On Mon, Nov 27, 2017 at 02:58:38PM +, George Dunlap wrote:
> On 11/27/2017 02:39 PM, Roger Pau Monné wrote:
> > On Mon, Nov 27, 2017 at 02:12:40PM +, George Dunlap wrote:
> >> On 11/27/2017 11:43 AM, Roger Pau Monné wrote:
> >>> On Wed, Nov 22, 2017 at 07:20:1
Supported, x86: bzImage
ELF is missing here.
> +Supported, ARM32: zImage
> +Supported, ARM64: Image
> +
> +Format which the toolstack accept for direct-boot kernels
> +
> +### systemd support for xl
BSD-style init is also supported.
The rest LGTM:
Revie
On Mon, Nov 27, 2017 at 02:12:40PM +, George Dunlap wrote:
> On 11/27/2017 11:43 AM, Roger Pau Monné wrote:
> > On Wed, Nov 22, 2017 at 07:20:12PM +, George Dunlap wrote:
> >> For now only include xl-specific features, or interaction with the
> >> syst
On Tue, Nov 28, 2017 at 10:44:00AM +0100, Juergen Gross wrote:
> When booted via the special PVH entry save the RSDP address set in the
> boot information block in struct boot_params. This will enable Xen to
> locate the RSDP at an arbitrary address.
>
> Signed-off-by: Juergen Gross
On Tue, Nov 28, 2017 at 10:43:59AM +0100, Juergen Gross wrote:
> In case the rsdp address in struct boot_params is specified don't try
> to find the table by searching, but take the address directly as set
> by the boot loader.
>
> Signed-off-by: Juergen Gross
> ---
>
On Wed, Nov 29, 2017 at 09:21:59AM +0100, Juergen Gross wrote:
> On 28/11/17 20:34, Maran Wilson wrote:
> > For certain applications it is desirable to rapidly boot a KVM virtual
> > machine. In cases where legacy hardware and software support within the
> > guest is not needed, Qemu should be
On Wed, Nov 29, 2017 at 03:11:12PM +0100, Juergen Gross wrote:
> On 29/11/17 15:03, Boris Ostrovsky wrote:
> > On 11/29/2017 03:50 AM, Roger Pau Monné wrote:
> >> On Wed, Nov 29, 2017 at 09:21:59AM +0100, Juergen Gross wrote:
> >>> On 28/11/17 20:34, Maran Wi
On Tue, Dec 19, 2017 at 07:25:51AM -0700, Jan Beulich wrote:
> >>> On 19.12.17 at 15:16, wrote:
> > --- a/xen/common/sched_null.c
> > +++ b/xen/common/sched_null.c
> > @@ -781,6 +781,10 @@ static struct task_slice null_schedule(const struct
> > scheduler *ops,
> >
On Tue, Dec 19, 2017 at 02:48:47PM +, Ian Jackson wrote:
> Roger Pau Monné writes ("Re: [PATCH] libxl/pvh: force PVH guests to use the
> xenstore shutdown"):
> > Yes, that's exactly what I meant but failed to express. Feel free to
> > replace the commit message
On Fri, Dec 01, 2017 at 03:14:07PM +0100, Juergen Gross wrote:
> Instead of locating the RSDP table below 1MB put it just below 4GB
> like the rest of the ACPI tables in case of PVH guests. This will
> avoid punching more holes than necessary into the memory map.
>
> Signed-off-by: Juergen Gross
On Tue, Dec 19, 2017 at 04:46:37PM +0100, Juergen Gross wrote:
> On 19/12/17 16:38, Roger Pau Monné wrote:
> > On Fri, Dec 01, 2017 at 03:14:07PM +0100, Juergen Gross wrote:
> >> Instead of locating the RSDP table below 1MB put it just below 4GB
> >> like the rest of the
On Tue, Dec 19, 2017 at 05:20:41PM +0100, Juergen Gross wrote:
> On 19/12/17 17:11, Roger Pau Monné wrote:
> > On Tue, Dec 19, 2017 at 04:46:37PM +0100, Juergen Gross wrote:
> >> On 19/12/17 16:38, Roger Pau Monné wrote:
> >>> On Fri, Dec 01, 2017 at 03:14:0
On Tue, Dec 05, 2017 at 03:09:47PM +, Ian Jackson wrote:
> Roger Pau Monne writes ("[PATCH v17 19/19] osstest: use -DWITHOUT_AUTO_OBJ
> with FreeBSD release targets"):
> > Due to a recent FreeBSD change the default output directory of the release
> > targets is changed to the object directory
On Wed, Dec 06, 2017 at 12:22:00PM +0100, Juergen Gross wrote:
> On 06/12/17 10:53, Julien Grall wrote:
> > Hi Juergen,
> >
> > On 12/05/2017 04:19 PM, Juergen Gross wrote:
> >> On 05/12/17 16:23, Julien Grall wrote:
> >>> Hi Juergen,
> >>>
> >>> On 04/12/17 15:49, Juergen Gross wrote:
> On
.g. when
> hotplugging memory into the guest.
>
> Signed-off-by: Juergen Gross <jgr...@suse.com>
Reviewed-by: Roger Pau Monné <roger@citrix.com>
Albeit I would also prefer this to not be PVH specific. Ideally I
would like both PVH and HVM to share the logic to mark the re
On Mon, May 14, 2018 at 05:03:52PM +0100, Wei Liu wrote:
> On Thu, May 10, 2018 at 06:15:05PM +0100, Roger Pau Monne wrote:
> > Provided to both Dom0 and DomUs.
> >
> > Signed-off-by: Roger Pau Monné <roger@citrix.com>
> > ---
> > Cc: Andrew Cooper <
On Mon, May 14, 2018 at 08:56:16AM -0600, Jan Beulich wrote:
> >>> On 14.05.18 at 16:15, wrote:
> > On Mon, May 14, 2018 at 06:24:37AM -0600, Jan Beulich wrote:
> >> >>> On 08.05.18 at 11:25, wrote:
> >> > --- a/xen/arch/x86/hvm/vmsi.c
> >> > +++
On Mon, May 14, 2018 at 05:00:51PM +0100, Wei Liu wrote:
> On Thu, May 10, 2018 at 06:15:04PM +0100, Roger Pau Monne wrote:
> > @@ -1014,6 +1034,30 @@ static int vcpu_hvm(struct xc_dom_image *dom)
> > if ( dom->start_info_seg.pfn )
> > bsp_ctx.cpu.rbx = dom->start_info_seg.pfn <<
gt; > the same set of MTRR ranges should provide Dom0 with a sane MTRR state
> > without having to manually build it in Xen.
> >
> > Signed-off-by: Roger Pau Monné <roger@citrix.com>
> > ---
> > Cc: Jan Beulich <jbeul...@suse.com>
> > Cc:
On Mon, May 14, 2018 at 06:24:37AM -0600, Jan Beulich wrote:
> >>> On 08.05.18 at 11:25, wrote:
> > --- a/xen/arch/x86/hvm/vmsi.c
> > +++ b/xen/arch/x86/hvm/vmsi.c
> > @@ -663,6 +663,42 @@ void vpci_msi_arch_mask(struct vpci_msi *msi, const
> > struct pci_dev *pdev,
> >
On Mon, May 14, 2018 at 06:29:37AM -0600, Jan Beulich wrote:
> >>> On 08.05.18 at 11:25, wrote:
> > --- a/xen/arch/x86/hvm/vmsi.c
> > +++ b/xen/arch/x86/hvm/vmsi.c
> > @@ -699,6 +699,29 @@ static int vpci_msi_update(const struct pci_dev *pdev,
> > uint32_t data,
> >
On Mon, May 14, 2018 at 05:42:53PM +0100, Wei Liu wrote:
> On Mon, May 14, 2018 at 05:02:47PM +0100, Roger Pau Monné wrote:
> > On Mon, May 14, 2018 at 05:00:51PM +0100, Wei Liu wrote:
> > > On Thu, May 10, 2018 at 06:15:04PM +0100, Roger Pau Monne wrote:
> > > > @@
gners don't
> even get the class code right, what other flaws do we have to expect?
> Anyway, this is no objection to the actual code change, I'm merely
> unconvinced that the argumentation is plausible.
>
> > Suggested-by: Andrew Cooper <andrew.coop...@citrix.com>
> > Signed
On Tue, May 08, 2018 at 11:30:18AM +0200, Juergen Gross wrote:
> On 08/05/18 11:23, Roger Pau Monne wrote:
> > Hello,
> >
> > There's a bug in current vpci code for MSI emulation when updating an
> > already bound interrupt. The code will disable and enable the interrupt
> > in order to update
On Wed, May 09, 2018 at 12:30:16PM +0100, Roger Pau Monné wrote:
> On Wed, May 09, 2018 at 11:56:40AM +0100, Andrew Cooper wrote:
> > On 09/05/18 11:21, Roger Pau Monne wrote:
> > I'm not sure that setting the default MTRR type is going to be a
> > clever idea in hindsight
ing the default type to WB. Linux
> > will use PAT to set the actual memory cache attributes.
> >
> > Signed-off-by: Boris Ostrovsky <boris.ostrov...@oracle.com>
> > Signed-off-by: Roger Pau Monné <roger@citrix.com>
>
> I'd argue that this is a bug in PVH st
On Wed, May 09, 2018 at 06:12:28PM +0200, Juergen Gross wrote:
> On 09/05/18 18:07, Roger Pau Monne wrote:
> > This prevents page-shattering, by being able to populate the RAM
> > regions below 4GB using 1GB pages, provided the guest memory size is
> > set to a multiple of a GB.
> >
> > Note that
On Thu, May 10, 2018 at 10:43:26AM +0100, George Dunlap wrote:
> On Wed, May 9, 2018 at 5:07 PM, Roger Pau Monne wrote:
> > This prevents page-shattering, by being able to populate the RAM
> > regions below 4GB using 1GB pages, provided the guest memory size is
> > set to a
n guest_walk_tables()
> was resolved by the aformentioned commit.
>
> Remove the unused variables and associated infrastructure.
>
> Reported-by: Jason Andryuk <jandr...@gmail.com>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Roger Pau Monné &
On Mon, May 14, 2018 at 06:08:57PM +0100, Ian Jackson wrote:
> In order to support auditing of qemu depriv, my audit tool wants to
> know the fd of a privcmd handle on which it can easily make
> hypercalls. xencall provides such a handle, but has no cooked
> facilities for making hypercalls. So
On Thu, May 17, 2018 at 12:16:55PM +0100, Ian Jackson wrote:
> Three more files which missed out on
> dea987c5ab11 "PERLLIB, @INC: Use BEGIN { }"
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-by: Roger Pau
On Thu, May 17, 2018 at 12:16:56PM +0100, Ian Jackson wrote:
> This makes `mg-anoint' in standalone mode a view onto an empty set of
> anointments. So now it becomes ok to call mg-anoint in make-*-flight.
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-b
qual. Both vCPU-s having MTRRs disabled means only PAT needs to be
> compared. Along those lines for fixed range MTRRs. Differring variable
> range counts likewise mean settings are different overall.
>
> Constify types and convert bool_t to bool.
>
> Signed-off-by: Jan Beulich <
Jackson <ian.jack...@eu.citrix.com>
LGTM
Reviewed-by: Roger Pau Monné <roger@citrix.com>
Thanks, Roger.
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Thu, May 17, 2018 at 12:16:57PM +0100, Ian Jackson wrote:
> make-*-flight is going to want this.
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-by: Roger Pau Monné <roger@citrix.com>
Just a style comment below.
> ---
> mg-anoint | 12 +++
appropriately. The overall result is that
> if no useful FreeBSD build is found, we simply do not set the
> freebsd_* runvars, rather than setting them to wrong values (eg,
> `freebsd_distpath=/i386'.
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-by
On Wed, May 16, 2018 at 07:51:07AM -0600, Jan Beulich wrote:
> >>> On 16.05.18 at 15:41, wrote:
> > On Wed, May 16, 2018 at 06:01:00AM -0600, Jan Beulich wrote:
> >> @@ -729,6 +729,14 @@ static int hvm_load_mtrr_msr(struct doma
> >> if ( hvm_load_entry(MTRR, h, _mtrr)
On Wed, May 16, 2018 at 06:01:00AM -0600, Jan Beulich wrote:
> >>> On 16.05.18 at 13:53, wrote:
> > On Wed, May 16, 2018 at 02:39:26AM -0600, Jan Beulich wrote:
> >> >>> On 15.05.18 at 16:36, wrote:
> >> > +for ( i = 0; i < num_var_ranges; i++
On Mon, May 14, 2018 at 06:08:59PM +0100, Ian Jackson wrote:
> Add mention of LIBXL_QEMU_USER_RANGE_BASE, in case that is what the
> user was intending.
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-by: Roger Pau Monné <roger...
Just some replies/questions to some of the points raised below.
On Fri, May 11, 2018 at 09:33:10AM -0700, Dan Williams wrote:
> [ adding linux-nvdimm ]
>
> Great write up! Some comments below...
>
> On Wed, May 9, 2018 at 10:35 AM, George Dunlap
> wrote:
> >> To use
e memory map provided to a PVH Dom0 is based on the native one using
> >> >> > the same set of MTRR ranges should provide Dom0 with a sane MTRR state
> >> >> > without having to manually build it in Xen.
> >> >> >
> >> >> > Signe
On Wed, May 16, 2018 at 02:47:39AM -0600, Jan Beulich wrote:
> >>> On 15.05.18 at 16:36, wrote:
> > --- a/xen/arch/x86/hvm/mtrr.c
> > +++ b/xen/arch/x86/hvm/mtrr.c
> > @@ -185,6 +185,30 @@ int hvm_vcpu_cacheattr_init(struct vcpu *v)
> > ((uint64_t)PAT_TYPE_UC_MINUS
On Wed, May 16, 2018 at 02:39:26AM -0600, Jan Beulich wrote:
> >>> On 15.05.18 at 16:36, wrote:
> > +for ( i = 0; i < num_var_ranges; i++ )
>
> Following your v1 I had already put together a patch to change just the
> save and load functions here, as the adjustments
G_SPACE_SIZE when Xen gains the ability to
> emulate MCFG table accesses.
Thanks for doing this. I'm not a QEMU maintainer but:
Reviewed-by: Roger Pau Monné <roger@citrix.com>
> Signed-off-by: Paul Durrant <paul.durr...@citrix.com>
> --
> Cc: Stefano Stabellini <sst
This looks interesting IMO. Just one small nit.
On Thu, May 17, 2018 at 03:31:40PM -0700, Stefano Stabellini wrote:
> ## Hardware Support
>
> ViryaOS will support as many hardware platforms as possible, x86 and ARM
It might be good to mention "x86 (amd64)", and likewise in the bullet
list
On Mon, May 21, 2018 at 12:46:19PM +0100, David Woodhouse wrote:
> On Tue, 2016-01-26 at 09:34 +0800, Jianzhong,Chang wrote:
> > There are some problems when msi guest_masked is set to 1 by default.
> > When guest os is windows 2008 r2 server,
> > the device(eg X540-AT2 vf) is not initialized
On Wed, May 23, 2018 at 05:55:50PM +0100, Andrew Cooper wrote:
> On 23/05/18 17:39, Roger Pau Monné wrote:
> > On Tue, May 22, 2018 at 12:20:40PM +0100, Andrew Cooper wrote:
> >> Instead of having multiple algorithms searching the MSR lists, implement a
> >> single
On Fri, May 25, 2018 at 11:01:18AM +0100, Andrew Cooper wrote:
> On 25/05/18 10:49, Wei Liu wrote:
> > On Fri, May 25, 2018 at 11:41:04AM +0200, Roger Pau Monné wrote:
> >> On Thu, May 24, 2018 at 05:05:19PM +0100, Wei Liu wrote:
> >>> They are moved to a new header
On Thu, May 24, 2018 at 05:05:18PM +0100, Wei Liu wrote:
> This is a step towards consolidating relevant data structures and
> defines to one location.
>
> It then requires defining cpuid_leaf in user space harness headers to
> make them continue to compile.
>
> No functional change.
>
>
On Thu, May 24, 2018 at 05:05:19PM +0100, Wei Liu wrote:
> They are moved to a new header which is going to be consumed by both
> the hypervisor and toolstack.
>
> Create a new directory for this kind of headers in anticipation of
stabell...@kernel.org>
> CC: Wei Liu <wei.l...@citrix.com>
> CC: Konrad Rzeszutek Wilk <konrad.w...@oracle.com>
> CC: Roger Pau Monné <roger@citrix.com>
> CC: Julien Grall <julien.gr...@linaro.org>
> Signed-off-by: Ian Jackson <ia
m>
> CC: Jun Nakajima <jun.nakaj...@intel.com>
> CC: Kevin Tian <kevin.t...@intel.com>
> CC: Wei Liu <wei.l...@citrix.com>
> CC: Roger Pau Monné <roger@citrix.com>
>
> Notes for backporting: This change probably does want backporting, but depends
>
; CC: Jan Beulich <jbeul...@suse.com>
> CC: Jun Nakajima <jun.nakaj...@intel.com>
> CC: Kevin Tian <kevin.t...@intel.com>
> CC: Wei Liu <wei.l...@citrix.com>
> CC: Roger Pau Monné <roger@citrix.com>
> ---
> xen/arch/x86/hvm/vmx/vmcs.c| 68
all writes to CR0 and reads from MSR_EFER, so can provide
> architecturally consistent behaviour from the guests point of view.
>
> As a result of fixing EFER context switching, we can remove the Intel-special
> case from hvm_nx_enabled() and let guest_walk_tables() work with the real
>
hat inserting an MSR into the load-save list involves
> moving the entire load-only list, and updating both counts.
>
> Signed-off-by: Andrew Cooper <andrew.coop...@citrix.com>
Reviewed-by: Roger Pau Monné <roger@citrix.com>
Just one nit below.
> @@ -1423,8 +1446,
On Thu, May 24, 2018 at 11:59:07AM +0100, Andrew Cooper wrote:
> On 24/05/18 11:53, Roger Pau Monné wrote:
> > On Wed, May 23, 2018 at 05:55:50PM +0100, Andrew Cooper wrote:
> >> On 23/05/18 17:39, Roger Pau Monné wrote:
> >>> On Tue, May 22, 2018 at 12:20:4
On Tue, May 15, 2018 at 01:51:03AM -0600, Jan Beulich wrote:
> >>> On 14.05.18 at 18:18, wrote:
> > On Mon, May 14, 2018 at 10:13:47AM -0600, Jan Beulich wrote:
> >> >>> On 14.05.18 at 18:03, wrote:
> >> > On Thu, May 10, 2018 at 06:15:05PM +0100, Roger
> >> > Copy the state found on the hardware when creating a PVH Dom0. Since
> >> > the memory map provided to a PVH Dom0 is based on the native one using
> >> > the same set of MTRR ranges should provide Dom0 with a sane MTRR state
> >> > without having
On Mon, May 14, 2018 at 06:08:56PM +0100, Ian Jackson wrote:
> These functions are no longer defined or used anywhere. The
> declarations should have been deleted when the definitions were.
>
> Signed-off-by: Ian Jackson <ian.jack...@eu.citrix.com>
Reviewed-by: Roge
Cooper <andrew.coop...@citrix.com>
> ---
> CC: Jan Beulich <jbeul...@suse.com>
> CC: Jun Nakajima <jun.nakaj...@intel.com>
> CC: Kevin Tian <kevin.t...@intel.com>
> CC: Wei Liu <wei.l...@citrix.com>
> CC: Roger Pau Monné <roger@citrix.com>
> ---
type);
> +
> +static inline int vmx_read_guest_msr(uint32_t msr, uint64_t *val)
> +{
> +struct vmx_msr_entry *ent;
const
Also I would probably do:
{
const struct vmx_msr_entry *ent = vmx_find_msr(msr, VMX_MSR_GUEST);
if ( !ent )
return -E
..@citrix.com>
> ---
> CC: Jan Beulich <jbeul...@suse.com>
> CC: Jun Nakajima <jun.nakaj...@intel.com>
> CC: Kevin Tian <kevin.t...@intel.com>
> CC: Wei Liu <wei.l...@citrix.com>
> CC: Roger Pau Monné <roger@citrix.com>
> ---
> xen/arch/x
CC: Jan Beulich
> CC: Jun Nakajima
> CC: Kevin Tian
> CC: Wei Liu
> CC: Roger Pau Monné
> ---
> xen/arch/x86/hvm/vmx/vmcs.c | 10 ++
> 1 file changed, 6 insertions(+), 4 deletions(-)
>
> diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c
iewed-by: Roger Pau Monné
Thanks.
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
ng this) and call it early in vcpu_initialise(). Make a
> similar adjustment in hvm_vcpu_reset_state().
>
> Finally, adjust the vcpu state initialising logic in libxc. All 3 sites zero
> memory before choosing the nonzero defaults, which propagates the RTM corner
> case.
>
>
ally sets %rax to 0 in the
> same action it uses to set %rip to the appropriate entrypoint.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
Thanks.
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Mon, May 28, 2018 at 03:27:55PM +0100, Andrew Cooper wrote:
> With the removal of the 32bit hypervisor build, host_pat is a constant value.
> Drop the variable and the redundant cpu_has_pat predicate, and use a define
> instead.
>
> Signed-off-by: Andrew Cooper
Reviewed-by:
der stale
> value.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
> ---
> CC: Jan Beulich
> CC: Wei Liu
> CC: Roger Pau Monné
> CC: Jun Nakajima
> CC: Kevin Tian
> ---
> xen/arch/x86/hvm/vmx/vmx.c | 1 +
> 1 file changed, 1 insertion(+)
&
e that ARM is also switched to use the new variable.
> >
> > Signed-off-by: Boris Ostrovsky
> > Signed-off-by: Roger Pau Monné
>
> As I already mentioned, the ARM part is OK. However, is the issue that
> xen_start_info is not available on PVH? We had the same problem on AR
On Fri, Jun 08, 2018 at 11:35:52AM +0200, Daniel Kiper wrote:
> On Thu, Jun 07, 2018 at 05:59:06PM +0200, Roger Pau Monne wrote:
> > Add a note to spell out that if the address tag is not present the
> > file should be loaded using the elf header.
> >
> > Sig
On Wed, Jun 06, 2018 at 07:28:20PM +0200, Daniel Kiper wrote:
> On Tue, Jun 05, 2018 at 11:55:36AM +0200, Roger Pau Monne wrote:
> > Add a note to spell out that if the address tag is not present the
> > file should be loaded using the elf header.
> >
> > Sig
On Fri, Jun 15, 2018 at 07:26:14PM +0100, Michael Young wrote:
> context (this hasn't reached Fedora yet as the build is broken, I think due
> to updates to Fedora's acpica-tools package which provides iasl).
I've recently experienced the same on FreeBSD, you might want to try:
Please try to avoid top posting.
On Wed, Jun 13, 2018 at 10:20:48PM +, Anchal Agarwal wrote:
> Hi Roger,
> To answer your question, due to the lack of mentioned commit
> (commit 12ea729645ac ("xen/blkback: unmap all persistent grants when
> frontend gets disconnected") in the older dom0
On Tue, Jun 12, 2018 at 08:56:13PM +, Anchal Agarwal wrote:
> From: Munehisa Kamata
>
> Add freeze and restore callbacks for PM suspend and hibernation support.
> The freeze handler stops a block-layer queue and disconnect the frontend
> from the backend while freeing ring_info and
>
> Signed-off-by: Paul Durrant
Reviewed-by: Roger Pau Monné
Thanks, Roger.
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
get a mapping established."
>
> This patch modifies the VT-d hardware domain initialization code such that
> the workaround will continue to function in dom0-strict mode, by mapping
> all pages not marked as unusable *unless* they are RAM pages not assigned
> to dom0.
>
ARNESS which might contain '' or
> --push-harness or --push-harness-try.
>
> CC: Roger Pau Monné
> Signed-off-by: Ian Jackson
Just tested this by manually killing a cr-daily-branch and it worked
properly, see:
http://logs.test-lab.xenproject.org/osstest/logs/124171/
So:
Teste
Hello,
I've run a test flight of my FreeBSD osstest series today, the flight
shows all green:
http://logs.test-lab.xenproject.org/osstest/logs/124163/
The series can be found at:
git://xenbits.xen.org/people/royger/osstest.git freebsd_v18
AFAICT it's fully Acked. I've rebased it on top of
and has not caused problems.
>
> libxc is not a stable API so the downside risk of providing this
> access is not significant.
>
> Signed-off-by: Ian Jackson
> Acked-by: Wei Liu
Reviewed-by: Roger Pau Monné
Thanks.
___
Xen-devel mail
On Mon, Jun 11, 2018 at 03:13:23PM +0100, Ian Jackson wrote:
> osstest is going to want to call it, and should not be expected to
> fish it out of the build tree.
>
> Signed-off-by: Ian Jackson
Reviewed-by: Roger Pau Monné
Thanks
_
On Mon, Jun 11, 2018 at 03:13:19PM +0100, Ian Jackson wrote:
> I want this to support my qemu depriv descriptor audit tool.
>
> Signed-off-by: Ian Jackson
> CC: Andrew Cooper
Reviewed-by: Roger Pau Monné
> diff --git a/tools/libs/call/libxencall.map b/tools/libs/call/libxenc
On Mon, Jun 11, 2018 at 03:13:22PM +0100, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
Reviewed-by: Roger Pau Monné
Thanks
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Fri, Jun 08, 2018 at 12:39:28PM +0200, Daniel Kiper wrote:
> On Fri, Jun 08, 2018 at 12:08:22PM +0200, Roger Pau Monné wrote:
> > On Fri, Jun 08, 2018 at 11:35:52AM +0200, Daniel Kiper wrote:
> > > On Thu, Jun 07, 2018 at 05:59:06PM +0200, Roger Pau Monne wrote:
> > >
On Fri, Jun 08, 2018 at 04:30:30PM +0100, Paul Durrant wrote:
> The documentation for the iommu_inclusive_mapping Xen command line option
> states:
>
> "Use this to work around firmware issues providing incorrect RMRR entries"
>
> Unfortunately this workaround does not function correctly if the
On Fri, Jun 08, 2018 at 04:30:29PM +0100, Paul Durrant wrote:
> diff --git a/docs/misc/xen-command-line.markdown
> b/docs/misc/xen-command-line.markdown
> index 8712a833a2..6beb28dada 100644
> --- a/docs/misc/xen-command-line.markdown
> +++ b/docs/misc/xen-command-line.markdown
> @@ -1212,8
Adding Daniel Kiper.
On Wed, Jun 13, 2018 at 02:09:45AM +0300, Kristaps Čivkulis wrote:
> Hello,
>
> I am implementing Multiboot2 support for FreeBSD loader to load Xen
> kernel. Currently I pass EFI 64-bit system table pointer tag, EFI boot
> services not terminated tag, EFI 64-bit image handle
On Tue, May 29, 2018 at 03:32:40AM +, .. .. wrote:
> Hello,
>
> I am doing a study on Virtual Machine Introspection on Intel SGX based
> system using Xen based VMs.
>
> I followed the article -
>
> https://wiki.xenproject.org/wiki/Linux_PVH
>
Please don't drop xen-devel from Cc and don't top post.
On Tue, May 29, 2018 at 09:56:29AM +0200, .. .. wrote:
> Yes, without xen, the system boots up fine. Unfortunately, since the system
> within few seconds goes back to login screen I am not able to check even
> the logs. But I am not sure if
On Mon, Jun 04, 2018 at 02:59:09PM +0100, Andrew Cooper wrote:
> No functional change (as curr->arch.debugreg[5] is zero when DE is clear), but
> this change simplifies the following patch.
>
> Signed-off-by: Andrew Cooper
Reviewed-by:
ll rather than silently discarding the values.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
> diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h
> index 197f8d6..59d5e4a 100644
> --- a/xen/include/asm-x86/domain.h
> +++ b/xen/include/asm-x86
On Mon, Jun 04, 2018 at 02:59:15PM +0100, Andrew Cooper wrote:
> Replace the few remaining uses with X86_DR6_* constants.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
___
Xen-devel mailing list
Xen-devel@lists.xenproject.
On Wed, Jun 06, 2018 at 04:59:24PM +0100, Andrew Cooper wrote:
> On 06/06/18 16:49, Roger Pau Monné wrote:
> > On Mon, Jun 04, 2018 at 02:59:08PM +0100, Andrew Cooper wrote:
> >> diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
> >> index 10415e6..7fddae1 100
On Mon, Jun 04, 2018 at 02:59:11PM +0100, Andrew Cooper wrote:
> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
> index bfa3a0d..39c9ddc 100644
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -2483,7 +2483,7 @@ void update_guest_eip(void)
> }
>
On Wed, Jun 06, 2018 at 05:50:38PM +0100, Andrew Cooper wrote:
> On 06/06/18 17:46, Roger Pau Monné wrote:
> > On Mon, Jun 04, 2018 at 02:59:11PM +0100, Andrew Cooper wrote:
> >> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
> >> index bfa3a0d..39
per, which also takes care of handing RTM
> correctly.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
lematic to implement correctly.
>
> Rearrange the logic to have nothing interesting at the intercept level, and
> everything implemented at the injection level. Amongst other things, this
> means that the monitor subsystem will pick up debug actions from emulated
> events.
>
> Si
On Thu, Jun 07, 2018 at 09:59:10AM +0100, Ross Lagerwall wrote:
> On 06/06/2018 04:01 PM, aaron.yo...@oracle.com wrote:
> > Any comments/suggestions/opinions/caveats on this approach?
>
> I did this a while back. It is easy enough to do:
>
> 1) Have Xen load OVMF_code.fd rather than the
On Mon, Jun 04, 2018 at 02:59:08PM +0100, Andrew Cooper wrote:
> diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
> index 10415e6..7fddae1 100644
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -977,6 +977,7 @@ unsigned long hvm_cr4_guest_valid_bits(const struct
>
On Mon, Jul 02, 2018 at 10:42:44AM +0100, Wei Liu wrote:
> On Mon, Jul 02, 2018 at 11:36:28AM +0200, Roger Pau Monné wrote:
> > On Mon, Jul 02, 2018 at 10:32:15AM +0100, Wei Liu wrote:
> > > On Mon, Jul 02, 2018 at 10:28:23AM +0200, Roger Pau Monne wrote:
> > > [...]
has a single
> caller. Use calloc() directly and drop alloc_str().
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
> @@ -832,7 +809,7 @@ int xc_cpuid_set(
> continue;
> }
>
> -config_transformed[i] = alloc_str();
&
1 - 100 of 5664 matches
Mail list logo