Re: [Xen-devel] [PATCH 1/1] cameraif: add ABI for para-virtual camera

2018-09-03 Thread Oleksandr Andrushchenko
On 09/03/2018 06:25 PM, Hans Verkuil wrote: Hi Oleksandr, On 09/03/2018 12:16 PM, Oleksandr Andrushchenko wrote: On 08/21/2018 08:54 AM, Oleksandr Andrushchenko wrote: On 08/14/2018 11:30 AM, Juergen Gross wrote: On 31/07/18 11:31, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko

Re: [Xen-devel] [PATCH v6 01/14] iommu: introduce the concept of BFN...

2018-09-03 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, September 3, 2018 7:47 PM > > >>> On 03.09.18 at 10:23, wrote: > >> From: Jan Beulich [mailto:jbeul...@suse.com] > >> Sent: 30 August 2018 17:00 > >> > >> >>> On 23.08.18 at 11:46, wrote: > >> > --- a/xen/include/xen/mm.h > >> > +++

[Xen-devel] [ovmf test] 127237: all pass - PUSHED

2018-09-03 Thread osstest service owner
flight 127237 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/127237/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 04722cfa309104d815257a2705db5ee7024dc9bf baseline version: ovmf e3b9ab433aaccffdcc71c

[Xen-devel] [xen-unstable-smoke test] 127242: regressions - FAIL

2018-09-03 Thread osstest service owner
flight 127242 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/127242/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs. 127212 Tests

Re: [Xen-devel] Ping VT-x: [PATCH 10/11] x86/vmx: Work around VMEntry failure when Single Stepping in an STI shadow

2018-09-03 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Monday, September 3, 2018 6:40 PM > > On 04/06/18 14:59, Andrew Cooper wrote: > > See the code comment for the details. > > > > Signed-off-by: Andrew Cooper Acked-by: Kevin Tian ___ Xen-

[Xen-devel] [PATCH v2] x86/altp2m: Allow setting the #VE info page for an arbitrary VCPU

2018-09-03 Thread Adrian Pop
In a classic HVI + Xen setup, the introspection engine would monitor legacy guest page-tables by marking them read-only inside the EPT; this way any modification explicitly made by the guest or implicitly made by the CPU page walker would trigger an EPT violation, which would be forwarded by Xen to

[Xen-devel] [xen-unstable-smoke test] 127234: regressions - FAIL

2018-09-03 Thread osstest service owner
flight 127234 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/127234/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs. 127212 Tests

[Xen-devel] [seabios test] 127226: tolerable FAIL - PUSHED

2018-09-03 Thread osstest service owner
flight 127226 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/127226/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop fail like 126467 test-amd64-amd64-xl-qemuu-ws16-amd64 17 g

[Xen-devel] [xen-unstable-smoke test] 127228: regressions - FAIL

2018-09-03 Thread osstest service owner
flight 127228 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/127228/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs. 127212 Tests

[Xen-devel] [linux-next test] 127206: regressions - FAIL

2018-09-03 Thread osstest service owner
flight 127206 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/127206/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs. 127148 test-amd64-

[Xen-devel] [xen-unstable test] 127205: trouble: broken/fail/pass

2018-09-03 Thread osstest service owner
flight 127205 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/127205/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xen-freebsd broken build-amd64-xen-free

Re: [Xen-devel] [xen-unstable-smoke test] 127225: regressions - FAIL

2018-09-03 Thread Andrew Cooper
On 03/09/18 23:41, osstest service owner wrote: > flight 127225 xen-unstable-smoke real [real] > http://logs.test-lab.xenproject.org/osstest/logs/127225/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-amd64-xl-qemuu-debi

[Xen-devel] [xen-unstable-smoke test] 127225: regressions - FAIL

2018-09-03 Thread osstest service owner
flight 127225 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/127225/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs. 127212 Tests

Re: [Xen-devel] [RFC PATCH v2 02/17] libxl: Add "stubdomain_version" to domain_build_info.

2018-09-03 Thread Marek Marczykowski-Górecki
On Thu, Aug 09, 2018 at 10:25:42AM +0100, Wei Liu wrote: > On Tue, Aug 07, 2018 at 04:16:07AM +0200, Marek Marczykowski-Górecki wrote: > > From: Eric Shelton > > > > This enum gives the ability to select between a MiniOS-based QEMU > > traditional stub domain and a Linux-based QEMU upstream stub

[Xen-devel] [ovmf baseline-only test] 75160: tolerable FAIL

2018-09-03 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75160 ovmf real [real] http://osstest.xensource.com/osstest/logs/75160/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail like 75158 test

[Xen-devel] [xen-unstable-smoke test] 127219: regressions - FAIL

2018-09-03 Thread osstest service owner
flight 127219 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/127219/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs. 127212 Tests

[Xen-devel] [ovmf baseline-only test] 75158: tolerable FAIL

2018-09-03 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75158 ovmf real [real] http://osstest.xensource.com/osstest/logs/75158/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail like 75153 test

[Xen-devel] [linux-linus test] 127193: regressions - FAIL

2018-09-03 Thread osstest service owner
flight 127193 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/127193/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rumprun-i386 12 guest-start fail REGR. vs. 125898 test-amd64-amd64-ru

Re: [Xen-devel] Xen Dom0 boot failure on platform that supports ARM GICv4

2018-09-03 Thread Shameerali Kolothum Thodi
> -Original Message- > From: Julien Grall [mailto:julien.gr...@arm.com] > Sent: 03 September 2018 18:14 > To: Shameerali Kolothum Thodi ; > xen-de...@lists.xen.org > Cc: sstabell...@kernel.org; Linuxarm ; Andre > Przywara > Subject: Re: Xen Dom0 boot failure on platform that supports ARM

[Xen-devel] [xen-unstable-smoke test] 127215: regressions - FAIL

2018-09-03 Thread osstest service owner
flight 127215 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/127215/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs. 127212 Tests

Re: [Xen-devel] [PATCH v2 4/6] x86emul: clean up AVX2 insn use in test harness

2018-09-03 Thread Andrew Cooper
On 29/08/18 15:24, Jan Beulich wrote: > Drop the pretty pointless conditionals from code testing AVX insns and > properly use AVX2 mnemonics in code testing AVX2 insns (the test harness > is already requiring sufficiently new a compiler/assembler). > > Signed-off-by: Jan Beulich Acked-by: Andrew

Re: [Xen-devel] [PATCH v2 3/6] x86emul: support AVX512 opmask insns

2018-09-03 Thread Andrew Cooper
On 29/08/18 15:24, Jan Beulich wrote: > These are all VEX encoded, so the EVEX decoding logic continues to > remain unused at this point. > > The new testcase is deliberately coded in assembly, as a C one would > have become almost unreadable due to the overwhelming amount of > __builtin_...() that

Re: [Xen-devel] [PATCH v2 04/13] optee: add OP-TEE mediator skeleton

2018-09-03 Thread Volodymyr Babchuk
Hi Julien, On 03.09.18 20:38, Julien Grall wrote: Hi Volodymyr, On 03/09/18 17:54, Volodymyr Babchuk wrote: Add very basic OP-TEE mediator. It can probe for OP-TEE presence, tell it about domain creation/destuction and forward all known s/destuction/destruction/ calls. This is all what is

Re: [Xen-devel] [PATCH v2 04/13] optee: add OP-TEE mediator skeleton

2018-09-03 Thread Julien Grall
Hi Volodymyr, On 03/09/18 17:54, Volodymyr Babchuk wrote: Add very basic OP-TEE mediator. It can probe for OP-TEE presence, tell it about domain creation/destuction and forward all known s/destuction/destruction/ calls. This is all what is needed for Dom0 to work with OP-TEE as long as Dom0

Re: [Xen-devel] [PATCH v2 01/13] arm: add generic TEE mediator framework

2018-09-03 Thread Julien Grall
Hi Volodymyr, On 03/09/18 17:54, Volodymyr Babchuk wrote: This patch adds basic framework for TEE mediators. Guests can't talk to TEE directly, we need some entity that will intercept request and decide what to do with them. "TEE mediator" is a such entity. This is how it works: user can build

[Xen-devel] [ovmf test] 127208: all pass - PUSHED

2018-09-03 Thread osstest service owner
flight 127208 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/127208/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf e3b9ab433aaccffdcc71c4af286ac352d4ce7c20 baseline version: ovmf 374168ae651fabcb77a0b

Re: [Xen-devel] [PATCH v2 02/13] domctl: add tee_op domctl

2018-09-03 Thread Julien Grall
Hi, On 03/09/18 17:54, Volodymyr Babchuk wrote: Currently this call used only to enable TEE support for a domain. It is planed to extend it when there will be multiple TEE mediators, so toolstack can determine which TEE is available on a platform. Signed-off-by: Volodymyr Babchuk --- xen/ar

Re: [Xen-devel] Xen Dom0 boot failure on platform that supports ARM GICv4

2018-09-03 Thread Julien Grall
On 03/09/18 17:54, Shameerali Kolothum Thodi wrote: Hi Julien, Thanks for taking a look at this. -Original Message- From: Julien Grall [mailto:julien.gr...@arm.com] Sent: 03 September 2018 17:13 To: Shameerali Kolothum Thodi ; xen-de...@lists.xen.org Cc: sstabell...@kernel.org; Linux

Re: [Xen-devel] [PATCH v2] tools/xl: refuse to set number of vcpus to 0 via xl vcpu-set

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 02:59:42PM +0200, Juergen Gross wrote: > Trying to set the number of vcpus of a domain to 0 isn't refused. > We should not allow that. > > Signed-off-by: Juergen Gross Acked-by: Wei Liu ___ Xen-devel mailing list Xen-devel@lis

Re: [Xen-devel] [PATCH 2/5] xen/domain: Break __domain_destroy() out of domain_create() and complete_domain_destroy()

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 06:05:34PM +0100, Andrew Cooper wrote: > On 03/09/18 18:01, Wei Liu wrote: > > On Mon, Sep 03, 2018 at 05:58:02PM +0100, Andrew Cooper wrote: > >> On 03/09/18 17:54, Wei Liu wrote: > >>> On Mon, Sep 03, 2018 at 03:46:57PM +0100, Andrew Cooper wrote: > This is the first

Re: [Xen-devel] [PATCH 2/5] xen/domain: Break __domain_destroy() out of domain_create() and complete_domain_destroy()

2018-09-03 Thread Andrew Cooper
On 03/09/18 18:01, Wei Liu wrote: > On Mon, Sep 03, 2018 at 05:58:02PM +0100, Andrew Cooper wrote: >> On 03/09/18 17:54, Wei Liu wrote: >>> On Mon, Sep 03, 2018 at 03:46:57PM +0100, Andrew Cooper wrote: This is the first step in making the destroy path idepotent, and using it in >>> "ide

Re: [Xen-devel] [PATCH 2/5] xen/domain: Break __domain_destroy() out of domain_create() and complete_domain_destroy()

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 05:58:02PM +0100, Andrew Cooper wrote: > On 03/09/18 17:54, Wei Liu wrote: > > On Mon, Sep 03, 2018 at 03:46:57PM +0100, Andrew Cooper wrote: > >> This is the first step in making the destroy path idepotent, and using it > >> in > > "idempotent". > > > >> place of the ad-ho

Re: [Xen-devel] [PATCH] xen/x86: Ignore the automatically generated include/asm-x86/asm-macros.h

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 05:48:03PM +0100, Andrew Cooper wrote: > Signed-off-by: Andrew Cooper Reviewed-by: Wei Liu ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] [PATCH] tools/xl: fix output of xl vcpu-pin dry run with smt=0

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 01:26:30PM +0200, Juergen Gross wrote: > Fix another smt=0 fallout: xl -N vcpu-pin prints only parts of the > affinities as it is using the number of online cpus instead of the > maximum cpu number. > > Signed-off-by: Juergen Gross Acked-by: Wei Liu

Re: [Xen-devel] [PATCH 5/5] xen/domain: Make rangeset_domain_destroy() idempotent

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 03:47:00PM +0100, Andrew Cooper wrote: > ... and move it into the common __domain_destroy() path. > > Signed-off-by: Andrew Cooper Reviewed-by: Wei Liu ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xe

Re: [Xen-devel] [PATCH 2/5] xen/domain: Break __domain_destroy() out of domain_create() and complete_domain_destroy()

2018-09-03 Thread Andrew Cooper
On 03/09/18 17:54, Wei Liu wrote: > On Mon, Sep 03, 2018 at 03:46:57PM +0100, Andrew Cooper wrote: >> This is the first step in making the destroy path idepotent, and using it in > "idempotent". > >> place of the ad-hoc cleanup paths in the create path. >> >> To begin with, the trivial free operati

Re: [Xen-devel] [PATCH 4/5] xen/domain: Fold xsm_free_security_domain() paths together

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 03:46:59PM +0100, Andrew Cooper wrote: > xsm_free_security_domain() is idempotent (both the dummy handler, and the > flask handler). Move it into the shared __domain_destroy() path, and drop the > INIT_xsm flag from domain_create() > > Signed-off-by: Andrew Cooper Review

Re: [Xen-devel] [PATCH 3/5] xen/domain: Call lock_profile_deregister_struct() from common code

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 03:46:58PM +0100, Andrew Cooper wrote: > lock_profile_register_struct() is called from common code, but the matching > deregister was previously only called from x86 code. > > The practical upshot of this when using CONFIG_LOCK_PROFILE, destroyed domains > on ARM (and in pa

[Xen-devel] [PATCH v2 13/13] lixl: arm: create optee firmware node in DT if tee=1

2018-09-03 Thread Volodymyr Babchuk
If TEE support is enabled with "tee=1" option in xl.cfg, then we need to inform guest about available TEE. Currently only OP-TEE is supported, so we'll create DT node in a way that is expected by optee driver in linux. Signed-off-by: Volodymyr Babchuk --- tools/libxl/libxl_arm.c | 29 ++

[Xen-devel] [PATCH v2 12/13] xl: add "tee" option for xl.cfg

2018-09-03 Thread Volodymyr Babchuk
This boolean option controls if TEE access is enabled for the domain. If access is enabled, xl will call xc_dom_tee_enable(...) to ask hypervisor to enable TEE support. Signed-off-by: Volodymyr Babchuk --- docs/man/xl.cfg.pod.5.in| 10 ++ tools/libxl/libxl_arm.c | 30

[Xen-devel] [PATCH v2 11/13] libxc: add xc_dom_tee_enable(...) function

2018-09-03 Thread Volodymyr Babchuk
This function uses XEN_DOMCTL_tee_op domctl to enable TEE support for a given domain. Signed-off-by: Volodymyr Babchuk --- tools/libxc/include/xenctrl.h | 7 +++ tools/libxc/xc_domain.c | 13 + 2 files changed, 20 insertions(+) diff --git a/tools/libxc/include/xenctrl.h b

[Xen-devel] [PATCH v2 10/13] optee: add support for RPC commands

2018-09-03 Thread Volodymyr Babchuk
OP-TEE can issue multiple RPC requests. We are interested mostly in request that asks NW to allocate/free shared memory for OP-TEE needs, becuase mediator need to do address translation in the same way as it was done for shared buffers registered by NW. As mediator now accesses shared command buff

[Xen-devel] [PATCH v2 06/13] optee: add domain contexts

2018-09-03 Thread Volodymyr Babchuk
OP-TEE meditor needs to store per-domain context, as will be seen in the next patches. At this moment it stores only reference to domain. This allows us to filter out calls from domains that are not allowed to work with OP-TEE. Signed-off-by: Volodymyr Babchuk --- xen/arch/arm/tee/optee.c | 66

[Xen-devel] [PATCH v2 08/13] optee: add support for RPC SHM buffers

2018-09-03 Thread Volodymyr Babchuk
OP-TEE usually uses the same idea with command buffers (see previous commit) to issue RPC requests. Problem is that initially it has no buffer, where it can write request. So the first RPC request it makes is special: it requests NW to allocate shared buffer for other RPC requests. Usually this buf

[Xen-devel] [PATCH v2 09/13] optee: add support for arbitrary shared memory

2018-09-03 Thread Volodymyr Babchuk
Shared memory is widely used by NW to communicate with TAs in OP-TEE. NW can share part of own memory with TA or OP-TEE core, by registering it OP-TEE, or by providing a temporal refernce. Anyways, information about such memory buffers are sent to OP-TEE as a list of pages. This mechanism is descri

[Xen-devel] [PATCH v2 07/13] optee: add std call handling

2018-09-03 Thread Volodymyr Babchuk
Main way to communicate with OP-TEE is to issue standard SMCCC call. "Standard" is a SMCCC term and it means that call can be interrupted and OP-TEE can return control to NW before completing the call. In contranst with fast calls, where arguments and return values are passed in registers, standar

[Xen-devel] [PATCH v2 05/13] optee: add fast calls handling

2018-09-03 Thread Volodymyr Babchuk
Some fast SMCCC calls to OP-TEE should be handled in a special way. Capabilities exchange should be filtered out, so only caps known to mediator are used. Also mediator disables static SHM memory capability, because it can't share OP-TEE memory with a domain. Only domain can share memory with OP-TE

[Xen-devel] [PATCH v2 04/13] optee: add OP-TEE mediator skeleton

2018-09-03 Thread Volodymyr Babchuk
Add very basic OP-TEE mediator. It can probe for OP-TEE presence, tell it about domain creation/destuction and forward all known calls. This is all what is needed for Dom0 to work with OP-TEE as long as Dom0 shares 1:1 mapped pages with OP-TEE. Any attempt to call OP-TEE from DomU will fail and ca

[Xen-devel] [PATCH v2 00/13] TEE mediator (and OP-TEE) support in XEN

2018-09-03 Thread Volodymyr Babchuk
From: Volodymyr Babchuk Hello all, This is v2 of patch series for OP-TEE mediator support in XEN. Changes from v1: - Added domctl interface, so now xl decides what domain should work with TEE - Removed XSM support due to change described above - Patch with OP-TEE mediator was splited to 7 se

[Xen-devel] [PATCH v2 01/13] arm: add generic TEE mediator framework

2018-09-03 Thread Volodymyr Babchuk
This patch adds basic framework for TEE mediators. Guests can't talk to TEE directly, we need some entity that will intercept request and decide what to do with them. "TEE mediator" is a such entity. This is how it works: user can build XEN with multiple TEE mediators (see the next patches, where

[Xen-devel] [PATCH v2 03/13] arm: tee: add OP-TEE header files

2018-09-03 Thread Volodymyr Babchuk
This header files describe protocol between OP-TEE and OP-TEE client driver in Linux. They are needed for upcomient OP-TEE mediator, which is added in the next patch. Reason to add those headers in separate patch is to ease up review. Those files were taken from linux tree (drivers/tee/optee/) and

[Xen-devel] [PATCH v2 02/13] domctl: add tee_op domctl

2018-09-03 Thread Volodymyr Babchuk
Currently this call used only to enable TEE support for a domain. It is planed to extend it when there will be multiple TEE mediators, so toolstack can determine which TEE is available on a platform. Signed-off-by: Volodymyr Babchuk --- xen/arch/arm/domctl.c | 10 ++ xen/include/p

Re: [Xen-devel] [PATCH 2/5] xen/domain: Break __domain_destroy() out of domain_create() and complete_domain_destroy()

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 03:46:57PM +0100, Andrew Cooper wrote: > This is the first step in making the destroy path idepotent, and using it in "idempotent". > place of the ad-hoc cleanup paths in the create path. > > To begin with, the trivial free operations are broken out. The rest of the > cl

Re: [Xen-devel] Xen Dom0 boot failure on platform that supports ARM GICv4

2018-09-03 Thread Shameerali Kolothum Thodi
Hi Julien, Thanks for taking a look at this. > -Original Message- > From: Julien Grall [mailto:julien.gr...@arm.com] > Sent: 03 September 2018 17:13 > To: Shameerali Kolothum Thodi ; > xen-de...@lists.xen.org > Cc: sstabell...@kernel.org; Linuxarm ; Andre > Przywara > Subject: Re: Xen Do

[Xen-devel] [PATCH] xen/x86: Ignore the automatically generated include/asm-x86/asm-macros.h

2018-09-03 Thread Andrew Cooper
Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné --- .gitignore | 1 + 1 file changed, 1 insertion(+) diff --git a/.gitignore b/.gitignore index a7cc3f3..ab53fc4 100644 --- a/.gitignore +++ b/.gitignore @@ -311,6 +311,7 @@ xen/arch/*/efi/runtime.c xen/include/

Re: [Xen-devel] [PATCH 1/5] xen/domain: Prepare data for is_{pv, hvm}_domain() as early as possible

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 03:46:56PM +0100, Andrew Cooper wrote: > Given two subtle failures from getting this wrong before, and more cleanup on > the way, move the setting of d->guest_type as early as possible. > > Note that despite moving the assignment of d->guest_type outside of the > is_idle_do

[Xen-devel] [PATCH v4] x86/hvm: remove default ioreq server (again)

2018-09-03 Thread Paul Durrant
My recent patch [1] to qemu-xen-traditional removes the last use of the 'default' ioreq server in Xen. (This is a catch-all ioreq server that is used if no explicitly registered I/O range is targetted). This patch can be applied once that patch is committed, to remove the (>100 lines of) redundant

Re: [Xen-devel] [PATCH v2 2/6] x86emul: extend MASKMOV{Q, DQU} tests

2018-09-03 Thread Andrew Cooper
On 29/08/18 15:23, Jan Beulich wrote: > While deriving the first AVX512 pieces from existing code I've got the > (in the end wrong) impression that the emulation of these insns would be > broken. Besides testing that the instructions act as no-ops when the > controlling mask bits are all zero, add

Re: [Xen-devel] [PATCH v2 1/6] x86emul: fix FMA scalar operand sizes

2018-09-03 Thread Andrew Cooper
On 29/08/18 15:23, Jan Beulich wrote: > FMA insns, other than the earlier AVX additions, don't use the low > opcode bit to distinguish between single and double vector elements. I think I've worked out why "other than the" is so weird to read as a native speaker here.  I think you mean "unlike the

Re: [Xen-devel] [PATCH RFC] x86/HVM: also stuff RSB upon exit to guest

2018-09-03 Thread Andrew Cooper
On 27/07/18 15:20, Jan Beulich wrote: > In order to mostly eliminate abuse of what Xen leaves in the RSB by > guest level attackers, fill the RSB with almost-NULL pointers right > before entering guest context. How do you envisage an attacker using what Xen leaves in the RSB?  An attacker doesn't

Re: [Xen-devel] [PATCH v2 2/2] x86/HVM: split page straddling emulated accesses in more cases

2018-09-03 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 03 September 2018 16:45 > To: xen-devel > Cc: Olaf Hering ; Andrew Cooper > ; Paul Durrant > Subject: [PATCH v2 2/2] x86/HVM: split page straddling emulated accesses in > more cases > > Assuming consecutive linea

Re: [Xen-devel] Xen Dom0 boot failure on platform that supports ARM GICv4

2018-09-03 Thread Julien Grall
On 03/09/18 15:53, Shameerali Kolothum Thodi wrote: Hi, Hello, I am trying to boot xen(stable-4.11) on one of our ARM64 boards which has support for GICv4. But dom0(kernel 4.18) boot fails with the below trap, XEN) done. (XEN) Std. Loglevel: All (XEN) Guest Loglevel: All (XEN)

Re: [Xen-devel] [PATCH 5/5] xen/domain: Make rangeset_domain_destroy() idempotent

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 16:47, wrote: > ... and move it into the common __domain_destroy() path. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/li

Re: [Xen-devel] [PATCH 4/5] xen/domain: Fold xsm_free_security_domain() paths together

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 16:46, wrote: > xsm_free_security_domain() is idempotent (both the dummy handler, and the > flask handler). Move it into the shared __domain_destroy() path, and drop the > INIT_xsm flag from domain_create() > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich __

Re: [Xen-devel] [PATCH 3/5] xen/domain: Call lock_profile_deregister_struct() from common code

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 16:46, wrote: > lock_profile_register_struct() is called from common code, but the matching > deregister was previously only called from x86 code. > > The practical upshot of this when using CONFIG_LOCK_PROFILE, destroyed domains > on ARM (and in particular, the freed page behi

Re: [Xen-devel] [PATCH 2/5] xen/domain: Break __domain_destroy() out of domain_create() and complete_domain_destroy()

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 16:46, wrote: > --- a/xen/common/domain.c > +++ b/xen/common/domain.c > @@ -260,6 +260,23 @@ static int __init parse_extra_guest_irqs(const char *s) > } > custom_param("extra_guest_irqs", parse_extra_guest_irqs); > > +/* > + * Destroy a domain once all references to it have

Re: [Xen-devel] [PATCH 1/5] xen/domain: Prepare data for is_{pv, hvm}_domain() as early as possible

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 16:46, wrote: > Given two subtle failures from getting this wrong before, and more cleanup on > the way, move the setting of d->guest_type as early as possible. > > Note that despite moving the assignment of d->guest_type outside of the > is_idle_domain(d) check, it still behav

[Xen-devel] [PATCH v5 2/3] x86/altp2m: Add a hvmop for setting the suppress #VE bit

2018-09-03 Thread Adrian Pop
Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a domain to change the value of the #VE suppress bit for a page. Add a libxc wrapper for invoking this hvmop. Signed-off-by: Adrian Pop Acked-by: Wei Liu Acked-by: Tamas K Lengyel --- Changes in v5: - remove the "set_" from stru

[Xen-devel] [PATCH v5 3/3] x86/altp2m: Add a hvmop for querying the suppress #VE bit

2018-09-03 Thread Adrian Pop
Signed-off-by: Adrian Pop --- tools/libxc/include/xenctrl.h | 2 ++ tools/libxc/xc_altp2m.c | 26 +++ xen/arch/x86/hvm/hvm.c | 19 ++ xen/arch/x86/mm/mem_access.c| 45 + xen/include/public/hvm/hvm_op.h | 2 ++ xe

[Xen-devel] [PATCH v5 0/3] Add hvmops for setting and getting the suppress #VE bit

2018-09-03 Thread Adrian Pop
As the code stands right now, after DomU has enabled #VE using HVMOP_altp2m_vcpu_enable_notify, all its pages have the #VE suppress bit cleared, generating #VEs for any EPT violation. There is currently no way to change the value of the #VE suppress bit for a page from a domain; it can only be don

[Xen-devel] [PATCH v5 1/3] x86/mm: Change default value for suppress #VE in set_mem_access()

2018-09-03 Thread Adrian Pop
From: Vlad Ioan Topan The default value for the "suppress #VE" bit set by set_mem_access() currently depends on whether the call is made from the same domain (the bit is set when called from another domain and cleared if called from the same domain). This patch changes that behavior to inherit th

[Xen-devel] [PATCH v4] x86/altp2m: Add a subop for obtaining the mem access of a page

2018-09-03 Thread Adrian Pop
Currently there is a subop for setting the memaccess of a page, but not for consulting it. The new HVMOP_altp2m_get_mem_access adds this functionality. Both altp2m get/set mem access functions use the struct xen_hvm_altp2m_mem_access which has now dropped the `set' part and has been renamed from

[Xen-devel] [PATCH v2 2/2] x86/HVM: split page straddling emulated accesses in more cases

2018-09-03 Thread Jan Beulich
Assuming consecutive linear addresses map to all RAM or all MMIO is not correct. Nor is assuming that a page straddling MMIO access will access the same emulating component for both parts of the access. If a guest RAM read fails with HVMTRANS_bad_gfn_to_mfn and if the access straddles a page bounda

[Xen-devel] [PATCH v2 1/2] x86/HVM: drop hvm_fetch_from_guest_linear()

2018-09-03 Thread Jan Beulich
It can easily be expressed through hvm_copy_from_guest_linear(), and in two cases this even simplifies callers. Suggested-by: Paul Durrant Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper --- v2: Make sure this compiles standalone. Slightly adjust change in hvm_ud_intercept(). --- a/x

[Xen-devel] [PATCH v2 0/2] x86/HVM: emulation adjustments

2018-09-03 Thread Jan Beulich
1: drop hvm_fetch_from_guest_linear() 2: split page straddling emulated accesses in more cases v2: Patch 1 now builds cleanly (without other patches in place the up-to- date versions of which are yet to be posted), and patch 2 is no longer RFC. Jan _

[Xen-devel] [PATCH v2] pvshim: introduce a PV shim defconfig

2018-09-03 Thread Roger Pau Monne
In order to build a tailored pvshim-only binary from Xen. Switch the PV shim build from the tools firmware into using the new defconfig. A diff of the .config generated for the pvshim firmware build before and after this change shows no differences. Signed-off-by: Roger Pau Monné Acked-by: Ian J

Re: [Xen-devel] [PATCH v2] hvmloader: fix build with LLVM Linker

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 05:33:26PM +0200, Roger Pau Monne wrote: > The hvmloader binary generated when using LLVM LD doesn't work > properly and seems to get stuck while trying to generate and load the > ACPI tables. This is caused by the layout of the binary when linked > with LLVM LD. > > LLVM L

[Xen-devel] [PATCH v2] hvmloader: fix build with LLVM Linker

2018-09-03 Thread Roger Pau Monne
The hvmloader binary generated when using LLVM LD doesn't work properly and seems to get stuck while trying to generate and load the ACPI tables. This is caused by the layout of the binary when linked with LLVM LD. LLVM LD has a different default linker script that GNU LD, and the resulting hvmloa

Re: [Xen-devel] [PATCH 1/1] cameraif: add ABI for para-virtual camera

2018-09-03 Thread Hans Verkuil
Hi Oleksandr, On 09/03/2018 12:16 PM, Oleksandr Andrushchenko wrote: > On 08/21/2018 08:54 AM, Oleksandr Andrushchenko wrote: >> On 08/14/2018 11:30 AM, Juergen Gross wrote: >>> On 31/07/18 11:31, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko This is the ABI for the

Re: [Xen-devel] [xen-unstable test] 127070: regressions - FAIL

2018-09-03 Thread Juergen Gross
On 03/09/18 17:21, Jan Beulich wrote: On 03.09.18 at 14:56, wrote: >> On 03/09/18 14:44, Jan Beulich wrote: >> On 01.09.18 at 23:43, wrote: flight 127070 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/127070/ Regressions :-( Tests

Re: [Xen-devel] [PATCH 2/2] tools/libxl: Switch Arm guest type to PVH

2018-09-03 Thread Wei Liu
On Mon, Sep 03, 2018 at 12:11:27PM +0100, Julien Grall wrote: > I don't think so. The top makefile does not pass -DCONFIG_ARM on compiler > command line. This is only done in sub-directory such as console and > libacpi. Indeed. That how console code did it. > > > > > There are several CONFIG_AR

Re: [Xen-devel] [xen-unstable test] 127070: regressions - FAIL

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 14:56, wrote: > On 03/09/18 14:44, Jan Beulich wrote: > On 01.09.18 at 23:43, wrote: >>> flight 127070 xen-unstable real [real] >>> http://logs.test-lab.xenproject.org/osstest/logs/127070/ >>> >>> Regressions :-( >>> >>> Tests which did not succeed and are blocking, >>> in

Re: [Xen-devel] [PATCH 1/2] add cpu_thread_id to struct cpuinfo_x86

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 17:11, wrote: > On 03/09/18 17:07, Jan Beulich wrote: > On 03.09.18 at 16:52, wrote: >>> On 03/09/18 16:47, Jan Beulich wrote: >>> On 03.09.18 at 15:53, wrote: > On 03/09/18 15:46, Jan Beulich wrote: > On 31.08.18 at 18:22, wrote: >>> Add the thread-id

Re: [Xen-devel] [PATCH 2/6] x86/mm: use optional cache in guest_walk_tables()

2018-09-03 Thread Jan Beulich
>>> On 19.07.18 at 15:22, wrote: >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: 19 July 2018 11:47 >> >> @@ -134,7 +135,15 @@ guest_walk_tables(struct vcpu *v, struct >> /* Get the l4e from the top level table and check its flags*/ >> gw->l4mfn = top_mfn; >> l4p = (guest_

Re: [Xen-devel] [PATCH 1/2] add cpu_thread_id to struct cpuinfo_x86

2018-09-03 Thread Juergen Gross
On 03/09/18 17:07, Jan Beulich wrote: On 03.09.18 at 16:52, wrote: >> On 03/09/18 16:47, Jan Beulich wrote: >> On 03.09.18 at 15:53, wrote: On 03/09/18 15:46, Jan Beulich wrote: On 31.08.18 at 18:22, wrote: >> Add the thread-id to the cpu config data and an accessor ma

Re: [Xen-devel] [PATCH 1/2] add cpu_thread_id to struct cpuinfo_x86

2018-09-03 Thread Andrew Cooper
On 03/09/18 15:52, Juergen Gross wrote: > On 03/09/18 16:47, Jan Beulich wrote: > On 03.09.18 at 15:53, wrote: >>> On 03/09/18 15:46, Jan Beulich wrote: >>> On 31.08.18 at 18:22, wrote: > Add the thread-id to the cpu config data and an accessor macro > cpu_to_thread(). > >

Re: [Xen-devel] [PATCH 1/2] add cpu_thread_id to struct cpuinfo_x86

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 16:52, wrote: > On 03/09/18 16:47, Jan Beulich wrote: > On 03.09.18 at 15:53, wrote: >>> On 03/09/18 15:46, Jan Beulich wrote: >>> On 31.08.18 at 18:22, wrote: > Add the thread-id to the cpu config data and an accessor macro > cpu_to_thread(). > > Signe

Re: [Xen-devel] [PATCH v17 13/13] x86/domctl: Don't pause the whole domain if only getting vcpu state

2018-09-03 Thread Roger Pau Monné
On Mon, Sep 03, 2018 at 05:42:43PM +0300, Isaila Alexandru wrote: > On Lu, 2018-09-03 at 16:36 +0200, Roger Pau Monné wrote: > > On Fri, Aug 31, 2018 at 04:56:21PM +0300, Isaila Alexandru wrote: > > > > > > On Mi, 2018-08-29 at 08:13 -0600, Jan Beulich wrote: > > > > > > > > > > > > > > > > > >

[Xen-devel] [xen-unstable-smoke test] 127212: tolerable all pass - PUSHED

2018-09-03 Thread osstest service owner
flight 127212 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/127212/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[Xen-devel] Xen Dom0 boot failure on platform that supports ARM GICv4

2018-09-03 Thread Shameerali Kolothum Thodi
Hi, I am trying to boot xen(stable-4.11) on one of our ARM64 boards which has support for GICv4. But dom0(kernel 4.18) boot fails with the below trap, XEN) done. (XEN) Std. Loglevel: All (XEN) Guest Loglevel: All (XEN) *** Serial input -> DOM0 (type 'CTRL-a' three times to switch inp

Re: [Xen-devel] SMT/Hyperthreading detection not always correct

2018-09-03 Thread Hans van Kranenburg
On 09/03/2018 03:35 PM, Jan Beulich wrote: On 03.09.18 at 15:24, wrote: >> (XEN) ACPI: LAPIC (acpi_id[0x00] lapic_id[0x00] enabled) >> (XEN) ACPI: LAPIC (acpi_id[0x10] lapic_id[0x20] enabled) >> (XEN) ACPI: LAPIC (acpi_id[0x08] lapic_id[0x10] enabled) >> (XEN) ACPI: LAPIC (acpi_id[0x18] lapic

Re: [Xen-devel] [PATCH 1/2] add cpu_thread_id to struct cpuinfo_x86

2018-09-03 Thread Juergen Gross
On 03/09/18 16:47, Jan Beulich wrote: On 03.09.18 at 15:53, wrote: >> On 03/09/18 15:46, Jan Beulich wrote: >> On 31.08.18 at 18:22, wrote: Add the thread-id to the cpu config data and an accessor macro cpu_to_thread(). Signed-off-by: Juergen Gross --- xen

Re: [Xen-devel] [PATCH] hvmloader: fix build with LLVM Linker

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 16:19, wrote: > On Mon, Aug 27, 2018 at 03:50:39AM -0600, Jan Beulich wrote: >> >>> On 24.08.18 at 11:58, wrote: >> > --- /dev/null >> > +++ b/tools/firmware/hvmloader/hvmloader.lds >> > @@ -0,0 +1,13 @@ >> > +SECTIONS >> > +{ >> > + . = 0x10; >> > + /* >> > + * NB: the

Re: [Xen-devel] [PATCH v2 17/23] x86/mm: put paging_update_nestedmode under CONFIG_HVM

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 16:27, wrote: > On Thu, Aug 30, 2018 at 02:35:37AM -0600, Jan Beulich wrote: >> >>> On 30.08.18 at 09:42, wrote: >> > On Tue, Aug 28, 2018 at 04:50:21AM -0600, Jan Beulich wrote: >> >> >>> On 26.08.18 at 14:19, wrote: >> >> > --- a/xen/arch/x86/mm/paging.c >> >> > +++ b/xen/ar

Re: [Xen-devel] [PATCH 1/2] add cpu_thread_id to struct cpuinfo_x86

2018-09-03 Thread Jan Beulich
>>> On 03.09.18 at 15:53, wrote: > On 03/09/18 15:46, Jan Beulich wrote: > On 31.08.18 at 18:22, wrote: >>> Add the thread-id to the cpu config data and an accessor macro >>> cpu_to_thread(). >>> >>> Signed-off-by: Juergen Gross >>> --- >>> xen/arch/x86/cpu/common.c | 1 + >>> xen/ar

[Xen-devel] [PATCH 0/5] xen/domain: Cleanup to the domain_create() error paths

2018-09-03 Thread Andrew Cooper
This is the start of a large amount of cleanup work to eventually allow for the removal of XEN_DOMCTL_max_cpus hypercall. The work to do is: 1) Make the domain destruction path fully idempotent, and use instead of the ad-hoc cleanup in each of the various create functions. 2) Do the same

[Xen-devel] [PATCH 1/5] xen/domain: Prepare data for is_{pv, hvm}_domain() as early as possible

2018-09-03 Thread Andrew Cooper
Given two subtle failures from getting this wrong before, and more cleanup on the way, move the setting of d->guest_type as early as possible. Note that despite moving the assignment of d->guest_type outside of the is_idle_domain(d) check, it still behaves the same. Previously, system domains had

[Xen-devel] [PATCH 4/5] xen/domain: Fold xsm_free_security_domain() paths together

2018-09-03 Thread Andrew Cooper
xsm_free_security_domain() is idempotent (both the dummy handler, and the flask handler). Move it into the shared __domain_destroy() path, and drop the INIT_xsm flag from domain_create() Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné CC: Stefano Stabellini C

[Xen-devel] [PATCH 2/5] xen/domain: Break __domain_destroy() out of domain_create() and complete_domain_destroy()

2018-09-03 Thread Andrew Cooper
This is the first step in making the destroy path idepotent, and using it in place of the ad-hoc cleanup paths in the create path. To begin with, the trivial free operations are broken out. The rest of the cleanup code will be moved as it is demonstrated (or made) to be idempotent. Signed-off-by

[Xen-devel] [PATCH 5/5] xen/domain: Make rangeset_domain_destroy() idempotent

2018-09-03 Thread Andrew Cooper
... and move it into the common __domain_destroy() path. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné CC: Stefano Stabellini CC: Julien Grall --- xen/common/domain.c | 9 +++-- xen/common/rangeset.c | 3 +++ 2 files changed, 6 insertions(+), 6 delet

  1   2   >