[Xen-devel] [xen-4.6-testing test] 62163: regressions - FAIL

2015-09-21 Thread osstest service owner
flight 62163 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/62163/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 5 xen-install fail REGR. vs. 62015 test-amd64-amd64-

[Xen-devel] [BUG] XEN domU crash when PV grub chainloads 32-bit domU grub

2015-09-21 Thread Andreas Sundstrom
This is using Debian Jessie and grub 2.02~beta2-22 (with Debian patches applied) and Xen 4.4.1 I originally posted a bug report with Debian but got the suggestion to file bugs with upstream as well. Debian bug report: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799480 Note that my original

Re: [Xen-devel] [PATCH] xen/mcfg: Call PHYSDEVOP_pci_mmcfg_reserved before PCI enumeration

2015-09-21 Thread Jan Beulich
>>> Konrad Rzeszutek Wilk 09/21/15 8:06 PM >>> >- Never figured out how much data we should save in the Xen's >struct pci_device to see if we are 'stale'. Looking back I think >we just need to do the interogation of the PCI capabilities and see >if they have somehow changed (the ones we care about

Re: [Xen-devel] [PATCH] xen/mcfg: Call PHYSDEVOP_pci_mmcfg_reserved before PCI enumeration

2015-09-21 Thread Jan Beulich
>>> Ed Swierk 09/21/15 6:01 PM >>> >The fundamental problem is that Xen tries to access extended config >space in pci_add_device(), before the Dom0 finally figures out where >MMCONFIG area is and makes the pci_mmcfg_reserved hypercall. The only >robust solution seems to be for Xen to defer extende

Re: [Xen-devel] [PATCH v7 15/17] vmx: VT-d posted-interrupt core logic handling

2015-09-21 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Monday, September 21, 2015 10:12 PM > To: Wu, Feng; George Dunlap > Cc: xen-devel@lists.xen.org; Tian, Kevin; Keir Fraser; George Dunlap; Andrew > Cooper; Jan Beulich > Subject: Re: [Xen-devel] [PATCH v

[Xen-devel] [linux-3.14 test] 62161: regressions - FAIL

2015-09-21 Thread osstest service owner
flight 62161 linux-3.14 real [real] http://logs.test-lab.xenproject.org/osstest/logs/62161/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qcow2 13 guest-saverestore fail REGR. vs. 60666 test-amd64-i386-xl-vhd

[Xen-devel] [linux-3.16 baseline-only test] 37997: regressions - trouble: broken/fail/pass

2015-09-21 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 37997 linux-3.16 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/37997/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-amd 3 host-instal

Re: [Xen-devel] [PATCH RFC] xen: if on Xen, "flatten" the scheduling domain hierarchy

2015-09-21 Thread Juergen Gross
On 09/21/2015 07:49 AM, Juergen Gross wrote: On 09/15/2015 06:50 PM, Dario Faggioli wrote: On Thu, 2015-08-20 at 20:16 +0200, Juergen Groß wrote: On 08/18/2015 05:55 PM, Dario Faggioli wrote: Hey everyone, So, as a followup of what we were discussing in this thread: [Xen-devel] PV-vNUMA i

Re: [Xen-devel] [PATCH 2/2] xen: arm: traps: correct cond

2015-09-21 Thread Peng Fan
On Mon, Sep 21, 2015 at 11:33:10AM +0100, Ian Campbell wrote: >On Mon, 2015-09-21 at 17:08 +0800, Peng Fan wrote: >> On Mon, Sep 21, 2015 at 11:10:11AM +0100, Julien Grall wrote: >> > Hi Peng, >> > >> > On 21/09/15 08:07, Peng Fan wrote: >> > > From "G6.2.29 CPSR, Current Program Status Register"

Re: [Xen-devel] [PATCH v6 2/2] xen/arm: support gzip compressed kernels

2015-09-21 Thread Stefano Stabellini
On Tue, 22 Sep 2015, Stefano Stabellini wrote: > On Tue, 22 Sep 2015, Julien Grall wrote: > > Hi Stefano, > > > > On 21/09/2015 23:51, Stefano Stabellini wrote: > > > Changes in v6: > > > - use vmap to map pages > > > - free old module and update mod->start and mod->size from > > > kernel_decompre

Re: [Xen-devel] [PATCH v6 2/2] xen/arm: support gzip compressed kernels

2015-09-21 Thread Stefano Stabellini
On Tue, 22 Sep 2015, Julien Grall wrote: > Hi Stefano, > > On 21/09/2015 23:51, Stefano Stabellini wrote: > > Changes in v6: > > - use vmap to map pages > > - free old module and update mod->start and mod->size from > > kernel_decompress > > I was expecting you to drop my Reviewed-by given those

[Xen-devel] [qemu-mainline bisection] complete test-armhf-armhf-xl-raw

2015-09-21 Thread osstest service owner
branch xen-unstable xen branch xen-unstable job test-armhf-armhf-xl-raw test xen-boot Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemuu git://git.qemu.org/qemu.git Tree: xen git://xenbits.xen.org/xen.git *** Found an

[Xen-devel] [xen-unstable test] 62156: regressions - FAIL

2015-09-21 Thread osstest service owner
flight 62156 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/62156/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate fail REGR. vs. 61627 R

Re: [Xen-devel] [PATCH] xen-blkback: free requests on disconnection

2015-09-21 Thread Julien Grall
Hi Konrad, On 09/09/2015 16:02, Konrad Rzeszutek Wilk wrote: Konrad, would you like me to resend the patch with the modified commit message, or do you plan to amend it yourself while committing? I will amend it. Thanks! What the status for this patch? Regards, -- Julien Grall

Re: [Xen-devel] [PATCH v6 2/2] xen/arm: support gzip compressed kernels

2015-09-21 Thread Julien Grall
Hi Stefano, On 21/09/2015 23:51, Stefano Stabellini wrote: Changes in v6: - use vmap to map pages - free old module and update mod->start and mod->size from kernel_decompress I was expecting you to drop my Reviewed-by given those changes. diff --git a/xen/arch/arm/kernel.c b/xen/arch/arm/ker

[Xen-devel] [PATCH v6 2/2] xen/arm: support gzip compressed kernels

2015-09-21 Thread Stefano Stabellini
Free the memory used for the compressed kernel and update the relative mod->start and mod->size parameters with the uncompressed ones. To decompress the kernel, allocate memory from dommheap, because freeing the modules is done by calling init_heap_pages, which frees to domheap. Map these pages us

[Xen-devel] [PATCH v6 1/2] xen: move perform_gunzip to common

2015-09-21 Thread Stefano Stabellini
The current gunzip code to decompress the Dom0 kernel is implemented in inflate.c which is included by bzimage.c. I am looking to doing the same on ARM64 but there is quite a bit of boilerplate definitions that I would need to import in order for inflate.c to work correctly. Instead of copying/pa

[Xen-devel] [PATCH v6 0/2] support gzipped kernels on arm

2015-09-21 Thread Stefano Stabellini
Hi all, this patch series introduces support for gzipped kernels, such as the standard Image.gz format used by Linux on arm64 by default, in Xen on arm. Without it, Xen cannot load the default kernel shipped by distros, such as CentOS 7. Stefano Stabellini (2): xen: move perform_gunzip to

[Xen-devel] [qemu-upstream-4.5-testing test] 62151: regressions - FAIL

2015-09-21 Thread osstest service owner
flight 62151 qemu-upstream-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/62151/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-vhd9 debian-di-install fail REGR. vs. 60577 test-am

[Xen-devel] [qemu-upstream-4.3-testing baseline-only test] 37996: regressions - FAIL

2015-09-21 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 37996 qemu-upstream-4.3-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/37996/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-win7-amd

Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops

2015-09-21 Thread Linus Torvalds
On Mon, Sep 21, 2015 at 11:16 AM, Andy Lutomirski wrote: > > In the interest of sanity, I want to drop the "native_", too Yes. I think the only reason it exists is to have that wrapper layer for PV. And that argument just goes away if you just make the non-inline helper function do all the PV log

Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops

2015-09-21 Thread Borislav Petkov
On Mon, Sep 21, 2015 at 11:16:30AM -0700, Andy Lutomirski wrote: > In the interest of sanity, I want to drop the "native_", too, since > there appear to be few or no good use cases for native_read_msr as > such. I'm tempted to add new functions read_msr and write_msr that > forward to rdmsrl_safe

Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops

2015-09-21 Thread Andy Lutomirski
On Mon, Sep 21, 2015 at 9:36 AM, Linus Torvalds wrote: > On Mon, Sep 21, 2015 at 1:46 AM, Ingo Molnar wrote: >> >> Linus, what's your preference? > > So quite frankly, is there any reason we don't just implement > native_read_msr() as just > >unsigned long long native_read_msr(unsigned int ms

Re: [Xen-devel] [PATCH] xen/mcfg: Call PHYSDEVOP_pci_mmcfg_reserved before PCI enumeration

2015-09-21 Thread Konrad Rzeszutek Wilk
On Mon, Sep 21, 2015 at 08:58:44AM -0700, Ed Swierk wrote: > After testing this change on different platforms, I'm finding some > complications. > > As I understand it, the BIOS is supposed to mark the MMCONFIG area > reserved in the E820 table no matter what. And if the ACPI DSDT > includes an MC

Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops

2015-09-21 Thread Andy Lutomirski
On Mon, Sep 21, 2015 at 9:49 AM, Arjan van de Ven wrote: > On 9/21/2015 9:36 AM, Linus Torvalds wrote: >> >> On Mon, Sep 21, 2015 at 1:46 AM, Ingo Molnar wrote: >>> >>> >>> Linus, what's your preference? >> >> >> So quite frankly, is there any reason we don't just implement >> native_read_msr() a

Re: [Xen-devel] [PATCH RFC tools 1/6] tools: Refactor "xentoollog" into its own library

2015-09-21 Thread Andrew Cooper
On 21/09/15 18:13, Ian Jackson wrote: > Andrew Cooper writes ("Re: [Xen-devel] [PATCH RFC tools 1/6] tools: Refactor > "xentoollog" into its own library"): >> On 21/09/15 17:17, Ian Jackson wrote: >>> Do you mean that statement expressions (originally a GNU extension) >>> should be avoided in tool

Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops

2015-09-21 Thread Linus Torvalds
On Mon, Sep 21, 2015 at 9:49 AM, Arjan van de Ven wrote: >> >> How many msr reads are so critical that the function call >> overhead would matter? > > if anything qualifies it'd be switch_to() and friends. Is there anything else than the FS/GS_BASE thing (possibly hidden behind inlines etc that I

Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops

2015-09-21 Thread Arjan van de Ven
On 9/21/2015 9:36 AM, Linus Torvalds wrote: On Mon, Sep 21, 2015 at 1:46 AM, Ingo Molnar wrote: Linus, what's your preference? So quite frankly, is there any reason we don't just implement native_read_msr() as just unsigned long long native_read_msr(unsigned int msr) { int er

Re: [Xen-devel] [PATCH RFC tools 1/6] tools: Refactor "xentoollog" into its own library

2015-09-21 Thread Ian Jackson
Andrew Cooper writes ("Re: [Xen-devel] [PATCH RFC tools 1/6] tools: Refactor "xentoollog" into its own library"): > On 21/09/15 17:17, Ian Jackson wrote: > > Do you mean that statement expressions (originally a GNU extension) > > should be avoided in tools code ? A quick git-grep discovered that

Re: [Xen-devel] [PATCH RFC tools 1/6] tools: Refactor "xentoollog" into its own library

2015-09-21 Thread Andrew Cooper
On 21/09/15 17:17, Ian Jackson wrote: > Andrew Cooper writes ("Re: [Xen-devel] [PATCH RFC tools 1/6] tools: Refactor > "xentoollog" into its own library"): >> On 10/06/15 12:36, Ian Campbell wrote: >>> + >>> +#define XTL_NEW_LOGGER(LOGGER,buffer) ({\ >>> +xentoo

[Xen-devel] [qemu-upstream-4.6-testing baseline-only test] 37994: regressions - FAIL

2015-09-21 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 37994 qemu-upstream-4.6-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/37994/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl 6 xe

Re: [Xen-devel] [PATCH v2 1/2] x86/msr: Carry on after a non-"safe" MSR access fails without !panic_on_oops

2015-09-21 Thread Linus Torvalds
On Mon, Sep 21, 2015 at 1:46 AM, Ingo Molnar wrote: > > Linus, what's your preference? So quite frankly, is there any reason we don't just implement native_read_msr() as just unsigned long long native_read_msr(unsigned int msr) { int err; unsigned long long val; val = na

Re: [Xen-devel] [PATCH RFC tools 1/6] tools: Refactor "xentoollog" into its own library

2015-09-21 Thread Ian Jackson
Andrew Cooper writes ("Re: [Xen-devel] [PATCH RFC tools 1/6] tools: Refactor "xentoollog" into its own library"): > On 10/06/15 12:36, Ian Campbell wrote: > > + > > +#define XTL_NEW_LOGGER(LOGGER,buffer) ({\ > > +xentoollog_logger_##LOGGER *new_consumer;

Re: [Xen-devel] [PATCH OSSTEST] Debian: Avoid uninitialised string warn when getting host firmware property

2015-09-21 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST] Debian: Avoid uninitialised string warn when getting host firmware property"): > Signed-off-by: Ian Campbell Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH OSSTEST] Debian: handle move of ip(8) to /sbin in Jessie

2015-09-21 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST] Debian: handle move of ip(8) to /sbin in Jessie"): > Unfortunately udev treats non-absolute commands as relative to > /lib/udev rather than consulting $PATH, so we have to figure out the > path based on the suite. Bah. Tempting to say `use env(1)' but of cou

Re: [Xen-devel] [PULL 0/19] xen-2015-09-08-tag

2015-09-21 Thread Stefano Stabellini
It is going to be in QEMU 2.5 and qemu-xen 4.7. On Mon, 21 Sep 2015, Chen, Tiejun wrote: > Stefano, > > I have two questions, > > #1. Which qemu version is this igd stuff going into? 2.6? > #2. Is this igd stuff going into qemu-xen inside xen? Any plan to go into xen > 4.6? > > Thanks > Tiejun

Re: [Xen-devel] [PATCH] xen/mcfg: Call PHYSDEVOP_pci_mmcfg_reserved before PCI enumeration

2015-09-21 Thread Ed Swierk
After testing this change on different platforms, I'm finding some complications. As I understand it, the BIOS is supposed to mark the MMCONFIG area reserved in the E820 table no matter what. And if the ACPI DSDT includes an MCFG record, then it should also include a PNP0C0x record for the MMCONFI

Re: [Xen-devel] [PATCH 0/2] GICv3: Clean up + enable support on GICv4

2015-09-21 Thread Julien Grall
Hi Ian, I think this series is all acked. Would it be possible to merge it in unstable? Regards, On 14/09/15 16:32, Julien Grall wrote: > Hi all, > > This small patch series allow Xen to run on platform reporting GICv4 > in the GIC*_PIDR2. > > Sincerely yours, > > Julien Grall (2): > xen/ar

Re: [Xen-devel] [PATCH XEN v2 05/15] tools: Refactor /dev/xen/evtchn wrappers into libxenevtchn.

2015-09-21 Thread Ian Campbell
On Wed, 2015-07-15 at 16:46 +0100, Ian Campbell wrote: > diff --git a/tools/libxenevtchn/include/xenevtchn.h > [...] > +/* A port identifier is guaranteed to fit in 31 bits. */ > +typedef int evtchn_port_or_error_t; > [...] > +/* > + * Returns a new event port awaiting interdomain connection from

Re: [Xen-devel] [PATCH v6 26/29] libxc/xen: introduce a start info structure for HVMlite guests

2015-09-21 Thread Jan Beulich
>>> On 04.09.15 at 14:09, wrote: First of all - I suppose it is intentional for this to not consider the Dom0 side (yet)? > --- a/tools/libxc/xc_dom_x86.c > +++ b/tools/libxc/xc_dom_x86.c > @@ -560,7 +560,70 @@ static int alloc_magic_pages_hvm(struct xc_dom_image > *dom) > xc_hvm_param_set

Re: [Xen-devel] [PATCH v6 24/29] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs

2015-09-21 Thread Jan Beulich
>>> On 04.09.15 at 14:09, wrote: > Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and > VCPUOP_is_up hypercalls from HVM guests. > > This patch introduces a new structure (vcpu_hvm_context) that should be used > in conjuction with the VCPUOP_initialise hypercall in order to init

Re: [Xen-devel] [PATCH v7 15/28] xen/arm: ITS: Add virtual ITS driver

2015-09-21 Thread Julien Grall
Hi Vijay, On 18/09/15 14:09, vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > This patch introduces virtual ITS driver with following > functionality > - Introduces helper functions to manage device table and >ITT table in guest memory > - Helper function to handle virtual ITS devi

Re: [Xen-devel] [PATCH] xen/x86: Don't try to write syscall-related MSRs for PV guests

2015-09-21 Thread Konrad Rzeszutek Wilk
On Mon, Sep 21, 2015 at 09:09:28AM -0400, Boris Ostrovsky wrote: > For PV guests these registers are set up by hypervisor and thus > should not be written by the guest. The comment in xen_write_msr_safe() > says so but we still write the MSRs, causing the hypervisor to > print a warning. > > Signe

[Xen-devel] [xen-4.4-testing baseline-only test] 37995: tolerable FAIL

2015-09-21 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 37995 xen-4.4-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/37995/ Failures :-/ but no regressions. Tests which did not succeed, including tests which could not be run: test-amd64-amd64-rumpuserxen-amd64 1 build-

Re: [Xen-devel] [PATCH v7 14/28] xen/arm: ITS: Initialize physical ITS and export lpi support

2015-09-21 Thread Julien Grall
Hi Vijay, On 18/09/15 14:09, vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > Initialize physical ITS if HW supports LPIs. > > Signed-off-by: Vijaya Kumar K > --- > v7: - Export lpi support information to vgic-v3 driver from gic-v3. > - Drop gic_lpi_supported() helper function >

[Xen-devel] [PATCH OSSTEST] Debian: Avoid uninitialised string warn when getting host firmware property

2015-09-21 Thread Ian Campbell
Signed-off-by: Ian Campbell --- Osstest/Debian.pm | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm index 8675922..a8b62ca 100644 --- a/Osstest/Debian.pm +++ b/Osstest/Debian.pm @@ -1169,7 +1169,7 @@ END preseed_microcode($ho,$sfx);

[Xen-devel] [PATCH OSSTEST] Debian: handle move of ip(8) to /sbin in Jessie

2015-09-21 Thread Ian Campbell
Unfortunately udev treats non-absolute commands as relative to /lib/udev rather than consulting $PATH, so we have to figure out the path based on the suite. Without this the force-mac-address workaround (needed on Arndale) doesn't work. Signed-off-by: Ian Campbell --- ts-host-install | 4 +++-

Re: [Xen-devel] DRAFT XSA 142 - libxl fails to honour readonly flag on disks with qemu-xen [and 1 more messages]

2015-09-21 Thread Ian Jackson
M A Young writes ("Re: DRAFT XSA 142 - libxl fails to honour readonly flag on disks with qemu-xen"): > Of course you still need a separate patch for xen 4.5.1 and earlier as the > xsa142.patch file attached is only valid for xen 4.6.0. Replacing > ERROR_INVAL with NULL works for xen 4.5.1 and co

Re: [Xen-devel] [PATCH V2 0/2] Introspection optimization helpers

2015-09-21 Thread Julien Grall
On 21/09/15 14:58, Razvan Cojocaru wrote: > Hello, Hi Razvan, > This doesn't have much to do with this series, but when running > scripts/get-maintainer.pl on my patches, I got "Stefano Stabellini > " for my first patch, and "Stefano > Stabellini " for the second one (i.e. the > second address is

Re: [Xen-devel] [PATCH v7 13/28] xen/arm: Move vgic rank locking inside get_irq_priority

2015-09-21 Thread Julien Grall
On 18/09/15 14:09, vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > Move vgic rank locking inside get_irq_priority callback. > LPIs does not have vgic rank lock for reading LPI priority. > So make generic vgic code cleaner. The commit message is not clear. I would rewrite like that: "Th

Re: [Xen-devel] [PATCH v6 18/29] xen/x86: allow disabling the emulated pmu

2015-09-21 Thread Boris Ostrovsky
On 09/21/2015 10:36 AM, Jan Beulich wrote: On 04.09.15 at 14:08, wrote: Hmm - this seems questionable to me: Isn't the vPMU an optional feature anyway? I.e. doesn't need separate handling here? Boris? It is optional system-wise, not per-guest, which is what I think Roger is trying to do. I i

[Xen-devel] [seabios test] 62149: regressions - FAIL

2015-09-21 Thread osstest service owner
flight 62149 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/62149/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 18 guest-start.2 fail REGR. vs. 62000 Regressions which ar

Re: [Xen-devel] [PATCH v6 22/29] elfnotes: intorduce a new PHYS_ENTRY elfnote

2015-09-21 Thread Jan Beulich
>>> On 04.09.15 at 14:09, wrote: > --- a/xen/include/public/elfnote.h > +++ b/xen/include/public/elfnote.h > @@ -200,9 +200,18 @@ > #define XEN_ELFNOTE_SUPPORTED_FEATURES 17 > > /* > + * Physical entry point into the kernel. > + * > + * 32bit entry point into the kernel. Xen will use this entr

[Xen-devel] DRAFT XSA 142 - libxl fails to honour readonly flag on disks with qemu-xen

2015-09-21 Thread Xen . org security team
* DRAFT DRAFT DRAFT * Xen Security Advisory XSA-142 libxl fails to honour readonly flag on disks with qemu-xen ISSUE DESCRIPTION = Callers of libxl can specify that a disk should be read-only to the guest. However, there is no code in libxl t

Re: [Xen-devel] [PATCH v2] xen: Improve x86's alloc_vcpu_guest_context()

2015-09-21 Thread Ian Campbell
On Mon, 2015-09-21 at 08:12 -0600, Jan Beulich wrote: > > > > On 17.09.15 at 18:52, wrote: > > This essentially reverts c/s 2037f2adb "x86: introduce > > alloc_vcpu_guest_context()", including the newer arm bits, but achieves > > the same end goal by using the newer vmalloc() infrastructure. > >

Re: [Xen-devel] [PATCH v7 12/28] xen/arm: ITS: Plumbing hw_irq_controller for LPIs

2015-09-21 Thread Julien Grall
Hi Vijay, Title: I would replace "Plumbing" by "Plumb" On 18/09/15 14:08, vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > Change callbacks gic_host_irq_type and gic_guest_irq_type > to gic_get_host_irq_type and gic_get_guest_irq_type > in gic_hw_operations, which returns hw_irq_control

Re: [Xen-devel] vTPM ownership problem

2015-09-21 Thread Xu, Quan
There are 2 error information: 1. The following is misleading, but correct. So ignore it. ERROR[VTPM]: LoadKey failure: Unrecognized uuid! 405ffc60-6b15-48e0-921a-d6645db0be03 ERROR[VTPM]: Failed to load key 2. This is maybe the problem: ERROR[VTPM]: LoadKey failure: Unrecognized uuid!

Re: [Xen-devel] [PATCH v7 10/28] xen/arm: ITS: Implement hw_irq_controller for LPIs

2015-09-21 Thread Julien Grall
Hi Vijay, On 18/09/15 14:08, vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > Implement hw_irq_controller callbacks required to > handle LPIs. > > Signed-off-by: Vijaya Kumar K With the 3 changes requested below: Reviewed-by: Julien Grall > --- > xen/arch/arm/gic-v3-its.c

Re: [Xen-devel] [PATCH v6 18/29] xen/x86: allow disabling the emulated pmu

2015-09-21 Thread Jan Beulich
>>> On 04.09.15 at 14:08, wrote: Hmm - this seems questionable to me: Isn't the vPMU an optional feature anyway? I.e. doesn't need separate handling here? Boris? Jan > Signed-off-by: Roger Pau Monné > Acked-by: Andrew Cooper > Cc: Jan Beulich > Cc: Andrew Cooper > --- > Changes since v4: >

Re: [Xen-devel] [PATCH v6 17/29] xen/x86: allow disabling the emulated PIC

2015-09-21 Thread Jan Beulich
>>> On 04.09.15 at 14:08, wrote: > @@ -425,6 +431,9 @@ void vpic_reset(struct domain *d) > > void vpic_init(struct domain *d) > { > +if ( !has_vpic(d) ) > +return; vpic_reset() above this function as well as functions further down in the source file aren't static, yet you aren't a

Re: [Xen-devel] [PATCH for-4.6] p2m/ept: Set the A bit only if PML is enabled

2015-09-21 Thread Tim Deegan
At 20:47 +0100 on 16 Sep (1442436442), Andrew Cooper wrote: > On 16/09/2015 09:47, Ross Lagerwall wrote: > > Since commit 191b3f3344ee ("p2m/ept: enable PML in p2m-ept for > > log-dirty"), the A and D bits of EPT paging entries are set > > unconditionally, regardless of whether PML is enabled or no

Re: [Xen-devel] [OSSTEST PATCH 19/26] ts-debian-hvm-install: Cope with images containing only isolinux

2015-09-21 Thread Ian Jackson
Ian Jackson writes ("Re: [OSSTEST PATCH 19/26] ts-debian-hvm-install: Cope with images containing only isolinux"): > Ian Campbell writes ("Re: [OSSTEST PATCH 19/26] ts-debian-hvm-install: Cope > with images containing only isolinux"): > > Acked-by: Ian Campbell > > Thanks, but given the circmst

Re: [Xen-devel] [PATCH v7 15/17] vmx: VT-d posted-interrupt core logic handling

2015-09-21 Thread Dario Faggioli
On Mon, 2015-09-21 at 12:22 +, Wu, Feng wrote: > > > -Original Message- > > From: George Dunlap [mailto:george.dun...@citrix.com] > > You also need to check that local_events_need_delivery() will > > return > > "true" if you get an interrupt between that time and entering the > > hype

Re: [Xen-devel] [PATCH v7 09/28] xen/arm: ITS: Introduce gic_is_lpi helper function

2015-09-21 Thread Julien Grall
Hi Vijay, On 18/09/15 14:08, vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > Helper function gic_is_lpi() is used to find > if irq is lpi or not. For GICv2 platforms this function > returns number of irq ids which represents only number of line irqs. > For GICv3 platform irq ids are cal

[Xen-devel] [linux-mingo-tip-master test] 62148: regressions - FAIL

2015-09-21 Thread osstest service owner
flight 62148 linux-mingo-tip-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/62148/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs.

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-09-21 Thread Jan Beulich
>>> On 21.09.15 at 16:03, wrote: On 21.09.15 at 20:04, < jbeul...@suse.com > wrote: >> >>> On 21.09.15 at 11:46, wrote: >> >>> >>> On 21.09.15 at 16:51, < jbeul...@suse.com > wrote: >> >>- Anything else? >> > >> > >> > Just test the extreme case. The ATS specification mandates a timeout >>

Re: [Xen-devel] [PATCH] xen/x86: Record xsave features in c->x86_capabilities

2015-09-21 Thread Jan Beulich
>>> On 21.09.15 at 16:09, wrote: > On 21/09/15 15:00, Jan Beulich wrote: > On 21.09.15 at 15:51, wrote: >>> On 21/09/15 14:04, Jan Beulich wrote: >>> On 17.09.15 at 13:40, wrote: > +/* Mask out features not currently understood by Xen. */ > +eax &= (cpufeat_mask(X86_FEATU

Re: [Xen-devel] [PATCH v2] xen: Improve x86's alloc_vcpu_guest_context()

2015-09-21 Thread Jan Beulich
>>> On 17.09.15 at 18:52, wrote: > This essentially reverts c/s 2037f2adb "x86: introduce > alloc_vcpu_guest_context()", including the newer arm bits, but achieves > the same end goal by using the newer vmalloc() infrastructure. > > For both x86 and ARM, {alloc,free}_vcpu_guest_context() become a

[Xen-devel] [ovmf test] 62150: all pass - PUSHED

2015-09-21 Thread osstest service owner
flight 62150 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/62150/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf 9a470dae60ed0c57afdf61342616dd1768ba5ec8 baseline version: ovmf 2f667c5488c81924861901d4d7c6f4bb170

Re: [Xen-devel] [PATCH v7 15/17] vmx: VT-d posted-interrupt core logic handling

2015-09-21 Thread Dario Faggioli
On Mon, 2015-09-21 at 13:50 +, Wu, Feng wrote: > > > -Original Message- > > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > > Note that, in case of preemptions, we are switching from a non-idle > > vcpu to another, non-idle, vcpu, so lazy context switching to the > > idle >

Re: [Xen-devel] [PATCH] xen/x86: Record xsave features in c->x86_capabilities

2015-09-21 Thread Andrew Cooper
On 21/09/15 15:00, Jan Beulich wrote: On 21.09.15 at 15:51, wrote: On 21/09/15 14:04, Jan Beulich wrote: On 17.09.15 at 13:40, wrote: Jan: I have opted for adding leaf 8 rather than reusing leaf 2, due to the uncertainty with how this information is exposed in libxl. This patch introduces

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-09-21 Thread Xu, Quan
George / Tim, Could you help me review these memory patches? Thanks! -Quan > -Original Message- > From: Xu, Quan > Sent: Wednesday, September 16, 2015 9:24 PM > To: andrew.coop...@citrix.com; Dong, Eddie; ian.campb...@citrix.com; > ian.jack...@eu.citrix.com; jbeul...@suse.com; Nakajima,

Re: [Xen-devel] [Patch RFC 00/13] VT-d Asynchronous Device-TLB Flush for ATS Device

2015-09-21 Thread Xu, Quan
>>> On 21.09.15 at 20:04, < jbeul...@suse.com > wrote: > >>> On 21.09.15 at 11:46, wrote: > >>> >>> On 21.09.15 at 16:51, < jbeul...@suse.com > wrote: > >>- Anything else? > > > > > > Just test the extreme case. The ATS specification mandates a timeout > > of 1 _minute_ for cache flush, even thou

[Xen-devel] [PATCH 3/3] x86/p2m‑ept: adjust some types in ept_set_entry()

2015-09-21 Thread Jan Beulich
Use unsigned and bool_t as appropriate. Signed-off-by: Jan Beulich --- a/xen/arch/x86/mm/p2m-ept.c +++ b/xen/arch/x86/mm/p2m-ept.c @@ -662,12 +662,12 @@ ept_set_entry(struct p2m_domain *p2m, un { ept_entry_t *table, *ept_entry = NULL; unsigned long gfn_remainder = gfn; -int i, tar

[Xen-devel] [PATCH 2/3] x86/p2m‑pt: use pre‑calculated IOMMU flags

2015-09-21 Thread Jan Beulich
... instead of recalculating them. At once clean up formatting of the touched code and drop a stray loop local variable shadowing a function scope one. Signed-off-by: Jan Beulich --- a/xen/arch/x86/mm/p2m-pt.c +++ b/xen/arch/x86/mm/p2m-pt.c @@ -655,17 +655,13 @@ p2m_pt_set_entry(struct p2m_doma

[Xen-devel] [PATCH 1/3] x86/p2m: tighten conditions of IOMMU mapping updates

2015-09-21 Thread Jan Beulich
In the EPT case permission changes should also result in updates or TLB flushes. In the NPT case the old MFN does not depend on the new entry being valid (but solely on the old one), and the need to update or TLB-flush again also depends on permission changes. In the shadow mode case, iommu_hap_p

Re: [Xen-devel] [PATCH] xen/x86: Record xsave features in c->x86_capabilities

2015-09-21 Thread Jan Beulich
>>> On 21.09.15 at 15:51, wrote: > On 21/09/15 14:04, Jan Beulich wrote: > On 17.09.15 at 13:40, wrote: >>> Jan: I have opted for adding leaf 8 rather than reusing leaf 2, due to the >>> uncertainty with how this information is exposed in libxl. This patch >>> introduces no change with how t

[Xen-devel] [PATCH 0/3] x86: further P2M adjustments

2015-09-21 Thread Jan Beulich
1: p2m: tighten conditions of IOMMU mapping updates 2: p2m-pt: use pre-calculated IOMMU flags 3: p2m-ept: adjust some types in ept_set_entry() Signed-off-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH V2 0/2] Introspection optimization helpers

2015-09-21 Thread Razvan Cojocaru
Hello, This doesn't have much to do with this series, but when running scripts/get-maintainer.pl on my patches, I got "Stefano Stabellini " for my first patch, and "Stefano Stabellini " for the second one (i.e. the second address is missing the ".eu" part). I don't know if this is intended, so th

Re: [Xen-devel] [PATCH] xen/x86: Record xsave features in c->x86_capabilities

2015-09-21 Thread Andrew Cooper
On 21/09/15 14:04, Jan Beulich wrote: On 17.09.15 at 13:40, wrote: Jan: I have opted for adding leaf 8 rather than reusing leaf 2, due to the uncertainty with how this information is exposed in libxl. This patch introduces no change with how the information is represented in userspace. Mind e

Re: [Xen-devel] [PATCH v7 15/17] vmx: VT-d posted-interrupt core logic handling

2015-09-21 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Monday, September 21, 2015 9:32 PM > To: Wu, Feng; George Dunlap > Cc: xen-devel@lists.xen.org; Tian, Kevin; Keir Fraser; George Dunlap; Andrew > Cooper; Jan Beulich > Subject: Re: [Xen-devel] [PATCH v7

Re: [Xen-devel] [PATCH v7 08/28] xen/arm: ITS: Add APIs to add and assign device

2015-09-21 Thread Julien Grall
Hi Vijay, On 18/09/15 14:08, vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > Add APIs to add devices to RB-tree, assign and remove > devices to domain. > > Signed-off-by: Vijaya Kumar K > --- > v7: - Added check for domain in its_assign_device() to avoid > assigning device to Do

[Xen-devel] [PATCH V2 0/2] Introspection optimization helpers

2015-09-21 Thread Razvan Cojocaru
Hello, This series adds two minor patches. The first one allows finer-grained control over the emulation behaviour of REP instructions. Previously, once vm_event-based emulation was enabled, no optimizations were allowed. However, this has a performance impact on the monitored guest, so I've added

[Xen-devel] [PATCH V2 1/2] xen, libxc: Fine grained control of REP emulation optimizations

2015-09-21 Thread Razvan Cojocaru
Previously, if vm_event emulation support was enabled, then REP optimizations were disabled when emulating REP-compatible instructions. This patch allows fine-tuning of this behaviour by providing a dedicated libxc helper function. Signed-off-by: Razvan Cojocaru --- Changes since V1: - Renamed

Re: [Xen-devel] [PATCH v7 15/17] vmx: VT-d posted-interrupt core logic handling

2015-09-21 Thread Dario Faggioli
On Mon, 2015-09-21 at 11:59 +, Wu, Feng wrote: > > > -Original Message- > > From: George Dunlap [mailto:george.dun...@citrix.com] > > > I think the handling for lazy context switch is not only for the > > > blocking case, > > > we still need to do something for lazy context switch eve

[Xen-devel] [PATCH V2 2/2] xen: Introduce VM_EVENT_FLAG_SET_REGISTERS

2015-09-21 Thread Razvan Cojocaru
A previous version of this patch dealing with support for skipping the current instruction when a vm_event response requested it computed the instruction length in the hypervisor, adding non-trivial code dependencies. This patch allows a userspace vm_event client to simply request that the guest's

Re: [Xen-devel] [PATCH v5 7/9] x86/intel_pstate: add a booting param to select the driver to load

2015-09-21 Thread Jan Beulich
>>> On 17.09.15 at 18:08, wrote: > We shouldn't have multiple different top level command line options. In > particular, having "mwait-idle" and "intel_pstate" seems wrong, given a > perfectly good "cpufreq=" option. "mwait-idle" is C-state related. Jan ___

Re: [Xen-devel] [PATCH v5 4/9] x86/intel_pstate: relocate the driver register function

2015-09-21 Thread Jan Beulich
>>> On 17.09.15 at 17:38, wrote: > On 14/09/15 03:32, Wei Wang wrote: >> Move the driver register function to >> the cpufreq.c. >> >> Signed-off-by: Wei Wang >> --- >> xen/drivers/cpufreq/cpufreq.c | 15 +++ >> xen/include/acpi/cpufreq/cpufreq.h | 27 +--

[Xen-devel] [linux-next test] 62146: regressions - FAIL

2015-09-21 Thread osstest service owner
flight 62146 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/62146/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 62042 test-armhf-armhf-xl-vh

[Xen-devel] [PATCH] xen/x86: Don't try to write syscall-related MSRs for PV guests

2015-09-21 Thread Boris Ostrovsky
For PV guests these registers are set up by hypervisor and thus should not be written by the guest. The comment in xen_write_msr_safe() says so but we still write the MSRs, causing the hypervisor to print a warning. Signed-off-by: Boris Ostrovsky --- arch/x86/xen/enlighten.c | 1 + 1 file change

Re: [Xen-devel] [PATCH v7 05/28] xen/arm: ITS: Port ITS driver to Xen

2015-09-21 Thread Julien Grall
On 18/09/15 14:08, vijay.kil...@gmail.com wrote: > +static void its_lpi_free(struct its_device *dev) > +{ > +int lpi; > + > +spin_lock(&lpi_lock); > + > +for ( lpi = dev->event_map.lpi_base; > + lpi < (dev->event_map.lpi_base + dev->event_map.nr_lpis); > + lpi += IRQS_

Re: [Xen-devel] DRAFT XSA 142 - libxl fails to honour readonly flag on disks with qemu-xen

2015-09-21 Thread M A Young
On Mon, 21 Sep 2015, Xen.org security team wrote: > * DRAFT DRAFT DRAFT * > > Xen Security Advisory XSA-142 > > ... > > xsa142.patch Xen 4.3.x and later > > $ sha256sum xsa142*.patch > de0d6d19becac199037dce5a6a49e35cb7de5c99b8e2950600ed71fdc2d5a752

Re: [Xen-devel] [PATCH] xen/x86: Record xsave features in c->x86_capabilities

2015-09-21 Thread Jan Beulich
>>> On 17.09.15 at 13:40, wrote: > Jan: I have opted for adding leaf 8 rather than reusing leaf 2, due to the > uncertainty with how this information is exposed in libxl. This patch > introduces no change with how the information is represented in userspace. Mind explaining this "uncertainty"? I

Re: [Xen-devel] [PATCH for-4.6] xen/arm: vgic-v2: Map the GIC virtual CPU interface with the correct size

2015-09-21 Thread Ian Campbell
On Mon, 2015-09-21 at 13:28 +0100, Julien Grall wrote: > Hi Ian, > > On 21/09/15 12:54, Ian Campbell wrote: > > On Fri, 2015-09-18 at 09:53 +0100, Ian Campbell wrote: > > > On Thu, 2015-09-17 at 19:00 +0100, Julien Grall wrote: > > > > On GICv2, the GIC virtual CPU interface is at minimum 8KB. Due

Re: [Xen-devel] DRAFT XSA 142 - libxl fails to honour readonly flag on disks with qemu-xen

2015-09-21 Thread Ian Jackson
Ian Campbell writes ("Re: DRAFT XSA 142 - libxl fails to honour readonly flag on disks with qemu-xen"): > On Tue, 2015-09-15 at 16:22 +, Xen.org security team wrote: > > VULNERABLE SYSTEMS > > == > > > [...] > > Only systems using libxl or libxl-based toolstacks are vulnerable

[Xen-devel] DRAFT XSA 142 - libxl fails to honour readonly flag on disks with qemu-xen

2015-09-21 Thread Xen . org security team
* DRAFT DRAFT DRAFT * Xen Security Advisory XSA-142 libxl fails to honour readonly flag on disks with qemu-xen ISSUE DESCRIPTION = Callers of libxl can specify that a disk should be read-only to the guest. However, there is no code in libxl t

Re: [Xen-devel] xhci_hcd intterrupt affinity in Dom0/DomU limited to single interrupt

2015-09-21 Thread Jan Beulich
>>> On 16.09.15 at 22:31, wrote: > I think the lspci -v output is the same in both cases with the exception > of the xhci_pci which is not present in the Native case lspci -v output. > xhci_pci is built into the kernel. The same kernel/system is used with > this system when booted with Dom0 and na

Re: [Xen-devel] Analysis: switch osstest default kernel from 3.14 to 4.1 (Was: Re: [linux-4.1 test] 60785: tolerable FAIL - PUSHED)

2015-09-21 Thread Ian Campbell
TL;DR: There are issues, but IMHO switching can be justified. On Thu, 2015-09-03 at 09:59 +0100, Ian Campbell wrote: > TL;DR: There are issues which need fixing first... > > On Fri, 2015-08-21 at 17:24 +, osstest service owner wrote: > > flight 60785 linux-4.1 real [real] > > http://logs.test

Re: [Xen-devel] [xen-4.4-testing test] 62047: regressions - FAIL

2015-09-21 Thread Jan Beulich
>>> On 18.09.15 at 08:53, wrote: > flight 62047 xen-4.4-testing real [real] > http://logs.test-lab.xenproject.org/osstest/logs/62047/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-i386-xl-raw9 debian-di-inst

Re: [Xen-devel] [PATCH for-4.6] p2m/ept: Set the A bit only if PML is enabled

2015-09-21 Thread Jan Beulich
>>> On 16.09.15 at 21:47, wrote: > On 16/09/2015 09:47, Ross Lagerwall wrote: >> Since commit 191b3f3344ee ("p2m/ept: enable PML in p2m-ept for >> log-dirty"), the A and D bits of EPT paging entries are set >> unconditionally, regardless of whether PML is enabled or not. This >> causes a regressio

  1   2   >