On Wed, Jan 10, 2018 at 12:28:27AM -0700, Jan Beulich wrote:
> >>> On 09.01.18 at 19:34, wrote:
> > On Mon, Jan 08, 2018 at 10:19:39AM -0700, Jan Beulich wrote:
> >> >>> On 04.01.18 at 14:06, wrote:
> >> > +{
> >> > +struct gnttab_query_size op;
> >> > +int rc;
> >> > +
> >> >
On Tue, Jan 09, 2018 at 04:02:50PM -0800, Anthony Liguori wrote:
> From: Anthony Liguori
>
> The grant table is a region of guest memory that contains GMFNs
> which in PV are MFNs but are PFNs in HVM. Since a Vixen guest MFN
> is an HVM PFN, we can pass this table directly through to the outer
>
flight 117735 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117735/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop fail like 117637
test-amd64-amd64-xl-qemut-win7-amd64 17
On Tue, Jan 09, 2018 at 07:43:51PM +, Wei Liu wrote:
> On Mon, Jan 08, 2018 at 05:45:32PM +, Ian Jackson wrote:
> > AIUI we have a series for pv-in-pvh shim which is nearing completion
> > in the sense that it will have been well-tested (especially the
> > hypervisor parts) and has good fun
On 09/01/2018 20:47, Chao Gao wrote:
> On Tue, Jan 09, 2018 at 11:47:54PM +, Andrew Cooper wrote:
>> On 08/01/18 04:01, Chao Gao wrote:
>>> Define interface, structures and hypercalls for toolstack to build
>>> cpu topology and for guest that will retrieve it [1].
>>> Two subop hypercalls intro
On 01/10/2018 01:22 AM, Boris Ostrovsky wrote:
On 01/09/2018 07:10 AM, Ross Lagerwall wrote:
When cleaning up after a partially successful gntdev_mmap(), unmap the
successfully mapped grant pages otherwise Xen will kill the domain if
in debug mode (Attempt to implicitly unmap a granted PTE) or
This run is configured for baseline tests only.
flight 74185 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74185/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64
>>> On 09.01.18 at 17:47, wrote:
> The opcode potentially written into ctxt->io_emul_stub[] in the case
> that ioemul_handle_quirk() is overriding the default logic isnt
> accounted for in the build-time check that the stubs are large enough.
>
> Introduce IOEMUL_QUIRK_STUB_BYTES and use for both
On 10/01/2018 09:52, Jan Beulich wrote:
On 09.01.18 at 17:47, wrote:
>> The opcode potentially written into ctxt->io_emul_stub[] in the case
>> that ioemul_handle_quirk() is overriding the default logic isnt
>> accounted for in the build-time check that the stubs are large enough.
>>
>> Intro
flight 117768 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117768/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen d51baf310e530659f73e714acf57bdc46303
baseline version:
xen 2d1c
On 09/01/18 19:39, Juergen Gross wrote:
> On 09/01/18 20:13, Andrew Cooper wrote:
>> (sorry for the top-post. I'm on my phone)
>>
>> I can see you are using ltr, but I don't see anywhere where where you are
>> changing the content on the TSS, or the top-of-stack content.
> The per-vcpu TSS is alr
On 10/01/18 11:40, Andrew Cooper wrote:
> On 09/01/18 19:39, Juergen Gross wrote:
>> On 09/01/18 20:13, Andrew Cooper wrote:
>>> (sorry for the top-post. I'm on my phone)
>>>
>>> I can see you are using ltr, but I don't see anywhere where where you are
>>> changing the content on the TSS, or the
flight 117737 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117737/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 117662
test-armhf-armhf-libvirt-xsm 14 saveresto
On Tue, Jan 09, 2018 at 09:50:14AM -0800, Anthony Liguori wrote:
> On Mon, Jan 8, 2018 at 8:05 AM, Jan Beulich wrote:
> On 04.01.18 at 14:06, wrote:
> >> From: Roger Pau Monne
> >>
> >> Note that the unmask and the virq operations are handled by the shim
> >> itself, and that FIFO event cha
On Wed, Jan 10, 2018 at 08:32:24AM +, Roger Pau Monné wrote:
> On Tue, Jan 09, 2018 at 07:43:51PM +, Wei Liu wrote:
> > On Mon, Jan 08, 2018 at 05:45:32PM +, Ian Jackson wrote:
> > > AIUI we have a series for pv-in-pvh shim which is nearing completion
> > > in the sense that it will hav
flight 74195 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74195/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-i3
On Tue, Jan 09, 2018 at 04:02:38PM -0800, Anthony Liguori wrote:
> From: Jan H. Schönherr
>
> Intel says for CPUID leaf 0Bh:
>
> "Software must not use EBX[15:0] to enumerate processor
>topology of the system. This value in this field
>(EBX[15:0]) is only intended for display/diagnosti
Hi Julien,
please excuse me for the long delay.
On 10/09/2017 06:25 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 30/08/17 19:32, Sergej Proskurin wrote:
>> This commit introduces macros for switching and restoring the vttbr
>> considering the currently set irq flags. We define these macros, as the
I have tracked down the problem to multiple calls to the zerocopy callback for
the same ubuf_info. I am not sure exactly which patch introduced the issue but
my suspicion is that it was one of the the MSG_ZEROCOPY series (see
https://marc.info/?l=linux-netdev&m=149807997726733&w=2).
I have a can
On Tue, Jan 09, 2018 at 04:02:34PM -0800, Anthony Liguori wrote:
> From: Anthony Liguori
>
> CVE-2017-5754 is problematic for paravirtualized x86 domUs because it
> appears to be very difficult to isolate the hypervisor's page tables
> from PV domUs while maintaining ABI compatibility. Instead o
On Tue, Jan 09, 2018 at 02:38:21AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:06, wrote:
> > +struct domain *d = current->domain;
> > +struct vcpu *v;
> > +unsigned int i;
> > +uint64_t old_store_pfn, old_console_pfn = 0, store_pfn,
> > console_pfn;
> > +
Current limit, PFN_DOWN(xen_phys_start), introduced by commit b280442
(x86: make Xen early boot code relocatable) is not reliable. Potentially
its value may fall below PFN_DOWN(__pa(_end)) and then part of Xen image
may not be mapped after relocation. This will not happen in current code
thanks to
Otherwise, due to Xen code/data changes under CPU feet, Xen may crash
silently at boot.
We were hit by the issue in OVS Xen 4.4 with my earlier version of
EFI/Multiboot2 patches. Initially its implementation allowed relocation
of Xen even if it was relocated by the bootloader. This led to the
cras
The attached script works for me. I have been testing it with a
Citrix pvshim shim series and a shim binary that Wei passed me under
the table. It makes a bootable HVM guest config for a PV guest.
Things that I see are wrong:
* My guest is trying to balloon up but due to the extra memory used
On Wed, Jan 10, 2018 at 01:07:33PM +, Ian Jackson wrote:
> The attached script works for me. I have been testing it with a
> Citrix pvshim shim series and a shim binary that Wei passed me under
> the table. It makes a bootable HVM guest config for a PV guest.
>
> Things that I see are wrong:
On Tue, Jan 09, 2018 at 03:16:38AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:06, wrote:
> > @@ -1303,22 +1320,20 @@ long do_vcpu_op(int cmd, unsigned int vcpuid,
> > XEN_GUEST_HANDLE_PARAM(void) arg)
> >
> > break;
> >
> > -case VCPUOP_up: {
> > -bool_t wake = 0;
>>> On 10.01.18 at 10:56, wrote:
> On 10/01/2018 09:52, Jan Beulich wrote:
> On 09.01.18 at 17:47, wrote:
>>> --- a/xen/arch/x86/pv/emul-priv-op.c
>>> +++ b/xen/arch/x86/pv/emul-priv-op.c
>>> @@ -89,19 +89,24 @@ static io_emul_stub_t *io_emul_stub_setup(struct
>>> priv_op_ctxt *ctxt, u8 opco
Hi,
As in subject...
Daniel
xen/arch/x86/setup.c | 18 ++
1 file changed, 14 insertions(+), 4 deletions(-)
Daniel Kiper (2):
x86/setup: do not relocate Xen over current Xen image placement
x86/setup: remap Xen image up to PFN_DOWN(__pa(_end))
___
>>> On 10.01.18 at 14:07, wrote:
> On Tue, Jan 09, 2018 at 03:16:38AM -0700, Jan Beulich wrote:
>> >>> On 04.01.18 at 14:06, wrote:
>> > @@ -1303,22 +1320,20 @@ long do_vcpu_op(int cmd, unsigned int vcpuid,
> XEN_GUEST_HANDLE_PARAM(void) arg)
>> >
>> > break;
>> >
>> > -case VCP
* Executive summary
- We've agreed on a "convergence" point for PV shim functionality that
covers as many users as possible:
- 'HVM' functionality: boots in HVM mode, has support for Xen 3.4
event channels, &c, booted via 'sidecar'
- 'PVH' functionality: boots in PVH mode, booted via toolst
On Tue, Jan 09, 2018 at 03:42:01AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:06, wrote:
> > +void pv_shim_online_memory(unsigned int nr, unsigned int order)
> > +{
> > +struct page_info *page, *tmp;
> > +PAGE_LIST_HEAD(list);
> > +
> > +spin_lock(&balloon_lock);
> > +page_l
>>> On 10.01.18 at 14:36, wrote:
> On Tue, Jan 09, 2018 at 03:42:01AM -0700, Jan Beulich wrote:
>> >>> On 04.01.18 at 14:06, wrote:
>> > @@ -1015,6 +1024,11 @@ long do_memory_op(unsigned long cmd,
>> > XEN_GUEST_HANDLE_PARAM(void) arg)
>> > __HYPERVISOR_memory_op, "lh",
>> >
>>> On 10.01.18 at 14:34, wrote:
> I'd like to propose a new appraoch:
>
> 1. Immediately release Amazon's v1 series for people who can / prefer
> to use the HVM + sidecar option.
> - Advisory and HOWTO should include who should use this option, and
> how to do it.
> - Check the series into a b
On 10/01/18 14:34, George Dunlap wrote:
> * Executive summary
>
> - We've agreed on a "convergence" point for PV shim functionality that
> covers as many users as possible:
> - 'HVM' functionality: boots in HVM mode, has support for Xen 3.4
>event channels, &c, booted via 'sidecar'
> - 'PV
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf
> Of Paul Durrant
> Sent: 10 January 2018 12:52
> To: 'Christoph Moench-Tegeder'
> Cc: 'Michael Collins' ; 'Juergen Gross'
> ; Wei Liu ; 'Alex Braunegg'
> ; xen-devel@lists.xenproject.org
> Sub
flight 117771 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117771/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
> On 10 Jan 2018, at 13:51, Juergen Gross wrote:
>
> On 10/01/18 14:34, George Dunlap wrote:
>> * Executive summary
>>
[snip]
>>
>> Regardless of what we think of step 2, I think we should take step 1
>> immediately.
>>
>> Let me know what you think.
Thank you for putting this proposal tog
On Wed, Jan 10, 2018 at 5:50 AM, Jan Beulich wrote:
On 10.01.18 at 14:34, wrote:
>> I'd like to propose a new appraoch:
>>
>> 1. Immediately release Amazon's v1 series for people who can / prefer
>> to use the HVM + sidecar option.
>> - Advisory and HOWTO should include who should use this o
On Tue, Jan 09, 2018 at 03:16:38AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:06, wrote:
> > @@ -1303,22 +1320,20 @@ long do_vcpu_op(int cmd, unsigned int vcpuid,
> > XEN_GUEST_HANDLE_PARAM(void) arg)
> >
> > break;
> >
> > -case VCPUOP_up: {
> > -bool_t wake = 0;
On Wed, Jan 10, 2018 at 5:07 AM, Ian Jackson wrote:
> The attached script works for me. I have been testing it with a
> Citrix pvshim shim series and a shim binary that Wei passed me under
> the table. It makes a bootable HVM guest config for a PV guest.
>
> Things that I see are wrong:
>
> * M
On Wed, Jan 10, 2018 at 4:27 AM, Wei Liu wrote:
> On Wed, Jan 10, 2018 at 08:32:24AM +, Roger Pau Monné wrote:
>> On Tue, Jan 09, 2018 at 07:43:51PM +, Wei Liu wrote:
>> > On Mon, Jan 08, 2018 at 05:45:32PM +, Ian Jackson wrote:
>> > > AIUI we have a series for pv-in-pvh shim which is
Here is the converter script where I just got my guest to boot with
the Vixen shim, as built and provided by Wei.
Ian.
#!/usr/bin/perl -w
#
# usage:
# pvshim-converter [OPTIONS] OLD-CONFIG NEW-CONFIG
#
# options:
# --sidecars-directory DIR default is /var/lib/xen/pvshim-sidecars
# --shim
In the early steps of compilation, the asm header files are created, such
as include/asm-$(TARGET_ARCH)/asm-offsets.h. These files depend on the
assembly file arch/$(TARGET_ARCH)/asm-offsets.s, which is generated
before. Depending on the used assembler, there might be comments in the
assembly files
Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
> Here is the converter script where I just got my guest to boot with
> the Vixen shim, as built and provided by Wei.
And here is one which handles the guest console correctly. Vixen
sends the L2 guest console to the emulated serial,
Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
> And here is one which handles the guest console correctly. Vixen
> sends the L2 guest console to the emulated serial, along with the
> shim's own output.
Some debugging stuff removed again.
#!/usr/bin/perl -w
#
# usage:
# pvshim-
On Fri, Jan 05, 2018 at 08:22:46AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:05, wrote:
> > +void __init pv_console_set_rx_handler(serial_rx_fn fn)
> > +{
> > +cons_rx_handler = fn;
> > +}
>
> Especially this and ...
>
> > +size_t pv_console_rx(struct cpu_user_regs *regs)
> > +{
> >
>>> On 10.01.18 at 16:33, wrote:
> I've spoken to Sergey and he agrees that this should be solved and
> that using uart_driver seems like the right approach.
>
> However given that we would like to merge this ASAP, do you consider
> this a blocker?
No.
Jan
>>> On 10.01.18 at 16:14, wrote:
> In the early steps of compilation, the asm header files are created, such
> as include/asm-$(TARGET_ARCH)/asm-offsets.h. These files depend on the
> assembly file arch/$(TARGET_ARCH)/asm-offsets.s, which is generated
> before. Depending on the used assembler, the
On Tue, Jan 09, 2018 at 03:59:33AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:06, wrote:
> > From: Roger Pau Monne
> >
> > Since the shim VCPUOP_{up/down} hypercall is wired to the plug/unplug
> > of CPUs to the shim itself, start the shim DomU with only the BSP
> > online, and let the gu
Draft README.
My git branch is bere
xenbits.xen.org:/home/iwj/ext/xen.git#wip.sidecar
(This contains the converter script too. The git history is not very
useful and the files are in the wrong place, but I needed somewhere to
do my work.)
Ian.
PV-in-HVM shim with "sidecar"
On Thu, Jan 4, 2018 at 1:05 PM, Wei Liu wrote:
> Hi all
>
> This is a patch series to run PV guest inside a PVH container. The series is
> still in a very RFC state. We're aware that some code is not very clean yet
> and
> in the process of cleaning things up.
>
> The series can be found at:
>
>
On Wed, Jan 10, 2018 at 04:26:07PM +, George Dunlap wrote:
> On Thu, Jan 4, 2018 at 1:05 PM, Wei Liu wrote:
> > Hi all
> >
> > This is a patch series to run PV guest inside a PVH container. The series is
> > still in a very RFC state. We're aware that some code is not very clean yet
> > and
>
On 01/10/2018 04:25 PM, Ian Jackson wrote:
> Draft README.
>
> My git branch is bere
>xenbits.xen.org:/home/iwj/ext/xen.git#wip.sidecar
>
> (This contains the converter script too. The git history is not very
> useful and the files are in the wrong place, but I needed somewhere to
> do my wo
Jan Beulich writes ("Re: Radical proposal v2: Publish Amazon's verison now,
Citrix's version soon"):
> There are a couple of instances of "a branch", and I'm not really
> clear on which one that would be, yet in part my opinion depends
> on that, as this will affect what state certain branches wil
On 01/10/2018 04:39 PM, Ian Jackson wrote:
> Jan Beulich writes ("Re: Radical proposal v2: Publish Amazon's verison now,
> Citrix's version soon"):
>> There are a couple of instances of "a branch", and I'm not really
>> clear on which one that would be, yet in part my opinion depends
>> on that, a
flight 117739 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117739/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-ws16-amd64 14 guest-localmigrate fail in 117710 pass
in 117739
test-amd64-amd64-x
On Wed, Jan 10, 2018 at 04:39:11PM +, Ian Jackson wrote:
> Jan Beulich writes ("Re: Radical proposal v2: Publish Amazon's verison now,
> Citrix's version soon"):
> > There are a couple of instances of "a branch", and I'm not really
> > clear on which one that would be, yet in part my opinion d
>>> On 10.01.18 at 17:39, wrote:
> Jan Beulich writes ("Re: Radical proposal v2: Publish Amazon's verison now,
> Citrix's version soon"):
>> There are a couple of instances of "a branch", and I'm not really
>> clear on which one that would be, yet in part my opinion depends
>> on that, as this wi
On 1/10/18 10:36 AM, George Dunlap wrote:
> On 01/10/2018 04:25 PM, Ian Jackson wrote:
>> Draft README.
>>
>> My git branch is bere
>>xenbits.xen.org:/home/iwj/ext/xen.git#wip.sidecar
>>
>> (This contains the converter script too. The git history is not very
>> useful and the files are in the
On Tue, 2018-01-09 at 09:28 -0700, Jan Beulich wrote:
> > > > On 09.01.18 at 16:43, wrote:
> >
> > On Tue, 2018-01-09 at 02:13 -0700, Jan Beulich wrote:
> > > > > > On 04.01.18 at 14:06, wrote:
> > > >
> > > > +size_t consoled_guest_rx(void)
> > > > +{
> > > > +size_t recv = 0, idx = 0;
> >
Hi Julien,
On 10/09/2017 07:15 PM, Julien Grall wrote:
> Hi Sergej,
>
[...]
>> diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
>> index 5e86368010..3a1a38e7af 100644
>> --- a/xen/arch/arm/p2m.c
>> +++ b/xen/arch/arm/p2m.c
>> @@ -1203,27 +1203,65 @@ static void p2m_free_vmid(struct domain *
Hi Julien,
On 10/09/2017 06:43 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 30/08/17 19:32, Sergej Proskurin wrote:
>> This commit copies and extends the altp2m-related code from x86 to ARM.
>> Functions that are no yet supported notify the caller or print a BUG
>> message stating their absence.
>
The current version of vixen handles console output from the guest
but not console input to the guest. This adds guest input as in
0d50a85f x86/pv-shim: shadow PV console's page for L2 DomU,
but with read_smb moved up in guest_tx.
Signed-off-by: Sarah Newman
---
xen/arch/x86/guest/vixen.c
On 10/01/18 17:16, Sergej Proskurin wrote:
Hi Julien,
Hi,
On 10/09/2017 06:43 PM, Julien Grall wrote:
Hi Sergej,
On 30/08/17 19:32, Sergej Proskurin wrote:
This commit copies and extends the altp2m-related code from x86 to ARM.
Functions that are no yet supported notify the caller or pr
On Wed, 10 Jan 2018, George Dunlap wrote:
> * Executive summary
>
> - We've agreed on a "convergence" point for PV shim functionality that
> covers as many users as possible:
> - 'HVM' functionality: boots in HVM mode, has support for Xen 3.4
>event channels, &c, booted via 'sidecar'
> - '
On Wed, 2018-01-10 at 15:41 +, Ian Jackson wrote:
> Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
> > And here is one which handles the guest console correctly. Vixen
> > sends the L2 guest console to the emulated serial, along with the
> > shim's own output.
So, I've got a P
On Fri, Jan 05, 2018 at 06:40:29AM -0700, Jan Beulich wrote:
> >>> On 04.01.18 at 14:05, wrote:
> > --- /dev/null
> > +++ b/xen/arch/x86/guest/xen.c
> > @@ -0,0 +1,75 @@
> > +/**
> > + * arch/x86/guest/xen.c
> > + *
> > +
## Paul Durrant (paul.durr...@citrix.com):
> Actually no need... The underlying issue was really a bug and has
> been fixed in 4.14.11.
Oh. That explains why reverting the other patch "fixed" the problem -
I had skipped 4.14.10 and 4.14.11 - and the problem has gone away
independently of that.
Co
Signed-off-by: Dario Faggioli
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
Cc: Juergen Gross
Cc: Meng Xu
---
Yes, I know. Again! Well, what can I say... Sorry for the nuisance. :-P
---
On Wed, Jan 10, 2018 at 07:20:34PM +0100, Dario Faggioli wrote:
> Signed-off-by: Dario Faggioli
Acked-by: Wei Liu
Welcome back!
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Wed, 10 Jan 2018, Dario Faggioli wrote:
> Signed-off-by: Dario Faggioli
Acked-by: Stefano Stabellini
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabellini
> Cc: Tim Deegan
> Cc: Wei Liu
> Cc: Juergen Gr
On Wed, Jan 10, 2018 at 5:51 AM, Juergen Gross wrote:
> On 10/01/18 14:34, George Dunlap wrote:
>> * Executive summary
>>
>> - We've agreed on a "convergence" point for PV shim functionality that
>> covers as many users as possible:
>> - 'HVM' functionality: boots in HVM mode, has support for X
On Wed, Jan 10, 2018 at 1:20 PM, Dario Faggioli wrote:
>
> Signed-off-by: Dario Faggioli
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabellini
> Cc: Tim Deegan
> Cc: Wei Liu
> Cc: Juergen Gross
> Cc: Meng Xu
On Wed, Jan 10, 2018 at 07:20:34PM +0100, Dario Faggioli wrote:
> Signed-off-by: Dario Faggioli
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabellini
> Cc: Tim Deegan
> Cc: Wei Liu
> Cc: Juergen Gross
> Cc: M
On 10/01/18 19:20, Dario Faggioli wrote:
> Signed-off-by: Dario Faggioli
Acked-by: Juergen Gross
Juergen
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabellini
> Cc: Tim Deegan
> Cc: Wei Liu
> Cc: Juergen
On Fri, Jan 05, 2018 at 04:39:33AM -0700, Jan Beulich wrote:
> > +#if defined(CONFIG_PVH_GUEST) && !defined(EFI)
>
> The EFI part here then also wouldn't be necessary, afaict.
It is necessary otherwise efi.lds will contain .Xen.note directives,
which breaks the build.
Wei.
_
flight 117741 xen-4.10-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117741/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-pvhv2-intel 12 guest-start fail never pass
test-amd64-amd64-xl-pvhv2-amd 12
On Wed, 2018-01-10 at 15:41 +, Ian Jackson wrote:
> Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
> > And here is one which handles the guest console correctly. Vixen
> > sends the L2 guest console to the emulated serial, along with the
> > shim's own output.
>
So, I've got a
> Actually no need... The underlying issue was really a bug and has
> been fixed in 4.14.11.
Thanks for tracking this down & spending time looking at this Paul.
Best regards,
Alex
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://l
flight 117762 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/117762/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539
Tests which did not suc
On Wed, Jan 10, 2018 at 9:44 AM, Dario Faggioli wrote:
> On Wed, 2018-01-10 at 15:41 +, Ian Jackson wrote:
>> Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
>> > And here is one which handles the guest console correctly. Vixen
>> > sends the L2 guest console to the emulated se
In addition to this software series, you will need the following:
1) A compiler which understands -mindirect-branch=thunk-external and
-mindirect-branch-register. A GCC patch series implementing this should
be available imminently. In the meantime, a development branch can be
ob
Use -mindirect-branch=thunk-extern/-mindirect-branch-register when available.
To begin with, use the retpoline thunk. Later work will add alternative
thunks which can be selected at boot time.
Signed-off-by: Andrew Cooper
---
v7:
* Alter thunk symbols to match the latested GCC changes proposed
Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
Reviewed-by: Jan Beulich
---
xen/arch/x86/domctl.c | 2 ++
xen/arch/x86/hvm/hvm.c | 2 ++
2 files changed, 4 insertions(+)
diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c
index 5973d9f..72b4489 100644
--- a/xen/arch/x86/domctl.c
+++
Depending on hardware and microcode availability, we will want to replace
IND_THUNK_REPOLINE with other implementations.
For AMD hardware, choose IND_THUNK_LFENCE in preference to retpoline if lfence
is known to be (or was successfully made) dispatch serialising.
Signed-off-by: Andrew Cooper
---
Introduce INDIRECT_CALL and INDIRECT_JMP which either degrade to a normal
indirect branch, or dispatch to the __x86_indirect_thunk_* symbols.
Update all the manual indirect branches in to use the new thunks. The
indirect branches in the early boot and kexec path are left intact as we can't
use th
Instead of gaining yet another top level boolean, introduce a more generic
cpuid= option. Also introduce a helper function to parse a generic boolean
value.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
docs/misc/xen-command-line.markdown | 12
xen/arch/x86/cpuid.c
Contemporary processors are gaining Indirect Branch Controls via microcode
updates. Intel are introducing one bit to indicate IBRS and IBPB support, and
a second bit for STIBP. AMD are introducing IBPB only, so enumerate it with a
separate bit.
Furthermore, depending on compiler and microcode av
This property is required for the AMD's recommended mitigation for Branch
Target Injection, but Xen needs to cope with being unable to detect or modify
the MSR.
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/cpu/amd.c| 35 ++-
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
xen/arch/x86/msr.c| 35 +++
xen/include/asm-x86/msr.h | 12
2 files changed, 47 insertions(+)
diff --git a/xen/arch/x86/msr.c b/xen/arch/x86/msr.c
index 31983ed..02a7b49 100644
--- a/x
Nothing very interesting at the moment, but the logic will grow as new
mitigations are added.
Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
---
xen/arch/x86/Makefile | 1 +
xen/arch/x86/setup.c| 3 ++
xen/arch/x86/spec_ctrl.c| 75
Signed-off-by: Andrew Cooper
---
v7:
* static, and tweak comment
---
docs/misc/xen-command-line.markdown | 6 ++-
xen/arch/x86/spec_ctrl.c| 104 ++--
2 files changed, 105 insertions(+), 5 deletions(-)
diff --git a/docs/misc/xen-command-line.markdown
With all infrastructure in place, it is now safe to let guests see and use
these features. Allow AMD's IBPB to be set even on Intel hardware, so the
toolstack can express "IBPB only" to guests.
This also requires updating the libxc logic to understand the e8b feature
leaf, which has the side effe
We need to be able to either set or clear IBRS in Xen context, as well as
restore appropriate guest values in guest context. See the documentation in
asm-x86/spec_ctrl_asm.h for details.
There is a semi-unrelated bugfix, where various asm_defn.h macros have a
hidden dependency on PAGE_SIZE, which
For performance reasons, HVM guests should have direct access to these MSRs
when possible.
Signed-off-by: Andrew Cooper
---
v7:
* Drop excess brackets
---
xen/arch/x86/domctl.c | 19 +++
xen/arch/x86/hvm/svm/svm.c | 5 +
xen/arch/x86/hvm/vmx/vmx.c | 18
Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
---
v7:
* Use the opt_ibpb boolean rather than using a cpufeature flag.
---
docs/misc/xen-command-line.markdown | 5 -
xen/arch/x86/domain.c | 3 +++
xen/arch/x86/spec_ctrl.c| 10 +-
xen/include/asm-x8
ret instructions are speculated directly to values recorded in the RSB/RAS, as
there is no uncertainty in well-formed code. Guests can take advantage of
this in two ways:
1) If they can find a path in Xen which executes more ret instructions than
call instructions. (At least one in the wa
Set STIBP behind the guests back if it knows about IBRS but not STIBP, and no
MSR_SPEC_CTRL protection active.
Signed-off-by: Andrew Cooper
---
v7:
* Move logic into a static inline helper.
---
xen/arch/x86/domain.c| 8
xen/arch/x86/msr.c | 3 ++-
xen/includ
On contemporary hardware, setting IBRS/STIBP has a performance impact on
adjacent hyperthreads. It is therefore recommended to clear the setting
before becoming idle, to avoid an idle core preventing adjacent userspace
execution from running at full performance.
Care must be taken to ensure there
On 1/10/18 9:39 AM, Ian Jackson wrote:
> Ian Jackson writes ("Re: sidecar (hvm shim) creation script"):
>> Here is the converter script where I just got my guest to boot with
>> the Vixen shim, as built and provided by Wei.
>
> And here is one which handles the guest console correctly. Vixen
> se
1 - 100 of 111 matches
Mail list logo