Re: [Xen-devel] [RFC QEMU PATCH 8/8] qmp: add a qmp command 'query-nvdimms' to get plugged NVDIMM devices

2016-10-10 Thread Haozhong Zhang
On 10/10/16 14:16, Eric Blake wrote: > On 10/09/2016 07:34 PM, Haozhong Zhang wrote: > > Xen uses this command to get the backend resource, guest SPA and size of > > NVDIMM devices so as to map them to guest. > > > > Signed-off-by: Haozhong Zhang > > --- > > Cc: Markus Armbruster > > > +++ b/do

Re: [Xen-devel] [RFC KERNEL PATCH 0/2] Add Dom0 NVDIMM support for Xen

2016-10-10 Thread Haozhong Zhang
On 10/10/16 17:43, Andrew Cooper wrote: > On 10/10/16 01:35, Haozhong Zhang wrote: > > Overview > > > > This RFC kernel patch series along with corresponding patch series of > > Xen, QEMU and ndctl implements Xen vNVDIMM, which can map the host > > NVDIMM devices to Xen HVM domU as vNVDIMM

[Xen-devel] Xen 4.2.4 and 4.6 hangs

2016-10-10 Thread Soumendu Satapathy
Hi there, I am trying to install and boot xen. I followed the following procedure. There was no errors while installation. But when I select the grub entry it hangs. The following is the steps I followed. yum -y install centos-release-xen yum --enablerepo=centos-virt-xen -y update kernel yum -

[Xen-devel] RXen 4.2.4 and 4.6 hangs

2016-10-10 Thread Soumendu Satapathy
Hi there, Platform - Intel CPU - Skylake I am trying to install and boot xen. I followed the following procedure. There was no errors while installation. But when I select the grub entry it hangs. The following is the steps I followed. yum -y install centos-release-xen yum --enablerepo=cento

Re: [Xen-devel] [PATCH v7] xen/sm{e, a}p: allow disabling sm{e, a}p for Xen itself

2016-10-10 Thread He Chen
On Mon, Oct 10, 2016 at 06:16:41AM -0600, Jan Beulich wrote: > >>> On 09.10.16 at 10:20, wrote: > > Changes in v7: > > * bugfix: fix the bug that this patch doesn't work on machine without SMAP. > > * test: This patch has not been tested (on 32-bit PV environment). > > Really sorry for tha

Re: [Xen-devel] [v2 1/3] x86: refactor psr implementation in hypervisor.

2016-10-10 Thread Yi Sun
On 16-10-10 01:34:47, Jan Beulich wrote: > >>> On 09.10.16 at 08:43, wrote: > > On 16-09-30 17:18:33, Konrad Rzeszutek Wilk wrote: > >> On Thu, Sep 22, 2016 at 10:15:20AM +0800, Yi Sun wrote: > >> > Current psr.c is designed for supporting L3 CAT/CDP. It has many > >> > limitations to add new feat

[Xen-devel] [qemu-mainline test] 101358: tolerable FAIL - PUSHED

2016-10-10 Thread osstest service owner
flight 101358 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/101358/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail like 101328 test-amd64-i386-xl-qemuu-w

Re: [Xen-devel] Xen virtual IOMMU high level design doc

2016-10-10 Thread Lan Tianyu
On 2016年10月06日 02:36, Konrad Rzeszutek Wilk wrote: >>> 3.3 Interrupt remapping >>> > > Interrupts from virtual devices and physical devices will be delivered >>> > > to vlapic from vIOAPIC and vMSI. It needs to add interrupt remapping >>> > > hooks in the vmsi_deliver() and ioapic_deliver() to find

Re: [Xen-devel] [Resend PATCH 1/2] Xen/Keyhandler: Make keyhandler always run in tasklet

2016-10-10 Thread Lan Tianyu
On 2016年10月10日 21:55, Konrad Rzeszutek Wilk wrote: > On Sat, Oct 08, 2016 at 11:26:44AM +0800, Lan Tianyu wrote: >> On 2016年10月06日 20:52, Jan Beulich wrote: >> On 30.09.16 at 04:19, wrote: @@ -87,10 +89,10 @@ void handle_keypress(unsigned char key, struct cpu_user_regs *regs)

[Xen-devel] [PATCH v5 4/7] VMX: Make sure PI is in proper state before install the hooks

2016-10-10 Thread Feng Wu
We may hit the last ASSERT() in vmx_vcpu_block in the current code, since vmx_vcpu_block() may get called before vmx_pi_switch_to() has been installed or executed. Here We use cmpxchg to update the NDST field, this can make sure we only update the NDST when vmx_pi_switch_to() has not been called. S

[Xen-devel] [PATCH v5 5/7] VT-d: No need to set irq affinity for posted format IRTE

2016-10-10 Thread Feng Wu
We don't set the affinity for posted format IRTE, since the destination of these interrupts is vCPU and the vCPU affinity is set during vCPU scheduling. Signed-off-by: Feng Wu --- v5: - Only suppress affinity related IRTE updates for PI xen/drivers/passthrough/vtd/intremap.c | 52 ++

[Xen-devel] [PATCH v5 2/7] VMX: Properly handle pi when all the assigned devices are removed

2016-10-10 Thread Feng Wu
This patch handles some concern cases when the last assigned device is removed from the domain. In this case we should carefully handle pi descriptor and the per-cpu blocking list, to make sure: - all the PI descriptor are in the right state when next time a devices is assigned to the domain again.

[Xen-devel] [PATCH v5 3/7] VMX: Cleanup PI per-cpu blocking list when vcpu is destroyed

2016-10-10 Thread Feng Wu
We should remove the vCPU from the per-cpu blocking list if it is going to be destroyed. Signed-off-by: Feng Wu --- v5: - Use vmx_pi_list_remove() instead of vmx_pi_list_cleanup() xen/arch/x86/hvm/vmx/vmx.c | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arc

[Xen-devel] [PATCH v5 6/7] VT-d: Some cleanups

2016-10-10 Thread Feng Wu
Use type-safe structure assignment instead of memcpy() Use sizeof(*iremap_entry) Signed-off-by: Feng Wu --- xen/drivers/passthrough/vtd/intremap.c | 17 + 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/xen/drivers/passthrough/vtd/intremap.c b/xen/drivers/passthrou

[Xen-devel] [PATCH v5 0/7] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-10-10 Thread Feng Wu
The current VT-d PI related code may operate incorrectly in the following scenarios: 1. When the last assigned device is dettached from the domain, all the PI related hooks are removed then, however, the vCPU can be blocked, switched to another pCPU, etc, all without the aware of PI. After the next

[Xen-devel] [PATCH v5 7/7] VMX: Fixup PI descriptor when cpu is offline

2016-10-10 Thread Feng Wu
When cpu is offline, we need to move all the vcpus in its blocking list to another online cpu, this patch handles it. Signed-off-by: Feng Wu --- v5: - Add some comments to explain why it doesn't cause deadlock for the ABBA deadlock scenario. xen/arch/x86/hvm/vmx/vmcs.c | 1 + xen/arch/x8

[Xen-devel] [PATCH v5 1/7] VMX: Statically assign two PI hooks

2016-10-10 Thread Feng Wu
PI hooks: vmx_pi_switch_from() and vmx_pi_switch_to() are needed even when any previously assigned device is detached from the domain. Since 'SN' bit is also used to control the CPU side PI and we change the state of SN bit in these two functions, then evaluate this bit in vmx_deliver_posted_intr()

[Xen-devel] [xen-unstable test] 101355: regressions - FAIL

2016-10-10 Thread osstest service owner
flight 101355 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/101355/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-raw 6 xen-boot fail REGR. vs. 101347 Regressions which

Re: [Xen-devel] [PATCH v4 5/6] VT-d: No need to set irq affinity for posted format IRTE

2016-10-10 Thread Wu, Feng
> >> How do you know? Judging just from current callers is - as said > >> before - calling for trouble down the road. And the function clearly > >> creates a brand new IRTE, which fully replaces the previous one. > > > > This function copy the old IRTE to 'new_ire' and it doesn't touch > > fields l

[Xen-devel] [xen-unstable-smoke test] 101359: tolerable all pass - PUSHED

2016-10-10 Thread osstest service owner
flight 101359 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101359/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 1

[Xen-devel] `xl create` hang on skylake desktop

2016-10-10 Thread Lai, Paul
Hi Shannon: I’m reporting that commit 38cd0664a6bf1c3b887992ea029d2bb516f52c59 is causing a hang in the `xl create windows7` command on my skylake desktop. This is a regression from previous behavior. commit 38cd0664a6bf1c3b887992ea029d2bb516f52c59 Author: Shannon Zhao Date: Wed Sep 28 18:19:

Re: [Xen-devel] [driver question] IOMMU concept in Xen

2016-10-10 Thread Maciek
Yes you are right, I was too focused on my issue that I didn't specify what I am trying to achieve :) My company current driver can work as normal PF pci device, and also we support SR-IOV. In driver initialization we can call sriov_configure to turn on SRIOV and enable VFs. To be able to run

[Xen-devel] [PATCH] Don't clear HCR_VM bit when updating VTTBR.

2016-10-10 Thread Jun Sun
Currently function p2m_restore_state() would clear HCR_VM bit, i.e., disabling stage2 translation, before updating VTTBR register. After some research and talking to ARM support, I got confirmed that this is not necessary. We are currently working on a new platform that would need this to be remove

Re: [Xen-devel] [RFC QEMU PATCH 8/8] qmp: add a qmp command 'query-nvdimms' to get plugged NVDIMM devices

2016-10-10 Thread Eric Blake
On 10/09/2016 07:34 PM, Haozhong Zhang wrote: > Xen uses this command to get the backend resource, guest SPA and size of > NVDIMM devices so as to map them to guest. > > Signed-off-by: Haozhong Zhang > --- > Cc: Markus Armbruster > +++ b/docs/qmp-commands.txt > @@ -3800,3 +3800,39 @@ Example fo

Re: [Xen-devel] [PATCH] fix EFI part of "symbols: Generate an xen-sym.map"

2016-10-10 Thread Stefano Stabellini
On Mon, 10 Oct 2016, Konrad Rzeszutek Wilk wrote: > On Mon, Oct 10, 2016 at 01:28:16AM -0600, Jan Beulich wrote: > > >>> On 07.10.16 at 19:57, wrote: > > > On Wed, 21 Sep 2016, Konrad Rzeszutek Wilk wrote: > > >> On Wed, Sep 21, 2016 at 10:04:21AM -0600, Jan Beulich wrote: > > >> > >>> On 21.09.16

Re: [Xen-devel] [PATCH] fix EFI part of "symbols: Generate an xen-sym.map"

2016-10-10 Thread Konrad Rzeszutek Wilk
On Mon, Oct 10, 2016 at 01:28:16AM -0600, Jan Beulich wrote: > >>> On 07.10.16 at 19:57, wrote: > > On Wed, 21 Sep 2016, Konrad Rzeszutek Wilk wrote: > >> On Wed, Sep 21, 2016 at 10:04:21AM -0600, Jan Beulich wrote: > >> > >>> On 21.09.16 at 17:59, wrote: > >> > > The fix can be done two ways: >

Re: [Xen-devel] [PATCH for-4.8] ipxe: update to newer commit

2016-10-10 Thread Juergen Schinker
and where have you applied that patch ? is it xen-4.8-rc1 ? do I have to apply that patch ? do I need to check out another tag ? do I have to wait a week? - On 10 Oct, 2016, at 16:33, Wei Liu wei.l...@citrix.com wrote: > Sure. I will check ipxe mailing list in one week. > > Wei. ___

Re: [Xen-devel] [PATCH for-4.8] ipxe: update to newer commit

2016-10-10 Thread Boris Ostrovsky
On 10/10/2016 12:33 PM, Wei Liu wrote: > On Mon, Oct 10, 2016 at 04:51:13PM +0100, Ian Jackson wrote: >> Wei Liu writes ("Re: [PATCH for-4.8] ipxe: update to newer commit"): >>> On Mon, Oct 10, 2016 at 04:34:31PM +0100, Ian Jackson wrote: How did you choose 827dd1bfee67daa683935ce65316f7e0f057

[Xen-devel] [qemu-mainline test] 101353: regressions - FAIL

2016-10-10 Thread osstest service owner
flight 101353 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/101353/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt 6 xen-boot fail REGR. vs. 101328 test-armhf-armhf-

[Xen-devel] [ovmf baseline-only test] 67856: all pass

2016-10-10 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67856 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67856/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 87c04781d5a7d13ba3cae87daedd52fe71280f3f baseline v

Re: [Xen-devel] [Qemu-devel] [RFC QEMU PATCH 0/8] Implement vNVDIMM for Xen HVM guest

2016-10-10 Thread no-reply
Hi, Your series failed automatic build test. Please find the testing commands and their output below. If you have docker installed, you can probably reproduce it locally. Message-id: 20161010003423.4333-1-haozhong.zh...@intel.com Subject: [Qemu-devel] [RFC QEMU PATCH 0/8] Implement vNVDIMM for Xe

Re: [Xen-devel] [RFC KERNEL PATCH 0/2] Add Dom0 NVDIMM support for Xen

2016-10-10 Thread Andrew Cooper
On 10/10/16 01:35, Haozhong Zhang wrote: > Overview > > This RFC kernel patch series along with corresponding patch series of > Xen, QEMU and ndctl implements Xen vNVDIMM, which can map the host > NVDIMM devices to Xen HVM domU as vNVDIMM devices. > > Xen hypervisor does not include an NVD

Re: [Xen-devel] [PATCH for-4.8] ipxe: update to newer commit

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 04:51:13PM +0100, Ian Jackson wrote: > Wei Liu writes ("Re: [PATCH for-4.8] ipxe: update to newer commit"): > > On Mon, Oct 10, 2016 at 04:34:31PM +0100, Ian Jackson wrote: > > > How did you choose 827dd1bfee67daa683935ce65316f7e0f057fe1c ? > > > > That's the latest commit

[Xen-devel] [xen-unstable-smoke test] 101356: tolerable all pass - PUSHED

2016-10-10 Thread osstest service owner
flight 101356 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101356/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [Xen-devel] [RFC KERNEL PATCH 0/2] Add Dom0 NVDIMM support for Xen

2016-10-10 Thread Dan Williams
On Sun, Oct 9, 2016 at 11:32 PM, Haozhong Zhang wrote: > On 10/09/16 20:45, Dan Williams wrote: >> On Sun, Oct 9, 2016 at 5:35 PM, Haozhong Zhang >> wrote: >> > Overview >> > >> > This RFC kernel patch series along with corresponding patch series of >> > Xen, QEMU and ndctl implements X

Re: [Xen-devel] [PATCH v2 for-4.8] libelf: fix symtab/strtab loading for 32bit domains

2016-10-10 Thread Ian Jackson
Roger Pau Monne writes ("[PATCH v2 for-4.8] libelf: fix symtab/strtab loading for 32bit domains"): > Commit ed04ca introduced a bug in the symtab/strtab loading for 32bit > guests, that corrupted the section headers array due to the padding > introduced by the elf_shdr union. > > The Elf section

Re: [Xen-devel] [PATCH v2 28/30] xen/x86: add MSI-X emulation to PVHv2 Dom0

2016-10-10 Thread Jan Beulich
>>> On 27.09.16 at 17:57, wrote: > --- a/xen/arch/x86/hvm/vmsi.c > +++ b/xen/arch/x86/hvm/vmsi.c > @@ -40,6 +40,7 @@ > #include > #include > #include > +#include > > static void vmsi_inj_irq( > struct vlapic *target, > @@ -1162,3 +1163,500 @@ struct hvm_pt_handler_init hvm_pt_msi_in

[Xen-devel] [PATCH v2 for-4.8] libelf: fix symtab/strtab loading for 32bit domains

2016-10-10 Thread Roger Pau Monne
Commit ed04ca introduced a bug in the symtab/strtab loading for 32bit guests, that corrupted the section headers array due to the padding introduced by the elf_shdr union. The Elf section header array on 32bit should be accessible as an array of Elf32_Shdr elements, and the union with Elf64_Shdr d

Re: [Xen-devel] [PATCH v2 0/9] Rework gcov support in Xen

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 17:47, wrote: > Wei Liu writes ("[PATCH v2 0/9] Rework gcov support in Xen"): >> Since the hypervisor interface is sysctl, we have the liberty to not >> care about backward compatibility. This series completely rewrites the >> gcov support inside Xen. > > I have looked at these

Re: [Xen-devel] [PATCH for-4.8] ipxe: update to newer commit

2016-10-10 Thread Ian Jackson
Wei Liu writes ("Re: [PATCH for-4.8] ipxe: update to newer commit"): > On Mon, Oct 10, 2016 at 04:34:31PM +0100, Ian Jackson wrote: > > How did you choose 827dd1bfee67daa683935ce65316f7e0f057fe1c ? > > That's the latest commit -- since upstream wants us to always use the > latest, I just picked th

Re: [Xen-devel] [PATCH v2 0/9] Rework gcov support in Xen

2016-10-10 Thread Ian Jackson
Wei Liu writes ("[PATCH v2 0/9] Rework gcov support in Xen"): > Since the hypervisor interface is sysctl, we have the liberty to not > care about backward compatibility. This series completely rewrites the > gcov support inside Xen. I have looked at these patches. One of them seemed in my bailiwi

Re: [Xen-devel] [PATCH for-4.8] ipxe: update to newer commit

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 04:34:31PM +0100, Ian Jackson wrote: > Wei Liu writes ("[PATCH for-4.8] ipxe: update to newer commit"): > > The current commit in tree is rather old. It has come to a point that > > cherry-picking commits from upstream isn't trivial anymore. > > > > There is long term plan

Re: [Xen-devel] [PATCH v2 6/9] gcov: userspace tools to extract and split gcov data

2016-10-10 Thread Ian Jackson
Wei Liu writes ("[PATCH v2 6/9] gcov: userspace tools to extract and split gcov data"): > Provide two tools: a small C program to extract data from hypervisor and > a python script to split data into multiple files. Acked-by: Ian Jackson ___ Xen-devel

Re: [Xen-devel] [PATCH for-4.8] ipxe: update to newer commit

2016-10-10 Thread Ian Jackson
Wei Liu writes ("[PATCH for-4.8] ipxe: update to newer commit"): > The current commit in tree is rather old. It has come to a point that > cherry-picking commits from upstream isn't trivial anymore. > > There is long term plan to track ipxe upstream, but for 4.8 release, we > should just update ip

Re: [Xen-devel] [PATCH v2 29/30] xen/x86: allow PVHv2 to perform foreign memory mappings

2016-10-10 Thread George Dunlap
On 10/10/16 15:50, Jan Beulich wrote: On 10.10.16 at 16:27, wrote: >> On 10/10/16 15:21, Jan Beulich wrote: >> On 27.09.16 at 17:57, wrote: --- a/xen/arch/x86/mm/p2m.c +++ b/xen/arch/x86/mm/p2m.c @@ -2793,7 +2793,7 @@ int p2m_add_foreign(struct domain *tdom, unsigned

Re: [Xen-devel] [PATCH v2 29/30] xen/x86: allow PVHv2 to perform foreign memory mappings

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 16:27, wrote: > On 10/10/16 15:21, Jan Beulich wrote: > On 27.09.16 at 17:57, wrote: >>> --- a/xen/arch/x86/mm/p2m.c >>> +++ b/xen/arch/x86/mm/p2m.c >>> @@ -2793,7 +2793,7 @@ int p2m_add_foreign(struct domain *tdom, unsigned >>> long fgfn, >>> struct domain *fdom; >>>

Re: [Xen-devel] [PATCH v2 5/9] gcov: add new interface and 3.4 and 4.7 format support

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 02:11:58PM +0100, Wei Liu wrote: [...] > > > + > > > +#include "gcov.h" > > > + > > > +/* > > > + * __gcov_init is called by gcc-generated constructor code for each > > > object > > > + * file compiled with -fprofile-arcs. > > > + * > > > + * Although this function is calle

Re: [Xen-devel] [PATCH v2 29/30] xen/x86: allow PVHv2 to perform foreign memory mappings

2016-10-10 Thread George Dunlap
On 10/10/16 15:21, Jan Beulich wrote: On 27.09.16 at 17:57, wrote: >> --- a/xen/arch/x86/mm/p2m.c >> +++ b/xen/arch/x86/mm/p2m.c >> @@ -2793,7 +2793,7 @@ int p2m_add_foreign(struct domain *tdom, unsigned long >> fgfn, >> struct domain *fdom; >> >> ASSERT(tdom); >> -if ( forei

Re: [Xen-devel] [PATCH v2 29/30] xen/x86: allow PVHv2 to perform foreign memory mappings

2016-10-10 Thread Jan Beulich
>>> On 27.09.16 at 17:57, wrote: > --- a/xen/arch/x86/mm/p2m.c > +++ b/xen/arch/x86/mm/p2m.c > @@ -2793,7 +2793,7 @@ int p2m_add_foreign(struct domain *tdom, unsigned long > fgfn, > struct domain *fdom; > > ASSERT(tdom); > -if ( foreigndom == DOMID_SELF || !is_pvh_domain(tdom) ) >

Re: [Xen-devel] [PATCH v2 27/30] x86/msixtbl: disable MSI-X intercepts for domains without an ioreq server

2016-10-10 Thread Jan Beulich
>>> On 27.09.16 at 17:57, wrote: > The current msixtbl intercepts only partially trap MSI-X accesses, but are > not complete, there's missing logic in order to setup PIRQs and bind them to > domains. Disable them for domains without at least an ioreq server (PVH). So what if a server registers la

[Xen-devel] [ovmf test] 101351: all pass - PUSHED

2016-10-10 Thread osstest service owner
flight 101351 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/101351/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 87c04781d5a7d13ba3cae87daedd52fe71280f3f baseline version: ovmf cf8140930ab23497f729b

Re: [Xen-devel] [BUG] Re: testing XEN-4.8-rc1

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 10:06:19AM -0400, Boris Ostrovsky wrote: > On 10/10/2016 06:00 AM, Wei Liu wrote: > > On Mon, Oct 10, 2016 at 10:36:04AM +0100, Juergen Schinker wrote: > >> Ok then on Debian testing > >> > >> ii gcc-6 6.2.0-5 > >>

Re: [Xen-devel] [BUG] Re: testing XEN-4.8-rc1

2016-10-10 Thread Boris Ostrovsky
On 10/10/2016 06:00 AM, Wei Liu wrote: > On Mon, Oct 10, 2016 at 10:36:04AM +0100, Juergen Schinker wrote: >> Ok then on Debian testing >> >> ii gcc-6 6.2.0-5 >>amd64GNU C compiler >> > Right, I think I know why it didn't bui

Re: [Xen-devel] [PATCH v2 26/30] xen/x86: add PCIe emulation

2016-10-10 Thread Jan Beulich
>>> On 27.09.16 at 17:57, wrote: > Add a new MMIO handler that traps accesses to PCIe regions, as discovered by > Xen from the MCFG ACPI table. The handler used is the same as the one used > for accesses to the IO PCI configuration space. Both in the title and in the code you use PCIe when you re

Re: [Xen-devel] [Resend PATCH 1/2] Xen/Keyhandler: Make keyhandler always run in tasklet

2016-10-10 Thread Konrad Rzeszutek Wilk
On Sat, Oct 08, 2016 at 11:26:44AM +0800, Lan Tianyu wrote: > On 2016年10月06日 20:52, Jan Beulich wrote: > On 30.09.16 at 04:19, wrote: > >> @@ -87,10 +89,10 @@ void handle_keypress(unsigned char key, struct > >> cpu_user_regs *regs) > >> if ( key >= ARRAY_SIZE(key_table) || !(h = &key_ta

Re: [Xen-devel] [PATCHv2 0/2] xen/privcmd: prevent page migration for hypercall buffers

2016-10-10 Thread David Vrabel
On 04/08/16 16:16, David Vrabel wrote: > Currently libxencall using mlocked buffers for hypercall buffers. > This pages are subject to compaction and page migration. A userspace > process may see a hypercall fail with -EFAULT if a page backing a > hypercall buffer is in the process of being migrate

Re: [Xen-devel] [PATCH v2 25/30] xen/x86: add all PCI devices to PVHv2 Dom0

2016-10-10 Thread Jan Beulich
>>> On 27.09.16 at 17:57, wrote: > --- a/xen/arch/x86/domain_build.c > +++ b/xen/arch/x86/domain_build.c > @@ -2378,6 +2378,25 @@ static int __init hvm_setup_acpi(struct domain *d) > return 0; > } > > +static int __init hvm_setup_pci(struct domain *d) > +{ > +struct pci_dev *pdev; > +

Re: [Xen-devel] [PATCH v2 23/30] xen/x86: route legacy PCI interrupts to Dom0

2016-10-10 Thread Jan Beulich
>>> On 27.09.16 at 17:57, wrote: > This is done adding some Dom0 specific logic to the IO APIC emulation inside > of Xen, so that writes to the IO APIC registers that should unmask an > interrupt will take care of setting up this interrupt with Xen. A Dom0 > specific EIO handler also has to be use

Re: [Xen-devel] [PATCH v2 8/9] Config.mk: introduce cc-ifversion

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 07:22:57AM -0600, Jan Beulich wrote: > >>> On 10.10.16 at 15:18, wrote: > > On Mon, Oct 10, 2016 at 06:00:03AM -0600, Jan Beulich wrote: > >> >>> On 10.10.16 at 11:40, wrote: > >> > It returns different string depending on compiler version. > >> > > >> > No user yet. > >>

Re: [Xen-devel] [PATCH v2 8/9] Config.mk: introduce cc-ifversion

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 15:18, wrote: > On Mon, Oct 10, 2016 at 06:00:03AM -0600, Jan Beulich wrote: >> >>> On 10.10.16 at 11:40, wrote: >> > It returns different string depending on compiler version. >> > >> > No user yet. >> > >> > Signed-off-by: Wei Liu >> >> Acked-by: Jan Beulich >> albeit I

Re: [Xen-devel] [PATCH v2 8/9] Config.mk: introduce cc-ifversion

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 06:00:03AM -0600, Jan Beulich wrote: > >>> On 10.10.16 at 11:40, wrote: > > It returns different string depending on compiler version. > > > > No user yet. > > > > Signed-off-by: Wei Liu > > Acked-by: Jan Beulich > albeit I wonder whether ... > > > --- a/Config.mk > >

[Xen-devel] [xen-unstable-smoke test] 101352: tolerable all pass - PUSHED

2016-10-10 Thread osstest service owner
flight 101352 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101352/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [Xen-devel] [PATCH v2 5/9] gcov: add new interface and 3.4 and 4.7 format support

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 06:56:52AM -0600, Jan Beulich wrote: > >>> On 10.10.16 at 14:23, wrote: > > On 10/10/16 12:56, Jan Beulich wrote: > > On 10.10.16 at 11:40, wrote: > >>> +struct type_info { > >>> +int ctr_type; > >> Can this be negative? > > > > This code is largely imported strai

Re: [Xen-devel] [PATCH v2 5/9] gcov: add new interface and 3.4 and 4.7 format support

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 05:56:35AM -0600, Jan Beulich wrote: [...] > Who is 9 (more similar ones below)? > > > +static int counter_active(const struct gcov_info *info, unsigned int type) > > +{ > > +return info->merge[type] ? 1 : 0; > > Return type bool and preferably with !! instead of condi

Re: [Xen-devel] [PATCH v2 5/9] gcov: add new interface and 3.4 and 4.7 format support

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 14:23, wrote: > On 10/10/16 12:56, Jan Beulich wrote: > On 10.10.16 at 11:40, wrote: >>> +struct type_info { >>> +int ctr_type; >> Can this be negative? > > This code is largely imported straight from Linux. We should not > needlessly deviate. Hmm, in that case some

[Xen-devel] [PATCH for-4.8] ipxe: update to newer commit

2016-10-10 Thread Wei Liu
The current commit in tree is rather old. It has come to a point that cherry-picking commits from upstream isn't trivial anymore. There is long term plan to track ipxe upstream, but for 4.8 release, we should just update ipxe to a newer commit (they are using rolling release model now). Forward-p

Re: [Xen-devel] [PATCH v2 20/30] xen/x86: add the basic infrastructure to import QEMU passthrough code

2016-10-10 Thread Jan Beulich
>>> On 27.09.16 at 17:57, wrote: > --- a/xen/arch/x86/hvm/hvm.c > +++ b/xen/arch/x86/hvm/hvm.c > @@ -632,6 +632,8 @@ int hvm_domain_initialise(struct domain *d) > goto fail1; > } > memset(d->arch.hvm_domain.io_bitmap, ~0, HVM_IOBITMAP_SIZE); > +INIT_LIST_HEAD

Re: [Xen-devel] [PATCH v2 5/9] gcov: add new interface and 3.4 and 4.7 format support

2016-10-10 Thread Andrew Cooper
On 10/10/16 12:56, Jan Beulich wrote: On 10.10.16 at 11:40, wrote: >> +struct type_info { >> +int ctr_type; > Can this be negative? This code is largely imported straight from Linux. We should not needlessly deviate. ~Andrew ___ Xen-devel ma

Re: [Xen-devel] [PATCH v7] xen/sm{e, a}p: allow disabling sm{e, a}p for Xen itself

2016-10-10 Thread Jan Beulich
>>> On 09.10.16 at 10:20, wrote: > Changes in v7: > * bugfix: fix the bug that this patch doesn't work on machine without SMAP. > * test: This patch has not been tested (on 32-bit PV environment). > Really sorry for that since I have took several days trying to > setup a 32-bit PV

Re: [Xen-devel] [PATCH v2 9/9] gcov: provide the capability to select gcov format automatically

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 11:40, wrote: > And make it the default in Kconfig. > > Signed-off-by: Wei Liu Acked-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 8/9] Config.mk: introduce cc-ifversion

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 11:40, wrote: > It returns different string depending on compiler version. > > No user yet. > > Signed-off-by: Wei Liu Acked-by: Jan Beulich albeit I wonder whether ... > --- a/Config.mk > +++ b/Config.mk > @@ -128,6 +128,11 @@ define cc-ver-check-closure > endif > e

Re: [Xen-devel] [PATCH v2 7/9] Config.mk: expand cc-ver a bit

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 11:40, wrote: > ... so that we can do other comparisons as well. > > No functional change. > > Signed-off-by: Wei Liu Acked-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 5/9] gcov: add new interface and 3.4 and 4.7 format support

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 11:40, wrote: > +struct type_info { > +int ctr_type; Can this be negative? > +unsigned int offset; > +}; > + > +/** > + * struct gcov_iterator - specifies current file position in logical records > + * @info: associated profiling data > + * @record: record type > + * @

Re: [Xen-devel] [PATCH v2 4/9] xen, tools: rip out old gcov implementation

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 11:40, wrote: > The internal data structure and code are tied to an old gcov format. > It's easier to just redo everything from scratch. > > Salvage the reusable parts: leave xen/common/gcov and an empty Makefile > there, leave gcov support in Kconfig but mark that as broken. A

Re: [Xen-devel] [PATCH v2 3/9] xen: delete gcno files in clean target

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 11:40, wrote: > Signed-off-by: Wei Liu Acked-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 1/9] Kconfig: use tab instead of space

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 11:40, wrote: > Previously in d6be2cfc ("xen: make clear gcov support limitation in > Kconfig") and db6c2264 ("xen: add a gcov Kconfig option"), space was > used to indent Kconfig text. Change that to use tab instead. > > No functional change. > > Signed-off-by: Wei Liu Revi

Re: [Xen-devel] [PATCH v2 2/9] Kconfig: add BROKEN config

2016-10-10 Thread Jan Beulich
>>> On 10.10.16 at 11:40, wrote: > Used to hide feature that is completely broken. > > Signed-off-by: Wei Liu Reviewed-by: Jan Beulich (in case it matters for this trivial a patch) ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xe

[Xen-devel] [ovmf baseline-only test] 67855: regressions - FAIL

2016-10-10 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67855 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67855/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boot

Re: [Xen-devel] [PATCH v2] x86/apicv: fix RTC periodic timer and apicv issue

2016-10-10 Thread Xuquan (Quan Xu)
On October 10, 2016 5:40 PM, Jan Beulich < jbeul...@suse.com > wrote: >> >>> On 20.09.16 at 15:30, wrote: >> > --- a/xen/arch/x86/hvm/vlapic.c >> > +++ b/xen/arch/x86/hvm/vlapic.c >> > @@ -433,6 +433,12 @@ void vlapic_EOI_set(struct vlapic *vlapic) >> > void vlapic_handle_EOI(s

[Xen-devel] [PATCH v3] xenbus: advertize control feature flags

2016-10-10 Thread Paul Durrant
The Xen docs specify several flags which a guest can set to advertize which values of the xenstore control/shutdown key it will recognize. This patch adds code to write all the relevant feature-flag keys. Signed-off-by: Paul Durrant Cc: Boris Ostrovsky Cc: David Vrabel Cc: Juergen Gross --- v

Re: [Xen-devel] [RFC PATCH 12/24] ARM: vGICv3: introduce basic ITS emulation bits

2016-10-10 Thread Andre Przywara
Hi, On 09/10/16 15:20, Vijay Kilari wrote: > On Wed, Sep 28, 2016 at 11:54 PM, Andre Przywara > wrote: >> Create a new file to hold the emulation code for the ITS widget. >> For now we emulate the memory mapped ITS registers and provide a stub >> to introduce the ITS command handling framework (

Re: [Xen-devel] [PATCH v2] xenbus: advertize control feature flags

2016-10-10 Thread Paul Durrant
> -Original Message- > From: David Vrabel [mailto:david.vra...@citrix.com] > Sent: 10 October 2016 11:16 > To: Paul Durrant ; linux-ker...@vger.kernel.org; > xen-de...@lists.xenproject.org > Cc: Boris Ostrovsky ; Juergen Gross > > Subject: Re: [PATCH v2] xenbus: advertize control feature f

Re: [Xen-devel] [PATCH v2] xenbus: advertize control feature flags

2016-10-10 Thread David Vrabel
On 10/10/16 10:43, Paul Durrant wrote: > The Xen docs specify several flags which a guest can set to advertize > which values of the xenstore control/shutdown key it will recognize. > This patch adds code to write all the relevant feature-flag keys. [...] > static int setup_shutdown_watcher(void)

[Xen-devel] [distros-debian-sid test] 67854: tolerable FAIL

2016-10-10 Thread Platform Team regression test user
flight 67854 distros-debian-sid real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67854/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-armhf-sid-netboot-pygrub 9 debian-di-install fail blocked in 67789 test-amd64-i3

Re: [Xen-devel] [PATCH v2] xenbus: advertize control feature flags

2016-10-10 Thread Juergen Gross
On 10/10/16 11:43, Paul Durrant wrote: > The Xen docs specify several flags which a guest can set to advertize > which values of the xenstore control/shutdown key it will recognize. > This patch adds code to write all the relevant feature-flag keys. > > Signed-off-by: Paul Durrant > Cc: Boris Ost

Re: [Xen-devel] per-domain logging

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 09:03:49AM +0200, Cedric Bosdonnat wrote: > On Fri, 2016-10-07 at 15:09 +0100, Wei Liu wrote: > > Instead of trying to change all the format strings I think it would be > > better to have a new set of LOG macros that takes domid. > > > > Something like: > >   LOGEVD(ERROR,

Re: [Xen-devel] [PATCH v2] x86: defer not-present segment checks

2016-10-10 Thread Andrew Cooper
On 10/10/16 11:04, Jan Beulich wrote: > Following on from commits 5602e74c60 ("x86emul: correct loading of > %ss") and bdb860d01c ("x86/HVM: correct segment register loading during > task switch") the point of the non-.present checks needs to be refined: > #NP (and its #SS companion), other than su

[Xen-devel] [PATCH v2] x86: defer not-present segment checks

2016-10-10 Thread Jan Beulich
Following on from commits 5602e74c60 ("x86emul: correct loading of %ss") and bdb860d01c ("x86/HVM: correct segment register loading during task switch") the point of the non-.present checks needs to be refined: #NP (and its #SS companion), other than suggested by the various instruction pages in In

[Xen-devel] [PATCH v2] xenbus: advertize control feature flags

2016-10-10 Thread Paul Durrant
The Xen docs specify several flags which a guest can set to advertize which values of the xenstore control/shutdown key it will recognize. This patch adds code to write all the relevant feature-flag keys. Signed-off-by: Paul Durrant Cc: Boris Ostrovsky Cc: David Vrabel Cc: Juergen Gross --- v

Re: [Xen-devel] [BUG] Re: testing XEN-4.8-rc1

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 10:36:04AM +0100, Juergen Schinker wrote: > Ok then on Debian testing > > ii gcc-6 6.2.0-5 > amd64GNU C compiler > Right, I think I know why it didn't build for you. We've got some medium to long te

[Xen-devel] [xen-unstable test] 101347: tolerable FAIL

2016-10-10 Thread osstest service owner
flight 101347 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/101347/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-credit2 16 guest-start.2 fail pass in 101339 Regressions which are regarded a

Re: [Xen-devel] [PATCH net] xen-netback: (re-)create a debugfs node for hash information

2016-10-10 Thread Wei Liu
On Mon, Oct 10, 2016 at 09:30:53AM +0100, Paul Durrant wrote: > From: Paul Durrant > > It is useful to be able to see the hash configuration when running tests. > This patch adds a debugfs node for that purpose. > > The original version of this patch (commit c0c64c152389) was reverted due > to b

[Xen-devel] [PATCH v2 8/9] Config.mk: introduce cc-ifversion

2016-10-10 Thread Wei Liu
It returns different string depending on compiler version. No user yet. Signed-off-by: Wei Liu --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan Cc: Wei Liu --- Config.mk | 5 + 1 file changed, 5 i

[Xen-devel] [PATCH v2 1/9] Kconfig: use tab instead of space

2016-10-10 Thread Wei Liu
Previously in d6be2cfc ("xen: make clear gcov support limitation in Kconfig") and db6c2264 ("xen: add a gcov Kconfig option"), space was used to indent Kconfig text. Change that to use tab instead. No functional change. Signed-off-by: Wei Liu --- v2: new Would like to have this in 4.8 Cc: And

[Xen-devel] [PATCH v2 4/9] xen, tools: rip out old gcov implementation

2016-10-10 Thread Wei Liu
The internal data structure and code are tied to an old gcov format. It's easier to just redo everything from scratch. Salvage the reusable parts: leave xen/common/gcov and an empty Makefile there, leave gcov support in Kconfig but mark that as broken. Also reserve the sysctl number for later use

[Xen-devel] [PATCH v2 2/9] Kconfig: add BROKEN config

2016-10-10 Thread Wei Liu
Used to hide feature that is completely broken. Signed-off-by: Wei Liu --- v2: use tab Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan Cc: Wei Liu Cc: Doug Goldstein --- xen/Kconfig | 3 +++ 1 file chan

[Xen-devel] [PATCH v2 0/9] Rework gcov support in Xen

2016-10-10 Thread Wei Liu
The original implementation of gcov support in Xen has several limitations: 1. The internal data structures are tied to gcc 3.4 format. 2. The sysctl interface is tied to gcc 3.4 format. 3. The gcov type definition is wrong, doesn't work with 32 bit hypervisor, which means arm32 wouldn't work.

[Xen-devel] [PATCH v2 6/9] gcov: userspace tools to extract and split gcov data

2016-10-10 Thread Wei Liu
Provide two tools: a small C program to extract data from hypervisor and a python script to split data into multiple files. The file xencov.c is salvaged and modified from the original xencov.c. Signed-off-by: Wei Liu --- v2: fix INSTALL_BIN typo Cc: Ian Jackson --- tools/misc/Makefile |

[Xen-devel] [PATCH v2 3/9] xen: delete gcno files in clean target

2016-10-10 Thread Wei Liu
Signed-off-by: Wei Liu --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan Cc: Wei Liu --- xen/Makefile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/Makefile b/xen/Makefile index

[Xen-devel] [PATCH v2 7/9] Config.mk: expand cc-ver a bit

2016-10-10 Thread Wei Liu
... so that we can do other comparisons as well. No functional change. Signed-off-by: Wei Liu --- v2: move dash into macro. Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan Cc: Wei Liu --- Config.mk | 8

  1   2   >