Re: [Xen-devel] Debugging Windows HVM crashes on Ryzen 3xxx series CPUs.

2019-10-25 Thread Steven Haigh
Further to my last, I downloaded the latest Windows Server 2016 ISO from Microsoft. Filename: Windows_Server_2016_Datacenter_EVAL_en-us_14393_refresh.ISO Have attached as much of the log as I could get attempting to boot from the ISO and having a blank LV as the install target. The Windows e

[Xen-devel] [ovmf test] 143123: all pass - PUSHED

2019-10-25 Thread osstest service owner
flight 143123 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/143123/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 6996ec88a244a2428beb81d126ee55d152f62a07 baseline version: ovmf 95d2883647dd8bf91f65c

[Xen-devel] [PATCH] xen: issue deprecation warning for 32-bit pv guest

2019-10-25 Thread Juergen Gross
Support for the kernel as Xen 32-bit PV guest will soon be removed. Issue a warning when booted as such. Signed-off-by: Juergen Gross --- arch/x86/xen/enlighten_pv.c | 8 1 file changed, 8 insertions(+) diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c index 58f79a

Re: [Xen-devel] Debugging Windows HVM crashes on Ryzen 3xxx series CPUs.

2019-10-25 Thread Jan Beulich
On 25.10.2019 09:00, Steven Haigh wrote: > Further to my last, I downloaded the latest Windows Server 2016 ISO from > Microsoft. > > Filename: Windows_Server_2016_Datacenter_EVAL_en-us_14393_refresh.ISO > > Have attached as much of the log as I could get attempting to boot from > the ISO and ha

[Xen-devel] [PATCH for-next 4/7] x86: add a comment regarding the location of hypervisor_probe

2019-10-25 Thread Wei Liu
Signed-off-by: Wei Liu --- xen/arch/x86/setup.c | 4 1 file changed, 4 insertions(+) diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index cf5a7b8e1e..4aa0af5a12 100644 --- a/xen/arch/x86/setup.c +++ b/xen/arch/x86/setup.c @@ -764,6 +764,10 @@ void __init noreturn __start_xen(unsig

[Xen-devel] [PATCH for-next 6/7] x86/hyperv: provide hyperv_guest variable

2019-10-25 Thread Wei Liu
It will be used to gate Hyper-V related code outside of the guest directory. No functional change. Signed-off-by: Wei Liu --- xen/arch/x86/guest/hyperv/hyperv.c | 3 +++ xen/include/asm-x86/guest/hyperv.h | 2 ++ 2 files changed, 5 insertions(+) diff --git a/xen/arch/x86/guest/hyperv/hyperv.c

[Xen-devel] [PATCH for-next 3/7] x86/hyperv: extract more information from Hyper-V

2019-10-25 Thread Wei Liu
Provide a structure to store that information. The structure will be accessed from other places later so make it public. Signed-off-by: Wei Liu --- xen/arch/x86/guest/hyperv/hyperv.c | 14 ++ xen/include/asm-x86/guest/hyperv.h | 12 2 files changed, 26 insertions(+) dif

[Xen-devel] [PATCH for-next 1/7] x86: import hyperv-tlfs.h from Linux

2019-10-25 Thread Wei Liu
Taken from Linux commit b2d8b167e15bb5ec2691d1119c025630a247f649. This is a pristine copy from Linux. It is not used yet and probably doesn't compile. Changes to make it work will come later. Signed-off-by: Wei Liu --- xen/include/asm-x86/guest/hyperv-tlfs.h | 906 1 fi

[Xen-devel] [PATCH for-next 2/7] x86: fix up hyperv-tlfs.h

2019-10-25 Thread Wei Liu
Do the following: 1. include xen/types.h and xen/bitops.h 2. fix up invocations of BIT macro Signed-off-by: Wei Liu --- This can be squashed into previous patch if preferred. --- xen/include/asm-x86/guest/hyperv-tlfs.h | 141 1 file changed, 71 insertions(+), 70 deletion

[Xen-devel] [PATCH for-next 5/7] x86: use running_on_hypervisor to gate hypervisor_setup

2019-10-25 Thread Wei Liu
The hypervisor_setup method is not unique to Xen guest. Signed-off-by: Wei Liu --- xen/arch/x86/setup.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c index 4aa0af5a12..044c45be36 100644 --- a/xen/arch/x86/setup.c +++ b/xen/arch/x8

[Xen-devel] [PATCH for-next 0/7] Implement Hyper-V reference TSC based clock source

2019-10-25 Thread Wei Liu
Hi all This series adds a clock source based on Hyper-V's reference TSC. The meat is in the last patch. With this series, Xen on Hyper-V no longer runs on emulated PIT. (XEN) Platform timer is 2294.686MHz HYPER-V REFERENCE TSC This series depends on [0]. Wei. 0: https://lists.xen.org/archives

[Xen-devel] [PATCH for-next 7/7] x86: implement Hyper-V clock source

2019-10-25 Thread Wei Liu
Implement a clock source using Hyper-V's reference TSC page. Signed-off-by: Wei Liu --- Relevant spec: https://github.com/MicrosoftDocs/Virtualization-Documentation/raw/live/tlfs/Hypervisor%20Top%20Level%20Functional%20Specification%20v5.0C.pdf Section 12.6. --- xen/arch/x86/time.c | 87 ++

Re: [Xen-devel] Debugging Windows HVM crashes on Ryzen 3xxx series CPUs.

2019-10-25 Thread Steven Haigh
# patch -p1 < ../000-debug-patch-0.patch patching file xen/arch/x86/hvm/hvm.c Hunk #1 succeeded at 3373 (offset 1 line). patching file xen/arch/x86/hvm/svm/svm.c Hunk #1 succeeded at 2159 (offset -64 lines). I've attached the output from around boot all the way until after the Windows HVM DomU c

[Xen-devel] getting 4.11.3 ready

2019-10-25 Thread Jan Beulich
All, the 4.11.3 stable release is due. I intend to wait for the XSA fixes going public on the 31st, but not (much) longer. Please point out backporting candidates that you find missing from the respective stable trees. I have three ones queued which haven't passed the push gate to the master branc

Re: [Xen-devel] [PATCH v2 00/20] hw/i386/pc: Split PIIX3 southbridge from i440FX northbridge

2019-10-25 Thread Aleksandar Markovic
On Thursday, October 24, 2019, Aleksandar Markovic < aleksandar.m.m...@gmail.com> wrote: > > > On Friday, October 18, 2019, Philippe Mathieu-Daudé > wrote: > >> Changes since v1 [0]: >> - Removed patch reintroducing DO_UPCAST() use (thuth) >> - Took various patches out to reduce series (thuth) >>

[Xen-devel] Tagging livepatch-build-tools.git with Xen releases

2019-10-25 Thread Lars Kurth
Hi all, I am wondering whether we should tag livepatch-build-tools.git with Xen releases Best Regards Lars ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel

[Xen-devel] Xen Security Advisory 284 v3 (CVE-2019-17340) - grant table transfer issues on large hosts

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17340 / XSA-284 version 3 grant table transfer issues on large hosts UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION

[Xen-devel] Xen Security Advisory 292 v3 (CVE-2019-17346) - x86: insufficient TLB flushing when using PCID

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17346 / XSA-292 version 3 x86: insufficient TLB flushing when using PCID UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION ==

[Xen-devel] Xen Security Advisory 287 v3 (CVE-2019-17342) - x86: steal_page violates page_struct access discipline

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17342 / XSA-287 version 3 x86: steal_page violates page_struct access discipline UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION =

[Xen-devel] Xen Security Advisory 290 v3 (CVE-2019-17344) - missing preemption in x86 PV page table unvalidation

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17344 / XSA-290 version 3 missing preemption in x86 PV page table unvalidation UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION ===

[Xen-devel] Xen Security Advisory 291 v3 (CVE-2019-17345) - x86/PV: page type reference counting issue with failed IOMMU update

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17345 / XSA-291 version 3 x86/PV: page type reference counting issue with failed IOMMU update UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION ===

[Xen-devel] Xen Security Advisory 285 v3 (CVE-2019-17341) - race with pass-through device hotplug

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17341 / XSA-285 version 3 race with pass-through device hotplug UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION =

[Xen-devel] Xen Security Advisory 294 v3 (CVE-2019-17348) - x86 shadow: Insufficient TLB flushing when using PCID

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17348 / XSA-294 version 3 x86 shadow: Insufficient TLB flushing when using PCID UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION ==

[Xen-devel] Xen Security Advisory 300 v3 (CVE-2019-17351) - Linux: No grant table and foreign mapping limits

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17351 / XSA-300 version 3 Linux: No grant table and foreign mapping limits UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION ===

[Xen-devel] Xen Security Advisory 288 v3 (CVE-2019-17343) - x86: Inconsistent PV IOMMU discipline

2019-10-25 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2019-17343 / XSA-288 version 3 x86: Inconsistent PV IOMMU discipline UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION =

Re: [Xen-devel] [PATCH 05/24] golang/xenlight: define KeyValueList builtin type

2019-10-25 Thread George Dunlap
> On Oct 24, 2019, at 8:54 PM, Nick Rosbrook wrote: > >> So we *could* actually just `type KeyValueList struct { }`, and punt on >> all these initialization questions until such time as it turns out that >> they're needed. > > If there is no clear need for this type to be implemented in the Go

Re: [Xen-devel] [PATCH v3 2/7] xen/nospec: Use always_inline to fix code gen for evaluate_nospec

2019-10-25 Thread Jan Beulich
On 23.10.2019 15:58, Andrew Cooper wrote: > evaluate_nospec() is incredibly fragile, and this is one giant bodge. > > To correctly protect jumps, the generated code needs to be of the form: > > cmp/test > jcc 1f > lfence > ... > 1: lfence > ... > > Critically, the lfence mu

Re: [Xen-devel] [PATCH v3 3/7] xen/nospec: Introduce CONFIG_SPECULATIVE_HARDEN_BRANCH

2019-10-25 Thread Jan Beulich
On 23.10.2019 15:58, Andrew Cooper wrote: > Just as with CONFIG_SPECULATIVE_HARDEN_ARRAY, branch hardening should be > configurable at compile time. > > The previous CONFIG_HVM was a consequence of what could be discussed publicly > at the time the patches were submitted, and wasn't actually corre

[Xen-devel] [xen-unstable-smoke test] 143151: tolerable all pass - PUSHED

2019-10-25 Thread osstest service owner
flight 143151 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/143151/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] [PATCH v3 4/7] x86/nospec: Rename and rework l1tf-barrier as branch-harden

2019-10-25 Thread Jan Beulich
On 23.10.2019 15:58, Andrew Cooper wrote: > l1tf-barrier is an inappropriate name, and came about because of restrictions > on could be discussed publicly when the patches were proposed. > > In practice, it is for general Spectre v1 mitigations, and is necessary in all > cases. An adversary which

Re: [Xen-devel] [PATCH for-next v3 6/7] x86/nospec: Move array_index_mask_nospec() into nospec.h

2019-10-25 Thread Jan Beulich
On 23.10.2019 15:58, Andrew Cooper wrote: > system.h isn't an appropriate place to live, now that asm/nospec.h exists. > This should arguably have been part of c/s db591d6e76e > > No functional change. > > Signed-off-by: Andrew Cooper Acked-by: Jan Beulich

Re: [Xen-devel] [PATCH v3 2/7] xen/nospec: Use always_inline to fix code gen for evaluate_nospec

2019-10-25 Thread Andrew Cooper
On 25/10/2019 13:03, Jan Beulich wrote: > On 23.10.2019 15:58, Andrew Cooper wrote: >> evaluate_nospec() is incredibly fragile, and this is one giant bodge. >> >> To correctly protect jumps, the generated code needs to be of the form: >> >> cmp/test >> jcc 1f >> lfence >> ... >> 1

Re: [Xen-devel] [PATCH v3 7/7] x86/nospec: Optimise array_index_mask_nospec() for power-of-2 arrays

2019-10-25 Thread Jan Beulich
On 23.10.2019 15:58, Andrew Cooper wrote: > This optimisation is not safe on ARM, because some CPUs do data value > speculation, which is why the CSDB barrer was introduced. So if an x86 CPU appeared which did so too, it would immediately be unsafe as well aiui. I.e. we'd have to again go and fix

Re: [Xen-devel] Tagging livepatch-build-tools.git with Xen releases

2019-10-25 Thread Ross Lagerwall
On 10/25/19 12:05 PM, Lars Kurth wrote: Hi all, I am wondering whether we should tag livepatch-build-tools.git with Xen releases I thought this had been discussed before but I can't find anything in my archives. IMO livepatch-build-tools is a separate tool that doesn't need to move in l

Re: [Xen-devel] [PATCH 05/24] golang/xenlight: define KeyValueList builtin type

2019-10-25 Thread Nick Rosbrook
> Ok, in that case let’s just leave the struct empty. Ok, sounds like a plan. > I think we basically have three options: > > 1. Try to arrange it so that the “zero” values correspond to “default” values > in libxl; i.e., have DevID 0 -> libxl_devid -1, DevID 1 -> libxl_devid 0, &c > > 2. Add New

Re: [Xen-devel] Tagging livepatch-build-tools.git with Xen releases

2019-10-25 Thread Andrew Cooper
On 25/10/2019 13:27, Ross Lagerwall wrote: > On 10/25/19 12:05 PM, Lars Kurth wrote: >> Hi all, >> >> I am wondering whether we should tag livepatch-build-tools.git with >> Xen releases >> > > I thought this had been discussed before but I can't find anything in > my archives. I recall a discussio

Re: [Xen-devel] [PATCH v3 2/7] xen/nospec: Use always_inline to fix code gen for evaluate_nospec

2019-10-25 Thread Jan Beulich
On 25.10.2019 14:10, Andrew Cooper wrote: > On 25/10/2019 13:03, Jan Beulich wrote: >> On 23.10.2019 15:58, Andrew Cooper wrote: >>> evaluate_nospec() is incredibly fragile, and this is one giant bodge. >>> >>> To correctly protect jumps, the generated code needs to be of the form: >>> >>> cmp/

Re: [Xen-devel] Tagging livepatch-build-tools.git with Xen releases

2019-10-25 Thread Jan Beulich
On 25.10.2019 14:27, Ross Lagerwall wrote: > On 10/25/19 12:05 PM, Lars Kurth wrote: >> Hi all, >> >> I am wondering whether we should tag livepatch-build-tools.git with Xen >> releases >> > > I thought this had been discussed before but I can't find anything in my > archives. Iirc this was on

Re: [Xen-devel] [PATCH v3 7/7] x86/nospec: Optimise array_index_mask_nospec() for power-of-2 arrays

2019-10-25 Thread Andrew Cooper
On 25/10/2019 13:24, Jan Beulich wrote: > On 23.10.2019 15:58, Andrew Cooper wrote: >> This optimisation is not safe on ARM, because some CPUs do data value >> speculation, which is why the CSDB barrer was introduced. > So if an x86 CPU appeared which did so too, it would immediately be > unsafe as

Re: [Xen-devel] [PATCH v3 1/4] iommu/amd: support all delivery modes with x2APIC

2019-10-25 Thread Jan Beulich
On 15.10.2019 17:47, Roger Pau Monne wrote: > Current AMD IOMMU code will attempt to create remapping entries for > all IO-APIC pins, regardless of the delivery mode. AMD IOMMU > implementation doesn't support remapping entries for IO-APIC pins with > delivery mode set to SMI, MNI, INIT or ExtINT,

Re: [Xen-devel] [PATCH v3 0/4] iommu: fixes for interrupt remapping enabling

2019-10-25 Thread Jan Beulich
On 15.10.2019 17:47, Roger Pau Monne wrote: > Hello, > > The following series contain fixes for issues found when enabling > interrupt remapping and the IO-APIC already has unmasked pins. While I'm > not aware of any system malfunctioning (apart from reporting IOMMU > interrupt remapping faults) I

Re: [Xen-devel] [PATCH v3 0/4] iommu: fixes for interrupt remapping enabling

2019-10-25 Thread Roger Pau Monné
On Fri, Oct 25, 2019 at 03:19:57PM +0200, Jan Beulich wrote: > On 15.10.2019 17:47, Roger Pau Monne wrote: > > Hello, > > > > The following series contain fixes for issues found when enabling > > interrupt remapping and the IO-APIC already has unmasked pins. While I'm > > not aware of any system m

Re: [Xen-devel] [PATCH v3 7/7] x86/nospec: Optimise array_index_mask_nospec() for power-of-2 arrays

2019-10-25 Thread Jan Beulich
On 25.10.2019 14:58, Andrew Cooper wrote: > On 25/10/2019 13:24, Jan Beulich wrote: >> On 23.10.2019 15:58, Andrew Cooper wrote: >>> @@ -21,9 +28,15 @@ static inline unsigned long >>> array_index_mask_nospec(unsigned long index, >>> { >>> unsigned long mask; >>> >>> -asm volatile ( "cm

Re: [Xen-devel] [PATCH] xen: issue deprecation warning for 32-bit pv guest

2019-10-25 Thread Boris Ostrovsky
On 10/25/19 3:38 AM, Juergen Gross wrote: > Support for the kernel as Xen 32-bit PV guest will soon be removed. > Issue a warning when booted as such. > > Signed-off-by: Juergen Gross Reviewed-by: Boris Ostrovsky > --- > arch/x86/xen/enlighten_pv.c | 8 > 1 file changed, 8 insertions(

Re: [Xen-devel] Tagging livepatch-build-tools.git with Xen releases

2019-10-25 Thread Ian Jackson
Andrew Cooper writes ("Re: [Xen-devel] Tagging livepatch-build-tools.git with Xen releases"): > On 25/10/2019 13:27, Ross Lagerwall wrote: > > On 10/25/19 12:05 PM, Lars Kurth wrote: > >> Hi all, > >> > >> I am wondering whether we should tag livepatch-build-tools.git with > >> Xen releases > >> >

Re: [Xen-devel] [PATCH v4 3/3] xen/efi: use directmap to access runtime services table

2019-10-25 Thread Jan Beulich
On 24.10.2019 05:45, Marek Marczykowski-Górecki wrote: > Do not require switching page tables to access (static) information in > the runtime services table itself, use directmap for this. This allows > exiting early from XEN_EFI_query_capsule_capabilities, > XEN_EFI_update_capsule and XEN_EFI_quer

Re: [Xen-devel] [PATCH v4 1/3] efi: remove old SetVirtualAddressMap() arrangement

2019-10-25 Thread Jan Beulich
On 24.10.2019 05:45, Marek Marczykowski-Górecki wrote: > Remove unused (#ifdef-ed out) code. Reviving it in its current shape > won't fly because: > - SetVirtualAddressMap() needs to be called with 1:1 mapping, which >isn't the case at this time > - it uses directmap, which may go away soon >

Re: [Xen-devel] [PATCH v4 2/3] xen/efi: optionally call SetVirtualAddressMap()

2019-10-25 Thread Jan Beulich
On 24.10.2019 05:45, Marek Marczykowski-Górecki wrote: > Some UEFI implementations are not happy about lack of > SetVirtualAddressMap() call. Likely abuse the address map change > notification to do things beyond the necessary ConvertPointer() calls. > Specifically, wihtout the SetVirtualAddressMap

Re: [Xen-devel] [PATCH v3 10/10] ioreq: provide support for long-running operations...

2019-10-25 Thread Jan Beulich
On 30.09.2019 15:32, Roger Pau Monne wrote: > ...and switch vPCI to use this infrastructure for long running > physmap modification operations. > > This allows to get rid of the vPCI specific modifications done to > handle_hvm_io_completion and allows generalizing the support for > long-running op

Re: [Xen-devel] [PATCH v1] x86/altp2m: Add hypercall to create a new view and set sve bits

2019-10-25 Thread Alexandru Stefan ISAILA
On 23.10.2019 14:58, Roger Pau Monné wrote: > On Wed, Oct 23, 2019 at 09:11:54AM +, Alexandru Stefan ISAILA wrote: >> >> >> On 03.09.2019 20:24, Tamas K Lengyel wrote: >>> On Tue, Sep 3, 2019 at 9:53 AM Jan Beulich wrote: On 02.09.2019 10:11, Alexandru Stefan ISAILA wrote: > --

Re: [Xen-devel] [PATCH v1] x86/altp2m: Add hypercall to create a new view and set sve bits

2019-10-25 Thread Alexandru Stefan ISAILA
On 25.10.2019 17:36, Alexandru Stefan ISAILA wrote: > > > On 23.10.2019 14:58, Roger Pau Monné wrote: >> On Wed, Oct 23, 2019 at 09:11:54AM +, Alexandru Stefan ISAILA wrote: >>> >>> >>> On 03.09.2019 20:24, Tamas K Lengyel wrote: On Tue, Sep 3, 2019 at 9:53 AM Jan Beulich wrote: >

Re: [Xen-devel] [PATCH v4 0/3] Optionally call EFI SetVirtualAddressMap()

2019-10-25 Thread Jürgen Groß
On 24.10.19 05:45, Marek Marczykowski-Górecki wrote: Workaround buggy UEFI accessing boot services memory after ExitBootServices(). Patches discussed here: https://lists.xenproject.org/archives/html/xen-devel/2019-08/msg00701.html In addition to the tests below, I've tested kexec on xen.efi with

Re: [Xen-devel] [PATCH] x86/VT-d: Misc initialisation cleanup

2019-10-25 Thread Jürgen Groß
On 24.10.19 19:27, Andrew Cooper wrote: * Initialise all spinlock fields together * No need for an atomic set_bit() to initialise domid_bitmap * Avoid using partial-line printk()'s. * Style fixes (too many, and too few spaces) No functional change. Signed-off-by: Andrew Cooper Releas

Re: [Xen-devel] [PATCH v3 2/7] xen/nospec: Use always_inline to fix code gen for evaluate_nospec

2019-10-25 Thread Andrew Cooper
On 25/10/2019 13:34, Jan Beulich wrote: > On 25.10.2019 14:10, Andrew Cooper wrote: >> On 25/10/2019 13:03, Jan Beulich wrote: >>> On 23.10.2019 15:58, Andrew Cooper wrote: evaluate_nospec() is incredibly fragile, and this is one giant bodge. To correctly protect jumps, the generated

Re: [Xen-devel] [PATCH v3 2/7] xen/nospec: Use always_inline to fix code gen for evaluate_nospec

2019-10-25 Thread Jan Beulich
On 25.10.2019 17:27, Andrew Cooper wrote: > On 25/10/2019 13:34, Jan Beulich wrote: >> On 25.10.2019 14:10, Andrew Cooper wrote: >>> The two choices to unblock 4.13 are this patch, or the previous version >>> which made CONFIG_HARDEN_BRANCH depend on BROKEN, which was even more >>> disliked. >> Opt

[Xen-devel] [OSSTEST PATCH 2/5] make-flight: Drop arm64 with Linux before 4.10

2019-10-25 Thread Ian Jackson
The driver for the laxtons' network cards is not in 4.4 (and that's quite old). Our ThunderX's may even require something more recent but we will cross that bridge when we see it. Effect is to drop the following jobs: linux-4.1 *arm64* linux-4.4 *arm64* linux-4.9 *arm64* (Checked by eyeb

[Xen-devel] [OSSTEST PATCH 4/5] adhoc-revtuple-generator: Bisecting over 5000 commits

2019-10-25 Thread Ian Jackson
Rather than merely 1000. Right now we have a troublesome FreeBSD build problem which needs this! Signed-off-by: Ian Jackson --- adhoc-revtuple-generator | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/adhoc-revtuple-generator b/adhoc-revtuple-generator index be3f3755..ac0f24

[Xen-devel] [OSSTEST PATCH 3/5] power_cycle_sleep: Change default sleep to 15s

2019-10-25 Thread Ian Jackson
5s is so short that when a host fails to respond we aren't sure if it was just very idle and ran off its PSU's internal energy storage for that period. Signed-off-by: Ian Jackson --- Osstest/TestSupport.pm | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Osstest/TestSupport.pm

[Xen-devel] [OSSTEST PATCH 1/5] make-flight: Rework arch_branch_filter_callback slightly

2019-10-25 Thread Ian Jackson
Now we have two lists of things not supported on ARM: one of branches where that's inherent in the branch somehow, and one for those where the kernel is simply too old. The latter are going to differ between armhf and arm64. No functional change. (Verified with standalone-generate-dump-flight-run

[Xen-devel] [OSSTEST PATCH 5/5] other_revision_job_suffix: disregard recursive FreeBSD builds

2019-10-25 Thread Ian Jackson
We aren't actually interested in bisecting the FreeBSD version (usually, the anointed version) which was used as the platform for the failed builds. We are thereby making the assumption that any build failure (or indeed test failure) is the result in changes to the recent FreeBSD being actually bu

[Xen-devel] [linux-linus test] 143128: regressions - trouble: broken/fail/pass

2019-10-25 Thread osstest service owner
flight 143128 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/143128/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow broken test-amd64-i386-xl-qemuu-win10-

Re: [Xen-devel] [OSSTEST PATCH 1/5] make-flight: Rework arch_branch_filter_callback slightly

2019-10-25 Thread Jürgen Groß
On 25.10.19 17:48, Ian Jackson wrote: Now we have two lists of things not supported on ARM: one of branches where that's inherent in the branch somehow, and one for those where the kernel is simply too old. The latter are going to differ between armhf and arm64. No functional change. (Verified

[Xen-devel] italia1 Re: [xen-unstable test] 143061: regressions - trouble: broken/fail/pass [and 1 more messages]

2019-10-25 Thread Ian Jackson
osstest service owner writes ("[linux-linus test] 143128: regressions - trouble: broken/fail/pass"): > flight 143128 linux-linus real [real] > http://logs.test-lab.xenproject.org/osstest/logs/143128/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which co

Re: [Xen-devel] Debugging Windows HVM crashes on Ryzen 3xxx series CPUs.

2019-10-25 Thread Andrew Cooper
On 24/10/2019 12:57, Steven Haigh wrote: > Hi all, > > I've managed to get the git master version of Xen on this affected > system and tries to boot a Windows Server 2016 system. It crashes as > per normal. > > I managed to get these logs, but I'm not quite sure what else to do to > debug this issu

[Xen-devel] [RFC XEN PATCH for-4.13 4/4] libxl_qmp: Have a lock for QMP socket access

2019-10-25 Thread Anthony PERARD
FIXME: The case where something failed when trying to acquired the lock isn't handled yet. This patch workaround the fact that it's not possible to connect multiple time to a single QMP socket. QEMU listen on the socket with a backlog value of 1, which mean that on Linux when concurrent thread

[Xen-devel] [RFC XEN PATCH for-4.13 3/4] libxl: libxl__ev_qmp_send now takes an egc

2019-10-25 Thread Anthony PERARD
No functionnal changes. Signed-off-by: Anthony PERARD --- tools/libxl/libxl_disk.c| 6 +++--- tools/libxl/libxl_dm.c | 8 tools/libxl/libxl_dom_save.c| 2 +- tools/libxl/libxl_dom_suspend.c | 2 +- tools/libxl/libxl_domain.c | 8 tools/libxl/libxl

[Xen-devel] [RFC XEN PATCH for-4.13 1/4] libxl: Introduce libxl__ev_child_kill

2019-10-25 Thread Anthony PERARD
Allow to kill a child and deregister the callback associated with it. The death isn't immediate will need to be collected later, so the ev_child machinery register its own callback. libxl__ev_child_kill() might be called by an AO operation that is finishing/cleaning up without a chance for libxl

[Xen-devel] [RFC XEN PATCH for-4.13 0/4] Fix: libxl workaround, multiple connection to single QMP socket

2019-10-25 Thread Anthony PERARD
Patch series available in this git branch: https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git br.fix-ev_qmp-multi-connect-v1 Hi, QEMU's QMP socket doesn't allow multiple concurrent connection. Also, it listen() on the socket with a `backlog' of only 1. On Linux at least, once that

[Xen-devel] [RFC XEN PATCH for-4.13 2/4] libxl: Introduce libxl__ev_qmplock

2019-10-25 Thread Anthony PERARD
This lock will be used to prevent concurrent access the QEMU's QMP socket. It is based on libxl__ev_devlock implementation and have the same properties. There is one addition to the ev_devlock API, libxl__ev_qmplock_dispose, which allow to cancel the lock operation while it is in Active state. Si

[Xen-devel] [xen-unstable test] 143133: regressions - FAIL

2019-10-25 Thread osstest service owner
flight 143133 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/143133/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-livepatch7 xen-boot fail REGR. vs. 142750 test-amd64-i386-qe

[Xen-devel] [xen-unstable-smoke test] 143165: tolerable all pass - PUSHED

2019-10-25 Thread osstest service owner
flight 143165 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/143165/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-armhf-armhf-xl 1

[Xen-devel] [linux-4.4 test] 143138: regressions - FAIL

2019-10-25 Thread osstest service owner
flight 143138 linux-4.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/143138/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvshim 18 guest-localmigrate/x10 fail REGR. vs. 139698 Tests which are faili

Re: [Xen-devel] [PATCH v3 2/7] xen/nospec: Use always_inline to fix code gen for evaluate_nospec

2019-10-25 Thread Norbert Manthey
On 10/25/19 17:40, Jan Beulich wrote: > On 25.10.2019 17:27, Andrew Cooper wrote: >> On 25/10/2019 13:34, Jan Beulich wrote: >>> On 25.10.2019 14:10, Andrew Cooper wrote: The two choices to unblock 4.13 are this patch, or the previous version which made CONFIG_HARDEN_BRANCH depend on BROK

[Xen-devel] [libvirt test] 143140: regressions - FAIL

2019-10-25 Thread osstest service owner
flight 143140 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/143140/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt-pair 11 xen-boot/dst_host fail REGR. vs. 143023 test-amd64-amd64-libvir

[Xen-devel] [xen-unstable-smoke test] 143178: tolerable all pass - PUSHED

2019-10-25 Thread osstest service owner
flight 143178 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/143178/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-armhf-armhf-xl 1

[Xen-devel] [XEN PATCH 0/3] read grubenv and set default from it

2019-10-25 Thread YOUNG, MICHAEL A.
This series of patches is to improve the parsing by pygrub of grub configuration on Fedora. The current result of parsing is generally that the second kernel listed is set as the default due to a set default=1 line in grub.cfg which is only intended to be reached after repeated boot failures. The

[Xen-devel] [XEN PATCH 3/3] Example Fedora 31 grub.cfg and grubenv files

2019-10-25 Thread YOUNG, MICHAEL A.
This patch adds an example grub.cfg and grubenv file for reference Signed-off-by: Michael Young --- tools/pygrub/examples/fedora-31.grub.cfg | 200 +++ tools/pygrub/examples/fedora-31.grubenv | 5 + 2 files changed, 205 insertions(+) create mode 100644 tools/pygrub/exampl

[Xen-devel] [XEN PATCH 2/3] read a grubenv file if it is next to the grub.cfg file

2019-10-25 Thread YOUNG, MICHAEL A.
When a grub.cfg file is found this patch checks if there is grubenv file in the same directory as the grub.cfg file. If there is it passes the contents to parse(). Signed-off-by: Michael Young --- tools/pygrub/src/pygrub | 21 ++--- 1 file changed, 18 insertions(+), 3 deletions(-

[Xen-devel] [XEN PATCH 1/3] set default kernel from grubenv next_entry or saved_entry

2019-10-25 Thread YOUNG, MICHAEL A.
This patch reads the contents of a grubenv file if available, and uses the value of next_entry (in preference) or of saved_entry to set the default kernel if there is a matching title or if it is a number. If either next_entry or saved_entry is set and neither is used then the default is set to 0.

[Xen-devel] [qemu-mainline test] 143143: regressions - FAIL

2019-10-25 Thread osstest service owner
flight 143143 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/143143/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvshim 20 guest-start/debian.repeat fail REGR. vs. 142915 Regressions which

[Xen-devel] [PATCH] tools/ocaml: Fix build error with Arch Linux

2019-10-25 Thread Petre Pircalabu
gcc (GCC) 9.2.0 complains: xentoollog_stubs.c: In function ‘stub_xtl_ocaml_vmessage’: xentoollog_stubs.c:93:16: error: initialization discards ‘const’ qualifier from pointer target type [-Werror=discarded-qualifiers] 93 | value *func = caml_named_value(xtl->vmessage_cb) ; |

[Xen-devel] [linux-linus bisection] complete test-amd64-i386-xl-xsm

2019-10-25 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-xl-xsm testid xen-boot Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git Tree: qemu g

[Xen-devel] [freebsd-master test] 143153: regressions - trouble: blocked/fail

2019-10-25 Thread osstest service owner
flight 143153 freebsd-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/143153/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-freebsd 7 freebsd-buildfail REGR. vs. 141501 Tests which did

Re: [Xen-devel] Debugging Windows HVM crashes on Ryzen 3xxx series CPUs.

2019-10-25 Thread Jürgen Groß
On 25.10.19 19:01, Andrew Cooper wrote: On 24/10/2019 12:57, Steven Haigh wrote: Hi all, I've managed to get the git master version of Xen on this affected system and tries to boot a Windows Server 2016 system. It crashes as per normal. I managed to get these logs, but I'm not quite sure what

[Xen-devel] [xen-4.12-testing test] 143155: regressions - FAIL

2019-10-25 Thread osstest service owner
flight 143155 xen-4.12-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/143155/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-multivcpu 7 xen-bootfail REGR. vs. 141776 Tests which di