On 05/17/2018 08:50 AM, Juergen Gross wrote:
On 17/05/18 07:45, Oleksandr Andrushchenko wrote:
Hi, Juergen!
This patch should go into 4.11 as it is needed for a related Linux
kernel patch and the risk is next to zero for Xen due to only adding
some macros not in use on Xen side.
Could you
On 17/05/18 07:45, Oleksandr Andrushchenko wrote:
> Hi, Juergen!
>
> This patch should go into 4.11 as it is needed for a related Linux
> kernel patch and the risk is next to zero for Xen due to only adding
> some macros not in use on Xen side.
>
> Could you please release ack this
On 05/17/2018 08:42 AM, Juergen Gross wrote:
On 17/05/18 07:29, Oleksandr Andrushchenko wrote:
On 05/17/2018 07:28 AM, Juergen Gross wrote:
On 16/05/18 06:59, Oleksandr Andrushchenko wrote:
On 05/11/2018 06:15 PM, Juergen Gross wrote:
On 11/05/18 15:38, Konrad Rzeszutek Wilk wrote:
On Fri,
Hi, Juergen!
This patch should go into 4.11 as it is needed for a related Linux
kernel patch and the risk is next to zero for Xen due to only adding
some macros not in use on Xen side.
Could you please release ack this and apply?
Thank you,
Oleksandr
On 05/02/2018 05:49 PM, Oleksandr
On 17/05/18 07:29, Oleksandr Andrushchenko wrote:
> On 05/17/2018 07:28 AM, Juergen Gross wrote:
>> On 16/05/18 06:59, Oleksandr Andrushchenko wrote:
>>> On 05/11/2018 06:15 PM, Juergen Gross wrote:
On 11/05/18 15:38, Konrad Rzeszutek Wilk wrote:
> On Fri, May 11, 2018 at 09:37:57AM
On 05/17/2018 12:08 AM, Dmitry Torokhov wrote:
On Wed, May 16, 2018 at 08:47:30PM +0300, Oleksandr Andrushchenko wrote:
On 05/16/2018 08:15 PM, Dmitry Torokhov wrote:
Hi Oleksandr,
On Mon, May 14, 2018 at 05:40:29PM +0300, Oleksandr Andrushchenko wrote:
@@ -211,93 +220,114 @@ static int
On 05/17/2018 07:28 AM, Juergen Gross wrote:
On 16/05/18 06:59, Oleksandr Andrushchenko wrote:
On 05/11/2018 06:15 PM, Juergen Gross wrote:
On 11/05/18 15:38, Konrad Rzeszutek Wilk wrote:
On Fri, May 11, 2018 at 09:37:57AM -0400, Konrad Rzeszutek Wilk wrote:
On Wed, May 02, 2018 at
On 16/05/18 06:59, Oleksandr Andrushchenko wrote:
> On 05/11/2018 06:15 PM, Juergen Gross wrote:
>> On 11/05/18 15:38, Konrad Rzeszutek Wilk wrote:
>>> On Fri, May 11, 2018 at 09:37:57AM -0400, Konrad Rzeszutek Wilk wrote:
On Wed, May 02, 2018 at 05:49:18PM +0300, Oleksandr Andrushchenko
On 17/05/18 01:57, osstest service owner wrote:
> flight 122804 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/122804/
>
> Failures and problems with tests :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>
flight 122804 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122804/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl broken in 122715
Hi,
As discussed some time ago, I'd like to help with adding tests for some
features we use in Qubes OS.
IMO the easiest thing to test is host suspend. You just need to execute
"rtcwake -s 30 -m mem", and see if the host is back to live after ~30s.
Right now I know it works on Xen 4.8, but
On Wed, May 16, 2018 at 08:47:30PM +0300, Oleksandr Andrushchenko wrote:
> On 05/16/2018 08:15 PM, Dmitry Torokhov wrote:
> > Hi Oleksandr,
> >
> > On Mon, May 14, 2018 at 05:40:29PM +0300, Oleksandr Andrushchenko wrote:
> > > @@ -211,93 +220,114 @@ static int xenkbd_probe(struct xenbus_device
Friendly ping. I am hopeful one of the x86 and/or KVM maintainers has a
few cycles to spare to look this over.
And thanks to everyone who has helped thus far by providing valuable
feedback and reviewing.
https://lkml.org/lkml/2018/4/16/1002
Thanks,
-Maran
On 4/16/2018 4:09 PM, Maran
flight 122796 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122796/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 13 guest-saverestore fail REGR. vs. 122696
flight 122888 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122888/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
flight 122879 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122879/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
On 16/05/18 09:14, Jan Beulich wrote:
On 15.05.18 at 19:54, wrote:
>> Also, I don't see any link between the change and the commit message. With
>> the microcode installed, STIBP and IBPB are already visible to dom0.
> They reportedly weren't (and I was able to
On 05/16/2018 08:15 PM, Dmitry Torokhov wrote:
Hi Oleksandr,
On Mon, May 14, 2018 at 05:40:29PM +0300, Oleksandr Andrushchenko wrote:
@@ -211,93 +220,114 @@ static int xenkbd_probe(struct xenbus_device *dev,
if (!info->page)
goto error_nomem;
- /* Set input abs
flight 122801 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122801/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 122561
test-armhf-armhf-libvirt-raw 13
c/s f9616884e (a backport of c/s 0d703a701 "x86/feature: Definitions for
Indirect Branch Controls") missed a CPUID adjustment when calculating the raw
featureset. This impacts host administrator diagnostics.
Signed-off-by: Sergey Dyasli
c/s 62b187969 "x86: further
Hi Oleksandr,
On Mon, May 14, 2018 at 05:40:29PM +0300, Oleksandr Andrushchenko wrote:
> @@ -211,93 +220,114 @@ static int xenkbd_probe(struct xenbus_device *dev,
> if (!info->page)
> goto error_nomem;
>
> - /* Set input abs params to match backend screen res */
> -
flight 122797 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122797/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt6 libvirt-buildfail REGR. vs. 122667
version targeted for
On Wed, May 16, 2018 at 5:01 PM, Jan Beulich wrote:
On 16.05.18 at 16:53, wrote:
>> On Wed, May 16, 2018 at 3:01 PM, Jan Beulich wrote:
>> On 16.05.18 at 15:18, wrote:
If the latter, I think the same
George Dunlap writes ("Re: [PATCH v6] scripts/add_maintainers.pl: New script"):
> I've looked over the help and approve of the functionality, and tested
> it for my use case and it seems to work as advertised.
>
> On that basis:
>
> Acked-by: George Dunlap
Thanks,
>>> On 16.05.18 at 16:53, wrote:
> On Wed, May 16, 2018 at 3:01 PM, Jan Beulich wrote:
> On 16.05.18 at 15:18, wrote:
>>> If the latter, I think the same argument applies: turning on XPTI is a
>>> requirement for many people, and thus
>>> On 07.05.18 at 23:07, wrote:
> @@ -180,6 +185,293 @@ int svm_avic_init_vmcb(struct vcpu *v)
> }
>
> /*
> + * Note:
> + * This function handles the AVIC_INCOMP_IPI #vmexit when AVIC is enabled.
> + * The hardware generates this fault when an IPI could not be
On 16/05/18 16:29, Jan Beulich wrote:
On 07.05.18 at 23:07, wrote:
>> +s->avic_last_phy_id = avic_get_physical_id_entry(d,
>> GET_xAPIC_ID(apic_id));
> You don't appear to read this value outside of this function. Please store
> values in struct
>>> On 07.05.18 at 23:07, wrote:
> --- /dev/null
> +++ b/xen/arch/x86/hvm/svm/avic.c
> @@ -0,0 +1,190 @@
> +/*
> + * avic.c: implements AMD Advanced Virtual Interrupt Controller (AVIC)
> support
> + * Copyright (c) 2018, Advanced Micro Devices, Inc.
> + *
> + *
On 05/16/2018 12:50 PM, Ian Jackson wrote:
> George Dunlap writes ("Re: [PATCH v6] scripts/add_maintainers.pl: New
> script"):
>>> Changes since v5:
>>> - Add mention of --get-maintainers, and its best use case, to --help
>>> output. (Move $get_maintainer up so that it can be used here.)
>>
>>
On 9 May 2018 at 07:18, Mauro Carvalho Chehab
wrote:
> As we move stuff around, some doc references are broken. Fix some of
> them via this script:
> ./scripts/documentation-file-ref-check --fix-rst
>
> Manually checked if the produced result is valid, removing
Am Thu, 10 May 2018 11:40:18 +0100
schrieb Anthony PERARD :
> I did fix the bug in QEMU 2.11 (5d6c599fe1d69a1bf8c5c4d3c58be2b31cd625ad)
> so Xen 4.11 does include it it the qemu-xen tree.
Is this supposed to be called also for PV? In my testing
flight 122877 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122877/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
On Wed, May 16, 2018 at 3:01 PM, Jan Beulich wrote:
On 16.05.18 at 15:18, wrote:
>> On Wed, May 16, 2018 at 10:06 AM, Jan Beulich wrote:
>> On 26.04.18 at 13:33, wrote:
Juergen Gross (9):
x86/xpti:
>>> On 07.05.18 at 23:07, wrote:
> --- a/xen/include/asm-x86/hvm/vlapic.h
> +++ b/xen/include/asm-x86/hvm/vlapic.h
> @@ -137,6 +137,10 @@ void vlapic_ipi(struct vlapic *vlapic, uint32_t icr_low,
> uint32_t icr_high);
>
> int vlapic_apicv_write(struct vcpu *v,
>>> On 07.05.18 at 23:07, wrote:
> AMD AVIC code makes use of vlapic_reg_read() and vlapic_reg_write(). To
> do this make the functions non-static.
To be honest I'd prefer if each of the two functions was made non-static in
the patch actually needing this to be the
>>> On 07.05.18 at 23:07, wrote:
> Rename vlapic_read_aligned() to vlapic_reg_read() to make it a pair of
> vlapic_reg_write().
>
> Signed-off-by: Janakarajan Natarajan
Acked-by: Jan Beulich
> -Original Message-
> From: Anthony PERARD [mailto:anthony.per...@citrix.com]
> Sent: 16 May 2018 15:31
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; qemu-bl...@nongnu.org; qemu-
> de...@nongnu.org; Stefano Stabellini
>
On Fri, May 04, 2018 at 08:26:03PM +0100, Paul Durrant wrote:
> Not all Xen environments support the xengnttab_grant_copy() operation.
> E.g. where the OS is FreeBSD or Xen is older than 4.8.0.
>
> This patch introduces an emulation of that operation using
> xengnttab_map_domain_grant_refs() and
> -Original Message-
> From: Anthony PERARD [mailto:anthony.per...@citrix.com]
> Sent: 16 May 2018 15:14
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; qemu-bl...@nongnu.org; qemu-
> de...@nongnu.org; Stefano Stabellini ; Greg
On Fri, May 04, 2018 at 08:26:01PM +0100, Paul Durrant wrote:
> Now that helpers are present in xen_backend, this patch removes open-coded
> calls to libxengnttab from the xen_disk code.
>
> This patch also fixes one whitspace error in the assignment of the
> XenDevOps initialise method.
>
>
On Wed, May 16, 2018 at 07:51:07AM -0600, Jan Beulich wrote:
> >>> On 16.05.18 at 15:41, wrote:
> > On Wed, May 16, 2018 at 06:01:00AM -0600, Jan Beulich wrote:
> >> @@ -729,6 +729,14 @@ static int hvm_load_mtrr_msr(struct doma
> >> if ( hvm_load_entry(MTRR, h, _mtrr)
>>> On 16.05.18 at 15:18, wrote:
> On Wed, May 16, 2018 at 10:06 AM, Jan Beulich wrote:
> On 26.04.18 at 13:33, wrote:
>>> Juergen Gross (9):
>>> x86/xpti: avoid copying L4 page table contents when possible
>>> xen/x86: add a
> -Original Message-
> From: Anthony PERARD [mailto:anthony.per...@citrix.com]
> Sent: 16 May 2018 14:50
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; qemu-bl...@nongnu.org; qemu-
> de...@nongnu.org; Stefano Stabellini
>
flight 74720 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74720/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-i386-squeeze-netboot-pygrub 10 debian-di-install fail like
74699
>>> On 16.05.18 at 15:41, wrote:
> On Wed, May 16, 2018 at 06:01:00AM -0600, Jan Beulich wrote:
>> --- unstable.orig/xen/arch/x86/hvm/mtrr.c
>> +++ unstable/xen/arch/x86/hvm/mtrr.c
>> @@ -676,22 +676,22 @@ int hvm_set_mem_pinned_cacheattr(struct
>>
>> static int
On Fri, May 04, 2018 at 08:26:00PM +0100, Paul Durrant wrote:
> This patch adds grant table helper functions to the xen_backend code to
> localize error reporting and use of xen_domid.
>
> The patch also defers the call to xengnttab_open() until just before the
> initialise method in XenDevOps is
>>> On 16.05.18 at 15:25, wrote:
> On 16/05/18 14:10, Jan Beulich wrote:
>>> +static int do_microcode_update(void *_info)
>>> +{
>>> +struct microcode_info *info = _info;
>>> +unsigned int cpu = smp_processor_id();
>>> +int ret;
>>> +
>>> +ret =
On Wed, May 16, 2018 at 06:01:00AM -0600, Jan Beulich wrote:
> >>> On 16.05.18 at 13:53, wrote:
> > On Wed, May 16, 2018 at 02:39:26AM -0600, Jan Beulich wrote:
> >> >>> On 15.05.18 at 16:36, wrote:
> >> > +for ( i = 0; i < num_var_ranges; i++
On 16/05/18 14:10, Jan Beulich wrote:
>> +static int do_microcode_update(void *_info)
>> +{
>> +struct microcode_info *info = _info;
>> +unsigned int cpu = smp_processor_id();
>> +int ret;
>> +
>> +ret = wait_for_cpus(>cpu_in, MICROCODE_DEFAULT_TIMEOUT);
>> +if ( ret )
>> +
On Wed, May 16, 2018 at 10:06 AM, Jan Beulich wrote:
On 26.04.18 at 13:33, wrote:
>> Juergen Gross (9):
>> x86/xpti: avoid copying L4 page table contents when possible
>> xen/x86: add a function for modifying cr3
>> xen/x86: support per-domain flag
This run is configured for baseline tests only.
flight 74719 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74719/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-521
>>> On 09.05.18 at 00:01, wrote:
> @@ -30,15 +31,21 @@
> #include
> #include
> #include
> +#include
> #include
> #include
> #include
> +#include
>
> +#include
> #include
> #include
> #include
> #include
>
> +/* By default, wait for 3us */
>
flight 122785 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122785/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl broken in 122710
On 16/05/18 09:37, John Wang wrote:
>
> Hi:
>
> 64 bit PV guest can attack hypervisor by SP3
>
Yes.
> whether it still can attack others 64 bit PV guest by SP3?
>
Meltdown attacks only operate within a single address space. You can't
attack a separate address space with it.
That said, the VM
>>> On 09.05.18 at 00:01, wrote:
> Mainly for the patch behind which relies on 'nr_phys_cpus' to estimate
> the time needed for microcode update in the worst case.
Leaving aside the aspect of "nr_phys_cpus" not being a suitable name
("nr_online_cores" would come closer imo)
>>> On 15.05.18 at 16:10, wrote:
> Current update process of already bound MSI interrupts is wrong
> because unmap_domain_pirq calls pci_disable_msi, which disables MSI
> interrupts on the device. On the other hand map_domain_pirq doesn't
> enable MSI, so the current update
>>> On 15.05.18 at 16:10, wrote:
> And put it in a separate update function. This is required in order to
> improve binding of MSI PIRQs when using vPCI.
>
> No functional change.
>
> Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
>>> On 15.05.18 at 16:10, wrote:
> The current unbind loop on failure in vpci_msi_enable is wrong and
> will only work correctly if the initial pirq is 0. Fix this by adding
> a proper bound.
>
> Reported-by: Jan Beulich
> Signed-off-by: Roger Pau Monné
flight 122868 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122868/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm
>>> On 16.05.18 at 13:58, wrote:
> On Wed, May 16, 2018 at 02:47:39AM -0600, Jan Beulich wrote:
>> >>> On 15.05.18 at 16:36, wrote:
>> > --- a/xen/arch/x86/hvm/mtrr.c
>> > +++ b/xen/arch/x86/hvm/mtrr.c
>> > @@ -185,6 +185,30 @@ int
>>> On 16.05.18 at 13:53, wrote:
> On Wed, May 16, 2018 at 02:39:26AM -0600, Jan Beulich wrote:
>> >>> On 15.05.18 at 16:36, wrote:
>> > +for ( i = 0; i < num_var_ranges; i++ )
>>
>> Following your v1 I had already put together a patch to
On Wed, May 16, 2018 at 02:47:39AM -0600, Jan Beulich wrote:
> >>> On 15.05.18 at 16:36, wrote:
> > --- a/xen/arch/x86/hvm/mtrr.c
> > +++ b/xen/arch/x86/hvm/mtrr.c
> > @@ -185,6 +185,30 @@ int hvm_vcpu_cacheattr_init(struct vcpu *v)
> > ((uint64_t)PAT_TYPE_UC_MINUS
On Wed, May 16, 2018 at 02:39:26AM -0600, Jan Beulich wrote:
> >>> On 15.05.18 at 16:36, wrote:
> > +for ( i = 0; i < num_var_ranges; i++ )
>
> Following your v1 I had already put together a patch to change just the
> save and load functions here, as the adjustments
George Dunlap writes ("Re: [PATCH v6] scripts/add_maintainers.pl: New script"):
> > Changes since v5:
> > - Add mention of --get-maintainers, and its best use case, to --help
> > output. (Move $get_maintainer up so that it can be used here.)
>
> Do you actually want to check this massive
On Wed, May 16, 2018 at 12:27:29PM +0100, Andrew Cooper wrote:
> On 14/05/18 16:48, Wei Liu wrote:
> > On Fri, May 11, 2018 at 11:38:14AM +0100, Andrew Cooper wrote:
> >> If Xen is virtualising MSR_SPEC_CTRL handling for guests, but using 0 as
> >> its
> >> own MSR_SPEC_CTRL value,
On 14/05/18 16:48, Wei Liu wrote:
> On Fri, May 11, 2018 at 11:38:14AM +0100, Andrew Cooper wrote:
>> If Xen is virtualising MSR_SPEC_CTRL handling for guests, but using 0 as its
>> own MSR_SPEC_CTRL value, spec_ctrl_{enter,exit}_idle() need not write to the
>> MSR.
>>
>> Requested-by: Jan Beulich
On 05/15/2018 06:23 PM, Ian Jackson wrote:
> From: Lars Kurth
>
> This provides a much better workflow when using git format-patch and
> git send-email, with get_maintainer.pl.
>
> The tool covers step 2 of the following workflow
>
> Step 1: git format-patch ... -o
On Wed, May 16, 2018 at 12:08:02PM +0100, Andrew Cooper wrote:
> On 14/05/18 16:52, Jan Beulich wrote:
> On 14.05.18 at 17:39, wrote:
> >> On Fri, May 11, 2018 at 11:38:11AM +0100, Andrew Cooper wrote:
> >>> @@ -417,6 +419,32 @@ void __init
On 14/05/18 16:52, Jan Beulich wrote:
On 14.05.18 at 17:39, wrote:
>> On Fri, May 11, 2018 at 11:38:11AM +0100, Andrew Cooper wrote:
>>> @@ -417,6 +419,32 @@ void __init init_speculation_mitigations(void)
>>> setup_clear_cpu_cap(X86_FEATURE_NO_XPTI);
>>>
>>>
On 16/05/18 11:49, Jan Beulich wrote:
On 16.05.18 at 12:28, wrote:
>> On 16/05/18 07:38, Jan Beulich wrote:
>> On 15.05.18 at 21:52, wrote:
On 14/05/18 16:27, Jan Beulich wrote:
On 11.05.18 at 12:38,
Dear All,
I'm trying to rebuild the blktap module from xenserver. I'm getting
following compile errors, any help or direction would be appreciated.
make[2]: Entering directory
`/root/rpmbuild/BUILD/blktap-3.2.0.xs1086/drivers'
/bin/sh ../libtool --tag=CC --mode=compile gcc -DHAVE_CONFIG_H
On Tue, May 15, 2018 at 03:36:16PM +0100, Roger Pau Monne wrote:
> And enable MTRR. This allows to provide a sane initial MTRR state for
> PVH DomUs. This will have to be expanded when pci-passthrough support
> is added to PVH guests, so that MMIO regions of devices are set as
> UC.
>
> Note that
flight 122867 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122867/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen b953322c5772dbc537421f9e2f97026a1c2fcb2e
baseline version:
xen
On 16/05/18 07:38, Jan Beulich wrote:
On 15.05.18 at 21:52, wrote:
>> On 14/05/18 16:27, Jan Beulich wrote:
>> On 11.05.18 at 12:38, wrote:
--- a/xen/arch/x86/spec_ctrl.c
+++ b/xen/arch/x86/spec_ctrl.c
@@ -128,7 +128,8
On Thu, May 03, 2018 at 12:18:40PM +0100, Paul Durrant wrote:
> This patch removes the current hackery where IOREQ_TYPE_PCI_CONFIG
> reqyests are handled by faking PIO to 0xcf8 and 0xcfc and replaces it
> with direct calls to pci_host_config_read/write_common().
> Doing so necessitates mapping
On 12.05.2018 10:27, Weiwei Jia wrote:
> Dear all,
>
> Recently, we made a few improvements on effectively utilizing Pause
> Loop Exiting (PLE) support for higher throughput on virtualized
> systems. Basically, it solves two problems: 1) how to adjust
> PLE_Window; 2) how to select virtual CPUs
Hi:
64 bit PV guest can attack hypervisor by SP3, whether it still can
attack others 64 bit PV guest by SP3 ? If yes, whether the xpti enable
on hypervisor can prevent vulnerability? if no, what operations need
to be done on 64 PV guest or hypervisor?
--
Thanks
APACII QA
John(XiaoGen
On Wed, May 09, 2018 at 10:18:52AM -0300, Mauro Carvalho Chehab wrote:
> As we move stuff around, some doc references are broken. Fix some of
> them via this script:
> ./scripts/documentation-file-ref-check --fix-rst
>
> Manually checked if the produced result is valid, removing a few
>
flight 122771 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122771/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-credit2 broken in 122704
>>> On 26.04.18 at 13:33, wrote:
> Juergen Gross (9):
> x86/xpti: avoid copying L4 page table contents when possible
> xen/x86: add a function for modifying cr3
> xen/x86: support per-domain flag for xpti
> xen/x86: use invpcid for flushing the TLB
> xen/x86: disable
Anthony, Stefano,
Ping?
Paul
> -Original Message-
> From: Paul Durrant [mailto:paul.durr...@citrix.com]
> Sent: 03 May 2018 12:19
> To: xen-devel@lists.xenproject.org; qemu-de...@nongnu.org
> Cc: Paul Durrant ; Stefano Stabellini
> ;
>>> On 15.05.18 at 16:36, wrote:
> --- a/xen/arch/x86/hvm/mtrr.c
> +++ b/xen/arch/x86/hvm/mtrr.c
> @@ -185,6 +185,30 @@ int hvm_vcpu_cacheattr_init(struct vcpu *v)
> ((uint64_t)PAT_TYPE_UC_MINUS << 48) | /* PAT6: UC- */
>
>>> On 15.05.18 at 16:36, wrote:
> --- a/xen/arch/x86/hvm/mtrr.c
> +++ b/xen/arch/x86/hvm/mtrr.c
> @@ -154,14 +154,26 @@ uint8_t pat_type_2_pte_flags(uint8_t pat_type)
> int hvm_vcpu_cacheattr_init(struct vcpu *v)
> {
> struct mtrr_state *m = >arch.hvm_vcpu.mtrr;
> +
>>> On 15.05.18 at 16:36, wrote:
> @@ -478,7 +478,7 @@ bool_t mtrr_pat_not_equal(struct vcpu *vd, struct vcpu
> *vs)
> struct mtrr_state *md = >arch.hvm_vcpu.mtrr;
> struct mtrr_state *ms = >arch.hvm_vcpu.mtrr;
> int32_t res;
> -uint8_t num_var_ranges =
>>> On 15.05.18 at 16:36, wrote:
> Provided to both Dom0 and DomUs.
>
> Signed-off-by: Roger Pau Monné
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
>>> On 15.05.18 at 19:54, wrote:
> Also, I don't see any link between the change and the commit message. With
> the microcode installed, STIBP and IBPB are already visible to dom0.
They reportedly weren't (and I was able to confirm that), and given this
original
On Fri, May 11, 2018 at 07:43:58PM -0300, Charles Gonçalves wrote:
> "That is, without (physical
> or virtual, depending on component) serial console you're often unlikely to
> actually observe any messages connected to the crash."
>
> I do not have any experience with serial console interaction
>>> On 15.05.18 at 17:36, wrote:
> On 15/05/18 10:04, Jan Beulich wrote:
> On 15.05.18 at 10:37, wrote:
>>> Commit 62b1879693e0 ("x86: further CPUID handling adjustments") added
>>> FEATURESET_7d0 reporting but forgot to update
>>> On 15.05.18 at 21:52, wrote:
> On 14/05/18 16:27, Jan Beulich wrote:
> On 11.05.18 at 12:38, wrote:
>>> --- a/xen/arch/x86/spec_ctrl.c
>>> +++ b/xen/arch/x86/spec_ctrl.c
>>> @@ -128,7 +128,8 @@ static void __init print_details(enum
89 matches
Mail list logo