[Xen-devel] [ovmf baseline-only test] 72034: all pass

2017-08-28 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72034 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72034/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 51ce27fd8c583845480858eda503f38e8b42d619 baseline v

[Xen-devel] Unable to boot Dom0 on Hikey

2017-08-28 Thread Saeed Mirzamohammadi
Hi, I'm following instructions on https://wiki.xenproject.org/wiki/HiKey and https://github.com/Jeeppler/xen-note/blob/master/ arm64/hikey/hikey-xen-centos.md. I'm trying to boot Xen on Hikey but Dom0 doesn't boot after Xen! I can boot the linux individually with startup.sh. This works fine but w

[Xen-devel] [linux-linus test] 112910: tolerable trouble: blocked/broken/fail/pass - PUSHED

2017-08-28 Thread osstest service owner
flight 112910 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/112910/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail in 112900 pass in 112910 test-amd64-i386-xl

Re: [Xen-devel] [RFC PATCH 3/5] Tool/ACPI: DSDT extension to support more vcpus

2017-08-28 Thread Lan Tianyu
On 2017年08月25日 18:36, Roger Pau Monné wrote: > On Thu, Aug 24, 2017 at 10:52:18PM -0400, Lan Tianyu wrote: >> This patch is to change DSDT table for processor object to support >255 >> vcpus. > > The note in ACPI 6.1A spec section 5.2.12.12 contains the following: > > [Compatibility note] On som

Re: [Xen-devel] [RFC PATCH 3/5] Tool/ACPI: DSDT extension to support more vcpus

2017-08-28 Thread Lan Tianyu
On 2017年08月25日 20:01, Jan Beulich wrote: On 25.08.17 at 12:36, wrote: >> On Thu, Aug 24, 2017 at 10:52:18PM -0400, Lan Tianyu wrote: >>> This patch is to change DSDT table for processor object to support >255 >> vcpus. >> >> The note in ACPI 6.1A spec section 5.2.12.12 contains the following

[Xen-devel] [ovmf test] 112911: all pass - PUSHED

2017-08-28 Thread osstest service owner
flight 112911 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112911/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 51ce27fd8c583845480858eda503f38e8b42d619 baseline version: ovmf ef5e0db22cdd73e9727af

Re: [Xen-devel] [RFC PATCH 0/5] Extend resources to support more vcpus in single VM

2017-08-28 Thread Lan Tianyu
On 2017年08月25日 22:10, Meng Xu wrote: > Hi Tianyu, > > On Thu, Aug 24, 2017 at 10:52 PM, Lan Tianyu wrote: >> >> This patchset is to extend some resources(i.e, event channel, >> hap and so) to support more vcpus for single VM. >> >> >> Chao Gao (1): >> xl/libacpi: extend lapic_id() to uint32_t >

Re: [Xen-devel] [Qemu-devel] [PATCH 4/5] pci: Add INTERFACE_LEGACY_PCI_DEVICE to legacy PCI devices

2017-08-28 Thread Eduardo Habkost
On Mon, Aug 28, 2017 at 06:58:37PM -0400, John Snow wrote: > > > On 08/25/2017 03:39 PM, Eduardo Habkost wrote: > > CCing maintainers of affected devices (sorry for not CCing you > > before). > > > > On Wed, Aug 23, 2017 at 07:14:44PM -0300, Eduardo Habkost wrote: > >> Add INTERFACE_LEGACY_PCI_D

[Xen-devel] [xen-4.7-testing test] 112909: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread osstest service owner
flight 112909 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/112909/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-2 48 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 112851 test-xtf-amd64-

Re: [Xen-devel] [RFC PATCH 4/5] hvmload: Add x2apic entry support in the MADT build

2017-08-28 Thread Lan Tianyu
On 2017年08月25日 18:11, Roger Pau Monné wrote: > On Thu, Aug 24, 2017 at 10:52:19PM -0400, Lan Tianyu wrote: >> This patch is to add x2apic entry support for ACPI MADT table. >> >> Signed-off-by: Lan Tianyu >> Signed-off-by: Chao Gao >> --- >> tools/libacpi/acpi2_0.h | 10 >> tools/libacp

[Xen-devel] [xen-4.8-testing test] 112908: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread osstest service owner
flight 112908 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/112908/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-4 48 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 112871 test-amd64-i386

Re: [Xen-devel] [Qemu-devel] [PATCH 4/5] pci: Add INTERFACE_LEGACY_PCI_DEVICE to legacy PCI devices

2017-08-28 Thread John Snow
On 08/25/2017 03:39 PM, Eduardo Habkost wrote: > CCing maintainers of affected devices (sorry for not CCing you > before). > > On Wed, Aug 23, 2017 at 07:14:44PM -0300, Eduardo Habkost wrote: >> Add INTERFACE_LEGACY_PCI_DEVICE to all direct subtypes of >> TYPE_PCI_DEVICE, except: >> >> 1) The on

[Xen-devel] [xen-4.9-testing test] 112907: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread osstest service owner
flight 112907 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/112907/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64 16 guest-localmigrate/x10 fail REGR. vs. 112872 test

Re: [Xen-devel] [RFC 6/6] acpi:arm64: Add support for parsing IORT table

2017-08-28 Thread Goel, Sameer
On 6/12/2017 7:24 AM, Julien Grall wrote: > Hi Sameer, > > On 08/06/17 20:30, Sameer Goel wrote: >> Add limited support for parsing IORT table to initialize SMMU devices. > > It would be nice to explain what you actually support in the commit message. > > [...] > >> >>  #define IORT_TYPE_MASK

Re: [Xen-devel] [RFC 6/6] acpi:arm64: Add support for parsing IORT table

2017-08-28 Thread Goel, Sameer
On 6/9/2017 5:15 AM, Robin Murphy wrote: > On 08/06/17 20:30, Sameer Goel wrote: > [...] >> /** >> - * iort_iommu_configure - Set-up IOMMU configuration for a device. >> + * iort_iommu_configure - Set-up IOMMU configuration for a device. This >> + * function sets up the fwspec as needed for a gi

Re: [Xen-devel] [RFC 2/6] arm64: Add definitions for fwnode_handle

2017-08-28 Thread Goel, Sameer
On 6/12/2017 6:40 AM, Julien Grall wrote: > Hi, > > On 08/06/17 22:57, Stefano Stabellini wrote: >> On Thu, 8 Jun 2017, Goel, Sameer wrote: > diff --git a/xen/include/xen/fwnode.h b/xen/include/xen/fwnode.h > new file mode 100644 > index 000..db65b15 > --- /dev/null > +++

Re: [Xen-devel] [RFC 2/6] arm64: Add definitions for fwnode_handle

2017-08-28 Thread Goel, Sameer
On 6/12/2017 6:51 AM, Julien Grall wrote: > Hi Sameer, > > On 08/06/17 22:42, Goel, Sameer wrote: >> On 6/8/2017 1:59 PM, Julien Grall wrote: >>> >>> >>> On 08/06/2017 20:30, Sameer Goel wrote: This will be used as a device property to match the DMA capable devices with the associated

Re: [Xen-devel] [RFC 3/6] Introduce _xrealloc

2017-08-28 Thread Goel, Sameer
On 6/9/2017 3:44 AM, Wei Liu wrote: > On Thu, Jun 08, 2017 at 08:49:01PM +0100, Julien Grall wrote: >> CC the REST maintainers >> >> On 08/06/2017 20:30, Sameer Goel wrote: >>> Introduce a memory realloc function. >>> >>> Signed-off-by: Sameer Goel >>> --- >>> xen/common/xmalloc_tlsf.c | 13 +++

[Xen-devel] [linux-next test] 112906: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread osstest service owner
flight 112906 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/112906/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64 7 xen-boot fail REGR. vs. 112853 test-amd64-i386-xl-q

Re: [Xen-devel] [PATCH v2] x86/apic/x2apic: Share IRQ vector between cluster members only when no cpumask is specified

2017-08-28 Thread Boris Ostrovsky
On 08/28/2017 11:41 AM, Jan Beulich wrote: On 28.08.17 at 16:35, wrote: >> On 08/28/2017 03:38 AM, Jan Beulich wrote: > And finally I continue to be not really happy about the change as > a whole. Despite what was discussed on v1, I'm concerned of the > effects of this on hosts _n

[Xen-devel] [PATCH 2/4] mm: Don't poison a page if boot-time scrubbing is off

2017-08-28 Thread Boris Ostrovsky
If boot-time scrubbing is turned off we don't check pages in check_one_page(). Thus there is no reason to ever poison them. Signed-off-by: Boris Ostrovsky --- xen/common/page_alloc.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c index 7d

[Xen-devel] [PATCH 4/4] mm: Don't hold heap lock in alloc_heap_pages() longer than necessary

2017-08-28 Thread Boris Ostrovsky
Once pages are removed from the heap we don't need to hold the heap lock. It is especially useful to drop it for an unscrubbed buddy since we will be scrubbing it. Signed-off-by: Boris Ostrovsky --- xen/common/page_alloc.c | 7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a

[Xen-devel] [PATCH 1/4] mm: Initialize lowmem virq when boot-time scrubbing is disabled

2017-08-28 Thread Boris Ostrovsky
scrub_heap_pages() does early return if boot-time scrubbing is disabled, neglecting to initialize lowmem VIRQ. Signed-off-by: Boris Ostrovsky --- xen/common/page_alloc.c | 12 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/xen/common/page_alloc.c b/xen/common/page_all

[Xen-devel] [PATCH 3/4] mm: Don't request scrubbing until dom0 is running

2017-08-28 Thread Boris Ostrovsky
There is no need to scrub pages freed during dom0 construction since heap will be scrubbed once dom0 is ready (by scrub_heap_pages()). Since boot_scrub_done will not be set if boot-time scrubbing is off we also check for domain state. Signed-off-by: Boris Ostrovsky --- xen/common/page_alloc.c |

[Xen-devel] [PATCH 0/4] Scrubbing updates

2017-08-28 Thread Boris Ostrovsky
First patch fixes a long-standing bug where a low memory monitor is not initializes if boottime scrubbing is turned off. The other threee patches are performace optimizations. Boris Ostrovsky (4): mm: Initialize lowmem virq when boot-time scrubbing is disabled mm: Don't poison a page if boot-

Re: [Xen-devel] [PATCH v4 05/11] arm: add SMCCC protocol definitions.

2017-08-28 Thread Volodymyr Babchuk
Hi Julien, On 24.08.17 18:00, Julien Grall wrote: Hi Volodymyr, Title: No need for the full stop. On 21/08/17 21:27, Volodymyr Babchuk wrote: This patch adds generic definitions used in ARM SMC call convention. Those definitions was taken from linux header arm-smccc.h, extended and formatted

[Xen-devel] [GIT PULL] (xen) stable/for-jens-4.13.. for 4.13-rc7 or 4.14-rc1 if you would like

2017-08-28 Thread Konrad Rzeszutek Wilk
Hey Jens, Please git pull the following branch: git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git stable/for-jens-4.13 .. which as a bug-fix when shutting down xen block backend driver with multiple queues and the driver not clearing all of them. Thank you! If you pull it in your

[Xen-devel] [xen-unstable-smoke test] 112912: tolerable trouble: broken/pass - PUSHED

2017-08-28 Thread osstest service owner
flight 112912 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112912/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64-pvops 2 hos

Re: [Xen-devel] [PATCH 1/2] Fix util/grub.d/20_linux_xen.in: Add xen_boot command support for aarch64

2017-08-28 Thread Konrad Rzeszutek Wilk
On Mon, Aug 28, 2017 at 02:40:14PM -0400, Konrad Rzeszutek Wilk wrote: > Commit d33045ce7ffcb7c1e4a60c14d5ca64b36e3c5abe introduced > the support for this, but it does not work under x86 (as it stops > 20_linux_xen from running). > > The 20_linux_xen is run under a shell and any exits from within

[Xen-devel] [PATCH 1/2] Fix util/grub.d/20_linux_xen.in: Add xen_boot command support for aarch64

2017-08-28 Thread Konrad Rzeszutek Wilk
Commit d33045ce7ffcb7c1e4a60c14d5ca64b36e3c5abe introduced the support for this, but it does not work under x86 (as it stops 20_linux_xen from running). The 20_linux_xen is run under a shell and any exits from within it: (For example on x86): + /usr/bin/grub2-file --is-arm64-efi /boot/xen-4.9.0.g

[Xen-devel] [PATCH 2/2] Use grub-file to figure out whether multiboot2 should be used for Xen.gz

2017-08-28 Thread Konrad Rzeszutek Wilk
The multiboot2 is much more preferable than multiboot. Especiall if booting under EFI where multiboot does not have the functionality to pass ImageHandler. Signed-off-by: Konrad Rzeszutek Wilk --- v2: Rebase on top of d33045ce7ffcb7c1e4a60c14d5ca64b36e3c5abe --- util/grub.d/20_linux_xen.in | 4

[Xen-devel] [PATCH] Fix ARM multiboot2 breaking Fedora.

2017-08-28 Thread Konrad Rzeszutek Wilk
Hey, The first patch: [PATCH 1/2] Fix util/grub.d/20_linux_xen.in: Add xen_boot command is a fix discovered on Fedora rawhide where I was surprised to see that grub2-mkconfig would not create a configuration file anymore. See https://bugzilla.redhat.com/show_bug.cgi?id=1486002 for details. The

Re: [Xen-devel] [PATCH v2 2/6] xen: credit2: soft-affinity awareness in gat_fallback_cpu()

2017-08-28 Thread Dario Faggioli
Il 28 Ago 2017 16:49, George Dunlap ha scritto: On 07/27/2017 01:05 PM, Dario Faggioli wrote: > By, basically, moving all the logic of the function > inside the usual two steps (soft-affinity step and > hard-affinity step) loop. > > While there, add two performance counters (in cpu_pick > and in g

[Xen-devel] [linux-3.18 test] 112904: trouble: blocked/broken/fail/pass

2017-08-28 Thread osstest service owner
flight 112904 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/112904/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvops 3 capture-logs broken REGR. vs. 112102

[Xen-devel] [PATCH] xen/build: Nuke include/{config, generated} during clean

2017-08-28 Thread Andrew Cooper
Otherwise a stale generated Kconfig may still be used after a tree-wide clean. Signed-off-by: Andrew Cooper --- CC: George Dunlap CC: Ian Jackson CC: Jan Beulich CC: Konrad Rzeszutek Wilk CC: Stefano Stabellini CC: Tim Deegan CC: Wei Liu --- xen/include/Makefile | 2 +- 1 file changed, 1

[Xen-devel] [xen-unstable test] 112902: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread osstest service owner
flight 112902 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/112902/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-win7-amd64 18 guest-start/win.repeat fail REGR. vs. 112809 test-amd64-

Re: [Xen-devel] [PATCH v2 1/6] xen/tools: credit2: soft-affinity awareness in runq_tickle()

2017-08-28 Thread Dario Faggioli
Il 28 Ago 2017 16:40, George Dunlap ha scritto: On 07/27/2017 01:05 PM, Dario Faggioli wrote: > Soft-affinity support is usually implemented by means > of a two step "balancing loop", where: > - during the first step, we consider soft-affinity > (if the vcpu has one); > - during the second (if w

[Xen-devel] [PATCH v1 0/2] Misc fixes regarding releasing resources on ARM

2017-08-28 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Oleksandr Tyshchenko (2): xen/arm: vgic: Check for vgic handler to be initialized before dereferencing it xen/arm: p2m: Check for p2m->domain to be initialized before releasing resources xen/arch/arm/p2m.c | 13 - xen/arch/arm/vgic.c | 3 ++-

[Xen-devel] [PATCH v1 1/2] xen/arm: vgic: Check for vgic handler to be initialized before dereferencing it

2017-08-28 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Since domain_vgic_free() can be called when the vgic_ops haven't been initialised yet, always check that d->arch.vgic.handler is not a null. Signed-off-by: Oleksandr Tyshchenko --- xen/arch/arm/vgic.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --gi

[Xen-devel] [PATCH v1 2/2] xen/arm: p2m: Check for p2m->domain to be initialized before releasing resources

2017-08-28 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Since p2m_teardown() can be called when p2m_init() haven't executed yet we might deal with unitialized list "p2m->pages" which leads to crash. To avoid this use back pointer to domain as end-of-initialization indicator. Signed-off-by: Oleksandr Tyshchenko --- xen/arc

Re: [Xen-devel] [RFC PATCH v1 2/7] iommu/arm: ipmmu-vmsa: Add Xen changes for main driver

2017-08-28 Thread Oleksandr Tyshchenko
Hi, Stefano, Julien. On Fri, Aug 25, 2017 at 11:06 PM, Stefano Stabellini wrote: > On Wed, 23 Aug 2017, Julien Grall wrote: >> Hi Oleksandr, >> >> On 21/08/17 16:53, Oleksandr Tyshchenko wrote: >> > On Thu, Aug 10, 2017 at 6:13 PM, Julien Grall wrote: >> > > On 10/08/17 15:27, Oleksandr Tyshchen

Re: [Xen-devel] [PATCH] libxl/arm: Fix build on arm64 + acpi

2017-08-28 Thread Wei Liu
On Fri, Aug 25, 2017 at 05:35:47PM -0400, Daniel Sabogal wrote: > With musl, the build fails with the following errors: > > actypes.h:202:2: error: #error unknown ACPI_MACHINE_WIDTH >#error unknown ACPI_MACHINE_WIDTH > ^ > actypes.h:207:9: error: unknown type name ‘acpi_native_uint

Re: [Xen-devel] [PATCH RFC 00/12] Nested p2m: allow sharing between vCPUs

2017-08-28 Thread George Dunlap
On 07/18/2017 11:34 AM, Sergey Dyasli wrote: > Nested p2m (shadow EPT) is an object that stores memory address > translations from L2 GPA directly to L0 HPA. This is achieved by > combining together L1 EPT tables with L0 EPT during L2 EPT violations. > > In the usual case, L1 uses the same EPTP va

Re: [Xen-devel] [PATCH RFC 10/12] x86/np2m: implement sharing of np2m between vCPUs

2017-08-28 Thread George Dunlap
On 07/18/2017 11:34 AM, Sergey Dyasli wrote: > Modify p2m_get_nestedp2m() to allow sharing a np2m between multiple > vcpus with the same np2m_base (L1 EPTP value in VMCS12). > > np2m_schedule_in/out() callbacks are added to context_switch() as well > as pseudo schedule-out is performed during virt

Re: [Xen-devel] [PATCH 06/27 v8] xen/arm: vpl011: Add a new domctl API to initialize vpl011

2017-08-28 Thread Wei Liu
On Mon, Aug 28, 2017 at 02:25:49PM +0530, Bhupinder Thakur wrote: > Add a new domctl API to initialize vpl011. It takes the GFN and console > backend domid as input and returns an event channel to be used for > sending and receiving events from Xen. > > Xen will communicate with xenconsole using G

Re: [Xen-devel] [PATCH 21/27 v8] xen/arm: vpl011: Add support for multiple consoles in xenconsole

2017-08-28 Thread Wei Liu
On Mon, Aug 28, 2017 at 02:26:04PM +0530, Bhupinder Thakur wrote: > This patch adds the support for multiple consoles and introduces the > iterator functions to operate on multiple consoles. > > The functions called by the iterators check that they are operating > on valid I/O parameters. This ens

Re: [Xen-devel] [PATCH RFC 07/12] x86/np2m: add np2m_schedule_in/out()

2017-08-28 Thread George Dunlap
On 07/18/2017 11:34 AM, Sergey Dyasli wrote: > np2m maintenance is required for a nested vcpu during scheduling: > > 1. On schedule-out: clear pCPU's bit in p2m->dirty_cpumask > to prevent useless IPIs. > > 2. On schedule-in: check if np2m is up to date and wasn't

Re: [Xen-devel] [PATCH 11/27 v8] xen/arm: vpl011: Add a new console_init function in xenconsole

2017-08-28 Thread Wei Liu
On Mon, Aug 28, 2017 at 02:25:54PM +0530, Bhupinder Thakur wrote: > This patch introduces a new console_init function. This function > initializes the console structure. > > Signed-off-by: Bhupinder Thakur It appears that you forgot to collect my ack: Acked-by: Wei Liu ___

Re: [Xen-devel] [PATCH 06/27 v8] xen/arm: vpl011: Add a new domctl API to initialize vpl011

2017-08-28 Thread Wei Liu
On Mon, Aug 28, 2017 at 02:25:49PM +0530, Bhupinder Thakur wrote: > Add a new domctl API to initialize vpl011. It takes the GFN and console > backend domid as input and returns an event channel to be used for > sending and receiving events from Xen. > > Xen will communicate with xenconsole using G

Re: [Xen-devel] [PATCH RFC 06/12] x86/vvmx: add stale_eptp flag

2017-08-28 Thread George Dunlap
On 07/18/2017 11:34 AM, Sergey Dyasli wrote: > The new variable will indicate if update of a shadow EPTP is needed *element > prior to vmentry. Update is required if a nested vcpu gets a new np2m > or if its np2m was flushed by an IPI. > > Helper function nvcpu_flush() is added. Passive voice i

Re: [Xen-devel] [PATCH RFC 05/12] x86/np2m: add np2m_generation

2017-08-28 Thread George Dunlap
On 07/18/2017 11:34 AM, Sergey Dyasli wrote: > Add np2m_generation variable to both p2m_domain and nestedvcpu. s/variable/element; BTW still trying to get a feel for the whole series. Patches w/o comments (or with minor comments like this) look plausible but I won't know what I think of the whol

Re: [Xen-devel] [PATCH RFC 02/12] x86/np2m: add np2m_flush_eptp()

2017-08-28 Thread George Dunlap
On 07/18/2017 11:34 AM, Sergey Dyasli wrote: > The new function finds all np2m objects with the specified eptp and > flushes them. p2m_flush_table_locked() is added in order not to release > the p2m lock after np2m_base check. > > Signed-off-by: Sergey Dyasli This patch looks plausible except fo

Re: [Xen-devel] [PATCH] xen: fix boolean parameter handling

2017-08-28 Thread Andrew Cooper
On 28/08/17 16:02, Jan Beulich wrote: On 28.08.17 at 16:49, wrote: >> Commit 63e8a1e5ffa7a7fdbde887805f673fea7e8d2e94 ("xen: check parameter >> validity when parsing command line") introduced a bug for the case >> when a boolean parameter was specified by its keyword only (no value). >> It wo

Re: [Xen-devel] [PATCH v8] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-28 Thread Tamas K Lengyel
On Mon, Aug 28, 2017 at 7:29 AM, Jan Beulich wrote: On 28.08.17 at 14:51, wrote: >> --- a/xen/include/asm-arm/monitor.h >> +++ b/xen/include/asm-arm/monitor.h >> @@ -26,6 +26,12 @@ >> #include >> >> static inline >> +void arch_allow_userspace(struct domain *d, uint8_t allow_userspace) >>

Re: [Xen-devel] [PATCH v7] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-28 Thread Tamas K Lengyel
On Mon, Aug 28, 2017 at 5:10 AM, Jan Beulich wrote: On 28.08.17 at 11:38, wrote: >> In some introspection usecases, an in-guest agent needs to communicate >> with the external introspection agent. An existing mechanism is >> HVMOP_guest_request_vm_event, but this is restricted to kernel use

Re: [Xen-devel] [PATCH v7] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-28 Thread Tamas K Lengyel
> diff --git a/xen/common/monitor.c b/xen/common/monitor.c > index 451f42f..0c3e645 100644 > --- a/xen/common/monitor.c > +++ b/xen/common/monitor.c > @@ -75,6 +75,7 @@ int monitor_domctl(struct domain *d, struct > xen_domctl_monitor_op *mop) > domain_pause(d); > d->monitor.guest

Re: [Xen-devel] [PATCH v2] x86/apic/x2apic: Share IRQ vector between cluster members only when no cpumask is specified

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 16:35, wrote: > On 08/28/2017 03:38 AM, Jan Beulich wrote: >> And finally I continue to be not really happy about the change as a whole. Despite what was discussed on v1, I'm concerned of the effects of this on hosts _not_ suffering from vector shortage. Coul

Re: [Xen-devel] [PATCH v3] passthrough: give XEN_DOMCTL_test_assign_device more sane semantics (and 1 more message)

2017-08-28 Thread Wei Liu
On Mon, Aug 28, 2017 at 01:27:46AM -0600, Jan Beulich wrote: > >>> On 25.08.17 at 18:05, wrote: > > On Fri, Aug 25, 2017 at 09:54:18AM -0600, Jan Beulich wrote: > >> >>> On 25.08.17 at 17:25, wrote: > >> > On Wed, Aug 16, 2017 at 06:20:01AM -0600, Jan Beulich wrote: > >> >> So far callers of the

Re: [Xen-devel] [PATCH v7] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-28 Thread Wei Liu
On Mon, Aug 28, 2017 at 12:38:46PM +0300, Alexandru Isaila wrote: > In some introspection usecases, an in-guest agent needs to communicate > with the external introspection agent. An existing mechanism is > HVMOP_guest_request_vm_event, but this is restricted to kernel usecases > like all other hy

Re: [Xen-devel] [PATCH] x86/mm: Drop is_guest_l3_slot() and simply callers

2017-08-28 Thread Wei Liu
On Mon, Aug 28, 2017 at 03:50:59PM +0100, Andrew Cooper wrote: > With a 64bit hypervisor there are no conditional l3 slots, and this is > unlikely to change moving forwards. > > No functional change (as confirmed by diffing the disassembly. GCC obviously > already optimised this code away.) > >

Re: [Xen-devel] [xen-unstable test] 112855: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread Boris Ostrovsky
On 08/28/2017 10:52 AM, Jan Beulich wrote: On 28.08.17 at 16:24, wrote: As for periodically testing process_pending_softirqs() we may still want to do this in alloc_heap_pages(), even without CONFIG_SCRUB_DEBUG. >>> For my taste, alloc_heap_pages() is the wrong place for such >>> ca

Re: [Xen-devel] [PATCH v4] common/vm_event: Initialize vm_event lists on domain creation

2017-08-28 Thread Tamas K Lengyel
On Mon, Aug 28, 2017 at 4:54 AM, Alexandru Isaila wrote: > The patch splits the vm_event into three structures:vm_event_share, > vm_event_paging, vm_event_monitor. The allocation for the > structure is moved to vm_event_enable so that it can be > allocated/init when needed and freed in vm_event_di

Re: [Xen-devel] [PATCH v3 02/21] x86/mm: carve out replace_grant_pv_mapping

2017-08-28 Thread George Dunlap
On 07/20/2017 05:04 PM, Wei Liu wrote: > And at once make it an inline function. Add declarations of at the same time Other than that: Acked-by: George Dunlap > replace_grant_{hvm,pv}_mapping to respective header files. > > The code movement will be done later. > > Signed-off-by: Wei Liu >

Re: [Xen-devel] [PATCH v3 01/21] x86/mm: carve out create_grant_pv_mapping

2017-08-28 Thread George Dunlap
On 07/20/2017 05:04 PM, Wei Liu wrote: > And at once make create_grant_host_mapping an inline function. This "At once" means "immediately" or "without any delay between this event and the preceding event", which doesn't make sense here. I think you want, "At the same time." Other than that, loo

Re: [Xen-devel] [PATCH v2 REPOST 11/12] x86/hvm/ioreq: defer mapping gfns until they are actually requsted

2017-08-28 Thread Wei Liu
On Tue, Aug 22, 2017 at 03:51:05PM +0100, Paul Durrant wrote: [...] > diff --git a/tools/libs/devicemodel/include/xendevicemodel.h > b/tools/libs/devicemodel/include/xendevicemodel.h > index 13216db04a..da6b253cfd 100644 > --- a/tools/libs/devicemodel/include/xendevicemodel.h > +++ b/tools/libs/de

Re: [Xen-devel] [PATCH] x86/mm: Drop is_guest_l3_slot() and simply callers

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 16:50, wrote: > With a 64bit hypervisor there are no conditional l3 slots, and this is > unlikely to change moving forwards. > > No functional change (as confirmed by diffing the disassembly. GCC obviously > already optimised this code away.) > > Signed-off-by: Andrew Cooper

Re: [Xen-devel] [PATCH v2 REPOST 05/12] tools/libxenctrl: use new xenforeignmemory API to seed grant table

2017-08-28 Thread Wei Liu
On Thu, Aug 24, 2017 at 05:09:35PM +0100, Paul Durrant wrote: > > > > Could be written as: > > > > return (is_hvm ? compat_gnttab_hvm_seed : compat_gnttab_seed) > >(xch, guest_domid, console_gmfn, xenstore_gmfn, console_domid, > > xenstore_domid); > > Is that preferable? > I do

Re: [Xen-devel] [PATCH] xen: fix boolean parameter handling

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 16:49, wrote: > Commit 63e8a1e5ffa7a7fdbde887805f673fea7e8d2e94 ("xen: check parameter > validity when parsing command line") introduced a bug for the case > when a boolean parameter was specified by its keyword only (no value). > It would set just the wrong boolean value for th

Re: [Xen-devel] [PATCH v2 REPOST 06/12] x86/hvm/ioreq: rename .*pfn and .*gmfn to .*gfn

2017-08-28 Thread Wei Liu
On Tue, Aug 22, 2017 at 03:51:00PM +0100, Paul Durrant wrote: > Since IOREQ servers are only relevant to HVM guests and all the names in > question unequivocally refer to guest frame numbers, name them all .*gfn > to avoid any confusion. > > This patch is purely cosmetic. No semantic or functional

Re: [Xen-devel] [PATCH v2 REPOST 03/12] x86/mm: add HYPERVISOR_memory_op to acquire guest resources

2017-08-28 Thread Wei Liu
On Tue, Aug 22, 2017 at 03:50:57PM +0100, Paul Durrant wrote: > + > +/* > + * Get the pages for a particular guest resource, so that they can be > + * mapped directly by a tools domain. > + */ > +#define XENMEM_acquire_resource 28 > +struct xen_mem_acquire_resource { > +/* IN - the domain whose

[Xen-devel] [ovmf baseline-only test] 72033: all pass

2017-08-28 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72033 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72033/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf ef5e0db22cdd73e9727afcaa5c7fe8e55b7b3671 baseline v

Re: [Xen-devel] [PATCH v2 4/6] xsm: flask: change the dummy xsm policy and flask hook for map_gmfn_foregin

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 16:24, wrote: > On 08/28/2017 09:29 AM, Jan Beulich wrote: > On 27.08.17 at 10:36, wrote: >>> --- a/xen/arch/arm/mm.c >>> +++ b/xen/arch/arm/mm.c >>> @@ -1284,7 +1284,7 @@ int xenmem_add_to_physmap_one( >>> return -EINVAL; >>> } >>> >>> -rc =

Re: [Xen-devel] [xen-unstable test] 112855: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 16:24, wrote: >>> As for periodically testing process_pending_softirqs() we may still want >>> to do this in alloc_heap_pages(), even without CONFIG_SCRUB_DEBUG. >> For my taste, alloc_heap_pages() is the wrong place for such >> calls. > > But the loop is in alloc_heap_pages()

[Xen-devel] [PATCH] x86/mm: Drop is_guest_l3_slot() and simply callers

2017-08-28 Thread Andrew Cooper
With a 64bit hypervisor there are no conditional l3 slots, and this is unlikely to change moving forwards. No functional change (as confirmed by diffing the disassembly. GCC obviously already optimised this code away.) Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu --- xen/arch

Re: [Xen-devel] [PATCH v2 2/6] xen: credit2: soft-affinity awareness in gat_fallback_cpu()

2017-08-28 Thread George Dunlap
On 07/27/2017 01:05 PM, Dario Faggioli wrote: > By, basically, moving all the logic of the function > inside the usual two steps (soft-affinity step and > hard-affinity step) loop. > > While there, add two performance counters (in cpu_pick > and in get_fallback_cpu() itself), in order to be able >

[Xen-devel] [PATCH] xen: fix boolean parameter handling

2017-08-28 Thread Juergen Gross
Commit 63e8a1e5ffa7a7fdbde887805f673fea7e8d2e94 ("xen: check parameter validity when parsing command line") introduced a bug for the case when a boolean parameter was specified by its keyword only (no value). It would set just the wrong boolean value for that parameter. Signed-off-by: Juergen Gros

Re: [Xen-devel] [PATCH v2 1/6] xen/tools: credit2: soft-affinity awareness in runq_tickle()

2017-08-28 Thread George Dunlap
On 07/27/2017 01:05 PM, Dario Faggioli wrote: > Soft-affinity support is usually implemented by means > of a two step "balancing loop", where: > - during the first step, we consider soft-affinity > (if the vcpu has one); > - during the second (if we get to it), we consider > hard-affinity. > >

Re: [Xen-devel] [PATCH v2 REPOST 02/12] x86/mm: allow a privileged PV domain to map guest mfns

2017-08-28 Thread Wei Liu
On Fri, Aug 25, 2017 at 11:05:54AM +0100, Paul Durrant wrote: > > -Original Message- > > From: Wei Liu [mailto:wei.l...@citrix.com] > > Sent: 24 August 2017 17:33 > > To: Paul Durrant > > Cc: xen-de...@lists.xenproject.org; Andrew Cooper > > ; Jan Beulich ; Wei Liu > > > > Subject: Re: [X

Re: [Xen-devel] [PATCH v2] x86/apic/x2apic: Share IRQ vector between cluster members only when no cpumask is specified

2017-08-28 Thread Boris Ostrovsky
On 08/28/2017 03:38 AM, Jan Beulich wrote: > >>> And finally I continue to be not really happy about the change as >>> a whole. Despite what was discussed on v1, I'm concerned of the >>> effects of this on hosts _not_ suffering from vector shortage. >>> Could you live with the new behavior requirin

Re: [Xen-devel] [xen-unstable test] 112855: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread Boris Ostrovsky
>> As for periodically testing process_pending_softirqs() we may still want >> to do this in alloc_heap_pages(), even without CONFIG_SCRUB_DEBUG. > For my taste, alloc_heap_pages() is the wrong place for such > calls. But the loop is in alloc_heap_pages() --- where else would you be testing? -bo

Re: [Xen-devel] [PATCH v2 4/6] xsm: flask: change the dummy xsm policy and flask hook for map_gmfn_foregin

2017-08-28 Thread George Dunlap
On 08/28/2017 09:29 AM, Jan Beulich wrote: On 27.08.17 at 10:36, wrote: >> --- a/xen/arch/arm/mm.c >> +++ b/xen/arch/arm/mm.c >> @@ -1284,7 +1284,7 @@ int xenmem_add_to_physmap_one( >> return -EINVAL; >> } >> >> -rc = xsm_map_gmfn_foreign(XSM_TARGET, d, od); >>

Re: [Xen-devel] [xen-unstable test] 112855: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 15:57, wrote: > On 08/28/2017 03:25 AM, Jan Beulich wrote: > On 25.08.17 at 19:14, wrote: >>> On 08/25/2017 09:40 AM, Jan Beulich wrote: >>> On 25.08.17 at 05:15, wrote: > flight 112855 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs

Re: [Xen-devel] [xen-unstable test] 112855: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread Boris Ostrovsky
On 08/28/2017 03:25 AM, Jan Beulich wrote: On 25.08.17 at 19:14, wrote: >> On 08/25/2017 09:40 AM, Jan Beulich wrote: >> On 25.08.17 at 05:15, wrote: flight 112855 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/112855/ Regressions :-(

Re: [Xen-devel] [PATCH v8] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 14:51, wrote: > --- a/xen/include/asm-arm/monitor.h > +++ b/xen/include/asm-arm/monitor.h > @@ -26,6 +26,12 @@ > #include > > static inline > +void arch_allow_userspace(struct domain *d, uint8_t allow_userspace) > +{ > +return; > +} I'm sorry for noticing this only now

[Xen-devel] [ovmf test] 112903: all pass - PUSHED

2017-08-28 Thread osstest service owner
flight 112903 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112903/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf ef5e0db22cdd73e9727afcaa5c7fe8e55b7b3671 baseline version: ovmf 714c2603018a99a514c42

[Xen-devel] [PATCH v8] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-28 Thread Alexandru Isaila
In some introspection usecases, an in-guest agent needs to communicate with the external introspection agent. An existing mechanism is HVMOP_guest_request_vm_event, but this is restricted to kernel usecases like all other hypercalls. Introduce a mechanism whereby the introspection agent can white

[Xen-devel] [xen-unstable-smoke test] 112905: tolerable trouble: broken/pass - PUSHED

2017-08-28 Thread osstest service owner
flight 112905 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112905/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64-pvops 2 hos

[Xen-devel] [linux-linus test] 112900: regressions - trouble: blocked/broken/fail/pass

2017-08-28 Thread osstest service owner
flight 112900 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/112900/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs. 112891 test-amd64-i

Re: [Xen-devel] [PATCH v2 4/6] xsm: flask: change the dummy xsm policy and flask hook for map_gmfn_foregin

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 13:01, wrote: > 2017-08-28 16:29 GMT+08:00 Jan Beulich : > On 27.08.17 at 10:36, wrote: >>> -static XSM_INLINE int xsm_map_gmfn_foreign(XSM_DEFAULT_ARG struct domain >>> *d, struct domain *t) >>> +static XSM_INLINE int xsm_map_gmfn_foreign(XSM_DEFAULT_ARG struct domain >>

Re: [Xen-devel] crashdump on PVM Dom0

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 12:45, wrote: > Oh!! I'm so sorry Jan Beulich. > It is my first time to use this mailing list. > Please understand my fault, this time only. > > Anyway, as you mentioned, I added below line in '/etc/default/grub' file > and reboot: >> GRUB_CMDLINE_XEN="crashkernel=384M-:256M@64

Re: [Xen-devel] [PATCH v7] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 11:38, wrote: > In some introspection usecases, an in-guest agent needs to communicate > with the external introspection agent. An existing mechanism is > HVMOP_guest_request_vm_event, but this is restricted to kernel usecases > like all other hypercalls. > > Introduce a mecha

Re: [Xen-devel] [PATCH v2 4/6] xsm: flask: change the dummy xsm policy and flask hook for map_gmfn_foregin

2017-08-28 Thread Zhongze Liu
Hi Jan, Thanks for having a look at the patch. 2017-08-28 16:29 GMT+08:00 Jan Beulich : On 27.08.17 at 10:36, wrote: >> --- a/xen/arch/arm/mm.c >> +++ b/xen/arch/arm/mm.c >> @@ -1284,7 +1284,7 @@ int xenmem_add_to_physmap_one( >> return -EINVAL; >> } >> >> -rc

[Xen-devel] [PATCH v4] common/vm_event: Initialize vm_event lists on domain creation

2017-08-28 Thread Alexandru Isaila
The patch splits the vm_event into three structures:vm_event_share, vm_event_paging, vm_event_monitor. The allocation for the structure is moved to vm_event_enable so that it can be allocated/init when needed and freed in vm_event_disable. Signed-off-by: Alexandru Isaila --- Changes since V3:

[Xen-devel] [libvirt test] 112901: tolerable trouble: blocked/broken/pass - PUSHED

2017-08-28 Thread osstest service owner
flight 112901 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/112901/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a build-arm64-libvirt 1 build-check(1)

Re: [Xen-devel] crashdump on PVM Dom0

2017-08-28 Thread Minjun Hong
Oh!! I'm so sorry Jan Beulich. It is my first time to use this mailing list. Please understand my fault, this time only. Anyway, as you mentioned, I added below line in '/etc/default/grub' file and reboot: > GRUB_CMDLINE_XEN="crashkernel=384M-:256M@64M" Then, 1. I cannot see anything when I type "

Re: [Xen-devel] [PATCH 01/14] fuzz/x86_emulate: Remove redundant AFL hook

2017-08-28 Thread George Dunlap
On 08/25/2017 06:37 PM, Andrew Cooper wrote: > On 25/08/17 17:43, George Dunlap wrote: >> You don't need __AFL_INIT if you have __AFL_LOOP. >> >> Signed-off-by: George Dunlap > > Really? Is that covered in any documentation? > > I got the contrary impression from whichever version of AFL I was

Re: [Xen-devel] [kernel-hardening] Re: x86: PIE support and option to extend KASLR randomization

2017-08-28 Thread Pavel Machek
Hi! > > + The kernel and modules will generate slightly more assembly (1 to > > 2% > > + increase on the .text sections). The vmlinux binary will be > > + significantly smaller due to less relocations. > > > > ... but describing a 1-2% kernel text size increase as "slightl

[Xen-devel] [PATCH v7] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-28 Thread Alexandru Isaila
In some introspection usecases, an in-guest agent needs to communicate with the external introspection agent. An existing mechanism is HVMOP_guest_request_vm_event, but this is restricted to kernel usecases like all other hypercalls. Introduce a mechanism whereby the introspection agent can white

Re: [Xen-devel] [RFC PATCH 2/5] XL: Increase event channels to support more vcpus

2017-08-28 Thread Jan Beulich
>>> On 28.08.17 at 11:11, wrote: > On 8/25/2017 6:04 PM, Wei Liu wrote: >> On Fri, Aug 25, 2017 at 10:57:26AM +0100, Roger Pau Monné wrote: >>> On Fri, Aug 25, 2017 at 10:18:24AM +0100, Wei Liu wrote: On Thu, Aug 24, 2017 at 10:52:17PM -0400, Lan Tianyu wrote: > This patch is to increase

Re: [Xen-devel] [RFC PATCH 2/5] XL: Increase event channels to support more vcpus

2017-08-28 Thread Wei Liu
On Mon, Aug 28, 2017 at 05:11:27PM +0800, Lan, Tianyu wrote: > On 8/25/2017 6:04 PM, Wei Liu wrote: > > On Fri, Aug 25, 2017 at 10:57:26AM +0100, Roger Pau Monné wrote: > > > On Fri, Aug 25, 2017 at 10:18:24AM +0100, Wei Liu wrote: > > > > On Thu, Aug 24, 2017 at 10:52:17PM -0400, Lan Tianyu wrote:

  1   2   >