On Fri, May 25, 2018 at 11:41:04AM +0200, Roger Pau Monné wrote:
> On Thu, May 24, 2018 at 05:05:19PM +0100, Wei Liu wrote:
> > They are moved to a new header which is going to be consumed by both
> > the hypervisor and toolstack.
> >
> > Create a new directory for this kind of headers in
>>> On 25.05.18 at 12:52, wrote:
> --- a/xen/arch/x86/smpboot.c
> +++ b/xen/arch/x86/smpboot.c
> @@ -794,7 +794,7 @@ static int setup_cpu_root_pgt(unsigned int cpu)
> /* SH_LINEAR_PT inserted together with guest mappings. */
> /* PERDOMAIN inserted during
On Fri, May 25, 2018 at 11:31:17AM +0200, Roger Pau Monné wrote:
> On Thu, May 24, 2018 at 05:05:18PM +0100, Wei Liu wrote:
> > This is a step towards consolidating relevant data structures and
> > defines to one location.
> >
> > It then requires defining cpuid_leaf in user space harness headers
Andrew Cooper writes ("Re: [PATCH] libxc/x86/PV: don't hand through CPUID leaf
0x8008 as is"):
> On 22/05/18 12:41, Wei Liu wrote:
> > On Tue, May 22, 2018 at 05:40:02AM -0600, Jan Beulich wrote:
> >> Just like for HVM the feature set should be used for EBX output, while
> >> EAX should be
On 25/05/18 12:36, Jan Beulich wrote:
On 25.05.18 at 10:36, wrote:
>> On 25/05/2018 08:49, Jan Beulich wrote:
>> On 22.05.18 at 13:20, wrote:
@@ -1650,22 +1641,81 @@ static void vmx_update_guest_cr(struct vcpu *v,
>> unsigned
On Thu 2018-05-24 09:37:20, Thomas Garnier wrote:
> On Thu, May 24, 2018 at 4:04 AM Pavel Machek wrote:
>
> > On Wed 2018-05-23 12:54:05, Thomas Garnier wrote:
> > > Change the assembly code to use only relative references of symbols for
> the
> > > kernel to be PIE compatible.
> >
On Fri, May 25, 2018 at 11:01:18AM +0100, Andrew Cooper wrote:
> On 25/05/18 10:49, Wei Liu wrote:
> > On Fri, May 25, 2018 at 11:41:04AM +0200, Roger Pau Monné wrote:
> >> On Thu, May 24, 2018 at 05:05:19PM +0100, Wei Liu wrote:
> >>> They are moved to a new header which is going to be consumed
>>> On 25.05.18 at 13:31, wrote:
> On 25/05/18 12:17, Jan Beulich wrote:
> On 25.05.18 at 12:52, wrote:
>>> --- a/xen/arch/x86/smpboot.c
>>> +++ b/xen/arch/x86/smpboot.c
>>> @@ -794,7 +794,7 @@ static int setup_cpu_root_pgt(unsigned int
On Thu, May 24, 2018 at 05:29:43PM +0200, Michal Hocko wrote:
> > ie if we had more,
> > could we solve our pain by making them more generic?
>
> Well, if you have more you will consume more bits in the struct pages,
> right?
Not necessarily ... the zone number is stored in the struct page
This patch mirrors the VMX code that doesn't allow
vmx_disable_intercept_for_msr() to clear interception of MSRs that
an introspection agent is trying to monitor.
Signed-off-by: Razvan Cojocaru
---
xen/arch/x86/hvm/svm/svm.c | 5 +++--
1 file changed, 3 insertions(+),
From: Michal Hocko [mailto:mho...@kernel.org]
Sent: Thursday, May 24, 2018 8:19 PM>
> > Let me try to reply your questions.
> > Exactly, GFP_ZONE_TABLE is too complicated. I think there are two advantages
> > from the series of patches.
> >
> > 1. XOR operation is simple and efficient,
On 25/05/18 10:49, Wei Liu wrote:
> On Fri, May 25, 2018 at 11:41:04AM +0200, Roger Pau Monné wrote:
>> On Thu, May 24, 2018 at 05:05:19PM +0100, Wei Liu wrote:
>>> They are moved to a new header which is going to be consumed by both
>>> the hypervisor and toolstack.
>>>
>>> Create a new directory
On 22/05/18 12:41, Wei Liu wrote:
> On Tue, May 22, 2018 at 05:40:02AM -0600, Jan Beulich wrote:
>> Just like for HVM the feature set should be used for EBX output, while
>> EAX should be restricted to the low 16 bits and ECX/EDX should be zero.
>>
>> Signed-off-by: Jan Beulich
Even with opt_msr_sc_{pv,hvm} both false we should set up the variable
as usual, to ensure proper one-time setup during boot and CPU bringup.
This then also brings the code in line with the comment immediately
ahead of the printk() being modified saying "irrespective of guests".
Signed-off-by:
On 25/05/2018 08:49, Jan Beulich wrote:
On 22.05.18 at 13:20, wrote:
>> @@ -1650,22 +1641,81 @@ static void vmx_update_guest_cr(struct vcpu *v,
>> unsigned int cr,
>>
>> static void vmx_update_guest_efer(struct vcpu *v)
>> {
>> -unsigned long
On Thu, May 24, 2018 at 05:05:18PM +0100, Wei Liu wrote:
> This is a step towards consolidating relevant data structures and
> defines to one location.
>
> It then requires defining cpuid_leaf in user space harness headers to
> make them continue to compile.
>
> No functional change.
>
>
On Thu, May 24, 2018 at 05:05:19PM +0100, Wei Liu wrote:
> They are moved to a new header which is going to be consumed by both
> the hypervisor and toolstack.
>
> Create a new directory for this kind of headers in anticipation of
flight 123122 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123122/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 16 guest-localmigrate/x10
fail in 122960 pass in 123122
On 25/05/18 07:02, Jan Beulich wrote:
> We should index an L1 table with an L1 index.
>
> Reported-by: Simon Gaiser
> Signed-off-by: Jan Beulich
Indeed we should.
Reviewed-by: Andrew Cooper , and I've got a
followup
On Fri, May 25, 2018 at 05:50:12AM -0600, Jan Beulich wrote:
> >>> On 24.05.18 at 18:05, wrote:
> > This is a step towards consolidating relevant data structures and
> > defines to one location.
>
> Sort of contrary to what the patch does - it converts one instance of the
>
On 25/05/18 12:08, Jan Beulich wrote:
> Even with opt_msr_sc_{pv,hvm} both false we should set up the variable
> as usual, to ensure proper one-time setup during boot and CPU bringup.
> This then also brings the code in line with the comment immediately
> ahead of the printk() being modified
The comments became stale when c/s d1d6fc97d66 "x86/xpti: really hide almost
all of Xen image" altered how the stubs were mapped.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Juergen Gross
---
xen/arch/x86/smpboot.c | 4
On 25/05/18 12:17, Jan Beulich wrote:
On 25.05.18 at 12:52, wrote:
>> --- a/xen/arch/x86/smpboot.c
>> +++ b/xen/arch/x86/smpboot.c
>> @@ -794,7 +794,7 @@ static int setup_cpu_root_pgt(unsigned int cpu)
>> /* SH_LINEAR_PT inserted together with guest mappings.
On Thu 2018-05-24 09:35:42, Thomas Garnier wrote:
> On Thu, May 24, 2018 at 4:03 AM Pavel Machek wrote:
>
> > On Wed 2018-05-23 12:54:03, Thomas Garnier wrote:
> > > Change the assembly code to use only relative references of symbols for
> the
> > > kernel to be PIE compatible.
> >
On Tue, Mar 27, Roger Pau Monne wrote:
> Allow the path to be set from a configure command line option.
Please backport 641f9ce2fa to 4.10 ASAP. See
https://lists.xenproject.org/archives/html/xen-devel/2018-02/msg02749.html
Thanks.
Olaf
signature.asc
Description: PGP signature
Linux 4.9 is getting a bit long in the tooth. 4.14 is an LTS branch
and the osstest-tested version seems reasonably good. I ran a special
report[1] to see what to expect and it reported no regressions.
Accordingly I am going to switch to using Linux 4.14 by default for
most X86 runs in osstest.
Hi Ian,
Would it be possible to update your CC with my Arm e-mail from now on?
On 25/05/18 15:44, Ian Jackson wrote:
Linux 4.9 is getting a bit long in the tooth. 4.14 is an LTS branch
and the osstest-tested version seems reasonably good. I ran a special
report[1] to see what to expect and
In 32-bit kernel builds, we cannot cast between a pointer and a 64-bit
type:
In file included from drivers/gpu/drm/xen/xen_drm_front_cfg.c:18:
drivers/gpu/drm/xen/xen_drm_front.h: In function 'xen_drm_front_fb_to_cookie':
drivers/gpu/drm/xen/xen_drm_front.h:129:9: error: cast from pointer to
This run is configured for baseline tests only.
flight 74742 xen-4.10-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74742/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win10-i386 10
On Fri, May 25, 2018 at 03:44:53PM +0100, Ian Jackson wrote:
> Linux 4.9 is getting a bit long in the tooth. 4.14 is an LTS branch
> and the osstest-tested version seems reasonably good. I ran a special
> report[1] to see what to expect and it reported no regressions.
>
> Accordingly I am going
Olaf Hering writes ("Re: [Xen-devel] [PATCH for-4.11] tools: set DEBUG_DIR from
configure"):
> On Tue, Mar 27, Roger Pau Monne wrote:
>
> > Allow the path to be set from a configure command line option.
>
> Please backport 641f9ce2fa to 4.10 ASAP. See
>
From: Oleksandr Andrushchenko
This work is in response to my previous attempt to introduce Xen/DRM
zero-copy driver [1] to enable Linux dma-buf API [2] for Xen based
frontends/backends. There is also an existing hyper_dmabuf approach
available [3] which, if
From: Oleksandr Andrushchenko
Memory {increase|decrease}_reservation and VA mappings update/reset
code used in balloon driver can be made common, so other drivers can
also re-use the same functionality without open-coding.
Create a dedicated module for the
From: Oleksandr Andrushchenko
Allow creating grant device context for use by kernel modules which
require functionality, provided by gntdev. Export symbols for dma-buf
API provided by the module.
Signed-off-by: Oleksandr Andrushchenko
From: Oleksandr Andrushchenko
1. Create a dma-buf from grant references provided by the foreign
domain. By default dma-buf is backed by system memory pages, but
by providing GNTDEV_DMA_FLAG_XXX flags it can also be created
as a DMA
From: Oleksandr Andrushchenko
Make set/clear page private code shared and accessible to
other kernel modules which can re-use these instead of open-coding.
Signed-off-by: Oleksandr Andrushchenko
---
drivers/xen/grant-table.c
On 25/05/18 08:17, Jan Beulich wrote:
On 24.05.18 at 18:44, wrote:
>> On 22/05/18 11:33, Jan Beulich wrote:
>>> Other than in the feature sets, where we indeed want to offer the
>>> feature even if not enumerated on hardware, we shouldn't dictate the
>>> feature
Am Tue, 22 May 2018 12:14:29 +0100
schrieb Wei Liu :
> I think your predicate is correct. Sorry for the noise.
Is there anything else to be done to get this fixed?
Olaf
pgpyQZGDs0CyK.pgp
Description: Digitale Signatur von OpenPGP
From: Oleksandr Andrushchenko
Add UAPI and IOCTLs for dma-buf grant device driver extension:
the extension allows userspace processes and kernel modules to
use Xen backed dma-buf implementation. With this extension grant
references to the pages of an imported
From: Oleksandr Andrushchenko
Allow mappings for DMA backed buffers if grant table module
supports such: this extends grant device to not only map buffers
made of balloon pages, but also from buffers allocated with
dma_alloc_xxx.
Signed-off-by: Oleksandr
From: Oleksandr Andrushchenko
1. Import a dma-buf with the file descriptor provided and export
granted references to the pages of that dma-buf into the array
of grant references.
2. Add API to close all references to an imported buffer, so it can be
>>> On 25.05.18 at 15:52, wrote:
> On 25/05/18 08:17, Jan Beulich wrote:
> On 24.05.18 at 18:44, wrote:
>>> On 22/05/18 11:33, Jan Beulich wrote:
Other than in the feature sets, where we indeed want to offer the
feature even if
On Thu, 24 May 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 23/05/18 23:34, Stefano Stabellini wrote:
> > On Tue, 22 May 2018, Julien Grall wrote:
> > > On a system where the firmware implements ARCH_WORKAROUND_2, it may be
> > > useful to either permanently enable or disable the workaround for
On Tue, 22 May 2018, Julien Grall wrote:
> This is based on the Linux commit dea5e2a4c5bc "arm64: alternatives: Add
> dynamic patching feature" written by Marc Zyngier:
>
> We've so far relied on a patching infrastructure that only gave us
> a single alternative, without any way to
On Thu, 24 May 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 24/05/18 01:40, Stefano Stabellini wrote:
> > On Wed, 23 May 2018, Stefano Stabellini wrote:
> > > On Tue, 22 May 2018, Julien Grall wrote:
> > > > In order to offer ARCH_WORKAROUND_2 support to guests, we need to track
> > > > the
> >
On Wed, 23 May 2018, Julien Grall wrote:
> Hi,
>
> On 05/23/2018 10:57 PM, Stefano Stabellini wrote:
> > On Tue, 22 May 2018, Julien Grall wrote:
> > > As for Spectre variant-2, we rely on SMCCC 1.1 to provide the discovery
> > > mechanism for detecting the SSBD mitigation.
> > >
> > > A new
On Tue, 22 May 2018, Julien Grall wrote:
> A stack is allocated per vCPU to be used by Xen. The allocation is done
> with alloc_xenheap_pages that does not zero the memory returned. However
> the top of the stack is containing information that will be used to
> store the initial state of the vCPU
On 25/05/18 14:05, Jan Beulich wrote:
On 25.05.18 at 14:03, wrote:
>> On Fri, May 25, 2018 at 05:50:12AM -0600, Jan Beulich wrote:
>> On 24.05.18 at 18:05, wrote:
This is a step towards consolidating relevant data structures and
>>> On 25.05.18 at 14:03, wrote:
> On Fri, May 25, 2018 at 05:50:12AM -0600, Jan Beulich wrote:
>> >>> On 24.05.18 at 18:05, wrote:
>> > This is a step towards consolidating relevant data structures and
>> > defines to one location.
>>
>> Sort of
Julien Grall writes ("Re: [Xen-devel] [OSSTEST PATCH] ap-common: Switch to
Linux 4.14 by default on X86."):
> Would it be possible to update your CC with my Arm e-mail from now on?
Sorry, I copied it from an old commit.
> FWIW, linux-arm-xen branch is using 4.14.9. I had to upgrade it in order
On 05/25/2018 06:19 PM, Boris Ostrovsky wrote:
> On 05/25/2018 08:38 AM, Razvan Cojocaru wrote:
>> This patch mirrors the VMX code that doesn't allow
>> vmx_disable_intercept_for_msr()
>
> vmx_clear_msr_intercept() ?
>
>> to clear interception of MSRs that
>> an introspection agent is trying to
On 24/05/18 11:23, Jan Beulich wrote:
On 24.05.18 at 12:13, wrote:
>> On 24/05/18 09:13, Jan Beulich wrote:
>> On 24.05.18 at 00:09, wrote:
It is, as documented, not completely strictly true (according to the
latest
>>> On 25.05.18 at 17:25, wrote:
> On 24/05/18 11:23, Jan Beulich wrote:
> On 24.05.18 at 12:13, wrote:
>>> On 24/05/18 09:13, Jan Beulich wrote:
>>> On 24.05.18 at 00:09, wrote:
> It is, as documented,
On Fri, May 25, 2018 at 2:14 AM Pavel Machek wrote:
> On Thu 2018-05-24 09:35:42, Thomas Garnier wrote:
> > On Thu, May 24, 2018 at 4:03 AM Pavel Machek wrote:
> >
> > > On Wed 2018-05-23 12:54:03, Thomas Garnier wrote:
> > > > Change the assembly code to use only
Schedule for our Annual Developer and Design Summit
We are excited to announce the program and speakers for the Xen Project
Developer and Design Summit (https://www.lfasiallc.com/events/xensummit2018/).
The summit brings together developers, engineers, and Xen Project power users
for in-person
flight 74743 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74743/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-armhf-jessie-netboot-pygrub 10 debian-di-install fail like
74725
baseline version:
flight 123129 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123129/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvshim broken
flight 123135 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123135/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 16
guest-localmigrate/x10 fail REGR. vs.
On Fri, May 25, 2018 at 03:44:53PM +0100, Ian Jackson wrote:
> Linux 4.9 is getting a bit long in the tooth. 4.14 is an LTS branch
> and the osstest-tested version seems reasonably good. I ran a special
> report[1] to see what to expect and it reported no regressions.
>
> Accordingly I am going
On Tue, 22 May 2018, Julien Grall wrote:
> The function ARM_SMCCC_ARCH_WORKAROUND_2 will be called by the guest for
> enabling/disabling the ssbd mitigation. So we want the handling to
> be as fast as possible.
>
> The new sequence will forward guest's ARCH_WORKAROUND_2 call to EL3 and
> also
flight 123144 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123144/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt 6 xen-install fail in 122971 pass in 123144
On Fri, 25 May 2018, Julien Grall wrote:
> On Fri, 25 May 2018, 22:54 Stefano Stabellini, wrote:
> You might want to CC Konrad next time on this patch
>
>
> May I ask why? This code falls under Arm maintainership.
I know, but I appreciate his input if he has time
On 25/05/2018 21:51, Stefano Stabellini wrote:
> On Wed, 23 May 2018, Julien Grall wrote:
>> Hi,
>>
>> On 05/23/2018 10:57 PM, Stefano Stabellini wrote:
>>> On Tue, 22 May 2018, Julien Grall wrote:
As for Spectre variant-2, we rely on SMCCC 1.1 to provide the discovery
mechanism for
flight 123147 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123147/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt 6 xen-install fail in 123073 pass in 123147
test-armhf-armhf-xl 7
This run is configured for baseline tests only.
flight 74744 xen-4.8-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74744/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-prev 6 xen-build
Hi Stefano,
Thank you very much for your fixes. It seems that you've addressed all
the issues during the last round of reviews.
I'm sorry for my off-and-on contribution time, which has largely
delayed the process of merging the patch set.
Please tell me if you need anything from me.
Cheers,
flight 123187 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123187/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7dc7c7435e9030ad07ad7bc7d136a3997bd0b182
baseline version:
ovmf
You might want to CC Konrad next time on this patch
On Tue, 22 May 2018, Julien Grall wrote:
> This is part of XSA-263.
>
> Signed-off-by: Julien Grall
>
> ---
> I am aware of the missing commit message here. I wanted to send the
> series on the ML to get some
At 12:20 +0100 on 22 May (1526991646), Andrew Cooper wrote:
> Intel hardware only uses 4 bits in MSR_EFER. Changes to LME and LMA are
> handled automatically via the VMENTRY_CTLS.IA32E_MODE bit.
>
> SCE is handled by ad-hoc logic in context_switch(), vmx_restore_guest_msrs()
> and
At 06:02 +0200 on 23 May (1527055365), Juergen Gross wrote:
> On 22/05/18 21:47, Marek Marczykowski-Górecki wrote:
> > Older gcc does not support #pragma GCC diagnostics, so use alternative
> > approach - change variable type to uint32_t (this code handle 32-bit
> > requests only anyway), which
>>> On 24.05.18 at 22:23, wrote:
>
> On 05/24/2018 01:53 AM, Jan Beulich wrote:
> On 24.05.18 at 02:46, wrote:
>>> Port WARN_ON_ONCE macro from Linux.
>> In such a case you should justify adjustments you've made:
> I can add more details, but
>>> On 24.05.18 at 18:44, wrote:
> On 22/05/18 11:33, Jan Beulich wrote:
>> Other than in the feature sets, where we indeed want to offer the
>> feature even if not enumerated on hardware, we shouldn't dictate the
>> feature being available if tool stack or host admin
We should index an L1 table with an L1 index.
Reported-by: Simon Gaiser
Signed-off-by: Jan Beulich
---
v2: Entirely different.
--- a/xen/arch/x86/smpboot.c
+++ b/xen/arch/x86/smpboot.c
@@ -883,7 +883,7 @@ static void cleanup_cpu_root_pgt(unsigne
>>> On 24.05.18 at 18:48, wrote:
> On 24/05/18 17:01, Roger Pau Monné wrote:
>> On Tue, May 22, 2018 at 12:20:46PM +0100, Andrew Cooper wrote:
>>> --- a/xen/include/asm-x86/hvm/vmx/vmcs.h
>>> +++ b/xen/include/asm-x86/hvm/vmx/vmcs.h
>>> @@ -306,6 +306,8 @@ extern u64
flight 123120 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123120/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 123010
test-armhf-armhf-libvirt 14
>>> On 24.05.18 at 22:26, wrote:
> On 05/24/2018 01:57 AM, Jan Beulich wrote:
> On 24.05.18 at 02:46, wrote:
>>> --- /dev/null
>>> +++ b/xen/include/xen/linux_compat.h
>> I continue to dislike the idea of having a header with these contents in
flight 123091 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/123091/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-xtf-amd64-amd64-3 50 xtf/test-hvm64-lbr-tsx-vmentry fail in 122991 pass
in 123091
On 25/05/2018 08:27, Jan Beulich wrote:
On 24.05.18 at 18:48, wrote:
>> On 24/05/18 17:01, Roger Pau Monné wrote:
>>> On Tue, May 22, 2018 at 12:20:46PM +0100, Andrew Cooper wrote:
--- a/xen/include/asm-x86/hvm/vmx/vmcs.h
+++
>>> On 22.05.18 at 13:20, wrote:
> @@ -1650,22 +1641,81 @@ static void vmx_update_guest_cr(struct vcpu *v,
> unsigned int cr,
>
> static void vmx_update_guest_efer(struct vcpu *v)
> {
> -unsigned long vm_entry_value;
> +unsigned long entry_ctls, guest_efer
>>> On 25.05.18 at 02:52, wrote:
> I'm trying to apply xsa263 patches, specifically for 4.10. However they
> dont seem to on top of 4.10.1 release.
>
> I see they do apply cleanly to current 4.10 staging branch. Are staging
> trees for stable branches like 4.10
80 matches
Mail list logo