On Tue, 17 Dec 2019 07:23:12 +0100 "Jürgen Groß" wrote:
> On 16.12.19 20:48, SeongJae Park wrote:
> > On on, 16 Dec 2019 17:23:44 +0100, Jürgen Groß wrote:
> >
> >> On 16.12.19 17:15, SeongJae Park wrote:
> >>> On Mon, 16 Dec 2019 15:37:20 +0100 SeongJae Park
> >>> wrote:
> >>>
> On Mon,
On 17.12.19 08:59, SeongJae Park wrote:
On Tue, 17 Dec 2019 07:23:12 +0100 "Jürgen Groß" wrote:
On 16.12.19 20:48, SeongJae Park wrote:
On on, 16 Dec 2019 17:23:44 +0100, Jürgen Groß wrote:
On 16.12.19 17:15, SeongJae Park wrote:
On Mon, 16 Dec 2019 15:37:20 +0100 SeongJae Park wrote:
O
flight 144892 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144892/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 144637
build-amd64
On Tue, 17 Dec 2019 09:16:47 +0100 "Jürgen Groß" wrote:
> On 17.12.19 08:59, SeongJae Park wrote:
> > On Tue, 17 Dec 2019 07:23:12 +0100 "Jürgen Groß" wrote:
> >
> >> On 16.12.19 20:48, SeongJae Park wrote:
> >>> On on, 16 Dec 2019 17:23:44 +0100, Jürgen Groß wrote:
> >>>
> On 16.12.19 17:
Hello,
I was asked via IRC to post my issue here. I got the following through
the debug interface:
0x:0x00:0x1f.0x6: ROM: 0x10400 bytes at 0x7ffc7018
(XEN) Xen version 4.11.2-pre (Debian 4.11.1+92-g6c33308a8d-2)
(pkg-xen-de...@lists.alioth.debian.org) (gcc (Debian 8.3.0-7) 8.3.0) debug=n
flight 144885 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144885/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 144853
test-armhf-armhf-libvirt-raw 13 saveresto
flight 144893 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144893/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 144637
build-amd64
Now that Kconfig has the capability to run shell command when
generating CONFIG_* we can use it in some cases to test CFLAGS.
CONFIG_INDIRECT_THUNK is a good example that wants to exist both in
Makefile and as a C macro, which Kconfig do. So use Kconfig to
generate CONFIG_INDIRECT_THUNK and have t
This import several files from Linux v5.3
- scripts/Kconfig.include
- scripts/clang-version.sh
- scripts/gcc-version.sh
and several config values from from Linux's init/Kconfig file.
Files are copied into scripts/ directory because that's were the files
are found in Linux tree, and also becaus
Kconfig can check if $(CC) is clang or not, if it is
CONFIG_CC_IS_CLANG will be set.
With that patch, the hypervisor can be built using clang by running
`make CC=clang CXX=clang++` without needed to provide an extra clang
parameter.
`make clang=y` still works as Config.mk will set CC and CXX.
Si
Patch series available in this git branch:
https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git
br.build-system-xen-kconfig-v2
v2:
nit changes in patch 1 and 2.
Hi,
This is a update of Kconfig as used to build the hypervisor. This is also in
preparation of using Kbuild. The firs
This is in preparation of importing Kbuild to build Xen. We won't be
able to include Config.mk so we will need a replacement for the macro
`cc-ifversion'.
This patch imports parts of "scripts/Kbuild.include" from Linux v5.4,
the macro cc-ifversion. It makes use of CONFIG_GCC_VERSION that
Kconfig n
The check for $(CC) -fvisibility=hidden is done by both arm and x86,
so the patch also move the check to the common area.
The check doesn't check if $(CC) is gcc, and clang can accept that
option as well, so s/GCC/CC/ is done to the define name.
Signed-off-by: Anthony PERARD
Acked-by: Andrew Coo
On 12/10/19 3:47 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Signed-off-by: Nick Rosbrook
> ---
> tools/golang/xenlight/gengotypes.py | 39 +++-
> tools/golang/xenlight/helpers.gen.go | 300 +++
> 2 files changed, 338 insertions(+), 1 deletion(-)
>
> diff --git
On 17/12/2019 01:18, Stefano Stabellini wrote:
On Mon, 16 Dec 2019, Julien Grall wrote:
On 16/12/2019 23:05, Stefano Stabellini wrote:
On Mon, 16 Dec 2019, Julien Grall wrote:
On 16/12/2019 18:02, Andrei Cherechesu wrote:
But even with this patch, RAM in DomU is not direct mapped (i.e Guest
On 17.12.2019 11:02, Limitless Green wrote:
> Hello,
>
> I was asked via IRC to post my issue here. I got the following through
> the debug interface:
>
>
> 0x:0x00:0x1f.0x6: ROM: 0x10400 bytes at 0x7ffc7018
> (XEN) Xen version 4.11.2-pre (Debian 4.11.1+92-g6c33308a8d-2)
> (pkg-xen-de...@l
Hi,
On 17/12/2019 04:39, Roman Shaposhnik wrote:
On Mon, Dec 16, 2019 at 6:55 PM Stefano Stabellini
wrote:
On Mon, 16 Dec 2019, Roman Shaposhnik wrote:
If I sum all the memory sizes together I get 0x3ddfd000 which is 990M.
If so, I wonder how you could boot succesfully with dom0_mem=1024M even
On Mon, Dec 16, 2019 at 08:48:03PM +0100, SeongJae Park wrote:
> On on, 16 Dec 2019 17:23:44 +0100, Jürgen Groß wrote:
>
> > On 16.12.19 17:15, SeongJae Park wrote:
> > > On Mon, 16 Dec 2019 15:37:20 +0100 SeongJae Park
> > > wrote:
> > >
> > >> On Mon, 16 Dec 2019 13:45:25 +0100 SeongJae Park
On Fri, Dec 13, 2019 at 07:04:32PM +, Andrew Cooper wrote:
> The trampoline has already set up the idle pagetables (which are the correct
> ones to use), and sanitised the flags state.
I wonder why do we have wakeup.S and wakeup_prot.S, it would be easier
to follow if it all was in the same fi
On Fri, Dec 13, 2019 at 07:04:33PM +, Andrew Cooper wrote:
> Only the callee-preserved registers need saving/restoring. Spill them to the
> stack like regular functions do. %rsp is now the only GPR which gets stashed
> in .data
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
On 17/12/2019 11:52, Roger Pau Monné wrote:
> On Fri, Dec 13, 2019 at 07:04:32PM +, Andrew Cooper wrote:
>> The trampoline has already set up the idle pagetables (which are the correct
>> ones to use), and sanitised the flags state.
> I wonder why do we have wakeup.S and wakeup_prot.S, it would
On 17/12/2019 12:04, Roger Pau Monné wrote:
>> diff --git a/xen/arch/x86/acpi/wakeup_prot.S
>> b/xen/arch/x86/acpi/wakeup_prot.S
>> index 35fd7a5e9f..2f6c8e18ef 100644
>> --- a/xen/arch/x86/acpi/wakeup_prot.S
>> +++ b/xen/arch/x86/acpi/wakeup_prot.S
>> @@ -11,24 +11,14 @@
>> #define REF(x)
On Tue, Dec 17, 2019 at 12:10:55PM +, Andrew Cooper wrote:
> On 17/12/2019 12:04, Roger Pau Monné wrote:
> >> diff --git a/xen/arch/x86/acpi/wakeup_prot.S
> >> b/xen/arch/x86/acpi/wakeup_prot.S
> >> index 35fd7a5e9f..2f6c8e18ef 100644
> >> --- a/xen/arch/x86/acpi/wakeup_prot.S
> >> +++ b/xen/a
On Fri, Dec 13, 2019 at 07:04:34PM +, Andrew Cooper wrote:
> Just like the BSP/AP paths, %cr4 is loaded with only PAE. Defer restoring all
> of %cr4 (MCE in particular) until all the system structures (IDT/TSS in
> particular) have been loaded.
>
> Signed-off-by: Andrew Cooper
Reviewed-by:
On Tue, Dec 17, 2019 at 12:06:01PM +, Andrew Cooper wrote:
> On 17/12/2019 11:52, Roger Pau Monné wrote:
> > On Fri, Dec 13, 2019 at 07:04:32PM +, Andrew Cooper wrote:
> >> The trampoline has already set up the idle pagetables (which are the
> >> correct
> >> ones to use), and sanitised th
Hello,
ty for the reply. I'm using the internal gfx of the Intel i3-8100. I
have ECC unbuffered RAM, but I thing this shouldn't be an issue. How can
I get these packages? I used the xen-hypervisor-common package from the
debian buster repository. If I try to build it (debian too), I run into
On 17/12/2019 12:18, Roger Pau Monné wrote:
> On Tue, Dec 17, 2019 at 12:06:01PM +, Andrew Cooper wrote:
>> On 17/12/2019 11:52, Roger Pau Monné wrote:
>>> On Fri, Dec 13, 2019 at 07:04:32PM +, Andrew Cooper wrote:
The trampoline has already set up the idle pagetables (which are the
>
On Fri, Dec 13, 2019 at 07:04:35PM +, Andrew Cooper wrote:
> Most users have been dropped, and they do nothing but obfuscate the assembly.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
Thanks, Roger.
___
Xen-devel mailing list
Xe
On Fri, Dec 13, 2019 at 07:04:36PM +, Andrew Cooper wrote:
> Construct the system linkage MSRs using percpu_traps_init(), brining the S3
> path in line with the BSP/AP path. Restore xcr0 from the per-cpu shadow copy.
>
> The FS/GS base values are unused in Xen context, and will be loaded
> ap
On Tue, 17 Dec 2019 12:39:15 +0100 "Roger Pau Monné"
wrote:
> On Mon, Dec 16, 2019 at 08:48:03PM +0100, SeongJae Park wrote:
> > On on, 16 Dec 2019 17:23:44 +0100, Jürgen Groß wrote:
> >
> > > On 16.12.19 17:15, SeongJae Park wrote:
> > > > On Mon, 16 Dec 2019 15:37:20 +0100 SeongJae Park
> >
Removing the 'hotplug-status' node in netback_remove() is wrong; the script
may not have completed. Only remove the node once the watch has fired and
has been unregistered.
Signed-off-by: Paul Durrant
---
Cc: Wei Liu
Cc: Paul Durrant
Cc: "David S. Miller"
---
drivers/net/xen-netback/xenbus.c
...of xenbus.c
This is a cosmetic function re-ordering to reduce churn in a subsequent
patch. Some style fix-up was done to make checkpatch.pl happier.
No functional change.
Signed-off-by: Paul Durrant
---
Cc: Wei Liu
Cc: Paul Durrant
Cc: "David S. Miller"
---
drivers/net/xen-netback/xenbus
...as the comment above the function states.
The switch to Initialising at the start of the function is somewhat bogus
as the toolstack will have set that initial state anyway. To behave
correctly, a backend should switch to InitWait once it has set up all
xenstore values that may be required by a
Paul Durrant (3):
xen-netback: move netback_probe() and netback_remove() to the end...
xen-netback: switch state to InitWait at the end of netback_probe()...
xen-netback: remove 'hotplug-status' once it has served its purpose
drivers/net/xen-netback/xenbus.c | 350 +++---
The Expected and Got values are rendered in the wrong order.
Signed-off-by: Andrew Cooper
---
CC: Ian Jackson
CC: Wei Liu
This wants backporting to the stable trees
---
tools/libxc/xc_sr_restore.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxc/xc_sr_restore.c
On 17.12.19 14:15, SeongJae Park wrote:
On Tue, 17 Dec 2019 12:39:15 +0100 "Roger Pau Monné"
wrote:
On Mon, Dec 16, 2019 at 08:48:03PM +0100, SeongJae Park wrote:
On on, 16 Dec 2019 17:23:44 +0100, Jürgen Groß wrote:
On 16.12.19 17:15, SeongJae Park wrote:
On Mon, 16 Dec 2019 15:37:20 +01
On Tue, Dec 17, 2019 at 01:49:56PM +, Andrew Cooper wrote:
> The Expected and Got values are rendered in the wrong order.
>
> Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.x
From: Ross Lagerwall
Otherwise it produces lots of false positives.
Signed-off-by: Ross Lagerwall
Signed-off-by: Sergey Dyasli
---
drivers/xen/grant-table.c | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/drivers/xen/grant-table.c b/drivers/xen/grant-table.c
index 49b3
This enables to use Outline instrumentation for Xen PV kernels.
KASAN_INLINE and KASAN_VMALLOC options currently lead to boot crashes
and hence disabled.
Rough edges in the patch are marked with XXX.
Signed-off-by: Sergey Dyasli
---
arch/x86/mm/init.c | 14 ++
arch/x86/mm/
This series allows to boot and run Xen PV kernels (Dom0 and DomU) with
CONFIG_KASAN=y. It has been used internally for some time now with good
results for finding memory corruption issues in Dom0 kernel.
Only Outline instrumentation is supported at the moment.
Patch 1 is of RFC quality
Patches 2-
From: Ross Lagerwall
When KASAN (or SLUB_DEBUG) is turned on, the normal expectation that
allocations are aligned to the next power of 2 of the size does not
hold. Therefore, handle grant copies that cross page boundaries.
Signed-off-by: Ross Lagerwall
Signed-off-by: Sergey Dyasli
---
drivers
Boqun Feng writes:
> Similar to x86, add a new vclock_mode VCLOCK_HVCLOCK, and reuse the
> hv_read_tsc_page() for userspace to read tsc page clocksource.
>
> Signed-off-by: Boqun Feng (Microsoft)
> ---
> arch/arm64/include/asm/clocksource.h | 3 ++-
> arch/arm64/include/asm/mshyperv.h
On Fri, Dec 13, 2019 at 03:08:34PM +1100, Steven Haigh wrote:
> Signed-off-by: Steven Haigh
Acked-by: Wei Liu
I will need to add tools/hotplug to the subject line and the following
commit message:
Use 4 spaces for indentation throughout the file. No functional
change.
Wei.
Signed-off-by: Ian Jackson
---
SUPPORT.md | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/SUPPORT.md b/SUPPORT.md
index f7a7a56c29..b24649ef2d 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
@@ -9,13 +9,13 @@ for the definitions of the support status levels etc.
# Relea
On Fri, Dec 13, 2019 at 03:08:35PM +1100, Steven Haigh wrote:
> Signed-off-by: Steven Haigh
> ---
> tools/hotplug/Linux/colo-proxy-setup | 30 +--
> tools/hotplug/Linux/vif-bridge| 19 --
> tools/hotplug/Linux/vif2 | 12 +++--
>
> On 17 Dec 2019, at 14:18, Ian Jackson wrote:
>
> Signed-off-by: Ian Jackson
> ---
> SUPPORT.md | 10 +-
> 1 file changed, 5 insertions(+), 5 deletions(-)
>
> diff --git a/SUPPORT.md b/SUPPORT.md
> index f7a7a56c29..b24649ef2d 100644
> --- a/SUPPORT.md
> +++ b/SUPPORT.md
> @@ -9,13 +9
On 17.12.19 15:18, Ian Jackson wrote:
Signed-off-by: Ian Jackson
Reviewed-by: Juergen Gross
Release-acked-by: Juergen Gross
Juergen
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Tue, Dec 17, 2019 at 02:13:30PM +, Wei Liu wrote:
> On Fri, Dec 13, 2019 at 03:08:34PM +1100, Steven Haigh wrote:
> > Signed-off-by: Steven Haigh
>
> Acked-by: Wei Liu
>
> I will need to add tools/hotplug to the subject line and the following
> commit message:
>
>Use 4 spaces for in
The existing code assumes that the first mfn passed to the boot
allocator is mapped, which creates problems when, e.g., we do not have
a direct map, and may create other bootstrapping problems in the
future. Make it static. The size is kept the same as before (1 page).
Signed-off-by: Hongyan Xia
On break point event eight context switches occures.
With fast single step it is possible to shorten path for two context switches
and gain 35% spead-up.
Was tested on Debian branch of Xen 4.12. See at:
https://github.com/skvl/xen/tree/debian/knorrie/4.12/fast-singlestep
Rebased on master:
http
On 17/12/2019 14:40, Sergey Kovalev wrote:
> On break point event eight context switches occures.
>
> With fast single step it is possible to shorten path for two context
> switches
> and gain 35% spead-up.
>
> Was tested on Debian branch of Xen 4.12. See at:
> https://github.com/skvl/xen/tree/debi
Signed-off-by: Wei Liu
---
Paul: this is based on the assumption that the next version is going to
be 4.14. Let me know if you decide otherwise...
---
tools/libfsimage/common/Makefile | 2 +-
tools/libvchan/Makefile | 2 +-
tools/libxc/Makefile | 2 +-
tools/libxl/Makefile
On Tue, Dec 17, 2019 at 6:16 AM George Dunlap wrote:
>
> On 12/10/19 3:47 PM, Nick Rosbrook wrote:
> > From: Nick Rosbrook
> >
> > Signed-off-by: Nick Rosbrook
> > ---
> > tools/golang/xenlight/gengotypes.py | 39 +++-
> > tools/golang/xenlight/helpers.gen.go | 300 +++
On 17.12.2019 17:48, Andrew Cooper wrote:
On 17/12/2019 14:40, Sergey Kovalev wrote:
On break point event eight context switches occures.
With fast single step it is possible to shorten path for two context
switches
and gain 35% spead-up.
Was tested on Debian branch of Xen 4.12. See at:
https:
On Tue, Dec 17, 2019 at 7:48 AM Andrew Cooper wrote:
>
> On 17/12/2019 14:40, Sergey Kovalev wrote:
> > On break point event eight context switches occures.
> >
> > With fast single step it is possible to shorten path for two context
> > switches
> > and gain 35% spead-up.
> >
> > Was tested on De
On Tue, Dec 17, 2019 at 12:26:24PM +, Andrew Cooper wrote:
> On 17/12/2019 12:18, Roger Pau Monné wrote:
> > On Tue, Dec 17, 2019 at 12:06:01PM +, Andrew Cooper wrote:
> >> On 17/12/2019 11:52, Roger Pau Monné wrote:
> >>> On Fri, Dec 13, 2019 at 07:04:32PM +, Andrew Cooper wrote:
> >>>
On Tue, Dec 17, 2019 at 8:08 AM Tamas K Lengyel wrote:
>
> On Tue, Dec 17, 2019 at 7:48 AM Andrew Cooper
> wrote:
> >
> > On 17/12/2019 14:40, Sergey Kovalev wrote:
> > > On break point event eight context switches occures.
> > >
> > > With fast single step it is possible to shorten path for two
Signed-off-by: Alexandru Isaila
---
CC: Jun Nakajima
CC: Kevin Tian
CC: George Dunlap
CC: Jan Beulich
CC: Andrew Cooper
CC: Wei Liu
CC: "Roger Pau Monné"
---
xen/arch/x86/mm/p2m-ept.c | 6 --
xen/arch/x86/mm/p2m.c | 6 ++
2 files changed, 6 insertions(+), 6 deletions(-)
diff -
By default the sve bits are not set.
This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(),
to set a range of sve bits.
The core function, p2m_set_suppress_ve_multi(), does not brake in case
of a error and it is doing a best effort for setting the bits in the
given range. A check for co
This patch aims to sanitize indexes, potentially guest provided
values, for altp2m_eptp[] and altp2m_p2m[] arrays.
Signed-off-by: Alexandru Isaila
---
CC: Razvan Cojocaru
CC: Tamas K Lengyel
CC: Petre Pircalabu
CC: George Dunlap
CC: Jan Beulich
CC: Andrew Cooper
CC: Wei Liu
CC: "Roger Pau
On 17/12/2019 15:10, Tamas K Lengyel wrote:
> On Tue, Dec 17, 2019 at 8:08 AM Tamas K Lengyel wrote:
>> On Tue, Dec 17, 2019 at 7:48 AM Andrew Cooper
>> wrote:
>>> On 17/12/2019 14:40, Sergey Kovalev wrote:
On break point event eight context switches occures.
With fast single step
At this moment the default_access param from xc_altp2m_create_view is
not used.
This patch assigns default_access to p2m->default_access at the time of
initializing a new altp2m view.
Signed-off-by: Alexandru Isaila
---
CC: Jan Beulich
CC: Andrew Cooper
CC: Wei Liu
CC: "Roger Pau Monné"
CC:
> -Original Message-
> From: Xen-devel On Behalf Of
> Sergey Dyasli
> Sent: 17 December 2019 14:08
> To: xen-de...@lists.xen.org; kasan-...@googlegroups.com; linux-
> ker...@vger.kernel.org
> Cc: Juergen Gross ; Sergey Dyasli
> ; Stefano Stabellini ;
> George Dunlap ; Ross Lagerwall
> ; Al
On Tue, Dec 17, 2019 at 8:12 AM Alexandru Stefan ISAILA
wrote:
>
> This patch aims to sanitize indexes, potentially guest provided
> values, for altp2m_eptp[] and altp2m_p2m[] arrays.
>
> Signed-off-by: Alexandru Isaila
LGTM, thanks!
Acked-by: Tamas K Lengyel
_
On Tue, Dec 17, 2019 at 01:32:18PM +, Paul Durrant wrote:
> Removing the 'hotplug-status' node in netback_remove() is wrong; the script
> may not have completed. Only remove the node once the watch has fired and
> has been unregistered.
>
> Signed-off-by: Paul Durrant
Acked-by: Wei Liu
___
On Tue, Dec 17, 2019 at 01:32:16PM +, Paul Durrant wrote:
> ...of xenbus.c
>
> This is a cosmetic function re-ordering to reduce churn in a subsequent
> patch. Some style fix-up was done to make checkpatch.pl happier.
>
> No functional change.
>
> Signed-off-by: Paul Durrant
Acked-by: Wei
On Tue, Dec 17, 2019 at 01:32:17PM +, Paul Durrant wrote:
> ...as the comment above the function states.
>
> The switch to Initialising at the start of the function is somewhat bogus
> as the toolstack will have set that initial state anyway. To behave
> correctly, a backend should switch to I
Ok, if its going to be 4 spaces for each file, I can batch convert &
tidy stuff up...
The file I changed had both types, so I went with my own preference :)
If it might be a better approach, I'll sort out the majority of scripts
in that directory - and do no function changes and post a series
Hide the following information that can help identify the running Xen
binary version:
XENVER_extraversion
XENVER_compile_info
XENVER_capabilities
XENVER_changeset
XENVER_commandline
XENVER_build_id
Return a more customer friendly empty string instead of ""
which would be s
On Wed, Dec 18, 2019 at 02:44:51AM +1100, Steven Haigh wrote:
> Ok, if its going to be 4 spaces for each file, I can batch convert & tidy
> stuff up...
>
> The file I changed had both types, so I went with my own preference :)
>
> If it might be a better approach, I'll sort out the majority of sc
Andrew, Tamas thank you very much. I will improve the patch.
December 17, 2019 3:13:42 PM UTC, Andrew Cooper
пишет:
>On 17/12/2019 15:10, Tamas K Lengyel wrote:
>> On Tue, Dec 17, 2019 at 8:08 AM Tamas K Lengyel
>wrote:
>>> On Tue, Dec 17, 2019 at 7:48 AM Andrew Cooper
> wrote:
On 17/12/20
From: SeongJae Park
Granting pages consumes backend system memory. In systems configured
with insufficient spare memory for those pages, it can cause a memory
pressure situation. However, finding the optimal amount of the spare
memory is challenging for large systems having dynamic resource
uti
Granting pages consumes backend system memory. In systems configured
with insufficient spare memory for those pages, it can cause a memory
pressure situation. However, finding the optimal amount of the spare
memory is challenging for large systems having dynamic resource
utilization patterns. Al
From: SeongJae Park
Each `blkif` has a free pages pool for the grant mapping. The size of
the pool starts from zero and is increased on demand while processing
the I/O requests. If current I/O requests handling is finished or 100
milliseconds has passed since last I/O requests handling, it chec
From: SeongJae Park
'reclaim_memory' callback can race with a driver code as this callback
will be called from any memory pressure detected context. To deal with
the case, this commit adds a spinlock in the 'xenbus_device'. Whenever
'reclaim_memory' callback is called, the lock of the device wh
From: SeongJae Park
The 'reclaim_memory()' callback of blkback could race with
'xen_blkbk_probe()' and 'xen_blkbk_remove()'. In the case, incompletely
linked 'backend_info' and 'blkif' might be exposed to the callback, thus
result in bad results including NULL dereference. This commit fixes the
From: SeongJae Park
A few of static variables in blkback have 'xen_blkif_' prefix, though it
is unnecessary for static variables. This commit removes such prefixes.
Reviewed-by: Roger Pau Monné
Signed-off-by: SeongJae Park
---
drivers/block/xen-blkback/blkback.c | 37 +---
From: SeongJae Park
The number of empty lines between functions in the xenbus.c is
inconsistent. This trivial style cleanup commit fixes the file to
consistently place only one empty line.
Acked-by: Roger Pau Monné
Signed-off-by: SeongJae Park
---
drivers/block/xen-blkback/xenbus.c | 7 ++---
On 17.12.19 17:07, SeongJae Park wrote:
From: SeongJae Park
'reclaim_memory' callback can race with a driver code as this callback
will be called from any memory pressure detected context. To deal with
the case, this commit adds a spinlock in the 'xenbus_device'. Whenever
'reclaim_memory' cal
On 17.12.19 17:07, SeongJae Park wrote:
From: SeongJae Park
The 'reclaim_memory()' callback of blkback could race with
'xen_blkbk_probe()' and 'xen_blkbk_remove()'. In the case, incompletely
linked 'backend_info' and 'blkif' might be exposed to the callback, thus
result in bad results includin
On Tue, 17 Dec 2019 09:30:32 +0100 SeongJae Park wrote:
> On Tue, 17 Dec 2019 09:16:47 +0100 "Jürgen Groß" wrote:
>
> > On 17.12.19 08:59, SeongJae Park wrote:
> > > On Tue, 17 Dec 2019 07:23:12 +0100 "Jürgen Groß" wrote:
> > >
> > >> On 16.12.19 20:48, SeongJae Park wrote:
> > >>> On on, 16
On 13.12.2019 20:04, Andrew Cooper wrote:
> Andrew Cooper (6):
> x86/suspend: Clarify and improve the behaviour of do_suspend_lowlevel()
> x86/suspend: Don't bother saving %cr3, %ss or flags
> x86/suspend: Don't save unnecessary GPRs
> x86/suspend: Restore cr4 later during resume
> x86/su
Hi Hongyan,
On 17/12/2019 14:33, Hongyan Xia wrote:
The existing code assumes that the first mfn passed to the boot
allocator is mapped, which creates problems when, e.g., we do not have
a direct map, and may create other bootstrapping problems in the
future. Make it static. The size is kept the
On Tue, 17 Dec 2019 17:13:42 +0100 "Jürgen Groß" wrote:
> On 17.12.19 17:07, SeongJae Park wrote:
> > From: SeongJae Park
> >
> > 'reclaim_memory' callback can race with a driver code as this callback
> > will be called from any memory pressure detected context. To deal with
> > the case, this
From: SeongJae Park
I though it would be better to review separated patches, but seems it
was my mistake. As Juergen asked, merged them again and post here.
Also, dropped Roger's reviewed-by.
Thanks,
SeongJae Park
>8 ---
Subjec
Hi,
On 04/12/2019 09:27, Andre Przywara wrote:
On Tue, 3 Dec 2019 16:52:45 +
Julien Grall wrote:
Hi,
On 03/12/2019 14:38, Andre Przywara wrote:
On Tue, 3 Dec 2019 11:39:58 +
Julien Grall wrote:
Hi,
(+Andre)
Hi,
@Andre, IIRC you originally added the support for sunxi in Xen.
On 17/12/2019 16:17, Jan Beulich wrote:
> On 13.12.2019 20:04, Andrew Cooper wrote:
>> Andrew Cooper (6):
>> x86/suspend: Clarify and improve the behaviour of do_suspend_lowlevel()
>> x86/suspend: Don't bother saving %cr3, %ss or flags
>> x86/suspend: Don't save unnecessary GPRs
>> x86/susp
I'm sorry for the non-threaded reply, but my mail client has
mixed up this mail with another one, so I have nothing to
properly reply to. With one stylistic issue taken care of
(blanks around the binary operator / )
Reviewed-by: Jan Beulich
The change would be easy enough to do while committing, b
On 17.12.2019 17:33, Andrew Cooper wrote:
> On 17/12/2019 16:17, Jan Beulich wrote:
>> On 13.12.2019 20:04, Andrew Cooper wrote:
>>> Andrew Cooper (6):
>>> x86/suspend: Clarify and improve the behaviour of do_suspend_lowlevel()
>>> x86/suspend: Don't bother saving %cr3, %ss or flags
>>> x86/s
flight 144895 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144895/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 144637
build-amd64
Hi,
On 17/12/2019 16:37, Jan Beulich wrote:
I'm sorry for the non-threaded reply, but my mail client has
mixed up this mail with another one, so I have nothing to
properly reply to. With one stylistic issue taken care of
(blanks around the binary operator / )
Reviewed-by: Jan Beulich
The change
On 17.12.2019 16:12, Alexandru Stefan ISAILA wrote:
> --- a/xen/arch/x86/mm/mem_access.c
> +++ b/xen/arch/x86/mm/mem_access.c
> @@ -367,10 +367,11 @@ long p2m_set_mem_access(struct domain *d, gfn_t gfn,
> uint32_t nr,
> if ( altp2m_idx )
> {
> if ( altp2m_idx >= MAX_ALTP2M ||
>
On 17.12.2019 16:12, Alexandru Stefan ISAILA wrote:
> @@ -4711,6 +4712,20 @@ static int do_altp2m_op(
> }
> break;
>
> +case HVMOP_altp2m_set_suppress_ve_multi:
> +if ( a.u.suppress_ve_multi.pad1 ||
> + a.u.suppress_ve_multi.first_error_code ||
> +
On 17.12.19 17:24, SeongJae Park wrote:
On Tue, 17 Dec 2019 17:13:42 +0100 "Jürgen Groß" wrote:
On 17.12.19 17:07, SeongJae Park wrote:
From: SeongJae Park
'reclaim_memory' callback can race with a driver code as this callback
will be called from any memory pressure detected context. To de
> On Mon, 16 Dec 2019, Julien Grall wrote:
> > On 16/12/2019 23:05, Stefano Stabellini wrote:
> > > On Mon, 16 Dec 2019, Julien Grall wrote:
> > > > On 16/12/2019 18:02, Andrei Cherechesu wrote:
> > > > But even with this patch, RAM in DomU is not direct mapped (i.e Guest
> > > > Physical
> > > > A
On Tue, 17 Dec 2019 18:10:19 +0100 "Jürgen Groß" wrote:
> On 17.12.19 17:24, SeongJae Park wrote:
> > On Tue, 17 Dec 2019 17:13:42 +0100 "Jürgen Groß" wrote:
> >
> >> On 17.12.19 17:07, SeongJae Park wrote:
> >>> From: SeongJae Park
> >>>
> >>> 'reclaim_memory' callback can race with a driver
On 12/10/19 3:47 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> Remove the exported global context variable, 'Ctx.' Generally, it is
> better to not export global variables for use through a Go package.
> However, there are some exceptions that can be found in the standard
> library.
>
> Add
On 12/10/19 3:47 PM, Nick Rosbrook wrote:
> From: Nick Rosbrook
>
> A previous commit that removed Context.CheckOpen revealed
> an ineffectual assignent to err in Context.Cpupoolinfo, as
> there is no error return type.
>
> Since it appears that the intent is to return an error here,
> add an er
Hi Andrei,
On 17/12/2019 17:20, Andrei Cherechesu wrote:
On Mon, 16 Dec 2019, Julien Grall wrote:
On 16/12/2019 23:05, Stefano Stabellini wrote:
On Mon, 16 Dec 2019, Julien Grall wrote:
On 16/12/2019 18:02, Andrei Cherechesu wrote:
But even with this patch, RAM in DomU is not direct mapped (i
flight 144898 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144898/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
1 - 100 of 152 matches
Mail list logo