[Xen-devel] [xen-4.4-testing test] 102521: tolerable FAIL - PUSHED

2016-11-22 Thread osstest service owner
flight 102521 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/102521/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail REGR. vs. 101268

[Xen-devel] [xen-4.6-testing test] 102519: regressions - FAIL

2016-11-22 Thread osstest service owner
flight 102519 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/102519/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-3 20 xtf/test-hvm32-invlpg~shadow fail REGR. vs. 101938

Re: [Xen-devel] [PATCH 1/2] build system: Include SeaBIOS and TianoCore directory

2016-11-22 Thread Konrad Rzeszutek Wilk
On Wed, Nov 23, 2016 at 02:39:35AM +, Wei Liu wrote: > On Sun, Nov 20, 2016 at 10:27:21PM -0500, Konrad Rzeszutek Wilk wrote: > > The release source did not include those two directories. > > > > Signed-off-by: Konrad Rzeszutek Wilk > > --- > > tools/misc/mktarball | 5

Re: [Xen-devel] [edk2] [PATCH v2] OvmfPkg/build.sh: Make GCC5 the default toolchain, catch GCC43 and earlier

2016-11-22 Thread Jordan Justen
On 2016-11-22 18:36:43, Konrad Rzeszutek Wilk wrote: > From Laszlo: > " change the catch-all (*) to GCC5, from GCC44 > - remove the (5.*.*) pattern from GCC49 > - add a branch (with multiple patterns if necessary) for gcc-4.3 and > earlier to exit with an error message / failure (those compiler

Re: [Xen-devel] [PATCH XSA-followup for-4.8] libelf: fix symtab/strtab loading for 32bit domains

2016-11-22 Thread Wei Liu
On Tue, Nov 22, 2016 at 05:39:37PM +, Roger Pau Monne wrote: > Commit ed04ca introduced a bug in the symtab/strtab loading for 32bit > guests, that corrupted the section headers array due to the padding > introduced by the elf_shdr union. > > The Elf section header array on 32bit should be

Re: [Xen-devel] [PATCH 1/2] build system: Include SeaBIOS and TianoCore directory

2016-11-22 Thread Wei Liu
On Sun, Nov 20, 2016 at 10:27:21PM -0500, Konrad Rzeszutek Wilk wrote: > The release source did not include those two directories. > > Signed-off-by: Konrad Rzeszutek Wilk > --- > tools/misc/mktarball | 5 + > 1 file changed, 5 insertions(+) > > diff --git

[Xen-devel] [PATCH v2] Compile TianoCore under Fedora Core 25

2016-11-22 Thread Konrad Rzeszutek Wilk
Hey! This patch allows me to compile TianoCore under Fedora Core 25. I've also tested it under some older ancient distros, such as: Ubuntu 16.04.1 (GCC 5.4.0), uses GCC5 Debian 8.6 (GCC 4.9.2), uses GCC49 Fedora Core 13 (GCC 4.4.4), uses GCC44 RHEL6 (GCC 4.4.7), uses GCC44 RHEL5 (GCC 4.1.2), it

[Xen-devel] [PATCH v2] OvmfPkg/build.sh: Make GCC5 the default toolchain, catch GCC43 and earlier

2016-11-22 Thread Konrad Rzeszutek Wilk
From Laszlo: " change the catch-all (*) to GCC5, from GCC44 - remove the (5.*.*) pattern from GCC49 - add a branch (with multiple patterns if necessary) for gcc-4.3 and earlier to exit with an error message / failure (those compiler versions are unsupported)" Bugzilla:

Re: [Xen-devel] Xen virtual IOMMU high level design doc V3

2016-11-22 Thread Lan Tianyu
On 2016年11月21日 15:05, Tian, Kevin wrote: >> If someone add "intel_iommu=on" kernel parameter manually, IOMMU driver >> > will panic guest because it can't enable DMA remapping function via gcmd >> > register and "Translation Enable Status" bit in gsts register is never >> > set by vIOMMU. This

Re: [Xen-devel] [PATCH v3 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-22 Thread Boris Ostrovsky
On 11/22/2016 11:25 AM, Boris Ostrovsky wrote: On 11/22/2016 11:01 AM, Jan Beulich wrote: On 22.11.16 at 16:43, wrote: On 11/22/2016 10:07 AM, Jan Beulich wrote: On 22.11.16 at 15:37, wrote: On 11/22/2016 08:59 AM, Jan

[Xen-devel] [xen-4.5-testing test] 102520: regressions - FAIL

2016-11-22 Thread osstest service owner
flight 102520 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/102520/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt 14 guest-saverestorefail REGR. vs. 101275

[Xen-devel] [xen-4.7-testing test] 102518: regressions - FAIL

2016-11-22 Thread osstest service owner
flight 102518 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/102518/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-winxpsp3-vcpus1 6 xen-boot fail REGR. vs. 101949

Re: [Xen-devel] [PATCH v3 06/11] acpi: PVH guests need _E02 method

2016-11-22 Thread Konrad Rzeszutek Wilk
On Mon, Nov 21, 2016 at 04:00:42PM -0500, Boris Ostrovsky wrote: > This is the method that will get invoked on an SCI. > > Signed-off-by: Boris Ostrovsky > Acked-by: Jan Beulich Reviewed-by: Konrad Rzeszutek Wilk > --- >

Re: [Xen-devel] Patch "x86/mm/xen: Suppress hugetlbfs in PV guests" (CVE-2016-3961) is missing in 3.4, 3.10 and 3.12 stable tree

2016-11-22 Thread Jiri Slaby
On 11/21/2016, 04:22 PM, Thomas Deutschmann wrote: > Hi, > > the following patch is present in the following LTS kernels > >> =linux-3.2.81 >> =linux-3.16.36 >> =linux-3.18.33 >> =linux-4.1.24 >> =linux-4.4.9 > > > however it is missing from LTS kernels > > - linux-3.4 > - linux-3.10 > -

Re: [Xen-devel] Can't always start 32 bit domains after 64 bit domains

2016-11-22 Thread Sarah Newman
On 11/22/2016 10:46 AM, Dario Faggioli wrote: > On Mon, 2016-11-21 at 13:06 -0800, Sarah Newman wrote: >> On 11/21/2016 11:37 AM, Sarah Newman wrote: >>> >>> If that's the reason not all the higher memory is being used first: is a >>> potential workaround to pin 64 bit domains to the second

Re: [Xen-devel] Xen ARM small task (WAS: Re: [Xen Question])

2016-11-22 Thread Julien Grall
On 22/11/16 19:06, Stefano Stabellini wrote: On Mon, 21 Nov 2016, Julien Grall wrote: On 21/11/2016 21:13, Edgar E. Iglesias wrote: On Mon, Nov 21, 2016 at 01:01:15PM -0800, Stefano Stabellini wrote: On Mon, 21 Nov 2016, Edgar E. Iglesias wrote: On Fri, Nov 18, 2016 at 10:58:42AM -0800,

[Xen-devel] [ovmf baseline-only test] 68081: all pass

2016-11-22 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68081 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68081/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 36e9e3e8ea0ce477504b6d2e21603ea94847efae baseline

Re: [Xen-devel] [PULL 0/5] xen-20161122-tag

2016-11-22 Thread Stefan Hajnoczi
> > git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xen-20161122-tag > > for you to fetch changes up to f1784a222eed213ce3213f431bc2f9c570f20c3e: > > xen: attach pvusb usb bus to backend qdev (2016-11-22 10:29:41 -0800) > >

[Xen-devel] [xen-unstable-smoke test] 102526: tolerable all pass - PUSHED

2016-11-22 Thread osstest service owner
flight 102526 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/102526/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl

Re: [Xen-devel] Xen ARM small task (WAS: Re: [Xen Question])

2016-11-22 Thread Stefano Stabellini
On Mon, 21 Nov 2016, Julien Grall wrote: > On 21/11/2016 21:13, Edgar E. Iglesias wrote: > > On Mon, Nov 21, 2016 at 01:01:15PM -0800, Stefano Stabellini wrote: > > > On Mon, 21 Nov 2016, Edgar E. Iglesias wrote: > > > > On Fri, Nov 18, 2016 at 10:58:42AM -0800, Stefano Stabellini wrote: > > > > >

Re: [Xen-devel] Can't always start 32 bit domains after 64 bit domains

2016-11-22 Thread Dario Faggioli
On Mon, 2016-11-21 at 13:06 -0800, Sarah Newman wrote: > On 11/21/2016 11:37 AM, Sarah Newman wrote: > >  > > If that's the reason not all the higher memory is being used first: > > is a potential workaround to pin 64 bit domains to the second > > physical core on > > boot, and 32 bit domains to

[Xen-devel] [PULL 2/5] xen: add an own bus for xen backend devices

2016-11-22 Thread Stefano Stabellini
From: Juergen Gross Add a bus for Xen backend devices in order to be able to establish a dedicated device path for pluggable devices. Signed-off-by: Juergen Gross Reviewed-by: Stefano Stabellini Signed-off-by: Stefano Stabellini

[Xen-devel] [PULL 5/5] xen: attach pvusb usb bus to backend qdev

2016-11-22 Thread Stefano Stabellini
From: Juergen Gross Attach the usb bus of a new pvusb controller to the qdev associated with the Xen backend. Any device connected to that controller can now specify the bus and port directly via its properties. Signed-off-by: Juergen Gross Reviewed-by:

[Xen-devel] [PULL 4/5] xen: create qdev for each backend device

2016-11-22 Thread Stefano Stabellini
From: Juergen Gross Create a qdev plugged to the xen-sysbus for each new backend device. This device can be used as a parent for all needed devices of that backend. The id of the new device will be "xen--" with being the xen backend type (e.g. "qdisk") and the xen backend

[Xen-devel] [PULL 3/5] qdev: add function qdev_set_id()

2016-11-22 Thread Stefano Stabellini
From: Juergen Gross In order to have an easy way to add a new qdev with a specific id carve out the needed functionality from qdev_device_add() into a new function qdev_set_id(). Signed-off-by: Juergen Gross Reviewed-by: Stefano Stabellini

[Xen-devel] [PULL 1/5] xen: fix ioreq handling

2016-11-22 Thread Stefano Stabellini
From: Jan Beulich Avoid double fetches and bounds check size to avoid overflowing internal variables. This is CVE-2016-9381 / XSA-197. Reported-by: yanghongke Signed-off-by: Jan Beulich Reviewed-by: Stefano Stabellini

[Xen-devel] [PULL 0/5] xen-20161122-tag

2016-11-22 Thread Stefano Stabellini
changes since commit a7764f1548ef9946af30a8f96be9cef10761f0c1: Fix FreeBSD (10.x) build after 7dc9ae43 (2016-11-22 10:56:01 +) are available in the git repository at: git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xen-20161122-tag for you to fetch changes up to f1784a222eed213ce321

Re: [Xen-devel] Can't always start 32 bit domains after 64 bit domains

2016-11-22 Thread Dario Faggioli
On Mon, 2016-11-21 at 11:37 -0800, Sarah Newman wrote: > On 11/21/2016 05:21 AM, Andrew Cooper wrote: > > I suspect that libxl's preference towards NUMA allocation of > > domains > > interferes with this, by adding a NUMA constraints to memory > > allocations > > for 64bit PV guests. > > I ran xl

Re: [Xen-devel] DomU application crashes while mmap'ing device memory on x86_64

2016-11-22 Thread Oleksandr Andrushchenko
Hi, just wanted to bump this as I also have the same issue on real HW now (x86_64) Nov 14 10:30:18 DomU kernel: [ 1169.569936] [] xen_mc_flush+0x19c/0x1b0 Thank you in advnce, Oleksandr On Mon, Nov 14, 2016 at 6:07 PM, Oleksandr Andrushchenko wrote: > Hi, there! > >

Re: [Xen-devel] [PATCH] xen/arm: Add support for 16 bit VMIDs

2016-11-22 Thread Stefano Stabellini
On Tue, 22 Nov 2016, Julien Grall wrote: > Hi Stefano, > > On 19/11/16 04:34, Stefano Stabellini wrote: > > On Fri, 11 Nov 2016, Bhupinder Thakur wrote: > > > VMID space is increased to 16-bits from 8-bits in ARMv8 8.1 revision. > > > This allows more than 256 VMs to be supported by Xen. > > > >

Re: [Xen-devel] Low-hanging fruit bugs for starting contributor

2016-11-22 Thread Konrad Rzeszutek Wilk
On Tue, Nov 22, 2016 at 05:49:35PM +, Andrew Cooper wrote: > On 22/11/16 17:42, Elazar Leibovich wrote: > > Indeed nested virtualization, I apologize for the accidental deletion, > > While we would like to contribute to nested virtualization eventually, > > if there are other small bugs in

Re: [Xen-devel] Low-hanging fruit bugs for starting contributor

2016-11-22 Thread Andrew Cooper
On 22/11/16 17:42, Elazar Leibovich wrote: > Indeed nested virtualization, I apologize for the accidental deletion, > While we would like to contribute to nested virtualization eventually, > if there are other small bugs in other places in the hypervisor, that > would be a good warm up as well.

Re: [Xen-devel] Big.LITTLE support (WAS Re: Xen ARM community call)

2016-11-22 Thread Dario Faggioli
On Tue, 2016-11-22 at 14:28 +, Julien Grall wrote: > On 09/11/16 22:50, Anastassios Nanos wrote: > > > Example of features that could be discussed: > > > - Sharing co-processor between guests > > > - PCI passthrough > > > > Another issue to discuss, at some point, could be

Re: [Xen-devel] [PATCH] xen/arm: Add support for 16 bit VMIDs

2016-11-22 Thread Julien Grall
Hello Bhupinder, On 11/11/16 09:06, Bhupinder Thakur wrote: VMID space is increased to 16-bits from 8-bits in ARMv8 8.1 revision. This allows more than 256 VMs to be supported by Xen. This change adds support for 16-bit VMIDs in Xen based on whether the architecture supports it.

Re: [Xen-devel] [PATCH-for-4.9 v1 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2016-11-22 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 22 November 2016 17:25 > To: Paul Durrant > Cc: Andrew Cooper ; Wei Liu > ; xen-de...@lists.xenproject.org; Daniel DeGraaf >

Re: [Xen-devel] Low-hanging fruit bugs for starting contributor

2016-11-22 Thread Elazar Leibovich
Indeed nested virtualization, I apologize for the accidental deletion, While we would like to contribute to nested virtualization eventually, if there are other small bugs in other places in the hypervisor, that would be a good warm up as well. Thanks, On Tue, Nov 22, 2016 at 7:38 PM Lars Kurth

Re: [Xen-devel] Error regarding filesystem in Dom0 in lager board

2016-11-22 Thread George John
Thank you all, what Andrii suggested was really the problem. I modified the uart driver in the kernel, so that it won't disable the port the xen was using(scif0). Now the linux Dom0 was booted up. But the new problem now occured was that filesystem getting stuck before login prompt. I assume it

[Xen-devel] [PATCH XSA-followup for-4.8] libelf: fix symtab/strtab loading for 32bit domains

2016-11-22 Thread Roger Pau Monne
Commit ed04ca introduced a bug in the symtab/strtab loading for 32bit guests, that corrupted the section headers array due to the padding introduced by the elf_shdr union. The Elf section header array on 32bit should be accessible as an array of Elf32_Shdr elements, and the union with Elf64_Shdr

Re: [Xen-devel] Low-hanging fruit bugs for starting contributor

2016-11-22 Thread Lars Kurth
Added Konrad, as he replied to an earlier mail. > On 22 Nov 2016, at 17:00, Elazar Leibovich > wrote: > > Hi, > At Ravello/Oracle, we would be interested with contributing patches to the > Xen hypervisor, especially in areas related , and our team have

Re: [Xen-devel] [PATCH-for-4.9 v1 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 17:32, wrote: >> -Original Message- >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: 22 November 2016 15:57 >> To: Paul Durrant >> Cc: Andrew Cooper ; Wei Liu >>

Re: [Xen-devel] [Qemu-devel] [PATCH] xen_disk: convert discard input to byte ranges

2016-11-22 Thread Eric Blake
On 11/22/2016 11:00 AM, Olaf Hering wrote: > On Tue, Nov 22, Eric Blake wrote: > >> if (sec_start + sec_count < sec_count || >> sec_start > (INT64_MAX >> BDRV_SECTOR_BITS) - sec_count) { >> return false; >> } > > My point was: how does this handle sec_start=0,sec_count=UINT64_MAX or >

Re: [Xen-devel] [PATCH 3/3] x86/HVM: correct error code writing during task switch

2016-11-22 Thread Andrew Cooper
On 22/11/16 13:56, Jan Beulich wrote: > Whether to write 32 or just 16 bits depends on the D bit of the target > CS. The width of the stack pointer to use depends on the B bit of the > target SS. > > Also avoid using the no-fault copying routine. > > Finally avoid using yet another struct

Re: [Xen-devel] Low-hanging fruit bugs for starting contributor

2016-11-22 Thread Elazar Leibovich
Hi, At Ravello/Oracle, we would be interested with contributing patches to the Xen hypervisor, especially in areas related , and our team have no experience with Xen. I've read the contributor guideline, and I think that before contributing big patches, we should start with contributing small

Re: [Xen-devel] [Qemu-devel] [PATCH] xen_disk: convert discard input to byte ranges

2016-11-22 Thread Olaf Hering
On Tue, Nov 22, Eric Blake wrote: > if (sec_start + sec_count < sec_count || > sec_start > (INT64_MAX >> BDRV_SECTOR_BITS) - sec_count) { > return false; > } My point was: how does this handle sec_start=0,sec_count=UINT64_MAX or sec_start=INT64_MAX,sec_count=INT64_MAX? For me this gets

[Xen-devel] [ovmf baseline-only test] 68080: all pass

2016-11-22 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68080 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68080/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf b43dd22981b71dd78dd4cc04d55dc23d81c3bafb baseline

Re: [Xen-devel] [PATCH 2/3] x86/HVM: limit writes to outgoing TSS during task switch

2016-11-22 Thread Andrew Cooper
On 22/11/16 13:55, Jan Beulich wrote: > The only fields modified are EIP, EFLAGS, GPRs, and segment selectors. > CR3 in particular is not supposed to be updated. > > Signed-off-by: Jan Beulich > > --- a/xen/arch/x86/hvm/hvm.c > +++ b/xen/arch/x86/hvm/hvm.c > @@ -2952,7 +2952,6

[Xen-devel] [xen-unstable-smoke test] 102516: tolerable all pass - PUSHED

2016-11-22 Thread osstest service owner
flight 102516 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/102516/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl

[Xen-devel] [qemu-mainline test] 102504: regressions - FAIL

2016-11-22 Thread osstest service owner
flight 102504 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/102504/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow2 9 debian-di-installfail REGR. vs. 101909

Re: [Xen-devel] [PATCH v3 08/11] pvh/acpi: Handle ACPI accesses for PVH guests

2016-11-22 Thread Boris Ostrovsky
On 11/22/2016 11:05 AM, Jan Beulich wrote: On 22.11.16 at 16:30, wrote: On 11/22/2016 10:01 AM, Jan Beulich wrote: +const static uint8_t pm1a_mask[4] = {ACPI_BITMASK_GLOBAL_LOCK_STATUS, 0, +

Re: [Xen-devel] [Qemu-devel] [PATCH] xen_disk: convert discard input to byte ranges

2016-11-22 Thread Eric Blake
On 11/22/2016 10:12 AM, Olaf Hering wrote: > On Fri, Nov 18, Eric Blake wrote: > >> if (sec_start > (INT64_MAX >> BDRV_SECTOR_BITS) - sec_count) > > I have looked at this for a while now and cant spot how this would cover > all cases. Are you saying there should be just a single overflow check,

Re: [Xen-devel] [PATCH-for-4.9 v1 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2016-11-22 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 22 November 2016 15:57 > To: Paul Durrant > Cc: Andrew Cooper ; Wei Liu > ; xen-de...@lists.xenproject.org; Daniel De Graaf >

Re: [Xen-devel] [PATCH 1/3] x86/HVM: limit writes to incoming TSS during task switch

2016-11-22 Thread Andrew Cooper
On 22/11/16 13:55, Jan Beulich wrote: > The only field modified (and even that conditionally) is the back link. > Write only that field, and only when it actually has been written to. > > Take the opportunity and also ditch the pointless initializer from the > "tss" local variable. It would help

Re: [Xen-devel] [PATCH] xen/arm: Add support for 16 bit VMIDs

2016-11-22 Thread Julien Grall
Hi Stefano, On 19/11/16 04:34, Stefano Stabellini wrote: On Fri, 11 Nov 2016, Bhupinder Thakur wrote: VMID space is increased to 16-bits from 8-bits in ARMv8 8.1 revision. This allows more than 256 VMs to be supported by Xen. This change adds support for 16-bit VMIDs in Xen based on whether

Re: [Xen-devel] Ping: [PATCH] x86/memshr: properly check grant references

2016-11-22 Thread Tamas K Lengyel
On Tue, Nov 22, 2016 at 3:12 AM, Jan Beulich wrote: > >>> On 14.11.16 at 11:34, wrote: > > They need to be range checked against the current table limit in any > > event. > > > > Reported-by: Huawei PSIRT > > > > Move the code to where it

Re: [Xen-devel] Ping: [PATCH] x86/memshr: properly check grant references

2016-11-22 Thread Wei Liu
On Tue, Nov 22, 2016 at 09:17:43AM -0700, Jan Beulich wrote: > >>> On 22.11.16 at 17:13, wrote: > > On Tue, Nov 22, 2016 at 3:12 AM, Jan Beulich wrote: > > > >> >>> On 14.11.16 at 11:34, wrote: > >> > They need to be range checked

Re: [Xen-devel] [RFC PATCH 0/7] Implement Xen PV-IOMMU interface

2016-11-22 Thread Martin Cerveny
Hello. Any update on this ? Thanks, Martin Cerveny On Wed, 10 Feb 2016, Malcolm Crossley wrote: This RFC series implements the PV-IOMMU interface according to the PV-IOMMU design draft D. The PV-IOMMU interface is currently restricted to being used by the hardware domain only as non

Re: [Xen-devel] Low-hanging fruit bugs for starting contributor

2016-11-22 Thread Lars Kurth
Elazar, we do have a list of links to starter projects at the bottom of https://wiki.xenproject.org/wiki/Outreachy/Round12%2B2016GSoC , but these are probably not quite what you are looking for. We don't maintain a list of starter

Re: [Xen-devel] Low-hanging fruit bugs for starting contributor

2016-11-22 Thread Konrad Rzeszutek Wilk
On Tue, Nov 22, 2016 at 03:49:01PM +, Elazar Leibovich wrote: > Hi, > For someone wishing to start contributing to Xen hypervisor, what would > you recommend as an easy, educational, bug he could start with? Port 'hptool' functionality to bring down physical CPUs up and down to libxl. > >

Re: [Xen-devel] Ping: [PATCH] x86/memshr: properly check grant references

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 17:13, wrote: > On Tue, Nov 22, 2016 at 3:12 AM, Jan Beulich wrote: > >> >>> On 14.11.16 at 11:34, wrote: >> > They need to be range checked against the current table limit in any >> > event. >> > >> > Reported-by:

Re: [Xen-devel] [PATCH v3 02/11] acpi: Define ACPI IO registers for PVH guests

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 16:52, wrote: > > On 11/22/2016 10:13 AM, Jan Beulich wrote: > On 22.11.16 at 15:53, wrote: >> >>> >>> On 11/22/2016 09:07 AM, Jan Beulich wrote: >>> On 22.11.16 at 13:28, wrote:

Re: [Xen-devel] [Qemu-devel] [PATCH] xen_disk: convert discard input to byte ranges

2016-11-22 Thread Olaf Hering
On Fri, Nov 18, Eric Blake wrote: > if (sec_start > (INT64_MAX >> BDRV_SECTOR_BITS) - sec_count) I have looked at this for a while now and cant spot how this would cover all cases. Are you saying there should be just a single overflow check, yours? My change has two: one to check for wrap around

Re: [Xen-devel] [PATCH v3 09/11] events/x86: Define SCI virtual interrupt

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 16:57, wrote: > On 11/22/2016 10:25 AM, Jan Beulich wrote: > On 21.11.16 at 22:00, wrote: >>> PVH guests do not have IOAPIC which typically generates an SCI. For >>> those guests SCI will be provided as a virtual

Re: [Xen-devel] [PATCH v3 08/11] pvh/acpi: Handle ACPI accesses for PVH guests

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 16:30, wrote: > On 11/22/2016 10:01 AM, Jan Beulich wrote: >> >>> +const static uint8_t pm1a_mask[4] = {ACPI_BITMASK_GLOBAL_LOCK_STATUS, > 0, >>> + ACPI_BITMASK_GLOBAL_LOCK_ENABLE, > 0}; >>> +const

Re: [Xen-devel] [PATCH v3 02/11] acpi: Define ACPI IO registers for PVH guests

2016-11-22 Thread Boris Ostrovsky
On 11/22/2016 10:13 AM, Jan Beulich wrote: On 22.11.16 at 15:53, wrote: On 11/22/2016 09:07 AM, Jan Beulich wrote: On 22.11.16 at 13:28, wrote: On 11/22/2016 05:37 AM, Jan Beulich wrote: On 21.11.16 at 22:00,

Re: [Xen-devel] [PATCH v3 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 16:43, wrote: > > On 11/22/2016 10:07 AM, Jan Beulich wrote: > On 22.11.16 at 15:37, wrote: >> >>> >>> On 11/22/2016 08:59 AM, Jan Beulich wrote: >>> On 22.11.16 at 13:34, wrote:

Re: [Xen-devel] [PATCH-for-4.9 v1 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2016-11-22 Thread Jan Beulich
>>> On 18.11.16 at 18:13, wrote: > This patch simply adds the boilerplate for the hypercall and bumps > __XEN_LATEST_INTERFACE_VERSION__ to 0x040900. Why the latter? > +static int dm_op_get_buf(XEN_GUEST_HANDLE_PARAM(xen_dm_op_buf_t) bufs, > +

Re: [Xen-devel] [PATCH v3 09/11] events/x86: Define SCI virtual interrupt

2016-11-22 Thread Boris Ostrovsky
On 11/22/2016 10:25 AM, Jan Beulich wrote: On 21.11.16 at 22:00, wrote: PVH guests do not have IOAPIC which typically generates an SCI. For those guests SCI will be provided as a virtual interrupt. We also move VIRQ_MCA definition out of xen-mca.h to keep all

[Xen-devel] Low-hanging fruit bugs for starting contributor

2016-11-22 Thread Elazar Leibovich
Hi, For someone wishing to start contributing to Xen hypervisor, what would you recommend as an easy, educational, bug he could start with? Thanks, ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v3 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-22 Thread Boris Ostrovsky
On 11/22/2016 10:07 AM, Jan Beulich wrote: On 22.11.16 at 15:37, wrote: On 11/22/2016 08:59 AM, Jan Beulich wrote: On 22.11.16 at 13:34, wrote: On 11/22/2016 05:39 AM, Jan Beulich wrote: On 22.11.16 at 11:31,

Re: [Xen-devel] [PATCH v3 10/11] pvh: Send an SCI on VCPU hotplug event

2016-11-22 Thread Jan Beulich
>>> On 21.11.16 at 22:00, wrote: > --- a/xen/arch/x86/domain.c > +++ b/xen/arch/x86/domain.c > @@ -509,6 +509,22 @@ void vcpu_destroy(struct vcpu *v) > xfree(v->arch.pv_vcpu.trap_ctxt); > } > > +int arch_update_avail_vcpus(struct domain *d) I don't see a

Re: [Xen-devel] [PATCH v3 08/11] pvh/acpi: Handle ACPI accesses for PVH guests

2016-11-22 Thread Boris Ostrovsky
On 11/22/2016 10:01 AM, Jan Beulich wrote: +const static uint8_t pm1a_mask[4] = {ACPI_BITMASK_GLOBAL_LOCK_STATUS, 0, + ACPI_BITMASK_GLOBAL_LOCK_ENABLE, 0}; +const static uint8_t gpe0_mask[4] = {1U << XEN_GPE0_CPUHP_BIT, 0, +

Re: [Xen-devel] [PATCH v3 09/11] events/x86: Define SCI virtual interrupt

2016-11-22 Thread Jan Beulich
>>> On 21.11.16 at 22:00, wrote: > PVH guests do not have IOAPIC which typically generates an SCI. For > those guests SCI will be provided as a virtual interrupt. > > We also move VIRQ_MCA definition out of xen-mca.h to > keep all x86-specific VIRQ_ARCH_* in one

Re: [Xen-devel] [PATCH v3 02/11] acpi: Define ACPI IO registers for PVH guests

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 15:53, wrote: > > On 11/22/2016 09:07 AM, Jan Beulich wrote: > On 22.11.16 at 13:28, wrote: >> >>> >>> On 11/22/2016 05:37 AM, Jan Beulich wrote: >>> On 21.11.16 at 22:00, wrote:

Re: [Xen-devel] [PATCH v3 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 15:37, wrote: > > On 11/22/2016 08:59 AM, Jan Beulich wrote: > On 22.11.16 at 13:34, wrote: >> >>> >>> On 11/22/2016 05:39 AM, Jan Beulich wrote: >>> On 22.11.16 at 11:31, wrote: On

[Xen-devel] [PATCH v2 1/4] Support for building in a Xen binary

2016-11-22 Thread Andre Przywara
From: Christoffer Dall Add support for building a Xen binary which includes a Dom0 image and the Dom0 command-line. If the user specifies --with-xen=, where Xen is an appropriate AArch64 Xen binary, the build system will generate a xen-system.axf instead of a

[Xen-devel] [PATCH v2 2/4] Xen: Support adding DT nodes

2016-11-22 Thread Andre Przywara
From: Christoffer Dall Support adding xen,xen-bootargs node via --with-xen-bootargs to the configure script and automatically add the Dom0 node to the DT as well. Signed-off-by: Christoffer Dall Signed-off-by: Andre Przywara

[Xen-devel] [PATCH v2 4/4] Explicitly clean linux-system.axf and xen-system.axf

2016-11-22 Thread Andre Przywara
From: Christoffer Dall When doing a make clean, only the output image currently configured to build is being removed. However, one would expect all build artifacts to be removed when doing a 'make clean' and when switching between Xen and Linux builds, it is easy to

[Xen-devel] [PATCH v2 0/4] boot-wrapper: arm64: Xen support

2016-11-22 Thread Andre Przywara
These patches allow to include a Xen hypervisor binary into a boot-wrapper ELF file, so that a Foundation Platform or a Fast Model can boot a Xen system (including a Dom0 kernel). The original patches have been around for a while, so this series is merely an update to apply on the latest

[Xen-devel] [PATCH v2 3/4] Xen: Select correct dom0 console

2016-11-22 Thread Andre Przywara
From: Ian Campbell If Xen is enabled, tell Dom0 to use the 'hvc0' console, and fall back to the usual ttyAMA0 otherwise. Signed-off-by: Ian Campbell Signed-off-by: Christoffer Dall Signed-off-by: Andre Przywara

Re: [Xen-devel] [PATCH v3 08/11] pvh/acpi: Handle ACPI accesses for PVH guests

2016-11-22 Thread Jan Beulich
>>> On 21.11.16 at 22:00, wrote: > --- a/xen/arch/x86/hvm/ioreq.c > +++ b/xen/arch/x86/hvm/ioreq.c > @@ -16,6 +16,7 @@ > * this program; If not, see . > */ > > +#include > #include > #include > #include Please take the

Re: [Xen-devel] [PATCH v3 02/11] acpi: Define ACPI IO registers for PVH guests

2016-11-22 Thread Boris Ostrovsky
On 11/22/2016 09:07 AM, Jan Beulich wrote: On 22.11.16 at 13:28, wrote: On 11/22/2016 05:37 AM, Jan Beulich wrote: On 21.11.16 at 22:00, wrote: @@ -119,11 +122,33 @@ typedef struct buffered_iopage buffered_iopage_t; /*

Re: [Xen-devel] [PATCH v3 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-22 Thread Boris Ostrovsky
On 11/22/2016 08:59 AM, Jan Beulich wrote: On 22.11.16 at 13:34, wrote: On 11/22/2016 05:39 AM, Jan Beulich wrote: On 22.11.16 at 11:31, wrote: On 21.11.16 at 22:00, wrote: This domctl is called when a VCPU is

[Xen-devel] Big.LITTLE support (WAS Re: Xen ARM community call)

2016-11-22 Thread Julien Grall
Hello Anastassios, On 09/11/16 22:50, Anastassios Nanos wrote: Hi Julien, all, I would like to start organizing a recurring community call to discuss and sync-up on upcoming features for Xen ARM. great idea, I'd like to join too (GMT). Example of features that could be discussed:

Re: [Xen-devel] [PATCH 2/2] x86emul: in_longmode() should not ignore ->read_msr() errors

2016-11-22 Thread Andrew Cooper
On 22/11/16 14:20, Jan Beulich wrote: > Suggested-by: George Dunlap > Signed-off-by: Jan Beulich Possibly worth nothing in the commit message that the current implementation of this hook when present never fails with MSR_EFER? Reviewed-by: Andrew

[Xen-devel] [PATCH 2/2] x86emul: in_longmode() should not ignore ->read_msr() errors

2016-11-22 Thread Jan Beulich
Suggested-by: George Dunlap Signed-off-by: Jan Beulich --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/arch/x86/x86_emulate/x86_emulate.c @@ -1296,10 +1296,10 @@ in_longmode( { uint64_t efer; -if (ops->read_msr == NULL) +if (

Re: [Xen-devel] [PATCH 1/2] x86emul: simplify DstBitBase handling code

2016-11-22 Thread Andrew Cooper
On 22/11/16 14:20, Jan Beulich wrote: > ..., at once making it more obvious that even in the negative bit > offset case the resulting bit offset to be used by the inlined > instructions will always be constrained to the operand size of the > original instruction. > > Also add a test case which

Re: [Xen-devel] Xen ARM community call

2016-11-22 Thread Julien Grall
Hello Dirk, On 09/11/16 07:32, Dirk Behme wrote: On 08.11.2016 13:19, Julien Grall wrote: Hi all, I would like to start organizing a recurring community call to discuss and sync-up on upcoming features for Xen ARM. Example of features that could be discussed: - Sharing co-processor

[Xen-devel] [PATCH 1/2] x86emul: simplify DstBitBase handling code

2016-11-22 Thread Jan Beulich
..., at once making it more obvious that even in the negative bit offset case the resulting bit offset to be used by the inlined instructions will always be constrained to the operand size of the original instruction. Also add a test case which would have failed without the XSA-195 fix.

Re: [Xen-devel] [PATCH v3 08/11] pvh/acpi: Handle ACPI accesses for PVH guests

2016-11-22 Thread Paul Durrant
> -Original Message- > From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: 21 November 2016 21:01 > To: xen-devel@lists.xen.org > Cc: jbeul...@suse.com; Andrew Cooper ; > Wei Liu ; Ian Jackson ; Roger >

[Xen-devel] [PATCH 0/2] x86emul: recent XSA follow-up

2016-11-22 Thread Jan Beulich
These aren't outright bug fixes, so aren't strictly candidates for 4.8, but I think they're still worthwhile to consider. 1: simplify DstBitBase handling code 2: in_longmode() should not ignore ->read_msr() errors Signed-off-by: Jan Beulich

Re: [Xen-devel] [PATCH v3 07/11] pvh/ioreq: Install handlers for ACPI-related PVH IO accesses

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 13:38, wrote: > > On 11/22/2016 06:34 AM, Jan Beulich wrote: > On 21.11.16 at 22:00, wrote: >>> PVH guests will have ACPI accesses emulated by the hypervisor >>> as opposed to QEMU (as is the case for HVM guests)

Re: [Xen-devel] [PATCH v3 02/11] acpi: Define ACPI IO registers for PVH guests

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 13:28, wrote: > > On 11/22/2016 05:37 AM, Jan Beulich wrote: > On 21.11.16 at 22:00, wrote: >>> @@ -119,11 +122,33 @@ typedef struct buffered_iopage buffered_iopage_t; >>> >>> /* Compatibility definitions for the

Re: [Xen-devel] [PATCH v3 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-22 Thread Jan Beulich
>>> On 22.11.16 at 13:34, wrote: > > On 11/22/2016 05:39 AM, Jan Beulich wrote: > On 22.11.16 at 11:31, wrote: >> On 21.11.16 at 22:00, wrote: This domctl is called when a VCPU is hot-(un)plugged to a

[Xen-devel] [PATCH 3/3] x86/HVM: correct error code writing during task switch

2016-11-22 Thread Jan Beulich
Whether to write 32 or just 16 bits depends on the D bit of the target CS. The width of the stack pointer to use depends on the B bit of the target SS. Also avoid using the no-fault copying routine. Finally avoid using yet another struct segment_register variable here. Signed-off-by: Jan

[Xen-devel] [PATCH 2/3] x86/HVM: limit writes to outgoing TSS during task switch

2016-11-22 Thread Jan Beulich
The only fields modified are EIP, EFLAGS, GPRs, and segment selectors. CR3 in particular is not supposed to be updated. Signed-off-by: Jan Beulich --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -2952,7 +2952,6 @@ void hvm_task_switch( if ( taskswitch_reason

Re: [Xen-devel] [COVERITY ACCESS] for Embedded/Automotive team

2016-11-22 Thread Artem Mygaiev
On 22.11.16 15:42, Andrew Cooper wrote: > On 22/11/16 11:55, Lars Kurth wrote: >> On 22/11/2016 11:51, "Julien Grall" wrote: >> >>> Hi Lars, >>> >>> On 19/11/16 16:53, Lars Kurth wrote: On 18/11/2016 20:55, "Julien Grall" wrote: > Coverity has

[Xen-devel] [PATCH 1/3] x86/HVM: limit writes to incoming TSS during task switch

2016-11-22 Thread Jan Beulich
The only field modified (and even that conditionally) is the back link. Write only that field, and only when it actually has been written to. Take the opportunity and also ditch the pointless initializer from the "tss" local variable. Signed-off-by: Jan Beulich ---

[Xen-devel] [PATCH 0/3] x86/HVM: XSA-192 follow-ups

2016-11-22 Thread Jan Beulich
1: limit writes to incoming TSS during task switch 2: limit writes to outgoing TSS during task switch 3: correct error code writing during task switch Signed-off-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org

Re: [Xen-devel] Xen ARM community call

2016-11-22 Thread Julien Grall
Hello all, Below an agenda for the call tomorrow: * Round-table and introductions * Features for the next release * Stable tree maintenance * Areas of concern Regards, On 18/11/16 16:07, Julien Grall wrote: Hello all, Based on the timezone given by each of you, the best time seems to be:

Re: [Xen-devel] [COVERITY ACCESS] for Embedded/Automotive team

2016-11-22 Thread Andrew Cooper
On 22/11/16 11:55, Lars Kurth wrote: > > On 22/11/2016 11:51, "Julien Grall" wrote: > >> Hi Lars, >> >> On 19/11/16 16:53, Lars Kurth wrote: >>> On 18/11/2016 20:55, "Julien Grall" wrote: Coverity has been proven useful on x86 to catch some bugs.

  1   2   >