[Xen-devel] [xen-4.8-testing baseline-only test] 74726: regressions - FAIL

2018-05-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 74726 xen-4.8-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74726/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 6 xen-install

[Xen-devel] [linux-3.18 test] 122884: regressions - FAIL

2018-05-18 Thread osstest service owner
flight 122884 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/122884/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-shadow 12 guest-start fail REGR. vs. 122565 test-amd64-i386-xl-q

[Xen-devel] [libvirt test] 122887: regressions - FAIL

2018-05-18 Thread osstest service owner
flight 122887 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/122887/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-xsm 12 guest-start fail REGR. vs. 122801 test-amd64-amd64-libvir

Re: [Xen-devel] [PATCH 4/6] arm: add a small kconfig for Renesas RCar H3

2018-05-18 Thread Stefano Stabellini
On Tue, 24 Apr 2018, Julien Grall wrote: > Hi, > > On 04/24/2018 03:18 PM, Andrii Anisov wrote: > > > > > Can you quantify what would be the cost of keeping that code around for > > > IOMMU-less platform? > > I'm not sure I understand your question. Do you mean a number of loc of the > > passthro

[Xen-devel] [ovmf test] 122885: all pass - PUSHED

2018-05-18 Thread osstest service owner
flight 122885 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/122885/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3f34e36d04a8de4992a696f738643b5a11261469 baseline version: ovmf 0edb7ec5ced0a28b93bf8

Re: [Xen-devel] [MirageOS-devel] ViryaOS: proposal for a new Xen Project sub-project

2018-05-18 Thread Stefano Stabellini
Thank you, Lars. On Fri, 18 May 2018, Lars Kurth wrote: > Hi Stefano, > what we also need for the project proposal are > > Sponsor: A sponsor can be a member of the project leadership team of a mature > project, a member of the advisory board or the > community manager. This ensures that a disti

Re: [Xen-devel] [PATCH 6/7] drivers/passthrough/arm: Refactor code for arm smmu drivers

2018-05-18 Thread Sameer Goel
On 2/9/2018 4:02 AM, Roger Pau Monné wrote: > On Fri, Feb 09, 2018 at 10:51:01AM +, Julien Grall wrote: >> Hi, >> >> On 02/09/2018 10:43 AM, Roger Pau Monné wrote: +unsigned int type; +}; + +#define resource_size(res) ((res)->size) + +#define platform_device

Re: [Xen-devel] [PATCH 1/7] Port WARN_ON_ONCE() from Linux

2018-05-18 Thread Sameer Goel
On 2/13/2018 2:46 AM, Jan Beulich wrote: On 09.02.18 at 11:47, wrote: >> On Fri, Feb 09, 2018 at 10:45:25AM +, Julien Grall wrote: >>> Hi, >>> >>> On 02/09/2018 10:29 AM, Roger Pau Monné wrote: On Thu, Feb 08, 2018 at 08:10:49PM -0700, Sameer Goel wrote: > diff --git a/xen/incl

Re: [Xen-devel] [PATCH 5/7] xen/iommu: smmu-v3: Add Xen specific code to enable the ported driver

2018-05-18 Thread Sameer Goel
On 3/10/2018 10:53 AM, Manish Jaggi wrote: > Hi Sameer, > > > On 02/09/2018 08:40 AM, Sameer Goel wrote: >> This driver follows an approach similar to smmu driver. The intent here >> is to reuse as much Linux code as possible. >> - Glue code has been introduced to bridge the API calls. >> - Calle

[Xen-devel] [xen-unstable-smoke test] 122959: tolerable all pass - PUSHED

2018-05-18 Thread osstest service owner
flight 122959 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/122959/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] [RFC 2/3] xen/grant-table: Extend API to work with DMA buffers

2018-05-18 Thread Boris Ostrovsky
On 05/17/2018 04:26 AM, Oleksandr Andrushchenko wrote: > From: Oleksandr Andrushchenko > > Signed-off-by: Oleksandr Andrushchenko > --- > drivers/xen/grant-table.c | 49 +++ > include/xen/grant_table.h | 7 ++ > 2 files changed, 56 insertions(+) > > diff

Re: [Xen-devel] [RFC 1/3] xen/balloon: Allow allocating DMA buffers

2018-05-18 Thread Boris Ostrovsky
On 05/17/2018 04:26 AM, Oleksandr Andrushchenko wrote: > From: Oleksandr Andrushchenko A commit message would be useful. > > Signed-off-by: Oleksandr Andrushchenko > > for (i = 0; i < nr_pages; i++) { > - page = alloc_page(gfp); > - if (page == NULL) { > -

[Xen-devel] [xen-4.9-testing test] 122876: regressions - FAIL

2018-05-18 Thread osstest service owner
flight 122876 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/122876/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-ws16-amd64 16 guest-localmigrate/x10 fail in 122659 REGR. vs. 122512

[Xen-devel] [xen-unstable-smoke baseline test] 122944: tolerable all pass

2018-05-18 Thread osstest service owner
"Old" tested version had not actually been tested; therefore in this flight we test it, rather than a new candidate. The baseline, if any, is the most recent actually tested revision. flight 122944 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/122944/ Failures :

Re: [Xen-devel] [PATCH v1] libxl: always call qemus xen-save-devices-state in suspend/resume

2018-05-18 Thread Olaf Hering
Am Fri, 18 May 2018 18:01:42 +0100 schrieb Wei Liu : > You don't need to test if the guest is HVM anymore. You only need to > know if QEMU upstream is running. libxl__domain_suspend_device_model handles qemu-xen and qemu-xen-trad. That function can not be called unconditionally I think. Perhaps I

Re: [Xen-devel] [PATCH v1 1/2] x86/mm: Add mem access rights to NPT

2018-05-18 Thread Razvan Cojocaru
On 05/18/2018 06:30 PM, Jan Beulich wrote: On 11.05.18 at 13:11, wrote: >> This patch adds access rights for the NPT pages. The access rights are >> saved in bits 59:56 of pte that are manipulated through p2m_set_access() >> and p2m_get_access() functions. > > You don't give any rationale fo

Re: [Xen-devel] [PATCH v1 2/2] hvm/svm: Enable EMUL_UNIMPLEMENTED events on svm

2018-05-18 Thread Razvan Cojocaru
On 05/18/2018 07:00 PM, Tamas K Lengyel wrote: > On Fri, May 18, 2018 at 9:32 AM, Jan Beulich wrote: > On 11.05.18 at 13:11, wrote: >>> Signed-off-by: Alexandru Isaila >> >> It would be helpful to know whether this patch depends on patch 1 in any way. >> If it doesn't, with Tamas'es ack this

Re: [Xen-devel] Xen Project Security Whitepaper v1 is ready for community review

2018-05-18 Thread Marek Marczykowski-Górecki
On Sat, May 19, 2018 at 01:55:53AM +1000, Steven Haigh wrote: > Hi Lars, > > I think this is an excellent start. > > A specific concern that I have is when we get into a state between releases > and XSAs where you cannot take the current release and then apply all > released > / embargo'ed XSA

Re: [Xen-devel] [PATCH for-4.11 v3.5 1/2] doc: correct livepatch.markdown syntax

2018-05-18 Thread Andrew Cooper
Sorry - it appears I mess the CC list up here.  CC'ing "The Rest" for this combined fixup and cleanup patch for livepatch.markdown, for inclusion into 4.11 ~Andrew On 08/05/18 10:55, Andrew Cooper wrote: > From: Juergen Gross > > "make -C docs all" fails due to incorrect markdown syntax in > liv

Re: [Xen-devel] [PATCH v1] libxl: always call qemus xen-save-devices-state in suspend/resume

2018-05-18 Thread Wei Liu
Cc Anthony. On Thu, May 17, 2018 at 05:51:08PM +0200, Olaf Hering wrote: > If a domU has a qemu-xen instance attached, it is required to call qemus > "xen-save-devices-state" method. Without it, the receiving side of a PV > migration may be unable to lock the image: > > xen be: qdisk-51712: xen b

Re: [Xen-devel] [PATCH v1] libxl: always call qemus xen-save-devices-state in suspend/resume

2018-05-18 Thread Wei Liu
On Fri, May 18, 2018 at 09:25:07AM +0200, Juergen Gross wrote: > On 17/05/18 17:51, Olaf Hering wrote: > > If a domU has a qemu-xen instance attached, it is required to call qemus > > "xen-save-devices-state" method. Without it, the receiving side of a PV > > migration may be unable to lock the ima

Re: [Xen-devel] [PATCH for-4.11] Config.mk: Update QEMU to include build fixes

2018-05-18 Thread Wei Liu
On Fri, May 18, 2018 at 05:17:54PM +0100, Anthony PERARD wrote: > This tag includes two build fixes: > - dump: Fix build with newer gcc > Fix build with GCC-8 > - Fix libusb-1.0.22 deprecated libusb_set_debug with libusb_set_option > > Signed-off-by: Anthony PERARD Applied.

[Xen-devel] [distros-debian-jessie test] 74725: tolerable FAIL

2018-05-18 Thread Platform Team regression test user
flight 74725 distros-debian-jessie real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74725/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-armhf-jessie-netboot-pygrub 10 debian-di-install fail like 74707 baseline version: fl

Re: [Xen-devel] Test for osstest, features used in Qubes OS

2018-05-18 Thread Marek Marczykowski
On Fri, May 18, 2018 at 09:54:37AM -0600, Jan Beulich wrote: > >>> On 18.05.18 at 17:33, wrote: > > Yes, I'm happy to help with that. As I've said, the basic test is very > > simple (rtcwake command) and already very useful. The fact that it is(?) > > broken on staging doesn't make it easier, > >

[Xen-devel] [PATCH for-4.11] Config.mk: Update QEMU to include build fixes

2018-05-18 Thread Anthony PERARD
This tag includes two build fixes: - dump: Fix build with newer gcc Fix build with GCC-8 - Fix libusb-1.0.22 deprecated libusb_set_debug with libusb_set_option Signed-off-by: Anthony PERARD --- FYI, I've already ask with this mail: > QEMU build fixes for Xen-4.11 > <20180510135438.gb2...@pera

Re: [Xen-devel] [PATCH v1 2/2] hvm/svm: Enable EMUL_UNIMPLEMENTED events on svm

2018-05-18 Thread Tamas K Lengyel
On Fri, May 18, 2018 at 9:32 AM, Jan Beulich wrote: On 11.05.18 at 13:11, wrote: >> Signed-off-by: Alexandru Isaila > > It would be helpful to know whether this patch depends on patch 1 in any way. > If it doesn't, with Tamas'es ack this could go in independent of the other > one. > For co

Re: [Xen-devel] Xen Project Security Whitepaper v1 is ready for community review

2018-05-18 Thread Steven Haigh
Hi Lars, I think this is an excellent start. A specific concern that I have is when we get into a state between releases and XSAs where you cannot take the current release and then apply all released / embargo'ed XSA patches. The current reasoning for this is that XSA patches are developed on

Re: [Xen-devel] Test for osstest, features used in Qubes OS

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 17:33, wrote: > Yes, I'm happy to help with that. As I've said, the basic test is very > simple (rtcwake command) and already very useful. The fact that it is(?) > broken on staging doesn't make it easier, Details on the breakage would be appreciated (on a separate thread), unl

Re: [Xen-devel] [PATCH for-next 4/5] tools: load IPXE from standalone file

2018-05-18 Thread Jan Beulich
>>> On 15.05.18 at 20:22, wrote: > @@ -95,13 +97,17 @@ static void rombios_load_roms(void) > etherboot_phys_addr = VGABIOS_PHYSICAL_ADDRESS + vgabios_sz; > if ( etherboot_phys_addr < OPTIONROM_PHYSICAL_ADDRESS ) > etherboot_phys_addr = OPTIONROM_PHYSICAL_ADDRESS; > -etherboo

Re: [Xen-devel] Test for osstest, features used in Qubes OS

2018-05-18 Thread Marek Marczykowski-Górecki
On Thu, May 17, 2018 at 08:00:38PM +0200, Sander Eikelenboom wrote: > Marek / Ian, > > Nice to see PCI-passthrough getting some attention again. > > On 17/05/18 17:12, Ian Jackson wrote: > > Marek Marczykowski-Górecki writes ("Re: Test for osstest, features used in > > Qubes OS"): > >> On Thu, M

[Xen-devel] [qemu-upstream-unstable baseline-only test] 74724: tolerable FAIL

2018-05-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 74724 qemu-upstream-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74724/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-xsm 12 guest-start

Re: [Xen-devel] [PATCH for-next 2/5] ipxe: produce a single binary from its build

2018-05-18 Thread Jan Beulich
>>> On 15.05.18 at 20:22, wrote: > --- a/tools/firmware/etherboot/Makefile > +++ b/tools/firmware/etherboot/Makefile > @@ -18,11 +18,15 @@ D=ipxe > T=ipxe.tar.gz > > ROMS = $(addprefix $D/src/bin/, $(addsuffix .rom, $(ETHERBOOT_NICS))) > +ROM = $D/src/bin/ipxe.bin > > .NOTPARALLEL: > > .

Re: [Xen-devel] Test for osstest, features used in Qubes OS

2018-05-18 Thread Marek Marczykowski-Górecki
On Thu, May 17, 2018 at 04:12:09PM +0100, Ian Jackson wrote: > Marek Marczykowski-Górecki writes ("Re: Test for osstest, features used in > Qubes OS"): > > On Thu, May 17, 2018 at 01:26:30PM +0100, Ian Jackson wrote: > > > Is it likely that this will depend on non-buggy host firmware ? If so > >

Re: [Xen-devel] [PATCH v1 2/2] hvm/svm: Enable EMUL_UNIMPLEMENTED events on svm

2018-05-18 Thread Jan Beulich
>>> On 11.05.18 at 13:11, wrote: > Signed-off-by: Alexandru Isaila It would be helpful to know whether this patch depends on patch 1 in any way. If it doesn't, with Tamas'es ack this could go in independent of the other one. For conveying such information a cover letter is usually helpful. Jan

Re: [Xen-devel] [PATCH v4] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Anthony PERARD
On Fri, May 18, 2018 at 03:38:30PM +0100, Paul Durrant wrote: > This patch removes the current hackery where IOREQ_TYPE_PCI_CONFIG > requests are handled by faking PIO to 0xcf8 and 0xcfc and replaces it > with direct calls to pci_host_config_read/write_common(). > Doing so necessitates mapping BDFs

Re: [Xen-devel] [PATCH v1 1/2] x86/mm: Add mem access rights to NPT

2018-05-18 Thread Jan Beulich
>>> On 11.05.18 at 13:11, wrote: > This patch adds access rights for the NPT pages. The access rights are > saved in bits 59:56 of pte that are manipulated through p2m_set_access() > and p2m_get_access() functions. You don't give any rationale for the choice of bits. Right now p2m-pt.c still assu

[Xen-devel] [xen-unstable-smoke baseline test] 122925: tolerable all pass

2018-05-18 Thread osstest service owner
"Old" tested version had not actually been tested; therefore in this flight we test it, rather than a new candidate. The baseline, if any, is the most recent actually tested revision. flight 122925 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/122925/ Failures :

Re: [Xen-devel] [PATCH v4 2/2] x86/domctl: Don't pause the whole domain if only getting vcpu state

2018-05-18 Thread Jan Beulich
>>> On 17.05.18 at 18:04, wrote: On 07.05.18 at 10:24, wrote: >> --- a/xen/arch/x86/cpu/mcheck/vmce.c >> +++ b/xen/arch/x86/cpu/mcheck/vmce.c >> @@ -357,20 +357,14 @@ void vmce_save_vcpu_ctxt_one(struct vcpu *v, struct >> hvm_vmce_vcpu *ctxt) >> ctxt->mcg_ext_ctl = v->arch.vmce.mcg_ext

[Xen-devel] Xen 4.11 RC5

2018-05-18 Thread Juergen Gross
Hi all, Xen 4.11 rc5 is tagged. You can check that out from xen.git: git://xenbits.xen.org/xen.git 4.11.0-rc5 For your convenience there is also a tarball at: https://downloads.xenproject.org/release/xen/4.11.0-rc5/xen-4.11.0-rc5.tar.gz And the signature is at: https://downloads.xenproject.org/

Re: [Xen-devel] [RFC PATCH 04/31] cpufreq: make turbo settings to be configurable

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 16:36, wrote: > BTW, what do you think about the following: > > Another question is second_max_freq. As I understand, it is highest > non-turbo frequency calculated by framework to limit target frequency > when turbo mode "is disabled". And Xen assumes that second_max_freq is >

[Xen-devel] [PATCH v2 3/5] xl: add PV sound condif parser

2018-05-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add config parser for virtual sound devices Signed-off-by: Oleksandr Grytsov Acked-by: Wei Liu --- tools/xl/xl_parse.c | 246 tools/xl/xl_parse.h | 1 + 2 files changed, 247 insertions(+) diff --git a/tools/xl/xl_parse.c

[Xen-devel] [PATCH v2 4/5] xl: add vsnd CLI commands

2018-05-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add CLI commands to attach, detach and list virtual sound devices Signed-off-by: Oleksandr Grytsov Acked-by: Wei Liu --- tools/xl/Makefile | 2 +- tools/xl/xl.h | 3 + tools/xl/xl_cmdtable.c | 15 +++ tools/xl/xl_vsnd.c | 203

[Xen-devel] [PATCH v2 0/5] libxl: add PV sound device

2018-05-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov This patch set adds PV sound device support to xl.cfg and xl. See sndif.h for protocol implementation details. Changes since initial: * rebase to current staging * use libxl__realloc instead of realloc Oleksandr Grytsov (5): libxl: add PV sound device libxl: add v

[Xen-devel] [PATCH v2 2/5] libxl: add vsnd list and info

2018-05-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add getting vsnd list amd info API Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl.h | 10 + tools/libxl/libxl_types.idl | 19 ++ tools/libxl/libxl_utils.h | 3 + tools/libxl/libxl_vsnd.c| 374 +++- 4 files change

[Xen-devel] [PATCH v4] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Paul Durrant
This patch removes the current hackery where IOREQ_TYPE_PCI_CONFIG requests are handled by faking PIO to 0xcf8 and 0xcfc and replaces it with direct calls to pci_host_config_read/write_common(). Doing so necessitates mapping BDFs to PCIDevices but maintaining a simple QLIST in xen_device_realize/un

[Xen-devel] [PATCH v2 5/5] docs: add PV sound device config

2018-05-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Update documentation with virtual sound device Signed-off-by: Oleksandr Grytsov Acked-by: Wei Liu --- docs/man/xl.cfg.pod.5.in | 149 +++ docs/man/xl.pod.1.in | 30 2 files changed, 179 insertions(+) diff --git a/docs/

[Xen-devel] [PATCH v2 1/5] libxl: add PV sound device

2018-05-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add PV sound device described in sndif.h Signed-off-by: Oleksandr Grytsov Acked-by: Wei Liu --- tools/libxl/Makefile | 2 +- tools/libxl/libxl.h | 14 ++ tools/libxl/libxl_create.c | 1 + tools/libxl/libxl_internal.h

Re: [Xen-devel] [RFC PATCH 04/31] cpufreq: make turbo settings to be configurable

2018-05-18 Thread Oleksandr Tyshchenko
Hi, Jan. Sorry for the late response. On Mon, May 7, 2018 at 6:39 PM, Jan Beulich wrote: On 09.11.17 at 18:09, wrote: >> --- a/xen/drivers/cpufreq/Kconfig >> +++ b/xen/drivers/cpufreq/Kconfig >> @@ -1,3 +1,6 @@ >> >> config HAS_CPUFREQ >> bool >> + >> +config HAS_CPU_TURBO >> +

Re: [Xen-devel] [PATCH v3] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Paul Durrant
> -Original Message- > From: Paul Durrant [mailto:paul.durr...@citrix.com] > Sent: 18 May 2018 15:28 > To: qemu-de...@nongnu.org; xen-devel@lists.xenproject.org > Cc: Paul Durrant ; Stefano Stabellini > ; Anthony Perard ; > Michael S. Tsirkin ; Marcel Apfelbaum > ; Paolo Bonzini ; Richard >

Re: [Xen-devel] [PATCH v4 2/2] Input: xen-kbdfront - allow better run-time configuration

2018-05-18 Thread Oleksandr Andrushchenko
Sorry for top posting. Due to a bug in the test used to verify this patch I need to make two more changes, please see inline. Please ignore this patch for now, I will send v5 soon. Sorry for inconvenience, Oleksandr On 05/18/2018 12:59 PM, Oleksandr Andrushchenko wrote: From: Oleksandr Andrus

[Xen-devel] [PATCH v3] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Paul Durrant
This patch removes the current hackery where IOREQ_TYPE_PCI_CONFIG requests are handled by faking PIO to 0xcf8 and 0xcfc and replaces it with direct calls to pci_host_config_read/write_common(). Doing so necessitates mapping BDFs to PCIDevices but maintaining a simple QLIST in xen_device_realize/un

Re: [Xen-devel] [xen-unstable-smoke baseline test] 122919: tolerable all pass

2018-05-18 Thread Ian Jackson
Jan Beulich writes ("Re: [Xen-devel] [xen-unstable-smoke baseline test] 122919: tolerable all pass"): > On 18.05.18 at 15:48, wrote: > > But in globbing, ! inside [ ] is a character class complement, not a > > literal. The result is that mg-adjust-flight-makexrefs would > > generally replace job

Re: [Xen-devel] [PATCH v2] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 18 May 2018 15:16 > To: Paul Durrant > Cc: Anthony Perard ; Roger Pau Monne > ; Stefano Stabellini ; xen- > devel ; qemu-de...@nongnu.org; > ehabk...@redhat.com; mar...@redhat.com; m...@redhat.com; Paolo > Bonzini

Re: [Xen-devel] [RFC PATCH 03/31] pmstat: move pmstat.c file to the xen/drivers/pm/stat.c location

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 16:13, wrote: > Hi, > > On Fri, May 18, 2018 at 2:35 PM, Jan Beulich wrote: > On 18.05.18 at 13:14, wrote: >>> On Mon, May 7, 2018 at 6:36 PM, Jan Beulich wrote: >>> On 09.11.17 at 18:09, wrote: > +int acpi_set_pdc_bits(u32 acpi_id, XEN_GUEST_HANDLE_PARAM(uint32

Re: [Xen-devel] Xen Project Security Whitepaper v1 is ready for community review

2018-05-18 Thread Lars Kurth
On 18/05/2018, 15:07, "Wei Liu" wrote: On Fri, May 18, 2018 at 07:16:24AM -0600, Jan Beulich wrote: > >>> On 18.05.18 at 12:13, wrote: > > 2.2.4.A > > We've discussed the option of different support life times before (and iirc more > than once). Personally I con

Re: [Xen-devel] [xen-unstable-smoke baseline test] 122919: tolerable all pass

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 15:48, wrote: > osstest service owner writes ("[xen-unstable-smoke baseline test] 122919: > tolerable all pass"): >> "Old" tested version had not actually been tested; therefore in this >> flight we test it, rather than a new candidate. The baseline, if >> any, is the most rec

Re: [Xen-devel] [PATCH v2] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 15:51, wrote: >> Sent: 18 May 2018 14:34 >> To: Paul Durrant >> >>> On 18.05.18 at 15:00, wrote: >> > +QLIST_FOREACH(xendev, &state->dev_list, entry) { >> > +unsigned int i; >> > +uint32_t tmp; >> > + >> > +if (xendev->sbdf != sbdf) { >> > +

Re: [Xen-devel] [RFC PATCH 03/31] pmstat: move pmstat.c file to the xen/drivers/pm/stat.c location

2018-05-18 Thread Oleksandr Tyshchenko
Hi, On Fri, May 18, 2018 at 2:35 PM, Jan Beulich wrote: On 18.05.18 at 13:14, wrote: >> On Mon, May 7, 2018 at 6:36 PM, Jan Beulich wrote: >> On 09.11.17 at 18:09, wrote: +int acpi_set_pdc_bits(u32 acpi_id, XEN_GUEST_HANDLE_PARAM(uint32) pdc) +{ +u32 bits[3]; +

Re: [Xen-devel] [PATCH v2 for-4.7/4.8] x86: Fix "x86: further CPUID handling adjustments"

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 15:23, wrote: > On 18/05/18 13:37, Jan Beulich wrote: > On 18.05.18 at 14:21, wrote: >>> On 17/05/18 13:23, Jan Beulich wrote: >>> On 16.05.18 at 19:27, wrote: > c/s 62b187969 "x86: further CPUID handling adjustments" make some > adjustments. > However, it

Re: [Xen-devel] Xen Project Security Whitepaper v1 is ready for community review

2018-05-18 Thread Wei Liu
On Fri, May 18, 2018 at 07:16:24AM -0600, Jan Beulich wrote: > >>> On 18.05.18 at 12:13, wrote: > > 2.2.4.A > > We've discussed the option of different support life times before (and iirc > more > than once). Personally I continue to think that all releases should be equal. > > I also continue

Re: [Xen-devel] [PATCH v2] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 18 May 2018 14:34 > To: Paul Durrant > Cc: Anthony Perard ; Roger Pau Monne > ; Stefano Stabellini ; xen- > devel ; qemu-de...@nongnu.org; > ehabk...@redhat.com; mar...@redhat.com; m...@redhat.com; Paolo > Bonzini

Re: [Xen-devel] [xen-unstable-smoke baseline test] 122919: tolerable all pass

2018-05-18 Thread Ian Jackson
osstest service owner writes ("[xen-unstable-smoke baseline test] 122919: tolerable all pass"): > "Old" tested version had not actually been tested; therefore in this > flight we test it, rather than a new candidate. The baseline, if > any, is the most recent actually tested revision. This is a

Re: [Xen-devel] [PATCH v2] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 15:00, wrote: > @@ -903,6 +926,80 @@ static void cpu_ioreq_move(ioreq_t *req) > } > } > > +static void rw_config_req_item(XenPciDevice *xendev, ioreq_t *req, It looks to me as if both parameters could be constified. > + uint32_t i, uint32_

Re: [Xen-devel] Xen Project Security Whitepaper v1 is ready for community review

2018-05-18 Thread Rich Persaud
> On May 18, 2018, at 06:13, Lars Kurth wrote: > > Dear Community Members, > > just under 3 months ago, we started a community consultation titled "Xen > Security Process Consultation: is there a case to change anything?" (see > https://lists.xenproject.org/archives/html/xen-announce/2018-02/m

Re: [Xen-devel] [PATCH v2 for-4.7/4.8] x86: Fix "x86: further CPUID handling adjustments"

2018-05-18 Thread Andrew Cooper
On 18/05/18 13:37, Jan Beulich wrote: On 18.05.18 at 14:21, wrote: >> On 17/05/18 13:23, Jan Beulich wrote: >> On 16.05.18 at 19:27, wrote: c/s 62b187969 "x86: further CPUID handling adjustments" make some adjustments. However, it breaks levelling of guests, making it imp

Re: [Xen-devel] Xen Project Security Whitepaper v1 is ready for community review

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 12:13, wrote: 2.2.4.A We've discussed the option of different support life times before (and iirc more than once). Personally I continue to think that all releases should be equal. I also continue to think that it was a mistake to shorten the release cadence to 6 months, for

Re: [Xen-devel] [xen-unstable test] 122715: trouble: broken/fail/pass

2018-05-18 Thread Ian Jackson
osstest service owner writes ("[xen-unstable test] 122715: trouble: broken/fail/pass"): > flight 122715 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/122715/ > > Failures and problems with tests :-( > > Tests which did not succeed and are blocking, > including tests

[Xen-devel] [PATCH v2] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Paul Durrant
This patch removes the current hackery where IOREQ_TYPE_PCI_CONFIG requests are handled by faking PIO to 0xcf8 and 0xcfc and replaces it with direct calls to pci_host_config_read/write_common(). Doing so necessitates mapping BDFs to PCIDevices but maintaining a simple QLIST in xen_device_realize/un

Re: [Xen-devel] [PATCH v2 for-4.7/4.8] x86: Fix "x86: further CPUID handling adjustments"

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 14:21, wrote: > On 17/05/18 13:23, Jan Beulich wrote: > On 16.05.18 at 19:27, wrote: >>> c/s 62b187969 "x86: further CPUID handling adjustments" make some >>> adjustments. >>> However, it breaks levelling of guests, making it impossible for the >>> toolstack >>> to hide S

Re: [Xen-devel] [PATCH v2 for-4.7/4.8] x86: Fix "x86: further CPUID handling adjustments"

2018-05-18 Thread Andrew Cooper
On 17/05/18 13:23, Jan Beulich wrote: On 16.05.18 at 19:27, wrote: >> c/s 62b187969 "x86: further CPUID handling adjustments" make some >> adjustments. >> However, it breaks levelling of guests, making it impossible for the >> toolstack >> to hide STIBP or IBPB from guests on hardware with

[Xen-devel] [xen-unstable-smoke baseline test] 122919: tolerable all pass

2018-05-18 Thread osstest service owner
"Old" tested version had not actually been tested; therefore in this flight we test it, rather than a new candidate. The baseline, if any, is the most recent actually tested revision. flight 122919 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/122919/ Failures :

[Xen-devel] [xen-4.8-testing test] 122866: tolerable FAIL - PUSHED

2018-05-18 Thread osstest service owner
flight 122866 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/122866/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-qemuu-ws16-amd64 16 guest-localmigrate/x10 fail in 122771 pass in 122866 test-amd64-i38

[Xen-devel] Xen 4.8.4 about due

2018-05-18 Thread Jan Beulich
All, this should go out in a week or two. Please point out backport candidates you find missing from its staging branch, but which you consider relevant. Jan ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailm

Re: [Xen-devel] [RFC PATCH 03/31] pmstat: move pmstat.c file to the xen/drivers/pm/stat.c location

2018-05-18 Thread Jan Beulich
>>> On 18.05.18 at 13:14, wrote: > On Mon, May 7, 2018 at 6:36 PM, Jan Beulich wrote: > On 09.11.17 at 18:09, wrote: >>> +int acpi_set_pdc_bits(u32 acpi_id, XEN_GUEST_HANDLE_PARAM(uint32) pdc) >>> +{ >>> +u32 bits[3]; >>> +int ret; >>> + >>> +if ( copy_from_guest(bits, pdc, 2) )

Re: [Xen-devel] [PATCH v7 0/7] KVM: x86: Allow Qemu/KVM to use PVH entry point

2018-05-18 Thread Paolo Bonzini
On 16/05/2018 22:27, Maran Wilson wrote: > Friendly ping. I am hopeful one of the x86 and/or KVM maintainers has a > few cycles to spare to look this over. > > And thanks to everyone who has helped thus far by providing valuable > feedback and reviewing. > >    https://lkml.org/lkml/2018/4/16/100

Re: [Xen-devel] [PATCH v4 1/2] xen/kbdif: Sync up with the canonical definition in Xen

2018-05-18 Thread Juergen Gross
On 18/05/18 11:59, Oleksandr Andrushchenko wrote: > From: Oleksandr Andrushchenko > > This is the sync up with the canonical definition of the keyboard > protocol in Xen: > 1. Add missing string constants for {feature|request}-raw-pointer >to align with the rest of the interface file. > > 2.

Re: [Xen-devel] [RFC PATCH 03/31] pmstat: move pmstat.c file to the xen/drivers/pm/stat.c location

2018-05-18 Thread Oleksandr Tyshchenko
Hi, Jan. Sorry for the late response. On Mon, May 7, 2018 at 6:36 PM, Jan Beulich wrote: On 09.11.17 at 18:09, wrote: >> From: Oleksandr Dmytryshyn >> >> Cpufreq driver should be more generalizable (not ACPI-specific). >> Thus this file should be placed to more convenient location. >> >>

Re: [Xen-devel] [MirageOS-devel] ViryaOS: proposal for a new Xen Project sub-project

2018-05-18 Thread Lars Kurth
Hi Stefano, what we also need for the project proposal are Sponsor: A sponsor can be a member of the project leadership team of a mature project, a member of the advisory board or the community manager. This ensures that a distinguished community member supports the idea behind the project. I w

Re: [Xen-devel] [PATCH v4 5/9] xen_backend: add an emulation of grant copy

2018-05-18 Thread Anthony PERARD
On Thu, May 17, 2018 at 04:35:54PM +0100, Paul Durrant wrote: > Not all Xen environments support the xengnttab_grant_copy() operation. > E.g. where the OS is FreeBSD or Xen is older than 4.8.0. > > This patch introduces an emulation of that operation using > xengnttab_map_domain_grant_refs() and m

Re: [Xen-devel] [PATCH v4 2/9] xen_backend: add grant table helpers

2018-05-18 Thread Anthony PERARD
On Thu, May 17, 2018 at 04:35:51PM +0100, Paul Durrant wrote: > This patch adds grant table helper functions to the xen_backend code to > localize error reporting and use of xen_domid. > > The patch also defers the call to xengnttab_open() until just before the > initialise method in XenDevOps is

Re: [Xen-devel] [PATCH v4 1/9] xen: add a meaningful declaration of grant_copy_segment into xen_common.h

2018-05-18 Thread Anthony PERARD
On Thu, May 17, 2018 at 04:35:50PM +0100, Paul Durrant wrote: > Currently the xen_disk source has to carry #ifdef exclusions to compile > against Xen older then 4.8. This is a bit messy so this patch lifts the > definition of struct xengnttab_grant_copy_segment and adds it into the > pre-4.8 compat

Re: [Xen-devel] [PATCH v3 3/3] xen-hvm: try to use xenforeignmemory_map_resource() to map ioreq pages

2018-05-18 Thread Anthony PERARD
On Tue, May 15, 2018 at 05:40:53PM +0100, Paul Durrant wrote: > Xen 4.11 has a new API to directly map guest resources. Among the resources > that can be mapped using this API are ioreq pages. > > This patch modifies QEMU to attempt to use the new API should it exist, > falling back to the previou

[Xen-devel] [xen-unstable-smoke baseline test] 122914: tolerable all pass

2018-05-18 Thread osstest service owner
"Old" tested version had not actually been tested; therefore in this flight we test it, rather than a new candidate. The baseline, if any, is the most recent actually tested revision. flight 122914 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/122914/ Failures :

Re: [Xen-devel] [PATCH v1] xl: show full value of cpu_khz in xl info output

2018-05-18 Thread Juergen Gross
On 17/05/18 16:31, Wei Liu wrote: > On Thu, May 17, 2018 at 04:25:58PM +0200, Olaf Hering wrote: >> Am Tue, 3 Apr 2018 13:14:11 +0200 >> schrieb Olaf Hering : >> >>> The exact value of cpu_khz can only be obtained via 'xl dmesg', and >>> therefore can be lost after some time. 'xl info' truncates t

[Xen-devel] [PATCH v4 1/2] xen/kbdif: Sync up with the canonical definition in Xen

2018-05-18 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko This is the sync up with the canonical definition of the keyboard protocol in Xen: 1. Add missing string constants for {feature|request}-raw-pointer to align with the rest of the interface file. 2. Add new XenStore feature fields, so it is possible to individuall

[Xen-devel] [PATCH v4 2/2] Input: xen-kbdfront - allow better run-time configuration

2018-05-18 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko It is now only possible to control if multi-touch virtual device is created or not (via the corresponding XenStore entries), but keyboard and pointer devices are always created. In some cases this is not desirable. For example, if virtual keyboard device is exposed t

Re: [Xen-devel] [PATCH] xen-hvm: stop faking I/O to access PCI config space

2018-05-18 Thread Paul Durrant
> -Original Message- > From: Anthony PERARD [mailto:anthony.per...@citrix.com] > Sent: 17 May 2018 17:31 > To: Paul Durrant > Cc: xen-devel@lists.xenproject.org; qemu-de...@nongnu.org; Stefano > Stabellini ; Michael S. Tsirkin ; > Marcel Apfelbaum ; Paolo Bonzini > ; Richard Henderson ; Ed

[Xen-devel] [PATCH v6 20/28] x86/asm: make some functions local

2018-05-18 Thread Jiri Slaby
There is a couple of assembly functions, which are invoked only locally in the file they are defined. In C, we mark them "static". In assembly, annotate them using SYM_{FUNC,CODE}_START_LOCAL (and switch their ENDPROC to SYM_{FUNC,CODE}_END too). Whether we use FUNC or CODE, depends on whether ENDP

[Xen-devel] [PATCH v6 25/28] x86_32/asm: add ENDs to some functions and relabel with SYM_CODE_*

2018-05-18 Thread Jiri Slaby
All these are functions which are invoked from elsewhere, but they are not typical C functions. So we annotate them using the new SYM_CODE_START. All these were not balanced with any END, so mark their ends by SYM_CODE_END, appropriatelly. Signed-off-by: Jiri Slaby Reviewed-by: Boris Ostrovsky [

[Xen-devel] [PATCH v6 09/28] x86/asm: annotate aliases

2018-05-18 Thread Jiri Slaby
_key_expansion_128 is an alias to _key_expansion_256a, __memcpy to memcpy, xen_syscall32_target to xen_sysenter_target, and so on. Annotate them all using the new SYM_FUNC_START_ALIAS, SYM_FUNC_START_LOCAL_ALIAS, and SYM_FUNC_END_ALIAS. This will make the tools generating the debuginfo happy. Sign

[Xen-devel] [PATCH v6 23/28] x86_64/asm: change all ENTRY+END to SYM_CODE_*

2018-05-18 Thread Jiri Slaby
Here, we change all assembly code which is marked using END (and not ENDPROC). We switch all these to appropriate new markings SYM_CODE_START and SYM_CODE_END. Signed-off-by: Jiri Slaby Reviewed-by: Boris Ostrovsky [xen bits] Cc: Thomas Gleixner Cc: Ingo Molnar Cc: "H. Peter Anvin" Cc: x...@k

[Xen-devel] [PATCH v6 24/28] x86_64/asm: change all ENTRY+ENDPROC to SYM_FUNC_*

2018-05-18 Thread Jiri Slaby
These are all functions which are invoked from elsewhere, so we annotate them as global using the new SYM_FUNC_START. And their ENDPROC's by SYM_FUNC_END. And make sure ENTRY/ENDPROC is not defined on X86_64, given these were the last users. Signed-off-by: Jiri Slaby Reviewed-by: Rafael J. Wysoc

[Xen-devel] [PATCH v6 01/28] linkage: new macros for assembler symbols

2018-05-18 Thread Jiri Slaby
Introduce new C macros for annotations of functions and data in assembly. There is a long-standing mess in macros like ENTRY, END, ENDPROC and similar. They are used in different manners and sometimes incorrectly. So introduce macros with clear use to annotate assembly as follows: a) Support macr

[Xen-devel] [PATCH v6 22/28] x86_64/asm: add ENDs to some functions and relabel with SYM_CODE_*

2018-05-18 Thread Jiri Slaby
All these are functions which are invoked from elsewhere, but they are not typical C functions. So we annotate them using the new SYM_CODE_START. All these were not balanced with any END, so mark their ends by SYM_CODE_END appropriatelly too. Signed-off-by: Jiri Slaby Reviewed-by: Boris Ostrovsky

[Xen-devel] [PATCH v6 14/28] xen/pvh: annotate data appropriatelly

2018-05-18 Thread Jiri Slaby
Use the new SYM_DATA_START_LOCAL, and SYM_DATA_END* macros to have: 8 OBJECT LOCAL DEFAULT6 gdt 000832 OBJECT LOCAL DEFAULT6 gdt_start 0028 0 OBJECT LOCAL DEFAULT6 gdt_end 0028 256 OBJECT LOCAL DEFAULT6 early_stack 0128 0 OBJECT LOCAL DEFAU

Re: [Xen-devel] [PATCH v1] libxl: fix return code in qmp_synchronous_send

2018-05-18 Thread Wei Liu
On Thu, May 17, 2018 at 04:29:57PM +0200, Olaf Hering wrote: > Use error code from libxl namespace, a plain -1 is not valid in this context. > > Signed-off-by: Olaf Hering While this function doesn't have libxl prefix, its return value does get returned directly by various libxl functions. Inste

[Xen-devel] [xen-unstable-smoke baseline test] 122913: tolerable all pass

2018-05-18 Thread osstest service owner
"Old" tested version had not actually been tested; therefore in this flight we test it, rather than a new candidate. The baseline, if any, is the most recent actually tested revision. flight 122913 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/122913/ Failures :

Re: [Xen-devel] [PATCH v1] libxl: always call qemus xen-save-devices-state in suspend/resume

2018-05-18 Thread Olaf Hering
Am Fri, 18 May 2018 09:25:07 +0200 schrieb Juergen Gross : > debianhvm The patch is for non-HVM, so perhaps these failures are something else. To me it was not clear from the faillog what exactly failed. Olaf pgpY2ULaICJiC.pgp Description: Digitale Signatur von OpenPGP ___

Re: [Xen-devel] [PATCH v3 1/2] xen/PVH: Set up GS segment for stack canary

2018-05-18 Thread Jan Beulich
>>> On 17.05.18 at 19:47, wrote: > On 05/17/2018 11:02 AM, Jan Beulich wrote: > On 17.05.18 at 16:47, wrote: >>> @@ -64,6 +67,9 @@ ENTRY(pvh_start_xen) >>> mov %eax,%es >>> mov %eax,%ss >>> >>> + mov $PVH_CANARY_SEL,%eax >>> + mov %eax,%gs >> I doubt this is needed for 64-bit (y

Re: [Xen-devel] [Patch v3 2/2] x86/microcode: Synchronize late microcode loading

2018-05-18 Thread Chao Gao
On Wed, May 16, 2018 at 07:46:48AM -0600, Jan Beulich wrote: On 16.05.18 at 15:25, wrote: >> On 16/05/18 14:10, Jan Beulich wrote: +static int do_microcode_update(void *_info) +{ +struct microcode_info *info = _info; +unsigned int cpu = smp_processor_id(); +

  1   2   >