Following a compiler change done in 2012, make use of the fact that for
non-zero input BSF and TZCNT produce the same numeric result (EFLAGS
setting differs), and that CPUs not knowing of TZCNT will treat the
instruction as BSF (i.e. ignore what looks like a REP prefix to them).
The assumption
On Fri, Jan 23, 2015 at 05:00:00PM +, David Vrabel wrote:
On 23/01/15 16:14, Roger Pau Monne wrote:
I've done quite a lot of work in blkfront/blkback, and I usually end up
looking at the patches, so add myself as maintainer together with Konrad.
Thanks, Roger.
I can take care of
flight 33637 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33637/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-win7-amd64 5 xen-boot fail pass in 33581
On Fri, 23 Jan 2015, Ard Biesheuvel wrote:
For future ARM/AArch64 support in the XenBus code, move the implementation
of hypercall invocation to a dedicated library. The use of a library rather
than just an arch specific source in XenBusDxe.inf allows us to move the
constructor dependency on
On 23 Jan 2015, at 15:20, Stefano Stabellini stefano.stabell...@eu.citrix.com
wrote:
On Fri, 23 Jan 2015, Konrad Rzeszutek Wilk wrote:
On Thu, Jan 22, 2015 at 03:12:08PM -0500, Konrad Rzeszutek Wilk wrote:
Hey,
I will becoming more involved in OpenStack to the point that
I cannot see
On Fri, 23 Jan 2015, Ard Biesheuvel wrote:
On ARM, xen_pfn_t is 64 bits but the size of a pointer is only
32 bits, so casting between them needs to go via (UINTN)
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel ard.biesheu...@linaro.org
Reviewed-by:
flight 33658 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33658/
Perfect :-)
All tests in this flight passed
version targeted for testing:
rumpuserxen 598ceb54916b2a87c8646c96a23e1e03b2e65e59
baseline version:
rumpuserxen
On Jan 23, 2015 10:10 AM, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
On Fri, 23 Jan 2015, Ian Campbell wrote:
On Fri, 2015-01-23 at 14:42 +, Stefano Stabellini wrote:
HVM guest -(PV)-- QEMU in Dom0 for guest
|
--(emulation)-- QEMU
On Fri, Jan 23, 2015 at 04:03:55PM +, Jan Beulich wrote:
On 23.01.15 at 16:46, konrad.w...@oracle.com wrote:
Subject: [PATCH] domain: In vcpu_destroy_pagetables we can return -ERESTART
instead of -EINTR
which has the side effect that domain_relinquish_resources will stop
and
flight 33634 linux-3.14 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33634/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 5 xen-boot fail REGR. vs. 33341
test-amd64-amd64-xl
On Fri, 23 Jan 2015, Ard Biesheuvel wrote:
Tiancore has its private copy of the Xen headers, and all drivers
that depend on it should use the same Xen interface version, so
let's move the #define to xen.h itself.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard
Ian Campbell writes (Re: [PATCH] README.dev: Document the usage of stop
files):
I've redone it as below which I think is probably (?) clearer.
Yes, I think it's much clearer, thanks.
Acked-by: Ian Jackson ian.jack...@eu.citrix.com
There are some less useful things you can do like [stuff]
Ian Campbell writes ([OSSTEST PATCH] README.dev: Document how to do a force
push.):
Signed-off-by: Ian Campbell ian.campb...@citrix.com
...
+Force pushing a branch
+==
+
+As osstest user on test controller
+$ cd ~/branches/for-$branch.git
+$
On 23/01/15 16:14, Roger Pau Monne wrote:
I've done quite a lot of work in blkfront/blkback, and I usually end up
looking at the patches, so add myself as maintainer together with Konrad.
Thanks, Roger.
I can take care of shovelling the patches onto the xen/tip.git if you
don't have a
On 01/23/15 07:19, Stefano Stabellini wrote:
xen_get_vmport_regs_pfn should take a xen_pfn_t argument, not an
unsigned long argument (in fact xen_pfn_t is defined as uint64_t on
ARM).
Also use xc_hvm_param_get instead of the deprecated xc_get_hvm_param.
Signed-off-by: Stefano Stabellini
flight 33640 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33640/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 5 xen-build fail REGR. vs. 33480
Reviewed-By: Olivier Martin olivier.mar...@arm.com
-Original Message-
From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org]
Sent: 23 January 2015 15:03
To: edk2-de...@lists.sourceforge.net; ler...@redhat.com; Olivier
Martin; roy.fr...@linaro.org; leif.lindh...@linaro.org;
Reviewed-By: Olivier Martin olivier.mar...@arm.com
-Original Message-
From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org]
Sent: 23 January 2015 15:03
To: edk2-de...@lists.sourceforge.net; ler...@redhat.com; Olivier
Martin; roy.fr...@linaro.org; leif.lindh...@linaro.org;
Reviewed-By: Olivier Martin olivier.mar...@arm.com
-Original Message-
From: Ard Biesheuvel [mailto:ard.biesheu...@linaro.org]
Sent: 23 January 2015 15:03
To: edk2-de...@lists.sourceforge.net; ler...@redhat.com; Olivier
Martin; roy.fr...@linaro.org; leif.lindh...@linaro.org;
flight 33668 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33668/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl5 xen-bootfail pass in 33614
test-amd64-i386-rhel6hvm-intel
On Fri, Jan 23, 2015 at 05:14:29PM +0100, Roger Pau Monne wrote:
I've done quite a lot of work in blkfront/blkback, and I usually end up
looking at the patches, so add myself as maintainer together with Konrad.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Konrad Rzeszutek Wilk
flight 33671 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33671/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 5 xen-boot fail REGR. vs. 26303
flight 33649 xen-4.5-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33649/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-winxpsp3 5 xen-boot fail REGR. vs. 33603
Regressions
On Fri, 23 Jan 2015, Ard Biesheuvel wrote:
This patchs adds support to VirtFdtDxe for the Xen DT node which
contains the base address of the Grant Table. This data is communicated
to XenBusDxe using a XENIO_PROTOCOL instance.
Contributed-under: TianoCore Contribution Agreement 1.0
On 01/23/15 16:02, Ard Biesheuvel wrote:
The DT binding for the ARM generic timer describes the secure,
non-secure, virtual and hypervisor timer interrupts, respectively.
However, under virtualization, only the virtual timer is usable, and
the device tree may omit the hypervisor timer
On 01/23/15 16:02, Ard Biesheuvel wrote:
This removes an instance of FixedPcdGet () so that the self relocating
PrePi instance can poke another value into it.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel ard.biesheu...@linaro.org
---
flight 33657 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33657/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 33422
Tests which did not
flight 33664 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33664/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-freebsd10-i386 7 freebsd-install fail like 33611
On Fri, Jan 23, 2015 at 11:45:06AM +, David Vrabel wrote:
On 23/01/15 00:29, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
Xen has support for splitting heavy work work into a series
of hypercalls, called multicalls, and preempting them through
what Xen calls
On Fri, Jan 23, 2015 at 11:45:06AM +, David Vrabel wrote:
+ */
+void xen_end_upcall(struct pt_regs *regs)
+{
+ if (xen_is_preemptible_hypercall(regs)) {
+ int cpuid = smp_processor_id();
+ if (_cond_resched())
+
On 01/23/15 16:02, Ard Biesheuvel wrote:
This adds support for detecting the presence of a GICv3 interrupt
controller from the device tree, and recording its distributor
base address in a PCD.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel
Service provider list members should not be prevented from being
reasonably honest with their users.
Signed-off-by: Ian Jackson ijack...@chiark.greenend.org.uk
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
security_vulnerability_process.html |8
1 file changed, 8
Applicants should be required to:
- Provide information on their public web pages which makes
it clear that and why they are eligible;
- Specifically, publicly state that and how they are using Xen
(so that the Security Team can verify eligibility);
- Provide a way for members of
IMPLEMENTATION TASKS:
* Create the mailing list (and check that it works from outside)
Signed-off-by: Ian Jackson ijack...@chiark.greenend.org.uk
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
v2: Provide whole email address for predisclosure-applications@,
but obfuscate it with
The prior consultation clause should applies to all disclosure
exceptions. The list end appears to have been moved by mistake. So
put it back.
Also, no longer suggest that predisclosure list members should consult
with the discoverer, since the discoverer is not generally known to
predisclosure
I would like to propose the following series of changes to the Xen
Project Security Policy. For readability I have presented them as
diffs to a reasonably-plausibly-formatted HTML.
The substance of each change is discussed in the corresponding commit
message.
I am going to wait a week to see if
IMPLEMENTATION TASKS:
* Assign last change date to be approval date
* Reformat html to web page CMS format
* Update web page
Signed-off-by: Ian Jackson ijack...@chiark.greenend.org.uk
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
security_vulnerability_process.html |4 +++-
1
No semantic change.
Signed-off-by: Ian Jackson ijack...@chiark.greenend.org.uk
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
security_vulnerability_process.html |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/security_vulnerability_process.html
On 01/23/15 16:02, Ard Biesheuvel wrote:
This is partially motivated by the desire to use PrePi in a virt
environment, and in that configuration, ArmPlatformInitializeMemory()
is never called. But actually, this is a more suitable place anyway.
Contributed-under: TianoCore Contribution
On 23 January 2015 at 18:41, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
On Fri, 23 Jan 2015, Ard Biesheuvel wrote:
This patch adds an implementation of XenHypercallLib for both
AArch64 and AArch32 execution modes on ARM systems.
Contributed-under: TianoCore Contribution
On 23 January 2015 at 18:54, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
On Fri, 23 Jan 2015, Ard Biesheuvel wrote:
This implements a SerialPortLib instance that wires up to the
PV console ring used by domU guests. Also imports the required
upstream Xen io/console.h header.
On Fri, 23 Jan 2015, Ard Biesheuvel wrote:
This patch adds an implementation of XenHypercallLib for both
AArch64 and AArch32 execution modes on ARM systems.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel ard.biesheu...@linaro.org
---
On 01/23/15 16:02, Ard Biesheuvel wrote:
ArmPkg/Drivers/TimerDxe/TimerDxe.c | 14 +-
.../ArmVirtualizationPkg/ArmVirtualizationPkg.dec | 3 +-
.../ArmVirtualizationPkg/ArmVirtualizationQemu.dsc | 3 -
.../ArmVirtualizationPkg/ArmVirtualizationXen.dsc | 274
Permitting deployment during embargo seemed to have rough consensus on
the principle. We seemed to be converging on the idea that the
Security Team should explicitly set deployment restrictions for each
set of patches.
IMPLEMENTATION TASKS:
* Add new section to Security Team's advisory
Permitting sharing of embargoed fixes amongst predisclosure list
seemed to have appropriate consensus.
IMPLEMENTATION TASKS:
* Send a notification to the existing predisclosure list members
informing them that they have been subscribed to the new list.
Notice should point them to the
Old tested version had not actually been tested; therefore in this
flight we test it, rather than a new candidate. The baseline, if
any, is the most recent actually tested revision.
flight 33685 linux-arm-xen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33685/
Failures :-/ but
On Fri, Jan 23, 2015 at 11:30:16AM +, David Vrabel wrote:
On 23/01/15 00:29, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
On kernels with voluntary or no preemption we can run
into situations where a hypercall issued through userspace
will linger around as it
On 23 January 2015 at 19:03, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
On Fri, 23 Jan 2015, Ard Biesheuvel wrote:
This patchs adds support to VirtFdtDxe for the Xen DT node which
contains the base address of the Grant Table. This data is communicated
to XenBusDxe using a
some notes
On 01/23/15 16:02, Ard Biesheuvel wrote:
This implements a MemoryInitPeiLib instance that differs from the
stock ArmPlatformPkg version only in the fact that it does not remove
the memory used by the flash device (FD). The reason is that, when using
PrePi, the DXE core is started
Hi Oleksandr,
On 23/01/2015 15:33, Oleksandr Tyshchenko wrote:
Signed-off-by: Oleksandr Tyshchenko oleksandr.tyshche...@globallogic.com
Signed-off-by: Iurii Konovalenko iurii.konovale...@globallogic.com
CC: Julien Grall julien.gr...@linaro.org
Reviewed-by: Julien Grall julien.gr...@linaro.org
24 янв. 2015 г. 0:36 пользователь Julien Grall julien.gr...@linaro.org
написал:
Hi Oleksandr,
Hi Julien
On 23/01/2015 15:33, Oleksandr Tyshchenko wrote:
Changes in v3:
1. Rewrite uart driver code to use start_tx/stop_tx callbacks.
2. Uncomment udelay after setup desired baudrate.
It
On Fri, 2015-01-23 at 12:03 +, Stefano Stabellini wrote:
You are right, I was mistaken. However keep in mind that only the
ubuntu stable branch linux-3.16.y-queue has the following important
backport:
commit 342443e998bd2dd6406d46c5f7e62540a6d4a170
Author: Stefano Stabellini
On 23.01.15 at 12:13, wei.l...@citrix.com wrote:
@@ -408,6 +413,68 @@ static void dump_numa(unsigned char key)
for_each_online_node ( i )
printk(Node %u: %u\n, i, page_num_node[i]);
+
+read_lock(d-vnuma_rwlock);
I'm sorry, but no - on v3 I specifically
On 23.01.15 at 13:59, li...@eikelenboom.it wrote:
Friday, January 23, 2015, 1:42:04 PM, you wrote:
On Mon, 1 Dec 2014, Stefano Stabellini wrote:
xc_physdev_unmap_pirq might revoke the permission to map the irq from
the domain causing the following xc_domain_irq_permission call to fail
and
Changes from v5:
* Remove common IRQ disable flag but instead disable IRQ when other MSR
read followed by MSR_IA32_TSC read;
* Add comments for special handle for MSR_IA32_TSC;
Changes from v4:
* Make the counter read and timestamp read atomic by disable IRQ;
* Treat MSR_IA32_TSC as a special
On Fri, 23 Jan 2015, Jan Beulich wrote:
On 23.01.15 at 13:59, li...@eikelenboom.it wrote:
Friday, January 23, 2015, 1:42:04 PM, you wrote:
On Mon, 1 Dec 2014, Stefano Stabellini wrote:
xc_physdev_unmap_pirq might revoke the permission to map the irq from
the domain causing the
Make some internal routines common so that total/local memory bandwidth
monitoring in the next patch can make use of them.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
Acked-by: Wei Liu wei.l...@citrix.com
---
tools/libxl/libxl_psr.c | 44 +--
Add Memory Bandwidth Monitoring(MBM) for VMs. Two types of monitoring
are supported: total and local memory bandwidth monitoring. To use it,
CMT should be enabled in hypervisor.
Signed-off-by: Chao Peng chao.p.p...@linux.intel.com
---
Changes in v6:
1. Remove DISABLE_IRQ flag as hypervisor
On 22/01/15 15:17, Jan Beulich wrote:
On 22.01.15 at 15:41, andrew.coop...@citrix.com wrote:
On 22/01/15 13:57, Jan Beulich wrote:
... making the code better document itself. No functional change
intended.
Signed-off-by: Jan Beulich jbeul...@suse.com
--- a/xen/arch/x86/hvm/vioapic.c
+++
On 23/01/15 13:20, Iurii Konovalenko wrote:
Thanks, now I have permissions to edit.
The last question about patches for u-boot. I can't upload them to
wiki because of file type filter.
What is the best way to share them?
The best solution would be to provide a git tree with the patched
On 23.01.15 at 14:41, andrew.coop...@citrix.com wrote:
On 22/01/15 15:17, Jan Beulich wrote:
On 22.01.15 at 15:41, andrew.coop...@citrix.com wrote:
On 22/01/15 13:57, Jan Beulich wrote:
... making the code better document itself. No functional change
intended.
Signed-off-by: Jan Beulich
On 23/01/15 13:58, Jan Beulich wrote:
On 23.01.15 at 14:41, andrew.coop...@citrix.com wrote:
On 22/01/15 15:17, Jan Beulich wrote:
On 22.01.15 at 15:41, andrew.coop...@citrix.com wrote:
On 22/01/15 13:57, Jan Beulich wrote:
... making the code better document itself. No functional change
As a module_init() function, this should have been this way from the
beginning.
Signed-off-by: Jan Beulich jbeul...@suse.com
---
drivers/xen/tmem.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
--- 3.19-rc5/drivers/xen/tmem.c
+++ 3.19-rc5-xen-tmem-init/drivers/xen/tmem.c
@@ -374,7
On 23.01.15 at 09:42, chao.p.p...@linux.intel.com wrote:
Except that MSR_IA32_TSC will looks heterogeneous. But since we already
treat it as a special case, I have no problem here. And if we do so,
even the first patch to add irq_disable ability is not needed. Sounds to
me that the
On 22/01/15 13:56, Jan Beulich wrote:
Following the earlier similar change validating CR4 modifications.
Signed-off-by: Jan Beulich jbeul...@suse.com
Reviewed-and-tested-by: Andrew Cooper andrew.coop...@citrix.com
There were some test failures, but they can't plausibly be related to
this
On 01/23/15 16:03, Ard Biesheuvel wrote:
Tiancore has its private copy of the Xen headers, and all drivers
that depend on it should use the same Xen interface version, so
let's move the #define to xen.h itself.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard
Hi All,
I've been attempting to revive the libvirt domXML - libxl_domain_config
tests originally started by Daniel all the way back in May!
https://www.redhat.com/archives/libvir-list/2014-May/msg01102.html
In a reply to patch5 of the series, Ian Campbell noted that the doc
produced by
From: David Vrabel david.vra...@citrix.com
Date: Tue, 20 Jan 2015 14:49:52 +
Always fully coalesce guest Rx packets into the minimum number of ring
slots. Reducing the number of slots per packet has significant
performance benefits when receiving off-host traffic.
Results from
On 01/23/15 16:02, Ard Biesheuvel wrote:
Our primary user QEMU/mach-virt presents us with a FDT blob padded
to 64 KB with plenty of room to set additional properties. However,
in the general case, we should only add properties after making sure
there is enough room available.
Old tested version had not actually been tested; therefore in this
flight we test it, rather than a new candidate. The baseline, if
any, is the most recent actually tested revision.
flight 33686 ovmf real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33686/
Failures :-/ but no
On 01/23/15 16:03, Ard Biesheuvel wrote:
On ARM, xen_pfn_t is 64 bits but the size of a pointer is only
32 bits, so casting between them needs to go via (UINTN)
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Ard Biesheuvel ard.biesheu...@linaro.org
---
flight 33677 linux-next real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33677/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 5 xen-boot fail REGR. vs. 33611
test-armhf-armhf-xl
Thanks for you relay, Konrad.
At 2015-01-23 22:29:48, Konrad Rzeszutek Wilk konrad.w...@oracle.com wrote:
On Fri, Jan 23, 2015 at 03:54:07PM +0800, openlui wrote:
Hi, all:
From the article [1] and xen-colors picture from Brendan Gergg's blog
[2], I have some understanding and question
(re-adding xen-devel)
On 22.01.15 at 17:54, tamas.leng...@zentific.com wrote:
On Thu, Jan 22, 2015 at 5:34 PM, Jan Beulich jbeul...@suse.com wrote:
On 22.01.15 at 17:23, tamas.leng...@zentific.com wrote:
Wouldn't making the
struct packed just take care of it automatically?
How would you
On Fri, Jan 23, 2015 at 10:00 AM, Jan Beulich jbeul...@suse.com wrote:
(re-adding xen-devel)
On 22.01.15 at 17:54, tamas.leng...@zentific.com wrote:
On Thu, Jan 22, 2015 at 5:34 PM, Jan Beulich jbeul...@suse.com wrote:
On 22.01.15 at 17:23, tamas.leng...@zentific.com wrote:
Wouldn't making
On 23.01.15 at 03:37, konrad.w...@oracle.com wrote:
On Thu, Jan 22, 2015 at 03:22:10PM +, Jan Beulich wrote:
On 22.01.15 at 16:01, konrad.w...@oracle.com wrote:
On Thu, Jan 22, 2015 at 09:49:08AM +, Jan Beulich wrote:
On 21.01.15 at 22:53, konrad.w...@oracle.com wrote:
This
On 23.01.15 at 02:44, konrad.w...@oracle.com wrote:
Here is a patch that does this. I don't yet have an setup to test
the failing scenario (working on that). I removed the part in
the softirq because with this patch I cannot see a way it would
ever get there (in the softirq hitting the BUG).
El 22/01/15 a les 16.43, Jan Beulich ha escrit:
On 22.01.15 at 16:19, roger@citrix.com wrote:
--- a/xen/arch/x86/domain_build.c
+++ b/xen/arch/x86/domain_build.c
@@ -320,11 +320,24 @@ static __init void pvh_add_mem_mapping(struct domain
*d, unsigned long gfn,
{
unsigned long i;
Hi,
On 19/01/15 15:23, Ian Campbell wrote:
On Thu, 2015-01-15 at 11:26 +, Ian Jackson wrote:
Wen Congyang writes ([PATCH v2] Fix building error):
ifeq ($(debug),y)
# Disable optimizations and enable debugging information for macros
CFLAGS += -O0 -g3
+# _FORTIFY_SOURCE requires
On 23/01/15 10:32, Juergen Gross wrote:
Hi,
while testing new patches to support dom0 with more than 512 GB I
stumbled over an issue which - I think - is present in pvops for
some time now.
On boot the kernel rearranges the memory layout to match the host
E820 map. This is done to be able
On Thu, 22 Jan 2015, Don Slutz wrote:
On 01/22/15 13:46, Stefano Stabellini wrote:
xen_get_vmport_regs_pfn should take a xen_pfn_t argument, not an
unsigned long argument (in fact xen_pfn_t is defined as uint64_t on
ARM).
Also use xc_hvm_param_get instead of the deprecated
On 01/23/2015 01:03 PM, Jan Beulich wrote:
On 23.01.15 at 12:35, andrew.coop...@citrix.com wrote:
I wonder whether it might be reasonable to extend contruct_dom0/libelf
to avoid constructing a p2m where pfns of built data (kernel, initrd,
p2m and initial pagetables) aliased with host io
This series aims to prevent PVH Dom0 from accessing MMIO regions of
devices that are used by Xen.
I know there are concerns with the way we build a PVH Dom0 right now, but
addressing those requires a major rework of how construct_dom0 works. IMHO I
don't think this should block this series,
Prevent Dom0 from accessing HPET MMIO region by adding the HPET mfn to the
list of forbiden memory regions (if ACPI_HPET_PAGE_PROTECT4 or
ACPI_HPET_PAGE_PROTECT64 flag is set) or to the list of read-only regions.
Also provide an option that prevents adding the HPET to the read-only memory
regions
Check that MMIO regions added to PVH Dom0 are allowed. Previously a PVH Dom0
would have access to the full MMIO range.
Signed-off-by: Roger Pau Monné roger@citrix.com
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
---
Changes since v3:
- Set execute access for
Preparatory change that allows setting the access type to
set_mmio_p2m_entry.
Signed-off-by: Roger Pau Monné roger@citrix.com
Acked-by: Tim Deegan t...@xen.org
Cc: Jan Beulich jbeul...@suse.com
Cc: Andrew Cooper andrew.coop...@citrix.com
Cc: Jun Nakajima jun.nakaj...@intel.com
Cc: Eddie Dong
My wiki login is: iurii.konovalenko
Best regards.
Iurii Konovalenko | Senior Software Engineer
GlobalLogic
On Fri, Jan 23, 2015 at 1:47 PM, Julien Grall julien.gr...@linaro.org wrote:
On 23/01/15 11:27, Iurii Konovalenko wrote:
Hi, Julien!
Hello Iurii,
I tried to add new page with
On 23/01/15 00:29, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
On kernels with voluntary or no preemption we can run
into situations where a hypercall issued through userspace
will linger around as it addresses sub-operatiosn in kernel
context (multicalls). Such
On 23.01.15 at 12:29, roger@citrix.com wrote:
El 22/01/15 a les 16.43, Jan Beulich ha escrit:
On 22.01.15 at 16:19, roger@citrix.com wrote:
--- a/xen/arch/x86/domain_build.c
+++ b/xen/arch/x86/domain_build.c
@@ -320,11 +320,24 @@ static __init void pvh_add_mem_mapping(struct domain
On 23/01/15 00:29, Luis R. Rodriguez wrote:
From: Luis R. Rodriguez mcg...@suse.com
Xen has support for splitting heavy work work into a series
of hypercalls, called multicalls, and preempting them through
what Xen calls continuation [0]. Despite this though without
CONFIG_PREEMPT
On 23/01/15 08:37, Jan Beulich wrote:
As a module_init() function, this should have been this way from the
beginning.
Applied to devel/for-linus-3.20, thanks.
David
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 19/01/15 15:51, David Vrabel wrote:
From: Jenny Herbert jennifer.herb...@citrix.com
Use gnttab_unmap_refs_async() to wait until the mapped pages are no
longer in use before unmapping them.
This allows blkback to use network storage which may retain refs to
pages in queued skbs after
On Fri, 23 Jan 2015, Ian Campbell wrote:
On Thu, 2015-01-22 at 18:54 +, Stefano Stabellini wrote:
On Thu, 22 Jan 2015, Ian Campbell wrote:
On Thu, 2015-01-22 at 10:56 +, Ian Campbell wrote:
I've managed to make a habit of forgetting to mention one important
point (including
On 23.01.15 at 12:35, andrew.coop...@citrix.com wrote:
I wonder whether it might be reasonable to extend contruct_dom0/libelf
to avoid constructing a p2m where pfns of built data (kernel, initrd,
p2m and initial pagetables) aliased with host io regions.
For one, the problem goes away to
xen_get_vmport_regs_pfn should take a xen_pfn_t argument, not an
unsigned long argument (in fact xen_pfn_t is defined as uint64_t on
ARM).
Also use xc_hvm_param_get instead of the deprecated xc_get_hvm_param.
Signed-off-by: Stefano Stabellini stefano.stabell...@eu.citrix.com
---
Changes in v2:
On 23/01/15 12:12, Iurii Konovalenko wrote:
My wiki login is: iurii.konovalenko
You should have the write permission now.
Regards,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On 22/01/2015 19:56, Stefano Stabellini wrote:
On Thu, 22 Jan 2015, Mao Mingy wrote:
On 21/01/2015 18:51, Stefano Stabellini wrote:
On Wed, 21 Jan 2015, Mao Mingy wrote:
I am trying to run the PVHVM guest on omap5 (arm arch) so that I can get
the
frame buffer shared by Domains. my setup are:
On Fri, Jan 23, 2015 at 10:03 AM, Jan Beulich jbeul...@suse.com wrote:
On 23.01.15 at 09:56, rcojoc...@bitdefender.com wrote:
On 01/22/2015 06:42 PM, Tamas K Lengyel wrote:
On Thu, Jan 22, 2015 at 5:25 PM, Jan Beulich jbeul...@suse.com wrote:
On 18.01.15 at 16:18, tamas.leng...@zentific.com
On Thu, 2015-01-22 at 18:54 +, Stefano Stabellini wrote:
On Thu, 22 Jan 2015, Ian Campbell wrote:
On Thu, 2015-01-22 at 10:56 +, Ian Campbell wrote:
I've managed to make a habit of forgetting to mention one important
point (including hitting send on this bit in reply to v4!)
On Thu, Jan 22, 2015 at 6:07 PM, Ian Jackson ian.jack...@eu.citrix.com wrote:
Oleksandr Dmytryshyn writes (Re: [PATCH v5] sndif: add ABI for Para-virtual
sound):
On Thu, Jan 22, 2015 at 5:41 PM, Ian Jackson ian.jack...@eu.citrix.com
wrote:
So for example, much real hardware will have a
1 - 100 of 207 matches
Mail list logo