On 22/03/18 17:30, Jan Beulich wrote:
On 21.03.18 at 13:51, wrote:
>> Instead of flushing the TLB from global pages when switching address
>> spaces with XPTI being active just disable global pages via %cr4
>> completely when a domain subject to XPTI is active. This avoids the
>> need for ext
>>> On 27.03.18 at 09:14, wrote:
> On 22/03/18 17:30, Jan Beulich wrote:
> On 21.03.18 at 13:51, wrote:
>>> Instead of flushing the TLB from global pages when switching address
>>> spaces with XPTI being active just disable global pages via %cr4
>>> completely when a domain subject to XPTI is
On 27/03/18 09:23, Jan Beulich wrote:
On 27.03.18 at 09:14, wrote:
>> On 22/03/18 17:30, Jan Beulich wrote:
>> On 21.03.18 at 13:51, wrote:
Instead of flushing the TLB from global pages when switching address
spaces with XPTI being active just disable global pages via %cr4
>>> On 26.03.18 at 18:32, wrote:
> The code is not prepared to handle such case, so just return early. In
> the debug case add an assert.
>
> Reported-by: Coverity
> Coverity ID: 1430809
> Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
___
On 27/03/18 09:37, Juergen Gross wrote:
> On 27/03/18 09:23, Jan Beulich wrote:
> On 27.03.18 at 09:14, wrote:
>>> On 22/03/18 17:30, Jan Beulich wrote:
>>> On 21.03.18 at 13:51, wrote:
> Instead of flushing the TLB from global pages when switching address
> spaces with XPTI being
>>> On 27.03.18 at 09:37, wrote:
> On 27/03/18 09:23, Jan Beulich wrote:
> On 27.03.18 at 09:14, wrote:
>>> On 22/03/18 17:30, Jan Beulich wrote:
>>> On 21.03.18 at 13:51, wrote:
> Instead of flushing the TLB from global pages when switching address
> spaces with XPTI being activ
flight 121278 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/121278/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-nested-intel 17 debian-hvm-install/l1/l2 fail REGR. vs.
119227
Tests w
On 27/03/18 10:33, Jan Beulich wrote:
On 27.03.18 at 09:37, wrote:
>> On 27/03/18 09:23, Jan Beulich wrote:
>> On 27.03.18 at 09:14, wrote:
On 22/03/18 17:30, Jan Beulich wrote:
On 21.03.18 at 13:51, wrote:
>> Instead of flushing the TLB from global pages when switchin
On Tue, Mar 27, 2018 at 05:42:11AM +1000, Alexey G wrote:
> On Mon, 26 Mar 2018 10:24:38 +0100
> Roger Pau Monné wrote:
>
> >On Sat, Mar 24, 2018 at 08:32:44AM +1000, Alexey G wrote:
> [...]
> >> In fact, the emulated chipset (NB+SB combo without supplemental
> >> devices) itself is a small part
>>> On 27.03.18 at 06:52, wrote:
> After reset, IBRS is disabled by processor, but a coming intr/nmi leave IBRS
> enabled after their exit. It's not necessory for bootup code to run in low
> performance with IBRS enabled.
>
> On ORACLE X6-2(500GB/88 cpus, dom0 11GB/20 vcpus), we observed an 200s+
>>> On 27.03.18 at 10:44, wrote:
> On 27/03/18 10:33, Jan Beulich wrote:
> On 27.03.18 at 09:37, wrote:
>>> On 27/03/18 09:23, Jan Beulich wrote:
>>> On 27.03.18 at 09:14, wrote:
> I just realized that using read_cr4() | X86_CR4_PGE is wrong. We would
> keep bits switched on whic
Avoid flushing the complete TLB when switching %cr3 for mitigation of
Meltdown by using the PCID feature if available.
We are using 4 PCID values for a 64 bit pv domain subject to XPTI and
2 values for the non-XPTI case:
- guest active and in kernel mode
- guest active and in user mode
- hypervis
If possible use the INVPCID instruction for flushing the TLB instead of
toggling cr4.pge for that purpose.
While at it remove the dependency on cr4.pge being required for mtrr
loading, as this will be required later anyway.
Add a command line option "invpcid" for controlling the use of
INVPCID (d
Instead of switching XPTI globally on or off add a per-domain flag for
that purpose. This allows to modify the xpti boot parameter to support
running dom0 without Meltdown mitigations. Using "xpti=nodom0" as boot
parameter will achieve that.
Move the xpti boot parameter handling to xen/arch/x86/pv
Today cpu_info->xen_cr3 is either 0 to indicate %cr3 doesn't need to
be switched on entry to Xen, or negative for keeping the value while
indicating not to restore %cr3, or positive in case %cr3 is to be
restored.
Switch to use a flag byte instead of a negative xen_cr3 value in order
to allow %cr3
For mitigation of Meltdown the current L4 page table is copied to the
cpu local root page table each time a 64 bit pv guest is entered.
Copying can be avoided in cases where the guest L4 page table hasn't
been modified while running the hypervisor, e.g. when handling
interrupts or any hypercall no
When switching to a 64-bit pv context the TLB is flushed twice today:
the first time when switching to the new address space in
write_ptbase(), the second time when switching to guest mode in
restore_to_guest.
Avoid the first TLB flush in that case.
Signed-off-by: Juergen Gross
---
V3:
- omit se
This patch series aims at reducing the overhead of the XPTI Meltdown
mitigation. It is based on Jan's XPTI speedup series.
Patch 1 had been posted before, the main changes in this patch are due
to addressing Jan's comments on my first version. The main objective of
that patch is to avoid copying t
Instead of flushing the TLB from global pages when switching address
spaces with XPTI being active just disable global pages via %cr4
completely when a domain subject to XPTI is active. This avoids the
need for extra TLB flushes as loading %cr3 will remove all TLB
entries.
In order to avoid states
This patch is ported to xen from linux commit
d70c7b31a60f2458f35c226131f2a01a7a98b6cf
KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
Add a handler for reading/writing the guest's view of the ICC_BPR1_EL1
register, which is located in the ICH_VMCR_EL2.BPR1 field.
Signed-off-by: Manish Jaggi
---
This patch is ported to xen from linux commit
132a324ab62fe4fb8d6dcc2ab4eddb0e93b69afe.
KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
Add a handler for reading the guest's view of the ICC_IAR1_EL1
register. This involves finding the highest priority Group-1
interrupt, checking against both PMR and
gicv3_ich_read/write_lr functions are duplicated in vgic-v3-sr.c
This is done to make the file independent of the xen vgic code for
handling the errata.
Both the functions in the patch are static, so this patch needs
subsequent patches to compile without error (unused function)
Signed-off-by: Man
The errata will require to emulate the GIC virtual CPU interface in Xen.
Because the hypervisor will update its internal state of the vGIC, we want
to avoid messing up with it. So the errata is handled separately from the
rest of the hypervisor.
New file vgic-v3-sr.c is added which will hold trap
This patch is ported to xen from linux commit
b6f49035b4bf6e2709f2a5fed3107f5438c1fd02
KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
Add a handler for writing the guest's view of the ICC_EOIR1_EL1
register. This involves dropping the priority of the interrupt,
and deactivating it if required (EOI
This patchset is based on Marc's patchset below.
arm64: KVM: Mediate access to GICv3 sysregs at EL2 [1].
As these patches are ported to xen specifically for cavium errata 30115
few changes are made:
- Xen coding style is used
- group1_enable / group0_enable command line options not used.
CONFIG
This patch is ported to xen from linux commit:
f8b630bc542e0368886ae193d3519c832b270359
KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler
Add a handler for reading/writing the guest's view of ICC_IGRPEN1_EL1
register, which is located in the ICH_VMCR_EL2.VENG1 field.
Signed-off-by: Manish Jaggi
-
This patch is ported to xen from linux commit
63000dd8006dc987db31ba670edc23142ea91e01
KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers
As we're about to access the Active Priority registers a lot more,
let's define accessors that take the register number as a parameter.
Thi
This patch is ported to xen from linux commit:
423de85a98c2b50715a0784a74f6124fbc0b1548
(KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler)
Add a handler for reading/writing the guest's view of the ICC_BPR0_EL1
register, which is located in the ICH_VMCR_EL2.BPR0 field.
Signed-off-by: Manish Jaggi
--
This patch is ported to xen from linux commit:
fbc48a0011deb3d51cb657ca9c0f9083f41c0665
(KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler)
Add a handler for reading/writing the guest's view of the
ICC_IGRPEN0_EL1 register, which is located in the ICH_VMCR_EL2.VENG0
field.
Signed-off-by: Manish Ja
Function vgic_v3_handle_cpuif_access is called from do_trap_guest_sync
if ARM64_WORKAROUND_CAVIUM_30115 capability is found.
A flag skip_hyp_tail is introduced in struct cpu_info. This flag
is used to skip leave_hypervisor_tail when enter_hypervisor_head
is not invoked. enter_hypervisor_head andle
Add MIDR values for Cavium ThunderX1 SoC family: ThunderX1, 81XX, 83XX.
This patch copies the below defines as is from linux kernel code.
arch/arm64/include/asm/cputype.h
Signed-off-by: Manish Jaggi
---
xen/include/asm-arm/processor.h | 9 +
1 file changed, 9 insertions(+)
diff --git a
This patch is ported to xen from linux commit:
eab0b2dc4f6f34147e3d10da49ab8032e15dbea0
(KVM: arm64: vgic-v3: Add misc Group-0 handlers)
A number of Group-0 registers can be handled by the same accessors
as that of Group-1, so let's add the required system register encodings
and catch them in the
This patch is ported to xen from linux commit:
e7f1d1eef482150a64a6e6ad8faf40f8f97eed67
KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access
A read-from-write-only GICv3 access should UNDEF at EL1. But since
we're in complete paranoia-land with broken CPUs, let's assume the
wor
Some Cavium Thunder CPUs suffer a problem where a Xen guest may
inadvertently cause the host kernel to quit receiving interrupts.
This patch adds CONFIG_CAVIUM_ERRATUM_30115. Subsequent patches will
provide workaround.
This patch is ported to xen from linux kernel commit:
690a341577f9adf2c275ababe
This patch is a xen port of linux commit
f9e7449c780f688bf61a13dfa8c344afeb4ad6e0
KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler
Add a handler for reading/writing the guest's view of the ICV_AP1Rn_EL1
registers. We just map them to the corresponding ICH_AP1Rn_EL2
registers.
This patch calls vreg_
This patch is a port to xen from linux commit:
7b1dba1f7325629427c0e5bdf014159b229d16c8
KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access
A write-to-read-only GICv3 access should UNDEF at EL1. But since
we're in complete paranoia-land with broken CPUs, let's assume the
worse a
This patch is ported from linux to xen
commit: 2724c11a1df4b22ee966c04809ea0e808f66b04e
(KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler)
Add a handler for reading the guest's view of the ICV_HPPIR1_EL1
register. This is a simple parsing of the available LRs, extracting the
highest available inter
Add an option to control when vTSC emulation will be activated for a
domU with tsc_mode=default. Without such option each TSC access from
domU will be emulated, which causes a significant perfomance drop for
workloads that make use of rdtsc.
One option to avoid the TSC option is to run domUs with
Hi, Daniel!
On 03/26/2018 03:46 PM, Oleksandr Andrushchenko wrote:
On 03/26/2018 11:18 AM, Daniel Vetter wrote:
On Fri, Mar 23, 2018 at 05:54:49PM +0200, Oleksandr Andrushchenko wrote:
My apologies, but I found a few more things that look strange and
should
be cleaned up. Sorry for this iterat
On Tue, Mar 13, 2018 at 11:14:54PM +, Igor Druzhinin wrote:
> This should help to avoid problems with accessing the device after
> migration/resume without PV drivers by migrating its PCI configuration
> space state. Without an explicitly defined state record it resets
> every time a VM migrate
On Tue, Mar 27, 2018 at 11:34 AM, Oleksandr Andrushchenko
wrote:
> Hi, Daniel!
>
>
> On 03/26/2018 03:46 PM, Oleksandr Andrushchenko wrote:
>>
>> On 03/26/2018 11:18 AM, Daniel Vetter wrote:
>>>
>>> On Fri, Mar 23, 2018 at 05:54:49PM +0200, Oleksandr Andrushchenko wrote:
>
> My apologies,
On 27/03/18 10:07, Manish Jaggi wrote:
> The errata will require to emulate the GIC virtual CPU interface in Xen.
> Because the hypervisor will update its internal state of the vGIC, we want
> to avoid messing up with it. So the errata is handled separately from the
> rest of the hypervisor.
>
>
flight 121295 rumprun real [real]
http://logs.test-lab.xenproject.org/osstest/logs/121295/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumprun 6 rumprun-buildfail REGR. vs. 106754
build-i386-rumprun
On 03/27/2018 12:50 PM, Daniel Vetter wrote:
On Tue, Mar 27, 2018 at 11:34 AM, Oleksandr Andrushchenko
wrote:
Hi, Daniel!
On 03/26/2018 03:46 PM, Oleksandr Andrushchenko wrote:
On 03/26/2018 11:18 AM, Daniel Vetter wrote:
On Fri, Mar 23, 2018 at 05:54:49PM +0200, Oleksandr Andrushchenko wro
On 03/27/2018 03:31 PM, Marc Zyngier wrote:
On 27/03/18 10:07, Manish Jaggi wrote:
The errata will require to emulate the GIC virtual CPU interface in Xen.
Because the hypervisor will update its internal state of the vGIC, we want
to avoid messing up with it. So the errata is handled separatel
On 27/03/18 10:07, Manish Jaggi wrote:
> This patch is ported to xen from linux commit
> b6f49035b4bf6e2709f2a5fed3107f5438c1fd02
> KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
>
> Add a handler for writing the guest's view of the ICC_EOIR1_EL1
> register. This involves dropping the priority of
On 03/26/2018 05:43 PM, Ian Jackson wrote:
>> +### Network
>>
>> +If QEMU runs in its own network namespace, it can't open the tap
>> +device itself because the interface won't be visible outside of its
>> +own namespace. So instead, have the toolstack open the device and pass
>> +it as an fd on
On 03/26/2018 05:43 PM, Ian Jackson wrote:
> Thanks for this update!
>
> George Dunlap writes ("[PATCH] docs/qemu-deprivilege: Revise and update with
> status and future plans"):
> ...
>> +# Technical details
>> +
>> +## Restrictions done
>
> This makes this doc into a mixture of a design doc an
On 27/03/18 11:10, Manish Jaggi wrote:
>
>
> On 03/27/2018 03:31 PM, Marc Zyngier wrote:
>> On 27/03/18 10:07, Manish Jaggi wrote:
>>> The errata will require to emulate the GIC virtual CPU interface in Xen.
>>> Because the hypervisor will update its internal state of the vGIC, we want
>>> to avo
(George, CC'ing you wrt your depriv doc patch - see below.)
Anthony PERARD writes ("[RFC 1/4] libxl: Learned to send FD through QMP to
QEMU"):
> Adding the ability to send a file descriptor from libxl to QEMU via the
> QMP interface. This will be use with the "add-fd" QMP command.
The code looks
On 27/03/18 10:07, Manish Jaggi wrote:
> This patch is ported to xen from linux commit
> d70c7b31a60f2458f35c226131f2a01a7a98b6cf
> KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
>
> Add a handler for reading/writing the guest's view of the ICC_BPR1_EL1
> register, which is located in the ICH_VMCR_
Anthony PERARD writes ("[RFC 4/4] HACK libxl_exec: Check QEMU status via QMP
instead of xenstore"):
> This path is more of a prof of concept reather than a patch as this
> would break qemu-trad.
...
> For libxl, the only way to find out if qemu is ready on migrate/restore,
> it is to connect to th
On 03/27/2018 04:00 PM, Marc Zyngier wrote:
On 27/03/18 10:07, Manish Jaggi wrote:
This patch is ported to xen from linux commit
d70c7b31a60f2458f35c226131f2a01a7a98b6cf
KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
Add a handler for reading/writing the guest's view of the ICC_BPR1_EL1
regist
On 27/03/18 11:35, Manish Jaggi wrote:
>
>
> On 03/27/2018 04:00 PM, Marc Zyngier wrote:
>> On 27/03/18 10:07, Manish Jaggi wrote:
>>> This patch is ported to xen from linux commit
>>> d70c7b31a60f2458f35c226131f2a01a7a98b6cf
>>> KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
>>>
>>> Add a handler
On 03/27/2018 04:15 PM, Marc Zyngier wrote:
On 27/03/18 11:35, Manish Jaggi wrote:
On 03/27/2018 04:00 PM, Marc Zyngier wrote:
On 27/03/18 10:07, Manish Jaggi wrote:
This patch is ported to xen from linux commit
d70c7b31a60f2458f35c226131f2a01a7a98b6cf
KVM: arm64: vgic-v3: Add ICV_BPR1_EL1
On 27/03/18 10:07, Manish Jaggi wrote:
> This patch is ported from linux to xen
> commit: 2724c11a1df4b22ee966c04809ea0e808f66b04e
> (KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler)
>
> Add a handler for reading the guest's view of the ICV_HPPIR1_EL1
> register. This is a simple parsing of the av
On 27/03/18 10:07, Manish Jaggi wrote:
> This patch is ported to xen from linux commit:
> eab0b2dc4f6f34147e3d10da49ab8032e15dbea0
> (KVM: arm64: vgic-v3: Add misc Group-0 handlers)
>
> A number of Group-0 registers can be handled by the same accessors
> as that of Group-1, so let's add the requir
On 03/27/2018 11:29 AM, Ian Jackson wrote:
> (George, CC'ing you wrt your depriv doc patch - see below.)
>
> Anthony PERARD writes ("[RFC 1/4] libxl: Learned to send FD through QMP to
> QEMU"):
>> Adding the ability to send a file descriptor from libxl to QEMU via the
>> QMP interface. This will
On 03/27/2018 04:28 PM, Marc Zyngier wrote:
On 27/03/18 10:07, Manish Jaggi wrote:
This patch is ported to xen from linux commit:
eab0b2dc4f6f34147e3d10da49ab8032e15dbea0
(KVM: arm64: vgic-v3: Add misc Group-0 handlers)
A number of Group-0 registers can be handled by the same accessors
as tha
On 03/27/2018 04:26 PM, Marc Zyngier wrote:
On 27/03/18 10:07, Manish Jaggi wrote:
This patch is ported from linux to xen
commit: 2724c11a1df4b22ee966c04809ea0e808f66b04e
(KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler)
Add a handler for reading the guest's view of the ICV_HPPIR1_EL1
registe
On 2018/3/27 16:52, Jan Beulich wrote:
On 27.03.18 at 06:52, wrote:
After reset, IBRS is disabled by processor, but a coming intr/nmi leave IBRS
enabled after their exit. It's not necessory for bootup code to run in low
performance with IBRS enabled.
On ORACLE X6-2(500GB/88 cpus, dom0 11GB/20
Avoid the need to deallocate memory when the data is invalid. It has
the benefit to not fragment memory in Xen.
Signed-off-by: Wei Liu
---
Found by code inspection. There shouldn't be any practical difference
in our current setup because the function is hardware domain only.
But ISTM the plan is
On 27/03/18 11:56, Manish Jaggi wrote:
>
>
> On 03/27/2018 04:15 PM, Marc Zyngier wrote:
>> On 27/03/18 11:35, Manish Jaggi wrote:
>>>
>>> On 03/27/2018 04:00 PM, Marc Zyngier wrote:
On 27/03/18 10:07, Manish Jaggi wrote:
> This patch is ported to xen from linux commit
> d70c7b31a60f
On 03/27/2018 04:35 PM, Marc Zyngier wrote:
On 27/03/18 11:56, Manish Jaggi wrote:
On 03/27/2018 04:15 PM, Marc Zyngier wrote:
On 27/03/18 11:35, Manish Jaggi wrote:
On 03/27/2018 04:00 PM, Marc Zyngier wrote:
On 27/03/18 10:07, Manish Jaggi wrote:
This patch is ported to xen from linux c
flight 121312 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/121312/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Tue, Mar 27, 2018 at 12:04:20PM +0100, Wei Liu wrote:
> Avoid the need to deallocate memory when the data is invalid. It has
> the benefit to not fragment memory in Xen.
>
> Signed-off-by: Wei Liu
Reviewed-by: Roger Pau Monné
> ---
> Found by code inspection. There shouldn't be any practica
On 27/03/18 12:07, Manish Jaggi wrote:
>
>
> On 03/27/2018 04:35 PM, Marc Zyngier wrote:
>> On 27/03/18 11:56, Manish Jaggi wrote:
>>>
>>> On 03/27/2018 04:15 PM, Marc Zyngier wrote:
On 27/03/18 11:35, Manish Jaggi wrote:
> On 03/27/2018 04:00 PM, Marc Zyngier wrote:
>> On 27/03/18 1
On Tue, Mar 27, 2018 at 11:36:00AM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("[RFC 4/4] HACK libxl_exec: Check QEMU status via QMP
> instead of xenstore"):
> > This path is more of a prof of concept reather than a patch as this
> > would break qemu-trad.
> ...
> > For libxl, the only way
On 03/27/2018 04:41 PM, Marc Zyngier wrote:
On 27/03/18 12:07, Manish Jaggi wrote:
On 03/27/2018 04:35 PM, Marc Zyngier wrote:
On 27/03/18 11:56, Manish Jaggi wrote:
On 03/27/2018 04:15 PM, Marc Zyngier wrote:
On 27/03/18 11:35, Manish Jaggi wrote:
On 03/27/2018 04:00 PM, Marc Zyngier wro
On 03/27/2018 11:20 AM, George Dunlap wrote:
>>> +### Further RLIMITs
>>> +
>>> +RLIMIT_AS limits the total amount of memory; but this includes the
>>> +virtual memory which QEMU uses as a mapcache. xen-mapcache.c already
>>> +fiddles with this; it would be straightforward to make it *set* the
>>>
On 27/03/18 12:15, Manish Jaggi wrote:
>
>
> On 03/27/2018 04:41 PM, Marc Zyngier wrote:
>> On 27/03/18 12:07, Manish Jaggi wrote:
>>>
>>> On 03/27/2018 04:35 PM, Marc Zyngier wrote:
On 27/03/18 11:56, Manish Jaggi wrote:
> On 03/27/2018 04:15 PM, Marc Zyngier wrote:
>> On 27/03/18 1
On 03/27/2018 04:55 PM, Marc Zyngier wrote:
On 27/03/18 12:15, Manish Jaggi wrote:
On 03/27/2018 04:41 PM, Marc Zyngier wrote:
On 27/03/18 12:07, Manish Jaggi wrote:
On 03/27/2018 04:35 PM, Marc Zyngier wrote:
On 27/03/18 11:56, Manish Jaggi wrote:
On 03/27/2018 04:15 PM, Marc Zyngier wro
On 27/03/18 12:27, Manish Jaggi wrote:
>
>
> On 03/27/2018 04:55 PM, Marc Zyngier wrote:
>> On 27/03/18 12:15, Manish Jaggi wrote:
>>>
>>> On 03/27/2018 04:41 PM, Marc Zyngier wrote:
On 27/03/18 12:07, Manish Jaggi wrote:
> On 03/27/2018 04:35 PM, Marc Zyngier wrote:
>> On 27/03/18 1
>>> On 27.03.18 at 13:03, wrote:
> On 2018/3/27 16:52, Jan Beulich wrote:
> On 27.03.18 at 06:52, wrote:
>>> --- a/xen/include/asm-x86/spec_ctrl.h
>>> +++ b/xen/include/asm-x86/spec_ctrl.h
>>> @@ -32,8 +32,22 @@ extern uint8_t default_bti_ist_info;
>>> static inline void init_shadow_spec_ct
>>> On 27.03.18 at 13:09, wrote:
> On Tue, Mar 27, 2018 at 12:04:20PM +0100, Wei Liu wrote:
>> Avoid the need to deallocate memory when the data is invalid. It has
>> the benefit to not fragment memory in Xen.
>>
>> Signed-off-by: Wei Liu
>
> Reviewed-by: Roger Pau Monné
Acked-by: Jan Beulich
On Tue, Mar 27, 2018 at 11:58:45AM +0100, George Dunlap wrote:
> On 03/27/2018 11:29 AM, Ian Jackson wrote:
> > This 2nd patch looks reasonable, but it prompted to notice two new
> > kinds of hazard introduced by the deprivileging design goal:
> >
> >> int libxl__qmp_save(libxl__gc *gc, int domid
Hi,
On 26/03/18 21:28, Stefano Stabellini wrote:
> On Wed, 21 Mar 2018, Andre Przywara wrote:
>> The ARM Generic Timer uses a level-sensitive interrupt semantic. We
>> easily catch when the line goes high, as this triggers the hardware IRQ.
>> However we also have to keep track of when the line lo
Hi,
On 26/03/18 22:30, Stefano Stabellini wrote:
> On Wed, 21 Mar 2018, Andre Przywara wrote:
>> Implement the framework for syncing IRQs between our emulation and the
>> list registers, which represent the guest's view of IRQs.
>> This is done in vgic_sync_from_lrs() and vgic_sync_to_lrs(), which
George Dunlap writes ("Re: [PATCH] docs/qemu-deprivilege: Revise and update
with status and future plans"):
> Actually I think most of the user-facing stuff already in xl.cfg is
> inappropriate for that man page. It might make sense to have a separate
> man page for it.
I wouldn't object to that
Anthony PERARD writes ("Re: [Xen-devel] [RFC 4/4] HACK libxl_exec: Check QEMU
status via QMP instead of xenstore"):
> Actually, I think that once connected to QMP, we can get "events" from
> QEMU. And there is an event for when qemu changes it's status.
Right, but doesn't one still have to poll o
flight 121289 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/121289/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 6 kernel-build fail REGR. vs. 118294
build-i386-pvops
Signed-off-by: Wei Liu
---
tools/firmware/xen-dir/shim.config | 1 +
1 file changed, 1 insertion(+)
diff --git a/tools/firmware/xen-dir/shim.config
b/tools/firmware/xen-dir/shim.config
index 4d5630f87a..05071bf436 100644
--- a/tools/firmware/xen-dir/shim.config
+++ b/tools/firmware/xen-dir/shim
On Tue, Mar 27, 2018 at 02:58:13PM +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> tools/firmware/xen-dir/shim.config | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/tools/firmware/xen-dir/shim.config
> b/tools/firmware/xen-dir/shim.config
> index 4d5630f87a..05071bf436 100644
>
On Tue, Mar 27, 2018 at 03:09:42PM +0100, Roger Pau Monné wrote:
> On Tue, Mar 27, 2018 at 02:58:13PM +0100, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > tools/firmware/xen-dir/shim.config | 1 +
> > 1 file changed, 1 insertion(+)
> >
> > diff --git a/tools/firmware/xen-dir/shim.config
On 03/27/2018 02:33 PM, Ian Jackson wrote:
+### Namespaces for unused functionality
> ...
+unshare(CLONE_NEWNS | CLONE_NEWIPC)
>>>
>>> This would mean we would have to pass qemu fds for both the network
>>> tap devices and any vnc consoles. That makes life considerably more
>>> compl
On Tue, Mar 27, 2018 at 02:43:22PM +0100, Ian Jackson wrote:
> Anthony PERARD writes ("Re: [Xen-devel] [RFC 4/4] HACK libxl_exec: Check QEMU
> status via QMP instead of xenstore"):
> > Actually, I think that once connected to QMP, we can get "events" from
> > QEMU. And there is an event for when q
On 03/27/2018 03:15 PM, George Dunlap wrote:
> On 03/27/2018 02:33 PM, Ian Jackson wrote:
> +### Namespaces for unused functionality
>> ...
> +unshare(CLONE_NEWNS | CLONE_NEWIPC)
This would mean we would have to pass qemu fds for both the network
tap devices and any vnc c
George Dunlap writes ("Re: [PATCH] docs/qemu-deprivilege: Revise and update
with status and future plans"):
> The alternate would be to have yet another UID range, to that we could
> have a "target ID" (i.e., QEMU) and a "reaper ID" for each domain. I
> think that should mean any races should be
George Dunlap writes ("Re: [PATCH] docs/qemu-deprivilege: Revise and update
with status and future plans"):
> On 03/27/2018 02:33 PM, Ian Jackson wrote:
> > Anyway IMO we should set RLIMIT_NPROC after fork and before execve.
> > If this causes setuid to fail in qemu, qemu will crash. But this
> >
On Tue, Mar 27, 2018 at 03:12:35PM +0100, Wei Liu wrote:
> On Tue, Mar 27, 2018 at 03:09:42PM +0100, Roger Pau Monné wrote:
> > On Tue, Mar 27, 2018 at 02:58:13PM +0100, Wei Liu wrote:
> > > Signed-off-by: Wei Liu
> > > ---
> > > tools/firmware/xen-dir/shim.config | 1 +
> > > 1 file changed, 1 i
On Tue, Mar 27, 2018 at 03:41:57PM +0100, Roger Pau Monné wrote:
> On Tue, Mar 27, 2018 at 03:12:35PM +0100, Wei Liu wrote:
> > On Tue, Mar 27, 2018 at 03:09:42PM +0100, Roger Pau Monné wrote:
> > > On Tue, Mar 27, 2018 at 02:58:13PM +0100, Wei Liu wrote:
> > > > Signed-off-by: Wei Liu
> > > > ---
On 03/27/2018 03:37 PM, Ian Jackson wrote:
> George Dunlap writes ("Re: [PATCH] docs/qemu-deprivilege: Revise and update
> with status and future plans"):
>> The alternate would be to have yet another UID range, to that we could
>> have a "target ID" (i.e., QEMU) and a "reaper ID" for each domain.
Anthony PERARD writes ("Re: [Xen-devel] [RFC 4/4] HACK libxl_exec: Check QEMU
status via QMP instead of xenstore"):
> On Tue, Mar 27, 2018 at 02:43:22PM +0100, Ian Jackson wrote:
> > Right, but doesn't one still have to poll on connect() ?
>
> Yes, we need to poll on connect().
>
> libvirt those
We are now planning to do this work on April 19th-21st. osstest will
be shut down some time on the 17th/18th to let it drain its queue.
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-dev
Reported-by: Wei Liu
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Wei Liu
---
xen/arch/x86/Kconfig | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig
index c405c4bf4f..f64fc56739 100644
--- a/xen/arch/x86
Anthony PERARD writes ("[PATCH] libxl_dm: Replace deprecated -drive if=scsi"):
> .. by -drive if=none,.. -device scsi-disk,...
>
> The use of if=scsi in QEMU is deprecated and has been removed in 2.12 by
> 1454509726 scsi: Remove automatic creation of SCSI controllers with -drive
> if=scsi
Acked
Reported-by: Wei Liu
Signed-off-by: Ian Jackson
---
README.dev | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/README.dev b/README.dev
index 37e2953..95fc66c 100644
--- a/README.dev
+++ b/README.dev
@@ -199,13 +199,13 @@ Force pushing a branch
As osstest user on te
On Tue, Mar 27, 2018 at 04:01:07PM +0100, Ian Jackson wrote:
> Reported-by: Wei Liu
> Signed-off-by: Ian Jackson
Reviewed-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Tue, Mar 27, 2018 at 03:56:22PM +0100, Roger Pau Monne wrote:
> Reported-by: Wei Liu
> Signed-off-by: Roger Pau Monné
Oh, this needs a further fix, will send v2.
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org
>>> On 27.03.18 at 16:56, wrote:
> Reported-by: Wei Liu
> Signed-off-by: Roger Pau Monné
Acked-by: Jan Beulich
(on the assumption that the shim then still builds)
Jan
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenprojec
1 - 100 of 174 matches
Mail list logo