Re: [Xen-devel] [PATCH v2] xl: free bitmaps on exit

2018-11-28 Thread Olaf Hering
Am Tue, 27 Nov 2018 17:19:06 + schrieb Wei Liu : > The other option -- to call atexit right after -- looks plausible to me. After looking through main(), moving the atexit() seems safe to me. Olaf pgpYhWjmpbrZl.pgp Description: Digitale Signatur von OpenPGP

Re: [Xen-devel] [PATCH] xen/x86: fix paging_max_paddr_bits()

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 08:52:24AM +0100, Juergen Gross wrote: > paging_max_paddr_bits() has an invalid use of IS_ENABLED(): instead of > IS_ENABLED(CONFIG_BIGMEM) it is using IS_ENABLED(BIGMEM). Fix that. > > Signed-off-by: Juergen Gross Reviewed-by: Roger Pau Monné __

Re: [Xen-devel] out of memory issue on dom0_hvm start

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 12:25:23AM +0100, andrei.seme...@bertin.fr wrote: > Hi all, > > I have some troubles to start xen when using dom0 in HVM mode on X86 Intel > nuc7i5bnh  > board. After some investigation it seems that  "domheap" memory allocator is > out of memory while  > constructing the

[Xen-devel] What is different amount cpu configurations :application default, hypervisor default, copy host copy configuration

2018-11-28 Thread John Wang
Hi Devs: I have a  big confusion about cpu configurations in virt-manager -> CPUs -> configuration (Refer to attachment) There are 3 type of model : copy host cpu configuration (like passthrough of kvm ); Application default; Hypervisor default.  I can not find any difference amount of them.

[Xen-devel] What is different amount cpu configurations :application default, hypervisor default, copy host copy configuration

2018-11-28 Thread John Wang
Hi Devs: I have a  big confuse about cpu configurations in virt-manager -> CPUs -> configuration There are 3 type of model : copy host cpu configuration (like passthrough of kvm ); Application default; Hypervisor default.  I can not find any . Anyone -- Thanks APACII QA John(XiaoGen Wang)

Re: [Xen-devel] Make grub error "too few arguments" with xen

2018-11-28 Thread Chen, Farrah
Hi all, I used git bisect and found the following error occurred from commit: 4d4a8c96e3593d76fe7b025665ccdecc70a53c1f. Such error in loader/arm64/xen_boot.c has been fixed, bur the error in loader/i386/xen.c hasn't been fixed, do you have any idea? Thanks a lot! ... loader/i386/xen.c: In f

Re: [Xen-devel] Interrupt injection with ISR set on Intel hardware

2018-11-28 Thread Roger Pau Monné
On Thu, Nov 01, 2018 at 09:18:14AM +, Andrew Cooper wrote: > On 01/11/2018 00:40, Tian, Kevin wrote: > >> From: Tian, Kevin > >> Sent: Tuesday, October 30, 2018 3:00 PM > >> > >>> From: Jan Beulich [mailto:jbeul...@suse.com] > >>> Sent: Thursday, October 25, 2018 9:58 PM > >>> > >> On 25.10

[Xen-devel] [distros-debian-squeeze test] 75624: tolerable FAIL

2018-11-28 Thread Platform Team regression test user
flight 75624 distros-debian-squeeze real [real] http://osstest.xensource.com/osstest/logs/75624/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-amd64-squeeze-netboot-pygrub 10 debian-di-install fail like 75616 test-amd64-i386-i386-squeeze-n

[Xen-devel] [PATCH v3] amd-iommu: remove page merging code

2018-11-28 Thread Paul Durrant
The page merging logic makes use of bits 1-8 and bit 63 of a PTE, which used to be specified as 'ignored'. However, bits 5 and 6 are now specified as 'accessed' and 'dirty' bits and their use only remains safe as long as the DTE 'Host Access Dirty' bits remain unused by Xen, or by hardware before t

[Xen-devel] [PATCH] xen/vmx: remove stale prototypes

2018-11-28 Thread Juergen Gross
Some prototypes in include/asm-x86/hvm/vmx/vmx.h have no related implementation. Remove them. Signed-off-by: Juergen Gross --- xen/include/asm-x86/hvm/vmx/vmx.h | 4 1 file changed, 4 deletions(-) diff --git a/xen/include/asm-x86/hvm/vmx/vmx.h b/xen/include/asm-x86/hvm/vmx/vmx.h index b11

[Xen-devel] vpci: deferral of register write until p2m changes are done

2018-11-28 Thread Roger Pau Monné
Hello, While doing the recent vPCI fixes and also working on SR-IOV support I've been thinking about how vPCI handles writes to PCI registers that imply modifications to the p2m for PVH Dom0. When memory decoding or ROM BARs are enabled Xen performs the following flow: 1. Create a rangeset with

Re: [Xen-devel] [PATCH 0/3] Remove tmem

2018-11-28 Thread Wei Liu
On Wed, Nov 28, 2018 at 06:52:04AM +0100, Juergen Gross wrote: > On 27/11/2018 19:44, Wei Liu wrote: > > It is agreed that tmem can be removed from xen.git. See the thread starting > > from . > > > > Wei Liu (3): > > xen: remove tmem from hypervisor > > tools: remove tmem code and commands > >

Re: [Xen-devel] [PATCH 1/3] xen: remove tmem from hypervisor

2018-11-28 Thread Wei Liu
On Tue, Nov 27, 2018 at 06:44:08PM +, Wei Liu wrote: > This patch removes all tmem related code and CONFIG_TMEM from the > hypervisor. Also remove tmem hypercalls from the default XSM policy. > > It is written as if tmem is disabled and tmem freeable pages is 0. > > Signed-off-by: Wei Liu M

Re: [Xen-devel] [PATCH] xen/vmx: remove stale prototypes

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 11:05:58AM +0100, Juergen Gross wrote: > Some prototypes in include/asm-x86/hvm/vmx/vmx.h have no related > implementation. Remove them. > > Signed-off-by: Juergen Gross Reviewed-by: Roger Pau Monné ___ Xen-devel mailing list

[Xen-devel] Xen 4.12 Development Update

2018-11-28 Thread Juergen Gross
This email only tracks big items for xen.git tree. Please reply for items you would like to see in 4.12 so that people have an idea what is going on and prioritise accordingly. You're welcome to provide description and use cases of the feature you're working on. = Timeline = We now adopt a fixed

[Xen-devel] [xen-unstable-coverity test] 130846: regressions - ALL FAIL

2018-11-28 Thread osstest service owner
flight 130846 xen-unstable-coverity real [real] http://logs.test-lab.xenproject.org/osstest/logs/130846/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: coverity-amd647 coverity-upload fail REGR. vs. 130392 version t

Re: [Xen-devel] Xen 4.12 Development Update

2018-11-28 Thread Juergen Gross
Sorry, this one is missing some updates. Will resend soon. Juergen On 28/11/2018 11:15, Juergen Gross wrote: > This email only tracks big items for xen.git tree. Please reply for items you > would like to see in 4.12 so that people have an idea what is going on and > prioritise accordingly. > >

Re: [Xen-devel] What is different amount cpu configurations :application default, hypervisor default, copy host copy configuration

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 05:13:22PM +0800, John Wang wrote: > Hi Devs: > > I have a  big confusion about cpu configurations in virt-manager -> CPUs -> > configuration (Refer to attachment) > > There are 3 type of model : copy host cpu configuration (like passthrough of > kvm ); Application default

Re: [Xen-devel] [PATCH v1] Increase framebuffer size to todays standards

2018-11-28 Thread Jan Beulich
>>> On 27.11.18 at 19:17, wrote: > I would be surprised if someone ever used the HDLCD driver after it was > merged. I am not even sure if it even works. > > Furthermore, this driver only targets development platform (i.g Juno) or > the models were pretty much everyone tends to use serial conso

[Xen-devel] Xen 4.12 Development Update

2018-11-28 Thread Juergen Gross
This email only tracks big items for xen.git tree. Please reply for items you would like to see in 4.12 so that people have an idea what is going on and prioritise accordingly. You're welcome to provide description and use cases of the feature you're working on. = Timeline = We now adopt a fixed

Re: [Xen-devel] Xen 4.12 Development Update

2018-11-28 Thread Paul Durrant
> -Original Message- [snip] > > * PV-IOMMU (v7) > - Paul Durrant > There's no way this is going to make 4.12 now. Paul ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] Xen 4.12 Development Update

2018-11-28 Thread Andrew Cooper
On 28/11/2018 10:26, Juergen Gross wrote: > = Projects = > > == Hypervisor == > > * Improvements to domain creation (v2) > - Andrew Cooper Made a bit more progress.  Still plenty to do. > === x86 === > > * Fixes to #DB injection > - Andrew Cooper Quickly turning into a rats nest.  Next

Re: [Xen-devel] [PATCH v3] amd-iommu: remove page merging code

2018-11-28 Thread Andrew Cooper
On 28/11/2018 09:55, Paul Durrant wrote: > The page merging logic makes use of bits 1-8 and bit 63 of a PTE, which > used to be specified as 'ignored'. However, bits 5 and 6 are now specified > as 'accessed' and 'dirty' bits and their use only remains safe as long as > the DTE 'Host Access Dirty' b

Re: [Xen-devel] [PATCH] xen/vmx: remove stale prototypes

2018-11-28 Thread Andrew Cooper
On 28/11/2018 10:15, Roger Pau Monné wrote: > On Wed, Nov 28, 2018 at 11:05:58AM +0100, Juergen Gross wrote: >> Some prototypes in include/asm-x86/hvm/vmx/vmx.h have no related >> implementation. Remove them. >> >> Signed-off-by: Juergen Gross > Reviewed-by: Roger Pau Monné Acked-by: Andrew Coop

[Xen-devel] [xen-4.8-testing test] 130804: trouble: blocked/broken/fail/pass

2018-11-28 Thread osstest service owner
flight 130804 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/130804/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64 broken build-arm64-pvops

Re: [Xen-devel] [PATCH v4 1/6] microcode/intel: extend microcode_update_match()

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 01:34:11PM +0800, Chao Gao wrote: > to a more generic function. The benefit is that this function can be > used to check whether a microcode is newer than another as well. We > rely on this function to decide to perform a replacement or an add when > updating the global micr

Re: [Xen-devel] [PATCH v5 11/20] xen: setup hypercall page for PVH

2018-11-28 Thread Daniel Kiper
On Tue, Nov 27, 2018 at 09:31:10PM +0100, Daniel Kiper wrote: > On Wed, Nov 21, 2018 at 03:28:46PM +0100, Juergen Gross wrote: > > Add the needed code to setup the hypercall page for calling into the > > Xen hypervisor. > > > > Import the XEN_HVM_DEBUGCONS_IOPORT define from Xen unstable into > > i

Re: [Xen-devel] [PATCH v5 01/20] xen: add some xen headers

2018-11-28 Thread Daniel Kiper
On Wed, Nov 21, 2018 at 03:28:36PM +0100, Juergen Gross wrote: > In order to support grub2 in Xen PVH environment some additional Xen > headers are needed as grub2 will be started in PVH mode requiring to > use several HVM hypercalls and structures. > > Add the needed headers from Xen 4.10 being th

Re: [Xen-devel] [PATCH 2/8] tools/xenstore: Document that xs_close(0) is OK.

2018-11-28 Thread Wei Liu
On Tue, Nov 06, 2018 at 09:41:07AM +, Wei Liu wrote: > On Fri, Nov 02, 2018 at 05:01:07PM +, Ian Jackson wrote: > > Signed-off-by: Ian Jackson > > Acked-by: Wei Liu I have applied patch 1 and 2 in this series to reduce the length of your patch queue. Wei. _

Re: [Xen-devel] [PATCH v5 11/20] xen: setup hypercall page for PVH

2018-11-28 Thread Juergen Gross
On 28/11/2018 12:28, Daniel Kiper wrote: > On Tue, Nov 27, 2018 at 09:31:10PM +0100, Daniel Kiper wrote: >> On Wed, Nov 21, 2018 at 03:28:46PM +0100, Juergen Gross wrote: >>> Add the needed code to setup the hypercall page for calling into the >>> Xen hypervisor. >>> >>> Import the XEN_HVM_DEBUGCON

Re: [Xen-devel] [PATCH v5 01/20] xen: add some xen headers

2018-11-28 Thread Juergen Gross
On 28/11/2018 12:31, Daniel Kiper wrote: > On Wed, Nov 21, 2018 at 03:28:36PM +0100, Juergen Gross wrote: >> In order to support grub2 in Xen PVH environment some additional Xen >> headers are needed as grub2 will be started in PVH mode requiring to >> use several HVM hypercalls and structures. >>

Re: [Xen-devel] [PATCH v5 15/20] xen_pvh: add build runes for grub-core

2018-11-28 Thread Juergen Gross
On 27/11/2018 22:17, Daniel Kiper wrote: > On Wed, Nov 21, 2018 at 03:28:50PM +0100, Juergen Gross wrote: >> Add the modifications to the build system needed to build a xen_pvh >> grub. >> >> Signed-off-by: Juergen Gross >> Reviewed-by: Daniel Kiper >> --- >> V3: sorted some filenames (Daniel Kip

Re: [Xen-devel] [PATCH v4 2/6] microcode: save all microcodes which pass sanity check

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 01:34:12PM +0800, Chao Gao wrote: > ... and search caches to find a suitable one when loading. Why do you need to save all of them? You are only going to load a single microcode, so I don't understand the need to cache them all. > With this cache, the existing 'uci->mc' st

[Xen-devel] [PATCH v3] xl: free bitmaps on exit

2018-11-28 Thread Olaf Hering
Every invocation of xl via valgrind will show three leaks. Since libxl_bitmap_alloc uses NOGC, the caller has to free the memory after use. And since xl_ctx_free might be called before parse_global_config, also move the libxl_bitmap_init calls into xl_ctx_alloc. Also move the call to atexit() afte

[Xen-devel] [PATCH] xen: remove trailing spaces from public headers

2018-11-28 Thread Juergen Gross
Several public header files have trailing spaces in them. This is rather annoying when importing them into other projects as they might be rejected not complying to coding style. Remove the trailing spaces in all headers below xen/include/public/. Signed-off-by: Juergen Gross --- I have omitted

Re: [Xen-devel] [PATCH v3] xl: free bitmaps on exit

2018-11-28 Thread Wei Liu
On Wed, Nov 28, 2018 at 01:24:34PM +0100, Olaf Hering wrote: > Every invocation of xl via valgrind will show three leaks. > Since libxl_bitmap_alloc uses NOGC, the caller has to free the memory > after use. And since xl_ctx_free might be called before > parse_global_config, also move the libxl_bitm

Re: [Xen-devel] [PATCH v4 3/6] microcode: delete 'mc' field from struct ucode_cpu_info

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 01:34:13PM +0800, Chao Gao wrote: > diff --git a/xen/arch/x86/microcode_intel.c b/xen/arch/x86/microcode_intel.c > index c4f812f..1857332 100644 > --- a/xen/arch/x86/microcode_intel.c > +++ b/xen/arch/x86/microcode_intel.c > @@ -296,9 +296,8 @@ static int get_matching_microc

Re: [Xen-devel] [PATCH] xen: remove trailing spaces from public headers

2018-11-28 Thread Wei Liu
On Wed, Nov 28, 2018 at 01:32:36PM +0100, Juergen Gross wrote: > Several public header files have trailing spaces in them. This is > rather annoying when importing them into other projects as they might > be rejected not complying to coding style. > > Remove the trailing spaces in all headers belo

Re: [Xen-devel] [PATCH] xen: remove trailing spaces from public headers

2018-11-28 Thread Andrew Cooper
On 28/11/2018 12:36, Wei Liu wrote: > On Wed, Nov 28, 2018 at 01:32:36PM +0100, Juergen Gross wrote: >> Several public header files have trailing spaces in them. This is >> rather annoying when importing them into other projects as they might >> be rejected not complying to coding style. >> >> Remo

[Xen-devel] [freebsd-master test] 130810: all pass - PUSHED

2018-11-28 Thread osstest service owner
flight 130810 freebsd-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/130810/ Perfect :-) All tests in this flight passed as required version targeted for testing: freebsd 8894b8e317520c031636fdfab98fc0557a0e1f4c baseline version: freebsd 23174883ee9

Re: [Xen-devel] [PATCH] xen: remove trailing spaces from public headers

2018-11-28 Thread Jan Beulich
>>> On 28.11.18 at 13:32, wrote: > Several public header files have trailing spaces in them. This is > rather annoying when importing them into other projects as they might > be rejected not complying to coding style. > > Remove the trailing spaces in all headers below xen/include/public/. > > S

Re: [Xen-devel] [PATCH] xen: remove trailing spaces from public headers

2018-11-28 Thread Wei Liu
On Wed, Nov 28, 2018 at 05:52:57AM -0700, Jan Beulich wrote: > >>> On 28.11.18 at 13:32, wrote: > > Several public header files have trailing spaces in them. This is > > rather annoying when importing them into other projects as they might > > be rejected not complying to coding style. > > > > Re

Re: [Xen-devel] [PATCH] xen/x86: fix paging_max_paddr_bits()

2018-11-28 Thread Jan Beulich
>>> On 28.11.18 at 09:41, wrote: > On Wed, Nov 28, 2018 at 08:52:24AM +0100, Juergen Gross wrote: >> paging_max_paddr_bits() has an invalid use of IS_ENABLED(): instead of >> IS_ENABLED(CONFIG_BIGMEM) it is using IS_ENABLED(BIGMEM). Fix that. >> >> Signed-off-by: Juergen Gross > > Reviewed-by:

Re: [Xen-devel] vpci: deferral of register write until p2m changes are done

2018-11-28 Thread Jan Beulich
>>> On 28.11.18 at 11:09, wrote: > Hello, > > While doing the recent vPCI fixes and also working on SR-IOV support > I've been thinking about how vPCI handles writes to PCI registers that > imply modifications to the p2m for PVH Dom0. > > When memory decoding or ROM BARs are enabled Xen performs

Re: [Xen-devel] [PATCH] xen: remove trailing spaces from public headers

2018-11-28 Thread Jan Beulich
>>> On 28.11.18 at 13:57, wrote: > On Wed, Nov 28, 2018 at 05:52:57AM -0700, Jan Beulich wrote: >> >>> On 28.11.18 at 13:32, wrote: >> > Several public header files have trailing spaces in them. This is >> > rather annoying when importing them into other projects as they might >> > be rejected no

Re: [Xen-devel] [PATCH] xen: remove trailing spaces from public headers

2018-11-28 Thread Juergen Gross
On 28/11/2018 13:52, Jan Beulich wrote: On 28.11.18 at 13:32, wrote: >> Several public header files have trailing spaces in them. This is >> rather annoying when importing them into other projects as they might >> be rejected not complying to coding style. >> >> Remove the trailing spaces in

Re: [Xen-devel] Problems building and running Xen on Hikey960

2018-11-28 Thread Julien Grall
Hi Matthew, On 28/11/2018 06:43, Matthew Daley wrote: > On Mon, 26 Nov 2018 at 14:07, Matthew Daley wrote: >> >> On Fri, 23 Nov 2018 at 09:51, Julien Grall wrote: >>> >>> Hi Matthew, >>> >>> Sorry for the late answer and thank you for testing the patch. >>> >>> On 11/13/18 10:43 PM, Matthew Dale

Re: [Xen-devel] [PATCH] xen: remove trailing spaces from public headers

2018-11-28 Thread Wei Liu
On Wed, Nov 28, 2018 at 06:09:25AM -0700, Jan Beulich wrote: > >>> On 28.11.18 at 13:57, wrote: > > On Wed, Nov 28, 2018 at 05:52:57AM -0700, Jan Beulich wrote: > >> >>> On 28.11.18 at 13:32, wrote: > >> > Several public header files have trailing spaces in them. This is > >> > rather annoying wh

Re: [Xen-devel] [PATCH] xen: remove trailing spaces from public headers

2018-11-28 Thread Wei Liu
On Wed, Nov 28, 2018 at 02:17:55PM +0100, Juergen Gross wrote: > On 28/11/2018 13:52, Jan Beulich wrote: > On 28.11.18 at 13:32, wrote: > >> Several public header files have trailing spaces in them. This is > >> rather annoying when importing them into other projects as they might > >> be rej

[Xen-devel] [PATCH v6 01/20] xen: add some xen headers

2018-11-28 Thread Juergen Gross
In order to support grub2 in Xen PVH environment some additional Xen headers are needed as grub2 will be started in PVH mode requiring to use several HVM hypercalls and structures. Add the needed headers from Xen 4.10 being the first Xen version with full (not only experimental) PVH guest support.

[Xen-devel] [PATCH v6 03/20] xen: carve out grant tab initialization into dedicated function

2018-11-28 Thread Juergen Gross
Initialize the grant tab in a dedicated function. This will enable using it for PVH guests, too. Call the new function from grub_machine_init() as this will later be common between Xen PV and Xen PVH mode. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V2: update commit message (Dan

[Xen-devel] [PATCH v6 04/20] xen: prepare common code for Xen PVH support

2018-11-28 Thread Juergen Gross
Some common code needs to be special cased for Xen PVH mode. This hits mostly Xen PV mode specific areas. Split include/grub/i386/pc/int_types.h off from include/grub/i386/pc/int.h to support including this file later from xen_pvh code without the grub_bios_interrupt definition. Move definition o

[Xen-devel] [PATCH v6 15/20] xen_pvh: add build runes for grub-core

2018-11-28 Thread Juergen Gross
Add the modifications to the build system needed to build a xen_pvh grub. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V3: sorted some filenames (Daniel Kiper) V4: add bus/pci.c to xen_pvh --- gentpl.py | 4 ++-- grub-core/Makefile.am | 12 gr

[Xen-devel] [PATCH v6 07/20] xen: modify grub_xen_ptr2mfn() for xen-pvh

2018-11-28 Thread Juergen Gross
grub_xen_ptr2mfn() returns the machine frame number for a given pointer value. For Xen-PVH guests this is just the PFN. Add the PVH specific variant. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V5: new patch (Daniel Kiper) --- grub-core/kern/xen/init.c | 2 ++ 1 file changed, 2 i

[Xen-devel] [PATCH v6 13/20] xen: setup Xen specific data for PVH

2018-11-28 Thread Juergen Gross
Initialize the needed Xen specific data. This is: - the Xen start of day page containing the console and Xenstore ring page PFN and event channel - the grant table - the shared info page Write back the possibly modified memory map to the hypervisor in case the guest is reading it from there aga

[Xen-devel] [PATCH v6 08/20] xen: add PVH specific defines to offset.h

2018-11-28 Thread Juergen Gross
include/grub/offsets.h needs some defines for Xen PVH mode. Add them. While at it line up the values in the surrounding lines to start at the same column. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V3: XENPVH->XEN_PVH (Daniel Kiper) --- include/grub/offsets.h | 21 -

[Xen-devel] [PATCH v6 16/20] grub-module-verifier: Ignore all_video for xenpvh

2018-11-28 Thread Juergen Gross
From: Hans van Kranenburg This solves the build failing with "Error: no symbol table and no .moddeps section" Also see: - 6371e9c10433578bb236a8284ddb9ce9e201eb59 - https://savannah.gnu.org/bugs/?49012 Signed-off-by: Hans van Kranenburg Reviewed-by: Daniel Kiper --- V2: new patch Signed-off-b

[Xen-devel] [PATCH v6 19/20] xen_pvh: support grub-install for xen_pvh

2018-11-28 Thread Juergen Gross
Add xen_pvh support to grub-install. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- include/grub/util/install.h | 1 + util/grub-install-common.c | 1 + util/grub-install.c | 7 +++ 3 files changed, 9 insertions(+) diff --git a/include/grub/util/install.h b/include/gru

[Xen-devel] [PATCH v6 10/20] xen: add PVH boot entry code

2018-11-28 Thread Juergen Gross
Add the code for the Xen PVH mode boot entry. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V3: clear %fs and %gs, too (Daniel Kiper) use GRUB_MEMORY_MACHINE_PROT_STACK_SIZE for stack size (Daniel Kiper) V5: reorder clearing segment regs (Daniel Kiper) --- grub-core/kern/i386/x

[Xen-devel] [PATCH v6 05/20] xen: add some dummy headers for PVH mode

2018-11-28 Thread Juergen Gross
With Xen PVH mode adding a new machine type the machine related headers need to be present for the build to succeed. Most of the headers just need to include the related common i386 headers. Add those to the tree. Note that xen_pvh/int.h needs to include pc/int_types.h instead of pc/int.h in order

[Xen-devel] [PATCH v6 02/20] loader/linux: support passing rsdp address via boot params

2018-11-28 Thread Juergen Gross
Xen PVH guests will have the RSDP at an arbitrary address. Support that by passing the RSDP address via the boot parameters to Linux. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V2: add oring 0x8000 to version field V3: move including machine/kernel.h to patch 8 (Daniel Kiper) V5:

[Xen-devel] [PATCH v6 06/20] xen: rearrange xen/init.c to prepare it for Xen PVH mode

2018-11-28 Thread Juergen Gross
Rearrange grub-core/kern/xen/init.c to prepare adding PVH mode support to it. This includes putting some code under #ifdef GRUB_MACHINE_XEN as it will not be used when running as PVH. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- grub-core/kern/xen/init.c | 60 +

[Xen-devel] [PATCH v6 14/20] xen: init memory regions for PVH

2018-11-28 Thread Juergen Gross
Add all usable memory regions to grub memory management and add the needed mmap iterate code, which will be used by grub core (e.g. grub-core/lib/relocator.c or grub-core/mmap/mmap.c). As we are running in 32-bit mode don't add memory above 4GB. Signed-off-by: Juergen Gross Reviewed-by: Daniel K

[Xen-devel] [PATCH v6 09/20] xen: add basic hooks for PVH in current code

2018-11-28 Thread Juergen Gross
Add the hooks to current code needed for Xen PVH. They will be filled with code later when the related functionality is being added. loader/i386/linux.c needs to include machine/kernel.h now as it needs to get GRUB_KERNEL_USE_RSDP_ADDR from there. Signed-off-by: Juergen Gross Reviewed-by: Daniel

[Xen-devel] [PATCH v6 18/20] xen_pvh: support building a standalone image

2018-11-28 Thread Juergen Gross
Support mkimage for xen_pvh. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V2: some style adjustments (Daniel Kiper) use defines for elf-notes (Daniel Kiper) V5: move elf-note define usage into new patch (Daniel Kiper) I didn't replace the 4096 by a PAGE_SIZE macro as requested

[Xen-devel] [PATCH v6 12/20] xen: get memory map from hypervisor for PVH

2018-11-28 Thread Juergen Gross
Retrieve the memory map from the hypervisor and normalize it to contain no overlapping entries and to be sorted by address. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V3: use grub_e820_mmap_entry instead of own struct (Daniel Kiper) --- grub-core/kern/i386/xen/pvh.c | 94 +++

[Xen-devel] [PATCH v6 20/20] xen_pvh: add support to configure

2018-11-28 Thread Juergen Gross
Support platform i386/xen_pvh in configure. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- configure.ac | 3 +++ 1 file changed, 3 insertions(+) diff --git a/configure.ac b/configure.ac index 5e63c4af3..81a19afd5 100644 --- a/configure.ac +++ b/configure.ac @@ -151,6 +151,7 @@ case

[Xen-devel] [PATCH v6 00/20] xen: add pvh guest support

2018-11-28 Thread Juergen Gross
This patch series adds support for booting Linux as PVH guest. Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh platform grub is booted as a standalone image directly by Xen. For booting Linux kernel it is using the standard linux kernel loader. The only modification of the linux

[Xen-devel] [PATCH v6 17/20] xen: use elfnote defines instead of plain numbers

2018-11-28 Thread Juergen Gross
In order to avoid using plain integers for the ELF notes use the available Xen include instead. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V5: new patch (Daniel Kiper) --- util/grub-mkimagexx.c | 14 -- 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/ut

[Xen-devel] [PATCH v6 11/20] xen: setup hypercall page for PVH

2018-11-28 Thread Juergen Gross
Add the needed code to setup the hypercall page for calling into the Xen hypervisor. Import the XEN_HVM_DEBUGCONS_IOPORT define from Xen unstable into include/xen/arch-x86/xen.h Signed-off-by: Juergen Gross Reviewed-by: Roger Pau Monné --- V3: grub_xen_early_halt->grub_xen_panic (Roger Pau Monn

[Xen-devel] [PATCH v2 3/3] docs: remove tmem related text

2018-11-28 Thread Wei Liu
Signed-off-by: Wei Liu --- docs/man/xl.conf.pod.5 | 9 +- docs/man/xl.pod.1.in| 68 docs/misc/tmem-internals.html | 789 docs/misc/xen-command-line.markdown | 6 - docs/misc/xsm-flask.txt | 36 -- 5 fil

[Xen-devel] [PATCH v2 0/3] Remove tmem

2018-11-28 Thread Wei Liu
It is agreed that tmem can be removed from xen.git. See the thread starting from . In this version: 1. Remove some residuals from previous version and fix all build errors discovered by Gitlab CI. 2. Swap the o

[Xen-devel] [PATCH v2 1/3] tools: remove tmem code and commands

2018-11-28 Thread Wei Liu
Remove all tmem related code in libxc. Leave some stubs in libxl in case anyone has linked to those functions before the removal. Remove all tmem related commands in xl, all tmem related code in other utilities we ship. Signed-off-by: Wei Liu --- tools/libxc/Makefile|

[Xen-devel] [xen-unstable-smoke test] 130848: tolerable all pass - PUSHED

2018-11-28 Thread osstest service owner
flight 130848 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130848/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [Xen-devel] [PATCH v2 2/3] xen: remove tmem from hypervisor

2018-11-28 Thread Jan Beulich
>>> On 28.11.18 at 14:58, wrote: > @@ -250,7 +249,7 @@ static void populate_physmap(struct memop_args *a) > > if ( unlikely(!page) ) > { > -if ( !tmem_enabled() || a->extent_order ) > +if ( a->extent_order ) >

Re: [Xen-devel] [PATCH v2 2/3] xen: remove tmem from hypervisor

2018-11-28 Thread Wei Liu
On Wed, Nov 28, 2018 at 07:43:25AM -0700, Jan Beulich wrote: > >>> On 28.11.18 at 14:58, wrote: > > @@ -250,7 +249,7 @@ static void populate_physmap(struct memop_args *a) > > > > if ( unlikely(!page) ) > > { > > -if ( !tmem_enabled() || a->ex

Re: [Xen-devel] [PATCH v2 2/3] xen: remove tmem from hypervisor

2018-11-28 Thread Wei Liu
On Wed, Nov 28, 2018 at 02:47:32PM +, Wei Liu wrote: > On Wed, Nov 28, 2018 at 07:43:25AM -0700, Jan Beulich wrote: > > >>> On 28.11.18 at 14:58, wrote: > > > @@ -250,7 +249,7 @@ static void populate_physmap(struct memop_args *a) > > > > > > if ( unlikely(!page) ) > > >

Re: [Xen-devel] Patch "x86/entry/64: Remove %ebx handling from error_entry/exit" has been added to the 4.9-stable tree

2018-11-28 Thread David Woodhouse
On Wed, 2018-08-22 at 09:19 +0200, gre...@linuxfoundation.org wrote: > This is a note to let you know that I've just added the patch titled > > x86/entry/64: Remove %ebx handling from error_entry/exit > > to the 4.9-stable tree which can be found at: > > http://www.kernel.org/git/?p=linu

Re: [Xen-devel] [PATCH v4 4/6] microcode: don't call apply_microcode() in cpu_request_microcode()

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 01:34:14PM +0800, Chao Gao wrote: > cpu_request_microcode() will only parse microcode file and save > suitable microcodes to microcode_cache. To update microcode, > apply_microcode() should be invoked explicitly. > > On AMD side, svm_host_osvw_init() is supposed to be calle

Re: [Xen-devel] [PATCH v4 5/6] microcode: delete microcode pointer and size from microcode_info

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 01:34:15PM +0800, Chao Gao wrote: > Microcode pointer and size is passed to other cpu to parse microcode > locally. Now, parsing microcode is done on one CPU. Others just > find a suitable microcode stored in microcode_cache. > > Signed-off-by: Chao Gao > --- > xen/arch/x

Re: [Xen-devel] [PATCH 1/3] xen/x86: delay parsing of dom0_mem parameter until needed

2018-11-28 Thread Jan Beulich
>>> On 22.11.18 at 17:40, wrote: > Instead of parsing the dom0_mem command line parameter as custom > parameter do that only when building dom0. This will enable a later > addition of specifying the memory size by fractions of the host memory > size, which isn't known when doing custom parameter p

Re: [Xen-devel] [PATCH 2/3] xen/x86: add dom0 memory sizing variants

2018-11-28 Thread Jan Beulich
>>> On 22.11.18 at 17:40, wrote: > @@ -777,13 +777,20 @@ The amount of memory will be at least the minimum but > never more than > the maximum (i.e., `max` overrides the `min` option). If there isn't > enough memory then as much as possible is allocated. > > -`max:` also sets the maximum res

Re: [Xen-devel] [PATCH 1/9] libxl: Remove redundant pidpath setting

2018-11-28 Thread Wei Liu
On Fri, Nov 23, 2018 at 05:14:54PM +, George Dunlap wrote: > This exact same line is duplicated further on without being used or > modified in between. > > Signed-off-by: George Dunlap Acked-by: Wei Liu ___ Xen-devel mailing list Xen-devel@lists.

Re: [Xen-devel] [PATCH 3/3] xen/x86: add CONFIG item for default dom0 memory size

2018-11-28 Thread Jan Beulich
>>> On 22.11.18 at 17:40, wrote: > --- a/xen/arch/x86/Kconfig > +++ b/xen/arch/x86/Kconfig > @@ -176,6 +176,15 @@ config PV_SHIM_EXCLUSIVE > firmware, and will not function correctly in other scenarios. > > If unsure, say N. > + > +config DOM0_MEM > + string "Default value fo

Re: [Xen-devel] [PATCH 2/9] libxl: Move dm user determination logic into a helper function

2018-11-28 Thread Wei Liu
On Fri, Nov 23, 2018 at 05:14:55PM +, George Dunlap wrote: > To reliably kill an untrusted devicemodel, we need to know not only > its pid, but its uid. In preparation for this, move the userid > determination logic into a helper function. > > Create a new field, `dm_runas`, in libxl__domain_

Re: [Xen-devel] [PATCH v4 6/6] x86/microcode: Synchronize late microcode loading

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 01:34:16PM +0800, Chao Gao wrote: > This patch ports microcode improvement patches from linux kernel. > > Before you read any further: the early loading method is still the > preferred one and you should always do that. The following patch is > improving the late loading me

Re: [Xen-devel] [PATCH 1/9] mm: Introduce new vm_insert_range API

2018-11-28 Thread Heiko Stübner
Am Donnerstag, 15. November 2018, 16:45:30 CET schrieb Souptick Joarder: > Previouly drivers have their own way of mapping range of > kernel pages/memory into user vma and this was done by > invoking vm_insert_page() within a loop. > > As this pattern is common across different drivers, it can > b

Re: [Xen-devel] Xen 4.12 Development Update

2018-11-28 Thread Christopher Clark
On Wed, Nov 28, 2018 at 2:26 AM Juergen Gross wrote: > > = Projects = > > == Hypervisor == > > * Argo (inter-VM communication) I have a patch series for this that is approaching readiness to post. It does touch ARM (slightly) so will be posted this week to meet the ARM deadline. Christopher __

Re: [Xen-devel] [PATCH 1/3] xen/x86: delay parsing of dom0_mem parameter until needed

2018-11-28 Thread Juergen Gross
On 28/11/2018 16:12, Jan Beulich wrote: On 22.11.18 at 17:40, wrote: >> Instead of parsing the dom0_mem command line parameter as custom >> parameter do that only when building dom0. This will enable a later >> addition of specifying the memory size by fractions of the host memory >> size, wh

Re: [Xen-devel] [PATCH 3/9] libxl: Get rid of support for QEMU_USER_BASE (xen-qemuuser-domidNN)

2018-11-28 Thread Wei Liu
On Fri, Nov 23, 2018 at 05:14:56PM +, George Dunlap wrote: > QEMU_USER_BASE allows a user to specify the UID to use when running > the devicemodel for a specific domain number. Unfortunately, this is > not really practical: It requires nearly 32,000 entries in > /etc/passwd. QEMU_USER_RANGE_B

[Xen-devel] [xen-4.9-testing test] 130807: regressions - trouble: blocked/broken/fail/pass

2018-11-28 Thread osstest service owner
flight 130807 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/130807/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64-xsm

Re: [Xen-devel] [PATCH 4/9] dm_depriv: Describe expected usage of device_model_user parameter

2018-11-28 Thread Wei Liu
On Fri, Nov 23, 2018 at 05:14:57PM +, George Dunlap wrote: > A number of subsequent patches rely on as-yet undefined behavior for > what the `device_model_user` parameter does. Rather than implement it > incorrectly (or randomly), or remove the feature, describe an expected > usage for the fea

Re: [Xen-devel] [PATCH 2/3] xen/x86: add dom0 memory sizing variants

2018-11-28 Thread Juergen Gross
On 28/11/2018 16:17, Jan Beulich wrote: On 22.11.18 at 17:40, wrote: >> @@ -777,13 +777,20 @@ The amount of memory will be at least the minimum but >> never more than >> the maximum (i.e., `max` overrides the `min` option). If there isn't >> enough memory then as much as possible is alloc

Re: [Xen-devel] [PATCH 3/3] xen/x86: add CONFIG item for default dom0 memory size

2018-11-28 Thread Juergen Gross
On 28/11/2018 16:18, Jan Beulich wrote: On 22.11.18 at 17:40, wrote: >> --- a/xen/arch/x86/Kconfig >> +++ b/xen/arch/x86/Kconfig >> @@ -176,6 +176,15 @@ config PV_SHIM_EXCLUSIVE >>firmware, and will not function correctly in other scenarios. >> >>If unsure, say N. >> + >> +c

Re: [Xen-devel] vpci: deferral of register write until p2m changes are done

2018-11-28 Thread Roger Pau Monné
On Wed, Nov 28, 2018 at 06:01:12AM -0700, Jan Beulich wrote: > >>> On 28.11.18 at 11:09, wrote: > > Hello, > > > > While doing the recent vPCI fixes and also working on SR-IOV support > > I've been thinking about how vPCI handles writes to PCI registers that > > imply modifications to the p2m for

Re: [Xen-devel] Patch "x86/entry/64: Remove %ebx handling from error_entry/exit" has been added to the 4.9-stable tree

2018-11-28 Thread Sasha Levin
On Wed, Nov 28, 2018 at 02:56:32PM +, David Woodhouse wrote: On Wed, 2018-08-22 at 09:19 +0200, gre...@linuxfoundation.org wrote: This is a note to let you know that I've just added the patch titled x86/entry/64: Remove %ebx handling from error_entry/exit to the 4.9-stable tree which c

Re: [Xen-devel] Problems building and running Xen on Hikey960

2018-11-28 Thread Stefano Stabellini
On Wed, 28 Nov 2018, Julien Grall wrote: > Hi Matthew, > > On 28/11/2018 06:43, Matthew Daley wrote: > > On Mon, 26 Nov 2018 at 14:07, Matthew Daley wrote: > >> > >> On Fri, 23 Nov 2018 at 09:51, Julien Grall wrote: > >>> > >>> Hi Matthew, > >>> > >>> Sorry for the late answer and thank you for

Re: [Xen-devel] [PATCH v2 2/3] xen: remove tmem from hypervisor

2018-11-28 Thread Daniel De Graaf
On 11/28/18 8:58 AM, Wei Liu wrote: This patch removes all tmem related code and CONFIG_TMEM from the hypervisor. Also remove tmem hypercalls from the default XSM policy. It is written as if tmem is disabled and tmem freeable pages is 0. We will need to keep public/tmem.h around forever to avoi

Re: [Xen-devel] [PATCH v2 3/3] docs: remove tmem related text

2018-11-28 Thread Daniel De Graaf
On 11/28/18 8:58 AM, Wei Liu wrote: Signed-off-by: Wei Liu Acked-by: Daniel De Graaf ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] [PATCH 8/9] libxl: Kill QEMU by uid when possible

2018-11-28 Thread Anthony PERARD
On Fri, Nov 23, 2018 at 05:18:59PM +, George Dunlap wrote: > On 11/23/18 5:15 PM, George Dunlap wrote: > Does libxl__qmp_cleanup() need to be called after the kill() happens? > If not, we could put this before the kill() and avoid having two call sites. QEMU is supposed to create monitor socke

  1   2   3   >