flight 103385 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103385/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284
Tests which
flight 103312 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103312/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-pair 9 xen-boot/src_hostfail REGR. vs. 101675
test-amd64-i386-libv
Since VMIDs are related to 2nd stage address translation, it makes more sense
to move the call to p2m_vmid_allocator_init(), which initializes the vmid
allocation bitmap, inside setup_virt_paging(), where 2nd stage address
translation
is set up.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Julie
VMID space is increased to 16-bits from 8-bits in ARMv8 8.1 revision.
This allows more than 256 VMs to be supported by Xen.
This change adds support for 16-bit VMIDs in Xen based on whether the
architecture supports it.
Signed-off-by: Bhupinder Thakur
---
xen/arch/arm/p2m.c | 45 ++
Hi Julien,
On 13 December 2016 at 19:43, Julien Grall wrote:
> Hi Bhupinder,
>
> On 12/12/16 07:26, Bhupinder Thakur wrote:
>
> [...]
>
>> -void p2m_vmid_allocator_init(void)
>> +int p2m_vmid_allocator_init(void)
>> {
>> -set_bit(INVALID_VMID, vmid_mask);
>> +int ret = 0;
>> +
>> +/
flight 103378 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103378/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284
Tests which
> On Dec 15, 2016, at 8:18 AM, Dario Faggioli wrote:
> Oh, and I see that you are both inlining in the email and attaching the
> patch. I personally don't particularly mind, but that may make the life
> of a committer (the person which, when the patch will have all the
> Acks, will put it inside
On Wed, Dec 14, 2016 at 8:05 PM, Julien Grall wrote:
>>> Note that ARM does not provide any hardware instruction to translate
>>> an IPA (guest physical address) to a PA. So we have a walker there.
>>>
>>> We also a walk for debugging guest page table (though only when it is
>>> using LPAE). I gue
flight 103373 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103373/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284
Tests which
On 12/13/2016 02:24 PM, Andrew Cooper wrote:
Hello,
All of this came about while reviewing some of Jans improvements to the
x86 instruction emulator.
It turns out that the XSA-156 / CVE-2015-8104 fix, c/s bd2239d9
"x86/HVM: always intercept #AC and #DB", introduced an awkward bug on
Intel har
The locking order is: first rank lock, then vgic lock. The order is
respected everywhere, except for gic_update_one_lr.
gic_update_one_lr is called with the vgic lock held, but it calls
vgic_get_target_vcpu, which tries to obtain the rank lock. This can
cause deadlocks.
We already have a version
flight 103364 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103364/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284
Tests which
Hello!
Glad to see he patch here. One thing, about the subject line: it should
contains "tags", i.e., an indication of the component that the patch
affects.
So, for example, in this case, the patch touches Credit1, which means
scheduling inside Xen. So, a valid subject line could be:
[PATCH] xe
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-pair
testid xen-boot/dst_host
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-pair
testid xen-boot/src_host
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional
Hey Konrad,
it looks like you forgot about this.
Cheers,
Stefano
On Fri, 18 Nov 2016, Konrad Rzeszutek Wilk wrote:
> That way we have one person who can: a) poke other maintainers
> or pull them in with new drivers are introduced, b) we have
> one maintainer who can shepherd the patches along i
This run is configured for baseline tests only.
flight 68221 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68221/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf dc756baeda55490202f3150a8821b5164e906451
baseline v
flight 103311 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103311/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-3 20 xtf/test-hvm32-invlpg~shadow fail REGR. vs. 102521
test-xtf-amd64-
flight 103356 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103356/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284
Tests which
On Wed, Dec 14, 2016 at 03:59:00PM +0100, Dario Faggioli wrote:
> On Tue, 2016-12-13 at 19:00 +, Julien Grall wrote:
> > Hi all,
> >
> > Stefano suggested to move the call at 5pm and I haven't seen any
> > disagreement.
> >
> > So the call will be tomorrow (Wednesday 14th December at 5pm).
On Wed, Dec 14, 2016 at 11:12 AM, Ian Jackson wrote:
> Kevin Grittner writes ("Re: [HACKERS] [OSSTEST PATCH 0/1] PostgreSQL db:
> Retry on constraint violation [and 2 more messages] [and 1 more messages]"):
>> On Wed, Dec 14, 2016 at 10:20 AM, Ian Jackson
>> wrote:
>> I would alter that slight
On 12/12/2016 09:00 AM, Anshul Makkar wrote:
During guest migrate allow permission to prevent
spurious page faults.
Prevents these errors:
d73: Non-privileged (73) attempt to map I/O space
avc: denied { set_misc_info } for domid=0 target=11
scontext=system_u:system_r:dom0_t
tcontext=sy
On 12/09/2016 11:17 AM, Cédric Bosdonnat wrote:
vtpm.txt is referenced in xl.cfg man page. Convert it to pod,
move it to the man folder and update the reference.
Signed-off-by: Cédric Bosdonnat
Since this manpage only describes Xen's vTPM implementation, and
Xen is not the only vTPM that exis
On Wed, Dec 14, 2016 at 01:16:00PM -0500, Konrad Rzeszutek Wilk wrote:
> On Wed, Dec 14, 2016 at 07:51:52AM +, Ross Lagerwall wrote:
> > Hi all,
> >
> > This series contains a few fixes to the xen-livepatch tool.
> > It also contains a few changes to make the output more readable.
>
> Hey Ros
The patch gets rid of a redundant check in csched_vcpu_acct which adds
more code clarity and performance. This patch also adds an ASSERT to
the same effect, in order to make assumption ( i.e., no calling this on
idle vcpus) even more clear and as a guard for future mis-use.
Signed-off-by: Praveen
flight 103342 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103342/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284
Tests which
On Wed, Dec 14, 2016 at 07:51:52AM +, Ross Lagerwall wrote:
> Hi all,
>
> This series contains a few fixes to the xen-livepatch tool.
> It also contains a few changes to make the output more readable.
Hey Ross,
I've applied and reviewed some of the patches. Testing them right now
and if thee
Hey,
Back in the Xen hackaton '16 networking session there were a couple of ideas
brought up. One of them was about exploring permanently mapped grants between
xen-netback/xen-netfront.
I started experimenting and came up with sort of a design document (in pandoc)
on what it would like to be prop
flight 103264 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103264/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 101737
test-amd64-i386-libvi
flight 103270 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103270/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-qcow2 9 debian-di-install fail REGR. vs. 103163
test-armhf-armh
On Wed, Dec 14, 2016 at 11:20 AM, Ian Jackson wrote:
>> I'm not sure Ian is intentionally taking that position. Not all of us
>> are as familiar with the ramifications of every serializability
>> behavior we may want as you are.
>
> Indeed. I think it's fair to say that I'm totally unfamiliar wi
Kevin Grittner writes ("Re: [HACKERS] [OSSTEST PATCH 0/1] PostgreSQL db: Retry
on constraint violation [and 2 more messages] [and 1 more messages]"):
> On Wed, Dec 14, 2016 at 10:20 AM, Ian Jackson
> wrote:
>
> > Let me try to summarise my understanding of what the developers think
> > they can
On Wed, Dec 14, 2016 at 10:20 AM, Ian Jackson wrote:
> Let me try to summarise my understanding of what the developers think
> they can and intend to promise, about SERIALIZABLE transactions:
>
> There is a consistent serialisation of all transactions which
> successfully commit; or which do no
Greg KH writes ("Re: Regression due to "mm/swap.c: flush lru pvecs on compound
page arrival""):
> On Wed, Dec 14, 2016 at 03:14:54PM +, Ian Jackson wrote:
> > Start reading at Dec 14 07:59:33.478093. At Dec 14 08:01:38.294433 a
> > log capture process started sending various debug keys to the
At 16:53 + on 14 Dec (1481734422), Andrew Cooper wrote:
> There are two bugs.
>
> Firstly, the ASSERT(paging_mode_only_log_dirty(d)) can trip when servicing a
> hypervisor #PF in the context of an HVM guest, e.g. a copy_to_user() failure
> in the shadow pagetable code.
>
> Secondly, the entry
There are two bugs.
Firstly, the ASSERT(paging_mode_only_log_dirty(d)) can trip when servicing a
hypervisor #PF in the context of an HVM guest, e.g. a copy_to_user() failure
in the shadow pagetable code.
Secondly, the entry conditions paging_fault() were previously guarded on
!paging_mode_externa
On 14/12/16 15:29, Jan Beulich wrote:
> ops->read_segment() will report whatever is actually there in the
> register, so we need to actively distinguish ES/CS/SS/DS from FS/GS.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel ma
On 14/12/16 14:49, Jan Beulich wrote:
On 14.12.16 at 14:47, wrote:
>> On 14/12/16 13:39, Jan Beulich wrote:
>> On 14.12.16 at 14:28, wrote:
On 14/12/16 13:18, Jan Beulich wrote:
On 14.12.16 at 13:36, wrote:
>> On 14/12/16 09:37, Jan Beulich wrote:
>>> @@ -5205,6 +5
On Wed, Dec 14, 2016 at 03:14:54PM +, Ian Jackson wrote:
> Michal Hocko writes ("Re: Regression due to "mm/swap.c: flush lru pvecs on
> compound page arrival""):
> > On Wed 14-12-16 13:29:56, Ian Jackson wrote:
> > > This commit breaks the test "test-amd64-amd64-xl-qemut-win7-amd64" in
> > > t
This run is configured for baseline tests only.
flight 68219 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68219/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-xtf-amd64-amd64-5 20 xtf/test-hvm32-invlpg~shad
On 12/14/2016 05:18 AM, Haozhong Zhang wrote:
> On 12/14/16 18:11 +0800, Haozhong Zhang wrote:
>> ... because INVALID_PADDR is a more general one.
>>
>> Suggested-by: Jan Beulich
>> Signed-off-by: Haozhong Zhang
>> ---
>> xen/arch/x86/hvm/nestedhvm.c | 2 +-
>> xen/arch/x86/hvm/svm/nestedsvm.
Robert Haas writes ("Re: [HACKERS] [OSSTEST PATCH 0/1] PostgreSQL db: Retry on
constraint violation [and 2 more messages]"):
> On Wed, Dec 14, 2016 at 9:26 AM, Kevin Grittner wrote:
> > considered. Essentially, the position Ian has been taking is that
> > PostgreSQL should provide the guarantee
branch xen-4.4-testing
xenbranch xen-4.4-testing
job test-xtf-amd64-amd64-1
testid leak-check/check
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xen
flight 103293 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103293/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf dc756baeda55490202f3150a8821b5164e906451
baseline version:
ovmf 94a1bc1212edf521b7c96
On Wed, Dec 14, 2016 at 07:29:21PM +0800, Haozhong Zhang wrote:
> Replace vmreturn() by vmsucceed(), vmfail(), vmfail_valid() and
> vmfail_invalid(), which are consistent to the pseudo code on Intel
> SDM, and allow to return VM instruction error numbers to L1
> hypervisor.
>
> Signed-off-by: Haoz
On Wed, Dec 14, 2016 at 03:16:33AM -0700, Jan Beulich wrote:
> >>> On 14.12.16 at 11:11, wrote:
> > ... because INVALID_PADDR is a more general one.
> >
> > Suggested-by: Jan Beulich
> > Signed-off-by: Haozhong Zhang
>
> Reviewed-by: Jan Beulich
>
> Thanks for doing this!
Indeed! Thank you.
On Wed, Dec 14, 2016 at 03:28:49PM +, Andrew Cooper wrote:
> On 14/12/16 15:13, Jan Beulich wrote:
> On 14.12.16 at 15:26, wrote:
> >> Signed-off-by: Andrew Cooper
> >> ---
> >> CC: Jan Beulich
> >> CC: Tim Deegan
> >> CC: George Dunlap
> >> CC: Konrad Rzeszutek Wilk
> >> CC: Stefano
At 14:26 + on 14 Dec (1481725588), Andrew Cooper wrote:
> Signed-off-by: Andrew Cooper
Both patches Acked-by: Tim Deegan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On 14/12/16 15:22, Jan Beulich wrote:
On 14.12.16 at 15:26, wrote:
>> paging_mark_gfn_dirty() actually takes a pfn, even by paramter name. Rename
>> the function and alter the type to pfn_t to match.
>>
>> Push pfn_t into the LOGDIRTY_IDX() macros, and clean up a couple of local
>> variable
ops->read_segment() will report whatever is actually there in the
register, so we need to actively distinguish ES/CS/SS/DS from FS/GS.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -1642,12 +1642,17 @@ static bool is_align
On 14/12/16 15:13, Jan Beulich wrote:
On 14.12.16 at 15:26, wrote:
>> Signed-off-by: Andrew Cooper
>> ---
>> CC: Jan Beulich
>> CC: Tim Deegan
>> CC: George Dunlap
>> CC: Konrad Rzeszutek Wilk
>> CC: Stefano Stabellini
>> CC: Julien Grall
>>
>> The one use of paging_mark_dirty() in com
On Wed 14-12-16 13:29:56, Ian Jackson wrote:
> osstest service owner writes ("[linux-3.18 bisection] complete
> test-amd64-amd64-xl-qemut-win7-amd64"):
> > *** Found and reproduced problem changeset ***
> >
> > Bug is in tree: linux
> > git://git.kernel.org/pub/scm/linux/kernel/git/stable/lin
>>> On 14.12.16 at 15:26, wrote:
> paging_mark_gfn_dirty() actually takes a pfn, even by paramter name. Rename
> the function and alter the type to pfn_t to match.
>
> Push pfn_t into the LOGDIRTY_IDX() macros, and clean up a couple of local
> variable types in paging_mark_pfn_dirty().
>
> Leav
Hi, Jan!
On 12/14/2016 04:59 PM, Jan Beulich wrote:
On 14.12.16 at 15:46, wrote:
Hi, all!
I am trying to map and then unmap grant refs in Dom0 from DomU
which are used for DMA by a real device in Dom0 (x86_64).
Mapping is done with GNTMAP_host_map | GNTMAP_device_map flags
and device can succe
Michal Hocko writes ("Re: Regression due to "mm/swap.c: flush lru pvecs on
compound page arrival""):
> On Wed 14-12-16 13:29:56, Ian Jackson wrote:
> > This commit breaks the test "test-amd64-amd64-xl-qemut-win7-amd64" in
> > the Xen Project CI system.
>
> Could you be more specific about the reg
>>> On 14.12.16 at 15:26, wrote:
> Signed-off-by: Andrew Cooper
> ---
> CC: Jan Beulich
> CC: Tim Deegan
> CC: George Dunlap
> CC: Konrad Rzeszutek Wilk
> CC: Stefano Stabellini
> CC: Julien Grall
>
> The one use of paging_mark_dirty() in common/tmem shows that TMEM currently
> wont compil
>>> On 14.12.16 at 15:11, wrote:
> @@ -1831,10 +1827,17 @@ static int fixup_page_fault(unsigned long addr,
> struct cpu_user_regs *regs)
> return EXCRET_fault_fixed;
> }
>
> -/* Logdirty guests call back into the paging code to update shadows. */
> -if ( paging_mode_lo
On Wed, Dec 14, 2016 at 8:38 AM, Robert Haas wrote:
> On Wed, Dec 14, 2016 at 9:26 AM, Kevin Grittner wrote:
>> Predicate locks
>> from reads within subtransactions are not discarded, even if the
>> work of the subtransaction is otherwise discarded.
>
> Oh, interesting. Just to be clear, I'm no
flight 103336 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103336/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284
Tests which
>>> On 14.12.16 at 15:46, wrote:
> Hi, all!
>
> I am trying to map and then unmap grant refs in Dom0 from DomU
> which are used for DMA by a real device in Dom0 (x86_64).
> Mapping is done with GNTMAP_host_map | GNTMAP_device_map flags
> and device can successfully access the pages and do DMA.
>
On Tue, 2016-12-13 at 19:00 +, Julien Grall wrote:
> Hi all,
>
> Stefano suggested to move the call at 5pm and I haven't seen any
> disagreement.
>
> So the call will be tomorrow (Wednesday 14th December at 5pm).
>
Hey, I'm not sure I will be able join today.
Both my interest and my contri
>>> On 14.12.16 at 14:47, wrote:
> On 14/12/16 13:39, Jan Beulich wrote:
> On 14.12.16 at 14:28, wrote:
>>> On 14/12/16 13:18, Jan Beulich wrote:
>>> On 14.12.16 at 13:36, wrote:
> On 14/12/16 09:37, Jan Beulich wrote:
>> @@ -5205,6 +5206,44 @@ x86_emulate(
>> }
>>> On 14.12.16 at 14:56, wrote:
> On 14/12/16 12:52, Jan Beulich wrote:
> On 14.12.16 at 12:35, wrote:
>>> The assertion about guest paging mode must only apply to guest pagefaults.
>>>
>>> This ASSERT() accidentally also trips if Xen takes a pagefault when in HVM
>>> context, such as a copy
Hi, all!
I am trying to map and then unmap grant refs in Dom0 from DomU
which are used for DMA by a real device in Dom0 (x86_64).
Mapping is done with GNTMAP_host_map | GNTMAP_device_map flags
and device can successfully access the pages and do DMA.
The problem is I cannot unmap the buffer back:
On Wed, Dec 14, 2016 at 9:40 AM, Kevin Grittner wrote:
> On Wed, Dec 14, 2016 at 8:27 AM, Robert Haas wrote:
>> But even after that fix, at the least, you'll still be able to
>> demonstrate the same problem by trapping serialization_failure rather
>> than unique_constraint.
>
> I hope not; the "d
On Tue, Dec 13, 2016 at 10:49:09PM +0100, Samuel Thibault wrote:
> Juergen Gross, on Tue 13 Dec 2016 16:18:07 +0100, wrote:
> > On 13/12/16 16:02, Wei Liu wrote:
> > > After 5623e2d2 ("x86: use unified linker script") the linker script for
> > > x86 build is generated. But the special rule to gener
On Wed, Dec 14, 2016 at 8:27 AM, Robert Haas wrote:
> But even after that fix, at the least, you'll still be able to
> demonstrate the same problem by trapping serialization_failure rather
> than unique_constraint.
I hope not; the "doomed" flag associated with a serializable
transaction should c
Thanks for the reply.
On Wed, Dec 14, 2016 at 9:26 AM, Kevin Grittner wrote:
> considered. Essentially, the position Ian has been taking is that
> PostgreSQL should provide the guarantee of (2) above. As far as I
> can see, that would require using S2PL -- something the community
> ripped out
On Wed, Dec 14, 2016 at 9:05 AM, Alvaro Herrera
wrote:
> Robert Haas wrote:
>> I have not read any database literature on the interaction of
>> serializability with subtransactions. This seems very thorny.
>> Suppose T1 reads A and B and updates A -> A' while concurrently T2
>> reads A and B and
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Tim Deegan
CC: George Dunlap
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Julien Grall
The one use of paging_mark_dirty() in common/tmem shows that TMEM currently
wont compile for ARM.
I considered introducing a common prototype
paging_mark_gfn_dirty() actually takes a pfn, even by paramter name. Rename
the function and alter the type to pfn_t to match.
Push pfn_t into the LOGDIRTY_IDX() macros, and clean up a couple of local
variable types in paging_mark_pfn_dirty().
Leave an explicit comment in vmx_vcpu_flush_pml_buff
On Wed, Dec 14, 2016 at 12:44 AM, Robert Haas wrote:
> On Tue, Dec 13, 2016 at 1:00 PM, Ian Jackson
> wrote:
> Saying that a set of transactions are serializable is equivalent to
> the statement that there is some serial order of execution which would
> have produced results equivalent to the a
The assertion about guest paging mode must only apply to guest pagefaults, as
should the later call to paging_fault().
This ASSERT() accidentally also trips if Xen takes a pagefault when in HVM
context, such as a copy_to_user() failure in the shadow pagetable code.
Merge the ASSERT() into the lat
Robert Haas wrote:
> I have not read any database literature on the interaction of
> serializability with subtransactions. This seems very thorny.
> Suppose T1 reads A and B and updates A -> A' while concurrently T2
> reads A and B and updates B -> B'. This is obviously not
> serializable; if ei
On 14/12/16 12:52, Jan Beulich wrote:
On 14.12.16 at 12:35, wrote:
>> The assertion about guest paging mode must only apply to guest pagefaults.
>>
>> This ASSERT() accidentally also trips if Xen takes a pagefault when in HVM
>> context, such as a copy_to_user() failure in the shadow pagetabl
On 12/14/16 11:55 +, Andrew Cooper wrote:
On 14/12/16 11:29, Haozhong Zhang wrote:
Replace vmreturn() by vmsucceed(), vmfail(), vmfail_valid() and
vmfail_invalid(), which are consistent to the pseudo code on Intel
SDM, and allow to return VM instruction error numbers to L1
hypervisor.
Signe
On 14/12/16 13:34, Jan Beulich wrote:
On 14.12.16 at 12:20, wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -2765,6 +2765,7 @@ x86_emulate(
>> if ( mode_64bit() && (op_bytes == 4) )
>> op_bytes = 8;
>>
On 14/12/16 13:39, Jan Beulich wrote:
On 14.12.16 at 14:28, wrote:
>> On 14/12/16 13:18, Jan Beulich wrote:
>> On 14.12.16 at 13:36, wrote:
On 14/12/16 09:37, Jan Beulich wrote:
> @@ -5205,6 +5206,44 @@ x86_emulate(
> }
> break;
>
> +case
Hi Stefano
On 09.12.16 21:01, Stefano Stabellini wrote:
> On Fri, 9 Dec 2016, Oleksandr Andrushchenko wrote:
>> On 12/09/2016 03:57 PM, Pasi Kärkkäinen wrote:
>>> On Fri, Dec 09, 2016 at 02:57:04PM +0200, Oleksandr Andrushchenko wrote:
>> Should we have a section on new PV drivers? If so, I s
On Tue, Dec 13, 2016 at 07:14:27PM -0600, Jiandi An wrote:
> Hi Guys,
>
> Xen currently does not handle mapping of MMIO regions specified under
> OperationRegion in ACPI ASL. OperationRegion is well defined in ACPI
> specification. I'm seeking for architectural direction on adding support for
On Wed 14-12-16 13:29:56, Ian Jackson wrote:
> osstest service owner writes ("[linux-3.18 bisection] complete
> test-amd64-amd64-xl-qemut-win7-amd64"):
> > *** Found and reproduced problem changeset ***
> >
> > Bug is in tree: linux
> > git://git.kernel.org/pub/scm/linux/kernel/git/stable/lin
>>> On 14.12.16 at 14:28, wrote:
> On 14/12/16 13:18, Jan Beulich wrote:
> On 14.12.16 at 13:36, wrote:
>>> On 14/12/16 09:37, Jan Beulich wrote:
@@ -5205,6 +5206,44 @@ x86_emulate(
}
break;
+case X86EMUL_OPC_F3(0x0f, 0xae): /* Grp15 */
+
>>> On 14.12.16 at 12:20, wrote:
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -2765,6 +2765,7 @@ x86_emulate(
> if ( mode_64bit() && (op_bytes == 4) )
> op_bytes = 8;
> seg = (b >> 3) & 7;
> +ASSERT(is_x86
On 14/12/16 13:21, Jan Beulich wrote:
On 14.12.16 at 14:15, wrote:
>> On 14/12/16 12:58, Jan Beulich wrote:
>> On 14.12.16 at 12:12, wrote:
When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the
EFI runtime instead of rebooting.
>>> Has it been understood what t
alexander.le...@verizon.com writes ("RE: megaraid_sas regression in linux-3.18
[and 1 more messages]"):
> Added 5e5ec1759dd6 to the 3.18 queue, thanks!
How often does this queue get flushed ?
Thanks,
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen
osstest service owner writes ("[linux-3.18 bisection] complete
test-amd64-amd64-xl-qemut-win7-amd64"):
> *** Found and reproduced problem changeset ***
>
> Bug is in tree: linux
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
> Bug introduced: a2d8c514753276394d6841
On 14/12/16 13:18, Jan Beulich wrote:
On 14.12.16 at 13:36, wrote:
>> On 14/12/16 09:37, Jan Beulich wrote:
>>> @@ -5205,6 +5206,44 @@ x86_emulate(
>>> }
>>> break;
>>>
>>> +case X86EMUL_OPC_F3(0x0f, 0xae): /* Grp15 */
>>> +{
>>> +unsigned long cr4;
>>> +
>
On Fri, Dec 09, 2016 at 01:57:13PM +0100, Daniel Kiper wrote:
> On Tue, Dec 06, 2016 at 11:52:48PM +0100, Daniel Kiper wrote:
> > Hi,
> >
> > This updated patch series adds description of the Multiboot2 protocol new
> > features and fixes some issues found here and there.
> >
> > It applies to mult
>>> On 14.12.16 at 13:36, wrote:
> On 14/12/16 09:37, Jan Beulich wrote:
>> @@ -5205,6 +5206,44 @@ x86_emulate(
>> }
>> break;
>>
>> +case X86EMUL_OPC_F3(0x0f, 0xae): /* Grp15 */
>> +{
>> +unsigned long cr4;
>> +
>> +fail_if(modrm_mod != 3);
>
> This sh
On 14/12/16 13:10, Andrew Cooper wrote:
> On 14/12/16 13:07, Jan Beulich wrote:
>> Older binutils don't have this at all, and newer may not have it
>> configured in.
>>
>> Signed-off-by: Jan Beulich
>
> Reviewed-by: Andrew Cooper , although
>
>> --- a/build/gen.mk
>> +++ b/build/gen.mk
>> @@ -40,6
On 14/12/16 12:58, Jan Beulich wrote:
On 14.12.16 at 12:12, wrote:
>> When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the
>> EFI runtime instead of rebooting.
> Has it been understood what the #GP is due to? I.e. is it namely
> not because of a mis-aligned SSE instruction m
On 14/12/16 13:07, Jan Beulich wrote:
> Older binutils don't have this at all, and newer may not have it
> configured in.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper , although
>
> --- a/build/gen.mk
> +++ b/build/gen.mk
> @@ -40,6 +40,8 @@ install: install-each-env info.json
>
Older binutils don't have this at all, and newer may not have it
configured in.
Signed-off-by: Jan Beulich
--- a/build/gen.mk
+++ b/build/gen.mk
@@ -40,6 +40,8 @@ install: install-each-env info.json
@$(INSTALL_DIR) $(DESTDIR)$(xtftestdir)/$(NAME)
$(INSTALL_DATA) info.json $(DESTD
>>> On 14.12.16 at 12:12, wrote:
> When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the
> EFI runtime instead of rebooting.
Has it been understood what the #GP is due to? I.e. is it namely
not because of a mis-aligned SSE instruction memory reference?
Jan
>>> On 14.12.16 at 12:35, wrote:
> The assertion about guest paging mode must only apply to guest pagefaults.
>
> This ASSERT() accidentally also trips if Xen takes a pagefault when in HVM
> context, such as a copy_to_user() failure in the shadow pagetable code.
>
> Signed-off-by: Andrew Cooper
On 14/12/16 09:37, Jan Beulich wrote:
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -432,6 +432,7 @@ typedef union {
> #define CR4_OSFXSR (1<<9)
> #define CR4_OSXMMEXCPT (1<<10)
> #define CR4_UMIP (1<<
On Wed, Dec 14, 2016 at 11:49:34AM +, Andrew Cooper wrote:
> On 14/12/16 11:44, Wei Liu wrote:
> > ... otherwise it returns 0 even if the function fails.
>
> Coverity-ID: 1397121
>
Does it work this way? Coverity does lead to the discovery of this bug,
but this CID doesn't reveal the bug dir
flight 103325 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103325/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-buildfail REGR. vs. 103284
Tests which
Hi Andrew,
On 13/12/16 19:39, Andrew Cooper wrote:
On 13/12/16 18:41, Julien Grall wrote:
On 13/12/16 18:28, Andrew Cooper wrote:
On 12/12/16 23:47, Tamas K Lengyel wrote:
Newer versions of VT-x/SVM may provide additional information on a
vmexit, which include a guest physical address relevant
On 14/12/16 11:13, Jan Beulich wrote:
On 14.12.16 at 11:43, wrote:
>> The movlpd's should be easy to implement. They aren't meaningfully
>> different from their integer counterparts in terms of needs for the
>> emulator.
> Well, the thing here is the increasing complexity of determining
> th
1 - 100 of 172 matches
Mail list logo