Re: [Xen-devel] [PATCH RFC v1 55/74] xen/pvshim: forward evtchn ops between L0 Xen and L2 DomU

2018-01-09 Thread Jan Beulich
>>> On 08.01.18 at 17:22, wrote: > On Mon, Jan 08, 2018 at 09:05:40AM -0700, Jan Beulich wrote: >> >>> On 04.01.18 at 14:06, wrote: >> > +unsigned long evtchn = xchg(&XEN_shared_info->evtchn_pending[l1], >> > 0); >> > + >> > +__clear_bit(l1, &pending); >> > +evtchn &= ~XE

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 01:14, wrote: > On 08/01/2018 17:45, Ian Jackson wrote: >> AIUI we have a series for pv-in-pvh shim which is nearing completion >> in the sense that it will have been well-tested (especially the >> hypervisor parts) and has good functionality. (Wei is handling the >> assembly o

Re: [Xen-devel] [PATCH v6.5 11/26] x86: Support indirect thunks from assembly code

2018-01-09 Thread Jan Beulich
>>> On 08.01.18 at 19:24, wrote: > On 04/01/18 09:23, Jan Beulich wrote: > On 04.01.18 at 01:15, wrote: >>> --- a/xen/arch/x86/pv/emul-priv-op.c >>> +++ b/xen/arch/x86/pv/emul-priv-op.c >>> @@ -73,37 +73,58 @@ void (*pv_post_outb_hook)(unsigned int port, u8 value); >>> >>> typedef void io_

Re: [Xen-devel] [PATCH v6.5 13/26] x86/amd: Try to set lfence as being Dispatch Serialising

2018-01-09 Thread Jan Beulich
>>> On 08.01.18 at 20:01, wrote: > On 04/01/18 09:32, Jan Beulich wrote: > On 04.01.18 at 01:15, wrote: >>> --- a/xen/arch/x86/cpu/amd.c >>> +++ b/xen/arch/x86/cpu/amd.c >>> @@ -558,8 +558,41 @@ static void init_amd(struct cpuinfo_x86 *c) >>> wrmsr_amd_safe(0xc001100d, l,

Re: [Xen-devel] [PATCH RFC v1 53/74] xen/pvshim: modify Dom0 builder in order to build a DomU

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > +void __init pv_shim_setup_dom(struct domain *d, l4_pgentry_t *l4start, > + unsigned long va_start, unsigned long store_va, > + unsigned long console_va, unsigned long > vphysmap, > +

Re: [Xen-devel] [PATCH RFC v1 57/74] x86/pv-shim: shadow PV console's page for L2 DomU

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > @@ -125,13 +127,28 @@ void __init pv_shim_setup_dom(struct domain *d, > l4_pgentry_t *l4start, > }) > SET_AND_MAP_PARAM(HVM_PARAM_STORE_PFN, si->store_mfn, store_va); > SET_AND_MAP_PARAM(HVM_PARAM_STORE_EVTCHN, si->store_evtchn, 0); > +SET_AND_MAP

Re: [Xen-devel] [PATCH RFC v1 52/74] xen: mark xenstore/console pages as RAM and add them to dom_io

2018-01-09 Thread Roger Pau Monné
On Mon, Jan 08, 2018 at 06:49:21AM -0700, Jan Beulich wrote: > >>> On 04.01.18 at 14:06, wrote: > > From: Roger Pau Monne > > > > Signed-off-by: Roger Pau Monné > > Signed-off-by: Wei Liu > > There being no description at all makes it rather harder to review this > one. I assume that marking

Re: [Xen-devel] [PATCH RFC v1 58/74] xen/pvshim: add migration support

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > +void hypervisor_resume(void) > +{ > +/* Reset shared info page. */ > +map_shared_info(); > + > +/* > + * Reset vcpu_info. Just clean the mapped bitmap and try to map the vcpu > + * area again. On failure to map (when it was previously mapped)

Re: [Xen-devel] [BUG] kernel bug encountered at drivers/net/xen-netback/netback.c:430!

2018-01-09 Thread Paul Durrant
I finally have a reliable repro and and it's trivial... Just try to copy a large file out of a Windows VM to an SMB share (using PV drivers in the VM). Dom0 goes bang pretty much immediately. I get another BUG too on another CPU... [ 1062.422497] [ cut here ] [ 1062.4225

Re: [Xen-devel] [PATCH RFC v1 59/74] xen/pvshim: add shim_mem cmdline parameter

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > @@ -284,7 +291,16 @@ unsigned long __init dom0_compute_nr_pages( > * maximum of 128MB. > */ > if ( nr_pages == 0 ) > -nr_pages = -min(avail / 16, 128UL << (20 - PAGE_SHIFT)); > +{ > +uint64_t rsvd = min

Re: [Xen-devel] [PATCH RFC v1 60/74] xen/pvshim: set max_pages to the value of tot_pages

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > From: Roger Pau Monne > > So that the guest is not able to deplete the memory pool of the shim > itself by trying to balloon up. > > Signed-off-by: Roger Pau Monné Acked-by: Jan Beulich Could perhaps be consider folding into the previous patch. Jan _

[Xen-devel] [xen-4.7-testing baseline-only test] 74130: trouble: blocked/broken

2018-01-09 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 74130 xen-4.7-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74130/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64

Re: [Xen-devel] [PATCH RFC v1 61/74] xen/pvshim: support vCPU hotplug

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > @@ -1303,22 +1320,20 @@ long do_vcpu_op(int cmd, unsigned int vcpuid, > XEN_GUEST_HANDLE_PARAM(void) arg) > > break; > > -case VCPUOP_up: { > -bool_t wake = 0; > -domain_lock(d); > -if ( !v->is_initialised ) > -

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread George Dunlap
On Mon, Jan 8, 2018 at 9:01 PM, Rich Persaud wrote: > On a similarly pragmatic note: would a variation of Anthony's vixen patch > series be suitable for pre-PVH Xen 4.6 - 4.9? These versions are currently > documented as security-supported (Oct 2018 - July 2020). Hmm, Ian's mail seems to be fo

Re: [Xen-devel] [PATCH RFC v1 62/74] xen/pvshim: memory hotplug

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > @@ -814,6 +817,113 @@ long pv_shim_cpu_down(void *data) > return 0; > } > > +static unsigned long batch_memory_op(int cmd, struct page_list_head *list) unsigned int cmd, const struct ... > +{ > +struct xen_memory_reservation xmr = { > +.domi

Re: [Xen-devel] [PATCH RFC v1 63/74] xen/shim: modify shim_mem parameter behaviour

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > From: Roger Pau Monne > > shim_mem will now account for both the memory used by the hypervisor > loaded in memory and the free memory slack given to the shim for > runtime usage. > > From experimental testing it seems like the total amount of MiB used > by the

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Ian Jackson
Andrew Cooper writes ("Re: Radical proposal: ship not-fully-tidied shim as 4.10.1"): > Does this sound fair? Everything is on fire. Your proposal seems much less radical than mine. I doubt it will produce a release to our users tomorrow, let alone this week. If we can't get agreement to commit

Re: [Xen-devel] [PATCH RFC v1 64/74] xen/pvshim: use default position for the m2p mappings

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > From: Roger Pau Monne > > When running a 32bit kernel as Dom0 on a 64bit hypervisor the > hypervisor will try to shrink the hypervisor hole to the minimum > needed, and thus requires the Dom0 to use XENMEM_machphys_mapping in > order to fetch the position of th

Re: [Xen-devel] [PATCH RFC v1 65/74] xen/shim: crash instead of reboot in shim mode

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > From: Roger Pau Monne > > All guest shutdown operations are forwarded to L0, so the only native > calls to machine_restart happen from crash related paths inside the > hypervisor, hence switch the reboot code to instead issue a crash > shutdown. > > Signed-off

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Ian Jackson
Andrew Cooper writes ("Re: Radical proposal: ship not-fully-tidied shim as 4.10.1"): > What I mean by this is > that, if we agree to go along this route, patches should be committed to > staging then immediately cherrypicked to staging-4.10, rather than > committed to staging-4.10 directly. This e

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread George Dunlap
On 01/09/2018 10:53 AM, Ian Jackson wrote: > Andrew Cooper writes ("Re: Radical proposal: ship not-fully-tidied shim as > 4.10.1"): >> What I mean by this is >> that, if we agree to go along this route, patches should be committed to >> staging then immediately cherrypicked to staging-4.10, rather

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Ian Jackson
George Dunlap writes ("Re: Radical proposal: ship not-fully-tidied shim as 4.10.1"): > On 01/09/2018 10:53 AM, Ian Jackson wrote: > > And as my other mail suggests, I don't think we should allow this work > > to be blocked by outstanding reviewed. IMO we should ship what we > > have ASAP. > > We

Re: [Xen-devel] [PATCH RFC v1 66/74] xen/shim: allow DomU to have as many vcpus as available

2018-01-09 Thread Jan Beulich
>>> On 04.01.18 at 14:06, wrote: > From: Roger Pau Monne > > Since the shim VCPUOP_{up/down} hypercall is wired to the plug/unplug > of CPUs to the shim itself, start the shim DomU with only the BSP > online, and let the guest bring up other CPUs as it needs them. > > Signed-off-by: Roger Pau M

Re: [Xen-devel] [PATCH RFC v1 52/74] xen: mark xenstore/console pages as RAM and add them to dom_io

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 10:25, wrote: > On Mon, Jan 08, 2018 at 06:49:21AM -0700, Jan Beulich wrote: >> >>> On 04.01.18 at 14:06, wrote: >> > +void __init hypervisor_init_memory(void) >> > +{ >> > +uint64_t pfn = 0; >> > +long rc; >> > + >> > +if ( !xen_guest ) >> > +return; >> > +

Re: [Xen-devel] [PATCH v6.5 11/26] x86: Support indirect thunks from assembly code

2018-01-09 Thread Andrew Cooper
On 09/01/18 08:36, Jan Beulich wrote: static io_emul_stub_t *io_emul_stub_setup(struct priv_op_ctxt *ctxt, u8 opcode, unsigned int port, unsigned int bytes) { +struct stubs *this_stubs = &this_cpu(stubs); +uns

Re: [Xen-devel] [PATCH RFC v1 52/74] xen: mark xenstore/console pages as RAM and add them to dom_io

2018-01-09 Thread Roger Pau Monné
On Tue, Jan 09, 2018 at 04:03:25AM -0700, Jan Beulich wrote: > >>> On 09.01.18 at 10:25, wrote: > > On Mon, Jan 08, 2018 at 06:49:21AM -0700, Jan Beulich wrote: > >> >>> On 04.01.18 at 14:06, wrote: > >> > +void __init hypervisor_init_memory(void) > >> > +{ > >> > +uint64_t pfn = 0; > >> > +

Re: [Xen-devel] [PATCH v1 0/5] libxl: add PV sound device

2018-01-09 Thread Oleksandr Grytsov
On Mon, Nov 20, 2017 at 3:44 PM, Oleksandr Grytsov wrote: > On Tue, Nov 14, 2017 at 2:38 PM, Oleksandr Grytsov > wrote: > >> On Wed, Nov 1, 2017 at 5:04 PM, Oleksandr Grytsov >> wrote: >> >>> From: Oleksandr Grytsov >>> >>> This patch set adds PV sound device support to xl.cfg and xl. >>> See

Re: [Xen-devel] [PATCH v1 0/6] libxl: create standalone vkb device

2018-01-09 Thread Oleksandr Grytsov
On Mon, Nov 20, 2017 at 3:44 PM, Oleksandr Grytsov wrote: > On Tue, Nov 14, 2017 at 2:39 PM, Oleksandr Grytsov > wrote: > >> On Wed, Nov 1, 2017 at 5:05 PM, Oleksandr Grytsov >> wrote: >> >>> From: Oleksandr Grytsov >>> >>> Changes since initial: >>> * add setting backend-type to xenstore >>>

Re: [Xen-devel] [PATCH] libxl: add libxl__is_driver_domain function

2018-01-09 Thread Oleksandr Grytsov
On Thu, Dec 14, 2017 at 4:14 PM, Oleksandr Grytsov wrote: > From: Oleksandr Grytsov > > We have following arm-based setup: > > - Dom0 with xen and xen tools; > - Dom1 with device backends (but it is not the driver domain); > - Dom2 with device frontend; > > On Dom2 destroying we have timeout err

Re: [Xen-devel] [PATCH v6.5 14/26] x86: Introduce alternative indirect thunks

2018-01-09 Thread Andrew Cooper
On 04/01/18 09:40, Jan Beulich wrote: On 04.01.18 at 01:15, wrote: >> --- a/docs/misc/xen-command-line.markdown >> +++ b/docs/misc/xen-command-line.markdown >> @@ -245,6 +245,20 @@ and not running softirqs. Reduce this if softirqs are >> not being run frequently >> enough. Setting this to a

Re: [Xen-devel] [PATCH v6.5 25/26] x86/cpuid: Offer Indirect Branch Controls to guests

2018-01-09 Thread Wei Liu
On Thu, Jan 04, 2018 at 12:15:54AM +, Andrew Cooper wrote: > With all infrastructure in place, it is now safe to let guests see and use > these features. Allow AMD's IBPB to be set even on Intel hardware, so the > toolstack can express "IBPB only" to guests. > > This also requires updating th

Re: [Xen-devel] [PATCH v6.5 19/26] x86/hvm: Permit guests direct access to MSR_{SPEC_CTRL, PRED_CMD}

2018-01-09 Thread Andrew Cooper
On 04/01/18 09:52, Jan Beulich wrote: > >> --- a/xen/arch/x86/msr.c >> +++ b/xen/arch/x86/msr.c >> @@ -132,7 +132,8 @@ int guest_rdmsr(const struct vcpu *v, uint32_t msr, >> uint64_t *val) >> case MSR_SPEC_CTRL: >> if ( !cp->feat.ibrsb ) >> goto gp_fault; >> -*va

Re: [Xen-devel] [PATCH RFC v1 49/74] x86/guest: map per-cpu vcpu_info area.

2018-01-09 Thread Roger Pau Monné
On Mon, Jan 08, 2018 at 06:21:04AM -0700, Jan Beulich wrote: > >>> On 04.01.18 at 14:06, wrote: > > +long rc; > > + > > +if ( !vcpu_info ) > > +{ > > +this_cpu(vcpu_info) = &XEN_shared_info->vcpu_info[vcpu]; > > +return 0; > > +} > > + > > +if ( test_bit(vcpu, v

[Xen-devel] [PATCH 1/2] xen/gntdev: Fix off-by-one error when unmapping with holes

2018-01-09 Thread Ross Lagerwall
If the requested range has a hole, the calculation of the number of pages to unmap is off by one. Fix it. Signed-off-by: Ross Lagerwall --- drivers/xen/gntdev.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c index 57efbd3..d3391

[Xen-devel] [PATCH 2/2] xen/gntdev: Fix partial gntdev_mmap() cleanup

2018-01-09 Thread Ross Lagerwall
When cleaning up after a partially successful gntdev_mmap(), unmap the successfully mapped grant pages otherwise Xen will kill the domain if in debug mode (Attempt to implicitly unmap a granted PTE) or Linux will kill the process and emit "BUG: Bad page map in process" if Xen is in release mode. T

[Xen-devel] [linux-linus test] 117721: regressions - FAIL

2018-01-09 Thread osstest service owner
flight 117721 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/117721/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-debianhvm-amd64 7 xen-bootfail REGR. vs. 115643 test-amd64-amd64-xl

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Wei Liu
On Tue, Jan 09, 2018 at 01:24:02AM -0700, Jan Beulich wrote: > >>> On 09.01.18 at 01:14, wrote: > > On 08/01/2018 17:45, Ian Jackson wrote: > >> AIUI we have a series for pv-in-pvh shim which is nearing completion > >> in the sense that it will have been well-tested (especially the > >> hypervisor

[Xen-devel] [distros-debian-snapshot test] 74142: trouble: blocked/broken

2018-01-09 Thread Platform Team regression test user
flight 74142 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74142/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvopsbroken build-i

Re: [Xen-devel] [PATCH v6.5 11/26] x86: Support indirect thunks from assembly code

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 12:23, wrote: > On 09/01/18 08:36, Jan Beulich wrote: > static io_emul_stub_t *io_emul_stub_setup(struct priv_op_ctxt *ctxt, u8 > opcode, >unsigned int port, unsigned > int > bytes) > { > +struct stubs *thi

Re: [Xen-devel] [PATCH v6.5 14/26] x86: Introduce alternative indirect thunks

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 12:44, wrote: > On 04/01/18 09:40, Jan Beulich wrote: > On 04.01.18 at 01:15, wrote: >>> +else >>> +{ >>> +/* >>> + * Evaluate the safest Branch Target Injection mitigations to use. >>> + * First, begin with compiler-aided mitigations. >>> +

Re: [Xen-devel] [PATCH v6.5 19/26] x86/hvm: Permit guests direct access to MSR_{SPEC_CTRL, PRED_CMD}

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 13:03, wrote: > On 04/01/18 09:52, Jan Beulich wrote: >> >>> --- a/xen/arch/x86/msr.c >>> +++ b/xen/arch/x86/msr.c >>> @@ -132,7 +132,8 @@ int guest_rdmsr(const struct vcpu *v, uint32_t msr, >>> uint64_t *val) >>> case MSR_SPEC_CTRL: >>> if ( !cp->feat.ibrsb ) >>>

Re: [Xen-devel] [PATCH v6.5 14/26] x86: Introduce alternative indirect thunks

2018-01-09 Thread Andrew Cooper
On 09/01/18 13:24, Jan Beulich wrote: On 09.01.18 at 12:44, wrote: >> On 04/01/18 09:40, Jan Beulich wrote: >> On 04.01.18 at 01:15, wrote: +else +{ +/* + * Evaluate the safest Branch Target Injection mitigations to use. + * First,

Re: [Xen-devel] [PATCH RFC v1 52/74] xen: mark xenstore/console pages as RAM and add them to dom_io

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 12:26, wrote: > On Tue, Jan 09, 2018 at 04:03:25AM -0700, Jan Beulich wrote: >> >>> On 09.01.18 at 10:25, wrote: >> > On Mon, Jan 08, 2018 at 06:49:21AM -0700, Jan Beulich wrote: >> >> >>> On 04.01.18 at 14:06, wrote: >> >> > +void __init hypervisor_init_memory(void) >> >> > +

Re: [Xen-devel] [PATCH v6.5 19/26] x86/hvm: Permit guests direct access to MSR_{SPEC_CTRL, PRED_CMD}

2018-01-09 Thread Andrew Cooper
On 09/01/18 13:28, Jan Beulich wrote: On 09.01.18 at 13:03, wrote: >> On 04/01/18 09:52, Jan Beulich wrote: --- a/xen/arch/x86/msr.c +++ b/xen/arch/x86/msr.c @@ -132,7 +132,8 @@ int guest_rdmsr(const struct vcpu *v, uint32_t msr, uint64_t *val) case MSR_SPEC_CTR

Re: [Xen-devel] [PATCH RFC v1 20/74] x86: produce a binary that can be booted as PVH

2018-01-09 Thread Wei Liu
On Mon, Jan 08, 2018 at 09:42:54AM -0700, Jan Beulich wrote: > >>> On 08.01.18 at 16:59, wrote: > > On Fri, Jan 05, 2018 at 04:39:33AM -0700, Jan Beulich wrote: > >> >>> On 04.01.18 at 14:05, wrote: > >> > --- a/xen/arch/x86/Makefile > >> > +++ b/xen/arch/x86/Makefile > >> > @@ -75,6 +75,8 @@ efi

Re: [Xen-devel] [PATCH v6.5 19/26] x86/hvm: Permit guests direct access to MSR_{SPEC_CTRL, PRED_CMD}

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 14:34, wrote: > On 09/01/18 13:28, Jan Beulich wrote: > On 09.01.18 at 13:03, wrote: >>> On 04/01/18 09:52, Jan Beulich wrote: > --- a/xen/arch/x86/msr.c > +++ b/xen/arch/x86/msr.c > @@ -132,7 +132,8 @@ int guest_rdmsr(const struct vcpu *v, uint32_t msr, > uint

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Anthony Liguori
On Jan 9, 2018 2:59 AM, "Ian Jackson" wrote: George Dunlap writes ("Re: Radical proposal: ship not-fully-tidied shim as 4.10.1"): > On 01/09/2018 10:53 AM, Ian Jackson wrote: > > And as my other mail suggests, I don't think we should allow this work > > to be blocked by outstanding reviewed. IMO

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Roger Pau Monné
On Tue, Jan 09, 2018 at 06:08:53AM -0800, Anthony Liguori wrote: > On Jan 9, 2018 2:59 AM, "Ian Jackson" wrote: > > George Dunlap writes ("Re: Radical proposal: ship not-fully-tidied shim as > 4.10.1"): > > On 01/09/2018 10:53 AM, Ian Jackson wrote: > > > And as my other mail suggests, I don't th

Re: [Xen-devel] [PATCH v6.5 20/26] x86: Protect unaware domains from meddling hyperthreads

2018-01-09 Thread Andrew Cooper
On 04/01/18 09:59, Jan Beulich wrote: On 04.01.18 at 01:15, wrote: >> Signed-off-by: Andrew Cooper > Fundamentally (as before) > Reviewed-by: Jan Beulich > However: > >> --- a/xen/arch/x86/domain.c >> +++ b/xen/arch/x86/domain.c >> @@ -2027,6 +2027,25 @@ int domain_relinquish_resources(stru

[Xen-devel] [PATCH 3/4] efi: Tweak efi_get_secureboot() and its data section assignment

2018-01-09 Thread Daniel Kiper
Otherwise they are not freed after the kernel proper init. Signed-off-by: Daniel Kiper --- arch/x86/xen/efi.c |3 +++ drivers/firmware/efi/libstub/secureboot-core.c | 12 ++-- drivers/firmware/efi/libstub/secureboot.c |3 +++ 3 files changed, 12

[Xen-devel] [PATCH 0/4] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot

2018-01-09 Thread Daniel Kiper
Hi, Initialize UEFI secure boot state during dom0 boot. Otherwise the kernel may not even know that it runs on secure boot enabled platform. Daniel arch/x86/xen/Makefile |4 +++- arch/x86/xen/efi.c | 14 + drivers/firmware/e

[Xen-devel] [PATCH 1/4] efi/stub: Extract efi_get_secureboot() to separate file

2018-01-09 Thread Daniel Kiper
We have to call efi_get_secureboot() from early Xen dom0 boot code to properly initialize boot_params.secure_boot. Sadly it lives in the EFI stub. Hence, it is not readily reachable from the kernel proper. So, move efi_get_secureboot() to separate file which can be included from the core kernel cod

[Xen-devel] [PATCH 2/4] x86/xen/efi: Initialize boot_params.secure_boot in xen_efi_init()

2018-01-09 Thread Daniel Kiper
Otherwise the kernel reports incorrect UEFI secure boot state in the Xen dom0. By the way fix CFLAGS_mmu_pv.o assignment alignment. Signed-off-by: Daniel Kiper --- arch/x86/xen/Makefile |4 +++- arch/x86/xen/efi.c| 11 +++ 2 files changed, 14 insertions(+), 1 deletion(-) diff

[Xen-devel] [PATCH 4/4] efi: Rename efi_get_secureboot() to __efi_get_secureboot() and make it static

2018-01-09 Thread Daniel Kiper
This may help compiler to do some function call optimization. This is rather cosmetic. If you like this patch apply. If you do not you may ignore it. Signed-off-by: Daniel Kiper --- arch/x86/xen/efi.c |2 +- drivers/firmware/efi/libstub/secureboot-core.c |2 +

[Xen-devel] [PATCH RFC 1/4] xen/x86: use dedicated function for tss initialization

2018-01-09 Thread Juergen Gross
Carve out the TSS initialization from load_system_tables(). Signed-off-by: Juergen Gross --- xen/arch/x86/cpu/common.c| 56 xen/include/asm-x86/system.h | 1 + 2 files changed, 32 insertions(+), 25 deletions(-) diff --git a/xen/arch/x86/cpu/comm

[Xen-devel] [PATCH RFC 0/4] xen/x86: use per-vcpu stacks for 64 bit pv domains

2018-01-09 Thread Juergen Gross
As a preparation for doing page table isolation in the Xen hypervisor in order to mitigate "Meltdown" use dedicated stacks for 64 bit PV domains mapped to the per-domain virtual area. The TSS is added to that area, too, and the GDT is no longer a remapped version of the per physical cpu one. This

[Xen-devel] [PATCH RFC 2/4] xen/x86: add helper for stack guard

2018-01-09 Thread Juergen Gross
Instead of open coding the calculation of the stack guard page multiple times add a helper to do the calculation. Signed-off-by: Juergen Gross --- xen/arch/x86/mm.c| 8 ++-- xen/include/asm-x86/mm.h | 6 ++ 2 files changed, 8 insertions(+), 6 deletions(-) diff --git a/xen/arch/x

[Xen-devel] [PATCH RFC 4/4] xen: use per-vcpu TSS and stacks for pv domains

2018-01-09 Thread Juergen Gross
Instead of using the TSS and stacks of the physical processor allocate them per vcpu, map them in the per domain area, and use those. Signed-off-by: Juergen Gross --- xen/arch/x86/domain.c| 45 +++ xen/arch/x86/pv/domain.c | 72

[Xen-devel] [PATCH RFC 3/4] xen/x86: split context_switch()

2018-01-09 Thread Juergen Gross
Split up context_switch() to prepare switching of the used stack. Signed-off-by: Juergen Gross --- xen/arch/x86/domain.c | 67 --- 1 file changed, 37 insertions(+), 30 deletions(-) diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c index d

Re: [Xen-devel] [PATCH v6.5 20/26] x86: Protect unaware domains from meddling hyperthreads

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 15:21, wrote: > On 04/01/18 09:59, Jan Beulich wrote: > On 04.01.18 at 01:15, wrote: >>> Signed-off-by: Andrew Cooper >> Fundamentally (as before) >> Reviewed-by: Jan Beulich >> However: >> >>> --- a/xen/arch/x86/domain.c >>> +++ b/xen/arch/x86/domain.c >>> @@ -2027,6 +20

Re: [Xen-devel] [PATCH RFC v1 32/74] x86: don't swallow the first command line item in pvh mode

2018-01-09 Thread Roger Pau Monné
On Thu, Jan 04, 2018 at 01:05:43PM +, Wei Liu wrote: > Instead, special case GRUB1 rather assuming that all bootloaders except GRUB2 > need a parameter stripping. The FreeBSD loader also prepends "xen.gz" (or the Xen kernel filename) to the command line. Hence this change will break it. Roger

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Anthony Liguori
On Tue, Jan 9, 2018 at 2:49 AM, Ian Jackson wrote: > Andrew Cooper writes ("Re: Radical proposal: ship not-fully-tidied shim as > 4.10.1"): >> Does this sound fair? > > Everything is on fire. Your proposal seems much less radical than > mine. I doubt it will produce a release to our users tomor

Re: [Xen-devel] Linux 4.15-rc6 + xen-unstable: BUG: unable to handle kernel NULL pointer dereference at (null), [ 0.000000] IP: zero_resv_unavail+0x8e/0xe1

2018-01-09 Thread Sander Eikelenboom
Since it's already rc7: "Give me a subtle ping, Vasili. One subtle ping only, please." On 04/01/18 21:02, Sander Eikelenboom wrote: > On 04/01/18 12:44, Juergen Gross wrote: >> On 04/01/18 11:17, Sander Eikelenboom wrote: >>> Hi Boris / Juergen, >>> >>> First of all best wishes for a quite turbule

Re: [Xen-devel] [PATCH RFC v1 57/74] x86/pv-shim: shadow PV console's page for L2 DomU

2018-01-09 Thread Sergey Dyasli
On Tue, 2018-01-09 at 02:13 -0700, Jan Beulich wrote: > > > > On 04.01.18 at 14:06, wrote: > > +size_t consoled_guest_rx(void) > > +{ > > +size_t recv = 0, idx = 0; > > +XENCONS_RING_IDX cons, prod; > > + > > +if ( !cons_ring ) > > +return 0; > > + > > +spin_lock(&rx_lock);

Re: [Xen-devel] [PATCH RFC v1 53/74] xen/pvshim: modify Dom0 builder in order to build a DomU

2018-01-09 Thread Roger Pau Monné
On Mon, Jan 08, 2018 at 07:06:14AM -0700, Jan Beulich wrote: > >>> On 04.01.18 at 14:06, wrote: > > From: Roger Pau Monne > > --- a/xen/arch/x86/pv/dom0_build.c > > +++ b/xen/arch/x86/pv/dom0_build.c > > @@ -31,9 +31,8 @@ > > #define L3_PROT (BASE_PROT|_PAGE_DIRTY) > > #define L4_PROT (BASE_PRO

Re: [Xen-devel] [RFC PATCH 1/8] x86/domctl: introduce a pair of hypercall to set and get cpu topology

2018-01-09 Thread Chao Gao
On Mon, Jan 08, 2018 at 01:14:44PM -0500, Daniel De Graaf wrote: >On 01/07/2018 11:01 PM, Chao Gao wrote: >> Define interface, structures and hypercalls for toolstack to build >> cpu topology and for guest that will retrieve it [1]. >> Two subop hypercalls introduced by this patch: >> XEN_DOMCTL_se

Re: [Xen-devel] Linux 4.15-rc6 + xen-unstable: BUG: unable to handle kernel NULL pointer dereference at (null), [ 0.000000] IP: zero_resv_unavail+0x8e/0xe1

2018-01-09 Thread Juergen Gross
On 09/01/18 16:29, Sander Eikelenboom wrote: > Since it's already rc7: > "Give me a subtle ping, Vasili. One subtle ping only, please." I like that film :-) Pavel, can you please comment? Do you have an idea how to repair the issue or should we revert your patch in 4.15? Juergen > > On 04/01/

Re: [Xen-devel] Linux 4.15-rc6 + xen-unstable: BUG: unable to handle kernel NULL pointer dereference at (null), [ 0.000000] IP: zero_resv_unavail+0x8e/0xe1

2018-01-09 Thread Pavel Tatashin
Hi Juergen, Do you have this patch applied: https://github.com/torvalds/linux/commit/e8c24773d6b2cd9bc8b36bd6e60beff599be14be Thank you, Pavel On 01/09/2018 11:10 AM, Juergen Gross wrote: On 09/01/18 16:29, Sander Eikelenboom wrote: Since it's already rc7: "Give me a subtle ping, Vasili. One

Re: [Xen-devel] [BUG] unable to shutdown (page fault in mwait_idle()/do_dbs_timer()/__find_next_bit()) (fwd)

2018-01-09 Thread Jan Beulich
>>> On 08.01.18 at 17:07, wrote: > On Mon, 8 Jan 2018, Jan Beulich wrote: > On 07.01.18 at 13:34, wrote: >>> (XEN) [ Xen-4.10.0-vgpu x86_64 debug=n Not tainted ] >> >> The -vgpu tag makes me wonder whether you have any patches in >> your tree on top of plain 4.10.0 (or 4.10-stagin

Re: [Xen-devel] [PATCH RFC v1 53/74] xen/pvshim: modify Dom0 builder in order to build a DomU

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 17:09, wrote: > On Mon, Jan 08, 2018 at 07:06:14AM -0700, Jan Beulich wrote: >> >>> On 04.01.18 at 14:06, wrote: >> > From: Roger Pau Monne >> > --- a/xen/arch/x86/pv/dom0_build.c >> > +++ b/xen/arch/x86/pv/dom0_build.c >> > @@ -31,9 +31,8 @@ >> > #define L3_PROT (BASE_PROT|_

Re: [Xen-devel] [PATCH RFC v1 57/74] x86/pv-shim: shadow PV console's page for L2 DomU

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 16:43, wrote: > On Tue, 2018-01-09 at 02:13 -0700, Jan Beulich wrote: >> > > > On 04.01.18 at 14:06, wrote: >> > +size_t consoled_guest_rx(void) >> > +{ >> > +size_t recv = 0, idx = 0; >> > +XENCONS_RING_IDX cons, prod; >> > + >> > +if ( !cons_ring ) >> > +r

Re: [Xen-devel] [PATCH RFC v1 54/74] xen/pvshim: set correct domid value

2018-01-09 Thread Roger Pau Monné
On Mon, Jan 08, 2018 at 07:17:16AM -0700, Jan Beulich wrote: > >>> On 04.01.18 at 14:06, wrote: > > @@ -576,11 +578,11 @@ static void noinline init_done(void) > > > > system_state = SYS_STATE_active; > > > > +domain_unpause_by_systemcontroller(dom0); > > + > > /* MUST be done pri

Re: [Xen-devel] [PATCH RFC v1 21/74] x86/entry: Early PVH boot code

2018-01-09 Thread Wei Liu
On Fri, Jan 05, 2018 at 06:32:56AM -0700, Jan Beulich wrote: > > +module_t *mod; > > +unsigned int i; > > + > > +ASSERT(pvh_info->magic == XEN_HVM_START_MAGIC_VALUE); > > + > > +/* > > + * Turn hvm_start_info into mbi. Luckily all modules are placed under > > 4GB > > + * bo

Re: [Xen-devel] Linux 4.15-rc6 + xen-unstable: BUG: unable to handle kernel NULL pointer dereference at (null), [ 0.000000] IP: zero_resv_unavail+0x8e/0xe1

2018-01-09 Thread Sander Eikelenboom
On 09/01/18 17:16, Pavel Tatashin wrote: > Hi Juergen, > > Do you have this patch applied: > > https://github.com/torvalds/linux/commit/e8c24773d6b2cd9bc8b36bd6e60beff599be14be Seems this hasn't made it to Linus yet ? I will give it a test and report back, thanks ! > > Thank you, > Pavel > >

Re: [Xen-devel] Linux 4.15-rc6 + xen-unstable: BUG: unable to handle kernel NULL pointer dereference at (null), [ 0.000000] IP: zero_resv_unavail+0x8e/0xe1

2018-01-09 Thread Boris Ostrovsky
On 01/09/2018 11:31 AM, Sander Eikelenboom wrote: > On 09/01/18 17:16, Pavel Tatashin wrote: >> Hi Juergen, >> >> Do you have this patch applied: >> >> https://github.com/torvalds/linux/commit/e8c24773d6b2cd9bc8b36bd6e60beff599be14be > Seems this hasn't made it to Linus yet ? > > I will give it a t

Re: [Xen-devel] [PATCH RFC v1 21/74] x86/entry: Early PVH boot code

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 16:45, wrote: > On Fri, Jan 05, 2018 at 06:32:56AM -0700, Jan Beulich wrote: >> > +pvh_mbi.mods_count = pvh_info->nr_modules; >> > +pvh_mbi.mods_addr = __pa(pvh_mbi_mods); >> > + >> > +mod = pvh_mbi_mods; >> > +entry = __va(pvh_info->modlist_paddr); >> >> How co

[Xen-devel] [PATCH] x86/ioemul: Account for ioemul_handle_quirk() in stub length check

2018-01-09 Thread Andrew Cooper
The opcode potentially written into ctxt->io_emul_stub[] in the case that ioemul_handle_quirk() is overriding the default logic isnt accounted for in the build-time check that the stubs are large enough. Introduce IOEMUL_QUIRK_STUB_BYTES and use for both the main and quirk stub cases. As a slim o

Re: [Xen-devel] [PATCH RFC v1 55/74] xen/pvshim: forward evtchn ops between L0 Xen and L2 DomU

2018-01-09 Thread Roger Pau Monné
On Tue, Jan 09, 2018 at 01:00:10AM -0700, Jan Beulich wrote: > >>> On 08.01.18 at 17:22, wrote: > > On Mon, Jan 08, 2018 at 09:05:40AM -0700, Jan Beulich wrote: > >> >>> On 04.01.18 at 14:06, wrote: > >> > +unsigned long evtchn = > >> > xchg(&XEN_shared_info->evtchn_pending[l1], 0); > >>

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Stefano Stabellini
On Tue, 9 Jan 2018, George Dunlap wrote: > On Mon, Jan 8, 2018 at 9:01 PM, Rich Persaud wrote: > > On a similarly pragmatic note: would a variation of Anthony's vixen patch > > series be suitable for pre-PVH Xen 4.6 - 4.9? These versions are currently > > documented as security-supported (Oct 2

Re: [Xen-devel] [PATCH RFC 4/4] xen: use per-vcpu TSS and stacks for pv domains

2018-01-09 Thread Andrew Cooper
On 09/01/18 14:27, Juergen Gross wrote: > Instead of using the TSS and stacks of the physical processor allocate > them per vcpu, map them in the per domain area, and use those. > > Signed-off-by: Juergen Gross I don't see anything here which updates the fields in the TSS across context switch. 

[Xen-devel] PVH backports to 4.9 and 4.8

2018-01-09 Thread George Dunlap
Part of our solution to XSA-254 SP3 (aka "Meltdown") is to backport the PVH mode from 4.10 to 4.9 and 4.8. This will first allow people able to run PVH kernels to switch their PV guests directly to PVH guests; and second, eventually enable the backport of patches which will enable transparent chan

Re: [Xen-devel] [PATCH RFC v1 21/74] x86/entry: Early PVH boot code

2018-01-09 Thread Wei Liu
On Tue, Jan 09, 2018 at 09:41:51AM -0700, Jan Beulich wrote: > >>> On 09.01.18 at 16:45, wrote: > > On Fri, Jan 05, 2018 at 06:32:56AM -0700, Jan Beulich wrote: > >> > +pvh_mbi.mods_count = pvh_info->nr_modules; > >> > +pvh_mbi.mods_addr = __pa(pvh_mbi_mods); > >> > + > >> > +mod = pvh

Re: [Xen-devel] [RFC PATCH 1/8] x86/domctl: introduce a pair of hypercall to set and get cpu topology

2018-01-09 Thread Daniel De Graaf
On 01/09/2018 04:06 AM, Chao Gao wrote: On Mon, Jan 08, 2018 at 01:14:44PM -0500, Daniel De Graaf wrote: On 01/07/2018 11:01 PM, Chao Gao wrote: Define interface, structures and hypercalls for toolstack to build cpu topology and for guest that will retrieve it [1]. Two subop hypercalls introduc

Re: [Xen-devel] Linux 4.15-rc6 + xen-unstable: BUG: unable to handle kernel NULL pointer dereference at (null), [ 0.000000] IP: zero_resv_unavail+0x8e/0xe1

2018-01-09 Thread Sander Eikelenboom
On 09/01/18 17:38, Boris Ostrovsky wrote: > On 01/09/2018 11:31 AM, Sander Eikelenboom wrote: >> On 09/01/18 17:16, Pavel Tatashin wrote: >>> Hi Juergen, >>> >>> Do you have this patch applied: >>> >>> https://github.com/torvalds/linux/commit/e8c24773d6b2cd9bc8b36bd6e60beff599be14be >> Seems this h

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Anthony Liguori
On Tue, Jan 9, 2018 at 8:52 AM, Stefano Stabellini wrote: > On Tue, 9 Jan 2018, George Dunlap wrote: >> On Mon, Jan 8, 2018 at 9:01 PM, Rich Persaud wrote: >> > On a similarly pragmatic note: would a variation of Anthony's vixen patch >> > series be suitable for pre-PVH Xen 4.6 - 4.9? These ver

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 18:23, wrote: > On Tue, Jan 9, 2018 at 8:52 AM, Stefano Stabellini > wrote: >> On Tue, 9 Jan 2018, George Dunlap wrote: >>> On Mon, Jan 8, 2018 at 9:01 PM, Rich Persaud wrote: >>> > On a similarly pragmatic note: would a variation of Anthony's vixen patch > series be suitable

Re: [Xen-devel] [PATCH RFC 4/4] xen: use per-vcpu TSS and stacks for pv domains

2018-01-09 Thread Juergen Gross
On 09/01/18 18:01, Andrew Cooper wrote: > On 09/01/18 14:27, Juergen Gross wrote: >> Instead of using the TSS and stacks of the physical processor allocate >> them per vcpu, map them in the per domain area, and use those. >> >> Signed-off-by: Juergen Gross > > I don't see anything here which upda

Re: [Xen-devel] [PATCH RFC v1 55/74] xen/pvshim: forward evtchn ops between L0 Xen and L2 DomU

2018-01-09 Thread Jan Beulich
>>> On 09.01.18 at 17:45, wrote: > On Tue, Jan 09, 2018 at 01:00:10AM -0700, Jan Beulich wrote: >> >>> On 08.01.18 at 17:22, wrote: >> > On Mon, Jan 08, 2018 at 09:05:40AM -0700, Jan Beulich wrote: >> >> >>> On 04.01.18 at 14:06, wrote: >> >> > +unsigned long evtchn = >> >> > xchg(&XEN_

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Anthony Liguori
On Tue, Jan 9, 2018 at 9:33 AM, Jan Beulich wrote: On 09.01.18 at 18:23, wrote: >> On Tue, Jan 9, 2018 at 8:52 AM, Stefano Stabellini >> wrote: >>> On Tue, 9 Jan 2018, George Dunlap wrote: On Mon, Jan 8, 2018 at 9:01 PM, Rich Persaud wrote: > On a similarly pragmatic note: would

Re: [Xen-devel] [PATCH RFC v1 55/74] xen/pvshim: forward evtchn ops between L0 Xen and L2 DomU

2018-01-09 Thread Anthony Liguori
On Mon, Jan 8, 2018 at 8:05 AM, Jan Beulich wrote: On 04.01.18 at 14:06, wrote: >> From: Roger Pau Monne >> >> Note that the unmask and the virq operations are handled by the shim >> itself, and that FIFO event channels are not exposed to the guest. >> >> Signed-off-by: Anthony Liguori >>

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Doug Goldstein
On 1/9/18 11:33 AM, Jan Beulich wrote: On 09.01.18 at 18:23, wrote: >> On Tue, Jan 9, 2018 at 8:52 AM, Stefano Stabellini >> wrote: >>> On Tue, 9 Jan 2018, George Dunlap wrote: On Mon, Jan 8, 2018 at 9:01 PM, Rich Persaud wrote: > On a similarly pragmatic note: would a variation of

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Doug Goldstein
On 1/8/18 3:44 PM, Anthony Liguori wrote: > > It's not particularly hard to plumb through I think but if you are > using PCI passthrough for PV, then you really shouldn't worry about > Spectre/Meltdown. That PV guest can already read all of physical > memory (since no IOMMU is used) and they can

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Stefano Stabellini
On Tue, 9 Jan 2018, Doug Goldstein wrote: > On 1/9/18 11:33 AM, Jan Beulich wrote: > On 09.01.18 at 18:23, wrote: > >> On Tue, Jan 9, 2018 at 8:52 AM, Stefano Stabellini > >> wrote: > >>> On Tue, 9 Jan 2018, George Dunlap wrote: > On Mon, Jan 8, 2018 at 9:01 PM, Rich Persaud wrote: > >

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Doug Goldstein
On 1/9/18 5:50 AM, Wei Liu wrote: > > We haven't tested booting the series I posted in HVM mode, but off the > top of my head it should work in HVM mode as well -- the multiboot path > is left intact. > Can we actually do this before committing to this series? I've seen a number of "this should

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Wei Liu
On Tue, Jan 09, 2018 at 09:23:03AM -0800, Anthony Liguori wrote: > On Tue, Jan 9, 2018 at 8:52 AM, Stefano Stabellini > wrote: > > On Tue, 9 Jan 2018, George Dunlap wrote: > >> On Mon, Jan 8, 2018 at 9:01 PM, Rich Persaud wrote: > >> > On a similarly pragmatic note: would a variation of Anthony's

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Wei Liu
On Tue, Jan 09, 2018 at 11:59:01AM -0600, Doug Goldstein wrote: > On 1/9/18 5:50 AM, Wei Liu wrote: > > > > We haven't tested booting the series I posted in HVM mode, but off the > > top of my head it should work in HVM mode as well -- the multiboot path > > is left intact. > > > > Can we actual

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Doug Goldstein
On 1/8/18 11:45 AM, Ian Jackson wrote: > But this is not a usual situation. This time, we don't have the time > to wait. > > Opinions ? I'm going to follow up with a top post with my feelings and from info on various parts of the thread. We have 2 versions of PV shim, the Citrix version and the

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread George Dunlap
On 01/09/2018 06:13 PM, Doug Goldstein wrote: > On 1/8/18 11:45 AM, Ian Jackson wrote: >> But this is not a usual situation. This time, we don't have the time >> to wait. >> >> Opinions ? > > I'm going to follow up with a top post with my feelings and from info on > various parts of the thread. >

Re: [Xen-devel] Radical proposal: ship not-fully-tidied shim as 4.10.1

2018-01-09 Thread Rich Persaud
>> On Jan 9, 2018, at 12:56, Stefano Stabellini wrote: >> >> On Tue, 9 Jan 2018, Doug Goldstein wrote: >> On 1/9/18 11:33 AM, Jan Beulich wrote: >> On 09.01.18 at 18:23, wrote: On Tue, Jan 9, 2018 at 8:52 AM, Stefano Stabellini wrote: >>> On Tue, 9 Jan 2018, George Dunlap wrot

Re: [Xen-devel] [PATCH RFC v1 56/74] xen/pvshim: add grant table operations

2018-01-09 Thread Roger Pau Monné
On Mon, Jan 08, 2018 at 10:19:39AM -0700, Jan Beulich wrote: > >>> On 04.01.18 at 14:06, wrote: > > @@ -30,11 +31,17 @@ > > #include > > #include > > > > +#include > > Interesting: The event channel patch gave me the impression that > it is not intended to deal with 32-bit guests. AFAICT

  1   2   >