[Xen-devel] [linux-3.18 baseline-only test] 71332: tolerable trouble: blocked/broken/fail/pass

2017-05-16 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71332 linux-3.18 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71332/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-amd64-libvirt 5 libvirt-build fa

[Xen-devel] [xen-4.7-testing test] 109490: tolerable FAIL - PUSHED

2017-05-16 Thread osstest service owner
flight 109490 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/109490/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a test-arm64-arm64-xl 1 build-

Re: [Xen-devel] [PATCH 03/18] xen/pvcalls: initialize the module and register the xenbus backend

2017-05-16 Thread Juergen Gross
On 16/05/17 21:58, Stefano Stabellini wrote: > On Tue, 16 May 2017, Juergen Gross wrote: >> On 15/05/17 22:35, Stefano Stabellini wrote: >>> The pvcalls backend has one ioworker per cpu: the ioworkers are >>> implemented as a cpu bound workqueue, and will deal with the actual >>> socket and data ri

Re: [Xen-devel] [PATCH for-4.9 0/2] build: fix tools and stubdom build

2017-05-16 Thread Steven Haigh
On 16/05/17 20:47, Wei Liu wrote: > Wei Liu (2): > tools/Rules.mk: honour CPPFLAGS in header check > build: fix tools/include and stubdom build > > stubdom/Makefile | 13 +++-- > tools/Rules.mk | 2 +- > tools/include/Makefile | 34 ++ >

[Xen-devel] [xen-4.8-testing test] 109489: regressions - FAIL

2017-05-16 Thread osstest service owner
flight 109489 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/109489/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-5 45 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 109008 test-amd64-i386

[Xen-devel] [linux-4.9 test] 109475: regressions - FAIL

2017-05-16 Thread osstest service owner
flight 109475 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/109475/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358 test-amd64-i386-xl-qe

[Xen-devel] [xen-4.6-testing test] 109488: regressions - FAIL

2017-05-16 Thread osstest service owner
flight 109488 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/109488/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-debianhvm-amd64 9 debian-hvm-install fail REGR. vs. 109085 test-amd6

Re: [Xen-devel] HPET enabled in BIOS, not presented as available_clocksource -- config, kernel code, &/or BIOS?

2017-05-16 Thread PGNet Dev
(apologies re: the empty 'double tap' :-/ ) On 5/14/17 8:39 AM, Andrew Cooper wrote: >> So I'm still unclear -- is this^ now, correctly "all" using MSI/HPET? > > What are you trying to achieve? It is still not clear despite all on > this thread. > > The Linux HEPT error messages are non-ideal,

Re: [Xen-devel] HPET enabled in BIOS, not presented as available_clocksource -- config, kernel code, &/or BIOS?

2017-05-16 Thread PGNet Dev
___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

[Xen-devel] [xen-unstable-smoke test] 109503: tolerable trouble: broken/pass - PUSHED

2017-05-16 Thread osstest service owner
flight 109503 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/109503/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 12 mig

[Xen-devel] [xen-unstable baseline-only test] 71330: tolerable trouble: blocked/broken/fail/pass

2017-05-16 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71330 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71330/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-amd64-libvirt 5 libvirt-build

Re: [Xen-devel] [PATCH 09/12 v3] xen/arm: vpl011: Add support for vuart in xenconsole

2017-05-16 Thread Stefano Stabellini
On Wed, 10 May 2017, Bhupinder Thakur wrote: > Xenconsole supports only PV console currently. This patch adds support > for vuart console, which allows emulated pl011 UART to be accessed > as a console. > > Signed-off-by: Bhupinder Thakur > --- > > One review comment was to keep the vuart code u

Re: [Xen-devel] [PATCH 08/12 v3] xen/arm: vpl011: Modify xenconsole to support multiple consoles

2017-05-16 Thread Stefano Stabellini
On Wed, 10 May 2017, Bhupinder Thakur wrote: > Xenconsole supports only PV console currently. This patch adds support > for supporting multiple consoles. > > This patch modifies different data structures and APIs used > in xenconsole to support multiple consoles. > > Change summary: > > 1. Split

Re: [Xen-devel] [PATCH 12/12 v3] xen/arm: vpl011: Update documentation for vuart console support

2017-05-16 Thread Stefano Stabellini
On Wed, 10 May 2017, Bhupinder Thakur wrote: > 1. Update documentation for a new vuart option added. > 2. Update documentation about SPI irq reserved for vpl011. > > Signed-off-by: Bhupinder Thakur > --- > > Changes since v2: > > - Incorporated the review comments on the documentation. > > do

Re: [Xen-devel] [PATCH 11/12 v3] xen/arm: vpl011: Add a pl011 uart DT node in the guest device tree

2017-05-16 Thread Stefano Stabellini
On Wed, 10 May 2017, Bhupinder Thakur wrote: > The SBSA uart node format is as specified in > Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below: > > ARM SBSA defined generic UART > -- > This UART uses a subset of the PL011 registers and conseque

Re: [Xen-devel] [PATCH 10/12 v3] xen/arm: vpl011: Add a new vuart console type to xenconsole client

2017-05-16 Thread Stefano Stabellini
On Wed, 10 May 2017, Bhupinder Thakur wrote: > Add a new console type VUART to connect to guest's emualated vuart > console. > > Signed-off-by: Bhupinder Thakur Reviewed-by: Stefano Stabellini > --- > tools/console/client/main.c | 8 +++- > 1 file changed, 7 insertions(+), 1 deletion(-)

Re: [Xen-devel] [PATCH 07/12 v3] xen/arm: vpl011: Allocate a new GFN in the toolstack for vuart

2017-05-16 Thread Stefano Stabellini
On Wed, 10 May 2017, Bhupinder Thakur wrote: > Allocate a new gfn to be used as a ring buffer between xenconsole > and Xen for sending/receiving pl011 data. > > Signed-off-by: Bhupinder Thakur Reviewed-by: Stefano Stabellini > --- > > Changes since v2: > > - Removed the DOMCTL call to set t

[Xen-devel] [qemu-mainline test] 109478: regressions - FAIL

2017-05-16 Thread osstest service owner
flight 109478 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/109478/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 5 xen-buildfail REGR. vs. 107636 build-arm64

Re: [Xen-devel] [PATCH 04/12 v3] xen/arm: vpl011: Add support for vuart in libxl

2017-05-16 Thread Stefano Stabellini
On Wed, 10 May 2017, Bhupinder Thakur wrote: > An option is provided in libxl to enable/disable pl011 vuart while > creating a guest domain. > > Libxl now suppots a generic vuart console and pl011 is a specific type. > In future support can be added for multiple vuart of different types. > > User

[Xen-devel] [linux-linus test] 109469: regressions - FAIL

2017-05-16 Thread osstest service owner
flight 109469 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/109469/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt 6 xen-boot fail REGR. vs. 109449 test-arm64-arm64-xl

Re: [Xen-devel] [PATCH 03/12 v3] xen/arm: vpl011: Add pl011 uart emulation in Xen

2017-05-16 Thread Stefano Stabellini
On Wed, 10 May 2017, Bhupinder Thakur wrote: > Add emulation code to emulate read/write access to pl011 registers > and pl011 interrupts: > > - Emulate DR read/write by reading and writing from/to the IN > and OUT ring buffers and raising an event to the backend when > there is dat

[Xen-devel] [linux-3.18 test] 109477: tolerable FAIL - PUSHED

2017-05-16 Thread osstest service owner
flight 109477 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/109477/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-credit2 7 host-ping-check-xen fail in 109446 pass in 109477 test-amd64-i386-xl-qemut-win7-amd

Re: [Xen-devel] [PATCH 08/18] xen/pvcalls: implement connect command

2017-05-16 Thread Boris Ostrovsky
>>> + ret = xenbus_map_ring_valloc(dev, &req->u.connect.ref, 1, &page); >>> + if (ret < 0) { >>> + sock_release(map->sock); >>> + kfree(map); >>> + goto out; >>> + } >>> + map->ring = page; >>> + map->ring_order = map->ring->ring_order; >>> + /* first read

[Xen-devel] [xen-unstable-smoke test] 109498: regressions - trouble: broken/fail/pass

2017-05-16 Thread osstest service owner
flight 109498 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/109498/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 15 guest-start/debian.repeat fail in 109495 REGR. vs. 109359 Tests whi

Re: [Xen-devel] [PATCH 08/18] xen/pvcalls: implement connect command

2017-05-16 Thread Stefano Stabellini
On Mon, 15 May 2017, Boris Ostrovsky wrote: > On 05/15/2017 04:36 PM, Stefano Stabellini wrote: > > Allocate a socket. Keep track of socket <-> ring mappings with a new data > > structure, called sock_mapping. Implement the connect command by calling > > inet_stream_connect, and mapping the new ind

Re: [Xen-devel] [PATCH 06/18] xen/pvcalls: handle commands from the frontend

2017-05-16 Thread Stefano Stabellini
On Mon, 15 May 2017, Boris Ostrovsky wrote: > On 05/15/2017 04:35 PM, Stefano Stabellini wrote: > > When the other end notifies us that there are commands to be read > > (pvcalls_back_event), wake up the backend thread to parse the command. > > > > The command ring works like most other Xen rings,

Re: [Xen-devel] [PATCH 07/18] xen/pvcalls: implement socket command

2017-05-16 Thread Stefano Stabellini
On Mon, 15 May 2017, Boris Ostrovsky wrote: > On 05/15/2017 04:35 PM, Stefano Stabellini wrote: > > Just reply with success to the other end for now. Delay the allocation > > of the actual socket to bind and/or connect. > > > > Signed-off-by: Stefano Stabellini > > CC: boris.ostrov...@oracle.com

Re: [Xen-devel] [PATCH 05/18] xen/pvcalls: connect to a frontend

2017-05-16 Thread Stefano Stabellini
On Tue, 16 May 2017, Stefano Stabellini wrote: > > > diff --git a/drivers/xen/pvcalls-back.c b/drivers/xen/pvcalls-back.c > > > index 86eca19..876e577 100644 > > > --- a/drivers/xen/pvcalls-back.c > > > +++ b/drivers/xen/pvcalls-back.c > > > @@ -44,13 +44,100 @@ struct pvcalls_back_global { > > >

Re: [Xen-devel] [PATCH 05/18] xen/pvcalls: connect to a frontend

2017-05-16 Thread Stefano Stabellini
On Mon, 15 May 2017, Boris Ostrovsky wrote: > On 05/15/2017 04:35 PM, Stefano Stabellini wrote: > > Introduce a per-frontend data structure named pvcalls_back_priv. It > > contains pointers to the command ring, its event channel, a list of > > active sockets and a tree of passive sockets (passing s

Re: [Xen-devel] [PATCH 03/18] xen/pvcalls: initialize the module and register the xenbus backend

2017-05-16 Thread Stefano Stabellini
On Tue, 16 May 2017, Stefano Stabellini wrote: > > And why are you using a rw semaphore --- I only noticed two instances of use > > and both are writes. > > Yes, this is wrong, legacy from a previous version of the codebase. A > simple spin_lock should suffice for this use-case. I replied too qui

Re: [Xen-devel] [PATCH 04/18] xen/pvcalls: xenbus state handling

2017-05-16 Thread Stefano Stabellini
On Mon, 15 May 2017, Boris Ostrovsky wrote: > On 05/15/2017 04:35 PM, Stefano Stabellini wrote: > > Introduce the code to handle xenbus state changes. > > > > Implement the probe function for the pvcalls backend. Write the > > supported versions, max-page-order and function-calls nodes to xenstore

Re: [Xen-devel] [PATCH 03/18] xen/pvcalls: initialize the module and register the xenbus backend

2017-05-16 Thread Stefano Stabellini
On Mon, 15 May 2017, Boris Ostrovsky wrote: > On 05/15/2017 04:35 PM, Stefano Stabellini wrote: > > The pvcalls backend has one ioworker per cpu: the ioworkers are > > implemented as a cpu bound workqueue, and will deal with the actual > > socket and data ring reads/writes. > > > > ioworkers are g

Re: [Xen-devel] [PATCH 03/18] xen/pvcalls: initialize the module and register the xenbus backend

2017-05-16 Thread Stefano Stabellini
On Tue, 16 May 2017, Juergen Gross wrote: > On 15/05/17 22:35, Stefano Stabellini wrote: > > The pvcalls backend has one ioworker per cpu: the ioworkers are > > implemented as a cpu bound workqueue, and will deal with the actual > > socket and data ring reads/writes. > > > > ioworkers are global:

[Xen-devel] [PULL 4/4] xen: call qemu_set_cloexec instead of fcntl

2017-05-16 Thread Stefano Stabellini
Use the common utility function, which contains checks on return values and first calls F_GETFD as recommended by POSIX.1-2001, instead of manually calling fcntl. CID: 1374831 Signed-off-by: Stefano Stabellini Reviewed-by: Eric Blake Reviewed-by: Greg Kurz CC: anthony.per...@citrix.com CC: gr.

[Xen-devel] [PULL 1/4] xen/mapcache: store dma information in revmapcache entries for debugging

2017-05-16 Thread Stefano Stabellini
The Xen mapcache is able to create long term mappings, they are called "locked" mappings. The third parameter of the xen_map_cache call specifies if a mapping is a "locked" mapping. >From the QEMU point of view there are two kinds of long term mappings: [a] device memory mappings, such as option

[Xen-devel] [PULL 2/4] configure: Remove -lxencall for Xen detection

2017-05-16 Thread Stefano Stabellini
From: Anthony PERARD QEMU does not depends on libxencall, it was added because it was a missing link dependency of libxendevicemodel, but now the later should be built properly. Signed-off-by: Anthony PERARD Reviewed-by: Stefano Stabellini --- configure | 2 +- 1 file changed, 1 insertion(+),

[Xen-devel] [PULL 3/4] xen/9pfs: fix two resource leaks on error paths, discovered by Coverity

2017-05-16 Thread Stefano Stabellini
CID: 1374836 Signed-off-by: Stefano Stabellini Reviewed-by: Eric Blake Reviewed-by: Greg Kurz CC: anthony.per...@citrix.com CC: gr...@kaod.org CC: aneesh.ku...@linux.vnet.ibm.com --- hw/9pfs/xen-9p-backend.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/hw/9pfs/xen-9p-backend.c b/hw/9p

[Xen-devel] [PULL 0/4] please pull xen-20170516-tag

2017-05-16 Thread Stefano Stabellini
The following changes since commit cdece0467c7cf8e3f4b3c3f0b13bf2c4fea9: block/win32: fix 'ret not initialized' warning (2017-05-16 15:34:18 +0100) are available in the git repository at: git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xen-20170516-tag for yo

Re: [Xen-devel] xen-evtchn: Bind dyn evtchn:qemu-dm interrupt to next online CPU

2017-05-16 Thread Boris Ostrovsky
On 05/16/2017 01:15 PM, Anoob Soman wrote: > Hi, > > In our Xenserver testing, I have seen cases when we boot 50 windows > VMs together, dom0 kernel softlocks up. > > The following is a brief description of the problem of what caused > soflockup detection code to kick. A HVM domain boot generates a

Re: [Xen-devel] [PATCH v2 2/3] Check the return value of fcntl in qemu_set_cloexec

2017-05-16 Thread Stefano Stabellini
On Thu, 11 May 2017, Paolo Bonzini wrote: > On 09/05/2017 21:04, Stefano Stabellini wrote: > > Assert that the return value is not an error. This issue was found by > > Coverity. > > > > CID: 1374831 > > > > Signed-off-by: Stefano Stabellini > > CC: gr...@kaod.org > > CC: pbonz...@redhat.com > >

[Xen-devel] [xen-unstable-smoke test] 109495: regressions - trouble: broken/fail/pass

2017-05-16 Thread osstest service owner
flight 109495 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/109495/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 15 guest-start/debian.repeat fail REGR. vs. 109359 Tests which

Re: [Xen-devel] Proposal to allow setting up shared memory areas between VMs from xl config file

2017-05-16 Thread Stefano Stabellini
On Tue, 16 May 2017, Jan Beulich wrote: > >>> On 15.05.17 at 19:40, wrote: > > On Mon, 15 May 2017, Jan Beulich wrote: > >> >>> On 15.05.17 at 12:21, wrote: > >> > On Zhongze proposal, the share page will be mapped at the a specific > >> > address in the guest memory. I agree this will require s

Re: [Xen-devel] Proposal to allow setting up shared memory areas between VMs from xl config file

2017-05-16 Thread Stefano Stabellini
On Tue, 16 May 2017, Ian Jackson wrote: > I think this discussion is rather too abstract. Can you give an > example of a pair of apps that would usefully communicate using a > shared memory page in this way ? Is one of these apps an unmodified > bare metal app ? That's a good idea. I CC'ed a cou

Re: [Xen-devel] [BUG] EDAC infomation partially missing

2017-05-16 Thread Elliott Mitchell
On Tue, May 16, 2017 at 03:54:37AM -0600, Jan Beulich wrote: > >>> On 16.05.17 at 05:47, wrote: > > I suspect the only paravirtualization needed is to > > map the physical address of the soft|hard errors to which VM's memory > > range was effected. What this effects is which VM should panic in c

[Xen-devel] [libvirt test] 109466: regressions - FAIL

2017-05-16 Thread osstest service owner
flight 109466 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/109466/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt 5 xen-install fail REGR. vs. 109375 Tests which did not suc

Re: [Xen-devel] Questions about PVHv2/HVMlite

2017-05-16 Thread George Dunlap
On Tue, May 16, 2017 at 6:13 PM, Boris Ostrovsky wrote: > On 05/16/2017 11:52 AM, Gary R Hook wrote: >> On 05/15/2017 09:54 PM, Boris Ostrovsky wrote: >>> >> >> Possibly stupid question time... >> >>> On 05/15/2017 03:51 PM, Gary R Hook wrote: >>> 2) Or, perhaps more importantly, what disti

[Xen-devel] xen-evtchn: Bind dyn evtchn:qemu-dm interrupt to next online CPU

2017-05-16 Thread Anoob Soman
Hi, In our Xenserver testing, I have seen cases when we boot 50 windows VMs together, dom0 kernel softlocks up. The following is a brief description of the problem of what caused soflockup detection code to kick. A HVM domain boot generates around 200K (evtchn:qemu-dm xen-dyn) interrupts, in

Re: [Xen-devel] [PATCH for-4.9] x86/pagewalk: Fix determination of Protection Key access rights

2017-05-16 Thread Andrew Cooper
On 16/05/17 18:06, Tim Deegan wrote: > At 17:51 +0100 on 16 May (1494957116), Andrew Cooper wrote: >> c/s 4c5d78a10 was accidentally buggy when handling Protection Keys. >> Protection keys applies to all user translations, not just accesses which >> originate from user mode. > Reviewed-by: Tim Deeg

Re: [Xen-devel] Questions about PVHv2/HVMlite

2017-05-16 Thread Boris Ostrovsky
On 05/16/2017 11:52 AM, Gary R Hook wrote: > On 05/15/2017 09:54 PM, Boris Ostrovsky wrote: >> > > Possibly stupid question time... > >> On 05/15/2017 03:51 PM, Gary R Hook wrote: >> >>> 2) Or, perhaps more importantly, what distinguishes said guest? >> >> Simplifying things a bit, it's an HVM gu

Re: [Xen-devel] [PATCH for-4.9] x86/pagewalk: Fix determination of Protection Key access rights

2017-05-16 Thread Tim Deegan
At 17:51 +0100 on 16 May (1494957116), Andrew Cooper wrote: > c/s 4c5d78a10 was accidentally buggy when handling Protection Keys. > Protection keys applies to all user translations, not just accesses which > originate from user mode. Reviewed-by: Tim Deegan Does the test for write-protection jus

[Xen-devel] [PATCH for-4.9] x86/pagewalk: Fix determination of Protection Key access rights

2017-05-16 Thread Andrew Cooper
c/s 4c5d78a10 was accidentally buggy when handling Protection Keys. Protection keys applies to all user translations, not just accesses which originate from user mode. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Tim Deegan CC: George Dunlap CC: Julien Grall This regression was intro

Re: [Xen-devel] [PATCH v2 3/3] x86/vioapic: bind interrupts to PVH Dom0

2017-05-16 Thread Roger Pau Monne
On Fri, May 12, 2017 at 07:55:04AM -0600, Jan Beulich wrote: > >>> On 19.04.17 at 17:11, wrote: > > --- a/xen/arch/x86/hvm/vioapic.c > > +++ b/xen/arch/x86/hvm/vioapic.c > > @@ -158,6 +158,62 @@ static int vioapic_read( > > return X86EMUL_OKAY; > > } > > > > +static int vioapic_dom0_map_gs

Re: [Xen-devel] [PATCH v2 2/3] x86/pt: enable binding of GSIs to a PVH Dom0

2017-05-16 Thread Jan Beulich
>>> On 16.05.17 at 17:55, wrote: > On Fri, May 12, 2017 at 07:42:51AM -0600, Jan Beulich wrote: >> >>> On 19.04.17 at 17:11, wrote: >> > Note that currently there's no support for unbinding this interrupts. >> >> Do you plan to deal with that before this changes goes in? Aiui this >> not working

Re: [Xen-devel] [PATCH v2 2/3] x86/pt: enable binding of GSIs to a PVH Dom0

2017-05-16 Thread Roger Pau Monne
On Fri, May 12, 2017 at 07:42:51AM -0600, Jan Beulich wrote: > >>> On 19.04.17 at 17:11, wrote: > > Note that currently there's no support for unbinding this interrupts. > > Do you plan to deal with that before this changes goes in? Aiui this > not working means you can't pass through devices wit

Re: [Xen-devel] Commit moratorium to staging

2017-05-16 Thread Ian Jackson
Julien Grall writes ("Commit moratorium to staging"): > It looks like osstest is a bit behind because of ARM64 boxes (they are > fully loaded) and XP testing (they now have been removed see [1]). > > I'd like to cut the next rc when staging == master, so please stop > committing today. I force

Re: [Xen-devel] [[PATCH v2]] libxl/arm: Fix ARM build.

2017-05-16 Thread Wei Liu
On Tue, May 16, 2017 at 06:57:53PM +0300, Andrii Anisov wrote: > From: Andrii Anisov > > Initialise *size in default branch to prevent certain compilers (i.e. > Linaro GCC 5.2-2015.11-2) from reporting "variable may be used uninitialized" > errors in caller function. > > Signed-off-by: Julien Gr

[Xen-devel] [[PATCH v2]] libxl/arm: Fix ARM build.

2017-05-16 Thread Andrii Anisov
From: Andrii Anisov Initialise *size in default branch to prevent certain compilers (i.e. Linaro GCC 5.2-2015.11-2) from reporting "variable may be used uninitialized" errors in caller function. Signed-off-by: Julien Grall --- tools/libxl/libxl_arm_acpi.c | 1 + 1 file changed, 1 insertion(+)

Re: [Xen-devel] [PATCH v9 14/28] ARM: vITS: introduce translation table walks

2017-05-16 Thread Julien Grall
Hi Andre, On 11/05/17 18:53, Andre Przywara wrote: The ITS stores the target (v)CPU and the (virtual) LPI number in tables. Introduce functions to walk those tables and translate an device ID - event ID pair into a pair of virtual LPI and vCPU. We map those tables on demand - which is cheap on a

Re: [Xen-devel] Questions about PVHv2/HVMlite

2017-05-16 Thread Gary R Hook
On 05/16/2017 04:36 AM, Andrew Cooper wrote: On 16/05/17 03:54, Boris Ostrovsky wrote: 2) Or, perhaps more importantly, what distinguishes said guest? Simplifying things a bit, it's an HVM guest that doesn't have device model (i.e. qemu) and which is booted directly (i.e. without hvmloader

Re: [Xen-devel] Questions about PVHv2/HVMlite

2017-05-16 Thread Gary R Hook
On 05/15/2017 09:54 PM, Boris Ostrovsky wrote: Possibly stupid question time... On 05/15/2017 03:51 PM, Gary R Hook wrote: 2) Or, perhaps more importantly, what distinguishes said guest? Simplifying things a bit, it's an HVM guest that doesn't have device model (i.e. qemu) and which is

Re: [Xen-devel] [[PATCH]] libxl/arm: Fix ARM build.

2017-05-16 Thread Wei Liu
On Tue, May 16, 2017 at 06:14:43PM +0300, Andrii Anisov wrote: > Dear Wei, > > > On 16.05.17 14:03, Wei Liu wrote: > > I'm confused by the commit message. > > My bad, I did not pay enough attention to write the message. Would following > be better? > > Implicitly initialize a referenced oup

Re: [Xen-devel] [PATCH v9 13/28] ARM: vITS: add command handling stub and MMIO emulation

2017-05-16 Thread Julien Grall
Hi Andre, On 11/05/17 18:53, Andre Przywara wrote: Emulate the memory mapped ITS registers and provide a stub to introduce the ITS command handling framework (but without actually emulating any commands at this time). This fixes a misnomer in our virtual ITS structure, where the spec is confusin

Re: [Xen-devel] [PATCH 06/12 v3] xen/arm: vpl011: Add a new vuart node in the xenstore

2017-05-16 Thread Wei Liu
On Fri, May 12, 2017 at 03:02:29PM +0530, Bhupinder Thakur wrote: [...] > >> @@ -151,13 +154,19 @@ retry_transaction: > >> if (rc) goto out; > >> > >> if (!libxl_only) { > >> -rc = libxl__xs_write_checked(gc, t, > >> GCSPRINTF("%s/frontend",libxl_path), > >> -

Re: [Xen-devel] [[PATCH]] libxl/arm: Fix ARM build.

2017-05-16 Thread Andrii Anisov
Dear Wei, On 16.05.17 14:03, Wei Liu wrote: I'm confused by the commit message. My bad, I did not pay enough attention to write the message. Would following be better? Implicitly initialize a referenced ouput parameter for all code branches in order to not face a "variable may be

Re: [Xen-devel] [PATCH 04/12 v3] xen/arm: vpl011: Add support for vuart in libxl

2017-05-16 Thread Wei Liu
On Wed, May 10, 2017 at 07:58:01PM +0530, Bhupinder Thakur wrote: > index 2204425..f5dc62c 100644 > --- a/tools/libxl/libxl_types.idl > +++ b/tools/libxl/libxl_types.idl > @@ -105,6 +105,7 @@ libxl_console_type = Enumeration("console_type", [ > (0, "UNKNOWN"), > (1, "SERIAL"), > (2,

Re: [Xen-devel] [xen-unstable test] 109456: regressions - FAIL

2017-05-16 Thread Ian Jackson
osstest service owner writes ("[xen-unstable test] 109456: regressions - FAIL"): > flight 109456 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/109456/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > t

[Xen-devel] [xen-unstable test] 109456: regressions - FAIL

2017-05-16 Thread osstest service owner
flight 109456 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/109456/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 17 guest-start/win.repeat fail REGR. vs. 109136 Tests w

Re: [Xen-devel] [PATCH for-4.9] tools/xenconsoled: Preserve errno while rotating logfile handles

2017-05-16 Thread Ian Jackson
Andrew Cooper writes ("[PATCH for-4.9] tools/xenconsoled: Preserve errno while rotating logfile handles"): > The logic to optionally exit after a poll() error relies on errno, but > handle_log_reload() does not preserve it. > > Signed-off-by: Andrew Cooper Acked-by: Ian Jackson This is an obv

[Xen-devel] [PATCH for-4.9] tools/xenconsoled: Preserve errno while rotating logfile handles

2017-05-16 Thread Andrew Cooper
The logic to optionally exit after a poll() error relies on errno, but handle_log_reload() does not preserve it. Signed-off-by: Andrew Cooper --- CC: Ian Jackson CC: Wei Liu CC: Julien Grall For some reason which we haven't tracked down completely yet, an NTP time step appears to reliably cau

Re: [Xen-devel] [PATCH RFC 0/6] qemu-xen-trad: sasl: add SASL support to VNC

2017-05-16 Thread Ian Jackson
George Dunlap writes ("Re: [PATCH RFC 0/6] qemu-xen-trad: sasl: add SASL support to VNC"): > On 16/05/17 14:16, Ian Jackson wrote: > > Simon: What is stopping you moving to a modern version of qemu ? > > I think from his previous query, it was the fact that there is no > suitable stubdom for qemu

Re: [Xen-devel] [PATCH RFC 0/6] qemu-xen-trad: sasl: add SASL support to VNC

2017-05-16 Thread George Dunlap
On 16/05/17 14:16, Ian Jackson wrote: > George Dunlap writes ("Re: [PATCH RFC 0/6] qemu-xen-trad: sasl: add SASL > support to VNC"): >> Hmm, I don't think this counts as "small patch with simple changes", >> but I'll let Ian comment. > > I'm quite uneasy about this. It seems like the addition of

Re: [Xen-devel] [PATCH RFC 0/6] qemu-xen-trad: sasl: add SASL support to VNC

2017-05-16 Thread Ian Jackson
George Dunlap writes ("Re: [PATCH RFC 0/6] qemu-xen-trad: sasl: add SASL support to VNC"): > Hmm, I don't think this counts as "small patch with simple changes", > but I'll let Ian comment. I'm quite uneasy about this. It seems like the addition of a lot of code; effectively, a fork of the SASL

Re: [Xen-devel] [PATCH RFC 0/6] qemu-xen-trad: sasl: add SASL support to VNC

2017-05-16 Thread George Dunlap
On Tue, May 16, 2017 at 12:03 AM, Simon Waterman wrote: > This patch series back-ports SASL authentication from > upstream QEMU to the VNC server in qemu-xen-traditional. > It enables authentication to the VNC console of a domain > to be controlled using any SASL mechanism when using an > IOEMU st

Re: [Xen-devel] [PATCH v1 02/10] iommu: Add extra order argument to the IOMMU APIs and platform callbacks

2017-05-16 Thread Jan Beulich
>>> On 16.05.17 at 14:48, wrote: > On Mon, May 15, 2017 at 3:33 PM, Jan Beulich wrote: > On 15.05.17 at 12:43, wrote: >>> Indeed, there was some misunderstanding from my side on this. >>> Let me elaborate a bit more on this: >>> 1. Yes, this TODO shouldn't be just dropped, but needs to be >>

Re: [Xen-devel] [PATCH v9 12/28] ARM: vGIC: advertise LPI support

2017-05-16 Thread Julien Grall
Hi Andre, On 11/05/17 18:53, Andre Przywara wrote: To let a guest know about the availability of virtual LPIs, set the respective bits in the virtual GIC registers and let a guest control the LPI enable bit. Only report the LPI capability if the host has initialized at least one ITS. This remove

Re: [Xen-devel] [PATCH v1 02/10] iommu: Add extra order argument to the IOMMU APIs and platform callbacks

2017-05-16 Thread Oleksandr Tyshchenko
Hi, Jan On Mon, May 15, 2017 at 3:33 PM, Jan Beulich wrote: On 15.05.17 at 12:43, wrote: >> On Mon, May 15, 2017 at 10:22 AM, Jan Beulich wrote: >> On 12.05.17 at 18:25, wrote: On Fri, May 12, 2017 at 7:17 PM, Jan Beulich wrote: On 12.05.17 at 17:50, wrote: >> On F

Re: [Xen-devel] [PATCH] xen: cleanup pvh leftovers from pv-only sources

2017-05-16 Thread Boris Ostrovsky
On 05/16/2017 03:41 AM, Juergen Gross wrote: > There are some leftovers testing for pvh guest mode in pv-only source > files. Remove them. > > Signed-off-by: Juergen Gross Reviewed-by: Boris Ostrovsky ___ Xen-devel mailing list Xen-devel@lists.xen.or

Re: [Xen-devel] [PATCH v9 11/28] ARM: VGIC: add vcpu_id to struct pending_irq

2017-05-16 Thread Julien Grall
Hi Andre, On 11/05/17 18:53, Andre Przywara wrote: The target CPU for an LPI is encoded in the interrupt translation table entry, so can't be easily derived from just an LPI number (short of walking *all* tables and find the matching LPI). To avoid this in case we need to know the VCPU (for the

Re: [Xen-devel] [PATCH v9 10/28] ARM: GIC: export and extend vgic_init_pending_irq()

2017-05-16 Thread Julien Grall
Hi Andre, On 11/05/17 18:53, Andre Przywara wrote: For LPIs we later want to dynamically allocate struct pending_irqs. So beside needing to initialize the struct from there we also need to clean it up and re-initialize it later on. Export vgic_init_pending_irq() and extend it to be reusable. Si

Re: [Xen-devel] [PATCH v2 1/3] x86/physdev: factor out the code to allocate and map a pirq

2017-05-16 Thread Jan Beulich
>>> On 16.05.17 at 13:52, wrote: > On Wed, Apr 19, 2017 at 04:11:26PM +0100, Roger Pau Monne wrote: > [...] >> +if ( *pirq_p < 0 ) >> +{ >> +if ( pirq ) >> +{ >> +dprintk(XENLOG_G_ERR, "dom%d: %d:%d already mapped to %d\n", >> +d->domain_id,

Re: [Xen-devel] [PATCH v2 1/3] x86/physdev: factor out the code to allocate and map a pirq

2017-05-16 Thread Jan Beulich
>>> On 16.05.17 at 11:47, wrote: > On Fri, May 12, 2017 at 06:56:01AM -0600, Jan Beulich wrote: >> >>> On 19.04.17 at 17:11, wrote: >> > +pcidevs_lock(); >> > +/* Verify or get pirq. */ >> > +spin_lock(&d->event_lock); >> > +pirq = domain_irq_to_pirq(d, irq); >> > + >> > +if (

Re: [Xen-devel] [PATCH for-4.9 2/2] build: fix tools/include and stubdom build

2017-05-16 Thread Samuel Thibault
Wei Liu, on mar. 16 mai 2017 11:47:30 +0100, wrote: > Build can fail if stubdom build is run before tools build because: > > 1. tools/include build uses relative path and depends on XEN_OS > 2. stubdom needs tools/include to be built, at which time XEN_OS is >mini-os and corresponding symlinks

Re: [Xen-devel] Enabling VT-d PI by default

2017-05-16 Thread Dario Faggioli
On Mon, 2017-05-15 at 15:32 +0100, George Dunlap wrote: > On Mon, May 15, 2017 at 2:35 PM, Andrew Cooper > wrote: > > On systems with this number of in-flight interrupts, trying to > > track > > "who got what interrupt" for priority > > boosting purposes is a waste of > > time, as we spend ages ta

Re: [Xen-devel] [PATCH v2 1/3] x86/physdev: factor out the code to allocate and map a pirq

2017-05-16 Thread Roger Pau Monne
On Wed, Apr 19, 2017 at 04:11:26PM +0100, Roger Pau Monne wrote: [...] > +if ( *pirq_p < 0 ) > +{ > +if ( pirq ) > +{ > +dprintk(XENLOG_G_ERR, "dom%d: %d:%d already mapped to %d\n", > +d->domain_id, *index, *pirq_p, pirq); > +if (

Re: [Xen-devel] [PATCH v3 for-4.9 3/3] libxl/devd: move the device allocation/removal code

2017-05-16 Thread Wei Liu
On Tue, May 16, 2017 at 08:59:25AM +0100, Roger Pau Monne wrote: > Move the device addition/removal code to the {add/remove}_device functions. > > Signed-off-by: Roger Pau Monné Acked-by: Wei Liu ___ Xen-devel mailing list Xen-devel@lists.xen.org htt

Re: [Xen-devel] [[PATCH]] libxl/arm: Fix ARM build.

2017-05-16 Thread Wei Liu
On Tue, May 16, 2017 at 12:03:49PM +0100, Wei Liu wrote: > On Tue, May 16, 2017 at 01:59:40PM +0300, Andrii Anisov wrote: > > CC Ian Jakson and Wei Liu as maintainers. > > > > Sincerely, > > Andrii Anisov. > > > > 2017-05-16 13:23 GMT+03:00 Andrii Anisov : > > > > > From: Andrii Anisov > > > >

Re: [Xen-devel] [Xen-users] UEFI Secure Boot Xen 4.9

2017-05-16 Thread Daniel Kiper
On Mon, May 15, 2017 at 07:09:54PM +, Bill Jacobs (billjac) wrote: > > -Original Message- > > From: Daniel Kiper [mailto:daniel.ki...@oracle.com] > > Sent: Monday, May 15, 2017 6:13 AM > > To: Bill Jacobs (billjac) ; george.dun...@citrix.com > > Cc: xen-devel@lists.xen.org; xen-us...@li

Re: [Xen-devel] Proposal to allow setting up shared memory areas between VMs from xl config file

2017-05-16 Thread Ian Jackson
Stefano Stabellini writes ("Re: [Xen-devel] Proposal to allow setting up shared memory areas between VMs from xl config file"): > Bare-metal apps already have the concept of a shared page to communicate > with hardware devices, co-processors and other hardware/firmare > intercommunication framewor

Re: [Xen-devel] [[PATCH]] libxl/arm: Fix ARM build.

2017-05-16 Thread Wei Liu
On Tue, May 16, 2017 at 01:59:40PM +0300, Andrii Anisov wrote: > CC Ian Jakson and Wei Liu as maintainers. > > Sincerely, > Andrii Anisov. > > 2017-05-16 13:23 GMT+03:00 Andrii Anisov : > > > From: Andrii Anisov > > > > Some compilers do not (validly?) detect that size will always be > > initia

Re: [Xen-devel] [[PATCH]] libxl/arm: Fix ARM build.

2017-05-16 Thread Andrii Anisov
CC Ian Jakson and Wei Liu as maintainers. Sincerely, Andrii Anisov. 2017-05-16 13:23 GMT+03:00 Andrii Anisov : > From: Andrii Anisov > > Some compilers do not (validly?) detect that size will always be > initialized when (rc > 0), so implicitly initialize it. > > Signed-off-by: Julien Grall >

[Xen-devel] [PATCH for-4.9 2/2] build: fix tools/include and stubdom build

2017-05-16 Thread Wei Liu
Build can fail if stubdom build is run before tools build because: 1. tools/include build uses relative path and depends on XEN_OS 2. stubdom needs tools/include to be built, at which time XEN_OS is mini-os and corresponding symlinks are created 3. libraries inside tools needs tools/include to

[Xen-devel] [PATCH for-4.9 1/2] tools/Rules.mk: honour CPPFLAGS in header check

2017-05-16 Thread Wei Liu
It could contain vital information about header location in a cross-build environment like stubdom. Signed-off-by: Wei Liu --- Cc: Steven Haigh Cc: Ian Jackson Cc: Julien Grall --- tools/Rules.mk | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/Rules.mk b/tools/Rules.

[Xen-devel] [PATCH for-4.9 0/2] build: fix tools and stubdom build

2017-05-16 Thread Wei Liu
Wei Liu (2): tools/Rules.mk: honour CPPFLAGS in header check build: fix tools/include and stubdom build stubdom/Makefile | 13 +++-- tools/Rules.mk | 2 +- tools/include/Makefile | 34 ++ 3 files changed, 22 insertions(+), 27 deletions(-)

Re: [Xen-devel] Xen 4.9 rc4

2017-05-16 Thread Andrii Anisov
Hello All, On 08.05.17 21:41, Julien Grall wrote: Hi all, Xen 4.9 rc4 is tagged. You can check that out from xen.git: git://xenbits.xen.org/xen.git 4.9.0-rc4 With the build fix patch [1] the RC is tested on M3ULCB (Renesas M3) board [2]. System build done with Yocto. Following is functi

Re: [Xen-devel] [PATCH v2 1/2] libxl/devd: fix a race with concurrent device addition/removal

2017-05-16 Thread Ian Jackson
Julien Grall writes ("Re: [PATCH v2 1/2] libxl/devd: fix a race with concurrent device addition/removal"): > Is this patch series targeting Xen 4.9? IMO it should be. The changes are confined to the xl devd code, which is currently broken. So the reward/risk ratio is good. Ian. __

Re: [Xen-devel] [PATCH for-4.9] ioemu-stubdom: don't link *-softmmu* and *-linux-user*

2017-05-16 Thread Ian Jackson
Julien Grall writes ("Re: [PATCH for-4.9] ioemu-stubdom: don't link *-softmmu* and *-linux-user*"): > On 12/05/17 17:23, Wei Liu wrote: > > On Fri, May 12, 2017 at 04:21:06PM +0100, Wei Liu wrote: > >> They are generated by ./configure. Having them linked can cause race > >> between tools build an

[Xen-devel] [distros-debian-snapshot test] 71324: tolerable trouble: blocked/broken/fail/pass

2017-05-16 Thread Platform Team regression test user
flight 71324 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71324/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-i386-daily-netboot-pvgrub 10 guest-start fail blocked in 71268 test-amd64-amd

[Xen-devel] [[PATCH]] libxl/arm: Fix ARM build.

2017-05-16 Thread Andrii Anisov
From: Andrii Anisov Some compilers do not (validly?) detect that size will always be initialized when (rc > 0), so implicitly initialize it. Signed-off-by: Julien Grall --- tools/libxl/libxl_arm_acpi.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/libxl/libxl_arm_acpi.c b/tools/l

[Xen-devel] [PATCH] hvmloader: avoid tests when they would clobber used memory

2017-05-16 Thread Jan Beulich
First of all limit the memory range used for testing to 4Mb: There's no point placing page tables right above 8Mb when they can equally well live at the bottom of the chunk at 4Mb - rep_io_test() cares about the 5Mb...7Mb range only anyway. In a subsequent patch this will then also allow simply loo

Re: [Xen-devel] Proposal to allow setting up shared memory areas between VMs from xl config file

2017-05-16 Thread Jan Beulich
>>> On 15.05.17 at 19:40, wrote: > On Mon, 15 May 2017, Jan Beulich wrote: >> >>> On 15.05.17 at 12:21, wrote: >> > On Zhongze proposal, the share page will be mapped at the a specific >> > address in the guest memory. I agree this will require some work in the >> > toolstack, on the hypervisor

  1   2   >