On 05/03/2018 07:06 AM, Kang, Luwei wrote:
Another thing is Xen's vmevent allows intercepting several other traced states.
It seems that a more generic framework is needed to
make PT work with vmevent subsystem? What is your thought on that?
Hi Wei,
I am not fully clear what is the
> > +int pt_do_wrmsr(unsigned int msr, uint64_t msr_content) {
> > +struct pt_desc *pt_desc = >arch.hvm_vmx.pt_desc;
> > +
> > +if ( !opt_intel_pt )
> > +return 1;
> > +
> > +switch ( msr ) {
> > +case MSR_IA32_RTIT_CTL:
> > +pt_set_rtit_ctl(pt_desc, msr_content);
>
flight 122566 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122566/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 3ff82ee5fc52c8e8764b407ec45cafab8452e2b9
baseline version:
ovmf
From: DavidWang
Zhaoxin is a x86 IC designer. Its SOC products support both CPU
virtualization and I/O virtualization, which are compatible with Intel
VMX and VT-d respectively. Zhaoxin has 'Shanghai' CPU vendor ID.
Signed-off-by: DavidWang
---
On 03/05/18 01:45, Marek Marczykowski wrote:
> On Wed, May 02, 2018 at 01:20:09AM -0600, Jan Beulich wrote:
> On 30.04.18 at 23:54, wrote:
>>> Using RING_GET_RESPONSE() on a shared ring is easy to use incorrectly
>>> (i.e., by not considering that the other
> > Here is a patch-series which adding Processor Trace enabling in XEN guest.
> > You can get It's software developer manuals from:
> > https://software.intel.com/sites/default/files/managed/c5/15/architect
> > ure-instruction-set-extensions-programming-reference.pdf
> > In Chapter 5 INTEL
On Wed, May 02, 2018 at 01:20:09AM -0600, Jan Beulich wrote:
> >>> On 30.04.18 at 23:54, wrote:
> > Using RING_GET_RESPONSE() on a shared ring is easy to use incorrectly
> > (i.e., by not considering that the other end may alter the data in the
> > shared ring
This run is configured for baseline tests only.
flight 74662 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74662/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 19f21ed91652d2a5160426ad8ca9219728d85aec
baseline
On 4/18/2018 1:11 AM, Linus Walleij wrote:
I wonder why I am starting to get CCed on Xen patches all of a sudden.
I happened to run into Jürgen at a conference only last weekend, but
I still don't know anything whatsoever about Xen or how it works.
If get_maintainer.pl has started to return my
flight 122563 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122563/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 19f21ed91652d2a5160426ad8ca9219728d85aec
baseline version:
ovmf
flight 122561 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122561/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 122554
test-armhf-armhf-libvirt-xsm 14
On Mon, 23 Apr 2018, Lars Kurth wrote:
> Hi all,
>
> On 06/04/2018, 15:13, "Lars Kurth" wrote:
>
> > 1) Requirements to the code, a subset of MISRA for ASIL B
> > Next step: get more information about requirements and publish it to
> > xen-devel.
>
Wei,
On 2/21/18 3:46 PM, Wei Liu wrote:
Move and rename update_paging_mode. Create a local header file for
this and other functions that need exporting.
Signed-off-by: Wei Liu
---
Cc: Suravee Suthikulpanit
---
On 05/02/2018 11:41 AM, Jan Beulich wrote:
On 02.05.18 at 17:22, wrote:
>> On 05/02/2018 11:01 AM, Jan Beulich wrote:
>> On 02.05.18 at 17:00, wrote:
On 05/02/2018 04:16 AM, Jan Beulich wrote:
On 30.04.18 at 18:23,
Wei,
On 2/21/18 3:46 PM, Wei Liu wrote:
It is never used and it is getting in the way of cleaning up.
The only callsite of guest_iommu_add_ppr_log has no effect because
guest iommu is not initialised.
Signed-off-by: Wei Liu
---
Cc: Suravee
On 02/05/18 17:15, Wei Liu wrote:
> On Wed, May 02, 2018 at 09:43:33AM -0600, Jan Beulich wrote:
> On 02.05.18 at 17:19, wrote:
>>> On Fri, Apr 27, 2018 at 08:53:30AM +, Kang, Luwei wrote:
>> Load/Store Intel processor trace register in context switch.
>> MSR
This run is configured for baseline tests only.
flight 74659 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74659/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 1df5fb2d83d9eca2d3b4b87fab7a0ec9f288cb6f
baseline
On 04/28/2018 11:09 AM, Arnd Bergmann wrote:
> On Sat, Apr 28, 2018 at 12:21 AM, Joao Martins
> wrote:
>> On 04/27/2018 09:13 PM, Arnd Bergmann wrote:
>>> diff --git a/arch/x86/kernel/pvclock.c b/arch/x86/kernel/pvclock.c
>>> index 761f6af6efa5..637982efecd8 100644
>>>
> On Apr 24, 2018, at 05:19, Lars Kurth wrote:
>
> Hi all,
> as agreed please find attached the meeting invite
> Regards
> Lars
>
> ## Agenda (provisional)
> I copied what was discussed on this thread so far
>
> -Original Message-
> From: Anthony PERARD [mailto:anthony.per...@citrix.com]
> Sent: 02 May 2018 16:58
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; qemu-bl...@nongnu.org; qemu-
> de...@nongnu.org; Stefano Stabellini ; Kevin
On Mon, Apr 30, 2018 at 01:01:35PM +0100, Paul Durrant wrote:
> The grant copy operation was added to libxengnttab in Xen 4.8.0 (released
> nearly 18 months ago) but the xen_disk PV backend QEMU is still carrying
> a significant amount of code purely to remain compatible with older
> versions of
On Wed, Apr 25, 2018 at 02:46:47PM +0100, Igor Druzhinin wrote:
> When global_log_dirty is enabled VRAM modification tracking never
> worked correctly. The address that is passed to xen_hvm_modified_memory()
> is not the effective PFN but RAM block address which is not the same
> for VRAM.
>
> We
>>> On 02.05.18 at 17:19, wrote:
> On Fri, Apr 27, 2018 at 08:53:30AM +, Kang, Luwei wrote:
>> > > Load/Store Intel processor trace register in context switch.
>> > > MSR IA32_RTIT_CTL is loaded/stored automatically from VMCS.
>> > > When Intel PT is supported in guest,
>>> On 02.05.18 at 17:22, wrote:
> On 05/02/2018 11:01 AM, Jan Beulich wrote:
> On 02.05.18 at 17:00, wrote:
>>> On 05/02/2018 04:16 AM, Jan Beulich wrote:
>>> On 30.04.18 at 18:23, wrote:
> ---
On Wed, May 02, 2018 at 11:23:12AM +0200, Juergen Gross wrote:
> On 02/05/18 00:33, gre...@linuxfoundation.org wrote:
> >
> > This is a note to let you know that I've just added the patch titled
> >
> > x86/xen: Add pvh specific rsdp address retrieval function
> >
> > to the 4.16-stable
On 02/05/18 16:09, Jan Beulich wrote:
On 02.05.18 at 17:08, wrote:
>> On 05/02/2018 11:00 AM, Jan Beulich wrote:
>> On 02.05.18 at 16:57, wrote:
On 05/02/2018 04:05 AM, Jan Beulich wrote:
On 30.04.18 at 18:23,
On 05/02/2018 11:01 AM, Jan Beulich wrote:
On 02.05.18 at 17:00, wrote:
>> On 05/02/2018 04:16 AM, Jan Beulich wrote:
>> On 30.04.18 at 18:23, wrote:
--- a/arch/x86/xen/xen-pvh.S
+++ b/arch/x86/xen/xen-pvh.S
@@ -54,6
On Fri, Apr 27, 2018 at 08:53:30AM +, Kang, Luwei wrote:
> > > Load/Store Intel processor trace register in context switch.
> > > MSR IA32_RTIT_CTL is loaded/stored automatically from VMCS.
> > > When Intel PT is supported in guest, we need load/restore PT MSRs only
> > > when PT is enabled in
>>> On 02.05.18 at 17:08, wrote:
> On 05/02/2018 11:00 AM, Jan Beulich wrote:
> On 02.05.18 at 16:57, wrote:
>>> On 05/02/2018 04:05 AM, Jan Beulich wrote:
>>> On 30.04.18 at 18:23, wrote:
>
>>> On 02.05.18 at 17:06, wrote:
> On 05/02/2018 04:26 AM, Jan Beulich wrote:
> On 01.05.18 at 14:34, wrote:
>>> On 05/01/2018 04:00 AM, Roger Pau Monné wrote:
On Mon, Apr 30, 2018 at 12:23:39PM -0400, Boris Ostrovsky wrote:
>
On 05/02/2018 11:00 AM, Jan Beulich wrote:
On 02.05.18 at 16:57, wrote:
>> On 05/02/2018 04:05 AM, Jan Beulich wrote:
>> On 30.04.18 at 18:23, wrote:
Signed-off-by: Boris Ostrovsky
>>> Reviewed-by:
On 05/02/2018 04:26 AM, Jan Beulich wrote:
On 01.05.18 at 14:34, wrote:
>> On 05/01/2018 04:00 AM, Roger Pau Monné wrote:
>>> On Mon, Apr 30, 2018 at 12:23:39PM -0400, Boris Ostrovsky wrote:
And without it we can't use _BOOT_XX macros any longer so define new
>>> On 02.05.18 at 16:57, wrote:
> On 05/02/2018 04:05 AM, Jan Beulich wrote:
> On 30.04.18 at 18:23, wrote:
>>> Signed-off-by: Boris Ostrovsky
>> Reviewed-by: Jan Beulich
>>
>> But to
On 05/02/2018 04:16 AM, Jan Beulich wrote:
On 30.04.18 at 18:23, wrote:
>> --- a/arch/x86/xen/xen-pvh.S
>> +++ b/arch/x86/xen/xen-pvh.S
>> @@ -54,6 +54,9 @@
>> * charge of setting up it's own stack, GDT and IDT.
>> */
>>
>> +#define PVH_GDT_ENTRY_CANARY4
On 05/02/2018 04:05 AM, Jan Beulich wrote:
On 30.04.18 at 18:23, wrote:
>> Signed-off-by: Boris Ostrovsky
> Reviewed-by: Jan Beulich
>
> But to understand why things have been working nevertheless it would
> have
On 05/02/2018 04:00 AM, Jan Beulich wrote:
On 30.04.18 at 18:23, wrote:
>> Latest binutils release (2.29.1) will no longer allow proper computation
>> of GDT entries on 32-bits, with warning:
>>
>> arch/x86/xen/xen-pvh.S: Assembler messages:
>>
From: Oleksandr Andrushchenko
It is now not fully possible to control if and which virtual devices
are created by the frontend, e.g. keyboard and pointer devices
are always created and multi-touch device is created if the
backend advertises multi-touch support.
From: Oleksandr Andrushchenko
Add missing string constants for {feature|request}-raw-pointer
to align with the rest of the interface file.
Fixes 7868654ff7fe ("kbdif: Define "feature-raw-pointer" and
"request-raw-pointer")
Signed-off-by: Oleksandr
flight 122557 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122557/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 1df5fb2d83d9eca2d3b4b87fab7a0ec9f288cb6f
baseline version:
ovmf
On 05/02/2018 04:58 PM, Konrad Rzeszutek Wilk wrote:
On Wed, May 02, 2018 at 10:16:08AM +0300, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
It is now not fully possible to control if and which virtual devices
are created by the frontend, e.g.
On Wed, May 02, 2018 at 10:16:08AM +0300, Oleksandr Andrushchenko wrote:
> From: Oleksandr Andrushchenko
>
> It is now not fully possible to control if and which virtual devices
> are created by the frontend, e.g. keyboard and pointer devices
> are always
On 02/05/2018, 12:45, "Ian Jackson" wrote:
Lars Kurth writes ("Re: [PATCH for-4.11 v2 2/2] Add new add_maintainers.pl
script to optimise the workflow when using git format-patch with
get_maintainer.pl"):
> On 02/05/2018, 11:50, "Ian Jackson"
PSEC 2018 brings together security researchers and developers from the
open-source ecosystems of OpenEmbedded, Xen Project and OpenXT.
Presentation topics will include Xen security, LinuxBoot, TPM 2.0, Intel TXT
SMI Transfer Monitor (STM), de-privileged QEMU, UEFI, trusted boot (SRTM and
Lars Kurth writes ("Re: [PATCH for-4.11 v2 2/2] Add new add_maintainers.pl
script to optimise the workflow when using git format-patch with
get_maintainer.pl"):
> On 02/05/2018, 11:50, "Ian Jackson" wrote:
> If the address is a mailing list for some other stanza in
On 05/02/2018 09:17 AM, Razvan Cojocaru wrote:
> On 04/23/2018 02:47 PM, George Dunlap wrote:
>> On 04/18/2018 02:12 PM, Razvan Cojocaru wrote:
>>> p2m_change_type_range() handles end > max_mapped_pfn, but not
>>> start > max_mapped_pfn. Check the latter just after grabbing the
>>> lock and bail
On 02/05/2018, 11:50, "Ian Jackson" wrote:
Lars Kurth writes ("Re: [PATCH for-4.11 v2 2/2] Add new add_maintainers.pl
script to optimise the workflow when using git format-patch with
get_maintainer.pl"):
> On 30/04/2018, 15:36, "Ian Jackson"
On Wed, May 02, 2018 at 08:03:52PM +1000, Alexey G wrote:
> - Emulating (a simplest) upstream PCIe hierarchy for passed through PCIe
> devices. The issue was described in details here:
> http://lists.gnu.org/archive/html/qemu-devel/2018-03/msg03593.html
>
> Latter problem must be resolved
Lars Kurth writes ("Re: [PATCH for-4.11 v2 2/2] Add new add_maintainers.pl
script to optimise the workflow when using git format-patch with
get_maintainer.pl"):
> On 30/04/2018, 15:36, "Ian Jackson" wrote:
>
> +# Get the list of patches
> +my $pattern =
On 01/05/18 11:28, Andrew Cooper wrote:
> On 26/04/18 12:33, Juergen Gross wrote:
>> This patch series aims at reducing the overhead of the XPTI Meltdown
>> mitigation.
>
> With just the first 3 patches of this series (in a bisection attempt),
> on a XenServer build based off staging, XenRT finds
On Wed, May 02, 2018 at 11:16:40AM +0100, George Dunlap wrote:
> Delete tabs and trailing whitespace.
>
> No functional change.
>
> Signed-off-by: George Dunlap
Acked-by: Wei Liu
___
Xen-devel mailing
On 01/05/18 14:34, Lars Kurth wrote:
> Requested by Ian Jackson, see
> https://lists.xenproject.org/archives/html/xen-devel/2018-04/msg02286.html
>
> The patch also fixes the location of linux-2.6.18-xen.hg (it is currently
> pointing to an alias)
>
> Cc: Andrew Cooper
Jan Beulich writes ("Re: [PATCH for-4.11 2/2] Replace http: with https: in
MAINTAINERs file"):
> On 01.05.18 at 14:34, wrote:
> > @@ -404,7 +404,7 @@ F: unmodified_drivers/linux-2.6/
> > USB PV DRIVERS
> > M: Noboru Iwamatsu
> > S:
On 02/05/18 12:16, George Dunlap wrote:
> Delete tabs and trailing whitespace.
>
> No functional change.
>
> Signed-off-by: George Dunlap
Release-acked-by: Juergen Gross
Juergen
___
Xen-devel mailing
On 02/05/18 11:02, Jan Beulich wrote:
> Commit 0142064421 ("x86/traps: move set_guest_{machine,nmi}_trapbounce")
> converted the functions' return types from int to bool without also
> correcting the checks in assembly code: The ABI does not guarantee sub-
> 32-bit return values to be promoted to
There are a lot of places which release a lock before calling
vcpu_sleep_nosync(), which then just grabs the lock again. This is
not only a waste of time, but leads to more code duplication (since
you have to copy-and-paste recipes rather than calling a unified
function), which in turn leads to
Delete tabs and trailing whitespace.
No functional change.
Signed-off-by: George Dunlap
---
Changes since RFC: Introduced
CC: Dario Faggioli
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
The current sequence to initiate vcpu migration is inefficent and error-prone:
- The initiator sets VPF_migraging with the lock held, then drops the
lock and calls vcpu_sleep_nosync(), which immediately grabs the lock
again
- A number of places unnecessarily check for v->pause_flags in
flight 122558 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122558/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 0306a1311d02ea52b4a9a9bc339f8bab9354c5e3
baseline version:
xen
flight 122554 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/122554/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 122527
test-armhf-armhf-libvirt-xsm 14
I’ll try to summarize current issues/difficulties in extending the PCIe
passthrough support and possible ways to resolve these problems which
were discussed in the mailing list so far.
Possible options to extend PCI passthrough/emulation capabilities
Signed-off-by: Jan Beulich
--- /dev/null
+++ b/tests/xsa-242/Makefile
@@ -0,0 +1,11 @@
+include $(ROOT)/build/common.mk
+
+NAME := xsa-242
+CATEGORY := xsa
+TEST-ENVS := pv64
+
+TEST-EXTRA-CFG := extra.cfg.in
+
+obj-perenv += main.o
+
+include $(ROOT)/build/gen.mk
---
Derived and extended from Jann Horn's original Linux PoC.
Signed-off-by: Jan Beulich
--- /dev/null
+++ b/tests/xsa-240/Makefile
@@ -0,0 +1,9 @@
+include $(ROOT)/build/common.mk
+
+NAME := xsa-240
+CATEGORY := xsa
+TEST-ENVS := $(PV_ENVIRONMENTS)
+
+obj-perenv += main.o
On 02/05/18 10:02, Jan Beulich wrote:
> Commit 0142064421 ("x86/traps: move set_guest_{machine,nmi}_trapbounce")
> converted the functions' return types from int to bool without also
> correcting the checks in assembly code: The ABI does not guarantee sub-
> 32-bit return values to be promoted to
On 02/05/18 00:33, gre...@linuxfoundation.org wrote:
>
> This is a note to let you know that I've just added the patch titled
>
> x86/xen: Add pvh specific rsdp address retrieval function
>
> to the 4.16-stable tree which can be found at:
>
>
> >> >>> On 28.04.18 at 03:07, wrote:
> >> >> > @@ -383,13 +388,28 @@ static int vmx_init_vmcs_config(void)
> >> >> > _vmx_secondary_exec_control &=
> >> >> > ~SECONDARY_EXEC_ENABLE_VIRT_EXCEPTIONS;
> >> >> >
> >> >> > min = 0;
> >> >> > -opt =
>>> On 02.05.18 at 09:22, wrote:
>> >>> On 28.04.18 at 03:07, wrote:
>> >> > @@ -383,13 +388,28 @@ static int vmx_init_vmcs_config(void)
>> >> > _vmx_secondary_exec_control &=
>> >> > ~SECONDARY_EXEC_ENABLE_VIRT_EXCEPTIONS;
>> >> >
>> >> >
>>> On 02.05.18 at 09:47, wrote:
> 发件人: Jan Beulich
> 发送时间: 2018年4月30日 22:15
On 25.04.18 at 11:51, wrote:
>> --- a/xen/include/asm-x86/iommu.h
>> +++ b/xen/include/asm-x86/iommu.h
>> @@ -54,6 +54,7 @@ static inline const
Commit 0142064421 ("x86/traps: move set_guest_{machine,nmi}_trapbounce")
converted the functions' return types from int to bool without also
correcting the checks in assembly code: The ABI does not guarantee sub-
32-bit return values to be promoted to 32 bits.
Take the liberty and also adjust the
Ian,
I addressed most of these locally, but have not dealt with the more functional
changes such as options, etc. However there are a few areas I was not planning
to address or have questions.
On 30/04/2018, 15:36, "Ian Jackson" wrote:
+# Get the list of
On Tue, May 1, 2018 at 1:54 PM, Minjun Hong wrote:
> On Mon, Apr 30, 2018 at 10:13 PM, Andrew Cooper
> wrote:
>>
>> On 29/04/18 11:11, Minjun Hong wrote:
>> > Hi.
>> > I'm looking for a point where address translation (guest virtual
>> > address to
flight 74658 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74658/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-i386-squeeze-netboot-pygrub 10 debian-di-install fail like
74641
>>> On 01.05.18 at 14:34, wrote:
> On 05/01/2018 04:00 AM, Roger Pau Monné wrote:
>> On Mon, Apr 30, 2018 at 12:23:39PM -0400, Boris Ostrovsky wrote:
>>> And without it we can't use _BOOT_XX macros any longer so define new ones.
>>
>> Not being that familiar with
>>> On 30.04.18 at 18:23, wrote:
> And without it we can't use _BOOT_XX macros any longer so define new ones.
Ah, here we go. Perhaps this should be moved earlier in the series?
Assuming you really want to go this route in the first place, taking
Roger's comment into
On 04/23/2018 02:47 PM, George Dunlap wrote:
> On 04/18/2018 02:12 PM, Razvan Cojocaru wrote:
>> p2m_change_type_range() handles end > max_mapped_pfn, but not
>> start > max_mapped_pfn. Check the latter just after grabbing the
>> lock and bail if true.
>>
>> Signed-off-by: Razvan Cojocaru
>>> On 30.04.18 at 18:23, wrote:
> --- a/arch/x86/xen/xen-pvh.S
> +++ b/arch/x86/xen/xen-pvh.S
> @@ -54,6 +54,9 @@
> * charge of setting up it's own stack, GDT and IDT.
> */
>
> +#define PVH_GDT_ENTRY_CANARY4
> +#define PVH_CANARY_SEL
>>> On 30.04.18 at 18:23, wrote:
> Signed-off-by: Boris Ostrovsky
Reviewed-by: Jan Beulich
But to understand why things have been working nevertheless it would
have been nice if the commit message wasn't empty, but
Gentle reminder...
I think that Xen side comments are already there and still I miss
some input from ALSA community on patch #5.
Thank you,
Oleksandr
On 04/16/2018 09:24 AM, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
Please note: this
>>> On 30.04.18 at 18:23, wrote:
> Latest binutils release (2.29.1) will no longer allow proper computation
> of GDT entries on 32-bits, with warning:
>
> arch/x86/xen/xen-pvh.S: Assembler messages:
> arch/x86/xen/xen-pvh.S:150: Warning: shift count out of range (32
On 05/02/2018 10:19 AM, Jan Beulich wrote:
On 02.05.18 at 07:29, wrote:
On 05/01/2018 12:54 AM, Marek Marczykowski-Górecki wrote:
Using RING_GET_RESPONSE() on a shared ring is easy to use incorrectly
(i.e., by not considering that the other end may alter the data in the
This run is configured for baseline tests only.
flight 74657 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74657/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f9dff90289507191f299331e44601c5ef83c1948
baseline
>>> On 01.05.18 at 14:34, wrote:
> @@ -404,7 +404,7 @@ F:unmodified_drivers/linux-2.6/
> USB PV DRIVERS
> M: Noboru Iwamatsu
> S: Supported
> -T: hg http://xenbits.xenproject.org/linux-2.6.18-xen.hg
> +T: hg
> > This patch add Intel processor trace support for cpuid handling.
>
> The 0x14 usage screams of wanting an #define.
Get it. Will define leaf 0x14 as a macro in next version. Thanks for the review.
Luwei Kang
___
Xen-devel mailing list
> On Tue, Jan 16, 2018 at 02:12:26AM +0800, Luwei Kang wrote:
> > Hi All,
> >
> > Here is a patch-series which adding Processor Trace enabling in XEN guest.
> > You can get It's software developer manuals from:
> > https://software.intel.com/sites/default/files/managed/c5/15/architect
> >
> >>> On 28.04.18 at 03:07, wrote:
> >> > @@ -383,13 +388,28 @@ static int vmx_init_vmcs_config(void)
> >> > _vmx_secondary_exec_control &=
> >> > ~SECONDARY_EXEC_ENABLE_VIRT_EXCEPTIONS;
> >> >
> >> > min = 0;
> >> > -opt = VM_ENTRY_LOAD_GUEST_PAT |
>>> On 30.04.18 at 23:54, wrote:
> Using RING_GET_RESPONSE() on a shared ring is easy to use incorrectly
> (i.e., by not considering that the other end may alter the data in the
> shared ring while it is being inspected). Safe usage of a response
> generally
>>> On 02.05.18 at 07:29, wrote:
> On 05/01/2018 12:54 AM, Marek Marczykowski-Górecki wrote:
>> Using RING_GET_RESPONSE() on a shared ring is easy to use incorrectly
>> (i.e., by not considering that the other end may alter the data in the
>> shared ring while it is being
From: Oleksandr Andrushchenko
It is now not fully possible to control if and which virtual devices
are created by the frontend, e.g. keyboard and pointer devices
are always created and multi-touch device is created if the
backend advertises multi-touch support.
>>> On 30.04.18 at 19:50, wrote:
> On 04/30/2018 01:07 PM, Andrew Cooper wrote:
>> On 30/04/18 12:37, Jan Beulich wrote:
>>> While the main problem to be addressed here is the issue of what so far
>>> was named "vmcb_in_sync" starting out with the wrong value (should
>>> On 01.05.18 at 10:15, wrote:
> On Mon, Apr 30, 2018 at 09:25:26AM -0600, Jan Beulich wrote:
> On 25.04.18 at 13:46, wrote:
>>> +static int do_microcode_update(void *_info)
>>> +{
>>> +struct microcode_info *info = _info;
>>> +unsigned int
Hi, Lars,
Our status and plan is below, I marked in blue.
== [PATCH v4 0/4] x86/cpuid: enable new cpu features The agreement was to park
until patches arrive, which as far as I can tell have not @John, @Yang: please
let me know if there is any progress and whether thus this item should be put
90 matches
Mail list logo