On Thu, Apr 07, 2016 at 09:46:49AM -0600, Jan Beulich wrote:
> >>> On 07.04.16 at 05:14, wrote:
> > On Fri, Apr 01, 2016 at 09:11:40AM -0600, Jan Beulich wrote:
> >> >>> On 24.03.16 at 21:00, wrote:
> >> > --- a/xen/arch/x86/Makefile
> >> > +++ b/xen/arch/x86/Makefile
> >> > @@ -113,12 +113,14 @@
On Thu, Apr 07, 2016 at 08:18:27PM -0400, Konrad Rzeszutek Wilk wrote:
> > > +build_id.o: $(TARGET)-syms
> > > + $(OBJCOPY) -O binary --only-section=.note $(BASEDIR)/xen-syms $@.bin
> >
> > Considering your xen.lds.S changes, won't this potentially copy quite
&g
On Tue, Apr 05, 2016 at 06:16:35PM -0700, Stefano Stabellini wrote:
> On Tue, 5 Apr 2016, Konrad Rzeszutek Wilk wrote:
> > On Tue, Apr 05, 2016 at 11:43:36AM -0400, Chris Patterson wrote:
> > > On Tue, Apr 5, 2016 at 9:49 AM, Konrad Rzeszutek Wilk
> > > wrote:
> &g
On Thu, Apr 07, 2016 at 08:24:06AM +0200, Juergen Gross wrote:
> Document the interface between qemu and libxl regarding backends
> supported by qemu.
Sorry for being dense..
>
> Signed-off-by: Juergen Gross
> ---
> docs/misc/qemu-backends.txt | 19 +++
> 1 file changed, 19 ins
do not specify an XSM
> policy during boot; if you need to load a policy from dom0, use the
> "flask=late" boot parameter.
>
> Original patch by Konrad Rzeszutek Wilk ; modified
> to also change the default value of flask_enforcing so that the policy
> is not still in pe
id a malicious guest flooding the
> >console.
> >
> >Signed-off-by: Shannon Zhao
> >Reviewed-by: Konrad Rzeszutek Wilk
>
> Acked-by: Julien Grall
>
> Regards,
Applied.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
;
> Signed-off-by: Andrew Cooper
> Reviewed-by: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Fri, Apr 08, 2016 at 10:42:52AM +0100, Julien Grall wrote:
>
>
> On 06/04/16 19:57, Shanker Donthineni wrote:
> >Hi Julien/Stefano,
>
> Hi Shanker,
>
> >
> >Any other comments to be addressed? Please propose an alternative
> >solution to fix the problem if this patch changes are not appropri
On Fri, Apr 08, 2016 at 05:53:55AM -0700, Guenter Roeck wrote:
> Register with kernel restart handler instead of setting arm_pm_restart
> directly.
>
> Select a high priority of 192 to ensure that default restart handlers
Is there some macro for that magic value?
> are replaced if Xen is running
On Fri, Apr 08, 2016 at 09:21:37AM -0600, Jan Beulich wrote:
> >>> On 08.04.16 at 03:32, wrote:
> > On Thu, Apr 07, 2016 at 09:46:49AM -0600, Jan Beulich wrote:
> >> >>> On 07.04.16 at 05:14, wrote:
> >> > On Fri, Apr 01, 2016 at 09:11:40AM -0600, Jan Beulich wrote:
> >> >> >>> On 24.03.16 at 21:
h
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> v3:
> * Style fixes. Use __test_and_set_bit()
> ---
> xen/arch/x86/cpu/common.c | 16 +++-
> 1 file changed, 15 insertions(+), 1 deletion(-)
>
> diff --git a/xen/arch/x86/cpu/common.c b/xen/arch/x86/cpu/common.c
>
> >>http://lists.xenproject.org/archives/html/xen-devel/2016-02/msg03100.html
> >
> >So the tags and alike would suggest this is ready to be committed,
> >but the lack of a version number or version history don't really
> >help support this. Could you please clarify the state of this patch?
>
> So
ed.
> * The APIC bit in e1d (on non-Intel) is also a fast-forward from the
>APIC_BASE MSR.
>
> As a small improvement, use compiler-visible &'s and |'s, rather than
> {clear,set}_bit().
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Konrad Rzeszu
bilities. This change is
> scaffolding for future patches, which will introduce detection and switching
> logic, after which the interface will report hardware capabilities correctly.
>
> Signed-off-by: Andrew Cooper
> Acked-by: Jan Beulich
Revi
y: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
the Xen default masking level.
>
> Signed-off-by: Andrew Cooper
> Reviewed-by: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
y build HVM domains.
>
> For now, the control domain is left as a special case, until futher work can
> be completed to remove the restriction.
>
> Signed-off-by: Andrew Cooper
> Reviewed-by: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
_
; Signed-off-by: Andrew Cooper
> Reviewed-by: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
to
> guests, even though they could be hidden. These flags affect how to interpret
> other cpuid leaves which are not maskable.
>
> Signed-off-by: Andrew Cooper
> Reviewed-by: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-d
On Thu, Apr 07, 2016 at 12:57:19PM +0100, Andrew Cooper wrote:
> And provide stubs for toolstack use.
>
> Signed-off-by: Andrew Cooper
> Acked-by: Wei Liu
> Acked-by: David Scott
> Acked-by: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
_
t; as well with 'unsigned int *' based bitmaps.
>
> As part of doing so, change the implementation to be in terms of char rather
> than unsigned long. This fixes alignment concerns with ARM.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Konrad Rzeszutek Wilk
___
On Thu, Apr 07, 2016 at 12:57:22PM +0100, Andrew Cooper wrote:
> Signed-off-by: Andrew Cooper
> Acked-by: Wei Liu
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
med in the public API, similar renames
> are made here.
>
> Signed-off-by: Andrew Cooper
> Acked-by: Wei Liu
Reviewed-by: Konrad Rzeszutek Wilk
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Fri, Apr 08, 2016 at 09:27:00AM -0600, Jan Beulich wrote:
> >>> On 08.04.16 at 03:52, wrote:
> > On Thu, Apr 07, 2016 at 08:18:27PM -0400, Konrad Rzeszutek Wilk wrote:
> >> >
> >> > > + $(OBJCOPY) -I binary -O elf64-x86-64 -B i386:x86-64 \
&
On Fri, Apr 08, 2016 at 10:33:33AM -0600, Jan Beulich wrote:
> >>> On 31.03.16 at 15:28, wrote:
> > On Thu, Mar 31, 2016 at 06:07:58AM -0600, Jan Beulich wrote:
> >> >>> On 31.03.16 at 13:43, wrote:
> >> > On Thu, Mar 31, 2016 at 12:30:09AM -0600, Jan Beulich wrote:
> >> >> >>> On 30.03.16 at 17:
On Fri, Apr 08, 2016 at 06:21:27PM +0100, Wei Liu wrote:
> On Fri, Apr 08, 2016 at 11:13:08AM -0600, Jan Beulich wrote:
> > >>> On 08.04.16 at 19:09, wrote:
> > > On Fri, Apr 08, 2016 at 10:33:33AM -0600, Jan Beulich wrote:
> > >> >>> On 31.03.16 at 15:28, wrote:
> > >> > On Thu, Mar 31, 2016 at
> +static int xsplice_list(xen_sysctl_xsplice_list_t *list)
> +{
> +xen_xsplice_status_t status;
> +struct payload *data;
> +unsigned int idx = 0, i = 0;
> +int rc = 0;
> +
> +if ( list->nr > 1024 )
> +return -E2BIG;
> +
> +if ( list->pad )
> +return -EINVAL;
On Fri, Apr 08, 2016 at 04:49:00PM +0100, Ross Lagerwall wrote:
> On 04/07/2016 03:58 AM, Konrad Rzeszutek Wilk wrote:
> >On Mon, Apr 04, 2016 at 06:46:24AM -0600, Jan Beulich wrote:
> >>>>>On 24.03.16 at 21:00, wrote:
> >>>The version of ld that first impl
start ==
__note_gnu_build_id_end)
If I left the name as .note or *(.note.*) it was OK.
Here is what I came up with. Going to test it shortly
From ff61823cef437fb8a69903b3ff14b0d06ccf743b Mon Sep 17 00:00:00 2001
From: Konrad Rzeszutek Wilk
Date: Wed, 6 Apr 2016 22:05:06 -0400
Subject: [PATCH] bu
On Fri, Apr 08, 2016 at 07:07:02PM +0100, Andrew Cooper wrote:
> On 07/04/16 04:49, Konrad Rzeszutek Wilk wrote:
> >
> > +notes.o: $(TARGET)-syms
> > + $(OBJCOPY) -O binary --only-section=.note $(BASEDIR)/xen-syms $@.bin
> > + $(OBJCOPY) -I binary -O
> diff --git a/xen/arch/x86/efi/Makefile b/xen/arch/x86/efi/Makefile
> index 5099430..a6dae4c 100644
> --- a/xen/arch/x86/efi/Makefile
> +++ b/xen/arch/x86/efi/Makefile
> @@ -6,7 +6,7 @@ create = test -e $(1) || touch -t 19990101 $(1)
>
> efi := y$(shell rm -f disabled)
> efi := $(if $(efi)
On Thu, Apr 07, 2016 at 09:13:58PM +0100, Andrew Cooper wrote:
> On 07/04/16 04:49, Konrad Rzeszutek Wilk wrote:
> > Drop paranthesis and function pointer on nmi_callback_t typedef.
> >
> > Make it more inline with how x86 maintainers want function
> > typedefs to be.
&g
On Fri, Apr 08, 2016 at 02:14:22PM -0600, Jan Beulich wrote:
> >>> On 08.04.16 at 21:23, wrote:
> > On Fri, Apr 08, 2016 at 11:44:54AM -0600, Jan Beulich wrote:
> >> >>> On 08.04.16 at 19:06, wrote:
> >> > So that when xen.efi is linked with this build_id.o (in v5, now called
> >> > notes.o in v
> > +int arch_xsplice_perform_rela(struct xsplice_elf *elf,
> > + const struct xsplice_elf_sec *base,
> > + const struct xsplice_elf_sec *rela)
> > +{
> > +const Elf_RelA *r;
> > +unsigned int symndx, i;
> > +uint64_t val;
> > +
On Fri, Apr 08, 2016 at 03:11:17PM -0600, Jan Beulich wrote:
> >>> On 08.04.16 at 22:50, wrote:
> > On Fri, Apr 08, 2016 at 02:14:22PM -0600, Jan Beulich wrote:
> >> >>> On 08.04.16 at 21:23, wrote:
> >> > @@ -57,10 +60,19 @@ SECTIONS
> >> > *(.lockprofile.data)
> >> > __lock_prof
On Fri, Apr 08, 2016 at 03:53:44PM +0100, Andrew Cooper wrote:
> On 07/04/16 04:49, Konrad Rzeszutek Wilk wrote:
> > +static int elf_resolve_sections(struct xsplice_elf *elf, const void *data)
> > +{
> > +struct xsplice_elf_sec *sec;
> > +unsigned in
On Fri, Apr 08, 2016 at 03:18:09PM -0600, Jan Beulich wrote:
> >>> On 08.04.16 at 23:10, wrote:
> >> > +int arch_xsplice_perform_rela(struct xsplice_elf *elf,
> >> > + const struct xsplice_elf_sec *base,
> >> > + const struct xsplice_elf_se
On Fri, Apr 08, 2016 at 09:31:36PM +0100, Andrew Cooper wrote:
> This series is available in git form at:
> http://xenbits.xen.org/git-http/people/andrewcoop/xen.git levelling-v6
And in 'for-staging'.
>
> Very few changes from v5:
> * Change the PKU feature depdendency from PAE to LM
> * Bugf
On Fri, Apr 08, 2016 at 04:50:10PM -0600, Jan Beulich wrote:
> >>> On 09.04.16 at 00:45, wrote:
> > On Fri, Apr 08, 2016 at 03:18:09PM -0600, Jan Beulich wrote:
> >> >>> On 08.04.16 at 23:10, wrote:
> >> >> > +int arch_xsplice_perform_rela(struct xsplice_elf *elf,
> >> >> > +
> diff --git a/docs/misc/xsplice.markdown b/docs/misc/xsplice.markdown
> index d4e7d75..8d2d413 100644
> --- a/docs/misc/xsplice.markdown
> +++ b/docs/misc/xsplice.markdown
> @@ -330,6 +330,41 @@ When reverting a patch, the hypervisor iterates over
> each `xsplice_patch_func`
> and the core code
On Fri, Apr 08, 2016 at 11:19:24AM -0600, Jan Beulich wrote:
> >>> On 08.04.16 at 16:22, wrote:
> > On 07/04/16 04:49, Konrad Rzeszutek Wilk wrote:
> >> +void vm_free_type(const void *, enum vmap_type);
> >> +void vunmap_type(const void *, enum vmap_type);
On Fri, Apr 08, 2016 at 07:19:37PM +0100, Andrew Cooper wrote:
> On 07/04/16 04:49, Konrad Rzeszutek Wilk wrote:
> > diff --git a/Config.mk b/Config.mk
> > index db70638..4b6f3f5 100644
> > --- a/Config.mk
> > +++ b/Config.mk
> > @@ -134,6 +134,7 @@ ifeq
On Fri, Apr 08, 2016 at 08:37:45PM -0400, Konrad Rzeszutek Wilk wrote:
> On Fri, Apr 08, 2016 at 04:50:10PM -0600, Jan Beulich wrote:
> > >>> On 09.04.16 at 00:45, wrote:
> > > On Fri, Apr 08, 2016 at 03:18:09PM -0600, Jan Beulich wrote:
> > >> >>>
On Thu, Apr 07, 2016 at 09:38:53AM -0600, Jan Beulich wrote:
> >>> On 07.04.16 at 05:05, wrote:
> >> >> > +/* All CPUs are waiting, now signal to disable IRQs. */
> >> >> > +xsplice_work.ready = 1;
> >> >> > +smp_wmb();
> >> >> > +
> >> >> > +atomic_inc(&xsplice_wor
On Thu, Apr 07, 2016 at 09:43:38AM -0600, Jan Beulich wrote:
> >>> On 07.04.16 at 05:09, wrote:
> >> > +uint8_t *old_ptr;
> >> > +
> >> > +BUILD_BUG_ON(PATCH_INSN_SIZE > sizeof(func->undo));
> >> > +BUILD_BUG_ON(PATCH_INSN_SIZE != (1 + sizeof val));
> >> > +
> >> > +old_ptr = (uint
On Sat, Apr 09, 2016 at 10:36:00PM -0400, Konrad Rzeszutek Wilk wrote:
> On Thu, Apr 07, 2016 at 09:43:38AM -0600, Jan Beulich wrote:
> > >>> On 07.04.16 at 05:09, wrote:
> > >> > +uint8_t *old_ptr;
> > >> > +
> > >
On Sat, Apr 09, 2016 at 10:36:02PM -0400, Konrad Rzeszutek Wilk wrote:
> On Thu, Apr 07, 2016 at 09:43:38AM -0600, Jan Beulich wrote:
> > >>> On 07.04.16 at 05:09, wrote:
> > >> > +uint8_t *old_ptr;
> > >> > +
> > >
han 32-bits - which means that ELF relocations
would truncate the 34 and 33th bit. Hence this alternate API.
We also add add extra checks in case the b) range has not been initialized.
Signed-off-by: Konrad Rzeszutek Wilk
Suggested-by: Jan Beulich
Acked-by: Julien Grall [ARM]
---
Cc: Ian Jac
.
We also print the dependency and payloads build_in the keyhandler.
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
---
Cc: Keir Fraser
Cc: Jan Beulich
Cc: Andrew Cooper
v3: First time included.
v4: Andrew fix against the build_id.o mutilations.
Andrew fix to not include
From: Ross Lagerwall
Add support for handling bug frames contained with xsplice modules. If a
trap occurs search either the kernel bug table or an applied payload's
bug table depending on the instruction pointer.
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Review
ve an exception that
is handled.
To not grow the code-base if xSplice is not compiled in we add
certain #define to help in determining if code needs to be __init
or not.
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
---
Cc: Keir Fraser
Cc: Jan Beulic
Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
---
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
v2: Add missing full stop.
v3: s/module/payload/
v4: Expand comment and include registration of 'virtual_region'
Redo the vsprintf handling of
If you have a patch for xSplice send it our way!
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
---
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
v5: Sort them F: fields (Jan)
v7: Added Andrew's Review
the ELF payloads.
This link has a nice description of how to use the tool:
http://lists.xenproject.org/archives/html/xen-devel/2015-10/msg02595.html
Andrew Cooper (1):
x86/mm: Introduce modify_xen_mappings()
Konrad Rzeszutek Wilk (14):
xsplice: Design document
xen/xsplice: Hyp
which simply overrides a symbol because you could end
up with a chain of jumps which is inefficient and may result in the expected
function not being executed.
Also we include a local definition block in the symbols.c file.
Signed-off-by: Konrad Rzeszutek Wilk
Signed-off-by: Ross Lagerwall
tra
xen_extra : Hello World
$xen-xsplice revert xen_hello_world
Performing revert: completed
$xen-xsplice unload xen_hello_world
Performing unload: completed
$xl info | grep extra
xen_extra : -unstable
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
Acked
:
Martin Pohlack
Jan Beulich
Thank you!
Input-from: Martin Pohlack
Input-from: Jan Beulich
Signed-off-by: Konrad Rzeszutek Wilk
Signed-off-by: Ross Lagerwall
Acked-by: Ian Jackson
---
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
v1-2: review
v3: Split document in
The VERSION hypercall provides the flexibility to expose
the size of the build-id (so the callers can allocate the
proper size before trying to retrieve it). It also allows
in one nice swoop to retrieve the hypervisor build-id in the
provided buffer.
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by
From: Andrew Cooper
To simply change the permissions on existing Xen mappings. The existing
destroy_xen_mappings() is altered to support a change the PTE permissions.
A new destroy_xen_mappings() is introduced, as the special case of not passing
_PAGE_PRESENT to modify_xen_mappings().
As clean
The underlaying toolstack code to do the basic
operations when using the XEN_XSPLICE_op syscalls:
- upload the payload,
- get status of an payload,
- list all the payloads,
- apply, check, replace, and revert the payload.
Signed-off-by: Konrad Rzeszutek Wilk
Signed-off-by: Ross Lagerwall
rt_end, XEN_VIRT_END] for the code.
We also use the "x86/mm: Introduce modify_xen_mappings()"
to change the virtual address page-table permissions.
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
Acked-by: Julien Grall
---
Cc: Stefano St
incorrect - some of the values it contains would be offset by the
size of the included build id.
This obviously causes problems when resolving symbols.
We also define the NT_GNU_BUILD_ID in the elfstructs.h as we
need to use it in various places.
Suggested-by: Andrew Cooper
Signed-off-by: Marti
Rzeszutek Wilk
Acked-by: Ian Jackson
Reviewed-by: Andrew Cooper
---
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
v2: - With the #define ELFSIZE in the ARM file we can use the common
#defines instead of using #ifdef CONFIG_ARM_32. Moved to another
patch.
- Add
As it should be an useful debug mechanism.
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
Reviewed-by: Andrew Cooper
--
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
v2: s/char */const void *
v5: s/ssize_t/unsigned int/
v6: Remove pointless initializers, use
search has to only use two public APIs:
- register_virtual_region
- unregister_virtual_region
to let the core code know.
If the ->lookup_symbol is not then the default internal symbol lookup
mechanism is used.
Suggested-by: Andrew Cooper
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: An
(load).
Also will use the name of the file as the
Signed-off-by: Konrad Rzeszutek Wilk
Signed-off-by: Ross Lagerwall
Acked-by: Wei Liu
---
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Wei Liu
v2:
- Removed REVERTED state.
- Fixed bugs handling XSPLICE_STATUS_PROGRESS.
- Split status
this work, we make the public header use architecture
neutral members (xen_ulong_t) but for per-architecture have to
fiddle with padding.
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by: Julien Grall [ARM bits]
--
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: Keir
'non-lock' variant.
Signed-off-by: Konrad Rzeszutek Wilk
Signed-off-by: Ross Lagerwall
Reviewed-by: Andrew Cooper
Acked-by: Daniel De Graaf
---
Cc: Daniel De Graaf
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Wei Liu
v2: Rebased on keyhandler: rework keyhandler infrastructure
v3: F
From: Ross Lagerwall
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
---
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
v6: Drop recursive lock - also now the caller is holding the lock
Move the code up in the code above
If the hypervisor is built with we will display it.
Signed-off-by: Konrad Rzeszutek Wilk
Acked-by: Wei Liu
---
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Wei Liu
v2: Include HAVE_*, use libxl_zalloc, s/rc/ret/
v3: Retry with different size if 1020 is not enough.
v4: Use VERSION_OP subops
.
Signed-off-by: Ross Lagerwall
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
---
Cc: Keir Fraser
Cc: Jan Beulich
Cc: Andrew Cooper
v2: Make a new alternative function that does not ASSERT on IRQs and
don't disable IRQs in the code when loading payload.
v4: Include test
as .xsplice.depends.
Signed-off-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
---
Cc: Keir Fraser
Cc: Jan Beulich
Cc: Andrew Cooper
v4: New. Make the objcopy use -S to strip the name.
v7: Added Andrew's Reviewed-by
---
---
.gitignore | 1 +
xen
On Mon, Apr 11, 2016 at 11:14:46AM +0100, Andrew Cooper wrote:
> On 10/04/16 22:14, Konrad Rzeszutek Wilk wrote:
> > diff --git a/xen/common/xsplice.c b/xen/common/xsplice.c
> > index cbee264..9a53cf4 100644
> > --- a/xen/common/xsplice.c
> > +++ b/xen/common
On Mon, Apr 11, 2016 at 10:39:59AM +0100, Andrew Cooper wrote:
> On 10/04/16 22:14, Konrad Rzeszutek Wilk wrote:
> > For those users who want to use the virtual addresses that
> > are in the hypervisor's virtual address space - these threej new
>
> Technically, all
On Mon, Apr 11, 2016 at 01:17:38PM +0100, Andrew Cooper wrote:
> On 10/04/16 22:14, Konrad Rzeszutek Wilk wrote:
> > diff --git a/xen/arch/x86/Makefile b/xen/arch/x86/Makefile
> > index d210bb7..e8cd757 100644
> > --- a/xen/arch/x86/Makefile
> > +++ b/xen/arch/x86/M
On Mon, Apr 11, 2016 at 03:04:09PM +0200, Juergen Gross wrote:
> Document the interface between qemu and libxl regarding backends
> supported by qemu.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Konrad Rzeszutek Wilk
> ---
> v2: - replace variable Xenstore path parts
On Mon, Apr 11, 2016 at 11:50:25AM +0100, Ian Jackson wrote:
> Jan Beulich writes ("Re: REST MAINTAINERS feedback requested Was:Re:
> [Xen-devel] [PATCH v5 01/28] HYPERCALL_version_op. New hypercall mirroring
> XENVER_ but sane."):
> > On 08.04.16 at 19:41, wrote:
> > > The interface for the old
On Mon, Apr 11, 2016 at 02:33:33PM +0100, Julien Grall wrote:
> The SPCR does not specify if the interrupt is edge or level triggered.
> So the configuration needs to be hardcoded in the code.
>
> Based on the PL011 TRM (see 2.2.8 in ARM DDI 0183G), the interrupt generated
> will be active high. W
On Mon, Apr 11, 2016 at 02:33:36PM +0100, Julien Grall wrote:
> This part of the code will never be executed when the entry
> corresponds to the boot CPU.
>
> Also print an error message rather when arch_cpu_init has failed.
>
> Signed-off-by: Julien Grall
> Reviewed-by: Stefano Stabellini
> Re
On Mon, Apr 11, 2016 at 02:33:34PM +0100, Julien Grall wrote:
> Since the ACPI 6.0 errata document [1], the first entry in the MADT
> does not have to correspond to the boot CPU.
>
> Introduce a new variable to know if a MADT entry matching the boot CPU
> is found. Furthermore, it's not necessary
On Mon, Apr 11, 2016 at 02:33:35PM +0100, Julien Grall wrote:
> The variable enabled_cpus is used to know the number of CPU enabled in
> the MADT.
>
> Currently this variable is used to check the validity of the boot CPU.
> It will be considered invalid when "enabled_cpus > 1".
>
> However, this
On Mon, Apr 11, 2016 at 02:33:37PM +0100, Julien Grall wrote:
> It's helpful to spot any error without having to modify the hypervisor
> code.
>
> Signed-off-by: Julien Grall
> Reviewed-by: Stefano Stabellini
> Reviewed-by: Shannon Zhao
Applied.
___
On Mon, Apr 11, 2016 at 10:08:58AM -0400, Boris Ostrovsky wrote:
> On 04/11/2016 05:03 AM, Andrew Cooper wrote:
> >c/s f71ecb6 "x86: introduce a new VMASSIST for architectural behaviour of
> >iopl" shifted the vcpu iopl field by 12, but didn't update the logic which
> >reconstructs the guests eflag
On Fri, Apr 08, 2016 at 08:52:08AM +, Wu, Bob wrote:
>
> Sorry bother, I read the XEN source code recently, and found the XEN platform
> PCI code under drivers/xen/platform-pci.c,
> and I can't fully under this driver's affect, can anybody explain a little
> for me?
>
> Is the platform PCI
On Fri, Apr 08, 2016 at 03:11:23PM +0200, Dario Faggioli wrote:
> On Fri, 2016-04-08 at 14:00 +0100, George Dunlap wrote:
> > On 08/04/16 13:52, George Dunlap wrote:
> > > On 08/04/16 02:23, Dario Faggioli wrote:
> > > > Signed-off-by: Dario Faggioli
> > > Thanks!
> > >
> > > Reviewed-by: George
On Fri, Apr 08, 2016 at 04:13:56PM +0100, Ian Jackson wrote:
> Dario Faggioli writes ("[Xen-devel] [PATCH v3 00/11] Fixes and improvement
> (including hard affinity!) for Credit2"):
> > Now it's only these two patches that need being Acked:
> >
> > 04/11 xen: sched: close potential races when s
ter specific header file in time.h and to commonize it with the
> get_s_time() function. Also defined cycles_t as uint64_t to simplify
> casting.
>
> get_s_time() was also modified to now use the updated get_cycles() to
> retrieve the tick count instead of directly reading it.
>
> * A filesystem in Guest that is integrity-aware can prepare I/Os with
> metadata attached.
> * Filesystems in Guest are capable of transferring metadata from user space.
> Those metadata get lost if we don't pass them through in blkfront.
>
> You may have a look at:
> [1] http://lwn.net/Article
> *Hypervisor Maintainers*
>
> Jan, the hypervisor patches #2, #5-#17, #21-#23 need your Ack.
s/Ack./Ack please./
> *Are there any TODOs left from v5 or v6 reviews?*
>
> One I hope can be deferred - that is xensyms_read which we use in
> "[PATCH v7 12/24] xsplice,symbols: Implement symbol name re
On Mon, Apr 11, 2016 at 10:32:20AM -0400, Konrad Rzeszutek Wilk wrote:
> > *Hypervisor Maintainers*
> >
> > Jan, the hypervisor patches #2, #5-#17, #21-#23 need your Ack.
>
> s/Ack./Ack please./
> > *Are there any TODOs left from v5 or v6 reviews?*
> >
>
On Mon, Apr 11, 2016 at 09:44:55AM -0600, Jan Beulich wrote:
> >>> On 10.04.16 at 21:47, wrote:
> > That allows the size and offsets to be the same. I checked under ARM32
> > builds:
> >
> >
> > struct xsplice_patch_func_internal {
> > const char * name; /*
On Mon, Apr 11, 2016 at 09:53:06AM -0600, Jan Beulich wrote:
> >>> On 09.04.16 at 02:37, wrote:
> > On Fri, Apr 08, 2016 at 04:50:10PM -0600, Jan Beulich wrote:
> >> >>> On 09.04.16 at 00:45, wrote:
> >> > On Fri, Apr 08, 2016 at 03:18:09PM -0600, Jan Beulich wrote:
> >> >> >>> On 08.04.16 at 23:
On Mon, Apr 11, 2016 at 12:03:49PM -0400, Konrad Rzeszutek Wilk wrote:
> On Mon, Apr 11, 2016 at 09:53:06AM -0600, Jan Beulich wrote:
> > >>> On 09.04.16 at 02:37, wrote:
> > > On Fri, Apr 08, 2016 at 04:50:10PM -0600, Jan Beulich wrote:
> > >> >>&g
On Mon, Apr 11, 2016 at 05:25:04PM +0100, Ian Jackson wrote:
> Jan Beulich writes ("Re: REST MAINTAINERS feedback requested Was:Re:
> [Xen-devel] [PATCH v5 01/28] HYPERCALL_version_op. New hypercall mirroring
> XENVER_ but sane."):
> > On 11.04.16 at 16:22, wrote:
> > > But to an extent some of
On Mon, Apr 11, 2016 at 10:55:38AM -0600, Jan Beulich wrote:
> >>> On 11.04.16 at 18:34, wrote:
> > On Mon, Apr 11, 2016 at 12:03:49PM -0400, Konrad Rzeszutek Wilk wrote:
> >> On Mon, Apr 11, 2016 at 09:53:06AM -0600, Jan Beulich wrote:
> >> > >>&g
On Mon, Apr 11, 2016 at 06:59:23PM +0200, Dario Faggioli wrote:
> On Mon, 2016-04-11 at 17:38 +0100, George Dunlap wrote:
> > On 11/04/16 17:27, Dario Faggioli wrote:
> > >
> > > Commit 94734ab7c3f5 ("xen: sched: close potential races
> > > when switching scheduler to CPUs") buggily replaced a cal
On Mon, Apr 11, 2016 at 11:26:05AM -0600, Jan Beulich wrote:
> >>> On 11.04.16 at 19:08, wrote:
> > If the system admin continously tried to unload and load the patchset
> > then we certainly would spam.
> >
> > But the 'loading' is (or ought to) be a single event. The applying
> > or reverting m
On Mon, Apr 11, 2016 at 02:21:55PM -0400, Konrad Rzeszutek Wilk wrote:
> On Mon, Apr 11, 2016 at 11:26:05AM -0600, Jan Beulich wrote:
> > >>> On 11.04.16 at 19:08, wrote:
> > > If the system admin continously tried to unload and load the patchset
> &g
enabled_msrs[].
>
> Signed-off-by: Razvan Cojocaru
Reviewed-by: Konrad Rzeszutek Wilk
Thought should there be some .. dynamic mechanism to update
the MSR list? Or remove entries (or temporarily blacklist
the built-one ins), etc?
> ---
> xen/arch/x86/hvm/hvm.c | 14
On Apr 11, 2016 11:41 AM, "Jan Beulich" wrote:
>
> >>> On 10.04.16 at 04:45, wrote:
> > On Sat, Apr 09, 2016 at 10:36:00PM -0400, Konrad Rzeszutek Wilk wrote:
> >> On Thu, Apr 07, 2016 at 09:43:38AM -0600, Jan Beulich wrote:
> >> > >&g
201 - 300 of 3821 matches
Mail list logo