On 07/03/2023 16:59, Paul Durrant wrote:
On 07/03/2023 16:52, David Woodhouse wrote:
On Tue, 2023-03-07 at 16:39 +, Paul Durrant wrote:
On 07/03/2023 16:33, David Woodhouse wrote:
On Thu, 2023-03-02 at 15:34 +, David Woodhouse wrote:
From: David Woodhouse
In fact I think we want to
On 07/03/2023 16:52, David Woodhouse wrote:
On Tue, 2023-03-07 at 16:39 +, Paul Durrant wrote:
On 07/03/2023 16:33, David Woodhouse wrote:
On Thu, 2023-03-02 at 15:34 +, David Woodhouse wrote:
From: David Woodhouse
In fact I think we want to only serialize the contents of the
On 07/03/2023 16:39, Paul Durrant wrote:
On 07/03/2023 16:33, David Woodhouse wrote:
On Thu, 2023-03-02 at 15:34 +, David Woodhouse wrote:
From: David Woodhouse
In fact I think we want to only serialize the contents of the domain's
path in /local/domain/${domid} and leave the rest
On 07/03/2023 16:33, David Woodhouse wrote:
On Thu, 2023-03-02 at 15:34 +, David Woodhouse wrote:
From: David Woodhouse
In fact I think we want to only serialize the contents of the domain's
path in /local/domain/${domid} and leave the rest to be recreated? Will
defer to Paul for that.
Si
On 07/03/2023 16:22, David Woodhouse wrote:
From: David Woodhouse
Signed-off-by: David Woodhouse
---
docs/system/i386/xen.rst | 30 +++---
1 file changed, 23 insertions(+), 7 deletions(-)
Reviewed-by: Paul Durrant
On 07/03/2023 16:21, David Woodhouse wrote:
From: David Woodhouse
Signed-off-by: David Woodhouse
---
MAINTAINERS | 9 +
1 file changed, 9 insertions(+)
Reviewed-by: Paul Durrant
e
---
hw/i386/pc.c | 7 +++
1 file changed, 7 insertions(+)
Reviewed-by: Paul Durrant
+
3 files changed, 30 insertions(+), 2 deletions(-)
Reviewed-by: Paul Durrant
*looks* like it's in use in the guest-visible grant table.
Might be useful to stick this text in the commit comment too.
Reviewed-by: Paul Durrant
+ */
+s->gt = qemu_xen_gnttab_open();
+uint32_t xs_gntref = GNTTAB_RESERVED_XENSTORE;
+s->granted_xs = qemu_xen_gnttab_map_refs(s->gt, 1, xen_domid, &xs_gntref,
+ PROT_READ | PROT_WRITE);
+
return 0;
}
nsertions(+), 4 deletions(-)
Reviewed-by: Paul Durrant
s and the domid. We probably
ought to fail to set the flags if the guest is playing with the domid
but since we're single-tenant it doesn't *really* matter... just a
nice-to-have. So...
Reviewed-by: Paul Durrant
insertions(+)
Reviewed-by: Paul Durrant
| 11 ---
1 file changed, 8 insertions(+), 3 deletions(-)
Reviewed-by: Paul Durrant
On 02/03/2023 15:34, David Woodhouse wrote:
From: Paul Durrant
The xen-block code ends up calling aio_poll() through blkconf_geometry(),
which means we see watch events during the indirect call to
xendev_class->realize() in xen_device_realize(). Unfortunately this call
is made bef
| 2 +-
hw/block/meson.build | 2 +-
hw/char/meson.build| 2 +-
hw/display/meson.build | 2 +-
hw/usb/meson.build | 2 +-
hw/xen/meson.build | 5 -
7 files changed, 10 insertions(+), 7 deletions(-)
Reviewed-by: Paul Durrant
xen/xen_pvdev.h| 3 ++-
17 files changed, 47 insertions(+), 32 deletions(-)
rename include/hw/xen/{xen_common.h => xen_native.h} (98%)
Reviewed-by: Paul Durrant
On 07/03/2023 14:52, David Woodhouse wrote:
On Tue, 2023-03-07 at 14:44 +, Paul Durrant wrote:
On 02/03/2023 15:34, David Woodhouse wrote:
From: Paul Durrant
Signed-off-by: Paul Durrant
Signed-off-by: David Woodhouse
---
Reviewed-by: Paul Durrant
You're reviewing your own co
On 07/03/2023 14:48, David Woodhouse wrote:
On Tue, 2023-03-07 at 14:40 +, Paul Durrant wrote:
-
-#define xenforeignmemory_unmap(h, p, s) munmap(p, s * XC_PAGE_SIZE)
-
Actually, probably best 'static inline' that, or at least put brackets
round the 'p' and 's&
/block/dataplane/xen-block.c | 8
hw/display/xenfb.c | 12 ++--
hw/net/xen_nic.c | 12 ++--
hw/usb/xen-usb.c | 8
4 files changed, 20 insertions(+), 20 deletions(-)
Reviewed-by: Paul Durrant
hile we're at it.
Signed-off-by: David Woodhouse
---
accel/xen/xen-all.c | 61 ---
hw/char/xen_console.c | 45 +--
include/hw/xen/xen.h | 2 --
3 files changed, 43 insertions(+), 65 deletions(-)
Reviewed-by: Paul Durrant
On 02/03/2023 15:34, David Woodhouse wrote:
From: Paul Durrant
Signed-off-by: Paul Durrant
Signed-off-by: David Woodhouse
---
accel/xen/xen-all.c | 11 +-
hw/char/xen_console.c | 2 +-
hw/i386/kvm/xen_xenstore.c | 3 -
hw/i386/kvm
On 02/03/2023 15:34, David Woodhouse wrote:
From: David Woodhouse
Signed-off-by: David Woodhouse
Signed-off-by: Paul Durrant
---
hw/char/xen_console.c| 8 +++---
hw/display/xenfb.c | 20 +++---
hw/xen/xen-operations.c | 45
de/hw/xen/xen-bus.h| 2 +-
include/hw/xen/xen-legacy-backend.h | 6 +++---
include/hw/xen/xen_backend_ops.h| 7 ---
11 files changed, 50 insertions(+), 26 deletions(-)
Reviewed-by: Paul Durrant
Add a
XEN_GNTTAB_OP_FEATURE_MAP_MULTIPLE flag to indicate that the native Xen
implementation *does* support multi-page maps, and a helper function to
query it.
Signed-off-by: David Woodhouse
Signed-off-by: Paul Durrant
[snip]
@@ -65,7 +195,34 @@ struct evtchn_backend_ops libxenevtchn_backend_ops = {
.pe
support.
Signed-off-by: David Woodhouse
Signed-off-by: Paul Durrant
---
hw/9pfs/xen-9p-backend.c| 24 +++---
hw/i386/xen/xen-hvm.c | 27 ---
hw/xen/meson.build | 1 +
hw/xen/xen-bus.c| 22 +++---
hw/xen/xen-legacy
On 02/03/2023 15:34, David Woodhouse wrote:
From: Paul Durrant
Signed-off-by: Paul Durrant
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xen_xenstore.c | 70 ++
1 file changed, 70 insertions(+)
Reviewed-by: Paul Durrant
On 02/03/2023 15:34, David Woodhouse wrote:
From: David Woodhouse
In fact I think we want to only serialize the contents of the domain's
path in /local/domain/${domid} and leave the rest to be recreated? Will
defer to Paul for that.
Yes. Assuming backends have properly implemented save/resto
On 02/03/2023 15:34, David Woodhouse wrote:
From: Paul Durrant
Store perms as a GList of strings, check permissions.
Signed-off-by: Paul Durrant
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xen_xenstore.c | 2 +-
hw/i386/kvm/xenstore_impl.c | 259
n_tx flag from the others.
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xenstore_impl.c | 151 ++-
tests/unit/test-xs-node.c | 231 +++-
2 files changed, 380 insertions(+), 2 deletions(-)
Reviewed-by: Paul Durrant
... with a couple of ni
follow-on commit.
Signed-off-by: David Woodhouse
---
hw/i386/kvm/xenstore_impl.c | 150 ++--
tests/unit/test-xs-node.c | 118
2 files changed, 262 insertions(+), 6 deletions(-)
Reviewed-by: Paul Durrant
++
2 files changed, 323 insertions(+), 15 deletions(-)
Reviewed-by: Paul Durrant
... with one suggestion...
[snip]
+/* Check for duplicates */
+w = g_hash_table_lookup(s->watches, abspath);
+while (w) {
+if (!g_strcmp0(token, w->token) && opaque == w->cb_op
create mode 100644 tests/unit/test-xs-node.c
With the comment fixed...
Reviewed-by: Paul Durrant
/xenstore_impl.c
create mode 100644 hw/i386/kvm/xenstore_impl.h
Reviewed-by: Paul Durrant
kin
Xen parts...
Reviewed-by: Paul Durrant
On 02/03/2023 08:35, Jan Beulich wrote:
Hello,
in (I think) Intel SDM version 076 a new guarantee of atomicity of certain
aligned 16-byte accesses appeared. While initially I thought this would be
another special case we need to invent a solution for (it still is, in
certain cases, as per furthe
On 21/02/2023 13:43, Jan Beulich wrote:
On 09.02.2023 11:38, Jan Beulich wrote:
This is the only file left with a use of an __s type coming from
Linux. Since the file has been using an apparently random mix of all
three classes of fixed-width types (__{s,u}, {s,u}, and
{,u}int_t), consolidate th
On 15/02/2023 15:34, Philippe Mathieu-Daudé wrote:
Unused since introduction in commit 04b0de0ee8
("xen: factor out common functions").
Signed-off-by: Philippe Mathieu-Daudé
---
accel/xen/xen-all.c | 10 --
1 file changed, 10 deletions(-)
Acked-by: Paul Durrant
/xen_platform.c
+++ b/hw/i386/xen/xen_platform.c
@@ -25,7 +25,6 @@
#include "qemu/osdep.h"
#include "qapi/error.h"
-#include "hw/ide.h"
#include "hw/ide/pci.h"
#include "hw/pci/pci.h"
#include "hw/xen/xen_common.h"
Acked-by: Paul Durrant
On 01/02/2023 18:22, Vikram Garhwal wrote:
Hi Paul,
Thanks for reviewing this and other patches in series.
Please see my reply below.
On 2/1/23 12:30 AM, Paul Durrant wrote:
On 31/01/2023 22:51, Vikram Garhwal wrote:
Add a new machine xenpvh which creates a IOREQ server to
register/connect
On 31/01/2023 22:51, Vikram Garhwal wrote:
Add a new machine xenpvh which creates a IOREQ server to register/connect with
Xen Hypervisor.
Is this really the right way? Is it not possible to do the Xen
initialization (including ioreq server registration) off the back of the
accelerator init (
On 31/01/2023 22:51, Vikram Garhwal wrote:
Replace g_malloc with g_new and perror with error_report.
Signed-off-by: Vikram Garhwal
Reviewed-by: Stefano Stabellini
---
hw/xen/xen-hvm-common.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
Reviewed-by: Paul Durrant
: Paul Durrant
the PV backends initialization.
Signed-off-by: Stefano Stabellini
Signed-off-by: Vikram Garhwal
Reviewed-by: Stefano Stabellini
---
include/hw/xen/xen_common.h | 13 -
1 file changed, 8 insertions(+), 5 deletions(-)
Reviewed-by: Paul Durrant
100644 include/hw/i386/xen_arch_hvm.h
create mode 100644 include/hw/xen/arch_hvm.h
create mode 100644 include/hw/xen/xen-hvm-common.h
Reviewed-by: Paul Durrant
10 insertions(+), 6 deletions(-)
rename hw/{i386 => }/xen/xen-mapcache.c (100%)
Reviewed-by: Paul Durrant
Untested on actual Xen but ObviouslyCorrect™.
Works for me...
Tested-by: Paul Durrant
Signed-off-by: David Woodhouse
---
src/fw/xen.c | 45 -
1 file changed, 32 insertions(+), 13 deletions(-)
Also...
Reviewed-by: Paul Durrant
already applied.
The TSC frequency should also be set in sub-leaf 2.
Signed-off-by: Paul Durrant
---
Cc: Sean Christopherson
Cc: Paolo Bonzini
Cc: Juergen Gross
Cc: Boris Ostrovsky
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc: Borislav Petkov
Cc: Dave Hansen
Cc: "H. Peter Anvin"
Cc:
ff-by: Paul Durrant
---
Cc: Sean Christopherson
Cc: Paolo Bonzini
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc: Borislav Petkov
Cc: Dave Hansen
Cc: David Woodhouse
v7:
- Morph kvm_update_hypervisor_cpuid() into kvm_get_hypervisor_cpuid()
- Place the definition of struct kvm_hypervisor_cpuid to
Patch #2 was the original patch. It has been expended to a series in v6.
Paul Durrant (2):
KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also
capture limit
KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if
present
arch/x86/include/asm/kvm_host.h | 8
with better information. A lot of simplicity was added.
---
Reviewed-by: Paul Durrant
number of packages")
Signed-off-by: Yang Yingliang
Reviewed-by: Paul Durrant
On 28/11/2022 12:26, Jan Beulich wrote:
On 28.11.2022 12:06, Roger Pau Monné wrote:
On Mon, Nov 28, 2022 at 09:21:47AM +0100, Jan Beulich wrote:
On 26.11.2022 23:19, Julien Grall wrote:
On 25/11/2022 14:15, Per Bilse wrote:
This patch modifies ioreq_broadcast() to allow partial success.
The
quot;)
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
;t want to rewrite the function logic at this point.
---
Changes since v1:
- Fix Viridian MSR tip conditions.
Reviewed-by: Paul Durrant
On 04/11/2022 16:10, Roger Pau Monné wrote:
On Fri, Nov 04, 2022 at 04:05:05PM +, Paul Durrant wrote:
On 04/11/2022 16:01, Roger Pau Monné wrote:
On Fri, Nov 04, 2022 at 03:55:54PM +, Paul Durrant wrote:
On 04/11/2022 14:22, Roger Pau Monne wrote:
The current reporting of the
On 04/11/2022 16:01, Roger Pau Monné wrote:
On Fri, Nov 04, 2022 at 03:55:54PM +, Paul Durrant wrote:
On 04/11/2022 14:22, Roger Pau Monne wrote:
The current reporting of the hardware assisted APIC options is done by
checking "virtualize APIC accesses" which is not very helpfu
On 04/11/2022 14:22, Roger Pau Monne wrote:
The current reporting of the hardware assisted APIC options is done by
checking "virtualize APIC accesses" which is not very helpful, as that
feature doesn't avoid a vmexit, instead it does provide some help in
order to detect APIC MMIO accesses in vmex
On 04/11/2022 14:22, Roger Pau Monne wrote:
The "APIC register virtualization" Intel hardware feature applies to
both MMIO or MSR APIC accesses depending on whether "virtualize x2APIC
mode" is also available.
As such also suggest MSR APIC accesses if both "APIC register
virtualization" and "virt
On 15/10/2022 06:07, Vikram Garhwal wrote:
xenstore_record_dm_state() will also be used in aarch64 xenpv machine.
Signed-off-by: Vikram Garhwal
Signed-off-by: Stefano Stabellini
Reviewed-by: Paul Durrant
On 15/10/2022 06:07, Vikram Garhwal wrote:
[snip]
+qemu_add_vm_change_state_handler(xen_hvm_change_state_handler, state);
+
+state->memory_listener = xen_memory_listener;
+memory_listener_register(&state->memory_listener, &address_space_memory);
+
+state->io_listener = xen_io_list
: Vikram Garhwal
Reviewed-by: Paul Durrant
ones
related to dirty logging.
Updated XenIOState can be used for both aarch64 and x86.
Also, remove free_phys_offset as it was unused.
Signed-off-by: Stefano Stabellini
Signed-off-by: Vikram Garhwal
Reviewed-by: Paul Durrant
ones
related to dirty logging.
Updated XenIOState can be used for both aarch64 and x86.
Also, remove free_phys_offset as it was unused.
Signed-off-by: Stefano Stabellini
Signed-off-by: Vikram Garhwal
Reviewed-by: Paul Durrant
done to keep the common ioreq functions in one place which will be
moved to new function in next patch in order to make it common to both x86 and
aarch64 machines.
Signed-off-by: Vikram Garhwal
Signed-off-by: Stefano Stabellini
Reviewed-by: Paul Durrant
On 15/10/2022 06:07, Vikram Garhwal wrote:
xen-mapcache.c contains common functions which can be used for enabling Xen on
aarch64 with IOREQ handling. Moving it out from hw/i386/xen to hw/xen to make it
accessible for both aarch64 and x86.
Signed-off-by: Vikram Garhwal
Signed-off-by: Stefano St
On 15/10/2022 06:07, Vikram Garhwal wrote:
Build fails when have_xen_pci_passthrough is disabled. This is because of
incorrect build configuration for xen_pt_stub.c.
Signed-off-by: Stefano Stabellini
Signed-off-by: Vikram Garhwal
Reviewed-by: Paul Durrant
On 21/09/2022 02:19, Ji, Ruili wrote:
[AMD Official Use Only - General]
Hi Paul and AFAIK:
^^^ you mean Anthony :-)
Thanks for your help.
When could we see this patch on the master branch? 😊
Our project urgently needs this solution.
Anthony? Ping?
Paul
On 14/09/2022 03:07, Ji, Ruili wrote:
[AMD Official Use Only - General]
Hi Paul,
Thank you!
But how could we merge this patch ?
AFAIK Anthony (anthony.per...@citrix.com) still deals with this.
Cheers,
Paul
On 13/09/2022 04:02, Ji, Ruili wrote:
[AMD Official Use Only - General]
Hi Paul,
Could you help to review this patch?
LGTM. You can add my R-b to it.
Paul
Thanks
*From:* Ji, Ruili
*Sent:* 2022年9月7日 9:04
*To:* 'Paul Durrant' ; 'qemu-de...@nongnu.org'
*Cc:* Liu
On 29/08/2022 10:03, Matias Ezequiel Vara Larsen wrote:
This commit creates a new doc to document the acquire resource interface. This
is a reference document.
Signed-off-by: Matias Ezequiel Vara Larsen
---
Changes in v1:
- correct documentation about how mfns are allocated
- correct documentat
On 16/09/2021 16:45, Jan Beulich wrote:
On 15.07.2021 10:58, Jan Beulich wrote:
On 20.05.2021 13:46, Jan Beulich wrote:
On 25.02.2021 17:23, Paul Durrant wrote:
On 25/02/2021 14:00, Jan Beulich wrote:
On 25.02.2021 13:11, Paul Durrant wrote:
On 25/02/2021 07:33, Jan Beulich wrote:
On
semuCPUOps::has_work,
remove it along with the assertion in cpu_has_work().
Signed-off-by: Philippe Mathieu-Daudé
Xen parts...
Acked-by: Paul Durrant
ned-off-by: Jan Beulich
Reviewed-by: Paul Durrant
On 19/08/2021 09:04, Jan Beulich wrote:
The old (super)page's permissions ought to be propagated, rather than
blindly allowing both reads and writes.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
ormal domain ID (from the [present]
context entry) gets used. See sub-section "IOTLB" of section "Address
Translation Caches" in the VT-d spec.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
On 18/08/2021 13:09, Jan Beulich wrote:
On 18.08.2021 12:51, Jan Beulich wrote:
Paul,
back at the time I did already question your intended meaning of
this flag. I notice that there's presently no consumer of it being
set (apart from yielding non-zero flush_flags). I'm afraid this
model makes a
On 10/08/2021 14:37, Jan Beulich wrote:
Hello,
while I don't expect this case to occur often in practice, for
superpage support we will need to be able to correctly free a
page table (hierarchy) after replacing its mapping range by a
superpage. Following P2M by carrying out an immediate iotlb fl
On 21/07/2021 16:58, Jan Beulich wrote:
Paul,
the description of this says
"At the moment iommu_map() and iommu_unmap() take a page order rather than a
count, whereas iommu_iotlb_flush() takes a page count rather than an order.
This patch makes them consistent with each other, opting for a
On 07/07/2021 14:22, Jan Beulich wrote:
This amends commit 980d6acf1517 ("IOMMU: make DMA containment of
quarantined devices optional").
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -10,6 +10,13 @@ The format is based on [Keep a
Cooper
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
--- a/xen/drivers/passthrough/iommu.c
+++ b/xen/drivers/passthrough/iommu.c
@@ -82,7 +82,7 @@ static int __init parse_iommu_param(cons
#ifdef CONFIG_HAS_PCI
else if ( (val = parse_boolean("qu
at's wanted is a "return", eliminate the "out"
label at the same time.
Take the opportunity and also limit the control to builds supporting
PCI.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
On 05/07/2021 17:15, Jan Beulich wrote:
..., as are the majority of the locks involved. Conditionalize things
accordingly.
Also adjust the ioreq field's indentation at this occasion.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
ne so...
Reviewed-by: Paul Durrant
On 01/07/2021 15:09, Anthony PERARD wrote:
This avoid the need to create the symbolic link "include/asm".
Signed-off-by: Anthony PERARD
Acked-by: Paul Durrant
d the lock. Contain all
command sending related locking to the latter function.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
e no idea why it was used here in
the first place, instead of the cheaper list iteration.
Signed-off-by: Jan Beulich
Reviewed-by: Paul Durrant
---
A first step beyond this could be to have the backing functions of
deassign_device() allow the caller to tell whether the failure was from
remo
On 17/05/2021 22:43, Marek Marczykowski-Górecki wrote:
On Tue, May 11, 2021 at 12:46:38PM +, Durrant, Paul wrote:
-Original Message-
From: Marek Marczykowski-Górecki
Sent: 11 May 2021 11:45
To: Durrant, Paul
Cc: Michael Brown ; p...@xen.org;
xen-devel@lists.xenproject.org;
net...@
:
* KEXEC_TYPE_LIVEUPDATE: New operation to request Live Update
* KEXEC_MA_RANGE_LIVEUPDATE: New range to query the Live Update
area below Xen
Signed-off-by: Julien Grall
Reviewed-by: Paul Durrant
---
xen/include/public/kexec.h | 13 ++---
1 file changed, 10 insertions(+), 3
On 06/05/2021 11:42, Julien Grall wrote:
From: Julien Grall
Looks good in general... just a few comments below...
Administrators often require updating the Xen hypervisor to address
security vulnerabilities, introduce new features, or fix software defects.
Currently, we offer the following
verything doesn't work anymore, we need to use the "host_device"
driver when the disk image is a block device and "file" driver when it
is a regular file.
Signed-off-by: Anthony PERARD
Acked-by: Paul Durrant
---
hw/block/xen-block.c | 14 +-
1 file ch
On 30/04/2021 17:37, Anthony PERARD wrote:
From: Anthony PERARD
Because Coverity complains about it and this is one leak that Valgrind
reports.
Signed-off-by: Anthony PERARD
Acked-by: Paul Durrant
---
hw/i386/xen/xen-hvm.c | 9 ++---
include/hw/xen/xen_common.h | 6
On 28/04/2021 09:49, Jan Beulich wrote:
On 28.04.2021 09:19, Paul Durrant wrote:
On 28/04/2021 07:15, Jan Beulich wrote:
Following the extension to the command line option I'm putting in place
in "IOMMU: make DMA containment of quarantined devices optional" (which
I still need t
On 28/04/2021 07:15, Jan Beulich wrote:
On 28.04.2021 00:00, Scott Davis wrote:
On 4/27/21, 2:56 AM, Jan Beulich wrote:
On 26.04.2021 19:25, Scott Davis wrote:
This patch modifies Xen's behavior when making devices assignable while the
iommu=no-quarantine command line option is in effect. Curr
On 22/04/2021 16:11, Jan Beulich wrote:
On 22.04.2021 17:06, Jan Beulich wrote:
On 22.04.2021 16:55, Jan Beulich wrote:
+do {
+/* Limit rows to just as many to cover the next one to access. */
+cfg->start_row = i;
+cfg->rows[modrm_reg] = i + 1;
+
On 22/04/2021 12:38, Jan Beulich wrote:
On 16.04.2021 15:16, Jan Beulich wrote:
Zapping leaf data for out of range leaves is just one half of it: To
avoid guests (bogusly or worse) inferring information from mere leaf
presence, also shrink maximum indicators such that the respective
trailing ent
at it wouldn't make the replacement atomic for parallel accesses to
the replaced region - those might still fail with SIGBUS due to
xenforeignmemory_map not being atomic. So we're still not expecting those.
Tested-by: Anthony PERARD
Signed-off-by: Igor Druzhinin
Reviewed-by: Paul Durrant
eating the behaviour that was previously assumed to exist.
Signed-off-by: Michael Brown
Reviewed-by: Paul Durrant
---
drivers/net/xen-netback/xenbus.c | 12
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/x
On 13/04/2021 11:48, Michael Brown wrote:
On 13/04/2021 08:12, Paul Durrant wrote:
If the frontend subsequently disconnects and reconnects (e.g.
transitions through Closed->Initialising->Connected) then:
- Nothing recreates "hotplug-status"
- When the frontend re-enters
On 10/04/2021 19:25, Michael Brown wrote:
Commit https://github.com/torvalds/linux/commit/1f25657 ("xen-netback:
remove 'hotplug-status' once it has served its purpose") seems to have
introduced a regression that prevents a vif frontend from transitioning
more than once into Connected state.
On 01/04/2021 14:38, George Dunlap wrote:
Signed-off-by: George Dunlap
---
CC: Paul Durrant
CC: Ian Jackson
CC: Wei Liu
Reviewed-by: Paul Durrant
---
CHANGELOG.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index f7ce6682b9
101 - 200 of 3658 matches
Mail list logo