[Xen-devel] [linux-4.1 test] 94729: tolerable FAIL - PUSHED

2016-05-23 Thread osstest service owner
flight 94729 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/94729/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-amd64-rumpuserxen 6 xen-buildfail like 94034 build-i386-rumpuserxen6

Re: [Xen-devel] [PATCH v5 07/10] IOMMU: propagate IOMMU Device-TLB flush error up to iommu_iotlb_flush{, _all} (leaf ones).

2016-05-23 Thread Xu, Quan
On May 18, 2016 4:08 PM, Quan Xu wrote: > Propagate the IOMMU Device-TLB flush error up to the > iommu_iotlb_flush{,_all}. > > This patch fixes the leaf ones. > --- a/xen/drivers/passthrough/vtd/iommu.c > +++ b/xen/drivers/passthrough/vtd/iommu.c > -static void intel_iommu_iotlb_flush(struct doma

[Xen-devel] [qemu-upstream-4.3-testing test] 94732: trouble: blocked/broken

2016-05-23 Thread osstest service owner
flight 94732 qemu-upstream-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/94732/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-pvops 3 host-install(3) broken REG

[Xen-devel] [linux-3.18 test] 94728: tolerable FAIL - PUSHED

2016-05-23 Thread osstest service owner
flight 94728 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/94728/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail like 94035 build-amd64-rumpuserxen 6

Re: [Xen-devel] [PATCH v4 6/6] build: convert lock_profile to Kconfig

2016-05-23 Thread Doug Goldstein
On 5/23/16 10:53 AM, Julien Grall wrote: > Hi Doug, > > On 22/05/16 06:01, Doug Goldstein wrote: >> diff --git a/xen/Kconfig.debug b/xen/Kconfig.debug >> index 0678049..303bf36 100644 >> --- a/xen/Kconfig.debug >> +++ b/xen/Kconfig.debug >> @@ -27,6 +27,13 @@ config FRAME_POINTER >> maybe

Re: [Xen-devel] [PATCH v2 12/15] xen/arm: arm64: Add Cortex-A53 cache errata workaround

2016-05-23 Thread Chenxiao Zhao
On Mon, May 23, 2016 at 7:22 AM Julien Grall wrote: > The ARM errata 819472, 827319 and 824069 define the same workaround for > these hardware issues in certain Cortex-A53 parts. > > The cache instructions "dc cvac" and "dc cvau" need to be upgraded to > "dc civac". > > Use the alternative framew

Re: [Xen-devel] [PATCH v4 3/6] build: convert verbose to Kconfig

2016-05-23 Thread Doug Goldstein
On 5/23/16 8:19 AM, Konrad Rzeszutek Wilk wrote: >> >> +config VERBOSE_DEBUG >> +bool "Verbose debug messages" >> +default DEBUG >> +---help--- >> + Guest output from HYPERVISOR_console_io and hypervisor parsing >> + ELF images (dom0) is logged in the Xen ring buffer. > > i

Re: [Xen-devel] [PATCH v4 2/6] build: convert crash_debug to Kconfig

2016-05-23 Thread Doug Goldstein
On 5/23/16 8:22 AM, Konrad Rzeszutek Wilk wrote: >> +config CRASH_DEBUG >> +bool "Crash Debugging Support" >> +depends on X86 >> +---help--- >> + If you want to be able to attach gdb to Xen to be able to debug > > s/be able// > I'll drop the extra 'to' as well. ;) "If you want

Re: [Xen-devel] [PATCH v4 1/6] build: convert debug to Kconfig

2016-05-23 Thread Doug Goldstein
On 5/23/16 3:39 AM, Jan Beulich wrote: On 22.05.16 at 21:04, wrote: >> On 5/22/16 12:01 AM, Doug Goldstein wrote: >>> --- /dev/null >>> +++ b/xen/Kconfig.debug >>> @@ -0,0 +1,13 @@ >>> + >>> +menu "Debugging Options" >>> + >>> +config DEBUG >>> + bool "Developer Checks" >> >> Add the follow

Re: [Xen-devel] [PATCH v4 1/6] build: convert debug to Kconfig

2016-05-23 Thread Doug Goldstein
On 5/23/16 8:19 AM, Andrew Cooper wrote: > On 23/05/16 13:58, Jan Beulich wrote: > On 22.05.16 at 07:01, wrote: >>> --- /dev/null >>> +++ b/xen/Kconfig.debug >>> @@ -0,0 +1,13 @@ >>> + >>> +menu "Debugging Options" >>> + >>> +config DEBUG >>> + bool "Developer Checks" >>> + ---help--- >>>

Re: [Xen-devel] [PATCH v5 06/10] IOMMU/MMU: propagate IOMMU Device-TLB flush error up to iommu_iotlb_flush{, _all} (top level ones).

2016-05-23 Thread Xu, Quan
On May 24, 2016 12:06 AM, Jan Beulich wrote: > >>> On 18.05.16 at 10:08, wrote: > > --- a/xen/common/memory.c > > +++ b/xen/common/memory.c > > @@ -633,9 +633,9 @@ static long > memory_exchange(XEN_GUEST_HANDLE_PARAM(xen_memory_exchange_t) > arg) > > return rc; > > } > > > > -static int xen

Re: [Xen-devel] [PATCH v4 1/6] build: convert debug to Kconfig

2016-05-23 Thread Doug Goldstein
On 5/23/16 7:58 AM, Jan Beulich wrote: On 22.05.16 at 07:01, wrote: >> verbose := y >> frame_pointer := y >> -else >> -CFLAGS += -DNDEBUG >> endif >> ifeq ($(perfc_arrays),y) >> perfc := y >> endif >> >> +ifeq ($(origin debug),command line) >> +$(error "You must use 'make menuc

Re: [Xen-devel] [PATCH] xen/privcmd: use vma_pages().

2016-05-23 Thread Muhammad Falak R Wani
On Mon, May 23, 2016 at 04:26:37PM -0400, Boris Ostrovsky wrote: > On 05/21/2016 09:09 AM, Muhammad Falak R Wani wrote: > > Replace explicit computation of vma page count by a call to > > vma_pages() > > > > Can you combine all three patches into a single one? > > Thanks. > -boris > Sure, I hav

[Xen-devel] [PATCH v2] xen: use vma_pages().

2016-05-23 Thread Muhammad Falak R Wani
Replace explicit computation of vma page count by a call to vma_pages(). Signed-off-by: Muhammad Falak R Wani --- drivers/xen/gntalloc.c | 2 +- drivers/xen/gntdev.c | 2 +- drivers/xen/privcmd.c | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/xen/gntalloc.c b/d

[Xen-devel] [qemu-mainline test] 94724: tolerable FAIL - PUSHED

2016-05-23 Thread osstest service owner
flight 94724 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/94724/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 94716 test-amd64-i386-xl-qemuu-win

[Xen-devel] [qemu-upstream-4.3-testing test] 94726: trouble: blocked/broken

2016-05-23 Thread osstest service owner
flight 94726 qemu-upstream-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/94726/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-pvops 3 host-install(3) broken REG

Re: [Xen-devel] [libvirt test] 94692: regressions - FAIL

2016-05-23 Thread Jim Fehlig
On 05/22/2016 02:12 AM, osstest service owner wrote: > flight 94692 libvirt real [real] > http://logs.test-lab.xenproject.org/osstest/logs/94692/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > build-i386-libvirt5 libvir

Re: [Xen-devel] PAT-related crash booting Linux 4.4 + Xen 4.5 on VMware ESXi

2016-05-23 Thread Ed Swierk
Good question. I ran my tests again, and found I'd misinterpreted the Fusion behavior. On Fusion 8.1.1, MSR_IA32_CR_PAT returns a reasonable value: (XEN) Freed 308kB init memory. mapping kernel into physical memory cpu_has_pat=0 cpuid_edx(1)=f89cbf5 pat=65536 pat_init_cache_modes pat=50100070406

[Xen-devel] [ovmf test] 94727: all pass - PUSHED

2016-05-23 Thread osstest service owner
flight 94727 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/94727/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf 60c809f3621039bb1ac6b4c1947baf5a848814b0 baseline version: ovmf f6190a01c13a6b4dd01a1765b28964db7dc

[Xen-devel] [xen-unstable test] 94718: regressions - FAIL

2016-05-23 Thread osstest service owner
flight 94718 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/94718/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 94580 Tests wh

[Xen-devel] [xen-unstable-smoke test] 94725: tolerable all pass - PUSHED

2016-05-23 Thread osstest service owner
flight 94725 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/94725/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH] xen/privcmd: use vma_pages().

2016-05-23 Thread Boris Ostrovsky
On 05/21/2016 09:09 AM, Muhammad Falak R Wani wrote: > Replace explicit computation of vma page count by a call to > vma_pages() > > Signed-off-by: Muhammad Falak R Wani > --- > drivers/xen/privcmd.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/xen/privcmd.c b/

Re: [Xen-devel] ARM Xen Bug #45: Is there a solution?

2016-05-23 Thread Julien Grall
On 23/05/2016 16:47, Dirk Behme wrote: Hello, Hello Dirk, is there a solution for arm: domain 0 disables clocks which are in fact being used http://bugs.xenproject.org/xen/bug/45 ? On an ARM based board I have to use 'clk_ignore_unused' preventing that Dom0 disables the UART clock for th

Re: [Xen-devel] PAT-related crash booting Linux 4.4 + Xen 4.5 on VMware ESXi

2016-05-23 Thread Boris Ostrovsky
On 05/23/2016 10:15 AM, Konrad Rzeszutek Wilk wrote: > On Fri, May 20, 2016 at 04:58:09PM -0700, Ed Swierk wrote: >> (XEN) traps.c:459:d0v0 Unhandled invalid opcode fault/trap [#6] on VCPU 0 >> [ec=] >> (XEN) domain_crash_sync called from entry.S: fault at 82d0802286c3 >> create_bounce_fr

[Xen-devel] [qemu-upstream-4.3-testing test] 94722: trouble: blocked/broken

2016-05-23 Thread osstest service owner
flight 94722 qemu-upstream-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/94722/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-pvops 3 host-install(3) broken REG

[Xen-devel] [xen-unstable-smoke test] 94723: tolerable all pass - PUSHED

2016-05-23 Thread osstest service owner
flight 94723 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/94723/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

[Xen-devel] [qemu-mainline test] 94716: tolerable FAIL - PUSHED

2016-05-23 Thread osstest service owner
flight 94716 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/94716/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 94625 test-amd64-i386-xl-qemuu-win

[Xen-devel] Xen Security Advisory 180 (CVE-2014-3672) - Unrestricted qemu logging

2016-05-23 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2014-3672 / XSA-180 Unrestricted qemu logging ISSUE DESCRIPTION = When the libxl toolstack launches qemu for HVM guests, it pipes the output of stderr to a file in /var/log

Re: [Xen-devel] [PATCH RFC 1/6] libxl: implementation of PV rtc device interface

2016-05-23 Thread Olaf Hering
On Thu, May 19, Iurii Mykhalskyi wrote: > +flexarray_append(back, "state"); > +flexarray_append(back, GCSPRINTF("%d", 1)); This should use the enum values instead of hardcoded "1", see the other users of "state" in staging. Olaf ___ Xen-devel

Re: [Xen-devel] [sh_eth.c] Problem in dma_map_single()

2016-05-23 Thread Wonseok Ko
Hi, Konrad It's not same. I am attaching a macro as below. #define SET_NETDEV_DEV(net, pdev) ((net)->dev.parent = (pdev)) So that's why I was setting the dma mask to ndev. Thanks, Wonseok Ko Thanks, Wonseok. 2016-05-18 6:10 GMT+09:00 Konrad Rzeszutek Wilk : > On Fri, Apr 15, 2016 at 12

Re: [Xen-devel] [PATCH v5 06/10] IOMMU/MMU: propagate IOMMU Device-TLB flush error up to iommu_iotlb_flush{, _all} (top level ones).

2016-05-23 Thread Jan Beulich
>>> On 18.05.16 at 10:08, wrote: > --- a/xen/common/memory.c > +++ b/xen/common/memory.c > @@ -633,9 +633,9 @@ static long > memory_exchange(XEN_GUEST_HANDLE_PARAM(xen_memory_exchange_t) arg) > return rc; > } > > -static int xenmem_add_to_physmap(struct domain *d, > -

Re: [Xen-devel] [PATCH] [RFC] xsm: add a default policy to .init.data

2016-05-23 Thread Daniel De Graaf
On 05/23/2016 11:34 AM, Jan Beulich wrote: On 23.05.16 at 16:51, wrote: --- a/xen/xsm/flask/Makefile +++ b/xen/xsm/flask/Makefile @@ -27,6 +27,27 @@ $(FLASK_H_FILES): $(FLASK_H_DEPEND) $(AV_H_FILES): $(AV_H_DEPEND) $(CONFIG_SHELL) policy/mkaccess_vector.sh $(AWK) $(AV_H_DEPEND) +obj-

Re: [Xen-devel] [PATCH v5 05/10] IOMMU: propagate IOMMU Device-TLB flush error up to IOMMU mapping.

2016-05-23 Thread Jan Beulich
>>> On 18.05.16 at 10:08, wrote: > Propagate the IOMMU Device-TLB flush error up to IOMMU mapping. Btw - there's little reason to repeat the title here. > @@ -295,12 +297,23 @@ static void __hwdom_init amd_iommu_hwdom_init(struct > domain *d) > * a pfn_valid() check would seem des

Re: [Xen-devel] [PATCH v4 6/6] build: convert lock_profile to Kconfig

2016-05-23 Thread Julien Grall
Hi Doug, On 22/05/16 06:01, Doug Goldstein wrote: diff --git a/xen/Kconfig.debug b/xen/Kconfig.debug index 0678049..303bf36 100644 --- a/xen/Kconfig.debug +++ b/xen/Kconfig.debug @@ -27,6 +27,13 @@ config FRAME_POINTER maybe slower, but it gives very useful debugging information

Re: [Xen-devel] [PATCH] libxl: Do not warn about non existing user for the device model

2016-05-23 Thread Ian Jackson
Wei Liu writes ("Re: [PATCH] libxl: Do not warn about non existing user for the device model"): > I would say it is OK to have some WIP options to go undocumented -- > because you don't want users to use them anyway. I agree. > Another way is to state explicitly in manpage that people should not

[Xen-devel] ARM Xen Bug #45: Is there a solution?

2016-05-23 Thread Dirk Behme
Hello, is there a solution for arm: domain 0 disables clocks which are in fact being used http://bugs.xenproject.org/xen/bug/45 ? On an ARM based board I have to use 'clk_ignore_unused' preventing that Dom0 disables the UART clock for the console UART configured with console=hvc0. Best reg

[Xen-devel] [xen-unstable-smoke test] 94721: tolerable all pass - PUSHED

2016-05-23 Thread osstest service owner
flight 94721 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/94721/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH v5 01/10] vt-d: fix the IOMMU flush issue

2016-05-23 Thread Jan Beulich
>>> On 23.05.16 at 17:22, wrote: > On May 23, 2016 9:31 PM, Jan Beulich wrote: >> >>> On 18.05.16 at 10:08, wrote: >> > --- a/xen/drivers/passthrough/vtd/iommu.c >> > +++ b/xen/drivers/passthrough/vtd/iommu.c >> > @@ -557,14 +557,16 @@ static void iommu_flush_all(void) >> > } >> > } >> > >

Re: [Xen-devel] [RFC for-4.8 0/6] xen/arm: Add support for mapping mmio-sram nodes into dom0

2016-05-23 Thread Edgar E. Iglesias
On Mon, May 23, 2016 at 04:13:53PM +0100, Julien Grall wrote: > Hi Edgar, > > On 23/05/16 15:02, Edgar E. Iglesias wrote: > >On Mon, May 23, 2016 at 02:02:39PM +0100, Julien Grall wrote: > >>(CC Wei Liu) > >> > >>On 23/05/16 12:56, Edgar E. Iglesias wrote: > >>>On Mon, May 23, 2016 at 11:29:31AM +

Re: [Xen-devel] [PATCH] [RFC] xsm: add a default policy to .init.data

2016-05-23 Thread Jan Beulich
>>> On 23.05.16 at 16:51, wrote: > --- a/xen/xsm/flask/Makefile > +++ b/xen/xsm/flask/Makefile > @@ -27,6 +27,27 @@ $(FLASK_H_FILES): $(FLASK_H_DEPEND) > $(AV_H_FILES): $(AV_H_DEPEND) > $(CONFIG_SHELL) policy/mkaccess_vector.sh $(AWK) $(AV_H_DEPEND) > > +obj-y += policy.o > + > +ifeq ($(X

Re: [Xen-devel] [PATCH] [RFC] xsm: add a default policy to .init.data

2016-05-23 Thread Daniel De Graaf
On 05/23/2016 11:25 AM, Andrew Cooper wrote: On 23/05/16 15:51, Daniel De Graaf wrote: diff --git a/xen/xsm/xsm_core.c b/xen/xsm/xsm_core.c index 634ec98..af1d86f 100644 --- a/xen/xsm/xsm_core.c +++ b/xen/xsm/xsm_core.c @@ -47,6 +47,17 @@ static void __init do_xsm_initcalls(void) } } +e

Re: [Xen-devel] [RFC for-4.8 4/6] xen/arm: Add helper functions to map RWX memory regions

2016-05-23 Thread Julien Grall
Hi Edgar, On 20/05/16 16:51, Edgar E. Iglesias wrote: From: "Edgar E. Iglesias" Create a helper function to map regions as MEMORY with cached attributes and read-write-execute permissions. Providing setting the execute bit is useful, I would try to rationalize the helpers by expanding map_r

Re: [Xen-devel] [PATCH] [RFC] xsm: add a default policy to .init.data

2016-05-23 Thread Andrew Cooper
On 23/05/16 15:51, Daniel De Graaf wrote: > diff --git a/xen/xsm/xsm_core.c b/xen/xsm/xsm_core.c > index 634ec98..af1d86f 100644 > --- a/xen/xsm/xsm_core.c > +++ b/xen/xsm/xsm_core.c > @@ -47,6 +47,17 @@ static void __init do_xsm_initcalls(void) > } > } > > +extern char __xsm_init_policy_st

Re: [Xen-devel] [PATCH v5 01/10] vt-d: fix the IOMMU flush issue

2016-05-23 Thread Xu, Quan
On May 23, 2016 9:31 PM, Jan Beulich wrote: > >>> On 18.05.16 at 10:08, wrote: > > --- a/xen/drivers/passthrough/vtd/iommu.c > > +++ b/xen/drivers/passthrough/vtd/iommu.c > > @@ -557,14 +557,16 @@ static void iommu_flush_all(void) > > } > > } > > > > -static void __intel_iommu_iotlb_flush(s

Re: [Xen-devel] [RFC for-4.8 0/6] xen/arm: Add support for mapping mmio-sram nodes into dom0

2016-05-23 Thread Julien Grall
Hi Edgar, On 23/05/16 15:02, Edgar E. Iglesias wrote: On Mon, May 23, 2016 at 02:02:39PM +0100, Julien Grall wrote: (CC Wei Liu) On 23/05/16 12:56, Edgar E. Iglesias wrote: On Mon, May 23, 2016 at 11:29:31AM +0100, Julien Grall wrote: On 20/05/16 16:51, Edgar E. Iglesias wrote: From: "Edgar

Re: [Xen-devel] [PATCH] [RFC] xsm: add a default policy to .init.data

2016-05-23 Thread Wei Liu
On Mon, May 23, 2016 at 10:51:29AM -0400, Daniel De Graaf wrote: > This includes the policy in tools/flask/policy in the hypervisor so that > the bootloader does not need to load a policy to get sane behavior from > an XSM-enabled hypervisor. > > RFC because this adds a binding between xen's build

[Xen-devel] [PATCH 1/5] flask/policy: split into modules

2016-05-23 Thread Daniel De Graaf
This makes it easier to enable or disable parts of the XSM policy. Signed-off-by: Daniel De Graaf --- tools/flask/policy/Makefile| 22 +- tools/flask/policy/modules/default_role.te | 8 + tools/flask/policy/modules/dom0.te | 74 ++ tools/fl

[Xen-devel] [PATCH 3/5] flask/policy: Remove unused support for binary modules

2016-05-23 Thread Daniel De Graaf
Signed-off-by: Daniel De Graaf --- .../policy/policy/support/loadable_module.spt | 166 - tools/flask/policy/policy/support/misc_macros.spt | 2 + 2 files changed, 2 insertions(+), 166 deletions(-) delete mode 100644 tools/flask/policy/policy/support/loadable_module.s

[Xen-devel] [PATCH 0/5] flask/policy: Updates for Xen 4.8

2016-05-23 Thread Daniel De Graaf
The most important patch is the first one, which splits up the XSM policy into multiple files that can be enabled/disabled to adjust the policy. The others are just general cleanup of the policy build and a better xenstore example. [PATCH 1/5] flask/policy: split into modules [PATCH 2/5] flask/po

[Xen-devel] [PATCH 5/5] flask/policy: comment out unused xenstore example

2016-05-23 Thread Daniel De Graaf
Signed-off-by: Daniel De Graaf --- tools/flask/policy/policy/access_vectors | 32 +++--- tools/flask/policy/policy/security_classes | 2 +- 2 files changed, 17 insertions(+), 17 deletions(-) diff --git a/tools/flask/policy/policy/access_vectors b/tools/flask/policy/po

[Xen-devel] [PATCH 2/5] flask/policy: move user definitions and constraints into modules

2016-05-23 Thread Daniel De Graaf
This also renames the example users created by vm_role. Signed-off-by: Daniel De Graaf --- docs/misc/xsm-flask.txt| 34 +++--- tools/flask/policy/Makefile| 9 -- tools/flask/policy/modules/default_role.te | 5

[Xen-devel] [PATCH 4/5] flask/policy: xenstore stubdom policy

2016-05-23 Thread Daniel De Graaf
This adds the xenstore_t type to the example policy for use by a xenstore stub domain. Signed-off-by: Daniel De Graaf --- tools/flask/policy/modules/modules.conf | 3 +++ tools/flask/policy/modules/xenstore.te | 21 + 2 files changed, 24 insertions(+) create mode 100644 to

[Xen-devel] [PATCH] [RFC] xsm: add a default policy to .init.data

2016-05-23 Thread Daniel De Graaf
This includes the policy in tools/flask/policy in the hypervisor so that the bootloader does not need to load a policy to get sane behavior from an XSM-enabled hypervisor. RFC because this adds a binding between xen's build and the tools build. The inclusion of policy.o could be made conditional o

Re: [Xen-devel] [Hackathon 16] Notes from Security Session

2016-05-23 Thread Daniel De Graaf
On 05/17/2016 05:08 PM, Konrad Rzeszutek Wilk wrote: On Tue, Apr 26, 2016 at 09:57:12AM +0100, Lars Kurth wrote: Also adding Steve Maresca to the thread, who has been using XSM extensively and also documenting XSM and can provide some user perspective Lars On 25 Apr 2016, at 20:51, Daniel De

Re: [Xen-devel] [PATCH 3/3] VMX: Remove the vcpu from the per-cpu blocking list after domain termination

2016-05-23 Thread Dario Faggioli
On Mon, 2016-05-23 at 13:32 +, Wu, Feng wrote: >  > > > --- a/xen/arch/x86/hvm/vmx/vmx.c > > > +++ b/xen/arch/x86/hvm/vmx/vmx.c > > > @@ -248,6 +248,36 @@ void vmx_pi_hooks_deassign(struct domain *d) > > >  d->arch.hvm_domain.vmx.pi_switch_to = NULL; > > >  } > > > > > > +static void vmx_p

Re: [Xen-devel] [PATCH v2 11/15] xen/arm: Document the errata implemented in Xen

2016-05-23 Thread Andrew Cooper
On 23/05/16 15:17, Julien Grall wrote: > The new document will help to keep track of all the erratum that Xen is > able to handle. Just a grammar nit (which most native English speakers get wrong, given its Latin roots) An erratum, or Many errata. In this case, I would suggest "... to keep track

Re: [Xen-devel] [PATCH v5 03/10] IOMMU/MMU: enhance the call trees of IOMMU unmapping and mapping

2016-05-23 Thread Jan Beulich
>>> On 18.05.16 at 10:08, wrote: > --- a/xen/arch/x86/mm.c > +++ b/xen/arch/x86/mm.c > @@ -2463,11 +2463,12 @@ static int __put_page_type(struct page_info *page, > } > > > -static int __get_page_type(struct page_info *page, unsigned long type, > - int preemptible) >

[Xen-devel] [PATCH v2 02/15] xen/arm: Include the header asm-arm/system.h in asm-arm/page.h

2016-05-23 Thread Julien Grall
The header asm-arm/page.h makes use of the macro dsb defined in the header asm-arm/system.h. Currently, the includer has to specify both of them. This can be avoided by including asm-arm/system.h in asm-arm/page.h. Signed-off-by: Julien Grall Acked-by: Stefano Stabellini --- Changes in v2:

[Xen-devel] [PATCH v2 13/15] xen/arm: arm64: Add cortex-A57 erratum 832075 workaround

2016-05-23 Thread Julien Grall
The ARM erratum 832075 applies to certain revisions of Cortex-A57, one of the workarounds is to change device loads into using load-acquire semantics. Use the alternative framework to enable the workaround only on affected cores. Whilst a guest could trigger the deadlock, it can be broken when th

[Xen-devel] [PATCH v2 15/15] xen/arm: arm64: Document Cortex-A57 erratum 834220

2016-05-23 Thread Julien Grall
The ARM erratum applies to certain revisions of Cortex-A57. The processor may report a Stage 2 translation fault as the result of Stage 1 fault for load crossing a page boundary when there is a permission fault or device memory fault at stage 1 and a translation fault at Stage 2. So Xen needs to c

[Xen-devel] [PATCH v2 00/15] xen/arm: Introduce alternative runtime patching for ARM64

2016-05-23 Thread Julien Grall
Hello, Some of the processor erratum will require to modify code sequence. As those modifications may impact the performance, they should only be enabled on affected cores. Furthermore, Xen may also want to take advantage of new hardware features coming up with v8.1 and v8.2. The first part of th

[Xen-devel] [PATCH v2 11/15] xen/arm: Document the errata implemented in Xen

2016-05-23 Thread Julien Grall
The new document will help to keep track of all the erratum that Xen is able to handle. The text is based on the Linux doc in Documents/arm64/silicon-errata.txt. Also list the current errata that Xen is aware of. Signed-off-by: Julien Grall --- docs/misc/arm/silicon-errata.txt | 45 +++

[Xen-devel] [PATCH v2 14/15] xen/arm: traps: Don't inject a fault if the translation VA -> IPA fails

2016-05-23 Thread Julien Grall
Based on ARM ARM (D4.5.3 in ARM DDI 0486A and B3.12.7 in ARM DDI 0406C.c), a Stage 1 translation error has priority over a Stage 2 translation error. Therefore gva_to_ipa can only fail if another vCPU is playing with the page table. Rather than injecting a custom fault, replay the instruction and

[Xen-devel] [PATCH v2 03/15] xen/arm: Add macros to handle the MIDR

2016-05-23 Thread Julien Grall
Add new macros to easily get different parts of the register and to check if a given MIDR match a CPU model range. The latter will be really useful to handle errata later. The macros have been imported from the header arch/arm64/include/asm/cputype.h in Linux v4.6-rc3. Also remove MIDR_MASK which

[Xen-devel] [PATCH v2 12/15] xen/arm: arm64: Add Cortex-A53 cache errata workaround

2016-05-23 Thread Julien Grall
The ARM errata 819472, 827319 and 824069 define the same workaround for these hardware issues in certain Cortex-A53 parts. The cache instructions "dc cvac" and "dc cvau" need to be upgraded to "dc civac". Use the alternative framework to replace those instructions only on affected cores. Whilst

[Xen-devel] [PATCH v2 10/15] xen/arm: Detect silicon revision and set cap bits accordingly

2016-05-23 Thread Julien Grall
After each CPU has been started, we iterate through a list of CPU errata to detect CPUs which need from hypervisor code patches. For each bug there is a function which check if that a particular CPU is affected. This needs to be done on every CPUs to cover heterogenous system properly. If a certa

[Xen-devel] [PATCH v2 09/15] xen/arm: Introduce alternative runtime patching

2016-05-23 Thread Julien Grall
Some of the processor erratum will require to modify code sequence. As those modifications may impact the performance, they should only be enabled on affected cores. Furthermore, Xen may also want to take advantage of new hardware features coming up with v8.1 and v8.2. This patch adds an infrastru

[Xen-devel] [PATCH v2 07/15] xen/arm: arm64: Reserve a brk immediate to fault on purpose

2016-05-23 Thread Julien Grall
It may not possible to return a proper error when encoding an instruction. Instead, a handcrafted instruction will be returned. Also, provide the encoding for the faulting instruction. Signed-off-by: Julien Grall Acked-by: Stefano Stabellini --- Changes in v2: - Add Stefano's acked

[Xen-devel] [PATCH v2 08/15] xen/arm: arm64: Add helpers to decode and encode branch instructions

2016-05-23 Thread Julien Grall
We may need to update branch instruction when patching Xen. The code has been imported from the files arch/arm64/kernel/insn.c and arch/arm64/include/asm/insn.h in Linux v4.6. Note that only the necessary helpers have been imported. Signed-off-by: Julien Grall --- Changes in v2: -

[Xen-devel] [PATCH v2 04/15] xen/arm: Add cpu_hwcap bitmap

2016-05-23 Thread Julien Grall
This will be used to know if a feature, which Xen cares, is available accross all the CPUs. This code is a light version of arch/arm64/kernel/cpufeature.c from Linux v4.6-rc3. Signed-off-by: Julien Grall --- xen/arch/arm/Makefile| 1 + xen/arch/arm/cpufeature.c| 34

[Xen-devel] [PATCH v2 06/15] xen/arm: arm64: Move the define BRK_BUG_FRAME into a separate header

2016-05-23 Thread Julien Grall
New immediates will be defined in the future. To keep track of the immediates allocated, gather all of them in a separate header. Also rename BRK_BUG_FRAME to BKR_BUG_FRAME_IMM. Signed-off-by: Julien Grall Reviewed-by: Stefano Stabellini --- Changes in v2: - Add Stefano's reviewed-

[Xen-devel] [PATCH v2 05/15] xen/arm64: Add an helper to invalidate all instruction caches

2016-05-23 Thread Julien Grall
Signed-off-by: Julien Grall Acked-by: Stefano Stabellini --- Changes in v2: - Add Stefano's acked-by --- xen/include/asm-arm/arm64/page.h | 6 ++ 1 file changed, 6 insertions(+) diff --git a/xen/include/asm-arm/arm64/page.h b/xen/include/asm-arm/arm64/page.h index 29a32cf..fbdc

[Xen-devel] [PATCH v2 01/15] xen/arm: Makefile: Sort the entries alphabetically

2016-05-23 Thread Julien Grall
Signed-off-by: Julien Grall Acked-by: Stefano Stabellini --- Changes in v2: - Add Stefano's acked-by --- xen/arch/arm/Makefile | 38 -- xen/arch/arm/arm32/Makefile | 9 - xen/arch/arm/arm64/Makefile | 12 +--- xe

Re: [Xen-devel] PAT-related crash booting Linux 4.4 + Xen 4.5 on VMware ESXi

2016-05-23 Thread Konrad Rzeszutek Wilk
On Fri, May 20, 2016 at 04:58:09PM -0700, Ed Swierk wrote: > I've encountered two problems booting a Linux 4.4 dom0 on recent > stable xen 4.5 on VMware ESXi 5.5.0. > > One has the same "ata_piix: probe of :00:07.1 failed with error > -22" symptom discussed some time ago, and prevents the kern

Re: [Xen-devel] [PATCH] libxl: Do not warn about non existing user for the device model

2016-05-23 Thread Wei Liu
On Mon, May 23, 2016 at 03:09:17PM +0100, Anthony PERARD wrote: > On Mon, May 23, 2016 at 12:57:26PM +0100, Wei Liu wrote: > > On Mon, May 23, 2016 at 12:35:02PM +0100, Anthony PERARD wrote: > > > Running QEMU as non-root user is not ready yet, so avoid avertising it > > > with a warning. > > > >

[Xen-devel] [qemu-upstream-4.3-testing test] 94717: trouble: blocked/broken

2016-05-23 Thread osstest service owner
flight 94717 qemu-upstream-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/94717/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-pvops 3 host-install(3) broken REG

Re: [Xen-devel] [PATCH] libxl: Do not warn about non existing user for the device model

2016-05-23 Thread Anthony PERARD
On Mon, May 23, 2016 at 12:57:26PM +0100, Wei Liu wrote: > On Mon, May 23, 2016 at 12:35:02PM +0100, Anthony PERARD wrote: > > Running QEMU as non-root user is not ready yet, so avoid avertising it > > with a warning. > > > > Also improve the doc to include more potential issue with running QEMU >

Re: [Xen-devel] [RFC for-4.8 0/6] xen/arm: Add support for mapping mmio-sram nodes into dom0

2016-05-23 Thread Edgar E. Iglesias
On Mon, May 23, 2016 at 02:02:39PM +0100, Julien Grall wrote: > (CC Wei Liu) > > On 23/05/16 12:56, Edgar E. Iglesias wrote: > >On Mon, May 23, 2016 at 11:29:31AM +0100, Julien Grall wrote: > >>On 20/05/16 16:51, Edgar E. Iglesias wrote: > >>>From: "Edgar E. Iglesias" > >>> > >>>This series adds

Re: [Xen-devel] [PATCH v10 3/3] vt-d: fix vt-d Device-TLB flush timeout issue

2016-05-23 Thread Xu, Quan
On May 20, 2016 5:59 PM, Jan Beulich wrote: > >>> On 20.05.16 at 09:15, wrote: > > On May 17, 2016 10:00 PM, Jan Beulich wrote: > >> >>> On 22.04.16 at 12:54, wrote: > >> > --- a/xen/drivers/passthrough/vtd/qinval.c > >> > +++ b/xen/drivers/passthrough/vtd/qinval.c > >> > @@ -206,10 +206,71 @@

[Xen-devel] [ovmf test] 94719: all pass - PUSHED

2016-05-23 Thread osstest service owner
flight 94719 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/94719/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf f6190a01c13a6b4dd01a1765b28964db7dc58e35 baseline version: ovmf edddb945519cf71c048e82a2f009db3e1e7

Re: [Xen-devel] [RFC 15/16] xen/arm: traps: Don't inject a fault if the translation VA -> IPA fails

2016-05-23 Thread Julien Grall
Hi Stefano, On 21/05/16 15:51, Stefano Stabellini wrote: On Sat, 21 May 2016, Stefano Stabellini wrote: On Thu, 5 May 2016, Julien Grall wrote: Based on ARM ARM (D4.5.3 in ARM DDI 0486A and B3.12.7 in ARM DDI 0406C.c), a Stage 1 translation error has priority over a Stage 2 translation error.

Re: [Xen-devel] [PATCH qemu-traditional] ioreq: Support 32-bit default_ioport_* accesses

2016-05-23 Thread Wei Liu
On Fri, May 20, 2016 at 09:52:40AM -0400, Boris Ostrovsky wrote: > Recent changes in ACPICA (specifically, Linux commit 66b1ed5aa8dd ("ACPICA: > ACPI 2.0, Hardware: Add access_width/bit_offset support for > acpi_hw_write()") result in guests issuing 32-bit accesses to IO space. > > QEMU needs to b

Re: [Xen-devel] [PATCH 3/3] VMX: Remove the vcpu from the per-cpu blocking list after domain termination

2016-05-23 Thread Wu, Feng
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, May 23, 2016 8:47 PM > To: Wu, Feng > Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com; > george.dun...@eu.citrix.com; Tian, Kevin ; xen- > de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or

Re: [Xen-devel] [PATCH v5 02/10] IOMMU: handle IOMMU mapping and unmapping failures

2016-05-23 Thread Jan Beulich
>>> On 18.05.16 at 10:08, wrote: > No spamming can occur. May I suggest "No spamming of the log can occur", to set some context for what follows? > --- a/xen/drivers/passthrough/iommu.c > +++ b/xen/drivers/passthrough/iommu.c > @@ -240,21 +240,49 @@ int iommu_map_page(struct domain *d, unsigned

Re: [Xen-devel] [RFC 13/16] xen/arm: arm64: Add Cortex-A53 cache errata workaround

2016-05-23 Thread Julien Grall
Hello Stefano, On 21/05/16 15:40, Stefano Stabellini wrote: On Thu, 5 May 2016, Julien Grall wrote: + bool "Cortex-A53: 819472: Store exclusive instructions might cause data corruption" + default y + depends on ARM_64 + help + This option adds an alternative cod

Re: [Xen-devel] [PATCH 3/3] VMX: Remove the vcpu from the per-cpu blocking list after domain termination

2016-05-23 Thread Wu, Feng
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, May 23, 2016 8:36 PM > To: Wu, Feng > Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com; > george.dun...@eu.citrix.com; Tian, Kevin ; xen- > de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or

Re: [Xen-devel] [PATCH 3/3] VMX: Remove the vcpu from the per-cpu blocking list after domain termination

2016-05-23 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Monday, May 23, 2016 8:31 PM > To: Wu, Feng ; xen-devel@lists.xen.org > Cc: k...@xen.org; Tian, Kevin ; jbeul...@suse.com; > andrew.coop...@citrix.com; george.dun...@eu.citrix.com; > konrad.w...@oracle.

Re: [Xen-devel] e820_host default value and libxl (not xl)

2016-05-23 Thread Wei Liu
On Mon, May 23, 2016 at 11:59:10AM +0100, Andrew Cooper wrote: > On 23/05/16 11:47, Wei Liu wrote: > > On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki wrote: > >> Hi, > >> > >> According to xl.cfg(5) " This option defaults to true (1) if any PCI > >> passthrough devices are con

Re: [Xen-devel] [PATCH v5 01/10] vt-d: fix the IOMMU flush issue

2016-05-23 Thread Jan Beulich
>>> On 18.05.16 at 10:08, wrote: > --- a/xen/drivers/passthrough/vtd/iommu.c > +++ b/xen/drivers/passthrough/vtd/iommu.c > @@ -557,14 +557,16 @@ static void iommu_flush_all(void) > } > } > > -static void __intel_iommu_iotlb_flush(struct domain *d, unsigned long gfn, > -int dma_old_

Re: [Xen-devel] [PATCH v4 0/6] Kconfig debug options

2016-05-23 Thread Konrad Rzeszutek Wilk
On Sun, May 22, 2016 at 12:33:23PM +0100, Andrew Cooper wrote: > On 22/05/16 06:01, Doug Goldstein wrote: > > This converts the debug options from xen/Rules.mk to Kconfig. Hopefully > > I haven't missed anything in the back and forth. > > > > change since v3: > > - wrap all options in 'if DEBUG ||

Re: [Xen-devel] [PATCH v4 5/6] build: convert perfc{, _arrays} to Kconfig

2016-05-23 Thread Konrad Rzeszutek Wilk
> +config PERF_COUNTERS > + bool "Performance Counters" > + ---help--- > + Enables software performance counters that allows you to analyze > + bottlenecks in the system. To access this data you must use the > + 'xenperf' tool. I would reword this as : "To access this da

Re: [Xen-devel] [PATCH v4 2/6] build: convert crash_debug to Kconfig

2016-05-23 Thread Konrad Rzeszutek Wilk
> +config CRASH_DEBUG > + bool "Crash Debugging Support" > + depends on X86 > + ---help--- > + If you want to be able to attach gdb to Xen to be able to debug s/be able// > + Xen if it crashes then say Y. > + ___ Xen-devel maili

Re: [Xen-devel] [PATCH v4 3/6] build: convert verbose to Kconfig

2016-05-23 Thread Konrad Rzeszutek Wilk
> > +config VERBOSE_DEBUG > + bool "Verbose debug messages" > + default DEBUG > + ---help--- > + Guest output from HYPERVISOR_console_io and hypervisor parsing > + ELF images (dom0) is logged in the Xen ring buffer. is logged? or will be logged? ___

Re: [Xen-devel] [PATCH 1/3] VMX: Properly adjust the status of pi descriptor

2016-05-23 Thread Wu, Feng
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, May 23, 2016 8:31 PM > To: Wu, Feng > Cc: andrew.coop...@citrix.com; dario.faggi...@citrix.com; > george.dun...@eu.citrix.com; Tian, Kevin ; xen- > de...@lists.xen.org; konrad.w...@oracle.com; k...@xen.or

Re: [Xen-devel] [PATCH v4 1/6] build: convert debug to Kconfig

2016-05-23 Thread Andrew Cooper
On 23/05/16 13:58, Jan Beulich wrote: On 22.05.16 at 07:01, wrote: >> --- /dev/null >> +++ b/xen/Kconfig.debug >> @@ -0,0 +1,13 @@ >> + >> +menu "Debugging Options" >> + >> +config DEBUG >> +bool "Developer Checks" >> +---help--- >> + Enables developer checks such as asserts and

Re: [Xen-devel] e820_host default value and libxl (not xl)

2016-05-23 Thread Konrad Rzeszutek Wilk
On Mon, May 23, 2016 at 01:27:31PM +0200, Marek Marczykowski-Górecki wrote: > On Mon, May 23, 2016 at 11:59:10AM +0100, Andrew Cooper wrote: > > On 23/05/16 11:47, Wei Liu wrote: > > > On Sat, May 21, 2016 at 04:42:11AM +0200, Marek Marczykowski-Górecki > > > wrote: > > >> Hi, > > >> > > >> Accord

Re: [Xen-devel] [PATCH v4 0/6] Kconfig debug options

2016-05-23 Thread Jan Beulich
>>> On 22.05.16 at 07:01, wrote: > This converts the debug options from xen/Rules.mk to Kconfig. Hopefully > I haven't missed anything in the back and forth. > > change since v3: > - wrap all options in 'if DEBUG || EXPERT' (except DEBUG) > - wording update to DEBUG option and some commit message

[Xen-devel] [PULL 2/4] xen: write information about supported backends

2016-05-23 Thread Gerd Hoffmann
From: Juergen Gross Add a Xenstore directory for each supported pv backend. This will allow Xen tools to decide which backend type to use in case there are multiple possibilities. The information is added under /local/domain//device-model//backends before the "running" state is written to Xensto

[Xen-devel] [PULL 1/4] xen: introduce dummy system device

2016-05-23 Thread Gerd Hoffmann
From: Juergen Gross Introduce a new dummy system device serving as parent for virtual buses. This will enable new pv backends to introduce virtual buses which are removable again opposed to system buses which are meant to stay once added. Signed-off-by: Juergen Gross Acked-by: Anthony PERARD R

[Xen-devel] [PULL 3/4] xen: add pvUSB backend

2016-05-23 Thread Gerd Hoffmann
From: Juergen Gross Add a backend for para-virtualized USB devices for xen domains. The backend is using host-libusb to forward USB requests from a domain via libusb to the real device(s) passed through. Signed-off-by: Juergen Gross Acked-by: Anthony PERARD Message-id: 1463062421-613-4-git-se

  1   2   >