 12:52, Roger Pau Monné wrote:
> On Wed, Dec 04, 2019 at 12:05:35PM +0100, Jan Beulich wrote:
>> On 04.12.2019 11:44, Roger Pau Monne wrote:
>>> --- a/xen/arch/x86/pv/domain.c
>>> +++ b/xen/arch/x86/pv/domain.c
>>> @@ -118,11 +118,18 @@ unsigned long pv_fixup_guest_cr4(const struct vcp
On Wed, Dec 04, 2019 at 02:15:58PM +0100, Jan Beulich wrote:
> On 04.12.2019 12:52, Roger Pau Monné wrote:
> > On Wed, Dec 04, 2019 at 12:05:35PM +0100, Jan Beulich wrote:
> >> On 04.12.2019 11:44, Roger Pau Monne wrote:
> >>> --- a/xen/arch/x86/pv/domain.c
> >>> +++ b/xen/arch/x86/pv/domain.c
> >>
On 04.12.2019 08:14, Jeremi Piotrowski wrote:
> Any suggestions how to proceed?
Actually here's a better version (I think).
Jan
lz4: refine commit 9143a6c55ef7 for the 64-bit case
I clearly went too far there: While the LZ4_WILDCOPY() instances indeed
need prior guarding, LZ4_SECURECOPY() needs
On Tue, Dec 03, 2019 at 04:33:09PM +0100, Jan Beulich wrote:
> On 29.11.2019 12:28, Roger Pau Monne wrote:
> > --- a/xen/arch/x86/apic.c
> > +++ b/xen/arch/x86/apic.c
> > @@ -492,7 +492,8 @@ static void __enable_x2apic(void)
> >
> > static void resume_x2apic(void)
> > {
> > -iommu_enable_x2
On 04.12.2019 14:17, Roger Pau Monné wrote:
> On Wed, Dec 04, 2019 at 02:15:58PM +0100, Jan Beulich wrote:
>> On 04.12.2019 12:52, Roger Pau Monné wrote:
>>> On Wed, Dec 04, 2019 at 12:05:35PM +0100, Jan Beulich wrote:
On 04.12.2019 11:44, Roger Pau Monne wrote:
> --- a/xen/arch/x86/pv/do
On 04.12.2019 14:51, Roger Pau Monné wrote:
> On Tue, Dec 03, 2019 at 04:33:09PM +0100, Jan Beulich wrote:
>> On 29.11.2019 12:28, Roger Pau Monne wrote:
>>> --- a/xen/arch/x86/apic.c
>>> +++ b/xen/arch/x86/apic.c
>>> @@ -492,7 +492,8 @@ static void __enable_x2apic(void)
>>>
>>> static void resu
On 12/3/19 7:57 AM, Pawel Wieczorkiewicz wrote:
> ... when all symbols have their status and include flags processed.
>
> Processing special sections may include additional symbols. String
> sections (.rodata*) are included iff they are referenced by at least
> one symbol. Thus, in order to decide
On 12/3/19 7:57 AM, Pawel Wieczorkiewicz wrote:
> The .init sections must not be considered for patching regardless of
> whether they are CHANGED or NEW.
> Explicitely detect and ignore all such sections, before marking
> ignored sections as SAME.
>
> Signed-off-by: Pawel Wieczorkiewicz
Reviewed-
When using global pages a full tlb flush can only be performed by
toggling the PGE bit in CR4, which is usually quite expensive in terms
of performance when running virtualized. This is specially relevant on
AMD hardware, which doesn't have the ability to do selective CR4
trapping, but can also be
Hi,
I am working on making libvmi[1] work on AMD, and one big issue is the lack
of support for single-stepping on AMD processors in the vmi api offered by xen.
I think i have a way to get it to work, and I would like to know if you see
any issues with this approach, and if there is any reason it h
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Define Defbool as struct analagous to the C type, and define the type
> 'defboolVal' that represent true, false, and default defbool values.
>
> Implement Set, Unset, SetIfDefault, IsDefault, Val, and String functions
> on Defbo
On 12/2/19 6:49 PM, Lars Kurth wrote:
> If you want to attend, please let me know.
>
> I arranged a room for the meeting and will be there on the 10th (I cannot do
> the 11th). There will be no food provided during the day, but of course there
> are snacks and coffee in our kitchen.
>
> I was a
Hi Boris,
On 28/11/2019 21:50, Boris Ostrovsky wrote:
On 11/28/19 5:23 AM, Jan Beulich wrote:
On 28.11.2019 10:38, Paul Durrant wrote:
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -576,11 +576,36 @@ static void vpmu_arch_destroy(struct vcpu *v)
vpmu->arch_vpmu_
On 04/12/2019 15:32, felix nasch wrote:
> Hi,
>
> I am working on making libvmi[1] work on AMD, and one big issue is the lack
> of support for single-stepping on AMD processors in the vmi api offered by
> xen.
> I think i have a way to get it to work, and I would like to know if you see
> any issu
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Introduce gengotypes.py to generate Go code the from IDL. As a first step,
> implement 'enum' type generation.
>
> As a result of the newly-generated code, remove the existing, and now
> conflicting definitions in xenlight.go. I
> On Dec 4, 2019, at 10:55 AM, Julien Grall wrote:
>
> Hi Boris,
>
> On 28/11/2019 21:50, Boris Ostrovsky wrote:
>> On 11/28/19 5:23 AM, Jan Beulich wrote:
>>> On 28.11.2019 10:38, Paul Durrant wrote:
>>>
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu.c
@@ -576,11 +5
On 04/12/2019 15:59, Boris Ostrovsky wrote:
On Dec 4, 2019, at 10:55 AM, Julien Grall wrote:
Hi Boris,
On 28/11/2019 21:50, Boris Ostrovsky wrote:
On 11/28/19 5:23 AM, Jan Beulich wrote:
On 28.11.2019 10:38, Paul Durrant wrote:
--- a/xen/arch/x86/cpu/vpmu.c
+++ b/xen/arch/x86/cpu/vpmu
On 04.12.2019 17:02, Julien Grall wrote:
>
>
> On 04/12/2019 15:59, Boris Ostrovsky wrote:
>>
>>
>>> On Dec 4, 2019, at 10:55 AM, Julien Grall wrote:
>>>
>>> Hi Boris,
>>>
>>> On 28/11/2019 21:50, Boris Ostrovsky wrote:
On 11/28/19 5:23 AM, Jan Beulich wrote:
> On 28.11.2019 10:38, Paul
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Define KeyValueList as empty struct as there is currently no reason for
> this type to be available in the Go package.
>
> Implement fromC and toC functions as no-ops.
>
> Signed-off-by: Nick Rosbrook
Reviewed-by: George Dunl
On 04.12.2019 16:12, Roger Pau Monne wrote:
> --- a/xen/arch/x86/pv/domain.c
> +++ b/xen/arch/x86/pv/domain.c
> @@ -118,6 +118,19 @@ unsigned long pv_fixup_guest_cr4(const struct vcpu *v,
> unsigned long cr4)
> (mmu_cr4_features & PV_CR4_GUEST_VISIBLE_MASK));
> }
>
> +static int8_t
On 04/12/2019 16:08, Jan Beulich wrote:
On 04.12.2019 17:02, Julien Grall wrote:
On 04/12/2019 15:59, Boris Ostrovsky wrote:
On Dec 4, 2019, at 10:55 AM, Julien Grall wrote:
Hi Boris,
On 28/11/2019 21:50, Boris Ostrovsky wrote:
On 11/28/19 5:23 AM, Jan Beulich wrote:
On 28.11.2019 1
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Define StringList as []string an implement fromC and toC functions.
>
> Signed-off-by: Nick Rosbrook
Reviewed-by: George Dunlap
___
Xen-devel mailing list
Xen-devel@lists.xenprojec
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Define Mac as [6]byte and implement fromC, toC, and String functions.
>
> Signed-off-by: Nick Rosbrook
Reviewed-by: George Dunlap
___
Xen-devel mailing list
Xen-devel@lists.xenproj
On Wed, Dec 04, 2019 at 05:11:42PM +0100, Jan Beulich wrote:
> On 04.12.2019 16:12, Roger Pau Monne wrote:
> > --- a/xen/arch/x86/pv/domain.c
> > +++ b/xen/arch/x86/pv/domain.c
> > @@ -118,6 +118,19 @@ unsigned long pv_fixup_guest_cr4(const struct vcpu *v,
> > unsigned long cr4)
> > (
Hello,
The following series aims to allow enabling x2APIC mode without
interrupt remapping support. The main usage of this would be in
virtualized environments, that usually provide x2APIC support but not
interrupt remapping.
See the last patch for some performance numbers of using x2APIC over
xA
The IO-APIC code assumes that x2apic being enabled also implies
interrupt remapping being enabled, and hence will use the 32bit
destination field in the IO-APIC entry.
This is safe now, but there's no reason to not enable x2APIC even
without interrupt remapping, and hence the IO-APIC code needs to
Cluster mode can only be used with interrupt remapping support, since
the top 16bits of the APIC ID are filled with the cluster ID, and
hence on systems where the physical ID is still smaller than 255 the
cluster ID is not. Force x2APIC to use physical mode if there's no
interrupt remapping support
x2APIC mode doesn't mandate interrupt remapping, and hence can be
enabled independently. This patch enables x2APIC when available,
regardless of whether there's interrupt remapping support.
This is beneficial specially when running on virtualized environments,
since it reduces the amount of vmexit
Check that the processor to be woken up APIC ID is addressable in the
current APIC mode.
Note that in practice systems with APIC IDs > 255 should already have
x2APIC enabled by the firmware, and hence this is mostly a safety
belt.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
- Reword er
On Wed, 2019-12-04 at 10:04 +0100, Jan Beulich wrote:
> On 03.12.2019 18:10, Andrew Cooper wrote:
> > --- a/xen/include/public/hvm/dm_op.h
> > +++ b/xen/include/public/hvm/dm_op.h
> > @@ -324,7 +324,7 @@ struct xen_dm_op_inject_event {
> > /* IN - error code (or ~0 to skip) */
> > uint32_
On Tue, 2019-12-03 at 17:10 +, Andrew Cooper wrote:
> Like %cr2 for pagefaults, %dr6 contains ancillary information for
> debug
> exceptions, and needs similar handling.
>
> For xendevicemodel_inject_event(), no ABI change is needed (although
> an API
> one would be ideal). Switch from 'cr2'
Vladimir Sementsov-Ogievskiy writes:
> Here is introduced ERRP_AUTO_PROPAGATE macro, to be used at start of
> functions with errp OUT parameter.
>
> It has three goals:
>
> 1. Fix issue with error_fatal & error_prepend/error_append_hint: user
> can't see this additional information, because exit(
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Define CpuidPolicyList as a string so that libxl_cpuid_parse_config can
> be used in the toC function.
>
> For now, fromC is a no-op since libxl does not support a way to read a
> policy, modify it,and then give it back to libxl
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Define MsVmGenid as [int(C.LIBXL_MS_VM_GENID_LEN)]byte and implement fromC
> and toC functions.
>
> Signed-off-by: Nick Rosbrook
> Reviewed-by: George Dunlap
> ---
> tools/golang/xenlight/xenlight.go | 23 +++
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Re-define Uuid as [16]byte and implement fromC, toC, and String functions.
>
> Signed-off-by: Nick Rosbrook
> ---
> tools/golang/xenlight/xenlight.go | 37 +--
> 1 file changed, 35 insertions(+), 2
On 04.12.2019 17:18, Roger Pau Monné wrote:
> On Wed, Dec 04, 2019 at 05:11:42PM +0100, Jan Beulich wrote:
>> On 04.12.2019 16:12, Roger Pau Monne wrote:
>>> @@ -130,7 +143,7 @@ unsigned long pv_make_cr4(const struct vcpu *v)
>>> */
>>> if ( d->arch.pv.pcid )
>>> cr4 |= X86_CR4_
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Re-define Hwcap as [8]uint32, and implement toC function. Also, re-name and
> modify signature of toGo function to fromC.
>
> Signed-off-by: Nick Rosbrook
> Reviewed-by: George Dunlap
> ---
> Changes in v2:
> - Fix comment in
From: Wei Liu
We are going to switch to using domheap page for page tables.
A new set of APIs is introduced to allocate, map, unmap and free pages
for page tables.
The allocation and deallocation work on mfn_t but not page_info,
because they are required to work even before frame table is set up
From: Wei Liu
We will soon rewrite the function to handle dynamically mapping and
unmapping of page tables.
No functional change.
Signed-off-by: Wei Liu
Signed-off-by: Hongyan Xia
---
Changed since v3:
- remove asserts on rc since rc never gets changed to anything else
- reword commit messag
From: Wei Liu
We will soon need to handle dynamically mapping / unmapping page
tables in the said function.
No functional change.
Signed-off-by: Wei Liu
Signed-off-by: Hongyan Xia
---
Changed since v3:
- remove asserts on rc since it never gets changed to anything else.
---
xen/arch/x86/mm.
From: Wei Liu
We will soon need to clean up mappings whenever the out most loop
is ended. Add a new label and turn relevant continue's into goto's.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 15 ---
1 file changed, 8 insertions(+), 7 deletions(-)
diff --
From: Wei Liu
They were put into page.h but mm.h is more appropriate.
The real reason is that I will be adding some new functions which
takes mfn_t. It turns out it is a bit difficult to do in page.h.
No functional change.
Signed-off-by: Wei Liu
Acked-by: Jan Beulich
---
Changed since v3:
-
From: Wei Liu
We will soon need to clean up mappings whenever the out most loop is
ended. Add a new label and turn relevant continue's into goto's.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 9 +
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/x
From: Wei Liu
The pl2e and pl1e variables are heavily (ab)used in that function. It
is fine at the moment because all page tables are always mapped so
there is no need to track the life time of each variable.
We will soon have the requirement to map and unmap page tables. We
need to track the l
From: Wei Liu
The pl2e and pl1e variables are heavily (ab)used in that function. It
is fine at the moment because all page tables are always mapped so
there is no need to track the life time of each variable.
We will soon have the requirement to map and unmap page tables. We
need to track the li
From: Wei Liu
We will need to have a variable named pl*e when we rewrite
virt_to_xen_l*e. Change pl*e to l*t to reflect better its purpose.
This will make reviewing later patch easier.
No functional change.
Signed-off-by: Wei Liu
Signed-off-by: Hongyan Xia
Reviewed-by: Jan Beulich
---
xen/a
NOTE: My email address has changed due to some HR management. I have
lost all my previous emails and I could only salvage some of the
comments to v3 from the mailing list archive. I will reply to the
comments from v3 in this v4 series.
This batch adds an alternative alloc-map-unmap-free Xen PTE AP
L.S.,
On current xen-unstable (4.14 to be) and AMD cpu:
After rebooting the host, while the guests are starting, I hit the assertion
below.
xen-staging-4.13 seems fine on the same machine.
--
Sander
(XEN) [2019-12-04 17:03:25.062] grant_table.c:1808:d7v0 Expanding d7 grant
table from 3 to 4
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Add struct and keyed union generation to gengotypes.py. For keyed unions,
> use a method similar to gRPC's oneof to interpret C unions as Go types.
> Meaning, for a given struct with a union field, generate a struct for
> each su
On 04.12.2019 18:21, Sander Eikelenboom wrote:
> On current xen-unstable (4.14 to be) and AMD cpu:
>
> After rebooting the host, while the guests are starting, I hit the assertion
> below.
> xen-staging-4.13 seems fine on the same machine.
Nothing between 4.13 RC4 and the tip of staging stands o
> There's no need for the map/unmap functions to have a _new
> suffix, is there?
I thought this was weird at first also, but what I find really useful
is that we can just change all call sites to the new API in small steps
without breaking. Otherwise we have to merge a huge batch of
changes (aroun
On Fri, Nov 29, 2019 at 10:10 AM Andrew Cooper
wrote:
>
> On 29/11/2019 15:05, Julien Grall wrote:
> > Hi,
> >
> > On 27/11/2019 18:44, Pavel Tatashin wrote:
> >> diff --git a/arch/arm64/include/asm/xen/hypercall.h
> >> b/arch/arm64/include/asm/xen/hypercall.h
> >> index 3522cbaed316..1a74fb28607f
On Fri, Nov 29, 2019 at 10:05 AM Julien Grall wrote:
>
> Hi,
>
> On 27/11/2019 18:44, Pavel Tatashin wrote:
> > diff --git a/arch/arm64/include/asm/xen/hypercall.h
> > b/arch/arm64/include/asm/xen/hypercall.h
> > index 3522cbaed316..1a74fb28607f 100644
> > --- a/arch/arm64/include/asm/xen/hyperca
>> @@ -5272,6 +5279,7 @@ int map_pages_to_xen(
>> ((1u << PAGETABLE_ORDER) - 1)) == 0)) )
>> {
>> unsigned long base_mfn;
>> +l1_pgentry_t *l1t;
>
> const, as this looks to be used for lookup only?
I cannot do this for now since va
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Implement basic type conversion in fromC functions such as strings and
> integer types. Also, remove existing toGo functions from xenlight.go in
> favor of the new generated functions.
You should probably say here explicitly wha
flight 144520 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144520/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-rtds 7 xen-boot fail in 144512 pass in 144520
test-amd64-i386-xl-qemuu-dmrestr
On 11/15/19 7:44 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Switch over union key to determine how to populate 'union' in Go struct.
>
> Since the unions of C types cannot be directly accessed, add C structs in
> cgo preamble to assist in marshaling keyed unions. This allows the C
> type
On 04/12/2019 10:06, Jan Beulich wrote:
> On 04.12.2019 10:43, Andrew Cooper wrote:
>> The vmcb is zeroed on allocate - drop all explicit writes of 0. Move
>> hvm_update_guest_efer() to co-locate it with the other control register
>> updates.
>>
>> Move the BUILD_BUG_ON() into build_assertions(),
On 04/12/2019 10:19, Jan Beulich wrote:
> On 04.12.2019 10:43, Andrew Cooper wrote:
>> --- a/xen/arch/x86/hvm/svm/intr.c
>> +++ b/xen/arch/x86/hvm/svm/intr.c
>> @@ -43,15 +43,13 @@ static void svm_inject_nmi(struct vcpu *v)
>> {
>> struct vmcb_struct *vmcb = v->arch.hvm.svm.vmcb;
>> u32
On 04/12/2019 09:43, Andrew Cooper wrote:
> @@ -420,10 +420,10 @@ struct vmcb_struct {
> u64 exitcode; /* offset 0x70 */
> u64 exitinfo1; /* offset 0x78 */
> u64 exitinfo2; /* offset 0x80 */
> -eventinj_t exitintinfo;/* offset 0x88 */
1 - 100 of 122 matches
Mail list logo