Add config option HVM_VIRIDIAN that covers viridian code within HVM.
Calls to viridian functions guarded by is_viridian_domain() and related macros.
Having this option may be beneficial by reducing code footprint for systems
that are not using Hyper-V.
Signed-off-by: Sergiy Kibrik
---
xen/arch/x
On 15.03.2025 02:00, dm...@proton.me wrote:
> Rename NR_ISAIRQS to NR_ISA_IRQS to enhance readability.
>
> No functional changes.
Requested-by: Andrew Cooper
> Signed-off-by: Denis Mukhin
Acked-by: Jan Beulich
On 16/03/2025 20:24, Luca Fancellu wrote:
>
>
> From: Penny Zheng
>
> ARM MPU system doesn't need to use paging memory pool, as MPU memory
> mapping table at most takes only one 4KB page, which is enough to
> manage the maximum 255 MPU memory regions, for all EL2 stage 1
> translation and EL
On 17.03.2025 08:19, Sergiy Kibrik wrote:
> --- a/xen/arch/x86/Kconfig
> +++ b/xen/arch/x86/Kconfig
> @@ -348,6 +348,11 @@ config HYPERV_GUEST
>
> endif
>
> +config HVM_VIRIDIAN
> + bool "Viridian enlightenments support" if EXPERT
> + depends on HVM
> + default y
Imo the prompt wa
From: TangDongxing
Follow the advice in Documentation/filesystems/sysfs.rst:
show() should only use sysfs_emit() or sysfs_emit_at() when formatting
the value to be returned to user space.
Signed-off-by: TangDongxing
---
drivers/xen/xen-pciback/pci_stub.c | 2 +-
1 file changed, 1 insertion(+),
> On 17 Mar 2025, at 09:51, Orzel, Michal wrote:
>
>
>
> On 17/03/2025 10:33, Luca Fancellu wrote:
>>
>>
>> Hi Michal,
>>
>>> On 17 Mar 2025, at 09:29, Orzel, Michal wrote:
>>>
>>>
>>>
>>> On 16/03/2025 20:24, Luca Fancellu wrote:
Introduce frame_table in order to prov
On 14.03.2025 19:33, Andrew Cooper wrote:
> It is only the hardware task switching mechanism which cares about a TSS being
> at least 0x67 bytes long.
I/O bitmap accesses are where this particular limit comes into play. For
32-bit task switching a slightly shorter one would still do, I think?
>
On 06.03.2025 23:03, Jason Andryuk wrote:
> This is useful for a combined hardware/xenstore domain that will run
> init-dom0less and xenstored. init-dom0less calls xc_hvm_param_get() to
> retrieve the xenstore event channel and pfn to configure xenstore for a
> guest. With a hypervisor-allocated
On 14.03.2025 14:34, Mykyta Poturai wrote:
> From: Oleksandr Tyshchenko
>
> The main purpose of this patch is to add a way to register PCI device
> (which is behind the IOMMU) using the generic PCI-IOMMU DT bindings [1]
> before assigning that device to a domain.
>
> This behaves similarly to th
On 06.03.2025 23:03, Jason Andryuk wrote:
> Running xl queries XENVER_commandline and XENVER_build_id. The hardware
> domain should have access to the command line.
And that's because of?
> The hardware domain is
> at least semi-trusted - just allow it access to all the xen_version
> info.
I'm
On 16.03.2025 11:08, Andrii Sultanov wrote:
> Following a similar change to amd_iommu struct, make two more structs
> take pci_sbdf_t directly instead of seg and bdf separately. This lets us
> drop several conversions from the latter to the former and simplifies
> several comparisons and assignment
On 2025-03-17 10:28, Jan Beulich wrote:
On 06.03.2025 23:03, Jason Andryuk wrote:
Allow hwdom all perms, except XSM_PRIV, and except commands where the
target is the control domain. This protects the control domain from
hwdom while allowing the hardware domain to serve as the backend and
device
On 14/3/25 18:31, Pierrick Bouvier wrote:
Will allow to make system/memory.c common later.
Reviewed-by: Richard Henderson
Signed-off-by: Pierrick Bouvier
---
include/exec/memory.h | 16
1 file changed, 4 insertions(+), 12 deletions(-)
diff --git a/include/exec/memory.h b/i
On 17.03.2025 14:55, Alejandro Vallejo wrote:
> On Mon, 17 Mar 2025, 09:29 Jan Beulich, wrote:
>> On 17.03.2025 10:19, Alejandro Vallejo wrote:
>>> On Mon, 17 Mar 2025, 07:19 Sergiy Kibrik, wrote:
--- a/xen/arch/x86/Kconfig
+++ b/xen/arch/x86/Kconfig
@@ -348,6 +348,11 @@ config HYP
On 17/03/2025 1:21 pm, Choi, Anderson wrote:
> Jürgen,
>
>> On 17.03.25 06:07, Choi, Anderson wrote:
>>> I'd like to report xen panic when shutting down an ARINC653 domain
>>> with the following setup. Note that this is only observed when
>>> CONFIG_DEBUG is enabled.
>>>
>>> [Test environment]
>>
On 11.03.2025 17:19, Oleksii Kurochko wrote:
> --- /dev/null
> +++ b/xen/arch/riscv/time.c
> @@ -0,0 +1,38 @@
> +#include
> +#include
> +#include
> +#include
> +
> +unsigned long __ro_after_init cpu_khz; /* CPU clock frequency in kHz. */
> +unsigned long __read_mostly boot_count;
Why not also
+xen-devel (sent it on private by mistake)
On Mon, 17 Mar 2025, 09:29 Jan Beulich, wrote:
> On 17.03.2025 10:19, Alejandro Vallejo wrote:
> > Hi,
> >
> > I'm surprised this isn't already possible. Neat!
> >
> > On Mon, 17 Mar 2025, 07:19 Sergiy Kibrik,
> wrote:
> >
> >> Add config option HVM_VI
Philippe Mathieu-Daudé writes:
> Hi,
>
> On 14/3/25 19:39, Pierrick Bouvier wrote:
>> On 3/14/25 11:34, Anthony PERARD wrote:
>>> On Fri, Mar 14, 2025 at 10:33:08AM -0700, Pierrick Bouvier wrote:
Hi,
one patch is missing review:
[PATCH v5 12/17] hw/xen: add stubs for various f
On 11.03.2025 17:19, Oleksii Kurochko wrote:
> --- a/xen/arch/riscv/setup.c
> +++ b/xen/arch/riscv/setup.c
> @@ -16,6 +16,7 @@
> #include
> #include
> #include
> +#include
> #include
> #include
> #include
> @@ -128,6 +129,8 @@ void __init noreturn start_xen(unsigned long bootcpu_id,
>
On 3/17/25 09:23, Philippe Mathieu-Daudé wrote:
On 17/3/25 17:22, Philippe Mathieu-Daudé wrote:
On 17/3/25 17:07, Pierrick Bouvier wrote:
On 3/17/25 08:50, Philippe Mathieu-Daudé wrote:
On 14/3/25 18:31, Pierrick Bouvier wrote:
Reviewed-by: Richard Henderson
Signed-off-by: Pierrick Bouvier
On 2025-03-17 10:18, Jan Beulich wrote:
On 06.03.2025 23:03, Jason Andryuk wrote:
This is useful for a combined hardware/xenstore domain that will run
init-dom0less and xenstored. init-dom0less calls xc_hvm_param_get() to
retrieve the xenstore event channel and pfn to configure xenstore for a
g
On 17/03/2025 6:48 pm, Andrea Bastoni wrote:
> Hi,
>
> In the last months we have been working with Stefano's team in AMD at tools to
> facilitate the analysis of "anonymous" memory allocations performed at
> "runtime"
> from the shared Xen heap.
>
> - Anonymous here means: allocations that insist
Stack protector is meant to be enabled on all architectures, but
currently it is tested (and enabled) only on ARM, so mention it in ARM
section.
Signed-off-by: Volodymyr Babchuk
Acked-by: Oleksii Kurochko
---
Changes in v7:
- Moved the change to v4.21
- Added Oleksii's acked-by tag
Changes
Both GCC and Clang support -fstack-protector feature, which add stack
canaries to functions where stack corruption is possible. This patch
makes general preparations to enable this feature on different
supported architectures:
- Added CONFIG_HAS_STACK_PROTECTOR option so each architecture
can
On Mon, 17 Mar 2025, gragst.li...@gmail.com wrote:
> From: Grygorii Strashko
>
> Add DOMU_VCPU_HARD_AFFINITY[number,vcpu] configuration file string option
> specifying the hard affinity configuration for the VM vCPU(vcpu) in DT.
>
> The format is a comma-separated list of pCPUs or ranges of pCPU
Both GCC and Clang support -fstack-protector feature, which add stack
canaries to functions where stack corruption is possible. This series
makes possible to use this feature in Xen. I tested this on ARM64 and
it is working as intended. Tested both with GCC and Clang. Also tested
with "-fstack-prot
On 3/14/25 7:06 PM, Andrew Morton wrote:
> On Fri, 14 Mar 2025 15:37:54 -0600 Nico Pache wrote:
>
>> Add NR_BALLOON_PAGES counter to track memory used by balloon drivers and
>> expose it through /proc/meminfo and other memory reporting interfaces.
>>
>> ...
>>
>> --- a/fs/proc/meminfo.c
>> +++
Only system/physmem.c and system/memory.c use those functions, so we can
move then to internal header.
Reviewed-by: Richard Henderson
Signed-off-by: Pierrick Bouvier
---
include/exec/memory-internal.h | 19 +++
include/exec/memory.h | 18 --
2 files chan
On Mon, 17 Mar 2025, Roger Pau Monne wrote:
> Such timestamps can still be disabled from the Web UI using a tick box.
>
> Signed-off-by: Roger Pau Monné
Acked-by: Stefano Stabellini
> ---
> .cirrus.yml | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/.cirrus.yml b/.cirrus.yml
> index
On Mon, 17 Mar 2025, Roger Pau Monne wrote:
> Signed-off-by: Roger Pau Monné
Acked-by: Stefano Stabellini
> ---
> .cirrus.yml | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/.cirrus.yml b/.cirrus.yml
> index aa195ba370ac..ce7588b7b6b1 100644
> --- a/.cirrus.yml
> +++
On 17.03.2025 18:38, Roger Pau Monné wrote:
> On Mon, Mar 17, 2025 at 05:11:56PM +0100, Jan Beulich wrote:
>> On 17.03.2025 16:56, Roger Pau Monné wrote:
>>> On Sat, Mar 15, 2025 at 12:02:50AM +, Andrew Cooper wrote:
On 14/03/2025 11:53 pm, Marek Marczykowski-Górecki wrote:
> On Fri, M
Enable previously added CONFIG_STACK_PROTECTOR feature for ARM
platform. Initialize stack protector magic value very early, at the
very beginning of start_xen() function.
We want to do this early because prior to that
boot_stack_chk_guard_setup() call, default stack protector guard value
is used.
xen panic is observed with the following configuration.
1. Debug xen build (CONFIG_DEBUG=y)
2. dom1 of an ARINC653 domain
3. shutdown dom1 with xl command
$ xl shutdown
(XEN)
(XEN) Panic on CPU 2:
(XEN) Assertion '!in_irq() && (local_irq_is_enabled() ||
A privileged domain can issue XEN_DOMCTL_vm_event_op with
op->domain == DOMID_INVALID. In this case vm_event_domctl()
function will get NULL as the first parameter and this will
cause hypervisor panic, as it tries to derefer this pointer.
Fix the issue by checking if valid domain is passed in.
Si
Hi Tamas,
Tamas K Lengyel writes:
> On Mon, Mar 17, 2025 at 7:08 PM Volodymyr Babchuk
> wrote:
>>
>> A privileged domain can issue XEN_DOMCTL_vm_event_op with
>> op->domain == DOMID_INVALID. In this case vm_event_domctl()
>> function will get NULL as the first parameter and this will
>> cause
On Mon, 17 Mar 2025, Jason Andryuk wrote:
> On 2025-03-17 10:22, Jan Beulich wrote:
> > On 06.03.2025 23:03, Jason Andryuk wrote:
> > > --- a/xen/include/xsm/dummy.h
> > > +++ b/xen/include/xsm/dummy.h
> > > @@ -95,7 +95,11 @@ static always_inline int xsm_default_action(
> > > return
On Mon, 17 Mar 2025, Roger Pau Monne wrote:
> Instead use env to find the location of expect.
>
> Additionally do not use the -f flag, as it's only meaningful when passing
> arguments on the command line, which we never do for console.exp. From the
> expect 5.45.4 man page:
>
> > The -f flag pre
On Mon, 17 Mar 2025, Roger Pau Monne wrote:
> In preparation for using the XTF selftests to smoke test the FreeBSD based
> Xen builds.
>
> Signed-off-by: Roger Pau Monné
> ---
> I've used the current version of FreeBSD to build XTF, but it might be
> safer to use the latest production (release) v
On 17/03/2025 11:08 pm, Volodymyr Babchuk wrote:
> A privileged domain can issue XEN_DOMCTL_vm_event_op with
> op->domain == DOMID_INVALID. In this case vm_event_domctl()
> function will get NULL as the first parameter and this will
> cause hypervisor panic, as it tries to derefer this pointer.
>
>
The define HYPERVISOR_VIRT_START is required by the common code,
even if MPU system doesn't use virtual memory, define it in
mpu/layout.h in order to reuse existing code.
Disable a check in the linker script for arm for !MMU systems.
Signed-off-by: Luca Fancellu
Reviewed-by: Michal Orzel
---
v3
A privileged domain can issue XEN_DOMCTL_vm_event_op with
op->domain == DOMID_INVALID. In this case vm_event_domctl()
function will get NULL as the first parameter and this will
cause hypervisor panic, as it tries to derefer this pointer.
Fix the issue by checking if valid domain is passed in.
Fi
On Mon, 17 Mar 2025, Roger Pau Monne wrote:
> Move the current logic to use the matrix keyword to generate a task for
> each version of FreeBSD we want to build Xen on. The matrix keyword
> however cannot be used in YAML aliases, so it needs to be explicitly used
> inside of each task, which creat
On Mon, 17 Mar 2025, Roger Pau Monne wrote:
> In preparation for adding some smoke tests that will consume those outputs.
>
> Signed-off-by: Roger Pau Monné
Acked-by: Stefano Stabellini
On Mon, 17 Mar 2025, Roger Pau Monne wrote:
> Introduce a basic set of smoke tests using the XTF selftest image, and run
> them on QEMU. Use the matrix keyword to create a different task for each
> XTF flavor on each FreeBSD build.
>
> Signed-off-by: Roger Pau Monné
> ---
> I've used the current
On Mon, 17 Mar 2025, Grygorii Strashko wrote:
> Add debug DBG_FDT_PRINT_CHOSEN config file option which adds
> print of DT "chosen" node at the end of generated U-boot script.
>
> This is useful for debug and development purposes.
>
> Example:
> ...
> setenv fdt_high 0x
> fd
On Mon, 17 Mar 2025, Roger Pau Monne wrote:
> In case the build fails or gets stuck, store the Kconfig file ahead of
> starting the build.
>
> Signed-off-by: Roger Pau Monné
Acked-by: Stefano Stabellini
On Mon, Mar 17, 2025 at 7:08 PM Volodymyr Babchuk
wrote:
>
> A privileged domain can issue XEN_DOMCTL_vm_event_op with
> op->domain == DOMID_INVALID. In this case vm_event_domctl()
> function will get NULL as the first parameter and this will
> cause hypervisor panic, as it tries to derefer this p
On 16/03/2025 20:24, Luca Fancellu wrote:
>
>
> From: Penny Zheng
>
> virt_to_maddr and maddr_to_virt are used widely in Xen code. So
> even there is no VMSA in MPU system, we keep the interface in MPU to
> to avoid changing the existing common code.
>
> In order to do that, move the virt_t
On 14.03.2025 21:49, Andrew Cooper wrote:
> ... which is more consise than the opencoded form, and more efficient when
> compiled.
>
> For production VMs, ~100% of emulations are simple MOVs, so it is likely that
> there are no segments to write back.
>
> Furthermore, now that find_{first,next}_b
On 17/03/2025 9:03 am, Jan Beulich wrote:
> On 14.03.2025 19:33, Andrew Cooper wrote:
>> It is only the hardware task switching mechanism which cares about a TSS
>> being
>> at least 0x67 bytes long.
> I/O bitmap accesses are where this particular limit comes into play. For
> 32-bit task switching
Move the current logic to use the matrix keyword to generate a task for
each version of FreeBSD we want to build Xen on. The matrix keyword
however cannot be used in YAML aliases, so it needs to be explicitly used
inside of each task, which creates a bit of duplication. At least abstract
the Free
On Fri, Mar 14, 2025 at 10:39:04AM +, Alejandro Vallejo wrote:
> On Thu Mar 13, 2025 at 5:43 PM GMT, Stewart Hildebrand wrote:
> > I think this just reinforces the need to rework the BAR mapping
> > machinery.
>
> Right. The most delicate part is dealing with races with another vCPU when the
>
On 11.03.2025 22:10, Andrew Cooper wrote:
> The data segment registers are part of the on-stack IRET frame when
> interrupting Virtual 8086 mode, but this ceased being relevant for Xen in
> commit 5d1181a5ea5e ("xen: Remove x86_32 build target.") in 2012.
>
> With all other cleanup in place, delet
On 15/03/2025 1:19 am, dm...@proton.me wrote:
> Add a separate menu for configuring HVM build-time settings to better
> organize HVM-specific options.
>
> HVM options will now appear in a dedicated sub-menu in the menuconfig
> tool.
>
> Also, make AMD_SVM config dependent on AMD config and INTEL_VM
On 11.03.2025 22:10, Andrew Cooper wrote:
> ... in preference to the crs[8] array. This avoids abusing crs[5..7] for the
> fs/gs bases, giving them proper named fields instead, and avoids storage for
> cr1 which is unused in the x86 architecture.
>
> In show_registers(), remove a redundant read_c
On 11.03.2025 22:10, Andrew Cooper wrote:
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
On 11.03.2025 22:10, Andrew Cooper wrote:
> This reverts commit 6065a05adf152a556fb9f11a5218c89e41b62893.
>
> The discussed "proper fix" has now been implemented, and the #DF path no
> longer writes out-of-bounds. Restore the proper #DF IST pointer.
>
> Signed-off-by: Andrew Cooper
Acked-by: J
On 17/03/2025 11:00 am, Jan Beulich wrote:
> On 11.03.2025 22:10, Andrew Cooper wrote:
>> _show_registers() prints the data selectors from struct cpu_user_regs, but
>> these fields are sometimes out-of-bounds. See commit 6065a05adf15
>> ("x86/traps: 'Fix' safety of read_registers() in #DF path").
On 11.03.2025 22:10, Andrew Cooper wrote:
> _show_registers() prints the data selectors from struct cpu_user_regs, but
> these fields are sometimes out-of-bounds. See commit 6065a05adf15
> ("x86/traps: 'Fix' safety of read_registers() in #DF path").
>
> There are 3 callers of _show_registers():
>
Add debug DBG_FDT_PRINT_CHOSEN config file option which adds
print of DT "chosen" node at the end of generated U-boot script.
This is useful for debug and development purposes.
Example:
...
setenv fdt_high 0x
fdt print /chosen
booti 0x4300 - 0x4320
Signed-off-by:
On 13/03/2025 19:28, Ayan Kumar Halder wrote:
> All the memory management specific registers are initialized in enable_mmu.
The title is a bit misleading (description does not help too). It's a pure code
movement, yet it's not mentioned at all. This can be fixed by changing title:
"Move MM speci
Even before its recent movement to the scheduler's private data
structure it looks to have been wrong to update the field under lock,
but then read it with the lock no longer held.
Coverity-ID: 1644500
Fixes: 9f0c658baedc ("arinc: add cpu-pool support to scheduler")
Signed-off-by: Jan Beulich
---
On 17/03/2025 10:33, Luca Fancellu wrote:
>
>
> Hi Michal,
>
>> On 17 Mar 2025, at 09:29, Orzel, Michal wrote:
>>
>>
>>
>> On 16/03/2025 20:24, Luca Fancellu wrote:
>>>
>>>
>>> Introduce frame_table in order to provide the implementation of
>>> virt_to_page for MPU system, move the MMU varia
On 17. 03. 25, 8:16, tang.dongx...@zte.com.cn wrote:
From: TangDongxing
Follow the advice in Documentation/filesystems/sysfs.rst:
show() should only use sysfs_emit() or sysfs_emit_at() when formatting
the value to be returned to user space.
Signed-off-by: TangDongxing
---
drivers/xen/xen-pc
On 15.03.2025 02:00, dm...@proton.me wrote:
> Replace the open-coded value 16 with the NR_ISA_IRQS symbol to enhance
> readability.
>
> No functional changes.
>
> Signed-off-by: Denis Mukhin
Reviewed-by: Jan Beulich
On 14.03.2025 20:00, Andrew Cooper wrote:
> On 12/03/2025 9:57 am, Roger Pau Monné wrote:
>> On Wed, Mar 12, 2025 at 09:31:37AM +0100, Jan Beulich wrote:
>>> On 11.03.2025 21:47, Andrew Cooper wrote:
On 06/01/2025 11:54 am, Jan Beulich wrote:
> On 06.01.2025 12:26, Andrew Cooper wrote:
>>>
In case the build fails or gets stuck, store the Kconfig file ahead of
starting the build.
Signed-off-by: Roger Pau Monné
---
.cirrus.yml | 19 ---
1 file changed, 12 insertions(+), 7 deletions(-)
diff --git a/.cirrus.yml b/.cirrus.yml
index ce7588b7b6b1..490f214f0460 100644
---
Introduce a basic set of smoke tests using the XTF selftest image, and run
them on QEMU. Use the matrix keyword to create a different task for each
XTF flavor on each FreeBSD build.
Signed-off-by: Roger Pau Monné
---
I've used the current version of FreeBSD to run the tests, but it might be
safe
In preparation for adding some smoke tests that will consume those outputs.
Signed-off-by: Roger Pau Monné
---
.cirrus.yml | 12
1 file changed, 12 insertions(+)
diff --git a/.cirrus.yml b/.cirrus.yml
index d8a322acd54c..c74d5cf6eb9a 100644
--- a/.cirrus.yml
+++ b/.cirrus.yml
@@ -6
In preparation for using the XTF selftests to smoke test the FreeBSD based
Xen builds.
Signed-off-by: Roger Pau Monné
---
I've used the current version of FreeBSD to build XTF, but it might be
safer to use the latest production (release) version instead.
---
.cirrus.yml | 24
Signed-off-by: Roger Pau Monné
---
.cirrus.yml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/.cirrus.yml b/.cirrus.yml
index aa195ba370ac..ce7588b7b6b1 100644
--- a/.cirrus.yml
+++ b/.cirrus.yml
@@ -1,7 +1,7 @@
#
https://cirrus-ci.org/guide/tips-and-tricks/#sharing-configu
Such timestamps can still be disabled from the Web UI using a tick box.
Signed-off-by: Roger Pau Monné
---
.cirrus.yml | 1 +
1 file changed, 1 insertion(+)
diff --git a/.cirrus.yml b/.cirrus.yml
index 1a39f5026f9a..aa195ba370ac 100644
--- a/.cirrus.yml
+++ b/.cirrus.yml
@@ -14,6 +14,7 @@ freeb
Hello,
The aim of the series is to introduce a basic set of smoke tests using
QEMU and XTF, to ensure some minimal run-time testing of the LLVM
toolchain generated Xen binary.
Roger Pau Monne (8):
automation/cirrus-ci: add timestamps
automation/cirrus-ci: update FreeBSD to 13.5
automation/c
Instead use env to find the location of expect.
Additionally do not use the -f flag, as it's only meaningful when passing
arguments on the command line, which we never do for console.exp. From the
expect 5.45.4 man page:
> The -f flag prefaces a file from which to read commands from. The flag
>
On 15.03.2025 02:00, dm...@proton.me wrote:
> Add new symbol APIC_VECTOR_VALID to replace open-coded value 16 in
> LAPIC and virtual LAPIC code.
First a good name is needed to make such a change. APIC_VECTOR_VALID
could imo be the name of a predicate macro, but it can't be a mere
number.
Then ...
On 16.03.2025 20:24, Luca Fancellu wrote:
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -74,6 +74,9 @@ config HAS_KEXEC
> config HAS_LLC_COLORING
> bool
>
> +config HAS_PAGING_MEMPOOL
> + bool
Imo this is too little of a change outside of Arm-specific code here. Just
go g
On 14.03.2025 18:59, Andrew Cooper wrote:
> This is an unnecessary indirection.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
On 14.03.2025 19:07, Andrew Cooper wrote:
> We have since gained a better location for it to live.
>
> Fix up the includes while doing so. I don't recall why we had kernel.h but
> it's definitely stale now.
>
> No functional change.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
On 13/03/2025 19:28, Ayan Kumar Halder wrote:
> Define enable_boot_cpu_mm() for the Armv8-R AArch32.
>
> Like boot-time page table in MMU system, we need a boot-time MPU protection
> region configuration in MPU system so Xen can fetch code and data from normal
> memory.
>
> To do this, Xen map
On 11.03.2025 22:10, Andrew Cooper wrote:
> --- a/xen/include/xlat.lst
> +++ b/xen/include/xlat.lst
> @@ -34,8 +34,6 @@
> ?pmu_intel_ctxt arch-x86/pmu.h
> ?pmu_regsarch-x86/pmu.h
>
> -!cpu_user_regs arch-x86/xen-@arch@.h
Ma
On 11.03.2025 22:10, Andrew Cooper wrote:
> In order to support FRED, we're going to have to remove the {ds..gs} fields
> from struct cpu_user_regs, meaning that it is going to have to become a
> different type to the structure embedded in vcpu_guest_context_u.
>
> In both arch_{get,set}_info_gues
On 11.03.2025 22:10, Andrew Cooper wrote:
> --- a/xen/arch/x86/domain.c
> +++ b/xen/arch/x86/domain.c
> @@ -1211,10 +1211,10 @@ int arch_set_info_guest(
> v->arch.user_regs.rflags= c.nat->user_regs.rflags;
> v->arch.user_regs.rsp = c.nat->user_regs.rsp;
>
On 17.03.25 06:07, Choi, Anderson wrote:
I'd like to report xen panic when shutting down an ARINC653 domain with the
following setup.
Note that this is only observed when CONFIG_DEBUG is enabled.
[Test environment]
Yocto release : 5.05
Xen release : 4.19 (hash = 026c9fa29716b0ff0f8b7c687908e71b
PCI passthrough is already supported for HVM domUs when dom0 is PVH
on x86. The last related patch on Qemu side was merged after Xen4.20
release. So mention this feature in Xen4.21 entry.
But SR-IOV is not yet supported on PVH dom0, add a note for it.
Signed-off-by: Jiqian Chen
Acked-by: Oleksii
>> From: TangDongxing
>>
>> Follow the advice in Documentation/filesystems/sysfs.rst:
>> show() should only use sysfs_emit() or sysfs_emit_at() when formatting
>> the value to be returned to user space.
>>
>> Signed-off-by: TangDongxing
>> ---
>> drivers/xen/xen-pciback/pci_stub.c | 2 +-
>>
Hi,
On 14/3/25 19:39, Pierrick Bouvier wrote:
On 3/14/25 11:34, Anthony PERARD wrote:
On Fri, Mar 14, 2025 at 10:33:08AM -0700, Pierrick Bouvier wrote:
Hi,
one patch is missing review:
[PATCH v5 12/17] hw/xen: add stubs for various functions.
My "Acked-by" wasn't enough? Feel free try chang
Hi,
I'm surprised this isn't already possible. Neat!
On Mon, 17 Mar 2025, 07:19 Sergiy Kibrik, wrote:
> Add config option HVM_VIRIDIAN that covers viridian code within HVM.
> Calls to viridian functions guarded by is_viridian_domain() and related
> macros.
> Having this option may be beneficial
Hi Jan,
> On 17 Mar 2025, at 08:41, Jan Beulich wrote:
>
> On 16.03.2025 20:24, Luca Fancellu wrote:
>> --- a/xen/common/Kconfig
>> +++ b/xen/common/Kconfig
>> @@ -74,6 +74,9 @@ config HAS_KEXEC
>> config HAS_LLC_COLORING
>> bool
>>
>> +config HAS_PAGING_MEMPOOL
>> + bool
>
> Imo this is too l
On 17.03.2025 10:19, Alejandro Vallejo wrote:
> Hi,
>
> I'm surprised this isn't already possible. Neat!
>
> On Mon, 17 Mar 2025, 07:19 Sergiy Kibrik, wrote:
>
>> Add config option HVM_VIRIDIAN that covers viridian code within HVM.
>> Calls to viridian functions guarded by is_viridian_domain()
On 16/03/2025 20:24, Luca Fancellu wrote:
>
>
> Introduce frame_table in order to provide the implementation of
> virt_to_page for MPU system, move the MMU variant in mmu/mm.h.
>
> Introduce FRAMETABLE_NR that is required for 'pdx_group_valid' in
> pdx.c, but leave the initialisation of the f
Hi Michal,
> On 17 Mar 2025, at 09:29, Orzel, Michal wrote:
>
>
>
> On 16/03/2025 20:24, Luca Fancellu wrote:
>>
>>
>> Introduce frame_table in order to provide the implementation of
>> virt_to_page for MPU system, move the MMU variant in mmu/mm.h.
>>
>> Introduce FRAMETABLE_NR that is requ
On 17.03.2025 10:29, Luca Fancellu wrote:
>> On 17 Mar 2025, at 08:41, Jan Beulich wrote:
>> On 16.03.2025 20:24, Luca Fancellu wrote:
>>> --- a/xen/common/Kconfig
>>> +++ b/xen/common/Kconfig
>>> @@ -74,6 +74,9 @@ config HAS_KEXEC
>>> config HAS_LLC_COLORING
>>> bool
>>>
>>> +config HAS_PAGING_ME
On 17/03/2025 7:56 am, Jan Beulich wrote:
> On 14.03.2025 20:00, Andrew Cooper wrote:
>> On 12/03/2025 9:57 am, Roger Pau Monné wrote:
>>> On Wed, Mar 12, 2025 at 09:31:37AM +0100, Jan Beulich wrote:
On 11.03.2025 21:47, Andrew Cooper wrote:
> On 06/01/2025 11:54 am, Jan Beulich wrote:
>>>
On 17/03/2025 11:58 am, Jan Beulich wrote:
> On 11.03.2025 22:10, Andrew Cooper wrote:
>> --- a/xen/arch/x86/domain.c
>> +++ b/xen/arch/x86/domain.c
>> @@ -1211,10 +1211,10 @@ int arch_set_info_guest(
>> v->arch.user_regs.rflags= c.nat->user_regs.rflags;
>> v->arch.use
On 15/03/2025 1:00 am, dm...@proton.me wrote:
> Remove uses of open-coded value 16 in x86's interrupt management code
> to enhance readability.
>
> Patch 0 makes a cosmetic rename NR_ISAIRQS -> NR_ISA_IRQS as per
> code review [1].
>
> Patch 1 makes use of NR_ISA_IRQS in the code where necessary
Jürgen,
> On 17.03.25 06:07, Choi, Anderson wrote:
>> I'd like to report xen panic when shutting down an ARINC653 domain
>> with the following setup. Note that this is only observed when
>> CONFIG_DEBUG is enabled.
>>
>> [Test environment]
>> Yocto release : 5.05
>> Xen release : 4.19 (hash = 0
Instead of testing import_attach for imported GEM buffers, invoke
drm_gem_is_imported() to do the test. The helper tests the dma_buf
itself while import_attach is just an artifact of the import. Prepares
to make import_attach optional.
Signed-off-by: Thomas Zimmermann
Cc: Oleksandr Andrushchenko
On 17.03.25 14:29, Andrew Cooper wrote:
On 17/03/2025 1:21 pm, Choi, Anderson wrote:
Jürgen,
On 17.03.25 06:07, Choi, Anderson wrote:
I'd like to report xen panic when shutting down an ARINC653 domain
with the following setup. Note that this is only observed when
CONFIG_DEBUG is enabled.
[Te
On Mon Mar 17, 2025 at 12:32 PM GMT, Roger Pau Monné wrote:
> On Fri, Mar 14, 2025 at 10:39:04AM +, Alejandro Vallejo wrote:
> > On Thu Mar 13, 2025 at 5:43 PM GMT, Stewart Hildebrand wrote:
> > > I think this just reinforces the need to rework the BAR mapping
> > > machinery.
> >
> > Right. T
From: Grygorii Strashko
Add DOMU_VCPU_HARD_AFFINITY[number,vcpu] configuration file string option
specifying the hard affinity configuration for the VM vCPU(vcpu) in DT.
The format is a comma-separated list of pCPUs or ranges of pCPUs. Ranges
are hyphen-separated intervals (such as 0-4) and are
1 - 100 of 169 matches
Mail list logo