Re: [Xen-devel] Xen 4.7.0 boot PANIC on kernel 4.7.0-4 + UEFI ?

2016-08-01 Thread Jan Beulich
>>> On 01.08.16 at 22:11, wrote: > On Fri, Jul 29, 2016, at 09:03 AM, Konrad Rzeszutek Wilk wrote: >> It may very well be added. >> >> But having extra test-confirmation is always good. > > looking at the patch > > diff --git a/include/linux/efi.h b/include/linux/efi.h > index c2db3

Re: [Xen-devel] page content

2016-08-01 Thread sepanta s
On Mon, Jul 25, 2016 at 1:03 PM, Razvan Cojocaru wrote: > On 07/25/2016 11:29 AM, sepanta s wrote: > > Hi, > > Is there an API in Xen to get the page content of a known gfn ? > > I want to calculate the checksum of the content of the page and wanna > > see if it > > is possible ? > > You can map

[Xen-devel] [PATCH v2] xen: rename xen_pmu_init() in sys-hypervisor.c

2016-08-01 Thread Juergen Gross
There are two functions with name xen_pmu_init() in the kernel. Rename the one in drivers/xen/sys-hypervisor.c to avoid shadowing the one in arch/x86/xen/pmu.c To avoid the same problem in future rename some more functions. Signed-off-by: Juergen Gross --- V2: rename more *_init() functions as s

[Xen-devel] [PATCH v2] xen: Make VPMU init message look less scary

2016-08-01 Thread Juergen Gross
The default for the Xen hypervisor is to not enable VPMU in order to avoid security issues. In this case the Linux kernel will issue the message "Could not initialize VPMU for cpu 0, error -95" which looks more like an error than a normal state. Change the message to something less scary in case t

Re: [Xen-devel] Xen 4.7.0 boot PANIC on kernel 4.7.0-4 + UEFI ?

2016-08-01 Thread Jan Beulich
>>> On 27.07.16 at 01:32, wrote: > I'm running Xen-4.7.0_08-452 + linux kernel 4.7.0-4.g89a2ada-default on > X86_64 UEFI hardware. > > If I boot without Xen hypervisor enabled it boots fine. > > If I boot with Xen enabled it PANICs: > > (XEN) [2016-07-26 22:05:33] Hardware Dom0 cra

[Xen-devel] [PATCH] xen: use a common function for pv and hvm guest backend register calls

2016-08-01 Thread Juergen Gross
Instead of calling xen_be_register() for each supported backend type for hvm and pv guests in their machine init functions use a common function in order not to have to add new backends twice. This at once fixes the error that hvm domains couldn't use the qusb backend. Signed-off-by: Juergen Gros

Re: [Xen-devel] monitor access to pages with a specific p2m_type_t

2016-08-01 Thread sepanta s
On Sat, Jul 23, 2016 at 3:49 PM, sepanta s wrote: > >>> Hi, >>> Is there any sample code which I can undestand how to capture the events >>> on the gfns which have p2m_ram_shared enabled ? >>> I couldn't find any ... . >>> I would be grateful if any help , as there is not any documents through >>

Re: [Xen-devel] [PATCH v3 1/3] x86/emulate: add support for {, v}movq xmm, xmm/m64

2016-08-01 Thread Jan Beulich
>>> On 02.08.16 at 01:19, wrote: > On Monday 01 August 2016 07:19:51 Jan Beulich wrote: >> >>> On 01.08.16 at 04:52, wrote: >> > @@ -4412,6 +4412,7 @@ x86_emulate( >> > case 0x7f: /* movq mm,mm/m64 */ >> > /* {,v}movdq{a,u} xmm,xmm/m128 */ >> > /* vmovdq{a,u

Re: [Xen-devel] [PATCH] x86: use gcc6'es flags asm() output support

2016-08-01 Thread Jan Beulich
>>> On 01.08.16 at 19:11, wrote: > On 01/08/16 17:06, Jan Beulich wrote: > On 01.07.16 at 18:51, wrote: >>> How about a different example, from the second hunk >>> >>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c >>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c >>> @@ -832,8 +832,19 @@ static

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Razvan Cojocaru
On 08/01/16 19:27, Tamas K Lengyel wrote: > On Mon, Aug 1, 2016 at 10:15 AM, Julien Grall wrote: >> >> >> On 01/08/16 16:59, Tamas K Lengyel wrote: >>> >>> On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote: >>> IMHO we should just pause the domain while mem_access permissions are >>> being chang

[Xen-devel] [qemu-mainline test] 99892: tolerable FAIL - PUSHED

2016-08-01 Thread osstest service owner
flight 99892 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/99892/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-libvirt-xsm 3 host-install(3) broken in 99889 pass in 99892 test-armhf-armhf-xl-credit2 6 x

Re: [Xen-devel] [PATCH 1/2] xen: when removing a backend don't remove many of them

2016-08-01 Thread Stefano Stabellini
On Fri, 29 Jul 2016, Juergen Gross wrote: > When a Xenstore watch fires indicating a backend has to be removed > don't remove all backends for that domain with the specified device > index, but just the one which has the correct type. > > The easiest way to achieve this is to use the already deter

[Xen-devel] [xen-unstable baseline-only test] 66881: regressions - trouble: blocked/broken/fail/pass

2016-08-01 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66881 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66881/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl 3 host-install(3)

[Xen-devel] [xen-unstable test] 99891: tolerable FAIL - PUSHED

2016-08-01 Thread osstest service owner
flight 99891 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/99891/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-amd64-rumpuserxen 6 xen-buildfail like 99886 build-i386-rumpuserxen

Re: [Xen-devel] [PATCH v3 1/3] x86/emulate: add support for {, v}movq xmm, xmm/m64

2016-08-01 Thread Mihai Donțu
On Monday 01 August 2016 07:19:51 Jan Beulich wrote: > >>> On 01.08.16 at 04:52, wrote: > > @@ -4412,6 +4412,7 @@ x86_emulate( > > case 0x7f: /* movq mm,mm/m64 */ > > /* {,v}movdq{a,u} xmm,xmm/m128 */ > > /* vmovdq{a,u} ymm,ymm/m256 */ > > +case 0xd6: /*

Re: [Xen-devel] [PATCH v2 00/25] arm/altp2m: Introducing altp2m to ARM.

2016-08-01 Thread Andrew Cooper
On 01/08/2016 19:15, Julien Grall wrote: > On 01/08/16 18:10, Sergej Proskurin wrote: >> >> Hello all, > > Hello Sergej, > >> The following patch series can be found on Github[0] and is part of my >> contribution to this year's Google Summer of Code (GSoC)[1]. My >> project is >> managed by the org

[Xen-devel] [BUG] Re: Xen 4.7.0 boot PANIC on kernel 4.7.0-4 + UEFI ?

2016-08-01 Thread lists
Horse is already WAY out of the barn on this, but just realizing the instructions say to > Please tag your subject line with a '[BUG]' prefix. ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 00/25] arm/altp2m: Introducing altp2m to ARM.

2016-08-01 Thread Tamas K Lengyel
On Mon, Aug 1, 2016 at 1:55 PM, Julien Grall wrote: > > > On 01/08/2016 20:20, Tamas K Lengyel wrote: >> >> On Mon, Aug 1, 2016 at 12:15 PM, Julien Grall >> wrote: >>> >>> On 01/08/16 18:10, Sergej Proskurin wrote: Hello all, >>> >>> >>> >>> Hello Sergej, >>> The followin

Re: [Xen-devel] [PATCH v2 00/25] arm/altp2m: Introducing altp2m to ARM.

2016-08-01 Thread Sergej Proskurin
Hi Julien, On 08/01/2016 09:55 PM, Julien Grall wrote: > > > On 01/08/2016 20:20, Tamas K Lengyel wrote: >> On Mon, Aug 1, 2016 at 12:15 PM, Julien Grall >> wrote: >>> On 01/08/16 18:10, Sergej Proskurin wrote: Hello all, >>> >>> >>> Hello Sergej, >>> The following patch ser

Re: [Xen-devel] Xen 4.7.0 boot PANIC on kernel 4.7.0-4 + UEFI ?

2016-08-01 Thread lists
On Fri, Jul 29, 2016, at 09:03 AM, Konrad Rzeszutek Wilk wrote: > It may very well be added. > > But having extra test-confirmation is always good. looking at the patch diff --git a/include/linux/efi.h b/include/linux/efi.h index c2db3ca..f196dd0 100644 --- a/include/linu

Re: [Xen-devel] [PATCH v2 00/25] arm/altp2m: Introducing altp2m to ARM.

2016-08-01 Thread Julien Grall
On 01/08/2016 20:20, Tamas K Lengyel wrote: On Mon, Aug 1, 2016 at 12:15 PM, Julien Grall wrote: On 01/08/16 18:10, Sergej Proskurin wrote: Hello all, Hello Sergej, The following patch series can be found on Github[0] and is part of my contribution to this year's Google Summer of Code

Re: [Xen-devel] [PATCH v2 00/25] arm/altp2m: Introducing altp2m to ARM.

2016-08-01 Thread Tamas K Lengyel
On Mon, Aug 1, 2016 at 12:15 PM, Julien Grall wrote: > On 01/08/16 18:10, Sergej Proskurin wrote: >> >> >> Hello all, > > > Hello Sergej, > >> The following patch series can be found on Github[0] and is part of my >> contribution to this year's Google Summer of Code (GSoC)[1]. My project is >> man

[Xen-devel] Call for Testing : Grant Table User-space Device

2016-08-01 Thread Akshay Jaggi
Hello Everyone, I am one of the students selected under FreeBSD for Google Summer of Code this year. My project was to implement a user-space grant table device for FreeBSD and add the appropriate bindings for the device in Xen, to enable the qdisk backends. (More details: http://akshayjaggi.me/

[Xen-devel] [qemu-mainline test] 99889: regressions - trouble: broken/fail/pass

2016-08-01 Thread osstest service owner
flight 99889 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/99889/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-xsm 3 host-install(3) broken REGR. vs. 99872 test-armhf-armhf-xl

[Xen-devel] [ovmf baseline-only test] 66880: trouble: blocked/broken/pass

2016-08-01 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66880 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66880/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm3 ho

[Xen-devel] [xen-unstable-smoke test] 99890: tolerable all pass - PUSHED

2016-08-01 Thread osstest service owner
flight 99890 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/99890/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Mark Rutland
Hi, I realised I made a confusing mistake in my last reply; clarification below. On Mon, Aug 01, 2016 at 06:26:54PM +0100, Mark Rutland wrote: > On Mon, Aug 01, 2016 at 05:57:50PM +0100, Julien Grall wrote: > > however we only need one TLBI instruction (assuming there is > > no superpage shatteri

[Xen-devel] [xen-unstable test] 99886: tolerable FAIL - PUSHED

2016-08-01 Thread osstest service owner
flight 99886 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/99886/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds 15 guest-start/debian.repeatfail like 99864 build-amd64-rumpuserxen

Re: [Xen-devel] [PATCH v2 00/25] arm/altp2m: Introducing altp2m to ARM.

2016-08-01 Thread Julien Grall
On 01/08/16 18:10, Sergej Proskurin wrote: Hello all, Hello Sergej, The following patch series can be found on Github[0] and is part of my contribution to this year's Google Summer of Code (GSoC)[1]. My project is managed by the organization The Honeynet Project. As part of GSoC, I am being

[Xen-devel] [PATCH v2] arm/vm_event: get/set registers

2016-08-01 Thread Tamas K Lengyel
Add support for getting/setting registers through vm_event on ARM. Only TTB/CR/R0/R1, PC and CPSR are sent as part of a request and only PC is set as part of a response. The set of registers can be expanded in the future to include other registers as well if necessary. Signed-off-by: Tamas K Lengy

Re: [Xen-devel] [PATCH v2 02/25] arm/altp2m: Add HVMOP_altp2m_get_domain_state.

2016-08-01 Thread Sergej Proskurin
Hi Andrew, On 08/01/2016 07:21 PM, Andrew Cooper wrote: > On 01/08/16 18:10, Sergej Proskurin wrote: >> diff --git a/xen/include/asm-arm/altp2m.h b/xen/include/asm-arm/altp2m.h >> index 0711796..d47b249 100644 >> --- a/xen/include/asm-arm/altp2m.h >> +++ b/xen/include/asm-arm/altp2m.h >> @@ -22,6

Re: [Xen-devel] [PATCH v2 02/25] arm/altp2m: Add HVMOP_altp2m_get_domain_state.

2016-08-01 Thread Andrew Cooper
On 01/08/16 18:10, Sergej Proskurin wrote: > diff --git a/xen/include/asm-arm/altp2m.h b/xen/include/asm-arm/altp2m.h > index 0711796..d47b249 100644 > --- a/xen/include/asm-arm/altp2m.h > +++ b/xen/include/asm-arm/altp2m.h > @@ -22,6 +22,8 @@ > > #include > > +#define altp2m_enabled(d) ((d)-

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Mark Rutland
On Mon, Aug 01, 2016 at 05:57:50PM +0100, Julien Grall wrote: > On 01/08/16 17:34, Mark Rutland wrote: > >On Mon, Aug 01, 2016 at 04:40:50PM +0100, Julien Grall wrote: > >>After I read again multiple time the ARM ARM (D4-1732 in ARM DDI > >>0487A.i) and spoke with various ARM folks, changing the pe

[Xen-devel] [PATCH v2 24/25] arm/altp2m: Extend xen-access for altp2m on ARM.

2016-08-01 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin Acked-by: Razvan Cojocaru --- Cc: Razvan Cojocaru Cc: Tamas K Lengyel Cc: Ian Jackson Cc: Wei Liu --- tools/tests/xen-access/xen-access.c | 27 +-- 1 file changed, 17 insertions(+), 10 deletions(-) diff --git a/tools/tests/xen-access/x

[Xen-devel] [PATCH v9] x86/mem-sharing: mem-sharing a range of memory

2016-08-01 Thread Tamas K Lengyel
Currently mem-sharing can be performed on a page-by-page basis from the control domain. However, this process is quite wasteful when a range of pages have to be deduplicated. This patch introduces a new mem_sharing memop for range sharing where the user doesn't have to separately nominate each pag

[Xen-devel] [linux-4.1 baseline-only test] 66878: regressions - trouble: blocked/broken/fail/pass

2016-08-01 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66878 linux-4.1 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66878/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-

[Xen-devel] [PATCH v2 14/25] arm/altp2m: Make get_page_from_gva ready for altp2m.

2016-08-01 Thread Sergej Proskurin
The function get_page_from_gva uses ARM's hardware support to translate gva's to machine addresses. This function is used, among others, for memory regulation purposes, e.g, within the context of memory ballooning. To ensure correct behavior while altp2m is in use, we use the host's p2m table for t

[Xen-devel] [PATCH v2 03/25] arm/altp2m: Add struct vttbr.

2016-08-01 Thread Sergej Proskurin
The struct vttbr introduces a simple way to precisely access the individual fields of the vttbr. --- xen/arch/arm/p2m.c | 8 xen/arch/arm/traps.c| 2 +- xen/include/asm-arm/p2m.h | 2 +- xen/include/asm-arm/processor.h | 16 4 files chang

[Xen-devel] [PATCH v2 06/25] arm/altp2m: Cosmetic fixes - function prototypes.

2016-08-01 Thread Sergej Proskurin
This commit changes the prototype of the following functions: - p2m_alloc_vmid - p2m_free_vmid Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/p2m.c | 12 +--- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/xen/arch/arm/p2m.c

[Xen-devel] [PATCH v2 11/25] arm/altp2m: Add HVMOP_altp2m_destroy_p2m.

2016-08-01 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v2: Substituted the call to tlb_flush for p2m_flush_table. Added comments. Cosmetic fixes. --- xen/arch/arm/altp2m.c| 50 xen/arch/arm/hvm.c |

[Xen-devel] [PATCH v2 20/25] arm/altp2m: Add altp2m paging mechanism.

2016-08-01 Thread Sergej Proskurin
This commit adds the function "altp2m_lazy_copy" implementing the altp2m paging mechanism. The function "altp2m_lazy_copy" lazily copies the hostp2m's mapping into the currently active altp2m view on 2nd stage translation violations on instruction or data access. Every altp2m violation generates a

[Xen-devel] [PATCH v2 17/25] arm/altp2m: Cosmetic fixes - function prototypes.

2016-08-01 Thread Sergej Proskurin
This commit changes the prototype of the following functions: - apply_p2m_changes - apply_one_level - p2m_insert_mapping - p2m_remove_mapping These changes are required as our implementation reuses most of the existing ARM p2m implementation to set page table attributes of the individual altp2m vi

[Xen-devel] [PATCH v2 25/25] arm/altp2m: Add test of xc_altp2m_change_gfn.

2016-08-01 Thread Sergej Proskurin
This commit extends xen-access by a simple test of the functionality provided by "xc_altp2m_change_gfn". The idea is to dynamically remap a trapping gfn to another mfn, which holds the same content as the original mfn. Signed-off-by: Sergej Proskurin --- Cc: Razvan Cojocaru Cc: Tamas K Lengyel

[Xen-devel] [PATCH v2 18/25] arm/altp2m: Add HVMOP_altp2m_set_mem_access.

2016-08-01 Thread Sergej Proskurin
The HVMOP HVMOP_altp2m_set_mem_access allows to set gfn permissions of (currently one page at a time) of a specific altp2m view. In case the view does not hold the requested gfn entry, it will be first copied from the hostp2m table and then modified as requested. Signed-off-by: Sergej Proskurin -

[Xen-devel] [PATCH v2 22/25] arm/altp2m: Adjust debug information to altp2m.

2016-08-01 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v2: Dump p2m information of the hostp2m and all altp2m views. --- xen/arch/arm/p2m.c | 20 1 file changed, 20 insertions(+) diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c index 2f4751b..8

[Xen-devel] [PATCH v2 12/25] arm/altp2m: Add HVMOP_altp2m_switch_p2m.

2016-08-01 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/altp2m.c| 32 xen/arch/arm/hvm.c | 2 +- xen/include/asm-arm/altp2m.h | 4 3 files changed, 37 insertions(+), 1 deletion(-) diff --git a/xen/ar

[Xen-devel] [PATCH v2 19/25] arm/altp2m: Add altp2m_propagate_change.

2016-08-01 Thread Sergej Proskurin
This commit introduces the function "altp2m_propagate_change" that is responsible to propagate changes applied to the host's p2m to a specific or even all altp2m views. In this way, Xen can in-/decrease the guest's physmem at run-time without leaving the altp2m views with stalled/invalid entries.

[Xen-devel] [PATCH v2 15/25] arm/altp2m: Extend __p2m_lookup.

2016-08-01 Thread Sergej Proskurin
This commit extends the functionality of the function "__p2m_lookup". The function "__p2m_lookup" performs the necessary steps gathering information concerning memory attributes and the p2m table level a specific gfn is mapped to. Thus, we extend the function's prototype so that the caller can opti

[Xen-devel] [PATCH v2 16/25] arm/altp2m: Make p2m_mem_access_check ready for altp2m.

2016-08-01 Thread Sergej Proskurin
This commit extends the function "p2m_mem_access_check" to consider altp2m. Also, the new implementation fills the request buffer to hold altp2m-related information. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/p2m.c | 17 +++-- 1 fil

Re: [Xen-devel] [PATCH] x86: use gcc6'es flags asm() output support

2016-08-01 Thread Andrew Cooper
On 01/08/16 17:06, Jan Beulich wrote: On 01.07.16 at 18:51, wrote: >> How about a different example, from the second hunk >> >> --- a/xen/arch/x86/x86_emulate/x86_emulate.c >> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c >> @@ -832,8 +832,19 @@ static int read_ulong( >> static bool_t mul_dbl

[Xen-devel] [PATCH v2 05/25] arm/altp2m: Rename and extend p2m_alloc_table.

2016-08-01 Thread Sergej Proskurin
The initially named function "p2m_alloc_table" allocated pages solely required for the host's p2m. The new implementation leaves p2m allocation related parts inside of this function to generally initialize p2m/altp2m tables. This is done generically, as the host's p2m and altp2m tables are allocate

[Xen-devel] [PATCH v2 01/25] arm/altp2m: Add first altp2m HVMOP stubs.

2016-08-01 Thread Sergej Proskurin
This commit moves the altp2m-related code from x86 to ARM. Functions that are no yet supported notify the caller or print a BUG message stating their absence. Also, the struct arch_domain is extended with the altp2m_active attribute, representing the current altp2m activity configuration of the do

[Xen-devel] [PATCH v2 09/25] arm/altp2m: Add altp2m table flushing routine.

2016-08-01 Thread Sergej Proskurin
The current implementation differentiates between flushing and destroying altp2m views. This commit adds the function altp2m_flush, which allows to flush all or individual altp2m views without destroying the entire table. In this way, altp2m views can be reused at a later point in time. Signed-off

[Xen-devel] [PATCH v2 02/25] arm/altp2m: Add HVMOP_altp2m_get_domain_state.

2016-08-01 Thread Sergej Proskurin
This commit adopts the x86 HVMOP_altp2m_get_domain_state implementation. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c | 9 - xen/include/asm-arm/altp2m.h | 2 ++ 2 files changed, 10 insertions(+), 1 deletion(-) diff --git

[Xen-devel] [PATCH v2 00/25] arm/altp2m: Introducing altp2m to ARM.

2016-08-01 Thread Sergej Proskurin
Hello all, The following patch series can be found on Github[0] and is part of my contribution to this year's Google Summer of Code (GSoC)[1]. My project is managed by the organization The Honeynet Project. As part of GSoC, I am being supervised by the Xen developer Tamas K. Lengyel , George D. W

[Xen-devel] [PATCH v2 04/25] arm/altp2m: Move hostp2m init/teardown to individual functions.

2016-08-01 Thread Sergej Proskurin
This commit pulls out generic init/teardown functionality out of p2m_init and p2m_teardown into p2m_init_one, p2m_free_one, and p2m_flush_table functions. This allows our future implementation to reuse existing code for the initialization/teardown of altp2m views. Signed-off-by: Sergej Proskurin

[Xen-devel] [PATCH v2 13/25] arm/altp2m: Make p2m_restore_state ready for altp2m.

2016-08-01 Thread Sergej Proskurin
This commit adapts the function "p2m_restore_state" in a way that the currently active altp2m table is considered during state restoration. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/p2m.c | 4 +++- xen/include/asm-arm/altp2m.h | 3 ++

[Xen-devel] [PATCH v2 23/25] arm/altp2m: Extend libxl to activate altp2m on ARM.

2016-08-01 Thread Sergej Proskurin
The current implementation allows to set the parameter HVM_PARAM_ALTP2M. This parameter allows further usage of altp2m on ARM. For this, we define an additional, common altp2m field as part of the libxl_domain_type struct. This field can be set on x86 and on ARM systems through the "altp2m" switch

[Xen-devel] [PATCH v2 10/25] arm/altp2m: Add HVMOP_altp2m_create_p2m.

2016-08-01 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v2: Cosmetic fixes. --- xen/arch/arm/altp2m.c| 23 +++ xen/arch/arm/hvm.c | 3 ++- xen/include/asm-arm/altp2m.h | 4 3 files changed, 29 insertions(+), 1 deletion(-) dif

[Xen-devel] [PATCH v2 08/25] arm/altp2m: Add HVMOP_altp2m_set_domain_state.

2016-08-01 Thread Sergej Proskurin
The HVMOP_altp2m_set_domain_state allows to activate altp2m on a specific domain. This commit adopts the x86 HVMOP_altp2m_set_domain_state implementation. Note that the function altp2m_flush is currently implemented in form of a stub. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc

[Xen-devel] [PATCH v2 21/25] arm/altp2m: Add HVMOP_altp2m_change_gfn.

2016-08-01 Thread Sergej Proskurin
This commit adds the functionality to change mfn mappings for specified gfn's in altp2m views. This mechanism can be used within the context of VMI, e.g., to establish stealthy debugging. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/altp2m.c

[Xen-devel] [PATCH v2 07/25] arm/altp2m: Add altp2m init/teardown routines.

2016-08-01 Thread Sergej Proskurin
The p2m initialization now invokes initialization routines responsible for the allocation and initialization of altp2m structures. The same applies to teardown routines. The functionality has been adopted from the x86 altp2m implementation. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabelli

[Xen-devel] What distros have Xen 4.7 packages that work on UEFI hardware?

2016-08-01 Thread lists
I want to run Xen+Linux Dom0 host on server-grade UEFI hardware. I want to use current stable releases of Xen (4.7) and Linux kernel (4.7). I prefer to use distro packages when possible, but the current distro packages I use crash on Xen boot. I can't keep having things down for days or weeks a

[Xen-devel] [PATCH v2 2/2] x86/mm: Annotate gfn_get_* helpers as requiring non-NULL parameters

2016-08-01 Thread Andrew Cooper
Introduce and use the nonnull attribute to help the compiler catch NULL parameters being passed to function which require their parameters not to be NULL. Experimentally, GCC 4.9 on Debian Jessie only warns of non-NULL-ness from immediate callers, so propagate the attributes out to all helpers. A

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Julien Grall
On 01/08/16 17:34, Mark Rutland wrote: Hi Julien, Hi Mark, On Mon, Aug 01, 2016 at 04:40:50PM +0100, Julien Grall wrote: Hi Razvan, On 28/07/16 16:04, Razvan Cojocaru wrote: On 07/28/2016 05:51 PM, Julien Grall wrote: The function p2m_set_mem_access can be re-implemented using the gener

[Xen-devel] [PATCH v2] mem_access: sanitize code around sending vm_event request

2016-08-01 Thread Tamas K Lengyel
The two functions monitor_traps and mem_access_send_req duplicate some of the same functionality. The mem_access_send_req however leaves a lot of the standard vm_event fields to be filled by other functions. Remove mem_access_send_req() completely, making use of monitor_traps() to put requests int

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Tamas K Lengyel
On Mon, Aug 1, 2016 at 10:33 AM, Julien Grall wrote: > > > On 01/08/16 17:27, Tamas K Lengyel wrote: >> >> On Mon, Aug 1, 2016 at 10:15 AM, Julien Grall >> wrote: >>> >>> >>> >>> On 01/08/16 16:59, Tamas K Lengyel wrote: On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote: >>>

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Mark Rutland
Hi Julien, On Mon, Aug 01, 2016 at 04:40:50PM +0100, Julien Grall wrote: > Hi Razvan, > > On 28/07/16 16:04, Razvan Cojocaru wrote: > >On 07/28/2016 05:51 PM, Julien Grall wrote: > >>The function p2m_set_mem_access can be re-implemented using the generic > >>functions p2m_get_entry and __p2m_set

[Xen-devel] [PATCH v2 2/3] xen/types: Correct the definition of uintptr_t

2016-08-01 Thread Andrew Cooper
uintptr_t is specified as unsigned int in 32bit, not unsigned long. This is why, when copying inttypes.h from GCC, the use of PRIxPTR and similar is broken for 32bit builds. Use __attribute__((__mode__(__pointer__))) to get the compilers default pointer type, which matches the pre-existing inttyp

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Julien Grall
On 01/08/16 17:27, Tamas K Lengyel wrote: On Mon, Aug 1, 2016 at 10:15 AM, Julien Grall wrote: On 01/08/16 16:59, Tamas K Lengyel wrote: On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote: IMHO we should just pause the domain while mem_access permissions are being changed. On x86 it is n

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Tamas K Lengyel
On Mon, Aug 1, 2016 at 10:15 AM, Julien Grall wrote: > > > On 01/08/16 16:59, Tamas K Lengyel wrote: >> >> On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote: >> IMHO we should just pause the domain while mem_access permissions are >> being changed. On x86 it is not necessary as the mem_access >>

[Xen-devel] [PATCH] libxl: fix printing hotplug arguments/environment

2016-08-01 Thread Roger Pau Monne
A OS could decide to not pass arguments or any environment variables to hotplug scripts, and this will trigger a bug in device_hotplug logic, since it expects both the argument and the environment arrays to exist. Allow both args or env to be NULL. Signed-off-by: Roger Pau Monné --- Cc: Wei Liu

Re: [Xen-devel] [PATCH 2/3] xen/types: Correct the definition of uintptr_t

2016-08-01 Thread Jan Beulich
>>> On 01.08.16 at 18:08, wrote: > On 01/08/16 16:51, Jan Beulich wrote: > On 01.08.16 at 15:14, wrote: >>> uintptr_t is specified as unsigned int in 32bit, not unsigned long. This is >>> why, when copying inttypes.h from GCC, the use of PRIxPTR and similar is >>> broken for 32bit builds. >>

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Julien Grall
On 01/08/16 16:59, Tamas K Lengyel wrote: On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote: IMHO we should just pause the domain while mem_access permissions are being changed. On x86 it is not necessary as the mem_access bookkeeping is kept in the ept pte entries but since on ARM the two th

Re: [Xen-devel] [PATCH] mem_access: Use monitor_traps instead of mem_access_send_req

2016-08-01 Thread Tamas K Lengyel
On Mon, Aug 1, 2016 at 4:33 AM, Julien Grall wrote: > Hello Tamas, > > On 29/07/16 23:26, Tamas K Lengyel wrote: >> >> However, as this patch really only touches >> things that belong to mem_access/monitor components maybe we should >> split these from the generic ARM code altogether to avoid such

Re: [Xen-devel] [PATCH 2/3] xen/types: Correct the definition of uintptr_t

2016-08-01 Thread Andrew Cooper
On 01/08/16 16:51, Jan Beulich wrote: On 01.08.16 at 15:14, wrote: >> uintptr_t is specified as unsigned int in 32bit, not unsigned long. This is >> why, when copying inttypes.h from GCC, the use of PRIxPTR and similar is >> broken for 32bit builds. > I don't think this is strictly the case,

Re: [Xen-devel] [PATCH] x86: use gcc6'es flags asm() output support

2016-08-01 Thread Jan Beulich
>>> On 01.07.16 at 18:51, wrote: > How about a different example, from the second hunk > > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > @@ -832,8 +832,19 @@ static int read_ulong( > static bool_t mul_dbl(unsigned long m[2]) > { > bool_t rc;

Re: [Xen-devel] [PATCH] xen: rename xen_pmu_init() in sys-hypervisor.c

2016-08-01 Thread Juergen Gross
On 01/08/16 17:46, Boris Ostrovsky wrote: > On 08/01/2016 11:44 AM, Juergen Gross wrote: >> On 01/08/16 16:10, Boris Ostrovsky wrote: >>> On 08/01/2016 07:40 AM, Juergen Gross wrote: There are two functions with name xen_pmu_init() in the kernel. Rename the one in drivers/xen/sys-hypervis

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Tamas K Lengyel
On Mon, Aug 1, 2016 at 9:40 AM, Julien Grall wrote: > Hi Razvan, > > On 28/07/16 16:04, Razvan Cojocaru wrote: >> >> On 07/28/2016 05:51 PM, Julien Grall wrote: >>> >>> The function p2m_set_mem_access can be re-implemented using the generic >>> functions p2m_get_entry and __p2m_set_entry. >>> >>>

Re: [Xen-devel] [PATCH 3/3] xen/common: Sort the obj build order

2016-08-01 Thread Jan Beulich
>>> On 01.08.16 at 15:14, wrote: > Suggested-by: Jan Beulich > Signed-off-by: Andrew Cooper Just like before, in case it's not implied: Acked-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 2/3] xen/types: Correct the definition of uintptr_t

2016-08-01 Thread Jan Beulich
>>> On 01.08.16 at 15:14, wrote: > uintptr_t is specified as unsigned int in 32bit, not unsigned long. This is > why, when copying inttypes.h from GCC, the use of PRIxPTR and similar is > broken for 32bit builds. I don't think this is strictly the case, i.e. doing it this way still ties us to in

Re: [Xen-devel] [PATCH] xen: Make VPMU init message look less scary

2016-08-01 Thread Boris Ostrovsky
On 08/01/2016 11:48 AM, Juergen Gross wrote: > On 01/08/16 16:11, Konrad Rzeszutek Wilk wrote: >> On Mon, Aug 01, 2016 at 01:41:20PM +0200, Juergen Gross wrote: >>> The default for the Xen hypervisor is to not enable VPMU in order to >>> avoid security issues. In this case the Linux kernel will iss

Re: [Xen-devel] [PATCH] xen: Make VPMU init message look less scary

2016-08-01 Thread Juergen Gross
On 01/08/16 16:11, Konrad Rzeszutek Wilk wrote: > On Mon, Aug 01, 2016 at 01:41:20PM +0200, Juergen Gross wrote: >> The default for the Xen hypervisor is to not enable VPMU in order to >> avoid security issues. In this case the Linux kernel will issue the >> message "Could not initialize VPMU for c

Re: [Xen-devel] [RFC 21/22] xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set, get}_entry

2016-08-01 Thread Julien Grall
Hi Razvan, On 28/07/16 16:04, Razvan Cojocaru wrote: On 07/28/2016 05:51 PM, Julien Grall wrote: The function p2m_set_mem_access can be re-implemented using the generic functions p2m_get_entry and __p2m_set_entry. Note that because of the implementation of p2m_get_entry, a TLB invalidation ins

Re: [Xen-devel] [PATCH] xen: rename xen_pmu_init() in sys-hypervisor.c

2016-08-01 Thread Boris Ostrovsky
On 08/01/2016 11:44 AM, Juergen Gross wrote: > On 01/08/16 16:10, Boris Ostrovsky wrote: >> On 08/01/2016 07:40 AM, Juergen Gross wrote: >>> There are two functions with name xen_pmu_init() in the kernel. Rename >>> the one in drivers/xen/sys-hypervisor.c to avoid shadowing the one in >>> arch/x86/

[Xen-devel] [ovmf baseline-only test] 66879: trouble: broken/pass

2016-08-01 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66879 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66879/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd

Re: [Xen-devel] [PATCH 1/3] xen/types: Alter typedef for bool_t

2016-08-01 Thread Jan Beulich
>>> On 01.08.16 at 15:14, wrote: > As xen/stdbool.h is included, the typedef should use bool rather than _Bool. > > Suggested-by: Jan Beulich I think this implies it, but just in case you think it doesn't ... > Signed-off-by: Andrew Cooper ...: Acked-by: Jan Beulich __

Re: [Xen-devel] [PATCH] xen: rename xen_pmu_init() in sys-hypervisor.c

2016-08-01 Thread Juergen Gross
On 01/08/16 16:10, Boris Ostrovsky wrote: > On 08/01/2016 07:40 AM, Juergen Gross wrote: >> There are two functions with name xen_pmu_init() in the kernel. Rename >> the one in drivers/xen/sys-hypervisor.c to avoid shadowing the one in >> arch/x86/xen/pmu.c >> >> Signed-off-by: Juergen Gross > >

Re: [Xen-devel] [PATCH] x86/mm: Clean up the construction of base_disallow_mask

2016-08-01 Thread Jan Beulich
>>> On 01.08.16 at 12:05, wrote: > * Use _PAGE_AVAIL_HIGH and _PAGE_NX instead of opencoding them > * Drop further remenants of the 32bit hypervisor build > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-de

Re: [Xen-devel] [PATCH 2/2] x86/mm: Annotate gfn_get_* helpers as requiring non-NULL parameters

2016-08-01 Thread Jan Beulich
>>> On 27.07.16 at 20:08, wrote: > --- a/xen/include/xen/compiler.h > +++ b/xen/include/xen/compiler.h > @@ -62,6 +62,8 @@ > > #define __must_check __attribute__((__warn_unused_result__)) > > +#define __nonnull(...) __attribute__((nonnull (__VA_ARGS__))) May I ask to use __nonnull__ here, to

Re: [Xen-devel] [PATCH 2/2] x86/mm: Annotate gfn_get_* helpers as requiring non-NULL parameters

2016-08-01 Thread Jan Beulich
>>> On 28.07.16 at 17:58, wrote: > On 27/07/16 19:08, Andrew Cooper wrote: >> Introduce and use the nonnull attribute to help the compiler catch NULL >> parameters being passed to function which require their parameters not to be >> NULL. Experimentally, GCC 4.9 on Debian Jessie only warns of non

Re: [Xen-devel] [PATCH] x86/hap: use the right cache attributes when MTRR is disabled

2016-08-01 Thread Jan Beulich
>>> On 26.07.16 at 18:15, wrote: > --- a/xen/arch/x86/hvm/mtrr.c > +++ b/xen/arch/x86/hvm/mtrr.c > @@ -814,10 +814,17 @@ int epte_get_entry_emt(struct domain *d, unsigned long > gfn, mfn_t mfn, > if ( gmtrr_mtype == -EADDRNOTAVAIL ) > return -1; > > -gmtrr_mtype = is_hvm_domai

[Xen-devel] [ovmf test] 99888: all pass - PUSHED

2016-08-01 Thread osstest service owner
flight 99888 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/99888/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 07783fdd67e40fa7cff3ebf34399c1ab65937802 baseline version: ovmf 3d8fab5719a52d67cd4666b

Re: [Xen-devel] [PATCH] xen/kconfig: unify messages of options moved from command line to kconfig

2016-08-01 Thread Jan Beulich
>>> On 26.07.16 at 17:45, wrote: > Change the message so that it mentions running from the top level directory > and using '-C xen' in order to call the 'menuconfig' target inside of the > xen directory (there's no top-level menuconfig target). Well, I'm not convinced whether this end up clarifyi

Re: [Xen-devel] [PATCH 2/2] Allow kdump with crash_kexec_post_notifiers

2016-08-01 Thread Petr Tesarik
On Mon, 1 Aug 2016 16:22:18 +0200 "Jan Beulich" wrote: > >>> On 01.08.16 at 16:15, wrote: >[...] > > But let me repeat: if PV kexec works, then it has always had priority > > over the hypercall. If it doesn't work, then it has always been broken. > > For the latter case, I agree that the kernel

Re: [Xen-devel] [PATCH] symbols: Generate an xen-sym.map file similar to Linux's

2016-08-01 Thread Jan Beulich
>>> On 18.07.16 at 20:39, wrote: First of all, for the title: Is what you do really similar to Linux? Iirc there System.map is simply output from nm. > Also note that during runtime one can do: > 82d080104920 t domain.c#do_domain_pause I can't seem to make sense of this. > @@ -307,6 +308,1

Re: [Xen-devel] [PATCH v3 2/3] x86/emulate: add support of emulating SSE2 instruction {, v}movd mm, r32/m32 and {, v}movq mm, r64

2016-08-01 Thread Mihai Donțu
On Monday 01 August 2016 15:53:56 Andrew Cooper wrote: > On 01/08/16 15:48, Mihai Donțu wrote: > > > I'd rather pick a fixed register and update the regs->... field from that > > > after the stub was executed. E.g. using rAX and treating it just like a > > > return value of the "call". But maybe I'

Re: [Xen-devel] [PATCH v3 2/3] x86/emulate: add support of emulating SSE2 instruction {, v}movd mm, r32/m32 and {, v}movq mm, r64

2016-08-01 Thread Andrew Cooper
On 01/08/16 15:59, Jan Beulich wrote: On 01.08.16 at 16:55, wrote: >> On Monday 01 August 2016 17:48:33 Mihai Donțu wrote: >>> On Monday 01 August 2016 07:43:20 Jan Beulich wrote: >>> Your suggestion makes sense, but I'm starting to doubt my initial >>> patch. :-) I'm testing "movq xm

Re: [Xen-devel] [PATCH v3 2/3] x86/emulate: add support of emulating SSE2 instruction {, v}movd mm, r32/m32 and {, v}movq mm, r64

2016-08-01 Thread Jan Beulich
>>> On 01.08.16 at 16:55, wrote: > On Monday 01 August 2016 17:48:33 Mihai Donțu wrote: >> On Monday 01 August 2016 07:43:20 Jan Beulich wrote: >> > > > > Your suggestion makes sense, but I'm starting to doubt my initial >> > > > > patch. :-) I'm testing "movq xmm1, xmm1" and noticing that it take

Re: [Xen-devel] [PATCH v3 2/3] x86/emulate: add support of emulating SSE2 instruction {, v}movd mm, r32/m32 and {, v}movq mm, r64

2016-08-01 Thread Jan Beulich
>>> On 01.08.16 at 16:48, wrote: > On Monday 01 August 2016 07:43:20 Jan Beulich wrote: >> > > > Your suggestion makes sense, but I'm starting to doubt my initial >> > > > patch. :-) I'm testing "movq xmm1, xmm1" and noticing that it takes the >> > > > GPR-handling route and I can't seem to be abl

  1   2   >