[xen-4.15-testing test] 162546: tolerable FAIL - PUSHED

2021-06-08 Thread osstest service owner
flight 162546 xen-4.15-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/162546/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stopfail like 162366

[xen-unstable-smoke test] 162554: tolerable all pass - PUSHED

2021-06-08 Thread osstest service owner
flight 162554 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/162554/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

[linux-linus test] 162539: regressions - FAIL

2021-06-08 Thread osstest service owner
flight 162539 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/162539/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 7 xen-install fail REGR. vs. 152332

[xen-unstable-smoke test] 162545: regressions - FAIL

2021-06-08 Thread osstest service owner
flight 162545 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/162545/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 162327 Tests which

Re: [PATCH v8 2/2] xen: Add files needed for minimal riscv build

2021-06-08 Thread Bob Eshleman
On 6/3/21 7:14 PM, Connor Davis wrote: > Add arch-specific makefiles and configs needed to build for > riscv. Also add a minimal head.S that is a simple infinite loop. > head.o can be built with > > $ make XEN_TARGET_ARCH=riscv64 SUBSYSTEMS=xen -C xen tiny64_defconfig > $ make

Xen Summit Design Session notes: Hyperlaunch

2021-06-08 Thread Christopher Clark
Design Session - Hyperlaunch Wednesday 26th May, at the Xen Design and Developer Summit 2021 Session Hosts: Christopher Clark & Daniel Smith tl;dr: - use cases for Hyperlaunch include supporting bare metal apps - latency is a critical requirement for workloads -

[ovmf test] 162542: regressions - FAIL

2021-06-08 Thread osstest service owner
flight 162542 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/162542/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 12 debian-hvm-install fail REGR. vs. 162359

[qemu-mainline test] 162537: regressions - trouble: broken/fail/pass

2021-06-08 Thread osstest service owner
flight 162537 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/162537/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-rtds broken test-amd64-amd64-xl-credit2

Re: [GIT PULL] xen: branch for v5.13-rc6

2021-06-08 Thread pr-tracker-bot
The pull request you sent on Tue, 8 Jun 2021 19:02:53 +0200: > git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git > for-linus-5.13b-rc6-tag has been merged into torvalds/linux.git: https://git.kernel.org/torvalds/c/368094df48e680fa51cedb68537408cfa64b788e Thank you! -- Deet-doot-dot,

[PATCH] x86/tsx: Cope with TSX deprecation on SKL/KBL/CFL/WHL

2021-06-08 Thread Andrew Cooper
The June 2021 microcode is formally de-featuring TSX on the older Skylake client CPUs. The workaround from the March 2019 microcode is being dropped, and replaced with additions to MSR_TSX_FORCE_ABORT to hide the HLE/RTM CPUID bits. With this microcode in place, TSX is disabled by default on

Xen Security Advisory 377 v2 (CVE-2021-28690) - x86: TSX Async Abort protections not restored after S3

2021-06-08 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28690 / XSA-377 version 2 x86: TSX Async Abort protections not restored after S3 UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

Xen Security Advisory 375 v2 (CVE-2021-0089) - Speculative Code Store Bypass

2021-06-08 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-0089 / XSA-375 version 2 Speculative Code Store Bypass UPDATES IN VERSION 2 New 4.12 backport (also targeting 4.11), addressing a

Xen Security Advisory 374 v2 (CVE-2021-28691) - Guest triggered use-after-free in Linux xen-netback

2021-06-08 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28691 / XSA-374 version 2 Guest triggered use-after-free in Linux xen-netback UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION

Xen Security Advisory 372 v3 (CVE-2021-28693) - xen/arm: Boot modules are not scrubbed

2021-06-08 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2021-28693 / XSA-372 version 3 xen/arm: Boot modules are not scrubbed UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION

[GIT PULL] xen: branch for v5.13-rc6

2021-06-08 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-5.13b-rc6-tag xen: branch for v5.13-rc6 It contains a single patch fixing a Xen related security bug: a malicious guest might be able to trigger a "use after free" issue in the

Re: [PATCH v2 2/2] tools/xenstore: set open file descriptor limit for xenstored

2021-06-08 Thread Olaf Hering
Am Tue, 8 Jun 2021 07:58:39 +0200 schrieb Juergen Gross : > +#XENSTORED_MAX_N_DOMAINS=32768 This will break fillup. Provide an empty variable like it is done for a few others in that file. Olaf pgpV5bgbdAXTR.pgp Description: Digitale Signatur von OpenPGP

Re: [PATCH] x86/cpuid: Half revert "x86/cpuid: Drop special_features[]"

2021-06-08 Thread Jan Beulich
On 08.06.2021 18:19, Andrew Cooper wrote: > xen-cpuid does print out the list of special features, and this is helpful to > keep. > > Fixes: ba6950fb070 ("x86/cpuid: Drop special_features[]") > Reported-by: Jan Beulich > Reported-by: Sander Eikelenboom > Signed-off-by: Andrew Cooper Acked-by:

[PATCH] x86/cpuid: Half revert "x86/cpuid: Drop special_features[]"

2021-06-08 Thread Andrew Cooper
xen-cpuid does print out the list of special features, and this is helpful to keep. Fixes: ba6950fb070 ("x86/cpuid: Drop special_features[]") Reported-by: Jan Beulich Reported-by: Sander Eikelenboom Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Roger Pau Monné CC: Wei Liu CC: Sander

[xen-unstable-smoke test] 162544: regressions - FAIL

2021-06-08 Thread osstest service owner
flight 162544 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/162544/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 162327 Tests which

AW: [BUG] Passed through PCI devices lost after Windows HVM DomU reboot

2021-06-08 Thread Paul Leiber
> Von: Jan Beulich > Gesendet: Dienstag, 8. Juni 2021 08:24 > > On 08.06.2021 01:44, Paul Leiber wrote: > > After more testing, I have come to the following conclusion: It seems that > every time I do a _reboot_ from within a Windows DomU, the PCI device > does not get attached to the DomU.

[xen-unstable test] 162533: tolerable FAIL

2021-06-08 Thread osstest service owner
flight 162533 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/162533/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 162475 test-amd64-amd64-qemuu-nested-amd

Re: [PATCH v4 0/5] Fix redefinition errors for toolstack libs

2021-06-08 Thread Christian Lindig
On 8 Jun 2021, at 13:35, Costin Lupu mailto:costin.l...@cs.pub.ro>> wrote: For replication I used gcc 10.3 on an Alpine system. In order to replicate the redefinition error for PAGE_SIZE one should install the 'fortify-headers' package which will change the chain of included headers by

Re: [PATCH v3 4/5] tools/libs/gnttab: Fix PAGE_SIZE redefinition error

2021-06-08 Thread Costin Lupu
Hi Julien, On 5/17/21 9:16 PM, Julien Grall wrote: > Hi Costin, > > On 10/05/2021 09:35, Costin Lupu wrote: >> If PAGE_SIZE is already defined in the system (e.g. in >> /usr/include/limits.h >> header) then gcc will trigger a redefinition error because of -Werror. >> This >> patch replaces usage

Re: [PATCH v3 3/5] tools/libs/foreignmemory: Fix PAGE_SIZE redefinition error

2021-06-08 Thread Costin Lupu
Hi Julien, On 5/17/21 9:12 PM, Julien Grall wrote: > Hi Costin, > > On 10/05/2021 09:35, Costin Lupu wrote: >> @@ -168,7 +168,7 @@ void >> *osdep_xenforeignmemory_map(xenforeignmemory_handle *fmem, >>   size_t i; >>   int rc; >>   -    addr = mmap(addr, num << PAGE_SHIFT, prot, flags |

[qemu-mainline bisection] complete test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow

2021-06-08 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow testid guest-saverestore Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git Tree:

[PATCH v4 5/5] tools/ocaml: Fix redefinition errors

2021-06-08 Thread Costin Lupu
If PAGE_SIZE is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. This patch replaces usage of PAGE_* macros with XC_PAGE_* macros in order to avoid confusion between control domain page granularity (PAGE_*

[PATCH v4 4/5] tools/libs/gnttab: Fix PAGE_SIZE redefinition error

2021-06-08 Thread Costin Lupu
If PAGE_SIZE is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. This patch replaces usage of PAGE_* macros with XC_PAGE_* macros in order to avoid confusion between control domain page granularity (PAGE_*

[PATCH v4 3/5] tools/libs/foreignmemory: Fix PAGE_SIZE redefinition error

2021-06-08 Thread Costin Lupu
If PAGE_SIZE is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. This patch replaces usage of PAGE_* macros with XC_PAGE_* macros in order to avoid confusion between control domain page granularity (PAGE_*

[PATCH v4 2/5] tools/libfsimage: Fix PATH_MAX redefinition error

2021-06-08 Thread Costin Lupu
If PATH_MAX is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. Signed-off-by: Costin Lupu Reviewed-by: Julien Grall --- tools/libfsimage/ext2fs/fsys_ext2fs.c | 2 ++

[PATCH v4 0/5] Fix redefinition errors for toolstack libs

2021-06-08 Thread Costin Lupu
For replication I used gcc 10.3 on an Alpine system. In order to replicate the redefinition error for PAGE_SIZE one should install the 'fortify-headers' package which will change the chain of included headers by indirectly including /usr/include/limits.h where PAGE_SIZE and PATH_MAX are defined.

[PATCH v4 1/5] tools/debugger: Fix PAGE_SIZE redefinition error

2021-06-08 Thread Costin Lupu
If PAGE_SIZE is already defined in the system (e.g. in /usr/include/limits.h header) then gcc will trigger a redefinition error because of -Werror. This patch replaces usage of PAGE_* macros with KDD_PAGE_* macros in order to avoid confusion between control domain page granularity (PAGE_*

Re: xen-unstable build-failure: xg_cpuid_x86.c:99:42: error: ‘INIT_SPECIAL_FEATURES’ undeclared (first use in this function); did you mean ‘INIT_PV_MAX_FEATURES’?

2021-06-08 Thread Andrew Cooper
On 08/06/2021 12:28, Sander Eikelenboom wrote: > L.S., > > I seem to be running into a build error with current xen-unstable. Yeah - that's my fault.  https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=69e1472d21cf7e5cf0795ef38b99d00de78a910e went a little too far, and shouldn't have

xen-unstable build-failure: xg_cpuid_x86.c:99:42: error: ‘INIT_SPECIAL_FEATURES’ undeclared (first use in this function); did you mean ‘INIT_PV_MAX_FEATURES’?

2021-06-08 Thread Sander Eikelenboom
L.S., I seem to be running into a build error with current xen-unstable. -- Sander echo '#if 0' >>/usr/src/new/xen-unstable/xen/include/asm-x86/asm-macros.h.new echo '.endif' >>/usr/src/new/xen-unstable/xen/include/asm-x86/asm-macros.h.new cat asm-macros.i

[xen-unstable-smoke test] 162541: regressions - FAIL

2021-06-08 Thread osstest service owner
flight 162541 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/162541/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 162327 Tests which

Re: [PATCH v8 2/2] xen: Add files needed for minimal riscv build

2021-06-08 Thread Jan Beulich
On 04.06.2021 04:14, Connor Davis wrote: > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -456,6 +456,15 @@ F: tools/libs/light/libxl_nonetbuffer.c > F: tools/hotplug/Linux/remus-netbuf-setup > F: tools/hotplug/Linux/block-drbd-probe > > +RISCV > +M: Bob Eshleman > +M: Alistair

Re: [XEN PATCH] tools/firmware/ovmf: Use OvmfXen platform file is exist

2021-06-08 Thread Anthony PERARD
On Tue, Jun 08, 2021 at 11:29:58AM +0100, Ian Jackson wrote: > Anthony PERARD writes ("[XEN PATCH] tools/firmware/ovmf: Use OvmfXen platform > file is exist"): > > A platform introduced in EDK II named OvmfXen is now the one to use for > > Xen instead of OvmfX64. It comes with PVH support. > > >

Re: [XEN PATCH] tools/firmware/ovmf: Use OvmfXen platform file is exist

2021-06-08 Thread Ian Jackson
Anthony PERARD writes ("[XEN PATCH] tools/firmware/ovmf: Use OvmfXen platform file is exist"): > A platform introduced in EDK II named OvmfXen is now the one to use for > Xen instead of OvmfX64. It comes with PVH support. > > Also, the Xen support in OvmfX64 is deprecated, > "deprecation

[PATCH v2] xen/grant-table: Simplify the update to the per-vCPU maptrack freelist

2021-06-08 Thread Julien Grall
From: Julien Grall Since XSA-228 (commit 02cbeeb62075 "gnttab: split maptrack lock to make it fulfill its purpose again"), v->maptrack_head, v->maptrack_tail and the content of the freelist are accessed with the lock v->maptrack_freelist_lock held. Therefore it is not necessary to update the

Re: [PATCH v20210601 08/38] tools: show migration transfer rate in send_dirty_pages

2021-06-08 Thread Juergen Gross
On 08.06.21 10:58, Olaf Hering wrote: Am Wed, 2 Jun 2021 09:10:44 +0200 schrieb Juergen Gross : MiB_sec = ((ctx->save.pages_sent * PAGE_SIZE * 1000) / ms) / (1024U * 1024U); I'm not sure: how does this improve the patch? The scattered calculation makes it much harder to verify

Re: [PATCH] x86/cpuid: Drop special_features[]

2021-06-08 Thread Jan Beulich
On 08.06.2021 10:46, Andrew Cooper wrote: > On 08/06/2021 07:18, Jan Beulich wrote: >> On 07.06.2021 14:41, Andrew Cooper wrote: >>> While the ! annotation is useful to indicate that something special is >>> happening, an array of bits is not. Drop it, to prevent mistakes. >>> >>> Signed-off-by:

Re: [PATCH] xen/grant-table: Simplify the update to the per-vCPU maptrack freelist

2021-06-08 Thread Julien Grall
Hi Jan, On 28/05/2021 14:29, Jan Beulich wrote: On 26.05.2021 17:21, Julien Grall wrote: From: Julien Grall Since XSA-288 (commit 02cbeeb62075 "gnttab: split maptrack lock to make XSA-228 I suppose? Yes, I will update in the next version. it fulfill its purpose again"),

Re: [PATCH v20210601 08/38] tools: show migration transfer rate in send_dirty_pages

2021-06-08 Thread Olaf Hering
Am Wed, 2 Jun 2021 09:10:44 +0200 schrieb Juergen Gross : > MiB_sec = ((ctx->save.pages_sent * PAGE_SIZE * 1000) / ms) / >(1024U * 1024U); I'm not sure: how does this improve the patch? Olaf pgplvhBZ3WWt2.pgp Description: Digitale Signatur von OpenPGP

Re: [PATCH] x86/cpuid: Drop special_features[]

2021-06-08 Thread Andrew Cooper
On 08/06/2021 07:18, Jan Beulich wrote: > On 07.06.2021 14:41, Andrew Cooper wrote: >> While the ! annotation is useful to indicate that something special is >> happening, an array of bits is not. Drop it, to prevent mistakes. >> >> Signed-off-by: Andrew Cooper >> --- >> CC: Jan Beulich >> CC:

[xen-unstable-smoke test] 162538: regressions - FAIL

2021-06-08 Thread osstest service owner
flight 162538 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/162538/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 162327 Tests which

[linux-linus test] 162532: regressions - FAIL

2021-06-08 Thread osstest service owner
flight 162532 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/162532/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 7 xen-install fail REGR. vs. 152332

[libvirt test] 162535: regressions - FAIL

2021-06-08 Thread osstest service owner
flight 162535 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/162535/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-amd64-libvirt

Re: [PATCH 2/2] libgnttab: Add support for Linux dma-buf offset

2021-06-08 Thread Oleksandr Andrushchenko
Hello, all! I would like to bring back this old thread as it seems it has stuck long time ago without clear NAck or Ack. I didn't rebase the changes because the change itself requires answers on the way we should go here: new ioctl (seems to be better) or extension of the existing one (not

Re: [BUG] Passed through PCI devices lost after Windows HVM DomU reboot

2021-06-08 Thread Jan Beulich
On 08.06.2021 01:44, Paul Leiber wrote: > After more testing, I have come to the following conclusion: It seems that > every time I do a _reboot_ from within a Windows DomU, the PCI device does > not get attached to the DomU. After DomU reboot, it is immediately available > for attachment in

Re: [PATCH] x86/cpuid: Drop special_features[]

2021-06-08 Thread Jan Beulich
On 07.06.2021 14:41, Andrew Cooper wrote: > While the ! annotation is useful to indicate that something special is > happening, an array of bits is not. Drop it, to prevent mistakes. > > Signed-off-by: Andrew Cooper > --- > CC: Jan Beulich > CC: Roger Pau Monné > CC: Wei Liu > --- >