On Wed, Jul 19, 2017 at 10:42 PM, Julien Grall wrote:
> Hi Vijay,
>
> On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> memnode_shift variable is changed from int to unsigned int.
>> With this change, compute_memnode_shift() returns error value
>> instead of return
flight 112011 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112011/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-win7-amd64 10 windows-install fail REGR. vs. 111765
test-amd64-i386-x
Hi,
>> > Can anyone please explain or point me to a thread where I can read about
>> > the internals of PCI passthrough or How passthrough actually works?
>>
>> For PV:
>>
>> http://elixir.free-electrons.com/linux/latest/source/drivers/xen/xen-pciback
>> http://elixir.free-electrons.com/linux/
On Wed, 19 Jul 2017 11:00:26 -0700 (PDT)
Stefano Stabellini wrote:
> My expectation is that unlocked mappings are much more frequent than
> locked mappings. Also, I expect that only very rarely we'll be able to
> reuse locked mappings. Over the course of a VM lifetime, it seems to me
> that walki
Hi Stefano,
I missed some of your comments in the last reply. adding responses to them.
2017-07-20 2:47 GMT+08:00 Stefano Stabellini :
> On Wed, 19 Jul 2017, Zhongze Liu wrote:
>>
>> 1. Motivation and Description
>> ===
Add a "umip" test for the User-Model Instruction Prevention. The test
simply tries to run sgdt/sidt/sldt/str/smsw in guest user-mode with
CR4_UMIP = 1.
Signed-off-by: Boqun Feng (Intel)
---
docs/all-tests.dox | 2 +
tests/umip/Makefile | 9
tests/umip/main.c | 120 +++
User-Mode Instruction Prevention (UMIP) is a security feature present in
new Intel Processors. With this feature, when the UMIP bit in CR4 set,
the following instructions cannot be executed if CPL > 0: SGDT, SIDT,
SLDT, SMSW, and STR. An attempt at such execution causes a general-
protection except
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-xl-qemuu-ws16-amd64
testid windows-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git
,Chris Metcalf ,"Paul E .
McKenney" ,Andrew Morton
,Christopher Li ,Dou Liyang
,Masahiro Yamada
,Daniel Borkmann ,Markus
Trippelsdorf ,Peter Foley ,Steven
Rostedt ,Tim Chen ,Catalin
Marinas ,Matthew Wilcox
,Michal Hocko ,Rob Landley
,Jiri Kosina ,"H . J . Lu"
,Paul Bolle ,Baoquan He
,Dan
,"Paul E . McKenney" ,Andrew
Morton ,Christopher Li ,Dou
Liyang ,Masahiro Yamada
,Daniel Borkmann ,Markus
Trippelsdorf ,Peter Foley ,Steven
Rostedt ,Tim Chen ,Ard
Biesheuvel ,Catalin Marinas
,Matthew Wilcox ,Michal Hocko
,Rob Landley ,Jiri Kosina
,"H . J . Lu" ,Paul Bolle
,Baoquan He ,Dan
Hi Punit,
On 7/19/2017 8:11 PM, Punit Agrawal wrote:
I took some notes for the PCI Passthrough design discussion at Xen
Summit. Due to the wide range of topics covered, the notes got sparser
towards the end of the session. I've tried to attribute names against
comments but have very likely got t
On 07/19/17 19:21, H. Peter Anvin wrote:
> On 07/19/17 16:33, H. Peter Anvin wrote:
>>>
>>> I agree that it is odd but that's how the compiler generates code. I
>>> will re-explore PIC options with mcmodel=small or medium, as mentioned
>>> on other threads.
>>
>> Why should the way compiler generat
On 07/19/17 16:33, H. Peter Anvin wrote:
>>
>> I agree that it is odd but that's how the compiler generates code. I
>> will re-explore PIC options with mcmodel=small or medium, as mentioned
>> on other threads.
>
> Why should the way compiler generates code affect the way we do things
> in assembl
flight 112004 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112004/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 18 guest-start/win.repeat fail like 111836
test-amd64-i386-xl-qemuu-win7-amd64
Hi Stefano,
2017-07-20 3:24 GMT+08:00 Stefano Stabellini :
> On Wed, 19 Jul 2017, Zhongze Liu wrote:
>> Add a new struct libxl_static_shm in the libxl IDL for the proposed new xl
>> config entry 'static_shm' (see [1]), which allow the user to set up shared
>> memory areas among several VMs for com
2017-07-20 2:47 GMT+08:00 Stefano Stabellini :
> On Wed, 19 Jul 2017, Zhongze Liu wrote:
>>
>> 1. Motivation and Description
>>
>> Virtual machines use grant table hypercalls to setup a share p
On 07/19/2017 10:08 PM, Konrad Rzeszutek Wilk wrote:
> On Wed, Jul 19, 2017 at 03:51:48PM +0800, Junxiao Bi wrote:
>> Hi Konrad,
>>
>> On 07/19/2017 03:37 PM, Roger Pau Monné wrote:
>>> On Wed, Jul 19, 2017 at 09:19:49AM +0800, Junxiao Bi wrote:
Hi Roger,
On 06/23/2017 08:57 PM, Roge
When ring buf full, hw queue will be stopped. While blkif interrupt consume
request and make free space in ring buf, hw queue will be started again.
But since start queue is protected by spin lock while stop not, that will
cause a race.
interrupt: process:
blki
On 07/19/17 11:26, Thomas Garnier wrote:
> On Tue, Jul 18, 2017 at 8:08 PM, Brian Gerst wrote:
>> On Tue, Jul 18, 2017 at 6:33 PM, Thomas Garnier wrote:
>>> Perpcu uses a clever design where the .percu ELF section has a virtual
>>> address of zero and the relocation code avoid relocating specific
On 07/19/17 15:47, Thomas Garnier wrote:
> On Wed, Jul 19, 2017 at 3:33 PM, H. Peter Anvin wrote:
>> On 07/18/17 15:33, Thomas Garnier wrote:
>>> The x86 relocation tool generates a list of 32-bit signed integers. There
>>> was no need to use 64-bit integers because all addresses where above the 2
On Wed, Jul 19, 2017 at 4:08 PM, H. Peter Anvin wrote:
> On 07/19/17 15:47, Thomas Garnier wrote:
>> On Wed, Jul 19, 2017 at 3:33 PM, H. Peter Anvin wrote:
>>> On 07/18/17 15:33, Thomas Garnier wrote:
The x86 relocation tool generates a list of 32-bit signed integers. There
was no need
On Wed, Jul 19, 2017 at 3:58 PM, H. Peter Anvin wrote:
> On 07/18/17 15:33, Thomas Garnier wrote:
>> Change the assembly code to use only relative references of symbols for the
>> kernel to be PIE compatible.
>>
>> Position Independent Executable (PIE) support will allow to extended the
>> KASLR r
On 07/18/17 15:33, Thomas Garnier wrote:
> Change the assembly code to use only relative references of symbols for the
> kernel to be PIE compatible.
>
> Position Independent Executable (PIE) support will allow to extended the
> KASLR randomization range below the -2G memory limit.
>
> Signed-off
On 19 July 2017 at 23:27, H. Peter Anvin wrote:
> On 07/19/17 08:40, Thomas Garnier wrote:
>>>
>>> This doesn't look right. It's accessing a per-cpu variable. The
>>> per-cpu section is an absolute, zero-based section and not subject to
>>> relocation.
>>
>> PIE does not respect the zero-based s
On 07/18/17 15:33, Thomas Garnier wrote:
> The x86 relocation tool generates a list of 32-bit signed integers. There
> was no need to use 64-bit integers because all addresses where above the 2G
> top of the memory.
>
> This change add a large-reloc option to generate 64-bit unsigned integers.
> I
On 07/19/17 08:40, Thomas Garnier wrote:
>>
>> This doesn't look right. It's accessing a per-cpu variable. The
>> per-cpu section is an absolute, zero-based section and not subject to
>> relocation.
>
> PIE does not respect the zero-based section, it tries to have
> everything relative. Patch 16
On Wed, Jul 19, 2017 at 3:33 PM, H. Peter Anvin wrote:
> On 07/18/17 15:33, Thomas Garnier wrote:
>> The x86 relocation tool generates a list of 32-bit signed integers. There
>> was no need to use 64-bit integers because all addresses where above the 2G
>> top of the memory.
>>
>> This change add
On Wed, Jul 19, 2017 at 3:27 PM, H. Peter Anvin wrote:
> On 07/19/17 08:40, Thomas Garnier wrote:
>>>
>>> This doesn't look right. It's accessing a per-cpu variable. The
>>> per-cpu section is an absolute, zero-based section and not subject to
>>> relocation.
>>
>> PIE does not respect the zero-
flight 112002 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112002/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 111966
test-armhf-armhf-libvirt-xsm 14 saveresto
flight 112009 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112009/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 7 xen-boot fail REGR. vs. 111972
test-amd64-i386-xl-q
We need to choose ACPI tables and ACPI IO port location
properly depending on the device model version we are running.
Previously, this decision was made by BIOS type specific
code in hvmloader, e.g. always load QEMU traditional specific
tables if it's ROMBIOS and always load QEMU Xen specific
tabl
On Wed, 19 Jul 2017, Zhongze Liu wrote:
> Add a new struct libxl_static_shm in the libxl IDL for the proposed new xl
> config entry 'static_shm' (see [1]), which allow the user to set up shared
> memory areas among several VMs for communication.
>
> Add related parsing code to the libxl/libxlu_* f
On Wed, Jul 19, 2017 at 7:08 AM, Christopher Lameter wrote:
> On Tue, 18 Jul 2017, Thomas Garnier wrote:
>
>> Performance/Size impact:
>> Hackbench (50% and 1600% loads):
>> - PIE enabled: 7% to 8% on half load, 10% on heavy load.
>> slab_test (average of 10 runs):
>> - PIE enabled: 3% to 4%
>>
flight 112023 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112023/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
On Wed, 19 Jul 2017, Zhongze Liu wrote:
>
> 1. Motivation and Description
>
> Virtual machines use grant table hypercalls to setup a share page for
> inter-VMs communications. These hypercalls
On Tue 2017-07-18 15:33:24, Thomas Garnier wrote:
> Change the assembly code to use only relative references of symbols for the
> kernel to be PIE compatible.
>
> Position Independent Executable (PIE) support will allow to extended the
> KASLR randomization range below the -2G memory limit.
>
> S
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse memory node and fetch numa-node-id information.
For each memory range, store in node_memblk_range[]
along with node id.
When booting in UEFI mode, UEFI passes memory information
to Dom0 using EFI memory desc
Hi,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse CPU node and fetch numa-node-id information.
For each node-id found, update nodemask_t mask.
Refer to Documentation/devicetree/bindings/numa.txt
in linux kernel.
Signed-off-by: Vijaya Kumar K
---
v3: - Parse cpu
On Tue, Jul 18, 2017 at 8:08 PM, Brian Gerst wrote:
> On Tue, Jul 18, 2017 at 6:33 PM, Thomas Garnier wrote:
>> Perpcu uses a clever design where the .percu ELF section has a virtual
>> address of zero and the relocation code avoid relocating specific
>> symbols. It makes the code simple and easi
On Wed, Jul 19, 2017 at 5:47 AM, Adrian Pop wrote:
> Hello,
>
> On Tue, Jul 18, 2017 at 11:26:45AM -0600, Tamas K Lengyel wrote:
>> On Tue, Jul 18, 2017 at 9:25 AM, Adrian Pop wrote:
>> > From: Vlad Ioan Topan
>> >
>> > The default value for the "suppress #VE" bit set by set_mem_access()
>> > cu
On Wed, 19 Jul 2017, Alexey G wrote:
> Stefano,
>
> On Tue, 18 Jul 2017 15:17:25 -0700 (PDT)
> Stefano Stabellini wrote:
>
> > > The patch modifies the behavior in which MapCacheEntry's are added to
> > > the list, avoiding duplicates.
> >
> > I take that the idea is to always go through the
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
The common code allows numa initialization only when
ACPI_NUMA config is enabled. Allow initialization when
NUMA config is enabled for DT.
In this patch, along with acpi_numa, check for acpi_disabled
is added.
Si
flight 112017 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112017/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Move code from xen/arch/x86/numa.c to xen/common/numa.c
so that it can be used by other archs.
The following changes are done:
- Few generic static functions in x86/numa.c is made
non-static common/numa.c
- The
On Wed, Jul 19, 2017 at 11:58 AM, Thomas Garnier wrote:
> On Tue, Jul 18, 2017 at 8:59 PM, Brian Gerst wrote:
>> On Tue, Jul 18, 2017 at 9:35 PM, H. Peter Anvin wrote:
>>> On 07/18/17 15:33, Thomas Garnier wrote:
With PIE support and KASLR extended range, the modules may be further
awa
On 09/07/17 09:09, Kai Huang wrote:
> This patch handles IA32_FEATURE_CONTROL and IA32_SGXLEPUBKEYHASHn MSRs.
>
> For IA32_FEATURE_CONTROL, if SGX is exposed to domain, then SGX_ENABLE bit
> is always set. If SGX launch control is also exposed to domain, and physical
> IA32_SGXLEPUBKEYHASHn are wri
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Rename some function in ACPI code as follow
- Rename setup_node to acpi_setup_node
- Rename bad_srat to numa_failed
- Rename nodes_cover_memory to arch_sanitize_nodes_memory
and changed return type to bool
-
On 19/07/17 17:17, Greg KH wrote:
> On Wed, Jul 19, 2017 at 04:51:02PM +0200, Juergen Gross wrote:
>> On 19/07/17 16:43, Greg KH wrote:
>>> From: Greg Kroah-Hartman
>>>
>>> It's better to be explicit and use the DRIVER_ATTR_RW() and
>>> DRIVER_ATTR_RO() macros when defining a driver's sysfs file.
On 19/07/17 07:40, Vijay Kilari wrote:
On Tue, Jul 18, 2017 at 8:59 PM, Wei Liu wrote:
On Tue, Jul 18, 2017 at 05:11:27PM +0530, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Add accessors for nodes[] and other static variables and
use those accessors. These variables are later access
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
memnode_shift variable is changed from int to unsigned int.
With this change, compute_memnode_shift() returns error value
instead of returning shift value. The memnode_shift is updated inside
compute_memnode_shift(
On 18 July 2017 at 23:20, Stefano Stabellini wrote:
> The following changes since commit f9dada2baabb639feb988b3a564df7a06d214e18:
>
> Merge remote-tracking branch 'remotes/cody/tags/block-pull-request' into
> staging (2017-07-18 20:29:36 +0100)
>
> are available in the git repository at:
>
>
>
Hi,
On 19/07/17 17:27, Wei Liu wrote:
On Wed, Jul 19, 2017 at 05:23:43PM +0100, Julien Grall wrote:
This is also more than cosmetics and I think the reviewed-by from Wei should
have been carried.
should *not* have been carried.
That's what I meant but failed to write the not.
And I agre
On Wed, Jul 19, 2017 at 05:23:43PM +0100, Julien Grall wrote:
>
> This is also more than cosmetics and I think the reviewed-by from Wei should
> have been carried.
should *not* have been carried.
And I agree.
___
Xen-devel mailing list
Xen-devel@lists
Hi Vijay,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Fix coding style, trailing spaces, tabs in NUMA code.
Also drop unused macros and functions.
There is no functional change.
Signed-off-by: Vijaya Kumar K
Reviewed-by: Wei Liu
---
v3: - Change commit message
On Tue, Jul 18, 2017 at 8:59 PM, Brian Gerst wrote:
> On Tue, Jul 18, 2017 at 9:35 PM, H. Peter Anvin wrote:
>> On 07/18/17 15:33, Thomas Garnier wrote:
>>> With PIE support and KASLR extended range, the modules may be further
>>> away from the kernel than before breaking mcmodel=kernel expectati
Hi Vijay,
On 19/07/2017 08:00, Vijay Kilari wrote:
On Tue, Jul 18, 2017 at 11:25 PM, Julien Grall wrote:
Hi,
On 18/07/17 12:41, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Introduce NR_NODES config option to specify number
of NUMA nodes supported. By default value is set at
64 for
Roger Pau Monne writes ("[PATCH v5 15/17] osstest: add support for FreeBSD
buildjobs to sg-run-job"):
> Add support and introduce a FreeBSD build job to sg-run-job.
...
> +switch -exact $ostype {
> +FREEBSD { run-ts broken = ts-freebsd-set-hostflags --share }
Roger Pau Monne writes ("[PATCH v5 15/17] osstest: add support for FreeBSD
buildjobs to sg-run-job"):
> Add support and introduce a FreeBSD build job to sg-run-job.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists
Roger Pau Monne writes ("[PATCH v5 14/17] osstest: change the meaning of
need_build_host"):
> Make need_build_host store a string instead of a boolean. This is
> later going to be expanded to handle the FreeBSD build jobs.
This is all fine, but I have two style comments:
> +if {[string match
On 19/07/17 09:17, Wei Liu wrote:
On Tue, Jul 18, 2017 at 06:52:11PM +0100, Julien Grall wrote:
Hi,
On 18/07/17 16:29, Wei Liu wrote:
On Tue, Jul 18, 2017 at 05:11:23PM +0530, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Introduce NR_NODES config option to specify number
of NUMA nod
flight 111995 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111995/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 7 xen-boot fail REGR.
vs. 110515
test-amd64
Roger Pau Monne writes ("[PATCH v5 13/17] osstest: introduce a script to set
the runtime hostflags runvar for FreeBSD jobs"):
> Due to the nature of the FreeBSD install media, which is
> self-generated from the ts-freebsd-build script, the hostflags runvar
> set to FreeBSD jobs are related to the
Roger Pau Monne writes ("[PATCH v5 12/17] osstest: add support for
runtime_IDENT_hostflags"):
> This is required for FreeBSD, that will need to set some of the
> hostflags at runtime. The current IDENT_hostflags will be keep as-is,
> and they should only be set at job creation time.
>
> Also intr
On Tue, Jul 18, 2017 at 7:49 PM, Brian Gerst wrote:
> On Tue, Jul 18, 2017 at 6:33 PM, Thomas Garnier wrote:
>> Change the assembly code to use only relative references of symbols for the
>> kernel to be PIE compatible. The new __ASM_GET_PTR_PRE macro is used to
>> get the address of a symbol on
Roger Pau Monne writes ("[PATCH v5 11/17] osstest: introduce a FreeBSD build
script"):
> In order to generate the FreeBSD installer image and the install
> media.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.x
Roger Pau Monne writes ("[PATCH v5 10/17] osstest: add support for the FreeBSD
package manager"):
> FreeBSD support is added to target_install_packages and
> target_install_packages_norec, although there's no equivalent to the
> --no-install-recommends in the FreeBSD package manager.
>
> Signed-o
Roger Pau Monne writes ("[PATCH v5 08/17] osstest: add a FreeBSD host install
script"):
> The installation is performed using the bsdinstall tool, which is part
> of the FreeBSD base system. The installer image is setup with the
> osstest ssh keys and sshd enabled by default, which allows the test
Roger Pau Monne writes ("[PATCH v5 07/17] osstest: introduce
rename_shared_mark_ready"):
> That allows marking a host as ready to be shared. Replace the current
> caller that open-codes it.
You got the Subject wrong. "rename" for "resource". :-)
With that fixed:
Acked-by: Ian Jackson
Thanks
Roger Pau Monne writes ("[PATCH v5 06/17] osstest: add executive prefix to
resource_shared_mark_ready"):
> This is a non-functional change in preparation for introducing a
> resource_shared_mark_ready in TestSupport.
>
> Signed-off-by: Roger Pau Monné
Acked-by: Ian Jackson
___
Hey Julien,
On Mon, Jul 17, 2017 at 02:26:22PM +0100, Julien Grall wrote:
> This email only tracks big items for xen.git tree. Please reply for items you
> woulk like to see in 4.10 so that people have an idea what is going on and
> prioritise accordingly.
>
> You're welcome to provide description
Hi Bhupinder,
I've tried this series today on an ARM64 platform. When I enable pl011 for the
guest,
I am not able to fully destroy the guest. It stay in zombie mode:
42sh> xl list
NameID Mem VCPUs State Time(s)
Domain-0
On Wed, Jul 19, 2017 at 04:51:02PM +0200, Juergen Gross wrote:
> On 19/07/17 16:43, Greg KH wrote:
> > From: Greg Kroah-Hartman
> >
> > It's better to be explicit and use the DRIVER_ATTR_RW() and
> > DRIVER_ATTR_RO() macros when defining a driver's sysfs file.
> >
> > Bonus is this fixes up a ch
On 19/07/17 16:43, Greg KH wrote:
> From: Greg Kroah-Hartman
>
> It's better to be explicit and use the DRIVER_ATTR_RW() and
> DRIVER_ATTR_RO() macros when defining a driver's sysfs file.
>
> Bonus is this fixes up a checkpatch.pl warning.
>
> This is part of a series to drop DRIVER_ATTR() from
From: Greg Kroah-Hartman
It's better to be explicit and use the DRIVER_ATTR_RW() and
DRIVER_ATTR_RO() macros when defining a driver's sysfs file.
Bonus is this fixes up a checkpatch.pl warning.
This is part of a series to drop DRIVER_ATTR() from the tree entirely.
Cc: Boris Ostrovsky
Cc: Juer
I took some notes for the PCI Passthrough design discussion at Xen
Summit. Due to the wide range of topics covered, the notes got sparser
towards the end of the session. I've tried to attribute names against
comments but have very likely got things mixed up. Apologies in advance.
Although the ses
On 09/07/17 09:09, Kai Huang wrote:
> This patch adds early stage SGX feature detection via SGX CPUID 0x12. Function
> detect_sgx is added to detect SGX info on each CPU (called from vmx_cpu_up).
> SDM says SGX info returned by CPUID is per-thread, and we cannot assume all
> threads will return the
On Wed, Jul 19, 2017 at 03:17:53PM +0200, Juergen Gross wrote:
> On 19/07/17 14:58, Greg KH wrote:
> > From: Greg Kroah-Hartman
> >
> > It's better to be explicit and use the DRIVER_ATTR_RW() and
> > DRIVER_ATTR_RO() macros when defining a driver's sysfs file.
> >
> > Bonus is this fixes up a ch
On 19/07/17 15:12, Roger Pau Monné wrote:
> On Wed, Jul 19, 2017 at 02:27:31PM +0100, Andrew Cooper wrote:
>> These functions don't need is_hvm_{vcpu,domain}() predicates.
>>
>> hvmop_set_evtchn_upcall_vector() does need the predicate to prevent a PV
>> caller accessing the hvm union, but swap the
On Wed, Jul 19, 2017 at 02:27:31PM +0100, Andrew Cooper wrote:
> These functions don't need is_hvm_{vcpu,domain}() predicates.
>
> hvmop_set_evtchn_upcall_vector() does need the predicate to prevent a PV
> caller accessing the hvm union, but swap the copy_from_guest() and
> is_hvm_domain() predica
On Tue, 18 Jul 2017, Thomas Garnier wrote:
> Performance/Size impact:
> Hackbench (50% and 1600% loads):
> - PIE enabled: 7% to 8% on half load, 10% on heavy load.
> slab_test (average of 10 runs):
> - PIE enabled: 3% to 4%
> Kernbench (average of 10 Half and Optimal runs):
> - PIE enabled: 5%
On Wed, Jul 19, 2017 at 03:51:48PM +0800, Junxiao Bi wrote:
> Hi Konrad,
>
> On 07/19/2017 03:37 PM, Roger Pau Monné wrote:
> > On Wed, Jul 19, 2017 at 09:19:49AM +0800, Junxiao Bi wrote:
> >> Hi Roger,
> >>
> >> On 06/23/2017 08:57 PM, Roger Pau Monné wrote:
> >>> On Thu, Jun 22, 2017 at 09:36:52
On 07/19/17 at 08:10pm, Baoquan He wrote:
> On 07/18/17 at 03:33pm, Thomas Garnier wrote:
>
> > quiet_cmd_relocs = RELOCS $@
> >cmd_relocs = $(CMD_RELOCS) $< > $@;$(CMD_RELOCS) --abs-relocs $<
> > $(obj)/vmlinux.relocs: vmlinux FORCE
> > diff --git a/arch/x86/boot/compressed/misc.c
> >
Anthony PERARD writes ("Re: [OSSTEST PATCH v12 10/21] ts-openstack-deploy:
Increase open fd limit for RabbitMQ"):
> I've created a bug report for openstack.
> https://bugs.launchpad.net/devstack/+bug/1703651
Thanks,
Ian.
___
Xen-devel mailing list
Xen-
On Wed, Jul 19, 2017 at 02:27:31PM +0100, Andrew Cooper wrote:
> These functions don't need is_hvm_{vcpu,domain}() predicates.
>
> hvmop_set_evtchn_upcall_vector() does need the predicate to prevent a PV
> caller accessing the hvm union, but swap the copy_from_guest() and
> is_hvm_domain() predica
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: 19 July 2017 14:28
> To: Xen-devel
> Cc: Andrew Cooper ; George Dunlap
> ; Jan Beulich ; Wei Liu
> ; Paul Durrant ; Roger Pau
> Monne
> Subject: [PATCH] x86/hvm: Drop more remains of the PVHv1 implementa
On 07/19/2017 07:57 AM, Andrew Cooper wrote:
> No functional change.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Boris Ostrovsky
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
These functions don't need is_hvm_{vcpu,domain}() predicates.
hvmop_set_evtchn_upcall_vector() does need the predicate to prevent a PV
caller accessing the hvm union, but swap the copy_from_guest() and
is_hvm_domain() predicate to avoid reading the hypercall parameter if we not
going to use it.
S
On Wed, Jul 19, 2017 at 02:05:44PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("Re: [OSSTEST PATCH v12 10/21] ts-openstack-deploy:
> Increase open fd limit for RabbitMQ"):
> > On Wed, Jul 19, 2017 at 11:28:29AM +0100, Ian Jackson wrote:
> > > Anthony PERARD writes ("[OSSTEST PATCH v12 10/21
On 19/07/17 14:58, Greg KH wrote:
> From: Greg Kroah-Hartman
>
> It's better to be explicit and use the DRIVER_ATTR_RW() and
> DRIVER_ATTR_RO() macros when defining a driver's sysfs file.
>
> Bonus is this fixes up a checkpatch.pl warning.
>
> This is part of a series to drop DRIVER_ATTR() from
Felix Schmoll writes ("Re: [PATCH v2] xenconsole: Add pipe option"):
> As there is already an interactive variable in the code, it seems
> like a rather strange overloading to call the option interactive
> that directly affects a different variable (currently pipe). The
> name seems to make sense h
Anthony PERARD writes ("Re: [OSSTEST PATCH v12 10/21] ts-openstack-deploy:
Increase open fd limit for RabbitMQ"):
> On Wed, Jul 19, 2017 at 11:28:29AM +0100, Ian Jackson wrote:
> > Anthony PERARD writes ("[OSSTEST PATCH v12 10/21] ts-openstack-deploy:
> > Increase open fd limit for RabbitMQ"):
>
From: Greg Kroah-Hartman
It's better to be explicit and use the DRIVER_ATTR_RW() and
DRIVER_ATTR_RO() macros when defining a driver's sysfs file.
Bonus is this fixes up a checkpatch.pl warning.
This is part of a series to drop DRIVER_ATTR() from the tree entirely.
Cc: Boris Ostrovsky
Cc: Juer
Anthony PERARD writes ("[OSSTEST PATCH v12 20/21] Create a flight to test
OpenStack with xen-unstable and libvirt"):
> This patch creates a flight "openstack-ocata", with those jobs:
...
I think it would help if you split apart the changes to make-flight
and mfi-* from the ones to cr-daily-* and
On 07/19/2017 06:43 AM, Juergen Gross wrote:
> On 19/07/17 12:32, Wei Liu wrote:
>> On Mon, Jul 17, 2017 at 01:38:03PM +0100, Andrew Cooper wrote:
>>> There are no current users which I can locate. One piece of xend which
>>> didn't
>>> move forwards into xl/libxl is this:
>>>
>>> # Configure
On 19/07/17 12:57, Andrew Cooper wrote:
> No functional change.
>
> Signed-off-by: Andrew Cooper
I have just realise I can now drop msraddr_to_bitpos(), so have folded
the additional hunk into this patch.
diff --git a/xen/arch/x86/cpu/vpmu_intel.c b/xen/arch/x86/cpu/vpmu_intel.c
index d58eca3..2
On 07/19/2017 01:57 PM, Wei Liu wrote:
> On Wed, Jul 19, 2017 at 01:52:08PM +0200, Sergej Proskurin wrote:
>> ---
>> root@avocet:~# xl list
>> NameID Mem VCPUs State
>> Time(s)
>> Domain-0 0 1024 6
>> r---
On 07/18/17 at 03:33pm, Thomas Garnier wrote:
> quiet_cmd_relocs = RELOCS $@
>cmd_relocs = $(CMD_RELOCS) $< > $@;$(CMD_RELOCS) --abs-relocs $<
> $(obj)/vmlinux.relocs: vmlinux FORCE
> diff --git a/arch/x86/boot/compressed/misc.c b/arch/x86/boot/compressed/misc.c
> index a0838ab929f2..0a
flight 112012 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112012/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 13 mig
On Wed, Jul 19, 2017 at 01:19:58PM +0200, Greg Kroah-Hartman wrote:
> On Wed, Jul 19, 2017 at 01:12:14PM +0200, Greg Kroah-Hartman wrote:
> > On Wed, Jul 19, 2017 at 12:37:47PM +0200, Daniel Kiper wrote:
> > > Hey Greg,
> > >
> > > On Wed, Jul 19, 2017 at 11:43:32AM +0200, Greg Kroah-Hartman wrote:
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Jun Nakajima
CC: Kevin Tian
CC: Boris Ostrovsky
---
xen/arch/x86/cpu/vpmu_intel.c | 64 ---
1 file changed, 23 insertions(+), 41 deletions(-)
diff --git a/xen/arch/x86/cpu/vpmu
1 - 100 of 142 matches
Mail list logo