> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: Thursday, December 17, 2015 11:17 PM
[...]
> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
> index f7c5e4f..cca35f2 100644
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
[...]
> @@ -3507,
... since we don't need its virtual address anywhere (it's a
placeholder page only after all). For this to work (and possibly be
done elsewhere too) share_xen_page_with_guest() needs to mark pages
handed to it as Xen heap ones.
To be on the safe side, also explicitly clear the page (not having don
>>> On 18.12.15 at 07:29, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Wednesday, December 16, 2015 3:58 PM
>>
>> ... since we don't need its virtual address anywhere (it's a
>> placeholder page only after all). For this wo work (and possibly be
>> done elsewhere too) share_xe
> From: David Vrabel [mailto:david.vra...@citrix.com]
> Sent: Thursday, December 17, 2015 11:17 PM
>
> This series improves the performance of EPT by further reducing the
> impact of the translation invalidations (ept_sync_domain()). By:
>
> a) Deferring invalidations until the p2m write lock is
> > +return (qdev_get_machine->igd_gfx_passthru
> > && ((dev->class_code >> 0x8) == PCI_CLASS_DISPLAY_VGA));
> > }
>
> Doesn't compile:
>
> qemu/hw/xen/xen_pt.h: In function ‘is_igd_vga_passthrough’:
> qemu/hw/xen/xen_pt.h:325:29: error: request for member ‘igd_gfx_passthru’ in
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, December 16, 2015 3:58 PM
>
> ... since we don't need its virtual address anywhere (it's a
> placeholder page only after all). For this wo work (and possibly be
> done elsewhere too) share_xen_page_with_guest() needs to mark pages
>
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Thursday, December 17, 2015 10:42 PM
>
> On 12/17/2015 09:29 AM, Jan Beulich wrote:
> On 17.12.15 at 15:26, wrote:
> >> On 12/17/2015 09:18 AM, Jan Beulich wrote:
> >> On 17.12.15 at 15:12, wrote:
> On 12/17/2015 0
Add Guangrong who will be looking at nested virtualization in our side.
> From: Tim Deegan [mailto:t...@xen.org]
> Sent: Friday, December 11, 2015 6:21 PM
>
> Hi,
>
> Thanks for the report. The maintainers list changed recently, so I'm
> CC'ing the current set for VMX and x86/mm.
>
> Since thi
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com]
> Sent: Tuesday, December 08, 2015 3:14 AM
>
> On 11/30/2015 07:39 PM, Brendan Gregg wrote:
> > This introduces a way to have a restricted VPMU, by specifying one of two
> > predefined groups of PMCs to make available. For secure environm
This run is configured for baseline tests only.
flight 38530 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38530/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 15 gues
flight 66444 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66444/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start fail REGR. vs. 63732
Tests which are failin
On 12/17/15 20:25, H. Peter Anvin wrote:
>
> /* DECLARE_LINKTABLE_RO */
> extern const struct foo tablename[], tablename__end[];
>
> /* DEFINE_LINKTABLE_RO */
> DECLARE_LINKTABLE_RO(struct foo, tablename);
>
> const struct
> foo__attribute__((used,section(".rodata.tbl.tablename.0"))) tablename[0
On 12/17/15 15:46, Luis R. Rodriguez wrote:
>
> I explain why I do that there but the gist of it is that on Linux we may also
> want stronger semantics for specific linker table solutions, and solutions
> such
> as those devised on the IOMMU init stuff do memmove() for sorting depending on
> sema
flight 66450 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66450/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-libvirt-vhd 9 debian-di-installfail like 65654
Tests which did not succeed, but a
> On Dec 17, 2015, at 7:35 PM, Dario Faggioli wrote:
>
> On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
>> Allow the schedulers to be independently enabled or disabled at
>> compile-time instead of just allowing the scheduler to be selected on
>> the command line.
>>
> Reading th
flight 66449 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66449/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 5 kernel-build fail REGR. vs. 60684
build-amd6
On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
> Instead of having a manually-curated list of schedulers, use the
> array
> that was auto-generated simply by compiling in the scheduler files as
> the sole source of truth of the available schedulers.
>
> CC: George Dunlap
> CC: Dario
On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
> Adds a simple macro to place a pointer to a scheduler into an array
> section at compile time. Also, goes ahead and generates the array
> entries with each of the schedulers.
>
> CC: George Dunlap
> CC: Dario Faggioli
> CC: Josh Whit
On Thu, 2015-12-17 at 14:59 -0600, Jonathan Creekmore wrote:
> Allow the schedulers to be independently enabled or disabled at
> compile-time instead of just allowing the scheduler to be selected on
> the command line.
>
Reading this quickly, that "instead" gave me a bit of an hard time. I'm
not a
On 12/17/15 12:28 AM, Harmandeep Kaur wrote:
> Hi,
>
> I tried to setup xen serial console with this guide,
> http://wiki.xen.org/wiki/Xen_Serial_Console
>
> I am using RS232 -USB cable for this purpose.
> I am on Ubuntu 15.10 (4.2.0-19-generic).
>
> xl info http://paste2.org/F2UgY5yz
>
> My ou
This run is configured for baseline tests only.
flight 38528 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38528/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pygrub 10 guest-start
On Thu, Dec 17, 2015 at 3:46 PM, Luis R. Rodriguez wrote:
> solutions such
> as those devised on the IOMMU init stuff do memmove() for sorting depending on
> semantics defined (in the simplest case here so far dependency between init
> sequences), this makes each set of sequences very subsystem sp
On Thu, Dec 17, 2015 at 12:38:10PM -0800, H. Peter Anvin wrote:
> I think we can make this even more generic. In particular, I would love
> to see a solution for link tables that:
>
> a) can be used for any kind of data structures, not just function
> pointers (the latter is a specialization of t
flight 38529 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38529/
Perfect :-)
All tests in this flight passed
baseline version:
flight 38481
jobs:
build-amd64 pass
build-armhf
On Thu, Dec 17, 2015 at 12:57:49PM -0800, Andy Lutomirski wrote:
> On Thu, Dec 17, 2015 at 12:55 PM, H. Peter Anvin wrote:
> > On 12/17/15 12:48, Andy Lutomirski wrote:
> >>
> >> I'm entirely ignorant of anything going on in gPXE/iPXE.
> >>
> >> Can you explain what a linker table *does*? It look
The tables are almost identical and therefore there is little reason to
keep both sets.
PVH needs 3 extra hypercalls:
* mmuext_op. MMUEXT_PIN_L_TABLE are required by control domain (dom0)
when building guests. We add MMUEXT_UNPIN_TABLE for completeness.
* platform_op. These are only available to
flight 66437 linux-3.16 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66437/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 10 guest-start fail REGR. vs. 64969
test-amd64-i386-xl-qem
Instead of having a manually-curated list of schedulers, use the array
that was auto-generated simply by compiling in the scheduler files as
the sole source of truth of the available schedulers.
CC: George Dunlap
CC: Dario Faggioli
Signed-off-by: Jonathan Creekmore
---
xen/common/schedule.c
Add machinery to allow the schedulers to be individually selectable
through the Kconfig interface. The first patch in the series sets up
the Kconfig options for the schedulers and places the appropriate CONFIG_
options around the scheduler list. The second, third, and fourth patches
rework the sche
Adds a simple macro to place a pointer to a scheduler into an array
section at compile time. Also, goes ahead and generates the array
entries with each of the schedulers.
CC: George Dunlap
CC: Dario Faggioli
CC: Josh Whitehead
CC: Robert VanVossen
Signed-off-by: Jonathan Creekmore
---
xen/co
Creates a section to contain scheduler entry pointers that are gathered
together into an array. This will allow, in a follow-on patch, scheduler
entries to be automatically gathered together into the array for
automatic parsing.
CC: Ian Campbell
CC: Stefano Stabellini
CC: Keir Fraser
CC: Jan Be
Allow the schedulers to be independently enabled or disabled at
compile-time instead of just allowing the scheduler to be selected on
the command line. To match existing behavior, all four schedulers are
compiled in by default, although the RTDS and ARINC653 are marked
EXPERIMENTAL to match their n
On 12/17/15 12:48, Andy Lutomirski wrote:
>
> I'm entirely ignorant of anything going on in gPXE/iPXE.
>
> Can you explain what a linker table *does*? It looks like all you've
> done in this patch is to move code around. What actually happens?
>
A linker table is a data structure that is stit
On Thu, Dec 17, 2015 at 12:55 PM, H. Peter Anvin wrote:
> On 12/17/15 12:48, Andy Lutomirski wrote:
>>
>> I'm entirely ignorant of anything going on in gPXE/iPXE.
>>
>> Can you explain what a linker table *does*? It looks like all you've
>> done in this patch is to move code around. What actuall
On Tue, Dec 15, 2015 at 2:16 PM, Luis R. Rodriguez
wrote:
> From: "Luis R. Rodriguez"
>
> This lets us annotate its requirements specifically for
> PC and lguest subarchitectures. While at it since head.c
> just has ebda data rename it. Since we're using linker tables
> and both x86 32-bit and 64
I think we can make this even more generic. In particular, I would love
to see a solution for link tables that:
a) can be used for any kind of data structures, not just function
pointers (the latter is a specialization of the former);
b) doesn't need any changes to the linker scripts once the ini
Commit 9256f66c1606 ("x86/PCI: intercept all PV Dom0 MMCFG writes")
added intercepts for writes to RO MMCFG space from PV dom0.
Similar functionality is needed by dom0s in HVM containers (such as
PVH and, in the future, HVMlite).
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/hvm/emulate.c
v2:
* Expanded npfec structure to include page's precense indicator (I took the
easy way out and didn't implement VMX's fine-grained status since I couldn't
figure out how to properly do it in SVM)
* s/mmio/mmcfg for some operations. I left mmio_ro_emulate_ctxt as is because
it is used for no
This is provided explicitly in SVM and implicitly in VMX (when neither of
the three EPT_EFFECTIVE_* bits is set).
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/hvm/svm/svm.c |3 ++-
xen/arch/x86/hvm/vmx/vmx.c |5 -
xen/include/xen/mm.h |1 +
3 files changed, 7 insertions(
flight 66433 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66433/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 11 guest-start fail like 65766
Tests which did not succeed,
flight 66426 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66426/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail in 66395
pass in 66426
test-amd64-amd64-qe
Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting
via last" warning"):
> On Thu, 2015-12-17 at 17:48 +, Ian Jackson wrote:
> > Why would `return' be better ? It would still generate the same
> > warning. Leaving the loop via `last' seems less heavyweight than
> > u
On Thu, 2015-12-17 at 17:59 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 1/9] README.dev: Document
> the blessings"):
> > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > > +Each flight has a `blessing' and an `intended blessing'. The
> > > +`intended blessing' is
On Thu, 2015-12-17 at 17:50 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test
> -database: Wipe previous local plan data"):
> > On Thu, 2015-12-17 at 17:37 +, Ian Jackson wrote:
> > > If you don't run it as the same user, this is not a problem,
> because
>
On Thu, 2015-12-17 at 17:48 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an
> "exiting via last" warning"):
> > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > > This warning appears when db_retry_abort is used, since 2b069b6c
> > > "Databas
On Thu, 2015-12-17 at 17:43 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 4/9] mg-schema-test
> -database: Borrow shares properly"):
> > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > > # As we copy, we note everything we're not borrowing as
> > > - # belonging t
Ian Campbell writes ("Re: [OSSTEST PATCH 1/9] README.dev: Document the
blessings"):
> On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > +Each flight has a `blessing' and an `intended blessing'. The
> > +`intended blessing' is what the flight is going to be blessed as when
> > +its executi
Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe
previous local plan data"):
> On Thu, 2015-12-17 at 17:37 +, Ian Jackson wrote:
> > If you don't run it as the same user, this is not a problem, because
> > the default WebspaceFile has $HOME in it.
>
> Right, I shoul
Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting
via last" warning"):
> On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > This warning appears when db_retry_abort is used, since 2b069b6c
> > "Database locking: Perl: Retry all deadlocks in PostgreSQL".
>
> Is th
On 17/12/15 16:58, Jan Beulich wrote:
> This eliminates a number of pointless conditionals: Bits 0 and 1 of
> xcomp_bv don't matter anyway, and as long as none of bits 2..62 are
> set, setting bit 63 is pointless too.
xcomp_bv[63] is the indication of whether the area is compressed or not.
It wil
On Mon, Dec 14, 2015 at 12:39:34PM +0100, Gerd Hoffmann wrote:
> Signed-off-by: Gerd Hoffmann
> ---
> hw/xen/xen_pt.h | 3 +--
> vl.c| 10 --
> 2 files changed, 1 insertion(+), 12 deletions(-)
>
> diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h
> index c545280..6d8702b 100644
On Thu, 2015-12-17 at 17:37 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test-database:
> Wipe previous local plan data"):
> > Acked-by: Ian Campbell
>
> Thanks.
>
> > Would it make sense to remove data-projection.pl too? I suppose it
> > isn't
> > consumed
Ian Campbell writes ("Re: [OSSTEST PATCH 4/9] mg-schema-test-database: Borrow
shares properly"):
> On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> > # As we copy, we note everything we're not borrowing as
> > - # belonging to the parent db.
> > + # belonging to the parent db. We b
flight 66464 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66464/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 13
On Thu, 2015-12-17 at 17:17 +, Julien Grall wrote:
> Hi Ian,
>
> On 11/12/15 15:28, Julien Grall wrote:
> > Hi all,
> >
> > This patch series aims to fix the emulation of register {w,x}zr for
> > ARM64.
> >
> > A branch is available with all the patches applied:
> >
> > git://xenbits.xen.or
Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe
previous local plan data"):
> Acked-by: Ian Campbell
Thanks.
> Would it make sense to remove data-projection.pl too? I suppose it isn't
> consumed anywhere so is more or less harmless.
Precisely.
> OOI do these test m
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Spot when our db search revealed no candidates for the resources to
> allocate, and:
> - when doing an immediate allocation, call it an error
> - when doing a planned allocation, cause it to prevent allocation
> on this iteration, and pri
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Now, attempting to allocate a nonexistent host fails immediately with
> a sensible message, rather than queueing up and then reporting the
> message only later:
>
> mariner:testing.git> OSSTEST_CONFIG=/u/iwj/.xen-osstest/config:local-
> confi
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> If something other than the DB statements inside need_retry throws an
> exception, ->err will normally be undef (because
> $dbh_tests->begin_work will clear it, if nothing else).
>
> Signed-off-by: Ian Jackson
Acked-by: Ian Campbell
> ---
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> This warning appears when db_retry_abort is used, since 2b069b6c
> "Database locking: Perl: Retry all deadlocks in PostgreSQL".
Is the reason for not turning this into a return related to the fact this
is within an eval, not a proper sub? But
Ian pointed out that the definition of "offset" and "appropriate
boundary" in the comments added by "xen/arm: vgic: Optimize the way to
store the target vCPU in the rank" were not cleared.
Clarify them by explicitly mentionning the offset is in byte and the
appropriate boundary is ITARGET/IROUTER
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> I experienced this `die' due to mg-schema-test-database failing to
> borrow shared hosts properly, and added this Dumper for debugging.
>
> I have not bothered to improve any of the other quite terse `die's in
> ms-planner.
>
> Signed-off-by
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
> ---
> mg-schema-test-database | 14 --
> 1 file changed, 12 insertions(+), 2 deletions(-)
>
> diff --git a/mg-schema-test-database b/mg-schema-test-database
> index a4cb732..4e0ee68 100755
> --- a/
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Whatever is in the user's cwd is unlikely to correspond to anything
> real. In principle it might be possible to obtain an official copy
> from the real daemons, and massage it, or something, but that's a lot
> of work.
>
> Instead, just rem
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> The default timeouts mean that after starting a test db queue daemon
> and a test db allocation attempt, we have to wait two minutes.
>
> Lower timeouts increase the risk that we might lose noncritical races
> and allocate resources to the `w
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
> ---
> README.dev | 101
>
> 1 file changed, 101 insertions(+)
>
> diff --git a/README.dev b/README.dev
> index 65ec111..879af60 100644
> --- a/README
Hi Ian,
On 11/12/15 15:28, Julien Grall wrote:
> Hi all,
>
> This patch series aims to fix the emulation of register {w,x}zr for ARM64.
>
> A branch is available with all the patches applied:
>
> git://xenbits.xen.org/people/julieng/xen-unstable.git branch handle-xzr-v1
>
> Regards,
>
> Julie
The default timeouts mean that after starting a test db queue daemon
and a test db allocation attempt, we have to wait two minutes.
Lower timeouts increase the risk that we might lose noncritical races
and allocate resources to the `wrong' tasks. And they reduce the
duration of an outage which wi
This warning appears when db_retry_abort is used, since 2b069b6c
"Database locking: Perl: Retry all deadlocks in PostgreSQL".
Signed-off-by: Ian Jackson
---
Osstest.pm |1 +
1 file changed, 1 insertion(+)
diff --git a/Osstest.pm b/Osstest.pm
index c77d960..a398b1e 100644
--- a/Osstest.pm
++
Signed-off-by: Ian Jackson
---
README.dev | 101
1 file changed, 101 insertions(+)
diff --git a/README.dev b/README.dev
index 65ec111..879af60 100644
--- a/README.dev
+++ b/README.dev
@@ -232,3 +232,104 @@ probably are after a reboot)
I experienced this `die' due to mg-schema-test-database failing to
borrow shared hosts properly, and added this Dumper for debugging.
I have not bothered to improve any of the other quite terse `die's in
ms-planner.
Signed-off-by: Ian Jackson
---
ms-planner |4 +++-
1 file changed, 3 insert
Signed-off-by: Ian Jackson
---
mg-schema-test-database | 14 --
1 file changed, 12 insertions(+), 2 deletions(-)
diff --git a/mg-schema-test-database b/mg-schema-test-database
index a4cb732..4e0ee68 100755
--- a/mg-schema-test-database
+++ b/mg-schema-test-database
@@ -448,12 +448,
Whatever is in the user's cwd is unlikely to correspond to anything
real. In principle it might be possible to obtain an official copy
from the real daemons, and massage it, or something, but that's a lot
of work.
Instead, just remove it when we start the test db daemons.
In principle it would b
If something other than the DB statements inside need_retry throws an
exception, ->err will normally be undef (because
$dbh_tests->begin_work will clear it, if nothing else).
Signed-off-by: Ian Jackson
---
Osstest/JobDB/Executive.pm |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff
Spot when our db search revealed no candidates for the resources to
allocate, and:
- when doing an immediate allocation, call it an error
- when doing a planned allocation, cause it to prevent allocation
on this iteration, and print a suitably unreassuring message
Previously it would simply s
Now, attempting to allocate a nonexistent host fails immediately with
a sensible message, rather than queueing up and then reporting the
message only later:
mariner:testing.git>
OSSTEST_CONFIG=/u/iwj/.xen-osstest/config:local-config.test-database_iwj
./mg-allocate -U 1h spong
2015-12-17 17:05:14
This eliminates a number of pointless conditionals: Bits 0 and 1 of
xcomp_bv don't matter anyway, and as long as none of bits 2..62 are
set, setting bit 63 is pointless too.
Signed-off-by: Jan Beulich
---
Noticed while working on XSA-165.
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@
On 15/12/15 16:44, Juergen Gross wrote:
> On 15/12/15 16:01, Andrew Cooper wrote:
>> On 15/12/15 14:57, Juergen Gross wrote:
>>> On 15/12/15 15:06, Andrew Cooper wrote:
On 15/12/15 12:55, Juergen Gross wrote:
> On 15/12/15 13:52, Ian Campbell wrote:
>> On Tue, 2015-12-15 at 13:47 +0100
Cc: Stefano Stabellini
Cc: xen-de...@lists.xensource.com
Signed-off-by: Markus Armbruster
---
xen-hvm.c | 7 +++
1 file changed, 7 insertions(+)
diff --git a/xen-hvm.c b/xen-hvm.c
index 3d78a0c..2a93390 100644
--- a/xen-hvm.c
+++ b/xen-hvm.c
@@ -240,6 +240,7 @@ static void xen_ram_init(PCMa
Hi all,
Currently XENMEM_exchange is not supported on ARM because the steal_page is
left unimplemented.
However, even if steal_page is implemented, the hypercall can't work for ARM
because:
- Direct mapped domain is not supported
- ARM doesn't have a M2P and therefore usage of mfn_to_gmfn
This function will be used in various place to check a given set of
contiguous MFN belongs to a direct domain guest.
Signed-off-by: Julien Grall
---
Cc: Ian Campbell
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Keir Fraser
Cc: Tim Deegan
---
xen/common/memory.c | 62
Direct mapped domain needs to retrieve the exact same underlying
physical page when the region is re-populated.
Therefore when memory is exchanged for direct mapped domain, we don't
want to free memory of the previous region neither allocate new memory.
Note that because of that, the hypercall XE
The implementation of steal_page for ARM and x86 would be the same.
Rather than duplicating the x86 function, move it in common code.
Also introduce missing define PRtype_info for ARM in order to compile
the code.
Signed-off-by: Julien Grall
---
Cc: Ian Campbell
Cc: Stefano Stabellini
Cc: Kei
Use the Kconfig generated CONFIG_COMPAT defines in the code base.
CC: Keir Fraser
CC: Jan Beulich
CC: Andrew Cooper
Signed-off-by: Doug Goldstein
Acked-by: Jan Beulich
---
config/x86_64.mk | 1 -
xen/arch/x86/Kconfig | 1 +
xen/common/Kconfig | 7 +++
3 files changed, 8 insertions(
On 17/12/15 15:17, David Vrabel wrote:
> diff --git a/xen/include/asm-x86/hvm/vmx/vmcs.h
> b/xen/include/asm-x86/hvm/vmx/vmcs.h
> index a8d4d5b..e778d86 100644
> --- a/xen/include/asm-x86/hvm/vmx/vmcs.h
> +++ b/xen/include/asm-x86/hvm/vmx/vmcs.h
> @@ -67,7 +67,7 @@ struct ept_data {
> };
If a guest allocates a page and the tlbflush_timestamp on the page
indicates that a TLB flush of the previous owner is required, only the
linear and combined mappings are invalidated. The guest-physical
mappings are not invalidated.
This is currently safe because the EPT code ensures that the
gue
Holding the p2m lock while calling ept_sync_domain() is very expensive
since it does a on_selected_cpus() call. IPIs on many socket machines
can be very slows and on_selected_cpus() is serialized.
It is safe to defer the invalidate until the p2m lock is released
except for two cases:
1. When fre
This series improves the performance of EPT by further reducing the
impact of the translation invalidations (ept_sync_domain()). By:
a) Deferring invalidations until the p2m write lock is released.
Prior to this change a 16 VCPU guest could not be successfully
migrated on an (admittedly slow) 160
flight 66421 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/66421/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate
fail REGR. vs. 65639
On 12/17/2015 09:29 AM, Jan Beulich wrote:
On 17.12.15 at 15:26, wrote:
On 12/17/2015 09:18 AM, Jan Beulich wrote:
On 17.12.15 at 15:12, wrote:
On 12/17/2015 09:01 AM, Jan Beulich wrote:
@@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu
enabled_cntrs |= (1ULL <<
>>> On 17.12.15 at 15:26, wrote:
> On 12/17/2015 09:18 AM, Jan Beulich wrote:
> On 17.12.15 at 15:12, wrote:
>>> On 12/17/2015 09:01 AM, Jan Beulich wrote:
@@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu
enabled_cntrs |= (1ULL << i);
}
On 12/17/2015 09:18 AM, Jan Beulich wrote:
On 17.12.15 at 15:12, wrote:
On 12/17/2015 09:01 AM, Jan Beulich wrote:
@@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu
enabled_cntrs |= (1ULL << i);
}
-if ( vpmu_is_set(vcpu_vpmu(v), VPMU_CPU_HAS_DS) &&
-
>>> On 17.12.15 at 15:12, wrote:
> On 12/17/2015 09:01 AM, Jan Beulich wrote:
>> @@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu
>> enabled_cntrs |= (1ULL << i);
>> }
>>
>> -if ( vpmu_is_set(vcpu_vpmu(v), VPMU_CPU_HAS_DS) &&
>> - !is_canonical_addre
On 12/17/2015 09:01 AM, Jan Beulich wrote:
For one, loading the MSR with a possibly non-canonical address was
possible since the verification is conditional, while the MSR load
wasn't. And then for PV guests we need to further limit the range of
valid addresses to exclude the hypervisor range.
S
On 17/12/15 14:01, Jan Beulich wrote:
> For one, loading the MSR with a possibly non-canonical address was
> possible since the verification is conditional, while the MSR load
> wasn't. And then for PV guests we need to further limit the range of
> valid addresses to exclude the hypervisor range.
>
For one, loading the MSR with a possibly non-canonical address was
possible since the verification is conditional, while the MSR load
wasn't. And then for PV guests we need to further limit the range of
valid addresses to exclude the hypervisor range.
Signed-off-by: Jan Beulich
--- a/xen/arch/x8
>>> On 17.12.15 at 14:55, wrote:
> On 12/17/2015 04:46 AM, Jan Beulich wrote:
> On 16.12.15 at 20:34, wrote:
>>> On 12/16/2015 04:04 AM, Jan Beulich wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -3116,6 +3116,21 @@ int hvm_hap_nested_page_fault(paddr_t
On 12/17/2015 04:46 AM, Jan Beulich wrote:
On 16.12.15 at 20:34, wrote:
On 12/16/2015 04:04 AM, Jan Beulich wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -3116,6 +3116,21 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned long
gla,
goto out_put_gfn;
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Xen Security Advisory CVE-2015-8550 / XSA-155
version 6
paravirtualized drivers incautious about shared memory contents
UPDATES IN VERSION 6
Correct CREDITS section.
ISSUE DESCRIPTI
> On 17.12.2015 at 8:10pm, wrote:
> >>> On 17.12.15 at 12:43, wrote:
> > You are correct.
> > As the _pci_hide_device()'s early check, I didn't use it.
> > Could I remove the device from that list before adding it to
> > dom_xen's, and reuse pci_hide_device() as below?
>
> That's what I was tr
1 - 100 of 131 matches
Mail list logo