Re: [Xen-devel] [BUG] Xen 4.13 rc1 can not boot up with new Domain0 kernel(linux5.4.0-rc3)

2019-11-05 Thread Zhang, JinwenX
> > Bug detailed description: > > > > Can not boot up xen with new Domain0 kernel(linux5.4.0-rc3) > > > > Environment : > > > > HW: Cascade Lake server > > Xen: XEN 4.13.0rc1 > > Dom0: Linux 5.4.0-rc3 > > > > Reproduce steps: > > > > 1. install Xen

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread David Hildenbrand
On 05.11.19 05:38, Dan Williams wrote: On Thu, Oct 24, 2019 at 5:11 AM David Hildenbrand wrote: Right now, ZONE_DEVICE memory is always set PG_reserved. We want to change that. KVM has this weird use case that you can map anything from /dev/mem into the guest. pfn_valid() is not a reliable ch

Re: [Xen-devel] [PATCH v1 01/10] mm/memory_hotplug: Don't allow to online/offline memory blocks with holes

2019-11-05 Thread David Hildenbrand
On 05.11.19 02:30, Dan Williams wrote: On Thu, Oct 24, 2019 at 5:10 AM David Hildenbrand wrote: Our onlining/offlining code is unnecessarily complicated. Only memory blocks added during boot can have holes (a range that is not IORESOURCE_SYSTEM_RAM). Hotplugged memory never has holes (e.g., se

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread David Hildenbrand
On 05.11.19 10:17, David Hildenbrand wrote: On 05.11.19 05:38, Dan Williams wrote: On Thu, Oct 24, 2019 at 5:11 AM David Hildenbrand wrote: Right now, ZONE_DEVICE memory is always set PG_reserved. We want to change that. KVM has this weird use case that you can map anything from /dev/mem int

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread David Hildenbrand
On 05.11.19 10:49, David Hildenbrand wrote: On 05.11.19 10:17, David Hildenbrand wrote: On 05.11.19 05:38, Dan Williams wrote: On Thu, Oct 24, 2019 at 5:11 AM David Hildenbrand wrote: Right now, ZONE_DEVICE memory is always set PG_reserved. We want to change that. KVM has this weird use cas

Re: [Xen-devel] [PATCH v1 09/10] mm/memory_hotplug: Don't mark pages PG_reserved when initializing the memmap

2019-11-05 Thread David Hildenbrand
On 04.11.19 23:44, Boris Ostrovsky wrote: On 10/24/19 8:09 AM, David Hildenbrand wrote: diff --git a/drivers/xen/balloon.c b/drivers/xen/balloon.c index 4f2e78a5e4db..af69f057913a 100644 --- a/drivers/xen/balloon.c +++ b/drivers/xen/balloon.c @@ -374,6 +374,13 @@ static void xen_online_page(stru

Re: [Xen-devel] [PATCH v1] libxl: fix crash in helper_done due to uninitialized data

2019-11-05 Thread Olaf Hering
Am Fri, 27 Sep 2019 18:17:12 +0100 schrieb Ian Jackson : > Olaf Hering writes ("[PATCH v1] libxl: fix crash in helper_done due to > uninitialized data"): > > A crash in helper_done, called from libxl_domain_suspend, was reported, > > libxl_aoutils.c:328:datacopier_writable: unexpected poll event

Re: [Xen-devel] [PATCH 2/3] x86/boot: Cache cpu_has_hypervisor very early on boot

2019-11-05 Thread Sergey Dyasli
On 01/11/2019 20:25, Andrew Cooper wrote: > We cache Long Mode and No Execute early on boot, so take the opportunity to > cache HYPERVISOR early as well. Either: 1. the description needs clarifying that the whole 1c featureset is being stored, or 2. a mask should be applied to store only the hy

Re: [Xen-devel] [PATCH v1 02/10] KVM: x86/mmu: Prepare kvm_is_mmio_pfn() for PG_reserved changes

2019-11-05 Thread David Hildenbrand
On 05.11.19 02:37, Dan Williams wrote: On Thu, Oct 24, 2019 at 5:10 AM David Hildenbrand wrote: Right now, ZONE_DEVICE memory is always set PG_reserved. We want to change that. KVM has this weird use case that you can map anything from /dev/mem into the guest. pfn_valid() is not a reliable ch

Re: [Xen-devel] [PATCH for-next v2 8/9] x86: be more verbose when running on a hypervisor

2019-11-05 Thread Wei Liu
On Wed, Oct 23, 2019 at 03:22:24PM +0200, Jan Beulich wrote: > On 21.10.2019 12:00, Roger Pau Monné wrote: > > On Mon, Sep 30, 2019 at 04:00:42PM +0100, Wei Liu wrote: > >> --- a/xen/include/asm-x86/guest/hypervisor.h > >> +++ b/xen/include/asm-x86/guest/hypervisor.h > >> @@ -36,6 +36,7 @@ bool hyp

Re: [Xen-devel] [XEN PATCH for-4.13] libxl: Fix setting vncpasswd to empty string

2019-11-05 Thread Wei Liu
On Mon, Nov 04, 2019 at 03:30:47PM +, Anthony PERARD wrote: > Before 93dcc22, error from setting the vnc password to an empty > string, when QEMU wasn't expected a password, never prevented the creation > of a guest, and only logged an error message. > > Reported-by: Roger Pau Monné > Fixes:

[Xen-devel] [linux-4.9 test] 143630: regressions - FAIL

2019-11-05 Thread osstest service owner
flight 143630 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/143630/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt-vhd 17 guest-start/debian.repeat fail REGR. vs. 142947 test-amd64-i386-xl-r

[Xen-devel] [PATCH V1 2/2] x86/mm: Make use of the default access param from xc_altp2m_create_view

2019-11-05 Thread Alexandru Stefan ISAILA
At this moment the default_access param from xc_altp2m_create_view is not used. This patch assigns default_access to p2m->default_access at the time of initializing a new altp2m view. Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/hvm.c| 3 ++- xen/arch/x86/mm/p2m-ept.c

[Xen-devel] [PATCH V1 1/2] x86/altp2m: Add hypercall to set a range of sve bits

2019-11-05 Thread Alexandru Stefan ISAILA
By default the sve bits are not set. This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(), to set a range of sve bits. The core function, p2m_set_suppress_ve_multi(), does not brake in case of a error and it is doing a best effort for setting the bits in the given range. A check for co

[Xen-devel] [XEN PATCH v2] MAINTAINERS: ARINC 653 scheduler maintainer updates

2019-11-05 Thread Stewart Hildebrand
Add DornerWorks internal list. This will forward to relevant people within DornerWorks. Add myself to MAINTAINERS for ARINC653 scheduler. Remove Robbie from MAINTAINERS for ARINC653 scheduler. --- Note that get_maintainers.pl/add_maintainers.pl do not currently add the DornerWorks list email ad

[Xen-devel] [linux-4.14 test] 143610: regressions - FAIL

2019-11-05 Thread osstest service owner
flight 143610 linux-4.14 real [real] http://logs.test-lab.xenproject.org/osstest/logs/143610/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow2 19 guest-start/debian.repeat fail REGR. vs. 142849 test-amd64-amd64-lib

[Xen-devel] [PULL 2/4] hw/misc/grlib_ahb_apb_pnp: Fix 8-bit accesses

2019-11-05 Thread Laurent Vivier
From: Philippe Mathieu-Daudé The Plug & Play region of the AHB/APB bridge can be accessed by various word size, however the implementation is clearly restricted to 32-bit: static uint64_t grlib_apb_pnp_read(void *opaque, hwaddr offset, unsigned size) { APBPnp *apb_pnp = GRLIB_APB_PNP(o

[Xen-devel] [PULL 4/4] global: Squash 'the the'

2019-11-05 Thread Laurent Vivier
From: "Dr. David Alan Gilbert" 'the' has a tendency to double up; squash them back down. Signed-off-by: Dr. David Alan Gilbert Reviewed-by: Alex Bennée Reviewed-by: Laurent Vivier Reviewed-by: Philippe Mathieu-Daudé Message-Id: <20191104185202.102504-1-dgilb...@redhat.com> Signed-off-by: Lau

[Xen-devel] [PULL 1/4] hw/misc/grlib_ahb_apb_pnp: Avoid crash when writing to PnP registers

2019-11-05 Thread Laurent Vivier
From: Philippe Mathieu-Daudé Guests can crash QEMU when writting to PnP registers: $ echo 'writeb 0x800ff042 69' | qemu-system-sparc -M leon3_generic -S -bios /etc/magic -qtest stdio [I 1571938309.932255] OPENED [R +0.063474] writeb 0x800ff042 69 Segmentation fault (core dumped) (gdb

[Xen-devel] [PULL 3/4] qom: Fix error message in object_class_property_add()

2019-11-05 Thread Laurent Vivier
From: Greg Kurz The error message in object_class_property_add() was copied from object_property_add() in commit 16bf7f522a2ff. Clarify that it is about a class, not an object. While here, have the format string in both functions to fit in a single line for better grep-ability, despite the check

[Xen-devel] [PULL 0/4] Trivial branch patches

2019-11-05 Thread Laurent Vivier
ial-branch-pull-request for you to fetch changes up to a37a36a11b584e083b1c578f1d60e6e0f7878d5f: global: Squash 'the the' (2019-11-05 15:06:09 +0100) Tri

Re: [Xen-devel] [PATCH v2 08/15] xen/gntdev: Use select for DMA_SHARED_BUFFER

2019-11-05 Thread Jürgen Groß
On 01.11.19 19:26, Jason Gunthorpe wrote: On Mon, Oct 28, 2019 at 05:10:25PM -0300, Jason Gunthorpe wrote: From: Jason Gunthorpe DMA_SHARED_BUFFER can not be enabled by the user (it represents a library set in the kernel). The kconfig convention is to use select for such symbols so they are tu

Re: [Xen-devel] [XEN PATCH v2] MAINTAINERS: ARINC 653 scheduler maintainer updates

2019-11-05 Thread Wei Liu
On Tue, Nov 05, 2019 at 08:51:52AM -0500, Stewart Hildebrand wrote: > Add DornerWorks internal list. This will forward to relevant people > within DornerWorks. > > Add myself to MAINTAINERS for ARINC653 scheduler. > > Remove Robbie from MAINTAINERS for ARINC653 scheduler. > Missing SoB here. N

Re: [Xen-devel] [PATCH V1 2/2] x86/mm: Make use of the default access param from xc_altp2m_create_view

2019-11-05 Thread Tamas K Lengyel
On Tue, Nov 5, 2019 at 5:43 AM Alexandru Stefan ISAILA wrote: > > At this moment the default_access param from xc_altp2m_create_view is > not used. > > This patch assigns default_access to p2m->default_access at the time of > initializing a new altp2m view. > > Signed-off-by: Alexandru Isaila Re

Re: [Xen-devel] [PATCH v2 09/15] xen/gntdev: use mmu_range_notifier_insert

2019-11-05 Thread Boris Ostrovsky
On 11/4/19 9:31 PM, Jason Gunthorpe wrote: > On Mon, Nov 04, 2019 at 05:03:31PM -0500, Boris Ostrovsky wrote: >> On 10/28/19 4:10 PM, Jason Gunthorpe wrote: >>> @@ -445,17 +438,9 @@ static void gntdev_vma_close(struct vm_area_struct >>> *vma) >>> struct gntdev_priv *priv = file->private_data;

Re: [Xen-devel] [PATCH V1 1/2] x86/altp2m: Add hypercall to set a range of sve bits

2019-11-05 Thread Tamas K Lengyel
On Tue, Nov 5, 2019 at 5:43 AM Alexandru Stefan ISAILA wrote: > > By default the sve bits are not set. > This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(), > to set a range of sve bits. > The core function, p2m_set_suppress_ve_multi(), does not brake in case > of a error and it is

[Xen-devel] [ovmf test] 143689: all pass - PUSHED

2019-11-05 Thread osstest service owner
flight 143689 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/143689/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 8d3f428109623096cb8845779cdf9dc44949b8e9 baseline version: ovmf e2fc50812895b17e8b23f

Re: [Xen-devel] [PATCH V1 1/2] x86/altp2m: Add hypercall to set a range of sve bits

2019-11-05 Thread Alexandru Stefan ISAILA
On 05.11.2019 17:18, Tamas K Lengyel wrote: > On Tue, Nov 5, 2019 at 5:43 AM Alexandru Stefan ISAILA > wrote: >> >> By default the sve bits are not set. >> This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(), >> to set a range of sve bits. >> The core function, p2m_set_suppress_ve_

Re: [Xen-devel] [XEN PATCH v2] MAINTAINERS: ARINC 653 scheduler maintainer updates

2019-11-05 Thread Stewart Hildebrand
On Tuesday, November 5, 2019 10:09 AM, Wei Liu wrote: >On Tue, Nov 05, 2019 at 08:51:52AM -0500, Stewart Hildebrand wrote: >> Add DornerWorks internal list. This will forward to relevant people >> within DornerWorks. >> >> Add myself to MAINTAINERS for ARINC653 scheduler. >> >> Remove Robbie from M

Re: [Xen-devel] [PATCH V1 1/2] x86/altp2m: Add hypercall to set a range of sve bits

2019-11-05 Thread George Dunlap
On 11/5/19 12:43 PM, Alexandru Stefan ISAILA wrote: > By default the sve bits are not set. > This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(), > to set a range of sve bits. > The core function, p2m_set_suppress_ve_multi(), does not brake in case > of a error and it is doing a best

[Xen-devel] [PATCH] create-diff-object: more precisely identify .rodata sections

2019-11-05 Thread Pawel Wieczorkiewicz
This is needed for more precise patchability verification. Only non-special .rodata sections should be subject for such a non-referenced check in kpatch_verify_patchability(). Current check (non-standard, non-rela, non-debug) is too weak and allows also non-rodata sections without referenced symbol

[Xen-devel] [PATCH] create-diff-object: do not strip STN_UNDEF symbols from *.fixup

2019-11-05 Thread Pawel Wieczorkiewicz
The rela groups in the *.fixup sections vary in size. That makes it more complex to handle in the livepatch_strip_undefined_elements(). It is also unnecessary as the .fixup sections are unlikely to have any STN_UNDEF symbols anyway. Signed-off-by: Pawel Wieczorkiewicz --- create-diff-object.c |

Re: [Xen-devel] [PATCH V1 2/2] x86/mm: Make use of the default access param from xc_altp2m_create_view

2019-11-05 Thread George Dunlap
On 11/5/19 12:43 PM, Alexandru Stefan ISAILA wrote: > At this moment the default_access param from xc_altp2m_create_view is > not used. Weird! > > This patch assigns default_access to p2m->default_access at the time of > initializing a new altp2m view. > > Signed-off-by: Alexandru Isaila Acke

Re: [Xen-devel] [PATCH V1 1/2] x86/altp2m: Add hypercall to set a range of sve bits

2019-11-05 Thread Alexandru Stefan ISAILA
>> >> +/* >> + * Set/clear the #VE suppress bit for multiple pages. Only available on >> VMX. >> + */ >> +long p2m_set_suppress_ve_multi(struct domain *d, uint32_t start, uint32_t >> nr, >> + bool suppress_ve, unsigned int altp2m_idx) >> +{ >> +struct p2m_do

Re: [Xen-devel] [PATCH V1 2/2] x86/mm: Make use of the default access param from xc_altp2m_create_view

2019-11-05 Thread Alexandru Stefan ISAILA
On 05.11.2019 17:38, George Dunlap wrote: > On 11/5/19 12:43 PM, Alexandru Stefan ISAILA wrote: >> At this moment the default_access param from xc_altp2m_create_view is >> not used. > > Weird! Indeed, it was bugging me every time I passed throughout that code. Alex > >> >> This patch assigns

Re: [Xen-devel] [PULL 0/4] Trivial branch patches

2019-11-05 Thread no-reply
Patchew URL: https://patchew.org/QEMU/20191105144247.10301-1-laur...@vivier.eu/ Hi, This series seems to have some coding style problems. See output below for more information: Subject: [PULL 0/4] Trivial branch patches Type: series Message-id: 20191105144247.10301-1-laur...@vivier.eu === TES

Re: [Xen-devel] [PULL 0/4] Trivial branch patches

2019-11-05 Thread Laurent Vivier
Greg, Dave, could you fix that? Thanks, Laurent Le 05/11/2019 à 16:48, no-re...@patchew.org a écrit : > Patchew URL: > https://patchew.org/QEMU/20191105144247.10301-1-laur...@vivier.eu/ > > > > Hi, > > This series seems to have some coding style problems. See output below for > more informa

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread Sean Christopherson
On Tue, Nov 05, 2019 at 11:02:46AM +0100, David Hildenbrand wrote: > On 05.11.19 10:49, David Hildenbrand wrote: > >On 05.11.19 10:17, David Hildenbrand wrote: > >>On 05.11.19 05:38, Dan Williams wrote: > >>>On Thu, Oct 24, 2019 at 5:11 AM David Hildenbrand wrote: > > Right now, ZONE_DEVI

Re: [Xen-devel] [BUG] Invalid guest state in Xen master, dom0 linux-5.3.6, domU windows 10

2019-11-05 Thread Håkon Alstadheim
Den 05.11.2019 02:15, skrev Andrew Cooper: On 05/11/2019 00:25, Andrew Cooper wrote: On 04/11/2019 23:42, Andrew Cooper wrote: On 04/11/2019 23:20, Håkon Alstadheim wrote: (XEN) RFLAGS=0x0193 (0x0193)  DR7 = 0x0400 (XEN) *** Insn bytes from b8868f61d69a: 44 00 00 8c d

Re: [Xen-devel] [PULL 0/4] Trivial branch patches

2019-11-05 Thread Dr. David Alan Gilbert
* Laurent Vivier (laur...@vivier.eu) wrote: > Greg, Dave, > > could you fix that? > > Thanks, > Laurent > > Le 05/11/2019 à 16:48, no-re...@patchew.org a écrit : > > Patchew URL: > > https://patchew.org/QEMU/20191105144247.10301-1-laur...@vivier.eu/ > > > > > > > > Hi, > > > > This series s

Re: [Xen-devel] [PATCH v1 09/10] mm/memory_hotplug: Don't mark pages PG_reserved when initializing the memmap

2019-11-05 Thread Boris Ostrovsky
On 11/5/19 5:18 AM, David Hildenbrand wrote: > On 04.11.19 23:44, Boris Ostrovsky wrote: >> On 10/24/19 8:09 AM, David Hildenbrand wrote: >>> diff --git a/drivers/xen/balloon.c b/drivers/xen/balloon.c >>> index 4f2e78a5e4db..af69f057913a 100644 >>> --- a/drivers/xen/balloon.c >>> +++ b/drivers/xen/

Re: [Xen-devel] [PULL 0/4] Trivial branch patches

2019-11-05 Thread Laurent Vivier
Le 05/11/2019 à 17:03, Dr. David Alan Gilbert a écrit : > * Laurent Vivier (laur...@vivier.eu) wrote: >> Greg, Dave, >> >> could you fix that? >> >> Thanks, >> Laurent >> >> Le 05/11/2019 à 16:48, no-re...@patchew.org a écrit : >>> Patchew URL: >>> https://patchew.org/QEMU/20191105144247.10301-1-l

[Xen-devel] [linux-4.19 test] 143600: regressions - FAIL

2019-11-05 Thread osstest service owner
flight 143600 linux-4.19 real [real] http://logs.test-lab.xenproject.org/osstest/logs/143600/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow2 19 guest-start/debian.repeat fail REGR. vs. 142932 test-amd64-amd64-lib

[Xen-devel] [PULL v2 0/3] Trivial branch patches

2019-11-05 Thread Laurent Vivier
ial-branch-pull-request for you to fetch changes up to e187e55ec65039ed6bd982debee632450ace3bae: global: Squash 'the the' (2019-11-05 18:39:14 +0100) Trivia

[Xen-devel] [PULL v2 1/3] hw/misc/grlib_ahb_apb_pnp: Avoid crash when writing to PnP registers

2019-11-05 Thread Laurent Vivier
From: Philippe Mathieu-Daudé Guests can crash QEMU when writting to PnP registers: $ echo 'writeb 0x800ff042 69' | qemu-system-sparc -M leon3_generic -S -bios /etc/magic -qtest stdio [I 1571938309.932255] OPENED [R +0.063474] writeb 0x800ff042 69 Segmentation fault (core dumped) (gdb

[Xen-devel] [PULL v2 3/3] global: Squash 'the the'

2019-11-05 Thread Laurent Vivier
From: "Dr. David Alan Gilbert" 'the' has a tendency to double up; squash them back down. Signed-off-by: Dr. David Alan Gilbert Reviewed-by: Alex Bennée Reviewed-by: Laurent Vivier Reviewed-by: Philippe Mathieu-Daudé Message-Id: <20191104185202.102504-1-dgilb...@redhat.com> Signed-off-by: Lau

[Xen-devel] [PULL v2 2/3] hw/misc/grlib_ahb_apb_pnp: Fix 8-bit accesses

2019-11-05 Thread Laurent Vivier
From: Philippe Mathieu-Daudé The Plug & Play region of the AHB/APB bridge can be accessed by various word size, however the implementation is clearly restricted to 32-bit: static uint64_t grlib_apb_pnp_read(void *opaque, hwaddr offset, unsigned size) { APBPnp *apb_pnp = GRLIB_APB_PNP(o

Re: [Xen-devel] [PULL 0/4] Trivial branch patches

2019-11-05 Thread no-reply
Patchew URL: https://patchew.org/QEMU/20191105144247.10301-1-laur...@vivier.eu/ Hi, This series seems to have some coding style problems. See output below for more information: Subject: [PULL 0/4] Trivial branch patches Type: series Message-id: 20191105144247.10301-1-laur...@vivier.eu === TES

[Xen-devel] [linux-4.4 test] 143646: regressions - FAIL

2019-11-05 Thread osstest service owner
flight 143646 linux-4.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/143646/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow2 19 guest-start/debian.repeat fail REGR. vs. 139698 test-amd64-amd64-libv

Re: [Xen-devel] [PULL v2 0/3] Trivial branch patches

2019-11-05 Thread no-reply
Patchew URL: https://patchew.org/QEMU/20191105175010.2591-1-laur...@vivier.eu/ Hi, This series seems to have some coding style problems. See output below for more information: Subject: [Xen-devel] [PULL v2 0/3] Trivial branch patches Type: series Message-id: 20191105175010.2591-1-laur...@vivie

[Xen-devel] [PATCH 2/2] x86/livepatch: Prevent patching with active waitqueues

2019-11-05 Thread Andrew Cooper
The safety of livepatching depends on every stack having been unwound, but there is one corner case where this is not true. The Sharing/Paging/Monitor infrastructure may use waitqueues, which copy the stack frame sideways and longjmp() to a different vcpu. This case is rare, and can be worked aro

[Xen-devel] [PATCH for-4.13 0/2] xen/livepatch: Safety fixes

2019-11-05 Thread Andrew Cooper
This pair of patches is long overdue being posted upstream. For several years now, XenServer has shipped the 2nd patch as a safety check (seeing as we have both livepatching and introspection), implemented with some return address manipulation to turn a void load hook into one which can return -EB

[Xen-devel] [PATCH 1/2] xen/livepatch: Add a return value to load hooks

2019-11-05 Thread Andrew Cooper
One use of load hooks is to perform a safety check of the system in its quiesced state. Any non-zero return value from a load hook will abort the apply attempt. Signed-off-by: Andrew Cooper --- CC: Konrad Rzeszutek Wilk CC: Ross Lagerwall CC: Juergen Gross For several years, the following pa

[Xen-devel] [linux-linus test] 143581: regressions - FAIL

2019-11-05 Thread osstest service owner
flight 143581 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/143581/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs. 133580 test-amd64-i38

[Xen-devel] [PATCH v1.5] x86/livepatch: Prevent patching with active waitqueues

2019-11-05 Thread Andrew Cooper
The safety of livepatching depends on every stack having been unwound, but there is one corner case where this is not true. The Sharing/Paging/Monitor infrastructure may use waitqueues, which copy the stack frame sideways and longjmp() to a different vcpu. This case is rare, and can be worked aro

Re: [Xen-devel] [PULL v2 0/3] Trivial branch patches

2019-11-05 Thread Laurent Vivier
Le 05/11/2019 à 20:20, no-re...@patchew.org a écrit : > Patchew URL: https://patchew.org/QEMU/20191105175010.2591-1-laur...@vivier.eu/ > > > > Hi, > > This series seems to have some coding style problems. See output below for > more information: > > Subject: [Xen-devel] [PULL v2 0/3] Trivial b

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread David Hildenbrand
I think I know what's going wrong: Pages that are pinned via gfn_to_pfn() and friends take a references, however are often released via kvm_release_pfn_clean()/kvm_release_pfn_dirty()/kvm_release_page_clean()... E.g., in arch/x86/kvm/x86.c:reexecute_instruction() ... pfn = gfn_to_pfn(vcpu->kvm

[Xen-devel] [freebsd-master test] 143704: regressions - trouble: blocked/fail

2019-11-05 Thread osstest service owner
flight 143704 freebsd-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/143704/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-freebsd 7 freebsd-buildfail REGR. vs. 141501 Tests which did

Re: [Xen-devel] [PATCH v2 01/15] mm/mmu_notifier: define the header pre-processor parts even if disabled

2019-11-05 Thread John Hubbard
On 10/28/19 1:10 PM, Jason Gunthorpe wrote: > From: Jason Gunthorpe > > Now that we have KERNEL_HEADER_TEST all headers are generally compile > tested, so relying on makefile tricks to avoid compiling code that depends > on CONFIG_MMU_NOTIFIER is more annoying. > > Instead follow the usual patte

Re: [Xen-devel] [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes

2019-11-05 Thread H. Peter Anvin
On 2019-11-04 07:13, Daniel Kiper wrote: > Hi, > > Due to very limited space in the setup_header this patch series introduces new > kernel_info struct which will be used to convey information from the kernel to > the bootloader. This way the boot protocol can be extended regardless of the > setup_

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread Sean Christopherson
On Tue, Nov 05, 2019 at 09:30:53PM +0100, David Hildenbrand wrote: > >>>I think I know what's going wrong: > >>> > >>>Pages that are pinned via gfn_to_pfn() and friends take a references, > >>>however are often released via > >>>kvm_release_pfn_clean()/kvm_release_pfn_dirty()/kvm_release_page_clean

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread Dan Williams
On Tue, Nov 5, 2019 at 12:31 PM David Hildenbrand wrote: > > >>> I think I know what's going wrong: > >>> > >>> Pages that are pinned via gfn_to_pfn() and friends take a references, > >>> however are often released via > >>> kvm_release_pfn_clean()/kvm_release_pfn_dirty()/kvm_release_page_clean().

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread Sean Christopherson
On Tue, Nov 05, 2019 at 03:02:40PM -0800, Dan Williams wrote: > On Tue, Nov 5, 2019 at 12:31 PM David Hildenbrand wrote: > > > The scarier code (for me) is transparent_hugepage_adjust() and > > > kvm_mmu_zap_collapsible_spte(), as I don't at all understand the > > > interaction between THP and _PA

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread Dan Williams
On Tue, Nov 5, 2019 at 3:13 PM Sean Christopherson wrote: > > On Tue, Nov 05, 2019 at 03:02:40PM -0800, Dan Williams wrote: > > On Tue, Nov 5, 2019 at 12:31 PM David Hildenbrand wrote: > > > > The scarier code (for me) is transparent_hugepage_adjust() and > > > > kvm_mmu_zap_collapsible_spte(), a

[Xen-devel] [xen-4.12-testing test] 143677: regressions - FAIL

2019-11-05 Thread osstest service owner
flight 143677 xen-4.12-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/143677/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-raw 19 guest-start/debian.repeat fail REGR. vs. 143190 test-amd64-amd

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread Sean Christopherson
On Tue, Nov 05, 2019 at 03:30:00PM -0800, Dan Williams wrote: > On Tue, Nov 5, 2019 at 3:13 PM Sean Christopherson > wrote: > > > > On Tue, Nov 05, 2019 at 03:02:40PM -0800, Dan Williams wrote: > > > On Tue, Nov 5, 2019 at 12:31 PM David Hildenbrand > > > wrote: > > > > > The scarier code (for m

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread Dan Williams
On Tue, Nov 5, 2019 at 3:30 PM Dan Williams wrote: > > On Tue, Nov 5, 2019 at 3:13 PM Sean Christopherson > wrote: > > > > On Tue, Nov 05, 2019 at 03:02:40PM -0800, Dan Williams wrote: > > > On Tue, Nov 5, 2019 at 12:31 PM David Hildenbrand > > > wrote: > > > > > The scarier code (for me) is tr

Re: [Xen-devel] [PATCH] tools: pygrub actually cross-compiles just fine

2019-11-05 Thread Stefano Stabellini
+ xen-devel On Tue, 5 Nov 2019, Stefano Stabellini wrote: > Actually, pygrub cross-compiles without issues. The cross-compilation > work-around goes back to 2005 and it probably referred to PowerPC. > > Remove the work-around now. > > Signed-off-by: Stefano Stabellini > CC: Christopher Clark >

[Xen-devel] Urgent for 4.13, Was dom0less + sched=null => broken in staging (fwd)

2019-11-05 Thread Stefano Stabellini
Hi Dario, I just checked and the patch is not in staging yet. Can we please make sure the patch goes in as soon as possible, given the looming release? Cheers, Stefano -- Forwarded message -- Date: Mon, 28 Oct 2019 11:40:23 -0700 (PDT) From: Stefano Stabellini To: Dario Faggiol

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread Sean Christopherson
On Tue, Nov 05, 2019 at 03:43:29PM -0800, Dan Williams wrote: > On Tue, Nov 5, 2019 at 3:30 PM Dan Williams wrote: > > > > On Tue, Nov 5, 2019 at 3:13 PM Sean Christopherson > > wrote: > > > > > > On Tue, Nov 05, 2019 at 03:02:40PM -0800, Dan Williams wrote: > > > > On Tue, Nov 5, 2019 at 12:31 P

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread Dan Williams
On Tue, Nov 5, 2019 at 4:03 PM Sean Christopherson wrote: > > On Tue, Nov 05, 2019 at 03:43:29PM -0800, Dan Williams wrote: > > On Tue, Nov 5, 2019 at 3:30 PM Dan Williams > > wrote: > > > > > > On Tue, Nov 5, 2019 at 3:13 PM Sean Christopherson > > > wrote: > > > > > > > > On Tue, Nov 05, 2019

[Xen-devel] [xen-4.10-testing test] 143729: regressions - trouble: fail/pass/starved

2019-11-05 Thread osstest service owner
flight 143729 xen-4.10-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/143729/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow2 19 guest-start/debian.repeat fail REGR. vs. 139091 test-amd64-amd

[Xen-devel] [xtf test] 143721: all pass - PUSHED

2019-11-05 Thread osstest service owner
flight 143721 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/143721/ Perfect :-) All tests in this flight passed as required version targeted for testing: xtf 08a19af3c78e8a03f83bc354b50545136c03edd2 baseline version: xtf 1b74ec3374a6edf32f

[Xen-devel] [PATCH 1/1] kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 10 (64 bit)

2019-11-05 Thread Julian Tuminaro
From: "julian.tumin...@gmail.com" Current implementation of find_os is based on the hard-coded values for different Windows version. It uses the value for get the address to start looking for DOS header in the given specified range. However, this is not scalable to all version of Windows as it w

[Xen-devel] [xen-4.8-testing test] 143733: regressions - trouble: fail/pass/starved

2019-11-05 Thread osstest service owner
flight 143733 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/143733/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 15 guest-saverestore.2 fail REGR. vs. 138829

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-05 Thread David Hildenbrand
On 06.11.19 01:08, Dan Williams wrote: On Tue, Nov 5, 2019 at 4:03 PM Sean Christopherson wrote: On Tue, Nov 05, 2019 at 03:43:29PM -0800, Dan Williams wrote: On Tue, Nov 5, 2019 at 3:30 PM Dan Williams wrote: On Tue, Nov 5, 2019 at 3:13 PM Sean Christopherson wrote: On Tue, Nov 05, 201