Re: [Xen-devel] [PATCH v1] xen/grant-table: log the lack of grants

2017-07-18 Thread Juergen Gross
On 07/07/17 20:23, Wengang Wang wrote: > log a message when we enter this situation: > 1) we already allocated the max number of available grants from hypervisor > and > 2) we still need more (but the request fails because of 1)). > > Sometimes the lack of grants causes IO hangs in xen_blkfront

Re: [Xen-devel] [PATCH][xen-next] xen/pvcalls: fix null pointer reference on sock_release call

2017-07-18 Thread Juergen Gross
On 11/07/17 21:41, Colin King wrote: > From: Colin Ian King > > Currently a sock_release on map->sock will result in a null pointer > deference on map when map is null. Instead, the sock_relase sould > be on sock and not map->sock. > > Detected by CoverityScan,

Re: [Xen-devel] [RFC PATCH 00/15] RFC: SGX virtualization design and draft patches

2017-07-18 Thread Huang, Kai
Hi Wei, Thank you very much for comments. Please see my reply below. On 7/17/2017 9:16 PM, Wei Liu wrote: Hi Kai Thanks for this nice write-up. Some comments and questions below. On Sun, Jul 09, 2017 at 08:03:10PM +1200, Kai Huang wrote: Hi all, [...] 2. SGX Virtualization Design 2.1

Re: [Xen-devel] [PATCH 15/15] xen: tools: expose EPC in ACPI table

2017-07-18 Thread Huang, Kai
On 7/17/2017 10:54 PM, Roger Pau Monné wrote: On Sun, Jul 09, 2017 at 08:16:05PM +1200, Kai Huang wrote: On physical machine EPC is exposed in ACPI table via "INT0E0C". Although EPC can be discovered by CPUID but Windows driver requires EPC to be exposed in ACPI table as well. This patch

Re: [Xen-devel] [PATCH 1/6] xen-blkfront: quiesce/unquiesce queue instead of start/stop queues

2017-07-18 Thread Ming Lei
On Tue, Jul 18, 2017 at 08:40:18AM +0100, Roger Pau Monné wrote: > On Tue, Jul 18, 2017 at 08:53:28AM +0800, Ming Lei wrote: > > On Mon, Jul 17, 2017 at 05:02:27PM +0100, Roger Pau Monné wrote: > > > On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote: > > > > On Mon, Jul 17, 2017 at

Re: [Xen-devel] [PATCH v4 7/9] vpci/msi: add MSI handlers

2017-07-18 Thread Paul Durrant
> -Original Message- > From: Roger Pau Monne [mailto:roger@citrix.com] > Sent: 30 June 2017 16:01 > To: xen-de...@lists.xenproject.org > Cc: boris.ostrov...@oracle.com; julien.gr...@arm.com; > konrad.w...@oracle.com; Roger Pau Monne ; Jan > Beulich

[Xen-devel] [xen-devel][xen/Arm]xen fail to boot on omap5 board

2017-07-18 Thread shishir tiwari
Hi I want test and understand xen hypervisor implementation with dom0 and domU on omap5 board. I followed https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM with latest kernel(4.11.7) and xen(4.9.0) and device tree and but unable to boot dom0. xen stop on

Re: [Xen-devel] [PATCH] scripts/get_maintainers.pl: Don't blindly drop "THE REST" maintainers

2017-07-18 Thread Andrew Cooper
On 17/07/17 19:18, Julien Grall wrote: > "THE REST" maintainers should always be CCed for any modification that > don't fall under the responsability of a specific component maintainer. > > However, the script get_maintainers.pl will remove "THE REST" > maintainers as soon as one maintainer of a

Re: [Xen-devel] Regarding hdmi sharing in xen

2017-07-18 Thread Andrii Anisov
Dear George John, On 17.07.17 09:59, George John wrote: I have a r-car H3 board with Dom0 and two DomU's. Are you speaking about Salvator-X or H3ULCB? Do we have to passthrough one of the hdmi ports to the one guest if we could implement GPU sharing between Dom0 and one DomU in r-car h3

Re: [Xen-devel] [PATCH v6 10/14] arm/guest_access: Rename vgic_access_guest_memory

2017-07-18 Thread Sergej Proskurin
Hi Julien, On 07/17/2017 05:43 PM, Julien Grall wrote: > Hi Sergej, > > On 06/07/17 12:50, Sergej Proskurin wrote: >> This commit renames the function vgic_access_guest_memory to >> access_guest_memory_by_ipa. As the function name suggests, the functions >> expects an ipa as argument. Thus, to

Re: [Xen-devel] [PATCH v5] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Paul Durrant
> -Original Message- > From: Petre Pircalabu [mailto:ppircal...@bitdefender.com] > Sent: 17 July 2017 17:47 > To: xen-devel@lists.xen.org > Cc: rcojoc...@bitdefender.com; ta...@tklengyel.com; Ian Jackson > ; Wei Liu ; Paul Durrant >

Re: [Xen-devel] [PATCH 2/2] xen: dont fiddle with event channel masking in suspend/resume

2017-07-18 Thread Thomas Gleixner
On Mon, 17 Jul 2017, Juergen Gross wrote: > Instead of fiddling with masking the event channels during suspend > and resume handling let do the irq subsystem do its job. It will do > the mask and unmask operations as needed. > > Signed-off-by: Juergen Gross Acked-by: Thomas

Re: [Xen-devel] [PATCH v1] xen/grant-table: log the lack of grants

2017-07-18 Thread Juergen Gross
On 07/07/17 20:23, Wengang Wang wrote: > log a message when we enter this situation: > 1) we already allocated the max number of available grants from hypervisor > and > 2) we still need more (but the request fails because of 1)). > > Sometimes the lack of grants causes IO hangs in xen_blkfront

Re: [Xen-devel] [PATCH 1/6] xen-blkfront: quiesce/unquiesce queue instead of start/stop queues

2017-07-18 Thread Roger Pau Monné
On Tue, Jul 18, 2017 at 08:53:28AM +0800, Ming Lei wrote: > On Mon, Jul 17, 2017 at 05:02:27PM +0100, Roger Pau Monné wrote: > > On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote: > > > On Mon, Jul 17, 2017 at 12:20:56PM +0100, Roger Pau Monné wrote: > > > > seems fairly easy to mess up and

Re: [Xen-devel] [PATCH] xen/x86: Don't BUG on CPU0 offlining

2017-07-18 Thread Juergen Gross
On 26/06/17 18:39, Vitaly Kuznetsov wrote: > CONFIG_BOOTPARAM_HOTPLUG_CPU0 allows to offline CPU0 but Xen HVM guests > BUG() in xen_teardown_timer(). Remove the BUG_ON(), this is probably a > leftover from ancient times when CPU0 hotplug was impossible, it works > just fine for HVM. > >

[Xen-devel] [ovmf baseline-only test] 71698: all pass

2017-07-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71698 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71698/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf d4f6c35c84b8503bc2acde89a7adb7ee05c56516 baseline

[Xen-devel] [linux-linus test] 111939: regressions - trouble: blocked/broken/fail/pass

2017-07-18 Thread osstest service owner
flight 111939 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/111939/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs. 110515

Re: [Xen-devel] Question about Xen on ARM

2017-07-18 Thread Andrii Anisov
Dear Christopher, On 14.07.17 00:39, Christopher Lambert wrote: I would like to test xen on an ARM target with one linux (as dom0) and one android (as domU). As I know there were built such setups on Renesas R-Car H2 and H3, and TI DRA7xx based boards (Lager, Salvator-X and Jacinto6 EVM board

[Xen-devel] Is there a way domU (1) can find the UUID of domU (2) ?

2017-07-18 Thread deepak
Let there be two domU's - domU (1) and domU (2) Is there a way domU (1) can find the UUID of domU (2) ? Please tell. Thanks. -- View this message in context: http://xen.1045712.n5.nabble.com/Is-there-a-way-domU-1-can-find-the-UUID-of-domU-2-tp5737307.html Sent from the Xen - Dev mailing list

[Xen-devel] [ovmf test] 111959: all pass - PUSHED

2017-07-18 Thread osstest service owner
flight 111959 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/111959/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 357c48258e0b452d31f487a47dca486ba666a954 baseline version: ovmf

Re: [Xen-devel] [PATCH] xen/pvcalls: NULL dereference in error handling

2017-07-18 Thread Juergen Gross
On 12/07/17 09:25, Dan Carpenter wrote: > We accidentally dereference "map" when it's NULL. > > Fixes: b535e2b9b78a ("xen/pvcalls: implement connect command") > Signed-off-by: Dan Carpenter The patch is okay, but the very same one has already been sent before. I'll

[Xen-devel] [RFC PATCH v3 04/24] x86: NUMA: Rename and sanitize memnode shift code

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K memnode_shift variable is changed from int to unsigned int. With this change, compute_memnode_shift() returns error value instead of returning shift value. The memnode_shift is updated inside compute_memnode_shift(). Also, following changes are made

[Xen-devel] [RFC PATCH v3 05/24] x86: NUMA: Add accessors for nodes[] and node_memblk_range[] structs

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Add accessors for nodes[] and other static variables and use those accessors. These variables are later accessed outside the file when the code made generic in later patches. However the coding style is not changed. Signed-off-by: Vijaya Kumar K

[Xen-devel] [RFC PATCH v3 08/24] NUMA: x86: Move numa code and make it generic

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Move code from xen/arch/x86/numa.c to xen/common/numa.c so that it can be used by other archs. The following changes are done: - Few generic static functions in x86/numa.c is made non-static common/numa.c - The generic contents of header file

[Xen-devel] [distros-debian-snapshot test] 71699: regressions - trouble: blocked/broken/fail/pass

2017-07-18 Thread Platform Team regression test user
flight 71699 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71699/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-amd64-daily-netboot-pygrub 11 guest-start fail REGR. vs. 71679

Re: [Xen-devel] ARM: Adjusting guest memory size through xl mem-{set|max} fails

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:19:09PM +0200, Sergej Proskurin wrote: > Hi Julien, > > > On 07/17/2017 03:53 PM, Julien Grall wrote: > > (+Wei and Ian) > > > > Hi Sergej > > > > On 17/07/17 13:04, Sergej Proskurin wrote: > >> Hi all, > >> > >> My setup comprises an ARMv7 (Arndale, Linux kernel

Re: [Xen-devel] A document for Xen release management

2017-07-18 Thread Julien Grall
Hi Wei, Thank you for writing down the document :). On 17/07/17 16:09, Wei Liu wrote: It is agreed during the summit we should write down such document. Here is my attempt of doing so. We should probably commit something like this into xen.git so that it gets updated regularly. Comments are

Re: [Xen-devel] [PATCH 2/6] xl: Add commands for hiding and unhiding pcie passthrough devices

2017-07-18 Thread Wei Liu
On Fri, Jul 07, 2017 at 10:00:01AM -0400, Konrad Rzeszutek Wilk wrote: > > > > 1. PV PCI passthrough is done via pciback, which means the physical > >device is assigned to the driver domain. All events to / from the > >guest / device are handled by the driver domain -- which includes > >

Re: [Xen-devel] preparations for 4.8.2

2017-07-18 Thread Wei Liu
On Tue, Jul 18, 2017 at 12:21:42PM +0100, Lars Kurth wrote: > Wei, > I attached the list output from xsa-list-send starting from 206 > If you look at > https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-481 > .html, you may want to start using from 213+ [$]> ./match-xsa

[Xen-devel] XEN on R-Car H3 starter kit

2017-07-18 Thread ajmalmalib4u
  Hi, I am using R-Car H3 hardware. ie. R-Car H3 Salvator-X. I am running Xen with Poky linux as Dom0 and DomU. Would i be able to run Xen with the same setup on R-Car H3 Starter Kit? What all should i look in a Hardware to run XEN in it?   regards, Ajeesh

Re: [Xen-devel] [RFC v2]Proposal to allow setting up shared memory areas between VMs from xl config file

2017-07-18 Thread Zhongze Liu
Hi Julien, After our discussion during the summit, I have revised my plan, but I'm still working on it and haven't sent it to the ML yet. I'm planning to send a new version of my proposal together with the parsing code later so that I could reference the proposal in the commit message. But here

[Xen-devel] [PATCH v4 02/13] libxl: add generic functions to get and free device list

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add libxl__device_list and libxl__device_list_free functions to handle device list using the device framework. Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_device.c | 66

[Xen-devel] [PATCH v4 11/13] libxl: change vtpm to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl.h | 12 ++- tools/libxl/libxl_vtpm.c | 231 +-- tools/xl/xl_vtpm.c | 3 +- 3 files changed, 73

[Xen-devel] [PATCH v4 12/13] libxl: remove unneeded DEVICE_ADD macro

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_device.c | 6 ++--- tools/libxl/libxl_disk.c | 5 +++-- tools/libxl/libxl_internal.h | 52 +++-

[Xen-devel] [PATCH v4 06/13] libxl: change p9 to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_9pfs.c | 67 +++- tools/libxl/libxl_create.c | 2 +- tools/libxl/libxl_internal.h | 7 +

[Xen-devel] [PATCH v4 04/13] xl: add PV display device commands

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add commands: vdispl-attach, vdispl-list, vdispl-detach and domain config vdispl parser Signed-off-by: Oleksandr Grytsov --- tools/xl/Makefile | 1 + tools/xl/xl.h | 3 + tools/xl/xl_cmdtable.c |

[Xen-devel] [PATCH v4 05/13] docs: add PV display driver information

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- docs/man/xl.cfg.pod.5.in | 49 docs/man/xl.pod.1.in | 42 + 2 files changed, 91

[Xen-devel] [PATCH v4 08/13] libxl: change vfb to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_console.c | 74 tools/libxl/libxl_create.c | 3 +- tools/libxl/libxl_dm.c | 3 +-

[Xen-devel] [PATCH v4 03/13] libxl: add vdispl device

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/Makefile | 2 +- tools/libxl/libxl.h | 24 +++ tools/libxl/libxl_create.c | 1 + tools/libxl/libxl_internal.h

[Xen-devel] [PATCH v4 07/13] libxl: change vkb to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_console.c | 79 tools/libxl/libxl_create.c | 5 +-- tools/libxl/libxl_dm.c | 3 +-

Re: [Xen-devel] A document for Xen release management

2017-07-18 Thread Wei Liu
On Tue, Jul 18, 2017 at 01:45:45PM +0100, Julien Grall wrote: > Hi Wei, > > Thank you for writing down the document :). > > On 17/07/17 16:09, Wei Liu wrote: > > It is agreed during the summit we should write down such document. Here > > is my attempt of doing so. > > > > We should probably

Re: [Xen-devel] preparations for 4.8.2

2017-07-18 Thread Lars Kurth
On 18/07/2017, 14:53, "Wei Liu" wrote: >On Tue, Jul 18, 2017 at 12:21:42PM +0100, Lars Kurth wrote: >> Wei, >> I attached the list output from xsa-list-send starting from 206 >> If you look at >> >>https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-4

Re: [Xen-devel] [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)

2017-07-18 Thread Tom Lendacky
On 7/18/2017 7:03 AM, Thomas Gleixner wrote: On Mon, 17 Jul 2017, Tom Lendacky wrote: This patch series provides support for AMD's new Secure Memory Encryption (SME) feature. SME can be used to mark individual pages of memory as encrypted through the page tables. A page of memory that is

[Xen-devel] [PATCH] x86/evtchn: Restrict the ops usable in do_event_channel_op_compat()

2017-07-18 Thread Andrew Cooper
This hypercall is unused by guests these days, but there was no prevention of usable subops. The following ops have been restricted, as there is no suitable structure in the evntchn_op union. EVTCHNOP_reset EVTCHNOP_init_control EVTCHNOP_expand_array EVTCHNOP_set_priority Signed-off-by:

[Xen-devel] [PATCH v4 00/13] libxl: add PV display device driver interface

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Changes since V3: * libxl__device_add renamed to libxl__device_add_async and reworked to match the former design; * libxl__device_add used for devices which don't require updating domain config but simple write to Xen Store (9pfs,

[Xen-devel] [PATCH v4 01/13] libxl: add generic function to add device

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add libxl__device_add to simple write XenStore device conifg and libxl__device_add_async to update domain configuration and write XenStore device config asynchroniously. Almost all devices have similar libxl__device__add function. This

[Xen-devel] [PATCH v4 10/13] libxl: change nic to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl.h | 9 +- tools/libxl/libxl_checkpoint_device.c | 9 +- tools/libxl/libxl_colo_save.c | 4 +- tools/libxl/libxl_dm.c

[Xen-devel] [PATCH v4 09/13] libxl: change disk to use generic getting list functions

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl.h | 9 +++- tools/libxl/libxl_checkpoint_device.c | 7 ++- tools/libxl/libxl_create.c| 3 +- tools/libxl/libxl_disk.c

[Xen-devel] [PATCH v4 13/13] libxl: make pci and usb setdefault function generic

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Due to changes in device framework setdefault function should have same format. Otherwise calling devicetype set_default causes segfault. Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_internal.h | 1 -

[Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Petre Pircalabu
If case of a vm_event with the emulate_flags set, if the instruction cannot be emulated, the monitor should be notified instead of directly injecting a hw exception. This behavior can be used to re-execute an instruction not supported by the emulator using the real processor (e.g. altp2m) instead

Re: [Xen-devel] [PATCH 04/25 v6] xen/arm: vpl011: Add support for vuart in libxl

2017-07-18 Thread Julien Grall
Hi Bhupinder, Sorry I am jumping a bit late in the discussion here. On 17/07/17 14:06, Bhupinder Thakur wrote: An option is provided in libxl to enable/disable sbsa vuart while s/sbsa/SBSA/ creating a guest domain. Libxl now suppots a generic vuart console and sbsa uart is a specific

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Andrew Cooper
On 18/07/17 10:37, Petre Pircalabu wrote: > If case of a vm_event with the emulate_flags set, if the instruction > cannot be emulated, the monitor should be notified instead of directly > injecting a hw exception. > This behavior can be used to re-execute an instruction not supported by > the

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Razvan Cojocaru
On 07/18/2017 01:09 PM, Andrew Cooper wrote: > On 18/07/17 10:37, Petre Pircalabu wrote: >> If case of a vm_event with the emulate_flags set, if the instruction >> cannot be emulated, the monitor should be notified instead of directly >> injecting a hw exception. >> This behavior can be used to

Re: [Xen-devel] [PATCH v6 10/14] arm/guest_access: Rename vgic_access_guest_memory

2017-07-18 Thread Julien Grall
On 18/07/17 09:42, Sergej Proskurin wrote: Hi Julien, On 07/17/2017 05:43 PM, Julien Grall wrote: Hi Sergej, On 06/07/17 12:50, Sergej Proskurin wrote: This commit renames the function vgic_access_guest_memory to access_guest_memory_by_ipa. As the function name suggests, the functions

Re: [Xen-devel] [PATCH v9 7/7] tools/xen-mceinj: add support of injecting LMCE

2017-07-18 Thread Wei Liu
On Wed, Jul 12, 2017 at 10:04:40AM +0800, Haozhong Zhang wrote: > > +static int inject_lmce(xc_interface *xc_handle, unsigned int cpu) > +{ > +uint8_t *cpumap = NULL; > +size_t cpumap_size, line, shift; > +unsigned int nr_cpus; > +int ret; > + > +nr_cpus =

[Xen-devel] [PATCH RFC 02/12] x86/np2m: add np2m_flush_eptp()

2017-07-18 Thread Sergey Dyasli
The new function finds all np2m objects with the specified eptp and flushes them. p2m_flush_table_locked() is added in order not to release the p2m lock after np2m_base check. Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/p2m.c | 34

[Xen-devel] [PATCH RFC 08/12] x86/np2m: add p2m_get_nestedp2m_locked()

2017-07-18 Thread Sergey Dyasli
The new function returns still write-locked np2m. Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/p2m.c | 12 +--- xen/include/asm-x86/p2m.h | 2 ++ 2 files changed, 11 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/mm/p2m.c

[Xen-devel] [PATCH RFC 05/12] x86/np2m: add np2m_generation

2017-07-18 Thread Sergey Dyasli
Add np2m_generation variable to both p2m_domain and nestedvcpu. np2m's generation will be incremented each time the np2m is flushed. This will allow to detect if a nested vcpu has the stale np2m. Signed-off-by: Sergey Dyasli --- xen/arch/x86/hvm/nestedhvm.c | 1 +

[Xen-devel] [PATCH RFC 01/12] x86/np2m: refactor p2m_get_nestedp2m()

2017-07-18 Thread Sergey Dyasli
1. Add a helper function assign_np2m() 2. Remove useless volatile 3. Update function's comment in the header 4. Minor style fixes ('\n' and d) Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/p2m.c | 31 ++- xen/include/asm-x86/p2m.h |

[Xen-devel] [PATCH v2] arm/p2m: Cleanup access to the host's p2m

2017-07-18 Thread Sergej Proskurin
This commit substitutes the direct access of the host's p2m (>arch.p2m) for the macro "p2m_get_hostp2m". This macro simplifies readability and also the differentiation between the host's p2m and alternative p2m's, i.e., as part of the altp2m subsystem that will be submitted in the future.

[Xen-devel] [PATCH RFC 09/12] x86/np2m: improve nestedhvm_hap_nested_page_fault()

2017-07-18 Thread Sergey Dyasli
There is a possibility for nested_p2m to became stale between nestedhvm_hap_nested_page_fault() and nestedhap_fix_p2m(). Simply use p2m_get_nestedp2m_lock() to guarantee that correct np2m is used. Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/hap/nested_hap.c | 29

[Xen-devel] [PATCH RFC 03/12] x86/vvmx: use np2m_flush_eptp() for INVEPT_SINGLE_CONTEXT

2017-07-18 Thread Sergey Dyasli
nvmx_handle_invept() updates current's np2m just to flush it. Instead, use the new np2m_flush_eptp() directly for this purpose. Signed-off-by: Sergey Dyasli --- xen/arch/x86/hvm/vmx/vvmx.c | 7 +-- 1 file changed, 1 insertion(+), 6 deletions(-) diff --git

[Xen-devel] [PATCH RFC 04/12] x86/np2m: remove np2m_base from p2m_get_nestedp2m()

2017-07-18 Thread Sergey Dyasli
Remove np2m_base parameter as it should always match the value of EPTP in VMCS12. Signed-off-by: Sergey Dyasli --- xen/arch/x86/hvm/svm/nestedsvm.c | 2 +- xen/arch/x86/hvm/vmx/vvmx.c | 3 +-- xen/arch/x86/mm/hap/nested_hap.c | 2 +- xen/arch/x86/mm/p2m.c

[Xen-devel] [PATCH RFC 00/12] Nested p2m: allow sharing between vCPUs

2017-07-18 Thread Sergey Dyasli
Nested p2m (shadow EPT) is an object that stores memory address translations from L2 GPA directly to L0 HPA. This is achieved by combining together L1 EPT tables with L0 EPT during L2 EPT violations. In the usual case, L1 uses the same EPTP value in VMCS12 for all vCPUs of a L2 guest. But

[Xen-devel] [PATCH RFC 07/12] x86/np2m: add np2m_schedule_in/out()

2017-07-18 Thread Sergey Dyasli
np2m maintenance is required for a nested vcpu during scheduling: 1. On schedule-out: clear pCPU's bit in p2m->dirty_cpumask to prevent useless IPIs. 2. On schedule-in: check if np2m is up to date and wasn't flushed. Signed-off-by: Sergey Dyasli

[Xen-devel] [PATCH RFC 06/12] x86/vvmx: add stale_eptp flag

2017-07-18 Thread Sergey Dyasli
The new variable will indicate if update of a shadow EPTP is needed prior to vmentry. Update is required if a nested vcpu gets a new np2m or if its np2m was flushed by an IPI. Helper function nvcpu_flush() is added. Signed-off-by: Sergey Dyasli ---

Re: [Xen-devel] [PATCH v6 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Julien Grall
On 18/07/17 10:49, Sergej Proskurin wrote: Hi Julien, Hello Sergej, On 07/17/2017 05:38 PM, Julien Grall wrote: Hi Sergej, On 06/07/17 12:50, Sergej Proskurin wrote: This commit moves the function vgic_access_guest_memory to guestcopy.c and the header asm/guest_access.h. No functional

[Xen-devel] [PATCH RFC 11/12] x86/np2m: add break to np2m_flush_eptp()

2017-07-18 Thread Sergey Dyasli
Now that np2m sharing is implemented, there can be only one np2m object with the same np2m_base. Break from loop if the required np2m was found during np2m_flush_eptp(). Signed-off-by: Sergey Dyasli --- xen/arch/x86/mm/p2m.c | 3 +++ xen/include/asm-x86/p2m.h | 2

[Xen-devel] [PATCH RFC 12/12] x86/vvmx: remove EPTP write from ept_handle_violation()

2017-07-18 Thread Sergey Dyasli
Now there is no need to update shadow EPTP after handling L2 EPT violation since all EPTP updates are handled by nvmx_eptp_update(). Signed-off-by: Sergey Dyasli --- xen/arch/x86/hvm/vmx/vmx.c | 6 -- 1 file changed, 6 deletions(-) diff --git

Re: [Xen-devel] Notes for Design Session: Loose ends for becoming a CNA (CVE Numbering Authorities) and other Security Team Operational Questions

2017-07-18 Thread Lars Kurth
A small correction > On 18 Jul 2017, at 11:37, Lars Kurth wrote: > > ... > b) The alternative would be for the security team to fix issues in private > and bundle as we already do and pre-disclose 2 weeks before a fixed monthly > embargo date. The effect would be

[Xen-devel] Pass through in Xen

2017-07-18 Thread ajmalmalib4u
Hi,   I am trying to learn how Passthrough works in xen. As an initial step I have tried to do PCI passthrough in my PC with Ubuntu 16.04 LTS (Xenial Xerus) as Dom0 and DomU. For that I had to rebuild the kernel to add xen support and with the procedure explained in,  

Re: [Xen-devel] Pass through in Xen

2017-07-18 Thread Roger Pau Monné
On Tue, Jul 18, 2017 at 04:43:53PM +0530, ajmalmalib4u wrote: >Hi, > >I am trying to learn how Passthrough works in xen. As an initial step I >have tried to do PCI passthrough in my PC with Ubuntu 16.04 LTS (Xenial >Xerus) as Dom0 and DomU. For that I had to rebuild the kernel

Re: [Xen-devel] [PATCH 11/25 v6] xen/arm: vpl011: Add a new console_init function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:41PM +0530, Bhupinder Thakur wrote: > This patch introduces a new console_init function. This function > initializes the console structure. > > Signed-off-by: Bhupinder Thakur I don't think this patch compiles, because ... > --- > CC:

[Xen-devel] [xen-unstable baseline-only test] 71697: regressions - trouble: blocked/broken/fail/pass

2017-07-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71697 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71697/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 20

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Paul Durrant
> -Original Message- > From: Petre Pircalabu [mailto:ppircal...@bitdefender.com] > Sent: 18 July 2017 10:38 > To: xen-devel@lists.xen.org > Cc: rcojoc...@bitdefender.com; ta...@tklengyel.com; Ian Jackson > ; Wei Liu ; Paul Durrant >

Re: [Xen-devel] [PATCH 01/15] xen: x86: expose SGX to HVM domain in CPU featureset

2017-07-18 Thread Andrew Cooper
On 09/07/17 09:04, Kai Huang wrote: > Expose SGX in CPU featureset for HVM domain. SGX will not be supported for > PV domain, as ENCLS (which SGX driver in guest essentially runs) must run > in ring 0, while PV kernel runs in ring 3. Theoretically we can support SGX > in PV domain via either

Re: [Xen-devel] [PATCH 15/15] xen: tools: expose EPC in ACPI table

2017-07-18 Thread Roger Pau Monné
On Tue, Jul 18, 2017 at 08:36:15PM +1200, Huang, Kai wrote: > > > On 7/17/2017 10:54 PM, Roger Pau Monné wrote: > > On Sun, Jul 09, 2017 at 08:16:05PM +1200, Kai Huang wrote: > > > On physical machine EPC is exposed in ACPI table via "INT0E0C". Although > > > EPC > > > can be discovered by

[Xen-devel] [linux-linus bisection] complete test-amd64-amd64-xl

2017-07-18 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-xl testid guest-localmigrate Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu

[Xen-devel] [ovmf baseline-only test] 71700: regressions - FAIL

2017-07-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71700 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71700/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 15

Re: [Xen-devel] Question about Xen on ARM

2017-07-18 Thread Andrii Anisov
Dear Christopher, On 18.07.17 12:08, Andrii Anisov wrote: In order to build the required system, a board candidate should: - have a CPU able to switch to EL2/Virtualization mode - have a public bootloader sources able to switch CPU to EL2/Virtualizaiotn mode - have a Linux system

Re: [Xen-devel] [xen-devel][xen/Arm]xen fail to boot on omap5 board

2017-07-18 Thread Andrii Anisov
Dear Shishir, On 18.07.17 12:05, shishir tiwari wrote: Hi I want test and understand xen hypervisor implementation with dom0 and domU on omap5 board. I followed https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM with latest kernel(4.11.7) and xen(4.9.0)

[Xen-devel] Notes for Design Session: Loose ends for becoming a CNA (CVE Numbering Authorities) and other Security Team Operational Questions

2017-07-18 Thread Lars Kurth
Hi all, on the following topic in session http://sched.co/AjHl we discussed the following issues Here are my notes ACTIONS for * Julien Grall/Stefano Stabellini * Andrew Cooper * Ian Jackson * Lars Kurth * Security team members Regards Lars = Consolidate Security Coverage Documents for CNA =

[Xen-devel] [ovmf test] 111973: all pass - PUSHED

2017-07-18 Thread osstest service owner
flight 111973 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/111973/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 5fc3889bb3c64f8cd81d7d387f829f146a1998fd baseline version: ovmf

Re: [Xen-devel] [PATCH 25/25 v6] xen/arm: vpl011: Update documentation for vuart console support

2017-07-18 Thread Julien Grall
Hi Bhupinder, Sorry I am jumping a bit late in the discussion here. On 17/07/17 14:06, Bhupinder Thakur wrote: 1. Update documentation for a new vuart option added. 2. Update documentation about SPI irq reserved for vuart. Signed-off-by: Bhupinder Thakur

Re: [Xen-devel] A document for Xen release management

2017-07-18 Thread Lars Kurth
I added Jan because I think we should probably add a section for point releases, which I assume would be a subset of the steps in this document Lars I will post the notes of the design session also. I am doing the ones first that I moderated and where I took notes in handwriting and/or photos of

Re: [Xen-devel] [PATCH v6 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Sergej Proskurin
Hi Julien, On 07/17/2017 05:38 PM, Julien Grall wrote: > Hi Sergej, > > On 06/07/17 12:50, Sergej Proskurin wrote: >> This commit moves the function vgic_access_guest_memory to guestcopy.c >> and the header asm/guest_access.h. No functional changes are made. >> Please note that the function will

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Wei Liu
On Tue, Jul 18, 2017 at 12:37:32PM +0300, Petre Pircalabu wrote: > If case of a vm_event with the emulate_flags set, if the instruction > cannot be emulated, the monitor should be notified instead of directly > injecting a hw exception. > This behavior can be used to re-execute an instruction not

Re: [Xen-devel] [PATCH v9 7/7] tools/xen-mceinj: add support of injecting LMCE

2017-07-18 Thread Wei Liu
On Tue, Jul 18, 2017 at 11:33:04AM +0100, Wei Liu wrote: > On Wed, Jul 12, 2017 at 10:04:40AM +0800, Haozhong Zhang wrote: > > > > +static int inject_lmce(xc_interface *xc_handle, unsigned int cpu) > > +{ > > +uint8_t *cpumap = NULL; > > +size_t cpumap_size, line, shift; > > +

[Xen-devel] [PATCH RFC 10/12] x86/np2m: implement sharing of np2m between vCPUs

2017-07-18 Thread Sergey Dyasli
Modify p2m_get_nestedp2m() to allow sharing a np2m between multiple vcpus with the same np2m_base (L1 EPTP value in VMCS12). np2m_schedule_in/out() callbacks are added to context_switch() as well as pseudo schedule-out is performed during virtual_vmexit(). Signed-off-by: Sergey Dyasli

Re: [Xen-devel] [PATCH 24/25 v6] xen/arm: vpl011: Add a pl011 uart DT node in the guest device tree

2017-07-18 Thread Julien Grall
Hi Bhupinder, On 17/07/17 14:06, Bhupinder Thakur wrote: The SBSA UART node format is as specified in Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below: ARM SBSA defined generic UART -- This UART uses a subset of the PL011 registers and

[Xen-devel] [tip:x86/mm] xen/x86: Remove SME feature in PV guests

2017-07-18 Thread tip-bot for Tom Lendacky
Commit-ID: f2f931c6819467af5260a21c59fb787ce2863f92 Gitweb: http://git.kernel.org/tip/f2f931c6819467af5260a21c59fb787ce2863f92 Author: Tom Lendacky AuthorDate: Mon, 17 Jul 2017 16:10:29 -0500 Committer: Ingo Molnar CommitDate: Tue, 18 Jul 2017

Re: [Xen-devel] preparations for 4.8.2

2017-07-18 Thread Lars Kurth
Wei, I attached the list output from xsa-list-send starting from 206 If you look at https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-481 .html, you may want to start using from 213+ Lars On 17/07/2017, 12:40, "Wei Liu" wrote: >On Mon, Jul 17, 2017 at

Re: [Xen-devel] [PATCH 04/25 v6] xen/arm: vpl011: Add support for vuart in libxl

2017-07-18 Thread Wei Liu
CC x86 maintainers On Tue, Jul 18, 2017 at 12:19:19PM +0100, Julien Grall wrote: > > > > ("arch_arm", Struct(None, [("gic_version", libxl_gic_version), > > + ("vuart", libxl_vuart_type), > > ... here it is ARM specific. I am not convinced that we should tie

Re: [Xen-devel] [PATCH v6 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Sergej Proskurin
Hi Julien, On 07/18/2017 12:43 PM, Julien Grall wrote: > > > On 18/07/17 10:49, Sergej Proskurin wrote: >> Hi Julien, > > Hello Sergej, > >> >> On 07/17/2017 05:38 PM, Julien Grall wrote: >>> Hi Sergej, >>> >>> On 06/07/17 12:50, Sergej Proskurin wrote: This commit moves the function

Re: [Xen-devel] A document for Xen release management

2017-07-18 Thread Ian Jackson
Wei Liu writes ("A document for Xen release management"): > When you think all pending issues are fixed and Xen is ready to be released > from the last RC: Mostly LGTM. Thanks! [Items numbered in quoted text so I can refer to them.] > 1. Send out commit moratorium emails to committers@. > >

Re: [Xen-devel] [PATCH v6 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Julien Grall
On 18/07/17 12:59, Sergej Proskurin wrote: Hi Julien, On 07/18/2017 12:43 PM, Julien Grall wrote: On 18/07/17 10:49, Sergej Proskurin wrote: Hi Julien, Hello Sergej, On 07/17/2017 05:38 PM, Julien Grall wrote: Hi Sergej, On 06/07/17 12:50, Sergej Proskurin wrote: This commit

[Xen-devel] Notes Design Session: Making Releases Lessons Learned: Improving Our Release Process and Tooling

2017-07-18 Thread Lars Kurth
Hi all, these are my notes from http://sched.co/AjES These are a little crude and I may have missed some things or misrepresented ACTIONS for * Wei Liu * Julien Grall * Lars Kurth * Ian Jackson Feel free to correct Lars Releases Lessons learned Process issues in 4.9.0

Re: [Xen-devel] [PATCH 20/25 v6] xen/arm: vpl011: Add a new console_close_evtchn function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:50PM +0530, Bhupinder Thakur wrote: > This patch introduces a console_close_evtchn console_cleanup function. This > function > closes the console event channel. > > Signed-off-by: Bhupinder Thakur Acked-by: Wei Liu

Re: [Xen-devel] [PATCH 18/25 v6] xen/arm: vpl011: Add a new console_cleanup function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:48PM +0530, Bhupinder Thakur wrote: > This patch introduces a new console_cleanup function. This function > frees up the console resources. > > Signed-off-by: Bhupinder Thakur > --- > CC: Ian Jackson > CC: Wei

Re: [Xen-devel] [PATCH 22/25 v6] xen/arm: vpl011: Add support for vuart console in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:52PM +0530, Bhupinder Thakur wrote: > This patch finally adds the support for vuart console. It adds > two new fields in the console initialization: > > - optional > - prefer_gnttab > > optional flag tells whether the console is optional. > > prefer_gnttab tells

  1   2   3   >