On Tue, 1 Aug 2017, Julien Grall wrote:
> Hi Edgar,
>
> On 01/08/2017 22:22, Edgar E. Iglesias wrote:
> > On Tue, Aug 01, 2017 at 10:02:45PM +0100, Julien Grall wrote:
> > > Hi,
> > >
> > > On 01/08/2017 21:40, Stefano Stabellini wrote:
> > > > On Tue, 1 Aug 2017, Edgar E. Iglesias wrote:
> > >
On Wed, Jul 12, 2017 at 3:15 AM, Wei Liu wrote:
>
> On Thu, Jul 13, 2017 at 10:03:39AM +0800, Xiong Zhang wrote:
> > When valid mmio_hole is set in hvm.cfg, segment fault happens at accessing
> > localents pointer.
> >
> > Because the size of localents pointer isn't enough to
On 08/02/2017 01:46 PM, Arvind Yadav wrote:
> pci_device_id are not supposed to change at runtime. All functions
> working with pci_device_id provided by work with
> const pci_device_id. So mark the non-const structs as const.
>
> Signed-off-by: Arvind Yadav
On 08/02/2017 08:01 AM, Juergen Gross wrote:
> On 01/08/17 16:28, PGNet Dev wrote:
>> On 7/28/17 9:02 AM, PGNet Dev wrote:
>>> On 7/27/17 11:23 PM, Juergen Gross wrote:
Can you please post the domain's config file used to create the domain
and the kernel config?
>>> Sure.
>>>
>>>
> From: Oleksandr Tyshchenko [mailto:olekst...@gmail.com]
> Sent: Tuesday, August 1, 2017 7:08 PM
>
> Hi, Kevin
>
> On Tue, Aug 1, 2017 at 6:06 AM, Tian, Kevin wrote:
> >> From: Oleksandr Tyshchenko [mailto:olekst...@gmail.com]
> >> Sent: Monday, July 31, 2017 7:58 PM
> >>
Hi all
OSSTest is shut down for maintenance at the moment. It will be brought
back either later today or tomorrow. I will send out another email when
the maintenance is done.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
flight 71930 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71930/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
build-arm64-pvops 2 hosts-allocate broken like 71702
build-arm64
On Tue, Aug 01, 2017 at 10:01:01AM +, Asharaf Perinchikkal wrote:
> Hi All,
>
>
> In Intel® Atom™ E3845(MinnowBoard Turbot Quad-Core board) has only support
> for Virtualization Technology (VT-x).
>
> No support for Intel® Virtualization Technology for Directed I/O (VT-d).
>
On Wed, Aug 02, 2017 at 07:10:25PM +0100, Julien Grall wrote:
> Hi,
>
> On 01/08/17 00:53, Stefano Stabellini wrote:
> >On Mon, 31 Jul 2017, Edgar E. Iglesias wrote:
> > @role Can only be 'master' or 'slave', it defaults to
> > 'slave'.
> >
> > @prot
Hi everybody,
the Xen based suspend notification interface is implemented in Linux by
drivers/xen/manage.c. The guest monitors a node on xenstore named
"control/shutdown", one of the possible commands is "suspend".
See the corresponding libxl__domain_pvcontrol_* functions and their
callers under
>>> Boris Ostrovsky 07/31/17 6:16 PM >>>
>On 07/31/2017 11:20 AM, Jan Beulich wrote:
> Boris Ostrovsky 07/23/17 4:14 AM >>>
> @@ -1050,17 +1120,42 @@ static void scrub_free_pages(unsigned int node)
> -if (
>>> Boris Ostrovsky 07/23/17 4:28 AM >>>
>On 06/27/2017 03:28 PM, Jan Beulich wrote:
> Boris Ostrovsky 06/22/17 8:56 PM >>>
>>> +static void check_and_stop_scrub(struct page_info *head)
>>> +{
>>> +if ( head->u.free.scrub_state ==
A previous patch introduced a new HYPERVISOR_memory_op to acquire guest
resources for direct priv-mapping.
This patch adds new functionality into libxenforeignmemory to make use
of a new privcmd ioctl [1] that uses the new memory op to make such
resources available via mmap(2).
[1]
There is a substantial amount of code duplicated between the x86 and arm
implementations of mm.c:xenmem_add_to_physmap_one() for
XENMAPSPACE_grant_table. Also, the code in question looks like it really
should be in common/grant_table.c
This patch introduces a new function in common/grant_table.c
Certain memory resources associated with a guest are not necessarily
present in the guest P2M and so are not necessarily available to be
foreign-mapped by a tools domain unless they are inserted, which risks
shattering a super-page mapping.
This patch adds a new memory op to allow such resourced
This series introduces support for direct mapping of guest resources.
Mapping is currently limited to grant tables but support for other resources
will be added by subsequent patches.
Paul Durrant (5):
arch/[x86|arm]: remove code duplication
x86/mm: allow a privileged PV domain to map guest
In the case where a PV domain is mapping guest resources then it needs make
the HYPERVISOR_mmu_update call using DOMID_SELF, rather than the guest
domid, so that the passed in gmfn values are correctly treated as mfns
rather than gfns present in the guest p2m.
This patch removes a check which
A previous patch added support for priv-mapping guest resources directly
(rather than having to foreign-map, which requires P2M modification for
HVM guests).
This patch makes use of the new API to seed the guest grant table unless
the underlying infrastructure (i.e. privcmd) doesn't support it,
On 02/08/17 12:12, Waseem, Amna wrote:
> Hello All,
>
> Can anyone tell me how xenstore filesystem gets populated about information
> about Dom0.
see tools/helpers/xen-init-dom0.c
> Which function or script creates node for local domain?
see tools/libxl/ (various source files)
> I want to
Hey, apologies in advance, for the very long email! :-O
On Tue, 2017-08-01 at 12:13 -0700, Stefano Stabellini wrote:
> Given the description below, it's possible that the new timer has to
> fire several times before the callback can be finally invoked, right?
>
> I would make some measurements
>>> Konrad Rzeszutek Wilk 07/31/17 6:04 PM >>>
>On Mon, Jul 31, 2017 at 07:55:34AM -0600, Jan Beulich wrote:
>> >>> Konrad Rzeszutek Wilk 07/26/17 9:50 PM >>>
>> >--- a/docs/misc/livepatch.markdown
>> >+++ b/docs/misc/livepatch.markdown
>> >@@ -279,6
Hello All,
Can anyone tell me how xenstore filesystem gets populated about information
about Dom0. Which function or script creates node for local domain?
I want to statically configure the xenstore about guest parameters. I want to
statically create nodes before bringing up xenstored daemon.
On 01/08/17 21:45, Andy Lutomirski wrote:
> On Tue, Aug 1, 2017 at 3:39 AM, Juergen Gross wrote:
>> When running as Xen pv-guest the exception frame on the stack contains
>> %r11 and %rcx additional to the other data pushed by the processor.
>>
>> Instead of having a paravirt op
>>> Razvan Cojocaru 08/01/17 9:22 PM >>>
>Since this seems to be blocked as-is, I propose transforming this patch
>into a series, with one patch adding a new return code specifically for
>unsupported instructions (X86_EMUL_UNIMPLEMENTED or
>X86_EMUL_UNSUPPORTED?), and
Is possible to achieve GPU virtualization in Intel® Atom using para
virtualization?
From: Roger Pau Monné [roger@citrix.com]
Sent: Wednesday, August 02, 2017 1:04 PM
To: Asharaf Perinchikkal
Cc: xen-devel@lists.xen.org; Anoop Babu
Subject: Re:
Hi,
On 01/08/17 20:07, Stefano Stabellini wrote:
On Tue, 1 Aug 2017, Oleksandr Andrushchenko wrote:
Hi, Stefano!
On 07/31/2017 11:28 PM, Stefano Stabellini wrote:
On Mon, 31 Jul 2017, Oleksandr Andrushchenko wrote:
3 Sharing with page exchange (XENMEM_exchange)
>>> David Woodhouse 07/31/17 5:57 PM >>>
>There is a first call to efi_arch_relocate_image(0) before the
>ExitBootServices() call. However I'm missing something because I can't
>see how that call achieves anything *other* than to trigger the fault
>we're concerned about.
>
>>> Boris Ostrovsky 07/31/17 6:03 PM >>>
On 07/31/2017 10:45 AM, Jan Beulich wrote:
Boris Ostrovsky 07/23/17 4:01 AM >>>
>> On 06/27/2017 01:06 PM, Jan Beulich wrote:
>> Boris Ostrovsky 06/22/17 8:55 PM
On Mon, Jun 26, 2017 at 3:37 PM, Andrew Cooper
wrote:
> On 26/06/17 14:00, Andrew Cooper wrote:
>> On 26/06/17 13:55, Olaf Hering wrote:
>>> If the default compiler silently defaults to to -fPIC/-fPIE building
>>> rombios fails:
>>>
>>> ld -melf_i386 -s -r 32bitbios.o
On 08/01/2017 07:34 PM, Andrew Cooper wrote:
> On 31/07/2017 20:49, Konrad Rzeszutek Wilk wrote:
>> On Wed, Jul 05, 2017 at 02:22:00PM +0100, Joao Martins wrote:
>>> On 07/05/2017 12:16 PM, Andrew Cooper wrote:
On 05/07/17 10:46, Joao Martins wrote:
> Hey Andrew,
>
> On 07/04/2017
Hello Edgar,
On 01.08.17 20:13, Edgar E. Iglesias wrote:
Are master ports behind IOMMU?
Yes, they are.
What IOMMU IP is used?
It's possible to reprogram the configuration of the PL and swap accelerators in
and out on the fly. It's probably going to be too slow for trying to
context switch
On Wed, 2017-08-02 at 11:34 +0100, Joao Martins wrote:
> On 08/01/2017 07:34 PM, Andrew Cooper wrote:
> > > On Wed, Jul 05, 2017 at 02:22:00PM +0100, Joao Martins wrote:
> > > >
> > > > There could be other uses too on passing this info to Xen, say
> > > > e.g. the
> > > > scheduler knowing the
On Wed, Aug 2, 2017 at 1:49 PM, Dario Faggioli
wrote:
> On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
>> This series of patches enable the toolstack to
>> set and get per-VCPU work-conserving flag.
>> With the toolstack, system administrators can decide
>> which
When more than one idle VCPUs that have the same PCPU as their
previous running core invoke runq_tickle(), they will tickle the same
PCPU. The tickled PCPU will only pick at most one VCPU, i.e., the
highest-priority one, to execute. The other VCPUs will not be
scheduled for a period, even when
On Wed, Aug 2, 2017 at 1:46 PM, Dario Faggioli
wrote:
> Hey, Meng!
>
> It's really cool to see progress on this... There was quite a bit of
> interest in scheduling in general at the Summit in Budapest, and one
> important thing for making sure RTDS will be really
+Hongbo from Intel GPU virtualization team
On 08/02/17 09:41 +, Asharaf Perinchikkal wrote:
> Is possible to achieve GPU virtualization in Intel® Atom using para
> virtualization?
>
> From: Roger Pau Monné [roger@citrix.com]
> Sent: Wednesday,
This patch implements the CPU init flow for CDP. The flow is almost
same as L3 CAT.
Signed-off-by: Yi Sun
---
v15:
- refine process in 'psr_cpu_init' to remove the 'goto'.
(suggested by Jan Beulich)
v14:
- remove the 'Notes' in commit message because a
On Wed, 2017-08-02 at 05:56 -0600, Jan Beulich wrote:
> >
> > >
> > > >
> > > > David Woodhouse 08/02/17 1:30 PM >>>
> > --- a/xen/arch/x86/efi/efi-boot.h
> > +++ b/xen/arch/x86/efi/efi-boot.h
> > @@ -87,7 +87,8 @@ static void __init efi_arch_relocate_image(unsigned long
The function is invoked with delta=0 before ExitBootServices() is called,
as a dummy run purely to validate that all the relocations can be handled.
This allows us to exit gracefully with an error message.
However, we have relocations in read-only sections such as .rodata and
.init.te(xt). Recent
On Wed, 2017-08-02 at 03:17 -0600, Jan Beulich wrote:
>
> >... but then again, if the whole function is really doing nothing at
> >all when invoked with delta==0 then perhaps it would just be easier to
> >remove the first pass altogether. I feel sure I'm missing something,
>
> The reason is even
>>> Roger Pau Monne 06/30/17 5:01 PM >>>
>Add handlers for the MSI control, address, data and mask fields in
>order to detect accesses to them and setup the interrupts as requested
>by the guest.
>
>Note that the pending register is not trapped, and the guest can
>freely
And provide a helper in TestSupport to use it. This allows osstest to
set host properties from test script themselves (instead of using
the mg-hosts clu).
Note that the setting of host properties is limited to flights with
intended blessing real, and it will fail for any other blessing.
The intended usage is to run this script against every host in order
to record the possible needed memdisk flags.
Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
---
Changes since v1:
- Get the arch of the job and exit with 0 if it's not
On Wed, Aug 02, 2017 at 02:07:17PM +0300, Andrii Anisov wrote:
> Hello Edgar,
Hi Andrii,
>
>
> On 01.08.17 20:13, Edgar E. Iglesias wrote:
> >>Are master ports behind IOMMU?
> >Yes, they are.
> What IOMMU IP is used?
Today it's an SMMUv2.
>
> >>>It's possible to reprogram the configuration
Hi Florian,
Sorry for the late answer.
On 26/07/17 14:12, Florian Jakobsmeier wrote:
Hello,
i was just testing the single step implementation and realized that the
before mentioned solution is not fully working. I'm still trying to
enable SS for a VM on Xen.
Would you mind sharing the
On 01.08.2017 19:07, Tamas K Lengyel wrote:
On Tue, Aug 1, 2017 at 4:30 AM, Andrew Cooper wrote:
On 01/08/17 10:46, Alexandru Isaila wrote:
Allow guest userspace code to request that a vm_event be sent out
via VMCALL. This functionality seems to be handy for a
On 31/07/17 13:22, Wei Liu wrote:
> A document for the release manager.
>
> Signed-off-by: Wei Liu
With two minor corrections (see below):
Reviewed-by: Juergen Gross
> ---
> docs/process/xen-release-management.pandoc | 594
>
On Tue, Aug 1, 2017 at 4:00 PM, Wei Liu wrote:
> On Tue, Aug 01, 2017 at 02:58:19PM +0300, Oleksandr Grytsov wrote:
>> On Mon, Jul 31, 2017 at 5:36 PM, Wei Liu wrote:
>> > On Sun, Jul 30, 2017 at 09:42:09PM +0300, Oleksandr Grytsov wrote:
>> >> On Fri,
This is needed in order to figure out which memdisk options should be
used to boot the images on each specific box.
Note that when passed the --recordappend argument upon success the
script stores the tentative host property in the runvars.
Signed-off-by: Roger Pau Monné
Hook the memdisk parameter detection and the saving of the host
properties into the examine jobs.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
- Do not pass a host ident to ts-examine-hostprops-save.
- Use .- for ts-memdisk-try-append so that the rest of the job
Hello,
This is the remaining memdisk examine series (ie: starting with the
first non-acked patch) and it's rebased on top of the previous FreeBSD
host install series.
The series expands the examine flight in order to test which memdisk
options should be used for each host. Hopefully all of this
This script turns the properties stored in the runvars using the
format hostprop/$ident/$prop=$val into host properties stored in the
database.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
- Call selecthost based on the idents passed in the putative
hostprops
So that it can also be used by make-hosts-flight. No functional change
intended.
Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
---
make-freebsd-flight | 31 ---
mfi-common | 31
This is used to store tentative host properties in the runvars of a
job, with the expectation that at some point (ie: at the end of the
job) they will be turned into real properties stored in the database.
Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
This is needed in order to run the memdisk test.
Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
---
make-hosts-flight | 3 +++
1 file changed, 3 insertions(+)
diff --git a/make-hosts-flight b/make-hosts-flight
index 0152dfe1..d5670857
On 01/08/17 16:28, PGNet Dev wrote:
> On 7/28/17 9:02 AM, PGNet Dev wrote:
>> On 7/27/17 11:23 PM, Juergen Gross wrote:
>>> Can you please post the domain's config file used to create the domain
>>> and the kernel config?
>>
>> Sure.
>>
>>https://pastebin.com/M6cr2pX7
>>
>
> Any add'l info
>>> Yi Sun 08/01/17 11:04 AM >>>
>@@ -1278,15 +1339,31 @@ static void psr_cpu_init(void)
>cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 0, ®s);
>if ( regs.b & PSR_RESOURCE_TYPE_L3 )
>{
>+bool do_l3_cat_init = true;
>+
>cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 1, ®s);
>
On 02.08.17 15:58, Edgar E. Iglesias wrote:
Today it's an SMMUv2.
You would need to implement additional ops like [1].
I don't necessarily think so. The context-switch would involve saving and
restoring accelerator state aswell as re-programming the PL.
With allocate/release, we only need to
>>> Roger Pau Monne 06/30/17 5:01 PM >>>
>Note that accesses to the Table Offset, Table BIR, PBA Offset and PBA
>BIR are not trapped by Xen at the moment.
They're mandated r/o by the spec anyway.
>@@ -113,6 +148,35 @@ static int vpci_modify_bar(struct domain *d, const
On 08/02/2017 05:24 AM, Jan Beulich wrote:
Boris Ostrovsky 07/31/17 6:03 PM >>>
> On 07/31/2017 10:45 AM, Jan Beulich wrote:
> Boris Ostrovsky 07/23/17 4:01 AM >>>
>>> On 06/27/2017 01:06 PM, Jan Beulich wrote:
>>> Boris
Hi,
I've just pushed QEMU v2.9.0 to our qemu-xen tree.
Regards,
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 17-08-02 06:35:46, Jan Beulich wrote:
> >>> Yi Sun 08/01/17 11:04 AM >>>
> >@@ -1278,15 +1339,31 @@ static void psr_cpu_init(void)
> >cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 0, ®s);
> >if ( regs.b & PSR_RESOURCE_TYPE_L3 )
> >{
> >+bool do_l3_cat_init = true;
>
>>> David Woodhouse 08/02/17 4:45 PM >>>
>On Wed, 2017-08-02 at 07:58 -0600, Jan Beulich wrote:
>> > > > David Woodhouse 08/02/17 2:11 PM >>>
>> > This change is sufficient (we believe) to make EFI builds of Xen
>> > actually boot again on current EDK2,
>>> Yi Sun 08/02/17 5:12 PM >>>
>On 17-08-02 06:35:46, Jan Beulich wrote:
>> >>> Yi Sun 08/01/17 11:04 AM >>>
>> >@@ -1278,15 +1339,31 @@ static void psr_cpu_init(void)
>> >cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 0, ®s);
>> >if ( regs.b &
>>> David Woodhouse 08/02/17 2:11 PM >>>
>On Wed, 2017-08-02 at 05:56 -0600, Jan Beulich wrote:
>> > > > David Woodhouse 08/02/17 1:30 PM >>>
>> > --- a/xen/arch/x86/efi/efi-boot.h
>> > +++ b/xen/arch/x86/efi/efi-boot.h
>> > @@ -87,7 +87,8 @@ static void
>>> Roger Pau Monne 06/30/17 5:02 PM >>>
>--- a/xen/drivers/vpci/header.c
>+++ b/xen/drivers/vpci/header.c
>@@ -459,7 +459,7 @@ static int vpci_init_bars(struct pci_dev *pdev)
>return 0;
>}
>
>-REGISTER_VPCI_INIT(vpci_init_bars);
>+REGISTER_VPCI_INIT(vpci_init_bars,
On Wed, 2017-08-02 at 07:58 -0600, Jan Beulich wrote:
> > > > David Woodhouse 08/02/17 2:11 PM >>>
> > This change is sufficient (we believe) to make EFI builds of Xen
> > actually boot again on current EDK2, is it not?
>
> It is safe / sufficient only with the specific
>>> David Woodhouse 08/02/17 1:30 PM >>>
>--- a/xen/arch/x86/efi/efi-boot.h
>+++ b/xen/arch/x86/efi/efi-boot.h
>@@ -87,7 +87,8 @@ static void __init efi_arch_relocate_image(unsigned long
>delta)
>case PE_BASE_RELOC_DIR64:
>if ( in_page_tables(addr) )
>blexit(L"Unexpected
During creating of a HVM domU meminit_hvm() tries to map superpages.
After save/restore or migration this mapping is lost, everything is
allocated in single pages. This causes a performance degradition after
migration.
Add neccessary code to preallocate a superpage for the chunk of pfns
that is
On Thu, Jul 20, 2017 at 7:26 AM, Thomas Garnier wrote:
> On Wed, Jul 19, 2017 at 4:33 PM, H. Peter Anvin wrote:
>> On 07/19/17 11:26, Thomas Garnier wrote:
>>> On Tue, Jul 18, 2017 at 8:08 PM, Brian Gerst wrote:
On Tue, Jul 18, 2017
On Wed, Aug 2, 2017 at 9:42 AM, Thomas Garnier wrote:
> I noticed that not only we have the problem of gs:0x40 not being
> accessible. The compiler will default to the fs register if
> mcmodel=kernel is not set.
>
> On the next patch set, I am going to add support for
>
Hi,
Thanks for the invite, please find the presentation here:
https://docs.google.com/presentation/d/1PhK9bdLyY_DSr8RbSs7LDdLWADbSW7YGwwnkpMLWeQg/edit#slide=id.g24c05965d7_0_15
Regards,
Mirela
On Tue, Aug 1, 2017 at 7:43 PM, Stefano Stabellini
wrote:
> On Tue, 1 Aug
On Wed, 2017-08-02 at 09:16 -0600, Jan Beulich wrote:
>
> Well, I've seen breakage in all sorts of places I wouldn't have expected
> anyone to fine a need to fiddle with.
This is the nature of 'value subtract', I suppose.
How about something like this? Somewhat complicated by the fact that
Just a reminder that we are going to use the following conf bridge:
Join the call: https://www.uberconference.com/stefano-stabellini
US dial-in number: 669-999-0613
No PIN needed
For the international numbers, go to
https://www.uberconference.com/stefano-stabellini and choose "Join by
Phone", a
On Tue, 2017-08-01 at 15:24 -0400, Meng Xu wrote:
> The initial discussion of this patch can be found at
> https://lists.xenproject.org/archives/html/xen-devel/2017-02/msg02857
> .html
>
> Changes in v4:
> 1) Take Dario's suggestions:
> Search the new->cpu first for the cpu to tickle.
>
Hey, Meng!
It's really cool to see progress on this... There was quite a bit of
interest in scheduling in general at the Summit in Budapest, and one
important thing for making sure RTDS will be really useful, is for it
to have a work conserving mode! :-)
On Tue, 2017-08-01 at 14:13 -0400, Meng
Hi, Kevin
On Wed, Aug 2, 2017 at 9:12 AM, Tian, Kevin wrote:
>> From: Oleksandr Tyshchenko [mailto:olekst...@gmail.com]
>> Sent: Tuesday, August 1, 2017 7:08 PM
>>
>> Hi, Kevin
>>
>> On Tue, Aug 1, 2017 at 6:06 AM, Tian, Kevin wrote:
>> >> From:
On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote:
> This series of patches enable the toolstack to
> set and get per-VCPU work-conserving flag.
> With the toolstack, system administrators can decide
> which VCPUs will be made work-conserving.
>
Thanks for this series as well, Meng. I'll look at
pci_device_id are not supposed to change at runtime. All functions
working with pci_device_id provided by work with
const pci_device_id. So mark the non-const structs as const.
Signed-off-by: Arvind Yadav
---
drivers/xen/platform-pci.c | 2 +-
1 file changed, 1
On Wed, Aug 2, 2017 at 9:56 AM, Kees Cook wrote:
> On Wed, Aug 2, 2017 at 9:42 AM, Thomas Garnier wrote:
>> I noticed that not only we have the problem of gs:0x40 not being
>> accessible. The compiler will default to the fs register if
>>
Hi,
On 01/08/17 00:53, Stefano Stabellini wrote:
On Mon, 31 Jul 2017, Edgar E. Iglesias wrote:
@role Can only be 'master' or 'slave', it defaults to 'slave'.
@prot When @role = master, this means the largest set of
stage-2 permission
81 matches
Mail list logo