Re: [Xen-devel] [PATCH 24/25 v6] xen/arm: vpl011: Add a pl011 uart DT node in the guest device tree

2017-07-20 Thread Bhupinder Thakur
Hi Julien, >> +/* >> + * If pl011 vuart is enabled then increment the nr_spis to allow >> allocation >> + * of SPI VIRQ for pl011. >> + */ >> +if (d_config->b_info.arch_arm.vuart) > > > vuart is an enum. Please follow what we did for the gic_version, i.e using a > switch or at

Re: [Xen-devel] [PATCH 4.12 26/84] x86/xen/efi: Initialize only the EFI struct members used by Xen

2017-07-20 Thread Juergen Gross
On 20/07/17 14:33, Daniel Kiper wrote: > On Thu, Jul 20, 2017 at 11:16:39AM +0200, Greg Kroah-Hartman wrote: >> On Thu, Jul 20, 2017 at 10:39:10AM +0200, Ingo Molnar wrote: >>> >>> * Daniel Kiper wrote: >>> Hey Greg, On Wed, Jul 19, 2017 at 11:43:32AM +0200, Greg Kroah-Hartman wrote

Re: [Xen-devel] [PATCH 22/25 v6] xen/arm: vpl011: Add support for vuart console in xenconsole

2017-07-20 Thread Bhupinder Thakur
Hi Stefano, >> CONFIG_ARM := y >> CONFIG_ARM_32 := y >> +CONFIG_VUART_CONSOLE := y >> CONFIG_ARM_$(XEN_OS) := y >> >> CONFIG_XEN_INSTALL_SUFFIX := > > What about leaving this off for ARM32 by default? I will disable it for ARM32. >> - if (!con->interface && xgt_handle) { >> + if (!

[Xen-devel] [linux-linus test] 112049: regressions - FAIL

2017-07-20 Thread osstest service owner
flight 112049 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/112049/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 7 xen-boot fail REGR. vs. 110515 test-amd64

[Xen-devel] [linux-linus bisection] complete test-amd64-amd64-pygrub

2017-07-20 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-pygrub testid xen-boot Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git Tre

Re: [Xen-devel] [PATCH XTF] Functional: Add a UMIP test

2017-07-20 Thread Boqun Feng
On Thu, Jul 20, 2017 at 10:38:59AM +0100, Andrew Cooper wrote: > On 20/07/17 06:29, Boqun Feng (Intel) wrote: > > Add a "umip" test for the User-Model Instruction Prevention. The test > > simply tries to run sgdt/sidt/sldt/str/smsw in guest user-mode with > > CR4_UMIP = 1. > > > > Signed-off-by: B

[Xen-devel] [qemu-mainline test] 112041: regressions - FAIL

2017-07-20 Thread osstest service owner
flight 112041 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/112041/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm6 xen-buildfail REGR. vs. 111765 build-i386

Re: [Xen-devel] [RFC PATCH] tools/libxl : add struct and parsing utils for the 'static_shm' xl config entry

2017-07-20 Thread Stefano Stabellini
On Thu, 20 Jul 2017, Zhongze Liu wrote: > >>> +} else if (!strcmp(key, "begin") || !strcmp(key, "end")) { > >>> +char *endptr; > >>> +int base = 10; > >>> +uint64_t new_bound; > >>> + > >>> +/* could be in hex form */ > >>> +if ('0' == val[0] && 'x' == va

Re: [Xen-devel] [RFC PATCH] tools/libxl : add struct and parsing utils for the 'static_shm' xl config entry

2017-07-20 Thread Stefano Stabellini
On Thu, 20 Jul 2017, Zhongze Liu wrote: > >> #endif /* LIBXL_H */ > >> diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl > >> index 8a9849c643..8c68b45add 100644 > >> --- a/tools/libxl/libxl_types.idl > >> +++ b/tools/libxl/libxl_types.idl > >> @@ -779,6 +779,57 @@ libxl_devic

Re: [Xen-devel] [RFC v3]Proposal to allow setting up shared memory areas between VMs from xl config file

2017-07-20 Thread Stefano Stabellini
On Thu, 20 Jul 2017, Zhongze Liu wrote: > >> where: > >> @id can be any string that matches the regexp "[^ > >> \t\n,]+" > >> and no logner than 128 characters > >> @begin/endcan be decimals or hexidemicals of the form > >> "0x2". > >>

Re: [Xen-devel] [PATCH] xen-mapcache: Fix the bug when overlapping emulated DMA operations may cause inconsistency in guest memory mappings

2017-07-20 Thread Stefano Stabellini
On Thu, 20 Jul 2017, Alexey G wrote: > On Wed, 19 Jul 2017 11:00:26 -0700 (PDT) > Stefano Stabellini wrote: > > > My expectation is that unlocked mappings are much more frequent than > > locked mappings. Also, I expect that only very rarely we'll be able to > > reuse locked mappings. Over the cou

[Xen-devel] [libvirt test] 112036: tolerable all pass - PUSHED

2017-07-20 Thread osstest service owner
flight 112036 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/112036/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 112002 test-armhf-armhf-libvirt-xsm 14 saveresto

Re: [Xen-devel] [PATCH 4/4] xen: Drop un-informative message during boot

2017-07-20 Thread Boris Ostrovsky
On 07/20/2017 07:04 AM, Punit Agrawal wrote: > On systems that are not booted as a Xen domain, the xenfs driver prints > the following message during boot. > > [3.460595] xenfs: not registering filesystem on non-xen platform > > As the user chose not to boot a Xen domain, this message does not

[Xen-devel] [xen-unstable-smoke test] 112062: tolerable trouble: broken/pass - PUSHED

2017-07-20 Thread osstest service owner
flight 112062 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112062/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13 mig

Re: [Xen-devel] [PATCH v3 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread Razvan Cojocaru
On 07/20/2017 09:52 PM, Tamas K Lengyel wrote: > On Thu, Jul 20, 2017 at 12:25 PM, Razvan Cojocaru > wrote: >> On 07/20/2017 07:46 PM, Tamas K Lengyel wrote: >>> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap >>> wrote: On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote: >> I

[Xen-devel] [xen-unstable test] 112033: regressions - trouble: broken/fail/pass

2017-07-20 Thread osstest service owner
flight 112033 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/112033/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 4 host-install(4) broken REGR. vs. 112004 test-armhf-armhf-x

Re: [Xen-devel] [PATCH v3 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread Tamas K Lengyel
On Thu, Jul 20, 2017 at 12:25 PM, Razvan Cojocaru wrote: > On 07/20/2017 07:46 PM, Tamas K Lengyel wrote: >> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap >> wrote: >>> On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel >>> wrote: > I think the issue would be whether to allow a domain to se

Re: [Xen-devel] [PATCH v3 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread Razvan Cojocaru
On 07/20/2017 07:46 PM, Tamas K Lengyel wrote: > On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap > wrote: >> On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote: I think the issue would be whether to allow a domain to set/clear the suppress #VE bit for its pages by calling the new HV

[Xen-devel] [BUG] libxl_ctx_free calls close(0)

2017-07-20 Thread Victor Kirhenshtein
Hello, it seems that libxl_ctx_free always calls close(0) for some reason, even if libxl never opens file descriptor 0. It sometimes closes valid descriptor in application causing random and hard to debug I/O errors. The following simple program can be used to reproduce this bug: #include #incl

[Xen-devel] [xen-unstable-smoke test] 112058: tolerable trouble: broken/pass - PUSHED

2017-07-20 Thread osstest service owner
flight 112058 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112058/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13 mig

Re: [Xen-devel] [PATCH v3 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread Tamas K Lengyel
On Thu, Jul 20, 2017 at 11:03 AM, Tamas K Lengyel wrote: > On Thu, Jul 20, 2017 at 10:57 AM, George Dunlap > wrote: >> On 07/20/2017 05:46 PM, Tamas K Lengyel wrote: >>> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap >>> wrote: On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote:

Re: [Xen-devel] [OSSTEST PATCH v12 20/21] Create a flight to test OpenStack with xen-unstable and libvirt

2017-07-20 Thread Anthony PERARD
On Wed, Jul 19, 2017 at 01:56:11PM +0100, Ian Jackson wrote: > Anthony PERARD writes ("[OSSTEST PATCH v12 20/21] Create a flight to test > OpenStack with xen-unstable and libvirt"): > > This patch creates a flight "openstack-ocata", with those jobs: > ... > > > OpenStack have many different repo

Re: [Xen-devel] Xen 4.10 Development Update

2017-07-20 Thread Julien Grall
On 20/07/17 17:57, Manish Jaggi wrote: Hi Julien, Hello Manish, I am not sure why piggyback on Daniel Kiper as it is not related to your work... On Mon, Jul 17, 2017 at 02:26:22PM +0100, Julien Grall wrote: This email only tracks big items for xen.git tree. Please reply for items you woul

Re: [Xen-devel] [PATCH v3 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread Tamas K Lengyel
On Thu, Jul 20, 2017 at 10:57 AM, George Dunlap wrote: > On 07/20/2017 05:46 PM, Tamas K Lengyel wrote: >> On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap >> wrote: >>> On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel >>> wrote: > I think the issue would be whether to allow a domain to set/

Re: [Xen-devel] [PATCH v3 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread George Dunlap
On 07/20/2017 05:46 PM, Tamas K Lengyel wrote: > On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap > wrote: >> On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote: I think the issue would be whether to allow a domain to set/clear the suppress #VE bit for its pages by calling the new HV

Re: [Xen-devel] Xen 4.10 Development Update

2017-07-20 Thread Manish Jaggi
Hi Julien, On Mon, Jul 17, 2017 at 02:26:22PM +0100, Julien Grall wrote: This email only tracks big items for xen.git tree. Please reply for items you woulk like to see in 4.10 so that people have an idea what is going on and prioritise accordingly. You're welcome to provide description and use

Re: [Xen-devel] xen/link: Move .data.rel.ro sections into .rodata for final link

2017-07-20 Thread Wei Liu
On Thu, Jul 20, 2017 at 05:46:50PM +0100, Wei Liu wrote: > CC relevant maintainers > > On Thu, Jul 20, 2017 at 05:20:43PM +0200, David Woodhouse wrote: > > From: David Woodhouse > > > > This includes stuff lke the hypercall tables which we really want lke -> like > > to be read-only. And they

Re: [Xen-devel] Paravitrualization drivers query

2017-07-20 Thread Wei Liu
On Thu, Jul 20, 2017 at 08:29:48PM +0530, shishir tiwari wrote: > Hi > > I am trying understand Xen Pv drivers and i writing my own pv fronend and > backend driver. > > 1. For driver internal communication how do i create/write node in backend > driver and how to read in fronted drivers. > 2.how

Re: [Xen-devel] [PATCH v3 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread Tamas K Lengyel
On Thu, Jul 20, 2017 at 10:43 AM, George Dunlap wrote: > On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote: >>> I think the issue would be whether to allow a domain to set/clear the >>> suppress #VE bit for its pages by calling the new HVMOP on itself. >> >> This problem is not limited to se

Re: [Xen-devel] xen/link: Move .data.rel.ro sections into .rodata for final link

2017-07-20 Thread Wei Liu
CC relevant maintainers On Thu, Jul 20, 2017 at 05:20:43PM +0200, David Woodhouse wrote: > From: David Woodhouse > > This includes stuff lke the hypercall tables which we really want > to be read-only. And they were going into .data.read-mostly. > > Signed-off-by: David Woodhouse > --- > Build

Re: [Xen-devel] [PATCH v3 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread George Dunlap
On Wed, Jul 19, 2017 at 7:24 PM, Tamas K Lengyel wrote: >> I think the issue would be whether to allow a domain to set/clear the >> suppress #VE bit for its pages by calling the new HVMOP on itself. > > This problem is not limited to setting the SVE bit. It also applies to > swapping altp2m views.

Re: [Xen-devel] [PATCH v3] Add option to xenconsole to always forward console input

2017-07-20 Thread Wei Liu
On Thu, Jul 20, 2017 at 09:47:48AM +0200, Felix Schmoll wrote: > Currently the default behaviour of the xenconsole client is to > ignore any input to stdin, unless stdin and stdout are both > ttys. The new option allows to manually overwrite this, causing the > client to forward input regardless. >

Re: [Xen-devel] [PATCH RFC] tools: Drop xc_cpuid_check() and bindings

2017-07-20 Thread Wei Liu
On Wed, Jul 19, 2017 at 08:50:07AM -0400, Boris Ostrovsky wrote: > On 07/19/2017 06:43 AM, Juergen Gross wrote: > > On 19/07/17 12:32, Wei Liu wrote: > >> On Mon, Jul 17, 2017 at 01:38:03PM +0100, Andrew Cooper wrote: > >>> There are no current users which I can locate. One piece of xend which >

Re: [Xen-devel] [PATCH 2/2] x86/altp2m: Add a hvmop for setting the suppress #VE bit

2017-07-20 Thread Tamas K Lengyel
On Thu, Jul 20, 2017 at 9:11 AM, George Dunlap wrote: > On Thu, Jun 15, 2017 at 8:01 PM, Tamas K Lengyel wrote: >> On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote: >>> Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a >>> privileged domain to change the value of the #VE suppr

[Xen-devel] USB Passthrough support X86_64

2017-07-20 Thread Ajmal M Ali
Hi, I am trying to do USB passthrough in x86_64. I have Ubuntu as Dom0 and DomU. *Dom0 : Linux teltvm0881 4.8.0-58-generic #63~16.04.1-Ubuntu SMP Mon Jun 26 18:08:51 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux* *DomU : Linux xen-guest-pv 4.12.0-custom #4 SMP Tue Jul 11 17:14:53 IST 2017 x86_64 GNU

[Xen-devel] [PATCH v3 21/21] x86/mm: add "pv_" prefix to new_guest_cr3

2017-07-20 Thread Wei Liu
Also take the chance to change d to currd. This function can't be moved yet. It can only be moved with other functions. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 18 +- xen/arch/x86/pv/emul-priv-op.c | 3 ++- xen/include/asm-x86/mm.h | 1 - xen/include/a

[Xen-devel] [PATCH v3 16/21] x86/mm: split out descriptor table code

2017-07-20 Thread Wei Liu
Move the code to pv/descriptor-tables.c. Add "pv_" prefix to {set,destroy}_gdt. Fix up call sites. Move the declarations to new header file. Fix coding style issues while moving code. Signed-off-by: Wei Liu --- xen/arch/x86/domain.c | 11 ++- xen/arch/x86/mm.c |

[Xen-devel] [PATCH v3 15/21] x86/mm: split out PV grant table code

2017-07-20 Thread Wei Liu
Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 349 -- xen/arch/x86/pv/Makefile | 1 + xen/arch/x86/pv/grant_table.c | 386 ++ 3 files changed, 387 insertions(+), 349 deletions(-) create mode 100644 xe

[Xen-devel] [PATCH v3 11/21] x86/mm: split out writable pagetable emulation code

2017-07-20 Thread Wei Liu
Move the code to pv/emul-ptwr-op.c. Fix coding style issues while moving the code. Rename ptwr_emulated_read to pv_emul_ptwr_read and export it via pv/mm.h because it is needed by other emulation code. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 308 +

[Xen-devel] [PATCH v3 12/21] x86/mm: split out readonly MMIO emulation code

2017-07-20 Thread Wei Liu
Move the code to pv/emul-mmio-op.c. Fix coding style issues while moving. Note that mmio_ro_emulated_write is needed by both PV and HVM, so it is left in x86/mm.c. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 129 xen/arch/x86/pv/Makefile |

[Xen-devel] [PATCH v3 14/21] x86/mm: move and rename guest_{, un}map_l1e

2017-07-20 Thread Wei Liu
Move them to pv/mm.c and rename them pv_{,un}map_guest_l1e. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 63 +++-- xen/arch/x86/pv/mm.c| 33 xen/include/asm-x86/pv/mm.h | 9 +++ 3 files changed, 57 insertio

[Xen-devel] [PATCH v3 10/21] x86/mm: move {un, }adjust_guest_* to pv/mm.h

2017-07-20 Thread Wei Liu
Those macros will soon be used in different files. They are PV specific so move them to pv/mm.h. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 47 - xen/include/asm-x86/pv/mm.h | 47 + 2 files chan

[Xen-devel] [PATCH v3 18/21] x86/mm: move and rename map_ldt_shadow_page

2017-07-20 Thread Wei Liu
Take the chance to change v to curr and d to currd in code. Also change the return type to bool. Fix up all the call sites. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 42 - xen/arch/x86/pv/descriptor-tables.c | 42 +++

[Xen-devel] [PATCH v3 19/21] x86/mm: factor out pv_arch_init_memory

2017-07-20 Thread Wei Liu
Move the split l4 setup code into the new function. The new function is also going to contain other PV specific setup code in later patch. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 73 ++- 1 file changed, 40 insertions(+), 33 deletions(-)

[Xen-devel] [PATCH v3 17/21] x86/mm: move compat descriptor handling code

2017-07-20 Thread Wei Liu
Move them along side the non-compat variants. Signed-off-by: Wei Liu --- xen/arch/x86/pv/descriptor-tables.c | 40 xen/arch/x86/x86_64/compat/mm.c | 41 - 2 files changed, 40 insertions(+), 41 deletions(-) diff --git a

[Xen-devel] [PATCH v3 20/21] x86/mm: move l4 table setup code

2017-07-20 Thread Wei Liu
Move two functions to pv/mm.c. Add prefix to init_guest_l4_table. Export them via pv/mm.h. Fix up call sites. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c| 69 +--- xen/arch/x86/pv/dom0_build.c | 3 +- xen/arch/x86/pv/domain.c | 3 +- xen

[Xen-devel] [PATCH v3 13/21] x86/mm: remove the unused inclusion of pv/emulate.h

2017-07-20 Thread Wei Liu
All emulation code is moved by now. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 26ad4a2e3b..c0a6ecc5b6 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -127,8 +127,6 @@ #include #include

Re: [Xen-devel] [PATCH 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread Tamas K Lengyel
On Thu, Jul 20, 2017 at 8:38 AM, George Dunlap wrote: > On Thu, Jun 15, 2017 at 7:49 PM, Tamas K Lengyel wrote: >> On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote: >>> From: Vlad Ioan Topan >>> >>> The default value for the "suppress #VE" bit set by set_mem_access() >>> currently depends on w

Re: [Xen-devel] Missing bits for production usage (was: [PATCH v5 00...)

2017-07-20 Thread Roger Pau Monne
On Thu, Jul 20, 2017 at 04:57:50PM +0100, Ian Jackson wrote: > Roger Pau Monne writes ("Missing bits for production usage (was: [PATCH v5 > 00...)"): > > A script to mark/unmark a $flight.$job as blessed. Marking a > > $flight.$job as blessed means that it's build output is never deleted > > from

[Xen-devel] [PATCH v3 04/21] x86/mm: lift PAGE_CACHE_ATTRS to page.h

2017-07-20 Thread Wei Liu
Currently all the users are within x86/mm.c. But that will change once we split PV specific mm code to another file. Lift that to page.h along side _PAGE_* in preparation for later patches. No functional change. Add some spaces around "|" while moving. Signed-off-by: Wei Liu --- xen/arch/x86/mm

[Xen-devel] [PATCH v3 09/21] x86/mm: rename and move update_intpte

2017-07-20 Thread Wei Liu
That function is only used by PV guests supporting code, add pv_ prefix. Export it via pv/mm.h. Move UPDATE_ENTRY as well. Signed-off-by: Wei Liu --- Now it is no longer an inline function, but I don't think that matters much. --- xen/arch/x86/mm.c | 65 ---

[Xen-devel] [PATCH v3 06/21] x86: move pv_emul_is_mem_write to pv/emulate.c

2017-07-20 Thread Wei Liu
Export it via pv/emulate.h. In the mean time it is required to include pv/emulate.h in x86/mm.c. The said function will be used later by different emulation handlers in later patches. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 9 ++--- xen/arch/x86/pv/emulate.c | 7 +++ xen

[Xen-devel] [PATCH v3 02/21] x86/mm: carve out replace_grant_pv_mapping

2017-07-20 Thread Wei Liu
And at once make it an inline function. Add declarations of replace_grant_{hvm,pv}_mapping to respective header files. The code movement will be done later. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 9 +++-- xen/include/asm-x86/grant_table.h | 10 -- xe

[Xen-devel] [PATCH v3 00/21] x86: refactor mm.c (the easy part)

2017-07-20 Thread Wei Liu
This series is part of my work to refactor x86/mm.c. It has grown to a 21 patches series so I figure I should probably get them approved first before making more changes. What is left is mostly PV MMU hypercall functions and their supporting code. I'm still thinking about how to refactor those bec

[Xen-devel] [PATCH v3 07/21] x86/mm: move and rename guest_get_eff{, kern}_l1e

2017-07-20 Thread Wei Liu
Move them to pv/mm.c and rename them to pv_get_guest_eff_{,kern}_l1e. Export them via pv/mm.h. They will be used later in emulation handlers. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 38 +++-- xen/arch/x86/pv/Makefile| 1 + xen/arch/x86/pv/mm.c|

[Xen-devel] [PATCH v3 05/21] x86/mm: document the return values from get_page_from_l*e

2017-07-20 Thread Wei Liu
Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 24 1 file changed, 24 insertions(+) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 8d7ceff9c8..141d1fc046 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -894,6 +894,12 @@ static int print_mmio_emul_rang

[Xen-devel] [PATCH v3 08/21] x86/mm: export get_page_from_pagenr

2017-07-20 Thread Wei Liu
It will be used by different files later, so export it via asm-x86/mm.h. Make it return 0 on success and -EINVAL on failure to match other get_page_from functions. Fix all call sites. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c| 26 +- xen/include/asm-x86/mm.h |

[Xen-devel] [PATCH v3 03/21] x86/mm: split HVM grant table code to hvm/grant_table.c

2017-07-20 Thread Wei Liu
Signed-off-by: Wei Liu --- xen/arch/x86/hvm/Makefile | 1 + xen/arch/x86/hvm/grant_table.c | 89 ++ xen/arch/x86/mm.c | 53 - 3 files changed, 90 insertions(+), 53 deletions(-) create mode 100644 xen/arch/x86/hvm/

[Xen-devel] [PATCH v3 01/21] x86/mm: carve out create_grant_pv_mapping

2017-07-20 Thread Wei Liu
And at once make create_grant_host_mapping an inline function. This requires making create_grant_{hvm,pv}_mapping non-static. Provide {hvm,pv}/grant_table.h. Include the headers where necessary. The two functions create_grant_{hvm,pv}_mapping will be moved later in a dedicated patch with all the

Re: [Xen-devel] Missing bits for production usage (was: [PATCH v5 00...)

2017-07-20 Thread Ian Jackson
Roger Pau Monne writes ("Missing bits for production usage (was: [PATCH v5 00...)"): > A script to mark/unmark a $flight.$job as blessed. Marking a > $flight.$job as blessed means that it's build output is never deleted > from osstest storage, a proposed command line would be: We can't call it "b

Re: [Xen-devel] [PATCH] xen: credit2: enable per cpu runqueue creation

2017-07-20 Thread George Dunlap
On 04/11/2017 05:15 PM, Praveen Kumar wrote: > The patch introduces a new command line option 'cpu' that when used will > create > runqueue per logical pCPU. This may be useful for small systems, and also for > development, performance evalution and comparison. > > Signed-off-by: Praveen Kumar >

Re: [Xen-devel] [PATCH v7 12/14] arm/mem_access: Add long-descriptor based gpt

2017-07-20 Thread Julien Grall
Hi, On 18/07/17 13:25, Sergej Proskurin wrote: +/* + * The starting level is the number of strides (grainsizes[gran] - 3) + * needed to consume the input address (ARM DDI 0487B.a J1-5924). + */ +level = 4 - DIV_ROUND_UP((input_size - grainsizes[gran]), (grainsizes[gran] - 3)

[Xen-devel] xen/link: Move .data.rel.ro sections into .rodata for final link

2017-07-20 Thread David Woodhouse
From: David Woodhouse This includes stuff lke the hypercall tables which we really want to be read-only. And they were going into .data.read-mostly. Signed-off-by: David Woodhouse --- Build tested on x86_64 (you really don't want to know about what I *actually* tested it with), not at all teste

[Xen-devel] Missing bits for production usage (was: [PATCH v5 00...)

2017-07-20 Thread Roger Pau Monne
Hello, This is mostly relevant for Ian, but I'm writing it here in case anyone else is interested. So far the content of this series works fine in standalone mode, and in a limited way in production mode: new flights always use the same base image in order to do the base install of FreeBSD. Inst

Re: [Xen-devel] [PATCH 2/2] x86/altp2m: Add a hvmop for setting the suppress #VE bit

2017-07-20 Thread George Dunlap
On Thu, Jun 15, 2017 at 8:01 PM, Tamas K Lengyel wrote: > On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote: >> Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a >> privileged domain to change the value of the #VE suppress bit for a >> page. >> >> Add a libxc wrapper for invokin

[Xen-devel] Paravitrualization drivers query

2017-07-20 Thread shishir tiwari
Hi I am trying understand Xen Pv drivers and i writing my own pv fronend and backend driver. 1. For driver internal communication how do i create/write node in backend driver and how to read in fronted drivers. 2.how do i create one shared page in backend driver to write/read data in frontend dri

Re: [Xen-devel] [PATCH 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-20 Thread George Dunlap
On Thu, Jun 15, 2017 at 7:49 PM, Tamas K Lengyel wrote: > On Fri, Jun 9, 2017 at 10:51 AM, Adrian Pop wrote: >> From: Vlad Ioan Topan >> >> The default value for the "suppress #VE" bit set by set_mem_access() >> currently depends on whether the call is made from the same domain (the >> bit is se

Re: [Xen-devel] [RFC 16/22] x86/percpu: Adapt percpu for PIE support

2017-07-20 Thread Thomas Garnier
On Wed, Jul 19, 2017 at 4:33 PM, H. Peter Anvin wrote: > On 07/19/17 11:26, Thomas Garnier wrote: >> On Tue, Jul 18, 2017 at 8:08 PM, Brian Gerst wrote: >>> On Tue, Jul 18, 2017 at 6:33 PM, Thomas Garnier wrote: Perpcu uses a clever design where the .percu ELF section has a virtual add

Re: [Xen-devel] [PATCH v4 5/9] xen/pci: split code to size BARs from pci_add_device

2017-07-20 Thread Roger Pau Monne
On Thu, Jul 20, 2017 at 03:00:40PM +0100, Roger Pau Monne wrote: > On Fri, Jul 14, 2017 at 04:33:20AM -0600, Jan Beulich wrote: > > >>> On 30.06.17 at 17:01, wrote: > > > +if ( ret < 0 ) > > > +break; > > > > ASSERT(ret) ? > > Really? This is different from th

Re: [Xen-devel] [PATCH v4 5/9] xen/pci: split code to size BARs from pci_add_device

2017-07-20 Thread Roger Pau Monne
On Fri, Jul 14, 2017 at 04:33:20AM -0600, Jan Beulich wrote: > >>> On 30.06.17 at 17:01, wrote: > > So that it can be called from outside in order to get the size of regular > > PCI > > BARs. This will be required in order to map the BARs from PCI devices into > > PVH > > Dom0 p2m. > > > > Sign

Re: [Xen-devel] [PATCH 13/25 v6] xen/arm: vpl011: Add a new add_console_evtchn_fd function in xenconsole

2017-07-20 Thread Bhupinder Thakur
Hi Wei, >> >> +static void add_console_evtchn_fd(struct console *con, void *data) > > There is no need to use void *. Just use long long * here. Since this function is going to be passed in later patches as an argument to iter functions, I wanted to keep the type generic so that I could type cas

[Xen-devel] [linux-linus bisection] complete test-amd64-amd64-xl-xsm

2017-07-20 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-xl-xsm testid guest-localmigrate Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-tradition

Re: [Xen-devel] [RFC PATCH v3 14/24] ARM: NUMA: DT: Parse NUMA distance information

2017-07-20 Thread Julien Grall
Hi Vijay, On 18/07/17 12:41, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Parse distance-matrix and fetch node distance information. Store distance information in node_distance[]. Register dt_node_distance() function pointer with the ARM numa code. This approach can be later used for AC

Re: [Xen-devel] [PATCH] docs: fix superpage default value

2017-07-20 Thread Wei Liu
On Thu, Jul 20, 2017 at 12:49:37PM +0100, Andrew Cooper wrote: > On 20/07/17 12:47, Wei Liu wrote: > > On Thu, Jul 20, 2017 at 12:45:38PM +0100, Roger Pau Monné wrote: > > > On Thu, Jul 20, 2017 at 12:35:56PM +0100, Wei Liu wrote: > > > > The code says it defaults to false. > > > > > > > > Signed-

Re: [Xen-devel] [PATCH 4.12 26/84] x86/xen/efi: Initialize only the EFI struct members used by Xen

2017-07-20 Thread Daniel Kiper
On Thu, Jul 20, 2017 at 11:16:39AM +0200, Greg Kroah-Hartman wrote: > On Thu, Jul 20, 2017 at 10:39:10AM +0200, Ingo Molnar wrote: > > > > * Daniel Kiper wrote: > > > > > Hey Greg, > > > > > > On Wed, Jul 19, 2017 at 11:43:32AM +0200, Greg Kroah-Hartman wrote: > > > > 4.12-stable review patch. If

Re: [Xen-devel] [RFC PATCH v3 02/24] x86: NUMA: Clean up: Fix coding styles and drop unused code

2017-07-20 Thread Julien Grall
On 20/07/17 13:29, Vijay Kilari wrote: On Thu, Jul 20, 2017 at 5:39 PM, Julien Grall wrote: But still compilation issue comes from below code. where only asm/numa.h is included. --- a/xen/include/asm-x86/irq.h +++ b/xen/include/asm-x86/irq.h @@ -4,7 +4,7 @@ /* (C) 1992, 1993 Linus Torvalds,

Re: [Xen-devel] [RFC PATCH v3 02/24] x86: NUMA: Clean up: Fix coding styles and drop unused code

2017-07-20 Thread Vijay Kilari
On Thu, Jul 20, 2017 at 5:39 PM, Julien Grall wrote: > > > On 20/07/17 13:05, Vijay Kilari wrote: >> >> On Thu, Jul 20, 2017 at 4:30 PM, Julien Grall >> wrote: >>> >>> Hi Vijay, >>> >>> >>> On 20/07/17 08:00, Vijay Kilari wrote: On Wed, Jul 19, 2017 at 9:53 PM, Julien Grall w

Re: [Xen-devel] [XenSummit 2017] Notes from the 5-level-paging session

2017-07-20 Thread Yu Zhang
On 7/20/2017 7:24 PM, Andrew Cooper wrote: On 20/07/17 11:36, Yu Zhang wrote: On 7/20/2017 6:42 PM, Andrew Cooper wrote: On 20/07/17 11:10, Yu Zhang wrote: On 7/17/2017 6:53 PM, Juergen Gross wrote: Hey, I took a few notes at the 5-level-paging session at the summit. I hope there isn't

Re: [Xen-devel] Notes from PCI Passthrough design discussion at Xen Summit

2017-07-20 Thread Julien Grall
On 20/07/17 12:00, Manish Jaggi wrote: On 7/20/2017 4:11 PM, Julien Grall wrote: On 20/07/17 10:32, Manish Jaggi wrote: Hi Roger, On 7/20/2017 1:54 PM, Roger Pau Monné wrote: On Thu, Jul 20, 2017 at 09:24:36AM +0530, Manish Jaggi wrote: Hi Punit, On 7/19/2017 8:11 PM, Punit Agrawal wrot

Re: [Xen-devel] [RFC PATCH v3 02/24] x86: NUMA: Clean up: Fix coding styles and drop unused code

2017-07-20 Thread Julien Grall
On 20/07/17 13:05, Vijay Kilari wrote: On Thu, Jul 20, 2017 at 4:30 PM, Julien Grall wrote: Hi Vijay, On 20/07/17 08:00, Vijay Kilari wrote: On Wed, Jul 19, 2017 at 9:53 PM, Julien Grall wrote: Hi Vijay, On 18/07/17 12:41, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Fix co

Re: [Xen-devel] [RFC PATCH v3 02/24] x86: NUMA: Clean up: Fix coding styles and drop unused code

2017-07-20 Thread Vijay Kilari
On Thu, Jul 20, 2017 at 4:30 PM, Julien Grall wrote: > Hi Vijay, > > > On 20/07/17 08:00, Vijay Kilari wrote: >> >> On Wed, Jul 19, 2017 at 9:53 PM, Julien Grall >> wrote: >>> >>> Hi Vijay, >>> >>> On 18/07/17 12:41, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Fix

Re: [Xen-devel] Notes from PCI Passthrough design discussion at Xen Summit

2017-07-20 Thread Julien Grall
On 20/07/17 12:06, Roger Pau Monné wrote: On Thu, Jul 20, 2017 at 11:47:04AM +0100, Julien Grall wrote: Slide 18 shows only for DomU ? ARM folks believe this is not needed for Dom0 in the ARM case, I don't have an opinion, I know it's certainly mandatory for x86 PVH Dom0. That was 8 months

Re: [Xen-devel] [PATCH] docs: fix superpage default value

2017-07-20 Thread Andrew Cooper
On 20/07/17 12:47, Wei Liu wrote: On Thu, Jul 20, 2017 at 12:45:38PM +0100, Roger Pau Monné wrote: On Thu, Jul 20, 2017 at 12:35:56PM +0100, Wei Liu wrote: The code says it defaults to false. Signed-off-by: Wei Liu --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc

Re: [Xen-devel] [PATCH] docs: fix superpage default value

2017-07-20 Thread Wei Liu
On Thu, Jul 20, 2017 at 12:45:38PM +0100, Roger Pau Monné wrote: > On Thu, Jul 20, 2017 at 12:35:56PM +0100, Wei Liu wrote: > > The code says it defaults to false. > > > > Signed-off-by: Wei Liu > > --- > > Cc: Andrew Cooper > > Cc: George Dunlap > > Cc: Ian Jackson > > Cc: Jan Beulich > > Cc

Re: [Xen-devel] [PATCH] docs: fix superpage default value

2017-07-20 Thread Roger Pau Monné
On Thu, Jul 20, 2017 at 12:35:56PM +0100, Wei Liu wrote: > The code says it defaults to false. > > Signed-off-by: Wei Liu > --- > Cc: Andrew Cooper > Cc: George Dunlap > Cc: Ian Jackson > Cc: Jan Beulich > Cc: Konrad Rzeszutek Wilk > Cc: Stefano Stabellini > Cc: Tim Deegan > Cc: Wei Liu >

Re: [Xen-devel] [RFC PATCH v3 09/24] NUMA: x86: Move common code from srat.c

2017-07-20 Thread Vijay Kilari
Hi Julien, On Thu, Jul 20, 2017 at 4:47 PM, Julien Grall wrote: > Hi Vijay, > > On 18/07/17 12:41, vijay.kil...@gmail.com wrote: >> >> From: Vijaya Kumar K >> >> Move code from xen/arch/x86/srat.c to xen/common/numa.c >> so that it can be used by other archs. >> >> Apart from moving the code the

[Xen-devel] [PATCH] docs: fix superpage default value

2017-07-20 Thread Wei Liu
The code says it defaults to false. Signed-off-by: Wei Liu --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan Cc: Wei Liu --- docs/misc/xen-command-line.markdown | 2 +- 1 file changed, 1 insertion(+), 1

Re: [Xen-devel] [RFC PATCH v3 13/24] ARM: NUMA: DT: Parse memory NUMA information

2017-07-20 Thread Julien Grall
On 19/07/17 19:39, Julien Grall wrote: cell = (const __be32 *)prop->data; banks = fdt32_to_cpu(prop->len) / (reg_cells * sizeof (u32)); -for ( i = 0; i < banks && bootinfo.mem.nr_banks < NR_MEM_BANKS; i++ ) +for ( i = 0; i < banks; i++ ) { device_tree_get_reg(&c

Re: [Xen-devel] [XenSummit 2017] Notes from the 5-level-paging session

2017-07-20 Thread Andrew Cooper
On 20/07/17 11:36, Yu Zhang wrote: On 7/20/2017 6:42 PM, Andrew Cooper wrote: On 20/07/17 11:10, Yu Zhang wrote: On 7/17/2017 6:53 PM, Juergen Gross wrote: Hey, I took a few notes at the 5-level-paging session at the summit. I hope there isn't any major stuff missing... Participants (at

Re: [Xen-devel] [RFC PATCH v3 13/24] ARM: NUMA: DT: Parse memory NUMA information

2017-07-20 Thread Julien Grall
Hi Vijay, On 20/07/17 11:37, Vijay Kilari wrote: On Thu, Jul 20, 2017 at 12:09 AM, Julien Grall wrote: This code looks fairly similar to some bits of acpi_numa_memory_affinity_init. Is there any way we could introduce a common helper? Yes some bit of code is similar, But acpi_numa_memory_aff

Re: [Xen-devel] [RFC PATCH v3 10/24] NUMA: Allow numa initialization with DT

2017-07-20 Thread Julien Grall
Hi Vijay, On 20/07/17 11:28, Vijay Kilari wrote: On Wed, Jul 19, 2017 at 11:28 PM, Julien Grall wrote: Hi Vijay, On 18/07/17 12:41, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K The common code allows numa initialization only when ACPI_NUMA config is enabled. Allow initialization whe

Re: [Xen-devel] [RFC PATCH v3 09/24] NUMA: x86: Move common code from srat.c

2017-07-20 Thread Julien Grall
Hi Vijay, On 18/07/17 12:41, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Move code from xen/arch/x86/srat.c to xen/common/numa.c so that it can be used by other archs. Apart from moving the code the following changes are done - Coding style of code moved to numa.c is changed to xen st

Re: [Xen-devel] [RFC PATCH v3 08/24] NUMA: x86: Move numa code and make it generic

2017-07-20 Thread Julien Grall
Hi Vijay, On 20/07/17 09:55, Vijay Kilari wrote: On Wed, Jul 19, 2017 at 11:11 PM, Julien Grall wrote: Hi Vijay, On 18/07/17 12:41, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Move code from xen/arch/x86/numa.c to xen/common/numa.c so that it can be used by other archs. The follow

Re: [Xen-devel] [RFC PATCH v3 07/24] ARM: NUMA: Add existing ARM numa code under CONFIG_NUMA

2017-07-20 Thread Julien Grall
Hi Vijay, On 20/07/17 10:31, Vijay Kilari wrote: On Tue, Jul 18, 2017 at 11:36 PM, Julien Grall wrote: Hi Vijay, On 18/07/17 12:41, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Right now CONFIG_NUMA is not enabled for ARM and existing code in asm-arm/numa.h is for !CONFIG_NUMA. Henc

Re: [Xen-devel] Notes from PCI Passthrough design discussion at Xen Summit

2017-07-20 Thread Roger Pau Monné
On Thu, Jul 20, 2017 at 11:47:04AM +0100, Julien Grall wrote: > > > Slide 18 shows only for DomU ? > > > > ARM folks believe this is not needed for Dom0 in the ARM case, I don't > > have an opinion, I know it's certainly mandatory for x86 PVH Dom0. > > That was 8 months ago, you managed to convin

[Xen-devel] [PATCH 4/4] xen: Drop un-informative message during boot

2017-07-20 Thread Punit Agrawal
On systems that are not booted as a Xen domain, the xenfs driver prints the following message during boot. [3.460595] xenfs: not registering filesystem on non-xen platform As the user chose not to boot a Xen domain, this message does not provide useful information. Drop this message. Signed-

[Xen-devel] [PATCH 0/4] Drop uninformative messages from bootlog

2017-07-20 Thread Punit Agrawal
Hi, While booting v4.13-rc1 on an arm64 system, I noticed some messages that clutter the boot log without providing any useful information. This series trims some of the obvious offenders. The patches are spread across a few sub-systems - arm64/mm, mailbox, APEI and xen, and can be independently

Re: [Xen-devel] [RFC PATCH v3 05/24] x86: NUMA: Add accessors for nodes[] and node_memblk_range[] structs

2017-07-20 Thread Julien Grall
On 20/07/17 08:41, Vijay Kilari wrote: On Wed, Jul 19, 2017 at 10:48 PM, Julien Grall wrote: On 19/07/17 07:40, Vijay Kilari wrote: On Tue, Jul 18, 2017 at 8:59 PM, Wei Liu wrote: On Tue, Jul 18, 2017 at 05:11:27PM +0530, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Add acces

Re: [Xen-devel] Notes from PCI Passthrough design discussion at Xen Summit

2017-07-20 Thread Manish Jaggi
Hi Roger, On 7/20/2017 3:59 PM, Roger Pau Monné wrote: On Thu, Jul 20, 2017 at 03:02:19PM +0530, Manish Jaggi wrote: Hi Roger, On 7/20/2017 1:54 PM, Roger Pau Monné wrote: On Thu, Jul 20, 2017 at 09:24:36AM +0530, Manish Jaggi wrote: Hi Punit, On 7/19/2017 8:11 PM, Punit Agrawal wrote: I t

Re: [Xen-devel] Notes from PCI Passthrough design discussion at Xen Summit

2017-07-20 Thread Manish Jaggi
HI Julien, On 7/20/2017 4:11 PM, Julien Grall wrote: On 20/07/17 10:32, Manish Jaggi wrote: Hi Roger, On 7/20/2017 1:54 PM, Roger Pau Monné wrote: On Thu, Jul 20, 2017 at 09:24:36AM +0530, Manish Jaggi wrote: Hi Punit, On 7/19/2017 8:11 PM, Punit Agrawal wrote: I took some notes for the

  1   2   >