On Wed, 2017-10-11 at 09:55 +0800, Yi Sun wrote:
> The whole value array is transferred into 'do_write_psr_msrs'. Then,
> we can
> write all features values on the cos id into MSRs.
>
> Because multiple features may co-exist, we need handle all features to
> write
> values of them into a COS regis
Hi all,
We are pleased to announce an update of Intel GVT-g for Xen.
Intel GVT-g is a full GPU virtualization solution with mediated pass-through,
starting from 4th generation Intel Core(TM) processors with Intel processor
graphics. A virtual GPU instance is maintained for each VM, with part of
On 17-10-11 14:59:23, Chao Peng wrote:
> On Wed, 2017-10-11 at 09:55 +0800, Yi Sun wrote:
> > static void do_write_psr_msrs(void *data)
> > {
> > -const struct cos_write_info *info = data;
> > -struct feat_node *feat = info->feature;
> > -const struct feat_props *props = info->props;
flight 114332 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114332/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 7 xen-boot fail REGR. vs. 114299
Tests which
Adding Julien and Stefano.
On Wed, Oct 11, 2017 at 07:17:59AM +, osstest service owner wrote:
> flight 114332 xen-unstable-smoke real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/114332/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests whic
Hi Stanislaw and Peter,
On 10/10/2017 08:42 PM, Stanislaw Gruszka wrote:
> On Tue, Oct 10, 2017 at 12:59:26PM +0200, Ingo Molnar wrote:
>>
>> (Cc:-ed more gents involved in kernel/sched/cputime.c work. Full patch
>> quoted
>> below.)
>>
>> * Dongli Zhang wrote:
>>
>>> After guest live migration
On Wed, Oct 11, 2017 at 04:54:40AM +, osstest service owner wrote:
> branch xen-unstable
> xenbranch xen-unstable
> job test-amd64-amd64-xl-pvh-intel
> testid guest-start
>
> Tree: linux
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
> Tree: linuxfirmware git://xenbit
The whole value array is transferred into 'do_write_psr_msrs'. Then, we can
write all features values on the cos id into MSRs.
Because multiple features may co-exist, we need handle all features to write
values of them into a COS register with new COS ID. E.g:
1. L3 CAT and L2 CAT co-exist.
2. Dom
>>> On 10.10.17 at 14:43, wrote:
> On 10/10/17 11:43, Jan Beulich wrote:
>> There's another issue here, but I'll first have to think about possible
>> (preferably non-intrusive) solutions: An access crossing a page
>> boundary and having
>> - a set mask bit corresponding to an element fully living
Hi Rik,
On 10/10/2017 10:01 PM, Rik van Riel wrote:
> On Tue, 2017-10-10 at 14:48 +0200, Peter Zijlstra wrote:
>> On Tue, Oct 10, 2017 at 02:42:01PM +0200, Stanislaw Gruszka wrote:
> + u64 steal, steal_time;
> + s64 steal_delta;
> +
> + steal_time =
> pa
Hi Dave,
On 26 September 2017 at 20:08, Dave Martin wrote:
> On Fri, Sep 22, 2017 at 01:53:26PM +0530, Bhupinder Thakur wrote:
>> This patch fixes the issue observed when pl011 patches were tested on
>> the junos hardware by Andre/Julien. It was observed that when large output is
>> generated suc
>>> On 10.10.17 at 19:03, wrote:
> On 10.10.17 19:12, Jan Beulich wrote:
> On 10.10.17 at 17:52, wrote:
>>> +uint8_t a[16];
>>> +} xen_uuid_t;
>>> +
>>> +/*
>>> + * XEN_DEFINE_UUID(0x00112233, 0x4455, 0x6677, 0x8899,
>>> + * 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff)
>>> + * will
>>> On 10.10.17 at 20:08, wrote:
> On 10/10/2017 05:24 PM, Jan Beulich wrote:
> On 10.10.17 at 16:13, wrote:
>>> On Ma, 2017-10-10 at 06:28 -0600, Jan Beulich wrote:> >
>>
>>>
>>> a.u.set_mem_access_multi.pfn_list,
> + a.u.set_mem_access_m
flight 114279 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114279/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-xsm broken in 114194
test-armhf-armhf-xl-credit2
>>> On 10.10.17 at 15:26, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 09 October 2017 14:06
>> >>> On 06.10.17 at 14:25, wrote:
>> > --- a/xen/common/memory.c
>> > +++ b/xen/common/memory.c
>> > @@ -965,6 +965,67 @@ static long xatp_permission_check(struct domain
>> *d, unsign
Hi Stefano,
Sorry for the long delay. I've been busy with other school stuff recently so
I can only use my spare time on this. The current situation is: the
code has already been completed, but I'm still drafting the man pages
and there are approximately 20% left. I'll try my best to update it wit
>>> On 10.10.17 at 16:37, wrote:
>> From: Paul Durrant
>> Sent: 10 October 2017 15:10
>> > From: Jan Beulich [mailto:jbeul...@suse.com]
>> > Sent: 09 October 2017 15:23
>> > To: Paul Durrant
>> > >>> On 06.10.17 at 14:25, wrote:
>> > > --- a/xen/common/memory.c
>> > > +++ b/xen/common/memory.c
>
>>> On 10.10.17 at 16:45, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 09 October 2017 16:21
>> >>> On 06.10.17 at 14:25, wrote:
>> > @@ -784,6 +885,45 @@ int hvm_get_ioreq_server_info(struct domain *d,
>> ioservid_t id,
>> > return rc;
>> > }
>> >
>> > +int hvm_get_ioreq
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 11 October 2017 09:31
> To: Paul Durrant
> Cc: Andrew Cooper ; George Dunlap
> ; Ian Jackson ; Wei Liu
> ; 'Stefano Stabellini' ; 'xen-
> de...@lists.xenproject.org' ;
> 'KonradRzeszutek Wilk' ; Tim (Xen.org)
>
>
>>> On 10.10.17 at 18:01, wrote:
>> > @@ -3795,6 +3807,18 @@ int gnttab_map_frame(struct domain *d,
>> unsigned long idx, gfn_t gfn,
>> > return rc;
>> > }
>> >
>> > +int gnttab_get_frame(struct domain *d, unsigned long idx, mfn_t *mfn)
>>
>> const struct domain * (I realize now that the sa
>>> On 11.10.17 at 10:38, wrote:
> Separate permissions could be an option, but maybe it would be better just
> to introduce a new resource mapping permission. I'll probably go with the
> latter.
Oh, I'm certainly fine with that, it just means more changes.
Jan
__
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 11 October 2017 09:47
> To: Paul Durrant
> Cc: Andrew Cooper ; George Dunlap
> ; Ian Jackson ; Wei Liu
> ; Stefano Stabellini ; xen-
> de...@lists.xenproject.org; KonradRzeszutek Wilk
> ; Tim (Xen.org)
> Subject:
>>> On 11.10.17 at 01:24, wrote:
> On Tue, 10 Oct 2017, Volodymyr Babchuk wrote:
>> --- a/xen/include/public/xen.h
>> +++ b/xen/include/public/xen.h
>> @@ -930,6 +930,39 @@ __DEFINE_XEN_GUEST_HANDLE(uint16, uint16_t);
>> __DEFINE_XEN_GUEST_HANDLE(uint32, uint32_t);
>> __DEFINE_XEN_GUEST_HANDLE(u
>>> On 10.10.17 at 18:47, wrote:
> On 10/10/2017 05:20 PM, George Dunlap wrote:
>> Once feof() returns true for a stream, it will continue to return true
>> for that stream until clearerr() is called (or the stream is closed
>> and re-opened).
>>
>> In llvm-clang-fast-mode, the same file descript
>>> On 10.10.17 at 19:22, wrote:
> George Dunlap writes ("[PATCH v3 01/12] fuzz/x86_emulate: Clear errors after
> each iteration"):
>> Once feof() returns true for a stream, it will continue to return true
>> for that stream until clearerr() is called (or the stream is closed
>> and re-opened).
>
>>> On 10.10.17 at 18:20, wrote:
> When generating coverage output, by default gcov generates output
> filenames based only on the coverage file and the "leaf" source file,
> not the full path. As a result, it uses the same name for
> x86_emulate.c and x86_emulate/x86_emulate.c, generally overwri
Due to the recent changes to the PVH tests, all of them are now
failing because the current Linux kernel used by osstest doesn't
support PVHv2, and osstest treats the failures as regressions because
previously the PVH tests where actually testing classic PV.
Rename the tests to 'pvhv2' in order to
>>> On 10.10.17 at 19:25, wrote:
> George Dunlap writes ("[PATCH v3 08/12] fuzz/x86_emulate: Move definitions
> into a header"):
>> Move fuzz-emul.c function prototypes into a header. Also share the
>> definition of the input size (rather than hard-coding it in
>> fuzz-emul.c).
>>
>> Signed-off
>>> On 10.10.17 at 18:20, wrote:
> At the moment, AFL reckons that for any given input, 87% of it is
> completely irrelevant: that is, it can change it as much as it wants
> but have no impact on the result of the test; and yet it can't remove
> it.
>
> This is largely because we interpret the bl
>>> On 10.10.17 at 20:44, wrote:
> On 10/10/17 17:20, George Dunlap wrote:
>> +if ( state[0].elem != state[1].elem ) \
>> +printf(#elem " differ: %lx != %lx\n", \
>> + (unsigned long)state[0].elem, \
>> + (unsigned long)state[
Hi Jan,
On 11/10/17 09:54, Jan Beulich wrote:
On 11.10.17 at 01:24, wrote:
On Tue, 10 Oct 2017, Volodymyr Babchuk wrote:
--- a/xen/include/public/xen.h
+++ b/xen/include/public/xen.h
@@ -930,6 +930,39 @@ __DEFINE_XEN_GUEST_HANDLE(uint16, uint16_t);
__DEFINE_XEN_GUEST_HANDLE(uint32, uint32_t
>>> On 10.10.17 at 18:20, wrote:
> --- a/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
> +++ b/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
> @@ -40,6 +40,8 @@ struct fuzz_state
> uint64_t msr[MSR_INDEX_MAX];
> struct segment_register segments[SEG_NUM];
> struct cpu_user_regs r
>>> On 10.10.17 at 18:20, wrote:
> AFL considers a testcase to be a useful addition not only if there are
> tuples exercised by that testcase which were not exercised otherwise,
> but also if the *number* of times an individual tuple is exercised
> changes significantly; in particular, if the numb
>>> On 11.10.17 at 11:29, wrote:
> Hi Jan,
>
> On 11/10/17 09:54, Jan Beulich wrote:
> On 11.10.17 at 01:24, wrote:
>>> On Tue, 10 Oct 2017, Volodymyr Babchuk wrote:
--- a/xen/include/public/xen.h
+++ b/xen/include/public/xen.h
@@ -930,6 +930,39 @@ __DEFINE_XEN_GUEST_HANDLE(ui
>>> On 11.10.17 at 10:54, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 11 October 2017 09:47
>> >>> On 10.10.17 at 18:01, wrote:
>> >> > @@ -993,6 +1018,11 @@ static int acquire_resource(const
>> >> xen_mem_acquire_resource_t *xmar)
>> >> >
On Tue, 2017-10-10 at 06:28 -0600, Jan Beulich wrote:
> > > > +typedef struct xen_hvm_altp2m_set_mem_access_multi
> > +xen_hvm_altp2m_set_mem_access_multi_t;
> > +DEFINE_XEN_GUEST_HANDLE(xen_hvm_altp2m_set_mem_access_multi_t);
>
> Are typedef and handle actually needed anywhere? Otherwise
> pl
On 11/10/17 10:51, Ian Jackson wrote:
> Andrew Cooper writes ("[PATCH] tools/libxc: Fix domid parameter types"):
>> Mixed throughout libxc are uint32_t, int, and domid_t for domid parameters.
>> With a signed type, and an explicitly 16-bit type, it is exceedingly
>> difficult
>> to construct an IN
Markus Armbruster writes ("Re: [Qemu-devel] [PATCH 7/8] os-posix: Provide new
-runasid option"):
> Actually, a numeric UID without group name or ID could be made to work
> just fine as long as it maps to a user name. The use case may not be
> worth the bother, though.
In libxl's use case, it wou
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 11 October 2017 10:43
> To: Paul Durrant
> Cc: Andrew Cooper ; George Dunlap
> ; Ian Jackson ; Wei Liu
> ; Stefano Stabellini ; xen-
> de...@lists.xenproject.org; KonradRzeszutek Wilk
> ; Tim (Xen.org)
> Subject
Andrew Cooper writes ("[PATCH] tools/libxc: Fix domid parameter types"):
> Mixed throughout libxc are uint32_t, int, and domid_t for domid parameters.
> With a signed type, and an explicitly 16-bit type, it is exceedingly difficult
> to construct an INVALID_DOMID constant which works with all of th
On Wed, Oct 11, 2017 at 10:52:42AM +0100, Andrew Cooper wrote:
> On 11/10/17 10:51, Ian Jackson wrote:
> > Andrew Cooper writes ("[PATCH] tools/libxc: Fix domid parameter types"):
> >> Mixed throughout libxc are uint32_t, int, and domid_t for domid parameters.
> >> With a signed type, and an explic
>>> On 10.10.17 at 22:24, wrote:
> --- a/xen/common/grant_table.c
> +++ b/xen/common/grant_table.c
> @@ -76,6 +76,9 @@ struct grant_table {
> /* Mapping tracking table per vcpu. */
> struct grant_mapping **maptrack;
>
> +/* Domain to which this struct grant_table belongs. */
> +
On Wed, Oct 11, 2017 at 01:28:44PM +0530, Bhupinder Thakur wrote:
> Hi Dave,
>
> On 26 September 2017 at 20:08, Dave Martin wrote:
> > On Fri, Sep 22, 2017 at 01:53:26PM +0530, Bhupinder Thakur wrote:
> >> This patch fixes the issue observed when pl011 patches were tested on
> >> the junos hardwa
>>> On 11.10.17 at 11:54, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 11 October 2017 10:43
>> Hmm, that would be an option, but I'd prefer if we could get away
>> without. And no, I wasn't suggesting to introduce yet another
>> hypercall. Instead how about the handle being a n
>>> On 10.10.17 at 23:00, wrote:
> On Tue, 2017-10-10 at 06:28 -0600, Jan Beulich wrote:
>> > > > +typedef struct xen_hvm_altp2m_set_mem_access_multi
>> > +xen_hvm_altp2m_set_mem_access_multi_t;
>> > +DEFINE_XEN_GUEST_HANDLE(xen_hvm_altp2m_set_mem_access_multi_t);
>>
>> Are typedef and handle
flight 114339 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114339/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 3b40cfcd1a1912c2e4c4eb353dc77cbf35c63c3a
baseline version:
xen dbc4
flight 114335 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114335/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 7 xen-boot fail REGR. vs. 114299
Tests which
On Tue, Oct 10, 2017 at 07:17:45PM -0400, Meng Xu wrote:
> Revise xl tool use case by adding -e option
> Remove work-conserving from TODO list
>
> Signed-off-by: Meng Xu
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lis
On Tue, Oct 10, 2017 at 07:17:42PM -0400, Meng Xu wrote:
> Modify libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
> functions to support per-VCPU extratime flag
>
> Signed-off-by: Meng Xu
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-d
On Tue, Oct 10, 2017 at 07:17:43PM -0400, Meng Xu wrote:
> Change main_sched_rtds and related output functions to support
> per-VCPU extratime flag.
>
> Signed-off-by: Meng Xu
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https
>>> On 10.10.17 at 13:35, wrote:
> On Wed, Oct 04, 2017 at 08:34:13AM +, Jan Beulich wrote:
>> >>> On 19.09.17 at 17:29, wrote:
>> > --- a/xen/include/xen/vpci.h
>> > +++ b/xen/include/xen/vpci.h
>> > @@ -72,6 +72,30 @@ struct vpci {
>> > } bars[7]; /* At most 6 BARS + 1 expansion RO
Roger Pau Monne writes ("[PATCH RFC] osstest: rename pvh tests to pvhv2"):
> Due to the recent changes to the PVH tests, all of them are now
> failing because the current Linux kernel used by osstest doesn't
> support PVHv2, and osstest treats the failures as regressions because
> previously the PV
Wei Liu writes ("Re: [PATCH] tools/libxc: Fix domid parameter types"):
> On Wed, Oct 11, 2017 at 10:52:42AM +0100, Andrew Cooper wrote:
> > I'm sorry for it being late, but it is blocking my other series to fix
> > gnttab construction in the domain builder, which really is 4.10 material.
Ah. OK.
>>> On 10.10.17 at 17:04, wrote:
> On Wed, Oct 04, 2017 at 08:34:43AM +, Jan Beulich wrote:
>> >>> On 19.09.17 at 17:29, wrote:
>> > --- a/xen/include/xen/vpci.h
>> > +++ b/xen/include/xen/vpci.h
>> > @@ -100,6 +100,40 @@ struct vpci {
>> > /* 64-bit address capable? */
>> >
On 11 October 2017 at 11:28, Ian Jackson wrote:
> Wei Liu writes ("Re: [PATCH] tools/libxc: Fix domid parameter types"):
>> On Wed, Oct 11, 2017 at 10:52:42AM +0100, Andrew Cooper wrote:
>> > I'm sorry for it being late, but it is blocking my other series to fix
>> > gnttab construction in the dom
On Tue, 2017-10-10 at 19:17 -0400, Meng Xu wrote:
> Change main_sched_rtds and related output functions to support
> per-VCPU extratime flag.
>
> Signed-off-by: Meng Xu
>
Reviewed-by: Dario Faggioli
Regards,
Dario
--
<> (Raistlin Majere)
---
On Tue, 2017-10-10 at 19:17 -0400, Meng Xu wrote:
> Revise xl tool use case by adding -e option
> Remove work-conserving from TODO list
>
> Signed-off-by: Meng Xu
>
Reviewed-by: Dario Faggioli
Regards,
Dario
--
<> (Raistlin Majere)
-
On Tue, 2017-10-10 at 19:17 -0400, Meng Xu wrote:
> Make RTDS scheduler work conserving without breaking the real-time
> guarantees.
>
> VCPU model:
> Each real-time VCPU is extended to have an extratime flag
> and a priority_level field.
> When a VCPU's budget is depleted in the current period,
>
On Tue, 2017-10-10 at 19:17 -0400, Meng Xu wrote:
> Modify libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set
> functions to support per-VCPU extratime flag
>
> Signed-off-by: Meng Xu
>
Reviewed-by: Dario Faggioli
Regards,
Dario
--
<> (Raistlin Majere)
---
On Tue, 2017-10-10 at 19:17 -0400, Meng Xu wrote:
> --- a/tools/xentrace/formats
> +++ b/tools/xentrace/formats
> @@ -75,7 +75,7 @@
> 0x00022801 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) rtds:tickle[
> cpu = %(1)d ]
> 0x00022802 CPU%(cpu)d %(tsc)d (+%(reltsc)8d) rtds:runq_pick [
> dom:v
This run is configured for baseline tests only.
flight 72227 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72227/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 17 guest-local
On Fri, Oct 06, 2017 at 08:00:00PM +0100, Andrew Cooper wrote:
> Mixed throughout libxc are uint32_t, int, and domid_t for domid parameters.
> With a signed type, and an explicitly 16-bit type, it is exceedingly difficult
> to construct an INVALID_DOMID constant which works with all of them. (The
flight 72228 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72228/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
build-arm64 2 hosts-allocate broken like 72196
build-arm64-pvops
On 11/10/17 08:44, Jan Beulich wrote:
On 10.10.17 at 14:43, wrote:
>> On 10/10/17 11:43, Jan Beulich wrote:
>>> There's another issue here, but I'll first have to think about possible
>>> (preferably non-intrusive) solutions: An access crossing a page
>>> boundary and having
>>> - a set mask
>>> On 11.10.17 at 05:03, wrote:
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -1105,7 +1105,13 @@ static void dma_msi_set_affinity(struct irq_desc
> *desc, const cpumask_t *mask)
>
> spin_lock_irqsave(&iommu->register_lock, flags);
> dma
On 10/10/2017 07:20 PM, Andrew Cooper wrote:
> On 10/10/17 17:20, George Dunlap wrote:
>> This is in preparation for adding the option for a more "compact"
>> interpretation of the fuzzing data, in which we only change select
>> bits of the state.
>>
>> Signed-off-by: George Dunlap
>> Acked-by: Ja
On Wed, Oct 11, 2017 at 04:33:26AM +, osstest service owner wrote:
> flight 114273 qemu-upstream-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/114273/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> t
>>> On 11.10.17 at 13:23, wrote:
> On 11/10/17 08:44, Jan Beulich wrote:
> On 10.10.17 at 14:43, wrote:
>>> On 10/10/17 11:43, Jan Beulich wrote:
There's another issue here, but I'll first have to think about possible
(preferably non-intrusive) solutions: An access crossing a page
>
On Wed, Oct 11, 2017 at 11:34:23AM +, Anthony PERARD wrote:
> On Wed, Oct 11, 2017 at 04:33:26AM +, osstest service owner wrote:
> > flight 114273 qemu-upstream-unstable real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/114273/
> >
> > Regressions :-(
> >
> > Tests which di
>>> On 10.10.17 at 18:31, wrote:
> --- a/xen/arch/x86/hvm/ioreq.c
> +++ b/xen/arch/x86/hvm/ioreq.c
> @@ -33,6 +33,37 @@
>
> #include
>
> +static void set_ioreq_server(struct domain *d, unsigned int id,
> + struct hvm_ioreq_server *s)
> +{
> +ASSERT(id < MAX_NR
Added type xen_uuid_t. This type represents UUID as an array of 16
bytes in big endian format.
Added macro XEN_DEFINE_UUID that constructs UUID in the usual way:
XEN_DEFINE_UUID(0x00112233, 0x4455, 0x6677, 0x8899,
0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff)
will construct UUID 00112233-
From: Gregory Herrero
When filling __xen_guest section of a guest, user may define
HYPERCALL_PAGE earlier than VIRT_BASE in the section leading to an
incorrect hypercall page address since an undefined virt_base could be
used to compute hypercall page address.
If there is no VIRT_BASE entry in __
>>> On 11.10.17 at 09:20, wrote:
> --- a/xen/arch/x86/psr.c
> +++ b/xen/arch/x86/psr.c
> @@ -,25 +,43 @@ static unsigned int get_socket_cpu(unsigned int
> socket)
> struct cos_write_info
> {
> unsigned int cos;
> -struct feat_node *feature;
> const uint32_t *val;
> -co
Hi jan
On 11.10.17 11:07, Jan Beulich wrote:
On 10.10.17 at 19:03, wrote:
On 10.10.17 19:12, Jan Beulich wrote:
On 10.10.17 at 17:52, wrote:
+uint8_t a[16];
+} xen_uuid_t;
+
+/*
+ * XEN_DEFINE_UUID(0x00112233, 0x4455, 0x6677, 0x8899,
+ * 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xf
>>> On 11.10.17 at 14:12, wrote:
> On 11.10.17 11:07, Jan Beulich wrote:
> On 10.10.17 at 19:03, wrote:
>>> On 10.10.17 19:12, Jan Beulich wrote:
>>> On 10.10.17 at 17:52, wrote:
> +uint8_t a[16];
> +} xen_uuid_t;
> +
> +/*
> + * XEN_DEFINE_UUID(0x00112233, 0x4455
>>> On 11.10.17 at 13:57, wrote:
> +/* Compound literals are supported in C99 and later. */
> +#if (defined (__STDC_VERSION__) && __STDC_VERSION__ >= 199901L) || \
> +defined (__GNUC__)
Strictly speaking the comment above is now stale.
Also please don't put a space between "defined" and
>>> On 11.10.17 at 14:03, wrote:
> When filling __xen_guest section of a guest, user may define
> HYPERCALL_PAGE earlier than VIRT_BASE in the section leading to an
> incorrect hypercall page address since an undefined virt_base could be
> used to compute hypercall page address.
> If there is no V
>>> On 20.09.17 at 21:50, wrote:
> It's a leftover from PVHv1 days.
>
> Signed-off-by: Boris Ostrovsky
I've applied this despite the still missing VMX maintainer ack,
for it being simple enough. But in general it should be you to
chase missing acks.
Jan
__
On Wed, Oct 11, 2017 at 06:40:14AM -0600, Jan Beulich wrote:
> >>> On 11.10.17 at 14:03, wrote:
> > When filling __xen_guest section of a guest, user may define
> > HYPERCALL_PAGE earlier than VIRT_BASE in the section leading to an
> > incorrect hypercall page address since an undefined virt_base
From: Paul Semel
the strcpy function was doing a comparison instead of doing an
assignment.
Signed-off-by: Paul Semel
Reviewed-by: Pawel Wieczorkiewicz
Reviewed-by: Bjoern Doebel
Reviewed-by: Martin Pohlack
---
common/libc/string.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
dif
>>> On 08.10.17 at 09:23, wrote:
> This patch implements get HW info flow for MBA including its callback
> function and sysctl interface.
>
> Signed-off-by: Yi Sun
> Reviewed-by: Roger Pau Monné
Acked-by: Jan Beulich
with one further adjustment:
> --- a/xen/include/asm-x86/psr.h
> +++ b/xen/
On 11/10/17 14:07, Paul Semel wrote:
> From: Paul Semel
>
> the strcpy function was doing a comparison instead of doing an
> assignment.
>
> Signed-off-by: Paul Semel
>
> Reviewed-by: Pawel Wieczorkiewicz
> Reviewed-by: Bjoern Doebel
> Reviewed-by: Martin Pohlack
Oops. This issue is hidden d
From: Gregory Herrero
When filling __xen_guest section of a guest, user may define
HYPERCALL_PAGE earlier than VIRT_BASE in the section leading to an
incorrect hypercall page address since an undefined virt_base could be
used to compute hypercall page address.
If there is no VIRT_BASE entry in __
>>> On 08.10.17 at 09:23, wrote:
> --- a/xen/arch/x86/psr.c
> +++ b/xen/arch/x86/psr.c
> @@ -138,6 +138,12 @@ static const struct feat_props {
>
> /* write_msr is used to write out feature MSR register. */
> void (*write_msr)(unsigned int cos, uint32_t val, enum psr_type type);
> +
> +
>>> On 11.10.17 at 15:35, wrote:
> @@ -336,16 +337,22 @@ elf_errorstatus elf_xen_parse_guest_info(struct
> elf_binary *elf,
> if ( !strcmp(name, "ELF_PADDR_OFFSET") )
> parms->elf_paddr_offset = strtoull(value, NULL, 0);
> if ( !strcmp(name, "HYPERCALL_PAGE") )
> -
flight 114346 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114346/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 7 xen-boot fail REGR. vs. 114299
Tests which
On 11 October 2017 at 15:38, Dave Martin wrote:
> On Wed, Oct 11, 2017 at 01:28:44PM +0530, Bhupinder Thakur wrote:
>> Hi Dave,
>>
>> On 26 September 2017 at 20:08, Dave Martin wrote:
>> > On Fri, Sep 22, 2017 at 01:53:26PM +0530, Bhupinder Thakur wrote:
>> >> This patch fixes the issue observed
From: Gregory Herrero
When filling __xen_guest section of a guest, user may define
HYPERCALL_PAGE earlier than VIRT_BASE in the section leading to an
incorrect hypercall page address since an undefined virt_base could be
used to compute hypercall page address.
If there is no VIRT_BASE entry in __
Hello,
Now that "x86/hvm: implement hvmemul_write() using real mappings" is in,
we can start working again on implementing hvmemul_cmpxchg() with a real
CMPXCHG, and finally fix the SMP emulation race upstream.
However, in order to do that we would need X86EMUL_CMPXCHG_FAILED which
has been
On 10/10/2017 12:54 PM, Kyle Huey wrote:
> On Mon, Jul 24, 2017 at 9:54 AM, Kyle Huey wrote:
>> On Mon, Jul 24, 2017 at 8:07 AM, Boris Ostrovsky
>> wrote:
> One thing I noticed is that the workaround doesn't appear to be
> complete: it is only checking PMC0 status and not other counters (
>>> On 11.10.17 at 15:59, wrote:
> Now that "x86/hvm: implement hvmemul_write() using real mappings" is in,
> we can start working again on implementing hvmemul_cmpxchg() with a real
> CMPXCHG, and finally fix the SMP emulation race upstream.
That's my plan, but this will end up being complete
Commit a0543df403 "xen/arm: page: Clean-up the definition of MAIRVAL"
combined the definition of MAIR0VAL and MAIR1VAL in MAIRVAL. Sadly, when
building in 32-bit environment, the assembler is unable to compute
64-bit constant and will ignore the 32-bit most-significants bits. This
will result of MA
On Fri, Sep 08, Olaf Hering wrote:
> A related question: is it save to increase MAX_BATCH_SIZE from 1024 to
> (256*1024) to transfer a whole gigabyte at a time? That way it will be
> easier to handle holes within a 1GB superpage.
To answer my own question:
This change leads to this error:
-#def
The macros SUPERPAGE_2MB_SHIFT and SUPERPAGE_1GB_SHIFT will be used by
other code in libxc. Move the macros to a header file.
Signed-off-by: Olaf Hering
Acked-by: Wei Liu
---
tools/libxc/xc_dom_x86.c | 5 -
tools/libxc/xc_private.h | 5 +
2 files changed, 5 insertions(+), 5 deletions(-)
Extend API for managing bitmaps. Each bitmap is now represented by a
generic struct xc_sr_bitmap.
Switch the existing populated_pfns to this API.
Signed-off-by: Olaf Hering
Acked-by: Wei Liu
---
tools/libxc/xc_sr_common.c | 41 +
tools/libxc/xc_sr_common.h | 73 +++
During creating of a HVM domU meminit_hvm() tries to map superpages.
After save/restore or migration this mapping is lost, everything is
allocated in single pages. This causes a performance degradition after
migration.
Add neccessary code to preallocate a superpage for the chunk of pfns
that is re
Using superpages on the receiving dom0 will avoid performance regressions.
Olaf
v10:
coding style in xc_sr_bitmap API
reset bitmap size on free
check for empty bitmap in xc_sr_bitmap API
add comment to struct x86_hvm_sp, keep the short name
style and type changes in x86_hvm_punch_hole
do no
flight 114288 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114288/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumprun8 xen-buildfail REGR. vs. 114204
Tests which did no
The function get_ipa_output_size is check whether the input size
configured by the guest is valid and will return it.
The check is done with the IPS already shifted against
TCR_EL1_IPS_48_BIT. However the constant has been defined with the
shift included, resulting the check always been false.
Fi
Hi,
On 11/10/17 08:30, Roger Pau Monné wrote:
Adding Julien and Stefano.
On Wed, Oct 11, 2017 at 07:17:59AM +, osstest service owner wrote:
flight 114332 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114332/
Regressions :-(
Tests which did not succeed an
1 - 100 of 201 matches
Mail list logo