Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-12 Thread Tian, Kevin
From: Tim Deegan [mailto:t...@xen.org] Sent: Thursday, February 12, 2015 8:42 PM At 07:08 + on 12 Feb (1423721283), Tian, Kevin wrote: for general log dirty, ept_invalidate_emt is required because there is access permission change (dirtied page becomes rw after 1st fault, so need to

Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-12 Thread Kai Huang
On 02/12/2015 10:10 PM, Andrew Cooper wrote: On 12/02/15 06:54, Tian, Kevin wrote: which presumably means that the PML buffer flush needs to be aware of which gfns are mapped by superpages to be able to correctly set a block of bits in the logdirty bitmap. Unfortunately PML itself can't tell

Re: [Xen-devel] [PATCH] xen/Coverity: Audit of MISSING_BREAK defects

2015-02-12 Thread Don Koch
On Thu, 12 Feb 2015 20:08:46 + Andrew Cooper andrew.coop...@citrix.com wrote: Coverity uses several heuristics to identify when one case statement legitimately falls through into the next, and a comment as the final item in a case statement is one heuristic (the assumption being that it is

Re: [Xen-devel] [PATCH OSSTEST 11/12] Changes on test step of debain hvm guest install

2015-02-12 Thread Hu, Robert
-Original Message- From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] Sent: Friday, February 13, 2015 2:17 AM To: Hu, Robert Cc: xen-devel@lists.xen.org; jfeh...@suse.com; wei.l...@citrix.com; ian.campb...@citrix.com; Pang, LongtaoX Subject: Re: [PATCH OSSTEST 11/12] Changes on

Re: [Xen-devel] [PATCH OSSTEST 12/12] Changes to test step of xen install

2015-02-12 Thread Hu, Robert
-Original Message- From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] Sent: Friday, February 13, 2015 2:21 AM To: Hu, Robert Cc: xen-devel@lists.xen.org; ian.jack...@eu.citrix.com; jfeh...@suse.com; wei.l...@citrix.com; ian.campb...@citrix.com; Pang, LongtaoX Subject: Re: [PATCH

[Xen-devel] [xen-unstable test] 34484: regressions - FAIL

2015-02-12 Thread xen . org
flight 34484 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34484/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt 13 guest-destroy fail REGR. vs. 34341 Regressions which

Re: [Xen-devel] [PATCH OSSTEST 01/12] Add support of parsing grub which has 'submenu' primitive

2015-02-12 Thread Hu, Robert
-Original Message- From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] Sent: Friday, February 13, 2015 2:32 AM To: Wei Liu Cc: Hu, Robert; xen-devel@lists.xen.org; jfeh...@suse.com; ian.campb...@citrix.com; Pang, LongtaoX Subject: Re: [PATCH OSSTEST 01/12] Add support of parsing

Re: [Xen-devel] [PATCH OSSTEST 10/12] Compose the main body of test-nested test job.

2015-02-12 Thread Hu, Robert
-Original Message- From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] Sent: Thursday, February 12, 2015 1:07 AM To: Hu, Robert Cc: xen-devel@lists.xen.org; jfeh...@suse.com; wei.l...@citrix.com; ian.campb...@citrix.com; Pang, LongtaoX Subject: Re: [PATCH OSSTEST 10/12] Compose the

[Xen-devel] [PATCH V4] x86 spinlock: Fix memory corruption on completing completions

2015-02-12 Thread Raghavendra K T
Paravirt spinlock clears slowpath flag after doing unlock. As explained by Linus currently it does: prev = *lock; add_smp(lock-tickets.head, TICKET_LOCK_INC); /* add_smp() is a full mb() */ if (unlikely(lock-tickets.tail

Re: [Xen-devel] [PATCH 00/17] blktap2 related bugfix patches

2015-02-12 Thread Hongyang Yang
Hi George, 在 11/03/2014 05:58 PM, George Dunlap 写道: On 10/29/2014 05:49 AM, Wen Congyang wrote: On 10/20/2014 10:25 PM, George Dunlap wrote: On Wed, Oct 15, 2014 at 2:05 AM, Wen Congyang we...@cn.fujitsu.com wrote: On 10/14/2014 11:48 PM, Ian Jackson wrote: Wen Congyang writes ([PATCH

Re: [Xen-devel] [PATCH v2] xen/arm: allow console=hvc0 to be omitted for guests

2015-02-12 Thread Julien Grall
On 13/02/2015 15:12, Ard Biesheuvel wrote: On 13 February 2015 at 15:03, Julien Grall julien.gr...@linaro.org wrote: Hi Ard, On 12/02/2015 19:29, Ard Biesheuvel wrote: This patch registers hvc0 as the preferred console if no console has been specified explicitly on the kernel command

Re: [Xen-devel] [PATCH OSSTEST 07/12] For hvm guest configuration, config console to 'hvc0'

2015-02-12 Thread Hu, Robert
Best Regards, Robert Ho -Original Message- From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] Sent: Thursday, February 12, 2015 1:04 AM To: Hu, Robert Cc: xen-devel@lists.xen.org; jfeh...@suse.com; wei.l...@citrix.com; ian.campb...@citrix.com; Pang, LongtaoX Subject: Re: [PATCH

Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-12 Thread Andrew Cooper
On 12/02/15 06:54, Tian, Kevin wrote: which presumably means that the PML buffer flush needs to be aware of which gfns are mapped by superpages to be able to correctly set a block of bits in the logdirty bitmap. Unfortunately PML itself can't tell us if the logged GPA comes from superpage

Re: [Xen-devel] [PATCH V3] x86 spinlock: Fix memory corruption on completing completions

2015-02-12 Thread Raghavendra K T
On 02/12/2015 07:20 PM, Oleg Nesterov wrote: On 02/12, Raghavendra K T wrote: @@ -191,8 +189,7 @@ static inline void arch_spin_unlock_wait(arch_spinlock_t *lock) * We need to check unlocked in a loop, tmp.head == head * can be false positive because of

Re: [Xen-devel] [PATCH V3] x86 spinlock: Fix memory corruption on completing completions

2015-02-12 Thread Raghavendra K T
On 02/12/2015 07:32 PM, Oleg Nesterov wrote: Damn, sorry for noise, forgot to mention... On 02/12, Raghavendra K T wrote: +static inline void __ticket_check_and_clear_slowpath(arch_spinlock_t *lock, + __ticket_t head) +{ + if (head

Re: [Xen-devel] [PATCH V3] x86 spinlock: Fix memory corruption on completing completions

2015-02-12 Thread Oleg Nesterov
Damn, sorry for noise, forgot to mention... On 02/12, Raghavendra K T wrote: +static inline void __ticket_check_and_clear_slowpath(arch_spinlock_t *lock, + __ticket_t head) +{ + if (head TICKET_SLOWPATH_FLAG) { +

Re: [Xen-devel] [PATCH V3] x86 spinlock: Fix memory corruption on completing completions

2015-02-12 Thread Raghavendra K T
On 02/12/2015 07:07 PM, Oleg Nesterov wrote: On 02/12, Raghavendra K T wrote: @@ -772,7 +773,8 @@ __visible void kvm_lock_spinning(struct arch_spinlock *lock, __ticket_t want) * check again make sure it didn't become free while * we weren't looking. */ - if

Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-12 Thread Tim Deegan
At 07:08 + on 12 Feb (1423721283), Tian, Kevin wrote: for general log dirty, ept_invalidate_emt is required because there is access permission change (dirtied page becomes rw after 1st fault, so need to change them back to ro again for the new dirty tracking round). But for PML, there's

Re: [Xen-devel] [PATCH] OvmfPkg: AcpiPlatformDxe: PCI enumeration may be disabled

2015-02-12 Thread Laszlo Ersek
On 02/12/15 13:29, Wei Liu wrote: On Thu, Feb 12, 2015 at 01:16:07PM +0100, Laszlo Ersek wrote: SVN r16411 delayed ACPI table installation until PCI enumeration was complete, because on QEMU the ACPI-related fw_cfg files should only be downloaded after PCI enumeration. However,

Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-12 Thread Tim Deegan
Hi, Thanks for posting this design! At 16:28 +0800 on 11 Feb (1423668493), Kai Huang wrote: Design == - PML feature is used globally A new Xen boot parameter, say 'opt_enable_pml', will be introduced to control PML feature detection, and PML feature will only be detected if

Re: [Xen-devel] [PATCH V3] x86 spinlock: Fix memory corruption on completing completions

2015-02-12 Thread Oleg Nesterov
On 02/12, Raghavendra K T wrote: @@ -191,8 +189,7 @@ static inline void arch_spin_unlock_wait(arch_spinlock_t *lock) * We need to check unlocked in a loop, tmp.head == head * can be false positive because of overflow. */ - if

Re: [Xen-devel] [PATCH] OvmfPkg: AcpiPlatformDxe: PCI enumeration may be disabled

2015-02-12 Thread Wei Liu
On Thu, Feb 12, 2015 at 01:16:07PM +0100, Laszlo Ersek wrote: SVN r16411 delayed ACPI table installation until PCI enumeration was complete, because on QEMU the ACPI-related fw_cfg files should only be downloaded after PCI enumeration. However, InitializeXen() in OvmfPkg/PlatformPei/Xen.c

Re: [Xen-devel] [PATCH V3] x86 spinlock: Fix memory corruption on completing completions

2015-02-12 Thread Peter Zijlstra
On Thu, Feb 12, 2015 at 05:17:27PM +0530, Raghavendra K T wrote: Paravirt spinlock clears slowpath flag after doing unlock. As explained by Linus currently it does: prev = *lock; add_smp(lock-tickets.head, TICKET_LOCK_INC); /* add_smp() is a

Re: [Xen-devel] [PATCH V3] x86 spinlock: Fix memory corruption on completing completions

2015-02-12 Thread Raghavendra K T
On 02/12/2015 08:30 PM, Peter Zijlstra wrote: On Thu, Feb 12, 2015 at 05:17:27PM +0530, Raghavendra K T wrote: [...] Linus suggested that we should not do any writes to lock after unlock(), and we can move slowpath clearing to fastpath lock. So this patch implements the fix with: 1. Moving

Re: [Xen-devel] [PATCH v2] vsprintf: Make sure argument to %pX specifier is valid

2015-02-12 Thread Boris Ostrovsky
On 02/12/2015 06:04 AM, Andrew Cooper wrote: On 11/02/15 20:58, Boris Ostrovsky wrote: If invalid pointer (i.e. something smaller than HYPERVISOR_VIRT_START) is passed for %*ph/%pv/%ps/%pS format specifiers then print (NULL) Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com ---

Re: [Xen-devel] [PATCH v2] vsprintf: Make sure argument to %pX specifier is valid

2015-02-12 Thread Andrew Cooper
On 12/02/15 15:01, Boris Ostrovsky wrote: On 02/12/2015 06:04 AM, Andrew Cooper wrote: On 11/02/15 20:58, Boris Ostrovsky wrote: If invalid pointer (i.e. something smaller than HYPERVISOR_VIRT_START) is passed for %*ph/%pv/%ps/%pS format specifiers then print (NULL) Signed-off-by: Boris

Re: [Xen-devel] [PATCH v2] vsprintf: Make sure argument to %pX specifier is valid

2015-02-12 Thread Boris Ostrovsky
On 02/12/2015 10:21 AM, Andrew Cooper wrote: On 12/02/15 15:01, Boris Ostrovsky wrote: On 02/12/2015 06:04 AM, Andrew Cooper wrote: On 11/02/15 20:58, Boris Ostrovsky wrote: If invalid pointer (i.e. something smaller than HYPERVISOR_VIRT_START) is passed for %*ph/%pv/%ps/%pS format specifiers

[Xen-devel] [PATCH 02/20] x86/shadow: Rename hash_foreach() to hash_vcpu_foreach()

2015-02-12 Thread Andrew Cooper
A later change requires the introduction of a domain variant. Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c | 31 +++ 1 file changed, 15 insertions(+), 16

[Xen-devel] [PATCH 04/20] x86/shadow: Only apply shadow heuristics when in guest context

2015-02-12 Thread Andrew Cooper
It is incorrect to be applying these heuristics because of toolstack actions. As the vcpu parameters are to be replaced with domain parameters, guest context is identified by using current-domain. Note that the majority of the heuristics in sh_remove_write_access() were already restricted to

[Xen-devel] [PATCH 09/20] x86/shadow: Alter shadow_{pro, de}mote() to take a domain

2015-02-12 Thread Andrew Cooper
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c |6 ++ xen/arch/x86/mm/shadow/multi.c | 10 +- xen/arch/x86/mm/shadow/private.h |4 ++-- 3 files changed, 9

[Xen-devel] [PATCH 03/20] x86/shadow: Introduce 'd' pointers and clean up use of 'v-domain'

2015-02-12 Thread Andrew Cooper
All of the introduced domain pointers will eventually be removed, but doing this mechanical cleanup here allows the subsequent patches which change function prototypes to be smaller and more clear. In addition, swap some use of is_pv_32on64_vcpu(v) for is_pv_32on64_domain(d). No functional

[Xen-devel] [PATCH 06/20] x86/shadow: Alter *_shadow_status() and make_fl1_shadow() to take a domain

2015-02-12 Thread Andrew Cooper
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/multi.c | 99 +++- 1 file changed, 48 insertions(+), 51 deletions(-) diff --git a/xen/arch/x86/mm/shadow/multi.c

[Xen-devel] [PATCH 08/20] x86/shadow: Alter OOS functions to take a domain

2015-02-12 Thread Andrew Cooper
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c | 23 --- xen/arch/x86/mm/shadow/multi.c | 19 --- xen/arch/x86/mm/shadow/private.h |6 +++--- 3

[Xen-devel] [PATCH 05/20] x86/shadow: Alter shadow_hash_{lookup, insert, delete}() to take a domain

2015-02-12 Thread Andrew Cooper
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c | 11 --- xen/arch/x86/mm/shadow/multi.c | 22 +- xen/arch/x86/mm/shadow/private.h |6 +++--- 3 files

[Xen-devel] [linux-next test] 34461: regressions - FAIL

2015-02-12 Thread xen . org
flight 34461 linux-next real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34461/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-amd64 5 xen-boot fail REGR. vs. 34299

Re: [Xen-devel] [PATCH v2] vsprintf: Make sure argument to %pX specifier is valid

2015-02-12 Thread Andrew Cooper
On 12/02/15 15:38, Boris Ostrovsky wrote: On 02/12/2015 10:21 AM, Andrew Cooper wrote: On 12/02/15 15:01, Boris Ostrovsky wrote: On 02/12/2015 06:04 AM, Andrew Cooper wrote: On 11/02/15 20:58, Boris Ostrovsky wrote: If invalid pointer (i.e. something smaller than HYPERVISOR_VIRT_START) is

[Xen-devel] [linux-3.14 test] 34468: regressions - FAIL

2015-02-12 Thread xen . org
flight 34468 linux-3.14 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34468/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 11 leak-check/check fail REGR. vs. 34268 Regressions which are

Re: [Xen-devel] pvSCSI test

2015-02-12 Thread Kristian Hagsted Rasmussen
On Monday, February 9, 2015 07:02, Juergen Gross jgr...@suse.com wrote: To: Kristian Hagsted Rasmussen; Olaf Hering; xen-de...@lists.xensource.com Subject: Re: [Xen-devel] pvSCSI test snip No, that's okay. The connection between p-dev and the drive is done via the target infrastructure.

Re: [Xen-devel] [PATCH] x86 spinlock: Fix memory corruption on completing completions

2015-02-12 Thread Oleg Nesterov
On 02/11, Jeremy Fitzhardinge wrote: On 02/11/2015 09:24 AM, Oleg Nesterov wrote: I agree, and I have to admit I am not sure I fully understand why unlock uses the locked add. Except we need a barrier to avoid the race with the enter_slowpath() users, of course. Perhaps this is the only

Re: [Xen-devel] [PATCH v2] vsprintf: Make sure argument to %pX specifier is valid

2015-02-12 Thread Boris Ostrovsky
On 02/12/2015 11:33 AM, Boris Ostrovsky wrote: Also, for %*ph format, if we just go with falling through to plain format and not marking somehow that we are printing a bad pointer: unsigned badval = 0xab; unsigned *badptr = badval; printk(badptr = %*ph\n, 1, badptr); console:

Re: [Xen-devel] [PATCH v2] vsprintf: Make sure argument to %pX specifier is valid

2015-02-12 Thread Andrew Cooper
On 12/02/15 16:33, Boris Ostrovsky wrote: On 02/12/2015 10:48 AM, Andrew Cooper wrote: On 12/02/15 15:38, Boris Ostrovsky wrote: On 02/12/2015 10:21 AM, Andrew Cooper wrote: On 12/02/15 15:01, Boris Ostrovsky wrote: On 02/12/2015 06:04 AM, Andrew Cooper wrote: On 11/02/15 20:58, Boris

[Xen-devel] [PATCH RFC 00/20] Change parts of the shadow interface to be domain based

2015-02-12 Thread Andrew Cooper
The purpose of this series is to prevent toolstack entry points into the shadow code from passing d-vcpu[0] for actions which are inherenly domain wide. It also fixes the fact that shadow heuristics were being applied to vcpu 0 for toolstack-initiated actions. This series is composed mostly of

Re: [Xen-devel] stubdom vtpm build failure in staging

2015-02-12 Thread Xu, Quan
-Original Message- From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Xu, Quan Sent: Friday, February 13, 2015 12:57 AM To: Olaf Hering Cc: xen-devel@lists.xen.org Subject: Re: [Xen-devel] stubdom vtpm build failure

[Xen-devel] [PATCH 18/20] x86/shadow: Alter sh_{remove_all_mappings, rm_mappings_from_l1}() to take a domain

2015-02-12 Thread Andrew Cooper
This allows the removal an improper use of d-vcpu[0] from toolstack context Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c | 13 ++--- xen/arch/x86/mm/shadow/multi.c |3 +--

[Xen-devel] [PATCH 15/20] x86/shadow: Alter shadow_unhook{_???}_mappings() to take a domain

2015-02-12 Thread Andrew Cooper
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c | 12 ++-- xen/arch/x86/mm/shadow/multi.c | 13 + xen/arch/x86/mm/shadow/multi.h |6 +++---

[Xen-devel] [PATCH 16/20] x86/shadow: Alter sh_rm_write_access_from_???() to take a domain

2015-02-12 Thread Andrew Cooper
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c | 19 ++- xen/arch/x86/mm/shadow/multi.c |6 ++ xen/arch/x86/mm/shadow/multi.h |4 ++--

[Xen-devel] [PATCH 19/20] x86/shadow: Alter sh_remove_write_access to take a domain

2015-02-12 Thread Andrew Cooper
This allows the removal an improper use of d-vcpu[0] from toolstack context Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c |7 +++ xen/arch/x86/mm/shadow/multi.c | 16

[Xen-devel] [PATCH 10/20] x86/shadow: Alter sh_put_ref() and shadow destroy functions to take a domain

2015-02-12 Thread Andrew Cooper
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c | 19 +-- xen/arch/x86/mm/shadow/multi.c | 30 +- xen/arch/x86/mm/shadow/multi.h |8

[Xen-devel] [PATCH 11/20] x86/shadow: Alter sh_get_ref() and sh_{, un}pin() to take a domain

2015-02-12 Thread Andrew Cooper
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c |6 +++--- xen/arch/x86/mm/shadow/multi.c | 16 xen/arch/x86/mm/shadow/private.h | 11 --- 3 files changed,

[Xen-devel] [PATCH 14/20] x86/shadow: Alter sh_remove_l?_shadow() to take a domain

2015-02-12 Thread Andrew Cooper
This involves introducing the domain variant of hash_foreach() Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c | 52 +-- xen/arch/x86/mm/shadow/multi.c

[Xen-devel] [PATCH 13/20] x86/shadow: Alter sh_{clear_shadow_entry, remove_shadow_via_pointer}() to take a domain

2015-02-12 Thread Andrew Cooper
Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/mm/shadow/common.c | 11 +-- xen/arch/x86/mm/shadow/multi.c |4 +--- xen/arch/x86/mm/shadow/multi.h |2 +- 3 files changed, 7 insertions(+), 10

[Xen-devel] [PATCH 17/20] x86/shadow: Alter sh_remove_{all_}shadows{, _and_parents}() to take a domain

2015-02-12 Thread Andrew Cooper
This allows the removal of 3 improper uses of d-vcpu[0] from toolstack context Signed-off-by: Andrew Cooper andrew.coop...@citrix.com CC: Jan Beulich jbeul...@suse.com CC: Tim Deegan t...@xen.org --- xen/arch/x86/hvm/hvm.c |2 +- xen/arch/x86/mm.c |4 ++--

Re: [Xen-devel] stubdom vtpm build failure in staging

2015-02-12 Thread Andrew Cooper
On 12/02/15 17:24, Xu, Quan wrote: -Original Message- From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Xu, Quan Sent: Friday, February 13, 2015 12:57 AM To: Olaf Hering Cc: xen-devel@lists.xen.org Subject: Re:

[Xen-devel] Xen Security Advisory 117 (CVE-2015-0268) - arm: vgic-v2: GICD_SGIR is not properly emulated

2015-02-12 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2015-0268 / XSA-117 version 2 arm: vgic-v2: GICD_SGIR is not properly emulated UPDATES IN VERSION 2 CVE assigned. Mention CVE and XSA numbers in

[Xen-devel] [linux-linus test] 34471: regressions - trouble: broken/fail/pass

2015-02-12 Thread xen . org
flight 34471 linux-linus real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34471/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-rumpuserxen-amd64 11 rumpuserxen-demo-xenstorels/xenstorels fail REGR. vs. 34227

<    1   2