On Tue, Oct 09, 2018 at 07:58:12PM +0100, Wei Liu wrote:
> The function iommu_share_p2m_table is used by both ARM and x86 but
> hap_enabled macro is x86 only. Put the ASSERT under CONFIG_X86.
>
> Signed-off-by: Wei Liu
I had a patch to just remove the ASSERT, but that's fine also.
Reviewed-by:
flight 128561 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128561/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128513
build-armhf
On 10/10/2018 08:23, Ingo Molnar wrote:
>
> * Juergen Gross wrote:
>
>> In the non-EFI boot path the ACPI RSDP table is currently found via
>> either EBDA or by searching through low memory for the RSDP magic.
>> This requires the RSDP to be located in the first 1MB of physical
>> memory. Xen PV
* Juergen Gross wrote:
> In the non-EFI boot path the ACPI RSDP table is currently found via
> either EBDA or by searching through low memory for the RSDP magic.
> This requires the RSDP to be located in the first 1MB of physical
> memory. Xen PVH guests, however, get the RSDP address via the st
The boot loader version reported via sysfs is wrong in case of the
kernel being booted via the Xen PVH boot entry. it should be 2.12
(0x020c), but it is reported to be 2.18 (0x0212).
As the current way to set the version is error prone use the more
readable variant (2 << 8) | 12.
Cc: # 4.12
Sign
In the non-EFI boot path the ACPI RSDP table is currently found via
either EBDA or by searching through low memory for the RSDP magic.
This requires the RSDP to be located in the first 1MB of physical
memory. Xen PVH guests, however, get the RSDP address via the start of
day information block.
In
Xen PVH guests receive the address of the RSDP table from Xen. In order
to support booting a Xen PVH guest via Grub2 using the standard x86
boot entry we need a way for Grub2 to pass the RSDP address to the
kernel.
For this purpose expand the struct setup_header to hold the physical
address of the
In case the rsdp address in struct boot_params is specified don't try
to find the table by searching, but take the address directly as set
by the boot loader.
Signed-off-by: Juergen Gross
---
V3: use a generic retrieval function with a __weak annotated default
function (Ingo Molnar)
V4: chec
flight 128518 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128518/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stopfail like 128449
test-armhf-armhf-libvirt 14 sav
Hello,
I'm developing an application that runs in Dom0 and needs to read memory
from a guest given a guest address (for instance, reading RIP from the
guest CPU context and then reading the current instruction). I'm using
xenforeignmemory_map() to map the guest memory, but this function takes the
flight 128558 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128558/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128513
build-armhf
Hi Juergen,
I love your patch! Yet something to improve:
[auto build test ERROR on tip/x86/core]
[also build test ERROR on v4.19-rc7 next-20181009]
[if your patch is applied to the wrong git tree, please drop us a note to help
improve the system]
url:
https://github.com/0day-ci/linux
flight 128556 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128556/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128513
build-armhf
flight 128552 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128552/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128513
test-amd64-a
This run is configured for baseline tests only.
flight 75380 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75380/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm
flight 128506 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128506/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 15 guest-saverestore.2 fail REGR. vs.
128156
Tests w
flight 128546 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128546/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128513
test-amd64-a
branch xen-unstable-smoke
xenbranch xen-unstable-smoke
job build-arm64-xsm
testid xen-build
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git://xenbits.xen.org/xen.git
*** Found and reproduced problem changeset ***
Bug is in tree: xen git://xenbits.xen.org/xen.git
Bug introduced:
Lars,
This NIST document ("A Methodology for Determining Forensic Data Requirements
for Detecting Hypervisor Attacks" [1]) appears to be focused on the application
of LibVMI in some contexts. It is a NIST Interagency or Internal Report
(NISTIR) document with a narrower scope than other NIST pu
flight 128540 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128540/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128513
test-amd64-a
This run is configured for baseline tests only.
flight 75379 xen-4.11-testing real [real]
http://osstest.xensource.com/osstest/logs/75379/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
The function iommu_share_p2m_table is used by both ARM and x86 but
hap_enabled macro is x86 only. Put the ASSERT under CONFIG_X86.
Signed-off-by: Wei Liu
---
xen/drivers/passthrough/iommu.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passth
flight 128534 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128534/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128513
test-amd64-a
Hi all,
I added a NIST Security Paper to the agenda which is currently under review and
is full of inaccuracies and could potentially become very problematic to the
project and vendors using Xen if officially published by NIST without being
corrected (it needs responses by the end of week). I wi
On Tue, 9 Oct 2018 12:21:46 -0400
Boris Ostrovsky wrote:
> On 10/9/18 6:41 AM, Christian Borntraeger wrote:
> >
> >
> > On 10/09/2018 11:54 AM, Filippo Sironi wrote:
> >> Start populating /sys/hypervisor with KVM entries when we're running on
> >> KVM. This is to replicate functionality that'
flight 128504 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128504/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-1 50 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 127900
test-amd64-amd6
Hi,
I'm observing a huge performance drop for memcached workload on x86
with the following commit, which was merged to Linux kernel 4.5.
Before this patch, memcached overhead is about 113% (i.e. 13% slower
than native Linux) [1], but with this patch it becomes 175%. I
observed even bigger performa
On Tue, 2018-10-09 at 12:59 +0200, Milan Boberic wrote:
> Hi,
>
Hi Milan,
> I'm testing Xen Hypervisor 4.10 performance on UltraZed-EG board with
> carrier card.
> I created bare-metal application in Xilinx SDK.
> In bm application I:
>- start triple timer counter (ttc) which generates
Thanks for all the replies. I will work through them.
One remark now:
Am Mon, 1 Oct 2018 13:39:51 +0100
schrieb Andrew Cooper :
> > With the new option the host admin can decide how a domU should behave
> > when it is migrated across systems of the same class. Since there is
> > always some jitte
flight 128527 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128527/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128513
test-amd64-a
Hi. Thanks for taking the time to help.
Bastian Blank writes ("Re: [Pkg-xen-devel] Ill-advised use of xs_open flag
1UL<<2 by Debian"):
> On Tue, Oct 09, 2018 at 04:04:24PM +0100, Ian Jackson wrote:
> > The Debian Xen packages have had a very bad patch which I propose to
> > simply drop, with
On 10/9/18 6:41 AM, Christian Borntraeger wrote:
>
>
> On 10/09/2018 11:54 AM, Filippo Sironi wrote:
>> Start populating /sys/hypervisor with KVM entries when we're running on
>> KVM. This is to replicate functionality that's available when we're
>> running on Xen.
>>
>> Let's start with /sys/hyp
xenbus_va_dev_error() will try to write error messages to Xenstore
under the error//error node (with something like
"device/vbd/51872"). This will fail normally and another message
about this failure is added to dmesg.
I believe this is a remnant from very ancient times, as it was added
in the fi
Tamas: I saw it. Thank you
On 09/10/2018, 16:13, "Andrew Cooper" wrote:
On 09/10/18 15:53, Tamas K Lengyel wrote:
> On Tue, Oct 9, 2018 at 7:41 AM Lars Kurth wrote:
>> Hi all,
>>
>> ## Agenda
>> The agenda can be found at
https://docs.google.com/document/d/1ZfZ1SJRau
Hi Ian
On Tue, Oct 09, 2018 at 04:04:24PM +0100, Ian Jackson wrote:
> The Debian Xen packages have had a very bad patch which I propose to
> simply drop, with minor compatibility implications, unless someone
> can explain what it is for and why it is still needed, and/or has a
> better pla
> > >Ian, any objections?
>
> Sorry for dropping this. It's been a while!
No problem, Ian, we have this heads-up now.
>
> > >> > When a MSI interrupt is bound to a guest using
> > >> > xc_domain_update_msi_irq (XEN_DOMCTL_bind_pt_irq) the interrupt
> > >> > is left masked by default.
> > >> >
>
On 09/10/18 15:53, Tamas K Lengyel wrote:
> On Tue, Oct 9, 2018 at 7:41 AM Lars Kurth wrote:
>> Hi all,
>>
>> ## Agenda
>> The agenda can be found at
>> https://docs.google.com/document/d/1ZfZ1SJRauLrISiTLXzM0DPxQL8beNkAQS5MwLLNtRKc/edit?usp=sharing
>> The document is R/W already
> I've added
Scrubbing RAM during boot may take a long time on machines with lots
of RAM. Add 'idle' option to bootscrub which marks all pages dirty
initially so they will eventually be scrubbed in idle-loop on every
online CPU.
It's guaranteed that the allocator will return scrubbed pages by doing
eager scrub
On Tue, Oct 09, 2018 at 04:16:48PM +0100, George Dunlap wrote:
> On 10/09/2018 04:12 PM, Wei Liu wrote:
> > On Tue, Oct 02, 2018 at 04:49:26PM +0100, George Dunlap wrote:
> >> Commit 3b4adba ("tools/libxl: include scheduler parameters in the
> >> output of xl list -l") added scheduling parameters t
On 10/09/2018 04:12 PM, Wei Liu wrote:
> On Tue, Oct 02, 2018 at 04:49:26PM +0100, George Dunlap wrote:
>> Commit 3b4adba ("tools/libxl: include scheduler parameters in the
>> output of xl list -l") added scheduling parameters to the set of
>> information collected by libxl_retrieve_domain_configur
On 09/10/2018 12:25, Bharat Bhushan wrote:
Hi,
Hi Bharat,
-Original Message-
From: Julien Grall
Sent: Friday, October 5, 2018 6:51 PM
To: Bharat Bhushan ; Xen-
de...@lists.xenproject.org
Subject: Re: [Xen-devel] ARM64: PCIe in DOM0
Hi,
On 05/10/2018 12:06, Bharat Bhushan wrote:
On Tue, Oct 02, 2018 at 04:49:26PM +0100, George Dunlap wrote:
> Commit 3b4adba ("tools/libxl: include scheduler parameters in the
> output of xl list -l") added scheduling parameters to the set of
> information collected by libxl_retrieve_domain_configuration(), in
> order to report that informati
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 09 October 2018 15:57
> To: xen-devel@lists.xenproject.org
> Cc: Paul Durrant ; Jan Beulich
> ; Roger Pau Monne ; Wei Liu
> ; Kevin Tian
> Subject: [PATCH v2] x86/vtd: fix IOMMU share PT destruction path
>
> Commit
flight 128519 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128519/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a7ab1c315c3cf5e804897471e992655c9b5baa0f
baseline version:
ovmf d20ae95a13e851d56c661
tl;dr
The Debian Xen packages have had a very bad patch which I propose to
simply drop, with minor compatibility implications, unless someone
can explain what it is for and why it is still needed, and/or has a
better plan.
I have been going through delta queue in the Debian Xen package.
Commit 2916951c1 ("mm / iommu: include need_iommu() test in
iommu_use_hap_pt()") included need_iommu() in iommu_use_hap_pt and
91d4eca7add ("mm / iommu: split need_iommu() into has_iommu_pt() and
need_iommu_pt_sync()") made things finer grain by spliting need_iommu
into three states.
The destructi
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 09 October 2018 15:41
> To: Paul Durrant
> Cc: Wei Liu ; xen-devel@lists.xenproject.org; Jan
> Beulich ; Roger Pau Monne ; Kevin
> Tian
> Subject: Re: [PATCH] x86/vtd: fix IOMMU share PT destruction path
>
> On Tue
On Tue, Oct 9, 2018 at 7:41 AM Lars Kurth wrote:
>
> Hi all,
>
> ## Agenda
> The agenda can be found at
> https://docs.google.com/document/d/1ZfZ1SJRauLrISiTLXzM0DPxQL8beNkAQS5MwLLNtRKc/edit?usp=sharing
> The document is R/W already
I've added a last minute item I would like to discuss if po
On 09/10/2018 16:40, David Woodhouse wrote:
> On Mon, 2018-10-01 at 09:16 +0200, Juergen Gross wrote:
>> The Xen specific queue spinlock wait function has two issues which
>> could result in a hanging system.
>>
>> They have a similar root cause of clearing a pending wakeup of a
>> waiting vcpu and
On Tue, Oct 09, 2018 at 03:32:51PM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Wei Liu [mailto:wei.l...@citrix.com]
> > Sent: 09 October 2018 15:26
> > To: xen-devel@lists.xenproject.org
> > Cc: Jan Beulich ; Roger Pau Monne
> > ; Paul Durrant ; Wei Liu
> > ; Kevin Tian
> >
On Mon, 2018-10-01 at 09:16 +0200, Juergen Gross wrote:
> The Xen specific queue spinlock wait function has two issues which
> could result in a hanging system.
>
> They have a similar root cause of clearing a pending wakeup of a
> waiting vcpu and later going to sleep waiting for the just cleared
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 09 October 2018 15:26
> To: xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; Roger Pau Monne
> ; Paul Durrant ; Wei Liu
> ; Kevin Tian
> Subject: Re: [PATCH] x86/vtd: fix IOMMU share PT destruction path
>
> On Tue
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 09 October 2018 14:38
> To: Paul Durrant
> Cc: Wei Liu ; xen-devel@lists.xenproject.org; Kevin
> Tian ; Jan Beulich ; Roger Pau
> Monne
> Subject: Re: [PATCH] x86/vtd: fix IOMMU share PT destruction path
>
> On Tue
On Tue, Oct 09, 2018 at 11:42:17AM +0100, Wei Liu wrote:
> Commit 2916951c1 ("mm / iommu: include need_iommu() test in
> iommu_use_hap_pt()") included need_iommu() in iommu_use_hap_pt and
> 91d4eca7add (" mm / iommu: split need_iommu() into has_iommu_pt() and
> need_iommu_pt_sync()") made things fi
On Tue, Oct 09, 2018 at 03:06:32PM +0100, Andrew Cooper wrote:
> The unstable ABI version is 4.12, not 4.11
>
> Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mail
The unstable ABI version is 4.12, not 4.11
Signed-off-by: Andrew Cooper
---
CC: Ian Jackson
CC: Wei Liu
---
tools/xenstat/libxenstat/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/xenstat/libxenstat/Makefile
b/tools/xenstat/libxenstat/Makefile
index 8c6ddf8
On 05/10/18 18:29, Ian Jackson wrote:
> From: Bastian Blank
>
> libxenstat does not have a stable ABI. Set its version to the current
> Xen release version.
>
> Signed-off-by: Ian Jackson
> ---
> tools/xenstat/libxenstat/Makefile | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff
On 07/10/2018 22:05, Boris Ostrovsky wrote:
> Xend-based toolstacks don't have static-max entry in xenstore. The
> equivalent node for those toolstacks is memory_static_max.
>
> Fixes: 5266b8e4445c (xen: fix booting ballooned down hvm guest)
> Signed-off-by: Boris Ostrovsky
> Cc: # 4.13
Reviewe
> >Ian, any objections?
Sorry for dropping this. It's been a while!
> >> > When a MSI interrupt is bound to a guest using
> >> > xc_domain_update_msi_irq (XEN_DOMCTL_bind_pt_irq) the interrupt
> >> > is left masked by default.
> >> >
> >> > This causes problems with guests that first configure
>
Hi all,
## Agenda
The agenda can be found at
https://docs.google.com/document/d/1ZfZ1SJRauLrISiTLXzM0DPxQL8beNkAQS5MwLLNtRKc/edit?usp=sharing
The document is R/W already
But in a nutshell
* Admin Items: When to have winter meetings (DST effect)
* Open / Closed Actions from Previous c
Hi Stefano,
On 05/10/2018 19:47, Stefano Stabellini wrote:
Don't add duplicate boot modules (same kind and same start address),
they are freed later, we don't want to introduce double-free errors.
Introduce a domU flag in struct bootmodule and struct bootcmdline. Set
it for kernels and ramdisks
On Tue, Oct 09, 2018 at 01:58:14PM +0100, Wei Liu wrote:
> On Tue, Oct 09, 2018 at 12:38:41PM +0100, Paul Durrant wrote:
> > > -Original Message-
> > > From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> > > Of Paul Durrant
> > > Sent: 09 October 2018 12:23
> > > To:
On Tue, Oct 09, 2018 at 12:43:05AM -0600, Jan Beulich wrote:
> 56fff3e5e9 ("x86: nuke PV superpage option and code") has introduced a
> (luckily latent only) bug here, in that it didn't make reference
It seems that the bug was from the original superpage code -- see
put_spage_pages.
> dropping de
On 09/10/2018 15:22, Boris Ostrovsky wrote:
> On 10/9/18 6:54 AM, Juergen Gross wrote:
>> +
>> +u64 x86_default_get_root_pointer(void)
>> +{
>> +return boot_params.hdr.acpi_rsdp_addr;
>> +}
>
>
> Should we then update init_pvh_bootparams() with
>
> pvh_bootparams.hdr.acpi_rsdp_addr = pvh
On 05/10/2018 19:47, Stefano Stabellini wrote:
Introduce a new array to store the cmdline of each boot module. It is
separate from struct bootmodules. Remove the cmdline field from struct
boot_module. This way, kernels and initrds with the same address in
memory can share struct bootmodule (imp
On 10/9/18 6:54 AM, Juergen Gross wrote:
> +
> +u64 x86_default_get_root_pointer(void)
> +{
> + return boot_params.hdr.acpi_rsdp_addr;
> +}
Should we then update init_pvh_bootparams() with
pvh_bootparams.hdr.acpi_rsdp_addr = pvh_start_info.rsdp_paddr;
(and drop x86_init.acpi.get_root_po
>>> On 09.10.18 at 14:57, wrote:
> On Tue, Oct 09, 2018 at 12:22:34PM +0100, Paul Durrant wrote:
>> > -Original Message-
>> > From: Wei Liu [mailto:wei.l...@citrix.com]
>> > Sent: 09 October 2018 11:42
>> > To: xen-devel@lists.xenproject.org
>> > Cc: Jan Beulich ; Roger Pau Monne
>> > ; P
flight 128503 xen-4.11-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128503/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 10 debian-hvm-install
fail never pass
test-amd64-i386-xl
On Tue, Oct 09, 2018 at 12:38:41PM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> > Of Paul Durrant
> > Sent: 09 October 2018 12:23
> > To: Wei Liu ; xen-devel@lists.xenproject.org
> > Cc: Kevin Tian ; Wei Li
On Tue, Oct 09, 2018 at 12:22:34PM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Wei Liu [mailto:wei.l...@citrix.com]
> > Sent: 09 October 2018 11:42
> > To: xen-devel@lists.xenproject.org
> > Cc: Jan Beulich ; Roger Pau Monne
> > ; Paul Durrant ; Wei Liu
> > ; Kevin Tian
> >
On Tue, Oct 09, 2018 at 11:35:28AM +0200, Juergen Gross wrote:
> On 15/02/2018 13:02, Daniel Kiper wrote:
> > Hi Juergen,
> >
> > Sorry for huge delay. It looks that I am recovering slowly and
> > probably I will have more time for reviews.
> >
> > On Wed, Nov 29, 2017 at 02:46:42PM +0100, Juergen
Hi Jan,
On 09/10/2018 12:43, Jan Beulich wrote:
On 09.10.18 at 12:16, wrote:
On 09/10/2018 08:04, Jan Beulich wrote:
On 08.10.18 at 20:33, wrote:
This patch adds a new per-arch helper is introduced to perform actions just
before the guest is first unpaused. This will be used to invalidate t
Hi Stefano,
On 05/10/2018 19:47, Stefano Stabellini wrote:
Add a new document to provide information on how to use dom0less related
features and their current limitations.
Signed-off-by: Stefano Stabellini
---
Changes in v4:
- rename to .txt
- improve wording
Changes in v3:
- add patch
---
>>> On 09.10.18 at 12:16, wrote:
> On 09/10/2018 08:04, Jan Beulich wrote:
> On 08.10.18 at 20:33, wrote:
>>> This patch adds a new per-arch helper is introduced to perform actions just
>>> before the guest is first unpaused. This will be used to invalidate the
>>> P2M to track access from th
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> Of Paul Durrant
> Sent: 09 October 2018 12:23
> To: Wei Liu ; xen-devel@lists.xenproject.org
> Cc: Kevin Tian ; Wei Liu ; Jan
> Beulich ; Roger Pau Monne
> Subject: Re: [Xen-devel] [PATCH] x8
Hi Andrew,
On 05/10/2018 15:54, Andrew Cooper wrote:
This reverts commit 703d9d5ec13a0f487e7415174ba54e0e3ca158db. The domain
creation logic has been adjusted to set up d->max_vcpus early enough to be
usable in vgic_v3_domain_init().
Signed-off-by: Andrew Cooper
---
CC: Stefano Stabellini
CC
Hi Andrew,
On 05/10/2018 15:54, Andrew Cooper wrote:
The purpose of this is to move the auduting to be earlier than
arch_domain_create().
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Stefano Stabellini
CC: Julien Grall
The max_vcpus setting for GIC_V3 is somewhat confu
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 09 October 2018 11:42
> To: xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; Roger Pau Monne
> ; Paul Durrant ; Wei Liu
> ; Kevin Tian
> Subject: [PATCH] x86/vtd: fix IOMMU share PT destruction path
>
> Commit 291
On Tue 09-10-18 15:24:13, Arun KS wrote:
> On 2018-10-09 14:59, Michal Hocko wrote:
> > On Fri 05-10-18 13:40:05, Arun KS wrote:
> > > When free pages are done with higher order, time spend on
> > > coalescing pages by buddy allocator can be reduced. With
> > > section size of 256MB, hot add latenc
Add the modifications to the build system needed to build a xenpvh
grub.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
gentpl.py | 4 ++--
grub-core/Makefile.am | 12
grub-core/Makefile.core.def | 35 +++
3 files
In order to support grub2 in Xen PVH environment some additional Xen
headers are needed as grub2 will be started in PVH mode requiring to
use several HVM hypercalls and structures.
Add the needed headers from Xen 4.10 being the first Xen version with
full (not only experimental) PVH guest support.
From: Hans van Kranenburg
This solves the build failing with "Error: no symbol table and no
.moddeps section"
Also see:
- 6371e9c10433578bb236a8284ddb9ce9e201eb59
- https://savannah.gnu.org/bugs/?49012
Signed-off-by: Hans van Kranenburg
---
V2: new patch
Signed-off-by: Juergen Gross
---
util
Support mkimage for xenpvh.
In order to avoid using plain integers for the ELF notes use the
available Xen include instead. While at it replace the plain numbers
for Xen PV mode, too.
Signed-off-by: Juergen Gross
---
V2: some style adjustments (Daniel Kiper)
use defines for elf-notes (Daniel
Initialize the needed Xen specific data. This is:
- the Xen start of day page containing the console and Xenstore ring
page PFN and event channel
- the grant table
- the shared info page
Set the RSDP address for the guest from the start_info page passed
as boot parameter.
Signed-off-by: Juerge
Add xenpvh support to grub-install.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
include/grub/util/install.h | 1 +
util/grub-install-common.c | 1 +
util/grub-install.c | 7 +++
3 files changed, 9 insertions(+)
diff --git a/include/grub/util/install.h b/include/grub
Xen PVH guests will have the RSDP at an arbitrary address. Support that
by passing the RSDP address via the boot parameters to Linux.
The new protocol version 2.14 requires to set version to 0x8000 ored
with the actually use protocol version (the minimum of the kernel
supplied protocol version and
flight 128505 xen-4.10-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/128505/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 6 xen-buildfail REGR. vs. 128108
build-arm64
include/grub/offsets.h needs some defines for Xen PVH mode.
Add them. While at it line up the values in the surrounding lines to
start at the same column.
Signed-off-by: Juergen Gross
---
include/grub/offsets.h | 21 -
1 file changed, 12 insertions(+), 9 deletions(-)
diff -
Support platform i386/xenpvh in configure.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
configure.ac | 3 +++
1 file changed, 3 insertions(+)
diff --git a/configure.ac b/configure.ac
index 5e63c4af3..96d81a3f2 100644
--- a/configure.ac
+++ b/configure.ac
@@ -151,6 +151,7 @@ case
Add the needed code to setup the hypercall page for calling into the
Xen hypervisor.
Signed-off-by: Juergen Gross
---
grub-core/kern/i386/xen/pvh.c | 70 +++
1 file changed, 70 insertions(+)
diff --git a/grub-core/kern/i386/xen/pvh.c b/grub-core/kern/i386
Add all usable memory regions to grub memory management and add the
needed mmap iterate code.
As we are running in 32-bit mode don't add memory above 4GB.
Signed-off-by: Juergen Gross
---
grub-core/kern/i386/xen/pvh.c | 35 +++
1 file changed, 35 insertions(+)
d
Add the code for the Xen PVH mode boot entry.
Signed-off-by: Juergen Gross
---
grub-core/kern/i386/xen/startup_pvh.S | 50 +++
1 file changed, 50 insertions(+)
diff --git a/grub-core/kern/i386/xen/startup_pvh.S
b/grub-core/kern/i386/xen/startup_pvh.S
index e18ee
This patch series adds support for booting Linux as PVH guest.
Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh
platform grub is booted as a standalone image directly by Xen.
For booting Linux kernel it is using the standard linux kernel
loader. The only modification of the linux
Add the hooks to current code needed for Xen PVH.
Signed-off-by: Juergen Gross
---
grub-core/kern/i386/xen/pvh.c | 36 +++
grub-core/kern/i386/xen/startup_pvh.S | 29
grub-core/kern/xen/init.c | 6 ++
include/g
Some common code needs to be special cased for Xen PVH mode. This hits
mostly Xen PV mode specific areas.
Signed-off-by: Juergen Gross
---
grub-core/kern/i386/tsc.c | 2 +-
include/grub/i386/pc/int.h| 3 +++
include/grub/i386/tsc.h | 2 +-
include/grub/i386/xen/hypercal
Xen PVH mode needs some headers including the common i386 headers.
Add those to the tree.
Signed-off-by: Juergen Gross
---
include/grub/i386/xenpvh/boot.h| 1 +
include/grub/i386/xenpvh/console.h | 1 +
include/grub/i386/xenpvh/int.h | 1 +
include/grub/i386/xenpvh/memory.h | 1 +
inclu
Initialize the grant tab in a dedicated function. This will enable
using it for PVH guests, too.
Call the new function from grub_machine_init() as this will later
be common between Xen PV and Xen PVH mode.
Signed-off-by: Juergen Gross
---
V2: update commit message (Daniel Kiper)
---
grub-core/k
Rearrange grub-core/kern/xen/init.c to prepare adding PVH mode support
to it. This includes putting some code under #ifdef GRUB_MACHINE_XEN
as it will not be used when running as PVH.
Signed-off-by: Juergen Gross
---
grub-core/kern/xen/init.c | 60 +++
Retrieve the memory map from the hypervisor and normalize it to contain
no overlapping entries and to be sorted by address.
Signed-off-by: Juergen Gross
---
grub-core/kern/i386/xen/pvh.c | 98 +++
1 file changed, 98 insertions(+)
diff --git a/grub-core/ke
On 09/10/18 07:43, Jan Beulich wrote:
> 56fff3e5e9 ("x86: nuke PV superpage option and code") has introduced a
> (luckily latent only) bug here, in that it didn't make reference
> dropping dependent on whether the page was mapped writable. The only
> current source of large page mappings for PV dom
1 - 100 of 140 matches
Mail list logo