On Sun, Jan 08, 2017 at 02:31:15PM +0100, MasterPrenium wrote:
> Hello,
>
> Replies below + :
> - I don't know if this can help but after the crash, when the system
> reboots, the Raid 5 stack is re-synchronizing
> [ 37.028239] md10: Warning: Device sdc1 is misaligned
> [ 37.028541] created
flight 104086 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104086/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 104073
test-armhf-armhf-libvirt
On 01/09/2017 06:03 AM, Andrew Cooper wrote:
> This avoids calling into hvm_cpuid() to obtain information which is directly
> available. In particular, this avoids the need to overload flag_dr_dirty
> because of hvm_cpuid() being unavailable in svm_save_dr().
>
> flag_dr_dirty is returned to a
On 01/09/2017 06:03 AM, Andrew Cooper wrote:
> Longterm, pv_cpuid() and hvm_cpuid() will be merged into a single
> guest_cpuid(), which is also capable of working outside of current context.
>
> To aid this transtion, introduce guest_cpuid() with the intended API, which
> simply defers back to
This run is configured for baseline tests only.
flight 68347 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68347/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7ecfa0aa38a3601c958a81dc36f69b5e04e40584
baseline
On Mon, 9 Jan 2017, Konrad Rzeszutek Wilk wrote:
> On Mon, Jan 09, 2017 at 10:42:41AM -0500, Dan Streetman wrote:
> > On Mon, Jan 9, 2017 at 9:59 AM, Boris Ostrovsky
> > wrote:
> > > On 01/06/2017 08:06 PM, Konrad Rzeszutek Wilk wrote:
> > >> On Thu, Jan 05, 2017 at
On 01/06/2017 10:05 AM, Juergen Gross wrote:
> Handling of multiple concurrent Xenstore accesses through xenbus driver
> either from the kernel or user land is rather lame today: xenbus is
> capable to have one access active only at one point of time.
>
> Rewrite xenbus to handle multiple requests
flight 104084 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104084/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 4 host-build-prep fail REGR. vs. 104078
Regressions which
flight 104087 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104087/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7ecfa0aa38a3601c958a81dc36f69b5e04e40584
baseline version:
ovmf
This run is configured for baseline tests only.
flight 68346 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68346/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 20
On 12/5/16 4:25 PM, Daniel Kiper wrote:
> Add multiboot2 protocol support. Alter min memory limit handling as we
> now may not find it from either multiboot (v1) or multiboot2.
>
> This way we are laying the foundation for EFI + GRUB2 + Xen development.
>
> Signed-off-by: Daniel Kiper
On 12/7/16 7:18 AM, Jan Beulich wrote:
On 05.12.16 at 23:25, wrote:
>> ..nor EFI platforms with runtime services enabled.
>
> Btw, was the title meant to read "... neither on non-EFI platforms ..."?
>
> Jan
>
Could we reduce the amount of negatives?
"disallow
On 12/5/16 4:25 PM, Daniel Kiper wrote:
> This way Xen can be loaded on EFI platforms using GRUB2 and
> other boot loaders which support multiboot2 protocol.
>
> Signed-off-by: Daniel Kiper
> ---
> v10 - suggestions/fixes:
> - replace ljmpl with lretq
>
Hi Andrew,
On 1/2/17 23:37, Andrew Cooper wrote:
+ma = d->avic_phy_apic_id_table_mfn;
+vmcb->avic_phy_apic_id = (ma << PAGE_SHIFT) & AVIC_HPA_MASK;
+vmcb->avic_phy_apic_id |= AVIC_PHY_APIC_ID_MAX;
Surely this should be some calculation derived from d->max_vcpus?
This is actually
On 12/5/16 4:25 PM, Daniel Kiper wrote:
> Every multiboot protocol (regardless of version) compatible image must
> specify its load address (in ELF or multiboot header). Multiboot protocol
> compatible loader have to load image at specified address. However, there
> is no guarantee that the
flight 104090 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104090/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 4 host-build-prep fail in 104084 REGR. vs. 104078
Tests which are
On 09/01/17 22:17, Boris Ostrovsky wrote:
> On 01/06/2017 10:05 AM, Juergen Gross wrote:
>> Handling of multiple concurrent Xenstore accesses through xenbus driver
>> either from the kernel or user land is rather lame today: xenbus is
>> capable to have one access active only at one point of time.
On 17-01-09 10:08:04, Wei Liu wrote:
> On Mon, Jan 09, 2017 at 09:24:54AM +0800, Yi Sun wrote:
> > On 17-01-06 12:04:43, Wei Liu wrote:
> > > On Wed, Dec 14, 2016 at 12:08:02PM +0800, Yi Sun wrote:
> > > > diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> > > > index
On 01/07/2017 12:37 AM, Stefano Stabellini wrote:
On Fri, 6 Jan 2017, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
---
xen/include/public/io/kbdif.h | 228
Jan,
On 01/05/2017 10:51 PM, Jan Beulich wrote:
On 31.12.16 at 06:45, wrote:
--- a/xen/include/asm-x86/hvm/domain.h
+++ b/xen/include/asm-x86/hvm/domain.h
@@ -72,6 +72,67 @@ struct hvm_ioreq_server {
bool_t bufioreq_atomic;
};
+struct
This patch changes 'cbm_type' to 'psr_val_type' to make it general.
Then, we can reuse this for every psr allocation feature.
Signed-off-by: Yi Sun
---
xen/arch/x86/domctl.c | 16 +-
xen/arch/x86/psr.c| 80
Hi, all,
We plan to bring a new PSR (Platform Shared Resource) feature called
Intel Memory Bandwidth Allocation (MBA) to Xen.
Besides the MBA enabling, we change some interfaces to make them more
general but not only for CAT.
The implementation bases on below patch set which is being reviewed.
This patch creates MBA feature document in doc/features/. It
describes details for MBA.
Signed-off-by: Yi Sun
---
docs/features/intel_psr_mba.pandoc | 226 +
1 file changed, 226 insertions(+)
create mode 100644
This run is configured for baseline tests only.
flight 68348 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68348/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 10 guest-start
On 01/05/2017 10:53 PM, Jan Beulich wrote:
On 31.12.16 at 06:45, wrote:
Expose vlapic_read_aligned and vlapic_reg_write() to be used by AVIC.
Signed-off-by: Suravee Suthikulpanit
Reviewed-by: Konrad Rzeszutek Wilk
On 01/07/2017 12:20 AM, Stefano Stabellini wrote:
On Fri, 6 Jan 2017, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Signed-off-by: Oleksandr Andrushchenko
---
xen/include/public/io/kbdif.h | 249
AVX512_VPOPCNTDQ: Vector POPCNT instructions for word and qwords.
variable precision.
Signed-off-by: He Chen
---
xen/include/public/arch-x86/cpufeatureset.h | 1 +
xen/tools/gen-cpuid.py | 3 ++-
2 files changed, 3 insertions(+), 1 deletion(-)
diff
This patch parses MBA parameters in configuration file. The parameter
means whether MBA is supported.
Signed-off-by: Yi Sun
---
xen/arch/x86/psr.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c
index 58d3555..eca9c43 100644
This patch implements get HW info flow in tools for MBA.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 7 +++
tools/libxc/xc_psr.c | 14 +
tools/libxl/libxl_psr.c | 12 ++-
tools/libxl/libxl_types.idl | 6 ++
This patch implements get HW info flow for MBA including its callback
function and sysctl interface.
Signed-off-by: Yi Sun
---
xen/arch/x86/psr.c | 15 +++
xen/arch/x86/sysctl.c | 16
xen/include/asm-x86/psr.h | 3 +++
This patch adds MBA description in related documents.
Signed-off-by: Yi Sun
---
docs/man/xl.pod.1.in | 35 +++
docs/misc/xl-psr.markdown | 60 +++
2 files changed, 95 insertions(+)
diff --git
This patch implements init flow for MBA including its callback
functions.
Signed-off-by: Yi Sun
---
xen/arch/x86/psr.c| 83 ++-
xen/include/asm-x86/psr.h | 1 +
2 files changed, 83 insertions(+), 1 deletion(-)
diff
This patch refactors some codes in tools/ to make set value
be more general.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 6 +++---
tools/libxc/xc_psr.c | 6 +++---
tools/libxl/libxl_psr.c | 4 ++--
3 files changed, 8 insertions(+), 8
This patch changes some interfaces in tools/ to make get hw info be
general but not only for CAT.
Add 'LIBXL_HAVE_PSR_MBA' to indicate interface change.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 23 +++--
tools/libxc/xc_psr.c | 32
This patch refactors some codes in tools/ to make get value
be more general.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 12 +++
tools/libxc/xc_psr.c | 8 ++---
tools/libxl/libxl_psr.c | 80 +++
This patch implements set value flow for MBA including its callback
function and domctl interface.
Signed-off-by: Yi Sun
---
xen/arch/x86/domctl.c | 6 ++
xen/arch/x86/psr.c | 152 +---
This patch implements get value flow in tools for MBA.
Signed-off-by: Yi Sun
---
tools/libxc/include/xenctrl.h | 1 +
tools/libxc/xc_psr.c | 3 ++
tools/libxl/libxl.h | 3 ++
tools/libxl/libxl_psr.c | 21 +
This patch implements get value callback function and domctl
interface for MBA.
Signed-off-by: Yi Sun
---
xen/arch/x86/domctl.c | 7 +++
xen/arch/x86/psr.c | 15 +++
xen/include/public/domctl.h | 1 +
3 files changed, 23 insertions(+)
This patch implements set value flow in tools for MBA.
Signed-off-by: Yi Sun
---
tools/libxc/xc_psr.c | 3 +++
tools/libxl/libxl.h | 3 +++
tools/libxl/libxl_psr.c | 33
tools/libxl/xl.h | 1 +
On 1/9/17 9:22 AM, Anthony PERARD wrote:
> Simpler non-nested brace expansion.
>
> Some entries in the MAINTAINER are not understood by the script, the
> ones that contain {,}. This patch fixes it.
>
> This will convert brace expansion style use in MAINTAINER into a regex
> that
Convert tabs into spaces; preserving indentation
No functional changes
Signed-off-by: Eric DeVolder
---
tools/libxc/xc_kexec.c | 16
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/tools/libxc/xc_kexec.c b/tools/libxc/xc_kexec.c
index
Convert tabs into spaces; preserving indentation
No functional changes
Signed-off-by: Eric DeVolder
---
tools/libxc/xc_kexec.c | 16
1 file changed, 8 insertions(+), 8 deletions(-)
diff --git a/tools/libxc/xc_kexec.c b/tools/libxc/xc_kexec.c
index
>>> On 09.01.17 at 16:40, wrote:
> On 01/09/2017 02:10 AM, Jan Beulich wrote:
>
> On 06.01.17 at 19:34, wrote:
>>> Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
>>> adjustments"):
On 06.01.17 at 17:24,
>>> On 09.01.17 at 12:03, wrote:
> @@ -67,6 +80,58 @@ static void __init sanitise_featureset(uint32_t *fs)
>(fs[FEATURESET_e1d] & ~CPUID_COMMON_1D_FEATURES));
> }
>
> +static void __init calculate_raw_policy(void)
> +{
> +struct
>>> On 09.01.17 at 12:03, wrote:
> ... rather than from the legacy path. Update the API to match guest_cpuid(),
> and remove its dependence on current.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
On 01/09/2017 02:10 AM, Jan Beulich wrote:
On 06.01.17 at 19:34, wrote:
Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
adjustments"):
On 06.01.17 at 17:24, wrote:
Well, as you may have seen, things are getting
>>> On 09.01.17 at 16:09, wrote:
> On 09/01/17 15:04, Jan Beulich wrote:
> On 09.01.17 at 12:03, wrote:
>>> @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t
> feature)
>>> return NULL;
>>> }
>>>
>>> +void
On Mon, Jan 9, 2017 at 9:59 AM, Boris Ostrovsky
wrote:
> On 01/06/2017 08:06 PM, Konrad Rzeszutek Wilk wrote:
>> On Thu, Jan 05, 2017 at 02:28:56PM -0500, Dan Streetman wrote:
>>> Do not read a pci device's msi message data to see if a pirq was
>>> previously
On 09/01/17 15:40, Jan Beulich wrote:
On 09.01.17 at 16:09, wrote:
>> On 09/01/17 15:04, Jan Beulich wrote:
>> On 09.01.17 at 12:03, wrote:
@@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t
>> feature)
On Mon, Jan 09, 2017 at 10:42:41AM -0500, Dan Streetman wrote:
> On Mon, Jan 9, 2017 at 9:59 AM, Boris Ostrovsky
> wrote:
> > On 01/06/2017 08:06 PM, Konrad Rzeszutek Wilk wrote:
> >> On Thu, Jan 05, 2017 at 02:28:56PM -0500, Dan Streetman wrote:
> >>> Do not read a
On 09/01/17 15:38, Jan Beulich wrote:
On 05.12.16 at 08:48, wrote:
>> --- a/tools/xenstore/include/xenstore_lib.h
>> +++ b/tools/xenstore/include/xenstore_lib.h
>> @@ -44,6 +44,7 @@ struct xs_permissions
>>
>> /* Header of the node record in tdb. */
>> struct
On 09/01/17 15:15, Jan Beulich wrote:
On 09.01.17 at 12:03, wrote:
>> @@ -67,6 +80,58 @@ static void __init sanitise_featureset(uint32_t *fs)
>>(fs[FEATURESET_e1d] & ~CPUID_COMMON_1D_FEATURES));
>> }
>>
>> +static void __init
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: 09 January 2017 11:03
> To: Xen-devel
> Cc: Andrew Cooper ; Jan Beulich
> ; Paul Durrant ; Jun
> Nakajima
On Friday, January 6, 2017 10:43:52 AM CET Nicolas Dichtel wrote:
> Here is the v2 of this series. The first 5 patches are just cleanup: some
> exported headers were still under a non-uapi directory.
Since this is meant as a cleanup, I commented on this to point out a cleaner
way to do the same.
On 01/09/2017 01:52 PM, Jan Beulich wrote:
On 09.01.17 at 12:36, wrote:
>> We've come across a weird phenomenon: an Ubuntu 16.04.1 LTS HVM guest
>> running kernel 4.4.0 installed via XenCenter in XenServer Dundee seems
>> to eat up all the RAM it can:
>>
>> (XEN) [
Commit 9e49dcf67f ("xenstore: add per-node generation counter) changed
the TDB layout, which - in order to not break older xenstored running
on the same system - need to be accompanied by a version bump.
Signed-off-by: Jan Beulich
--- a/tools/xenstore/tdb.c
+++
This ports built-in firmware to use linker tables,
this replaces the custom section solution with a
generic solution.
This also demos the use of the .rodata linker table.
Tested with 0 built-in firmware, 1 and 2 built-in
firmwares successfully.
v6: rename table macro as suggested by Andy
Move the __jump_table from the a custom section solution
to a generic solution, this avoiding extra vmlinux.lds.h
customizations.
This also demos the use of the .data linker table and of
the shared asm call push_section_tbl().
Built-in kernel functionality was tested with
kprobe makes use of two custom sections, each custom section
is folded into one of the standard Linux sections types as follows,
it currently relies on the linker script to fold the custom section
onto the respective Linux section:
type Linux-section custom section name begin
kprobe makes use of two sections, the one dealing with the actual
kprobes was recently ported using the standard section range API.
The blacklist functionality of kprobes is still using a custom
section and declaring its custom section using the linker script
as follows:
type Linux-section
Add a test drivers for linker tables.
v6: rename table macro as suggested by Andy Shevchenko
v5: added this commit for the first time in this series.
Signed-off-by: Luis R. Rodriguez
---
lib/Kconfig.debug| 6 +
lib/Makefile
This v3 only modifies the tools sandbox to adjust for the linker tables
macro renames suggested by Andy Shevchenko. It applies after the kernel
changes, a public tree is available with both series applied [0] based on
linux-next tag next-20170109, if you pull from there please drop the last
patch
Start off with just __ref -- we enalbe you to override, if you do
that then you can define your own. The way you'd use this, if you
do override, is define your own __ref and then use include_next.
Signed-off-by: Luis R. Rodriguez
---
tools/include/linux/init.h | 9 +
This will be used later by the linker-table userspace sandbox.
Signed-off-by: Luis R. Rodriguez
---
tools/include/linux/export.h | 22 ++
1 file changed, 22 insertions(+)
diff --git a/tools/include/linux/export.h b/tools/include/linux/export.h
index
This adds __used, to be used later in the userspace linker-tables
sandbox. If any userspace applicaiton wants to override they can
add their own definition and then use include_next.
This definition should probably suffice for most uses cases though.
Signed-off-by: Luis R. Rodriguez
This will be used later by the userspace linker table.
Signed-off-by: Luis R. Rodriguez
---
tools/include/linux/compiler.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/tools/include/linux/compiler.h b/tools/include/linux/compiler.h
index 556c991de212..6321265df00a
>>> On 09.01.17 at 12:03, wrote:
> @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t
> feature)
> return NULL;
> }
>
> +void guest_cpuid(const struct vcpu *v, uint32_t leaf,
> + uint32_t subleaf, struct cpuid_leaf *res)
> +{
On 09/01/17 15:04, Jan Beulich wrote:
On 09.01.17 at 12:03, wrote:
>> @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t
>> feature)
>> return NULL;
>> }
>>
>> +void guest_cpuid(const struct vcpu *v, uint32_t leaf,
>> +
Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
adjustments"):
> See e.g. the cpufreq=, i.e. we're talking of
>
> com1=:,:,...
I think we will have to use `=', so
com1==,=,...
Since we already have BDFs which I think contain `:', and that would
be more confusing than
>>> On 09.01.17 at 17:28, wrote:
> On 09/01/17 16:21, Jan Beulich wrote:
> On 09.01.17 at 12:03, wrote:
>>> --- a/xen/arch/x86/cpuid.c
>>> +++ b/xen/arch/x86/cpuid.c
>>> @@ -346,7 +346,10 @@ void guest_cpuid(const struct vcpu *v, uint32_t
of month.
> v4.10-rc3 can't be compiled either.
You mean an avr32 board ?
>> The debug patch which force enables the test driver is not submitted
>> for
>> upstream inclusion but is kept as part of the public tree for those
>> curious,
>> its the last patch [1].
Anthony PERARD writes ("[PATCH v2] get_maintainer.pl: Teach brace expansion"):
> It is done by using two different regex, the first one will take care of
> converting ',' inside '{}' to a '|', one by one, as long as there is at
> least two commas. The second regex will do the final convertion of
Eric DeVolder writes ("[PATCH] convert tabs into spaces; preserving
indentation"):
> Convert tabs into spaces; preserving indentation
>
> No functional changes
>
> Signed-off-by: Eric DeVolder
Acked-by: Ian Jackson
Although did you mean
>>> On 09.01.17 at 12:03, wrote:
> This avoids calling into hvm_cpuid() to obtain information which is directly
> available. In particular, this avoids the need to overload flag_dr_dirty
> because of hvm_cpuid() being unavailable in svm_save_dr().
>
> flag_dr_dirty is
On Mon, Jan 09, Ian Jackson wrote:
> Olaf Hering writes ("[PATCH qemu-xen-traditional 2/2] xen_platform: SUSE
> xenlinux unplug for emulated PCI"):
> > From: Olaf Hering
> >
> > Implement SUSE specific unplug protocol for emulated PCI devices
> > in PVonHVM guests. Its a
On 09/01/17 16:31, Jan Beulich wrote:
On 09.01.17 at 12:03, wrote:
>> --- a/xen/include/asm-x86/cpuid.h
>> +++ b/xen/include/asm-x86/cpuid.h
>> @@ -92,6 +92,10 @@ struct cpuid_policy
>> * Everything else should be considered inaccurate, and not necesserily
>>> On 09.01.17 at 12:03, wrote:
> Clamp the toolstack-providied max_leaf values in recalculate_cpuid_policy(),
> causing the per-domain policy to have guest-accurate data.
>
> Have guest_cpuid() exit early if a requested leaf is out of range, rather than
> falling
Juergen Gross writes ("[PATCH v4 05/12] xenstore: add support for reading
directory with many children"):
> Output is the generation count of the node (which will change each time
> the node is being modified) and a list of child names starting with
> the specified index. The end of the list is
>>> On 09.01.17 at 12:03, wrote:
> @@ -396,12 +403,47 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf,
> case 0x8000 ... 0x8000 + CPUID_GUEST_NR_EXTD - 1:
> if ( leaf > p->extd.max_leaf )
> return;
> -break;
> +
>>> On 09.01.17 at 17:34, wrote:
> Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
> adjustments"):
>> See e.g. the cpufreq=, i.e. we're talking of
>>
>> com1=:,:,...
>
> I think we will have to use `=', so
> com1==,=,...
>
> Since we already
Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing
adjustments"):
> Right, I had been thinking of this too, but then wasn't sure to
> suggest such a mixture. Perhaps the first two options could
> even remain completely nameless then (I think those are the
> ones which had been
> -Original Message-
> From: Joao Martins [mailto:joao.m.mart...@oracle.com]
> Sent: 06 January 2017 20:09
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Andrew Cooper
> ; Wei Liu ; Stefano
> Stabellini
This avoids hvm_cpuid() recursing into itself, and the MSR paths using
hvm_cpuid() to obtain information which is directly available.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/hvm/hvm.c | 95
This avoids refering back to domain_cpuid() or native CPUID to obtain
information which is directly available.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/traps.c | 22 +-
1 file changed, 5
Derive host_policy from raw_policy, and {pv,hvm}_max_policy from host_policy.
Clamp the raw values to the maximum we will offer to guests.
This simplifies the PV and HVM policy calculations, removing the need for an
intermediate linear host_featureset bitmap.
Signed-off-by: Andrew Cooper
All callers of pv_cpuid() and hvm_cpuid() (other than guest_cpuid() legacy
path) have been removed from the codebase. Move them into cpuid.c to avoid
any further use, leaving guest_cpuid() as the sole API to use.
This is purely code motion, with no functional change.
Signed-off-by: Andrew
Reuse the logic in hvm_cr4_guest_valid_bits() instead of duplicating it.
This fixes a bug to do with the handling of X86_CR4_PCE. The RDPMC
instruction predate the architectural performance feature, and has been around
since the P6. X86_CR4_PCE is like X86_CR4_TSD and only controls whether
With most uses of the *_featureset API removed, the remaining uses are only
during XEN_SYSCTL_get_cpu_featureset, init_guest_cpuid(), and
recalculate_cpuid_policy(), none of which are hot paths.
Drop the temporary infrastructure, and have the current users recreate the
linear bitmap using
... rather than performing runtime adjustments. This is safe now that
recalculate_cpuid_policy() perfoms suitable sanitisation when the policy data
is loaded.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/traps.c | 44
... rather than dynamically clamping against the PV maximum policy.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
v2:
* Spelling fix in the commit message
---
xen/arch/x86/domctl.c | 12 ++--
1 file changed, 6 insertions(+), 6
This avoids calling into hvm_cpuid() to obtain information which is directly
available. In particular, this avoids the need to overload flag_dr_dirty
because of hvm_cpuid() being unavailable in svm_save_dr().
flag_dr_dirty is returned to a boolean (as it was before c/s c097f549 which
introduced
All per-domain policy data concerning leaf 7 is accurate. Handle it all in
guest_cpuid() by reading out of the raw array block, and introduing a dynamic
adjustment for OSPKE.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
v2:
* Extend the
Alter the function to return the valid CR4 bits, rather than the invalid CR4
bits. This will allow reuse in other areas of code.
Pick the appropriate cpuid_policy object rather than using hvm_cpuid() or
boot_cpu_data. This breaks the dependency on current.
Signed-off-by: Andrew Cooper
More work is required before maxphysaddr can be read straight out of the
cpuid_policy block, but in the meantime hvm_cpuid() wants to disappear so
update the code to use the newer interface.
Use the behaviour of max_leaf handling (returning all zeros) to avoid a double
call into guest_cpuid().
Clamp the toolstack-providied max_leaf values in recalculate_cpuid_policy(),
causing the per-domain policy to have guest-accurate data.
Have guest_cpuid() exit early if a requested leaf is out of range, rather than
falling into the legacy path.
Signed-off-by: Andrew Cooper
flight 104078 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104078/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-freebsd10-amd64 15 guest-saverestore.2 fail pass in 104075
Regressions which are regarded
Introduce init_domain_cpuid_policy() to allocate an appropriate cpuid policy
for the domain (currently the domains maximum applicable policy), and call it
during domain construction.
init_guest_cpuid() now needs calling before dom0 is constructed.
Signed-off-by: Andrew Cooper
Presented herewith is v2 of the first part of improvement work to support full
per-domain CPUID policies. More work is pending on top of this series.
This series is available in git form from:
http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/xen-cpuid-v2
On Mon, Jan 09, 2017 at 01:31:35AM -0700, Jan Beulich wrote:
> >>> On 09.01.17 at 02:19, wrote:
> > On 17-01-06 12:04:36, Wei Liu wrote:
> >> On Wed, Dec 14, 2016 at 12:08:01PM +0800, Yi Sun wrote:
> >> > This patch implements xl/xc changes to support get HW info
> >> >
On Sun, Jan 8, 2017 at 4:20 AM, Marc Tousignant wrote:
> I first tried upgrading to 4.8 but then none of my VM’s would launch. I’m
> guessing there was a change to the config files that I did not look in to.
>
> I then tried going to 4.6.2 before, but the issue happens there as
1 - 100 of 179 matches
Mail list logo