On Monday, November 19, 2018 11:16:16 AM CET David Hildenbrand wrote:
> The content of pages that are marked PG_offline is not of interest
> (e.g. inflated by a balloon driver), let's skip these pages.
>
> Cc: "Rafael J. Wysocki"
> Cc: Pavel Machek
> Cc: Len Brown
> Cc: Andrew Morton
> Cc:
On 20/11/2018 18:10, Andrii Anisov wrote:
Hello Julien,
On 19.11.18 18:42, Julien Grall wrote:
There are no issue about processing IRQs before the syncs. It is the same as
if an IRQ was raised from ila different pCPUs.
So why do you need that?
From my understanding of gic-vgic code (old
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-freebsd10-amd64
testid freebsd-install
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu
On Monday, November 19, 2018 11:16:15 AM CET David Hildenbrand wrote:
> Let's use pfn_to_online_page() instead of pfn_to_page() when checking
> for saveable pages to not save/restore offline memory sections.
>
> Cc: "Rafael J. Wysocki"
> Cc: Pavel Machek
> Cc: Len Brown
> Cc: Andrew Morton
>
flight 130580 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130580/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 129475
build-i386
flight 130599 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130599/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
flight 130625 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130625/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-amd64 6
On 20/11/18 13:57, Igor Mammedov wrote:
> On Mon, 19 Nov 2018 18:14:26 +0100
> Paolo Bonzini wrote:
>
>> On 19/11/18 16:31, Igor Mammedov wrote:
>>> I've tried to give suggestions how to restructure series
>>> on per patch basis. In my opinion it quite possible to split
>>> series in several
On 19/11/18 19:14, Michael S. Tsirkin wrote:
> On Mon, Nov 19, 2018 at 06:14:26PM +0100, Paolo Bonzini wrote:
>> On 19/11/18 16:31, Igor Mammedov wrote:
>>> I've tried to give suggestions how to restructure series
>>> on per patch basis. In my opinion it quite possible to split
>>> series in
On Tue, Nov 20, 2018 at 09:45:13AM -0700, Jan Beulich wrote:
> >>> On 20.11.18 at 17:01, wrote:
> > Bridges are not behind an IOMMU, and are already special cased and
> > skipped in amd_iommu_add_device. Apply the same special casing when
> > updating page tables.
> >
> > This is required or
On Tue, Nov 20, 2018 at 11:05 AM Razvan Cojocaru
wrote:
>
> Move p2m_mem_access_sanity_check() from the asm-x86/mem_access.h
> header, where it currently is declared inline, to
> arch/x86/mm/mem_access.c. This allows source code that includes it
> directly, or indirectly (such as
On Mon, Nov 19, 2018 at 11:16:11AM +0100, David Hildenbrand wrote:
> Right now, pages inflated as part of a balloon driver will be dumped
> by dump tools like makedumpfile. While XEN is able to check in the
> crash kernel whether a certain pfn is actuall backed by memory in the
> hypervisor (see
On 11/19/18 at 11:16am, David Hildenbrand wrote:
> Right now, pages inflated as part of a balloon driver will be dumped
> by dump tools like makedumpfile. While XEN is able to check in the
> crash kernel whether a certain pfn is actuall backed by memory in the
> hypervisor (see
> > >> ---
> > >> drivers/hv/hv_balloon.c | 14 --
> > >> 1 file changed, 12 insertions(+), 2 deletions(-)
> > >>
> > >> diff --git a/drivers/hv/hv_balloon.c b/drivers/hv/hv_balloon.c
> > >> index 211f3fe3a038..47719862e57f 100644
> > >> --- a/drivers/hv/hv_balloon.c
> > >> +++
On Mon, Nov 19, 2018 at 11:16:09AM +0100, David Hildenbrand wrote:
> Commit b1123ea6d3b3 ("mm: balloon: use general non-lru movable page
> feature") reworked balloon handling to make use of the general
> non-lru movable page feature. The big comment block in
> balloon_compaction.h contains quite
flight 130633 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130633/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-amd64 6
>
> PG_balloon was introduced to implement page migration/compaction for pages
> inflated in virtio-balloon. Nowadays, it is only a marker that a page is
> part of virtio-balloon and therefore logically offline.
>
> We also want to make use of this flag in other balloon drivers - for
> inflated
flight 130520 linux-4.19 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130520/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
Thanks for this patch!
> On Nov 19, 2018, at 2:16 AM, David Hildenbrand wrote:
>
> Mark inflated and never onlined pages PG_offline, to tell the world that
> the content is stale and should not be dumped.
>
> Cc: Xavier Deguillard
> Cc: Nadav Amit
> Cc: Arnd Bergmann
> Cc: Greg
flight 130629 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130629/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-amd64 6
flight 130564 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130564/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64-xsm
On Mon, Nov 19, 2018 at 11:16:10AM +0100, David Hildenbrand wrote:
> PG_balloon was introduced to implement page migration/compaction for pages
> inflated in virtio-balloon. Nowadays, it is only a marker that a page is
> part of virtio-balloon and therefore logically offline.
>
> We also want to
On Tue, Nov 20, 2018 at 10:12 AM Jan Beulich wrote:
>
> >>> On 20.11.18 at 17:59, wrote:
> > On 20/11/2018 16:18, Jan Beulich wrote:
> >> For domain heap pages assigned to a domain dropping the page reference
> >> tied to PGC_allocated may not drop the last reference, as otherwise the
> >>
>>> On 15.11.18 at 22:47, wrote:
> As noted in c/s 4999bf3e8b "x86/PV: use generic emulator for privileged
> instruction handling", these hoops are jumped through to retain the older
> behaviour, along with a note suggesting that we should reconsider things.
>
> It does not matter exactly when
Hi David,
>
> Mark inflated and never onlined pages PG_offline, to tell the world that
> the content is stale and should not be dumped.
>
> Cc: "K. Y. Srinivasan"
> Cc: Haiyang Zhang
> Cc: Stephen Hemminger
> Cc: Kairui Song
> Cc: Vitaly Kuznetsov
> Cc: Andrew Morton
> Cc: Matthew Wilcox
On Mon, 19 Nov 2018 13:27:14 -0500
"Michael S. Tsirkin" wrote:
> On Thu, Nov 08, 2018 at 03:16:23PM +0100, Igor Mammedov wrote:
> > On Mon, 5 Nov 2018 02:40:28 +0100
> > Samuel Ortiz wrote:
> >
> > > XSDT is the 64-bit version of the legacy ACPI RSDT (Root System
> > > Description Table).
On 20.11.18 09:45, Pankaj Gupta wrote:
>
> Hi David,
>
>>
>> Mark inflated and never onlined pages PG_offline, to tell the world that
>> the content is stale and should not be dumped.
>>
>> Cc: "K. Y. Srinivasan"
>> Cc: Haiyang Zhang
>> Cc: Stephen Hemminger
>> Cc: Kairui Song
>> Cc: Vitaly
>>> On 19.11.18 at 18:26, wrote:
> For now, only do allocation/deallocation; keeping them in sync
> will be done in subsequent patches.
>
> Logdirty synchronization will only be done for active altp2ms;
> so allocate logdirty rangesets (copying the host logdirty
> rangeset) when an altp2m is
>>> On 19.11.18 at 19:11, wrote:
> On 19/11/2018 10:13, Jan Beulich wrote:
>> @@ -8828,12 +8837,7 @@ x86_emulate(
>> dst.type = OP_NONE;
>> break;
>> default:
>> -if ( (d & DstMask) != DstMem )
>> -{
>> -
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict
testid depriv-audit-qemu/create
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu
On Mon, 19 Nov 2018 18:02:53 +
"Boeuf, Sebastien" wrote:
> On Mon, 2018-11-19 at 16:37 +0100, Igor Mammedov wrote:
> > On Fri, 16 Nov 2018 19:42:08 +
> > "Boeuf, Sebastien" wrote:
> >
> > >
> > > Hi Igor,
> > >
> > > On Fri, 2018-11-16 at 10:39 +0100, Igor Mammedov wrote:
> > > >
flight 130585 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130585/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
On 20/11/2018 19:09, Wei Liu wrote:
> Introduce XEN_DOM0_UUID in Xen's global configuration file. Make
> xen-init-dom0 accept an extra argument for UUID.
>
> Signed-off-by: Wei Liu
Reviewed-by: Juergen Gross
Juergen
___
Xen-devel mailing list
On 11/19/18 at 11:16am, David Hildenbrand wrote:
> diff --git a/kernel/crash_core.c b/kernel/crash_core.c
> index 933cb3e45b98..093c9f917ed0 100644
> --- a/kernel/crash_core.c
> +++ b/kernel/crash_core.c
> @@ -464,6 +464,8 @@ static int __init crash_save_vmcoreinfo_init(void)
>
On Thu, Nov 15, 2018 at 9:09 PM Souptick Joarder wrote:
>
> Previouly drivers have their own way of mapping range of
> kernel pages/memory into user vma and this was done by
> invoking vm_insert_page() within a loop.
>
> As this pattern is common across different drivers, it can
> be generalized
flight 130638 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130638/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-amd64 6
flight 130617 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130617/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-xsm 4
On 11/20/18 17:33, Igor Mammedov wrote:
> On Wed, 7 Nov 2018 16:36:40 +0400
> Marc-André Lureau wrote:
>
>> Interfaces don't have instance, let's make the interface type really
>> abstract to avoid confusion.
>>
>> Signed-off-by: Marc-André Lureau
>> ---
>>
branch xen-unstable
xenbranch xen-unstable
job build-armhf-libvirt
testid libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib https://git.savannah.gnu.org/git/gnulib.git/
Tree: libvirt_keycodemapdb https://gitlab.com/keycodemap/keycodemapdb.git
Tree: qemuu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-275
version 2
insufficient TLB flushing / improper large page mappings with AMD IOMMUs
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-277
version 2
x86: incorrect error handling for guest p2m page removals
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-279
version 2
x86: DoS from attempting to use INVPCID with a non-canonical addresses
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
On 19/11/2018 15:25, Jan Beulich wrote:
On 15.11.18 at 22:47, wrote:
>> For more historical context, see
>> c/s c17b36d5dc792cfdf59b6de0213b168bec0af8e8
>> c/s 04656384a1b9714e43db850c51431008e23450d8
>>
>> PVRDTSCP was an attempt to provide Xen-aware userspace with a stable
>>
flight 130591 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130591/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
On 20/11/2018 11:06, Jan Beulich wrote:
On 15.11.18 at 22:47, wrote:
>> The final remnanat of PVRDTSCP is that we would emulate RDTSCP even on
>> hardware which lacked the instruction. RDTSCP is available on almost all
>> 64-bit x86 hardware.
>>
>> Remove this emulation, drop the
flight 75615 distros-debian-snapshot real [real]
http://osstest.xensource.com/osstest/logs/75615/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-amd64-current-netinst-pygrub 10 debian-di-install fail like
75591
On Mon, 19 Nov 2018 18:14:26 +0100
Paolo Bonzini wrote:
> On 19/11/18 16:31, Igor Mammedov wrote:
> > I've tried to give suggestions how to restructure series
> > on per patch basis. In my opinion it quite possible to split
> > series in several smaller ones and it should really help with
> >
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-276
version 2
resource accounting issues in x86 IOREQ server handling
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-280
version 2
Fix for XSA-240 conflicts with shadow paging
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
flight 130601 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130601/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
On 15/11/2018 09:33, Roger Pau Monné wrote:
> On Fri, Nov 02, 2018 at 01:37:29PM +0100, Juergen Gross wrote:
>> Add the needed code to setup the hypercall page for calling into the
>> Xen hypervisor.
>>
>> Signed-off-by: Juergen Gross
>
> Thanks, LGTM, just one suggestion and one question.
>
>>
> On Nov 20, 2018, at 9:12 AM, Jan Beulich wrote:
>
On 19.11.18 at 18:26, wrote:
>> When an new altp2m view is created very early on guest boot, the
>> display will freeze (although the guest will run normally). This
>> may also happen on resizing the display. The reason is the way
>>
On 09/11/2018 19:12, Daniel Kiper wrote:
> On Fri, Nov 02, 2018 at 01:37:29PM +0100, Juergen Gross wrote:
>> Add the needed code to setup the hypercall page for calling into the
>> Xen hypervisor.
>>
>> Signed-off-by: Juergen Gross
>> ---
>> V3: grub_xen_early_halt->grub_xen_panic (Roger Pau
On 11/20/18 11:05 AM, Jan Beulich wrote:
On 19.11.18 at 18:26, wrote:
>> For now, only do allocation/deallocation; keeping them in sync
>> will be done in subsequent patches.
>>
>> Logdirty synchronization will only be done for active altp2ms;
>> so allocate logdirty rangesets (copying the
On 11/20/18 12:27 PM, Jan Beulich wrote:
On 20.11.18 at 11:02, wrote:
>> On 11/20/18 11:05 AM, Jan Beulich wrote:
>> On 19.11.18 at 18:26, wrote:
For now, only do allocation/deallocation; keeping them in sync
will be done in subsequent patches.
Logdirty
On 11/20/18 11:12 AM, Jan Beulich wrote:
On 19.11.18 at 18:26, wrote:
>> When an new altp2m view is created very early on guest boot, the
>> display will freeze (although the guest will run normally). This
>> may also happen on resizing the display. The reason is the way
>> Xen currently
> >> ---
> >> drivers/hv/hv_balloon.c | 14 --
> >> 1 file changed, 12 insertions(+), 2 deletions(-)
> >>
> >> diff --git a/drivers/hv/hv_balloon.c b/drivers/hv/hv_balloon.c
> >> index 211f3fe3a038..47719862e57f 100644
> >> --- a/drivers/hv/hv_balloon.c
> >> +++
>>> On 20.11.18 at 11:02, wrote:
> On 11/20/18 11:05 AM, Jan Beulich wrote:
> On 19.11.18 at 18:26, wrote:
>>> For now, only do allocation/deallocation; keeping them in sync
>>> will be done in subsequent patches.
>>>
>>> Logdirty synchronization will only be done for active altp2ms;
>>> so
>>> On 15.11.18 at 22:47, wrote:
> @@ -1040,7 +1040,10 @@ static int hvm_load_cpu_ctxt(struct domain *d,
> hvm_domain_context_t *h)
> if ( hvm_funcs.tsc_scaling.setup )
> hvm_funcs.tsc_scaling.setup(v);
>
> -v->arch.hvm.msr_tsc_aux = ctxt.msr_tsc_aux;
> +if (
Hello Andre,
I'm going to change "gic_raise_guest_irq()" function interface.
Could you please comment my understanding of vgic-v3-its.c code below?
So that I could fix it alongside the function interface change.
On 16.11.18 18:45, Andrii Anisov wrote:
diff --git
>>> On 20.11.18 at 11:56, wrote:
> Without this change valgrind can not decide what variant of
> xen_domctl_createdomain is provided as input.
>
> Fixes commit 4a83497635 ("xen/domctl: Merge set_max_evtchn into createdomain")
> Fixes commit a903bf5233 ("tools: Pass grant table limits to
>
Deployment note: I have copied this binary to the images directory in
Cambridge and Massachusetts. The corresponding patch to chiark-utils
is on its way to my upstream hat.
CC: George Dunlap
Signed-off-by: Ian Jackson
---
production-config | 2 +-
production-config-cambridge | 2 +-
libxl creates this directory with mode 0. That prevents
fishdescriptor from working. chmod it. This is OK for testing.
CC: George Dunlap
Signed-off-by: Ian Jackson
---
ts-depriv-audit-qemu | 1 +
1 file changed, 1 insertion(+)
diff --git a/ts-depriv-audit-qemu b/ts-depriv-audit-qemu
index
* Use mkdir -p, rather than trying to only create /run/user/$uid.
That helps if /run and/or /run/user do not exist, as they do in
libxl-made chroots with recent libxl (which gets qemu to chroot).
* Do all of this in the root directory of the qemu process, not our
own root directory. So it
>>> On 20.11.18 at 10:43, wrote:
>
>> On Nov 20, 2018, at 9:12 AM, Jan Beulich wrote:
>>
> On 19.11.18 at 18:26, wrote:
>>> When an new altp2m view is created very early on guest boot, the
>>> display will freeze (although the guest will run normally). This
>>> may also happen on
>>> On 19.11.18 at 18:26, wrote:
> When an new altp2m view is created very early on guest boot, the
> display will freeze (although the guest will run normally). This
> may also happen on resizing the display. The reason is the way
> Xen currently (mis)handles logdirty VGA: it intentionally
>
Hello Stefano,
On 01.11.18 22:20, Stefano Stabellini wrote:
No, I haven't had any time. Aside from the Xen version, another
difference is the interrupt source. I used the physical timer for
testing.
Could you share your approach for interrupts latency measurement? Are
you using any HW
On Mon, Nov 19, 2018 at 07:56:18AM -0700, Jan Beulich wrote:
> >>> On 14.11.18 at 12:57, wrote:
> > Make sure the MSIX MMIO regions don't have p2m entries setup, so that
> > accesses to them trap into the hypervisor and can be handled by vpci.
> >
> > Commit 042678762 ("x86/iommu: add
On 20/11/2018 14:10, Wei Liu wrote:
> They should have used .gcc-x86-32-build-debug in the first place.
>
> Signed-off-by: Wei Liu
Oops yes - Acked-by: Andrew Cooper
> ---
> This patch is trivial so I intend to commit it as soon as possible to
> fix Gitlab CI.
> ---
> .gitlab-ci.yml | 4 ++--
Wei Liu writes ("[PATCH 1/3] tools: update examples/README"):
> This file gets installed to the host system.
>
> This patch cleans it up: 1. remove things that don't exist anymore; 2.
> change xm to xl; 3. fix xen-devel list address; 4. add things that are
> missing.
Acked-by: Ian Jackson
Wei Liu writes ("[PATCH 2/3] tools/helpers: make gen_stub_json_config accept an
UUID argument"):
> If that's set, the stub is going to contain that UUID.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
Make X86_VENDOR_UNKNOWN have the value 0 so a piece of zeroed memory can't get
confused with X86_VENDOR_INTEL.
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Roger Pau Monné
---
xen/include/asm-x86/x86-vendors.h | 12 ++--
1 file changed, 6
On Wed, 7 Nov 2018 16:36:39 +0400
Marc-André Lureau wrote:
> Instead, it returns 1 if an error was detected, which is the case for:
>
> /qdev/properties/dynamic/global/subprocess:
> warning: global dynamic-prop-type-bad.prop3 has invalid class name
> warning: global nohotplug-type.prop5=105
They should have used .gcc-x86-32-build-debug in the first place.
Signed-off-by: Wei Liu
---
This patch is trivial so I intend to commit it as soon as possible to
fix Gitlab CI.
---
.gitlab-ci.yml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/.gitlab-ci.yml
On Tue, Nov 20, 2018 at 02:10:02PM +, Wei Liu wrote:
> They should have used .gcc-x86-32-build-debug in the first place.
>
> Signed-off-by: Wei Liu
> ---
> This patch is trivial so I intend to commit it as soon as possible to
> fix Gitlab CI.
Agreed.
Acked-by: Doug Goldstein
flight 130548 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130548/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
>>> On 20.11.18 at 12:29, wrote:
> On 20/11/2018 11:06, Jan Beulich wrote:
> On 15.11.18 at 22:47, wrote:
>>> The final remnanat of PVRDTSCP is that we would emulate RDTSCP even on
>>> hardware which lacked the instruction. RDTSCP is available on almost all
>>> 64-bit x86 hardware.
>>>
>>>
Hello Julien,
It is me again.
On 15.11.18 17:05, Julien Grall wrote:
On 11/15/18 1:19 PM, Andrii Anisov wrote:
So I would prefer to stick with _t which is quite common within the p2m
code base so far.
I've found a similar code only in one place - p2m_get_entry()
function. And it is, at
Wei Liu writes ("[PATCH 3/3] xen-init-dom0: set Dom0 UUID if requested"):
> Read from XEN_CONFIG_DIR/dom0-uuid. If it contains a valid UUID, set
> it for Dom0.
I approve of the basic principle of this change. Thanks.
However, I am not particularly keen on the details of the config
Boris has confirmed that noone appears to be using PVRDTSCP any more, and in
the decade since it was introduced, guest kernel / hardware support has
provided a better alternative.
For changes, see individual patches.
Andrew Cooper (5):
x86/time: Alter tsc_set_info() to return an error value
The final remnanat of PVRDTSCP is that we would emulate RDTSCP even on
hardware which lacked the instruction. RDTSCP is available on almost all
64-bit x86 hardware.
Remove this emulation, drop the TSC_MODE_PVRDTSCP constant, and allow RDTSCP
in a PV guest's CPUID policy.
Signed-off-by: Andrew
As noted in c/s 4999bf3e8b "x86/PV: use generic emulator for privileged
instruction handling", these hoops are jumped through to retain the older
behaviour, along with a note suggesting that we should reconsider things.
Part of the reason for retention of the old behaviour was removed by c/s
With PVRDTSCP mode removed, handling of MSR_TSC_AUX can move into the common
code. Move its storage into struct vcpu_msrs (dropping the HVM-specific
msr_tsc_aux), and add an RDPID feature check as this bit also enumerates the
presence of the MSR.
Introduce cpu_has_rdpid along with the
For more historical context, see
c/s c17b36d5dc792cfdf59b6de0213b168bec0af8e8
c/s 04656384a1b9714e43db850c51431008e23450d8
PVRDTSCP was an attempt to provide Xen-aware userspace with a stable monotonic
clock, and enough information for said userspace to cope with frequency
changes across
Currently, tsc_set_info() performs no parameter checking, and an invalid
tsc_mode goes largely unnoticed. Fix it to reject invalid tsc_modes with
-EINVAL, and update the callers to check the return value.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Roger Pau Monné
v2:
On 19 November 2018 at 12:08, Mao Zhongyi
wrote:
> Use DeviceClass rather than SysBusDeviceClass in
> xen_sysdev_class_init().
>
> Cc: sstabell...@kernel.org
> Cc: anthony.per...@citrix.com
> Cc: xen-devel@lists.xenproject.org
>
> Signed-off-by: Mao Zhongyi
> Signed-off-by: Zhang Shengju
> ---
To mitigate Meltdown, Xen has been fixed with a software fix, namely
using retpoline sequences generated by the compiler. This way, indirect
branches are protected against the attack.
However, the retpoline sequence comes with a slow down. To make up for
this, we propose to avoid jump tables in
Current logic to handle long running operations is flawed because it
doesn't prevent the guest vcpu from running. Fix this by raising a
scheduler softirq when preemption is required, so that the do_softirq
call in the guest entry path performs a rescheduling. Also move the
call to
No functional change expected.
Signed-off-by: Roger Pau Monné
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
Changes since v4:
- New in this version.
---
A few things I had run into while working on that issue:
1: mm: disallow MEMF_no_refcount to be passed for domain-owned allocations
2: x86: correct instances of PGC_allocated clearing
3: x86: reduce code duplication in guest_remove_page()
4: make domain_adjust_tot_pages() __must_check
They don't
For domain heap pages assigned to a domain dropping the page reference
tied to PGC_allocated may not drop the last reference, as otherwise the
test_and_clear_bit() might already act on an unowned page.
Work around this where possible, but the need to acquire extra page
references is a fair hint
Quite a bit of duplicate code has accumulated on the "paging" types
special case path. Re-use what can be re-used from the common path.
Since it needs touching anyway, slightly re-format and extend the
gdprintk() on the common path as well.
Signed-off-by: Jan Beulich
--- a/xen/common/memory.c
>>> On 20.11.18 at 15:37, wrote:
> With PVRDTSCP mode removed, handling of MSR_TSC_AUX can move into the common
> code. Move its storage into struct vcpu_msrs (dropping the HVM-specific
> msr_tsc_aux), and add an RDPID feature check as this bit also enumerates the
> presence of the MSR.
>
>
On Wed, 7 Nov 2018 16:36:40 +0400
Marc-André Lureau wrote:
> Interfaces don't have instance, let's make the interface type really
> abstract to avoid confusion.
>
> Signed-off-by: Marc-André Lureau
> ---
> include/hw/acpi/acpi_dev_interface.h | 6 +-
> include/hw/arm/linux-boot-if.h
On Mon, Nov 19, 2018 at 09:30:59PM +, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> automation/build/README.md | 3 +++
> automation/scripts/containerize | 8 +---
> 2 files changed, 8 insertions(+), 3 deletions(-)
>
> diff --git a/automation/build/README.md
On Mon, Nov 19, 2018 at 09:31:00PM +, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> .gitlab-ci.yml | 2 +-
> automation/scripts/build | 3 +++
> 2 files changed, 4 insertions(+), 1 deletion(-)
>
> diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
> index 5678b552c4..28152e906d 100644
On Mon, Nov 19, 2018 at 09:31:01PM +, Wei Liu wrote:
> ... so that it can be passed on to test stage.
>
> Note that xen is only extracted for x86_64 build since others may not
> have that. Use a directory to account for possibly different file
> names on Arm.
>
> Signed-off-by: Wei Liu
On 20/11/2018 15:59, Jan Beulich wrote:
> In particular sh_oos_audit() has become stale due to changes elsewhere,
> and the need for adjustment was not noticed because both "full audit"
> flags are off in both release and debug builds. Switch away from pre-
> processsor conditionals, thus exposing
On 20/11/2018 16:17, Jan Beulich wrote:
> When such pages get assigned to domains (and hence their ->tot_pages
> not incremented accordingly) we would otherwise also need to suppress
> decrementing the count when freeing those pages.
>
> Signed-off-by: Jan Beulich
>
> ---
On 20/11/2018 16:18, Jan Beulich wrote:
> For domain heap pages assigned to a domain dropping the page reference
> tied to PGC_allocated may not drop the last reference, as otherwise the
> test_and_clear_bit() might already act on an unowned page.
>
> Work around this where possible, but the need
1 - 100 of 135 matches
Mail list logo