[Xen-devel] [xen-4.10-testing test] 121756: regressions - FAIL

2018-04-04 Thread osstest service owner
flight 121756 xen-4.10-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/121756/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 16 guest-localmigrate/x10 fail REGR. vs.

[Xen-devel] [linux-linus test] 121755: regressions - FAIL

2018-04-04 Thread osstest service owner
flight 121755 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/121755/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-xsm7 xen-boot fail REGR. vs. 118324

Re: [Xen-devel] Problem with Xen 4.7.5

2018-04-04 Thread Steven Haigh
On 2018-04-05 03:22, Ian Jackson wrote: We have discovered a bug in Xen 4.7.5 (related to shadow paging). This bug is a new regression compared to 4.7.4 and does not affect other Xen releases. We are investigating the problem. For now, we recommend that users of 4.7.x do not upgrade to 4.7.5.

[Xen-devel] [PATCH 1/7] tools/libxc: fix strncpy size

2018-04-04 Thread Marek Marczykowski-Górecki
gcc-8 warns about possible truncation of trailing '\0'. Final character is overridden by '\0' anyway, so don't bother to copy it. This fixes compile failure: xc_pm.c: In function 'xc_set_cpufreq_gov': xc_pm.c:308:5: error: 'strncpy' specified bound 16 equals destination size

[Xen-devel] [PATCH 7/7] tools/kdd: mute spurious gcc warning

2018-04-04 Thread Marek Marczykowski-Górecki
gcc-8 complains: kdd.c:698:13: error: 'memcpy' offset [-204, -717] is out of the bounds [0, 216] of object 'ctrl' with type 'kdd_ctrl' {aka 'union '} [-Werror=array-bounds] memcpy(buf, ((uint8_t *)) + offset, len);

[Xen-devel] [PATCH 0/7] Fix warnings found by gcc 8

2018-04-04 Thread Marek Marczykowski-Górecki
A few patches enabling build with gcc 8. Marek Marczykowski-Górecki (7): tools/libxc: fix strncpy size tools/misc: fix hypothetical buffer overflow in xen-lowmemd tools/blktap2: fix hypothetical buffer overflow tools/blktap2: fix possible '\0' truncation tools/xenpmd: fix possible '\0'

[Xen-devel] [PATCH 6/7] tools/gdbsx: fix -Wstringop-truncation warning

2018-04-04 Thread Marek Marczykowski-Górecki
gcc-8 complains: gx_main.c: In function 'prepare_stop_reply': gx_main.c:385:9: error: 'strncpy' output truncated before terminating nul copying 6 bytes from a string of the same length [-Werror=stringop-truncation] strncpy(buf, "watch:", 6);

[Xen-devel] [PATCH 4/7] tools/blktap2: fix possible '\0' truncation

2018-04-04 Thread Marek Marczykowski-Górecki
gcc-8 complains: tapdisk-vbd.c: In function 'tapdisk_vbd_resume_ring': tapdisk-vbd.c:1671:53: error: 'snprintf' output may be truncated before the last format character [-Werror=format-truncation=] snprintf(params.name, sizeof(params.name) - 1, "%s", message);

[Xen-devel] [PATCH 3/7] tools/blktap2: fix hypothetical buffer overflow

2018-04-04 Thread Marek Marczykowski-Górecki
gcc-8 complains: vhd-util-read.c: In function 'vhd_util_read': vhd-util-read.c:50:24: error: '%lu' directive output may be truncated writing between 1 and 20 bytes into a region of size 15 [-Werror=format-truncation=] snprintf(nbuf, nsize, "%" PRIu64, num);

[Xen-devel] [PATCH 2/7] tools/misc: fix hypothetical buffer overflow in xen-lowmemd

2018-04-04 Thread Marek Marczykowski-Górecki
gcc-8 complains: xen-lowmemd.c: In function 'handle_low_mem': xen-lowmemd.c:80:55: error: '%s' directive output may be truncated writing up to 511 bytes into a region of size 489 [-Werror=format-truncation=] snprintf(error, BUFSZ,"Failed to write target %s to xenstore",

[Xen-devel] [PATCH 5/7] tools/xenpmd: fix possible '\0' truncation

2018-04-04 Thread Marek Marczykowski-Górecki
gcc-8 complains: xenpmd.c:207:9: error: 'strncpy' specified bound 32 equals destination size [-Werror=stringop-truncation] strncpy(info->oem_info, attrib_value, 32); ^ xenpmd.c:201:9: error: 'strncpy' specified bound 32

Re: [Xen-devel] [PATCH v2 1/2] xen/arm: Add MVEBU UART driver for Marvell Armada 3700 SoC

2018-04-04 Thread André Przywara
On 05/04/18 00:17, Amit Tomer wrote: > Hi, > >> Ah yes, if that works, we should. That bit is from the Linux BSP, isn't it? > > Yes, it's from Linux BSP code only. Hope following is fine. > > if ( reg & STATUS_TXFIFO_EMP ) > return TX_FIFO_SIZE; > else if ( reg &

Re: [Xen-devel] [PATCH v2 1/2] xen/arm: Add MVEBU UART driver for Marvell Armada 3700 SoC

2018-04-04 Thread Amit Tomer
Hi, > Ah yes, if that works, we should. That bit is from the Linux BSP, isn't it? Yes, it's from Linux BSP code only. Hope following is fine. if ( reg & STATUS_TXFIFO_EMP ) return TX_FIFO_SIZE; else if ( reg & STAT_TX_FIFO_HFL ) return TX_FIFO_SIZE / 2; else if (

Re: [Xen-devel] [PATCH v2 1/2] xen/arm: Add MVEBU UART driver for Marvell Armada 3700 SoC

2018-04-04 Thread André Przywara
On 04/04/18 23:25, Amit Tomer wrote: > Hi, > >> Just a nit, but it might be smarter to first check for the receive IRQ, >> because not handling this might loose information. TX is less critical. > > Ok, actually tried it ealier when I was debugging the Rx path issue and > that time it didn't

Re: [Xen-devel] [PATCH v2 1/2] xen/arm: Add MVEBU UART driver for Marvell Armada 3700 SoC

2018-04-04 Thread Amit Tomer
Hi, > Just a nit, but it might be smarter to first check for the receive IRQ, > because not handling this might loose information. TX is less critical. Ok, actually tried it ealier when I was debugging the Rx path issue and that time it didn't work. May be I should try it again. > Similar to

Re: [Xen-devel] [PATCH] ARM: new VGIC: evtchn: fix potential race in vcpu_mark_events_pending()

2018-04-04 Thread Stefano Stabellini
On Wed, 4 Apr 2018, Andre Przywara wrote: > Hi, > > On 04/04/18 01:04, Stefano Stabellini wrote: > > On Tue, 3 Apr 2018, Julien Grall wrote: > >> On 29/03/18 18:35, Stefano Stabellini wrote: > >>> On Thu, 29 Mar 2018, Andre Przywara wrote: > Stefano pointed out the following situation: >

Re: [Xen-devel] preparations for 4.9.2 and 4.7.5

2018-04-04 Thread Stefano Stabellini
On Wed, 4 Apr 2018, Julien Grall wrote: > Hi Stefano, > > On 04/04/18 00:55, Stefano Stabellini wrote: > > On Tue, 3 Apr 2018, Julien Grall wrote: > > > Hi, > > > > > > On 16/03/18 17:15, Julien Grall wrote: > > > > > > > > > > > > On 16/03/2018 16:56, Julien Grall wrote: > > > > > Hi Stefano,

[Xen-devel] [PATCH v6 7/7] KVM: x86: Allow Qemu/KVM to use PVH entry point

2018-04-04 Thread Maran Wilson
For certain applications it is desirable to rapidly boot a KVM virtual machine. In cases where legacy hardware and software support within the guest is not needed, Qemu should be able to boot directly into the uncompressed Linux kernel binary without the need to run firmware. There already exists

[Xen-devel] [PATCH v6 6/7] xen/pvh: Add memory map pointer to hvm_start_info struct

2018-04-04 Thread Maran Wilson
The start info structure that is defined as part of the x86/HVM direct boot ABI and used for starting Xen PVH guests would be more versatile if it also included a way to pass information about the memory map to the guest. This would allow KVM guests to share the same entry point. Signed-off-by:

[Xen-devel] [PATCH v6 4/7] xen/pvh: Move Xen specific PVH VM initialization out of common file

2018-04-04 Thread Maran Wilson
We need to refactor PVH entry code so that support for other hypervisors like Qemu/KVM can be added more easily. This patch moves the small block of code used for initializing Xen PVH virtual machines into the Xen specific file. This initialization is not going to be needed for Qemu/KVM guests.

[Xen-devel] [PATCH v6 5/7] xen/pvh: Move Xen code for getting mem map via hcall out of common file

2018-04-04 Thread Maran Wilson
We need to refactor PVH entry code so that support for other hypervisors like Qemu/KVM can be added more easily. The original design for PVH entry in Xen guests relies on being able to obtain the memory map from the hypervisor using a hypercall. When we extend the PVH entry ABI to support other

[Xen-devel] [PATCH v6 3/7] xen/pvh: Create a new file for Xen specific PVH code

2018-04-04 Thread Maran Wilson
We need to refactor PVH entry code so that support for other hypervisors like Qemu/KVM can be added more easily. The first step in that direction is to create a new file that will eventually hold the Xen specific routines. Signed-off-by: Maran Wilson ---

[Xen-devel] [PATCH v6 2/7] xen/pvh: Move PVH entry code out of Xen specific tree

2018-04-04 Thread Maran Wilson
Once hypervisors other than Xen start using the PVH entry point for starting VMs, we would like the option of being able to compile PVH entry capable kernels without enabling CONFIG_XEN and all the code that comes along with that. To allow that, we are moving the PVH code out of Xen and into files

[Xen-devel] [PATCH v6 1/7] xen/pvh: Split CONFIG_XEN_PVH into CONFIG_PVH and CONFIG_XEN_PVH

2018-04-04 Thread Maran Wilson
In order to pave the way for hypervisors other than Xen to use the PVH entry point for VMs, we need to factor the PVH entry code into Xen specific and hypervisor agnostic components. The first step in doing that, is to create a new config option for PVH entry that can be enabled independently from

[Xen-devel] [PATCH v6 0/7] KVM: x86: Allow Qemu/KVM to use PVH entry point

2018-04-04 Thread Maran Wilson
For certain applications it is desirable to rapidly boot a KVM virtual machine. In cases where legacy hardware and software support within the guest is not needed, Qemu should be able to boot directly into the uncompressed Linux kernel binary without the need to run firmware. There already exists

[Xen-devel] [xen-unstable test] 121749: regressions - trouble: broken/fail/pass

2018-04-04 Thread osstest service owner
flight 121749 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/121749/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt broken test-amd64-i386-xl-qemut-win7-amd64

[Xen-devel] [xen-unstable-smoke test] 121791: tolerable all pass - PUSHED

2018-04-04 Thread osstest service owner
flight 121791 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/121791/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: [Xen-devel] [PATCH v2 1/2] xen/arm: Add MVEBU UART driver for Marvell Armada 3700 SoC

2018-04-04 Thread Andre Przywara
Hi, On 03/04/18 14:49, Amit Singh Tomar wrote: > This patch adds driver for UART controller found on Armada 3700 SoC. > > There is no reference manuals available for 3700 SoC in public and it > is derived by looking at Linux driver[1]. > >

Re: [Xen-devel] [PATCH v3] libxl: add libxl_domain_suspend_only to simply suspend a domain, without saving it

2018-04-04 Thread Wei Liu
On Wed, Apr 04, 2018 at 07:01:12PM +0200, Marek Marczykowski-Górecki wrote: > Similar functionality to libxl_domain_suspend(), but do not save domains > state to any file. Only suspend the domain and keep it in suspended > shutdown state (do not destroy it). Such domain can be later woken up >

[Xen-devel] Problem with Xen 4.7.5

2018-04-04 Thread Ian Jackson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 We have discovered a bug in Xen 4.7.5 (related to shadow paging). This bug is a new regression compared to 4.7.4 and does not affect other Xen releases. We are investigating the problem. For now, we recommend that users of 4.7.x do not upgrade to

[Xen-devel] [PATCH v3] libxl: add libxl_domain_suspend_only to simply suspend a domain, without saving it

2018-04-04 Thread Marek Marczykowski-Górecki
Similar functionality to libxl_domain_suspend(), but do not save domains state to any file. Only suspend the domain and keep it in suspended shutdown state (do not destroy it). Such domain can be later woken up with libxl_domain_resume. The main reason for this functionality is to suspend the host

[Xen-devel] [xtf test] 121750: all pass - PUSHED

2018-04-04 Thread osstest service owner
flight 121750 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/121750/ Perfect :-) All tests in this flight passed as required version targeted for testing: xtf 086cad25a948e54cf84319f94c1799cbcf6b4d97 baseline version: xtf

[Xen-devel] [xen-4.6-testing test] 121744: regressions - FAIL

2018-04-04 Thread osstest service owner
flight 121744 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/121744/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-intel 17 debian-hvm-install/l1/l2 fail REGR. vs. 119227 Tests

Re: [Xen-devel] Patches for stable

2018-04-04 Thread Juergen Gross
On 04/04/18 17:42, Greg KH wrote: > On Wed, Apr 04, 2018 at 05:12:32PM +0200, Juergen Gross wrote: >> On 04/04/18 16:46, Greg KH wrote: >>> On Wed, Apr 04, 2018 at 04:30:30PM +0200, Juergen Gross wrote: On 04/04/18 16:27, Greg KH wrote: > On Wed, Apr 04, 2018 at 12:38:43PM +0200, Juergen

Re: [Xen-devel] [PATCH] pci: a workaround for nonstandard PCI devices whose PBA shares

2018-04-04 Thread Chao Gao
On Wed, Apr 04, 2018 at 04:45:32PM +0100, Roger Pau Monné wrote: >On Wed, Apr 04, 2018 at 11:29:39PM +0800, Chao Gao wrote: >> ... the same page with other registers which are not relevant to MSI-X. Xen >> marks pages where PBA resides as read-only. When assigning such devices to >> guest, device

Re: [Xen-devel] [PATCH v2] libxl: allow libxl_domain_suspend to simply suspend a domain, without saving it

2018-04-04 Thread Ian Jackson
Marek Marczykowski-Górecki writes ("Re: [PATCH v2] libxl: allow libxl_domain_suspend to simply suspend a domain, without saving it"): > Fine with me too. > > Should I add also #define HAVE_DOMAIN_SUSPEND_ONLY or such? Yes. Thanks, and sorry to quibble about these kind of details. Ian.

Re: [Xen-devel] [PATCH v2 2/2] xen/arm: Add Marvell ARMADA 3700 early printk support

2018-04-04 Thread Andre Przywara
Hi, one more thing ... On 04/04/18 16:34, Andre Przywara wrote: > Hi, > > On 03/04/18 14:49, Amit Singh Tomar wrote: >> diff --git a/xen/arch/arm/arm64/debug-mvebu.inc >> b/xen/arch/arm/arm64/debug-mvebu.inc >> new file mode 100644 >> index 000..ac48889 >> --- /dev/null >> +++

Re: [Xen-devel] [PATCH v2] libxl: allow libxl_domain_suspend to simply suspend a domain, without saving it

2018-04-04 Thread Marek Marczykowski-Górecki
On Wed, Apr 04, 2018 at 04:45:51PM +0100, Ian Jackson wrote: > Marek Marczykowski-Górecki writes ("Re: [PATCH v2] libxl: allow > libxl_domain_suspend to simply suspend a domain, without saving it"): > > On Wed, Mar 28, 2018 at 12:20:25PM +0100, Ian Jackson wrote: > > > I agree that

[Xen-devel] [PATCH 6/7] add mspin_sleep function to time manager

2018-04-04 Thread Pawel Wieczorkiewicz
From: Paul Semel Signed-off-by: Paul Semel cr https://code.amazon.com/reviews/CR-786227 --- common/time.c | 14 ++ 1 file changed, 14 insertions(+) diff --git a/common/time.c b/common/time.c index 6aa1648..7577694 100644 --- a/common/time.c

[Xen-devel] [PATCH 2/7] add current_time function to time manager

2018-04-04 Thread Pawel Wieczorkiewicz
From: Paul Semel this function returns the "epoch" time Signed-off-by: Paul Semel cr https://code.amazon.com/reviews/CR-786224 --- common/time.c | 16 include/xtf/time.h | 4 2 files changed, 20 insertions(+) diff --git

[Xen-devel] [PATCH 3/7] add gettimeofday function to time managment

2018-04-04 Thread Pawel Wieczorkiewicz
From: Paul Semel Signed-off-by: Paul Semel cr https://code.amazon.com/reviews/CR-786225 --- common/time.c | 14 ++ include/xtf/time.h | 12 2 files changed, 26 insertions(+) diff --git a/common/time.c b/common/time.c index

[Xen-devel] [PATCH 4/7] add nspin_sleep function to time manager

2018-04-04 Thread Pawel Wieczorkiewicz
From: Paul Semel Signed-off-by: Paul Semel cr https://code.amazon.com/reviews/CR-836539 --- common/time.c | 18 ++ 1 file changed, 18 insertions(+) diff --git a/common/time.c b/common/time.c index c80bc11..db28d78 100644 ---

[Xen-devel] [PATCH 1/7] introduce time managment in xtf

2018-04-04 Thread Pawel Wieczorkiewicz
From: Paul Semel this file is introduce to be able to implement an inter domain communication protocol over xenstore. For synchronization purpose, we do really want to be able to "control" time common/time.c: since_boot_time gets the time in nanoseconds from the moment the VM

[Xen-devel] [PATCH 7/7] add sleep, msleep and NOW() macros to time manager

2018-04-04 Thread Pawel Wieczorkiewicz
From: Paul Semel Signed-off-by: Paul Semel cr https://code.amazon.com/reviews/CR-786228 --- common/time.c | 18 ++ include/xtf/time.h | 16 2 files changed, 34 insertions(+) diff --git a/common/time.c b/common/time.c

Re: [Xen-devel] [PATCH] pci: a workaround for nonstandard PCI devices whose PBA shares

2018-04-04 Thread Roger Pau Monné
On Wed, Apr 04, 2018 at 11:29:39PM +0800, Chao Gao wrote: > ... the same page with other registers which are not relevant to MSI-X. Xen > marks pages where PBA resides as read-only. When assigning such devices to > guest, device driver writes MSI-X irrelevant registers on those pages would > lead

Re: [Xen-devel] [PATCH v2] libxl: allow libxl_domain_suspend to simply suspend a domain, without saving it

2018-04-04 Thread Ian Jackson
Marek Marczykowski-Górecki writes ("Re: [PATCH v2] libxl: allow libxl_domain_suspend to simply suspend a domain, without saving it"): > On Wed, Mar 28, 2018 at 12:20:25PM +0100, Ian Jackson wrote: > > I agree that libxl_domain_suspend is an unfortunate name, but can't we > > come up with an

Re: [Xen-devel] [PATCH v2] libxl: allow libxl_domain_suspend to simply suspend a domain, without saving it

2018-04-04 Thread Marek Marczykowski-Górecki
On Wed, Mar 28, 2018 at 12:20:25PM +0100, Ian Jackson wrote: > Wei Liu writes ("Re: [PATCH v2] libxl: allow libxl_domain_suspend to simply > suspend a domain, without saving it"): > > On Wed, Mar 14, 2018 at 03:36:08PM +0100, Marek Marczykowski-Górecki wrote: > > > When LIBXL_SUSPEND_NO_SAVE flag

Re: [Xen-devel] Patches for stable

2018-04-04 Thread Greg KH
On Wed, Apr 04, 2018 at 05:12:32PM +0200, Juergen Gross wrote: > On 04/04/18 16:46, Greg KH wrote: > > On Wed, Apr 04, 2018 at 04:30:30PM +0200, Juergen Gross wrote: > >> On 04/04/18 16:27, Greg KH wrote: > >>> On Wed, Apr 04, 2018 at 12:38:43PM +0200, Juergen Gross wrote: > Please add the

Re: [Xen-devel] [PATCH v2 2/2] xen/arm: Add Marvell ARMADA 3700 early printk support

2018-04-04 Thread Andre Przywara
Hi, On 03/04/18 14:49, Amit Singh Tomar wrote: > Signed-off-by: Amit Singh Tomar > --- > Changes since v1: > * Removed header file dependency. > > --- > docs/misc/arm/early-printk.txt | 1 + > xen/arch/arm/Rules.mk | 1 + >

[Xen-devel] [PATCH] pci: a workaround for nonstandard PCI devices whose PBA shares

2018-04-04 Thread Chao Gao
... the same page with other registers which are not relevant to MSI-X. Xen marks pages where PBA resides as read-only. When assigning such devices to guest, device driver writes MSI-X irrelevant registers on those pages would lead to an EPT violation and the guest is destroyed because no handler

Re: [Xen-devel] Xen-4.10 Domain-0 crashes at bootup

2018-04-04 Thread Juergen Gross
On 04/04/18 17:00, M A Young wrote: > On Wed, 4 Apr 2018, Ajay Garg wrote: > >> Thanks Michael for the reply. >> >> I want to give this patch a try, as the symptoms look identical. >> However, I see no xen-head.S when I clone the repo from >> git://xenbits.xen.org/xen.git >> >> What am I missing?

Re: [Xen-devel] Patches for stable

2018-04-04 Thread Juergen Gross
On 04/04/18 16:46, Greg KH wrote: > On Wed, Apr 04, 2018 at 04:30:30PM +0200, Juergen Gross wrote: >> On 04/04/18 16:27, Greg KH wrote: >>> On Wed, Apr 04, 2018 at 12:38:43PM +0200, Juergen Gross wrote: Please add the patches: commit 038bac2b02989acf1fc938cedcb7944c02672b9f upstream

Re: [Xen-devel] Xen-4.10 Domain-0 crashes at bootup

2018-04-04 Thread M A Young
On Wed, 4 Apr 2018, Ajay Garg wrote: > Thanks Michael for the reply. > > I want to give this patch a try, as the symptoms look identical. > However, I see no xen-head.S when I clone the repo from > git://xenbits.xen.org/xen.git > > What am I missing? The patch is for the xen code in the

Re: [Xen-devel] Make coverity results public

2018-04-04 Thread Wei Liu
On Wed, Apr 04, 2018 at 03:47:44PM +0100, Lars Kurth wrote: > > On 28/03/2018, 19:23, "George Dunlap" wrote: > > > > > Lars, if you don't object I'm going to open up the results. And I will > > leave the task to update the contribution guide webpage to

Re: [Xen-devel] Make coverity results public

2018-04-04 Thread Lars Kurth
On 28/03/2018, 19:23, "George Dunlap" wrote: > > Lars, if you don't object I'm going to open up the results. And I will > leave the task to update the contribution guide webpage to you. :-) I'd wait at least until EOD Thursday. :-) Sure. I

Re: [Xen-devel] Xen-4.10 Domain-0 crashes at bootup

2018-04-04 Thread Ajay Garg
Thanks Michael for the reply. I want to give this patch a try, as the symptoms look identical. However, I see no xen-head.S when I clone the repo from git://xenbits.xen.org/xen.git What am I missing? Thanks and Regards, Ajay > > It is a kernel problem under some compile conditions. See for

Re: [Xen-devel] Patches for stable

2018-04-04 Thread Greg KH
On Wed, Apr 04, 2018 at 04:30:30PM +0200, Juergen Gross wrote: > On 04/04/18 16:27, Greg KH wrote: > > On Wed, Apr 04, 2018 at 12:38:43PM +0200, Juergen Gross wrote: > >> Please add the patches: > >> > >> commit 038bac2b02989acf1fc938cedcb7944c02672b9f upstream > >> commit

Re: [Xen-devel] Patches for stable

2018-04-04 Thread Juergen Gross
On 04/04/18 16:27, Greg KH wrote: > On Wed, Apr 04, 2018 at 12:38:43PM +0200, Juergen Gross wrote: >> Please add the patches: >> >> commit 038bac2b02989acf1fc938cedcb7944c02672b9f upstream >> commit dfc9327ab7c99bc13e12106448615efba833886b upstream >> commit

Re: [Xen-devel] Patches for stable

2018-04-04 Thread Greg KH
On Wed, Apr 04, 2018 at 12:38:43PM +0200, Juergen Gross wrote: > Please add the patches: > > commit 038bac2b02989acf1fc938cedcb7944c02672b9f upstream > commit dfc9327ab7c99bc13e12106448615efba833886b upstream > commit b17d9d1df3c33a4f1d2bf397e2257aecf9dc56d4 upstream > > to the 4.15 and 4.16

[Xen-devel] [xen-unstable-smoke test] 121776: tolerable all pass - PUSHED

2018-04-04 Thread osstest service owner
flight 121776 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/121776/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

[Xen-devel] [OSSTEST PATCH] crontabs: Add warning not to just "crontab -e"

2018-04-04 Thread Ian Jackson
Signed-off-by: Ian Jackson --- crontab | 4 crontab-cambridge | 4 2 files changed, 8 insertions(+) diff --git a/crontab b/crontab index 3c8c8cc..e7f2ad3 100755 --- a/crontab +++ b/crontab @@ -1,6 +1,10 @@ #!/bin/bash ./mg-crontab-install #@@

Re: [Xen-devel] [PATCH] ARM: new VGIC: evtchn: fix potential race in vcpu_mark_events_pending()

2018-04-04 Thread Andre Przywara
Hi, On 04/04/18 01:04, Stefano Stabellini wrote: > On Tue, 3 Apr 2018, Julien Grall wrote: >> On 29/03/18 18:35, Stefano Stabellini wrote: >>> On Thu, 29 Mar 2018, Andre Przywara wrote: Stefano pointed out the following situation: -- 1) vcpuA/cpuA is running, it

[Xen-devel] [linux-4.9 test] 121738: tolerable FAIL - PUSHED

2018-04-04 Thread osstest service owner
flight 121738 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/121738/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stopfail like 121371 test-amd64-i386-xl-qemut-win7-amd64 17

Re: [Xen-devel] Xen development link

2018-04-04 Thread Praveen Kumar
On Wed, Apr 4, 2018 at 5:17 PM, Lars Kurth wrote: > Hi Praveen, > > On 4 Apr 2018, at 12:42, Praveen Kumar wrote: > > On Wed, Apr 4, 2018 at 3:50 PM, Roger Pau Monné > wrote: > > On Wed, Apr 04, 2018 at 02:40:45PM +0530,

Re: [Xen-devel] Xen-4.10 Domain-0 crashes at bootup

2018-04-04 Thread Jason Andryuk
On Wed, Apr 4, 2018 at 6:25 AM, Juergen Gross wrote: > On 04/04/18 12:07, M A Young wrote: >> On Wed, 4 Apr 2018, Ajay Garg wrote: >> >>> Since I failed to get a single reply on my original issue as per >>>

Re: [Xen-devel] [PATCH v11] x86/altp2m: support for setting restrictions for an array of pages

2018-04-04 Thread George Dunlap
On 03/30/2018 04:39 PM, Petre Pircalabu wrote: > From: Razvan Cojocaru > > For the default EPT view we have xc_set_mem_access_multi(), which > is able to set an array of pages to an array of access rights with > a single hypercall. However, this functionality was

Re: [Xen-devel] Xen development link

2018-04-04 Thread Lars Kurth
Hi Praveen, > On 4 Apr 2018, at 12:42, Praveen Kumar wrote: > > On Wed, Apr 4, 2018 at 3:50 PM, Roger Pau Monné > wrote: >> On Wed, Apr 04, 2018 at 02:40:45PM +0530, Praveen Kumar wrote: >>> On Wed, Apr 4, 2018 at

Re: [Xen-devel] [PATCH v4 8/8] x86: avoid double CR3 reload when switching to guest user mode

2018-04-04 Thread Juergen Gross
On 19/03/18 14:41, Jan Beulich wrote: > When XPTI is active, the CR3 load in restore_all_guest is sufficient > when switching to user mode, improving in particular system call and > page fault exit paths for the guest. > > Signed-off-by: Jan Beulich > Tested-by: Juergen Gross

Re: [Xen-devel] [PATCH] x86/hvm/ioreq: fix out of bounds access in error path

2018-04-04 Thread Andrew Cooper
On 04/04/18 12:11, Paul Durrant wrote: >> -Original Message- >> From: Wei Liu [mailto:wei.l...@citrix.com] >> Sent: 04 April 2018 12:03 >> To: Xen-devel >> Cc: Wei Liu ; Jan Beulich ; >> Andrew Cooper

Re: [Xen-devel] [PATCH] x86/hvm/ioreq: fix out of bounds access in error path

2018-04-04 Thread Paul Durrant
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: 04 April 2018 12:03 > To: Xen-devel > Cc: Wei Liu ; Jan Beulich ; > Andrew Cooper ; Paul Durrant >

[Xen-devel] Xen 4.7.5 and 4.9.2 released

2018-04-04 Thread Lars Kurth
All, I am pleased to announce the releases of Xen 4.7.5 and Xen 4.9.2. These are available immediately from their git repositories and Xen Project download pages (where a list of changes can also be found). We recommend all users of the 4.7 and 4.9 stable series to update to these latest point

[Xen-devel] [PATCH] x86/hvm/ioreq: fix out of bounds access in error path

2018-04-04 Thread Wei Liu
It is possible to call the error path with i pointing beyond the end of the array. There is another bug that if there is already a default ioreq server, the code will actually sets the element to NULL, hence leaking memory. Move setting NULL to where it is needed. Coverity-ID: 1433777

[Xen-devel] [xen-unstable-coverity test] 121767: all pass - PUSHED

2018-04-04 Thread osstest service owner
flight 121767 xen-unstable-coverity real [real] http://logs.test-lab.xenproject.org/osstest/logs/121767/ Perfect :-) All tests in this flight passed as required version targeted for testing: xen 913acc1aa019054742217926dea0827e7a9df02e baseline version: xen

Re: [Xen-devel] preparations for 4.9.2 and 4.7.5

2018-04-04 Thread Lars Kurth
Alright, these are now at * https://xenproject.org/downloads/xen-archives/xen-project-47-series/xen-475.html * https://xenproject.org/downloads/xen-archives/xen-project-49-series/xen-492.html Blog post and mails will follow shortly (as Jan is OO today) Regards Lars On 04/04/2018, 11:37, "Lars

[Xen-devel] [libvirt test] 121735: regressions - FAIL

2018-04-04 Thread osstest service owner
flight 121735 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/121735/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-libvirt-qcow2 10 debian-di-install fail REGR. vs. 121707 Tests which did not

Re: [Xen-devel] Xen development link

2018-04-04 Thread Praveen Kumar
On Wed, Apr 4, 2018 at 3:50 PM, Roger Pau Monné wrote: > On Wed, Apr 04, 2018 at 02:40:45PM +0530, Praveen Kumar wrote: >> On Wed, Apr 4, 2018 at 2:32 PM, Praveen Kumar >> wrote: >> > On Wed, Apr 4, 2018 at 1:11 PM, Roger Pau Monné

Re: [Xen-devel] [PATCH v2] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot

2018-04-04 Thread Daniel Kiper
On Tue, Apr 03, 2018 at 10:00:52AM -0700, James Bottomley wrote: > On Tue, 2018-04-03 at 18:07 +0200, Daniel Kiper wrote: > > On Tue, Apr 03, 2018 at 08:44:41AM -0700, James Bottomley wrote: [...] > > > This looks like a bad idea: you're duplicating the secure boot > > > check in > > > > > >

[Xen-devel] Patches for stable

2018-04-04 Thread Juergen Gross
Please add the patches: commit 038bac2b02989acf1fc938cedcb7944c02672b9f upstream commit dfc9327ab7c99bc13e12106448615efba833886b upstream commit b17d9d1df3c33a4f1d2bf397e2257aecf9dc56d4 upstream to the 4.15 and 4.16 stable kernels. Those patches are needed to boot Linux as PVH guest on recent

Re: [Xen-devel] Xen-4.10 Domain-0 crashes at bootup

2018-04-04 Thread Juergen Gross
On 04/04/18 12:07, M A Young wrote: > On Wed, 4 Apr 2018, Ajay Garg wrote: > >> Since I failed to get a single reply on my original issue as per >> https://lists.xenproject.org/archives/html/minios-devel/2018-04/msg4.html, >> so I had no option but to try on a newer xen version. >> >> So, I

Re: [Xen-devel] Xen development link

2018-04-04 Thread Roger Pau Monné
On Wed, Apr 04, 2018 at 02:40:45PM +0530, Praveen Kumar wrote: > On Wed, Apr 4, 2018 at 2:32 PM, Praveen Kumar wrote: > > On Wed, Apr 4, 2018 at 1:11 PM, Roger Pau Monné > > wrote: > >> On Wed, Apr 04, 2018 at 10:08:29AM +0530, Praveen Kumar wrote:

Re: [Xen-devel] Xen-4.10 Domain-0 crashes at bootup

2018-04-04 Thread M A Young
On Wed, 4 Apr 2018, Ajay Garg wrote: > Since I failed to get a single reply on my original issue as per > https://lists.xenproject.org/archives/html/minios-devel/2018-04/msg4.html, > so I had no option but to try on a newer xen version. > > So, I created a new virtualbox-guest, and

[Xen-devel] [ovmf test] 121741: all pass - PUSHED

2018-04-04 Thread osstest service owner
flight 121741 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/121741/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf c4172f80051effc62f3eceeeced4c0b66a80eb94 baseline version: ovmf

Re: [Xen-devel] preparations for 4.9.2 and 4.7.5

2018-04-04 Thread Lars Kurth
Folks, I have not created the webpages for these. The script I am using to generate these depends on a script in xsa.git, which fails at the moment due to a missing new package dependency that I can't resolve as I don't have root access Lars On 04/04/2018, 10:59, "Julien Grall"

[Xen-devel] Xen-4.10 Domain-0 crashes at bootup

2018-04-04 Thread Ajay Garg
Since I failed to get a single reply on my original issue as per https://lists.xenproject.org/archives/html/minios-devel/2018-04/msg4.html, so I had no option but to try on a newer xen version. So, I created a new virtualbox-guest, and followed the steps as per

[Xen-devel] [xen-unstable bisection] complete test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm

2018-04-04 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm testid debian-hvm-install Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu

Re: [Xen-devel] Xen development link

2018-04-04 Thread Praveen Kumar
On Wed, Apr 4, 2018 at 2:32 PM, Praveen Kumar wrote: > On Wed, Apr 4, 2018 at 1:11 PM, Roger Pau Monné wrote: >> On Wed, Apr 04, 2018 at 10:08:29AM +0530, Praveen Kumar wrote: >>> Hi, >>> >>> I came across Xen development link ( >>>

Re: [Xen-devel] preparations for 4.9.2 and 4.7.5

2018-04-04 Thread Julien Grall
Hi Stefano, On 04/04/18 00:55, Stefano Stabellini wrote: On Tue, 3 Apr 2018, Julien Grall wrote: Hi, On 16/03/18 17:15, Julien Grall wrote: On 16/03/2018 16:56, Julien Grall wrote: Hi Stefano, On 16/03/2018 16:33, Stefano Stabellini wrote: On Fri, 16 Mar 2018, Julien Grall wrote: Hi

Re: [Xen-devel] Xen development link

2018-04-04 Thread Praveen Kumar
On Wed, Apr 4, 2018 at 1:11 PM, Roger Pau Monné wrote: > On Wed, Apr 04, 2018 at 10:08:29AM +0530, Praveen Kumar wrote: >> Hi, >> >> I came across Xen development link ( >> https://xenorg.uservoice.com/forums/172169-xen-development ) which was >> lastly updated in Jul 2017 (

Re: [Xen-devel] [PATCH v11] x86/altp2m: support for setting restrictions for an array of pages

2018-04-04 Thread Razvan Cojocaru
On 03/30/2018 06:39 PM, Petre Pircalabu wrote: > From: Razvan Cojocaru > > For the default EPT view we have xc_set_mem_access_multi(), which > is able to set an array of pages to an array of access rights with > a single hypercall. However, this functionality was

Re: [Xen-devel] [RFC PATCH] Make Security Policy Doc ready to become a CNA

2018-04-04 Thread Lars Kurth
Ian, can we agree on a final URL for the generated docs (the ones generated from SUPPORT.md). That would enable me to send out a new series Lars From: Lars Kurth Date: Wednesday, 21 March 2018 at 09:18 To: George Dunlap Cc: Lars Kurth

Re: [Xen-devel] Xen development link

2018-04-04 Thread Roger Pau Monné
On Wed, Apr 04, 2018 at 10:08:29AM +0530, Praveen Kumar wrote: > Hi, > > I came across Xen development link ( > https://xenorg.uservoice.com/forums/172169-xen-development ) which was > lastly updated in Jul 2017 ( around ). > This looks great to me, but just wanted to check if we are still >

[Xen-devel] [qemu-mainline test] 121732: regressions - FAIL

2018-04-04 Thread osstest service owner
flight 121732 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/121732/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-intel 14 xen-boot/l1 fail REGR. vs. 120095

Re: [Xen-devel] [linux-linus bisection] complete test-amd64-amd64-xl-pvhv2-amd

2018-04-04 Thread Juergen Gross
On 03/04/18 18:55, Sander Eikelenboom wrote: > On 03/04/18 12:29, Juergen Gross wrote: >> On 03/04/18 12:19, osstest service owner wrote: >>> branch xen-unstable >>> xenbranch xen-unstable >>> job test-amd64-amd64-xl-pvhv2-amd >>> testid guest-start >>> >>> Tree: linux >>>

Re: [Xen-devel] [PATCH v4 1/8] x86: NOP out XPTI entry/exit code when it's not in use

2018-04-04 Thread Juergen Gross
On 03/04/18 19:48, Juergen Gross wrote: > On 19/03/18 14:37, Jan Beulich wrote: >> Introduce a synthetic feature flag to use alternative instruction >> patching to NOP out all code on entry/exit paths. Having NOPs here is >> generally better than using conditional branches. >> >> Also change the