[Xen-devel] [xen-unstable-coverity test] 131768: all pass - PUSHED

2019-01-06 Thread osstest service owner
flight 131768 xen-unstable-coverity real [real] http://logs.test-lab.xenproject.org/osstest/logs/131768/ Perfect :-) All tests in this flight passed as required version targeted for testing: xen a5b0eb363694e7e15405f0b3fc5fb6fab79df1db baseline version: xen 7b6e

[Xen-devel] [linux-3.18 test] 131749: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131749 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/131749/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-examine 8 reboot fail REGR. vs. 128858 test-amd64-i386-qemu

[Xen-devel] [ovmf test] 131767: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131767 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/131767/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 129475 build-i386-xsm

[Xen-devel] [libvirt test] 131766: tolerable all pass - PUSHED

2019-01-06 Thread osstest service owner
flight 131766 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/131766/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 131730 test-armhf-armhf-libvirt-raw 13 saveresto

[Xen-devel] [ovmf test] 131770: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131770 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/131770/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 129475 build-i386-xsm

[Xen-devel] [linux-linus test] 131754: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131754 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/131754/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-amd64-pvgrub 7 xen-bootfail REGR. vs. 125898 test-amd64-amd64-xl

[Xen-devel] [xen-unstable test] 131755: tolerable FAIL

2019-01-06 Thread osstest service owner
flight 131755 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/131755/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 21 leak-check/check fail in 131736 pass in 131755 test-armhf-

[Xen-devel] [ovmf test] 131771: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131771 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/131771/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 129475 build-i386-xsm

[Xen-devel] [linux-4.19 test] 131757: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131757 linux-4.19 real [real] http://logs.test-lab.xenproject.org/osstest/logs/131757/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs. 129313 test-amd64-amd64-amd

[Xen-devel] [ovmf test] 131774: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131774 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/131774/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 129475 build-i386-xsm

[Xen-devel] [ovmf test] 131776: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131776 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/131776/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 129475 build-i386-xsm

[Xen-devel] [PATCH v4 1/2] xen/blkback: add stack variable 'blkif' in connect_ring()

2019-01-06 Thread Dongli Zhang
As 'be->blkif' is used for many times in connect_ring(), the stack variable 'blkif' is added to substitute 'be-blkif'. Suggested-by: Paul Durrant Signed-off-by: Dongli Zhang --- drivers/block/xen-blkback/xenbus.c | 27 ++- 1 file changed, 14 insertions(+), 13 deletions(-

[Xen-devel] [PATCH v4 2/2] xen/blkback: rework connect_ring() to avoid inconsistent xenstore 'ring-page-order' set by malicious blkfront

2019-01-06 Thread Dongli Zhang
The xenstore 'ring-page-order' is used globally for each blkback queue and therefore should be read from xenstore only once. However, it is obtained in read_per_ring_refs() which might be called multiple times during the initialization of each blkback queue. If the blkfront is malicious and the 'r

Re: [Xen-devel] Xen (both x86 and Arm) Community Call: Jan 9 - 16:00 - 17:00 UTC - Call for Agenda Items

2019-01-06 Thread Juergen Gross
On 03/01/2019 15:28, Lars Kurth wrote: > Hi all, > > based on Stefano's and Julien's suggestion that it may make sense to merge > the x86 and arm calls, I am willing to try. It also makes sense this time in > particular because we are approaching freeze time. +1 > As per request the meeting is

[Xen-devel] [ovmf test] 131777: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131777 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/131777/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 129475 build-i386-xsm

[Xen-devel] [ovmf test] 131778: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131778 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/131778/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 129475 build-i386-xsm

Re: [Xen-devel] [PATCH v4 2/2] xen: use SYMBOL when required

2019-01-06 Thread Jan Beulich
>>> On 04.01.19 at 18:05, wrote: > I realize that you are not convinced by these arguments, but let's find > a way forward. My preference would be to have SYMBOL returning unsigned > long and do unsigned long comparisons when pointers pointing to > different objects are involved. I continue to fa

[Xen-devel] [ovmf test] 131779: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131779 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/131779/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 129475 build-i386-xsm

[Xen-devel] [linux-3.18 test] 131769: regressions - FAIL

2019-01-06 Thread osstest service owner
flight 131769 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/131769/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-examine 8 reboot fail REGR. vs. 128858 test-amd64-i386-qemu

[Xen-devel] [PATCH v3 13/15] xsm, argo: XSM control for any access to argo by a domain

2019-01-06 Thread Christopher Clark
Will inhibit initialization of the domain's argo data structure to prevent receiving any messages or notifications and access to any of the argo hypercall operations. Signed-off-by: Christopher Clark --- v2 self: fix xsm use in soft-reset prior to introduction v1 #5 (#17) feedback Paul: XSM contr

[Xen-devel] [PATCH v3 14/15] xsm, argo: notify: don't describe rings that cannot be sent to

2019-01-06 Thread Christopher Clark
Signed-off-by: Christopher Clark --- xen/common/argo.c | 11 +++ 1 file changed, 11 insertions(+) diff --git a/xen/common/argo.c b/xen/common/argo.c index 31535bd..0dc064d 100644 --- a/xen/common/argo.c +++ b/xen/common/argo.c @@ -1172,6 +1172,17 @@ fill_ring_data(const struct domain *cu

[Xen-devel] [PATCH v3 02/15] argo: introduce the argo_op hypercall boilerplate

2019-01-06 Thread Christopher Clark
Presence is gated upon CONFIG_ARGO. Registers the hypercall previously reserved for this. Takes 5 arguments, does nothing and returns -ENOSYS. Will be avoiding a compat ABI by using fixed-size types in hypercall ops so HYPERCALL, rather than COMPAT_CALL, is the correct macro for the hypercall tab

[Xen-devel] [PATCH v3 06/15] xen/arm: introduce guest_handle_for_field()

2019-01-06 Thread Christopher Clark
ARM port of c/s bb544585: "introduce guest_handle_for_field()" This helper turns a field of a GUEST_HANDLE into a GUEST_HANDLE. Signed-off-by: Christopher Clark Reviewed-by: Paul Durrant --- xen/include/asm-arm/guest_access.h | 3 +++ 1 file changed, 3 insertions(+) diff --git a/xen/include/a

[Xen-devel] [PATCH v3 15/15] argo: validate hypercall arg structures via compat machinery

2019-01-06 Thread Christopher Clark
Argo doesn't use compat hypercall or argument translation but can use some of the infrastructure for validating the hypercall argument structures to ensure that the struct sizes, offsets and compositions don't vary between 32 and 64bit, so add that here in a new dedicated source file for this purpo

[Xen-devel] [PATCH v3 03/15] argo: define argo_dprintk for subsystem debugging

2019-01-06 Thread Christopher Clark
A convenience for working on development of the argo subsystem: setting a #define variable enables additional debug messages. Signed-off-by: Christopher Clark --- v2 #03 feedback, Jan: fix ifdef/define confusion error v1 #04 feedback, Jan: fix dprintk implementation xen/common/argo.c | 9 ++

[Xen-devel] [PATCH v3 12/15] xsm, argo: XSM control for argo message send operation

2019-01-06 Thread Christopher Clark
Default policy: allow. Signed-off-by: Christopher Clark --- v2: reordered commit sequence to after sendv implementation v1 feedback Jan #16: apply const to function signatures v1 version was: Reviewed-by: Paul Durrant xen/common/argo.c | 8 xen/include/xsm/dummy.h

[Xen-devel] [PATCH v3 00/15] Argo: hypervisor-mediated interdomain communication

2019-01-06 Thread Christopher Clark
Version three of this patch series: * Teardown of rings and pending notifications is implemented for domain destroy, removing need to avoid state for defunct domains. Data structures added to track rings that a domain is the single partner for and pending notifications about wildcard-sender

[Xen-devel] [PATCH v3 08/15] argo: implement the unregister op

2019-01-06 Thread Christopher Clark
Takes a single argument: a handle to the ring unregistration struct, which specifies the port and partner domain id or wildcard. The ring's entry is removed from the hashtable of registered rings; any entries for pending notifications are removed; and the ring is unmapped from Xen's address space.

[Xen-devel] [PATCH v3 04/15] argo: init, destroy and soft-reset, with enable command line opt

2019-01-06 Thread Christopher Clark
Initialises basic data structures and performs teardown of argo state for domain shutdown. Inclusion of the Argo implementation is dependent on CONFIG_ARGO. Introduces a new Xen command line parameter 'argo': bool to enable/disable the argo hypercall. Defaults to disabled. New headers: public/

[Xen-devel] [PATCH v3 01/15] argo: Introduce the Kconfig option to govern inclusion of Argo

2019-01-06 Thread Christopher Clark
Defines CONFIG_ARGO when enabled. Default: disabled. When the Kconfig option is enabled, the Argo hypercall implementation will be included, allowing use of the hypervisor-mediated interdomain communication mechanism. Argo is implemented for x86 and ARM hardware platforms. Availability of the op

[Xen-devel] [PATCH v3 09/15] argo: implement the sendv op; evtchn: expose send_guest_global_virq

2019-01-06 Thread Christopher Clark
sendv operation is invoked to perform a synchronous send of buffers contained in iovs to a remote domain's registered ring. It takes: * A destination address (domid, port) for the ring to send to. It performs a most-specific match lookup, to allow for wildcard. * A source address, used to inf

[Xen-devel] [PATCH v3 10/15] argo: implement the notify op

2019-01-06 Thread Christopher Clark
Queries for data about space availability in registered rings and causes notification to be sent when space has become available. The hypercall op populates a supplied data structure with information about ring state, and if insufficent space is currently available in a given ring, the hypervisor

[Xen-devel] [PATCH v3 07/15] argo: implement the register op

2019-01-06 Thread Christopher Clark
The register op is used by a domain to register a region of memory for receiving messages from either a specified other domain, or, if specifying a wildcard, any domain. This operation creates a mapping within Xen's private address space that will remain resident for the lifetime of the ring. In s

[Xen-devel] [PATCH v3 11/15] xsm, argo: XSM control for argo register

2019-01-06 Thread Christopher Clark
XSM controls for argo ring registration with two distinct cases, where the ring being registered is: 1) Single source: registering a ring for communication to receive messages from a specified single other domain. Default policy: allow. 2) Any source: registering a ring

[Xen-devel] [PATCH v3 05/15] errno: add POSIX error codes EMSGSIZE, ECONNREFUSED to the ABI

2019-01-06 Thread Christopher Clark
EMSGSIZE: Argo's sendv operation will return EMSGSIZE when an excess amount of data, across all iovs, has been supplied, exceeding either the statically configured maximum size of a transmittable message, or the (variable) size of the ring registered by the destination domain. ECONNREFUSED: Argo's