[Xen-devel] Xen Security Advisory 280 v2 - Fix for XSA-240 conflicts with shadow paging

2018-11-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-280 version 2 Fix for XSA-240 conflicts with shadow paging UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION = Th

[Xen-devel] Xen Security Advisory 279 v2 - x86: DoS from attempting to use INVPCID with a non-canonical addresses

2018-11-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-279 version 2 x86: DoS from attempting to use INVPCID with a non-canonical addresses UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 275 v2 - insufficient TLB flushing / improper large page mappings with AMD IOMMUs

2018-11-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-275 version 2 insufficient TLB flushing / improper large page mappings with AMD IOMMUs UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION =

[Xen-devel] Xen Security Advisory 277 v2 - x86: incorrect error handling for guest p2m page removals

2018-11-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-277 version 2 x86: incorrect error handling for guest p2m page removals UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION ===

[Xen-devel] Xen Security Advisory 276 v2 - resource accounting issues in x86 IOREQ server handling

2018-11-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory XSA-276 version 2 resource accounting issues in x86 IOREQ server handling UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

[Xen-devel] [libvirt bisection] complete build-armhf-libvirt

2018-11-20 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job build-armhf-libvirt testid libvirt-build Tree: libvirt git://libvirt.org/libvirt.git Tree: libvirt_gnulib https://git.savannah.gnu.org/git/gnulib.git/ Tree: libvirt_keycodemapdb https://gitlab.com/keycodemap/keycodemapdb.git Tree: qemuu git://xenbits.

Re: [Xen-devel] [Qemu-devel] [PATCH v5 00/24] ACPI reorganization for hardware-reduced API addition

2018-11-20 Thread Igor Mammedov
On Mon, 19 Nov 2018 18:14:26 +0100 Paolo Bonzini wrote: > On 19/11/18 16:31, Igor Mammedov wrote: > > I've tried to give suggestions how to restructure series > > on per patch basis. In my opinion it quite possible to split > > series in several smaller ones and it should really help with > > mak

[Xen-devel] [distros-debian-snapshot test] 75615: tolerable FAIL

2018-11-20 Thread Platform Team regression test user
flight 75615 distros-debian-snapshot real [real] http://osstest.xensource.com/osstest/logs/75615/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-amd64-current-netinst-pygrub 10 debian-di-install fail like 75591 test-amd64-i386-i386-daily-ne

[Xen-devel] [OSSTEST PATCH v2 2/3] ts-depriv-audit-qemu: chmod +x qemu's chroot

2018-11-20 Thread Ian Jackson
libxl creates this directory with mode 0. That prevents fishdescriptor from working. chmod it. This is OK for testing. CC: George Dunlap Signed-off-by: Ian Jackson --- ts-depriv-audit-qemu | 1 + 1 file changed, 1 insertion(+) diff --git a/ts-depriv-audit-qemu b/ts-depriv-audit-qemu index d

[Xen-devel] [OSSTEST PATCH v2 1/3] ts-depriv-audit-qemu: Create complete /run/user in appropriate root

2018-11-20 Thread Ian Jackson
* Use mkdir -p, rather than trying to only create /run/user/$uid. That helps if /run and/or /run/user do not exist, as they do in libxl-made chroots with recent libxl (which gets qemu to chroot). * Do all of this in the root directory of the qemu process, not our own root directory. So it w

[Xen-devel] [OSSTEST PATCH v2 3/3] production-config*: Update to fishdescriptor with chroot bugfix

2018-11-20 Thread Ian Jackson
Deployment note: I have copied this binary to the images directory in Cambridge and Massachusetts. The corresponding patch to chiark-utils is on its way to my upstream hat. CC: George Dunlap Signed-off-by: Ian Jackson --- production-config | 2 +- production-config-cambridge | 2 +-

Re: [Xen-devel] Xen optimization

2018-11-20 Thread Andrii Anisov
Hello Stefano, On 01.11.18 22:20, Stefano Stabellini wrote: No, I haven't had any time. Aside from the Xen version, another difference is the interrupt source. I used the physical timer for testing. Could you share your approach for interrupts latency measurement? Are you using any HW specifi

[Xen-devel] [libvirt test] 130527: trouble: blocked/broken/pass

2018-11-20 Thread osstest service owner
flight 130527 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/130527/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-arm64

Re: [Xen-devel] [PATCH 4/4] x86/pv: Expose RDTSCP to PV guests

2018-11-20 Thread Andrew Cooper
On 20/11/2018 11:06, Jan Beulich wrote: On 15.11.18 at 22:47, wrote: >> The final remnanat of PVRDTSCP is that we would emulate RDTSCP even on >> hardware which lacked the instruction. RDTSCP is available on almost all >> 64-bit x86 hardware. >> >> Remove this emulation, drop the TSC_MODE_PV

[Xen-devel] [xen-unstable-smoke test] 130591: trouble: blocked/broken/pass

2018-11-20 Thread osstest service owner
flight 130591 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130591/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-arm64-xs

Re: [Xen-devel] [PATCH 1/4] x86: Begin to remove TSC mode PVRDTSCP

2018-11-20 Thread Andrew Cooper
On 19/11/2018 15:25, Jan Beulich wrote: On 15.11.18 at 22:47, wrote: >> For more historical context, see >> c/s c17b36d5dc792cfdf59b6de0213b168bec0af8e8 >> c/s 04656384a1b9714e43db850c51431008e23450d8 >> >> PVRDTSCP was an attempt to provide Xen-aware userspace with a stable >> monotonic

Re: [Xen-devel] [PATCH] gic:vgic: avoid excessive conversions

2018-11-20 Thread Andrii Anisov
Hello Andre, I'm going to change "gic_raise_guest_irq()" function interface. Could you please comment my understanding of vgic-v3-its.c code below? So that I could fix it alongside the function interface change. On 16.11.18 18:45, Andrii Anisov wrote: diff --git a/xen/arch/arm/vgic-v3-its.c

Re: [Xen-devel] [PATCH v1] bump XEN_DOMCTL_INTERFACE_VERSION

2018-11-20 Thread Jan Beulich
>>> On 20.11.18 at 11:56, wrote: > Without this change valgrind can not decide what variant of > xen_domctl_createdomain is provided as input. > > Fixes commit 4a83497635 ("xen/domctl: Merge set_max_evtchn into createdomain") > Fixes commit a903bf5233 ("tools: Pass grant table limits to > XEN_DO

Re: [Xen-devel] [PATCH 4/4] x86/pv: Expose RDTSCP to PV guests

2018-11-20 Thread Jan Beulich
>>> On 15.11.18 at 22:47, wrote: > The final remnanat of PVRDTSCP is that we would emulate RDTSCP even on > hardware which lacked the instruction. RDTSCP is available on almost all > 64-bit x86 hardware. > > Remove this emulation, drop the TSC_MODE_PVRDTSCP constant, and allow RDTSCP > in a PV g

Re: [Xen-devel] [PATCH 3/4] x86/msr: Handle MSR_TSC_AUX consistently for PV and HVM guests

2018-11-20 Thread Jan Beulich
>>> On 15.11.18 at 22:47, wrote: > @@ -1040,7 +1040,10 @@ static int hvm_load_cpu_ctxt(struct domain *d, > hvm_domain_context_t *h) > if ( hvm_funcs.tsc_scaling.setup ) > hvm_funcs.tsc_scaling.setup(v); > > -v->arch.hvm.msr_tsc_aux = ctxt.msr_tsc_aux; > +if ( ctxt.msr_tsc_

[Xen-devel] [PATCH v1] bump XEN_DOMCTL_INTERFACE_VERSION

2018-11-20 Thread Olaf Hering
Without this change valgrind can not decide what variant of xen_domctl_createdomain is provided as input. Fixes commit 4a83497635 ("xen/domctl: Merge set_max_evtchn into createdomain") Fixes commit a903bf5233 ("tools: Pass grant table limits to XEN_DOMCTL_set_gnttab_limits") Fixes commit ae8b8bc5

Re: [Xen-devel] [PATCH V7 2/5] x86/mm: allocate logdirty_ranges for altp2ms

2018-11-20 Thread Razvan Cojocaru
On 11/20/18 12:27 PM, Jan Beulich wrote: On 20.11.18 at 11:02, wrote: >> On 11/20/18 11:05 AM, Jan Beulich wrote: >> On 19.11.18 at 18:26, wrote: For now, only do allocation/deallocation; keeping them in sync will be done in subsequent patches. Logdirty synchronizatio

Re: [Xen-devel] [PATCH V7 2/5] x86/mm: allocate logdirty_ranges for altp2ms

2018-11-20 Thread Jan Beulich
>>> On 20.11.18 at 11:02, wrote: > On 11/20/18 11:05 AM, Jan Beulich wrote: > On 19.11.18 at 18:26, wrote: >>> For now, only do allocation/deallocation; keeping them in sync >>> will be done in subsequent patches. >>> >>> Logdirty synchronization will only be done for active altp2ms; >>> so a

Re: [Xen-devel] [PATCH V7 3/5] x86/altp2m: fix display frozen when switching to a new view early

2018-11-20 Thread Jan Beulich
>>> On 20.11.18 at 10:43, wrote: > >> On Nov 20, 2018, at 9:12 AM, Jan Beulich wrote: >> > On 19.11.18 at 18:26, wrote: >>> When an new altp2m view is created very early on guest boot, the >>> display will freeze (although the guest will run normally). This >>> may also happen on resizing

Re: [Xen-devel] [PATCH V7 2/5] x86/mm: allocate logdirty_ranges for altp2ms

2018-11-20 Thread Razvan Cojocaru
On 11/20/18 11:05 AM, Jan Beulich wrote: On 19.11.18 at 18:26, wrote: >> For now, only do allocation/deallocation; keeping them in sync >> will be done in subsequent patches. >> >> Logdirty synchronization will only be done for active altp2ms; >> so allocate logdirty rangesets (copying the ho

Re: [Xen-devel] [PATCH V7 3/5] x86/altp2m: fix display frozen when switching to a new view early

2018-11-20 Thread George Dunlap
> On Nov 20, 2018, at 9:12 AM, Jan Beulich wrote: > On 19.11.18 at 18:26, wrote: >> When an new altp2m view is created very early on guest boot, the >> display will freeze (although the guest will run normally). This >> may also happen on resizing the display. The reason is the way >> Xen

Re: [Xen-devel] [PATCH v1 5/8] hv_balloon: mark inflated pages PG_offline

2018-11-20 Thread Pankaj Gupta
> >> --- > >> drivers/hv/hv_balloon.c | 14 -- > >> 1 file changed, 12 insertions(+), 2 deletions(-) > >> > >> diff --git a/drivers/hv/hv_balloon.c b/drivers/hv/hv_balloon.c > >> index 211f3fe3a038..47719862e57f 100644 > >> --- a/drivers/hv/hv_balloon.c > >> +++ b/drivers/hv/hv_balloo

Re: [Xen-devel] [PATCH V7 3/5] x86/altp2m: fix display frozen when switching to a new view early

2018-11-20 Thread Razvan Cojocaru
On 11/20/18 11:12 AM, Jan Beulich wrote: On 19.11.18 at 18:26, wrote: >> When an new altp2m view is created very early on guest boot, the >> display will freeze (although the guest will run normally). This >> may also happen on resizing the display. The reason is the way >> Xen currently (mis

Re: [Xen-devel] [PATCH v4 10/19] xen: setup hypercall page for PVH

2018-11-20 Thread Juergen Gross
On 09/11/2018 19:12, Daniel Kiper wrote: > On Fri, Nov 02, 2018 at 01:37:29PM +0100, Juergen Gross wrote: >> Add the needed code to setup the hypercall page for calling into the >> Xen hypervisor. >> >> Signed-off-by: Juergen Gross >> --- >> V3: grub_xen_early_halt->grub_xen_panic (Roger Pau Monné

Re: [Xen-devel] [PATCH v4 10/19] xen: setup hypercall page for PVH

2018-11-20 Thread Juergen Gross
On 15/11/2018 09:33, Roger Pau Monné wrote: > On Fri, Nov 02, 2018 at 01:37:29PM +0100, Juergen Gross wrote: >> Add the needed code to setup the hypercall page for calling into the >> Xen hypervisor. >> >> Signed-off-by: Juergen Gross > > Thanks, LGTM, just one suggestion and one question. > >>

Re: [Xen-devel] [PATCH V7 3/5] x86/altp2m: fix display frozen when switching to a new view early

2018-11-20 Thread Jan Beulich
>>> On 19.11.18 at 18:26, wrote: > When an new altp2m view is created very early on guest boot, the > display will freeze (although the guest will run normally). This > may also happen on resizing the display. The reason is the way > Xen currently (mis)handles logdirty VGA: it intentionally > misc

Re: [Xen-devel] [PATCH V7 2/5] x86/mm: allocate logdirty_ranges for altp2ms

2018-11-20 Thread Jan Beulich
>>> On 19.11.18 at 18:26, wrote: > For now, only do allocation/deallocation; keeping them in sync > will be done in subsequent patches. > > Logdirty synchronization will only be done for active altp2ms; > so allocate logdirty rangesets (copying the host logdirty > rangeset) when an altp2m is acti

[Xen-devel] [xen-unstable bisection] complete test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict

2018-11-20 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict testid depriv-audit-qemu/create Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-trad

Re: [Xen-devel] [PATCH v1 5/8] hv_balloon: mark inflated pages PG_offline

2018-11-20 Thread David Hildenbrand
On 20.11.18 09:45, Pankaj Gupta wrote: > > Hi David, > >> >> Mark inflated and never onlined pages PG_offline, to tell the world that >> the content is stale and should not be dumped. >> >> Cc: "K. Y. Srinivasan" >> Cc: Haiyang Zhang >> Cc: Stephen Hemminger >> Cc: Kairui Song >> Cc: Vitaly K

Re: [Xen-devel] [PATCH v1 5/8] hv_balloon: mark inflated pages PG_offline

2018-11-20 Thread Pankaj Gupta
Hi David, > > Mark inflated and never onlined pages PG_offline, to tell the world that > the content is stale and should not be dumped. > > Cc: "K. Y. Srinivasan" > Cc: Haiyang Zhang > Cc: Stephen Hemminger > Cc: Kairui Song > Cc: Vitaly Kuznetsov > Cc: Andrew Morton > Cc: Matthew Wilcox

[Xen-devel] [xen-unstable-smoke test] 130585: trouble: blocked/broken/pass

2018-11-20 Thread osstest service owner
flight 130585 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130585/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-arm64-xs

Re: [Xen-devel] [PATCH 2/4] x86/pv: Remove deferred RDTSC{, P} handling in pv_emulate_privileged_op()

2018-11-20 Thread Jan Beulich
>>> On 15.11.18 at 22:47, wrote: > As noted in c/s 4999bf3e8b "x86/PV: use generic emulator for privileged > instruction handling", these hoops are jumped through to retain the older > behaviour, along with a note suggesting that we should reconsider things. > > It does not matter exactly when pv

Re: [Xen-devel] [PATCH v5 19/24] hw: acpi: Retrieve the PCI bus from AcpiPciHpState

2018-11-20 Thread Igor Mammedov
On Mon, 19 Nov 2018 18:02:53 + "Boeuf, Sebastien" wrote: > On Mon, 2018-11-19 at 16:37 +0100, Igor Mammedov wrote: > > On Fri, 16 Nov 2018 19:42:08 + > > "Boeuf, Sebastien" wrote: > > > > > > > > Hi Igor, > > > > > > On Fri, 2018-11-16 at 10:39 +0100, Igor Mammedov wrote: > > > >

Re: [Xen-devel] [PATCH v5 05/24] hw: acpi: Implement XSDT support for RSDP

2018-11-20 Thread Igor Mammedov
On Mon, 19 Nov 2018 13:27:14 -0500 "Michael S. Tsirkin" wrote: > On Thu, Nov 08, 2018 at 03:16:23PM +0100, Igor Mammedov wrote: > > On Mon, 5 Nov 2018 02:40:28 +0100 > > Samuel Ortiz wrote: > > > > > XSDT is the 64-bit version of the legacy ACPI RSDT (Root System > > > Description Table). RS

Re: [Xen-devel] [PATCH v5 01/47] x86emul: introduce IMPOSSIBLE()

2018-11-20 Thread Jan Beulich
>>> On 19.11.18 at 19:11, wrote: > On 19/11/2018 10:13, Jan Beulich wrote: >> @@ -8828,12 +8837,7 @@ x86_emulate( >> dst.type = OP_NONE; >> break; >> default: >> -if ( (d & DstMask) != DstMem ) >> -{ >> -

<    1   2