[Xen-devel] [libvirt test] 124095: regressions - FAIL

2018-06-12 Thread osstest service owner
flight 124095 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/124095/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 123814 build-i386-libvirt

Re: [Xen-devel] [PATCH for-4.11] scripts/add_maintainers.pl: Don't call get_maintainers.pl with -f

2018-06-12 Thread Julien Grall
On 06/06/18 11:06, Julien Grall wrote: Hi, On 05/06/18 19:26, Lars Kurth wrote: On 05/06/2018, 19:15, "Juergen Gross" wrote: On 05/06/18 18:39, Julien Grall wrote: > The option -f of scripts/get_maintainers.pl will return the maintainers > of a given file, *not* the list

[Xen-devel] [PATCH v3 10/13] xen/arm64: Implement a fast path for handling SMCCC_ARCH_WORKAROUND_2

2018-06-12 Thread Julien Grall
The function ARM_SMCCC_ARCH_WORKAROUND_2 will be called by the guest for enabling/disabling the ssbd mitigation. So we want the handling to be as fast as possible. The new sequence will forward guest's ARCH_WORKAROUND_2 call to EL3 and also track the state of the workaround per-vCPU. Note that

[Xen-devel] [PATCH v3 08/13] xen/arm: alternatives: Add dynamic patching feature

2018-06-12 Thread Julien Grall
This is based on the Linux commit dea5e2a4c5bc "arm64: alternatives: Add dynamic patching feature" written by Marc Zyngier: We've so far relied on a patching infrastructure that only gave us a single alternative, without any way to provide a range of potential replacement

[Xen-devel] [PATCH v3 06/13] xen/arm: Add ARCH_WORKAROUND_2 support for guests

2018-06-12 Thread Julien Grall
In order to offer ARCH_WORKAROUND_2 support to guests, we need to track the state of the workaround per-vCPU. The field 'pad' in cpu_info is now repurposed to store flags easily accessible in assembly. As the hypervisor will always run with the workaround enabled, we may need to enable (on guest

[Xen-devel] [PATCH v3 03/13] xen/arm: setup: Check errata for boot CPU later on

2018-06-12 Thread Julien Grall
Some errata will rely on the SMCCC version which is detected by psci_init(). This is part of XSA-263. Signed-off-by: Julien Grall Reviewed-by: Stefano Stabellini --- Changes in v2: - Add Stefano's reviewed-by --- xen/arch/arm/setup.c | 8 ++-- 1 file changed, 6 insertions(+),

[Xen-devel] [PATCH v3 04/13] xen/arm: Add ARCH_WORKAROUND_2 probing

2018-06-12 Thread Julien Grall
As for Spectre variant-2, we rely on SMCCC 1.1 to provide the discovery mechanism for detecting the SSBD mitigation. A new capability is also allocated for that purpose, and a config option. This is part of XSA-263. Signed-off-by: Julien Grall --- Changes in v3: - required should

[Xen-devel] [PATCH v3 07/13] xen/arm: Simplify alternative patching of non-writable region

2018-06-12 Thread Julien Grall
During the MMU setup process, Xen will set SCTLR_EL2.WNX (Write-Non-eXecutable) bit. Because of that, the alternative code need to re-mapped the region in a difference place in order to modify the text section. At the moment, the function patching the code is only aware of the re-mapped region.

[Xen-devel] [PATCH v3 02/13] xen/arm64: entry: Use named label in guest_sync

2018-06-12 Thread Julien Grall
This will improve readability for future changes. This is part of XSA-263. Signed-off-by: Julien Grall Reviewed-by: Stefano Stabellini --- Changes in v2: - Add Stefano's reviewed-by --- xen/arch/arm/arm64/entry.S | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff

[Xen-devel] [PATCH v3 05/13] xen/arm: Add command line option to control SSBD mitigation

2018-06-12 Thread Julien Grall
On a system where the firmware implements ARCH_WORKAROUND_2, it may be useful to either permanently enable or disable the workaround for cases where the user decides that they'd rather not get a trap overhead, and keep the mitigation permanently on or off instead of switching it on exception

[Xen-devel] [PATCH v3 12/13] xen/arm: smccc: Fix indentation in ARM_SMCCC_ARCH_WORKAROUND_1_FID

2018-06-12 Thread Julien Grall
Signed-off-by: Julien Grall Acked-by: Stefano Stabellini --- Changes in v2: - Add Stefano's acked-by --- xen/include/asm-arm/smccc.h | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/xen/include/asm-arm/smccc.h b/xen/include/asm-arm/smccc.h index

[Xen-devel] [OSSTEST PATCH 05/11] ResourceCondition: Break out PropCompareBase

2018-06-12 Thread Ian Jackson
Make a base class so we can easily invent other kinds of resource property condition. The child is responsible only for stringification and the actual comparison. These classes does not need Exporter, so drop all that. Use `use parent' to import the base class. Signed-off-by: Ian Jackson ---

[Xen-devel] [OSSTEST PATCH 06/11] ResourceCondition: Provide PropEq

2018-06-12 Thread Ian Jackson
This can be used, for example, with the following entry in a hostflags runvar: PropEq:Firmware:uefi Signed-off-by: Ian Jackson --- Osstest/ResourceCondition/PropEq.pm | 38 + 1 file changed, 38 insertions(+) create mode 100644

[Xen-devel] [OSSTEST PATCH 10/11] TestSupport: substeps: work if steps in ad-hoc tests take >1s

2018-06-12 Thread Ian Jackson
When running by hand, OSSTEST_TESTID is not set. We provide a value with the time and the pid in it, so that rerunning the script by hand works, even though in production this would result in multiple identically-named substeps. But we need to fix this value for the duration of the script.

[Xen-devel] [OSSTEST PATCH 01/11] ts-xen-install: Drop obsolete --check and $checkmode

2018-06-12 Thread Ian Jackson
Since 5edec3222ff14b8200d5b41ed9af3c8d04c27314 ts-xen-build-check: reimplementation ... in 2011 we have a fully general version, and the --check option is no longer used. And since 467d6239daa352483ec8fef003bd4fc723702b77 pygrub: guest kernel install: move target_extract_jobdist_path into

[Xen-devel] [OSSTEST PATCH 00/11] dmrestrict audit: Preparatory fixes

2018-06-12 Thread Ian Jackson
From: Ian Jackson While working on auditing dm restriction, I came up with these miscellaneous improvements, bugfixes, slightly refactorings, and minor new features. I intend to push them to osstest pretest soon to get them out of my queue. Ian Jackson (11): ts-xen-install: Drop obsolete

[Xen-devel] [OSSTEST PATCH 04/11] TestSupport: Break out target_extract_distpart

2018-06-12 Thread Ian Jackson
No functional change. Signed-off-by: Ian Jackson --- Osstest/TestSupport.pm | 10 +- ts-xen-install | 4 +--- 2 files changed, 10 insertions(+), 4 deletions(-) diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm index cebeb0d..6de566c 100644 ---

[Xen-devel] [OSSTEST PATCH 09/11] sg-run-job: add some comments about guest state

2018-06-12 Thread Ian Jackson
Signed-off-by: Ian Jackson --- sg-run-job | 2 ++ 1 file changed, 2 insertions(+) diff --git a/sg-run-job b/sg-run-job index e1dc2d2..0a3f688 100755 --- a/sg-run-job +++ b/sg-run-job @@ -604,11 +604,13 @@ proc test-guest-migr {g} { } proc test-guest {g} { +# guest is expected to be

[Xen-devel] [OSSTEST PATCH 07/11] config: ExtraDebs: replace with DebianExtraPackages

2018-06-12 Thread Ian Jackson
`ExtraDebs' is a silly name. Also the semantics are rather inflexible; we might want to install specific packages rather than the contents of a whole directory. And, document it. This variable has only just been introduced, so hopefully it is OK to replace and rename it now without causing too

[Xen-devel] [OSSTEST PATCH 11/11] TestSupport: guest_var_boolean: Understand `y' and `1' as well

2018-06-12 Thread Ian Jackson
Previously this would treat `y' and `1' as false, which is very confusing. Signed-off-by: Ian Jackson --- Osstest/TestSupport.pm | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm index 7bc40f3..d8ed02d 100644 ---

[Xen-devel] [OSSTEST PATCH 08/11] ts-xen-install: DebianExtraPackages: call apt-get -f install

2018-06-12 Thread Ian Jackson
Currently this is just a precaution. Signed-off-by: Ian Jackson --- ts-xen-install | 1 + 1 file changed, 1 insertion(+) diff --git a/ts-xen-install b/ts-xen-install index d3a9d11..9913e85 100755 --- a/ts-xen-install +++ b/ts-xen-install @@ -99,6 +99,7 @@ sub some_extradebs ($) {

[Xen-devel] [OSSTEST PATCH 03/11] sg-run-job: Allow suppression of consequences of per-host-ts fail

2018-06-12 Thread Ian Jackson
Signed-off-by: Ian Jackson --- sg-run-job | 13 ++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/sg-run-job b/sg-run-job index aa97ee6..e1dc2d2 100755 --- a/sg-run-job +++ b/sg-run-job @@ -216,7 +216,8 @@ proc testid_matches_globs {testid globs} { # where

Re: [Xen-devel] [PATCH] xen/altp2m: set access_required properly for all altp2ms

2018-06-12 Thread Jan Beulich
>>> On 11.06.18 at 17:12, wrote: > --- a/xen/arch/x86/domain.c > +++ b/xen/arch/x86/domain.c > @@ -38,6 +38,7 @@ > #include > #include > #include > +#include Not the least to avoid this I think ... > @@ -719,6 +720,22 @@ int arch_domain_soft_reset(struct domain *d) > return ret; >

[Xen-devel] [PATCH v2] xen/netfront: raise max number of slots in xennet_get_responses()

2018-06-12 Thread Juergen Gross
The max number of slots used in xennet_get_responses() is set to MAX_SKB_FRAGS + (rx->status <= RX_COPY_THRESHOLD). In old kernel-xen MAX_SKB_FRAGS was 18, while nowadays it is 17. This difference is resulting in frequent messages "too many slots" and a reduced network throughput for some

[Xen-devel] [PATCH v5 2/3] Input: xen-kbdfront - fix multi-touch XenStore node's locations

2018-06-12 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko kbdif protocol describes multi-touch device parameters as a part of frontend's XenBus configuration nodes while they belong to backend's configuration. Fix this by reading the parameters as defined by the protocol. Fixes: 49aac8204da5 ("Input: xen-kbdfront - add

[Xen-devel] [PATCH v5 3/3] Input: xen-kbdfront - allow better run-time configuration

2018-06-12 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko It is now only possible to control if multi-touch virtual device is created or not (via the corresponding XenStore entries), but keyboard and pointer devices are always created. In some cases this is not desirable. For example, if virtual keyboard device is exposed

[Xen-devel] [PATCH v5 1/3] xen: Sync up with the canonical protocol definitions in Xen

2018-06-12 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko This is the sync up with the canonical definitions of the input, sound and display protocols in Xen. Changes to kbdif: 1. Add missing string constants for {feature|request}-raw-pointer to align with the rest of the interface file. 2. Add new XenStore feature

[Xen-devel] [PATCH v5 0/3] Input: xen-kbdfront - allow better run-time configuration

2018-06-12 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Hi, all! This patch series synchronizes Xen canonical protocol definitions which allow the last two patches in the series to update Xen kbdfront driver with a fix and v5 of the patch to allow better run-time configuration for xen-kbdfront. As xen-kbdfront patches

Re: [Xen-devel] [PATCH v2 9/9] x86/vmx: Don't leak EFER.NXE into guest context

2018-06-12 Thread Jan Beulich
>>> On 08.06.18 at 20:48, wrote: > @@ -1646,22 +1637,71 @@ static void vmx_update_guest_cr(struct vcpu *v, > unsigned int cr, > > static void vmx_update_guest_efer(struct vcpu *v) > { > -unsigned long vm_entry_value; > +unsigned long entry_ctls, guest_efer =

Re: [Xen-devel] [PATCH v5 07/10] arm: add a tiny kconfig configuration

2018-06-12 Thread Julien Grall
Hi Stefano, On 12/06/18 01:50, Stefano Stabellini wrote: On Tue, 5 Jun 2018, Julien Grall wrote: Hi Stefano, On 04/06/18 18:24, Stefano Stabellini wrote: Add a tiny kconfig configuration. Enabled NULL and Credit schedulers. Support only 8 cpus. It only carries non-default options (use make

Re: [Xen-devel] [PATCH for-4.11] scripts/add_maintainers.pl: Don't call get_maintainers.pl with -f

2018-06-12 Thread Ian Jackson
Julien Grall writes ("Re: [PATCH for-4.11] scripts/add_maintainers.pl: Don't call get_maintainers.pl with -f"): > On 06/06/18 11:06, Julien Grall wrote: > > I will commit the patch once we branched. > > I was about to commit but I forgot that I would need a ack from someone > in "THE REST". >

Re: [Xen-devel] [PATCH v1 04/13] xen/arm: Add ARCH_WORKAROUND_2 probing

2018-06-12 Thread Julien Grall
Hi Stefano, On 12/06/18 00:14, Stefano Stabellini wrote: On Tue, 5 Jun 2018, Julien Grall wrote: As for Spectre variant-2, we rely on SMCCC 1.1 to provide the discovery mechanism for detecting the SSBD mitigation. A new capability is also allocated for that purpose, and a config option. This

[Xen-devel] [OSSTEST PATCH 02/11] cs-adjust-flight: Allow adjusting play flights after start

2018-06-12 Thread Ian Jackson
Specifically, rather than simply bombing out, if the flight already has steps, we call dbfl_check again with an empty list of OK blessings. dbfl_check will then bomb out, unless the flight's blessing or intended blessing is `play'. If it doesn't bomb out, we print a message. Signed-off-by: Ian

Re: [Xen-devel] [PATCH] xen/altp2m: set access_required properly for all altp2ms

2018-06-12 Thread Razvan Cojocaru
Thanks for the review! On 06/12/2018 03:23 PM, Jan Beulich wrote: On 11.06.18 at 17:12, wrote: >> --- a/xen/arch/x86/domain.c >> +++ b/xen/arch/x86/domain.c >> @@ -38,6 +38,7 @@ >> #include >> #include >> #include >> +#include > > Not the least to avoid this I think ... > >> @@

[Xen-devel] [OSSTEST PATCH] seabios: Switch from git:// to https://

2018-06-12 Thread Ian Jackson
Currently git.seabios.org is down. https is better anyway. CC: Anthony PERARD Signed-off-by: Ian Jackson --- ap-common | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ap-common b/ap-common index 5e7cfde..a967ac6 100644 --- a/ap-common +++ b/ap-common @@ -47,7 +47,7 @@ :

Re: [Xen-devel] [libvirt] Likely build race, "/usr/bin/ld: cannot find -lvirt"

2018-06-12 Thread Jiri Denemark
On Thu, May 24, 2018 at 15:52:55 -0600, Jim Fehlig wrote: > On 05/24/2018 04:27 AM, Ian Jackson wrote: > > Ian Jackson writes ("Likely build race, "/usr/bin/ld: cannot find -lvirt""): > >> tl;dr: > >> > >> I think there is a bug in libvirt's build system which, with > >> low probability, causes a

Re: [Xen-devel] [PATCH for-4.11] scripts/add_maintainers.pl: Don't call get_maintainers.pl with -f

2018-06-12 Thread Jan Beulich
>>> On 12.06.18 at 12:44, wrote: > On 06/06/18 11:06, Julien Grall wrote: >> On 05/06/18 19:26, Lars Kurth wrote: >>> This change in behaviour was mistakenly introduced in one of the later >>> revisions (can't recall which), when we refactored the call to >>> get_maintainers.pl >> >> Thank

[Xen-devel] [PATCH v3 01/13] xen/arm: domain: Zero the per-vCPU cpu_info

2018-06-12 Thread Julien Grall
A stack is allocated per vCPU to be used by Xen. The allocation is done with alloc_xenheap_pages that does not zero the memory returned. However the top of the stack is containing information that will be used to store the initial state of the vCPU (see struct cpu_info). Some of the fields may not

[Xen-devel] [PATCH v3 11/13] xen/arm: Kconfig: Move HARDEN_BRANCH_PREDICTOR under "Architecture features"

2018-06-12 Thread Julien Grall
At the moment, HARDEN_BRANCH_PREDICTOR is not in any section making impossible for the user to unselect it. Also, it looks like we require to use 'expert = "y"' for showing the option in expert mode. Signed-off-by: Julien Grall Reviewed-by: Stefano Stabellini --- Changes in v2: -

[Xen-devel] [PATCH v3 00/13] xen/arm: SSBD (aka Spectre-v4) mitigation (XSA-263)

2018-06-12 Thread Julien Grall
Hi all, This patch series implement the Xen hypervisor side of the "Spectre-v4" (CVE-2018-3639) mitigation known as "Speculative Store Bypass Disable" (SSBD). More information can be found at: https://bugs.chromium.org/p/project-zero/issues/detail?id=1528

[Xen-devel] [PATCH v3 09/13] xen/arm64: Add generic assembly macros

2018-06-12 Thread Julien Grall
Add assembly macros to simplify assembly code: - adr_cpu_info: Get the address to the current cpu_info structure - ldr_this_cpu: Load a per-cpu value This is part of XSA-263. Signed-off-by: Julien Grall Reviewed-by: Stefano Stabellini --- Changes in v2: - Add Stefano's

[Xen-devel] [PATCH v3 13/13] xen/arm: Avoid to use current everywhere in enter_hypervisor_head

2018-06-12 Thread Julien Grall
Using current is fairly expensive, so save up into a variable. Signed-off-by: Julien Grall Reviewed-by: Stefano Stabellini --- Changes in v2: - Add Stefano's reviewed-by --- xen/arch/arm/traps.c | 14 -- 1 file changed, 8 insertions(+), 6 deletions(-) diff --git

Re: [Xen-devel] [PATCH 1/2] VT-d: re-phrase logic in vtd_set_hwdom_mapping() for clarity

2018-06-12 Thread Paul Durrant
> -Original Message- > From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf > Of Paul Durrant > Sent: 11 June 2018 11:35 > To: Roger Pau Monne > Cc: Kevin Tian ; Stefano Stabellini > ; Wei Liu ; Andrew Cooper > ; Tim (Xen.org) ; George > Dunlap ; Julien Grall ; > Jan

Re: [Xen-devel] [PATCH 07/11] x86/xen: Add support for Hygon's Dhyana Family 18h processor

2018-06-12 Thread puwen
> (heavily shrinking the Cc list) > > >>> On 09.06.18 at 15:23, wrote: > > This patch enables the Xen Hypervisor support to Hygon > > Family 18h CPU: > > - Add Hygon support in Xen PMU arch init codes. > > - Add Hygon support in PMU MSR read/write codes. > > - Add Hygon support in read PMC

[Xen-devel] [distros-debian-sid test] 74842: tolerable FAIL

2018-06-12 Thread Platform Team regression test user
flight 74842 distros-debian-sid real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74842/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-amd64-sid-netboot-pvgrub 11 guest-start fail blocked in 74777

Re: [Xen-devel] [PATCH v2 5/9] x86/vmx: Improvements to LBR MSR handling

2018-06-12 Thread Jan Beulich
>>> On 12.06.18 at 10:51, wrote: > On 12/06/2018 09:15, Jan Beulich wrote: > On 08.06.18 at 20:48, wrote: >>> @@ -3106,14 +3104,13 @@ static int vmx_msr_write_intercept(unsigned int >>> msr, > uint64_t msr_content) >>> for ( ; (rc == 0) && lbr->count; lbr++ ) >>>

Re: [Xen-devel] [PATCH] xen/netfront: raise max number of slots in xennet_get_responses()

2018-06-12 Thread Juergen Gross
On 11/06/18 20:59, Boris Ostrovsky wrote: > On 06/11/2018 03:57 AM, Juergen Gross wrote: >> The max number of slots used in xennet_get_responses() is set to >> MAX_SKB_FRAGS + (rx->status <= RX_COPY_THRESHOLD). >> >> In old kernel-xen MAX_SKB_FRAGS was 18, while nowadays it is 17. This >>

Re: [Xen-devel] [PATCH v2 5/9] x86/vmx: Improvements to LBR MSR handling

2018-06-12 Thread Jan Beulich
>>> On 08.06.18 at 20:48, wrote: > @@ -3106,14 +3104,13 @@ static int vmx_msr_write_intercept(unsigned int msr, > uint64_t msr_content) > for ( ; (rc == 0) && lbr->count; lbr++ ) > for ( i = 0; (rc == 0) && (i < lbr->count); i++ ) > if ( (rc =

Re: [Xen-devel] [PATCH v2 5/9] x86/vmx: Improvements to LBR MSR handling

2018-06-12 Thread Andrew Cooper
On 12/06/2018 09:15, Jan Beulich wrote: On 08.06.18 at 20:48, wrote: >> @@ -3106,14 +3104,13 @@ static int vmx_msr_write_intercept(unsigned int msr, >> uint64_t msr_content) >> for ( ; (rc == 0) && lbr->count; lbr++ ) >> for ( i = 0; (rc == 0) && (i <

[Xen-devel] [ovmf baseline-only test] 74855: all pass

2018-06-12 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 74855 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74855/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf a05a8a5aa17da4bc7144706a9931d68beec1a61f baseline

Re: [Xen-devel] [PATCH v2 6/9] x86/vmx: Pass an MSR value into vmx_msr_add()

2018-06-12 Thread Jan Beulich
>>> On 08.06.18 at 20:48, wrote: > The main purpose of this change is to allow us to set a specific MSR value, > without needing to know whether there is already a load/save list slot for it. > > Previously, callers wanting this property needed to call both vmx_add_*_msr() > and

Re: [Xen-devel] [PATCH v2 8/9] x86/vmx: Support removing MSRs from the host/guest load/save lists

2018-06-12 Thread Jan Beulich
>>> On 08.06.18 at 20:48, wrote: > --- a/xen/arch/x86/hvm/vmx/vmcs.c > +++ b/xen/arch/x86/hvm/vmx/vmcs.c > @@ -1452,6 +1452,74 @@ int vmx_add_msr(struct vcpu *v, uint32_t msr, uint64_t > val, > return rc; > } > > +int vmx_del_msr(struct vcpu *v, uint32_t msr, enum vmx_msr_list_type type)

Re: [Xen-devel] [PATCH v2 9/9] x86/vmx: Don't leak EFER.NXE into guest context

2018-06-12 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Saturday, June 9, 2018 2:49 AM > > Intel hardware only uses 4 bits in MSR_EFER. Changes to LME and LMA are > handled automatically via the VMENTRY_CTLS.IA32E_MODE bit. > > SCE is handled by ad-hoc logic in context_switch(), >

Re: [Xen-devel] [PATCH v5 0/10] arm: more kconfig configurability and small default configs

2018-06-12 Thread Jan Beulich
>>> On 12.06.18 at 02:41, wrote: > On Wed, 6 Jun 2018, Jan Beulich wrote: >> >>> On 05.06.18 at 19:52, wrote: >> >> > >> > On 04/06/18 18:23, Stefano Stabellini wrote: >> >> Hi all, >> >> >> >> This patch series is the first step toward building a small certifiable >> >> Xen hypervisor for

Re: [Xen-devel] 4.11.0 RC1 panic

2018-06-12 Thread Jan Beulich
>>> On 10.06.18 at 12:57, wrote: > (XEN) Xen call trace: > (XEN)[] mm.c#dec_linear_entries+0x12/0x20 > (XEN)[] mm.c#_put_page_type+0x13e/0x350 > (XEN)[] _spin_lock+0xd/0x50 > (XEN)[] mm.c#put_page_from_l2e+0xdf/0x110 > (XEN)[] free_page_type+0x2f9/0x790 > (XEN)[]

Re: [Xen-devel] [PATCH v2 4/9] x86/vmx: Support remote access to the MSR lists

2018-06-12 Thread Jan Beulich
>>> On 08.06.18 at 20:48, wrote: > At the moment, all modifications of the MSR lists are in current context. > However, future changes may need to put MSR_EFER into the lists from domctl > hypercall context. > > Plumb a struct vcpu parameter down through the infrastructure, and use >

[Xen-devel] [xen-4.8-testing test] 124070: regressions - trouble: blocked/broken/fail/pass

2018-06-12 Thread osstest service owner
flight 124070 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/124070/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm broken build-armhf-xsm 5

Re: [Xen-devel] [PATCH v1 05/13] xen/arm: Add command line option to control SSBD mitigation

2018-06-12 Thread Julien Grall
Hi Stefano, On 12/06/18 00:15, Stefano Stabellini wrote: On Tue, 5 Jun 2018, Julien Grall wrote: /* * Assembly code may use the variable directly, so we need to make sure * it fits in a register. @@ -251,19 +286,17 @@ static bool has_ssbd_mitigation(const struct arm_cpu_capabilities

Re: [Xen-devel] [PATCH for-4.11] scripts/add_maintainers.pl: Don't call get_maintainers.pl with -f

2018-06-12 Thread Julien Grall
On 12/06/18 12:18, Jan Beulich wrote: On 12.06.18 at 12:44, wrote: On 06/06/18 11:06, Julien Grall wrote: On 05/06/18 19:26, Lars Kurth wrote: This change in behaviour was mistakenly introduced in one of the later revisions (can't recall which), when we refactored the call to

Re: [Xen-devel] 4.11.0 RC1 panic

2018-06-12 Thread Manuel Bouyer
On Tue, Jun 12, 2018 at 01:57:35AM -0600, Jan Beulich wrote: > Let's focus on this scenario for now, as it is under better (timing) control > on the Xen side. Below is a first debugging patch which > - avoids the ASSERT() in question, instead triggering a printk(), in the hope > that the data

[Xen-devel] [distros-debian-snapshot test] 74858: tolerable FAIL

2018-06-12 Thread Platform Team regression test user
flight 74858 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74858/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-i386-daily-netboot-pvgrub 11 guest-start fail like 74781

Re: [Xen-devel] [PATCH v1] unmodified_drivers: unplug the emulated devices at resume time

2018-06-12 Thread Olaf Hering
Am Tue, 12 Jun 2018 09:01:07 -0600 schrieb "Jan Beulich" : > So there's no plan to fix this on the qemu side? Even if there would be one, existing dom0s may not get an update in time. I sent some prototype of a potential fix for qemu, it needs more work. Olaf pgpzDYSfvvGmr.pgp Description:

[Xen-devel] [PATCH 1/1] libxl/xl: rename id to unique-id in vdispl xen store

2018-06-12 Thread Oleksandr Grytsov
From: Oleksandr Grytsov In the display protocol connector's id is named as unique-id. This patch renames it in the libxl/xl code and uses XENDISPL_FIELD... definitions from the protocol header. Signed-off-by: Oleksandr Grytsov --- docs/man/xl.cfg.pod.5.in| 2 +-

Re: [Xen-devel] [PATCH v5 07/10] arm: add a tiny kconfig configuration

2018-06-12 Thread Stefano Stabellini
On Tue, 12 Jun 2018, Julien Grall wrote: > Hi Stefano, > > On 12/06/18 01:50, Stefano Stabellini wrote: > > On Tue, 5 Jun 2018, Julien Grall wrote: > > > Hi Stefano, > > > > > > On 04/06/18 18:24, Stefano Stabellini wrote: > > > > Add a tiny kconfig configuration. Enabled NULL and Credit

Re: [Xen-devel] 4.11.0 RC1 panic

2018-06-12 Thread Andrew Cooper
On 12/06/18 16:38, Manuel Bouyer wrote: > On Tue, Jun 12, 2018 at 01:39:05PM +0200, Manuel Bouyer wrote: >> I applied this patch to 4.11rc4 (let's not change too much things at the >> same time) and rebooted my test host. Hopefully I'll have some data to report >> soon > Got the first panic (still

Re: [Xen-devel] [PATCH v1] unmodified_drivers: unplug the emulated devices at resume time

2018-06-12 Thread Jan Beulich
>>> On 12.06.18 at 16:10, wrote: > Since qemu-2.10 it is required to unplug emulated devices again after > a live migration. If this is not done, qemu's block-backend driver > will be unable to open the backing disk image because it is still busy > by qemu's IDE driver. As a result the domUs

Re: [Xen-devel] [PATCH] xen/altp2m: set access_required properly for all altp2ms

2018-06-12 Thread Razvan Cojocaru
On 06/12/2018 03:35 PM, Razvan Cojocaru wrote: >>> @@ -210,7 +211,7 @@ static int p2m_init_altp2m(struct domain *d) >>> return -ENOMEM; >>> } >>> p2m->p2m_class = p2m_alternate; >>> -p2m->access_required = 1; >>> +p2m->access_required =

Re: [Xen-devel] 4.11.0 RC1 panic

2018-06-12 Thread Manuel Bouyer
On Tue, Jun 12, 2018 at 01:39:05PM +0200, Manuel Bouyer wrote: > I applied this patch to 4.11rc4 (let's not change too much things at the > same time) and rebooted my test host. Hopefully I'll have some data to report > soon Got the first panic (still from a i386 domU): login: (XEN) d4v0 Hit #DB

[Xen-devel] [PATCH 0/1] libxl/xl: rename id to unique-id in vdispl xen store

2018-06-12 Thread Oleksandr Grytsov
From: Oleksandr Grytsov As new version of the display protocol introduces unique-id variable, it needs to be changed in libxl/xl. This patchset renames it in the xen store and in display device structures. Also it uses XENDISPL_FIELD_... defines instead of inline names. Oleksandr Grytsov (1):

[Xen-devel] [xen-unstable test] 123379: regressions - FAIL

2018-06-12 Thread Juergen Gross
On 08/06/18 12:12, Juergen Gross wrote: > On 07/06/18 13:30, Juergen Gross wrote: >> On 06/06/18 11:40, Juergen Gross wrote: >>> On 06/06/18 11:35, Jan Beulich wrote: >>> On 05.06.18 at 18:19, wrote: >>> test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 14 >>> guest-saverestore.2

Re: [Xen-devel] 4.11.0 RC1 panic

2018-06-12 Thread Manuel Bouyer
On Tue, Jun 12, 2018 at 04:54:30PM +0100, Andrew Cooper wrote: > On 12/06/18 16:38, Manuel Bouyer wrote: > > On Tue, Jun 12, 2018 at 01:39:05PM +0200, Manuel Bouyer wrote: > >> I applied this patch to 4.11rc4 (let's not change too much things at the > >> same time) and rebooted my test host.

Re: [Xen-devel] [PATCH v5 07/10] arm: add a tiny kconfig configuration

2018-06-12 Thread Julien Grall
Hi, On 12/06/18 16:55, Stefano Stabellini wrote: On Tue, 12 Jun 2018, Julien Grall wrote: Hi Stefano, On 12/06/18 01:50, Stefano Stabellini wrote: On Tue, 5 Jun 2018, Julien Grall wrote: Hi Stefano, On 04/06/18 18:24, Stefano Stabellini wrote: Add a tiny kconfig configuration. Enabled

Re: [Xen-devel] [PATCH v3 3/9] xen/balloon: Share common memory reservation routines

2018-06-12 Thread Boris Ostrovsky
On 06/12/2018 09:41 AM, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko diff --git a/include/xen/mem-reservation.h b/include/xen/mem-reservation.h new file mode 100644 index ..e0939387278d --- /dev/null +++ b/include/xen/mem-reservation.h @@ -0,0 +1,64 @@ +/*

Re: [Xen-devel] [PATCH v3 4/9] xen/grant-table: Allow allocating buffers suitable for DMA

2018-06-12 Thread Boris Ostrovsky
On 06/12/2018 09:41 AM, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko Extend grant table module API to allow allocating buffers that can be used for DMA operations and mapping foreign grant references on top of those. The resulting buffer is similar to the one allocated by the

Re: [Xen-devel] [PATCH v3 5/9] xen/gntdev: Allow mappings for DMA buffers

2018-06-12 Thread Boris Ostrovsky
On 06/12/2018 09:41 AM, Oleksandr Andrushchenko wrote: static void gntdev_print_maps(struct gntdev_priv *priv, @@ -121,8 +146,27 @@ static void gntdev_free_map(struct grant_map *map) if (map == NULL) return; +#ifdef CONFIG_XEN_GRANT_DMA_ALLOC + if

Re: [Xen-devel] [PATCH v5 1/3] xen: Sync up with the canonical protocol definitions in Xen

2018-06-12 Thread Dmitry Torokhov
On Tue, Jun 12, 2018 at 03:46:10PM +0200, Juergen Gross wrote: > On 12/06/18 09:48, Oleksandr Andrushchenko wrote: > > From: Oleksandr Andrushchenko > > > > This is the sync up with the canonical definitions of the input, > > sound and display protocols in Xen. > > > > Changes to kbdif: > > 1.

Re: [Xen-devel] [PATCH v3 6/9] xen/gntdev: Make private routines/structures accessible

2018-06-12 Thread Boris Ostrovsky
On 06/12/2018 09:41 AM, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko This is in preparation for adding support of DMA buffer functionality: make map/unmap related code and structures, used privately by gntdev, ready for dma-buf extension, which will re-use these. Rename

[Xen-devel] [xen-4.8-testing test] 124100: regressions - FAIL

2018-06-12 Thread osstest service owner
flight 124100 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/124100/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm broken in 124070 build-i386-pvops

Re: [Xen-devel] [PATCH v3 7/9] xen/gntdev: Add initial support for dma-buf UAPI

2018-06-12 Thread Boris Ostrovsky
On 06/12/2018 09:41 AM, Oleksandr Andrushchenko wrote: diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index a09db23e9663..e82660d81d7e 100644 --- a/drivers/xen/gntdev.c +++ b/drivers/xen/gntdev.c @@ -48,6 +48,9 @@ #include #include "gntdev-common.h" +#ifdef

Re: [Xen-devel] [PATCH v3 8/9] xen/gntdev: Implement dma-buf export functionality

2018-06-12 Thread Boris Ostrovsky
On 06/12/2018 09:41 AM, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko 1. Create a dma-buf from grant references provided by the foreign domain. By default dma-buf is backed by system memory pages, but by providing GNTDEV_DMA_FLAG_XXX flags it can also be created as

Re: [Xen-devel] [PATCH v3 9/9] xen/gntdev: Implement dma-buf import functionality

2018-06-12 Thread Boris Ostrovsky
On 06/12/2018 09:42 AM, Oleksandr Andrushchenko wrote: int gntdev_dmabuf_imp_release(struct gntdev_dmabuf_priv *priv, u32 fd) { - return -EINVAL; + struct gntdev_dmabuf *gntdev_dmabuf; + struct dma_buf_attachment *attach; + struct dma_buf *dma_buf; + +

Re: [Xen-devel] [PATCH v2] xen/netfront: raise max number of slots in xennet_get_responses()

2018-06-12 Thread David Miller
From: Juergen Gross Date: Tue, 12 Jun 2018 08:57:53 +0200 > The max number of slots used in xennet_get_responses() is set to > MAX_SKB_FRAGS + (rx->status <= RX_COPY_THRESHOLD). > > In old kernel-xen MAX_SKB_FRAGS was 18, while nowadays it is 17. This > difference is resulting in frequent

Re: [Xen-devel] [PATCH v3 3/9] xen/balloon: Share common memory reservation routines

2018-06-12 Thread Boris Ostrovsky
On 06/12/2018 09:41 AM, Oleksandr Andrushchenko wrote: One more thing: please add a comment here saying that frames array is array of PFNs (in Xen granularity), which is what XENMEM_populate_physmap requires. And remove (or update to name the actual call you are making) the corresponding

[Xen-devel] strange behavior with Multiboot2 on EFI

2018-06-12 Thread Kristaps Čivkulis
Hello, I am implementing Multiboot2 support for FreeBSD loader to load Xen kernel. Currently I pass EFI 64-bit system table pointer tag, EFI boot services not terminated tag, EFI 64-bit image handle pointer tag and Image load base physical address tag. The problem is, Xen kernel gets stuck into

Re: [Xen-devel] [Qemu-devel] [PATCH v4 11/40] hw/xen: Use the IEC binary prefix definitions

2018-06-12 Thread Richard Henderson
On 06/12/2018 11:04 AM, Eric Blake wrote: > On 06/12/2018 03:51 PM, Richard Henderson wrote: >> On 06/10/2018 03:14 PM, Philippe Mathieu-Daudé wrote: >>>   xen_pv_printf(xendev, 1, "type \"%s\", fileproto \"%s\", filename >>> \"%s\"," >>> -  " size %" PRId64 " (%" PRId64 "

Re: [Xen-devel] [PATCH v5 1/3] xen: Sync up with the canonical protocol definitions in Xen

2018-06-12 Thread Oleksandr Andrushchenko
On 06/13/2018 02:40 AM, Dmitry Torokhov wrote: On Tue, Jun 12, 2018 at 03:46:10PM +0200, Juergen Gross wrote: On 12/06/18 09:48, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko This is the sync up with the canonical definitions of the input, sound and display protocols in Xen.

Re: [Xen-devel] [PATCH v5 3/3] Input: xen-kbdfront - allow better run-time configuration

2018-06-12 Thread Oleksandr Andrushchenko
On 06/13/2018 01:07 AM, Dmitry Torokhov wrote: On Tue, Jun 12, 2018 at 10:48:56AM +0300, Oleksandr Andrushchenko wrote: + if (!(with_kbd | with_ptr | with_mtouch)) { I changed this to logical "OR" and applied, thank you. Yes, that's better, thank you + ret = -ENXIO; +

Re: [Xen-devel] [Qemu-devel] [PATCH v4 11/40] hw/xen: Use the IEC binary prefix definitions

2018-06-12 Thread Richard Henderson
On 06/10/2018 03:14 PM, Philippe Mathieu-Daudé wrote: > xen_pv_printf(xendev, 1, "type \"%s\", fileproto \"%s\", filename > \"%s\"," > - " size %" PRId64 " (%" PRId64 " MB)\n", > + " size %" PRId64 " (%llu MB)\n", >blkdev->type,

[Xen-devel] [RFC PATCH 03/12] xenbus: add freeze/thaw/restore callbacks support

2018-06-12 Thread Anchal Agarwal
From: Munehisa Kamata Since commit b3e96c0c7562 ("xen: use freeze/restore/thaw PM events for suspend/resume/chkpt"), xenbus uses PMSG_FREEZE, PMSG_THAW and PMSG_RESTORE events for Xen suspend. However, they're actually assigned to xenbus_dev_suspend(), xenbus_dev_cancel() and xenbus_dev_resume()

[Xen-devel] [RFC PATCH 05/12] x86/xen: add system core suspend and resume callbacks

2018-06-12 Thread Anchal Agarwal
From: Munehisa Kamata Add Xen PVHVM specific system core callbacks for PM suspend and hibernation support. The callbacks suspend and resume Xen primitives, like shared_info, pvclock and grant table. Note that Xen suspend can handle them in a different manner, but system core callbacks are called

[Xen-devel] [RFC PATCH 02/12] xen/manage: introduce helper function to know the on-going suspend mode

2018-06-12 Thread Anchal Agarwal
From: Munehisa Kamata Introduce simple functions which help to know the on-going suspend mode so that other Xen-related code can behave differently according to the current suspend mode. Signed-off-by: Munehisa Kamata Signed-off-by: Anchal Agarwal Reviewed-by: Alakesh Haloi Reviewed-by:

[Xen-devel] [RFC PATCH 01/12] xen/manage: keep track of the on-going suspend mode

2018-06-12 Thread Anchal Agarwal
From: Munehisa Kamata To differentiate between Xen suspend, PM suspend and PM hibernation, keep track of the on-going suspend mode by mainly using a new PM notifier. Since Xen suspend doesn't have corresponding PM event, its main logic is modfied to acquire pm_mutex and set the current mode.

[Xen-devel] [RFC PATCH 09/12] x86/xen: save and restore steal clock

2018-06-12 Thread Anchal Agarwal
From: Munehisa Kamata Save steal clock values of all present CPUs in the system core ops suspend callbacks. Also, restore a boot CPU's steal clock in the system core resume callback. For non-boot CPUs, restore after they're brought up, because runstate info for non-boot CPUs are not active until

[Xen-devel] [RFC PATCH 06/12] xen-blkfront: add callbacks for PM suspend and hibernation

2018-06-12 Thread Anchal Agarwal
From: Munehisa Kamata Add freeze and restore callbacks for PM suspend and hibernation support. The freeze handler stops a block-layer queue and disconnect the frontend from the backend while freeing ring_info and associated resources. The restore handler re-allocates ring_info and re-connect to

[Xen-devel] [RFC PATCH 12/12] PM / hibernate: update the resume offset on SNAPSHOT_SET_SWAP_AREA

2018-06-12 Thread Anchal Agarwal
From: Aleksei Besogonov The SNAPSHOT_SET_SWAP_AREA is supposed to be used to set the hibernation offset on a running kernel to enable hibernating to a swap file. However, it doesn't actually update the swsusp_resume_block variable. As a result, the hibernation fails at the last step (after all

[Xen-devel] [RFC PATCH 00/12] Enable PM hibernation on guest VMs

2018-06-12 Thread Anchal Agarwal
Hello, I am sending out a series of patches that implements guest PM hibernation. These guests are running on xen hypervisor. The patches had been tested against mainstream kernel and latest xen version-4.11. EC2 instance hibernation feature is provided to the AWS EC2 customers. PM hibernation

[Xen-devel] [RFC PATCH 04/12] x86/xen: Introduce new function to map HYPERVISOR_shared_info on Resume

2018-06-12 Thread Anchal Agarwal
Introduce a small function which re-uses shared page's PA allocated during guest initialization time in reserve_shared_info() and not allocate new page during resume flow. It also does the mapping of shared_info_page by calling xen_hvm_init_shared_info() to use the function. Signed-off-by:

Re: [Xen-devel] [Qemu-devel] [PATCH v4 11/40] hw/xen: Use the IEC binary prefix definitions

2018-06-12 Thread Eric Blake
On 06/12/2018 03:51 PM, Richard Henderson wrote: On 06/10/2018 03:14 PM, Philippe Mathieu-Daudé wrote: xen_pv_printf(xendev, 1, "type \"%s\", fileproto \"%s\", filename \"%s\"," - " size %" PRId64 " (%" PRId64 " MB)\n", + " size %" PRId64 " (%llu MB)\n",

Re: [Xen-devel] [PATCH v5 0/10] arm: more kconfig configurability and small default configs

2018-06-12 Thread Stefano Stabellini
On Tue, 12 Jun 2018, Jan Beulich wrote: > >> >> As a consequence of these changes, some options will become user-visible > >> >> and not dependent on CONFIG_EXPERT. It does not mean that Xen Project > >> >> will security support all possible combinations of kconfig options. > >> >> Instead, there

[Xen-devel] TESTDAY report 4.11rc6

2018-06-12 Thread pierre-philipp braun
Hello! Here is a success report for 4.11.0 rc6. Better late than never, right? ## Hardware - modern Lenovo V520-15IKL Desktop (i5-7400: 4 cores) - old monster IBM 3850 M2 (x4 Xeon X7350: 16 cores) I wish I had some Opterons available. ## Software (resp.) - Devuan/ascii and Linux

  1   2   >