On 22/01/2018 09:31, Jan Beulich wrote:
On 19.01.18 at 18:40, wrote:
>> On 19/01/18 16:03, Jan Beulich wrote:
>>> --- a/xen/include/asm-x86/flushtlb.h
>>> +++ b/xen/include/asm-x86/flushtlb.h
>>> @@ -101,6 +101,8 @@ void write_cr3(unsigned long cr3);
>>> #define
>>> On 19.01.18 at 18:40, wrote:
> On 19/01/18 16:03, Jan Beulich wrote:
>> --- a/xen/include/asm-x86/flushtlb.h
>> +++ b/xen/include/asm-x86/flushtlb.h
>> @@ -101,6 +101,8 @@ void write_cr3(unsigned long cr3);
>> #define FLUSH_CACHE 0x400
>> /* VA for the flush
>>> On 19.01.18 at 22:19, wrote:
> On Fri, Jan 19, 2018 at 02:52:50AM -0700, Jan Beulich wrote:
>> >>> On 19.01.18 at 08:21, wrote:
>> > Maybe this is a silly question but which tag are the 4.10 XPTI
>> > commits from
>>> On 19.01.18 at 18:29, wrote:
> On Fri, Jan 19, 2018 at 4:02 PM, Jan Beulich wrote:
>> Their need is not tied to the actual flushing of TLBs, but the ticking
>> of the TLB clock. Make this more obvious by folding the two invocations
>> into a single one
>>> On 19.01.18 at 18:43, wrote:
> On 19/01/18 16:04, Jan Beulich wrote:
>> Just like any other function's CPU inputs, the one here shouldn't go
>> unchecked.
>>
>> Signed-off-by: Jan Beulich
>>
>> --- a/xen/include/xen/cpumask.h
>> +++
>>> On 19.01.18 at 18:00, wrote:
> On 01/19/2018 04:36 PM, Jan Beulich wrote:
> On 19.01.18 at 16:43, wrote:
>>> So what if instead of trying to close the "windows", we made it so that
>>> there was nothing through the windows to see? If
flight 118263 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118263/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm broken
flight 118264 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118264/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 broken
test-amd64-i386-qemuu-rhel6hvm-amd
On 19/01/18 13:51, Jan Beulich wrote:
On 19.01.18 at 14:36, wrote:
>> On 19/01/18 11:43, Jan Beulich wrote:
>> On 18.01.18 at 16:46, wrote:
@@ -729,6 +760,9 @@ ENTRY(nmi)
handle_ist_exception:
SAVE_ALL CLAC
>>> On 19.01.18 at 17:57, wrote:
> --- a/xen/arch/x86/shutdown.c
> +++ b/xen/arch/x86/shutdown.c
> @@ -511,6 +511,15 @@ static struct dmi_system_id __initdata
> reboot_dmi_table[] = {
> DMI_MATCH(DMI_PRODUCT_NAME, "Latitude E6520"),
> },
> },
The only difference between all the DEFINE_TRAP_ENTRY_* macros are the
interrupts (Asynchronous Abort, IRQ, FIQ) unmasked.
Rather than duplicating the code, introduce __DEFINE_TRAP_ENTRY macro
that will take the list of interrupts to unmask.
This is part of XSA-254.
Signed-off-by: Julien Grall
Add a command line parameter for controlling Xen page table isolation
(XPTI): per default it is on for non-AMD systems in 64 bit pv domains.
Possible settings are:
- true: switched on even on AMD systems
- false: switched off for all
- nodom0: switched off for dom0
Signed-off-by: Juergen Gross
On Mon, Jan 22, 2018 at 12:35:21PM +, Wei Liu wrote:
> To avoid spamming the list with all the other acked patches, here is the
> updated patch.
>
> ---8<---
> From 1ac0afbbc0ecd620c5fba3a03bb084bc4dafc78e Mon Sep 17 00:00:00 2001
> From: Wei Liu
> Date: Wed, 17 Jan 2018
On Thu, 2018-01-04 at 00:15 +, Andrew Cooper wrote:
>
> --- a/xen/include/asm-x86/asm_defns.h
> +++ b/xen/include/asm-x86/asm_defns.h
> @@ -217,22 +217,34 @@ static always_inline void stac(void)
> addq $-(UREGS_error_code-UREGS_r15), %rsp
> cld
> movq
On Mon, 2018-01-22 at 10:18 +, Andrew Cooper wrote:
> On 22/01/2018 10:04, David Woodhouse wrote:
> >
> > On Thu, 2018-01-04 at 00:15 +, Andrew Cooper wrote:
> > >
> > > --- a/xen/include/asm-x86/asm_defns.h
> > > +++ b/xen/include/asm-x86/asm_defns.h
> > > @@ -217,22 +217,34 @@ static
>>> On 22.01.18 at 12:42, wrote:
> On 19/01/18 13:51, Jan Beulich wrote:
> On 19.01.18 at 14:36, wrote:
>>> On 19/01/18 11:43, Jan Beulich wrote:
>>> On 18.01.18 at 16:46, wrote:
> @@ -729,6 +760,9 @@
As a preparation for doing page table isolation in the Xen hypervisor
in order to mitigate "Meltdown" use dedicated stacks, GDT and TSS for
64 bit PV domains mapped to the per-domain virtual area.
The per-vcpu stacks are used for early interrupt handling only. After
saving the domain's registers
Use indirect jump via register in case the target address isn't
reachable via a 32 bit relative jump.
Add macros for stub size and use those instead of returning the size
when writing the stub trampoline in order to support easy switching
between different sized stubs.
Signed-off-by: Juergen
Carve out the TSS initialization from load_system_tables().
Signed-off-by: Juergen Gross
---
xen/arch/x86/cpu/common.c| 56
xen/include/asm-x86/system.h | 1 +
2 files changed, 32 insertions(+), 25 deletions(-)
diff --git
show_guest_stack() and compat_show_guest_stack() stop dumping the
stack of the guest whenever its virtual address reaches the same
alignment which is used for the hypervisor stacks.
Remove this arbitrary limit and try to dump a fixed number of lines
instead.
Signed-off-by: Juergen Gross
For support of per-vcpu stacks we need per-vcpu trampolines. To be
able to put those into the per-domain mappings the upper levels
page tables must not have NX set for per-domain mappings.
In order to be able to reset the NX bit for a per-domain mapping add
a helper flipflags_perdomain_mapping()
>>> On 22.01.18 at 13:32, wrote:
> As a preparation for doing page table isolation in the Xen hypervisor
> in order to mitigate "Meltdown" use dedicated stacks, GDT and TSS for
> 64 bit PV domains mapped to the per-domain virtual area.
>
> The per-vcpu stacks are used for early
On Fri, Dec 15, 2017 at 05:07:06AM -0700, Jan Beulich wrote:
> >>> On 18.10.17 at 13:40, wrote:
> > +static void control_write(const struct pci_dev *pdev, unsigned int reg,
> > + uint32_t val, void *data)
> > +{
> > +struct vpci_msi *msi = data;
On 22/01/2018 09:39, Jan Beulich wrote:
On 19.01.18 at 18:48, wrote:
>> On 19/01/18 16:06, Jan Beulich wrote:
>>> At most one bit can be set in the masks, so especially on larger systems
>>> it's quite a bit of unnecessary memory and processing overhead to track
On 05/26/2017 10:44 PM, Julien Grall wrote:
Hi all,
Hi Julien,
General consolidated comments first:
Review Comments:
a. The document talks about high level design and does not go into the
implementation details
and detailed code flows. So this is missing if adding such detail is
At the moment, the reset vector is defined as .word 0 (e.g andeq r0, r0,
r0).
This is rather unintuitive and will result to execute the trap
undefined. Instead introduce trap helpers for reset and will generate an
error message in the unlikely case that reset will be called.
This is part of
On Fri, Jan 19, 2018 at 04:29:31PM +, Roger Pau Monné wrote:
> On Fri, Jan 19, 2018 at 03:34:56PM +, Wei Liu wrote:
> > diff --git a/xen/arch/x86/boot/build32.mk b/xen/arch/x86/boot/build32.mk
> > index 48c7407c00..028ac19b96 100644
> > --- a/xen/arch/x86/boot/build32.mk
> > +++
On 01/22/2018 09:25 AM, Jan Beulich wrote:
On 19.01.18 at 18:00, wrote:
>> On 01/19/2018 04:36 PM, Jan Beulich wrote:
>> On 19.01.18 at 16:43, wrote:
So what if instead of trying to close the "windows", we made it so that
When scheduling a vcpu subject to xpti activate the per-vcpu stacks
by loading the vcpu specific gdt and tss. When de-scheduling such a
vcpu switch back to the per physical cpu gdt and tss.
Accessing the user registers on the stack is done via helpers as
depending on XPTI active or not the
Remove NSC/Cyrix CPU macros and current_text_addr() which are used
nowhere.
Signed-off-by: Juergen Gross
---
xen/include/asm-x86/processor.h | 41 -
1 file changed, 41 deletions(-)
diff --git a/xen/include/asm-x86/processor.h
On 22/01/18 12:41, Jan Beulich wrote:
On 19.01.18 at 20:19, wrote:
>> --- a/xen/include/public/domctl.h
>> +++ b/xen/include/public/domctl.h
>> @@ -1117,7 +1117,7 @@ struct xen_domctl {
>> #define XEN_DOMCTL_pausedomain3
>> #define
>>> On 22.01.18 at 13:32, wrote:
> Remove NSC/Cyrix CPU macros and current_text_addr() which are used
> nowhere.
I agree doing the former, but I have a vague recollection that we've
left the latter in place despite there not being any callers at present.
Jan
>>> On 20.01.18 at 12:10, wrote:
> On Fri, 2018-01-19 at 08:07 -0700, Jan Beulich wrote:
>> I understand that, but there was no explanation whatsoever as
>> to why that is.
>
> Looks like we set per_cpu(curr_vcpu)=next every time we switch, even if
> we are switching to the
>>> On 19.01.18 at 17:39, wrote:
> On Fri, Jan 19, 2018 at 04:29:31PM +, Roger Pau Monné wrote:
>> On Fri, Jan 19, 2018 at 03:34:56PM +, Wei Liu wrote:
>> > diff --git a/xen/arch/x86/boot/build32.mk b/xen/arch/x86/boot/build32.mk
>> > index 48c7407c00..028ac19b96
Revert patch "x86: Meltdown band-aid against malicious 64-bit PV
guests" in order to prepare for a final Meltdown mitigation.
Signed-off-by: Juergen Gross
---
xen/arch/x86/domain.c | 5 -
xen/arch/x86/mm.c | 21
xen/arch/x86/smpboot.c
In case of XPTI being active for a pv-domain allocate and initialize
per-vcpu stacks. The stacks are added to the per-domain mappings of
the pv-domain.
Signed-off-by: Juergen Gross
---
xen/arch/x86/pv/domain.c | 72 +++
On Mon, Jan 22, 2018 at 03:31:22AM -0700, Jan Beulich wrote:
> >>> On 19.01.18 at 17:39, wrote:
> > On Fri, Jan 19, 2018 at 04:29:31PM +, Roger Pau Monné wrote:
> >> On Fri, Jan 19, 2018 at 03:34:56PM +, Wei Liu wrote:
> >> > diff --git a/xen/arch/x86/boot/build32.mk
In order to support switching stacks when entering the hypervisor for
support of page table isolation, don't use %rsp for accessing the
saved user registers, but do that via %rdi.
Signed-off-by: Juergen Gross
---
xen/arch/x86/x86_64/compat/entry.S | 82 +--
Modify the interrupt handlers to switch stacks on interrupt entry in
case they are running on a per-vcpu stack. Same applies to returning
to the guest: in case the to be loaded context is located on a
per-vcpu stack switch to this one before returning to the guest.
Signed-off-by: Juergen Gross
>>> On 22.01.18 at 13:35, wrote:
> To avoid spamming the list with all the other acked patches, here is the
> updated patch.
Feel free to re-instate my R-b, but please commit only if Andrew
withdraws his earlier voiced more general objection.
Jan
On 22/01/2018 10:04, David Woodhouse wrote:
> On Thu, 2018-01-04 at 00:15 +, Andrew Cooper wrote:
>> --- a/xen/include/asm-x86/asm_defns.h
>> +++ b/xen/include/asm-x86/asm_defns.h
>> @@ -217,22 +217,34 @@ static always_inline void stac(void)
>> addq $-(UREGS_error_code-UREGS_r15),
>>> On 19.01.18 at 20:19, wrote:
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -1117,7 +1117,7 @@ struct xen_domctl {
> #define XEN_DOMCTL_pausedomain3
> #define XEN_DOMCTL_unpausedomain 4
> #define
It used to the case that we placed RSDP under 1MB and let Xen search
for it. We moved the placement to under 4GB in 4a5733771, so the
search wouldn't work.
Stash the RSDP address to solve this problem.
Suggested-by: Roger Pau Monné
Signed-off-by: Wei Liu
On Mon, Jan 22, 2018 at 12:44:41PM +, Roger Pau Monné wrote:
> On Mon, Jan 22, 2018 at 12:35:21PM +, Wei Liu wrote:
> > To avoid spamming the list with all the other acked patches, here is the
> > updated patch.
> >
> > ---8<---
> > From 1ac0afbbc0ecd620c5fba3a03bb084bc4dafc78e Mon Sep 17
flight 118271 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118271/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
On Mon, Jan 22, 2018 at 06:09:14PM +, Andrew Cooper wrote:
> On 22/01/18 16:13, Wei Liu wrote:
> > Modify early boot code to relocate pvh info as well, so that we can be
> > sure __va in __start_xen works.
> >
> > Signed-off-by: Wei Liu
> > ---
> > Cc: Jan Beulich
On 22/01/18 18:48, George Dunlap wrote:
> On 01/22/2018 06:39 PM, Andrew Cooper wrote:
>> On 22/01/18 16:51, Jan Beulich wrote:
>> On 22.01.18 at 16:00, wrote:
On 22/01/18 15:48, Jan Beulich wrote:
On 22.01.18 at 15:38, wrote:
>> On
On 22/01/18 18:17, Wei Liu wrote:
> On Mon, Jan 22, 2018 at 06:09:14PM +, Andrew Cooper wrote:
>> On 22/01/18 16:13, Wei Liu wrote:
>>> Modify early boot code to relocate pvh info as well, so that we can be
>>> sure __va in __start_xen works.
>>>
>>> Signed-off-by: Wei Liu
On Mon, Jan 22, 2018 at 06:19:43PM +, Andrew Cooper wrote:
> On 22/01/18 18:17, Wei Liu wrote:
> > On Mon, Jan 22, 2018 at 06:09:14PM +, Andrew Cooper wrote:
> >> On 22/01/18 16:13, Wei Liu wrote:
> >>> Modify early boot code to relocate pvh info as well, so that we can be
> >>> sure __va
On 22/01/18 16:13, Wei Liu wrote:
> Modify early boot code to relocate pvh info as well, so that we can be
> sure __va in __start_xen works.
>
> Signed-off-by: Wei Liu
> ---
> Cc: Jan Beulich
> Cc: Andrew Cooper
> Cc: Roger Pau
On 22/01/18 16:51, Jan Beulich wrote:
On 22.01.18 at 16:00, wrote:
>> On 22/01/18 15:48, Jan Beulich wrote:
>> On 22.01.18 at 15:38, wrote:
On 22/01/18 15:22, Jan Beulich wrote:
On 22.01.18 at 15:18, wrote:
>> On
On 01/22/2018 06:39 PM, Andrew Cooper wrote:
> On 22/01/18 16:51, Jan Beulich wrote:
> On 22.01.18 at 16:00, wrote:
>>> On 22/01/18 15:48, Jan Beulich wrote:
>>> On 22.01.18 at 15:38, wrote:
> On 22/01/18 15:22, Jan Beulich wrote:
> On
flight 118267 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118267/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-pair broken
test-amd64-i386-libvirt-xsm
On 22/01/18 17:51, Jan Beulich wrote:
On 22.01.18 at 16:00, wrote:
>> On 22/01/18 15:48, Jan Beulich wrote:
>> On 22.01.18 at 15:38, wrote:
On 22/01/18 15:22, Jan Beulich wrote:
On 22.01.18 at 15:18, wrote:
>> On
On 22/01/18 22:45, Konrad Rzeszutek Wilk wrote:
> On Mon, Jan 22, 2018 at 01:32:44PM +0100, Juergen Gross wrote:
>> As a preparation for doing page table isolation in the Xen hypervisor
>> in order to mitigate "Meltdown" use dedicated stacks, GDT and TSS for
>> 64 bit PV domains mapped to the
flight 118275 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118275/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539
Tests which did not
On 23/01/18 07:34, Juergen Gross wrote:
> On 22/01/18 19:39, Andrew Cooper wrote:
>> On 22/01/18 16:51, Jan Beulich wrote:
>> On 22.01.18 at 16:00, wrote:
On 22/01/18 15:48, Jan Beulich wrote:
On 22.01.18 at 15:38, wrote:
>> On 22/01/18
On 22/01/18 19:39, Andrew Cooper wrote:
> On 22/01/18 16:51, Jan Beulich wrote:
> On 22.01.18 at 16:00, wrote:
>>> On 22/01/18 15:48, Jan Beulich wrote:
>>> On 22.01.18 at 15:38, wrote:
> On 22/01/18 15:22, Jan Beulich wrote:
> On 22.01.18 at
George Dunlap:
> Part of our solution to XSA-254 SP3 (aka "Meltdown") is to backport
> the PVH mode from 4.10 to 4.9 and 4.8. This will first allow people
> able to run PVH kernels to switch their PV guests directly to PVH
> guests; and second, eventually enable the backport of patches which
>
>>> On 22.01.18 at 13:52, wrote:
> On 22/01/18 12:41, Jan Beulich wrote:
> On 19.01.18 at 20:19, wrote:
>>> --- a/xen/include/public/domctl.h
>>> +++ b/xen/include/public/domctl.h
>>> @@ -1117,7 +1117,7 @@ struct xen_domctl {
>>> #define
On Mon, Jan 22, 2018 at 06:35:14AM -0700, Jan Beulich wrote:
> >>> On 22.01.18 at 14:21, wrote:
> > On Mon, Jan 22, 2018 at 01:03:14PM +, Roger Pau Monné wrote:
> >> On Mon, Jan 22, 2018 at 12:47:10PM +, Wei Liu wrote:
> >> > --- a/xen/drivers/acpi/osl.c
> >> > +++
The include percpu.h was added by mistake in cpuerrata.h (see commit
4c4fddc166 "xen/arm64: Add skeleton to harden the branch aliasing
attacks"). So remove it.
Signed-off-by: Julien Grall
---
xen/include/asm-arm/cpuerrata.h | 1 -
1 file changed, 1 deletion(-)
diff
On 01/22/2018 01:30 PM, Jan Beulich wrote:
On 22.01.18 at 13:33, wrote:
>> On 01/22/2018 09:25 AM, Jan Beulich wrote:
>> On 19.01.18 at 18:00, wrote:
On 01/19/2018 04:36 PM, Jan Beulich wrote:
On 19.01.18 at 16:43,
>>> On 22.01.18 at 15:25, wrote:
> On 22/01/18 14:10, Juergen Gross wrote:
>> On 22/01/18 13:52, Jan Beulich wrote:
>> On 22.01.18 at 13:32, wrote:
Remove NSC/Cyrix CPU macros and current_text_addr() which are used
nowhere.
>>> I agree
On 22/01/18 15:22, Jan Beulich wrote:
On 22.01.18 at 15:18, wrote:
>> On 22/01/18 13:50, Jan Beulich wrote:
>> On 22.01.18 at 13:32, wrote:
As a preparation for doing page table isolation in the Xen hypervisor
in order to mitigate "Meltdown"
Hi all,
This small patch series fix an issue I discovered when using the Foundation
model and the DT provided by Linux upstream.
Indeed the Device-Tree is exposing an ITS but LPIs are not available.
Resulting to an early crash on Xen.
Whilst this looks a DT issue, Linux is able to cope with it.
There are firmware tables out describing the ITS but does not support
LPIs. This will result to a data abort when trying to initialize ITS.
While this can be consider a bug in the Device-Tree, same configuration
boots on Linux. So gate the ITS initialization with the support of LPIs
in the
Hi all,
Running Xen inside QEMU x86 without KVM acceleartion and without VMX
emulation leads to the failure appended below.
This trivial workaround "fixes" the problem:
diff --git a/xen/arch/x86/extable.c b/xen/arch/x86/extable.c
index 72f30d9..a67d6c1 100644
--- a/xen/arch/x86/extable.c
+++
On 22/01/2018 23:48, Stefano Stabellini wrote:
> Hi all,
>
> Running Xen inside QEMU x86 without KVM acceleartion and without VMX
> emulation leads to the failure appended below.
>
> This trivial workaround "fixes" the problem:
>
> diff --git a/xen/arch/x86/extable.c b/xen/arch/x86/extable.c
>
On Tue, 23 Jan 2018, Andrew Cooper wrote:
> On 22/01/2018 23:48, Stefano Stabellini wrote:
> > Hi all,
> >
> > Running Xen inside QEMU x86 without KVM acceleartion and without VMX
> > emulation leads to the failure appended below.
> >
> > This trivial workaround "fixes" the problem:
> >
> > diff
On 22/01/2018 22:27, Boris Ostrovsky wrote:
> On 01/19/2018 08:36 AM, Andrew Cooper wrote:
>> On 19/01/18 11:43, Jan Beulich wrote:
>>
@@ -99,6 +106,10 @@ UNLIKELY_END(realmode)
.Lvmx_vmentry_fail:
sti
SAVE_ALL
+
+SPEC_CTRL_ENTRY_FROM_PV /*
When booting Xen via UEFI the Xen config file can contain multiple sections
each describing different boot options. It is currently only possible to choose
which section to boot with if the buffer contains a string. UEFI provides a
different standard to pass optional arguments to an application,
On 23/01/2018 00:38, Stefano Stabellini wrote:
> On Tue, 23 Jan 2018, Andrew Cooper wrote:
>> On 22/01/2018 23:48, Stefano Stabellini wrote:
>>> Hi all,
>>>
>>> Running Xen inside QEMU x86 without KVM acceleartion and without VMX
>>> emulation leads to the failure appended below.
>>>
>>> This
flight 118274 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118274/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
On 01/19/2018 08:36 AM, Andrew Cooper wrote:
> On 19/01/18 11:43, Jan Beulich wrote:
>
>>> @@ -99,6 +106,10 @@ UNLIKELY_END(realmode)
>>> .Lvmx_vmentry_fail:
>>> sti
>>> SAVE_ALL
>>> +
>>> +SPEC_CTRL_ENTRY_FROM_PV /* Req: %rsp=regs/cpuinfo Clob: acd */
>> I think the use
flight 118269 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118269/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-amdbroken in 118264
Jan, All,
> On 10 Jan 2018, at 16:02, Jan Beulich wrote:
>
On 10.01.18 at 16:14, wrote:
>> In the early steps of compilation, the asm header files are created, such
>> as include/asm-$(TARGET_ARCH)/asm-offsets.h. These files depend on the
>>
flight 118268 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118268/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-raw broken
On 01/22/2018 07:17 PM, Andrew Cooper wrote:
On 22/01/2018 22:27, Boris Ostrovsky wrote:
On 01/19/2018 08:36 AM, Andrew Cooper wrote:
On 19/01/18 11:43, Jan Beulich wrote:
@@ -99,6 +106,10 @@ UNLIKELY_END(realmode)
.Lvmx_vmentry_fail:
sti
SAVE_ALL
+
+
flight 118270 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/118270/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stopfail like 118253
test-armhf-armhf-libvirt 14
Roger Pau Monné writes ("Re: [Xen-devel] [PATCH v2 4/7] x86/shim: use credit
scheduler"):
> On Fri, Jan 19, 2018 at 03:34:55PM +, Wei Liu wrote:
> > Remove sched=null from shim cmdline and doc
> >
> > We use the default scheduler (credit1 as of writing). The NULL
> > scheduler still has bugs
On Mon, Jan 22, 2018 at 03:02:52PM +, Wei Liu wrote:
> diff --git a/xen/arch/x86/guest/pvh-boot.c b/xen/arch/x86/guest/pvh-boot.c
> index be3122b16c..2903b392bc 100644
> --- a/xen/arch/x86/guest/pvh-boot.c
> +++ b/xen/arch/x86/guest/pvh-boot.c
> @@ -69,6 +69,8 @@ static void __init
On Mon, Jan 22, 2018 at 04:28:30PM +, Wei Liu wrote:
> It used to the case that we placed RSDP under 1MB and let Xen search
> for it. We moved the placement to under 4GB in 4a5733771, so the
> search wouldn't work.
>
> Introduce rsdp_hint to ACPI code and set that variable in
>
>>> On 22.01.18 at 16:51, wrote:
> On 19/01/18 15:02, Jan Beulich wrote:
> On 19.01.18 at 15:24, wrote:
>>> On 19/01/18 12:47, Jan Beulich wrote:
>>> On 18.01.18 at 16:46, wrote:
> + * %rsp is preserved
>>> On 22.01.18 at 16:00, wrote:
> On 22/01/18 15:48, Jan Beulich wrote:
> On 22.01.18 at 15:38, wrote:
>>> On 22/01/18 15:22, Jan Beulich wrote:
>>> On 22.01.18 at 15:18, wrote:
> On 22/01/18 13:50, Jan Beulich wrote:
> On
>>> On 22.01.18 at 17:33, wrote:
> On Mon, Jan 22, 2018 at 04:28:30PM +, Wei Liu wrote:
>> It used to the case that we placed RSDP under 1MB and let Xen search
>> for it. We moved the placement to under 4GB in 4a5733771, so the
>> search wouldn't work.
>>
>> Introduce
>>> On 22.01.18 at 17:13, wrote:
> Modify early boot code to relocate pvh info as well, so that we can be
> sure __va in __start_xen works.
>
> Signed-off-by: Wei Liu
As before
Reviewed-by: Jan Beulich
with the caveat that this
On 22/01/18 16:49, Jan Beulich wrote:
On 22.01.18 at 16:51, wrote:
>> On 19/01/18 15:02, Jan Beulich wrote:
>> On 19.01.18 at 15:24, wrote:
On 19/01/18 12:47, Jan Beulich wrote:
On 18.01.18 at 16:46,
On 01/22/2018 05:04 PM, Jan Beulich wrote:
On 22.01.18 at 16:15, wrote:
>> On 01/22/2018 01:30 PM, Jan Beulich wrote:
>> On 22.01.18 at 13:33, wrote:
What I'm proposing is something like this:
* We have a "global" region
>>> On 22.01.18 at 16:34, wrote:
> On Mon, Jan 22, 2018 at 03:02:52PM +, Wei Liu wrote:
>> --- a/xen/drivers/acpi/osl.c
>> +++ b/xen/drivers/acpi/osl.c
>> @@ -62,8 +62,13 @@ void __init acpi_os_vprintf(const char *fmt, va_list args)
>> printk("%s", buffer);
>> }
>>
Modify early boot code to relocate pvh info as well, so that we can be
sure __va in __start_xen works.
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Roger Pau Monné
Cc: Doug Goldstein
It used to the case that we placed RSDP under 1MB and let Xen search
for it. We moved the placement to under 4GB in 4a5733771, so the
search wouldn't work.
Introduce rsdp_hint to ACPI code and set that variable in
convert_pvh_info.
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
osstest service owner writes ("[xen-unstable test] 118266: regressions -
trouble: broken/fail/pass"):
> flight 118266 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/118266/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which
On 01/19/2018 05:33 PM, Julien Grall wrote:
On 19/01/18 06:05, Manish Jaggi wrote:
On 01/17/2018 12:01 AM, Julien Grall wrote:
Hi Manish,
Hi Julien,
Thanks for reviewing the patch.
I sent the previous e-mail too soon.
On 02/01/18 09:27, manish.ja...@linaro.org wrote:
From: Manish
Aliasing attacked against CPU branch predictors can allow an attacker to
redirect speculative control flow on some CPUs and potentially divulge
information from one context to another.
This patch adds initiatial skeleton code behind a new Kconfig option
to enable implementation-specific
On 19/01/18 15:02, Jan Beulich wrote:
On 19.01.18 at 15:24, wrote:
>> On 19/01/18 12:47, Jan Beulich wrote:
>> On 18.01.18 at 16:46, wrote:
@@ -265,6 +265,10 @@ On hardware supporting IBRS, the `ibrs=` option can
be
On Mon, Jan 22, 2018 at 12:47:10PM +, Wei Liu wrote:
> It used to the case that we placed RSDP under 1MB and let Xen search
> for it. We moved the placement to under 4GB in 4a5733771, so the
> search wouldn't work.
>
> Stash the RSDP address to solve this problem.
>
> Suggested-by: Roger Pau
>>> On 22.01.18 at 14:29, wrote:
> On 22/01/18 13:01, Jan Beulich wrote:
> On 22.01.18 at 13:52, wrote:
>>> On 22/01/18 12:41, Jan Beulich wrote:
>>> On 19.01.18 at 20:19, wrote:
> ---
It used to the case that we placed RSDP under 1MB and let Xen search
for it. We moved the placement to under 4GB in 4a5733771, so the
search wouldn't work.
Introduce rsdp_hint to ACPI code and set that variable in
convert_pvh_info.
Signed-off-by: Wei Liu
---
Cc: Jan Beulich
On Mon, Jan 22, 2018 at 01:03:14PM +, Roger Pau Monné wrote:
> On Mon, Jan 22, 2018 at 12:47:10PM +, Wei Liu wrote:
> > It used to the case that we placed RSDP under 1MB and let Xen search
> > for it. We moved the placement to under 4GB in 4a5733771, so the
> > search wouldn't work.
> >
>
1 - 100 of 112 matches
Mail list logo