[Xen-devel] [xen-4.8-testing test] 117660: FAIL

2018-01-06 Thread osstest service owner
flight 117660 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/117660/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm broken in 117586 test-a

[Xen-devel] [xen-unstable test] 117652: regressions - FAIL

2018-01-06 Thread osstest service owner
flight 117652 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/117652/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-cubietruck 6 xen-installfail REGR. vs. 117311 Tests which did no

[Xen-devel] [linux-linus test] 117655: regressions - FAIL

2018-01-06 Thread osstest service owner
flight 117655 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/117655/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-debianhvm-amd64 7 xen-bootfail REGR. vs. 115643 test-amd64-i386-qem

[Xen-devel] [linux-next test] 117649: regressions - FAIL

2018-01-06 Thread osstest service owner
flight 117649 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/117649/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 10 debian-install fail REGR. vs. 117544 test-amd64-i386-exam

Re: [Xen-devel] [PATCH 05/22] char: optionally redirect {, g}printk output to QEMU debug log

2018-01-06 Thread Matt Wilson
On Sat, Jan 06, 2018 at 04:18:46PM -0800, Anthony Liguori wrote: > On Sat, Jan 6, 2018 at 2:54 PM, Anthony Liguori wrote: > > From: Matt Wilson > > Yeah, this has no hope of working on ARM Matt. Shame on you ;-P It's almost like you put this patch in front of the one introducing is_vixen() jus

Re: [Xen-devel] [PATCH 07/22] vixen: introduce is_vixen() to allow altering behavior

2018-01-06 Thread Anthony Liguori
On Sat, Jan 6, 2018 at 4:06 PM, Matt Wilson wrote: > On Sat, Jan 06, 2018 at 02:54:22PM -0800, Anthony Liguori wrote: >> From: Anthony Liguori >> >> Vixen (Virtualized Xen) is a paravirtual mode of Xen where >> paravirtual I/O is passed through from the parent hypervisor >> all the way through th

Re: [Xen-devel] [PATCH 22/22] vixen: dom0 builder support

2018-01-06 Thread Matt Wilson
On Sat, Jan 06, 2018 at 02:54:37PM -0800, Anthony Liguori wrote: > From: Anthony Liguori > > The dom0 builder requires a number of modifications in order to be > able to launch unprivileged guests. The console and store pages > must be mapped in a specific location within the guest's initial > p

Re: [Xen-devel] [PATCH 05/22] char: optionally redirect {, g}printk output to QEMU debug log

2018-01-06 Thread Anthony Liguori
On Sat, Jan 6, 2018 at 2:54 PM, Anthony Liguori wrote: > From: Matt Wilson > > When using Vixen, it is helpful to get the Xen messages in a > separate channel than the console output. Add an option to > output to the QEMU backdoor logging port. > > Signed-off-by: Matt Wilson > Signed-off-by: An

Re: [Xen-devel] [PATCH 07/22] vixen: introduce is_vixen() to allow altering behavior

2018-01-06 Thread Matt Wilson
On Sat, Jan 06, 2018 at 02:54:22PM -0800, Anthony Liguori wrote: > From: Anthony Liguori > > Vixen (Virtualized Xen) is a paravirtual mode of Xen where > paravirtual I/O is passed through from the parent hypervisor > all the way through the dom0 guest. The dom0 guest is also > deprivileged and r

Re: [Xen-devel] [PATCH 00/22] Vixen: A PV-in-HVM shim

2018-01-06 Thread Anthony Liguori
On Sat, Jan 6, 2018 at 3:50 PM, Andrew Cooper wrote: > On 06/01/2018 22:54, Anthony Liguori wrote: >> From: Anthony Liguori >> >> CVE-2017-5754 is problematic for paravirtualized x86 domUs because it >> appears to be very difficult to isolate the hypervisor's page tables >> from PV domUs while ma

Re: [Xen-devel] [PATCH 00/22] Vixen: A PV-in-HVM shim

2018-01-06 Thread Matt Wilson
On Sat, Jan 06, 2018 at 11:50:46PM +, Andrew Cooper wrote: > On 06/01/2018 22:54, Anthony Liguori wrote: > > Please note the Xen page table configuration fundamental to the > > current PV ABI makes it impossible for an operating system to mitigate > > CVE-2017-5754 through mechanisms like Kerne

Re: [Xen-devel] [PATCH 00/22] Vixen: A PV-in-HVM shim

2018-01-06 Thread Andrew Cooper
On 06/01/2018 22:54, Anthony Liguori wrote: > From: Anthony Liguori > > CVE-2017-5754 is problematic for paravirtualized x86 domUs because it > appears to be very difficult to isolate the hypervisor's page tables > from PV domUs while maintaining ABI compatibility. Instead of trying > to make a K

Re: [Xen-devel] [PATCH 00/22] Vixen: A PV-in-HVM shim

2018-01-06 Thread Anthony Liguori
On Sat, Jan 6, 2018 at 2:54 PM, Anthony Liguori wrote: > From: Anthony Liguori > > CVE-2017-5754 is problematic for paravirtualized x86 domUs because it > appears to be very difficult to isolate the hypervisor's page tables > from PV domUs while maintaining ABI compatibility. Instead of trying >

[Xen-devel] [PATCH 10/22] vixen: do not permit access to physical IRQs if in Vixen mode

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori Our intention is for the Vixen guest to be deprivileged so we need to avoid permitting access to each IRQ even though it is technically the hardware domain. Signed-off-by: Anthony Liguori --- xen/arch/x86/irq.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff

[Xen-devel] [PATCH 16/22] vixen: pass grant table operations through to the outer Xen

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori The grant table is a region of guest memory that contains GMFNs which in PV are MFNs but are PFNs in HVM. Since a Vixen guest MFN is an HVM PFN, we can pass this table directly through to the outer Xen which cuts down considerably on overhead. We do not forward most of the

[Xen-devel] [PATCH 15/22] vixen: pass through version hypercalls to parent Xen

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori This is necessary to trigger event channel upcalls but it is also useful to passthrough the full version information such that the guest believes it is running on the parent Xen. Signed-off-by: Matt Wilson Signed-off-by: Anthony Liguori --- xen/common/kernel.c | 82 +

[Xen-devel] [PATCH 21/22] vixen: provide Xencons implementation

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori Our initial approach exposed the console ring directly to guests which worked well except for the fact that very old versions of Xen did not support console ring for HVM guests. It also proved to be complicated from a management tool perspective since both the serial consol

[Xen-devel] [PATCH 11/22] vixen: early initialization of Vixen including shared_info mapping

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori We split initialization of Vixen into two parts. The first part just detects the presence of an HVM hypervisor so that we can figure out whether to modify the e820 table. The later initialization is used to actually map the shared_info structure from the parent hypervisor

[Xen-devel] [PATCH 08/22] vixen: allow dom0 to be created with a domid != 0

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori Some older guests special case domid=0 instead of checking the shared info flags so in order to get PV drivers loaded properly, we need to make the guest always appear with a domid != 0. While the Vixen domain is the hardware domain, we don't want it to behave that way so w

[Xen-devel] [PATCH 00/22] Vixen: A PV-in-HVM shim

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori CVE-2017-5754 is problematic for paravirtualized x86 domUs because it appears to be very difficult to isolate the hypervisor's page tables from PV domUs while maintaining ABI compatibility. Instead of trying to make a KPTI-like approach work for Xen PV, it seems reasonable

[Xen-devel] [PATCH 04/22] x86: Don't use potentially incorrect CPUID values for topology information

2018-01-06 Thread Anthony Liguori
From: Jan H. Schönherr Intel says for CPUID leaf 0Bh: "Software must not use EBX[15:0] to enumerate processor topology of the system. This value in this field (EBX[15:0]) is only intended for display/diagnostic purposes. The actual number of logical processors available to BIOS/OS/

[Xen-devel] [PATCH 13/22] vixen: Use SCHEDOP_shutdown to shutdown the machine

2018-01-06 Thread Anthony Liguori
From: Jan H. Schönherr While the hwdom_shutdown() is able to reboot the system, it fails to properly power it off. With SCHEDOP_shutdown, we delegate the problem. Signed-off-by: Jan H. Schönherr Signed-off-by: Anthony Liguori --- xen/common/domain.c | 14 ++ 1 file changed, 14 ins

[Xen-devel] [PATCH 02/22] x86/entry: Probe for Xen early during boot

2018-01-06 Thread Anthony Liguori
From: Andrew Cooper Signed-off-by: Andrew Cooper Signed-off-by: Anthony Liguori --- xen/arch/x86/Makefile | 1 + xen/arch/x86/guest/Makefile | 1 + xen/arch/x86/guest/xen.c| 75 + xen/arch/x86/setup.c| 4 +++ xen/incl

[Xen-devel] [PATCH 05/22] char: optionally redirect {, g}printk output to QEMU debug log

2018-01-06 Thread Anthony Liguori
From: Matt Wilson When using Vixen, it is helpful to get the Xen messages in a separate channel than the console output. Add an option to output to the QEMU backdoor logging port. Signed-off-by: Matt Wilson Signed-off-by: Anthony Liguori --- xen/drivers/char/console.c | 24 ++

[Xen-devel] [PATCH 22/22] vixen: dom0 builder support

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori The dom0 builder requires a number of modifications in order to be able to launch unprivileged guests. The console and store pages must be mapped in a specific location within the guest's initial page table. We also have to setup the start info to be what's expected for un

[Xen-devel] [PATCH 12/22] vixen: paravirtualization TSC frequency calculation

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori Otherwise when time sharing a physical CPU, the calculation can be bogus resulting in time drift for the guest due to improper frequency within pvclock. Signed-off-by: Anthony Liguori --- xen/arch/x86/guest/vixen.c| 21 + xen/arch/x86/time.c

[Xen-devel] [PATCH 19/22] vixen: Fix Vixen adaptation of send_global_virq()

2018-01-06 Thread Anthony Liguori
From: Jan H. Schönherr The function originally did the following unconditionally: send_guest_global_virq(global_virq_handlers[virq] ?: hardware_domain, virq); The new variant should reflect the non-Vixen case correctly. Signed-off-by: Jan H. Schönherr Signed-off-by: Anthony Liguori --- x

[Xen-devel] [PATCH 18/22] vixen: Introduce ECS_PROXY for event channel proxying

2018-01-06 Thread Anthony Liguori
From: Jan H. Schönherr Previously, we would keep proxied event channels as ECS_INTERDOMAIN channel around. This works for most things, but has the problem that EVTCHNOP_status is broken, and that EVTCHNOP_close does not mark an event channel as free. Introduce a separate ECS_PROXY to denote even

[Xen-devel] [PATCH 14/22] vixen: forward VCPUOP_register_runstate_memory_area to outer Xen

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori This allows for proper accounting of steal time within the guest. Signed-off-by: Anthony Liguori --- xen/common/domain.c | 6 ++ 1 file changed, 6 insertions(+) diff --git a/xen/common/domain.c b/xen/common/domain.c index ede377c..780f8ff 100644 --- a/xen/common/doma

[Xen-devel] [PATCH 03/22] x86/guest: Hypercall support

2018-01-06 Thread Anthony Liguori
From: Andrew Cooper Signed-off-by: Andrew Cooper Signed-off-by: Anthony Liguori --- xen/arch/x86/guest/Makefile | 1 + xen/arch/x86/guest/hypercall_page.S | 79 ++ xen/arch/x86/guest/xen.c | 5 ++ xen/arch/x86/xen.lds.S| 1

[Xen-devel] [PATCH 17/22] vixen: setup infrastructure to receive event channel notifications

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori This patch registers an interrupt handler using either an INTx interrupt from the platform PCI device, CALLBACK_IRQ vector delivery, or evtchn_upcall_vector depending on what the parent hypervisor supports. The event channel polling code comes from Linux but uses the intern

[Xen-devel] [PATCH 06/22] console: do not print banner if below info log threshold

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori Only print the banner if the log threshold is at least info. For Vixen guests, we want the console output to be exactly what the PV guest would show on it's own. That means the inner Xen banner can potentially break automation that assumes a specific type of console output

[Xen-devel] [PATCH 01/22] ---- x86/Kconfig: Options for Xen and PVH support

2018-01-06 Thread Anthony Liguori
From: Andrew Cooper Signed-off-by: Andrew Cooper Signed-off-by: Anthony Liguori --- xen/arch/x86/Kconfig | 17 + 1 file changed, 17 insertions(+) diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig index 7c45829..07530bf 100644 --- a/xen/arch/x86/Kconfig +++ b/xen/arch/x8

[Xen-devel] [PATCH 20/22] vixen: event channel passthrough support

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori For Vixen, we do not want to pass through all event channel operations as HVM guests do not have nearly as many event channel interactions as PV and on older versions of Xen, there is no reliable way to wake up an event channel on VCPU != 0 leading to a variety of deadlocks.

[Xen-devel] [PATCH 09/22] vixen: modify the e820 table to advertise HVM special pages as RAM

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori In order to be able to assign the Xenstore page into the Vixen guest, we need struct page_info's to exist. We do this by modifying the e820 table early in boot and then using the badpages handling to prevent these pages from being added to the xenheap. Since these pages ex

[Xen-devel] [PATCH 07/22] vixen: introduce is_vixen() to allow altering behavior

2018-01-06 Thread Anthony Liguori
From: Anthony Liguori Vixen (Virtualized Xen) is a paravirtual mode of Xen where paravirtual I/O is passed through from the parent hypervisor all the way through the dom0 guest. The dom0 guest is also deprivileged and renumbered to give the appearance that it is running as a normal PV guest. Si

[Xen-devel] [PATCH v2] x86: xen: remove the use of VLAIS

2018-01-06 Thread Nick Desaulniers
Variable Length Arrays In Structs (VLAIS) is not supported by Clang, and frowned upon by others. https://lkml.org/lkml/2013/9/23/500 Here, the VLAIS was used because the size of the bitmap returned from xen_mc_entry() depended on possibly (based on kernel configuration) runtime sized data. Rather

Re: [Xen-devel] [PATCH] x86/xen/time: fix section mismatch for xen_init_time_ops()

2018-01-06 Thread Nick Desaulniers
On Tue, Jan 2, 2018 at 7:00 AM, Boris Ostrovsky wrote: > On 01/02/2018 09:32 AM, Andrew Cooper wrote: >> On 02/01/18 14:24, Juergen Gross wrote: >>> On 02/01/18 15:18, Boris Ostrovsky wrote: On 12/23/2017 09:50 PM, Nick Desaulniers wrote: > The header declares this function as __init but

Re: [Xen-devel] [PATCH v6 00/11] vpci: PCI config space emulation

2018-01-06 Thread Jaggi, Manish
Hello, >From: Xen-devel [xen-devel-boun...@lists.xen.org] on behalf of Roger Pau Monne >[roger@citrix.com] >Sent: Tuesday, September 19, 2017 8:59 PM >To: xen-devel@lists.xenproject.org >Cc: boris.ostrov...@oracle.com >Subject: [Xen-devel] [PATCH v6 00/

[Xen-devel] Xen Security Advisory 249 (CVE-2017-17563) - broken x86 shadow mode refcount overflow check

2018-01-06 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2017-17563 / XSA-249 version 3 broken x86 shadow mode refcount overflow check UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION ==

[Xen-devel] Xen Security Advisory 250 (CVE-2017-17564) - improper x86 shadow mode refcount error handling

2018-01-06 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2017-17564 / XSA-250 version 3 improper x86 shadow mode refcount error handling UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION =

[Xen-devel] Xen Security Advisory 248 (CVE-2017-17566) - x86 PV guests may gain access to internally used pages

2018-01-06 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2017-17566 / XSA-248 version 3 x86 PV guests may gain access to internally used pages UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION =

[Xen-devel] Xen Security Advisory 251 (CVE-2017-17565) - improper bug check in x86 log-dirty handling

2018-01-06 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2017-17565 / XSA-251 version 3 improper bug check in x86 log-dirty handling UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION ===

[Xen-devel] [xen-4.10-testing test] 117647: regressions - FAIL

2018-01-06 Thread osstest service owner
flight 117647 xen-4.10-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/117647/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-libvirt-xsm 7 xen-boot fail REGR. vs. 117130 Tests which di

[Xen-devel] Xen Security Advisory 253 (CVE-2018-5244) - x86: memory leak with MSR emulation

2018-01-06 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Xen Security Advisory CVE-2018-5244 / XSA-253 version 3 x86: memory leak with MSR emulation UPDATES IN VERSION 3 CVE assigned. ISSUE DESCRIPTION = I

[Xen-devel] [xen-4.9-testing test] 117644: regressions - FAIL

2018-01-06 Thread osstest service owner
flight 117644 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/117644/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf broken in 117607 build-armhf

[Xen-devel] [distros-debian-stretch test] 73983: trouble: blocked/broken

2018-01-06 Thread Platform Team regression test user
flight 73983 distros-debian-stretch real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/73983/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvopsbroken build-i3

[Xen-devel] [seabios test] 117642: regressions - FAIL

2018-01-06 Thread osstest service owner
flight 117642 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/117642/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539 Tests which did not suc

[Xen-devel] [linux-3.18 test] 117641: FAIL

2018-01-06 Thread osstest service owner
flight 117641 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/117641/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt broken in 117609 test-amd64-

[Xen-devel] [xen-4.7-testing test] 117639: trouble: broken/fail/pass

2018-01-06 Thread osstest service owner
flight 117639 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/117639/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-migrupgrade broken test-amd64-amd64-