From: Tim Deegan [mailto:t...@xen.org]
Sent: Thursday, February 12, 2015 8:42 PM
At 07:08 + on 12 Feb (1423721283), Tian, Kevin wrote:
for general log dirty, ept_invalidate_emt is required because there is
access permission change (dirtied page becomes rw after 1st fault,
so need to
On 02/12/2015 10:10 PM, Andrew Cooper wrote:
On 12/02/15 06:54, Tian, Kevin wrote:
which presumably
means that the PML buffer flush needs to be aware of which gfns are
mapped by superpages to be able to correctly set a block of bits in the
logdirty bitmap.
Unfortunately PML itself can't tell
On Thu, 12 Feb 2015 20:08:46 +
Andrew Cooper andrew.coop...@citrix.com wrote:
Coverity uses several heuristics to identify when one case statement
legitimately falls through into the next, and a comment as the final item in a
case statement is one heuristic (the assumption being that it is
-Original Message-
From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
Sent: Friday, February 13, 2015 2:17 AM
To: Hu, Robert
Cc: xen-devel@lists.xen.org; jfeh...@suse.com; wei.l...@citrix.com;
ian.campb...@citrix.com; Pang, LongtaoX
Subject: Re: [PATCH OSSTEST 11/12] Changes on
-Original Message-
From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
Sent: Friday, February 13, 2015 2:21 AM
To: Hu, Robert
Cc: xen-devel@lists.xen.org; ian.jack...@eu.citrix.com; jfeh...@suse.com;
wei.l...@citrix.com; ian.campb...@citrix.com; Pang, LongtaoX
Subject: Re: [PATCH
flight 34484 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34484/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 13 guest-destroy fail REGR. vs. 34341
Regressions which
-Original Message-
From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
Sent: Friday, February 13, 2015 2:32 AM
To: Wei Liu
Cc: Hu, Robert; xen-devel@lists.xen.org; jfeh...@suse.com;
ian.campb...@citrix.com; Pang, LongtaoX
Subject: Re: [PATCH OSSTEST 01/12] Add support of parsing
-Original Message-
From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
Sent: Thursday, February 12, 2015 1:07 AM
To: Hu, Robert
Cc: xen-devel@lists.xen.org; jfeh...@suse.com; wei.l...@citrix.com;
ian.campb...@citrix.com; Pang, LongtaoX
Subject: Re: [PATCH OSSTEST 10/12] Compose the
Paravirt spinlock clears slowpath flag after doing unlock.
As explained by Linus currently it does:
prev = *lock;
add_smp(lock-tickets.head, TICKET_LOCK_INC);
/* add_smp() is a full mb() */
if (unlikely(lock-tickets.tail
Hi George,
在 11/03/2014 05:58 PM, George Dunlap 写道:
On 10/29/2014 05:49 AM, Wen Congyang wrote:
On 10/20/2014 10:25 PM, George Dunlap wrote:
On Wed, Oct 15, 2014 at 2:05 AM, Wen Congyang we...@cn.fujitsu.com wrote:
On 10/14/2014 11:48 PM, Ian Jackson wrote:
Wen Congyang writes ([PATCH
On 13/02/2015 15:12, Ard Biesheuvel wrote:
On 13 February 2015 at 15:03, Julien Grall julien.gr...@linaro.org wrote:
Hi Ard,
On 12/02/2015 19:29, Ard Biesheuvel wrote:
This patch registers hvc0 as the preferred console if no console
has been specified explicitly on the kernel command
Best Regards,
Robert Ho
-Original Message-
From: Ian Jackson [mailto:ian.jack...@eu.citrix.com]
Sent: Thursday, February 12, 2015 1:04 AM
To: Hu, Robert
Cc: xen-devel@lists.xen.org; jfeh...@suse.com; wei.l...@citrix.com;
ian.campb...@citrix.com; Pang, LongtaoX
Subject: Re: [PATCH
On 12/02/15 06:54, Tian, Kevin wrote:
which presumably
means that the PML buffer flush needs to be aware of which gfns are
mapped by superpages to be able to correctly set a block of bits in the
logdirty bitmap.
Unfortunately PML itself can't tell us if the logged GPA comes from
superpage
On 02/12/2015 07:20 PM, Oleg Nesterov wrote:
On 02/12, Raghavendra K T wrote:
@@ -191,8 +189,7 @@ static inline void arch_spin_unlock_wait(arch_spinlock_t
*lock)
* We need to check unlocked in a loop, tmp.head == head
* can be false positive because of
On 02/12/2015 07:32 PM, Oleg Nesterov wrote:
Damn, sorry for noise, forgot to mention...
On 02/12, Raghavendra K T wrote:
+static inline void __ticket_check_and_clear_slowpath(arch_spinlock_t *lock,
+ __ticket_t head)
+{
+ if (head
Damn, sorry for noise, forgot to mention...
On 02/12, Raghavendra K T wrote:
+static inline void __ticket_check_and_clear_slowpath(arch_spinlock_t *lock,
+ __ticket_t head)
+{
+ if (head TICKET_SLOWPATH_FLAG) {
+
On 02/12/2015 07:07 PM, Oleg Nesterov wrote:
On 02/12, Raghavendra K T wrote:
@@ -772,7 +773,8 @@ __visible void kvm_lock_spinning(struct arch_spinlock
*lock, __ticket_t want)
* check again make sure it didn't become free while
* we weren't looking.
*/
- if
At 07:08 + on 12 Feb (1423721283), Tian, Kevin wrote:
for general log dirty, ept_invalidate_emt is required because there is
access permission change (dirtied page becomes rw after 1st fault,
so need to change them back to ro again for the new dirty tracking
round). But for PML, there's
On 02/12/15 13:29, Wei Liu wrote:
On Thu, Feb 12, 2015 at 01:16:07PM +0100, Laszlo Ersek wrote:
SVN r16411 delayed ACPI table installation until PCI enumeration was
complete, because on QEMU the ACPI-related fw_cfg files should only be
downloaded after PCI enumeration.
However,
Hi,
Thanks for posting this design!
At 16:28 +0800 on 11 Feb (1423668493), Kai Huang wrote:
Design
==
- PML feature is used globally
A new Xen boot parameter, say 'opt_enable_pml', will be introduced to control
PML feature detection, and PML feature will only be detected if
On 02/12, Raghavendra K T wrote:
@@ -191,8 +189,7 @@ static inline void arch_spin_unlock_wait(arch_spinlock_t
*lock)
* We need to check unlocked in a loop, tmp.head == head
* can be false positive because of overflow.
*/
- if
On Thu, Feb 12, 2015 at 01:16:07PM +0100, Laszlo Ersek wrote:
SVN r16411 delayed ACPI table installation until PCI enumeration was
complete, because on QEMU the ACPI-related fw_cfg files should only be
downloaded after PCI enumeration.
However, InitializeXen() in OvmfPkg/PlatformPei/Xen.c
On Thu, Feb 12, 2015 at 05:17:27PM +0530, Raghavendra K T wrote:
Paravirt spinlock clears slowpath flag after doing unlock.
As explained by Linus currently it does:
prev = *lock;
add_smp(lock-tickets.head, TICKET_LOCK_INC);
/* add_smp() is a
On 02/12/2015 08:30 PM, Peter Zijlstra wrote:
On Thu, Feb 12, 2015 at 05:17:27PM +0530, Raghavendra K T wrote:
[...]
Linus suggested that we should not do any writes to lock after unlock(),
and we can move slowpath clearing to fastpath lock.
So this patch implements the fix with:
1. Moving
On 02/12/2015 06:04 AM, Andrew Cooper wrote:
On 11/02/15 20:58, Boris Ostrovsky wrote:
If invalid pointer (i.e. something smaller than HYPERVISOR_VIRT_START)
is passed for %*ph/%pv/%ps/%pS format specifiers then print (NULL)
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
On 12/02/15 15:01, Boris Ostrovsky wrote:
On 02/12/2015 06:04 AM, Andrew Cooper wrote:
On 11/02/15 20:58, Boris Ostrovsky wrote:
If invalid pointer (i.e. something smaller than HYPERVISOR_VIRT_START)
is passed for %*ph/%pv/%ps/%pS format specifiers then print (NULL)
Signed-off-by: Boris
On 02/12/2015 10:21 AM, Andrew Cooper wrote:
On 12/02/15 15:01, Boris Ostrovsky wrote:
On 02/12/2015 06:04 AM, Andrew Cooper wrote:
On 11/02/15 20:58, Boris Ostrovsky wrote:
If invalid pointer (i.e. something smaller than HYPERVISOR_VIRT_START)
is passed for %*ph/%pv/%ps/%pS format specifiers
A later change requires the introduction of a domain variant.
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c | 31 +++
1 file changed, 15 insertions(+), 16
It is incorrect to be applying these heuristics because of toolstack actions.
As the vcpu parameters are to be replaced with domain parameters, guest
context is identified by using current-domain.
Note that the majority of the heuristics in sh_remove_write_access() were
already restricted to
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c |6 ++
xen/arch/x86/mm/shadow/multi.c | 10 +-
xen/arch/x86/mm/shadow/private.h |4 ++--
3 files changed, 9
All of the introduced domain pointers will eventually be removed, but doing
this mechanical cleanup here allows the subsequent patches which change
function prototypes to be smaller and more clear.
In addition, swap some use of is_pv_32on64_vcpu(v) for is_pv_32on64_domain(d).
No functional
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/multi.c | 99 +++-
1 file changed, 48 insertions(+), 51 deletions(-)
diff --git a/xen/arch/x86/mm/shadow/multi.c
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c | 23 ---
xen/arch/x86/mm/shadow/multi.c | 19 ---
xen/arch/x86/mm/shadow/private.h |6 +++---
3
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c | 11 ---
xen/arch/x86/mm/shadow/multi.c | 22 +-
xen/arch/x86/mm/shadow/private.h |6 +++---
3 files
flight 34461 linux-next real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34461/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 5 xen-boot fail REGR. vs. 34299
On 12/02/15 15:38, Boris Ostrovsky wrote:
On 02/12/2015 10:21 AM, Andrew Cooper wrote:
On 12/02/15 15:01, Boris Ostrovsky wrote:
On 02/12/2015 06:04 AM, Andrew Cooper wrote:
On 11/02/15 20:58, Boris Ostrovsky wrote:
If invalid pointer (i.e. something smaller than
HYPERVISOR_VIRT_START)
is
flight 34468 linux-3.14 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34468/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 11 leak-check/check fail REGR. vs. 34268
Regressions which are
On Monday, February 9, 2015 07:02, Juergen Gross jgr...@suse.com wrote:
To: Kristian Hagsted Rasmussen; Olaf Hering; xen-de...@lists.xensource.com
Subject: Re: [Xen-devel] pvSCSI test
snip
No, that's okay. The connection between p-dev and the drive is done
via the target infrastructure.
On 02/11, Jeremy Fitzhardinge wrote:
On 02/11/2015 09:24 AM, Oleg Nesterov wrote:
I agree, and I have to admit I am not sure I fully understand why
unlock uses the locked add. Except we need a barrier to avoid the race
with the enter_slowpath() users, of course. Perhaps this is the only
On 02/12/2015 11:33 AM, Boris Ostrovsky wrote:
Also, for %*ph format, if we just go with falling through to plain
format and not marking somehow that we are printing a bad pointer:
unsigned badval = 0xab;
unsigned *badptr = badval;
printk(badptr = %*ph\n, 1, badptr);
console:
On 12/02/15 16:33, Boris Ostrovsky wrote:
On 02/12/2015 10:48 AM, Andrew Cooper wrote:
On 12/02/15 15:38, Boris Ostrovsky wrote:
On 02/12/2015 10:21 AM, Andrew Cooper wrote:
On 12/02/15 15:01, Boris Ostrovsky wrote:
On 02/12/2015 06:04 AM, Andrew Cooper wrote:
On 11/02/15 20:58, Boris
The purpose of this series is to prevent toolstack entry points into the
shadow code from passing d-vcpu[0] for actions which are inherenly domain
wide. It also fixes the fact that shadow heuristics were being applied to
vcpu 0 for toolstack-initiated actions.
This series is composed mostly of
-Original Message-
From: xen-devel-boun...@lists.xen.org
[mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Xu, Quan
Sent: Friday, February 13, 2015 12:57 AM
To: Olaf Hering
Cc: xen-devel@lists.xen.org
Subject: Re: [Xen-devel] stubdom vtpm build failure
This allows the removal an improper use of d-vcpu[0] from toolstack context
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c | 13 ++---
xen/arch/x86/mm/shadow/multi.c |3 +--
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c | 12 ++--
xen/arch/x86/mm/shadow/multi.c | 13 +
xen/arch/x86/mm/shadow/multi.h |6 +++---
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c | 19 ++-
xen/arch/x86/mm/shadow/multi.c |6 ++
xen/arch/x86/mm/shadow/multi.h |4 ++--
This allows the removal an improper use of d-vcpu[0] from toolstack context
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c |7 +++
xen/arch/x86/mm/shadow/multi.c | 16
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c | 19 +--
xen/arch/x86/mm/shadow/multi.c | 30 +-
xen/arch/x86/mm/shadow/multi.h |8
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c |6 +++---
xen/arch/x86/mm/shadow/multi.c | 16
xen/arch/x86/mm/shadow/private.h | 11 ---
3 files changed,
This involves introducing the domain variant of hash_foreach()
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c | 52 +--
xen/arch/x86/mm/shadow/multi.c
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/mm/shadow/common.c | 11 +--
xen/arch/x86/mm/shadow/multi.c |4 +---
xen/arch/x86/mm/shadow/multi.h |2 +-
3 files changed, 7 insertions(+), 10
This allows the removal of 3 improper uses of d-vcpu[0] from toolstack context
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com
CC: Jan Beulich jbeul...@suse.com
CC: Tim Deegan t...@xen.org
---
xen/arch/x86/hvm/hvm.c |2 +-
xen/arch/x86/mm.c |4 ++--
On 12/02/15 17:24, Xu, Quan wrote:
-Original Message-
From: xen-devel-boun...@lists.xen.org
[mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Xu, Quan
Sent: Friday, February 13, 2015 12:57 AM
To: Olaf Hering
Cc: xen-devel@lists.xen.org
Subject: Re:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-0268 / XSA-117
version 2
arm: vgic-v2: GICD_SGIR is not properly emulated
UPDATES IN VERSION 2
CVE assigned.
Mention CVE and XSA numbers in
flight 34471 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34471/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64 11 rumpuserxen-demo-xenstorels/xenstorels
fail REGR. vs. 34227
101 - 155 of 155 matches
Mail list logo