")
Reported-by: Luca Fancellu
Signed-off-by: Juergen Gross
---
V2:
- switch parameter name as well (Andrew Cooper)
---
tools/libs/guest/xg_dom_boot.c | 14 +++---
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/tools/libs/guest/xg_dom_boot.c b/tools/libs/guest/xg_do
Some MSR access helpers are redundant now, so remove the no longer
needed ones.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/msr.h | 14 ++
arch/x86/xen/enlighten_pv.c | 4 ++--
2 files changed, 4 insertions(+), 14 deletions(-)
diff --git a/arch/x86/include/asm/msr.h b
of the
native_*() functions would lose the related tracing entries.
Note that the Xen related MSR access functions will not be switched,
as these will be handled after the move of the trace hooks.
Signed-off-by: Juergen Gross
Acked-by: Sean Christopherson
Acked-by: Wei Liu
---
arch/x86/hyperv
---
include/xen/xen.h | 9 -
20 files changed, 101 insertions(+), 76 deletions(-)
Jason Andryuk (3):
xen/events: Cleanup find_virq() return codes
xen/events: Return -EEXIST for bound VIRQs
xen/events: Update virq_to_irq on migration
Juergen Gross (3
On 26.09.25 09:17, Igor Korkin wrote:
Hi all,
I'm observing a steady and abnormal increase in the `nr_cpu` value
reported by the `credit` Xen scheduler
(visible via `sudo xl dmesg; sudo xl debug-keys r`).
This behavior occurs consistently when the system is subjected to
heavy synthetic load (e
On 26.09.25 07:49, Jan Beulich wrote:
On 25.09.2025 22:22, Oleksii Kurochko wrote:
On 9/25/25 8:26 AM, Jan Beulich wrote:
On 24.09.2025 11:36, Oleksii Kurochko wrote:
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -14,6 +14,7 @@ The format is based on [Keep a
Changelog](https://keepachangelog.com/e
your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]
url:
https://github.com/intel-lab-lkp/linux/commits/Juergen-Gross/x86-paravirt-
/paravirt.h for those archs, while this is not necessary for arm
any longer.
Signed-off-by: Juergen Gross
Acked-by: Peter Zijlstra (Intel)
---
arch/arm/Kconfig| 1 +
arch/arm/include/asm/paravirt.h | 18 --
arch/arm/kernel/Makefile| 1 -
arch/arm/kernel
Instead of having a pre-filled array xen_mmu_ops for Xen PV paravirt
functions, drop the array and assign each element individually.
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
arch/x86/xen/mmu_pv.c | 100 --
tools/objtool/check.c | 1 -
2
In some places asm/paravirt.h is included without really being needed.
Remove the related #include statements.
Signed-off-by: Juergen Gross
Acked-by: Peter Zijlstra (Intel)
---
arch/x86/entry/entry_64.S | 1 -
arch/x86/entry/vsyscall/vsyscall_64.c | 1 -
arch/x86/hyperv
with a new config option
CONFIG_HAVE_PV_STEAL_CLOCK_GEN, which can be selected by an arch
in case it wants to use that common variant.
Signed-off-by: Juergen Gross
Acked-by: Peter Zijlstra (Intel)
---
arch/Kconfig | 3 +++
arch/arm/include/asm/paravirt.h| 4
The only user of paravirt_sched_clock() is in tsc.c, so move the code
from paravirt.c and paravirt.h to tsc.c.
Signed-off-by: Juergen Gross
Acked-by: Peter Zijlstra (Intel)
---
arch/x86/include/asm/paravirt.h| 12
arch/x86/include/asm/timer.h | 1 +
arch/x86/kernel
Instead of having a pre-filled array xen_cpu_ops for Xen PV paravirt
functions, drop the array and assign each element individually.
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
arch/x86/xen/enlighten_pv.c | 82 +++--
tools/objtool/check.c | 1 -
2
Remove the arch specific variant of paravirt_steal_clock() and use
the common one instead.
With all archs supporting Xen now having been switched to the common
variant, including paravirt.h can be dropped from drivers/xen/time.c.
Signed-off-by: Juergen Gross
Acked-by: Peter Zijlstra (Intel
Instead of having a pre-filled array xen_irq_ops for Xen PV paravirt
functions, drop the array and assign each element individually.
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
arch/x86/xen/irq.c| 20 +++-
tools/objtool/check.c | 1 -
2 files changed, 7 insertions
Instead of having the pv spinlock function definitions in paravirt.h,
move them into the new header paravirt-spinlock.h.
Signed-off-by: Juergen Gross
---
V2:
- use new header instead of qspinlock.h
- use dedicated pv_ops_lock array
- move more paravirt related lock code
---
arch/x86/hyperv
15-17.
Patches 18-20 are doing the real preparations for multiple pv_ops
arrays and using those arrays in multiple headers.
- Patch 21 is an example how the new scheme can look like using the
PV-spinlocks.
Changes in V2:
- new patches 13-18 and 20
- complete rework of patch 21
Juergen Gros
The only user of paravirt_sched_clock() is in tsc.c, so move the code
from paravirt.c and paravirt.h to tsc.c.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/paravirt.h| 12
arch/x86/include/asm/timer.h | 1 +
arch/x86/kernel/kvmclock.c | 1 +
arch/x86
Remove the arch specific variant of paravirt_steal_clock() and use
the common one instead.
With alol archs supporting Xen now having been switched to the common
variant, including paravirt.h can be dropped from drivers/xen/time.c.
Signed-off-by: Juergen Gross
---
arch/x86/Kconfig
/paravirt.h for those archs, while this is not necessary for arm
any longer.
Signed-off-by: Juergen Gross
---
arch/arm/Kconfig| 1 +
arch/arm/include/asm/paravirt.h | 18 --
arch/arm/kernel/Makefile| 1 -
arch/arm/kernel/paravirt.c | 20
paravirt.h into the headers where their
native counterparts are defined. This is meant to keep the native
and paravirt function definitions together in one place and
hopefully to be able to reduce the include hell with paravirt.
Juergen Gross (14):
x86/paravirt: remove not needed includes of
with a new config option
CONFIG_HAVE_PV_STEAL_CLOCK_GEN, which can be selectd by an arch
in case it wants to use that common variant.
Signed-off-by: Juergen Gross
---
arch/Kconfig | 3 +++
arch/arm/include/asm/paravirt.h| 4
arch/arm/kernel/paravirt.c
In some places asm/paravirt.h is included without really being needed.
Remove the related #include statements.
Signed-off-by: Juergen Gross
---
arch/x86/entry/entry_64.S | 1 -
arch/x86/entry/vsyscall/vsyscall_64.c | 1 -
arch/x86/hyperv/hv_spinlock.c | 1 -
arch/x86
On 09.09.25 11:07, David Hildenbrand wrote:
On 08.09.25 09:39, Kevin Brodsky wrote:
arch_{enter,leave}_lazy_mmu_mode() currently have a stateless API
(taking and returning no value). This is proving problematic in
situations where leave() needs to restore some context back to its
original state
On 8/20/25 08:05, Juergen Gross wrote:
Ping?
On 30.07.25 14:23, Juergen Gross wrote:
Live update is now working with the PVH variant of xenstore-stubdom.
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
SUPPORT.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a
On 02.09.25 14:22, Juergen Gross wrote:
On 02.09.25 12:56, Manuel Bouyer wrote:
On Tue, Sep 02, 2025 at 11:44:36AM +0100, Andrew Cooper wrote:
On 02/09/2025 11:17 am, Manuel Bouyer wrote:
Hello,
I'm trying to boot a NetBSD PVH dom0 on Xen 4.20.
The same NetBSD kernel works fine with Xen
make it non-fatal to avoid trying to look up the irq, since we don't
know which per_cpu(virq_to_irq) it will be in.
Cc: sta...@vger.kernel.org
Signed-off-by: Jason Andryuk
Reviewed-by: Juergen Gross
Juergen
OpenPGP_0xB0DE9DD628BF132F.asc
Description: OpenPGP publi
.
So, remove this indirection through XEN_SAVE_RESTORE and select
HIBERNATE_CALLBACKS directly. Also, drop the XEN_SAVE_RESTORE from the x86
xen config fragment.
No functional change intended with this clean-up.
Signed-off-by: Lukas Bulwahn
Reviewed-by: Juergen Gross
Ju
k.
Make xen_rebind_evtchn_to_cpu() update the per_cpu virq_to_irq mappings
to keep them update to date with the current cpu. This ensures the
correct virq_to_irq is cleared in __unbind_from_irq().
Fixes: e46cdb66c8fc ("xen: event channels")
Cc: sta...@vger.kernel.org
Signed-off-by: Jason Andryuk
Reviewed
On 02.09.25 12:56, Manuel Bouyer wrote:
On Tue, Sep 02, 2025 at 11:44:36AM +0100, Andrew Cooper wrote:
On 02/09/2025 11:17 am, Manuel Bouyer wrote:
Hello,
I'm trying to boot a NetBSD PVH dom0 on Xen 4.20.
The same NetBSD kernel works fine with Xen 4.18
The boot options are:
menu=Boot netbsd-cu
without CONFIG_XEN_PV, and the usage of
static-keys for selecting the correct code path otherwise.
Juergen Gross (3):
xen: rework xen_pv_domain()
xen: replace XENFEAT_auto_translated_physmap with xen_pv_domain()
drivers/xen/gntdev: use xen_pv_domain() instead of cached value
arch/x86/include
Eliminate the use_ptemod variable by replacing its use cases with
xen_pv_domain().
Instead of passing the xen_pv_domain() return value to
gntdev_ioctl_dmabuf_exp_from_refs(), use xen_pv_domain() in that
function.
Signed-off-by: Juergen Gross
---
drivers/xen/gntdev-dmabuf.c | 7
limination.
Set the X86_FEATURE_XENPV feature very early, as xen_pv_domain() is
used rather early, too.
Signed-off-by: Juergen Gross
---
arch/x86/xen/enlighten_pv.c | 2 +-
include/xen/xen.h | 9 -
2 files changed, 9 insertions(+), 2 deletions(-)
diff --git a/arch/x86/xen/enligh
Instead of testing the XENFEAT_auto_translated_physmap feature, just
use !xen_pv_domain() which is equivalent.
This has the advantage that a kernel not built with CONFIG_XEN_PV
will be smaller due to dead code elimination.
Signed-off-by: Juergen Gross
---
arch/x86/include/asm/xen/page.h
/hypercall.h | 5 +++--
drivers/xen/xenbus/xenbus_xs.c | 23 ---
include/linux/compiler.h | 8
3 files changed, 3 insertions(+), 33 deletions(-)
Jan Beulich (1):
compiler: remove __ADDRESSABLE_ASM{_STR,}() again
Juergen Gross (1):
drivers/xen
ould have been zero from the start.
I think this one is better. Either with or without the Fixes: tag changed:
Reviewed-by: Juergen Gross
Juergen
OpenPGP_0xB0DE9DD628BF132F.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
Avoid dereferencing NULL in introduce_domain() when called during
live update.
Coverity ID: 1665111
Fixes: f78895ad78c9 ("tools/xenstored: Read event channel from xenstored page")
Signed-off-by: Juergen Gross
---
tools/xenstored/domain.c | 2 +-
1 file changed, 1 insertion(+),
On 20.08.25 11:18, Dmytro Prokopchuk1 wrote:
On 7/30/25 01:09, Stefano Stabellini wrote:
On Fri, 25 Jul 2025, Dmytro Prokopchuk1 wrote:
On 7/23/25 16:58, Jan Beulich wrote:
On 23.07.2025 12:12, Dmytro Prokopchuk1 wrote:
--- a/automation/eclair_analysis/ECLAIR/deviations.ecl
+++ b/automation
Ping?
On 30.07.25 14:23, Juergen Gross wrote:
Live update is now working with the PVH variant of xenstore-stubdom.
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
SUPPORT.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/SUPPORT.md b/SUPPORT.md
index 6a82a92189
Ping?
On 30.07.25 14:23, Juergen Gross wrote:
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
CHANGELOG.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 5f31ca08fe..d118bb1c8c 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -26,6 +26,7 @@ The
+ Release Manager
On 15.08.25 16:32, Juergen Gross wrote:
In order to be able to use "xl info" before Xenstore has been started
or after it has crashed, hide obtaining the available Xenstore features
behind the new option "-x".
Fixes: ecce7970cfe7 ("tools/xl: add avail
: Andrew Cooper
Signed-off-by: Juergen Gross
---
docs/man/xl.1.pod.in | 4
docs/man/xl.cfg.5.pod.in | 2 +-
tools/xl/xl_info.c | 14 ++
3 files changed, 15 insertions(+), 5 deletions(-)
diff --git a/docs/man/xl.1.pod.in b/docs/man/xl.1.pod.in
index fe38724b2b..88ccf7a
The kernel is not supported to run as a Xen guest on Xen versions
older than 4.0.
Remove xen_strict_xenbus_quirk() which is testing the Xen version to be
at least 4.0.
Signed-off-by: Juergen Gross
---
drivers/xen/xenbus/xenbus_xs.c | 23 ---
1 file changed, 23 deletions
Add the Xenstore feature value to the output of "xl info" in order to
prepare for a future capability to limit Xenstore features visible by
a guest.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
Acked-by: Anthony PERARD
---
tools/xl/Makefile | 3 ++-
tools/xl/xl_i
Add a guest config parameter "xenstore_feature_mask" allowing to limit
the Xenstore features the guest can see and use. This can be needed in
order to allow migrating a guest to a host running a Xenstore version
providing less features than the source host.
Signed-off-by: Juergen Gross
). Oxenstored is not covered.
Changes in V2:
- added Jason's Reviewed-by: tags
- a small fix of patch 4
Changes in V3:
- patches 1-5 have gone in already
- 2 fixes in patch
Juergen Gross (2):
tools/xl: add available Xenstore features to xl info output
tools: allow to limit xenstore features via
Live update is now working with the PVH variant of xenstore-stubdom.
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
SUPPORT.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/SUPPORT.md b/SUPPORT.md
index 6a82a92189..eb44ee85fd 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
CHANGELOG.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 5f31ca08fe..d118bb1c8c 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -26,6 +26,7 @@ The format is based on [Keep a
Changelog](https
In order to reactivate an event channel after kexec() of Mini-OS,
libxenevtchn needs to allocate the port data for the event channel
and set the handler again. Add a new interface xenevtchn_bind()
for that purpose, available under Mini-OS only.
Signed-off-by: Juergen Gross
Reviewed-by: Jason
Pass the live_update bool to stubdom_init() in order to be able to
handle it properly under Mini-OS.
As stubdom_init() will (re-)create the 9pfs device needed for
reading the saved state, call stubdom_init() before lu_read_state().
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
After performing a live update in stubdom environment some information
about inter-domain event channels is lost. In order to set this
information again, call xenevtchn_bind() from new_domain() in the
restore case.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
tools/xenstored
With Mini-OS now supporting the O_CLOEXEC flag for the kexec case,
set the related cloexec flag in minios.c.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
Acked-by: Anthony PERARD
---
tools/libs/gnttab/minios.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/libs/gnttab
e exceeding 4GB.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
V2:
- move to start of series
V3:
- change offset to off64_t and size to size_t (Andrew Cooper)
---
tools/xenstored/lu.c | 97 +++-
1 file changed, 60 insertions(+), 37 deletions(-
When running in a stubdom environment xenevtchn_fdopen() won't work,
as any file descriptor state is lost across kexec().
Use a wrapper to replace the call of xenevtchn_fdopen() with the
really needed xenevtchn_open() when running on top of Mini-OS.
Signed-off-by: Juergen Gross
Review
With Mini-OS now supporting O_CLOEXEC for the kexec case, no longer
ignore the XENEVTCHN_NO_CLOEXEC flag in minios.c.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
Acked-by: Anthony PERARD
---
tools/libs/evtchn/minios.c | 6 ++
1 file changed, 2 insertions(+), 4 deletions
1 and 5
Juergen Gross (9):
xenstored: use fread() instead of mmap() for reading live update state
libevtchn: add O_CLOEXEC support for Mini-OS
libxengnttab: set the cloexec flag on Mini-OS
xenstored: don't use xenevtchn_fdopen() in stubdom
tools/libxenevtchn: add xenevtchn_bind()
On 30.07.25 08:18, Jürgen Groß wrote:
On 29.07.25 21:25, Andrew Cooper wrote:
On 29/07/2025 8:21 pm, Andrew Cooper wrote:
On 29/07/2025 12:01 pm, Juergen Gross wrote:
diff --git a/tools/xenstored/lu.c b/tools/xenstored/lu.c
index 77e0d377c5..f2c8b92d07 100644
--- a/tools/xenstored/lu.c
+++ b
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
CHANGELOG.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 5f31ca08fe..d118bb1c8c 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -26,6 +26,7 @@ The format is based on [Keep a
Changelog](https
Live update is now working with the PVH variant of xenstore-stubdom.
Signed-off-by: Juergen Gross
---
V2:
- new patch
---
SUPPORT.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/SUPPORT.md b/SUPPORT.md
index 6a82a92189..eb44ee85fd 100644
--- a/SUPPORT.md
+++ b/SUPPORT.md
After performing a live update in stubdom environment some information
about inter-domain event channels is lost. In order to set this
information again, call xenevtchn_bind() from new_domain() in the
restore case.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
tools/xenstored
Pass the live_update bool to stubdom_init() in order to be able to
handle it properly under Mini-OS.
As stubdom_init() will (re-)create the 9pfs device needed for
reading the saved state, call stubdom_init() before lu_read_state().
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
When running in a stubdom environment xenevtchn_fdopen() won't work,
as any file descriptor state is lost across kexec().
Use a wrapper to replace the call of xenevtchn_fdopen() with the
really needed xenevtchn_open() when running on top of Mini-OS.
Signed-off-by: Juergen Gross
Review
small performance impact for the daemon live update case, but it
should be neglectable.
Changes in V2:
- rebase
- former patches 1 and 2 have been committed already
- former patch 5 moved to start of the series (has all needed Acks)
- new patches 8 and 9
Juergen Gross (9):
xenstored: use fread
With Mini-OS now supporting O_CLOEXEC for the kexec case, no longer
ignore the XENEVTCHN_NO_CLOEXEC flag in minios.c.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
tools/libs/evtchn/minios.c | 6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/tools/libs
In order to reactivate an event channel after kexec() of Mini-OS,
libxenevtchn needs to allocate the port data for the event channel
and set the handler again. Add a new interface xenevtchn_bind()
for that purpose, available under Mini-OS only.
Signed-off-by: Juergen Gross
Reviewed-by: Jason
With Mini-OS now supporting the O_CLOEXEC flag for the kexec case,
set the related cloexec flag in minios.c.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
tools/libs/gnttab/minios.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/libs/gnttab/minios.c b/tools/libs/gnttab
Mini-OS doesn't support using mmap() for accessing a file. In order
to support reading the live update state from a 9pfs based file, use
fread() instead of mmap().
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
V2:
- move to start of series
---
tools/xenstored/lu.c
Use the newest Mini-OS.
Signed-off-by: Juergen Gross
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index 20e4382ef8..7edbab8efe 100644
--- a/Config.mk
+++ b/Config.mk
@@ -208,7 +208,7 @@ QEMU_UPSTREAM_URL ?=
https://xenbits.xen.org/git
Add a small pool of statically allocated memory pages to be handed out
for very early page table allocations.
This will make it possible to do virtual allocations e.g. for mapping
the shared info page.
Signed-off-by: Juergen Gross
---
V2:
- add comment (Jan Beulich)
- drop N_PT in favor of
There is no need to use a populated memory page for mapping the shared
info page at that location. Just use an allocated virtual address for
the shared info page. For PVH allocate an unused pfn.
Signed-off-by: Juergen Gross
---
V2:
- don't leak virtual page in map_shared_page() (Jan Be
the RAM areas,
resulting in a net win of one memory page.
Changes in V2:
- addressed comments by Jan
Juergen Gross (2):
mm: provide a way to do very early page table allocations
x86: don't use a memory page for mapping the shared info page
arch/x86/mm.c | 20
):
xen/netfront: Fix TX response spurious interrupts
Dr. David Alan Gilbert (1):
xen: Remove some deadcode (x)
Juergen Gross (1):
xen/gntdev: remove struct gntdev_copy_batch from stack
Peng Jiang (1):
xen/xenbus: fix W=1 build warning in xenbus_va_dev_error function
Ryan Chung (1
Add a guest config parameter "xenstore_feature_mask" allowing to limit
the Xenstore features the guest can see and use. This can be needed in
order to allow migrating a guest to a host running a Xenstore version
providing less features than the source host.
Signed-off-by: Juergen Gross
Add support for XS_SET_FEATURE and XS_GET_FEATURE to xenstored.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
tools/xenstored/core.c | 4 +++
tools/xenstored/domain.c | 60
tools/xenstored/domain.h | 8 ++
3 files changed, 72
now only version 1 is supported.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
tools/xenstored/control.c | 6 ++---
tools/xenstored/lu.c| 21 ++-
tools/xenstored/lu.h| 1 +
tools/xs-clients/xenstore_control.c | 41
he current known
one.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
tools/xenstored/control.c| 2 +-
tools/xenstored/lu.c | 2 +-
tools/xenstored/xenstore_state.h | 31 ++-
3 files changed, 32 insertions(+), 3 deletions(-)
diff --g
). Oxenstored is not covered.
Changes in V2:
- added Jason's Reviewed-by: tags
- a small fix of patch 4
Juergen Gross (7):
tools/libs/store: add get- and set-feature related functions
tools/xenstored: support specification of migration stream version
tools/xenstored: add missing migration r
Add the Xenstore feature value to the output of "xl info" in order to
prepare for a future capability to limit Xenstore features visible by
a guest.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
tools/xl/Makefile | 3 ++-
tools/xl/xl_info.c | 22 +
features to guests by setting the appropriate
bits in the ring page.
Signed-off-by: Juergen Gross
---
V2:
- move setting interface->server_features to introduce_domain()
---
tools/xenstored/domain.c | 60 +++-
tools/xenstored/domain.h | 3 ++
tools/xenstored/l
specific
domain.
xs_set_features_domain(): set the features available for a specific
domain.
Signed-off-by: Juergen Gross
Reviewed-by: Jason Andryuk
---
tools/include/xenstore.h | 13 +
tools/libs/store/Makefile| 2 +-
tools/libs/store/libxenstore.map | 6
tools
On 25.07.25 07:18, Jürgen Groß wrote:
On 25.07.25 00:48, Jason Andryuk wrote:
On 2025-07-22 10:06, Juergen Gross wrote:
Add per domain server features, which are initialized by the supported
features at domain introduction, or by live update from the migration
stream. This requires to add
Add a guest config parameter "xenstore_feature_mask" allowing to limit
the Xenstore features the guest can see and use. This can be needed in
order to allow migrating a guest to a host running a Xenstore version
providing less features than the source host.
Signed-off-by: Juergen Gross
Add the Xenstore feature value to the output of "xl info" in order to
prepare for a future capability to limit Xenstore features visible by
a guest.
Signed-off-by: Juergen Gross
---
tools/xl/Makefile | 3 ++-
tools/xl/xl_info.c | 22 ++
2 files changed, 24 insert
features to guests by setting the appropriate
bits in the ring page.
Signed-off-by: Juergen Gross
---
tools/xenstored/domain.c | 71
tools/xenstored/domain.h | 3 ++
tools/xenstored/lu.c | 14 ++--
tools/xenstored/lu.h | 2 +-
4 files changed, 80
Add support for XS_SET_FEATURE and XS_GET_FEATURE to xenstored.
Signed-off-by: Juergen Gross
---
tools/xenstored/core.c | 4 +++
tools/xenstored/domain.c | 60
tools/xenstored/domain.h | 8 ++
3 files changed, 72 insertions(+)
diff --git a/tools
now only version 1 is supported.
Signed-off-by: Juergen Gross
---
tools/xenstored/control.c | 6 ++---
tools/xenstored/lu.c| 21 ++-
tools/xenstored/lu.h| 1 +
tools/xs-clients/xenstore_control.c | 41 ++---
4 files
specific
domain.
xs_set_features_domain(): set the features available for a specific
domain.
Signed-off-by: Juergen Gross
---
tools/include/xenstore.h | 13 +
tools/libs/store/Makefile| 2 +-
tools/libs/store/libxenstore.map | 6
tools/libs/store/xs.c
he current known
one.
Signed-off-by: Juergen Gross
---
tools/xenstored/control.c| 2 +-
tools/xenstored/lu.c | 2 +-
tools/xenstored/xenstore_state.h | 31 ++-
3 files changed, 32 insertions(+), 3 deletions(-)
diff --git a/tools/xenstored/control
). Oxenstored is not covered.
Juergen Gross (7):
tools/libs/store: add get- and set-feature related functions
tools/xenstored: support specification of migration stream version
tools/xenstored: add missing migration record definitions
tools/xenstored: add server feature support
tools/xenstored
Anthony,
could you please have a look at patches 3, 4 and 7? They are lacking a
tools maintainer's comment.
Juergen
On 02.07.25 10:12, Juergen Gross wrote:
With this series applied I was able to perform Live Update of Xenstore
running in a PVH stubdom.
This series is based on a related
pulating of cpu_data[]")
Signed-off-by: Jan Beulich
Reviewed-by: Juergen Gross
Juergen
OpenPGP_0xB0DE9DD628BF132F.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
On 16.07.25 23:15, Jason Andryuk wrote:
Factor out the xenstore setup code into configure_xenstore(). This is
in preparation for handling already-introduced domains.
Signed-off-by: Jason Andryuk
---
tools/helpers/init-dom0less.c | 51 ---
1 file changed, 36 i
On 16.07.25 23:15, Jason Andryuk wrote:
Replace dom0_init() with init_domains() which uses libxenmanage to
iterate through all existing domains and introduce them.
dom0_domid is updated with the xenstore domain, since it really
indicates the local domain.
I agree with that explanation, but I w
On 16.07.25 23:15, Jason Andryuk wrote:
fire_special_watches() can only be called after setup_structure() has
been called. If it is called before setup_structure(), the hashtable
search will segfault as the nodes hashtable has not been allocated.
Normally, dom0 is setup up first and setup_struc
Use the newest Mini-OS.
Signed-off-by: Juergen Gross
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index 55b1b83d49..6430a871cb 100644
--- a/Config.mk
+++ b/Config.mk
@@ -208,7 +208,7 @@ QEMU_UPSTREAM_URL ?=
https://xenbits.xen.org/git
cycle,
so no need for playing "stable interface" games. :-)
Signed-off-by: Jason Andryuk
Reviewed-by: Juergen Gross
Juergen
OpenPGP_0xB0DE9DD628BF132F.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
, returned as 0. */
+uint16_t caps; /* Must be 0 on input, returned as 0. */
I'd drop the "returned as 0" in the comment. :-)
With that fixed:
Reviewed-by: Juergen Gross
Juergen
OpenPGP_0xB0DE9DD628BF132F.asc
Description: OpenPGP public key
OpenPGP_signature.asc
Description: OpenPGP digital signature
On 16.07.25 23:14, Jason Andryuk wrote:
Make introduce_domain() use an event channel from the the xenstore page.
It is only used if non-zero. Otherwise the passed in event channel port
is used.
The is useful for a xenstored stubdom to configure domains autonomously.
Signed-off-by: Jason Andryu
On 16.07.25 23:14, Jason Andryuk wrote:
Write the associated event channel into the xenstore page so xenstored
can read it. xenstored can map the grant by the reserved grant table
entry, and then read out the event channel and bind it. This eliminates
the need for an additional mechanism to dis
index, so no further information is needed.
Suggested-by: Juergen Gross
Signed-off-by: Jason Andryuk
---
xen/include/public/io/xs_wire.h | 7 +++
1 file changed, 7 insertions(+)
diff --git a/xen/include/public/io/xs_wire.h b/xen/include/public/io/xs_wire.h
index e92a87a07b..f2c0afd107
1 - 100 of 4764 matches
Mail list logo