ping
On 02/08/2017 04:42 PM, Konrad Rzeszutek Wilk wrote:
On Wed, Feb 08, 2017 at 09:38:18AM +0200, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Multi-touch fields re-use the page that is used by the other features
which means that you can interleave multi-touch, motion, and k
Hello Oleksandr,
On 02/17/2017 08:20 PM, Oleksandr Tyshchenko wrote:
Hi, all.
So, as I understand we have two possible solutions for the IOMMU page
table to be populated:
1. When the first device is being assigned. Retrieve all mappings
from stage-2 table.
2. When the domain is being created.
flight 105918 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105918/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 3 host-install(3) broken REGR. vs. 59254
test-amd64-amd64-xl
Hi Stefano,
On 02/16/2017 01:41 AM, Stefano Stabellini wrote:
On Fri, 3 Feb 2017, Julien Grall wrote:
On ARM, when the user put 'acpi=force' Xen will use ACPI over DT.
Currently, if Xen fails to initialize ACPI it will fallback on DT.
This behavior makes difficult for a user to notice Xen didn
>>> On 20.02.17 at 02:52, wrote:
> On 02/17/17 02:55 -0700, Jan Beulich wrote:
>> >>> On 17.02.17 at 07:39, wrote:
>> > Signed-off-by: Haozhong Zhang
>>
>> Not sure here, I can't imagine the function being here without
>> reason, even if the plans perhaps never got carried out. Could
>> you ple
>>> On 20.02.17 at 03:48, wrote:
> On 02/17/17 03:07 -0700, Jan Beulich wrote:
>> >>> On 17.02.17 at 07:39, wrote:
>> > @@ -804,7 +800,7 @@ static void mcinfo_clear(struct mc_info *mi)
>> > x86_mcinfo_nentries(mi) = 0;
>> > }
>> >
>> > -void *x86_mcinfo_reserve(struct mc_info *mi, int siz
>>> On 20.02.17 at 05:36, wrote:
> On 02/17/17 03:21 -0700, Jan Beulich wrote:
>> >>> On 17.02.17 at 07:39, wrote:
>> > +continue;
>> > +ret = vcpu_fill_mc_msrs(v, MCG_STATUS_MCIP | MCG_STATUS_RIPV,
>> > +0, 0, 0);
>>
>> What guarantees RIP to
On 02/20/17 02:00 -0700, Jan Beulich wrote:
> >>> On 20.02.17 at 02:52, wrote:
> > On 02/17/17 02:55 -0700, Jan Beulich wrote:
> >> >>> On 17.02.17 at 07:39, wrote:
> >> > Signed-off-by: Haozhong Zhang
> >>
> >> Not sure here, I can't imagine the function being here without
> >> reason, even if
On 02/20/17 02:02 -0700, Jan Beulich wrote:
> >>> On 20.02.17 at 03:48, wrote:
> > On 02/17/17 03:07 -0700, Jan Beulich wrote:
> >> >>> On 17.02.17 at 07:39, wrote:
> >> > @@ -804,7 +800,7 @@ static void mcinfo_clear(struct mc_info *mi)
> >> > x86_mcinfo_nentries(mi) = 0;
> >> > }
> >> >
On 02/20/17 02:04 -0700, Jan Beulich wrote:
> >>> On 20.02.17 at 05:36, wrote:
> > On 02/17/17 03:21 -0700, Jan Beulich wrote:
> >> >>> On 17.02.17 at 07:39, wrote:
> >> > +continue;
> >> > +ret = vcpu_fill_mc_msrs(v, MCG_STATUS_MCIP | MCG_STATUS_RIPV,
> >> > +
flight 68583 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68583/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-i386-sid-netboot-pvgrub 10 guest-start fail blocked in 68553
test-amd64-amd64-am
On Fri, Feb 17, 2017 at 5:07 PM, Konrad Rzeszutek Wilk
wrote:
> On Thu, Feb 16, 2017 at 10:51:44PM +0100, Vincent JARDIN wrote:
>> Le 16/02/2017 à 14:36, Konrad Rzeszutek Wilk a écrit :
>> > > Is it time now to officially remove Dom0 support?
>> > So we do have an prototype implementation of netba
>>> On 17.02.17 at 23:38, wrote:
For all of the comments below, please understand that I'm giving
them in the understanding that pre-existing code may be similarly
problematic; we shouldn't introduce new issues though.
> --- a/xen/include/public/io/ring.h
> +++ b/xen/include/public/io/ring.h
> @
This removes the need for every cpuid() emulation hook to individually support
CPUID faulting.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Paul Durrant
v2:
* Substantial rebase
* Reimplement speculative reading by squashing the exception rather than
trying to prevent it by using
Split out from a previous general emulation series. Substantially rebased.
Andrew Cooper (3):
x86/hvm: Don't raise #GP behind the emulators back for MSR accesses
x86/emul: Introduce common msr_val for emulation
x86/emul: Support CPUID faulting via a speculative MSR read
xen/arch/x86/hvm/e
Use it consistently in place of local tsc_aux, msr_content and val
declarations, and replace opencoded uses of X86EMUL_OKAY.
No functional change.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
v2:
* New
---
xen/arch/x86/x86_emulate/x86_emulate.c | 95 ++
1
The current hvm_msr_{read,write}_intercept() infrastructure calls
hvm_inject_hw_exception() directly to latch a fault, and returns
X86EMUL_EXCEPTION to its caller.
This behaviour is problematic for the hvmemul_{read,write}_msr() paths, as the
fault is raised behind the back of the x86 emulator.
A
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: 20 February 2017 10:29
> To: Xen-devel
> Cc: Andrew Cooper ; Jan Beulich
> ; Paul Durrant
> Subject: [PATCH v2 3/3] x86/emul: Support CPUID faulting via a speculative
> MSR read
>
> This removes the nee
> -Original Message-
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: 20 February 2017 10:29
> To: Xen-devel
> Cc: Andrew Cooper ; Paul Durrant
> ; Boris Ostrovsky ;
> Suravee Suthikulpanit
> Subject: [PATCH v2 1/3] x86/hvm: Don't raise #GP behind the emulators back
> for
At 04:49 -0700 on 16 Feb (1487220558), Jan Beulich wrote:
> >>> On 16.02.17 at 12:14, wrote:
> On 15.02.17 at 12:21, wrote:
> >> At 01:18 -0700 on 15 Feb (1487121525), Jan Beulich wrote:
> >>> >>> On 14.02.17 at 18:33, wrote:
> >>> >> TBD: Do we really want to re-init the TSS every time we
On Mon, Feb 20, 2017 at 12:20:10AM +, Andrew Cooper wrote:
> From
> http://logs.test-lab.xenproject.org/osstest/logs/105917/test-amd64-amd64-xl-pvh-intel/serial-fiano0.log
> around Feb 19 23:12:06.269706
>
> (XEN) [ Xen-4.9-unstable x86_64 debug=y Not tainted ]
> (XEN) CPU:2
>
On 19/02/17 21:27, Julien Grall wrote:
> Hi Dario,
>
> On 02/18/2017 01:47 AM, Dario Faggioli wrote:
>> On Fri, 2017-02-17 at 14:50 -0800, Stefano Stabellini wrote:
>>> On Fri, 17 Feb 2017, Julien Grall wrote:
Please explain in which context this will be beneficial. My gut
feeling is
>>>
At 15:45 + on 16 Feb (1487259954), Andrew Cooper wrote:
> XSA-173 (c/s 8b1764833) introduces gfn_bits, and an upper limit which might be
> lower than the real maxphysaddr, to avoid overflowing the superpage shadow
> backpointer.
>
> However, plenty of hardware has a physical address width less
At 20:07 + on 16 Feb (1487275634), Andrew Cooper wrote:
> Replace one opencoded mfn_eq() and some coding style issues on altered lines.
> Swap __mfn_valid() to being bool, although it can't be updated to take mfn_t
> because of include dependencies.
>
> No functional change.
>
> Signed-off-by
>>> On 20.02.17 at 11:28, wrote:
> Use it consistently in place of local tsc_aux, msr_content and val
> declarations, and replace opencoded uses of X86EMUL_OKAY.
>
> No functional change.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
One thing less on my to-be-done-eventually lis
>>> On 20.02.17 at 11:28, wrote:
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -5424,10 +5424,25 @@ x86_emulate(
> break;
>
> case X86EMUL_OPC(0x0f, 0xa2): /* cpuid */
> +msr_val = 0;
> fail_if(ops->cpuid == NULL
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/tools/gen-cpuid.py | 10 +++---
1 file changed, 7 insertions(+), 3 deletions(-)
diff --git a/xen/tools/gen-cpuid.py b/xen/tools/gen-cpuid.py
index 5cab6db..6531ca8 100755
--- a/xen/tools/gen-cpuid.py
+++ b/xen/tools/gen-cpuid.py
@@ -2
Now that all leaves have been altered to use the guest_cpuid() path, remove
all the remaining legacy infrastructure.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpuid.c| 76 -
xen/arch/x86/domctl.c | 45 +---
Leaf 0x4 is reserved by AMD. For Intel, it is a multi-invocation leaf with
ecx enumerating different cache details.
Add a new union for it in struct cpuid_policy, collect it from hardware in
calculate_raw_policy(), audit it in recalculate_cpuid_policy() and update
guest_cpuid() and update_domain_
The thermal/performance leaf was previously hidden from HVM guests, but fully
visible to PV guests. Most of the leaf refers to MSR availability, and there
is nothing an unprivileged PV guest can do with the information, so hide the
leaf entirely.
The PV MSR handling logic as minimal support for s
The features words, ecx and edx, are already audited as part of the featureset
logic. The existing leaf 0x8001 dynamic logic has its SYSCALL adjustment
split out, as the rest of the adjustments are common with leaf 0x1. The
existing leaf 0x1 feature adjustments from {pv,hvm}_cpuid() are moved
On real hardware, the bulk of CPUID data is system-specific and constant.
Hold the toolstack to the same behaviour when constructing domains.
Values which are expected to change dynamically (e.g. OSXSAVE) are unaffected
and continue to function as before.
Signed-off-by: Andrew Cooper
---
CC: Jan
The MONITOR flag isn't exposed to guests. The existing toolstack logic, and
pv_cpuid() in the hypervisor, zero the MONITOR leaf for queries.
However, the MONITOR leaf is still visible in the hardware domains native
CPUID view, and Linux depends on this to set up C-state information. Leak the
hos
Leaf 0xa is reserved by AMD, and only exposed to Intel guests when vPMU is
enabled. Leave the logic as-was, ready to be cleaned up when further
toolstack infrastructure is in place.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
---
xen/arch/x86/cpuid.c | 43 -
At 05:03 -0700 on 17 Feb (1487307837), Jan Beulich wrote:
> The present way of setting this up is flawed: Leaving the I/O bitmap
> pointer at zero means that the interrupt redirection bitmap lives
> outside (ahead of) the allocated space of the TSS. Similarly setting a
> TSS limit of 255 when only
Leaf 0xb is reserved by AMD, and uniformly hidden from guests by the toolstack
logic and hypervisor PV logic.
The previous dynamic logic filled in the x2APIC ID for all HVM guests. This
is modified to respect the entire leaf being reserved by AMD, but is altered
to include PV Intel guests, so the
This is the final piece of work to move the remaining legacy CPUID logic onto
the new guest_cpuid() path, allowing the legacy logic to be dropped entirely.
It is available in git form from
http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/xen-cpuid-v4
Andrew Co
At 17:13 + on 16 Feb (1487265184), Andrew Cooper wrote:
> They depend soley on paging mode, so don't need to be repeated per domain, and
> can live in .rodata. While making this change, drop the redundant log_dirty
> from the function pointer names.
>
> Signed-off-by: Andrew Cooper
Acked-by
On 18/02/17 00:41, Stefano Stabellini wrote:
> On Fri, 17 Feb 2017, Dario Faggioli wrote:
>> On Thu, 2017-02-09 at 16:54 -0800, Stefano Stabellini wrote:
>>> These are the results, in nanosec:
>>>
>>> AVG MIN MAX WARM MAX
>>>
>>> NODEBUG no WFI 18901
On 20/02/17 10:59, Jan Beulich wrote:
On 20.02.17 at 11:28, wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -5424,10 +5424,25 @@ x86_emulate(
>> break;
>>
>> case X86EMUL_OPC(0x0f, 0xa2): /* cpuid */
>> +msr_
>>> On 20.02.17 at 12:04, wrote:
> On 20/02/17 10:59, Jan Beulich wrote:
> On 20.02.17 at 11:28, wrote:
>>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>>> @@ -5424,10 +5424,25 @@ x86_emulate(
>>> break;
>>>
>>> case X86EMUL_OP
On Sun, 2017-02-19 at 21:27 +, Julien Grall wrote:
> Hi Dario,
>
Hi,
> On 02/18/2017 01:47 AM, Dario Faggioli wrote:
> > - vcpu A yields, and there are no runnable but not running vcpus
> > around. In this case, A gets to run again. Full stop.
>
> Which turn to be the busy looping I was
On 14/02/17 10:13, Jan Beulich wrote:
On 14.02.17 at 09:40, wrote:
>>> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew
>>> Cooper
>>> Sent: Tuesday, February 14, 2017 4:19 PM
>>>
>>> On 14/02/2017 08:04, Tian, Kevin wrote:
> From: Andrew Cooper [mailto:am...@herm
The domain builder in libxc no longer depends on leaked CPUID information to
properly construct HVM domains. Remove the control domain exclusion.
On capable hardware, this prevents all unintended leakage of hardware CPUID
values into the control domain, and brings the hypervisor leaves into view.
>>> On 20.02.17 at 12:01, wrote:
> At 05:03 -0700 on 17 Feb (1487307837), Jan Beulich wrote:
>> The present way of setting this up is flawed: Leaving the I/O bitmap
>> pointer at zero means that the interrupt redirection bitmap lives
>> outside (ahead of) the allocated space of the TSS. Similarly
At 04:17 -0700 on 20 Feb (1487564245), Jan Beulich wrote:
> >>> On 20.02.17 at 12:01, wrote:
> > At 05:03 -0700 on 17 Feb (1487307837), Jan Beulich wrote:
> >> The present way of setting this up is flawed: Leaving the I/O bitmap
> >> pointer at zero means that the interrupt redirection bitmap live
On February 18, 2017 12:33 AM, Jan Beulich wrote:
On 17.02.17 at 09:49, wrote:
>> On Fri, Feb 17, 2017 at 09:37:45AM +, Xuquan (Quan Xu) wrote:
>>>From a589074281cc22a30ed75a5bccba60e83d2312a6 Mon Sep 17
>00:00:00 2001
>>>From: Quan Xu
>>>Date: Sat, 18 Feb 2017 09:27:37 +0800
>>>Subject:
On Sun, 2017-02-19 at 21:34 +, Julien Grall wrote:
> Hi Stefano,
>
> I have CCed another ARM person who has more knowledge than me on
> scheduling/power.
>
Ah, when I saw this, I thought you were Cc-ing my friend Juri, which
also works there, and is doing that stuff. :-)
> > In both cases th
Hello Vijay,
On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Right not CONFIG_NUMA is not enabled for ARM and
s/not/now/
existing code in asm-arm/numa.h is for !COFIG_NUMA.
s/COFIG_NUMA/CONFIG_NUMA/
Hence put this code under #ifndef CONFIG_NUMA.
This help to make
On Mon, 2017-02-20 at 11:04 +, George Dunlap wrote:
> On 18/02/17 00:41, Stefano Stabellini wrote:
> >
> > On Fri, 17 Feb 2017, Dario Faggioli wrote:
> > > cyclictest 1us cyclictest 1ms cyclictest
> > > 100ms
> > > (cycles) Credit1 Credit2 Credit1 Cred
> > >
Hi,
On 09/02/17 16:11, Jan Beulich wrote:
On 09.02.17 at 16:56, wrote:
From: Vijaya Kumar K
Move common generic NUMA code to xen/common/numa.c from
xen/arch/x86/numa.c. Also move generic code in header file
xen/include/asm-x86/numa.h to xen/include/xen/numa.h
This common code can be re-used
flight 105919 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/105919/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-pair 21 guest-migrate/src_host/dst_host fail in 105900 pass in
105919
test-armhf-armhf-xl-cred
On Fri, Feb 17, 2017 at 04:44:45AM -0700, Jan Beulich wrote:
> >>> On 17.02.17 at 12:36, wrote:
> > On Fri, Feb 17, 2017 at 03:33:26AM -0700, Jan Beulich wrote:
> >> >>> On 17.02.17 at 11:12, wrote:
> >> > On Thu, Feb 16, 2017 at 07:10:41PM +, Andrew Cooper wrote:
> >> >> On 16/02/17 18:56, W
On February 13, 2017 4:21 PM, Tian, Kevin wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Wednesday, February 08, 2017 4:52 PM
>>
>> >>> On 08.02.17 at 09:27, wrote:
>> > Assumed vCPU is in guest_mode..
>> > When apicv is enabled, hypervisor calls vmx_deliver_posted_intr(),
>> > th
Several `ln -sf` can race with each other and cause error like:
14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory
Provide dedicated targets for soft-linking directories.
Reported-by: Andrew Cooper
Signed-off-by: Wei Liu
---
v3: use pattern matching rule
---
tools/fuzz/x8
Several `ln -sf` can race with each other. Provide dedicated targets
for soft-linking directories.
Signed-off-by: Wei Liu
---
tools/tests/x86_emulator/Makefile | 12
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/tools/tests/x86_emulator/Makefile
b/tools/tests/x86_e
Wei Liu (2):
fuzz/x86emul: avoid race in link farm rune
x86emul/test: avoid race in link farm rune
tools/fuzz/x86_instruction_emulator/Makefile | 12
tools/tests/x86_emulator/Makefile| 12
2 files changed, 16 insertions(+), 8 deletions(-)
--
2.11.0
__
On Thu, Feb 16, 2017 at 08:44:08AM -0700, Jan Beulich wrote:
> do_dm_op() expects (void *, size_t) pairs, but with nr being uint32_t
> the type of the expression of xc_hvm_track_dirty_vram()'s last argument
> to the function is only a 32 bits one. Neither C nor the ABI require
> the compiler to pro
On Fri, Feb 17, 2017 at 03:08:55AM -0700, Jan Beulich wrote:
> >>> On 17.02.17 at 07:39, wrote:
> > Use uint32_t rather than int to align to the type of
> > xen_mc_physcpuinfo.ncpus.
>
> I'm not sure about policies in the tool stack, but in the hypervisor I
> would request to use unsigned int ins
On Fri, Feb 17, 2017 at 02:39:34PM +0800, Haozhong Zhang wrote:
> If LMCE is supported by host and "lmce = 1" is present in xl config, the
> LMCE capability will be exposed in guest MSR_IA32_MCG_CAP. By default,
> LMCE is not exposed to guest so as to keep the backwards migration
> compatibility.
>
Hello Vijay,
On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Move common generic NUMA code to xen/common/numa.c from
xen/arch/x86/numa.c. Also move generic code in header file
xen/include/asm-x86/numa.h to xen/include/xen/numa.h
This common code can be re-used later for
>>> On 20.02.17 at 13:05, wrote:
> Several `ln -sf` can race with each other and cause error like:
>
> 14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory
>
> Provide dedicated targets for soft-linking directories.
>
> Reported-by: Andrew Cooper
> Signed-off-by: Wei Liu
>
>>> On 20.02.17 at 13:32, wrote:
> On Fri, Feb 17, 2017 at 02:39:34PM +0800, Haozhong Zhang wrote:
>> If LMCE is supported by host and "lmce = 1" is present in xl config, the
>> LMCE capability will be exposed in guest MSR_IA32_MCG_CAP. By default,
>> LMCE is not exposed to guest so as to keep the
Dario Faggioli writes:
> On Fri, 2017-02-17 at 19:44 +, Julien Grall wrote:
>> On 02/17/2017 06:40 PM, Dario Faggioli wrote:
>> > Does ARM
>> > have frequency scaling (I did remember something on xen-devel, but
>> > I am
>> > not sure whether it landed upstream)?
>>
>> I guess you mean the s
Hello Vijay,
On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Move some common numa code from xen/arch/x86/srat.c
to xen/common/numa.c
Signed-off-by: Vijaya Kumar K
---
xen/arch/x86/srat.c| 54 -
xen/common/numa.c
On Fri, Feb 17, 2017 at 02:39:36PM +0800, Haozhong Zhang wrote:
> If option '-l' or '--lmce' is specified and the host supports LMCE,
> xen-mceinj will inject LMCE to CPU specified by '-c' (or CPU0 if '-c'
> is not present).
>
> Signed-off-by: Haozhong Zhang
> ---
> Cc: Ian Jackson
> Cc: Wei Liu
Hello Vijay,
On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
numa_setup() contains generic and arch specific code.
Split numa_setup() and move architecture specific code
under arch_numa_setup().
Signed-off-by: Vijaya Kumar K
---
xen/arch/arm/Makefile | 1 +
xen/a
Hello Vijay,
On 09/02/17 15:56, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
When booting in UEFI mode, UEFI passes memory information
to Dom0 using EFI memory descriptor table and deletes the
memory nodes from the host DT. However to fetch the memory
numa node id, memory DT node should
On 15/02/17 11:07, Jan Beulich wrote:
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -45,6 +45,8 @@
> #define ModRM (1<<6)
> /* Destination is only written; never read. */
> #define Mov (1<<7)
> +/* VEX/EVEX (SIMD only): 2nd sourc
>>> On 09.02.17 at 11:26, wrote:
> On 09/02/17 09:52, Jan Beulich wrote:
>> All,
>>
>> these stable releases are due in about 3 weeks time. Please indicate
>> backports you consider necessary but find still missing. Commits
>> already marked for backporting:
>>
>> e719192026 xen: credit2: never co
On Mon, Feb 20, 2017 at 05:38:53AM -0700, Jan Beulich wrote:
> >>> On 20.02.17 at 13:32, wrote:
> > On Fri, Feb 17, 2017 at 02:39:34PM +0800, Haozhong Zhang wrote:
> >> If LMCE is supported by host and "lmce = 1" is present in xl config, the
> >> LMCE capability will be exposed in guest MSR_IA32_M
On Fri, Feb 17, 2017 at 12:40:12PM -0500, Boris Ostrovsky wrote:
> PV guests support VPMU and therefore leaf 0xa can be exposed
> to them.
>
> Signed-off-by: Boris Ostrovsky
I will defer this to x86 experts.
___
Xen-devel mailing list
Xen-devel@lists.
On Mon, Feb 20, 2017 at 05:37:56AM -0700, Jan Beulich wrote:
> >>> On 20.02.17 at 13:05, wrote:
> > Several `ln -sf` can race with each other and cause error like:
> >
> > 14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory
> >
> > Provide dedicated targets for soft-linking d
On 20/02/17 14:15, Wei Liu wrote:
> On Fri, Feb 17, 2017 at 12:40:12PM -0500, Boris Ostrovsky wrote:
>> PV guests support VPMU and therefore leaf 0xa can be exposed
>> to them.
>>
>> Signed-off-by: Boris Ostrovsky
> I will defer this to x86 experts.
Reviewed-by: Andrew Cooper
This already happe
On Mon, Feb 20, 2017 at 02:16:25PM +, Andrew Cooper wrote:
> On 20/02/17 14:15, Wei Liu wrote:
> > On Fri, Feb 17, 2017 at 12:40:12PM -0500, Boris Ostrovsky wrote:
> >> PV guests support VPMU and therefore leaf 0xa can be exposed
> >> to them.
> >>
> >> Signed-off-by: Boris Ostrovsky
> > I wil
>>> On 20.02.17 at 15:05, wrote:
> On Mon, Feb 20, 2017 at 05:37:56AM -0700, Jan Beulich wrote:
>> >>> On 20.02.17 at 13:05, wrote:
>> > +asm:
>> > + [ -L $@ ] || ln -sf $(XEN_ROOT)/xen/include/asm-x86 $@
>> > +
>> > +asm/%: asm ;
>>
>> Is the semicolon needed here? You don't have one above ...
On Thu, Feb 16, 2017 at 08:47:07AM +0100, Juergen Gross wrote:
> There have been reports that Fedora 25 uses /run instead of /var/run.
>
> Add a --with-rundir option ito configure to be able to specify that
I've read this thread but I'm not sure if I need to take any action or
all the comments ad
Several `ln -sf` can race with each other and cause error like:
14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory
Provide dedicated targets for soft-linking directories.
Reported-by: Andrew Cooper
Signed-off-by: Wei Liu
---
tools/fuzz/x86_instruction_emulator/Makefile |
Wei Liu (2):
fuzz/x86emul: avoid race in link farm rune
x86emul/test: avoid race in link farm rune
tools/fuzz/x86_instruction_emulator/Makefile | 12
tools/tests/x86_emulator/Makefile| 12
2 files changed, 16 insertions(+), 8 deletions(-)
--
2.11.0
__
Several `ln -sf` can race with each other. Provide dedicated targets
for soft-linking directories.
Signed-off-by: Wei Liu
---
tools/tests/x86_emulator/Makefile | 12
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/tools/tests/x86_emulator/Makefile
b/tools/tests/x86_e
On 20/02/17 15:31, Wei Liu wrote:
> On Thu, Feb 16, 2017 at 08:47:07AM +0100, Juergen Gross wrote:
>> There have been reports that Fedora 25 uses /run instead of /var/run.
>>
>> Add a --with-rundir option ito configure to be able to specify that
>
> I've read this thread but I'm not sure if I need
>>> On 20.02.17 at 14:45, wrote:
> On 15/02/17 11:07, Jan Beulich wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -45,6 +45,8 @@
>> #define ModRM (1<<6)
>> /* Destination is only written; never read. */
>> #define Mov (1
On 15/02/17 11:11, Jan Beulich wrote:
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -6183,6 +6200,23 @@ x86_emulate(
> case X86EMUL_OPC(0x0f, 0xae): case X86EMUL_OPC_66(0x0f, 0xae): /* Grp15
> */
> switch ( modrm_reg & 7 )
>
>>> On 20.02.17 at 15:37, wrote:
> Several `ln -sf` can race with each other and cause error like:
>
> 14:43:56 00:07:06 O: ln: cannot remove 'asm': No such file or directory
>
> Provide dedicated targets for soft-linking directories.
>
> Reported-by: Andrew Cooper
> Signed-off-by: Wei Liu
R
>>> On 20.02.17 at 15:37, wrote:
> Several `ln -sf` can race with each other. Provide dedicated targets
> for soft-linking directories.
>
> Signed-off-by: Wei Liu
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https:/
On 15/02/17 11:12, Jan Beulich wrote:
> @@ -6806,6 +6808,23 @@ x86_emulate(
> sfence = true;
> break;
>
> +case X86EMUL_OPC_66(0x0f38, 0x2a): /* movntdqa m128,xmm */
> +case X86EMUL_OPC_VEX_66(0x0f38, 0x2a): /* vmovntdqa mem,{x,y}mm */
> +generate_exception_i
On Fri, Feb 17, 2017 at 10:27:06AM +, Paul Durrant wrote:
> The new xendevicemodel library is intended to be used by all Xen device
> models such that the only hypercall that use will be the dm_op hypercall
> added by commit 524a98c2.
>
> This patch adds the boilerplate for the new library, wi
On Fri, Feb 17, 2017 at 10:27:09AM +, Paul Durrant wrote:
> My recent patch [1] to the Linux privcmd module introduced a mechanism
> to restrict an open file handle to subsequently only accept operations for
> a specified domain.
>
> This patch extends the libxendevicemodel API and make use of
On Fri, Feb 17, 2017 at 10:27:07AM +, Paul Durrant wrote:
> This patch extracts all functions resulting in a dm_op hypercall from
> libxenctrl and moves them into libxendevicemodel. It also adds a compat
> layer into libxenctrl, which can be selected by defining
> XC_WANT_COMPAT_DEVICEMODEL_API
On Fri, Feb 17, 2017 at 10:27:08AM +, Paul Durrant wrote:
> My recent patch [1] to the Linux privcmd module introduced a dedicated
> mechanism for making dm_op hypercalls.
>
> This patch adds the necessary code to libxendevicemodel to take
> advantage of that mechanism if it is implemented in
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 20 February 2017 15:08
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Jackson ;
> Wei Liu ; Samuel Thibault lyon.org>
> Subject: Re: [PATCH 1/4] tools/libxendevicemodel: introduce the new library
>
>
On Mon, Feb 20, 2017 at 03:07:32PM +, Wei Liu wrote:
> On Fri, Feb 17, 2017 at 10:27:06AM +, Paul Durrant wrote:
> > The new xendevicemodel library is intended to be used by all Xen device
> > models such that the only hypercall that use will be the dm_op hypercall
> > added by commit 524a9
>>> On 20.02.17 at 15:52, wrote:
> On 15/02/17 11:11, Jan Beulich wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -6183,6 +6200,23 @@ x86_emulate(
>> case X86EMUL_OPC(0x0f, 0xae): case X86EMUL_OPC_66(0x0f, 0xae): /* Grp15
>> */
>>
On 15/02/17 11:12, Jan Beulich wrote:
> --- a/tools/tests/x86_emulator/test_x86_emulator.c
> +++ b/tools/tests/x86_emulator/test_x86_emulator.c
> @@ -8,19 +8,37 @@
>
> #define verbose false /* Switch to true for far more logging. */
>
> +static void blowfish_set_regs(struct cpu_user_regs *regs
>>> On 20.02.17 at 16:01, wrote:
> On 15/02/17 11:12, Jan Beulich wrote:
>> @@ -6806,6 +6808,23 @@ x86_emulate(
>> sfence = true;
>> break;
>>
>> +case X86EMUL_OPC_66(0x0f38, 0x2a): /* movntdqa m128,xmm */
>> +case X86EMUL_OPC_VEX_66(0x0f38, 0x2a): /* vmovntdqa mem,
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 20 February 2017 15:12
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Jackson ;
> Wei Liu ; Samuel Thibault lyon.org>
> Subject: Re: [PATCH 1/4] tools/libxendevicemodel: introduce the new library
>
>
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 20 February 2017 15:09
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Jackson ;
> Wei Liu
> Subject: Re: [PATCH 2/4] tools/libxendevicemodel: extract functions and add
> a compat layer
>
> On Fri, Feb
On 18/01/17 13:21, bharat gohil wrote:
Hello
I am new to GPU and GPU virtualization and found that xen support
intel GPU virtualization using XenGT.
I want to know,
1) What are the critical GPU command pass from xen to Dom0?
2) How the Dom0 mediator or xen validate the GPU command which is
On 20/02/17 14:43, Juergen Gross wrote:
> On 20/02/17 15:31, Wei Liu wrote:
>> On Thu, Feb 16, 2017 at 08:47:07AM +0100, Juergen Gross wrote:
>>> There have been reports that Fedora 25 uses /run instead of /var/run.
>>>
>>> Add a --with-rundir option ito configure to be able to specify that
>> I've
On Mon, Feb 20, 2017 at 03:14:27PM +, Paul Durrant wrote:
> > -Original Message-
> > From: Wei Liu [mailto:wei.l...@citrix.com]
> > Sent: 20 February 2017 15:12
> > To: Paul Durrant
> > Cc: xen-de...@lists.xenproject.org; Ian Jackson ;
> > Wei Liu ; Samuel Thibault > lyon.org>
> > Sub
1 - 100 of 188 matches
Mail list logo