[Xen-devel] [xen-unstable-smoke test] 112976: regressions - trouble: broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112976 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112976/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956 Tests which

Re: [Xen-devel] [PATCH v2 14/15] tools: implement new generic set value interface and MBA set value command

2017-08-30 Thread Yi Sun
On 17-08-30 10:47:37, Roger Pau Monn� wrote: > On Thu, Aug 24, 2017 at 09:14:48AM +0800, Yi Sun wrote: > > int libxl_psr_cat_get_cbm(libxl_ctx *ctx, uint32_t domid, > > @@ -457,7 +431,33 @@ int libxl_psr_set_val(libxl_ctx *ctx, uint32_t domid, > >libxl_psr_cbm_type type, li

Re: [Xen-devel] [PATCH v2 11/15] tools: implement the new xl get hw info interface

2017-08-30 Thread Yi Sun
On 17-08-30 10:23:18, Roger Pau Monn� wrote: > On Thu, Aug 24, 2017 at 09:14:45AM +0800, Yi Sun wrote: > > +static int psr_mba_hwinfo(void) > > +{ > > +int rc; > > +unsigned int i, nr; > > +libxl_psr_hw_info *info; > > + > > +rc = libxl_psr_get_hw_info(ctx, &info, &nr, > > +

[Xen-devel] linux-next: build failure after merge of the xen-tip tree

2017-08-30 Thread Stephen Rothwell
Hi all, After merging the xen-tip tree, today's linux-next build (x86_64 allmodconfig) failed like this: arch/x86/xen/xen-asm_64.o: In function `xen_trace_page_fault': (.text+0x174): undefined reference to `trace_page_fault' Caused by commit ad5b8c4ba323 ("xen: get rid of paravirt op adjust_e

Re: [Xen-devel] [PATCH v10] VT-d: use correct BDF for VF to search VT-d unit

2017-08-30 Thread Crawford, Eric R
Sorry for the delay, it looks like this patch resolves the issue. Tested-by: Crawford, Eric R -Eric -Original Message- From: Gao, Chao Sent: Monday, August 28, 2017 12:27 AM To: Crawford, Eric R Cc: Andrew Cooper ; Roger Pau Monné ; Wei Liu ; George Dunlap ; Ian Jackson ; Crawford,

[Xen-devel] [xen-unstable-smoke test] 112972: regressions - trouble: broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112972 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112972/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956 Tests which

[Xen-devel] linux-next: manual merge of the xen-tip tree with the tip tree

2017-08-30 Thread Stephen Rothwell
Hi all, Today's linux-next merge of the xen-tip tree got a conflict in: arch/x86/xen/enlighten_pv.c between commit: 64b163fab684 ("x86/idt: Unify gate_struct handling for 32/64-bit kernels") from the tip tree and commit: ad5b8c4ba323 ("xen: get rid of paravirt op adjust_exception_frame"

[Xen-devel] linux-next: manual merge of the xen-tip tree with the tip tree

2017-08-30 Thread Stephen Rothwell
Hi all, Today's linux-next merge of the xen-tip tree got a conflict in: arch/x86/include/asm/traps.h between commit: 11a7ffb01703 ("x86/traps: Simplify pagefault tracing logic") from the tip tree and commit: ad5b8c4ba323 ("xen: get rid of paravirt op adjust_exception_frame") from the x

[Xen-devel] [ovmf baseline-only test] 72043: all pass

2017-08-30 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72043 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72043/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 5202e6c907e5769ac8ecb024b7a07509bdba6181 baseline v

[Xen-devel] [xen-4.7-testing baseline-only test] 72042: regressions - trouble: blocked/broken/fail/pass

2017-08-30 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72042 xen-4.7-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72042/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-debianhvm-amd64 21

Re: [Xen-devel] [PATCH v2 10/15] tools: implement the new libxl get hw info interface

2017-08-30 Thread Yi Sun
On 17-08-30 10:15:22, Roger Pau Monn� wrote: > On Thu, Aug 24, 2017 at 09:14:44AM +0800, Yi Sun wrote: > > diff --git a/tools/libxl/libxl_psr.c b/tools/libxl/libxl_psr.c > > index b183305..d7da7d7 100644 > > --- a/tools/libxl/libxl_psr.c > > +++ b/tools/libxl/libxl_psr.c > > @@ -382,56 +382,51 @@ s

Re: [Xen-devel] [PATCH v2 09/15] tools: implement the new libxc get hw info interface

2017-08-30 Thread Yi Sun
On 17-08-30 09:58:03, Roger Pau Monn� wrote: > On Thu, Aug 24, 2017 at 09:14:43AM +0800, Yi Sun wrote: > > diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h > > index c7710b8..81a6f48 100644 > > --- a/tools/libxc/include/xenctrl.h > > +++ b/tools/libxc/include/xenctrl.h > >

[Xen-devel] [linux-4.9 test] 112953: regressions - trouble: blocked/broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112953 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/112953/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs. 112863 Tests which did

Re: [Xen-devel] [PATCH v2 08/15] tools: create general interfaces to support psr allocation features

2017-08-30 Thread Yi Sun
On 17-08-30 09:42:56, Roger Pau Monn� wrote: > On Thu, Aug 24, 2017 at 09:14:42AM +0800, Yi Sun wrote: > > This patch creates general interfaces in libxl to support all psr > > allocation features. > > > > Add 'LIBXL_HAVE_PSR_MBA' to indicate interface change. > > I'm not sure this is enough to c

[Xen-devel] [xen-unstable-smoke test] 112969: regressions - trouble: broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112969 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112969/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956 Tests which

Re: [Xen-devel] [PATCH v2 07/15] x86: implement set value flow for MBA

2017-08-30 Thread Yi Sun
On 17-08-30 09:31:04, Roger Pau Monn� wrote: > On Thu, Aug 24, 2017 at 09:14:41AM +0800, Yi Sun wrote: > > It also changes the memebers in 'cos_write_info' to transfer the > > feature array, feature properties array and value array. Then, we > > can write all features values on the cos id into MSRs

[Xen-devel] [ovmf test] 112958: all pass - PUSHED

2017-08-30 Thread osstest service owner
flight 112958 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112958/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 5202e6c907e5769ac8ecb024b7a07509bdba6181 baseline version: ovmf c1d799b915096b79b5c5d

[Xen-devel] [linux-3.18 test] 112952: trouble: blocked/broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112952 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/112952/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvops 3 capture-logs broken REGR. vs. 112102

Re: [Xen-devel] [PATCH v5 1/4] VT-d PI: track the number of vcpus on pi blocking list

2017-08-30 Thread Chao Gao
On Wed, Aug 30, 2017 at 10:00:49AM -0600, Jan Beulich wrote: On 16.08.17 at 07:14, wrote: >> @@ -100,6 +101,24 @@ void vmx_pi_per_cpu_init(unsigned int cpu) >> spin_lock_init(&per_cpu(vmx_pi_blocking, cpu).lock); >> } >> >> +static void vmx_pi_add_vcpu(struct pi_blocking_vcpu *pbv, >>

[Xen-devel] [ovmf baseline-only test] 72041: all pass

2017-08-30 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72041 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72041/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf c1d799b915096b79b5c5d035b134ffbccc6d1469 baseline v

[Xen-devel] [xen-unstable-smoke test] 112967: regressions - trouble: broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112967 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112967/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956 Tests which

[Xen-devel] [xen-4.8-testing baseline-only test] 72040: regressions - trouble: blocked/broken/fail/pass

2017-08-30 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72040 xen-4.8-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72040/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win10-i386 16 gues

[Xen-devel] [xen-unstable-smoke test] 112963: regressions - trouble: broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112963 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112963/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956 Tests which

[Xen-devel] [seabios test] 112951: regressions - FAIL

2017-08-30 Thread osstest service owner
flight 112951 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/112951/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs. 112938 test-amd64-i386-

[Xen-devel] [xen-unstable test] 112949: regressions - trouble: blocked/broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112949 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/112949/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-17 xen-boot fail REGR. vs. 112809 Tests which did no

[Xen-devel] [xen-unstable-smoke test] 112962: regressions - trouble: broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112962 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112962/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956 Tests which

Re: [Xen-devel] [PATCH 11/13] xen/gntdev: update to new mmu_notifier semantic

2017-08-30 Thread Boris Ostrovsky
On 08/29/2017 07:54 PM, Jérôme Glisse wrote: > Call to mmu_notifier_invalidate_page() are replaced by call to > mmu_notifier_invalidate_range() and thus call are bracketed by > call to mmu_notifier_invalidate_range_start()/end() > > Remove now useless invalidate_page callback. > > Signed-off-by: Jé

Re: [Xen-devel] [PATCH v4 39/39] arm/xen-access: Add test of xc_altp2m_change_gfn

2017-08-30 Thread Sergej Proskurin
Hi Razvan, [...] >> + >> +*gfn_new = ++(xenaccess->max_gpfn); > Unnecessary parentheses. > Thanks. >> +rc = xc_domain_populate_physmap_exact(xenaccess->xc_handle, domain_id, >> 1, 0, 0, gfn_new); >> +if ( rc < 0 ) >> +goto err; >> + >> +/* Copy content of the old gfn i

Re: [Xen-devel] [PATCH v4 29/39] x86/altp2m: Move altp2m_check to altp2m.c

2017-08-30 Thread Sergej Proskurin
Hi Razvan, On 08/30/2017 08:42 PM, Razvan Cojocaru wrote: > On 08/30/2017 09:32 PM, Sergej Proskurin wrote: >> diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c >> index 42e6f09029..66f1d83d84 100644 >> --- a/xen/common/vm_event.c >> +++ b/xen/common/vm_event.c >> @@ -29,6 +29,7 @@ >> #

Re: [Xen-devel] [PATCH 2/2] x86/mm: Use mfn_t for make_cr3()

2017-08-30 Thread Tim Deegan
At 13:19 +0100 on 30 Aug (1504099173), Andrew Cooper wrote: > No functional change. > > Signed-off-by: Andrew Cooper Acked-by: Tim Deegan ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

[Xen-devel] [PATCH v9 2/2] x86/monitor: Notify monitor if an emulation fails.

2017-08-30 Thread Petre Pircalabu
If case of a vm_event with the emulate_flags set, if the instruction is not implemented by the emulator, the monitor should be notified instead of directly injecting a hw exception. This behavior can be used to re-execute an instruction not supported by the emulator using the real processor (e.g. a

[Xen-devel] [PATCH v9 0/2] Notify monitor when emulating an unimplemented instruction

2017-08-30 Thread Petre Pircalabu
This patchset implements a mechanism which allows XEN to send first an event if the emulator encountered an unsupported instruction. The monitor application can choose to mitigate the error, for example to singlestep the instruction using the real processor and then resume execution of the normal

[Xen-devel] [PATCH v9 1/2] x86emul: New return code for unimplemented instruction

2017-08-30 Thread Petre Pircalabu
Enforce the distinction between an instruction not implemented by the emulator and the failure to emulate that instruction by defining a new return code, X86EMUL_UNIMPLEMENTED. This value should only be used by the core emulator if it fails to decode the current instruction, and not by any of the

Re: [Xen-devel] [PATCH v4 39/39] arm/xen-access: Add test of xc_altp2m_change_gfn

2017-08-30 Thread Razvan Cojocaru
On 08/30/2017 09:32 PM, Sergej Proskurin wrote: > This commit extends xen-access by a simple test of the functionality > provided by "xc_altp2m_change_gfn". The idea is to dynamically remap a > trapping gfn to another mfn, which holds the same content as the > original mfn. On success, the guest wi

Re: [Xen-devel] [PATCH v4 29/39] x86/altp2m: Move altp2m_check to altp2m.c

2017-08-30 Thread Razvan Cojocaru
On 08/30/2017 09:32 PM, Sergej Proskurin wrote: > diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c > index 42e6f09029..66f1d83d84 100644 > --- a/xen/common/vm_event.c > +++ b/xen/common/vm_event.c > @@ -29,6 +29,7 @@ > #include > #include > #include > +#include Any reason why this

[Xen-devel] [PATCH v4 04/39] arm/p2m: Add HVMOP_altp2m_get_domain_state

2017-08-30 Thread Sergej Proskurin
This commit adopts the x86 HVMOP_altp2m_get_domain_state implementation. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v3: Removed the "altp2m_enabled" check in HVMOP_altp2m_get_domain_state case as it has been moved in front of the switch statement in

[Xen-devel] [PATCH v4 22/39] arm/p2m: Make p2m_mem_access_check ready for altp2m

2017-08-30 Thread Sergej Proskurin
This commit extends the function "p2m_mem_access_check" and "p2m_mem_access_check_and_get_page" to consider altp2m. The function "p2m_mem_access_check_and_get_page" needs to translate the gva upon the hostp2m's vttbr, as it contains all valid mappings while the currently active altp2m view might no

[Xen-devel] [PATCH v4 39/39] arm/xen-access: Add test of xc_altp2m_change_gfn

2017-08-30 Thread Sergej Proskurin
This commit extends xen-access by a simple test of the functionality provided by "xc_altp2m_change_gfn". The idea is to dynamically remap a trapping gfn to another mfn, which holds the same content as the original mfn. On success, the guest will continue to run. Subsequent altp2m access violations

[Xen-devel] [PATCH v4 07/39] arm/p2m: Move hostp2m init/teardown to individual functions

2017-08-30 Thread Sergej Proskurin
This commit pulls out generic init/teardown functionality out of "p2m_init" and "p2m_teardown" into "p2m_init_one", "p2m_teardown_one", and "p2m_flush_table" functions. This allows our future implementation to reuse existing code for the initialization/teardown of altp2m views. Signed-off-by: Ser

[Xen-devel] [PATCH v4 27/39] arm/p2m: Add altp2m_propagate_change

2017-08-30 Thread Sergej Proskurin
This commit introduces the function "altp2m_propagate_change" that is responsible to propagate changes applied to the host's p2m to a specific or even all altp2m views. In this way, Xen can in-/decrease the guest's physmem at run-time without leaving the altp2m views with stalled/invalid entries.

[Xen-devel] [PATCH v4 17/39] arm/p2m: Add HVMOP_altp2m_switch_p2m

2017-08-30 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v3: Extended the function "altp2m_switch_domain_altp2m_by_id" so that if the guest domain indirectly calles this function, the current vcpu also changes the altp2m view without performing an explicit context

[Xen-devel] [PATCH v4 28/39] altp2m: Rename p2m_altp2m_check to altp2m_check

2017-08-30 Thread Sergej Proskurin
In this commit, we rename the function "p2m_altp2m_check" to "altp2m_check". This is a preparation measure for the following commit which moves the renamed function "altp2m_check" from p2m.c to altp2m.c in order to group all altp2m-related functions to one spot (which is altp2m.c). The reason for

[Xen-devel] [PATCH v4 10/39] arm/p2m: Change func prototype and impl of p2m_(alloc|free)_vmid

2017-08-30 Thread Sergej Proskurin
This commit changes the prototype and implementation of the functions "p2m_alloc_vmid" and "p2m_free_vmid". The function "p2m_alloc_vmid" does not expect the struct domain as argument anymore and returns an allocated vmid. The function "p2m_free_vmid" takes only the vmid that is to be freed as argu

[Xen-devel] [PATCH v4 35/39] arm/p2m: Adjust debug information to altp2m

2017-08-30 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v2: Dump p2m information of the hostp2m and all altp2m views. v4: Adjust printk format. --- xen/arch/arm/p2m.c | 20 1 file changed, 20 insertions(+) diff --git a/xen/arch/arm/p2m.c b/xen/arch

[Xen-devel] [PATCH v4 30/39] arm/altp2m: Move altp2m_check to altp2m.h

2017-08-30 Thread Sergej Proskurin
In this commit, we move the function "altp2m_check" from p2m.h to altp2m.h in order to group all altp2m-related functions in one point, namely in altp2m.{c|h}. This commit moves solely the arm code. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v4: This commit

[Xen-devel] [PATCH v4 25/39] arm/p2m: Modify reference count only if hostp2m active

2017-08-30 Thread Sergej Proskurin
This commit makes sure that the page reference count is updated through the function "p2m_put_l3_page" only when the entries have been freed from the host's p2m. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall v4: Moved the check for the host's p2m from "p2m_free_en

[Xen-devel] [PATCH v4 08/39] arm/p2m: Cosmetic fix - function prototype of p2m_alloc_table

2017-08-30 Thread Sergej Proskurin
The function "p2m_alloc_table" should be able to allocate 2nd stage translation tables not only for the host's p2m but also for alternate p2m's. Signed-off-by: Sergej Proskurin Acked-by: Julien Grall --- Cc: Stefano Stabellini Cc: Julien Grall --- v2: Removed altp2m table initialization from "

[Xen-devel] [PATCH v4 32/39] arm/altp2m: Make altp2m_vcpu_idx ready for altp2m

2017-08-30 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/include/asm-arm/altp2m.h | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/xen/include/asm-arm/altp2m.h b/xen/include/asm-arm/altp2m.h index f9e14ab1dc..eff6bd5a38 100644 --- a/xen/include/a

[Xen-devel] [PATCH v4 11/39] altp2m: Move (MAX|INVALID)_ALTP2M to xen/p2m-common.h

2017-08-30 Thread Sergej Proskurin
We move the macros (MAX|INVALID)_ALTP2M out of x86-related code to common code, as the following patches will make use of them on ARM. Signed-off-by: Sergej Proskurin --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc:

[Xen-devel] [PATCH v4 20/39] arm/p2m: Make get_page_from_gva ready for altp2m

2017-08-30 Thread Sergej Proskurin
The function get_page_from_gva uses ARM's hardware support to translate gva's to machine addresses. This function is used, among others, for memory regulation purposes, e.g, within the context of memory ballooning. To ensure correct behavior while altp2m is in use, we use the host's p2m table for t

[Xen-devel] [PATCH v4 16/39] arm/p2m: Add HVMOP_altp2m_destroy_p2m

2017-08-30 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v2: Substituted the call to tlb_flush for p2m_flush_table. Added comments. Cosmetic fixes. v3: Changed the locking mechanism to "p2m_write_lock" inside the function "altp2m_destroy_by_id". Do not fl

[Xen-devel] [PATCH v4 19/39] arm/p2m: Make p2m_restore_state ready for altp2m

2017-08-30 Thread Sergej Proskurin
This commit adapts the function "p2m_restore_state" in a way that the currently active altp2m table is considered during state restoration. Signed-off-by: Sergej Proskurin Acked-by: Julien Grall --- Cc: Stefano Stabellini Cc: Julien Grall --- v3: Moved declaration of "altp2m_switch_domain_altp

[Xen-devel] [PATCH v4 29/39] x86/altp2m: Move altp2m_check to altp2m.c

2017-08-30 Thread Sergej Proskurin
In this commit, we move the function "altp2m_check" from p2m.c to altp2m.c in order to group all altp2m-related functions in one point, namely in altp2m.{c|h}. This commit moves solely the x86 code. Signed-off-by: Sergej Proskurin --- Cc: George Dunlap Cc: Jan Beulich Cc: Andrew Cooper Cc: Raz

[Xen-devel] [PATCH v4 26/39] arm/p2m: Add HVMOP_altp2m_set_mem_access

2017-08-30 Thread Sergej Proskurin
The HVMOP_altp2m_set_mem_access allows to set gfn permissions of (currently one page at a time) of a specific altp2m view. In case the view does not hold the requested gfn entry, it will be first copied from the host's p2m table and then modified as requested. Signed-off-by: Sergej Proskurin ---

[Xen-devel] [PATCH v4 13/39] arm/p2m: Add altp2m table flushing routine

2017-08-30 Thread Sergej Proskurin
The current implementation differentiates between flushing and destroying altp2m views. This commit adds the function altp2m_flush, which allows to release all of the alternate p2m views. To make sure that we flush alternate p2m's only if they are not used by any vCPU, we introduce a counter that t

[Xen-devel] [PATCH v4 01/39] arm/p2m: Introduce p2m_(switch|restore)_vttbr_and_(g|s)et_flags

2017-08-30 Thread Sergej Proskurin
This commit introduces macros for switching and restoring the vttbr considering the currently set irq flags. We define these macros, as the following commits will use the associated functionality multiple times throughout different files. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini

[Xen-devel] [PATCH v4 12/39] arm/p2m: Add altp2m init/teardown routines

2017-08-30 Thread Sergej Proskurin
The p2m initialization now invokes initialization routines responsible for the allocation and initialization of altp2m structures. The same applies to teardown routines. The functionality has been adopted from the x86 altp2m implementation. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabelli

[Xen-devel] [PATCH v4 15/39] arm/p2m: Add HVMOP_altp2m_create_p2m

2017-08-30 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin Acked-by: Julien Grall --- Cc: Stefano Stabellini Cc: Julien Grall --- v2: Cosmetic fixes. v3: Cosmetic fixes. Renamed the function "altp2m_init_next" to "altp2m_init_next_available". Exchanged the check "altp2m_vttbr[idx] == INVALID_VTTBR" for

[Xen-devel] [PATCH v4 14/39] arm/p2m: Add HVMOP_altp2m_set_domain_state

2017-08-30 Thread Sergej Proskurin
The HVMOP_altp2m_set_domain_state allows to activate altp2m on a specific domain. This commit adopts the x86 HVMOP_altp2m_set_domain_state implementation. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v2: Dynamically allocate memory for altp2m views only when n

[Xen-devel] [PATCH v4 02/39] arm/p2m: Add first altp2m HVMOP stubs

2017-08-30 Thread Sergej Proskurin
This commit copies and extends the altp2m-related code from x86 to ARM. Functions that are no yet supported notify the caller or print a BUG message stating their absence. Currently, we prohibit concurrent access of the altp2m interface by locking the entire domain. As stated in the provided TODO

[Xen-devel] [PATCH v4 18/39] arm/p2m: Add p2m_get_active_p2m macro

2017-08-30 Thread Sergej Proskurin
This commit introduces the macro "p2m_get_active_p2m" returning the currently active (alt)p2m. The need for this macro will be shown in the following commits. Signed-off-by: Sergej Proskurin Acked-by: Julien Grall --- Cc: Stefano Stabellini Cc: Julien Grall --- v4: Moved the introduced macro f

[Xen-devel] [PATCH v4 37/39] altp2m: Allow activating altp2m on ARM domains

2017-08-30 Thread Sergej Proskurin
The previous libxl implemention limited the use of altp2m to x86 HVM domains. This commit extends libxl by introducing the altp2m switch to ARM domains. Additionally, we introduce the macro LIBXL_HAVE_ARM_ALTP2M in parallel to the former LIBXL_HAVE_ALTP2M to differentiate between altp2m for x86 an

[Xen-devel] [PATCH v4 36/39] altp2m: Document external-only use on ARM

2017-08-30 Thread Sergej Proskurin
From: Tamas K Lengyel Currently, the altp2m feature has been used and thus documented for the x86 architecture. As we aim to introduce altp2m to ARM, in this commit, we adjust the documentation by pointing out x86 only parts and thus make clear that the modes XEN_ALTP2M_external and XEN_ALTP2M_di

[Xen-devel] [PATCH v4 03/39] arm/p2m: Add hvm_allow_(set|get)_param

2017-08-30 Thread Sergej Proskurin
This commit introduces the functions hvm_allow_(set|get)_param. These can be used as a filter controlling access to HVM params. This functionality has been inspired by the x86 implementation. The introduced filter ensures that the HVM param HVM_PARAM_ALTP2M is set once and not altered by guest dom

[Xen-devel] [PATCH v4 05/39] arm/p2m: Introduce p2m_is_(hostp2m|altp2m)

2017-08-30 Thread Sergej Proskurin
This commit adds a p2m class to the struct p2m_domain to distinguish between the host's original p2m and alternate p2m's. The need for this functionality will be shown in the following commits. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v4: Change return typ

[Xen-devel] [PATCH v4 21/39] arm/p2m: Cosmetic fix - __p2m_get_mem_access

2017-08-30 Thread Sergej Proskurin
In this commit, we extend the function prototype of "__p2m_get_mem_access" to hold an argument of type "struct p2m_domain*", as we need to distinguish between the host's p2m and different altp2m views. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v3: Changed t

[Xen-devel] [PATCH v4 38/39] arm/xen-access: Extend xen-access for altp2m on ARM

2017-08-30 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin Acked-by: Razvan Cojocaru --- Cc: Razvan Cojocaru Cc: Tamas K Lengyel Cc: Ian Jackson Cc: Wei Liu --- tools/tests/xen-access/xen-access.c | 33 - 1 file changed, 20 insertions(+), 13 deletions(-) diff --git a/tools/tests/xen-ac

[Xen-devel] [PATCH v4 09/39] arm/p2m: Rename parameter in p2m_alloc_vmid

2017-08-30 Thread Sergej Proskurin
This commit does not change or introduce any additional functionality but rather is a part of the following commit that alters the functionality of the function "p2m_alloc_vmid". Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/p2m.c | 12 ++-

[Xen-devel] [PATCH v4 34/39] arm/p2m: Add HVMOP_altp2m_change_gfn

2017-08-30 Thread Sergej Proskurin
This commit adds the functionality to change mfn mappings for specified gfn's in altp2m views. This mechanism can be used within the context of VMI, e.g., to establish stealthy debugging. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v3: Moved the altp2m_lock t

[Xen-devel] [PATCH v4 24/39] arm/p2m: Make p2m_put_l3_page ready for altp2m

2017-08-30 Thread Sergej Proskurin
This commit extends the prototype of the function "p2m_put_l3_page" by an additional function parameter of type "struct p2m_domain*". This is needed as a future commit will extend the function "p2m_put_l3_page" so that we can call "put_page" only if the p2m being modified is the hostp2m. Signed-of

[Xen-devel] [PATCH v4 00/39] arm/altp2m: Introducing altp2m to ARM

2017-08-30 Thread Sergej Proskurin
Hi all, The following patch series can be found on Github[0] and is part of my contribution to last year's Google Summer of Code (GSoC)[1]. My project is managed by the organization The Honeynet Project. As part of GSoC, I was being supervised by the Xen maintainer Tamas K. Lengyel , George D. Web

[Xen-devel] [PATCH v4 33/39] arm/p2m: Add altp2m paging mechanism

2017-08-30 Thread Sergej Proskurin
This commit adds the function "altp2m_lazy_copy" implementing the altp2m paging mechanism. The function "altp2m_lazy_copy" lazily copies the hostp2m's mapping into the currently active altp2m view on 2nd stage translation faults on instruction or data access. Signed-off-by: Sergej Proskurin --- C

[Xen-devel] [PATCH v4 06/39] arm/p2m: Cosmetic fix - substitute _gfn(ULONG_MAX) for INVALID_GFN

2017-08-30 Thread Sergej Proskurin
In ./xen/arch/arm/p2m.c, we compare the gfn's with INVALID_GFN throughout the code. Thus it makes sense to use the macro INVALID_GFN instead of a hard coded value to initialize "p2m->lowest_mapped_gfn". Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/ar

[Xen-devel] [PATCH v4 23/39] arm/p2m: Cosmetic fix - function prototypes

2017-08-30 Thread Sergej Proskurin
This commit changes the prototypes of the following functions: - p2m_insert_mapping - p2m_remove_mapping These changes are required as our implementation reuses most of the existing ARM p2m implementation to set page table attributes of the individual altp2m views. Therefore, exiting function prot

[Xen-devel] [PATCH v4 31/39] arm/altp2m: Introduce altp2m_switch_vcpu_altp2m_by_id

2017-08-30 Thread Sergej Proskurin
This commit adds the function "altp2m_switch_vcpu_altp2m_by_id" that is executed after checking whether the vcpu should be switched to a different altp2m within the function "altp2m_check". Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- v3: This commit has been

[Xen-devel] [libvirt test] 112950: regressions - trouble: blocked/broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112950 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/112950/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 debian-hvm-install fail REGR. vs. 112918 Tests w

[Xen-devel] [PATCH 1/6] example/vhost_xen: remove

2017-08-30 Thread Jianfeng Tan
Signed-off-by: Jianfeng Tan --- MAINTAINERS |1 - examples/Makefile |1 - examples/vhost_xen/Makefile | 52 -- examples/vhost_xen/main.c | 1522 --- examples/vhost_xen/main.h | 66 --

[Xen-devel] [PATCH 0/6] remove xen dom0 support in DPDK

2017-08-30 Thread Jianfeng Tan
Following the calls on the mailing list: http://dpdk.org/ml/archives/dev/2017-June/068151.html The Technical Board decided to drop Xen dom0 support from EAL: http://dpdk.org/ml/archives/dev/2017-June/068615.html This series remove xen dom0 support in DPDK, as well as xenvirt PMD and vhost_

[Xen-devel] [PATCH 2/6] net/xenvirt: remove

2017-08-30 Thread Jianfeng Tan
Signed-off-by: Jianfeng Tan --- MAINTAINERS | 2 - app/test-pmd/Makefile | 4 - app/test-pmd/testpmd.c | 12 - config/common_base | 5 - config/defconfig_arm-armv7a-linuxapp-

[Xen-devel] [PATCH 4/6] xen: remove xen dependency in drivers, ether, mempool

2017-08-30 Thread Jianfeng Tan
Signed-off-by: Jianfeng Tan --- drivers/crypto/qat/qat_qp.c | 7 +-- drivers/net/i40e/i40e_rxtx.c | 8 ++-- lib/librte_ether/rte_ethdev.c| 7 +-- lib/librte_mempool/rte_mempool.c | 8 ++-- 4 files changed, 6 insertions(+), 24 deletions(-) diff --git a/drivers/crypto/

[Xen-devel] [PATCH 6/6] eal: remove API rte_mem_phy2mch

2017-08-30 Thread Jianfeng Tan
Previously, to get MFN address in dom0, this API is a wrapper to obtain the "physical address". As we removed xen dom0 support, this API is not necessary. Signed-off-by: Jianfeng Tan --- doc/guides/rel_notes/release_17_11.rst | 2 ++ drivers/net/e1000/em_rxtx.c| 4 ++-- driv

[Xen-devel] [PATCH 3/6] xen: remove xen dependency in app, examples, test

2017-08-30 Thread Jianfeng Tan
Signed-off-by: Jianfeng Tan --- app/test-pmd/testpmd.c | 2 +- examples/ip_pipeline/app.h | 4 -- examples/ip_pipeline/config_parse.c | 19 - examples/ip_pipeline/init.c | 5 --- examples/kni/main.c | 3 -- test/test/process.h

Re: [Xen-devel] [PATCH 3/3] x86/mm: merge ptwr and mmio_ro page fault handlers

2017-08-30 Thread Andrew Cooper
On 30/08/17 18:11, Wei Liu wrote: > Provide a unified entry to avoid going through pte look-up, decode and > emulation cycle more than necessary. The path taken is determined by > the faulting address. > > Note that the order of checks is changed in the new function, but the > order of the checks i

[Xen-devel] [xen-unstable-smoke test] 112960: regressions - trouble: broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112960 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112960/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956 Tests which

Re: [Xen-devel] [PATCH] libxc: increase maximum migration stream record length

2017-08-30 Thread Juergen Gross
On 10/08/17 14:26, Andrew Cooper wrote: > On 10/08/17 12:24, Juergen Gross wrote: >> Today the maximum record lenth in a migration stream is 8MB. This >> limits the size of a PV domain to a little bit less than 1TB in the >> migration case, as the P2M frame list will exceed 8MB in this case. >> >>

Re: [Xen-devel] [PATCH 2/3] x86/mm: don't wrap x86_emulate_ctxt in ptwr_emulate_ctxt

2017-08-30 Thread Andrew Cooper
On 30/08/17 18:11, Wei Liu wrote: > diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c > index ed80df02fa..5b840cc603 100644 > --- a/xen/arch/x86/mm.c > +++ b/xen/arch/x86/mm.c > @@ -4956,9 +4956,9 @@ long arch_memory_op(unsigned long cmd, > XEN_GUEST_HANDLE_PARAM(void) arg) > */ > > struct p

[Xen-devel] [PATCH 0/3] x86/mm: merge ptwr and mmio_ro page fault handlers

2017-08-30 Thread Wei Liu
Wei Liu (3): x86/mm: introduce trace point for mmio_ro emulation x86/mm: don't wrap x86_emulate_ctxt in ptwr_emulate_ctxt x86/mm: merge ptwr and mmio_ro page fault handlers xen/arch/x86/mm.c| 325 +++ xen/arch/x86/traps.c | 20

[Xen-devel] [PATCH 3/3] x86/mm: merge ptwr and mmio_ro page fault handlers

2017-08-30 Thread Wei Liu
Provide a unified entry to avoid going through pte look-up, decode and emulation cycle more than necessary. The path taken is determined by the faulting address. Note that the order of checks is changed in the new function, but the order of the checks is performed shouldn't matter. The sole calle

[Xen-devel] [PATCH 1/3] x86/mm: introduce trace point for mmio_ro emulation

2017-08-30 Thread Wei Liu
Using ptrw_emulation trace point is wrong. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c| 2 +- xen/include/asm-x86/perfc_defn.h | 1 + 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 1f23470cef..ed80df02fa 100644 --- a/xen

[Xen-devel] [PATCH 2/3] x86/mm: don't wrap x86_emulate_ctxt in ptwr_emulate_ctxt

2017-08-30 Thread Wei Liu
Rewrite the code so that it has the same structure as mmio_ro_emualte_ctxt. The new code doesn't contain x86_emulate_ctxt anymore but a pointer to the x86_emulate_ctxt; x86_emulate_ctxt now also points to ptwr_emulate_ctxt via its data pointer. This patch will help unify mmio_ro and ptwr code path

Re: [Xen-devel] [PATCH v8 1/2] x86emul: New return code for unimplemented instruction

2017-08-30 Thread Petre Ovidiu PIRCALABU
Hi Jan, The main use-case for the new return code is to have a clear distinction between an instruction not implemented by the emulator (e.g. ?fldenv or fnstenv) and the failure to emulate . - hvm_process_io_incercept returns X86EMUL_UNHANDLEABLE if one of the hvm_io_ops (read/write) failed

[Xen-devel] [linux-linus test] 112948: tolerable trouble: blocked/broken/fail/pass - PUSHED

2017-08-30 Thread osstest service owner
flight 112948 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/112948/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a test-arm64-arm64-xl 1 build-chec

[Xen-devel] [xen-4.9-testing baseline-only test] 72039: regressions - trouble: blocked/broken/fail/pass

2017-08-30 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72039 xen-4.9-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72039/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win7-amd64 16 guest

Re: [Xen-devel] [PATCH v4 03/11] public: xen.h: add definitions for UUID handling

2017-08-30 Thread Volodymyr Babchuk
Hi Jan, On 23.08.17 14:29, Jan Beulich wrote: On 23.08.17 at 13:08, wrote: On 23.08.17 11:10, Jan Beulich wrote: On 22.08.17 at 16:37, wrote: I can't see why you want to map UUID to a certain structure. This is so that the type cannot mistakenly be passed to a function taking unsigned cha

Re: [Xen-devel] [Xen-users] UEFI Secure Boot Xen 4.9

2017-08-30 Thread Tamas K Lengyel
On Tue, Aug 29, 2017 at 2:01 PM, Daniel Kiper wrote: > Hey Tamas, > > Sorry for late reply. I was on vacation. > > On Tue, Aug 22, 2017 at 09:01:06PM -0600, Tamas K Lengyel wrote: >> On Tue, May 16, 2017 at 5:04 AM, Daniel Kiper >> wrote: > > [...] > >> > UEFI will verify shim secure boot signat

Re: [Xen-devel] [PATCH 1/2] x86/mm: Use mfn_t for new_guest_cr3()

2017-08-30 Thread Jan Beulich
>>> On 30.08.17 at 17:57, wrote: > On 30/08/17 16:45, Jan Beulich wrote: > On 30.08.17 at 14:19, wrote: >>> @@ -2772,23 +2772,23 @@ int vcpu_destroy_pagetables(struct vcpu *v) >>> return rc != -EINTR ? rc : -ERESTART; >>> } >>> >>> -int new_guest_cr3(unsigned long mfn) >>> +int new_gu

Re: [Xen-devel] [PATCH v5 1/4] VT-d PI: track the number of vcpus on pi blocking list

2017-08-30 Thread Jan Beulich
>>> On 16.08.17 at 07:14, wrote: > @@ -100,6 +101,24 @@ void vmx_pi_per_cpu_init(unsigned int cpu) > spin_lock_init(&per_cpu(vmx_pi_blocking, cpu).lock); > } > > +static void vmx_pi_add_vcpu(struct pi_blocking_vcpu *pbv, > +struct vmx_pi_blocking_vcpu *vpbv) > +

Re: [Xen-devel] [PATCH 1/2] x86/mm: Use mfn_t for new_guest_cr3()

2017-08-30 Thread Andrew Cooper
On 30/08/17 16:45, Jan Beulich wrote: On 30.08.17 at 14:19, wrote: >> @@ -2772,23 +2772,23 @@ int vcpu_destroy_pagetables(struct vcpu *v) >> return rc != -EINTR ? rc : -ERESTART; >> } >> >> -int new_guest_cr3(unsigned long mfn) >> +int new_guest_cr3(mfn_t mfn) >> { >> struct vcp

[Xen-devel] [xen-unstable-smoke test] 112959: regressions - trouble: broken/fail/pass

2017-08-30 Thread osstest service owner
flight 112959 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112959/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 12 guest-start fail REGR. vs. 112956 Tests which

Re: [Xen-devel] [PATCH v6 3/3] tools/libxc: use superpages during restore of HVM guest

2017-08-30 Thread Olaf Hering
On Wed, Aug 30, Wei Liu wrote: > > Can this actually happen with the available senders? If not, this is > > again the missing memory map. > Probably not now, but as said, you shouldn't rely on the structure of > the stream unless it is stated in the spec. Well, what can happen with todays impleme

  1   2   >