Re: [Xen-devel] [PATCH v2 01/25] arm/altp2m: Add first altp2m HVMOP stubs.

2016-08-04 Thread Sergej Proskurin
Hi Julien, On 08/04/2016 06:51 PM, Julien Grall wrote: > > > On 04/08/16 17:22, Sergej Proskurin wrote: >> >> On 08/04/2016 06:04 PM, Julien Grall wrote: >>> >>> >>> On 04/08/16 17:01, Sergej Proskurin wrote: Hi Julien, On 08/03/2016 06:54 PM, Julien Grall wrote: > Hello S

Re: [Xen-devel] [PATCH v2 07/25] arm/altp2m: Add altp2m init/teardown routines.

2016-08-04 Thread Sergej Proskurin
Hi Julien, On 08/03/2016 08:12 PM, Julien Grall wrote: > Hello Sergej, > > On 01/08/16 18:10, Sergej Proskurin wrote: >> The p2m initialization now invokes initialization routines responsible >> for the allocation and initialization of altp2m structures. The same >> applies to teardown routines.

Re: [Xen-devel] [PATCH v2 2/2] hotplug: Prevent alloc/free of irq descriptors during cpu up/down (again)

2016-08-04 Thread Juergen Gross
On 03/08/16 19:22, Boris Ostrovsky wrote: > Now that Xen no longer allocates irqs in _cpu_up() we can restore > commit a89941816726 ("hotplug: Prevent alloc/free of irq descriptors > during cpu up/down") > > Signed-off-by: Boris Ostrovsky > Acked-by: Thomas Gleixner Reviewed-by: Juergen Gross

Re: [Xen-devel] [PATCH v2 1/2] xen/x86: Move irq allocation from Xen smp_op.cpu_up()

2016-08-04 Thread Juergen Gross
On 03/08/16 19:22, Boris Ostrovsky wrote: > Commit ce0d3c0a6fb1 ("genirq: Revert sparse irq locking around > __cpu_up() and move it to x86 for now") reverted irq locking > introduced by commit a89941816726 ("hotplug: Prevent alloc/free > of irq descriptors during cpu up/down") because of Xen alloca

Re: [Xen-devel] [PATCH] domctl: relax getdomaininfo permissions

2016-08-04 Thread Jan Beulich
>>> On 04.08.16 at 18:31, wrote: > Jan Beulich writes ("[PATCH] domctl: relax getdomaininfo permissions"): >> Qemu needs access to this for the domain it controls, both due to it >> being used by xc_domain_memory_mapping() (which qemu calls) and the >> explicit use in hw/xenpv/xen_domainbuild.c:xe

Re: [Xen-devel] [RFC Design Doc v2] Add vNVDIMM support for Xen

2016-08-04 Thread Haozhong Zhang
On 08/04/16 10:51, Konrad Rzeszutek Wilk wrote: > > > > Such a pmem namespace can be created via a userspace tool ndctl and > > > > then recognized by Linux NVDIMM driver. However, they currently only > > > > reserve space for Linux kernel's page structs. Therefore, our design > > > > need to e

Re: [Xen-devel] [PATCH v5 0/4] x86/ioreq server: Introduce HVMMEM_ioreq_server mem type.

2016-08-04 Thread Jan Beulich
>>> On 05.08.16 at 04:44, wrote: > On 7/12/2016 5:02 PM, Yu Zhang wrote: >> XenGT leverages ioreq server to track and forward the accesses to GPU >> I/O resources, e.g. the PPGTT(per-process graphic translation tables). >> Currently, ioreq server uses rangeset to track the BDF/ PIO/MMIO ranges >>

Re: [Xen-devel] unable start xen in hikey

2016-08-04 Thread Chenxiao Zhao
The xen.cfg file seems fine to me. I suggest you try to use the dtb file compiled from the kernel source and update UEFI bootloader on hikey board to the latest version. hope this could help. On 8/4/2016 11:02 PM, Kamenee Arumugam wrote: I have already pass hi6220-key.dtb in my xen.cfg: opti

[Xen-devel] [PATCH RFC 03/04] tools/libxc: arm: Implement save ops arm_setup

2016-08-04 Thread Chenxiao Zhao
arm_setup need to return number of pages that vm is allocated. Code is copied from x64 save ops. Signed-off-by: Chenxiao Zhao diff --git a/tools/libxc/xc_sr_save_arm.c b/tools/libxc/xc_sr_save_arm.c index 611f99a..a2ef2db 100644 --- a/tools/libxc/xc_sr_save_arm.c +++ b/tools/libxc/xc_sr_save_a

[Xen-devel] [PATCH RFC 04/04] xen: arm64: save/restore domain type

2016-08-04 Thread Chenxiao Zhao
On arm64 VM uses d->arch.type to indicate if the domain is 32-bit or 64-bit. This value is set while parsing kernel image. while restoring VCPU state, it will use this value to decide the VCPU type. I can not find a proper place to save/restore this value in state file, this is surely not a goo

[Xen-devel] [PATCH RFC 02/04] tools/libxc: arm: Add missing save ops

2016-08-04 Thread Chenxiao Zhao
Add arm_check_vm_state function, .check_vm_state can not be NULL in arch specific ops. Signed-off-by: Chenxiao Zhao diff --git a/tools/libxc/xc_sr_save_arm.c b/tools/libxc/xc_sr_save_arm.c index 1442679..611f99a 100644 --- a/tools/libxc/xc_sr_save_arm.c +++ b/tools/libxc/xc_sr_save_arm.c @@ -1

[Xen-devel] [PATCH RFC 00/04] xen: arm64: Support VM save/restore on arm64

2016-08-04 Thread Chenxiao Zhao
Hi all, This patch added support VM save/restore for arm64. It is based on previous work done by Ian Campbell [1] with some bug fixes to make it work on stable-4.7. You should apply Ian's patch first. There still some known issues that have not fixed yet. * GIC v2 not support * No live migra

[Xen-devel] [PATCH RFC 01/04] xen: arm64: save/restore VCPU state for arm64

2016-08-04 Thread Chenxiao Zhao
added support to save/restore arm64 registers Signed-off-by: Chenxiao Zhao diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c index aee3353..3073b17 100644 --- a/xen/arch/arm/hvm.c +++ b/xen/arch/arm/hvm.c @@ -120,7 +120,8 @@ static int cpu_save(struct domain *d, hvm_domain_context_t *h)

Re: [Xen-devel] [PATCH v5 0/4] x86/ioreq server: Introduce HVMMEM_ioreq_server mem type.

2016-08-04 Thread Yu Zhang
On 7/12/2016 5:02 PM, Yu Zhang wrote: XenGT leverages ioreq server to track and forward the accesses to GPU I/O resources, e.g. the PPGTT(per-process graphic translation tables). Currently, ioreq server uses rangeset to track the BDF/ PIO/MMIO ranges to be emulated. To select an ioreq server, th

[Xen-devel] [ovmf baseline-only test] 66919: all pass

2016-08-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66919 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66919/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf afd6b28915cac422294a28033ef83727b27ce216 baseline v

[Xen-devel] [qemu-mainline test] 99944: tolerable FAIL - PUSHED

2016-08-04 Thread osstest service owner
flight 99944 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/99944/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 99938 test-amd64-amd64-xl-qemuu-wi

[Xen-devel] [xen-unstable test] 99942: regressions - FAIL

2016-08-04 Thread osstest service owner
flight 99942 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/99942/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt 6 xen-boot fail REGR. vs. 99917 test-amd64-i386-xl-q

[Xen-devel] [xen-unstable-smoke test] 99948: tolerable all pass - PUSHED

2016-08-04 Thread osstest service owner
flight 99948 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/99948/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

[Xen-devel] [PATCH v2 01/23] hvmloader: Provide hvmloader_acpi_build_tables()

2016-08-04 Thread Boris Ostrovsky
In preparation for moving out ACPI builder make all BIOSes call hvmloader_acpi_build_tables() instead of calling ACPI code directly. No functional changes. Signed-off-by: Boris Ostrovsky Acked-by: Jan Beulich --- tools/firmware/hvmloader/ovmf.c| 2 +- tools/firmware/hvmloader/rombios.c | 2

[Xen-devel] [PATCH v2 00/23] Make ACPI builder available to components other than hvmloader

2016-08-04 Thread Boris Ostrovsky
The goal here is to build ACPI tables for PVHv2/HVMlite guests while reusing existing hvmloader's ACPI builder code. The builder is provided as a library in tools/libacpi. This version is built on top of Anthony's git://xenbits.xen.org/people/aperard/xen-unstable.git:hvmloader-with-separated-bi

[Xen-devel] [PATCH v2 21/23] ilibxl: Initialize domain build info before calling libxl__domain_make

2016-08-04 Thread Boris Ostrovsky
libxl__domain_make() may want to use b_info so we should set defaults a little earlier. Signed-off-by: Boris Ostrovsky --- v2: * New patch. The need for this patch was triggered by commit b173750d2bc2 tools/libxl/libxl_create.c | 22 +++--- 1 file changed, 11 insertions(+), 11 d

[Xen-devel] [PATCH v2 22/23] libxl/acpi: Build ACPI tables for HVMlite guests

2016-08-04 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- v2: * Only initialize ACPI tables here but don't load them just yet (store them in acpi_modeuls[]) * Reorder .gitignore changes .gitignore | 12 ++- tools/libacpi/build.c| 7 +- tools/libacpi/libacpi.h | 15 +++- tools/libxl

[Xen-devel] [PATCH v2 05/23] acpi/hvmloader: Move passthrough initialization from ACPI code

2016-08-04 Thread Boris Ostrovsky
Initialize it in hvmloader, avoiding ACPI code's use of xenstore_read() Signed-off-by: Boris Ostrovsky --- v2: * Dropped pt_ prefix * Slight change in construct_passthrough_tables() code (thus dropped Jan's R-b) tools/firmware/hvmloader/acpi/build.c | 28 +--- tools/fi

[Xen-devel] [PATCH v2 10/23] acpi/hvmloader: Replace mem_alloc() and virt_to_phys() with memory ops

2016-08-04 Thread Boris Ostrovsky
Components that wish to use ACPI builder will need to provide their own mem_alloc() and virt_to_phys() routines. Pointers to these routines will be passed to the builder as memory ops. Signed-off-by: Boris Ostrovsky --- v2: * Added acpi_ctxt.free() op tools/firmware/hvmloader/acpi/build.c | 9

[Xen-devel] [PATCH v2 17/23] libacpi: Build DSDT for PVH guests

2016-08-04 Thread Boris Ostrovsky
PVH guests require DSDT with only ACPI INFO (Xen-specific) and Processor objects. We separate ASL's ACPI INFO definition into dsdt_acpi_info.asl so that it can be included in ASLs for both HVM and PVH2. Signed-off-by: Boris Ostrovsky --- tools/libacpi/Makefile | 21 +---

[Xen-devel] [PATCH v2 04/23] acpi/hvmloader: Decide which SSDTs to install in hvmloader

2016-08-04 Thread Boris Ostrovsky
With that, xenstore_read() won't need to be done in ACPI code Signed-off-by: Boris Ostrovsky Acked-by: Jan Beulich --- tools/firmware/hvmloader/acpi/build.c | 15 ++- tools/firmware/hvmloader/acpi/libacpi.h | 4 tools/firmware/hvmloader/util.c | 12 3 fi

[Xen-devel] [PATCH v2 07/23] acpi/hvmloader: Set TIS header address in hvmloader

2016-08-04 Thread Boris Ostrovsky
Users other than hvmloader may provide TIS address as virtual. Signed-off-by: Boris Ostrovsky Reviewed-by: Jan Beulich --- v2: * constified tis_hdr. tools/firmware/hvmloader/acpi/build.c | 9 - tools/firmware/hvmloader/acpi/libacpi.h | 3 +++ tools/firmware/hvmloader/config.h |

[Xen-devel] [PATCH v2 08/23] acpi/hvmloader: Make providing IOAPIC in MADT optional

2016-08-04 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky Reviewed-by: Jan Beulich --- tools/firmware/hvmloader/acpi/build.c | 70 ++--- tools/firmware/hvmloader/acpi/libacpi.h | 1 + tools/firmware/hvmloader/util.c | 2 +- 3 files changed, 40 insertions(+), 33 deletions(-) diff --

[Xen-devel] [PATCH v2 15/23] x86: Add more checks verifying that PIT/PIC/IOAPIC are emulated

2016-08-04 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky Reviewed-by: Jan Beulich --- v2: * Added ASSERT(has_vpic(d)) * This patch can go in independent of the rest of the series. xen/arch/x86/hvm/vlapic.c | 14 -- xen/arch/x86/hvm/vpt.c| 2 +- 2 files changed, 13 insertions(+), 3 deletions(-) diff --g

[Xen-devel] [PATCH v2 19/23] libxl/acpi: Add ACPI e820 entry

2016-08-04 Thread Boris Ostrovsky
Add entry for ACPI tables created for PVHv2 guests to e820 map. Signed-off-by: Boris Ostrovsky --- v2: * Deal with multiple acpi_modules. tools/libxl/libxl_dom.c | 8 tools/libxl/libxl_x86.c | 15 +++ 2 files changed, 19 insertions(+), 4 deletions(-) diff --git a/tools/li

[Xen-devel] [PATCH v2 16/23] x86: Allow LAPIC-only emulation_flags for HVM guests

2016-08-04 Thread Boris Ostrovsky
PVHv2 guests may request LAPIC emulation (and nothing else) Signed-off-by: Boris Ostrovsky Reviewed-by: Jan Beulich --- v2: * Note: I kept the code as is (with minor style adjustments). Roger's version (with emulation_flags_ok()) has slighly more logic to account for dom0. Without that I did

[Xen-devel] [PATCH v2 23/23] libxc/xc_dom_core: Copy ACPI tables to guest space

2016-08-04 Thread Boris Ostrovsky
Load ACPI modules into guest space Signed-off-by: Boris Ostrovsky --- v2: * New patch, loosely based on Shannon's ARM patch tools/libxc/xc_dom_core.c | 92 +++ 1 file changed, 92 insertions(+) diff --git a/tools/libxc/xc_dom_core.c b/tools/libxc/xc_d

[Xen-devel] [PATCH v2 18/23] libxc/libxl: Allow multiple ACPI modules

2016-08-04 Thread Boris Ostrovsky
Provide ability to load multiple ACPI modules. Thie feature is needed by PVHv2 guests and will be used in subsequent patches. We assume that PVHv2 guests do not load their ACPI modules specified in the configuration file. We can extend support for that in the future if desired. Signed-off-by: Bor

[Xen-devel] [PATCH v2 06/23] acpi/hvmloader: Collect processor and NUMA info in hvmloader

2016-08-04 Thread Boris Ostrovsky
No need for ACPI code to rely on hvm_info variable. Signed-off-by: Boris Ostrovsky --- v2: * Note: struct acpi_numa's pointers can't be constified due to their use in later patches tools/firmware/hvmloader/acpi/build.c | 50 + tools/firmware/hvmloader/acpi/li

[Xen-devel] [PATCH v2 13/23] acpi/hvmloader: Include file/paths adjustments

2016-08-04 Thread Boris Ostrovsky
In prepearation to moving acpi sources into generally available libacpi: 1. Move certain x86-specific definitions into acpi's x86.h 2. Modify include files serach paths to point to acpi 3. Macro-ise include file for build.c that defines various utilities used by that file. Users of libacpi will

[Xen-devel] [PATCH v2 03/23] acpi/hvmloader: Initialize vm_gid data outside ACPI code

2016-08-04 Thread Boris Ostrovsky
This way ACPI code won't use xenstore-read() and hvm_param_set() which are private to hvmloader. Signed-off-by: Boris Ostrovsky --- v2: * Pass VM GID address back via acpi_config.vm_gid_addr. tools/firmware/hvmloader/acpi/build.c | 34 ++--- tools/firmware/hvmloade

[Xen-devel] [PATCH v2 12/23] acpi/hvmloader: Link ACPI object files directly

2016-08-04 Thread Boris Ostrovsky
ACPI sources will be available to various component which will build them according to their own rules. ACPI's Makefile will only generate necessary source files. Signed-off-by: Boris Ostrovsky --- v2: * Reordered .gitignore changes alphabetically * Dropped trailing slashes * Use relative path fo

[Xen-devel] [PATCH v2 09/23] acpi/hvmloader: Build WAET optionally

2016-08-04 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky Reviewed-by: Jan Beulich --- v2: * Note: didn't break "if ( !waet ) return -1" line since that's the style of the file. tools/firmware/hvmloader/acpi/build.c | 9 ++--- tools/firmware/hvmloader/acpi/libacpi.h | 1 + tools/firmware/hvmloader/util.c

[Xen-devel] [PATCH v2 02/23] acpi/hvmloader: Allow acpi_build_tables() callers specify acpi_info values

2016-08-04 Thread Boris Ostrovsky
By doing this we can move hvmloader-private interfaces (such as uart_exists(), lpt_exists() etc.) out of the ACPI builder. This will help us with allowing to call the builder from places other than hvmloader. Signed-off-by: Boris Ostrovsky --- v2: * Keep struct acpi_info private to build.c and in

[Xen-devel] [PATCH v2 14/23] acpi: Move ACPI code to tools/libacpi

2016-08-04 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky Acked-by: Jan Beulich --- v2: * Minor cleanup of hvmloader's Makefile tools/firmware/hvmloader/Makefile | 14 -- tools/firmware/hvmloader/ovmf.c| 2 +- tools/{firmware/hvmloader/acpi => libacpi}/Mak

[Xen-devel] [PATCH v2 11/23] acpi/hvmloader: Translate all addresses when assigning addresses in ACPI tables

2016-08-04 Thread Boris Ostrovsky
Non-hvmloader users may be building tables in virtual address space and therefore we need to make sure that values that end up in tables are physical addresses. Signed-off-by: Boris Ostrovsky Reviewed-by: Jan Beulich --- tools/firmware/hvmloader/acpi/build.c | 47 ++-

[Xen-devel] [PATCH v2 20/23] libxl/pvhv2: Include APIC page in MMIO hole for PVHv2 guests

2016-08-04 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- tools/libxl/Makefile| 2 ++ tools/libxl/libxl_dom.c | 22 ++ 2 files changed, 20 insertions(+), 4 deletions(-) diff --git a/tools/libxl/Makefile b/tools/libxl/Makefile index 9fee752..3a2d64a 100644 --- a/tools/libxl/Makefile +++ b/tools

[Xen-devel] [qemu-mainline baseline-only test] 66917: tolerable FAIL

2016-08-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66917 qemu-mainline real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66917/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta

[Xen-devel] [xen-unstable-smoke test] 99947: tolerable all pass - PUSHED

2016-08-04 Thread osstest service owner
flight 99947 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/99947/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH v2 2/3] symbols: Generate an xen-sym.map

2016-08-04 Thread Konrad Rzeszutek Wilk
On August 4, 2016 11:49:23 AM EDT, Konrad Rzeszutek Wilk wrote: >You could construct _most_ of the names of the functions >by doing 'nm --defined' but unfortunatly you do not get the > prefix that is added on in Xen . For example: > >$ cat xen-syms.symbols |grep do_domain_pause >0x82d08010492

Re: [Xen-devel] HVMOP_guest_request_vm_event only works from guest in ring0

2016-08-04 Thread Razvan Cojocaru
On 08/04/16 22:03, Bread Cutter wrote: > My workaround for now is just something like > > int mode = hvm_guest_x86_mode(curr); > > uint32_t eax = regs->eax; > > > +if(eax == 0xFACE) { > +hvm_event_guest_request(); > +return 1; > +} > + > > switch ( mode )

Re: [Xen-devel] HVMOP_guest_request_vm_event only works from guest in ring0

2016-08-04 Thread Bread Cutter
My workaround for now is just something like int mode = hvm_guest_x86_mode(curr); uint32_t eax = regs->eax; +if(eax == 0xFACE) { +hvm_event_guest_request(); +return 1; +} + switch ( mode ) { case 8: This way I don't have to worry about if it's

Re: [Xen-devel] [PATCH RFC 06/12] xen/x86: populate PVHv2 Dom0 physical memory map

2016-08-04 Thread Andrew Cooper
On 02/08/16 10:19, Roger Pau Monne wrote: > On Fri, Jul 29, 2016 at 08:04:12PM +0100, Andrew Cooper wrote: >> On 29/07/16 17:29, Roger Pau Monne wrote: >>> Craft the Dom0 e820 memory map and populate it. >>> >>> Signed-off-by: Roger Pau Monné >>> --- >>> Cc: Jan Beulich >>> Cc: Andrew Cooper >>>

Re: [Xen-devel] [PATCH RFC 04/12] xen/x86: split Dom0 build into PV and PVHv2

2016-08-04 Thread Andrew Cooper
On 01/08/16 12:36, Roger Pau Monne wrote: > On Fri, Jul 29, 2016 at 06:57:08PM +0100, Andrew Cooper wrote: >> On 29/07/16 17:28, Roger Pau Monne wrote: >>> Split the Dom0 builder into two different functions, one for PV (and classic >>> PVH), and another one for PVHv2. Introduce a new command line

Re: [Xen-devel] [PATCH] xen/arm: p2m: Don't use default access permission when shattering a superpage

2016-08-04 Thread Stefano Stabellini
On Fri, 29 Jul 2016, Julien Grall wrote: > The following message flood the console when memaccess is enabled on > various platforms: > > traps.c:2510:d1v0 HSR=0x9383004f pc=0x08b7d4c4 gva=0x08eeb8e0 > gpa=0x004903f8e0 > > This is because a data abort from a guest was received

Re: [Xen-devel] [OSSTEST PATCH RFC 04/14] ap-common: add xtf tree

2016-08-04 Thread Andrew Cooper
On 04/08/16 17:13, Ian Jackson wrote: > Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf > tree"): >> On 04/08/16 16:21, Ian Jackson wrote: >>> Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf >>> tree"): We should also clarify the force push cri

Re: [Xen-devel] [OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build [and 1 more messages]

2016-08-04 Thread Ian Jackson
Andrew Cooper writes ("Re: [Xen-devel] [OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build [and 1 more messages]"): > The current hard-coded paths exist only because of current limitiations > in xl/libxl (identified here: > http://xenbits.xen.org/people/andrewcoop/xen-test-framework/#errata) > > Wit

Re: [Xen-devel] [OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build [and 1 more messages]

2016-08-04 Thread Andrew Cooper
On 04/08/16 17:05, Ian Jackson wrote: > Wei Liu writes ("Re: [OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build [and 1 > more messages]"): >> On Thu, Aug 04, 2016 at 04:17:45PM +0100, Ian Jackson wrote: >>> The ability to coinstall multiple different xtfs was my reason for >>> suggesting that the xt

Re: [Xen-devel] [PATCH v3 0/6] xen/arm: Simplify do_trap_*_abort_guest

2016-08-04 Thread Stefano Stabellini
On Thu, 4 Aug 2016, Julien Grall wrote: > The current data/instruction abort paths contain unnecessary code and > translate too often a VA to a IPA. This series aim to simplify this path. > > Now that the register HPFAR_EL2 is read in some case that can be affected > by the erratum 834220 on Corte

Re: [Xen-devel] [PATCH v3 3/6] xen/arm: Use check_workaround to handle the erratum 766422

2016-08-04 Thread Julien Grall
Hi, On 04/08/16 18:50, Julien Grall wrote: Currently, Xen is accessing the stored MIDR everytime it has to check whether the processor is affected by the erratum 766422. This could take advantage of the new capability bitfields to detect whether the processor is affected at boot time. With thi

Re: [Xen-devel] [PATCH v3 2/6] xen/arm: Provide macros to help creating workaround helpers

2016-08-04 Thread Julien Grall
Hi, On 04/08/16 18:50, Julien Grall wrote: Workarounds may require to execute a different path when the platform is affected by the associated erratum. Furthermore, this may need to be called in the common code. To avoid too much intrusion/overhead, the workaround helpers need to be a nop on ar

Re: [Xen-devel] [PATCH v3 1/6] xen/arm: traps: Simplify the switch in do_trap_*_abort_guest

2016-08-04 Thread Julien Grall
Hi, On 04/08/16 18:50, Julien Grall wrote: The fault status we care are in the form xx where xx is the lookup level that gave the fault. We can simplify the code by masking the 2 least significant bits. Signed-off-by: Julien Grall I forgot to retain the reviewed-by from Stefano given on

[Xen-devel] [PATCH v3 2/6] xen/arm: Provide macros to help creating workaround helpers

2016-08-04 Thread Julien Grall
Workarounds may require to execute a different path when the platform is affected by the associated erratum. Furthermore, this may need to be called in the common code. To avoid too much intrusion/overhead, the workaround helpers need to be a nop on architecture which will never have the workaroun

[Xen-devel] [PATCH v3 6/6] xen/arm: arm64: Add Cortex-A57 erratum 834220 workaround

2016-08-04 Thread Julien Grall
The ARM erratum applies to certain revisions of Cortex-A57. The processor may report a Stage 2 translation fault as the result of Stage 1 fault for load crossing a page boundary when there is a permission fault or device memory fault at stage 1 and a translation fault at Stage 2. So Xen needs to c

[Xen-devel] [PATCH v3 1/6] xen/arm: traps: Simplify the switch in do_trap_*_abort_guest

2016-08-04 Thread Julien Grall
The fault status we care are in the form xx where xx is the lookup level that gave the fault. We can simplify the code by masking the 2 least significant bits. Signed-off-by: Julien Grall --- The switch has not been replaced by a simple if because more case will be added in follow-up

[Xen-devel] [PATCH v3 5/6] xen/arm: traps: Avoid unnecessary VA -> IPA translation in abort handlers

2016-08-04 Thread Julien Grall
Translating a VA to a IPA is expensive. Currently, Xen is assuming that HPFAR_EL2 is only valid when the stage-2 data/instruction abort happened during a translation table walk of a first stage translation (i.e S1PTW is set). However, based on the ARM ARM (D7.2.34 in DDI 0487A.j), the register is

[Xen-devel] [PATCH v3 3/6] xen/arm: Use check_workaround to handle the erratum 766422

2016-08-04 Thread Julien Grall
Currently, Xen is accessing the stored MIDR everytime it has to check whether the processor is affected by the erratum 766422. This could take advantage of the new capability bitfields to detect whether the processor is affected at boot time. With this patch, the number of instructions to check t

[Xen-devel] [PATCH v3 0/6] xen/arm: Simplify do_trap_*_abort_guest

2016-08-04 Thread Julien Grall
The current data/instruction abort paths contain unnecessary code and translate too often a VA to a IPA. This series aim to simplify this path. Now that the register HPFAR_EL2 is read in some case that can be affected by the erratum 834220 on Cortex-A57, we need to implement a workaround for it (s

[Xen-devel] [PATCH v3 4/6] xen/arm: traps: MMIO should only be emulated for fault translation

2016-08-04 Thread Julien Grall
The function do_trap_data_abort_guest assumes that a stage-2 data abort can only be taken for a translation fault or permission fault today. Whilst this is true today, it might not be in the future. Rather than emulating the MMIO for any fault other than the permission one, print a warning message

[Xen-devel] [PULL 1/1] Xen PCI passthrough: fix passthrough failure when no interrupt pin

2016-08-04 Thread Stefano Stabellini
From: Bruce Rogers Commit 5a11d0f7 mistakenly converted a log message into an error condition when no pin interrupt is found for the pci device being passed through. Revert that part of the commit. Signed-off-by: Bruce Rogers Signed-off-by: Stefano Stabellini Acked-by: Anthony PERARD --- hw/

[Xen-devel] xen-20160804-tag

2016-08-04 Thread Stefano Stabellini
t tags/xen-20160804-tag for you to fetch changes up to 0968c91ce00f42487fb11de5da38e53b5dc6bc7f: Xen PCI passthrough: fix passthrough failure when no interrupt pin (2016-08-04 10:42:48 -0700) Xen

[Xen-devel] [DRAFT v5] PV Calls protocol design document (former XenSock)

2016-08-04 Thread Stefano Stabellini
Hi all, This is the design document of the PV Calls protocol. You can find prototypes of the Linux frontend and backend drivers here: git://git.kernel.org/pub/scm/linux/kernel/git/sstabellini/xen.git pvcalls-5 To use them, make sure to enable CONFIG_PVCALLS in your kernel config and add "pvcalls

Re: [Xen-devel] [PATCH v2] mem_access: sanitize code around sending vm_event request

2016-08-04 Thread Tamas K Lengyel
On Thu, Aug 4, 2016 at 10:45 AM, Julien Grall wrote: > Hello Tamas, > > On 04/08/16 17:12, Tamas K Lengyel wrote: >> >> On Thu, Aug 4, 2016 at 8:10 AM, George Dunlap >> wrote: >>> >>> On 03/08/16 17:31, Tamas K Lengyel wrote: I understand and that's fine. However, for our components we

Re: [Xen-devel] [PATCH v2 20/25] arm/altp2m: Add altp2m paging mechanism.

2016-08-04 Thread Julien Grall
Hi Sergej, On 01/08/16 18:10, Sergej Proskurin wrote: diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c index 12be7c9..628abd7 100644 --- a/xen/arch/arm/traps.c +++ b/xen/arch/arm/traps.c [...] @@ -2403,35 +2405,64 @@ static void do_trap_instr_abort_guest(struct cpu_user_regs *regs,

Re: [Xen-devel] [PATCH v2 01/25] arm/altp2m: Add first altp2m HVMOP stubs.

2016-08-04 Thread Julien Grall
On 04/08/16 17:22, Sergej Proskurin wrote: On 08/04/2016 06:04 PM, Julien Grall wrote: On 04/08/16 17:01, Sergej Proskurin wrote: Hi Julien, On 08/03/2016 06:54 PM, Julien Grall wrote: Hello Sergej, On 01/08/16 18:10, Sergej Proskurin wrote: This commit moves the altp2m-related code f

Re: [Xen-devel] [PATCH] domctl: relax getdomaininfo permissions

2016-08-04 Thread Andrew Cooper
On 04/08/16 17:07, Jan Beulich wrote: On 04.08.16 at 17:55, wrote: >> On 04/08/16 16:44, Jan Beulich wrote: >> On 04.08.16 at 17:22, wrote: On 04/08/16 09:41, Jan Beulich wrote: > @@ -817,14 +816,22 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe > > case XEN_DOMCTL_g

Re: [Xen-devel] [PATCH v2] mem_access: sanitize code around sending vm_event request

2016-08-04 Thread Julien Grall
Hello Tamas, On 04/08/16 17:12, Tamas K Lengyel wrote: On Thu, Aug 4, 2016 at 8:10 AM, George Dunlap wrote: On 03/08/16 17:31, Tamas K Lengyel wrote: I understand and that's fine. However, for our components we may prefer a different style of workflow on occasion as our definition of what con

[Xen-devel] [ovmf test] 99943: all pass - PUSHED

2016-08-04 Thread osstest service owner
flight 99943 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/99943/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf afd6b28915cac422294a28033ef83727b27ce216 baseline version: ovmf 365a3aab857a2820d36d2ae

Re: [Xen-devel] [PATCH] domctl: relax getdomaininfo permissions

2016-08-04 Thread Ian Jackson
Jan Beulich writes ("[PATCH] domctl: relax getdomaininfo permissions"): > Qemu needs access to this for the domain it controls, both due to it > being used by xc_domain_memory_mapping() (which qemu calls) and the > explicit use in hw/xenpv/xen_domainbuild.c:xen_domain_poll(). > > This at once avoi

[Xen-devel] [xen-unstable-smoke test] 99945: tolerable all pass - PUSHED

2016-08-04 Thread osstest service owner
flight 99945 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/99945/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH v3] mem_access: sanitize code around sending vm_event request

2016-08-04 Thread Jan Beulich
>>> On 04.08.16 at 18:16, wrote: > On Thu, Aug 4, 2016 at 1:51 AM, Jan Beulich wrote: > On 04.08.16 at 08:36, wrote: >>> On Thu, Aug 4, 2016 at 12:29 AM, Jan Beulich wrote: >>> On 03.08.16 at 20:41, wrote: > @@ -1846,11 +1846,15 @@ int hvm_hap_nested_page_fault(paddr_t gpa, >

Re: [Xen-devel] [PATCH v2 01/25] arm/altp2m: Add first altp2m HVMOP stubs.

2016-08-04 Thread Sergej Proskurin
On 08/04/2016 06:04 PM, Julien Grall wrote: > > > On 04/08/16 17:01, Sergej Proskurin wrote: >> Hi Julien, >> >> >> On 08/03/2016 06:54 PM, Julien Grall wrote: >>> Hello Sergej, >>> >>> On 01/08/16 18:10, Sergej Proskurin wrote: This commit moves the altp2m-related code from x86 to ARM. Funct

Re: [Xen-devel] [PATCH v3] mem_access: sanitize code around sending vm_event request

2016-08-04 Thread Tamas K Lengyel
On Thu, Aug 4, 2016 at 1:51 AM, Jan Beulich wrote: On 04.08.16 at 08:36, wrote: >> On Thu, Aug 4, 2016 at 12:29 AM, Jan Beulich wrote: >> On 03.08.16 at 20:41, wrote: @@ -1846,11 +1846,15 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned long gla,

Re: [Xen-devel] [PATCH v2 03/25] arm/altp2m: Add struct vttbr.

2016-08-04 Thread Julien Grall
On 04/08/16 17:11, Sergej Proskurin wrote: diff --git a/xen/include/asm-arm/processor.h b/xen/include/asm-arm/processor.h index 15bf890..f8ca18c 100644 --- a/xen/include/asm-arm/processor.h +++ b/xen/include/asm-arm/processor.h @@ -529,6 +529,22 @@ union hsr { }; + +/* VTTBR: Virtualization

Re: [Xen-devel] [OSSTEST PATCH RFC 04/14] ap-common: add xtf tree

2016-08-04 Thread Ian Jackson
Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf tree"): > On 04/08/16 16:21, Ian Jackson wrote: > > Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf > > tree"): > >> We should also clarify the force push criteria. It is moderately likely > >> that we

Re: [Xen-devel] [PATCH v2] mem_access: sanitize code around sending vm_event request

2016-08-04 Thread Tamas K Lengyel
On Thu, Aug 4, 2016 at 8:10 AM, George Dunlap wrote: > On 03/08/16 17:31, Tamas K Lengyel wrote: >> On Wed, Aug 3, 2016 at 10:10 AM, George Dunlap >> wrote: >>> On 03/08/16 16:58, Tamas K Lengyel wrote: On Wed, Aug 3, 2016 at 9:44 AM, George Dunlap wrote: > On 03/08/16 16:40, Tam

Re: [Xen-devel] [PATCH v2 03/25] arm/altp2m: Add struct vttbr.

2016-08-04 Thread Sergej Proskurin
Hi Julien, >> Hello Sergej, >> >> Title: s/altp2m/p2m/ I will adapt the titles of all patches, thank you. >> >> On 01/08/16 18:10, Sergej Proskurin wrote: >>> The struct vttbr introduces a simple way to precisely access the >>> individual fields of the vttbr. >> >> I am not sure whether this is

Re: [Xen-devel] [PATCHv2 2/2] xen/privcmd: add ioctls for locking/unlocking hypercall buffers

2016-08-04 Thread Jan Beulich
>>> On 04.08.16 at 17:16, wrote: > Using mlock() for hypercall buffers is not sufficient since mlocked > pages are still subject to compaction and page migration. Page > migration can be prevented by taking additional references to the > pages. > > Introduce two new ioctls: IOCTL_PRIVCMD_HCALL_B

Re: [Xen-devel] [PATCH] domctl: relax getdomaininfo permissions

2016-08-04 Thread Jan Beulich
>>> On 04.08.16 at 17:55, wrote: > On 04/08/16 16:44, Jan Beulich wrote: > On 04.08.16 at 17:22, wrote: >>> On 04/08/16 09:41, Jan Beulich wrote: @@ -817,14 +816,22 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe case XEN_DOMCTL_getdomaininfo: { -domid

Re: [Xen-devel] [OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build [and 1 more messages]

2016-08-04 Thread Ian Jackson
Wei Liu writes ("Re: [OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build [and 1 more messages]"): > On Thu, Aug 04, 2016 at 04:17:45PM +0100, Ian Jackson wrote: > > The ability to coinstall multiple different xtfs was my reason for > > suggesting that the xtfdist should be unpacked into a job-specifi

Re: [Xen-devel] [PATCH v2 01/25] arm/altp2m: Add first altp2m HVMOP stubs.

2016-08-04 Thread Julien Grall
On 04/08/16 17:01, Sergej Proskurin wrote: Hi Julien, On 08/03/2016 06:54 PM, Julien Grall wrote: Hello Sergej, On 01/08/16 18:10, Sergej Proskurin wrote: This commit moves the altp2m-related code from x86 to ARM. Functions that are no yet supported notify the caller or print a BUG message

Re: [Xen-devel] [PATCH v2 01/25] arm/altp2m: Add first altp2m HVMOP stubs.

2016-08-04 Thread Sergej Proskurin
Hi Julien, On 08/03/2016 06:54 PM, Julien Grall wrote: > Hello Sergej, > > On 01/08/16 18:10, Sergej Proskurin wrote: >> This commit moves the altp2m-related code from x86 to ARM. Functions >> that are no yet supported notify the caller or print a BUG message >> stating their absence. >> >> Also,

[Xen-devel] [PATCH v2 1/3] livepach: Add .livepatch.hooks functions and test-case

2016-08-04 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Add hook functions which run during patch apply and patch revert. Hook functions are used by livepatch payloads to manipulate data structures during patching, etc. One use case is the XSA91. As Martin mentions it: "If we have shadow variables, we also need an unload hook to

[Xen-devel] [PATCH v2 2/3] symbols: Generate an xen-sym.map

2016-08-04 Thread Konrad Rzeszutek Wilk
You could construct _most_ of the names of the functions by doing 'nm --defined' but unfortunatly you do not get the prefix that is added on in Xen . For example: $ cat xen-syms.symbols |grep do_domain_pause 0x82d080104920 t domain.c#do_domain_pause $ nm --defined xen-syms|grep do_domain_paus

Re: [Xen-devel] [PATCH] domctl: relax getdomaininfo permissions

2016-08-04 Thread Andrew Cooper
On 04/08/16 16:44, Jan Beulich wrote: On 04.08.16 at 17:22, wrote: >> On 04/08/16 09:41, Jan Beulich wrote: >>> @@ -817,14 +816,22 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe >>> >>> case XEN_DOMCTL_getdomaininfo: >>> { >>> -domid_t dom = op->domain; >>> - >>> -rcu

[Xen-devel] [PATCH v2 3/3] livepatch: Sync cache of build-id before using it first time.

2016-08-04 Thread Konrad Rzeszutek Wilk
We don't print at bootup time the build-id. The reason is that xen_build_init and livepatch_init are both __initcall type routines. This meant that when livepatch_init called xen_build_id, it would return -ENODATA as build_id_len was not setup yet (b/c xen_build_init would be called later). We fix

[Xen-devel] [PATCH v1] Livepatch patches for v4.8 (v1)

2016-08-04 Thread Konrad Rzeszutek Wilk
Attached are thee patches for v4.8. The first one had been posted during v4.7 but we decided to punt to v4.8: [PATCH v2 1/3] livepach: Add .livepatch.hooks functions and test-case The other one is to make it easier to make sure that the livepatch symbols match with the hypervisor one and not have

Re: [Xen-devel] [PATCH] domctl: relax getdomaininfo permissions

2016-08-04 Thread Jan Beulich
>>> On 04.08.16 at 17:22, wrote: > On 04/08/16 09:41, Jan Beulich wrote: >> @@ -817,14 +816,22 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe >> >> case XEN_DOMCTL_getdomaininfo: >> { >> -domid_t dom = op->domain; >> - >> -rcu_read_lock(&domlist_read_lock); >> +dom

Re: [Xen-devel] [OSSTEST PATCH RFC 04/14] ap-common: add xtf tree

2016-08-04 Thread Andrew Cooper
On 04/08/16 16:21, Ian Jackson wrote: > Andrew Cooper writes ("Re: [OSSTEST PATCH RFC 04/14] ap-common: add xtf > tree"): >> On 04/08/16 12:49, Ian Jackson wrote: >>> Andrew, do you want to have osstest run its xtf push gate between >>> `staging' and `master' branches of xtf, or do you want to jus

Re: [Xen-devel] [OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build [and 1 more messages]

2016-08-04 Thread Wei Liu
On Thu, Aug 04, 2016 at 04:17:45PM +0100, Ian Jackson wrote: > Wei Liu writes ("[OSSTEST PATCH RFC 06/14] Introduce ts-xtf-build"): > > > > +sub stash () { > > > > +built_stash($ho, $builddir, "xtfdist", "xtfdist"); > > > > +} > > > > > > Can you post a tar zvvtf of a sample xtfdist tarball ?

Re: [Xen-devel] [OSSTEST PATCH RFC 01/14] ts-xen-build: always compile in FEP support

2016-08-04 Thread Ian Jackson
Wei Liu writes ("Re: [Xen-devel] [OSSTEST PATCH RFC 01/14] ts-xen-build: always compile in FEP support"): > On Thu, Aug 04, 2016 at 04:22:58PM +0100, Ian Jackson wrote: > > Why not just report the fep test as having failed, in old branches, > > and then carry on ? > > How to do that? If the test

Re: [Xen-devel] Xen 4.6.1 crash with altp2m enabled by default

2016-08-04 Thread Jan Beulich
>>> On 04.08.16 at 17:08, wrote: > crash> x /130x 0x830bd0da1000 > 0x830bd0da1000: 0x000e 0x > 0x830bd0da1010: 0x 0x > 0x830bd0da1020: 0x 0x > 0x830bd0da1030:

Re: [Xen-devel] [OSSTEST PATCH RFC 11/14] Introduce ts-xtf-run

2016-08-04 Thread Ian Jackson
Wei Liu writes ("Re: [OSSTEST PATCH RFC 11/14] Introduce ts-xtf-run"): > On Thu, Aug 04, 2016 at 01:19:15PM +0100, Ian Jackson wrote: > > Please arrange that all problems which ought to cause "record step as > > `fail' and run no more tests" are handled by: > > > > - having the code which d

Re: [Xen-devel] [OSSTEST PATCH RFC 01/14] ts-xen-build: always compile in FEP support

2016-08-04 Thread Wei Liu
On Thu, Aug 04, 2016 at 04:22:58PM +0100, Ian Jackson wrote: > Wei Liu writes ("Re: [Xen-devel] [OSSTEST PATCH RFC 01/14] ts-xen-build: > always compile in FEP support"): > > On Thu, Aug 04, 2016 at 02:28:01PM +0100, Andrew Cooper wrote: > > > However, it might be useful to confirm that fep doesn'

[Xen-devel] [PATCHv2 2/2] xen/privcmd: add ioctls for locking/unlocking hypercall buffers

2016-08-04 Thread David Vrabel
Using mlock() for hypercall buffers is not sufficient since mlocked pages are still subject to compaction and page migration. Page migration can be prevented by taking additional references to the pages. Introduce two new ioctls: IOCTL_PRIVCMD_HCALL_BUF_LOCK and IOCTL_PRIVCMD_HCALL_BUF_UNLOCK whi

  1   2   3   >