>>> On 10.01.18 at 18:45, wrote:
> On Fri, Jan 05, 2018 at 06:40:29AM -0700, Jan Beulich wrote:
>> >>> On 04.01.18 at 14:05, wrote:
>> > --- a/xen/include/asm-x86/guest.h
>> > +++ b/xen/include/asm-x86/guest.h
>> > @@ -20,6 +20,7 @@
>> > #define
flight 117761 qemu-upstream-4.10-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117761/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 117345
On Wed, Jan 10, 2018 at 7:38 PM, Rich Persaud wrote:
> On Jan 10, 2018, at 11:39, Ian Jackson wrote:
>
>
> [ Disclaimer: non-technical, PM-oriented message ahead. Opinions expressed
> are those of this individual and not former/current employers or
> On Jan 10, 2018, at 11:39, Ian Jackson wrote:
>
> Jan Beulich writes ("Re: Radical proposal v2: Publish Amazon's verison now,
> Citrix's version soon"):
>> There are a couple of instances of "a branch", and I'm not really
>> clear on which one that would be, yet in
flight 117759 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117759/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 15 guest-start/debian.repeat fail REGR. vs. 117311
Tests which did
On Fri, 22 Dec 2017, Mirela Simonovic wrote:
> This document contains our design specification for "suspend to RAM"
> support for ARM in Xen. It covers the basic suspend to RAM mechanism
> based on ARM PSCI standard, that would allow individual guests and
> Xen itself to suspend/resume.
>
> We
flight 117748 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117748/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stopfail like 115643
test-armhf-armhf-libvirt 14
This run is configured for baseline tests only.
flight 74214 xen-4.9-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74214/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
On Wed, Dec 20, 2017 at 09:17:07AM +0100, Juergen Gross wrote:
> On 20/12/17 00:27, Dongwon Kim wrote:
> > I forgot to include this brief information about this patch series.
> >
> > This patch series contains the implementation of a new device driver,
> > hyper_dmabuf, which provides a method
Yes, I will post a test application.
Thanks
On Wed, Dec 20, 2017 at 10:38:08AM +0200, Oleksandr Andrushchenko wrote:
>
> On 12/20/2017 01:27 AM, Dongwon Kim wrote:
> >This patch series contains the implementation of a new device driver,
> >hyper_dmabuf, which provides a method for DMA-BUF
On Wed, Dec 20, 2017 at 10:59:57AM +0100, Daniel Vetter wrote:
> On Tue, Dec 19, 2017 at 03:27:31PM -0800, Dongwon Kim wrote:
> > I forgot to include this brief information about this patch series.
> >
> > This patch series contains the implementation of a new device driver,
> > hyper_dmabuf,
On 1/10/18 9:39 AM, Ian Jackson wrote:
> Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
>> Here is the converter script where I just got my guest to boot with
>> the Vixen shim, as built and provided by Wei.
>
> And here is one which handles the guest console correctly. Vixen
>
ret instructions are speculated directly to values recorded in the RSB/RAS, as
there is no uncertainty in well-formed code. Guests can take advantage of
this in two ways:
1) If they can find a path in Xen which executes more ret instructions than
call instructions. (At least one in the
Set STIBP behind the guests back if it knows about IBRS but not STIBP, and no
MSR_SPEC_CTRL protection active.
Signed-off-by: Andrew Cooper
---
v7:
* Move logic into a static inline helper.
---
xen/arch/x86/domain.c| 8
xen/arch/x86/msr.c
On contemporary hardware, setting IBRS/STIBP has a performance impact on
adjacent hyperthreads. It is therefore recommended to clear the setting
before becoming idle, to avoid an idle core preventing adjacent userspace
execution from running at full performance.
Care must be taken to ensure
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
v7:
* Use the opt_ibpb boolean rather than using a cpufeature flag.
---
docs/misc/xen-command-line.markdown | 5 -
xen/arch/x86/domain.c | 3 +++
xen/arch/x86/spec_ctrl.c
For performance reasons, HVM guests should have direct access to these MSRs
when possible.
Signed-off-by: Andrew Cooper
---
v7:
* Drop excess brackets
---
xen/arch/x86/domctl.c | 19 +++
xen/arch/x86/hvm/svm/svm.c | 5 +
We need to be able to either set or clear IBRS in Xen context, as well as
restore appropriate guest values in guest context. See the documentation in
asm-x86/spec_ctrl_asm.h for details.
There is a semi-unrelated bugfix, where various asm_defn.h macros have a
hidden dependency on PAGE_SIZE,
Signed-off-by: Andrew Cooper
---
v7:
* static, and tweak comment
---
docs/misc/xen-command-line.markdown | 6 ++-
xen/arch/x86/spec_ctrl.c| 104 ++--
2 files changed, 105 insertions(+), 5 deletions(-)
diff --git
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/msr.c| 35 +++
xen/include/asm-x86/msr.h | 12
2 files changed, 47 insertions(+)
diff --git a/xen/arch/x86/msr.c
Nothing very interesting at the moment, but the logic will grow as new
mitigations are added.
Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
---
xen/arch/x86/Makefile | 1 +
xen/arch/x86/setup.c| 3 ++
This property is required for the AMD's recommended mitigation for Branch
Target Injection, but Xen needs to cope with being unable to detect or modify
the MSR.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/cpu/amd.c
Contemporary processors are gaining Indirect Branch Controls via microcode
updates. Intel are introducing one bit to indicate IBRS and IBPB support, and
a second bit for STIBP. AMD are introducing IBPB only, so enumerate it with a
separate bit.
Furthermore, depending on compiler and microcode
Instead of gaining yet another top level boolean, introduce a more generic
cpuid= option. Also introduce a helper function to parse a generic boolean
value.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
Introduce INDIRECT_CALL and INDIRECT_JMP which either degrade to a normal
indirect branch, or dispatch to the __x86_indirect_thunk_* symbols.
Update all the manual indirect branches in to use the new thunks. The
indirect branches in the early boot and kexec path are left intact as we can't
use
Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
Reviewed-by: Jan Beulich
---
xen/arch/x86/domctl.c | 2 ++
xen/arch/x86/hvm/hvm.c | 2 ++
2 files changed, 4 insertions(+)
diff --git a/xen/arch/x86/domctl.c
Depending on hardware and microcode availability, we will want to replace
IND_THUNK_REPOLINE with other implementations.
For AMD hardware, choose IND_THUNK_LFENCE in preference to retpoline if lfence
is known to be (or was successfully made) dispatch serialising.
Signed-off-by: Andrew Cooper
In addition to this software series, you will need the following:
1) A compiler which understands -mindirect-branch=thunk-external and
-mindirect-branch-register. A GCC patch series implementing this should
be available imminently. In the meantime, a development branch can be
> Actually no need... The underlying issue was really a bug and has
> been fixed in 4.14.11.
Thanks for tracking this down & spending time looking at this Paul.
Best regards,
Alex
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
On Wed, 2018-01-10 at 15:41 +, Ian Jackson wrote:
> Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
> > And here is one which handles the guest console correctly. Vixen
> > sends the L2 guest console to the emulated serial, along with the
> > shim's own output.
>
So, I've got
flight 117741 xen-4.10-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117741/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pvhv2-intel 12 guest-start fail never pass
test-amd64-amd64-xl-pvhv2-amd
On Fri, Jan 05, 2018 at 04:39:33AM -0700, Jan Beulich wrote:
> > +#if defined(CONFIG_PVH_GUEST) && !defined(EFI)
>
> The EFI part here then also wouldn't be necessary, afaict.
It is necessary otherwise efi.lds will contain .Xen.note directives,
which breaks the build.
Wei.
On 10/01/18 19:20, Dario Faggioli wrote:
> Signed-off-by: Dario Faggioli
Acked-by: Juergen Gross
Juergen
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
On Wed, Jan 10, 2018 at 07:20:34PM +0100, Dario Faggioli wrote:
> Signed-off-by: Dario Faggioli
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
On Wed, Jan 10, 2018 at 1:20 PM, Dario Faggioli wrote:
>
> Signed-off-by: Dario Faggioli
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
On Wed, Jan 10, 2018 at 5:51 AM, Juergen Gross wrote:
> On 10/01/18 14:34, George Dunlap wrote:
>> * Executive summary
>>
>> - We've agreed on a "convergence" point for PV shim functionality that
>> covers as many users as possible:
>> - 'HVM' functionality: boots in HVM mode,
On Wed, 10 Jan 2018, Dario Faggioli wrote:
> Signed-off-by: Dario Faggioli
Acked-by: Stefano Stabellini
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
On Wed, Jan 10, 2018 at 07:20:34PM +0100, Dario Faggioli wrote:
> Signed-off-by: Dario Faggioli
Acked-by: Wei Liu
Welcome back!
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
Signed-off-by: Dario Faggioli
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano
## Paul Durrant (paul.durr...@citrix.com):
> Actually no need... The underlying issue was really a bug and has
> been fixed in 4.14.11.
Oh. That explains why reverting the other patch "fixed" the problem -
I had skipped 4.14.10 and 4.14.11 - and the problem has gone away
independently of that.
On Fri, Jan 05, 2018 at 06:40:29AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:05, wrote:
> > --- /dev/null
> > +++ b/xen/arch/x86/guest/xen.c
> > @@ -0,0 +1,75 @@
> > +/**
> > + *
On Wed, 2018-01-10 at 15:41 +, Ian Jackson wrote:
> Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
> > And here is one which handles the guest console correctly. Vixen
> > sends the L2 guest console to the emulated serial, along with the
> > shim's own output.
So, I've got a
On Wed, 10 Jan 2018, George Dunlap wrote:
> * Executive summary
>
> - We've agreed on a "convergence" point for PV shim functionality that
> covers as many users as possible:
> - 'HVM' functionality: boots in HVM mode, has support for Xen 3.4
>event channels, , booted via 'sidecar'
> -
On 10/01/18 17:16, Sergej Proskurin wrote:
Hi Julien,
Hi,
On 10/09/2017 06:43 PM, Julien Grall wrote:
Hi Sergej,
On 30/08/17 19:32, Sergej Proskurin wrote:
This commit copies and extends the altp2m-related code from x86 to ARM.
Functions that are no yet supported notify the caller or
The current version of vixen handles console output from the guest
but not console input to the guest. This adds guest input as in
0d50a85f x86/pv-shim: shadow PV console's page for L2 DomU,
but with read_smb moved up in guest_tx.
Signed-off-by: Sarah Newman
---
Hi Julien,
On 10/09/2017 06:43 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 30/08/17 19:32, Sergej Proskurin wrote:
>> This commit copies and extends the altp2m-related code from x86 to ARM.
>> Functions that are no yet supported notify the caller or print a BUG
>> message stating their absence.
Hi Julien,
On 10/09/2017 07:15 PM, Julien Grall wrote:
> Hi Sergej,
>
[...]
>> diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
>> index 5e86368010..3a1a38e7af 100644
>> --- a/xen/arch/arm/p2m.c
>> +++ b/xen/arch/arm/p2m.c
>> @@ -1203,27 +1203,65 @@ static void p2m_free_vmid(struct domain
On Tue, 2018-01-09 at 09:28 -0700, Jan Beulich wrote:
> > > > On 09.01.18 at 16:43, wrote:
> >
> > On Tue, 2018-01-09 at 02:13 -0700, Jan Beulich wrote:
> > > > > > On 04.01.18 at 14:06, wrote:
> > > >
> > > > +size_t consoled_guest_rx(void)
> > >
On 1/10/18 10:36 AM, George Dunlap wrote:
> On 01/10/2018 04:25 PM, Ian Jackson wrote:
>> Draft README.
>>
>> My git branch is bere
>>xenbits.xen.org:/home/iwj/ext/xen.git#wip.sidecar
>>
>> (This contains the converter script too. The git history is not very
>> useful and the files are in the
>>> On 10.01.18 at 17:39, wrote:
> Jan Beulich writes ("Re: Radical proposal v2: Publish Amazon's verison now,
> Citrix's version soon"):
>> There are a couple of instances of "a branch", and I'm not really
>> clear on which one that would be, yet in part my opinion
On Wed, Jan 10, 2018 at 04:39:11PM +, Ian Jackson wrote:
> Jan Beulich writes ("Re: Radical proposal v2: Publish Amazon's verison now,
> Citrix's version soon"):
> > There are a couple of instances of "a branch", and I'm not really
> > clear on which one that would be, yet in part my opinion
flight 117739 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117739/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-ws16-amd64 14 guest-localmigrate fail in 117710 pass
in 117739
On 01/10/2018 04:39 PM, Ian Jackson wrote:
> Jan Beulich writes ("Re: Radical proposal v2: Publish Amazon's verison now,
> Citrix's version soon"):
>> There are a couple of instances of "a branch", and I'm not really
>> clear on which one that would be, yet in part my opinion depends
>> on that,
Jan Beulich writes ("Re: Radical proposal v2: Publish Amazon's verison now,
Citrix's version soon"):
> There are a couple of instances of "a branch", and I'm not really
> clear on which one that would be, yet in part my opinion depends
> on that, as this will affect what state certain branches
On 01/10/2018 04:25 PM, Ian Jackson wrote:
> Draft README.
>
> My git branch is bere
>xenbits.xen.org:/home/iwj/ext/xen.git#wip.sidecar
>
> (This contains the converter script too. The git history is not very
> useful and the files are in the wrong place, but I needed somewhere to
> do my
On Wed, Jan 10, 2018 at 04:26:07PM +, George Dunlap wrote:
> On Thu, Jan 4, 2018 at 1:05 PM, Wei Liu wrote:
> > Hi all
> >
> > This is a patch series to run PV guest inside a PVH container. The series is
> > still in a very RFC state. We're aware that some code is not
On Thu, Jan 4, 2018 at 1:05 PM, Wei Liu wrote:
> Hi all
>
> This is a patch series to run PV guest inside a PVH container. The series is
> still in a very RFC state. We're aware that some code is not very clean yet
> and
> in the process of cleaning things up.
>
> The series
Draft README.
My git branch is bere
xenbits.xen.org:/home/iwj/ext/xen.git#wip.sidecar
(This contains the converter script too. The git history is not very
useful and the files are in the wrong place, but I needed somewhere to
do my work.)
Ian.
PV-in-HVM shim with "sidecar"
On Tue, Jan 09, 2018 at 03:59:33AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:06, wrote:
> > From: Roger Pau Monne
> >
> > Since the shim VCPUOP_{up/down} hypercall is wired to the plug/unplug
> > of CPUs to the shim itself, start the shim DomU
>>> On 10.01.18 at 16:14, wrote:
> In the early steps of compilation, the asm header files are created, such
> as include/asm-$(TARGET_ARCH)/asm-offsets.h. These files depend on the
> assembly file arch/$(TARGET_ARCH)/asm-offsets.s, which is generated
> before. Depending on
>>> On 10.01.18 at 16:33, wrote:
> I've spoken to Sergey and he agrees that this should be solved and
> that using uart_driver seems like the right approach.
>
> However given that we would like to merge this ASAP, do you consider
> this a blocker?
No.
Jan
On Fri, Jan 05, 2018 at 08:22:46AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:05, wrote:
> > +void __init pv_console_set_rx_handler(serial_rx_fn fn)
> > +{
> > +cons_rx_handler = fn;
> > +}
>
> Especially this and ...
>
> > +size_t pv_console_rx(struct
Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
> And here is one which handles the guest console correctly. Vixen
> sends the L2 guest console to the emulated serial, along with the
> shim's own output.
Some debugging stuff removed again.
#!/usr/bin/perl -w
#
# usage:
#
Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
> Here is the converter script where I just got my guest to boot with
> the Vixen shim, as built and provided by Wei.
And here is one which handles the guest console correctly. Vixen
sends the L2 guest console to the emulated serial,
In the early steps of compilation, the asm header files are created, such
as include/asm-$(TARGET_ARCH)/asm-offsets.h. These files depend on the
assembly file arch/$(TARGET_ARCH)/asm-offsets.s, which is generated
before. Depending on the used assembler, there might be comments in the
assembly
Here is the converter script where I just got my guest to boot with
the Vixen shim, as built and provided by Wei.
Ian.
#!/usr/bin/perl -w
#
# usage:
# pvshim-converter [OPTIONS] OLD-CONFIG NEW-CONFIG
#
# options:
# --sidecars-directory DIR default is /var/lib/xen/pvshim-sidecars
# --shim
On Wed, Jan 10, 2018 at 4:27 AM, Wei Liu wrote:
> On Wed, Jan 10, 2018 at 08:32:24AM +, Roger Pau Monné wrote:
>> On Tue, Jan 09, 2018 at 07:43:51PM +, Wei Liu wrote:
>> > On Mon, Jan 08, 2018 at 05:45:32PM +, Ian Jackson wrote:
>> > > AIUI we have a series for
On Wed, Jan 10, 2018 at 5:07 AM, Ian Jackson wrote:
> The attached script works for me. I have been testing it with a
> Citrix pvshim shim series and a shim binary that Wei passed me under
> the table. It makes a bootable HVM guest config for a PV guest.
>
> Things
On Tue, Jan 09, 2018 at 03:16:38AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:06, wrote:
> > @@ -1303,22 +1320,20 @@ long do_vcpu_op(int cmd, unsigned int vcpuid,
> > XEN_GUEST_HANDLE_PARAM(void) arg)
> >
> > break;
> >
> > -case VCPUOP_up: {
> > -
On Wed, Jan 10, 2018 at 5:50 AM, Jan Beulich wrote:
On 10.01.18 at 14:34, wrote:
>> I'd like to propose a new appraoch:
>>
>> 1. Immediately release Amazon's v1 series for people who can / prefer
>> to use the HVM + sidecar option.
>> - Advisory
> On 10 Jan 2018, at 13:51, Juergen Gross wrote:
>
> On 10/01/18 14:34, George Dunlap wrote:
>> * Executive summary
>>
[snip]
>>
>> Regardless of what we think of step 2, I think we should take step 1
>> immediately.
>>
>> Let me know what you think.
Thank you for putting
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> Of Paul Durrant
> Sent: 10 January 2018 12:52
> To: 'Christoph Moench-Tegeder'
> Cc: 'Michael Collins' ; 'Juergen Gross'
> ; Wei Liu
On 10/01/18 14:34, George Dunlap wrote:
> * Executive summary
>
> - We've agreed on a "convergence" point for PV shim functionality that
> covers as many users as possible:
> - 'HVM' functionality: boots in HVM mode, has support for Xen 3.4
>event channels, , booted via 'sidecar'
> -
>>> On 10.01.18 at 14:34, wrote:
> I'd like to propose a new appraoch:
>
> 1. Immediately release Amazon's v1 series for people who can / prefer
> to use the HVM + sidecar option.
> - Advisory and HOWTO should include who should use this option, and
> how to do it.
>
>>> On 10.01.18 at 14:36, wrote:
> On Tue, Jan 09, 2018 at 03:42:01AM -0700, Jan Beulich wrote:
>> >>> On 04.01.18 at 14:06, wrote:
>> > @@ -1015,6 +1024,11 @@ long do_memory_op(unsigned long cmd,
>> > XEN_GUEST_HANDLE_PARAM(void) arg)
>> >
* Executive summary
- We've agreed on a "convergence" point for PV shim functionality that
covers as many users as possible:
- 'HVM' functionality: boots in HVM mode, has support for Xen 3.4
event channels, , booted via 'sidecar'
- 'PVH' functionality: boots in PVH mode, booted via
>>> On 10.01.18 at 14:07, wrote:
> On Tue, Jan 09, 2018 at 03:16:38AM -0700, Jan Beulich wrote:
>> >>> On 04.01.18 at 14:06, wrote:
>> > @@ -1303,22 +1320,20 @@ long do_vcpu_op(int cmd, unsigned int vcpuid,
> XEN_GUEST_HANDLE_PARAM(void) arg)
>> >
>>
Hi,
As in subject...
Daniel
xen/arch/x86/setup.c | 18 ++
1 file changed, 14 insertions(+), 4 deletions(-)
Daniel Kiper (2):
x86/setup: do not relocate Xen over current Xen image placement
x86/setup: remap Xen image up to PFN_DOWN(__pa(_end))
On Tue, Jan 09, 2018 at 03:16:38AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:06, wrote:
> > @@ -1303,22 +1320,20 @@ long do_vcpu_op(int cmd, unsigned int vcpuid,
> > XEN_GUEST_HANDLE_PARAM(void) arg)
> >
> > break;
> >
> > -case VCPUOP_up: {
> > -
On Wed, Jan 10, 2018 at 01:07:33PM +, Ian Jackson wrote:
> The attached script works for me. I have been testing it with a
> Citrix pvshim shim series and a shim binary that Wei passed me under
> the table. It makes a bootable HVM guest config for a PV guest.
>
> Things that I see are
The attached script works for me. I have been testing it with a
Citrix pvshim shim series and a shim binary that Wei passed me under
the table. It makes a bootable HVM guest config for a PV guest.
Things that I see are wrong:
* My guest is trying to balloon up but due to the extra memory used
Otherwise, due to Xen code/data changes under CPU feet, Xen may crash
silently at boot.
We were hit by the issue in OVS Xen 4.4 with my earlier version of
EFI/Multiboot2 patches. Initially its implementation allowed relocation
of Xen even if it was relocated by the bootloader. This led to the
Current limit, PFN_DOWN(xen_phys_start), introduced by commit b280442
(x86: make Xen early boot code relocatable) is not reliable. Potentially
its value may fall below PFN_DOWN(__pa(_end)) and then part of Xen image
may not be mapped after relocation. This will not happen in current code
thanks to
On Tue, Jan 09, 2018 at 02:38:21AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:06, wrote:
> > +struct domain *d = current->domain;
> > +struct vcpu *v;
> > +unsigned int i;
> > +uint64_t old_store_pfn, old_console_pfn = 0, store_pfn,
> >
On Tue, Jan 09, 2018 at 04:02:34PM -0800, Anthony Liguori wrote:
> From: Anthony Liguori
>
> CVE-2017-5754 is problematic for paravirtualized x86 domUs because it
> appears to be very difficult to isolate the hypervisor's page tables
> from PV domUs while maintaining ABI
I have tracked down the problem to multiple calls to the zerocopy callback for
the same ubuf_info. I am not sure exactly which patch introduced the issue but
my suspicion is that it was one of the the MSG_ZEROCOPY series (see
https://marc.info/?l=linux-netdev=149807997726733=2).
I have a
On Tue, Jan 09, 2018 at 04:02:38PM -0800, Anthony Liguori wrote:
> From: Jan H. Schönherr
>
> Intel says for CPUID leaf 0Bh:
>
> "Software must not use EBX[15:0] to enumerate processor
>topology of the system. This value in this field
>(EBX[15:0]) is only intended
Hi Julien,
please excuse me for the long delay.
On 10/09/2017 06:25 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 30/08/17 19:32, Sergej Proskurin wrote:
>> This commit introduces macros for switching and restoring the vttbr
>> considering the currently set irq flags. We define these macros, as
flight 74195 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74195/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
On Wed, Jan 10, 2018 at 08:32:24AM +, Roger Pau Monné wrote:
> On Tue, Jan 09, 2018 at 07:43:51PM +, Wei Liu wrote:
> > On Mon, Jan 08, 2018 at 05:45:32PM +, Ian Jackson wrote:
> > > AIUI we have a series for pv-in-pvh shim which is nearing completion
> > > in the sense that it will
On Tue, Jan 09, 2018 at 09:50:14AM -0800, Anthony Liguori wrote:
> On Mon, Jan 8, 2018 at 8:05 AM, Jan Beulich wrote:
> On 04.01.18 at 14:06, wrote:
> >> From: Roger Pau Monne
> >>
> >> Note that the unmask and the virq
flight 117737 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117737/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 117662
test-armhf-armhf-libvirt-xsm 14
On 10/01/18 11:40, Andrew Cooper wrote:
> On 09/01/18 19:39, Juergen Gross wrote:
>> On 09/01/18 20:13, Andrew Cooper wrote:
>>> (sorry for the top-post. I'm on my phone)
>>>
>>> I can see you are using ltr, but I don't see anywhere where where you are
>>> changing the content on the TSS, or the
On 09/01/18 19:39, Juergen Gross wrote:
> On 09/01/18 20:13, Andrew Cooper wrote:
>> (sorry for the top-post. I'm on my phone)
>>
>> I can see you are using ltr, but I don't see anywhere where where you are
>> changing the content on the TSS, or the top-of-stack content.
> The per-vcpu TSS is
On 10/01/2018 09:52, Jan Beulich wrote:
On 09.01.18 at 17:47, wrote:
>> The opcode potentially written into ctxt->io_emul_stub[] in the case
>> that ioemul_handle_quirk() is overriding the default logic isnt
>> accounted for in the build-time check that the stubs
flight 117768 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117768/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen d51baf310e530659f73e714acf57bdc46303
baseline version:
xen
>>> On 09.01.18 at 17:47, wrote:
> The opcode potentially written into ctxt->io_emul_stub[] in the case
> that ioemul_handle_quirk() is overriding the default logic isnt
> accounted for in the build-time check that the stubs are large enough.
>
> Introduce
This run is configured for baseline tests only.
flight 74185 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74185/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
On 01/10/2018 01:22 AM, Boris Ostrovsky wrote:
On 01/09/2018 07:10 AM, Ross Lagerwall wrote:
When cleaning up after a partially successful gntdev_mmap(), unmap the
successfully mapped grant pages otherwise Xen will kill the domain if
in debug mode (Attempt to implicitly unmap a granted PTE)
On 09/01/2018 20:47, Chao Gao wrote:
> On Tue, Jan 09, 2018 at 11:47:54PM +, Andrew Cooper wrote:
>> On 08/01/18 04:01, Chao Gao wrote:
>>> Define interface, structures and hypercalls for toolstack to build
>>> cpu topology and for guest that will retrieve it [1].
>>> Two subop hypercalls
1 - 100 of 104 matches
Mail list logo