>>> On 13.08.18 at 17:44, wrote:
> On 13/08/18 17:29, Jan Beulich wrote:
> On 13.08.18 at 16:20, wrote:
>>> On 13/08/18 15:54, Jan Beulich wrote:
>>> On 13.08.18 at 15:06, wrote:
> Suggested new interface
> ---
> Hypercalls, memory map(s) and ACPI tables s
Revised Agenda:
* 4.10+ changes to Xen's memory scrubbing: discussion of the changes
that made to it in recent versions of Xen (4.10+) - Christopher
* I think we need to talk about how we mean to unblock
large chunks of work - Jan (see example list below)
* Project Management stuff to keep t
>>> On 13.08.18 at 21:17, wrote:
> On 8/13/18 4:45 PM, Razvan Cojocaru wrote:
>> On 8/13/18 4:38 PM, Jan Beulich wrote:
>> On 13.08.18 at 15:19, wrote:
On 8/13/18 3:58 PM, Jan Beulich wrote:
On 13.08.18 at 14:51, wrote:
>> So first we've got that vmx_idtv_reinject() call wr
On 14/08/18 09:02, Jan Beulich wrote:
On 13.08.18 at 17:44, wrote:
>> On 13/08/18 17:29, Jan Beulich wrote:
>> On 13.08.18 at 16:20, wrote:
On 13/08/18 15:54, Jan Beulich wrote:
On 13.08.18 at 15:06, wrote:
>> Suggested new interface
>> ---
>>> On 14.08.18 at 09:19, wrote:
> On 14/08/18 09:02, Jan Beulich wrote:
> On 13.08.18 at 17:44, wrote:
>>> On 13/08/18 17:29, Jan Beulich wrote:
>>> On 13.08.18 at 16:20, wrote:
> On 13/08/18 15:54, Jan Beulich wrote:
> On 13.08.18 at 15:06, wrote:
>>> Suggested new int
On 14/08/18 09:34, Jan Beulich wrote:
On 14.08.18 at 09:19, wrote:
>> On 14/08/18 09:02, Jan Beulich wrote:
>> On 13.08.18 at 17:44, wrote:
On 13/08/18 17:29, Jan Beulich wrote:
On 13.08.18 at 16:20, wrote:
>> On 13/08/18 15:54, Jan Beulich wrote:
>> On 13.08.1
> -Original Message-
> From: Julien Grall [mailto:julien.gr...@arm.com]
> Sent: 13 August 2018 18:33
> To: xen-devel@lists.xenproject.org
> Cc: Ian Jackson ; Wei Liu ;
> Paul Durrant ; Julien Grall
> Subject: [PATCH] libs/foreignmemory: Avoid printing an error for ENOTSUPP
>
> Resource ma
On Mon, Aug 13, 2018 at 06:33:25PM +0100, Julien Grall wrote:
> Resource mapping is not supported on Arm and results to an error message
> at every guest boot:
>
> xenforeignmemory: error: ioctl failed: Operation not supported
>
> Hide the error message when errnor is ENOTSUPP.
>
> Signed-off-by
On Mon, 2018-08-13 at 02:54 -0600, Jan Beulich wrote:
> > > > On 13.08.18 at 09:46, wrote:
> >
> > proposed topics so far:
> > * 4.10+ changes to Xen's memory scrubbing: discussion of the changes
> > that made to it in recent versions of Xen (4.10+) - Christopher
> > * Project Management
On 31/07/18 11:31, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> This is the ABI for the two halves of a para-virtualized
> camera driver which extends Xen's reach multimedia capabilities even
> farther enabling it for video conferencing, In-Vehicle Infotainment,
> high defin
flight 125900 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125900/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 22ec06c8aaa1c4023bb7f960746da57f1b648568
baseline version:
ovmf 1aa9314e3a84b27f74f23
Hi Amit,
On 07/08/18 18:07, Amit Singh Tomar wrote:
Signed-off-by: Amit Singh Tomar
---
docs/misc/arm/early-printk.txt | 1 +
xen/arch/arm/Rules.mk | 1 +
xen/arch/arm/arm64/debug-meson.inc | 50 ++
3 files changed, 52 insertions(+)
flight 125879 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125879/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-pvops
Hi Amit,
On 07/08/18 18:07, Amit Singh Tomar wrote:
This patch adds driver for UART controller present on Amlogic S905 SoC.
https://dn.odroid.com/S905/DataSheet/S905_Public_Datasheet_V1.1.4.pdf
The spec does not seems to provide the offset register. Where did you
find them?
Signed-off-by:
flight 125885 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125885/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvopsbroken
build-arm64-xsm
flight 125881 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125881/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-xsm
On 13/08/18 11:00, Andrew Cooper wrote:
This series can be found in git form here:
http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/xen-create-v1
Is this the correct URL? The subject says v2 but this is branch v1.
Looking over the OCaml-related patches, I
On 14/08/18 14:12, Christian Lindig wrote:
>
> On 13/08/18 11:00, Andrew Cooper wrote:
>> This series can be found in git form here:
>>
>> http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/xen-create-v1
> Is this the correct URL? The subject says v2 but this is b
This avoids repeated calls to page_is_ram_type which improves
performance and makes the code easier to read.
No functional change.
Signed-off-by: Roger Pau Monné
---
Changes since v4:
- New in this version.
---
Cc: Jan Beulich
---
xen/drivers/passthrough/x86/iommu.c | 60 +++--
To iommu_hwdom_strict and iommu_hwdom_passthrough which is more
descriptive of their usage. Also change their type from bool_t to
bool.
No functional change.
Signed-off-by: Roger Pau Monné
---
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Suravee Suthikulpanit
Cc: Brian Woods
Cc: Kevin Tian
---
Cha
The type is only returned if the full page has the same type. This
function is unimplemented for ARM.
Signed-off-by: Roger Pau Monné
---
Cc: Stefano Stabellini
Cc: Julien Grall
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Tim Deegan
Cc:
To select the iommu configuration used by Dom0. This option supersedes
iommu=dom0-strict|dom0-passthrough.
Signed-off-by: Roger Pau Monné
---
Changes since v4:
- Move the iommu_dom0_* variable renaming to a previous patch.
- Use dom0-iommu=passthrough|strict booleans, like the iommu option
u
Hello,
The following series implement a workaround for missing RMRR
entries for a PVH Dom0. It's based on the iommu_inclusive_mapping VTd
option.
The PVH workaround identity maps all regions marked as reserved in the
memory map.
Note that this workaround is enabled by default on Intel hardware.
The helpers returns whether a given memory address belongs to a domain
MMCFG range.
Signed-off-by: Roger Pau Monné
---
Changes since v4:
- New in this version.
---
Cc: Paul Durrant
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/io.c| 5 +
xen/include/asm-x86/hvm/io.h | 3
Several people have reported hardware issues (malfunctioning USB
controllers) due to iommu page faults on Intel hardware. Those faults
are caused by missing RMRR (VTd) entries in the ACPI tables. Those can
be worked around on VTd hardware by manually adding RMRR entries on
the command line, this is
So it's done before the iommu is initialized. This is required in
order to be able to fetch the MMCFG regions from the domain struct.
No functional change.
Signed-off-by: Roger Pau Monné
---
Changes since v1:
- New in this version.
---
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/hvm/d
Introduce a new dom0-iommu=map-inclusive generic option that
supersedes iommu_inclusive_mapping. The previous behavior is preserved
and the option should only be enabled by default on Intel hardware.
Signed-off-by: Roger Pau Monné
Reviewed-by: Paul Durrant
---
Changes since v4:
- Use an if to s
On Mon, Aug 13, 2018 at 11:01:00AM +0100, Andrew Cooper wrote:
> set_max_evtchn is somewhat weird. It was introduced with the event_fifo work,
> but has never been used. Still, it is a bounding on resources consumed by the
> event channel infrastructure, and should be part of createdomain, rather
Signed-off-by: Roger Pau Monné
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Julien Grall
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
xen/include/public/domctl.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff
On Mon, Aug 13, 2018 at 11:01:01AM +0100, Andrew Cooper wrote:
> ... rather than setting it up once domain_create() has completed. This
> involves constructing a default value for dom0.
>
> No practical change in functionality.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Roger Pau Monné
__
On Mon, Aug 13, 2018 at 11:01:03AM +0100, Andrew Cooper wrote:
> ... rather than setting the limits up after domain_create() has completed.
>
> This removes all the gnttab infrastructure for calculating the number of dom0
> grant frames, opting instead to require the dom0 construction code to pass
On Mon, Aug 13, 2018 at 11:01:04AM +0100, Andrew Cooper wrote:
> Now that XEN_DOMCTL_createdomain handles the grant table limits, remove
> XEN_DOMCTL_set_gnttab_limits (including XSM hooks and libxc wrappers).
>
> Signed-off-by: Andrew Cooper
> Acked-by: Daniel De Graaf
> Acked-by: Wei Liu
Rev
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-4.19-rc1-tag
xen: features and fixes for 4.19-rc1
It contains the following:
- a series to add dma-buf functionality to Xen grant table handling
- a fix for booting the kernel as Xen
On Mon, Aug 13, 2018 at 11:01:05AM +0100, Andrew Cooper wrote:
> Now that the max_{grant,maptrack}_frames are specified from the very beginning
> of grant table construction, the various initialisation functions can be
> folded together and simplified as a result.
>
> Leave grant_table_init() as t
On Tue, Aug 14, 2018 at 04:03:24PM +0200, Roger Pau Monne wrote:
> Signed-off-by: Roger Pau Monné
> ---
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Mon, Aug 13, 2018 at 11:01:06AM +0100, Andrew Cooper wrote:
> This is in preparation to set up d->max_cpus and d->vcpu[] in domain_create(),
> and allow later parts of domain construction to have access to the values.
>
> Signed-off-by: Andrew Cooper
> ---
> CC: Jan Beulich
> CC: Stefano Stab
On Mon, Aug 13, 2018 at 11:01:08AM +0100, Andrew Cooper wrote:
> Make dom0_max_vcpus() a common interface, and implement it on ARM by splitting
> the existing alloc_dom0_vcpu0() function in half.
>
> As domain_create() doesn't yet set up the vcpu array, the max value is also
> passed into alloc_do
On Mon, Aug 13, 2018 at 11:01:09AM +0100, Andrew Cooper wrote:
> For ARM, the call to arch_domain_create() needs to have completed before
> domain_max_vcpus() will return the correct upper bound.
>
> For each arch's dom0's, drop the temporary max_vcpus parameter, and allocation
> of dom0->vcpu.
>
There is a call trace generated after commit
2d408c0d4574b01b9ed45e02516888bf925e11a9(
xen-netfront: fix queue name setting). There is no 'device/vif/xx-q0-tx' file
found
under /proc/irq/xx/.
This patch only picks up device type and id as its name.
With the patch, now /proc/interrupts looks lik
flight 125884 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125884/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-pvops
From: Xiao Liang
Date: Tue, 14 Aug 2018 23:21:28 +0800
> There is a call trace generated after commit
> 2d408c0d4574b01b9ed45e02516888bf925e11a9(
> xen-netfront: fix queue name setting). There is no 'device/vif/xx-q0-tx' file
> found
> under /proc/irq/xx/.
>
> This patch only picks up device t
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-3620,CVE-2018-3646 / XSA-273
L1 Terminal Fault speculative side channel
ISSUE DESCRIPTION
=
In x86 nomenclature, a Terminal Fault is a pagetable walk which aborts
due to the page b
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-269
version 2
x86: Incorrect MSR_DEBUGCTL handling lets guests enable BTS
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
==
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-270
version 2
Linux netback driver OOB access in hash handling
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
L
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-268
version 2
Use of v2 grant tables may cause crash on ARM
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
AR
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2018-14007 / XSA-271
version 2
XAPI HTTP directory traversal
UPDATES IN VERSION 2
Public release.
ISSUE DESCRIPTION
=
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory XSA-272
version 2
oxenstored does not apply quota-maxentity
UPDATES IN VERSION 2
Ammend patch to reference XSA-272 in the commit message.
flight 75067 distros-debian-snapshot real [real]
http://osstest.xensource.com/osstest/logs/75067/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-i386-daily-netboot-pygrub broken
test-amd64-amd64-i386-daily-
This run is configured for baseline tests only.
flight 75068 ovmf real [real]
http://osstest.xensource.com/osstest/logs/75068/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail like 75062
test
Add zero-padding to #defined ACPI table strings that are copied.
Provides sufficient characters to satisfy the length required to
fully populate the destination and prevent array-bounds warnings.
Signed-off-by: Christopher Clark
---
Please add this patch to the backport list for the next minor
On Mon, 16 Jul 2018, Julien Grall wrote:
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/include/asm-arm/cpregs.h | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/xen/include/asm-arm/cpregs.h b/xen/include/asm-arm/cpregs.h
> index 4c74e8161b..
On Mon, 16 Jul 2018, Julien Grall wrote:
> A couple of places in the code will need to clear/set flags in HCR_EL2
> for a given vCPU and then replicate into the hardware. Introduce
> helpers and replace open-coded version.
>
> Signed-off-by: Julien Grall
The macros look good, but I grepped for t
On Mon, 16 Jul 2018, Julien Grall wrote:
> The p2m lock is only necessary to prevent gvirt_to_maddr failing when
> break-before-make sequence is used in the P2M update concurrently on
> another pCPU. So reduce the locking section.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
On Mon, 16 Jul 2018, Julien Grall wrote:
> Mem access has only an impact on the hardware translation between a
> guest virtual address and the machine physical address. So it is not
> necessary to fallback to memaccess for all the other case (e.g when it
> is not possible to acquire the page behind
On Mon, 16 Jul 2018, Julien Grall wrote:
> Currently, lpae_mapping can only work on entry from any level other than
> 3. Make it work with any level by extending the prototype to pass the
> level.
>
> At the same time, rename the function to lpae_is_mapping so naming stay
> consistent accross lpae
On Mon, 16 Jul 2018, Julien Grall wrote:
> Currently, lpae_table can only work on entry from any level other than
> 3. Make it work with any level by extending the prototype to pass the
> level.
>
> At the same time, rename the function to lpae_is_mapping so naming stay
> consistent accross all lp
On Mon, 16 Jul 2018, Julien Grall wrote:
> This will help to keep the naming consistent accross all lpae helpers.
>
> No functional change intended.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/guest_walk.c | 2 +-
> xen/arch/arm/mm.c | 6 +
On Mon, 16 Jul 2018, Julien Grall wrote:
> !lpae_is_page(pte, level) && !lpae_is_superpage(pte, level) is
> equivalent to !lpae_is_mapping(pte, level).
>
> At the same time drop lpae_is_page(pte, level) that is now unused.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
flight 125910 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125910/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Hi Stefano,
On 08/14/2018 09:46 PM, Stefano Stabellini wrote:
On Mon, 16 Jul 2018, Julien Grall wrote:
A couple of places in the code will need to clear/set flags in HCR_EL2
for a given vCPU and then replicate into the hardware. Introduce
helpers and replace open-coded version.
Signed-off-by:
On Mon, 16 Jul 2018, Julien Grall wrote:
> The new helpers make easier to read the code by abstracting the way to
^ it
> set/get an MFN from/to an LPAE entry. The helpers is using "walk" as the
^are
> bits are common for ac
On Mon, 16 Jul 2018, Julien Grall wrote:
> Currently, lpae_is_{table, mapping} helpers will always return false on
> entry with the valid bit unset. However, it would be useful to have them
^entries
> operating on any entry. For instance to store information in advance but
> still request a faul
On Mon, 16 Jul 2018, Julien Grall wrote:
> Comestic change to make clearer what is the return ('ret' is a bit
> too generic).
>
> Signed-off-by: Julien Grall
Acked-by: Stefano Stabellini
> ---
> xen/arch/arm/p2m.c | 6 +++---
> 1 file changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a
On Mon, 16 Jul 2018, Julien Grall wrote:
> This is making the code slightly easier to understand.
>
> Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
> ---
> xen/arch/arm/p2m.c | 10 ++
> 1 file changed, 6 insertions(+), 4 deletions(-)
>
> diff --git a/xen/arch/arm/p2m.c
On Mon, 16 Jul 2018, Julien Grall wrote:
> At the moment, guest_walk_tables can either return 0, -EFAULT, -EINVAL.
> The use of the last 2 are not clearly defined and used inconsistently in
> the code. The current only caller does not care about the return
> value and the value of it seems very lim
On Mon, 16 Jul 2018, Julien Grall wrote:
> GUEST_BUG_ON may be used in other files doing guest emulation.
>
> Signed-off-by: Julien Grall
Given that GUEST_BUG_ON is not actually used in any other files in this
patch series, I assume you are referring to one of your future series?
> ---
> xen/
On Mon, 16 Jul 2018, Julien Grall wrote:
> At the moment, HSR_CPREG is expected to receive only the co-processor
> register name in parameter. Because the name is actually a define, this
> may have been expanded by a previous macro.
>
> Rather than imposing the use of _HSR_CPREG* in such cases, al
On Tue, 14 Aug 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 08/14/2018 09:46 PM, Stefano Stabellini wrote:
> > On Mon, 16 Jul 2018, Julien Grall wrote:
> > > A couple of places in the code will need to clear/set flags in HCR_EL2
> > > for a given vCPU and then replicate into the hardware. Introd
PV 9pfs requires the PV backend in QEMU. Make sure that libxl knows it.
Signed-off-by: Stefano Stabellini
---
diff --git a/tools/libxl/libxl_dm.c b/tools/libxl/libxl_dm.c
index fdd7fa3..70e8b16 100644
--- a/tools/libxl/libxl_dm.c
+++ b/tools/libxl/libxl_dm.c
@@ -2598,7 +2598,7 @@ int libxl__need
On Tue, 14 Aug 2018, Christopher Clark wrote:
> Add zero-padding to #defined ACPI table strings that are copied.
> Provides sufficient characters to satisfy the length required to
> fully populate the destination and prevent array-bounds warnings.
>
> Signed-off-by: Christopher Clark
> ---
>
>
On Aug 13, 2018, at 10:57, Ian Jackson wrote:
>
> Both our arm64 boxes are out of commission and repairing them is
> taking too long.
Apologies if this is already documented elsewhere - does OSStest use Qemu for
arm64 testing?
Rich
___
Xen-devel mail
Hi Rich,
On 08/14/2018 11:42 PM, Rich Persaud wrote:
On Aug 13, 2018, at 10:57, Ian Jackson wrote:
Both our arm64 boxes are out of commission and repairing them is
taking too long.
Apologies if this is already documented elsewhere - does OSStest use Qemu for
arm64 testing?
Osstest does n
Hi Stefano,
On 08/14/2018 10:33 PM, Stefano Stabellini wrote:
On Mon, 16 Jul 2018, Julien Grall wrote:
Currently, lpae_is_{table, mapping} helpers will always return false on
entry with the valid bit unset. However, it would be useful to have them
^entries
operating on any entry. For inst
Hi Stefano,
On 08/14/2018 10:49 PM, Stefano Stabellini wrote:
On Tue, 14 Aug 2018, Julien Grall wrote:
Hi Stefano,
On 08/14/2018 09:46 PM, Stefano Stabellini wrote:
On Mon, 16 Jul 2018, Julien Grall wrote:
A couple of places in the code will need to clear/set flags in HCR_EL2
for a given vCP
On Tue, 14 Aug 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 08/14/2018 10:49 PM, Stefano Stabellini wrote:
> > On Tue, 14 Aug 2018, Julien Grall wrote:
> > > Hi Stefano,
> > >
> > > On 08/14/2018 09:46 PM, Stefano Stabellini wrote:
> > > > On Mon, 16 Jul 2018, Julien Grall wrote:
> > > > > A co
On Aug 14, 2018, at 18:46, Julien Grall wrote:
>
> Hi Rich,
>
>> On 08/14/2018 11:42 PM, Rich Persaud wrote:
>>> On Aug 13, 2018, at 10:57, Ian Jackson wrote:
>>>
>>> Both our arm64 boxes are out of commission and repairing them is
>>> taking too long.
>> Apologies if this is already documente
On Wed, Aug 8, 2018 at 3:54 AM Jan Beulich wrote:
>
> >>> On 08.08.18 at 10:25, wrote:
> > On Tue, Aug 07, 2018 at 10:45:32AM -0600, Tamas K Lengyel wrote:
> >> On Tue, Aug 7, 2018 at 10:04 AM Tamas K Lengyel
> >> wrote:
> >> (XEN) [VT-D]iommu.c:919: iommu_fault_status: Fault Overflow
> >> (XEN)
flight 125888 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125888/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-xsm broken
build-arm64-pvops
flight 125892 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125892/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken
build-arm64-xsm
flight 125896 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125896/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64 broken in 125869
build-arm64-
Use EFLAGS.IF for all ordinary purposes; there's in particular no need
to unduly defer NMI/#MC. Clear/set GIF solely around VMRUN itself. This
has the additional advantage that svm_stgi_label now indeed marks the
only place where GIF gets set.
A note regarding the main STI(s) placement: Quite coun
While this is only a start (IOCTL_PRIVCMD_MMAP* and IOCTL_PRIVCMD_DM_OP
require more work), it at least allows some simple operations (like
"xl dmesg") which have always been available on XenoLinux to work again
with a 64-bit kernel underneath a 32-bit distro.
Signed-off-by: Jan Beulich
Acked-by:
>>> On 25.06.18 at 12:17, wrote:
> This is unnecessary and triggers a warning in the hypervisor.
>
> Often systems have more processor entries in their ACPI tables than are
> actually installed/active. The ACPI_STA_DEVICE_PRESENT bit cannot be
> reliably used, but the ACPI_MADT_ENABLED bit can. I
>>> On 15.08.18 at 03:00, wrote:
> On Wed, Aug 8, 2018 at 3:54 AM Jan Beulich wrote:
>>
>> >>> On 08.08.18 at 10:25, wrote:
>> > On Tue, Aug 07, 2018 at 10:45:32AM -0600, Tamas K Lengyel wrote:
>> >> On Tue, Aug 7, 2018 at 10:04 AM Tamas K Lengyel
>> >> wrote:
>> >> (XEN) [VT-D]iommu.c:919: iom
84 matches
Mail list logo