On 27.06.23 19:22, Demi Marie Obenour wrote:
When a grant entry is still in use by the remote domain, Linux must put
it on a deferred list. Normally, this list is very short, because
the PV network and block protocols expect the backend to unmap the grant
first. However, Qubes OS's GUI protocol
On Thu, Jun 29, 2023 at 03:44:04PM -0700, Stefano Stabellini wrote:
> On Thu, 29 Jun 2023, Oleksandr Tyshchenko wrote:
> > On 29.06.23 04:00, Stefano Stabellini wrote:
> > > I think we need to add a second way? It could be anything that can help
> > > us distinguish between a non-grants-capable vir
Fixes: 21e3ef57e040 ("x86: Rename {domctl,sysctl}.cpu_policy.{cpuid,msr}_policy
fields")
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Roger Pau Monné
CC: Wei Liu
v2:
* Fix domctl too.
---
xen/include/public/domctl.h | 6 ++
xen/include/public/sysctl.h | 10 --
2 files c
Hi,
On 07/06/2023 04:02, Stewart Hildebrand wrote:
From: Oleksandr Tyshchenko
The main purpose of this patch is to add a way to register PCI device
(which is behind the IOMMU) using the generic PCI-IOMMU DT bindings [1]
before assigning that device to a domain.
This behaves similarly to the e
On Wed, Jun 28, 2023 at 02:31:39PM +0200, Roger Pau Monné wrote:
> On Fri, Jun 23, 2023 at 03:04:21PM +, osstest service owner wrote:
> > flight 181558 xen-unstable real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/181558/
> >
> > Regressions :-(
> >
> > Tests which did not suc
On Thu, Jun 08, 2023 at 02:59:12PM +0100, Luca Fancellu wrote:
> Commit 56a7aaa16bfe introduced some SVE related code that is protected by
> '#if defined(__aarch64__)', the issue is that this doesn't take into
> consideration when the toolstack is compiled for an arm32 Dom0 running on
> an arm64 pl
On Tue, Jul 04, 2023 at 10:29:09AM +0100, Andrew Cooper wrote:
> Fixes: 21e3ef57e040 ("x86: Rename
> {domctl,sysctl}.cpu_policy.{cpuid,msr}_policy fields")
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
Thanks, Roger.
On Tue, Jul 04, 2023 at 10:37:38AM +0100, Anthony PERARD wrote:
> On Wed, Jun 28, 2023 at 02:31:39PM +0200, Roger Pau Monné wrote:
> > On Fri, Jun 23, 2023 at 03:04:21PM +, osstest service owner wrote:
> > > flight 181558 xen-unstable real [real]
> > > http://logs.test-lab.xenproject.org/osstes
> On 3 Jul 2023, at 21:54, P S wrote:
>
>
>
>> On Jul 3, 2023, at 15:45, Luca Fancellu wrote:
>>
>>
>>
>>> On 3 Jul 2023, at 18:48, Stefano Stabellini wrote:
>>>
On Mon, 3 Jul 2023, Daniel P. Smith wrote:
On 7/1/23 11:13, Luca Fancellu wrote:
>> On 1 Jul 2023, at 08:53, A
flight 181689 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/181689/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-libvirt-vhd 19 guest-start/debian.repeat fail in 181683 pass
in 181689
test-amd64-i386-xl
Change mechanically the parameter names and types of function
declarations to be consistent with the ones used in the corresponding
definitions so as to fix violations of MISRA C:2012 Rule 8.3 ("All
declarations of an object or function shall use the same names and type
qualifiers") and MISRA C:201
Hi Penny,
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or responding to
this email.
From: Wei Chen
On Armv8-A, Xen has a fixed virtual start address (li
On 04.07.23 09:48, Roger Pau Monné wrote:
On Thu, Jun 29, 2023 at 03:44:04PM -0700, Stefano Stabellini wrote:
On Thu, 29 Jun 2023, Oleksandr Tyshchenko wrote:
On 29.06.23 04:00, Stefano Stabellini wrote:
I think we need to add a second way? It could be anything that can help
us distinguish bet
On Wed, Jun 07, 2023 at 11:41:24AM +0200, Jan Beulich wrote:
> On 01.06.2023 15:05, Roger Pau Monne wrote:
> > --- a/xen/arch/x86/boot/head.S
> > +++ b/xen/arch/x86/boot/head.S
> > @@ -329,7 +337,8 @@ __efi64_mb2_start:
> >
> > /*
> > * efi_multiboot2() is called according to S
On Wed, Jun 07, 2023 at 12:10:28PM +0200, Jan Beulich wrote:
> On 01.06.2023 15:05, Roger Pau Monne wrote:
> > @@ -807,7 +830,41 @@ void __init efi_multiboot2(EFI_HANDLE ImageHandle,
> > EFI_SYSTEM_TABLE *SystemTable
> >
> > if ( gop )
> > {
> > -gop_mode = efi_find_gop_mode(go
Hi Penny,
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or responding to
this email.
From: Wei Chen
At the moment, on MMU system, enable_mmu() will retur
Hi Penny,
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or responding to
this email.
This commit wants to introduce a new Kconfig CONFIG_HAS_MMU to guard
M
Hi,
FWIW, I have ran into this issue some time ago too. I run Xen on top of
KVM and then passthrough some of the virtio devices (network one
specifically) into a (PV) guest. So, I hit both cases, the dom0 one and
domU one. As a temporary workaround I needed to disable
CONFIG_XEN_VIRTIO completely
Hi,
On 04/07/2023 12:14, Ayan Kumar Halder wrote:
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please
use proper judgment and caution when opening attachments, clicking
links, or responding to this email.
This commit wants to introduc
On 04/07/2023 11:36, Ayan Kumar Halder wrote:
Hi Penny,
Hi Ayan,
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please
use proper judgment and caution when opening attachments, clicking
links, or responding to this email.
From: We
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or responding to
this email.
From: Wei Chen
There are lots of MMU specific code in head.S. This code will
On 04/07/2023 12:47, Julien Grall wrote:
On 04/07/2023 11:36, Ayan Kumar Halder wrote:
Hi Penny,
Hi Ayan,
Hi Julien,
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please
use proper judgment and caution when opening attachments, c
On 04/07/2023 12:44, Julien Grall wrote:
Hi,
On 04/07/2023 12:14, Ayan Kumar Halder wrote:
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please
use proper judgment and caution when opening attachments, clicking
links, or responding to
On 27.06.2023 19:22, Demi Marie Obenour wrote:
> When a grant entry is still in use by the remote domain, Linux must put
> it on a deferred list. Normally, this list is very short, because
> the PV network and block protocols expect the backend to unmap the grant
> first. However, Qubes OS's GUI
On 04/07/2023 13:02, Ayan Kumar Halder wrote:
On 04/07/2023 12:47, Julien Grall wrote:
On 04/07/2023 11:36, Ayan Kumar Halder wrote:
Hi Penny,
Hi Ayan,
Hi Julien,
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please
use proper
On 28.06.2023 07:38, Penny Zheng wrote:
> On 2023/6/26 14:00, Jan Beulich wrote:
>> On 26.06.2023 05:34, Penny Zheng wrote:
>>> --- a/xen/arch/x86/Kconfig
>>> +++ b/xen/arch/x86/Kconfig
>>> @@ -27,6 +27,7 @@ config X86
>>> select HAS_PDX
>>> select HAS_SCHED_GRANULARITY
>>> select HAS_U
Convert xen/blkback to use blkdev_get_handle_by_dev() and pass the
handle around.
CC: xen-devel@lists.xenproject.org
Signed-off-by: Jan Kara
---
drivers/block/xen-blkback/blkback.c | 4 +--
drivers/block/xen-blkback/common.h | 4 +--
drivers/block/xen-blkback/xenbus.c | 40 +++---
Hello,
this patch series implements the idea of blkdev_get_by_*() calls returning
bdev_handle which is then passed to blkdev_put() [1]. This makes the get
and put calls for bdevs more obviously matching and allows us to propagate
context from get to put without having to modify all the users (agai
Create struct bdev_handle that contains all parameters that need to be
passed to blkdev_put() and provide blkdev_get_handle_* functions that
return this structure instead of plain bdev pointer. This will
eventually allow us to pass one more argument to blkdev_put() without
too much hassle.
CC: Ala
Now that everybody is converted, we can rename blkdev_get_handle_by_*()
and blkdev_handle_put() back to their original names. No functional
change.
Done by Coccinelle patch:
@@
expression dev, mode, holder, hops;
@@
- blkdev_get_handle_by_dev(dev, mode, holder, hops)
+ blkdev_get_by_d
On Tue, Jul 04, 2023 at 02:21:28PM +0200, Jan Kara wrote:
> +struct bdev_handle *blkdev_get_handle_by_dev(dev_t dev, blk_mode_t mode,
> + void *holder, const struct blk_holder_ops *hops)
> +{
> + struct bdev_handle *handle = kmalloc(sizeof(struct bdev_handle),
> +
On Tue 04-07-23 13:43:51, Matthew Wilcox wrote:
> On Tue, Jul 04, 2023 at 02:21:28PM +0200, Jan Kara wrote:
> > +struct bdev_handle *blkdev_get_handle_by_dev(dev_t dev, blk_mode_t mode,
> > + void *holder, const struct blk_holder_ops *hops)
> > +{
> > + struct bdev_handle *handle = kmal
flight 181694 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/181694/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On Wed, Jun 07, 2023 at 12:07:54PM +0200, Jan Beulich wrote:
> On 01.06.2023 15:05, Roger Pau Monne wrote:
> > --- a/docs/misc/xen-command-line.pandoc
> > +++ b/docs/misc/xen-command-line.pandoc
> > @@ -2628,6 +2628,9 @@ with the specified width, height and depth.
> > `ask` option. (N.B menu mode
On 28.06.2023 13:32, Andrew Cooper wrote:
> Hello,
>
> This wasn't a formal discussion point at XenSummit, but Oleksii pointed
> out that it was still a problem, hence this thread.
>
> As we take on more architectures, it becomes more and more important for
> things to be handled in a mostly-comm
On 29.06.2023 21:25, Stefano Stabellini wrote:
> On Thu, 29 Jun 2023, Federico Serafini wrote:
>> Change parameter names of nestedhvm_vcpu_iomap_get() definition to
>> those used in the function declaration in order to:
>> 1) improve readability;
I see this was committed already, so ftaod no reque
On 29.06.2023 21:31, Stefano Stabellini wrote:
> On Thu, 29 Jun 2023, Federico Serafini wrote:
>> Change parameter name from 's' to 'state' in function definitions in
>> order to:
>> 1) keep consistency with the parameter names used in the corresponding
>>declarations;
>> 2) keep consistency wi
On 29.06.2023 17:55, Federico Serafini wrote:
> --- a/xen/arch/x86/cpu/mcheck/mce.h
> +++ b/xen/arch/x86/cpu/mcheck/mce.h
> @@ -44,7 +44,7 @@ extern uint8_t cmci_apic_vector;
> extern bool lmce_support;
>
> /* Init functions */
> -enum mcheck_type amd_mcheck_init(struct cpuinfo_x86 *c);
> +enum
On 7/4/23 05:21, Jan Kara wrote:
+struct bdev_handle {
+ struct block_device *bdev;
+ void *holder;
+};
Please explain in the patch description why a holder pointer is
introduced in struct bdev_handle and how it relates to the bd_holder
pointer in struct block_device. Is one of th
Hi Julien,
> On 29 Jun 2023, at 22:11, Julien Grall wrote:
>
> From: Julien Grall
>
> At the moment, we are mapping the size of the reserved area for Xen
> (i.e. 2MB) even if the binary is smaller. We don't exactly know what's
> after Xen, so it is not a good idea to map more than necessary fo
Hi Julien,
> On 29 Jun 2023, at 22:11, Julien Grall wrote:
>
> From: Julien Grall
>
> At the moment, we are mapping the size of the reserved area for Xen
> (i.e. 2MB) even if the binary is smaller. We don't exactly know what's
> after Xen, so it is not a good idea to map more than necessary fo
Hi Julien,
> On 29 Jun 2023, at 22:11, Julien Grall wrote:
>
> From: Julien Grall
>
> UBSAN has been enabled a few years ago on x86 but was never
> enabled on Arm because the final binary is bigger than 2MB (
> the maximum we can currently handled).
>
> With the recent rework, it is now possi
On 26/06/2023 04:33, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or responding to
this email.
So sorry for the long long wait before v3 serie, since I got sidetracked to
a n
> On 29 Jun 2023, at 22:11, Julien Grall wrote:
>
> From: Julien Grall
>
> At the moment, the maximum size of Xen binary we can support is 2MB.
> This is what we reserved in the virtual address but also what all
> the code in Xen relies on as we only allocate one L3 page-table.
>
> When fea
On 26.06.2023 17:37, Nicola Vetrini wrote:
> Redefine BUILD_BUG_ON_ZERO to avoid using a compiler extension
> that gives an acceptable semantics to C99 undefined behavior 58
> ("A structure or union is defined as containing no named members
> (6.7.2.1)").
>
> The first definition includes an addit
On 30.06.2023 17:20, Andrew Cooper wrote:
> It was previously noted that CALL/BUG is a weird combination, but there is
> good reason to use this pattern.
>
> Introduce an explicit tailcall macro make it clearer in context.
>
> No functional change.
>
> Reported-by: Jan Beulich
Did I? Must have
On 27.06.2023 09:56, Andrew Cooper wrote:
> We're about to rearrange the common and arch types.h split. While most
> users already include , a few do not and some files fail to
> compile as a result.
>
> Almost all logic is going to have types very early in the include chain. Drop
> the include
Hi Julien,
> On 29 Jun 2023, at 23:01, Julien Grall wrote:
>
> From: Julien Grall
>
> Both the stub and the x86 prototypes for replace_grant_host_mapping()
> and create_grant_host_mapping() will define the first parameter (and
> third for the former) as uint64_t. Yet Arm will define it as
> 'u
On 28.06.2023 16:54, Andrew Cooper wrote:
> Xen uses the stdint types. Rearrange the types headers to define the
> compatibility __{u,s}$N types in terms of the stdint types, not the other way
> around.
>
> All supported compilers on architectures other than x86 support the stdint
> __*_TYPE__ ma
flight 181690 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/181690/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-vhd broken
test-amd64-amd64-xl-vhd 5 host-insta
Hi Julien,
> On 19 Jun 2023, at 19:01, Julien Grall wrote:
>
> From: Julien Grall
>
> On older version of the Arm Arm (ARM DDI 0487E.a, B2-125) there were
> the following paragraph:
>
> "DMB and DSB instructions affect reads and writes to the memory system
> generated by Load/Store instructio
On Tue, Jul 04, 2023 at 01:43:46PM +0200, Marek Marczykowski-Górecki wrote:
> Hi,
>
> FWIW, I have ran into this issue some time ago too. I run Xen on top of
> KVM and then passthrough some of the virtio devices (network one
> specifically) into a (PV) guest. So, I hit both cases, the dom0 one and
On 04.07.2023 12:23, Federico Serafini wrote:
> Change mechanically the parameter names and types of function
> declarations to be consistent with the ones used in the corresponding
> definitions so as to fix violations of MISRA C:2012 Rule 8.3 ("All
> declarations of an object or function shall us
Hi Julien,
> On 19 Jun 2023, at 19:01, Julien Grall wrote:
>
> From: Julien Grall
>
> Per the Arm Arm (ARM DDI 0406C.d A3.8.3):
>
> "The DMB and DSB memory barriers affect reads and writes to the memory
> system generated by load/store instructions and data or unified cache
> maintenance oper
Hi Julien,
> On 19 Jun 2023, at 19:01, Julien Grall wrote:
>
> From: Julien Grall
>
> Per the Arm Arm (ARM DDI 0406C.d A3.8.3):
>
> "The DMB and DSB memory barriers affect reads and writes to the memory
> system generated by load/store instructions and data or unified cache
> maintenance oper
On 04/07/23 16:24, Jan Beulich wrote:
On 26.06.2023 17:37, Nicola Vetrini wrote:
Redefine BUILD_BUG_ON_ZERO to avoid using a compiler extension
that gives an acceptable semantics to C99 undefined behavior 58
("A structure or union is defined as containing no named members
(6.7.2.1)").
The fi
Hi Julien,
> On 19 Jun 2023, at 19:01, Julien Grall wrote:
>
> From: Julien Grall
>
> Per the Arm Arm, (Armv7 DDI406C.d A3.8.3 and Armv8 DDI 0487J.a B2.3.12):
>
> "The DMB and DSB memory barriers affect reads and writes to the memory
> system generated by load/store instructions and data or u
Hi Julien,
> On 19 Jun 2023, at 19:01, Julien Grall wrote:
>
> From: Julien Grall
>
> Per the Arm Arm, (Armv7 DDI406C.d A3.8.3 and Armv8 DDI 0487J.a B2.3.12):
>
> "The DMB and DSB memory barriers affect reads and writes to the memory
> system generated by load/store instructions and data or u
On 04.07.2023 16:53, Nicola Vetrini wrote:
>
>
> On 04/07/23 16:24, Jan Beulich wrote:
>> On 26.06.2023 17:37, Nicola Vetrini wrote:
>>> Redefine BUILD_BUG_ON_ZERO to avoid using a compiler extension
>>> that gives an acceptable semantics to C99 undefined behavior 58
>>> ("A structure or union is
Hi Julien,
> On 19 Jun 2023, at 19:01, Julien Grall wrote:
>
> From: Julien Grall
>
> The implementation of write_pte() is pretty much the same on arm32
> and arm64. So it would be good to consolidate it as this would help
> to clarify the requirements when using the helper.
>
> Take the oppo
Hi Julien,
> On 19 Jun 2023, at 19:01, Julien Grall wrote:
>
> From: Julien Grall
>
> At the moment, the temporary mapping is only used when the virtual
> runtime region of Xen is clashing with the physical region.
>
> In follow-up patches, we will rework how secondary CPU bring-up works
> an
Hi Penny,
On 26/06/2023 04:34, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or responding to
this email.
In function init_staticmem_pages, we need the access to static memory
flight 181691 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/181691/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 181667
test-armhf-armhf-libvirt-qcow2 15 saveres
On 30.06.2023 16:50, GitLab wrote:
>
>
> Pipeline #917215286 has failed!
>
> Project: xen ( https://gitlab.com/xen-project/xen )
> Branch: staging ( https://gitlab.com/xen-project/xen/-/commits/staging )
>
> Commit: 9dd3caf1 (
> https://gitlab.com/xen-project/xen/-/commit/9dd3caf12f52b859947c2
On 28.06.2023 11:46, Roger Pau Monné wrote:
> On Mon, May 08, 2023 at 04:46:18PM +, Olaf Hering wrote:
>> clang complains about the signed type:
>>
>> implicit truncation from 'int' to a one-bit wide bit-field changes value
>> from 1 to -1 [-Wsingle-bit-bitfield-constant-conversion]
>>
>> The
On 04/07/2023 4:39 pm, Jan Beulich wrote:
> On 30.06.2023 16:50, GitLab wrote:
>>
>> Pipeline #917215286 has failed!
>>
>> Project: xen ( https://gitlab.com/xen-project/xen )
>> Branch: staging ( https://gitlab.com/xen-project/xen/-/commits/staging )
>>
>> Commit: 9dd3caf1 (
>> https://gitlab.com/
On 29.06.2023 16:52, Luca Fancellu wrote:
>
>
>> On 29 Jun 2023, at 11:06, Nicola Vetrini wrote:
>>
>> In the file `xen/drivers/passthrough/arm/smmu-v3.c' there are a few
>> occurrences
>
> here you use a different character to enclose the file path (` vs ‘) may I
> suggest to
> use only (‘)?
On Tue, Jul 04, 2023 at 05:42:33PM +0200, Jan Beulich wrote:
> On 28.06.2023 11:46, Roger Pau Monné wrote:
> > On Mon, May 08, 2023 at 04:46:18PM +, Olaf Hering wrote:
> >> clang complains about the signed type:
> >>
> >> implicit truncation from 'int' to a one-bit wide bit-field changes value
On 29.06.2023 21:20, Stefano Stabellini wrote:
> On Thu, 29 Jun 2023, Luca Fancellu wrote:
>>> On 29 Jun 2023, at 11:06, Nicola Vetrini wrote:
>>> --- a/xen/common/xmalloc_tlsf.c
>>> +++ b/xen/common/xmalloc_tlsf.c
>>> @@ -140,9 +140,7 @@ static inline void MAPPING_SEARCH(unsigned long *r, int
>>
On 04.07.2023 17:55, Roger Pau Monné wrote:
> On Tue, Jul 04, 2023 at 05:42:33PM +0200, Jan Beulich wrote:
>> On 28.06.2023 11:46, Roger Pau Monné wrote:
>>> On Mon, May 08, 2023 at 04:46:18PM +, Olaf Hering wrote:
clang complains about the signed type:
implicit truncation from '
On Tue, Jul 04, 2023 at 06:04:36PM +0200, Jan Beulich wrote:
> On 04.07.2023 17:55, Roger Pau Monné wrote:
> > On Tue, Jul 04, 2023 at 05:42:33PM +0200, Jan Beulich wrote:
> >> On 28.06.2023 11:46, Roger Pau Monné wrote:
> >>> On Mon, May 08, 2023 at 04:46:18PM +, Olaf Hering wrote:
> clan
On Tue, Jul 04, 2023 at 07:06:26AM -0700, Bart Van Assche wrote:
> On 7/4/23 05:21, Jan Kara wrote:
> > +struct bdev_handle {
> > + struct block_device *bdev;
> > + void *holder;
> > +};
>
> Please explain in the patch description why a holder pointer is introduced
> in struct bdev_handle and
On Tue, Jul 04, 2023 at 02:07:47PM +0200, Jan Beulich wrote:
> On 27.06.2023 19:22, Demi Marie Obenour wrote:
> > When a grant entry is still in use by the remote domain, Linux must put
> > it on a deferred list. Normally, this list is very short, because
> > the PV network and block protocols exp
On 04.07.2023 18:10, Roger Pau Monné wrote:
> On Tue, Jul 04, 2023 at 06:04:36PM +0200, Jan Beulich wrote:
>> On 04.07.2023 17:55, Roger Pau Monné wrote:
>>> On Tue, Jul 04, 2023 at 05:42:33PM +0200, Jan Beulich wrote:
Plus is the mentioned
"potential ABI change" safe to take on a stable
On Tue, Jul 04, 2023 at 02:21:28PM +0200, Jan Kara wrote:
> +struct bdev_handle *blkdev_get_handle_by_dev(dev_t dev, blk_mode_t mode,
> + void *holder, const struct blk_holder_ops *hops)
> +{
> + struct bdev_handle *handle = kmalloc(sizeof(struct bdev_handle),
> +
On 04/07/2023 3:29 pm, Jan Beulich wrote:
> On 30.06.2023 17:20, Andrew Cooper wrote:
>> It was previously noted that CALL/BUG is a weird combination, but there is
>> good reason to use this pattern.
>>
>> Introduce an explicit tailcall macro make it clearer in context.
>>
>> No functional change.
On 04/07/2023 3:38 pm, Jan Beulich wrote:
> On 28.06.2023 16:54, Andrew Cooper wrote:
>> Xen uses the stdint types. Rearrange the types headers to define the
>> compatibility __{u,s}$N types in terms of the stdint types, not the other way
>> around.
>>
>> All supported compilers on architectures o
On Tue, Jul 4, 2023 at 5:49 PM Roger Pau Monné wrote:
Hello all.
[sorry for the possible format issues]
On Tue, Jul 04, 2023 at 01:43:46PM +0200, Marek Marczykowski-Górecki wrote:
> > Hi,
> >
> > FWIW, I have ran into this issue some time ago too. I run Xen on top of
> > KVM and then passthrou
From: Anthony PERARD
Commit 189829399070 ("xen-block: Use specific blockdev driver")
introduced a new error path, without taking care of allocated
resources.
So only allocate the qdicts after the error check, and free both
`filename` and `driver` when we are about to return and thus taking
care
On 30/06/2023 12:37 pm, George Dunlap wrote:
> The credit scheduler tries as hard as it can to ensure that it always
> runs scheduling units with positive credit (PRI_TS_UNDER) before
> running those with negative credit (PRI_TS_OVER). If the next
> runnable scheduling unit is of priority OVER, it
Hi Penny,
Most of these are specific to ARM_64, thus we can add "#ifdef
CONFIG_ARM_64" as follows :-
On 26/06/2023 04:34, Penny Zheng wrote:
CAUTION: This message has originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or respo
On Tue, 4 Jul 2023 at 18:19, Anthony PERARD wrote:
>
> From: Anthony PERARD
>
> Commit 189829399070 ("xen-block: Use specific blockdev driver")
> introduced a new error path, without taking care of allocated
> resources.
>
> So only allocate the qdicts after the error check, and free both
> `file
Hi Bertrand,
On 04/07/2023 15:35, Bertrand Marquis wrote:
On 29 Jun 2023, at 23:01, Julien Grall wrote:
From: Julien Grall
Both the stub and the x86 prototypes for replace_grant_host_mapping()
and create_grant_host_mapping() will define the first parameter (and
third for the former) as uint6
Hi Michal,
On 30/06/2023 07:50, Michal Orzel wrote:
On 29/06/2023 22:11, Julien Grall wrote:
From: Julien Grall
At the moment, we are mapping the size of the reserved area for Xen
(i.e. 2MB) even if the binary is smaller. We don't exactly know what's
after Xen, so it is not a good idea to
Hi Bertrand,
On 04/07/2023 15:12, Bertrand Marquis wrote:
On 29 Jun 2023, at 22:11, Julien Grall wrote:
From: Julien Grall
At the moment, we are mapping the size of the reserved area for Xen
(i.e. 2MB) even if the binary is smaller. We don't exactly know what's
after Xen, so it is not a good
Hi,
On 30/06/2023 07:56, Michal Orzel wrote:
On 29/06/2023 22:11, Julien Grall wrote:
From: Julien Grall
At the moment, the maximum size of Xen binary we can support is 2MB.
This is what we reserved in the virtual address but also what all
the code in Xen relies on as we only allocate one
Hi Michal,
On 30/06/2023 07:58, Michal Orzel wrote:
On 29/06/2023 22:11, Julien Grall wrote:
From: Julien Grall
UBSAN has been enabled a few years ago on x86 but was never
enabled on Arm because the final binary is bigger than 2MB (
the maximum we can currently handled).
With the recent
Hi all,
On 29/06/2023 21:11, Julien Grall wrote:
From: Julien Grall
Hi all,
At the moment, we are not able to enable UBSAN on Arm because the
final binary will be over the maximum size of Xen we currently support
(i.e. 2MB).
This patch series aim to lift the restrictions and also
enable UBSA
Hi,
On 04/07/2023 16:50, Andrew Cooper wrote:
On 04/07/2023 4:39 pm, Jan Beulich wrote:
On 30.06.2023 16:50, GitLab wrote:
Pipeline #917215286 has failed!
Project: xen ( https://gitlab.com/xen-project/xen )
Branch: staging ( https://gitlab.com/xen-project/xen/-/commits/staging )
Commit: 9dd
Hi Bertrand,
On 04/07/2023 16:06, Bertrand Marquis wrote:
On 19 Jun 2023, at 19:01, Julien Grall wrote:
From: Julien Grall
The implementation of write_pte() is pretty much the same on arm32
and arm64. So it would be good to consolidate it as this would help
to clarify the requirements when u
Hi,
On 19/06/2023 18:01, Julien Grall wrote:
From: Julien Grall
Hi all,
The main goal of this series is to add some missing ISBs after update
the PTEs.
The last patch is re-ingesting a patch that was reverted
due to a boot failure on the Arndale. This has now been fixed by patch
#2.
Cheers,
Hi,
Replying here because there is no cover letter (in the future please add
one if you have more than two patches bundled together).
On 04/07/2023 10:42, Anthony PERARD wrote:
On Thu, Jun 08, 2023 at 02:59:12PM +0100, Luca Fancellu wrote:
Commit 56a7aaa16bfe introduced some SVE related code
Hi,
On 30/06/2023 00:03, Stefano Stabellini wrote:
On Fri, 30 Jun 2023, Henry Wang wrote:
With UBSAN on some arm64 platforms, e.g. FVP_Base_RevC-2xAEMvA, the
following splat will be printed while Dom0 is booting:
```
(XEN) ==
(XEN)
Hi Penny,
On 26/06/2023 04:33, Penny Zheng wrote:
Wei Chen (11):
xen/arm: remove xen_phys_start and xenheap_phys_end from config.h
xen/arm: make ARM_EFI selectable for Arm64
I have committed these two patches.
Cheers,
--
Julien Grall
Hi,
On 26/06/2023 04:33, Penny Zheng wrote:
From: Wei Chen
On Armv8-A, Xen has a fixed virtual start address (link address
too) for all Armv8-A platforms. In an MMU based system, Xen can
map its loaded address to this virtual start address. So, on
Armv8-A platforms, the Xen start address does
Hi Penny,
On 26/06/2023 04:33, Penny Zheng wrote:
From: Wei Chen
Only the first 4KB of Xen image will be mapped as identity
(PA == VA). At the moment, Xen guarantees this by having
everything that needs to be used in the identity mapping
in .text.header section of head.S, and the size will be
Hi Penny,
On 26/06/2023 04:34, Penny Zheng wrote:
From: Wei Chen
There is no VMSA support on MPU systems, so we can not map early
UART to FIXMAP_CONSOLE. In stead, we can use PA == VA for early
UART on MPU systems.
Signed-off-by: Wei Chen
Signed-off-by: Penny Zheng
Is this change necessar
From: Oleksandr Tyshchenko
With enabling both CONFIG_UBSAN and CONFIG_IPMMU_VMSA I have got the following
splat when an IOMMU driver tried to setup page tables:
(XEN) ipmmu: /soc/iommu@e67b: d1: Set IPMMU context 1 (pgd 0x77fe9)
(XEN)
Hi Roger,
Roger Pau Monné writes:
> On Thu, Jun 22, 2023 at 09:17:36PM +, Volodymyr Babchuk wrote:
>>
>> Hi Roger,
>>
>> Roger Pau Monné writes:
>>
>> > On Wed, Jun 21, 2023 at 10:07:20PM +, Volodymyr Babchuk wrote:
>> >>
>> >> Hi Roger,
>> >>
>> >> Roger Pau Monné writes:
>> >>
Hi Penny,
On 26/06/2023 04:33, Penny Zheng wrote:
From: Wei Chen
At the moment, on MMU system, enable_mmu() will return to an
address in the 1:1 mapping, then each path is responsible to
switch to virtual runtime mapping. Then remove_identity_mapping()
is called to remove all 1:1 mapping.
Th
1 - 100 of 118 matches
Mail list logo