most of the callers are now switched to _mfn(domain_page_to_mfn(...)).
>
> Signed-off-by: Julien Grall <julien.gr...@linaro.org>
Acked-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ger@citrix.com>
Acked-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ve PV l4 table setup code" and "x86/mm: factor out
> pv_arch_init_memory"
> x86/mm: Consolidate all Xen L2 slot writing into
> init_xen_pae_l2_slots()
> x86/mm: Consolidate all Xen L4 slot writing into init_xen_l4_slots()
Acked-by: Tim Deegan <t...@xen.org>
to make __page_to_mfn and __mfn_to_page using typesafe
> MFN.
>
> The first 6 patches will convert of the code to use typesafe MFN, easing
> the tree-wide conversion in patch 7.
x86 shadow code changes Acked-by: Tim Deegan <t...@xen.org>
_
At 19:36 +0100 on 28 Sep (1506627400), Andrew Cooper wrote:
> ... instead of the opencoded _mfn(pagetable_get_pfn(...)) construct.
>
> Fix two overly long lines; no functional change.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim
At 07:52 -0600 on 22 Sep (1506066733), Jan Beulich wrote:
> >>> On 14.09.17 at 14:58, wrote:
> > The l1 mask needs to stay in x86/mm.c while l{2,3,4} masks are only
> > needed by PV code. Both x86 common mm code and PV mm code use
> > base_disallow_mask and l1 maks.
> >
> >
For the shadow pagetable changes in patches 1 and 2:
Acked-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ROOT_PAGETABLE_XEN_SLOTS);
> +
> +memcpy([l4_table_offset(XEN_VIRT_START)],
> + _pg_table[l4_table_offset(XEN_VIRT_START)],
> + (ROOT_PAGETABLE_FIRST_XEN_SLOT + slots -
> +l4_table_offset(XEN_VIRT_START)) * sizeof(*l4t));
Doe
gned-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 13:19 +0100 on 30 Aug (1504099173), Andrew Cooper wrote:
> No functional change.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-deve
At 12:19 +0100 on 29 Aug (1504009152), Andrew Cooper wrote:
> And update all affected callers. Fix the fill_ro_mpt() prototype to be bool
> like its implementation.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim De
At 14:14 +0100 on 24 Aug (1503584097), Andrew Cooper wrote:
> This avoids the explicit boxing/unboxing of mfn_t in relevant codepaths.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim Deegan <t...@xen.org>
At 11:05 +0100 on 24 Aug (1503572736), Wei Liu wrote:
> On Thu, Aug 24, 2017 at 11:02:33AM +0100, Tim Deegan wrote:
> > At 16:58 +0100 on 23 Aug (1503507504), Wei Liu wrote:
> > > After 404595352 ("x86/paging: Enforce PG_external == PG_translate ==
> > &
; > Remove it and simplify xen/paging.h.
> >
> > Signed-off-by: Wei Liu <wei.l...@citrix.com>
>
> This is something I certainly would want Tim to see (and perhaps
> approve).
Thanks. I see and approve. :)
Acked-by: Tim Deegan <t...@xen.org>
_
_refcounts
> are replaced by calls to paging_mode_translate.
Would it be a good idea to merge all three and have only PG_external?
> Signed-off-by: Wei Liu <wei.l...@citrix.com>
Acked-by: Tim Deegan <t...@xen.org>
with one adjustment:
> /* common paging mode bits */
>
race
> period, and we simplify the code (a.k.a. 'win-win' :-D).
Thanks!
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 09:04 -0600 on 18 Aug (1503047077), Jan Beulich wrote:
> >>> On 18.08.17 at 16:47, wrote:
> > At 01:48 -0600 on 17 Aug (1502934495), Jan Beulich wrote:
> >> >>> On 16.08.17 at 18:47, wrote:
> >> > On 16/08/17 16:23, Jan Beulich wrote:
> >> > On
At 15:47 +0100 on 18 Aug (1503071247), Tim Deegan wrote:
> At 01:48 -0600 on 17 Aug (1502934495), Jan Beulich wrote:
> > >>> On 16.08.17 at 18:47, <andrew.coop...@citrix.com> wrote:
> > > atomic_read() is not free to be reordered by the compiler. It is an asm
>
At 01:48 -0600 on 17 Aug (1502934495), Jan Beulich wrote:
> >>> On 16.08.17 at 18:47, wrote:
> > On 16/08/17 16:23, Jan Beulich wrote:
> > On 16.08.17 at 13:22, wrote:
> >>> --- a/xen/arch/x86/mm/shadow/multi.c
> >>> +++
-by: Tim Deegan <t...@xen.org>
---
xen/arch/x86/mm/shadow/multi.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm/shadow/multi.c b/xen/arch/x86/mm/shadow/multi.c
index c9c2252..f8a8928 100644
--- a/xen/arch/x86/mm/shadow/multi.c
+++ b/xen/arch/x86/mm/
At 14:55 +0100 on 18 Aug (1503068128), Tim Deegan wrote:
> At 12:22 +0100 on 16 Aug (1502886128), Andrew Cooper wrote:
> > diff --git a/xen/arch/x86/mm/shadow/multi.c b/xen/arch/x86/mm/shadow/multi.c
> > index c9c2252..1e3dfaf 100644
> > --- a/xen/arch/x86/mm/shadow/multi.c
&
At 12:22 +0100 on 16 Aug (1502886128), Andrew Cooper wrote:
> diff --git a/xen/arch/x86/mm/shadow/multi.c b/xen/arch/x86/mm/shadow/multi.c
> index c9c2252..1e3dfaf 100644
> --- a/xen/arch/x86/mm/shadow/multi.c
> +++ b/xen/arch/x86/mm/shadow/multi.c
> @@ -3112,7 +3112,6 @@ static int
At 12:22 +0100 on 16 Aug (1502886127), Andrew Cooper wrote:
> * Drop trailing whitespace.
> * Move amd_nonfatal_mcheck_init() into .init.text and drop a trailing
> return.
> * Drop unnecessary wmb()'s. Because of Xen's implementation, they are only
> compiler barriers anyway, and each
Hi,
This looks good to me. I have one question:
At 18:45 +0200 on 16 Aug (1502909149), Dario Faggioli wrote:
> @@ -474,7 +484,41 @@ static struct notifier_block cpu_nfb = {
> void __init rcu_init(void)
> {
> void *cpu = (void *)(long)smp_processor_id();
> +
> +
At 18:21 +0200 on 14 Aug (1502734919), Dario Faggioli wrote:
> On Mon, 2017-08-14 at 14:54 +0100, Tim Deegan wrote:
> > At 15:24 +0200 on 14 Aug (1502724279), Dario Faggioli wrote:
> > > About the former... I'm not sure which check of rcp->cur you're
> > > refe
Hi,
At 15:24 +0200 on 14 Aug (1502724279), Dario Faggioli wrote:
> On Mon, 2017-08-14 at 11:39 +0100, Tim Deegan wrote:
> > At 11:19 +0200 on 14 Aug (1502709563), Dario Faggioli wrote:
> > > 3) CPU2 is not in idle_cpumask, and so it will not be in the
> > > sampled
>
Hi,
At 11:19 +0200 on 14 Aug (1502709563), Dario Faggioli wrote:
> Basically, for the race to occur (in [3]), it is necessary that [2]
> (CPU1 doing rcp->cur++) happens after [1] (last call to rcu_pending()
> of CPU2, before clearing the mask and going idle). In fact, it that is
> not the case,
Hi,
At 10:01 +0200 on 27 Jul (1501149684), Dario Faggioli wrote:
> In Xen, that is impossible, and that's particularly problematic
> when system is idle (or lightly loaded) systems, as CPUs that
> are idle may never have the chance to tell RCU about their
> quiescence, and grace periods could
r should accept them.
Reviewed-by: Tim Deegan <t...@xen.org>
> guest_can_use_l2_superpages() checking opt_allow_superpage is a piece of PV
> guest policy enforcement, rather than its intended purpose of meaning "would
> hardware tolerate finding an L2 superpage with these
At 16:40 +0100 on 30 Jun (1498840853), Andrew Cooper wrote:
> * sh_pin() has boolean properties, so switch its return type.
> * sh_remove_shadows() uses ints everywhere other than its stub.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim De
Hi,
At 12:16 +0100 on 28 Jun (1498652182), Andrew Cooper wrote:
> sh_pin() has boolean properties, so switch its return type.
>
> Signed-off-by: Andrew Cooper
Good idea, thanks.
> -static bool_t
> +static bool
> sh_write_guest_entry(struct vcpu *v, intpte_t *p,
common
> value to initialize a variable and directly passed as an argument.
>
> Introduce 2 news define {G,M}FN_INVALID_INITIALIZER to be used for
> initializing a variable.
>
> [1] https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64856
>
> Signed-off-by: Julien Grall <juli
At 03:18 -0600 on 23 Jun (1498187924), Jan Beulich wrote:
> >>> On 23.06.17 at 10:55, wrote:
>
> >
> > On 23/06/17 09:30, Jan Beulich wrote:
> > On 22.06.17 at 20:31, wrote:
> >>> Hi,
> >>>
> >>> On 20/06/17 11:32, Jan Beulich wrote:
> >>> On
At 09:58 +0100 on 23 Jun (1498211910), Tim Deegan wrote:
> At 09:41 +0100 on 23 Jun (1498210893), Julien Grall wrote:
> > On 23/06/17 09:30, Jan Beulich wrote:
> > >
> > >> typedef struct
> > >> {
> > >> unsigned long i;
>
At 09:41 +0100 on 23 Jun (1498210893), Julien Grall wrote:
> Hi Jan,
>
> On 23/06/17 09:30, Jan Beulich wrote:
> On 22.06.17 at 20:31, wrote:
> >> Hi,
> >>
> >> On 20/06/17 11:32, Jan Beulich wrote:
> >> On 20.06.17 at 12:06, wrote:
> At 03:36
dr);
Using "return ~PTR_ERR(addr)" when the usual idiom is
"return -PTR_ERR(foo)" is a bit subtle. Still, the code seems to be
correct, so if people prefer it,
Acked-by: Tim Deegan <t...@xen.org>
Cheers,
Tim.
___
Xen-devel mai
y mistake.
Tim.
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
> ---
> CC: Tim Deegan <t...@xen.org>
> CC: Jan Beulich <jbeul...@suse.com>
> ---
> xen/arch/x86/mm/shadow/common.c | 10 +++---
> 1 file changed, 7 insertions(+), 3 deletions(-)
>
At 03:36 -0600 on 20 Jun (1497929778), Jan Beulich wrote:
> >>> On 20.06.17 at 11:14, wrote:
> > At 01:32 -0600 on 20 Jun (1497922345), Jan Beulich wrote:
> >> >>> On 19.06.17 at 18:57, wrote:
> >> > --- a/xen/include/xen/mm.h
> >> > +++ b/xen/include/xen/mm.h
At 01:32 -0600 on 20 Jun (1497922345), Jan Beulich wrote:
> >>> On 19.06.17 at 18:57, wrote:
> > --- a/xen/include/xen/mm.h
> > +++ b/xen/include/xen/mm.h
> > @@ -56,7 +56,7 @@
> >
> > TYPE_SAFE(unsigned long, mfn);
> > #define PRI_mfn "05lx"
> > -#define
or: initializer element is not constant
> #define INVALID_MFN _mfn(~0UL)
>
> Signed-off-by: Julien Grall <julien.gr...@arm.com>
Acked-by: Tim Deegan <t...@xen.org>
> I know that this solution will not work for non-debug build. I would
> like input from the community
Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 17:51 +0100 on 16 May (1494957116), Andrew Cooper wrote:
> c/s 4c5d78a10 was accidentally buggy when handling Protection Keys.
> Protection keys applies to all user translations, not just accesses which
> originate from user mode.
Reviewed-by: Tim Deegan <t...@xen.org>
Does the
; other changes.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
s/sturct/struct/
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi,
At 09:59 +0100 on 05 May (1493978382), Lars Kurth wrote:
> > On 5 May 2017, at 09:43, Tim Deegan <t...@xen.org> wrote:
> > - Only features listed as Supported in MAINTAINERS get support.
>
> This seems related to George's proposal of the scope. I am not sure
> MA
At 13:53 +0100 on 04 May (1493905990), Ian Jackson wrote:
> To become a CNA (CVE Numbering Authority), which we would like to do,
> we need to provide MITRE's CNA programme with a definition of the
> scope of our CNA. That should be the scope of our general security
> support, clearly.
>
> At
Only mappings of the M2P (compat and regular) don't need to be
>writeable or executable.
> * The PV GDT mappings don't need to be executable.
>
> Reported-by: Jann Horn <ja...@google.com>
> Signed-off-by: Andrew Cooper <andrew.c
At 10:15 +0100 on 03 May (1493806508), Tim Deegan wrote:
> At 00:31 -0600 on 03 May (1493771502), Jan Beulich wrote:
> > +else if ( ctxt.cur > sizeof(*desc) )
> > {
> > uint32_t off;
> > -const struct hvm_save_descriptor *desc;
&
At 00:31 -0600 on 03 May (1493771502), Jan Beulich wrote:
> Hmm, with both of you being of that opinion, I've taken another
> look. I think I see now why you think that way (this being data
> from an internal producer, overflow/underflow are not a primary
> concern), so I'll withdraw my objection
.com>
> Signed-off-by: Razvan Cojocaru <rcojoc...@bitdefender.com>
> Tested-by: Razvan Cojocaru <rcojoc...@bitdefender.com>
I actually preferred the first patch :P but this is fine.
Acked-by: Tim Deegan <t...@xen.org>
> diff --git a/xen/common/hvm/save.c b/xen/com
appens when the
per-type handler returns no data at all (because all VCPUs are
offline).
With the commit message fixed,
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 02:50 -0600 on 02 May (1493693403), Jan Beulich wrote:
> >>> On 02.05.17 at 10:32, wrote:
> > At 04:52 -0600 on 28 Apr (1493355160), Jan Beulich wrote:
> >> >>> On 27.04.17 at 11:51, wrote:
> >> > At 03:23 -0600 on 27 Apr (1493263380), Jan Beulich wrote:
> >> >>
At 04:52 -0600 on 28 Apr (1493355160), Jan Beulich wrote:
> >>> On 27.04.17 at 11:51, wrote:
> > At 03:23 -0600 on 27 Apr (1493263380), Jan Beulich wrote:
> >> ... it wouldn't better be the other way around: We use the patch
> >> in its current (or even v1) form, and try to do
t (but if it's that what
> you're after, I could certainly collect a few numbers).
I think that would be a good idea, just as a sanity-check. But apart
from that the patch looks correct to me, so:
Reviewed-by: Tim Deegan <t...@xen.org>
for v2 (not v1).
Cheers,
Tim.
At 08:07 -0600 on 26 Apr (1493194043), Jan Beulich wrote:
> >>> On 25.04.17 at 12:59, wrote:
> > Hi,
> >
> > At 02:59 -0600 on 25 Apr (1493089158), Jan Beulich wrote:
> >> Jann's explanation of the problem:
> >>
> >> "start situation:
> >> - domain A and domain B are PV domains
>
At 05:59 -0600 on 25 Apr (1493099950), Jan Beulich wrote:
> >>> On 25.04.17 at 12:59, wrote:
> > Hi,
> >
> > At 02:59 -0600 on 25 Apr (1493089158), Jan Beulich wrote:
> >> Jann's explanation of the problem:
> >>
> >> "start situation:
> >> - domain A and domain B are PV domains
>
Hi,
At 02:59 -0600 on 25 Apr (1493089158), Jan Beulich wrote:
> Jann's explanation of the problem:
>
> "start situation:
> - domain A and domain B are PV domains
> - domain A and B both have currently scheduled vCPUs, and the vCPUs
>are not scheduled away
> - domain A has XSM_TARGET
ndrew.coop...@citrix.com>
> Reviewed-by: Paul Durrant <paul.durr...@citrix.com>
For the whole series, Acked-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
ent, to make it
> easier to follow.
>
> Alter set_ad_bits() to take properly typed pointers and booleans rather than
> integers.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
> Reviewed-by: Jan Beulich <jbeul...@suse.c
At 17:02 + on 23 Mar (1490288548), Andrew Cooper wrote:
> On 23/03/17 16:55, Tim Deegan wrote:
> > At 16:31 + on 16 Mar (1489681899), Andrew Cooper wrote:
> >> Some bits are unconditionally reserved in pagetable entries, or reserved
> >> because of alignmen
At 16:31 + on 16 Mar (1489681903), Andrew Cooper wrote:
> * Drop trailing whitespace
> * Consistently apply Xen style
> * Introduce a local variable block
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim
At 16:31 + on 16 Mar (1489681902), Andrew Cooper wrote:
> --- a/xen/arch/x86/mm/guest_walk.c
> +++ b/xen/arch/x86/mm/guest_walk.c
> @@ -32,24 +32,28 @@ asm(".file \"" __OBJECT_FILE__ "\"");
> #include
> #include
>
> -/* Modify a guest pagetable entry to set the Accessed and Dirty bits.
>
ut the installed shadow is valid and hardware
> doesn't fault.
>
> Reuse the pagewalk reserved bits helpers, and assert in
> l?e_propagate_from_guest() that shadows are not attempted to be created with
> reserved bits set.
>
> Signed-off-by: Andrew Cooper <andrew.coop..
individual vcpu and guest pagetable entry, and
> calculates whether any reserved bits are set.
>
> While here, add a couple of newlines to aid readability.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim Deegan <t...@xen.org>, although:
n CR4 rather than CR0.
>
> Requested-by: Jan Beulich <jbeul...@suse.com>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim Deegan <t...@xen.org>
(with or without the renaming Jan asked for).
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 16:31 + on 16 Mar (1489681897), Andrew Cooper wrote:
> There is only one single user of VALID_GFN(). Inline the macro to remove the
> added layer of indirection in sh_gva_to_gfn()
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim De
At 16:31 + on 16 Mar (1489681896), Andrew Cooper wrote:
> It is a pointer, not an array.
>
> No functional change.
>
> Requested-by: Jan Beulich <jbeul...@suse.com>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acke
<roger@citrix.com>
Signed-off-by: Tim Deegan <t...@xen.org>
---
tools/debugger/kdd/kdd.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/tools/debugger/kdd/kdd.c b/tools/debugger/kdd/kdd.c
index 70f007e..1bd5dd5 100644
--- a/tools/debugger/kdd/kdd.c
+++ b/tools/
Hi,
At 12:02 +0900 on 10 Mar (1489147353), Roger Pau Monne wrote:
> The layout of the structures make them already aligned, there's no need for
> the
> packed attributes.
That's not right -- kdd_pkt gets 8 bytes longer with this patch.
In fact this code has the bug that clang's new warning is
At 14:36 + on 06 Mar (1488811016), George Dunlap wrote:
> On 06/03/17 13:58, Jan Beulich wrote:
> On 06.03.17 at 13:31, wrote:
> >> --- a/Config.mk
> >> +++ b/Config.mk
> >> @@ -216,6 +216,7 @@ $(call
> >>
At 12:26 + on 02 Mar (1488457613), Andrew Cooper wrote:
> On 01/03/17 16:03, Jan Beulich wrote:
> On 27.02.17 at 15:03, wrote:
> >> The shadow logic should never create a shadow of a guest PTE which contains
> >> reserved bits from the guests point of view.
gt; * 3-level entries can no longer alias Xen's idea of paged or shared.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 14:03 + on 27 Feb (1488204193), Andrew Cooper wrote:
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
id, so this doesn't cause a behavioural change.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
rs.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
calculation of the appropriate pagewalk input before its first use.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 14:17 + on 02 Mar (1488464221), Andrew Cooper wrote:
> On 02/03/17 14:12, Tim Deegan wrote:
> > At 14:03 + on 27 Feb (1488204194), Andrew Cooper wrote:
> >> +static inline bool guest_has_pse36(const struct vcpu *v)
> >> +{
> >> +
At 14:03 + on 27 Feb (1488204196), Andrew Cooper wrote:
> The shadow logic should never create a shadow of a guest PTE which contains
Nit: a _valid/present_ shadow.
> reserved bits from the guests point of view. Such a shadowed entry might not
> cause #PF[RSVD] when walked by hardware, thus
At 14:03 + on 27 Feb (1488204194), Andrew Cooper wrote:
> +static inline bool guest_has_pse36(const struct vcpu *v)
> +{
> + /* No support for 2-level PV guests. */
> +return is_pv_vcpu(v) ? 0 : paging_mode_hap(v->domain);
> +}
Should this check the CPUID policy to see whether PSE36
NFIG run.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
> ---
Acked-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 15:13 + on 24 Feb (1487949198), Roger Pau Monne wrote:
> It is now useless since PVHv1 is removed and PVHv2 is a HVM domain from Xen's
> point of view.
>
> Signed-off-by: Roger Pau Monné <roger@citrix.com>
Acked-by: Tim De
ll function
> were tools only (and hence we could freely change their behavior).
> Also, since we wouldn't be able to tell size 128 from size 0 with what
> you propose, "get" would then possibly return a value different from
> what was passed to "set".
Sure you could - just
: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 05:03 -0700 on 17 Feb (1487307837), Jan Beulich wrote:
> The present way of setting this up is flawed: Leaving the I/O bitmap
> pointer at zero means that the interrupt redirection bitmap lives
> outside (ahead of) the allocated space of the TSS. Similarly setting a
> TSS limit of 255 when only
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
() in guest_pt.h but it is unused in the
> codebase. Repurpose it to perform a guest-specific maxphysaddr check, which
> replaces the users of gfn_bits.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim Deegan <t...@xen.org>
_
At 04:49 -0700 on 16 Feb (1487220558), Jan Beulich wrote:
> >>> On 16.02.17 at 12:14, wrote:
> On 15.02.17 at 12:21, wrote:
> >> At 01:18 -0700 on 15 Feb (1487121525), Jan Beulich wrote:
> >>> >>> On 14.02.17 at 18:33, wrote:
> >>> >> TBD: Do
At 01:18 -0700 on 15 Feb (1487121525), Jan Beulich wrote:
> >>> On 14.02.17 at 18:33, wrote:
> >> TBD: Do we really want to re-init the TSS every time we are about to
> >> use it?
> >
> > No - I think we should init it when the guest writes the param(s) and
> > leave it at
At 01:13 -0700 on 15 Feb (1487121231), Jan Beulich wrote:
> >>> On 14.02.17 at 18:35, wrote:
> > At 06:37 -0700 on 13 Feb (1486967832), Jan Beulich wrote:
> >> >>> On 13.02.17 at 14:19, wrote:
> >> > -tss = mem_alloc(128, 128);
> >> > -memset(tss, 0,
At 06:37 -0700 on 13 Feb (1486967832), Jan Beulich wrote:
> >>> On 13.02.17 at 14:19, wrote:
> > -tss = mem_alloc(128, 128);
> > -memset(tss, 0, 128);
> > +tss = mem_alloc(TSS_SIZE, TSS_SIZE);
>
> tss = mem_alloc(TSS_SIZE, 128);
>
> is sufficient here, as I've
O bitmap
> pointer. Both this and the segment limit now take the allocated size
> into account.
>
> Signed-off-by: Jan Beulich <jbeul...@suse.com>
This looks pretty good to me. Once the question below is resolved,
Reviewed-by: Tim Deegan <t...@xen.org>
> ---
> TBD: Do we
td.maxphysaddr = max_t(uint8_t, p->extd.maxphysaddr,
> (p->basic.pae || p->basic.pse36) ? 36 :
> 32);
That looks good to me. Reviewed-by: Tim Deegan <t...@xen.org>
> >> @@ -360,6 +361,21 @@ void paging_dump_vcpu_info(struct vcpu *v);
> >> int paging
p;&
> + p2m->np2m_base == P2M_BASE_EADDR )
Looks like p2m_is_nestedp2m(p2m) is the usual idiom. Either way:
Reviewed-by: Tim Deegan <t...@xen.org>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
At 15:29 + on 08 Feb (1486567798), Andrew Cooper wrote:
> On Intel, a guest can get an PTE shadowed which should have faulted and
> didn't (because the smfn is actually within 39 bits)
Yes.
, while on AMD, a
> guest can try to create a PTE which shouldn't fault (because CPUID says
> anything
Hi,
At 12:36 + on 08 Feb (1486557378), Andrew Cooper wrote:
> XSA-173 (c/s 8b1764833) introduces gfn_bits, and an upper limit which might be
> lower than the real maxphysaddr, to avoid overflowing the superpage shadow
> backpointer.
>
> However, plenty of hardware has a physical address
At 17:26 + on 30 Jan (1485797162), Andrew Cooper wrote:
> The vTLB and last_write* booleans are used exclusively by the shadow pagetable
> code. Move them from paging_vcpu to shadow_vcpu, which causes them to be
> entirely omitted on a build without shadow paging support.
>
> While changing
At 17:26 + on 30 Jan (1485797161), Andrew Cooper wrote:
> No functional change yet, but required for subsequent changes.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Acked-by: Tim Deegan <t...@xen.org>
___
X
At 03:44 -0700 on 31 Jan (1485834259), Jan Beulich wrote:
> >>> On 30.01.17 at 16:17, wrote:
> > Commit 71bb7304e7a7a35ea6df4b0cedebc35028e4c159 added flushing of
> > nested p2m tables whenever the host p2m table changed. Unfortunately
> > in the process, it added a
won't continue to use the flushed mappings.
>
> While modifying this function, remove all the trailing whitespace and tweak
> style in the affected areas.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Tim Deegan <t...@xen.org>
__
At 09:40 -0700 on 27 Jan (1485510008), Jan Beulich wrote:
> >>> On 27.01.17 at 14:20, <t...@xen.org> wrote:
> > At 12:51 + on 27 Jan (1485521470), Andrew Cooper wrote:
> >> On 27/01/17 11:14, Tim Deegan wrote:
> >> > But looking at it now,
> Despite being owned by the guest, this TSS is actually managed by
Xen.
> It should be initialised to defaults each time Xen needs to use it
on
> behalf of the guest.
At 14:35 + on 27 Jan (1485527708), Andrew Cooper wrote:
> On 27/01/17 14:01, Tim Deegan wrote:
> > Hi
1 - 100 of 562 matches
Mail list logo