On 31.10.2025 14:08, Grygorii Strashko wrote:
> Hi Jan,
>
> On 30.10.25 14:10, Jan Beulich wrote:
>> Arm's arch_domain_soft_reset() returning -ENOSYS is quite unhelpful: This
>> way a domain will be crashed if a tool stack mistakenly invokes
>> XEN_DOMCTL_soft_reset on it. Instead the tool stack s
On 05.11.2025 12:33, Oleksii Kurochko wrote:
>
> On 10/30/25 1:10 PM, Jan Beulich wrote:
>> Arm's arch_domain_soft_reset() returning -ENOSYS is quite unhelpful: This
>> way a domain will be crashed if a tool stack mistakenly invokes
>> XEN_DOMCTL_soft_reset on it. Instead the tool stack should be
On 11/5/25 21:00, Frediano Ziglio wrote:
> On Wed, 5 Nov 2025 at 20:31, Demi Marie Obenour wrote:
>>
>> On 11/5/25 10:38, Frediano Ziglio wrote:
>>> From: Frediano Ziglio
>>>
>>> For xen.gz file we strip all symbols and have an additional
>>> xen-syms file version with all symbols.
>>> Make xen.e
On Wed, 5 Nov 2025 at 20:31, Demi Marie Obenour wrote:
>
> On 11/5/25 10:38, Frediano Ziglio wrote:
> > From: Frediano Ziglio
> >
> > For xen.gz file we strip all symbols and have an additional
> > xen-syms file version with all symbols.
> > Make xen.efi more coherent stripping all symbols too.
>
On 11/4/25 20:16, Val Packett wrote:
>
> On 11/4/25 9:15 AM, Jürgen Groß wrote:
>> On 15.10.25 21:57, Val Packett wrote:
>>> Starting a virtio backend in a PV domain would panic the kernel in
>>> alloc_ioreq, trying to dereference vma->vm_private_data as a pages
>>> pointer when in reality it stay
On 11/5/25 10:38, Frediano Ziglio wrote:
> From: Frediano Ziglio
>
> For xen.gz file we strip all symbols and have an additional
> xen-syms file version with all symbols.
> Make xen.efi more coherent stripping all symbols too.
> xen-syms.efi can be used for debugging.
>
> Signed-off-by: Frediano
On 05/11/2025 13:39, [email protected] wrote:
Hi,
Hi Haseeb,
I have sent out a patch using IPAS2E1IS. The R version RIPAS2E1IS would only be
helpful if we have to invalidate more than one page at a time and this is not
possible unless a batch version of hypercall is implemented b
On Wed, Nov 05, 2025 at 02:19:03PM +0530, Ritesh Harjani wrote:
> > + * in_lazy_mmu_mode() can be used to check whether the lazy MMU mode is
> > + * currently enabled.
> > */
> > #ifdef CONFIG_ARCH_HAS_LAZY_MMU_MODE
> > static inline void lazy_mmu_mode_enable(void)
> > {
> > - arch_enter_laz
From: Frediano Ziglio
For xen.gz file we strip all symbols and have an additional
xen-syms file version with all symbols.
Make xen.efi more coherent stripping all symbols too.
xen-syms.efi can be used for debugging.
Signed-off-by: Frediano Ziglio
---
Changes since v1:
- avoid leaving target if
Hi,
I have sent out a patch using IPAS2E1IS. The R version RIPAS2E1IS would only be
helpful if we have to invalidate more than one page at a time and this is not
possible unless a batch version of hypercall is implemented because otherwise
there is only one page removed per hypercall. Although
On 10/30/25 1:10 PM, Jan Beulich wrote:
Arm's arch_domain_soft_reset() returning -ENOSYS is quite unhelpful: This
way a domain will be crashed if a tool stack mistakenly invokes
XEN_DOMCTL_soft_reset on it. Instead the tool stack should be told of its
mistake.
Introduce HAS_SOFT_RESET, implied
On 11/4/25 5:56 PM, Andrew Cooper wrote:
The latest oxenstored from Xapi-project fails to start up:
launch-xenstore[1201]: Starting /usr/sbin/oxenstored...
launch-xenstore[1222]: Fatal error: exception
Dynlink.Error (Dynlink.Cannot_open_dll "Dynlink.Error
(Dynlink.Cannot_open_dll
On 03.11.25 11:47, Teddy Astie wrote:
Le 31/10/2025 à 22:24, Grygorii Strashko a écrit :
From: Grygorii Strashko
The VMTRACE feature depends on Platform/Arch HW and code support and now
can be used only on x86 HVM with Intel VT-x (INTEL_VMX) enabled.
This makes VMTRACE support optional by i
Ritesh Harjani (IBM) writes:
> Kevin Brodsky writes:
>
>> Upcoming changes to the lazy_mmu API will cause
>> arch_flush_lazy_mmu_mode() to be called when leaving a nested
>> lazy_mmu section.
>>
>> Move the relevant logic from arch_leave_lazy_mmu_mode() to
>> arch_flush_lazy_mmu_mode() and have
Kevin Brodsky writes:
> A per-CPU batch struct is activated when entering lazy MMU mode; its
> lifetime is the same as the lazy MMU section (it is deactivated when
> leaving the mode). Preemption is disabled in that interval to ensure
> that the per-CPU reference remains valid.
>
> The generic la
> On 4 Nov 2025, at 16:56, Andrew Cooper wrote:
>
> The latest oxenstored from Xapi-project fails to start up:
>
> launch-xenstore[1201]: Starting /usr/sbin/oxenstored...
> launch-xenstore[1222]: Fatal error: exception
>Dynlink.Error (Dynlink.Cannot_open_dll "Dynlink.Error
> (Dynlink.Ca
Kevin Brodsky writes:
> Despite recent efforts to prevent lazy_mmu sections from nesting, it
> remains difficult to ensure that it never occurs - and in fact it
> does occur on arm64 in certain situations (CONFIG_DEBUG_PAGEALLOC).
> Commit 1ef3095b1405 ("arm64/mm: Permit lazy_mmu_mode to be neste
On Thu, Oct 09, 2025 at 01:48:01PM +0200, Jan Beulich wrote:
> On 09.10.2025 13:36, Marek Marczykowski-Górecki wrote:
> > On Tue, Oct 07, 2025 at 04:46:17PM +0200, Jan Beulich wrote:
> >> On 07.10.2025 16:23, Marek Marczykowski-Górecki wrote:
> >>> On Tue, Oct 07, 2025 at 04:12:13PM +0200, Jan Beul
18 matches
Mail list logo