-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-280
version 2
Fix for XSA-240 conflicts with shadow paging
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
Th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-279
version 2
x86: DoS from attempting to use INVPCID with a non-canonical addresses
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-275
version 2
insufficient TLB flushing / improper large page mappings with AMD IOMMUs
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-277
version 2
x86: incorrect error handling for guest p2m page removals
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-276
version 2
resource accounting issues in x86 IOREQ server handling
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
branch xen-unstable
xenbranch xen-unstable
job build-armhf-libvirt
testid libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_gnulib https://git.savannah.gnu.org/git/gnulib.git/
Tree: libvirt_keycodemapdb https://gitlab.com/keycodemap/keycodemapdb.git
Tree: qemuu git://xenbits.
On Mon, 19 Nov 2018 18:14:26 +0100
Paolo Bonzini wrote:
> On 19/11/18 16:31, Igor Mammedov wrote:
> > I've tried to give suggestions how to restructure series
> > on per patch basis. In my opinion it quite possible to split
> > series in several smaller ones and it should really help with
> > mak
flight 75615 distros-debian-snapshot real [real]
http://osstest.xensource.com/osstest/logs/75615/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-amd64-current-netinst-pygrub 10 debian-di-install fail like
75591
test-amd64-i386-i386-daily-ne
libxl creates this directory with mode 0. That prevents
fishdescriptor from working. chmod it. This is OK for testing.
CC: George Dunlap
Signed-off-by: Ian Jackson
---
ts-depriv-audit-qemu | 1 +
1 file changed, 1 insertion(+)
diff --git a/ts-depriv-audit-qemu b/ts-depriv-audit-qemu
index d
* Use mkdir -p, rather than trying to only create /run/user/$uid.
That helps if /run and/or /run/user do not exist, as they do in
libxl-made chroots with recent libxl (which gets qemu to chroot).
* Do all of this in the root directory of the qemu process, not our
own root directory. So it w
Deployment note: I have copied this binary to the images directory in
Cambridge and Massachusetts. The corresponding patch to chiark-utils
is on its way to my upstream hat.
CC: George Dunlap
Signed-off-by: Ian Jackson
---
production-config | 2 +-
production-config-cambridge | 2 +-
Hello Stefano,
On 01.11.18 22:20, Stefano Stabellini wrote:
No, I haven't had any time. Aside from the Xen version, another
difference is the interrupt source. I used the physical timer for
testing.
Could you share your approach for interrupts latency measurement? Are
you using any HW specifi
flight 130527 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130527/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64
On 20/11/2018 11:06, Jan Beulich wrote:
On 15.11.18 at 22:47, wrote:
>> The final remnanat of PVRDTSCP is that we would emulate RDTSCP even on
>> hardware which lacked the instruction. RDTSCP is available on almost all
>> 64-bit x86 hardware.
>>
>> Remove this emulation, drop the TSC_MODE_PV
flight 130591 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130591/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-xs
On 19/11/2018 15:25, Jan Beulich wrote:
On 15.11.18 at 22:47, wrote:
>> For more historical context, see
>> c/s c17b36d5dc792cfdf59b6de0213b168bec0af8e8
>> c/s 04656384a1b9714e43db850c51431008e23450d8
>>
>> PVRDTSCP was an attempt to provide Xen-aware userspace with a stable
>> monotonic
Hello Andre,
I'm going to change "gic_raise_guest_irq()" function interface.
Could you please comment my understanding of vgic-v3-its.c code below?
So that I could fix it alongside the function interface change.
On 16.11.18 18:45, Andrii Anisov wrote:
diff --git a/xen/arch/arm/vgic-v3-its.c
>>> On 20.11.18 at 11:56, wrote:
> Without this change valgrind can not decide what variant of
> xen_domctl_createdomain is provided as input.
>
> Fixes commit 4a83497635 ("xen/domctl: Merge set_max_evtchn into createdomain")
> Fixes commit a903bf5233 ("tools: Pass grant table limits to
> XEN_DO
>>> On 15.11.18 at 22:47, wrote:
> The final remnanat of PVRDTSCP is that we would emulate RDTSCP even on
> hardware which lacked the instruction. RDTSCP is available on almost all
> 64-bit x86 hardware.
>
> Remove this emulation, drop the TSC_MODE_PVRDTSCP constant, and allow RDTSCP
> in a PV g
>>> On 15.11.18 at 22:47, wrote:
> @@ -1040,7 +1040,10 @@ static int hvm_load_cpu_ctxt(struct domain *d,
> hvm_domain_context_t *h)
> if ( hvm_funcs.tsc_scaling.setup )
> hvm_funcs.tsc_scaling.setup(v);
>
> -v->arch.hvm.msr_tsc_aux = ctxt.msr_tsc_aux;
> +if ( ctxt.msr_tsc_
Without this change valgrind can not decide what variant of
xen_domctl_createdomain is provided as input.
Fixes commit 4a83497635 ("xen/domctl: Merge set_max_evtchn into createdomain")
Fixes commit a903bf5233 ("tools: Pass grant table limits to
XEN_DOMCTL_set_gnttab_limits")
Fixes commit ae8b8bc5
On 11/20/18 12:27 PM, Jan Beulich wrote:
On 20.11.18 at 11:02, wrote:
>> On 11/20/18 11:05 AM, Jan Beulich wrote:
>> On 19.11.18 at 18:26, wrote:
For now, only do allocation/deallocation; keeping them in sync
will be done in subsequent patches.
Logdirty synchronizatio
>>> On 20.11.18 at 11:02, wrote:
> On 11/20/18 11:05 AM, Jan Beulich wrote:
> On 19.11.18 at 18:26, wrote:
>>> For now, only do allocation/deallocation; keeping them in sync
>>> will be done in subsequent patches.
>>>
>>> Logdirty synchronization will only be done for active altp2ms;
>>> so a
>>> On 20.11.18 at 10:43, wrote:
>
>> On Nov 20, 2018, at 9:12 AM, Jan Beulich wrote:
>>
> On 19.11.18 at 18:26, wrote:
>>> When an new altp2m view is created very early on guest boot, the
>>> display will freeze (although the guest will run normally). This
>>> may also happen on resizing
On 11/20/18 11:05 AM, Jan Beulich wrote:
On 19.11.18 at 18:26, wrote:
>> For now, only do allocation/deallocation; keeping them in sync
>> will be done in subsequent patches.
>>
>> Logdirty synchronization will only be done for active altp2ms;
>> so allocate logdirty rangesets (copying the ho
> On Nov 20, 2018, at 9:12 AM, Jan Beulich wrote:
>
On 19.11.18 at 18:26, wrote:
>> When an new altp2m view is created very early on guest boot, the
>> display will freeze (although the guest will run normally). This
>> may also happen on resizing the display. The reason is the way
>> Xen
> >> ---
> >> drivers/hv/hv_balloon.c | 14 --
> >> 1 file changed, 12 insertions(+), 2 deletions(-)
> >>
> >> diff --git a/drivers/hv/hv_balloon.c b/drivers/hv/hv_balloon.c
> >> index 211f3fe3a038..47719862e57f 100644
> >> --- a/drivers/hv/hv_balloon.c
> >> +++ b/drivers/hv/hv_balloo
On 11/20/18 11:12 AM, Jan Beulich wrote:
On 19.11.18 at 18:26, wrote:
>> When an new altp2m view is created very early on guest boot, the
>> display will freeze (although the guest will run normally). This
>> may also happen on resizing the display. The reason is the way
>> Xen currently (mis
On 09/11/2018 19:12, Daniel Kiper wrote:
> On Fri, Nov 02, 2018 at 01:37:29PM +0100, Juergen Gross wrote:
>> Add the needed code to setup the hypercall page for calling into the
>> Xen hypervisor.
>>
>> Signed-off-by: Juergen Gross
>> ---
>> V3: grub_xen_early_halt->grub_xen_panic (Roger Pau Monné
On 15/11/2018 09:33, Roger Pau Monné wrote:
> On Fri, Nov 02, 2018 at 01:37:29PM +0100, Juergen Gross wrote:
>> Add the needed code to setup the hypercall page for calling into the
>> Xen hypervisor.
>>
>> Signed-off-by: Juergen Gross
>
> Thanks, LGTM, just one suggestion and one question.
>
>>
>>> On 19.11.18 at 18:26, wrote:
> When an new altp2m view is created very early on guest boot, the
> display will freeze (although the guest will run normally). This
> may also happen on resizing the display. The reason is the way
> Xen currently (mis)handles logdirty VGA: it intentionally
> misc
>>> On 19.11.18 at 18:26, wrote:
> For now, only do allocation/deallocation; keeping them in sync
> will be done in subsequent patches.
>
> Logdirty synchronization will only be done for active altp2ms;
> so allocate logdirty rangesets (copying the host logdirty
> rangeset) when an altp2m is acti
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict
testid depriv-audit-qemu/create
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-trad
On 20.11.18 09:45, Pankaj Gupta wrote:
>
> Hi David,
>
>>
>> Mark inflated and never onlined pages PG_offline, to tell the world that
>> the content is stale and should not be dumped.
>>
>> Cc: "K. Y. Srinivasan"
>> Cc: Haiyang Zhang
>> Cc: Stephen Hemminger
>> Cc: Kairui Song
>> Cc: Vitaly K
Hi David,
>
> Mark inflated and never onlined pages PG_offline, to tell the world that
> the content is stale and should not be dumped.
>
> Cc: "K. Y. Srinivasan"
> Cc: Haiyang Zhang
> Cc: Stephen Hemminger
> Cc: Kairui Song
> Cc: Vitaly Kuznetsov
> Cc: Andrew Morton
> Cc: Matthew Wilcox
flight 130585 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/130585/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-xs
>>> On 15.11.18 at 22:47, wrote:
> As noted in c/s 4999bf3e8b "x86/PV: use generic emulator for privileged
> instruction handling", these hoops are jumped through to retain the older
> behaviour, along with a note suggesting that we should reconsider things.
>
> It does not matter exactly when pv
On Mon, 19 Nov 2018 18:02:53 +
"Boeuf, Sebastien" wrote:
> On Mon, 2018-11-19 at 16:37 +0100, Igor Mammedov wrote:
> > On Fri, 16 Nov 2018 19:42:08 +
> > "Boeuf, Sebastien" wrote:
> >
> > >
> > > Hi Igor,
> > >
> > > On Fri, 2018-11-16 at 10:39 +0100, Igor Mammedov wrote:
> > > >
On Mon, 19 Nov 2018 13:27:14 -0500
"Michael S. Tsirkin" wrote:
> On Thu, Nov 08, 2018 at 03:16:23PM +0100, Igor Mammedov wrote:
> > On Mon, 5 Nov 2018 02:40:28 +0100
> > Samuel Ortiz wrote:
> >
> > > XSDT is the 64-bit version of the legacy ACPI RSDT (Root System
> > > Description Table). RS
>>> On 19.11.18 at 19:11, wrote:
> On 19/11/2018 10:13, Jan Beulich wrote:
>> @@ -8828,12 +8837,7 @@ x86_emulate(
>> dst.type = OP_NONE;
>> break;
>> default:
>> -if ( (d & DstMask) != DstMem )
>> -{
>> -
101 - 140 of 140 matches
Mail list logo