[Xen-devel] [BUG] task jbd2/xvda4-8:174 blocked for more than 120 seconds.

2019-02-08 Thread Sacha
Hi, On  Debian GNU/Linux 9.7 (stretch) amd64, we have a bug on the last Xen Hypervisor version: xen-hypervisor-4.8-amd64 4.8.5+shim4.10.2+xsa282 The rollback on the previous package version corrected the problem: xen-hypervisor-4.8-amd64 4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10 The

Re: [Xen-devel] [admin] [BUG] task jbd2/xvda4-8:174 blocked for more than 120 seconds.

2019-02-08 Thread Samuel Thibault
Hello, Sacha, le ven. 08 févr. 2019 18:00:22 +0100, a ecrit: > On  Debian GNU/Linux 9.7 (stretch) amd64, we have a bug on the last Xen > Hypervisor version: > > xen-hypervisor-4.8-amd64 4.8.5+shim4.10.2+xsa282 (Read: 4.8.5+shim4.10.2+xsa282-1+deb9u11) > The rollback on the previous package

Re: [Xen-devel] [admin] [Pkg-xen-devel] [BUG] task jbd2/xvda4-8:174 blocked for more than 120 seconds.

2019-02-08 Thread Samuel Thibault
Hello, Hans van Kranenburg, le ven. 08 févr. 2019 20:18:44 +0100, a ecrit: > Upstream mailing list is at: > xen-devel@lists.xenproject.org Apparently it didn't get the mails, I guess because it's subscriber-only posting? I have now forwarded the mails. > Apparently, >

[Xen-devel] [libvirt test] 133033: regressions - trouble: blocked/broken/fail/pass

2019-02-08 Thread osstest service owner
flight 133033 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/133033/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-arm64-pvops

[Xen-devel] [linux-3.18 bisection] complete test-amd64-i386-xl-qemuu-ovmf-amd64

2019-02-08 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-xl-qemuu-ovmf-amd64 testid xen-boot Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu

[Xen-devel] [linux-4.14 test] 133019: trouble: blocked/broken/fail/pass

2019-02-08 Thread osstest service owner
flight 133019 linux-4.14 real [real] http://logs.test-lab.xenproject.org/osstest/logs/133019/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64

[Xen-devel] [linux-3.18 test] 133013: regressions - trouble: blocked/broken/fail/pass

2019-02-08 Thread osstest service owner
flight 133013 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/133013/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64

[Xen-devel] [xen-unstable test] 133015: trouble: blocked/broken/fail/pass

2019-02-08 Thread osstest service owner
flight 133015 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/133015/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64-xsm

[Xen-devel] [ovmf test] 133025: all pass - PUSHED

2019-02-08 Thread osstest service owner
flight 133025 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/133025/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 7a90895306acbf970de87e8020f8c6dc22ce8fb3 baseline version: ovmf

[Xen-devel] Fwd: [BUG] task jbd2/xvda4-8:174 blocked for more than 120 seconds.

2019-02-08 Thread Samuel Thibault
From: Samuel Thibault To: xen-de...@lists.xen.org, x...@packages.debian.org Subject: Re: [admin] [BUG] task jbd2/xvda4-8:174 blocked for more than 120 seconds. Hello, Sacha, le ven. 08 févr. 2019 18:00:22 +0100, a ecrit: > On  Debian GNU/Linux 9.7 (stretch) amd64, we have a bug on the last Xen

[Xen-devel] Fwd: [BUG] task jbd2/xvda4-8:174 blocked for more than 120 seconds.

2019-02-08 Thread Samuel Thibault
From: Sacha To: xen-de...@lists.xen.org Subject: [admin] [BUG] task jbd2/xvda4-8:174 blocked for more than 120 seconds. Hi, On  Debian GNU/Linux 9.7 (stretch) amd64, we have a bug on the last Xen Hypervisor version: xen-hypervisor-4.8-amd64 4.8.5+shim4.10.2+xsa282 The rollback on the

[Xen-devel] [xen-unstable-smoke test] 133050: trouble: blocked/broken/pass

2019-02-08 Thread osstest service owner
flight 133050 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/133050/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken

Re: [Xen-devel] [PATCH net-next] xen-netback: mark expected switch fall-through

2019-02-08 Thread Gustavo A. R. Silva
On 2/8/19 2:21 PM, David Miller wrote: > From: "Gustavo A. R. Silva" > Date: Fri, 8 Feb 2019 13:58:38 -0600 > >> In preparation to enabling -Wimplicit-fallthrough, mark switch >> cases where we are expecting to fall through. >> >> Warning level 3 was used: -Wimplicit-fallthrough=3 >> >> This

Re: [Xen-devel] [PATCH net-next] xen-netback: mark expected switch fall-through

2019-02-08 Thread David Miller
From: "Gustavo A. R. Silva" Date: Fri, 8 Feb 2019 13:58:38 -0600 > In preparation to enabling -Wimplicit-fallthrough, mark switch > cases where we are expecting to fall through. > > Warning level 3 was used: -Wimplicit-fallthrough=3 > > This patch is part of the ongoing efforts to enabling >

[Xen-devel] [PATCH net-next] xen-netback: mark expected switch fall-through

2019-02-08 Thread Gustavo A. R. Silva
In preparation to enabling -Wimplicit-fallthrough, mark switch cases where we are expecting to fall through. Warning level 3 was used: -Wimplicit-fallthrough=3 This patch is part of the ongoing efforts to enabling -Wimplicit-fallthrough. Signed-off-by: Gustavo A. R. Silva ---

Re: [Xen-devel] Xen-unstable PVHdom0: Assertion 'IS_ALIGNED(dfn_x(dfn), (1ul << page_order))' failed at iommu.c:324

2019-02-08 Thread Sander Eikelenboom
On 08/02/2019 17:47, Roger Pau Monné wrote: > On Fri, Feb 08, 2019 at 05:15:22PM +0100, Sander Eikelenboom wrote: >> On 08/02/2019 16:10, Roger Pau Monné wrote: >>> On Fri, Jan 25, 2019 at 07:44:40PM +0100, Sander Eikelenboom wrote: On 25/01/2019 15:38, Roger Pau Monné wrote: > On Thu,

Re: [Xen-devel] [Pkg-xen-devel] [admin] [BUG] task jbd2/xvda4-8:174 blocked for more than 120 seconds.

2019-02-08 Thread Hans van Kranenburg
Hi, Upstream mailing list is at: xen-devel@lists.xenproject.org Apparently, x...@packages.debian.org results in a message to pkg-xen-de...@lists.alioth.debian.org On 2/8/19 6:13 PM, Samuel Thibault wrote: > > Sacha, le ven. 08 févr. 2019 18:00:22 +0100, a ecrit: >> On  Debian GNU/Linux

[Xen-devel] [linux-linus test] 132995: trouble: blocked/broken/fail/pass

2019-02-08 Thread osstest service owner
flight 132995 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/132995/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64-xsm

Re: [Xen-devel] XEN on R-CAR H3

2019-02-08 Thread Amit Tomer
Hi, > Would try changes mentioned by you. We managed to boot XEN with dom0 kernel on H3. But we see following , when we try to domU guest: # xl create -c config.xl Parsing config from config.xl libxl: error: libxl_exec.c:118:libxl_report_child_exitstatus: /etc/xen/scripts/block add [2417]

Re: [Xen-devel] [xen-unstable-smoke test] 133030: trouble: blocked/broken/pass

2019-02-08 Thread Wei Liu
CC Stefano as well On Fri, Feb 08, 2019 at 01:14:16PM +, Wei Liu wrote: > On Fri, Feb 08, 2019 at 05:21:44AM +, osstest service owner wrote: > > flight 133030 xen-unstable-smoke real [real] > > http://logs.test-lab.xenproject.org/osstest/logs/133030/ > > > > Failures and problems with

[Xen-devel] [linux-3.18 bisection] complete test-amd64-i386-xl

2019-02-08 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-xl testid xen-boot Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git Tree:

Re: [Xen-devel] [PATCH RFC 16/55] x86/mm: switch to new APIs in map_pages_to_xen

2019-02-08 Thread Wei Liu
On Thu, Feb 07, 2019 at 04:44:17PM +, Wei Liu wrote: > Page tables allocated in that function should be mapped and unmapped > now. > > Signed-off-by: Wei Liu > --- > xen/arch/x86/mm.c | 31 ++- > 1 file changed, 22 insertions(+), 9 deletions(-) > Gitlab CI has

Re: [Xen-devel] [PATCH for-4.12 2/8] amd/ntp: remove assert that prevents creating 2M MMIO entries

2019-02-08 Thread Roger Pau Monné
On Thu, Feb 07, 2019 at 05:21:28PM +, George Dunlap wrote: > On 2/5/19 1:38 PM, Roger Pau Monné wrote: > > On Tue, Feb 05, 2019 at 05:44:14AM -0700, Jan Beulich wrote: > > On 05.02.19 at 11:40, wrote: > >>> On Tue, Feb 05, 2019 at 12:45:56AM -0700, Jan Beulich wrote: > >>> On 04.02.19

[Xen-devel] [xen-unstable-smoke test] 133035: trouble: blocked/broken/pass

2019-02-08 Thread osstest service owner
flight 133035 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/133035/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken

Re: [Xen-devel] [PATCH for-4.12 V2] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Razvan Cojocaru
On 2/8/19 6:44 PM, Jan Beulich wrote: On 08.02.19 at 17:30, wrote: >> On 2/8/19 5:50 PM, Jan Beulich wrote: >> On 08.02.19 at 15:00, wrote: /* If the alternate p2m state has changed, handle appropriately */ -if ( d->arch.altp2m_active != ostate && +

Re: [Xen-devel] Xen-unstable PVHdom0: Assertion 'IS_ALIGNED(dfn_x(dfn), (1ul << page_order))' failed at iommu.c:324

2019-02-08 Thread Roger Pau Monné
On Fri, Feb 08, 2019 at 05:15:22PM +0100, Sander Eikelenboom wrote: > On 08/02/2019 16:10, Roger Pau Monné wrote: > > On Fri, Jan 25, 2019 at 07:44:40PM +0100, Sander Eikelenboom wrote: > >> On 25/01/2019 15:38, Roger Pau Monné wrote: > >>> On Thu, Jan 24, 2019 at 01:04:31PM +0100, Roger Pau Monné

Re: [Xen-devel] [PATCH for-4.12 V2] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Jan Beulich
>>> On 08.02.19 at 17:30, wrote: > On 2/8/19 5:50 PM, Jan Beulich wrote: > On 08.02.19 at 15:00, wrote: >>> /* If the alternate p2m state has changed, handle appropriately */ >>> -if ( d->arch.altp2m_active != ostate && >>> +if ( nstate != ostate && >>>

Re: [Xen-devel] [PATCH for-4.12 V2] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Razvan Cojocaru
On 2/8/19 5:50 PM, Jan Beulich wrote: On 08.02.19 at 15:00, wrote: >> --- a/xen/arch/x86/hvm/hvm.c >> +++ b/xen/arch/x86/hvm/hvm.c >> @@ -4525,7 +4525,7 @@ static int do_altp2m_op( >> case HVMOP_altp2m_set_domain_state: >> { >> struct vcpu *v; >> -bool_t ostate; >>

Re: [Xen-devel] [PATCH v5 7/8] x86/microcode: Synchronize late microcode loading

2019-02-08 Thread Jan Beulich
>>> On 28.01.19 at 08:06, wrote: > @@ -30,18 +31,25 @@ > #include > #include > #include > +#include > #include > #include > #include > +#include > > +#include > #include > #include > #include > #include > > +/* By default, wait for 3us */ > +#define

Re: [Xen-devel] Xen-unstable PVHdom0: Assertion 'IS_ALIGNED(dfn_x(dfn), (1ul << page_order))' failed at iommu.c:324

2019-02-08 Thread Sander Eikelenboom
shing VGA console. (XEN) [2019-02-08 16:06:12.229] *** Serial input to DOM0 (type 'CTRL-a' three times to switch input) (XEN) [2019-02-08 16:06:12.229] Freed 476kB init memory (XEN) [2019-02-08 16:06:12.517] Dom0 callback via changed to Direct Vector 0xf3 [0.00] Linux version 5.0.0-rc5-2019020

Re: [Xen-devel] [PATCH v5 5/8] microcode: split out apply_microcode() from cpu_request_microcode()

2019-02-08 Thread Jan Beulich
>>> On 28.01.19 at 08:06, wrote: > --- a/xen/arch/x86/microcode_amd.c > +++ b/xen/arch/x86/microcode_amd.c > @@ -297,6 +297,10 @@ static int apply_microcode(unsigned int cpu) > > uci->cpu_sig.rev = rev; > > +#if CONFIG_HVM > +svm_host_osvw_init(); > +#endif #ifdef (it's been wrong

Re: [Xen-devel] [PATCH for-4.12 V2] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Jan Beulich
>>> On 08.02.19 at 15:00, wrote: > --- a/xen/arch/x86/hvm/hvm.c > +++ b/xen/arch/x86/hvm/hvm.c > @@ -4525,7 +4525,7 @@ static int do_altp2m_op( > case HVMOP_altp2m_set_domain_state: > { > struct vcpu *v; > -bool_t ostate; > +bool ostate, nstate; > >

Re: [Xen-devel] Xen-unstable PVHdom0: Assertion 'IS_ALIGNED(dfn_x(dfn), (1ul << page_order))' failed at iommu.c:324

2019-02-08 Thread Roger Pau Monné
On Fri, Jan 25, 2019 at 07:44:40PM +0100, Sander Eikelenboom wrote: > On 25/01/2019 15:38, Roger Pau Monné wrote: > > On Thu, Jan 24, 2019 at 01:04:31PM +0100, Roger Pau Monné wrote: > > Sorry, fixing that error took longer than expected, and requires > > modifying quite a lot of code, so I'm not

[Xen-devel] Fetching Xen metrics

2019-02-08 Thread Olivier Lambert
Hi there! Following a Twitter discussion with Netdata people (see https://twitter.com/linuxnetdata/status/1093834441930215425) we would like to help them to build a Netdata plugin [1] for gathering Xen metrics. From the Dom0, no need to access those from the "outside". Right now, there is RRDs

Re: [Xen-devel] SpectreV1+L1TF Patch Series v6

2019-02-08 Thread Julien Grall
Hi, Please don't send the next version in reply-to a random e-mail from the previous version. Instead you should create a new thread to make things easier for review. Cheers, -- Julien Grall ___ Xen-devel mailing list

Re: [Xen-devel] [PATCH for-4.12 V2] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Razvan Cojocaru
On 2/8/19 4:00 PM, Razvan Cojocaru wrote: HVMOP_altp2m_set_domain_state does not domain_pause(), presumably on purpose (as it was originally supposed to cater to a in-guest agent, and a domain pausing itself is not a good idea). This can lead to domain crashes in the vmx_vmexit_handler() code

[Xen-devel] [PATCH for-4.12 V2] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Razvan Cojocaru
HVMOP_altp2m_set_domain_state does not domain_pause(), presumably on purpose (as it was originally supposed to cater to a in-guest agent, and a domain pausing itself is not a good idea). This can lead to domain crashes in the vmx_vmexit_handler() code that checks if the guest has the ability to

[Xen-devel] [PATCH SpectreV1+L1TF v6 9/9] common/memory: block speculative out-of-bound accesses

2019-02-08 Thread Norbert Manthey
The get_page_from_gfn method returns a pointer to a page that belongs to a gfn. Before returning the pointer, the gfn is checked for being valid. Under speculation, these checks can be bypassed, so that the function get_page is still executed partially. Consequently, the function

[Xen-devel] [PATCH SpectreV1+L1TF v6 6/9] is_control_domain: block speculation

2019-02-08 Thread Norbert Manthey
Checks of domain properties, such as is_hardware_domain or is_hvm_domain, might be bypassed by speculatively executing these instructions. A reason for bypassing these checks is that these macros access the domain structure via a pointer, and check a certain field. Since this memory access is

[Xen-devel] [PATCH SpectreV1+L1TF v6 4/9] spec: add l1tf-barrier

2019-02-08 Thread Norbert Manthey
To control the runtime behavior on L1TF vulnerable platforms better, the command line option l1tf-barrier is introduced. This option controls whether on vulnerable x86 platforms the lfence instruction is used to prevent speculative execution from bypassing the evaluation of conditionals that are

[Xen-devel] [PATCH SpectreV1+L1TF v6 5/9] nospec: introduce evaluate_nospec

2019-02-08 Thread Norbert Manthey
Since the L1TF vulnerability of Intel CPUs, loading hypervisor data into L1 cache is problematic, because when hyperthreading is used as well, a guest running on the sibling core can leak this potentially secret data. To prevent these speculative accesses, we block speculation after accessing the

[Xen-devel] [PATCH SpectreV1+L1TF v6 8/9] common/grant_table: block speculative out-of-bound accesses

2019-02-08 Thread Norbert Manthey
Guests can issue grant table operations and provide guest controlled data to them. This data is also used for memory loads. To avoid speculative out-of-bound accesses, we use the array_index_nospec macro where applicable. However, there are also memory accesses that cannot be protected by a single

[Xen-devel] [PATCH SpectreV1+L1TF v6 7/9] is_hvm/pv_domain: block speculation

2019-02-08 Thread Norbert Manthey
When checking for being an hvm domain, or PV domain, we have to make sure that speculation cannot bypass that check, and eventually access data that should not end up in cache for the current domain type. Signed-off-by: Norbert Manthey --- xen/include/xen/sched.h | 6 -- 1 file changed, 4

[Xen-devel] [PATCH SpectreV1+L1TF v6 3/9] x86/hvm: block speculative out-of-bound accesses

2019-02-08 Thread Norbert Manthey
There are multiple arrays in the HVM interface that are accessed with indices that are provided by the guest. To avoid speculative out-of-bound accesses, we use the array_index_nospec macro. When blocking speculative out-of-bound accesses, we can classify arrays into dynamic arrays and static

[Xen-devel] [PATCH SpectreV1+L1TF v6 2/9] x86/vioapic: block speculative out-of-bound accesses

2019-02-08 Thread Norbert Manthey
When interacting with io apic, a guest can specify values that are used as index to structures, and whose values are not compared against upper bounds to prevent speculative out-of-bound accesses. This change prevents these speculative accesses. Furthermore, variables are initialized and the

[Xen-devel] [PATCH SpectreV1+L1TF v6 1/9] xen/evtchn: block speculative out-of-bound accesses

2019-02-08 Thread Norbert Manthey
Guests can issue event channel interaction with guest specified data. To avoid speculative out-of-bound accesses, we use the nospec macros, or the domain_vcpu function. This commit is part of the SpectreV1+L1TF mitigation patch series. Signed-off-by: Norbert Manthey --- Notes: v6: drop vcpu

[Xen-devel] SpectreV1+L1TF Patch Series v6

2019-02-08 Thread Norbert Manthey
Dear all, This patch series attempts to mitigate the issue that have been raised in the XSA-289 (https://xenbits.xen.org/xsa/advisory-289.html). To block speculative execution on Intel hardware, an lfence instruction is required to make sure that selected checks are not bypassed. Speculative

Re: [Xen-devel] [PATCH v2] x86/shadow: adjust minimum allocation calculations

2019-02-08 Thread George Dunlap
On Thu, Feb 7, 2019 at 11:42 AM Jan Beulich wrote: > > A previously bad situation has become worse with the early setting of > ->max_vcpus: The value returned by shadow_min_acceptable_pages() has > further grown, and hence now holds back even more memory from use for > the p2m. > > Make

Re: [Xen-devel] [PATCH for-4.12] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Razvan Cojocaru
On 2/8/19 2:58 PM, Jan Beulich wrote: Well, to be honest I expected dependencies like this to be there, and hence I didn't expect it would be a straightforward change. Just like we do e.g. for the IOMMU enabling, I guess the boolean wants to become a tristate then (off -> enabling -> enabled),

Re: [Xen-devel] [xen-unstable-smoke test] 133030: trouble: blocked/broken/pass

2019-02-08 Thread Wei Liu
On Fri, Feb 08, 2019 at 05:21:44AM +, osstest service owner wrote: > flight 133030 xen-unstable-smoke real [real] > http://logs.test-lab.xenproject.org/osstest/logs/133030/ > > Failures and problems with tests :-( > > Tests which did not succeed and are blocking, > including tests which

Re: [Xen-devel] [PATCH for-4.12] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Jan Beulich
>>> On 08.02.19 at 12:58, wrote: > On 2/8/19 1:13 PM, Razvan Cojocaru wrote: >> On 2/8/19 12:51 PM, Jan Beulich wrote: >> On 08.02.19 at 10:56, wrote: HVMOP_altp2m_set_domain_state does not domain_pause(), presumably on purpose (as it was originally supposed to cater to a in-guest

Re: [Xen-devel] [PATCH for-4.12] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Razvan Cojocaru
On 2/8/19 1:13 PM, Razvan Cojocaru wrote: On 2/8/19 12:51 PM, Jan Beulich wrote: On 08.02.19 at 10:56, wrote: HVMOP_altp2m_set_domain_state does not domain_pause(), presumably on purpose (as it was originally supposed to cater to a in-guest agent, and a domain pausing itself is not a good

Re: [Xen-devel] [PATCH v5 3/8] microcode: introduce the global microcode cache

2019-02-08 Thread Jan Beulich
>>> On 28.01.19 at 08:06, wrote: > @@ -208,6 +210,58 @@ static void microcode_fini_cpu(unsigned int cpu) > spin_unlock(_mutex); > } > > +/* Save a ucode patch to the global cache list */ > +bool save_patch(struct microcode_patch *new_patch) > +{ > +struct microcode_patch

Re: [Xen-devel] [PATCH for-4.12] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Razvan Cojocaru
On 2/8/19 12:51 PM, Jan Beulich wrote: On 08.02.19 at 10:56, wrote: HVMOP_altp2m_set_domain_state does not domain_pause(), presumably on purpose (as it was originally supposed to cater to a in-guest agent, and a domain pausing itself is not a good idea). This can lead to domain crashes in the

Re: [Xen-devel] [PATCH for-4.12 5/8] pvh/dom0: warn when dom0_mem is not set to a fixed value

2019-02-08 Thread George Dunlap
On Thu, Feb 7, 2019 at 5:48 PM Roger Pau Monné wrote: > > On Thu, Feb 07, 2019 at 05:09:14PM +, George Dunlap wrote: > > On Wed, Jan 30, 2019 at 10:37 AM Roger Pau Monne > > wrote: > > > > > > There have been several reports of the dom0 builder running out of > > > memory when buildign a

Re: [Xen-devel] [PATCH for-4.12] xen/arm: gic-v2: deactivate interrupts during initialization

2019-02-08 Thread Peng Fan
> -Original Message- > From: Stefano Stabellini [mailto:sstabell...@kernel.org] > Sent: 2019年2月6日 5:39 > To: xen-devel@lists.xenproject.org > Cc: sstabell...@kernel.org; Stefano Stabellini ; > julien.gr...@arm.com; Peng Fan ; jgr...@suse.com > Subject: [PATCH for-4.12] xen/arm: gic-v2:

Re: [Xen-devel] [PATCH for-4.12] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Jan Beulich
>>> On 08.02.19 at 10:56, wrote: > HVMOP_altp2m_set_domain_state does not domain_pause(), presumably > on purpose (as it was originally supposed to cater to a in-guest > agent, and a domain pausing itself is not a good idea). > > This can lead to domain crashes in the vmx_vmexit_handler() code >

[Xen-devel] [PATCH v4.1 4/6] xen/x86: Allow stubdom access to irq created for msi.

2019-02-08 Thread Marek Marczykowski-Górecki
Stubdomains need to be given sufficient privilege over the guest which it provides emulation for in order for PCI passthrough to work correctly. When a HVM domain try to enable MSI, QEMU in stubdomain calls PHYSDEVOP_map_pirq, but later it needs to call XEN_DOMCTL_bind_pt_irq as part of

Re: [Xen-devel] [PATCH v4 4/6] xen/x86: Allow stubdom access to irq created for msi.

2019-02-08 Thread Marek Marczykowski-Górecki
On Fri, Feb 08, 2019 at 10:35:37AM +0100, Roger Pau Monné wrote: > What about hot-unplug? The proper flow there would be to ask the > stubdomain to detach the device, and only deassign it after the > stubdomain has reported successful detach. I think that's already the > case. I think so. The

[Xen-devel] [PATCH for-4.12] x86/altp2m: fix HVMOP_altp2m_set_domain_state race

2019-02-08 Thread Razvan Cojocaru
HVMOP_altp2m_set_domain_state does not domain_pause(), presumably on purpose (as it was originally supposed to cater to a in-guest agent, and a domain pausing itself is not a good idea). This can lead to domain crashes in the vmx_vmexit_handler() code that checks if the guest has the ability to

Re: [Xen-devel] [PATCH 7/8] x86/mm: handle foreign mappings in p2m_entry_modify

2019-02-08 Thread Roger Pau Monné
On Thu, Feb 07, 2019 at 06:05:24PM +, George Dunlap wrote: > On 2/7/19 5:57 PM, Roger Pau Monné wrote: > > On Thu, Feb 07, 2019 at 05:49:16PM +, George Dunlap wrote: > >> On 1/30/19 10:36 AM, Roger Pau Monne wrote: > >>> diff --git a/xen/include/asm-x86/p2m.h b/xen/include/asm-x86/p2m.h >

Re: [Xen-devel] [PATCH v4 4/6] xen/x86: Allow stubdom access to irq created for msi.

2019-02-08 Thread Roger Pau Monné
On Thu, Feb 07, 2019 at 06:51:57PM +0100, Marek Marczykowski-Górecki wrote: > On Thu, Feb 07, 2019 at 06:40:16PM +0100, Roger Pau Monné wrote: > > On Thu, Feb 07, 2019 at 04:41:38PM +0100, Marek Marczykowski-Górecki wrote: > > > On Thu, Feb 07, 2019 at 03:57:54PM +0100, Roger Pau Monné wrote: > >

Re: [Xen-devel] [PATCH SpectreV1+L1TF v5 5/9] nospec: introduce evaluate_nospec

2019-02-08 Thread Julien Grall
Hi, On 29/01/2019 14:43, Norbert Manthey wrote: Since the L1TF vulnerability of Intel CPUs, loading hypervisor data into L1 cache is problemetic, because when hyperthreading is used as well, a s/problemetic/problematic/ guest running on the sibling core can leak this potentially secret