flight 113916 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113916/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stopfail REGR. vs. 113387
Tests which did not
flight 113917 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113917/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf aa57c0f096e2e0d555038fc63caea34398f219e6
baseline version:
ovmf
- Lai Jiangshan ha scritto:
> On Sat, Sep 30, 2017 at 12:39 AM, Paolo Bonzini wrote:
> > On 29/09/2017 17:47, Lai Jiangshan wrote:
> >> Hello, all
> >>
> >> An interesting (at least to me) thinking came up to me when I found
> >> that the
This patch creates MBA feature document in doc/features/. It describes
key points to implement MBA which is described in details in Intel SDM
"Introduction to Memory Bandwidth Allocation".
Signed-off-by: Yi Sun
---
CC: Jan Beulich
CC: Andrew Cooper
This patch implements the new libxl get hw info interface,
'libxl_psr_get_hw_info', which is suitable to all psr allocation
features. It also implements corresponding list free function,
'libxl_psr_hw_info_list_free' and makes 'libxl_psr_cat_get_info' call
'libxl_psr_get_hw_info' to avoid
This patch implements set value flow for MBA including its callback
function and domctl interface.
It also changes the memebers in 'cos_write_info' to transfer the
feature array, feature properties array and value array. Then, we
can write all features values on the cos id into MSRs.
Because
This patch implements get HW info flow for MBA including its callback
function and sysctl interface.
Signed-off-by: Yi Sun
---
CC: Jan Beulich
CC: Andrew Cooper
CC: Wei Liu
CC: Roger Pau Monné
This patch implements get value domctl interface for MBA.
Signed-off-by: Yi Sun
Reviewed-by: Roger Pau Monné
Acked-by: Jan Beulich
---
CC: Andrew Cooper
CC: Wei Liu
CC: Chao
This patch creates general interfaces in libxl to support all psr
allocation features.
Add 'LIBXL_HAVE_PSR_GENERIC' to indicate interface change.
Please note, the functionality cannot work until later patches
are applied.
Signed-off-by: Yi Sun
---
CC: Wei Liu
This patch implements generic get value interfaces in libxc and libxl.
It also refactors the get value flow in xl to make it be suitable for all
allocation features. Based on that, a new MBA get value command is added in xl.
Signed-off-by: Yi Sun
Acked-by: Wei Liu
Hi, all,
We plan to bring a new PSR (Platform Shared Resource) feature called
Intel Memory Bandwidth Allocation (MBA) to Xen.
Besides the MBA enabling, we change some interfaces to make them more
general but not only for CAT.
Any comments are welcome!
You can find this series at:
This patch implements a new libxc get hw info interface and corresponding
data structures. It also changes libxl_psr.c to call this new interface.
Signed-off-by: Yi Sun
---
CC: Wei Liu
CC: Ian Jackson
CC: Roger Pau Monné
This patch renames 'cbm_type' to 'psr_type' to generalize it.
Then, we can reuse this for all psr allocation features.
Signed-off-by: Yi Sun
Reviewed-by: Wei Liu
Reviewed-by: Roger Pau Monné
Acked-by: Jan Beulich
This patch implements new generic set value interfaces in libxc and libxl.
These interfaces are suitable for all allocation features. It also adds a
new MBA set value command in xl.
Signed-off-by: Yi Sun
---
CC: Wei Liu
CC: Ian Jackson
This patch adds MBA description in related documents.
Signed-off-by: Yi Sun
Acked-by: Wei Liu
Reviewed-by: Roger Pau Monné
---
CC: Ian Jackson
CC: Chao Peng
v5:
-
This patch renames 'xc_psr_cat_type' to 'xc_psr_type' so that
the structure name is common for all allocation features.
Signed-off-by: Yi Sun
Acked-by: Wei Liu
Reviewed-by: Chao Peng
Reviewed-by: Roger Pau Monné
This patch implements main data structures of MBA.
Like CAT features, MBA HW info has cos_max which means the max thrtl
register number, and thrtl_max which means the max throttle value
(delay value). It also has a flag to represent if the throttle
value is linear or non-linear.
One thrtl
This patch refines psr codes:
1. Change type of 'cat_init_feature' to 'bool' to remove the pointless
returning of error code.
2. Move printk in 'cat_init_feature' to reduce a return path.
3. Define a local variable 'ebx' in 'psr_cpu_init' to reduce calling of
'cpuid_count_leaf()'.
4. Change
This patch renames PSR sysctl/domctl interfaces and related xsm policy to
make them be general for all resource allocation features but not only
for CAT. Then, we can resuse the interfaces for all allocation features.
Basically, it changes 'psr_cat_op' to 'psr_alloc', and remove 'CAT_' from some
This patch implements a new xl get HW info interface. A new argument
is added for psr-hwinfo command to get and show MBA HW info.
Signed-off-by: Yi Sun
Reviewed-by: Roger Pau Monné
---
CC: Wei Liu
CC: Ian Jackson
flight 113913 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113913/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 16 guest-localmigrate/x10 fail REGR. vs.
113902
Regressions
This fixes hitting this BUG_ON():
xen/common/sched_credit2.c:3452
rqd = c2rqd(ops, cpu);
BUG_ON(!cpumask_test_cpu(cpu, >active));
when Credit2 is used as default scheduler, and a
cpupool, also using Credit2, is created.
The bug hit because c2rqd() accesses
rqd[per_cpu(runq_map,cpu)]->active
flight 113914 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113914/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl
flight 113909 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113909/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm 6 xen-build fail in 113899 REGR. vs. 113387
Tests which are
On Fri, 29 Sep 2017, Julien Grall wrote:
> Hi Stefano,
>
> On 09/29/2017 09:10 PM, Stefano Stabellini wrote:
> > On Wed, 27 Sep 2017, Bhupinder Thakur wrote:
> > > DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
> > > xencons_queued() to tell the current size of the ring
Hi Stefano,
On 09/29/2017 09:10 PM, Stefano Stabellini wrote:
On Wed, 27 Sep 2017, Bhupinder Thakur wrote:
DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
xencons_queued() to tell the current size of the ring buffer,
xencons_mask() to mask off the index, which are useful
DO NOT MERGE
This patch contains test code for programming stream tables for PCIe devices
seen by DOM0. This change can be used on top of [1].
[1] [RFC v2 0/7] SMMUv3 driver and the supporting framework
---
xen/arch/arm/physdev.c| 41 +--
flight 113912 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113912/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl
On 9/29/2017 10:20 AM, John P. McDermott (USN Civilian) wrote:
>
>> On Sep 29, 2017, at 11:57 AM, John P. McDermott (USN Civilian)
>> wrote:
>>
>>
>>> On Sep 29, 2017, at 11:31 AM, John P. McDermott (USN Civilian)
>>> wrote:
>>>
>>>
On Wed, 27 Sep 2017, Bhupinder Thakur wrote:
> DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
> xencons_queued() to tell the current size of the ring buffer,
> xencons_mask() to mask off the index, which are useful helper functions.
> pl011 emulation code will use these
On 29/09/17 19:32, Boris Ostrovsky wrote:
> On 09/29/2017 01:53 PM, Andrew Cooper wrote:
>> On AMD processors which support SMEP (Some Fam16h processors) and SMAP (Zen,
>> Fam17h), a guest which is running with shadow paging and clears CR0.PG while
>> keeping CR4.{SMEP,SMAP} set will livelock, as
On Fri, 29 Sep 2017, Bhupinder Thakur wrote:
> This patch fixes the wrong range check done in cmp_mmio_handler().
>
> This function returns -1 , 0 or 1 based on whether the key value
> is below the range, in the range or above the range where the range is
> (start, start+size). However, it
flight 113902 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113902/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl 6 xen-install fail in 113896 pass in 113902
An update to CR4 following a CR0 update can be done easily by falling
through into the CR4 case. This avoids unnecessary passes through
vmx_vmcs_{enter,exit}() and unnecessary stack usage (as the compiler
cannot optimise this use to a tailcall).
Signed-off-by: Andrew Cooper
On 09/29/2017 01:53 PM, Andrew Cooper wrote:
> On AMD processors which support SMEP (Some Fam16h processors) and SMAP (Zen,
> Fam17h), a guest which is running with shadow paging and clears CR0.PG while
> keeping CR4.{SMEP,SMAP} set will livelock, as hardware raises #PF which the
> shadow
This rearanges the logic to avoid the double !hvm_paging_enabled(v) check, but
is otherwise identical.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Jun Nakajima
CC: Kevin Tian
---
This series is mostly cleanup, base on code observations when working on my
comprehensive XTF pagetable test, running in unpaged modes. I've double
checked the behaviour HAP and Shadow modes, with and without the unrestricted
guest feature, on Haswell and Skylake-S hardware.
Andrew Cooper (3):
* Drop trailing whitespace
* Fix indendation and newlines
* Use bool where appropriate
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Jun Nakajima
CC: Kevin Tian
---
On Wed, Sep 20, 2017 at 08:23:20AM +, Paul Durrant wrote:
> > -Original Message-
> > From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> > Sent: 19 September 2017 20:08
> > To: Xen-devel
> > Cc: Wei Liu ; Paul Durrant
On AMD processors which support SMEP (Some Fam16h processors) and SMAP (Zen,
Fam17h), a guest which is running with shadow paging and clears CR0.PG while
keeping CR4.{SMEP,SMAP} set will livelock, as hardware raises #PF which the
shadow pagetable concludes shouldn't happen.
This occurs because
> Joao Martins (1):
> public/io/netif.h: add gref mapping control messages
>
> xen/include/public/io/netif.h | 115
> ++
> 1 file changed, 115 insertions(+)
> ---
Could you include the following pandoc document in docs/misc? And change only
one thing:
On 09/29/2017 09:15 AM, bharat gohil wrote:
Hello
Hi,
Please avoid top-posting.
The patch didn't work in my case.
The patch will be useful only if the compatible string in the DT of your
UART is "snps,dw-apb-uart". What is the compatible string for it?
Cheers,
Thanks,
Bharat
On
On 09/29/2017 01:07 PM, Roger Pau Monné wrote:
> On Fri, Sep 29, 2017 at 05:02:48PM +, Boris Ostrovsky wrote:
>> On 09/29/2017 11:51 AM, Roger Pau Monné wrote:
>>> On Fri, Sep 29, 2017 at 03:33:58PM +, Juergen Gross wrote:
On 29/09/17 17:24, Roger Pau Monné wrote:
> On Fri, Sep
flight 113903 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113903/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 6 kernel-build fail REGR. vs. 113896
build-armhf-libvirt
Roger Pau Monné writes ("Re: [PATCH 1/2] osstest: fix PVH DomU tests"):
> On Fri, Sep 29, 2017 at 03:35:24PM +, Ian Jackson wrote:
> > I think it might stop the pvh tests from working in those branches.
>
> This change will just turn the PVH tests into PV test on old branches,
> because
flight 113910 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113910/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf e294710f590cda22c88319641b14ab8f5916c888
baseline version:
xtf
This run is configured for baseline tests only.
flight 72177 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72177/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 27daa8658e518902bf281b07993c2d60af1913c3
baseline
On Fri, Sep 29, 2017 at 05:02:48PM +, Boris Ostrovsky wrote:
> On 09/29/2017 11:51 AM, Roger Pau Monné wrote:
> > On Fri, Sep 29, 2017 at 03:33:58PM +, Juergen Gross wrote:
> >> On 29/09/17 17:24, Roger Pau Monné wrote:
> >>> On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
>
On 09/29/2017 11:51 AM, Roger Pau Monné wrote:
> On Fri, Sep 29, 2017 at 03:33:58PM +, Juergen Gross wrote:
>> On 29/09/17 17:24, Roger Pau Monné wrote:
>>> On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
>>> Then, I also wonder whether it would make sense for this grub to load
flight 113911 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113911/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl
On Fri, 29 Sep 2017, Lars Kurth wrote:
> Dear committers,
>
> in accordance with https://www.xenproject.org/governance.html, I need the
> leadership teams of the two mature projects – the Hypervisor and the XAPI
> project – to vote on this proposal.
>
> The Advisory Board is endorsing the
On 29/09/2017 17:47, Lai Jiangshan wrote:
> Hello, all
>
> An interesting (at least to me) thinking came up to me when I found
> that the lguest was removed. But I don't have enough knowledge
> to find out the answer nor energy to implement it in some time.
>
> Is it possible to implement kvm-pv
Hi,
On 09/28/2017 03:49 PM, Andre Przywara wrote:
Hi,
On 09/28/2017 01:03 PM, Julien Grall wrote:
Hi,
On 09/26/2017 10:37 AM, Awais Masood wrote:
This patch adds support for Allwinner H5/sun50i SoC.
Makefile updated to enable ARM64 compilation for sunxi.c.
...
---
> On Sep 29, 2017, at 11:57 AM, John P. McDermott (USN Civilian)
> wrote:
>
>
>> On Sep 29, 2017, at 11:31 AM, John P. McDermott (USN Civilian)
>> wrote:
>>
>>
>>> On Sep 29, 2017, at 11:25 AM, Roger Pau Monné
> On Sep 29, 2017, at 11:31 AM, John P. McDermott (USN Civilian)
> wrote:
>
>
>> On Sep 29, 2017, at 11:25 AM, Roger Pau Monné wrote:
>>
>> On Fri, Sep 29, 2017 at 02:57:11PM +, John P. McDermott (USN Civilian)
>> wrote:
>>> (XEN) Xen
On 29/09/17 16:01, George Dunlap wrote:
> @@ -4203,13 +4197,17 @@ static void lbr_fixup(void)
> bdw_erratum_bdf14_fixup();
> }
>
> -void vmx_vmenter_helper(const struct cpu_user_regs *regs)
> +int vmx_vmenter_helper(const struct cpu_user_regs *regs)
What are the semantics of this
On Fri, Sep 29, 2017 at 03:33:58PM +, Juergen Gross wrote:
> On 29/09/17 17:24, Roger Pau Monné wrote:
> > On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
> > Then, I also wonder whether it would make sense for this grub to load
> > the kernel using the PVH entry point or the
On Fri, Sep 29, 2017 at 03:35:24PM +, Ian Jackson wrote:
> Roger Pau Monne writes ("[PATCH 1/2] osstest: fix PVH DomU tests"):
> > The pvh=1 xl option was removed, so switch the PVH tests to use
> > type='pvh' instead.
>
> What will be the effect of this on old Xen branches ?
PVHv1 is also
On 09/29/2017 01:07 PM, Lars Kurth wrote:
> Dear committers,
>
> in accordance with https://www.xenproject.org/governance.html, I need the
> leadership teams of the two mature projects – the Hypervisor and the XAPI
> project – to vote on this proposal.
>
> The Advisory Board is endorsing the
> -Original Message-
> From: Andrew Cooper
> Sent: 29 September 2017 16:35
> To: Paul Durrant ; xen-de...@lists.xenproject.org
> Cc: Jan Beulich
> Subject: Re: [PATCH v8 01/11] x86/hvm/ioreq: maintain an array of ioreq
> servers rather than a
Roger Pau Monne writes ("[PATCH 1/2] osstest: fix PVH DomU tests"):
> The pvh=1 xl option was removed, so switch the PVH tests to use
> type='pvh' instead.
What will be the effect of this on old Xen branches ?
I think it might stop the pvh tests from working in those branches.
Ian.
Roger Pau Monne writes ("[PATCH 2/2] osstest: use type='hvm' for HVM guests"):
> The previous builder='hvm' is also kept for compatibility with older
> Xen releases. Note that the type option is ignored in previous Xen
> versions.
Acked-by: Ian Jackson
On 29/09/17 15:51, Paul Durrant wrote:
> A subsequent patch will remove the current implicit limitation on creation
> of ioreq servers which is due to the allocation of gfns for the ioreq
> structures and buffered ioreq ring.
>
> It will therefore be necessary to introduce an explicit limit and,
On Fri, Sep 29, 2017 at 4:24 PM, Roger Pau Monné wrote:
> On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
>> I'm thinking about to add support for Xen PVH guests to grub2.
>>
>> Basically I see two options how to do it:
>>
>> a) add PVH support to current
On 29/09/17 17:24, Roger Pau Monné wrote:
> On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
>> I'm thinking about to add support for Xen PVH guests to grub2.
>>
>> Basically I see two options how to do it:
>>
>> a) add PVH support to current grub.xen (both, 32- and 64-bit), in
>>
> On Sep 29, 2017, at 11:25 AM, Roger Pau Monné wrote:
>
> On Fri, Sep 29, 2017 at 02:57:11PM +, John P. McDermott (USN Civilian)
> wrote:
>> (XEN) Xen BUG at page_alloc.c:738
>
> Do you have XSA-245 applied?
>
> http://xenbits.xen.org/xsa/advisory-245.html
>
>
On Fri, Sep 29, 2017 at 02:57:11PM +, John P. McDermott (USN Civilian)
wrote:
> (XEN) Xen BUG at page_alloc.c:738
Do you have XSA-245 applied?
http://xenbits.xen.org/xsa/advisory-245.html
Roger.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
On 29/09/17 16:17, Roger Pau Monné wrote:
> On Thu, Sep 28, 2017 at 08:41:28AM +, Jan Beulich wrote:
>> Segment bases (and limits) aren't being cleared by the loading of a nul
>> selector into a segment register on AMD CPUs. Therefore, if an
>> outgoing vCPU has a non-zero base in FS or GS and
On Fri, Sep 29, 2017 at 02:46:53PM +, Juergen Gross wrote:
> I'm thinking about to add support for Xen PVH guests to grub2.
>
> Basically I see two options how to do it:
>
> a) add PVH support to current grub.xen (both, 32- and 64-bit), in
>order to use the same grub binary for either
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.14c-rc3-tag
xen: fixes for 4.14-rc3
It contains 3 fixes:
- avoid a warning when compiling with clang
- consider read-only bits in xen-pciback when writing to a BAR
- fix a boot
On Thu, Sep 28, 2017 at 08:41:28AM +, Jan Beulich wrote:
> Segment bases (and limits) aren't being cleared by the loading of a nul
> selector into a segment register on AMD CPUs. Therefore, if an
> outgoing vCPU has a non-zero base in FS or GS and the subsequent
> incoming vCPU has a non-zero
On Fri, Sep 29, 2017 at 10:57:11AM -0400, John P. McDermott (USN Civilian)
wrote:
> Xen Developers,
>
> Trying to run Xen ARM64 on HiKey 960. Following the guidance on the wiki,
> building on Ubuntu 17, everything works as expected until Xen boots. The
> interesting tail of the serial console
On Fri, Sep 29, 2017 at 3:46 PM, Juergen Gross wrote:
> I'm thinking about to add support for Xen PVH guests to grub2.
>
> Basically I see two options how to do it:
>
> a) add PVH support to current grub.xen (both, 32- and 64-bit), in
>order to use the same grub binary for
From: Sergey Dyasli
Now that np2m sharing is implemented, there can be only one np2m object
with the same np2m_base. Break from loop if the required np2m was found
during np2m_flush_eptp().
Signed-off-by: Sergey Dyasli
Reviewed-by: George
From: Sergey Dyasli
At the moment, nested p2ms are not shared between vcpus even if they
share the same base pointer.
Modify p2m_get_nestedp2m() to allow sharing a np2m between multiple
vcpus with the same np2m_base (L1 np2m_base value in VMCX12).
If the current np2m
nvmx_handle_invept() updates current's np2m just to flush it. This is
not only wasteful, but ineffective: if several L2 vcpus share the same
np2m base pointer, they all need to be flushed (not only the current
one).
Introduce a new function, np2m_flush_base() which will flush all
shadow p2m's
From: Sergey Dyasli
Remove np2m_base parameter as it should always match the value of
np2m_base in VMCX12.
Signed-off-by: Sergey Dyasli
Reviewed-by: George Dunlap
---
CC: Andrew Cooper
There is a possibility for nested_p2m to became stale between
nestedhvm_hap_nested_page_fault() and nestedhap_fix_p2m(). At the moment
this is handled by detecting such a race inside nestedhap_fix_p2m() and
special-casing it.
Instead, introduce p2m_get_nestedp2m_locked(), which will returned a
At the moment, the shadow EPTP value is written unconditionally in
ept_handle_violation().
Instead, write the value on vmentry to the guest; but only write it if
the value needs updating.
To detect this, add a flag to the nestedvcpu struct, stale_np2m, to
indicate when such an action is
Flush IPIs are sent to all cpus in a shadow p2m's dirty_cpumask when
updated. This mask however is far to broad. A pcpu's bit is set in
the cpumask when a vcpu runs on that pcpu, but is only cleared when a
flush happens. This means that the IPI includes the current pcpu of
vcpus that are not
From: Sergey Dyasli
Remove some code duplication.
Suggested-by: George Dunlap
Signed-off-by: Sergey Dyasli
Reviewed-by: George Dunlap
---
CC: Andrew Cooper
CC:
On 09/04/2017 09:14 AM, Sergey Dyasli wrote:
> Nested p2m (shadow EPT) is an object that stores memory address
> translations from L2 GPA directly to L0 HPA. This is achieved by
> combining together L1 EPT with L0 EPT during L2 EPT violations.
>
> In the usual case, L1 uses the same EPTP value in
From: Sergey Dyasli
1. Add a helper function assign_np2m()
2. Remove useless volatile
3. Update function's comment in the header
4. Minor style fixes ('\n' and d)
Signed-off-by: Sergey Dyasli
Reviewed-by: George Dunlap
A previous patch added support for priv-mapping guest resources directly
(rather than having to foreign-map, which requires P2M modification for
HVM guests).
This patch makes use of the new API to seed the guest grant table unless
the underlying infrastructure (i.e. privcmd) doesn't support it,
This patch allows grant table frames to be mapped using the
XENMEM_acquire_resource memory op.
Signed-off-by: Paul Durrant
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc:
Xen Developers,
Trying to run Xen ARM64 on HiKey 960. Following the guidance on the wiki,
building on Ubuntu 17, everything works as expected until Xen boots. The
interesting tail of the serial console output is
...
Xen 4.10-unstable (c/s Tue Sep 12 14:45:13 2017 +0200 git:16b1414de9) EFI
On Fri, Sep 29, 2017 at 12:07:47PM +, Lars Kurth wrote:
> Dear committers,
>
> in accordance with https://www.xenproject.org/governance.html, I need the
> leadership teams of the two mature projects – the Hypervisor and the XAPI
> project – to vote on this proposal.
>
> The Advisory Board
flight 113905 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113905/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 27daa8658e518902bf281b07993c2d60af1913c3
baseline version:
ovmf
By using a static inline stub in private.h for OS where this functionality
is not implemented, the various duplicate stubs in the OS-specific source
modules can be avoided.
Signed-off-by: Paul Durrant
Reviewed-by: Roger Pau Monné
Acked-by: Wei Liu
A previous patch introduced a new HYPERVISOR_memory_op to acquire guest
resources for direct priv-mapping.
This patch adds new functionality into libxenforeignmemory to make use
of a new privcmd ioctl [1] that uses the new memory op to make such
resources available via mmap(2).
[1]
A subsequent patch will introduce a new scheme to allow an emulator to
map ioreq server pages directly from Xen rather than the guest P2M.
This patch lays the groundwork for that change by deferring mapping of
gfns until their values are requested by an emulator. To that end, the
pad field of the
This patch adjusts the ioreq server code to use type-safe gfn_t values
where possible. No functional change.
Signed-off-by: Paul Durrant
Reviewed-by: Roger Pau Monné
Reviewed-by: Wei Liu
Acked-by: Jan Beulich
This patch re-works much of the ioreq server initialization and teardown
code:
- The hvm_map/unmap_ioreq_gfn() functions are expanded to call through
to hvm_alloc/free_ioreq_gfn() rather than expecting them to be called
separately by outer functions.
- Several functions now test the validity
A subsequent patch will remove the current implicit limitation on creation
of ioreq servers which is due to the allocation of gfns for the ioreq
structures and buffered ioreq ring.
It will therefore be necessary to introduce an explicit limit and, since
this limit should be small, it simplifies
...to allow the calling domain to prevent translation of specified l1e
value.
Despite what the comment in public/xen.h might imply, specifying a
command value of MMU_NORMAL_PT_UPDATE will not simply update an l1e with
the specified value. Instead, mod_l1_entry() tests whether foreign_dom
has
This series introduces support for direct mapping of guest resources.
The resources are:
- IOREQ server pages
- Grant tables
v8:
- Re-ordered series and dropped two patches that have already been
committed.
v7:
- Fixed assertion failure hit during domain destroy.
v6:
- Responded to
... XENMEM_resource_ioreq_server
This patch adds support for a new resource type that can be mapped using
the XENMEM_acquire_resource memory op.
If an emulator makes use of this resource type then, instead of mapping
gfns, the IOREQ server will allocate pages from the heap. These pages
will
Certain memory resources associated with a guest are not necessarily
present in the guest P2M.
This patch adds the boilerplate for new memory op to allow such a resource
to be priv-mapped directly, by either a PV or HVM tools domain.
NOTE: Whilst the new op is not intrinsicly specific to the x86
I'm thinking about to add support for Xen PVH guests to grub2.
Basically I see two options how to do it:
a) add PVH support to current grub.xen (both, 32- and 64-bit), in
order to use the same grub binary for either pv-domains or
pvh-domains
b) create a new variant grub.xenpvh capable only
On 29/09/17 14:53, Anaïs Gantet wrote:
>
> Hi,
>
> I would just like to underline a unusual behaviour I observed recently
> with Xen. Indeed, a test with a Xen HVM x86-32bit guest pointed out the
> x86_emulate function in xen/arch/x86/x86_emulate/x86_emulate.c seems to
> only partially handle
1 - 100 of 152 matches
Mail list logo