On Mon, 23 Jul 2018, Andrii Anisov wrote:
> Hello Stefano,
>
> On 07.07.18 02:11, Stefano Stabellini wrote:
> > The device tree based boot protocol is extended to carry information
> > about DomUs. Based on that information, Xen creates and starts one or
> > more DomUs.
> Please consider also
On 07/23/2018 06:02 PM, Boris Ostrovsky wrote:
> On 07/23/2018 10:42 AM, Andrew Cooper wrote:
>> Because of a bug in 2010, LMSL support didn't functioned in Xen.
>>
>> c/s f2c608444 noticed but avoided fixing the issue for migration reasons. In
>> addition to migration problems, changes to the
On 07/23/2018 10:42 AM, Andrew Cooper wrote:
> Because of a bug in 2010, LMSL support didn't functioned in Xen.
>
> c/s f2c608444 noticed but avoided fixing the issue for migration reasons. In
> addition to migration problems, changes to the segmentation logic for
> emulation would be needed
flight 125506 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125506/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
test-armhf-armhf-xl-vhd
On 07/23/2018 02:34 PM, Mark Railton wrote:
> Fixed issue with multi line comment
Fix [not Fixed]
>
> Signed-off-by: Mark Railton
> ---
> drivers/xen/xlate_mmu.c | 5 +++--
> 1 file changed, 3 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/xen/xlate_mmu.c b/drivers/xen/xlate_mmu.c
>
On 07/23/2018 02:48 PM, Mark Railton wrote:
> On Mon, Jul 23, 2018 at 02:44:28PM -0700, Randy Dunlap wrote:
>> On 07/23/2018 02:40 PM, Mark Railton wrote:
>>> On Mon, Jul 23, 2018 at 02:38:20PM -0700, Randy Dunlap wrote:
On 07/23/2018 02:34 PM, Mark Railton wrote:
> Fixed issue with multi
On 07/23/2018 02:40 PM, Mark Railton wrote:
> On Mon, Jul 23, 2018 at 02:38:20PM -0700, Randy Dunlap wrote:
>> On 07/23/2018 02:34 PM, Mark Railton wrote:
>>> Fixed issue with multi line comment
>>
>> Fix [not Fixed]
>>
>>>
>>> Signed-off-by: Mark Railton
>>> ---
>>> drivers/xen/xlate_mmu.c | 5
This run is configured for baseline tests only.
flight 74998 ovmf real [real]
http://osstest.xensource.com/osstest/logs/74998/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail like 74996
flight 125523 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125523/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 549ae85ce1b00228c3abcf6a9e4022c4f4fba5ed
baseline version:
ovmf
On Mon, Jul 23, 2018 at 2:26 AM, Andrew Cooper
wrote:
> On 23/07/18 10:09, Roger Pau Monné wrote:
> > On Fri, Jul 20, 2018 at 02:15:05PM -0700, Christopher Clark wrote:
> >> Exclude named output files from the Xen tree setup.
> >>
> >> The linkfarm.stamp content will differ between top level
flight 125519 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125519/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 6 kernel-build fail in 125513 REGR. vs. 125510
Tests which are failing
flight 125521 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125521/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
The altp2m functionality was originally envisioned to be used in
several different configurations, one of which was a single in-guest
agent that had full operational control of altp2m. This required the
single hypercall to be an HVMOP rather than a DOMCTL, since HVM guests
are not allowed to make
On 07/23/2018 09:26 AM, Oleksandr Andrushchenko wrote:
> On 07/23/2018 11:38 AM, Oleksandr Andrushchenko wrote:
>>
>>> data/upstream/linux-xen/drivers/xen/gntdev-dmabuf.c: In function
>>> ‘gntdev_ioctl_dmabuf_exp_from_refs’:
>>> /data/upstream/linux-xen/drivers/xen/gntdev-dmabuf.c:503:6: warning:
Ping?
Cheers,
On 16/07/18 18:26, Julien Grall wrote:
Hi all,
This is patch series is a bunch of clean-up/improvement I collected while
working on the P2M and trap subsystems.
Cheers,
Julien Grall (15):
xen/arm: cpregs: Allow HSR_CPREG* to receive more than 1 parameter
xen/arm: cpregs:
On Mon, 23 Jul 2018, Julien Grall wrote:
> On 18/07/18 18:48, Stefano Stabellini wrote:
> > On Wed, 18 Jul 2018, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 13/07/18 21:54, Stefano Stabellini wrote:
> > > > On Thu, 12 Jul 2018, Julien Grall wrote:
> > > > > Hi,
> > > > >
> > > > > Would
Julien,
Got it, thanks.
*BR,*
*Ihor Matushchak*
2018-07-23 17:59 GMT+03:00 Julien Grall :
>
>
> On 23/07/18 15:47, Ihor Matushchak wrote:
>
>> Hi Julien,
>>
>
> Hi Ihor,
>
>
>> Sure, I would be glad to do that.
>>
>> I suppose it should be placed somewhere on wiki.xenproject.org <
>>
Using unstable gets us the latest toolchain available in Debian.
See: https://gitlab.com/liuw/xen/pipelines/26330873
Wei Liu (2):
automation: add debian unstable images
automation: build with debian unstable
.gitlab-ci.yml | 64
On 7/23/18 4:26 AM, Greg KH wrote:
> On Sat, Jul 14, 2018 at 02:25:43AM -0700, Srivatsa S. Bhat wrote:
>> Hi Greg,
>>
>> This patch series is a backport of the Spectre-v2 fixes (IBPB/IBRS)
>> and patches for the Speculative Store Bypass vulnerability to 4.4.y
>> (they apply cleanly on top of
The regexp used with find in order to list the man pages doesn't work
with FreeBSD find, so use a wildcard instead. No functional change.
Signed-off-by: Roger Pau Monné
---
Cc: Ian Jackson
Cc: Wei Liu
---
docs/Makefile | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git
This will get us the latest toolchain available in Debian.
Signed-off-by: Wei Liu
---
automation/build/debian/unstable-i386.dockerfile | 50
automation/build/debian/unstable.dockerfile | 48 +++
2 files changed, 98 insertions(+)
create mode
Signed-off-by: Wei Liu
---
.gitlab-ci.yml | 64 ++
1 file changed, 64 insertions(+)
diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
index 682e48ef51..8aae194136 100644
--- a/.gitlab-ci.yml
+++ b/.gitlab-ci.yml
@@ -103,6 +103,70 @@
Hi all,
Wei and Doug have recently been improving [xen.git] / automation / build,
implementing some of the functionality outlined in [1] (see "CI / CD" heading).
We are intending to take every patch series that is sent to xen-devel and
create a branch at https://gitlab.com/xen-project/xen.git
Hello Stefano,
On 07.07.18 02:11, Stefano Stabellini wrote:
The device tree based boot protocol is extended to carry information
about DomUs. Based on that information, Xen creates and starts one or
more DomUs.
Please consider also status monitoring and restarting for those domains.
DomUs
On 18/07/18 18:48, Stefano Stabellini wrote:
On Wed, 18 Jul 2018, Julien Grall wrote:
Hi Stefano,
On 13/07/18 21:54, Stefano Stabellini wrote:
On Thu, 12 Jul 2018, Julien Grall wrote:
Hi,
Would it be possible to provide a branch with the patch applied? It would
be
nice to have that for
flight 125505 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125505/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 4 memdisk-try-append fail REGR. vs. 125138
On 07/23/2018 06:22 PM, Boris Ostrovsky wrote:
On 07/23/2018 09:26 AM, Oleksandr Andrushchenko wrote:
On 07/23/2018 11:38 AM, Oleksandr Andrushchenko wrote:
data/upstream/linux-xen/drivers/xen/gntdev-dmabuf.c: In function
‘gntdev_ioctl_dmabuf_exp_from_refs’:
On 07/23/2018 08:09 PM, George Dunlap wrote:
> The altp2m functionality was originally envisioned to be used in
> several different configurations, one of which was a single in-guest
> agent that had full operational control of altp2m. This required the
> single hypercall to be an HVMOP rather
Hello Stefano,
On 07.07.18 02:11, Stefano Stabellini wrote:
Extend allocate_memory to work for non 1:1 mapped domUs. Specifically,
memory allocated for domU will be mapped into the domU pseudo-physical
address space at the appropriate addresses according to the guest memory
map:
On Mon, 23 Jul 2018, Andrii Anisov wrote:
> Hello Stefano,
>
>
> On 07.07.18 02:11, Stefano Stabellini wrote:
> > Extend allocate_memory to work for non 1:1 mapped domUs. Specifically,
> > memory allocated for domU will be mapped into the domU pseudo-physical
> > address space at the appropriate
Hi,
At 04:48 -0600 on 19 Jul (1531975717), Jan Beulich wrote:
> Emulation requiring device model assistance uses a form of instruction
> re-execution, assuming that the second (and any further) pass takes
> exactly the same path. This is a valid assumption as far use of CPU
> registers goes (as
flight 125503 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125503/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-credit2 broken in 125485
test-arm64-arm64-libvirt-xsm
flight 125507 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125507/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-raw broken
test-arm64-arm64-xl-credit2
flight 125509 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125509/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 broken
test-armhf-armhf-xl-credit2 4
On Mon, Jul 23, 2018 at 02:55:12PM -0700, Randy Dunlap wrote:
> On 07/23/2018 02:48 PM, Mark Railton wrote:
> > On Mon, Jul 23, 2018 at 02:44:28PM -0700, Randy Dunlap wrote:
> >> On 07/23/2018 02:40 PM, Mark Railton wrote:
> >>> On Mon, Jul 23, 2018 at 02:38:20PM -0700, Randy Dunlap wrote:
>
On Mon, Jul 23, 2018 at 02:44:28PM -0700, Randy Dunlap wrote:
> On 07/23/2018 02:40 PM, Mark Railton wrote:
> > On Mon, Jul 23, 2018 at 02:38:20PM -0700, Randy Dunlap wrote:
> >> On 07/23/2018 02:34 PM, Mark Railton wrote:
> >>> Fixed issue with multi line comment
> >>
> >> Fix [not Fixed]
> >>
>
Fixed issue with multi line comment
Signed-off-by: Mark Railton
---
drivers/xen/xlate_mmu.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/drivers/xen/xlate_mmu.c b/drivers/xen/xlate_mmu.c
index 23f1387b3ef7..3b03bc1641ed 100644
--- a/drivers/xen/xlate_mmu.c
+++
On Mon, Jul 23, 2018 at 02:38:20PM -0700, Randy Dunlap wrote:
> On 07/23/2018 02:34 PM, Mark Railton wrote:
> > Fixed issue with multi line comment
>
> Fix [not Fixed]
>
> >
> > Signed-off-by: Mark Railton
> > ---
> > drivers/xen/xlate_mmu.c | 5 +++--
> > 1 file changed, 3 insertions(+), 2
On Sat, 14 Jul 2018, Srivatsa S. Bhat wrote:
> This patch series is a backport of the Spectre-v2 fixes (IBPB/IBRS)
> and patches for the Speculative Store Bypass vulnerability to 4.4.y
> (they apply cleanly on top of 4.4.140).
FWIW -- not sure how much inspiration you took from our SLE 4.4-based
flight 125531 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125531/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 005c855dc6be0f61f76de0d7ec4a62ee737518d6
baseline version:
ovmf
On Mon, Jul 23, 2018 at 12:25 AM, Greg KH wrote:
> On Sun, Jul 22, 2018 at 11:05:09AM -0700, Andy Lutomirski wrote:
>> error_entry and error_exit communicate the user vs kernel status of
>> the frame using %ebx. This is unnecessary -- the information is in
>> regs->cs. Just use regs->cs.
>>
>>
flight 125508 qemu-upstream-4.11-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125508/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl broken in 125498
On Mon 23-07-18 09:11:54, Michal Hocko wrote:
> On Mon 23-07-18 09:03:06, Michal Hocko wrote:
> > On Fri 20-07-18 17:09:02, Andrew Morton wrote:
> > [...]
> > > Please take a look?
> >
> > Are you OK to have these in a separate patch?
>
> Btw. I will rebase this patch once oom stuff in
On Sun, Jul 22, 2018 at 11:05:09AM -0700, Andy Lutomirski wrote:
> error_entry and error_exit communicate the user vs kernel status of
> the frame using %ebx. This is unnecessary -- the information is in
> regs->cs. Just use regs->cs.
>
> This makes error_entry simpler and makes error_exit more
On Fri 20-07-18 17:09:02, Andrew Morton wrote:
[...]
> Please take a look?
Are you OK to have these in a separate patch?
--
Michal Hocko
SUSE Labs
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
On Mon 23-07-18 09:03:06, Michal Hocko wrote:
> On Fri 20-07-18 17:09:02, Andrew Morton wrote:
> [...]
> > Please take a look?
>
> Are you OK to have these in a separate patch?
Btw. I will rebase this patch once oom stuff in linux-next settles. At
least oom_lock removal from oom_reaper will
On 07/23/2018 05:37 AM, sepanta s wrote:
> I have written a program that can share memory pages of two VMs every x
> milliseconds. To do so, I modified xen and added an unshare event to be
> able to capture it. However, for some pages, when I receive the unshare
> event that contains the
Signed-off-by: Wei Liu
---
See: https://gitlab.com/liuw/xen/pipelines/26289145
Clang build failed. That should be fixed separately.
---
.gitlab-ci.yml | 32
1 file changed, 32 insertions(+)
diff --git a/.gitlab-ci.yml b/.gitlab-ci.yml
index
Hi all,
I have written a program that can share memory pages of two VMs every x
milliseconds. To do so, I modified xen and added an unshare event to be
able to capture it. However, for some pages, when I receive the unshare
event that contains the information about the pages which was about to
This run is configured for baseline tests only.
flight 74996 ovmf real [real]
http://osstest.xensource.com/osstest/logs/74996/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail like 74995
On Fri, Jul 20, 2018 at 02:15:05PM -0700, Christopher Clark wrote:
> Exclude named output files from the Xen tree setup.
>
> The linkfarm.stamp content will differ between top level "make"
> and "make install" invocations, due to the introduction of these
> output files that are produced during
On Fri, Jul 20, 2018 at 02:15:05PM -0700, Christopher Clark wrote:
> Exclude named output files from the Xen tree setup.
>
> The linkfarm.stamp content will differ between top level "make"
> and "make install" invocations, due to the introduction of these
> output files that are produced during
On 23/07/18 10:09, Roger Pau Monné wrote:
> On Fri, Jul 20, 2018 at 02:15:05PM -0700, Christopher Clark wrote:
>> Exclude named output files from the Xen tree setup.
>>
>> The linkfarm.stamp content will differ between top level "make"
>> and "make install" invocations, due to the introduction of
> On 23 Jul 2018, at 11:26, Wei Liu wrote:
>
> Clang complains:
>
> systemd_stubs.c:51:8: error: shifting a negative signed value is undefined
> [-Werror,-Wshift-negative-value]
>ret = Val_int(-1U);
> ^~~~
>
> Since sd_notify_fd has a signature of unit -> unit,
Wei Liu (2):
tools/gdbsx: fix build with clang 3.8
ocaml: remove undefined behaviour in systemd_stubs.c
tools/debugger/gdbsx/Rules.mk | 2 ++
tools/ocaml/xenstored/systemd_stubs.c | 10 ++
2 files changed, 4 insertions(+), 8 deletions(-)
--
2.11.0
Currently building gdbsx with clang 3.8 gives the following errors:
xg_main.c:783:17: error: 'aligned' attribute ignored when parsing type
[-Werror,-Wignored-attributes]
iop->uva = (uint64_aligned_t)((unsigned long)tobuf);
^~~~
Clang complains:
systemd_stubs.c:51:8: error: shifting a negative signed value is undefined
[-Werror,-Wshift-negative-value]
ret = Val_int(-1U);
^~~~
Since sd_notify_fd has a signature of unit -> unit, we simply change
the return value to Val_unit.
Signed-off-by:
On 07/20/2018 05:08 PM, Boris Ostrovsky wrote:
On 07/20/2018 05:01 AM, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This work is in response to my previous attempt to introduce Xen/DRM
zero-copy driver [1] to enable Linux dma-buf API [2] for Xen based
frontends/backends. There
On 07/19/2018 01:24 PM, Dan Carpenter wrote:
Reviewed-by: Dan Carpenter
regards,
dan carpenter
Applied to drm-misc-next
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
Currently building gdbsx with clang 3.8 gives the following errors:
xg_main.c:783:17: error: 'aligned' attribute ignored when parsing type
[-Werror,-Wignored-attributes]
iop->uva = (uint64_aligned_t)((unsigned long)tobuf);
^~~~
Clang complains:
systemd_stubs.c:51:8: error: shifting a negative signed value is undefined
[-Werror,-Wshift-negative-value]
ret = Val_int(-1U);
^~~~
Simply change the return value to 0.
Signed-off-by: Wei Liu
---
Cc: Christian Lindig
Cc: David Scott
See:
See individual patch for details.
Wei Liu (2):
tools/gdbsx: fix build with clang 3.8
ocaml: remove undefined behaviour in systemd_stubs.c
tools/debugger/gdbsx/Rules.mk | 4
tools/ocaml/xenstored/systemd_stubs.c | 2 +-
2 files changed, 5 insertions(+), 1 deletion(-)
--
2.11.0
> On 23 Jul 2018, at 10:52, Wei Liu wrote:
>
> On Mon, Jul 23, 2018 at 10:47:04AM +0100, Andrew Cooper wrote:
>> On 23/07/18 10:30, Wei Liu wrote:
>>> Clang complains:
>>>
>>> systemd_stubs.c:51:8: error: shifting a negative signed value is undefined
>>> [-Werror,-Wshift-negative-value]
>>>
On Fri 20-07-18 16:01:25, Andrew Morton wrote:
> On Tue, 17 Jul 2018 10:12:01 +0200 Michal Hocko wrote:
>
> > > Any suggestions regarding how the driver developers can test this code
> > > path? I don't think we presently have a way to fake an oom-killing
> > > event? Perhaps we should add
On Sat, Jul 21, 2018 at 04:35:37PM +0200, Marek Marczykowski-Górecki wrote:
> From: Simon Gaiser
>
> Parsing/generating the escape sequences used by xenstore-client is non
> trivial. So make scripting (for use in stubdom) easier by adding a raw
> option.
Should a description for this option be
On Mon, Jul 23, 2018 at 10:30:38AM +0100, Wei Liu wrote:
> Currently building gdbsx with clang 3.8 gives the following errors:
>
> xg_main.c:783:17: error: 'aligned' attribute ignored when parsing type
> [-Werror,-Wignored-attributes]
> iop->uva = (uint64_aligned_t)((unsigned long)tobuf);
>
On 23/07/18 10:30, Wei Liu wrote:
> Clang complains:
>
> systemd_stubs.c:51:8: error: shifting a negative signed value is undefined
> [-Werror,-Wshift-negative-value]
> ret = Val_int(-1U);
> ^~~~
>
> Simply change the return value to 0.
That will break the function
Hello Christopher,
On 20.06.18 03:58, Christopher Clark wrote:
Mixed-criticality and safety-critical systems under development need
support for timely boot of multiple domains at system launch --
“Initial Domains” -- with static assignment of resources between them,
each isolated from the
Hi
I think the main questions here are:
1. Do we need a separated KConfig option for SILO
2. Can we use indirect call like "dummy_xsm_ops.grant_copy"
Any suggestion?
Best regards
Xin(Talons) Li
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent:
This is a note to let you know that I've just added the patch titled
x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend
to the 4.4-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of the patch is:
flight 74997 distros-debian-sid real [real]
http://osstest.xensource.com/osstest/logs/74997/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-armhf-sid-netboot-pygrub 10 debian-di-install fail like 74976
On Mon, Jul 23, 2018 at 10:47:04AM +0100, Andrew Cooper wrote:
> On 23/07/18 10:30, Wei Liu wrote:
> > Clang complains:
> >
> > systemd_stubs.c:51:8: error: shifting a negative signed value is undefined
> > [-Werror,-Wshift-negative-value]
> > ret = Val_int(-1U);
> >
On 23/07/18 10:52, Wei Liu wrote:
> On Mon, Jul 23, 2018 at 10:47:04AM +0100, Andrew Cooper wrote:
>> On 23/07/18 10:30, Wei Liu wrote:
>>> Clang complains:
>>>
>>> systemd_stubs.c:51:8: error: shifting a negative signed value is undefined
>>> [-Werror,-Wshift-negative-value]
>>> ret =
On Mon, Jul 23, 2018 at 11:39:05AM +0200, Roger Pau Monné wrote:
> On Sat, Jul 21, 2018 at 04:35:37PM +0200, Marek Marczykowski-Górecki wrote:
> > From: Simon Gaiser
> >
> > Parsing/generating the escape sequences used by xenstore-client is non
> > trivial. So make scripting (for use in stubdom)
On 07/20/2018 07:02 PM, Razvan Cojocaru wrote:
> On 07/20/2018 08:18 PM, George Dunlap wrote:
>> Furthermore, imagine the following scenario:
>>
>> * dom0 enables altp2m on domain A
>> * dom0 switches altp2m to view 1 on domain A
>> * dom0 enables #VE on domain A
>> * domain A has a vmexit
>> ->
On 23/07/18 11:26, Wei Liu wrote:
> Wei Liu (2):
> tools/gdbsx: fix build with clang 3.8
> ocaml: remove undefined behaviour in systemd_stubs.c
Both Acked-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
From: Isaila Alexandru
This patch adds access control for NPT mode.
There aren’t enough extra bits to store the access rights in the NPT p2m
table, so we add a radix tree to store the rights. For efficiency,
remove entries which match the default permissions rather than
continuing to store
The calls to xpti_init_default() in parse_xpti() are buggy. The CPUID data
hasn't been fetched that early, and boot_cpu_has(X86_FEATURE_ARCH_CAPS) will
always evaluate false.
As a result, the default case won't disable XPTI on Intel hardware which
advertises ARCH_CAPABILITIES_RDCL_NO.
Simplify
It turns out that nothing ever prevented HVM guests from trying to set unknown
EFER bits. Generally, this results in a vmentry failure.
For Intel hardware, all implemented bits are covered by the checks.
For AMD hardware, the only EFER bit which isn't covered by the checks is TCE
(which AFAICT
On Mon, Jul 23, 2018 at 02:40:05PM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Wei Liu [mailto:wei.l...@citrix.com]
> > Sent: 23 July 2018 14:35
> > To: Paul Durrant
> > Cc: xen-devel@lists.xenproject.org; Jan Beulich ;
> > Andrew Cooper ; George Dunlap
> > ; Ian Jackson ;
On 07/23/2018 12:42 AM, Davidlohr Bueso wrote:
> On Mon, 23 Jul 2018, Wanpeng Li wrote:
>
>> On Fri, 20 Jul 2018 at 06:03, Waiman Long wrote:
>>>
>>> On 07/19/2018 05:54 PM, Davidlohr Bueso wrote:
>>> > On Thu, 19 Jul 2018, Waiman Long wrote:
>>> >
>>> >> On a VM with only 1 vCPU, the locking
On Mon, Jul 23, 2018 at 02:49:50PM +0100, Andrew Cooper wrote:
> It turns out that nothing ever prevented HVM guests from trying to set unknown
> EFER bits. Generally, this results in a vmentry failure.
>
> For Intel hardware, all implemented bits are covered by the checks.
>
> For AMD
On 23/07/18 15:48, Andrew Cooper wrote:
> The calls to xpti_init_default() in parse_xpti() are buggy. The CPUID data
> hasn't been fetched that early, and boot_cpu_has(X86_FEATURE_ARCH_CAPS) will
> always evaluate false.
>
> As a result, the default case won't disable XPTI on Intel hardware
On Tue, Jul 17, 2018 at 02:38:15PM +0100, Paul Durrant wrote:
[...]
> +static int iommuop_unmap(struct xen_iommu_op_unmap *op)
> +{
[...]
> +
> +if ( !iommu_unmap_page(currd, bfn) )
> +rc = -EIO;
So it is an error to unmap the page successfully? In fact this same line
is changed in
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 23 July 2018 15:26
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Jan Beulich ;
> Andrew Cooper ; George Dunlap
> ; Ian Jackson ; Julien
> Grall ; Konrad Rzeszutek Wilk
> ; Stefano Stabellini ; Tim
>
Hi,
On 07/07/18 00:14, Stefano Stabellini wrote:
Signed-off-by: Stefano Stabellini
CC: george.dun...@eu.citrix.com
CC: ian.jack...@eu.citrix.com
CC: jbeul...@suse.com
CC: andrew.coop...@citrix.com
---
SUPPORT.md | 10 ++
1 file changed, 10 insertions(+)
diff --git a/SUPPORT.md
Hello,
For the last few days, I have been trying to get a PVH dom0 running,
however I encountered the following problem: the system seems to
freeze after the hypervisor boots, the screen goes black. I have tried to
debug it via a serial console (using Minicom) and managed to get some
more Xen
flight 125515 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125515/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-freebsd 7 freebsd-buildfail REGR. vs. 125317
Tests which did
flight 125513 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125513/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 6 kernel-build fail REGR. vs. 125510
Tests which did not
Hi Stefano,
On 07/07/18 00:13, Stefano Stabellini wrote:
+config QEMU_PLATFORM
+ bool
+
+config RCAR3_PLATFORM
+ bool
Those 2 options do nothing. So I would prefer if they are removed. With
that fixed:
Acked-by: Julien Grall
Cheers,
--
Julien Grall
Hi Stefano,
On 07/07/18 00:14, Stefano Stabellini wrote:
Add specific per-platform defaults for NR_CPUS. Note that the order of
the defaults matter: they need to go first, otherwise the generic
defaults will be applied.
This is done so that Xen builds customized for a specific hardware
On Sat, Jul 14, 2018 at 02:25:43AM -0700, Srivatsa S. Bhat wrote:
> Hi Greg,
>
> This patch series is a backport of the Spectre-v2 fixes (IBPB/IBRS)
> and patches for the Speculative Store Bypass vulnerability to 4.4.y
> (they apply cleanly on top of 4.4.140).
>
> I used 4.9.y as my reference
This is a note to let you know that I've just added the patch titled
x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths
to the 4.4-stable tree which can be found at:
http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
The filename of the
flight 125504 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125504/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-libvirt 6 libvirt-buildfail REGR. vs. 123814
build-i386-libvirt
Hi Stefano,
On 07/07/18 00:13, Stefano Stabellini wrote:
Add a tiny kconfig configuration. Enabled only the credit scheduler.
It only carries non-default options (use make menuconfig or make
olddefconfig to produce a complete .config file).
Signed-off-by: Stefano Stabellini
Acked-by: Julien
On 06/28/2018 08:54 AM, Razvan Cojocaru wrote:
> For the hostp2m, access_required starts off as 0, then it can be
> set with xc_domain_set_access_required(). However, all the altp2ms
> set it to 1 on init, and ignore both the hostp2m and the hypercall.
> This patch sets access_required to the
On 07/23/2018 01:29 PM, George Dunlap wrote:
> It's possible my analysis is wrong there (I'm not intimately familiar
> with the code), but I think my patch is better anyway for a couple of
> reasons:
>
> * The logic to keep EPTP_INDEX in sync is explicit, and all in the same
> file.
>
> * It
On 07/16/2018 09:53 AM, Jan Beulich wrote:
On 16.07.18 at 10:35, wrote:
>> On 06/28/2018 07:19 PM, Tamas K Lengyel wrote:
>>> On Thu, Jun 28, 2018 at 1:54 AM Razvan Cojocaru
>>> wrote:
For the hostp2m, access_required starts off as 0, then it can be
set with
From: Oleksandr Andrushchenko
Add support for Linux grant device driver extension which allows
converting existing dma-buf's into an array of grant references
and vise versa. This is only implemented for Linux as other OSes
have no Linux dma-buf support.
Bump gnttab library minor version to 3.
flight 125501 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125501/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 10 debian-hvm-install fail REGR. vs.
123554
1 - 100 of 135 matches
Mail list logo