On 10/06/2020 22:47, Julien Grall wrote:
On Wed, 10 Jun 2020 at 19:49, Jürgen Groß wrote:
On 10.06.20 19:55, Julien Grall wrote:
Hi Juergen,
On 09/06/2020 16:45, Juergen Gross wrote:
Writing the runtime parameters loglvl or guest_loglvl omits setting the
new length of the resulting param
flight 151016 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151016/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds 12 guest-start fail REGR. vs. 150931
Tests which did not succeed,
On 11/06/2020 04:55, Jason Andryuk wrote:
> The hardcoded tpm_signature is too restrictive to detect many TPMs. For
> instance, it doesn't accept a QEMU emulated TPM (VID 0x1014 DID 0x0001).
> Make the TPM detection match that in rombios which accepts a wider
> range.
>
> With this change, the TPM
Use $(BASEDIR)/include instead of $(XEN_ROOT)/xen/include for the
include path to be coherent with the rest of the Makefiles.
Signed-off-by: Bertrand Marquis
---
xen/arch/x86/boot/build32.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/boot/build32.mk b/xen/ar
Add MIDR and CPU part numbers for Arm Neoverse N1 processor
Signed-off-by: Bertrand Marquis
---
xen/include/asm-arm/processor.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/asm-arm/processor.h b/xen/include/asm-arm/processor.h
index aa642e3ab2..3ca67f8157 100644
--- a/xen/in
This serie is introducing changes to convert runstate address virtual
address provided by a guest during the hypercall on Arm.
It keeps the current strategy on x86 but moves some of the common code
inside the architecture code.
The serie is divided in 2 patches to allow an easier review of the
spec
At the moment on Arm, a Linux guest running with KTPI enabled will
cause the following error when a context switch happens in user mode:
(XEN) p2m.c:1890: d1v0: Failed to walk page-table va 0xff837ebe0cd0
This patch is modifying the register runstate area handling on arm to
convert the guest a
Add support for runstate area register with the structure crossing pages
The code is storing up to 2 pages reference during the hypercall.
During a context switch, the code is computing where the
state_entry_time is and is breaking the memcpy in 2 parts when it is
required.
Signed-off-by: Bertrand
> -Original Message-
> From: Andrew Cooper
> Sent: 11 June 2020 12:52
> To: Jason Andryuk ; xen-devel@lists.xenproject.org
> Cc: Ian Jackson ; Wei Liu ; Jan
> Beulich ;
> Paul Durrant
> Subject: Re: [PATCH] libacpi: Widen TPM detection
>
> On 11/06/2020 04:55, Jason Andryuk wrote:
> > T
On 6/10/20 3:50 PM, Julien Grall wrote:
> On 10/06/2020 09:13, Oleksandr Andrushchenko wrote:
>> Hello,
>
> Hi,
>
>> While adding support for para-virtualized block device in u-boot
>>
>> I faced an issue with HYPERVISOR_console_io + CONSOLEIO_write.
>>
>> I tried to use the hypercall during MMU s
From: Colin Ian King
The variable irq is being initialized with a value that is never read
and it is being updated later with a new value. The initialization is
redundant and can be removed.
Addresses-Coverity: ("Unused value")
Signed-off-by: Colin Ian King
---
arch/x86/pci/xen.c | 2 +-
1 fi
Hi,
SeaBIOS commit 67643955c746 (make SeaBios compatible with Xen vTPM.)
made tpm_start() exit before calling tpm_startup(). The commit
message has no explanation why this change was made. Does anyone
remember why it was made?
The code today means SeaBIOS will not populate PCRs when running on
Hi,
On 11/06/2020 13:18, Oleksandr Andrushchenko wrote:
On 6/10/20 3:50 PM, Julien Grall wrote:
On 10/06/2020 09:13, Oleksandr Andrushchenko wrote:
Hello,
Hi,
While adding support for para-virtualized block device in u-boot
I faced an issue with HYPERVISOR_console_io + CONSOLEIO_write.
Hi Bertrand,
On 11/06/2020 12:54, Bertrand Marquis wrote:
Add MIDR and CPU part numbers for Arm Neoverse N1 processor
The MIDR and CPU part listed are only there because we need to use them
for errata. This is not the list of processors we support :).
So I would prefer to introduce the new
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2020-0543 / XSA-320
version 2
Special Register Buffer speculative side channel
UPDATES IN VERSION 2
Add a link to Intel's cross reference of affect
> -Original Message-
> From: Julien Grall
> Sent: 11 June 2020 10:20
> To: Julien Grall ; Jürgen Groß ;
> Paul Durrant
>
> Cc: xen-devel ; Andrew Cooper
> ; George
> Dunlap ; Ian Jackson ;
> Jan Beulich
> ; Stefano Stabellini ; Wei Liu
>
> Subject: Re: [PATCH for-4.14] xen/hypfs: fix
On Tue, Nov 26, 2019 at 10:14 AM Pawel Wieczorkiewicz
wrote:
> This series introduces new features to the livepatch functionality as
> briefly discussed during Xen Developer Summit 2019: [a] and [b].
> It also provides a few fixes and some small improvements.
>
> Main changes in v6:
> - Added mis
On 6/11/20 8:36 AM, Jason Andryuk wrote:
Hi,
SeaBIOS commit 67643955c746 (make SeaBios compatible with Xen vTPM.)
made tpm_start() exit before calling tpm_startup(). The commit
message has no explanation why this change was made. Does anyone
remember why it was made?
The code today means SeaB
> On 11 Jun 2020, at 14:09, Julien Grall wrote:
>
> Hi Bertrand,
>
> On 11/06/2020 12:54, Bertrand Marquis wrote:
>> Add MIDR and CPU part numbers for Arm Neoverse N1 processor
>
> The MIDR and CPU part listed are only there because we need to use them for
> errata. This is not the list of
On 11.06.20 16:57, Julien Grall wrote:
Hi all,
kexec-tools has an option to load dynamically libxenctlr.so (not
.so.4.x) (see [1]).
Given that the library has never been considered stable, it is probably
a disaster that is waiting to happen.
Looking at the tree kexec is using the follow li
On 20.05.20 17:56, Roger Pau Monné wrote:
On Wed, May 20, 2020 at 03:49:59PM +0100, Ian Jackson wrote:
Juergen Gross writes ("[PATCH] tools/libxengnttab: correct size of allocated
memory"):
The size of the memory allocated for the IOCTL_GNTDEV_MAP_GRANT_REF
ioctl() parameters is calculated wro
Hi,
On 11/06/2020 16:21, Jürgen Groß wrote:
On 11.06.20 16:57, Julien Grall wrote:
Hi all,
kexec-tools has an option to load dynamically libxenctlr.so (not
.so.4.x) (see [1]).
Given that the library has never been considered stable, it is
probably a disaster that is waiting to happen.
Lo
On 11.06.20 17:27, Julien Grall wrote:
Hi,
On 11/06/2020 16:21, Jürgen Groß wrote:
On 11.06.20 16:57, Julien Grall wrote:
Hi all,
kexec-tools has an option to load dynamically libxenctlr.so (not
.so.4.x) (see [1]).
Given that the library has never been considered stable, it is
probably a
On 11/06/2020 16:35, Jürgen Groß wrote:
On 11.06.20 17:27, Julien Grall wrote:
Hi,
On 11/06/2020 16:21, Jürgen Groß wrote:
On 11.06.20 16:57, Julien Grall wrote:
Hi all,
kexec-tools has an option to load dynamically libxenctlr.so (not
.so.4.x) (see [1]).
Given that the library has neve
> -Original Message-
> From: Xen-devel On Behalf Of Jürgen
> Groß
> Sent: 11 June 2020 16:26
> To: Roger Pau Monné ; Ian Jackson
>
> Cc: xen-devel@lists.xenproject.org; Wei Liu
> Subject: Re: [PATCH] tools/libxengnttab: correct size of allocated memory
>
> On 20.05.20 17:56, Roger Pau
On 11/06/2020 12:54, Bertrand Marquis wrote:
> Use $(BASEDIR)/include instead of $(XEN_ROOT)/xen/include for the
> include path to be coherent with the rest of the Makefiles.
>
> Signed-off-by: Bertrand Marquis
Does something subtle break before this change?
~Andrew
> ---
> xen/arch/x86/boot/b
On 10/06/2020 15:29, Roger Pau Monne wrote:
> There's no need to setup a timer for GSIs that are edge triggered,
> since those don't require any EIO or unmask, and hence couldn't block
> other interrupts.
>
> Note this is only used by PVH dom0, that can setup the passthrough of
> edge triggered int
Hi Andrew,
> On 11 Jun 2020, at 17:24, Andrew Cooper wrote:
>
> On 11/06/2020 12:54, Bertrand Marquis wrote:
>> Use $(BASEDIR)/include instead of $(XEN_ROOT)/xen/include for the
>> include path to be coherent with the rest of the Makefiles.
>>
>> Signed-off-by: Bertrand Marquis
>
> Does somet
> -Original Message-
> From: Andrew Cooper
> Sent: 11 June 2020 17:26
> To: Roger Pau Monne ; xen-devel@lists.xenproject.org
> Cc: p...@xen.org; Jan Beulich ; Wei Liu
> Subject: Re: [PATCH for-4.14 v2 2/2] x86/passthrough: introduce a flag for
> GSIs not requiring an EOI
> or unmask
>
>
On 11/06/2020 17:50, Bertrand Marquis wrote:
> Hi Andrew,
>
>> On 11 Jun 2020, at 17:24, Andrew Cooper wrote:
>>
>> On 11/06/2020 12:54, Bertrand Marquis wrote:
>>> Use $(BASEDIR)/include instead of $(XEN_ROOT)/xen/include for the
>>> include path to be coherent with the rest of the Makefiles.
>>>
On Thu, 11 Jun 2020, Bertrand Marquis wrote:
> At the moment on Arm, a Linux guest running with KTPI enabled will
> cause the following error when a context switch happens in user mode:
> (XEN) p2m.c:1890: d1v0: Failed to walk page-table va 0xff837ebe0cd0
>
> This patch is modifying the regist
> > +return -EINVAL;
> > }
> >
> > -__copy_to_guest(runstate_guest(v), &runstate, 1);
> > +v->arch.runstate_guest.page = page;
> > +v->arch.runstate_guest.offset = offset;
> > +
> > +spin_unlock(&v->arch.runstate_guest.lock);
> > +
> > +return 0;
> > +}
> > +
> > +
On Thu, 11 Jun 2020, Julien Grall wrote:
> > > +return -EINVAL;
> > > }
> > >
> > > -__copy_to_guest(runstate_guest(v), &runstate, 1);
> > > +v->arch.runstate_guest.page = page;
> > > +v->arch.runstate_guest.offset = offset;
> > > +
> > > +spin_unlock(&v->arch.runstate_
flight 151049 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151049/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
Am Wed, 10 Jun 2020 20:16:57 +0100
schrieb Tim Deegan :
> How tedious.
Indeed. This compiles for me as well:
--- orig/kdd.h 2020-06-08 17:40:05.0 +
+++ kdd.h 2020-06-11 19:00:44.234364040 +
@@ -68,7 +68,6 @@
uint16_t len; /* Payload length, excl. header and traili
Hi Stefano,
On 11/06/2020 19:50, Stefano Stabellini wrote:
On Thu, 11 Jun 2020, Julien Grall wrote:
+return -EINVAL;
}
-__copy_to_guest(runstate_guest(v), &runstate, 1);
+v->arch.runstate_guest.page = page;
+v->arch.runstate_guest.offset = offset;
+
+spin_unlock(&
flight 151021 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151021/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-libvirt 6 libvirt-buildfail REGR. vs. 150963
Tests which did no
flight 151050 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151050/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
flight 151024 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151024/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 150978
version targeted for testi
flight 151022 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151022/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 150912
Tests which did not succeed, b
flight 151036 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151036/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm 6 xen-buildfail REGR. vs. 150120
build-i386
Now we can make corrections for scheduling unit run time, based on
data gathered in previous patches. This includes time spent in IRQ
handlers and time spent for hypervisor housekeeping tasks. Those time
spans needs to be deduced from a total run time.
This patch adds sched_get_time_correction() f
As scheduler code now collects time spent in IRQ handlers and in
do_softirq(), we can present those values to userspace tools like
xentop, so system administrator can see how system behaves.
We are updating counters only in sched_get_time_correction() function
to minimize number of taken spinlocks
Add code that saves time spent in IRQ handler, so later we can make
adjustments to schedule unit run time.
This and following changes are called upon to provide fair
scheduling. Problem is that any running vCPU can be interrupted by to
handle IRQ which is bound to some other vCPU. Thus, current vC
We are tracing each IRQ or HYP mode change and the calculated time
adjustment values.
Signed-off-by: Volodymyr Babchuk
---
tools/xentrace/xenalyze.c | 37 +
xen/common/sched/core.c| 9 +
xen/include/public/trace.h | 5 +
3 files changed, 51
In most cases hypervisor code performs guest-related jobs. Tasks like
hypercall handling or MMIO access emulation are done for calling vCPU
so it is okay to charge time spent in hypervisor to the current vCPU.
But, there are also tasks that are not originated from guests. This
includes things like
xentop show the values in the header like this:
IRQ Time 0.2s0.0% HYP Time 1.3s0.1%
The first value is the total time spent in corresponding mode, the
second value is the instant load percentage, similar to vCPU load
value.
"IRQ" corresponds to time spent in IRQ handler.
"HYP" is the tim
There was number of discussions about fair scheduling, including latest
one at [1].
In a nutshell, schedulers don't know when pCPU is doing guest-related
work or when it is busy with something else, like running
tasklets. All time spent between two calls to schedule() is being
charged to active vC
On Thu, 11 Jun 2020, Julien Grall wrote:
> Hi Stefano,
>
> On 11/06/2020 19:50, Stefano Stabellini wrote:
> > On Thu, 11 Jun 2020, Julien Grall wrote:
> > > > > +return -EINVAL;
> > > > > }
> > > > >
> > > > > -__copy_to_guest(runstate_guest(v), &runstate, 1);
> > > > > +v->
On Thu, 11 Jun 2020, Bertrand Marquis wrote:
> Add support for runstate area register with the structure crossing pages
> The code is storing up to 2 pages reference during the hypercall.
> During a context switch, the code is computing where the
> state_entry_time is and is breaking the memcpy in
On Thu, 11 Jun 2020, Julien Grall wrote:
> > Probably my use-case should be somewhere documented, so another time someone
> > steps into similar issues it is explained.
>
> You would have the exact same issue if you don't use hypercalls but modify a
> buffer with MMU off and then expect it to read
On Thu, Jun 11, 2020 at 10:32 AM Stefan Berger wrote:
>
> On 6/11/20 8:36 AM, Jason Andryuk wrote:
> > Hi,
> >
> > SeaBIOS commit 67643955c746 (make SeaBios compatible with Xen vTPM.)
> > made tpm_start() exit before calling tpm_startup(). The commit
> > message has no explanation why this change
flight 151053 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151053/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 11.06.20 18:00, Julien Grall wrote:
On 11/06/2020 16:35, Jürgen Groß wrote:
On 11.06.20 17:27, Julien Grall wrote:
Hi,
On 11/06/2020 16:21, Jürgen Groß wrote:
On 11.06.20 16:57, Julien Grall wrote:
Hi all,
kexec-tools has an option to load dynamically libxenctlr.so (not
.so.4.x) (see
flight 151032 xen-4.12-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151032/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-prev 6 xen-buildfail REGR. vs. 150176
build-amd64-pr
On 12.06.20 02:22, Volodymyr Babchuk wrote:
Add code that saves time spent in IRQ handler, so later we can make
adjustments to schedule unit run time.
This and following changes are called upon to provide fair
scheduling. Problem is that any running vCPU can be interrupted by to
handle IRQ which
On 12.06.20 02:22, Volodymyr Babchuk wrote:
In most cases hypervisor code performs guest-related jobs. Tasks like
hypercall handling or MMIO access emulation are done for calling vCPU
so it is okay to charge time spent in hypervisor to the current vCPU.
But, there are also tasks that are not ori
On 12.06.20 02:22, Volodymyr Babchuk wrote:
Now we can make corrections for scheduling unit run time, based on
data gathered in previous patches. This includes time spent in IRQ
handlers and time spent for hypervisor housekeeping tasks. Those time
spans needs to be deduced from a total run time.
On 12.06.20 02:22, Volodymyr Babchuk wrote:
As scheduler code now collects time spent in IRQ handlers and in
do_softirq(), we can present those values to userspace tools like
xentop, so system administrator can see how system behaves.
We are updating counters only in sched_get_time_correction()
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-5.8b-rc1-tag
xen: branch for v5.8-rc1
It contains the following patches:
- several smaller cleanups
- a fix for a Xen guest regression with CPU offlining
- a small fix in the xen p
60 matches
Mail list logo