>>> On 18.05.17 at 17:38, wrote:
> Modify Config.mk and Kconfig.debug to disable debug by default in
> preparation for late RCs and eventual release.
>
> Signed-off-by: Julien Grall
To avoid pointless code churn on the master branch, shouldn't this
be done only after (or even while) branching?
>>> On 18.05.17 at 20:35, wrote:
> On Thu, 18 May 2017, Julien Grall wrote:
>> Hi,
>>
>> On 18/05/17 09:41, Jan Beulich wrote:
>> > The compiler dislikes duplicat "const", and the ones it complains about
>>
>> s/duplicat/duplicate/
>>
>> > look like they we in fact meant to be placed differentl
On 12/29/2016 7:04 AM, Julien Grall wrote:
>
> ### Finding the StreamID and DeviceID
>
> The static table IORT (see [5]) will provide information that will help to
> deduce the StreamID and DeviceID from a given RID.
>
IORT table will also need some information on PCI seg to parse through the
>>> On 18.05.17 at 20:06, wrote:
> On Thu, May 18, 2017 at 11:53 AM, Jan Beulich wrote:
> On 17.05.17 at 22:30, wrote:
>>> On 05/17/2017 07:51 PM, Oleksandr Tyshchenko wrote:
On Wed, May 17, 2017 at 7:01 PM, Jan Beulich wrote:
> Well, if the ARM maintainers insist on baking their o
>>> On 18.05.17 at 19:41, wrote:
> patch #6: As for the current patch, likely the "init" platform
> callback should be extended with
> extra "use_iommu" argument as well as the "iommu_domain_init" API. In
> that case we
> would just pass thought incoming flag to the IOMMU drivers followed by
> upd
>>> On 18.05.17 at 16:23, wrote:
>> > --- a/xen/arch/x86/cpu/vpmu.c
>> > +++ b/xen/arch/x86/cpu/vpmu.c
>> > @@ -859,6 +859,7 @@ static int cpu_callback(
>> > {
>> > vpmu_save_force(vcpu);
>> > vpmu_reset(vpmu, VPMU_CONTEXT_LOADED);
>> > +per_cpu(last_vcpu, cpu) = NUL
>>> On 18.05.17 at 17:12, wrote:
> On 18/05/17 09:41, Jan Beulich wrote:
>> The compiler dislikes duplicat "const", and the ones it complains about
>
> s/duplicat/duplicate/
>
>> look like they we in fact meant to be placed differently.
>>
>> Also fix array_access_okay() (just like on x86), desp
>>> On 18.05.17 at 14:52, wrote:
> On 18/05/17 13:35, Jan Beulich wrote:
>> Intel SDM revision 062 finally makes this explicit.
>>
>> Signed-off-by: Jan Beulich
>
> So it does. Acked-by: Andrew Cooper
I withdraw this patch as being redundant with 96a7cb37b9
("x86emul: MOVNTI does not allow RE
flight 109589 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109589/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf 1538388f283a3cba96c08177413eb415db78921a
baseline version:
xtf 88454e5ece8fc9caa23a2f
flight 109572 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109572/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt-raw 5 xen-install fail in 109552 pass in 109572
test-armhf-armhf-libvirt 5 x
On Wed, 17 May 2017, Juergen Gross wrote:
> On 16/05/17 21:58, Stefano Stabellini wrote:
> > On Tue, 16 May 2017, Juergen Gross wrote:
> >> On 15/05/17 22:35, Stefano Stabellini wrote:
> >>> The pvcalls backend has one ioworker per cpu: the ioworkers are
> >>> implemented as a cpu bound workqueue,
On Mon, May 15, 2017 at 03:46:55PM +0200, Daniel Kiper wrote:
> Hi Julien,
>
> On Mon, May 15, 2017 at 02:43:28PM +0100, Julien Grall wrote:
> > Hi Daniel,
> >
> > On 15/05/17 14:38, Daniel Kiper wrote:
> > >On Sun, May 14, 2017 at 03:43:44PM +0800, fu@linaro.org wrote:
> > >>From: Fu Wei
> >
On 05/18/2017 03:10 PM, Stefano Stabellini wrote:
> On Tue, 16 May 2017, Boris Ostrovsky wrote:
> + ret = xenbus_map_ring_valloc(dev, &req->u.connect.ref, 1, &page);
> + if (ret < 0) {
> + sock_release(map->sock);
> + kfree(map);
> + goto out;
> + }
>
On 18/05/2017 21:02, Manish Jaggi wrote:
In the IORT table using the PCI-RC node, SMMU node and ITS node,
RID->StreamID->Device-ID mapping can be generated.
As per IORT spec toady, same RID can be mapped to different StreamIDs
using two ID Array elements with same RID range but different outp
Hi Julien,
On 5/18/2017 8:27 PM, Julien Grall wrote:
Hello,
On 18/05/17 12:59, Manish Jaggi wrote:
On 2/27/2017 11:42 PM, Julien Grall wrote:
On 02/27/2017 04:58 PM, Shanker Donthineni wrote:
Hi Julien,
Hi Shanker,
Please don't drop people in CC. In my case, any e-mail I am not CCed
are s
On Thu, May 18, 2017 at 05:47:08PM +0100, Ian Jackson wrote:
> Konrad Rzeszutek Wilk writes ("Re: [PATCH v2 6/9] ts-xen-build: Build the
> livepatch test-cases"):
> > > or something ?
> >
> > I ended up doing two patches - one to create an enable_livepatch
> > (in mfi-common) to seed the jobs.
>
On Tue, 16 May 2017, Boris Ostrovsky wrote:
> >>> + ret = xenbus_map_ring_valloc(dev, &req->u.connect.ref, 1, &page);
> >>> + if (ret < 0) {
> >>> + sock_release(map->sock);
> >>> + kfree(map);
> >>> + goto out;
> >>> + }
> >>> + map->ring = page;
> >>> + map->ring_order = m
On 18/05/17 17:40, George Dunlap wrote:
> There are four general areas I think there may be bugs.
>
> ## Unprivileged access to Livepatching hypercalls
>
> ## Bugs in the patch creation tools which create patches with vulnerabilities
>
> ## Bugs in the patch-application code such that vulnerabiliti
Hi all,
Julien, Dario, George and I had a quick meeting to discuss stubdom
scheduling. These are my notes.
Description of the problem: need for a place to run emulators and
mediators outside of Xen, with low latency.
Explanation of what EL0 apps are. What should be their interface with
Xen? Cou
flight 109565 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109565/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358
test-amd64-i386-xl-qe
On Thu, 18 May 2017, Julien Grall wrote:
> Hi,
>
> On 18/05/17 09:41, Jan Beulich wrote:
> > The compiler dislikes duplicat "const", and the ones it complains about
>
> s/duplicat/duplicate/
>
> > look like they we in fact meant to be placed differently.
> >
> > Also fix array_access_okay() (ju
Julien Grall writes ("Re: [PATCH v3 for-4.9 0/3] libxl/devd: bugfixes"):
> On 17/05/17 15:02, Julien Grall wrote:
> > For the last patch, at this stage of the release I would prefer to defer
> > it for Xen 4.10.
After reviewing these, I'd like to make a case for the third patch for
4.9:
I haven't
On Mon, 15 May 2017, Wei Liu wrote:
> On Sat, May 13, 2017 at 10:28:27AM +0800, Zhongze Liu wrote:
> > 2017-05-13 1:51 GMT+08:00 Wei Liu :
> > > Hi Zhongze
> > >
> > > This is a nice write-up. Some comments below. Feel free to disagree with
> > > what I say below, this is more a discussion than pic
Roger Pau Monne writes ("[PATCH v3 for-4.9 3/3] libxl/devd: move the device
allocation/removal code"):
> Move the device addition/removal code to the {add/remove}_device functions.
>
> Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
___
Xen-dev
Hi, all.
On Thu, May 18, 2017 at 11:53 AM, Jan Beulich wrote:
On 17.05.17 at 22:30, wrote:
>> On 05/17/2017 07:51 PM, Oleksandr Tyshchenko wrote:
>>> On Wed, May 17, 2017 at 7:01 PM, Jan Beulich wrote:
Well, if the ARM maintainers insist on baking their own thing every
time we'd
Roger Pau Monne writes ("[PATCH v3 for-4.9 1/3] libxl/devd: fix a race with
concurrent device addition/removal"):
> Current code can free the libxl__device inside of the libxl__ddomain_device
> before the addition has finished if a removal happens while an addition is
> still in process:
Acked-by
Roger Pau Monne writes ("[PATCH v3 for-4.9 2/3] libxl/devd: correctly
manipulate the dguest list"):
> Current code in backend_watch_callback has two issues when manipulating the
> dguest list:
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel
Hi, all.
On Thu, May 18, 2017 at 11:38 AM, Jan Beulich wrote:
On 17.05.17 at 21:52, wrote:
>> On 05/12/2017 03:31 PM, Jan Beulich wrote:
>> On 10.05.17 at 16:03, wrote:
From: Oleksandr Tyshchenko
The presence of this flag lets us know that the guest
has devices whi
Julien Grall writes ("[PATCH] Use non-debug build for Xen 4.9"):
> Modify Config.mk and Kconfig.debug to disable debug by default in
> preparation for late RCs and eventual release.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.o
Ian Jackson writes ("Re: [Xen-devel] [xen-unstable-smoke test] 109547:
tolerable trouble: broken/pass - PUSHED"):
> However, currently, with only two arm64 boxes, I don't think we have
> enough bandwidth to add this to the smoke tests. I have put a note in
> my backlog to revisit this when we hav
On 05/18/2017 11:46 AM, Juergen Gross wrote:
> xen_flush_tlb_all() is used in arch/x86/xen/mmu.c only. Make it static.
>
> Signed-off-by: Juergen Gross
Reviewed-by: Boris Ostrovsky
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen
I forgot to move gpr_switch.S. Here is an updated version.
---8<---
From 58df816b937dc7a3598de01f053a6030e631057e Mon Sep 17 00:00:00 2001
From: Wei Liu
Date: Thu, 18 May 2017 16:18:56 +0100
Subject: [PATCH] x86/traps: move privilege instruction emulation code
Move relevant code to pv/emulate.c.
On Thu, May 18, 2017 at 9:07 AM, Adrian Pop wrote:
> Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a
> domain to change the value of the #VE suppress bit for a page.
>
> Signed-off-by: Adrian Pop
> ---
> xen/arch/x86/hvm/hvm.c | 14
> xen/arch/x86/mm/mem
On 18/05/2017 17:53, "Ian Jackson" wrote:
>George Dunlap writes ("Livepatching and Xen Security"):
>> # Executive summary
>
>I am completely in agreement with your analysis and your conclusions.
Me too. I am not sure though whether we need a vote or lazy consensus.
For Credit2 (see
https://l
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 148 +++
xen/arch/x86/x86_64/traps.c | 149
2 files changed, 148 insertions(+), 149 deletions(-)
diff --git a/xen/arch/x86/pv/traps
And export it via pv/domain.h.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 36
xen/arch/x86/x86_64/traps.c | 37 +
xen/include/asm-x86/pv/domain.h | 5 +
3 files changed, 42
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 18 ++
xen/arch/x86/traps.c| 18 --
2 files changed, 18 insertions(+), 18 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/traps.c
index ff7dd1905f..6876150969 10064
Export hypercall_page_initialise_ring1_kernel as the code is moved.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c| 405
xen/arch/x86/x86_64/compat/traps.c | 416 -
xen/arch/x86/x86_64
Fixed some coding style issues while moving.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 50 +
xen/arch/x86/traps.c| 47 --
2 files changed, 50 insertions(+), 47 deleti
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 56 +
xen/arch/x86/x86_64/traps.c | 56 -
2 files changed, 56 insertions(+), 56 deletions(-)
diff --git a/xen/arch/x86/pv/traps.
And provide an Emacs block.
Signed-off-by: Wei Liu
---
xen/include/asm-x86/traps.h | 20 +++-
1 file changed, 15 insertions(+), 5 deletions(-)
diff --git a/xen/include/asm-x86/traps.h b/xen/include/asm-x86/traps.h
index 7f36f6c1a7..0676e81d1a 100644
--- a/xen/include/asm-x86/tra
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 14 ++
xen/arch/x86/x86_64/traps.c | 14 --
2 files changed, 14 insertions(+), 14 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/traps.c
index b69990c6b7..cb9b3b1425 10064
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 4 ++--
xen/include/asm-x86/traps.h | 6 +++---
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/traps.c
index ea5b543247..c36b650f5f 100644
--- a/xen/arch/x86/p
Fix coding style issues. No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 62 ++---
1 file changed, 43 insertions(+), 19 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/traps.c
index db92f6d520..ea5b543247
Move from x86_64/traps.c to pv/traps.c.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 30 ++
xen/arch/x86/x86_64/traps.c | 30 --
2 files changed, 30 insertions(+), 30 deletions(-)
diff --git a/xen/arch/x8
It needs to be non-static when we split PV specific code out.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/traps.c| 2 +-
xen/include/asm-x86/traps.h | 1 +
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c
index e
Replace bool_t with bool. Delete trailing white spaces. Fix some coding
style issues.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/traps.c | 77 +++-
1 file changed, 40 insertions(+), 37 deletions(-)
diff --git a/xen/arch/x86/tra
And remove the now unused instruction_done in x86/traps.c.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/emulate.c | 51 ++
xen/arch/x86/traps.c | 62 --
xen/include/asm-x86/pv/traps.h | 2
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 36
xen/arch/x86/traps.c| 36
2 files changed, 36 insertions(+), 36 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/traps.
Move relevant code to pv/emulate.c. Export emulate_privileged_op in
pv/traps.h.
Note that read_descriptor is duplicated in emulate.c. The duplication
will be gone once all emulation code is moved.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/Makefile |1 +
xen/arc
The following handlers are moved:
1. do_set_trap_table
2. do_set_debugreg
3. do_get_debugreg
4. do_fpu_taskswitch
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 97 +
xen/arch/x86/traps.c| 94 ---
Fix coding style issues. Replace bool_t with bool. Add spaces around
binary ops. Use unsigned integer for shifting. Eliminate TOGGLE_MODE.
Signed-off-by: Wei Liu
Signed-off-by: Andrew Cooper
---
xen/arch/x86/pv/emulate.c | 123 --
1 file changed, 63 i
And export it in pv/traps.h.
The stub function returns 0 because that represents "unsuccessful
emulation" in the original code.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/emulate.c | 20
xen/arch/x86/traps.c | 20
x
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 73 +
xen/arch/x86/traps.c| 69 --
2 files changed, 73 insertions(+), 69 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/traps.c | 27 +++
xen/arch/x86/traps.c| 27 ---
2 files changed, 27 insertions(+), 27 deletions(-)
diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/traps.c
index 79304704dd
The code is moved to pv/emulate.c. Export emulate_gate_op in
pv/traps.h.
Delete the now unused read_descriptor in x86/traps.c. Duplicate
instruction_done in pv/traps.c.
No functional change.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/emulate.c | 403 +
V3 of the series. Rebased on top of x86-next branch.
Patches are broken down into the smallest trunk possible to ease review and
future rebasing.
git://xenbits.xen.org/people/liuw/xen.git wip.move-traps-v3
Wei Liu (22):
x86/traps: move privilege instruction emulation code
x86/traps: move
George Dunlap writes ("Livepatching and Xen Security"):
> # Executive summary
I am completely in agreement with your analysis and your conclusions.
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Konrad Rzeszutek Wilk writes ("Re: [PATCH v2 3/9] OssTest: Add
target_dir_exists"):
> On Tue, Dec 13, 2016 at 04:24:56PM +, Ian Jackson wrote:
> > Konrad Rzeszutek Wilk writes ("[PATCH v2 3/9] OssTest: Add
> > target_dir_exists"):
> > > We have target_file_exists but not an equivalant one for
Konrad Rzeszutek Wilk writes ("Re: [PATCH v2 6/9] ts-xen-build: Build the
livepatch test-cases"):
> > or something ?
>
> I ended up doing two patches - one to create an enable_livepatch
> (in mfi-common) to seed the jobs.
>
> And then another to piggyback on that.
>
> I am attaching them here (
# Executive summary
* It is important for the Livepatching feature to be declared
"security supported".
* At the moment it's not clear whether we can get osstest support in
by the release or not, or if we did whether that would be considered
sufficient to consider it supported
* I would argue th
flight 109579 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109579/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12 mig
Konrad Rzeszutek Wilk writes ("Re: [PATCH v2 6/9] ts-xen-build: Build the
livepatch test-cases"):
> So I feel like the only way to figure out whether the livepatch tests cases
> can be built is if I check either the version of Xen (4.9 or above say)
> or if an file exists (xen/xen/test/Makefile).
Konrad Rzeszutek Wilk writes ("[PATCH] livepatch/Makefile: Add 'install'
stanza"):
> So that you can do:
>
> DESTDIR=`pwd`/dist/xenlptinstall/usr/lib/debug
> mkdir -p $DESTDIR
> BASEDIR=`pwd`/xen XEN_ROOT=`pwd` make -C xen/test -f `pwd`/xen/Rules.mk
> install
Looking at our other DESTDIR settin
xen_flush_tlb_all() is used in arch/x86/xen/mmu.c only. Make it static.
Signed-off-by: Juergen Gross
---
arch/x86/xen/mmu.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/xen/mmu.c b/arch/x86/xen/mmu.c
index 5e375a5e815f..3be06f3caf3c 100644
--- a/arch/x86/xen/mmu.c
On Thu, May 18, 2017 at 04:38:29PM +0100, Julien Grall wrote:
> Modify Config.mk and Kconfig.debug to disable debug by default in
> preparation for late RCs and eventual release.
>
> Signed-off-by: Julien Grall
Acked-by: Wei Liu
___
Xen-devel mailing
Modify Config.mk and Kconfig.debug to disable debug by default in
preparation for late RCs and eventual release.
Signed-off-by: Julien Grall
---
tools/Rules.mk| 2 +-
xen/Kconfig.debug | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/tools/Rules.mk b/tools/Rules.mk
inde
flight 109561 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109561/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 109516
test-armhf-armhf-libvirt 13 saveresto
Destroying a Xen guest domain while it was doing I/Os via xen-blkback
leaked several resources, including references of the guest's memory
pages.
This patch series addresses those leaks by correcting usage of
reference counts and the sequence when to free which resource.
The series applies on top
The be structure must nor be freed when freeing the blkif structure
isn't done. Otherwise a use-after-free of be when unmapping the ring
used for communicating with the frontend will occur in case of a
late call of xenblk_disconnect() (e.g. due to an I/O still active
when trying to disconnect).
Si
There is no need to use xen_blkif_get()/xen_blkif_put() in the kthread
of xen-blkback. Thread stopping is synchronous and using the blkif
reference counting in the kthread will avoid to ever let the reference
count drop to zero at the end of an I/O running concurrent to
disconnecting and multiple r
Today disconnecting xen-blkback is broken in case there are still
I/Os in flight: xen_blkif_disconnect() will bail out early without
releasing all resources in the hope it will be called again when
the last request has terminated. This, however, won't happen as
xen_blkif_free() won't be called on t
On Thu, May 18, 2017 at 09:48:02AM -0500, Gary R Hook wrote:
> On 05/18/2017 03:16 AM, Roger Pau Monné wrote:
> >
> > So using your example, the config file should look like:
> >
> > extra = "root=/dev/xvda1 console=hvc0"
> > kernel = "/root/64/vmlinuz-4.11.0-pvh+"
> > ramdisk = "/root/64/initrd.
On 18/05/17 15:31, Tim Deegan wrote:
> Hi,
>
> At 15:02 +0100 on 18 May (1495119734), Andrew Cooper wrote:
>> * When fabricating gl1e's from superpages, propagate the protection key as
>>well, so the protection key logic sees the real key as opposed to 0.
>>
>> * Experimentally, the protectio
On Thu, May 18, 2017 at 04:06:33PM +0100, Julien Grall wrote:
> (CC Ian and Wei)
>
I did see this. Ian said he wanted to review this in detail. That's why
I haven't committed them.
> On 17/05/17 15:02, Julien Grall wrote:
> > On 16/05/17 08:59, Roger Pau Monne wrote:
> > > Hello,
> >
> > Hi Rog
Hi Jan,
On 18/05/17 09:01, Jan Beulich wrote:
I think it would be good for 4.9 to build out of the box with this recently
released compiler version.
1: xmalloc: correct _xmalloc_array() indentation
2: x86: fix build with gcc 7
3: arm: fix build with gcc 7
Signed-off-by: Jan Beulich
For the
Hi,
On 18/05/17 09:41, Jan Beulich wrote:
The compiler dislikes duplicat "const", and the ones it complains about
s/duplicat/duplicate/
look like they we in fact meant to be placed differently.
Also fix array_access_okay() (just like on x86), despite the construct
being unused on ARM: -Wint
This adds a wrapper for issuing HVMOP_altp2m_set_suppress_ve from a
domain.
Signed-off-by: Adrian Pop
---
tools/libxc/include/xenctrl.h | 2 ++
tools/libxc/xc_altp2m.c | 24
2 files changed, 26 insertions(+)
diff --git a/tools/libxc/include/xenctrl.h b/tools/libx
As the code stands right now, after DomU has enabled #VE using
HVMOP_altp2m_vcpu_enable_notify, all its pages have the #VE suppress bit
cleared, generating #VEs for any EPT violation. There is currently no
way to change the value of the #VE suppress bit for a page from a
domain; it can only be don
Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a
domain to change the value of the #VE suppress bit for a page.
Signed-off-by: Adrian Pop
---
xen/arch/x86/hvm/hvm.c | 14
xen/arch/x86/mm/mem_access.c| 48 +
xen/
From: Vlad Ioan Topan
The default value for the "suppress #VE" bit set by set_mem_access()
currently depends on whether the call is made from the same domain (the
bit is set when called from another domain and cleared if called from
the same domain). This patch changes that behavior to inherit th
(CC Ian and Wei)
On 17/05/17 15:02, Julien Grall wrote:
On 16/05/17 08:59, Roger Pau Monne wrote:
Hello,
Hi Roger,
The first two patches in the series fix a race with concurrent device
addition/removal and two bugs related to manipulation of the list of
active
domains in the devd subcomman
On 18/05/17 16:38, Roger Pau Monné wrote:
> On Tue, May 16, 2017 at 08:23:17AM +0200, Juergen Gross wrote:
>> Destroying a Xen guest domain while it was doing I/Os via xen-blkback
>> leaked several resources, including references of the guest's memory
>> pages.
>>
>> This patch series addresses tho
This run is configured for baseline tests only.
flight 71343 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71343/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-libvirt 5 libvirt-buildfai
On Thu, 2017-05-18 at 07:16 -0600, Jan Beulich wrote:
> > > > On 18.05.17 at 15:03, wrote:
> >
> > As I said last time, I'd rename cpu_callback() to something less
> > generic, like vpmu_cpu_callback() (or vpmu_cpuhp_callback()).
>
> The vpmu_ prefix is clearly pointless for a static function.
>
Hello,
On 18/05/17 12:59, Manish Jaggi wrote:
On 2/27/2017 11:42 PM, Julien Grall wrote:
On 02/27/2017 04:58 PM, Shanker Donthineni wrote:
Hi Julien,
Hi Shanker,
Please don't drop people in CC. In my case, any e-mail I am not CCed
are skipping my inbox and I may not read them for a while.
On Tue, May 16, 2017 at 08:23:17AM +0200, Juergen Gross wrote:
> Destroying a Xen guest domain while it was doing I/Os via xen-blkback
> leaked several resources, including references of the guest's memory
> pages.
>
> This patch series addresses those leaks by correcting usage of
> reference coun
Julien Grall writes ("Re: [Xen-devel] [xen-4.8-testing test] 109515: tolerable
FAIL - PUSHED"):
> The arm64 jobs are blocked because of the missing ocamlopt
> package. I think testing Xen 4.8 would be good so we may want to
> backport the patch 4d0240e033 "tools: ocaml: In configure, check for
> o
On 05/18/2017 03:16 AM, Roger Pau Monné wrote:
So using your example, the config file should look like:
extra = "root=/dev/xvda1 console=hvc0"
kernel = "/root/64/vmlinuz-4.11.0-pvh+"
ramdisk = "/root/64/initrd.img-4.11.0-pvh+"
builder="hvm"
device_model_version="none"
memory = 4096
name = "sosp
George,
Patch works as expected, no failures on create and no stale iptables
rules after running under the same load that was producing the errors
previously.
Ubuntu 16.04
Linux 3.13.0-83-generic
iptables v1.6.0
Xen 4.6 5 from distro packages
Thanks!
-Tony
On Wed, May 17, 2017 at 7:44 AM, Geor
On Thu, 2017-05-18 at 07:59 -0600, Jan Beulich wrote:
> > > > On 11.05.17 at 19:21, wrote:
> >
> > The patch contains the updated version of rbtree implementation
> > from linux
> > kernel tree containing the fixes so far handled.
>
> I suppose this isn't just fixes, but also enhancements. Furth
Julien Grall writes ("Re: [Xen-devel] [xen-unstable-smoke test] 109547:
tolerable trouble: broken/pass - PUSHED"):
> On 05/17/2017 08:32 PM, osstest service owner wrote:
> > flight 109547 xen-unstable-smoke real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/109547/
> >
> > Failures :
Simon Waterman writes ("Re: [PATCH RFC 0/6] qemu-xen-trad: sasl: add SASL
support to VNC"):
> It's not the QEMU in the stubdom that would need to be newer
> but rather the one that's spawned in domain-0 to provide the
> VNC backend when you use an IOEMU stubdom. As I understand
> it this also nee
Hi Andre,
On 11/05/17 18:53, Andre Przywara wrote:
For each hardware ITS create and initialize a virtual ITS for Dom0.
We use the same memory mapped address to keep the doorbell working.
This introduces a function to initialize a virtual ITS.
We maintain a list of virtual ITSes, at the moment fo
Hi Andre,
On 11/05/17 18:53, Andre Przywara wrote:
Increase the count of MMIO regions needed by one for each ITS Dom0 has
to emulate. We emulate the ITSes 1:1 from the hardware, so the number
is the number of host ITSes.
Signed-off-by: Andre Przywara
Acked-by: Julien Grall
Cheers,
--
Juli
Hi,
At 15:02 +0100 on 18 May (1495119734), Andrew Cooper wrote:
> * When fabricating gl1e's from superpages, propagate the protection key as
>well, so the protection key logic sees the real key as opposed to 0.
>
> * Experimentally, the protection key checks are performed ahead of the other
Hi Andre,
On 11/05/17 18:53, Andre Przywara wrote:
The DISCARD command drops the connection between a DeviceID/EventID
and an LPI/collection pair.
We mark the respective structure entries as not allocated and make
sure that any queued IRQs are removed.
Signed-off-by: Andre Przywara
---
xen/ar
> > --- a/xen/arch/x86/cpu/vpmu.c
> > +++ b/xen/arch/x86/cpu/vpmu.c
> > @@ -859,6 +859,7 @@ static int cpu_callback(
> > {
> > vpmu_save_force(vcpu);
> > vpmu_reset(vpmu, VPMU_CONTEXT_LOADED);
> > +per_cpu(last_vcpu, cpu) = NULL;// OR: this_cpu(last_vcpu)
> >
flight 109560 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/109560/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm 5 xen-buildfail REGR. vs. 107636
build-arm64
Hi Andre,
On 11/05/17 18:53, Andre Przywara wrote:
The MOVI command moves the interrupt affinity from one redistributor
(read: VCPU) to another.
For now migration of "live" LPIs is not yet implemented, but we store
the changed affinity in the host LPI structure and in our virtual ITTE.
Signed-o
1 - 100 of 197 matches
Mail list logo