[Xen-devel] [ovmf test] 112305: all pass - PUSHED

2017-07-25 Thread osstest service owner
flight 112305 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112305/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3b341e263da957b2c8896317f41cc32880c878b0 baseline version: ovmf 1683ecec41a7c944783c5

[Xen-devel] [qemu-mainline test] 112290: regressions - trouble: blocked/broken/fail/pass

2017-07-25 Thread osstest service owner
flight 112290 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/112290/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-credit2 4 host-install(4)broken REGR. vs. 111765 test-arm64-arm64-

[Xen-devel] [xen-unstable test] 112286: tolerable trouble: broken/fail/pass - PUSHED

2017-07-25 Thread osstest service owner
flight 112286 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/112286/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-arm64-arm64-xl-xsm 4 host-install(4) broken pass in 112274 test-arm64-arm64-xl-credit2 4

[Xen-devel] [xen-unstable-smoke test] 112297: tolerable trouble: broken/pass - PUSHED

2017-07-25 Thread osstest service owner
flight 112297 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112297/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13 mig

[Xen-devel] [linux-linus test] 112277: regressions - FAIL

2017-07-25 Thread osstest service owner
flight 112277 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/112277/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515 test-amd64-amd64-xl

Re: [Xen-devel] [GIT PULL] (xen) stable/for-jens-4.13

2017-07-25 Thread Jens Axboe
On 07/25/2017 03:21 PM, Konrad Rzeszutek Wilk wrote: > Hi Jens, > > Please git pull in your branch "for-linus" the following > branch which is based on 765e40b675a9566459ddcb8358ad16f3b8344bbe > "blk-mq: map queues to all present CPUs": > > git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xe

[Xen-devel] [PATCH v2 07/13] xen/pvcalls: implement accept command

2017-07-25 Thread Stefano Stabellini
Send PVCALLS_ACCEPT to the backend. Allocate a new active socket. Make sure that only one accept command is executed at any given time by setting PVCALLS_FLAG_ACCEPT_INFLIGHT and waiting on the inflight_accept_req waitqueue. sock->sk->sk_send_head is not used for ip sockets: reuse the field to sto

[Xen-devel] [PATCH v2 09/13] xen/pvcalls: implement recvmsg

2017-07-25 Thread Stefano Stabellini
Implement recvmsg by copying data from the "in" ring. If not enough data is available and the recvmsg call is blocking, then wait on the inflight_conn_req waitqueue. Take the active socket in_mutex so that only one function can access the ring at any given time. If not enough data is available on

[Xen-devel] [PATCH v2 10/13] xen/pvcalls: implement poll command

2017-07-25 Thread Stefano Stabellini
For active sockets, check the indexes and use the inflight_conn_req waitqueue to wait. For passive sockets, send PVCALLS_POLL to the backend. Use the inflight_accept_req waitqueue if an accept is outstanding. Otherwise use the inflight_req waitqueue: inflight_req is awaken when a new response is r

[Xen-devel] [PATCH v2 01/13] xen/pvcalls: introduce the pvcalls xenbus frontend

2017-07-25 Thread Stefano Stabellini
Introduce a xenbus frontend for the pvcalls protocol, as defined by https://xenbits.xen.org/docs/unstable/misc/pvcalls.html. This patch only adds the stubs, the code will be added by the following patches. Signed-off-by: Stefano Stabellini CC: boris.ostrov...@oracle.com CC: jgr...@suse.com ---

[Xen-devel] [PATCH v2 04/13] xen/pvcalls: implement connect command

2017-07-25 Thread Stefano Stabellini
Send PVCALLS_CONNECT to the backend. Allocate a new ring and evtchn for the active socket. Introduce a data structure to keep track of sockets. Introduce a waitqueue to allow the frontend to wait on data coming from the backend on the active socket (recvmsg command). Two mutexes (one of reads and

[Xen-devel] [PATCH v2 05/13] xen/pvcalls: implement bind command

2017-07-25 Thread Stefano Stabellini
Send PVCALLS_BIND to the backend. Introduce a new structure, part of struct sock_mapping, to store information specific to passive sockets. Introduce a status field to keep track of the status of the passive socket. Introduce a waitqueue for the "accept" command (see the accept command implementa

[Xen-devel] [PATCH v2 11/13] xen/pvcalls: implement release command

2017-07-25 Thread Stefano Stabellini
Send PVCALLS_RELEASE to the backend and wait for a reply. Take both in_mutex and out_mutex to avoid concurrent accesses. Then, free the socket. Signed-off-by: Stefano Stabellini CC: boris.ostrov...@oracle.com CC: jgr...@suse.com --- drivers/xen/pvcalls-front.c | 85 ++

[Xen-devel] [PATCH v2 13/13] xen: introduce a Kconfig option to enable the pvcalls frontend

2017-07-25 Thread Stefano Stabellini
Also add pvcalls-front to the Makefile. Signed-off-by: Stefano Stabellini CC: boris.ostrov...@oracle.com CC: jgr...@suse.com --- drivers/xen/Kconfig | 9 + drivers/xen/Makefile | 1 + 2 files changed, 10 insertions(+) diff --git a/drivers/xen/Kconfig b/drivers/xen/Kconfig index 4545561

[Xen-devel] [PATCH v2 08/13] xen/pvcalls: implement sendmsg

2017-07-25 Thread Stefano Stabellini
Send data to an active socket by copying data to the "out" ring. Take the active socket out_mutex so that only one function can access the ring at any given time. If not enough room is available on the ring, rather than returning immediately or sleep-waiting, spin for up to 5000 cycles. This small

[Xen-devel] [PATCH v2 12/13] xen/pvcalls: implement frontend disconnect

2017-07-25 Thread Stefano Stabellini
Implement pvcalls frontend removal function. Go through the list of active and passive sockets and free them all, one at a time. Signed-off-by: Stefano Stabellini Reviewed-by: Juergen Gross CC: boris.ostrov...@oracle.com CC: jgr...@suse.com --- drivers/xen/pvcalls-front.c | 28 +

[Xen-devel] [PATCH v2 02/13] xen/pvcalls: connect to the backend

2017-07-25 Thread Stefano Stabellini
Implement the probe function for the pvcalls frontend. Read the supported versions, max-page-order and function-calls nodes from xenstore. Introduce a data structure named pvcalls_bedata. It contains pointers to the command ring, the event channel, a list of active sockets and a list of passive so

[Xen-devel] [PATCH v2 03/13] xen/pvcalls: implement socket command and handle events

2017-07-25 Thread Stefano Stabellini
Send a PVCALLS_SOCKET command to the backend, use the masked req_prod_pvt as req_id. This way, req_id is guaranteed to be between 0 and PVCALLS_NR_REQ_PER_RING. We already have a slot in the rsp array ready for the response, and there cannot be two outstanding responses with the same req_id. Wait

[Xen-devel] [PATCH v2 06/13] xen/pvcalls: implement listen command

2017-07-25 Thread Stefano Stabellini
Send PVCALLS_LISTEN to the backend. Signed-off-by: Stefano Stabellini CC: boris.ostrov...@oracle.com CC: jgr...@suse.com --- drivers/xen/pvcalls-front.c | 48 + drivers/xen/pvcalls-front.h | 1 + 2 files changed, 49 insertions(+) diff --git a/drivers

[Xen-devel] [PATCH v2 00/13] introduce the Xen PV Calls frontend

2017-07-25 Thread Stefano Stabellini
Hi all, this series introduces the frontend for the newly introduced PV Calls procotol. PV Calls is a paravirtualized protocol that allows the implementation of a set of POSIX functions in a different domain. The PV Calls frontend sends POSIX function calls to the backend, which implements them a

[Xen-devel] [GIT PULL] (xen) stable/for-jens-4.13

2017-07-25 Thread Konrad Rzeszutek Wilk
Hi Jens, Please git pull in your branch "for-linus" the following branch which is based on 765e40b675a9566459ddcb8358ad16f3b8344bbe "blk-mq: map queues to all present CPUs": git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git stable/for-jens-4.13 It has two bug-fixes for the xen-blkfr

Re: [Xen-devel] [PATCH v1 11/13] xen/pvcalls: implement release command

2017-07-25 Thread Stefano Stabellini
On Mon, 24 Jul 2017, Juergen Gross wrote: > On 22/07/17 02:12, Stefano Stabellini wrote: > > Send PVCALLS_RELEASE to the backend and wait for a reply. Take both > > in_mutex and out_mutex to avoid concurrent accesses. Then, free the > > socket. > > > > Signed-off-by: Stefano Stabellini > > CC: bo

Re: [Xen-devel] [PATCH v1 10/13] xen/pvcalls: implement poll command

2017-07-25 Thread Stefano Stabellini
On Mon, 24 Jul 2017, Juergen Gross wrote: > On 22/07/17 02:12, Stefano Stabellini wrote: > > For active sockets, check the indexes and use the inflight_conn_req > > waitqueue to wait. > > > > For passive sockets, send PVCALLS_POLL to the backend. Use the > > inflight_accept_req waitqueue if an acc

Re: [Xen-devel] [PATCH v1 03/13] xen/pvcalls: implement socket command and handle events

2017-07-25 Thread Stefano Stabellini
On Mon, 24 Jul 2017, Juergen Gross wrote: > On 22/07/17 02:11, Stefano Stabellini wrote: > > Send a PVCALLS_SOCKET command to the backend, use the masked > > req_prod_pvt as req_id. This way, req_id is guaranteed to be between 0 > > and PVCALLS_NR_REQ_PER_RING. We already have a slot in the rsp arr

Re: [Xen-devel] [PATCH v1 02/13] xen/pvcalls: connect to the backend

2017-07-25 Thread Stefano Stabellini
On Mon, 24 Jul 2017, Juergen Gross wrote: > On 22/07/17 02:11, Stefano Stabellini wrote: > > Implement the probe function for the pvcalls frontend. Read the > > supported versions, max-page-order and function-calls nodes from > > xenstore. > > > > Introduce a data structure named pvcalls_bedata. I

[Xen-devel] [libvirt test] 112276: tolerable all pass - PUSHED

2017-07-25 Thread osstest service owner
flight 112276 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/112276/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 112201 test-armhf-armhf-libvirt-xsm 14 saveresto

[Xen-devel] [PATCH v2] hvmloader, libxl: use the correct ACPI settings depending on device model

2017-07-25 Thread Igor Druzhinin
We need to choose ACPI tables and ACPI IO port location properly depending on the device model version we are running. Previously, this decision was made by BIOS type specific code in hvmloader, e.g. always load QEMU traditional specific tables if it's ROMBIOS and always load QEMU Xen specific tabl

Re: [Xen-devel] QEMU commit 04bf2526ce breaks use of xen-mapcache

2017-07-25 Thread Paolo Bonzini
> > Thanks---however, after re-reading xen-mapcache.c, dma needs to be false > > for unlocked mappings. > > If there is a DMA operation already in progress, it means that we'll > already have a locked mapping for it. Yes, I only wanted to say that qemu_ram_ptr_length should pass dma=false when c

[Xen-devel] [PATCH 4.12 047/196] xen/scsiback: Fix a TMR related use-after-free

2017-07-25 Thread Greg Kroah-Hartman
4.12-stable review patch. If anyone has any objections, please let me know. -- From: Bart Van Assche commit 9f4ab18ac51dc87345a9cbd2527e6acf7a0a9335 upstream. scsiback_release_cmd() must not dereference se_cmd->se_tmr_req because that memory is freed by target_free_cmd_mem() b

[Xen-devel] [PATCH 4.9 037/125] xen/scsiback: Fix a TMR related use-after-free

2017-07-25 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Bart Van Assche commit 9f4ab18ac51dc87345a9cbd2527e6acf7a0a9335 upstream. scsiback_release_cmd() must not dereference se_cmd->se_tmr_req because that memory is freed by target_free_cmd_mem() be

Re: [Xen-devel] [RFC PATCH v3 15/24] ARM: NUMA: DT: Add CPU NUMA support

2017-07-25 Thread Stefano Stabellini
On Tue, 25 Jul 2017, Julien Grall wrote: > On 25/07/17 19:48, Stefano Stabellini wrote: > > On Tue, 25 Jul 2017, Julien Grall wrote: > > > On 25/07/17 07:47, Vijay Kilari wrote: > > > > > > void numa_failed(void) > > > > > > { > > > > > > numa_off = true; > > > > > > init_dt_numa_distan

Re: [Xen-devel] QEMU commit 04bf2526ce breaks use of xen-mapcache

2017-07-25 Thread Stefano Stabellini
On Tue, 25 Jul 2017, Paolo Bonzini wrote: > - Original Message - > > From: "Stefano Stabellini" > > To: "Paolo Bonzini" > > Cc: "Anthony PERARD" , "Stefano Stabellini" > > , > > xen-devel@lists.xen.org, qemu-de...@nongnu.org > > Sent: Tuesday, July 25, 2017 8:08:21 PM > > Subject: Re: QE

[Xen-devel] [PATCH] x86/hvm: Fix boundary check in hvmemul_insn_fetch()

2017-07-25 Thread Andrew Cooper
c/s 0943a03037 added some extra protection for overflowing the emulation instruction cache, but Coverity points out that boundary condition is off by one when memcpy()'ing out of the buffer. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Paul Durrant --- xen/arch/x86/hvm/emulate.c | 4 ++

Re: [Xen-devel] [PATCH v2 1/3] x86/svm: Drop svm_segment_register_t

2017-07-25 Thread Boris Ostrovsky
On 07/25/2017 02:28 PM, Andrew Cooper wrote: > Most SVM code already uses struct segment_register. Drop the typedef and > adjust the definitions in struct vmcb_struct, and svm_dump_sel(). Introduce > some build-time assertions that struct segment_register from the common > emulation code is usabl

Re: [Xen-devel] [RFC PATCH v3 15/24] ARM: NUMA: DT: Add CPU NUMA support

2017-07-25 Thread Julien Grall
On 25/07/17 19:48, Stefano Stabellini wrote: On Tue, 25 Jul 2017, Julien Grall wrote: On 25/07/17 07:47, Vijay Kilari wrote: void numa_failed(void) { numa_off = true; init_dt_numa_distance(); node_distance_fn = NULL; +init_cpu_to_node(); +} + +void __init numa_set_cpu_nod

Re: [Xen-devel] [RFC PATCH v3 15/24] ARM: NUMA: DT: Add CPU NUMA support

2017-07-25 Thread Stefano Stabellini
On Tue, 25 Jul 2017, Julien Grall wrote: > On 25/07/17 07:47, Vijay Kilari wrote: > > > > void numa_failed(void) > > > > { > > > > numa_off = true; > > > > init_dt_numa_distance(); > > > > node_distance_fn = NULL; > > > > +init_cpu_to_node(); > > > > +} > > > > + > > > > +void

Re: [Xen-devel] QEMU commit 04bf2526ce breaks use of xen-mapcache

2017-07-25 Thread Paolo Bonzini
- Original Message - > From: "Stefano Stabellini" > To: "Paolo Bonzini" > Cc: "Anthony PERARD" , "Stefano Stabellini" > , > xen-devel@lists.xen.org, qemu-de...@nongnu.org > Sent: Tuesday, July 25, 2017 8:08:21 PM > Subject: Re: QEMU commit 04bf2526ce breaks use of xen-mapcache > > On

Re: [Xen-devel] [RFC PATCH v3 15/24] ARM: NUMA: DT: Add CPU NUMA support

2017-07-25 Thread Julien Grall
On 25/07/17 07:47, Vijay Kilari wrote: void numa_failed(void) { numa_off = true; init_dt_numa_distance(); node_distance_fn = NULL; +init_cpu_to_node(); +} + +void __init numa_set_cpu_node(int cpu, unsigned int nid) +{ +if ( !node_isset(nid, processor_nodes_parsed) || ni

[Xen-devel] [PATCH v2 2/3] x86/hvm: Rearange check_segment() to use a switch statement

2017-07-25 Thread Andrew Cooper
This simplifies the logic by separating the x86_segment check from the type check. No functional change. Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich --- xen/arch/x86/hvm/domain.c | 43 +-- 1 file changed, 29 insertions(+), 14 deletions(-) diff

[Xen-devel] [PATCH v2 0/3] Improvements to struct semgent_register

2017-07-25 Thread Andrew Cooper
No functional change, but the source code is less verbose. Andrew Cooper (3): x86/svm: Drop svm_segment_register_t x86/hvm: Rearange check_segment() to use a switch statement x86/emul: Drop segment_attributes_t tools/fuzz/x86_instruction_emulator/fuzz-emul.c | 10 +- tools/tests/x86_emula

[Xen-devel] [PATCH v2 3/3] x86/emul: Drop segment_attributes_t

2017-07-25 Thread Andrew Cooper
The amount of namespace resolution is unnecessarily large, as all code deals in terms of struct segment_register. This removes the attr.fields part of all references, and alters attr.bytes to just attr. Three areas of code using initialisers for segment_register are tweaked to compile with older

[Xen-devel] [PATCH v2 1/3] x86/svm: Drop svm_segment_register_t

2017-07-25 Thread Andrew Cooper
Most SVM code already uses struct segment_register. Drop the typedef and adjust the definitions in struct vmcb_struct, and svm_dump_sel(). Introduce some build-time assertions that struct segment_register from the common emulation code is usable in struct vmcb_struct. While making these adjustme

Re: [Xen-devel] [OSSTEST PATCH v13 00/24] Have OpenStack tested on top of xen's master and libvirt's master.

2017-07-25 Thread Ian Jackson
Anthony PERARD writes ("[OSSTEST PATCH v13 00/24] Have OpenStack tested on top of xen's master and libvirt's master."): > Now powered with subunit-to-substep engine. > > The Tempest test names reported via subunit are in the form: > tempest.scenario.test_minimum_basic.TestMinimumBasicScenario.tes

Re: [Xen-devel] [OSSTEST PATCH v13 18/24] TestSupport: Introduce target_cmd_stashed

2017-07-25 Thread Ian Jackson
Anthony PERARD writes ("[OSSTEST PATCH v13 18/24] TestSupport: Introduce target_cmd_stashed"): > This works like target_cmd, but takes a ref to a filename as argument > and stash the output of the command then return a path to the stashed > output. ... > +# Like target_cmd, but stash cmd stdout an

Re: [Xen-devel] [OSSTEST PATCH v13 22/24] New branch openstack-ocata

2017-07-25 Thread Ian Jackson
Anthony PERARD writes ("[OSSTEST PATCH v13 22/24] New branch openstack-ocata"): > Testing of the Ocata stable branch of OpenStack against Xen unstable. > > OpenStack have many different repo which should be in sync, so we should > attempd to grab the revisions of the stable branch of every OpenSta

Re: [Xen-devel] [OSSTEST PATCH v13 24/24] openstack tests: Don't run them on arm*

2017-07-25 Thread Ian Jackson
Anthony PERARD writes ("[OSSTEST PATCH v13 24/24] openstack tests: Don't run them on arm*"): > Signed-off-by: Anthony PERARD Acked-by: Ian Jackson You should probably mention the existence of this patch in the other one's commit message... Ian. ___

Re: [Xen-devel] [OSSTEST PATCH v13 21/24] Create a flight to test OpenStack with xen-unstable and libvirt

2017-07-25 Thread Ian Jackson
Anthony PERARD writes ("[OSSTEST PATCH v13 21/24] Create a flight to test OpenStack with xen-unstable and libvirt"): > This patch creates a flight "openstack*", with those jobs: Do you mean it creates a "branch" ? But I don't think it does. I predict no changes to the output of mg-list-all-bran

Re: [Xen-devel] Duplicated memory node in the Device-Tree (WAS [XEN] Re: Duplicated memory nodes cause the BUG())

2017-07-25 Thread Stefano Stabellini
On Tue, 25 Jul 2017, Julien Grall wrote: > On 25/07/17 18:52, Stefano Stabellini wrote: > > On Tue, 25 Jul 2017, Andrii Anisov wrote: > > > Hello Andrew, > > > > > > > > > On 25.07.17 19:23, Andrew Cooper wrote: > > > > As a general rule, Xen needs to be able to tolerate and cope with any > > > >

Re: [Xen-devel] QEMU commit 04bf2526ce breaks use of xen-mapcache

2017-07-25 Thread Stefano Stabellini
On Tue, 25 Jul 2017, Paolo Bonzini wrote: > > Hi, > > > > Commits 04bf2526ce (exec: use qemu_ram_ptr_length to access guest ram) > > start using qemu_ram_ptr_length() instead of qemu_map_ram_ptr(). > > That result in calling xen_map_cache() with lock=true, but this mapping > > is never invalidated

Re: [Xen-devel] Duplicated memory node in the Device-Tree (WAS [XEN] Re: Duplicated memory nodes cause the BUG())

2017-07-25 Thread Julien Grall
On 25/07/17 18:52, Stefano Stabellini wrote: On Tue, 25 Jul 2017, Andrii Anisov wrote: Hello Andrew, On 25.07.17 19:23, Andrew Cooper wrote: As a general rule, Xen needs to be able to tolerate and cope with any quantity of crap described by the firmware. On the x86 side, we have large quan

Re: [Xen-devel] [OSSTEST PATCH v13 19/24] TestSupport: Implement target_subunit_cmd a subunit stream parser into substeps

2017-07-25 Thread Ian Jackson
Anthony PERARD writes ("[OSSTEST PATCH v13 19/24] TestSupport: Implement target_subunit_cmd a subunit stream parser into substeps"): > target_subunit_cmd can be used like target_cmd, but the command would > needs to output a subunit v1 stream, which will be parsed and turned > into osstest substep

Re: [Xen-devel] Duplicated memory node in the Device-Tree (WAS [XEN] Re: Duplicated memory nodes cause the BUG())

2017-07-25 Thread Stefano Stabellini
On Tue, 25 Jul 2017, Andrii Anisov wrote: > Hello Andrew, > > > On 25.07.17 19:23, Andrew Cooper wrote: > > As a general rule, Xen needs to be able to tolerate and cope with any > > quantity of crap described by the firmware. On the x86 side, we have > > large quantities of workarounds for buggy

Re: [Xen-devel] QEMU commit 04bf2526ce breaks use of xen-mapcache

2017-07-25 Thread Paolo Bonzini
> Hi, > > Commits 04bf2526ce (exec: use qemu_ram_ptr_length to access guest ram) > start using qemu_ram_ptr_length() instead of qemu_map_ram_ptr(). > That result in calling xen_map_cache() with lock=true, but this mapping > is never invalidated. > So QEMU use more and more RAM until it stop workin

Re: [Xen-devel] [Bug] Intel RMRR support with upstream Qemu

2017-07-25 Thread Andrew Cooper
On 25/07/17 17:40, Alexey G wrote: > On Mon, 24 Jul 2017 21:39:08 +0100 > Igor Druzhinin wrote: >>> But, the problem is that overall MMIO hole(s) requirements are not known >>> exactly at the time the HVM domain being created. Some PCI devices will >>> be emulated, some will be merely passed throu

Re: [Xen-devel] [PATCH 22/25 v6] xen/arm: vpl011: Add support for vuart console in xenconsole

2017-07-25 Thread Stefano Stabellini
Hi Bhupinder, Thanks for trying, and I would have done the same thing as you did: ifeq ($(CONFIG_SBSA_VUART_CONSOLE),y) CONFIG_VUART_CONSOLE := y endif However, we don't want to introduce a dependency between "make tools" and "make xen", meaning that one should be able to do "make tools" success

Re: [Xen-devel] [OSSTEST PATCH v13 10/24] ts-openstack-deploy: Increase open fd limit for RabbitMQ

2017-07-25 Thread Ian Jackson
Anthony PERARD writes ("[OSSTEST PATCH v13 10/24] ts-openstack-deploy: Increase open fd limit for RabbitMQ"): > Signed-off-by: Anthony PERARD Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-25 Thread Razvan Cojocaru
On 07/18/2017 01:20 PM, Razvan Cojocaru wrote: > On 07/18/2017 01:09 PM, Andrew Cooper wrote: >> On 18/07/17 10:37, Petre Pircalabu wrote: >>> If case of a vm_event with the emulate_flags set, if the instruction >>> cannot be emulated, the monitor should be notified instead of directly >>> injectin

Re: [Xen-devel] [PATCH 22/25 v6] xen/arm: vpl011: Add support for vuart console in xenconsole

2017-07-25 Thread Stefano Stabellini
On Tue, 25 Jul 2017, Julien Grall wrote: > Hi Stefano, > > On 07/21/2017 08:44 PM, Stefano Stabellini wrote: > > On Fri, 21 Jul 2017, Julien Grall wrote: > > > Hi, > > > > > > On 18/07/17 21:07, Stefano Stabellini wrote: > > > > On Mon, 17 Jul 2017, Bhupinder Thakur wrote: > > > > > This patch fi

Re: [Xen-devel] [PATCH 04/25 v6] xen/arm: vpl011: Add support for vuart in libxl

2017-07-25 Thread Bhupinder Thakur
Hi, On 18 July 2017 at 17:00, Wei Liu wrote: > CC x86 maintainers > > On Tue, Jul 18, 2017 at 12:19:19PM +0100, Julien Grall wrote: >> > >> > ("arch_arm", Struct(None, [("gic_version", libxl_gic_version), >> > + ("vuart", libxl_vuart_type), >> >> ... here it is

Re: [Xen-devel] [PATCH 3/7] xen: credit2: soft-affinity awareness in fallback_cpu()

2017-07-25 Thread Dario Faggioli
On Tue, 2017-07-25 at 17:52 +0100, George Dunlap wrote: > On 07/25/2017 05:47 PM, Dario Faggioli wrote: > > > > All that being said, it probably would be good to add a performance > > counter, and try to get a sense of how frequently we actually end > > up in > > this function as a fallback. > >

Re: [Xen-devel] [PATCH 1/4] xen: credit2: implement utilization cap

2017-07-25 Thread Dario Faggioli
On Tue, 2017-07-25 at 15:34 +0100, George Dunlap wrote: > On 06/29/2017 11:09 AM, Dario Faggioli wrote: > > E.g., if the vcpu is "greedy", and always tries to run, as soon as > > it > > has some budget, the difference between the two solution is _where_ > > we > > put the "sitting period". > > Sor

[Xen-devel] [PATCH v2 02/13] iommu: Add extra order argument to the IOMMU APIs and platform callbacks

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Replace existing single-page stuff (IOMMU APIs and platform callbacks) with the multi-page one followed by modifications of all related parts. These new map_pages/unmap_pages APIs do almost the same thing as old map_page/unmap_page ones except the formers have extra or

[Xen-devel] [PATCH v2 06/13] iommu: Add extra use_iommu argument to iommu_domain_init()

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The presence of this flag lets us know that the guest domain has statically assigned devices which will most likely be used for passthrough and as the result the IOMMU is expected to be used for this domain. Taking into the account this hint when dealing with non-share

[Xen-devel] [PATCH v2 13/13] [RFC] iommu: AMD-Vi: Squash map_pages/unmap_pages with map_page/unmap_page

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Reduce the scope of the TODO by squashing single-page stuff with multi-page one. Next target is to use large pages whenever possible in the case that hardware supports them. Signed-off-by: Oleksandr Tyshchenko CC: Jan Beulich CC: Suravee Suthikulpanit --- Change

[Xen-devel] [PATCH v2 04/13] xen/arm: p2m: Update IOMMU mapping whenever possible if page table is not shared

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Update IOMMU mapping if the IOMMU doesn't share page table with the CPU. The best place to do so on ARM is __p2m_set_entry(). Use mfn as an indicator of the required action. If mfn is valid call iommu_map_pages(), otherwise - iommu_unmap_pages(). Signed-off-by: Oleksan

[Xen-devel] [PATCH v2 05/13] iommu/arm: Re-define iommu_use_hap_pt(d) as iommu_hap_pt_share

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Not every integrated into ARM SoCs IOMMU can share page tables with the CPU and as the result the iommu_use_hap_pt(d) mustn't always be true. Reuse x86's iommu_hap_pt_share flag to indicate whether the IOMMU page table is shared or not. As P2M table must always be shar

[Xen-devel] [PATCH v2 09/13] xen/arm: Add use_iommu flag to xen_arch_domainconfig

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko This flag is intended to let Xen know that the guest has devices which will most likely be used for passthrough and as the result the IOMMU is expected to be used for this domain. The primary aim of this knowledge is to help the IOMMUs that don't share page tables with

[Xen-devel] [PATCH v2 03/13] xen/arm: p2m: Add helper to convert p2m type to IOMMU flags

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The helper has the same purpose as existing for x86 one. It is used for choosing IOMMU mapping attribute according to the memory type. Signed-off-by: Oleksandr Tyshchenko Reviewed-by: Julien Grall --- Changes in v1: - Add Julien's reviewed-by Changes in

[Xen-devel] [PATCH v2 08/13] iommu/arm: Misc fixes for arch specific part

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko 1. Add missing return in case if IOMMU ops have been already set. 2. Add check for shared IOMMU before returning an error. Signed-off-by: Oleksandr Tyshchenko CC: Julien Grall --- Changes in V1: - Changes in V2: - --- xen/drivers/passthrough/arm/

[Xen-devel] [PATCH v2 07/13] iommu: Make decision about needing IOMMU for hardware domains in advance

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The hardware domains require IOMMU to be used in the most cases and a decision to use it is made at hardware domain construction time. But, it is not the best moment for the non-shared IOMMUs due to the necessity of retrieving all mapping which could happen in a period

[Xen-devel] [PATCH v2 11/13] iommu/arm: smmu: Squash map_pages/unmap_pages with map_page/unmap_page

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Eliminate TODO by squashing single-page stuff with multi-page one. Signed-off-by: Oleksandr Tyshchenko CC: Julien Grall --- Changes in v1: - Changes in v2: - --- xen/drivers/passthrough/arm/smmu.c | 48 +- 1 fi

[Xen-devel] [PATCH v2 10/13] xen/arm: domain_build: Don't expose IOMMU specific properties to the guest

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko We don't passthrough IOMMU device to DOM0 even if it is not used by Xen. Therefore exposing the properties that describe relationship between master devices and IOMMUs does not make any sense. According to the: 1. Documentation/devicetree/bindings/iommu/iommu.txt 2. Do

[Xen-devel] [PATCH v2 01/13] xen/device-tree: Add dt_count_phandle_with_args helper

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Port Linux helper of_count_phandle_with_args for counting number of phandles in a property. Signed-off-by: Oleksandr Tyshchenko Reviewed-by: Julien Grall --- Changes in v1: - Add Julien's reviewed-by Changes in v2: - --- xen/common/device_tree.c

[Xen-devel] [PATCH v2 12/13] [RFC] iommu: VT-d: Squash map_pages/unmap_pages with map_page/unmap_page

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Reduce the scope of the TODO by squashing single-page stuff with multi-page one. Next target is to use large pages whenever possible in the case that hardware supports them. Signed-off-by: Oleksandr Tyshchenko CC: Jan Beulich CC: Kevin Tian --- Changes in v1:

[Xen-devel] [PATCH v2 00/13] "Non-shared" IOMMU support on ARM

2017-07-25 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Hi, all. The purpose of this patch series is to create a base for porting any "Non-shared" IOMMUs to Xen on ARM. Saying "Non-shared" IOMMU I mean the IOMMU that can't share the page table with the CPU. Primarily, we are interested in IPMMU-VMSA and I hope that it will

[Xen-devel] QEMU commit 04bf2526ce breaks use of xen-mapcache

2017-07-25 Thread Anthony PERARD
Hi, Commits 04bf2526ce (exec: use qemu_ram_ptr_length to access guest ram) start using qemu_ram_ptr_length() instead of qemu_map_ram_ptr(). That result in calling xen_map_cache() with lock=true, but this mapping is never invalidated. So QEMU use more and more RAM until it stop working for a reason

Re: [Xen-devel] [Bug] Intel RMRR support with upstream Qemu

2017-07-25 Thread Igor Druzhinin
On 25/07/17 17:40, Alexey G wrote: > On Mon, 24 Jul 2017 21:39:08 +0100 > Igor Druzhinin wrote: >>> But, the problem is that overall MMIO hole(s) requirements are not known >>> exactly at the time the HVM domain being created. Some PCI devices will >>> be emulated, some will be merely passed throu

Re: [Xen-devel] [PATCH 3/7] xen: credit2: soft-affinity awareness in fallback_cpu()

2017-07-25 Thread George Dunlap
On 07/25/2017 05:47 PM, Dario Faggioli wrote: > On Tue, 2017-07-25 at 17:17 +0100, George Dunlap wrote: >> On 07/25/2017 05:00 PM, Dario Faggioli wrote: >>> On Tue, 2017-07-25 at 11:19 +0100, George Dunlap wrote: >>> Mmm.. I think you're right. In fact, in a properly configured >>> system, >>>

Re: [Xen-devel] Duplicated memory node in the Device-Tree (WAS [XEN] Re: Duplicated memory nodes cause the BUG())

2017-07-25 Thread Andrii Anisov
Hello Andrew, On 25.07.17 19:23, Andrew Cooper wrote: As a general rule, Xen needs to be able to tolerate and cope with any quantity of crap described by the firmware. On the x86 side, we have large quantities of workarounds for buggy ACPI/MP/SMBIOS tables. That approach somehow covered with

Re: [Xen-devel] [Bug] Intel RMRR support with upstream Qemu

2017-07-25 Thread Alexey G
On Tue, 25 Jul 2017 15:13:17 +0100 Igor Druzhinin wrote: > >> The algorithm implemented in hvmloader for that is not complicated and > >> can be moved to libxl easily. What we can do is to provision a hole big > >> enough to include all the initially assigned PCI devices. We can also > >> account

Re: [Xen-devel] [PATCH 3/7] xen: credit2: soft-affinity awareness in fallback_cpu()

2017-07-25 Thread Dario Faggioli
On Tue, 2017-07-25 at 17:17 +0100, George Dunlap wrote: > On 07/25/2017 05:00 PM, Dario Faggioli wrote: > > On Tue, 2017-07-25 at 11:19 +0100, George Dunlap wrote: > > > > > Mmm.. I think you're right. In fact, in a properly configured > > system, > > we'll never go past step 3 (from the comment a

Re: [Xen-devel] [Bug] Intel RMRR support with upstream Qemu

2017-07-25 Thread Alexey G
On Mon, 24 Jul 2017 21:39:08 +0100 Igor Druzhinin wrote: > > But, the problem is that overall MMIO hole(s) requirements are not known > > exactly at the time the HVM domain being created. Some PCI devices will > > be emulated, some will be merely passed through and yet there will be > > some RMRR

Re: [Xen-devel] Android bring up over xen for Rcar-H3

2017-07-25 Thread Andrii Anisov
Dear George, On 19.07.17 12:42, George John wrote: I want to bring up Android over Xen as Dom0 on Rcar-H3 salvator x board. Can anybody please share the procedure to do so.?. Once you have an Android for Salvator-X board, the procedure is not really specific. You have to have the ATF running u-

Re: [Xen-devel] Duplicated memory node in the Device-Tree (WAS [XEN] Re: Duplicated memory nodes cause the BUG())

2017-07-25 Thread Andrew Cooper
On 25/07/17 17:02, Andrii Anisov wrote: > Hello Julien, > > > On 25.07.17 18:44, Julien Grall wrote: >> I have seen work on this board for the past year and it is the first >> time I have seen a complain about memory overlap. So why this sudden >> change? > It just an approach change. I'm cleaning

Re: [Xen-devel] Duplicated memory node in the Device-Tree (WAS [XEN] Re: Duplicated memory nodes cause the BUG())

2017-07-25 Thread Mark Rutland
On Tue, Jul 25, 2017 at 06:27:31PM +0300, Andrii Anisov wrote: > On 25.07.17 17:23, Julien Grall wrote: > >I think this is by chance rather than by design. The first > >question to answer is why a Firmware would specify twice the same > >memory banks? Is it valid from the specification? > Yep, that

Re: [Xen-devel] [PATCH 3/7] xen: credit2: soft-affinity awareness in fallback_cpu()

2017-07-25 Thread George Dunlap
On 07/25/2017 05:00 PM, Dario Faggioli wrote: > On Tue, 2017-07-25 at 11:19 +0100, George Dunlap wrote: >> On 06/16/2017 03:13 PM, Dario Faggioli wrote: >>> >>> diff --git a/xen/common/sched_credit2.c >>> b/xen/common/sched_credit2.c >>> index c749d4e..54f6e21 100644 >>> --- a/xen/common/sched_cred

Re: [Xen-devel] [PATCH] x86/pagewalk: Remove opt_allow_superpage check from guest_can_use_l2_superpages()

2017-07-25 Thread Andrew Cooper
On 25/07/17 16:27, Tim Deegan wrote: > At 16:00 +0100 on 25 Jul (1500998413), Andrew Cooper wrote: >> The purpose of guest_walk_tables() is to match the behaviour of real >> hardware. >> >> A PV guest can have 2M superpages in its pagetables, via the M2P and the >> initial initrd mapping, even if

Re: [Xen-devel] [PATCH 4/5] xen: sched_null: add some tracing

2017-07-25 Thread Dario Faggioli
On Tue, 2017-07-25 at 16:15 +0100, George Dunlap wrote: > On Thu, Jun 29, 2017 at 1:56 PM, Dario Faggioli > wrote: > > In line with what is there in all the other schedulers. > > > > Signed-off-by: Dario Faggioli > > --- > > George Dunlap > > FYI forgot the 'CC:' for this and patch 5.  :-)   >

Re: [Xen-devel] [PATCH] x86/pagewalk: Remove opt_allow_superpage check from guest_can_use_l2_superpages()

2017-07-25 Thread Wei Liu
On Tue, Jul 25, 2017 at 04:27:00PM +0100, Tim Deegan wrote: > At 16:00 +0100 on 25 Jul (1500998413), Andrew Cooper wrote: > > The purpose of guest_walk_tables() is to match the behaviour of real > > hardware. > > > > A PV guest can have 2M superpages in its pagetables, via the M2P and the > > ini

Re: [Xen-devel] [PATCH] x86/pagewalk: Remove opt_allow_superpage check from guest_can_use_l2_superpages()

2017-07-25 Thread Wei Liu
On Tue, Jul 25, 2017 at 04:00:13PM +0100, Andrew Cooper wrote: > The purpose of guest_walk_tables() is to match the behaviour of real hardware. > > A PV guest can have 2M superpages in its pagetables, via the M2P and the > initial initrd mapping, even if it isn't permitted to create arbitrary 2M >

Re: [Xen-devel] [PATCH 1/4] xen: credit2: implement utilization cap

2017-07-25 Thread Dario Faggioli
On Tue, 2017-07-25 at 16:08 +0100, George Dunlap wrote: > On 06/08/2017 01:08 PM, Dario Faggioli wrote: > > > Hmm, this needs to be rebased on the structure layout patches I > checked > in last week. :-) > Indeed it does. And of course, I'm up for it. :-) The soft-affinity series is likely to ge

Re: [Xen-devel] Duplicated memory node in the Device-Tree (WAS [XEN] Re: Duplicated memory nodes cause the BUG())

2017-07-25 Thread Andrii Anisov
Hello Julien, On 25.07.17 18:44, Julien Grall wrote: I have seen work on this board for the past year and it is the first time I have seen a complain about memory overlap. So why this sudden change? It just an approach change. I'm cleaning up nits for the board. Is that a comment from the v

Re: [Xen-devel] [PATCH 3/7] xen: credit2: soft-affinity awareness in fallback_cpu()

2017-07-25 Thread Dario Faggioli
On Tue, 2017-07-25 at 11:19 +0100, George Dunlap wrote: > On 06/16/2017 03:13 PM, Dario Faggioli wrote: > > > > diff --git a/xen/common/sched_credit2.c > > b/xen/common/sched_credit2.c > > index c749d4e..54f6e21 100644 > > --- a/xen/common/sched_credit2.c > > +++ b/xen/common/sched_credit2.c > > @

Re: [Xen-devel] [PATCH 3/5] xen: sched-null: support soft-affinity

2017-07-25 Thread George Dunlap
On Thu, Jun 29, 2017 at 1:56 PM, Dario Faggioli wrote: > The null scheduler does not really use hard-affinity for > scheduling, it uses it for 'placement', i.e., for deciding > to what pCPU to statically assign a vCPU. > > Let's use soft-affinity in the same way, of course with the > difference th

Re: [Xen-devel] Duplicated memory node in the Device-Tree (WAS [XEN] Re: Duplicated memory nodes cause the BUG())

2017-07-25 Thread Julien Grall
On 25/07/17 16:27, Andrii Anisov wrote: Hello Julien, Hi Andrii, On 25.07.17 17:23, Julien Grall wrote: I think this is by chance rather than by design. The first question to answer is why a Firmware would specify twice the same memory banks? Is it valid from the specification? Yep, that is

Re: [Xen-devel] [PATCH v7 20/20] osstest: save/retrieve the last successfully tested FreeBSD build

2017-07-25 Thread Roger Pau Monne
On Tue, Jul 25, 2017 at 04:18:52PM +0100, Ian Jackson wrote: > Roger Pau Monne writes ("[PATCH v7 20/20] osstest: save/retrieve the last > successfully tested FreeBSD build"): > > And use it in order to install the hosts for the next FreeBSD flight. > ... > > +case "$branch" in > > +freebsd-*) > >

Re: [Xen-devel] Duplicated memory node in the Device-Tree (WAS [XEN] Re: Duplicated memory nodes cause the BUG())

2017-07-25 Thread Andrii Anisov
Hello Julien, On 25.07.17 17:23, Julien Grall wrote: I think this is by chance rather than by design. The first question to answer is why a Firmware would specify twice the same memory banks? Is it valid from the specification? Yep, that is the question. Regardless that, it looks like to me

Re: [Xen-devel] [PATCH] x86/pagewalk: Remove opt_allow_superpage check from guest_can_use_l2_superpages()

2017-07-25 Thread Tim Deegan
At 16:00 +0100 on 25 Jul (1500998413), Andrew Cooper wrote: > The purpose of guest_walk_tables() is to match the behaviour of real hardware. > > A PV guest can have 2M superpages in its pagetables, via the M2P and the > initial initrd mapping, even if it isn't permitted to create arbitrary 2M > su

Re: [Xen-devel] [PATCH 2/5] xen: sched_null: check for pending tasklet work a bit earlier

2017-07-25 Thread George Dunlap
On Thu, Jun 29, 2017 at 1:56 PM, Dario Faggioli wrote: > Whether or not there's pending tasklet work to do, it's > something we know from the tasklet_work_scheduled parameter. > > Deal with that as soon as possible, like all other schedulers > do. > > Signed-off-by: Dario Faggioli Reviewed-by: G

Re: [Xen-devel] [PATCH v7 20/20] osstest: save/retrieve the last successfully tested FreeBSD build

2017-07-25 Thread Ian Jackson
Roger Pau Monne writes ("[PATCH v7 20/20] osstest: save/retrieve the last successfully tested FreeBSD build"): > And use it in order to install the hosts for the next FreeBSD flight. ... > +case "$branch" in > +freebsd-*) > +IFS=$'\n' That's quite brave, but I don't object. I would have pipe

  1   2   >