flight 131118 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131118/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
freebsd 3c25eec2c353aafe1b3338c66bfbaed78075ef43
baseline version:
freebsd b1bbabbbe7b
Hi Jan,
> > > Without a full hypervisor log this is going to remain guesswork, but
> > > could you check whether "pcid=no" and/or "pv-l1tf=no" on the Xen
> > > boot command line help?
> >
> > [vagrant@localhost ~]$ cat /proc/cmdline
> > placeholder root=UUID=f4dcb7e6-e430-4b8b-8e83-5deb3522c88b r
flight 131082 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131082/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 15 guest-saverestore.2 fail REGR. vs.
129996
test-armhf-arm
On Fri, Dec 7, 2018 at 3:15 PM David Woodhouse wrote:
>
> During a context switch, if clearing a descriptor which is currently
> referenced by the old process's user %gs, if Xen preempts the vCPU
> before %gs is set for the new process, a fault may occur.
>
> This fault actually seems to be fairly
During a context switch, if clearing a descriptor which is currently
referenced by the old process's user %gs, if Xen preempts the vCPU
before %gs is set for the new process, a fault may occur.
This fault actually seems to be fairly harmless; xen_failsafe_callback
will just return to the "faulting
flight 131090 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131090/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 129475
build-i386
During a context switch, if clearing a descriptor which is currently
referenced by the old process's user %gs, if Xen preempts the vCPU
before %gs is set for the new process, a fault may occur.
This fault actually seems to be fairly harmless; xen_failsafe_callback
will just return to the "faulting
On Fri, 7 Dec 2018, Julien Grall wrote:
> > > @@ -1547,6 +1551,25 @@ int p2m_cache_flush_range(struct domain *d, gfn_t
> > > start, gfn_t end)
> > > while ( gfn_x(start) < gfn_x(end) )
> > > {
> > > + /*
> > > + * Cleaning the cache for the P2M may take a long time. So w
flight 131077 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131077/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-cubietruck 16 guest-start/debian.repeat fail REGR. vs.
130840
test-amd64-i386-p
On Thu, 6 Dec 2018, Julien Grall wrote:
> Hi,
>
> On 12/4/18 8:26 PM, Julien Grall wrote:
> > At the moment, the implementation of Set/Way operations will go through
> > all the entries of the guest P2M and flush them. However, this is very
> > expensive and may render unusable a guest OS using th
On Sat, Dec 8, 2018 at 2:40 AM Robin Murphy wrote:
>
> On 2018-12-07 7:28 pm, Souptick Joarder wrote:
> > On Fri, Dec 7, 2018 at 10:41 PM Matthew Wilcox wrote:
> >>
> >> On Fri, Dec 07, 2018 at 03:34:56PM +, Robin Murphy wrote:
> +int vm_insert_range(struct vm_area_struct *vma, unsigned
On Tue, 4 Dec 2018, Julien Grall wrote:
> At the moment, the implementation of Set/Way operations will go through
> all the entries of the guest P2M and flush them. However, this is very
> expensive and may render unusable a guest OS using them.
>
> For instance, Linux 32-bit will use Set/Way oper
CC'ing Dario
Dario, please give a look at the preemption question below.
On Fri, 7 Dec 2018, Julien Grall wrote:
> On 06/12/2018 23:32, Stefano Stabellini wrote:
> > On Tue, 4 Dec 2018, Julien Grall wrote:
> > > Set/Way operations are used to perform maintenance on a given cache.
> > > At the mo
flight 131081 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131081/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail like 130373
test-amd64-amd64-xl-qemuu-ws16-amd64 17 g
On 2018-12-07 7:28 pm, Souptick Joarder wrote:
On Fri, Dec 7, 2018 at 10:41 PM Matthew Wilcox wrote:
On Fri, Dec 07, 2018 at 03:34:56PM +, Robin Murphy wrote:
+int vm_insert_range(struct vm_area_struct *vma, unsigned long addr,
+ struct page **pages, unsigned long page_c
On Wed, 5 Dec 2018, Stefano Stabellini wrote:
> Shared memory regions need to be advertised to the guest. Fortunately, a
> device tree binding for special memory regions already exist:
> reserved-memory.
>
> Add a reserved-memory node for each shared memory region, for both
> owners and borrowers.
On Fri, 2018-12-07 at 12:18 +, David Woodhouse wrote:
>
> > #else
> > + struct multicall_space mc = __xen_mc_entry(0);
> > + MULTI_set_segment_base(mc.mc, SEGBASE_GS_USER_SEL, 0);
> > +
> > loadsegment(fs, 0);
> > #endif
>
> That seems to boot and run,
By default on capable hardware, SECONDARY_EXEC_ENABLE_VMCS_SHADOWING is
activated unilaterally. The VMCS Link pointer is initialised to ~0, but the
VMREAD/VMWRITE bitmap pointers are not.
This causes the 16bit IVT and Bios Data Area get interpreted as the read/write
permission bitmap for guests w
On 12/5/18 5:15 PM, Stefano Stabellini wrote:
From: Zhongze Liu
The existing XENMAPSPACE_gmfn_foreign subop of XENMEM_add_to_physmap forbids
a Dom0 to map memory pages from one DomU to another, which restricts some useful
yet not dangerous use cases -- such as sharing pages among DomU's so that
On Fri, Dec 7, 2018 at 10:41 PM Matthew Wilcox wrote:
>
> On Fri, Dec 07, 2018 at 03:34:56PM +, Robin Murphy wrote:
> > > +int vm_insert_range(struct vm_area_struct *vma, unsigned long addr,
> > > + struct page **pages, unsigned long page_count)
> > > +{
> > > + unsigned lo
On Fri, Dec 07, 2018 at 11:07:54AM -0500, Boris Ostrovsky wrote:
> Can this be considered as an ACK from you?
I'll look at v9 next week and add tags, assuming v9 is going to be the
final one, of course.
--
Regards/Gruss,
Boris.
SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham N
flight 131126 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131126/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Wei Liu writes ("Re: [PATCH] libxl: Documentation about the domain
configuration on disk"):
> On Thu, Dec 06, 2018 at 02:57:33PM +, Anthony PERARD wrote:
> > Anyway, that comment block isn't very helpful because it basically says
> > that we can't depriv QEMU, I mean do hotplug with a deprived
On Thu, Dec 06, 2018 at 03:08:44PM +, Paul Durrant wrote:
> This backend has now been replaced by the 'xen-qdisk' XenDevice.
>
> Signed-off-by: Paul Durrant
Acked-by: Anthony PERARD
--
Anthony PERARD
___
Xen-devel mailing list
[email protected]
On Thu, Dec 06, 2018 at 03:08:42PM +, Paul Durrant wrote:
> This patch adds a creator function for XenBlockDevice-s so that they can
> be created automatically when the Xen toolstack instantiates a new
> PV backend. When the XenBlockDevice is created this way it is also
> necessary to create a
On Thu, Oct 18, 2018 at 06:46:22PM +0100, Andrew Cooper wrote:
> Hello,
>
> This is an accumulation and summary of various tasks which have been
> discussed since the revelation of the speculative security issues in
> January, and also an invitation to discuss alternative ideas. They are
> x86 sp
On Thu, Dec 06, 2018 at 03:08:41PM +, Paul Durrant wrote:
> ...that maintains compatibility with existing Xen toolstacks.
>
> Xen toolstacks instantiate PV backends by simply writing information into
> xenstore and expecting a backend implementation to be watching for this.
>
> This patch add
On 07/12/2018 17:50, Paul Durrant wrote:
> The code in viridian_synic_wrmsr() duplicates logic in vlapic_reg_write()
> to update the ICR, ICR2 and TASKPRI registers. Instead of doing this,
> make vlapic_reg_write() non-static and call it.
>
> Signed-off-by: Paul Durrant
> ---
> Cc: Jan Beulich
>
On 12/7/2018 7:14 AM, Paolo Bonzini wrote:
On 07/12/18 14:58, Juergen Gross wrote:
On 07/12/2018 14:52, Paolo Bonzini wrote:
On 07/12/18 14:50, Juergen Gross wrote:
The PVH boot entry is in the same bzImage binary as the normal one.
Its just another entry, similar to the Xen PV boot entry. So
On Thu, Dec 06, 2018 at 03:08:40PM +, Paul Durrant wrote:
> ...and wire in the dataplane.
>
> This patch adds the remaining code to make the xen-block XenDevice
> functional. The parameters that a block frontend expects to find are
> populated in the backend xenstore area, and the 'ring-ref' a
flight 131074 linux-4.19 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131074/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs. 129313
test-amd64-amd64-xl-
On 07/12/2018 13:13, Paul Durrant wrote:
> When viridian APIC assist is active, the code in vlapic_has_pending_irq()
> may end up re-calling vlapic_find_highest_isr() after emulating an EOI
> whereas simply moving the call after the EOI emulation removes the need
> for this duplication.
>
> Signed-
The code in viridian_synic_wrmsr() duplicates logic in vlapic_reg_write()
to update the ICR, ICR2 and TASKPRI registers. Instead of doing this,
make vlapic_reg_write() non-static and call it.
Signed-off-by: Paul Durrant
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Wei Liu
Cc: "Roger Pau Monné"
-
flight 131075 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131075/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pygrub 7 xen-boot fail REGR. vs. 130155
build-armhf
On Mon, Dec 03, 2018 at 02:26:09PM -0800, Stefano Stabellini wrote:
> From: Stefano Stabellini
>
> Introduce a device tree binding for Xen reserved-memory regions. They
> are used to share memory across VMs from the VM config files. (See
> static_shm config option.)
>
> Signed-off-by: Stefano St
On Fri, Dec 07, 2018 at 03:34:56PM +, Robin Murphy wrote:
> > +int vm_insert_range(struct vm_area_struct *vma, unsigned long addr,
> > + struct page **pages, unsigned long page_count)
> > +{
> > + unsigned long uaddr = addr;
> > + int ret = 0, i;
>
> Some of the sites bei
On Fri, 7 Dec 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 06/12/2018 22:04, Stefano Stabellini wrote:
> > On Wed, 5 Dec 2018, Julien Grall wrote:
> > > On 04/12/2018 23:59, Stefano Stabellini wrote:
> > > > On Tue, 4 Dec 2018, Julien Grall wrote:
> > > > > A follow-up patch will re-purpose the
On Thu, Dec 06, 2018 at 03:08:39PM +, Paul Durrant wrote:
> This is a purely cosmetic patch that purges remaining use of 'blk' and
> 'ioreq' in local function names, and then makes sure all functions are
> prefixed with 'xen_block_'.
>
> No functional change.
>
> Signed-off-by: Paul Durrant
On Thu, Dec 06, 2018 at 03:08:36PM +, Paul Durrant wrote:
> This patch adds the transformations necessary to get dataplane/xen-block.c
> to build against the new XenBus/XenDevice framework. MAINTAINERS is also
> updated due to the introduction of dataplane/xen-block.h.
>
> NOTE: Existing data
On Thu, Dec 06, 2018 at 03:08:35PM +, Paul Durrant wrote:
> v2:
> - Leave existing boilerplate alone, other than removing the now-incorrect
>description
> ---
> hw/block/dataplane/xen-block.c | 409
> ++---
> 1 file changed, 16 insertions(+), 393 delet
On 12/7/18 5:25 AM, Borislav Petkov wrote:
> On Thu, Dec 06, 2018 at 11:14:34PM +0100, Paolo Bonzini wrote:
>>> There are some minor changes in non-xen x86 code so it would be good to
>>> get x86 maintainers' ack.
>> It's not really code, only Kconfig (and I remarked on it just now), but
>> it does
On Thu, Dec 06, 2018 at 03:08:33PM +, Paul Durrant wrote:
> The legacy PV backend infrastructure provides functions to bind, unbind
> and send notifications to event channnels. Similar functionality will be
> required by XenDevice implementations so this patch adds the necessary
> support.
>
>
On Thu, Dec 06, 2018 at 03:08:31PM +, Paul Durrant wrote:
> @@ -36,6 +54,12 @@ static void xen_block_unrealize(XenDevice *xendev, Error
> **errp)
>
> trace_xen_block_unrealize(type, vdev->disk, vdev->partition);
>
> +/* Disconnect from the frontend in case this has not already hap
On 12/07/2018 11:15 PM, Paul Durrant wrote:
>> -Original Message-
>> From: Dongli Zhang [mailto:[email protected]]
>> Sent: 07 December 2018 15:10
>> To: Paul Durrant ; [email protected];
>> [email protected]; [email protected]
>> Cc: [email protected]
On 06/12/2018 18:39, Souptick Joarder wrote:
Previouly drivers have their own way of mapping range of
kernel pages/memory into user vma and this was done by
invoking vm_insert_page() within a loop.
As this pattern is common across different drivers, it can
be generalized by creating a new functi
On Fri, Dec 07, 2018 at 03:26:01PM +, Anthony PERARD wrote:
> On Fri, Dec 07, 2018 at 02:39:40PM +, Paul Durrant wrote:
> > > -Original Message-
> > > From: Anthony PERARD [mailto:[email protected]]
> > > Sent: 07 December 2018 14:35
> > > To: Paul Durrant
> > > Cc: qemu-de
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict
testid debian-hvm-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditiona
On Fri, Dec 07, 2018 at 02:39:40PM +, Paul Durrant wrote:
> > -Original Message-
> > From: Anthony PERARD [mailto:[email protected]]
> > Sent: 07 December 2018 14:35
> > To: Paul Durrant
> > Cc: [email protected]; [email protected]; xen-
> > [email protected];
On 07/12/2018 15:09, Julien Grall wrote:
> Hi Andrew,
>
> On 07/12/2018 13:45, Andrew Cooper wrote:
>> A large amount of the information here is obsolete since Xen 4.7
>>
>> To being with, however, this patch marks a change in style for section
>> headings, due to how HTML anchors are generated. H
flight 131124 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/131124/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
> -Original Message-
> From: Dongli Zhang [mailto:[email protected]]
> Sent: 07 December 2018 15:10
> To: Paul Durrant ; [email protected];
> [email protected]; [email protected]
> Cc: [email protected]; Roger Pau Monne ;
> [email protected]
> Subj
On 07/12/18 14:58, Juergen Gross wrote:
> On 07/12/2018 14:52, Paolo Bonzini wrote:
>> On 07/12/18 14:50, Juergen Gross wrote:
>>> The PVH boot entry is in the same bzImage binary as the normal one.
>>> Its just another entry, similar to the Xen PV boot entry. So the binary
>>> arch/x86/boot/bzimag
Hi Paul,
On 12/07/2018 05:39 PM, Paul Durrant wrote:
>> -Original Message-
>> From: Xen-devel [mailto:[email protected]] On Behalf
>> Of Dongli Zhang
>> Sent: 07 December 2018 04:18
>> To: [email protected]; [email protected]; linux-
>> bl...@vg
Hi Andrew,
On 07/12/2018 13:45, Andrew Cooper wrote:
A large amount of the information here is obsolete since Xen 4.7
To being with, however, this patch marks a change in style for section
headings, due to how HTML anchors are generated. Having more than one
parameter per heading makes an awkw
On Thu, Dec 06, 2018 at 03:08:30PM +, Paul Durrant wrote:
> This patch adds a new source module, xen-bus-helper.c, which builds on
> basic libxenstore primitives to provide functions to create (setting
> permissions appropriately) and destroy xenstore areas, and functions to
> 'printf' and 'sca
Em Fri, 7 Dec 2018 00:09:45 +0530
Souptick Joarder escreveu:
> Previouly drivers have their own way of mapping range of
> kernel pages/memory into user vma and this was done by
> invoking vm_insert_page() within a loop.
>
> As this pattern is common across different drivers, it can
> be generali
On 07/12/2018 13:41, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
To be able to use it for the hot-plugged CPUs as well.
The reason why we link proc_info_list in ".rodata" section is that
it context should never be modified.
This patch also renames ".init.proc.info" section to ".p
> -Original Message-
> From: Anthony PERARD [mailto:[email protected]]
> Sent: 07 December 2018 14:35
> To: Paul Durrant
> Cc: [email protected]; [email protected]; xen-
> [email protected]; Kevin Wolf ; Max Reitz
> ; Stefano Stabellini
> Subject: Re: [PATCH v2 03
On Thu, Dec 06, 2018 at 03:08:29PM +, Paul Durrant wrote:
> +static char *disk_to_vbd_name(unsigned int disk)
> +{
> +char *name, *prefix = (disk >= 26) ?
> +disk_to_vbd_name((disk / 26) - 1) : g_strdup("");
> +
> +name = g_strdup_printf("%s%c", prefix, 'a' + disk);
I don't thi
On 07/12/2018 14:52, Paolo Bonzini wrote:
> On 07/12/18 14:50, Juergen Gross wrote:
>> The PVH boot entry is in the same bzImage binary as the normal one.
>> Its just another entry, similar to the Xen PV boot entry. So the binary
>> arch/x86/boot/bzimage can be booted either on bare metal via grub2
On 07/12/18 14:50, Juergen Gross wrote:
> The PVH boot entry is in the same bzImage binary as the normal one.
> Its just another entry, similar to the Xen PV boot entry. So the binary
> arch/x86/boot/bzimage can be booted either on bare metal via grub2 or
> other boot-loaders, as Xen PV-guest, as X
On 07.12.18 12:34, Julien Grall wrote:
Hi Oleksandr,
Hi Julien
Please configure your client to quote with > rather than indentation.
Below is an example how it can get messy in just 3 answers, I let you
imagine with longer thread :).
This is a general issue with gmail web-interface tha
On 07/12/2018 14:41, Paolo Bonzini wrote:
> On 07/12/18 07:02, Juergen Gross wrote:
>> On 06/12/2018 23:11, Paolo Bonzini wrote:
>>> On 06/12/18 07:04, Maran Wilson wrote:
+config PVH
+ bool "Support for running PVH guests"
+ ---help---
+This option enables the PVH entry p
Andrew Cooper (3):
docs/cmdline: Fix markdown syntax
docs/cmdline: Move XSM to be in alphabetical order
docs/cmdline: Rewrite the cpuid_mask_* section
docs/misc/xen-command-line.markdown | 100 ++--
1 file changed, 51 insertions(+), 49 deletions(-)
--
2.1.4
Adjust the default line to note that the default is now selectable in Kconfig.
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Ian Jackson
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei Liu
CC: Julien Grall
---
docs/misc/xen-command-line.ma
A large amount of the information here is obsolete since Xen 4.7
To being with, however, this patch marks a change in style for section
headings, due to how HTML anchors are generated. Having more than one
parameter per heading makes an awkward anchor, especially when brace globbing
is used. Fur
* vwfi needs a closing `. rmrr needs one as well, and the opening ' switched
to `
* The com1/com2 example lines are already verbatim blocks and shouldn't
escape their underscores. This ends up in the rendered output.
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Ian Jackson
C
On 07/12/18 07:02, Juergen Gross wrote:
> On 06/12/2018 23:11, Paolo Bonzini wrote:
>> On 06/12/18 07:04, Maran Wilson wrote:
>>> +config PVH
>>> + bool "Support for running PVH guests"
>>> + ---help---
>>> + This option enables the PVH entry point for guest virtual machines
>>> + as sp
From: Oleksandr Tyshchenko
To be able to use it for the hot-plugged CPUs as well.
The reason why we link proc_info_list in ".rodata" section is that
it context should never be modified.
This patch also renames ".init.proc.info" section to ".proc.info"
as "init" prefix is not actual anymore.
Si
Hi Jan,
On 05/12/2018 08:37, Jan Beulich wrote:
On 04.12.18 at 21:26, wrote:
At the moment, the implementation of Set/Way operations will go through
all the entries of the guest P2M and flush them. However, this is very
expensive and may render unusable a guest OS using them.
For instance, Li
Hi Stefano,
On 06/12/2018 23:32, Stefano Stabellini wrote:
On Tue, 4 Dec 2018, Julien Grall wrote:
Set/Way operations are used to perform maintenance on a given cache.
At the moment, Set/Way operations are not trapped and therefore a guest
OS will directly act on the local cache. However, a vCP
When viridian APIC assist is active, the code in vlapic_has_pending_irq()
may end up re-calling vlapic_find_highest_isr() after emulating an EOI
whereas simply moving the call after the EOI emulation removes the need
for this duplication.
Signed-off-by: Paul Durrant
---
Cc: Jan Beulich
Cc: Andre
On 07/12/2018 12:12, Jan Beulich wrote:
>> @@ -244,19 +240,20 @@ long do_update_descriptor(uint64_t pa, uint64_t desc)
>> break;
>> }
>>
>> -paging_mark_dirty(currd, _mfn(mfn));
>> +paging_mark_dirty(currd, mfn);
>>
>> /* All is good so make the update. */
>> -gdt
> -Original Message-
> From: Anthony PERARD [mailto:[email protected]]
> Sent: 07 December 2018 12:15
> To: Paul Durrant
> Cc: [email protected]; [email protected]; xen-
> [email protected]; Stefano Stabellini ;
> Michael S. Tsirkin ; Marcel Apfelbaum
> ; Paolo Bon
On Fri, Dec 07, 2018 at 01:11:28PM +0100, Juergen Gross wrote:
> This patch series adds support for booting Linux as PVH guest.
>
> Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh
> platform grub is booted as a standalone image directly by Xen.
>
> For booting Linux kernel it is us
On Thu, Dec 06, 2018 at 03:08:28PM +, Paul Durrant wrote:
> This patch adds the basic boilerplate for a 'XenBus' object that will act
> as a parent to 'XenDevice' PV backends.
> A new 'XenBridge' object is also added to connect XenBus to the system bus.
>
> The XenBus object is instantiated by
From: Hans van Kranenburg
This solves the build failing with "Error: no symbol table and no
.moddeps section"
Also see:
- 6371e9c10433578bb236a8284ddb9ce9e201eb59
- https://savannah.gnu.org/bugs/?49012
Signed-off-by: Hans van Kranenburg
Reviewed-by: Daniel Kiper
---
V2: new patch
Signed-off-b
On 07.12.18 12:02, Julien Grall wrote:
Hi, Julien.
On 07/12/2018 09:45, Oleksandr Tyshchenko wrote:
From: Oleksandr Tyshchenko
Hi, all.
This is small patch series for ARM32 which needed to be able to bring
secondary CPUs up not only during the initial boot, but at runtime also.
For exampl
On Thu, 2018-12-06 at 20:27 +, David Woodhouse wrote:
> On Thu, 2018-12-06 at 10:49 -0800, Andy Lutomirski wrote:
> > > On Dec 6, 2018, at 9:36 AM, Andrew Cooper <
> > > [email protected]> wrote:
> > > Basically - what is happening is that xen_load_tls() is
> > > invalidating the
> > >
In order to avoid using plain integers for the ELF notes use the
available Xen include instead.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V5: new patch (Daniel Kiper)
---
util/grub-mkimagexx.c | 14 --
1 file changed, 8 insertions(+), 6 deletions(-)
diff --git a/ut
Support mkimage for xen_pvh.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: some style adjustments (Daniel Kiper)
use defines for elf-notes (Daniel Kiper)
V5: move elf-note define usage into new patch (Daniel Kiper)
I didn't replace the 4096 by a PAGE_SIZE macro as requested
With Xen PVH mode adding a new machine type the machine related headers
need to be present for the build to succeed. Most of the headers just
need to include the related common i386 headers. Add those to the tree.
Note that xen_pvh/int.h needs to include pc/int_types.h instead of
pc/int.h in order
Add the code for the Xen PVH mode boot entry.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: clear %fs and %gs, too (Daniel Kiper)
use GRUB_MEMORY_MACHINE_PROT_STACK_SIZE for stack size (Daniel Kiper)
V5: reorder clearing segment regs (Daniel Kiper)
---
grub-core/kern/i386/x
Add all usable memory regions to grub memory management and add the
needed mmap iterate code, which will be used by grub core (e.g.
grub-core/lib/relocator.c or grub-core/mmap/mmap.c).
As we are running in 32-bit mode don't add memory above 4GB.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel K
include/grub/offsets.h needs some defines for Xen PVH mode.
Add them. While at it line up the values in the surrounding lines to
start at the same column.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: XENPVH->XEN_PVH (Daniel Kiper)
---
include/grub/offsets.h | 21 -
>>> On 06.12.18 at 19:03, wrote:
> --- a/xen/arch/x86/pv/descriptor-tables.c
> +++ b/xen/arch/x86/pv/descriptor-tables.c
> @@ -206,30 +206,26 @@ int compat_set_gdt(XEN_GUEST_HANDLE_PARAM(uint)
> frame_list,
> return ret;
> }
>
> -long do_update_descriptor(uint64_t pa, uint64_t desc)
> +l
Initialize the grant tab in a dedicated function. This will enable
using it for PVH guests, too.
Call the new function from grub_machine_init() as this will later
be common between Xen PV and Xen PVH mode.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: update commit message (Dan
Some common code needs to be special cased for Xen PVH mode. This hits
mostly Xen PV mode specific areas.
Split include/grub/i386/pc/int_types.h off from
include/grub/i386/pc/int.h to support including this file later from
xen_pvh code without the grub_bios_interrupt definition.
Move definition o
Xen PVH guests will have the RSDP at an arbitrary address. Support that
by passing the RSDP address via the boot parameters to Linux.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V2: add oring 0x8000 to version field
V3: move including machine/kernel.h to patch 8 (Daniel Kiper)
V5:
In order to support grub2 in Xen PVH environment some additional Xen
headers are needed as grub2 will be started in PVH mode requiring to
use several HVM hypercalls and structures.
Add the needed headers from Xen 4.10 being the first Xen version with
full (not only experimental) PVH guest support.
Add the hooks to current code needed for Xen PVH. They will be filled
with code later when the related functionality is being added.
loader/i386/linux.c needs to include machine/kernel.h now as it needs
to get GRUB_KERNEL_USE_RSDP_ADDR from there. This in turn requires to
add an empty kernel.h hea
grub_xen_ptr2mfn() returns the machine frame number for a given pointer
value. For Xen-PVH guests this is just the PFN. Add the PVH specific
variant.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V5: new patch (Daniel Kiper)
---
grub-core/kern/xen/init.c | 2 ++
1 file changed, 2 i
Support platform i386/xen_pvh in configure.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
configure.ac | 3 +++
1 file changed, 3 insertions(+)
diff --git a/configure.ac b/configure.ac
index 5e63c4af3..81a19afd5 100644
--- a/configure.ac
+++ b/configure.ac
@@ -151,6 +151,7 @@ case
Add the modifications to the build system needed to build a xen_pvh
grub.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: sorted some filenames (Daniel Kiper)
V4: add bus/pci.c to xen_pvh
---
gentpl.py | 4 ++--
grub-core/Makefile.am | 12
gr
Add the needed code to setup the hypercall page for calling into the
Xen hypervisor.
Import the XEN_HVM_DEBUGCONS_IOPORT define from Xen unstable into
include/xen/arch-x86/xen.h
Signed-off-by: Juergen Gross
Reviewed-by: Roger Pau Monné
---
V3: grub_xen_early_halt->grub_xen_panic (Roger Pau Monn
This patch series adds support for booting Linux as PVH guest.
Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh
platform grub is booted as a standalone image directly by Xen.
For booting Linux kernel it is using the standard linux kernel
loader. The only modification of the linux
Add xen_pvh support to grub-install.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
include/grub/util/install.h | 1 +
util/grub-install-common.c | 1 +
util/grub-install.c | 7 +++
3 files changed, 9 insertions(+)
diff --git a/include/grub/util/install.h b/include/gru
Initialize the needed Xen specific data. This is:
- the Xen start of day page containing the console and Xenstore ring
page PFN and event channel
- the grant table
- the shared info page
Write back the possibly modified memory map to the hypervisor in case
the guest is reading it from there aga
Retrieve the memory map from the hypervisor and normalize it to contain
no overlapping entries and to be sorted by address.
Signed-off-by: Juergen Gross
Reviewed-by: Daniel Kiper
---
V3: use grub_e820_mmap_entry instead of own struct (Daniel Kiper)
---
grub-core/kern/i386/xen/pvh.c | 94 +++
On 07/12/2018 12:50, Daniel Kiper wrote:
> On Fri, Dec 07, 2018 at 08:35:26AM +0100, Juergen Gross wrote:
>> Add the hooks to current code needed for Xen PVH. They will be filled
>> with code later when the related functionality is being added.
>>
>> loader/i386/linux.c needs to include machine/ker
1 - 100 of 132 matches
Mail list logo