[Xen-devel] [ovmf baseline-only test] 68378: trouble: blocked/broken

2017-01-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68378 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68378/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3863 ho

Re: [Xen-devel] [PATCH 6/6] x86/cpuid: Offer ITSC to domains which are automatically non-migrateable

2017-01-17 Thread Jan Beulich
>>> On 16.01.17 at 18:26, wrote: > On 16/01/17 17:07, Jan Beulich wrote: > On 16.01.17 at 12:40, wrote: >>> Dom0 doesn't have a toolstack to explicitly decide that ITSC is safe to >>> offer. >>> For domains which are constructed with disable_migrate set, offer ITSC >>> automatically. >> I'm

[Xen-devel] [xen-unstable test] 104197: regressions - FAIL

2017-01-17 Thread osstest service owner
flight 104197 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/104197/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64 5 xen-install fail REGR. vs. 104181 Regressions which

Re: [Xen-devel] arm: Boot allocator fails with multi node memory

2017-01-17 Thread Jan Beulich
>>> On 16.01.17 at 19:46, wrote: > On 09/01/17 08:40, Jan Beulich wrote: > On 07.01.17 at 07:05, wrote: >>> Question: Why this address is not mapped?. If mapped where this va is >>> mapped?. >> >> Well, I think this is the wrong question to ask. Why would it be mapped >> if there's no memory

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Jan Beulich
>>> On 16.01.17 at 18:44, wrote: > On Mon, Jan 16, 2017 at 09:50:53AM -0700, Jan Beulich wrote: >> >>> On 16.01.17 at 17:31, wrote: >> > On Mon, Jan 16, 2017 at 09:09:55AM -0700, Jan Beulich wrote: >> >> >>> On 16.01.17 at 16:14, wrote: >> >> > On Fri, Jan 13, 2017 at 08:51:57AM -0700, Jan Beuli

Re: [Xen-devel] [PATCH V6] x86/HVM: Introduce struct hvm_pi_ops

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 05:21, wrote: > Change in V6: > * Change hvm_domain.pi_ops to be a pointer > (per Boris's suggestion). I must have overlooked that suggestion during review, and I'm afraid it's not a good idea: See Weng Fu's series at https://lists.xenproject.org/archives/html/xen-devel/2

Re: [Xen-devel] [PATCH V5] x86/HVM: Introduce struct hvm_pi_ops

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 03:35, wrote: > The current function pointers in struct vmx_domain for managing hvm > posted interrupt can be used also by SVM AVIC. Therefore, this patch > introduces the struct hvm_pi_ops in the struct hvm_domain to hold them. > > Signed-off-by: Suravee Suthikulpanit Acked-

Re: [Xen-devel] arm: Boot allocator fails with multi node memory

2017-01-17 Thread Julien Grall
Hi Stefano, On 16/01/17 19:59, Stefano Stabellini wrote: On Mon, 16 Jan 2017, Julien Grall wrote: On 09/01/17 08:40, Jan Beulich wrote: On 07.01.17 at 07:05, wrote: Question: Why this address is not mapped?. If mapped where this va is mapped?. Well, I think this is the wrong question to as

Re: [Xen-devel] arm: Boot allocator fails with multi node memory

2017-01-17 Thread Julien Grall
Hi Jan, On 17/01/17 09:09, Jan Beulich wrote: On 16.01.17 at 19:46, wrote: On 09/01/17 08:40, Jan Beulich wrote: On 07.01.17 at 07:05, wrote: Question: Why this address is not mapped?. If mapped where this va is mapped?. Well, I think this is the wrong question to ask. Why would it be map

Re: [Xen-devel] IOMMU fault with IGD passthrough setup on XEN 4.8.0

2017-01-17 Thread G.R.
On Tue, Jan 17, 2017 at 12:11 AM, Jan Beulich wrote: > >>> On 16.01.17 at 16:15, wrote: > > On Mon, Jan 16, 2017 at 9:56 PM, Jan Beulich wrote: > > > >> For building a debug hypervisor, all you need to do is set > >> CONFIG_DEBUG=y in xen/.config. I don't think there are any > >> knobs to avoid

Re: [Xen-devel] [PATCH 5/6] x86/cpuid: Don't offer HVM hypervisor leaves to PV guests

2017-01-17 Thread Andrew Cooper
On 16/01/17 17:02, Jan Beulich wrote: On 16.01.17 at 12:40, wrote: >> Xen leaf 4 is HVM-only. Report a lower max_leaf to PV guests, so they don't >> go and investigate a leaf which will return all zeros. >> >> Signed-off-by: Andrew Cooper > Well, if you think it's worth it (we'll have to ma

Re: [Xen-devel] [PATCH v3 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2017-01-17 Thread Andrew Cooper
On 16/01/17 16:16, Jan Beulich wrote: On 16.01.17 at 17:05, wrote: >> On 13/01/17 12:47, Jan Beulich wrote: >>> The kernel already has to parse this structure anyway, and will know the >>> bitness of its userspace process. We could easily (at this point) >>> require the kernel to

[Xen-devel] [PATCH v2 2/6] x86/cpuid: Introduce recalculate_xstate()

2017-01-17 Thread Andrew Cooper
All data in the xstate union, other than the Da1 feature word, is derived from other state; either feature bits from other words, or layout information which has already been collected by Xen's xstate driver. Recalculate the xstate information for each policy object when the feature bits may have

[Xen-devel] [xen-unstable-smoke test] 104203: regressions - FAIL

2017-01-17 Thread osstest service owner
flight 104203 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/104203/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 104195 Tests which

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Roger Pau Monné
On Tue, Jan 17, 2017 at 02:12:59AM -0700, Jan Beulich wrote: > >>> On 16.01.17 at 18:44, wrote: > > On Mon, Jan 16, 2017 at 09:50:53AM -0700, Jan Beulich wrote: > >> >>> On 16.01.17 at 17:31, wrote: > >> > On Mon, Jan 16, 2017 at 09:09:55AM -0700, Jan Beulich wrote: > >> >> >>> On 16.01.17 at 16:

[Xen-devel] [distros-debian-snapshot test] 68380: trouble: blocked/broken

2017-01-17 Thread Platform Team regression test user
flight 68380 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68380/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 3 host-install(3) broken R

Re: [Xen-devel] [PATCH 4/4] x86: add multiboot2 protocol support for EFI platforms

2017-01-17 Thread George Dunlap
On Mon, Jan 16, 2017 at 3:16 PM, Daniel Kiper wrote: > On Mon, Jan 16, 2017 at 09:28:45AM -0500, Doug Goldstein wrote: >> On 1/16/17 9:11 AM, Daniel Kiper wrote: >> > On Mon, Jan 16, 2017 at 08:41:08AM -0500, Doug Goldstein wrote: >> >> On 1/16/17 7:50 AM, Daniel Kiper wrote: >> >>> I would prefer

[Xen-devel] [qemu-mainline test] 104200: regressions - FAIL

2017-01-17 Thread osstest service owner
flight 104200 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/104200/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 5 xen-install fail REGR. vs. 104178 test-armhf-armhf-

Re: [Xen-devel] [PATCH v3 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2017-01-17 Thread George Dunlap
On Tue, Jan 17, 2017 at 11:22 AM, Andrew Cooper wrote: > On 16/01/17 16:16, Jan Beulich wrote: > On 16.01.17 at 17:05, wrote: >>> On 13/01/17 12:47, Jan Beulich wrote: The kernel already has to parse this structure anyway, and will know the bitness of its userspace

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 12:43, wrote: > On Tue, Jan 17, 2017 at 02:12:59AM -0700, Jan Beulich wrote: >> >>> On 16.01.17 at 18:44, wrote: >> > On Mon, Jan 16, 2017 at 09:50:53AM -0700, Jan Beulich wrote: >> >> >>> On 16.01.17 at 17:31, wrote: >> >> > On Mon, Jan 16, 2017 at 09:09:55AM -0700, Jan Beuli

Re: [Xen-devel] [PATCH v3 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 12:22, wrote: > On 16/01/17 16:16, Jan Beulich wrote: > On 16.01.17 at 17:05, wrote: >>> On 13/01/17 12:47, Jan Beulich wrote: The kernel already has to parse this structure anyway, and will know the bitness of its userspace process. We could ea

Re: [Xen-devel] [PATCH 4/4] x86: add multiboot2 protocol support for EFI platforms

2017-01-17 Thread Daniel Kiper
On Tue, Jan 17, 2017 at 12:05:21PM +, George Dunlap wrote: > On Mon, Jan 16, 2017 at 3:16 PM, Daniel Kiper wrote: [...] > >> Yes there are some code changes which is the point of me sending this. > >> But the work for you is the same as having to rebase your series over > >> the past few yea

[Xen-devel] [ovmf test] 104204: all pass - PUSHED

2017-01-17 Thread osstest service owner
flight 104204 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/104204/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 315d9d08fd77db1024ccc5307823da8aaed85e2f baseline version: ovmf 2b631390f9f5f6971c3c8

Re: [Xen-devel] [PATCH v2 2/6] x86/cpuid: Introduce recalculate_xstate()

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 12:27, wrote: > --- a/xen/arch/x86/cpuid.c > +++ b/xen/arch/x86/cpuid.c > @@ -80,6 +80,103 @@ static void sanitise_featureset(uint32_t *fs) >(fs[FEATURESET_e1d] & ~CPUID_COMMON_1D_FEATURES)); > } > > +static void recalculate_xstate(struct cpuid_pol

Re: [Xen-devel] IOMMU fault with IGD passthrough setup on XEN 4.8.0

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 11:49, wrote: > On Tue, Jan 17, 2017 at 12:11 AM, Jan Beulich wrote: > >> >>> On 16.01.17 at 16:15, wrote: >> > On Mon, Jan 16, 2017 at 9:56 PM, Jan Beulich wrote: >> > >> >> For building a debug hypervisor, all you need to do is set >> >> CONFIG_DEBUG=y in xen/.config. I do

Re: [Xen-devel] [PATCH v2 5/5] fix: add multiboot2 protocol support for EFI platforms

2017-01-17 Thread Jan Beulich
>>> On 16.01.17 at 15:15, wrote: > Doug v2 - new in this version to help show what's changed Thanks for providing this. > --- a/xen/arch/x86/boot/head.S > +++ b/xen/arch/x86/boot/head.S > @@ -519,6 +519,7 @@ trampoline_setup: > 1: > /* Switch to low-memory stack. */ > mov

Re: [Xen-devel] Xen ARM - Exposing a PL011 to the guest

2017-01-17 Thread Julien Grall
Hi, Sorry for the late answer, I am just back from holidays and still catching-up with my e-mails. On 03/01/17 20:08, Stefano Stabellini wrote: On Thu, 29 Dec 2016, Bhupinder Thakur wrote: On 28 December 2016 at 23:19, Julien Grall wrote: On 21/12/16 22:12, Stefano Stabellini wrote: On W

[Xen-devel] [xen-unstable-smoke test] 104206: tolerable all pass - PUSHED

2017-01-17 Thread osstest service owner
flight 104206 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/104206/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [Xen-devel] Xen ARM - Exposing a PL011 to the guest

2017-01-17 Thread Julien Grall
Hi, On 06/01/17 21:54, Stefano Stabellini wrote: On Fri, 6 Jan 2017, Bhupinder Thakur wrote: Hi, I am trying to allocate a new SPI VIRQ for sending pl011 interrupt to the guest OS. Currently Xen does not allow to allocate a SPI VIRQ for a guest domain. I tried allocating a new SPI VIRQ by call

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Roger Pau Monné
On Tue, Jan 17, 2017 at 05:33:41AM -0700, Jan Beulich wrote: > >>> On 17.01.17 at 12:43, wrote: > > On Tue, Jan 17, 2017 at 02:12:59AM -0700, Jan Beulich wrote: > >> >>> On 16.01.17 at 18:44, wrote: > >> > On Mon, Jan 16, 2017 at 09:50:53AM -0700, Jan Beulich wrote: > >> >> >>> On 16.01.17 at 17:

[Xen-devel] [ovmf baseline-only test] 68381: tolerable trouble: blocked/broken

2017-01-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68381 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68381/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-i3863 host-install(3) broken bas

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 15:13, wrote: > On Tue, Jan 17, 2017 at 05:33:41AM -0700, Jan Beulich wrote: >> >>> On 17.01.17 at 12:43, wrote: >> > If the PVH domain has access to an APIC and wants to use it it must parse >> > the >> > info from the MADT, or else it cannot get the APIC address or the APIC

Re: [Xen-devel] IOMMU fault with IGD passthrough setup on XEN 4.8.0

2017-01-17 Thread G.R.
On Tue, Jan 17, 2017 at 8:54 PM, Jan Beulich wrote: > >>> On 17.01.17 at 11:49, wrote: > > I was trying to figure out if I followed your instruction properly. > > My first attempt only resulted in a binary with similar size with my > > previous one. > > Probably something went wrong. > > I put m

Re: [Xen-devel] [PATCH v3 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2017-01-17 Thread Andrew Cooper
On 17/01/17 12:29, George Dunlap wrote: > On Tue, Jan 17, 2017 at 11:22 AM, Andrew Cooper > wrote: >> On 16/01/17 16:16, Jan Beulich wrote: >> On 16.01.17 at 17:05, wrote: On 13/01/17 12:47, Jan Beulich wrote: > The kernel already has to parse this structure anyway, and will know

Re: [Xen-devel] [PATCH v3 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2017-01-17 Thread Andrew Cooper
On 17/01/17 12:42, Jan Beulich wrote: > >>> And I'm not sure we really need to bother considering hypothetical >>> 128-bit architectures at this point in time. >> Because considering this case will avoid us painting ourselves into a >> corner. > Why would we consider this case h

Re: [Xen-devel] STAO spec in xen.git

2017-01-17 Thread Andrew Cooper
On 17/01/17 04:55, Juergen Gross wrote: > On 16/01/17 19:40, Stefano Stabellini wrote: >> On Mon, 16 Jan 2017, Ian Jackson wrote: >>> Stefano Stabellini writes ("Re: STAO spec in xen.git"): In that case, I think we should still commit it as ODT, but convert it automatically to PDF when we

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Boris Ostrovsky
On 01/17/2017 09:44 AM, Jan Beulich wrote: On 17.01.17 at 15:13, wrote: >> On Tue, Jan 17, 2017 at 05:33:41AM -0700, Jan Beulich wrote: >> On 17.01.17 at 12:43, wrote: If the PVH domain has access to an APIC and wants to use it it must parse the info from the MADT, or els

Re: [Xen-devel] [PATCH v2 2/6] x86/cpuid: Introduce recalculate_xstate()

2017-01-17 Thread Andrew Cooper
On 17/01/17 12:52, Jan Beulich wrote: On 17.01.17 at 12:27, wrote: >> --- a/xen/arch/x86/cpuid.c >> +++ b/xen/arch/x86/cpuid.c >> @@ -80,6 +80,103 @@ static void sanitise_featureset(uint32_t *fs) >>(fs[FEATURESET_e1d] & ~CPUID_COMMON_1D_FEATURES)); >> } >> >> +s

Re: [Xen-devel] [PATCH v2 2/6] x86/cpuid: Introduce recalculate_xstate()

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 16:15, wrote: > On 17/01/17 12:52, Jan Beulich wrote: > On 17.01.17 at 12:27, wrote: >>> @@ -154,6 +152,13 @@ struct cpuid_policy >>> }; >>> uint32_t /* b */:32, xss_low, xss_high; >>> }; >>> + >>> +/* Per-component common state.

Re: [Xen-devel] STAO spec in xen.git

2017-01-17 Thread Olaf Hering
On Fri, Jan 13, Julien Grall wrote: > Regarding the format. Does ODT will allow git to do proper diff? There is flat ODT, "Safe as ..." and pick the better format from the pulldown menu. Olaf signature.asc Description: PGP signature ___ Xen-devel ma

Re: [Xen-devel] [PATCH v3 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 16:13, wrote: > On 17/01/17 12:42, Jan Beulich wrote: >> And I'm not sure we really need to bother considering hypothetical 128-bit architectures at this point in time. >>> Because considering this case will avoid us painting ourselves into a >>> corner

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 16:27, wrote: > On 01/17/2017 09:44 AM, Jan Beulich wrote: > On 17.01.17 at 15:13, wrote: >>> There's only one kind of PVHv2 guest that doesn't require ACPI, and that >>> guest >>> type also doesn't have emulated local APICs. We agreed that this model was >>> interesting f

Re: [Xen-devel] [PATCH v2 2/6] x86/cpuid: Introduce recalculate_xstate()

2017-01-17 Thread Andrew Cooper
On 17/01/17 15:28, Jan Beulich wrote: On 17.01.17 at 16:15, wrote: >> On 17/01/17 12:52, Jan Beulich wrote: >> On 17.01.17 at 12:27, wrote: @@ -154,6 +152,13 @@ struct cpuid_policy }; uint32_t /* b */:32, xss_low, xss_high; }; +

Re: [Xen-devel] [PATCH v3 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 16:06, wrote: > On 17/01/17 12:29, George Dunlap wrote: >> On Tue, Jan 17, 2017 at 11:22 AM, Andrew Cooper >> wrote: >>> On 16/01/17 16:16, Jan Beulich wrote: >>> On 16.01.17 at 17:05, wrote: > On 13/01/17 12:47, Jan Beulich wrote: >> The kernel already has to

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Boris Ostrovsky
On 01/17/2017 10:33 AM, Jan Beulich wrote: On 17.01.17 at 16:27, wrote: >> On 01/17/2017 09:44 AM, Jan Beulich wrote: >> On 17.01.17 at 15:13, wrote: There's only one kind of PVHv2 guest that doesn't require ACPI, and that guest type also doesn't have emulated local APICs

[Xen-devel] [PATCH] xen/arm: bootfdt.c is only used during initialization

2017-01-17 Thread Julien Grall
This file contains data and code only used at initialization. Mark the file as such in the build system and correct kind_guess. Signed-off-by: Julien Grall --- xen/arch/arm/Makefile | 2 +- xen/arch/arm/bootfdt.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/xen/arch/ar

[Xen-devel] [PATCH] xen/arm: Don't mix GFN and MFN when using iomem_deny_access

2017-01-17 Thread Julien Grall
iomem_deny_access is working on MFN and not GFN. Make it clear by renaming the local variables. Signed-off-by: Julien Grall --- xen/arch/arm/domain_build.c | 6 +++--- xen/arch/arm/gic-v2.c | 18 +- xen/arch/arm/gic-v3.c | 18 +- 3 files changed, 21 i

Re: [Xen-devel] IOMMU fault with IGD passthrough setup on XEN 4.8.0

2017-01-17 Thread Jan Beulich
>>> On 17.01.17 at 16:08, wrote: > I was lucky to capture the full log before it fills up my 100MB ring buffer > (in less than 2 seconds). > Please find the log in the attachment. Sadly nothing helpful in there; I'm a little puzzled though that the first thing we see is (XEN) [VT-D]iommu.c:909:

[Xen-devel] [DRAFT C] PVH CPU hotplug design document

2017-01-17 Thread Roger Pau Monné
Hello, Below is a draft of a design document for PVHv2 CPU hotplug. It should cover both vCPU and pCPU hotplug. It's mainly centered around the hardware domain, since for unprivileged PVH guests the vCPU hotplug mechanism is already described in Boris series [0], and it's shared with HVM. The aim

[Xen-devel] [PATCH 1/5] xen: credit2: use the correct scratch cpumask.

2017-01-17 Thread Dario Faggioli
In fact, there is one scratch mask per each CPU. When you use the one of a CPU, it must be true that: - the CPU belongs to your cpupool and scheduler, - you own the runqueue lock (the one you take via {v,p}cpu_schedule_lock()) for that CPU. This was not the case within the following functions

[Xen-devel] [PATCH 0/5] xen: sched: scheduling (mostly, Credit2) and cpupool fixes and improvements

2017-01-17 Thread Dario Faggioli
Hello, This series fixes a few issues issues, related to Credit2 and to scheduling and cpupools interactions in a more general fashion. The first 3 patches cures (symptoms of) bugs in Credit2, and should be backported to 4.8 (it should not be too hard to do so, and I can help with that, if necess

[Xen-devel] [PATCH 3/5] xen: credit2: fix shutdown/suspend when playing with cpupools.

2017-01-17 Thread Dario Faggioli
In fact, during shutdown/suspend, we temporarily move all the vCPUs to the BSP (i.e., pCPU 0, as of now). For Credit2 domains, we call csched2_vcpu_migrate(), expects to find the target pCPU in the domain's pool Therefore, if Credit2 is the default scheduler and we have removed pCPU 0 from cpupool

[Xen-devel] [PATCH 5/5] xen: sched: simplify ACPI S3 resume path.

2017-01-17 Thread Dario Faggioli
In fact, when domains are being unpaused: - it's not necessary to put the vcpu to sleep, as they are all already paused; - it is not necessary to call vcpu_migrate(), as the vcpus are still paused, and therefore won't wakeup anyway. Basically, the only important thing is to call pick_cp

[Xen-devel] [PATCH v3] kexec: implement STATUS hypercall to check if image is loaded

2017-01-17 Thread Eric DeVolder
The tools that use kexec are asynchronous in nature and do not keep state changes. As such provide an hypercall to find out whether an image has been loaded for either type. Note: No need to modify XSM as it has one size fits all check and does not check for subcommands. Note: No need to check KE

[Xen-devel] [PATCH v4 5/8] dm_op: convert HVMOP_modified_memory

2017-01-17 Thread Paul Durrant
This patch introduces code to handle DMOP continuations. NOTE: This patch also modifies the type of the 'nr' argument of xc_hvm_modified_memory() from uint64_t to uint32_t. In practice the value passed was always truncated to 32 bits. Suggested-by: Jan Beulich Signed-off-by: Paul Dur

[Xen-devel] [PATCH v4 1/8] public / x86: Introduce __HYPERCALL_dm_op...

2017-01-17 Thread Paul Durrant
...as a set of hypercalls to be used by a device model. As stated in the new docs/designs/dm_op.markdown: "The aim of DMOP is to prevent a compromised device model from compromising domains other then the one it is associated with. (And is therefore likely already compromised)." See that file fo

[Xen-devel] [PATCH v4 6/8] dm_op: convert HVMOP_set_mem_type

2017-01-17 Thread Paul Durrant
This patch removes the need for handling HVMOP restarts, so that infrastructure is removed. NOTE: This patch also modifies the type of the 'nr' argument of xc_hvm_set_mem_type() from uint64_t to uint32_t. In practice the value passed was always truncated to 32 bits. Suggested-by: Jan

[Xen-devel] [PATCH v4 2/8] dm_op: convert HVMOP_*ioreq_server*

2017-01-17 Thread Paul Durrant
The definitions of HVM_IOREQSRV_BUFIOREQ_* have to persist as they are already in use by callers of the libxc interface. Suggested-by: Jan Beulich Signed-off-by: Paul Durrant -- Reviewed-by: Jan Beulich Cc: Ian Jackson Acked-by: Wei Liu Cc: Andrew Cooper Cc: Daniel De Graaf v4: - #define u

[Xen-devel] [PATCH v4 0/8] New hypercall for device models

2017-01-17 Thread Paul Durrant
Following on from the design submitted by Jennifer Herbert to the list [1] this series provides an implementation of __HYPERCALL_dm_op followed by patches based on Jan Beulich's previous HVMCTL series [2] to convert tools-only HVMOPs used by device models to DMOPs. [1] https://lists.xenproject.org

[Xen-devel] [PATCH v4 7/8] dm_op: convert HVMOP_inject_trap and HVMOP_inject_msi

2017-01-17 Thread Paul Durrant
NOTE: This patch also modifies the types of the 'vector', 'type' and 'insn_len' arguments of xc_hvm_inject_trap() from uint32_t to uint8_t. In practice the values passed were always truncated to 8 bits. Suggested-by: Jan Beulich Signed-off-by: Paul Durrant --- Reviewed-by: Jan

[Xen-devel] [PATCH v4 3/8] dm_op: convert HVMOP_track_dirty_vram

2017-01-17 Thread Paul Durrant
The handle type passed to the underlying shadow and hap functions is changed for compatibility with the new hypercall buffer. NOTE: This patch also modifies the type of the 'nr' parameter of xc_hvm_track_dirty_vram() from uint64_t to uint32_t. In practice the value passed was always tr

[Xen-devel] [PATCH v4 8/8] x86/hvm: serialize trap injecting producer and consumer

2017-01-17 Thread Paul Durrant
Since injection works on a remote vCPU, and since there's no enforcement of the subject vCPU being paused, there's a potential race between the producing and consuming sides. Fix this by leveraging the vector field as synchronization variable. Signed-off-by: Jan Beulich [re-based] Signed-off-by:

[Xen-devel] [PATCH v4 4/8] dm_op: convert HVMOP_set_pci_intx_level, HVMOP_set_isa_irq_level, and...

2017-01-17 Thread Paul Durrant
... HVMOP_set_pci_link_route These HVMOPs were exposed to guests so their definitions need to be preserved for compatibility. This patch therefore updates __XEN_LATEST_INTERFACE_VERSION__ to 0x00040900 and makes the HVMOP defintions conditional on __XEN_INTERFACE_VERSION__ less than that value. N

[Xen-devel] [PATCH 2/5] xen: credit2: never consider CPUs outside of our cpupool.

2017-01-17 Thread Dario Faggioli
In fact, relying on the mask of what pCPUs belong to which Credit2 runqueue is not enough. If we only do that, when Credit2 is the boot scheduler, we may ASSERT() or panic when moving a pCPU from Pool-0 to another cpupool. This is because pCPUs outside of any pool are considered part of cpupool0.

[Xen-devel] [PATCH 4/5] xen: sched: impove use of cpumask scratch space in Credit1.

2017-01-17 Thread Dario Faggioli
It is ok to use just cpumask_scratch in csched_runq_steal(). In fact, the cpu parameter comes from the cpu local variable in csched_load_balance(), which in turn comes from cpu in csched_schedule(), which is smp_processor_id(). While there, also: - move the comment about cpumask_scratch in the he

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Roger Pau Monné
On Tue, Jan 17, 2017 at 10:50:44AM -0500, Boris Ostrovsky wrote: > On 01/17/2017 10:33 AM, Jan Beulich wrote: > On 17.01.17 at 16:27, wrote: > >> On 01/17/2017 09:44 AM, Jan Beulich wrote: > >> On 17.01.17 at 15:13, wrote: > There's only one kind of PVHv2 guest that doesn't require

[Xen-devel] PV audio drivers for Linux

2017-01-17 Thread Ughreja, Rakesh A
Hi, I am trying to develop PV audio drivers and facing one issue to achieve zero copy of the buffers between Front End (DOM1) and Back End (DOM0) drivers. When the buffer is allocated using __get_free_pages() on the DOM0 OS, I am able to grant the access using gnttab_grant_foreign_access() to

Re: [Xen-devel] [PATCH] xen/common: Drop function calls for Xen compile/version information

2017-01-17 Thread Konrad Rzeszutek Wilk
On Mon, Jan 16, 2017 at 01:04:09PM +, Andrew Cooper wrote: > The chageset/version/compile information is currently exported as a set of > function calls into a separate translation unit, which is inefficient for all > callers. > > Replace the function calls with externs pointing appropriately

Re: [Xen-devel] [PATCH v2 2/2] swiotlb-xen: implement xen_swiotlb_get_sgtable callback

2017-01-17 Thread Konrad Rzeszutek Wilk
On Mon, Jan 16, 2017 at 05:09:24PM -0800, Stefano Stabellini wrote: > On Mon, 16 Jan 2017, Andrii Anisov wrote: > > From: Andrii Anisov > > > > Signed-off-by: Andrii Anisov > > Thanks for the patch! > > > > arch/arm/xen/mm.c | 11 +++ > > 1 file changed, 11 insertions(+) > > > > dif

Re: [Xen-devel] [PATCH] xen/common: Drop function calls for Xen compile/version information

2017-01-17 Thread Andrew Cooper
On 17/01/17 18:05, Konrad Rzeszutek Wilk wrote: > On Mon, Jan 16, 2017 at 01:04:09PM +, Andrew Cooper wrote: >> The chageset/version/compile information is currently exported as a set of >> function calls into a separate translation unit, which is inefficient for all >> callers. >> >> Replace t

Re: [Xen-devel] [PATCH] xen/common: Drop function calls for Xen compile/version information

2017-01-17 Thread Konrad Rzeszutek Wilk
On Tue, Jan 17, 2017 at 06:16:36PM +, Andrew Cooper wrote: > On 17/01/17 18:05, Konrad Rzeszutek Wilk wrote: > > On Mon, Jan 16, 2017 at 01:04:09PM +, Andrew Cooper wrote: > >> The chageset/version/compile information is currently exported as a set of > >> function calls into a separate tra

Re: [Xen-devel] PVH CPU hotplug design document

2017-01-17 Thread Boris Ostrovsky
On 01/17/2017 12:45 PM, Roger Pau Monné wrote: > On Tue, Jan 17, 2017 at 10:50:44AM -0500, Boris Ostrovsky wrote: >> On 01/17/2017 10:33 AM, Jan Beulich wrote: >> On 17.01.17 at 16:27, wrote: On 01/17/2017 09:44 AM, Jan Beulich wrote: On 17.01.17 at 15:13, wrote: >> There's

[Xen-devel] [xen-unstable test] 104202: tolerable FAIL - PUSHED

2017-01-17 Thread osstest service owner
flight 104202 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/104202/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 104181 test-armhf-armhf-libvirt-xs

Re: [Xen-devel] [PATCH] xen/common: Drop function calls for Xen compile/version information

2017-01-17 Thread Konrad Rzeszutek Wilk
On Tue, Jan 17, 2017 at 01:42:54PM -0500, Konrad Rzeszutek Wilk wrote: > On Tue, Jan 17, 2017 at 06:16:36PM +, Andrew Cooper wrote: > > On 17/01/17 18:05, Konrad Rzeszutek Wilk wrote: > > > On Mon, Jan 16, 2017 at 01:04:09PM +, Andrew Cooper wrote: > > >> The chageset/version/compile inform

Re: [Xen-devel] Xen ARM - Exposing a PL011 to the guest

2017-01-17 Thread Stefano Stabellini
On Tue, 17 Jan 2017, Julien Grall wrote: > Hi, > > Sorry for the late answer, I am just back from holidays and still catching-up > with my e-mails. > > On 03/01/17 20:08, Stefano Stabellini wrote: > > On Thu, 29 Dec 2016, Bhupinder Thakur wrote: > > > On 28 December 2016 at 23:19, Julien Grall w

[Xen-devel] [ovmf baseline-only test] 68383: tolerable trouble: blocked/broken

2017-01-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68383 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68383/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-i3863 host-install(3) broken bas

Re: [Xen-devel] STAO spec in xen.git

2017-01-17 Thread Stefano Stabellini
On Tue, 17 Jan 2017, Olaf Hering wrote: > On Fri, Jan 13, Julien Grall wrote: > > > Regarding the format. Does ODT will allow git to do proper diff? > > There is flat ODT, "Safe as ..." and pick the better format from the pulldown > menu. Sounds like a good idea. Can you submit a patch? __

[Xen-devel] [qemu-mainline test] 104208: tolerable FAIL - PUSHED

2017-01-17 Thread osstest service owner
flight 104208 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/104208/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt 15 guest-start/debian.repeatfail like 104176 test-armhf-armhf-libvirt-x

[Xen-devel] [PATCH v3 2/5] efi: build xen.gz with EFI code

2017-01-17 Thread Doug Goldstein
From: Daniel Kiper Build xen.gz with EFI code. We need this to support multiboot2 protocol on EFI platforms. If we wish to load non-ELF file using multiboot (v1) or multiboot2 then it must contain "linear" (or "flat") representation of code and data. This is requirement of both boot protocols. C

[Xen-devel] [PATCH v3 0/5] multiboot2 protocol support

2017-01-17 Thread Doug Goldstein
This is a series based on v11 of Daniel Kiper's "x86: multiboot2 protocol support" series. It aims to collect up all the fixes and changes that Andrew Cooper, Jan Beulich and myself discovered in code review and testing on actual hardware. I've had problems with the relocation portion of the series

[Xen-devel] [PATCH v3 3/5] efi: create new early memory allocator

2017-01-17 Thread Doug Goldstein
From: Daniel Kiper There is a problem with place_string() which is used as early memory allocator. It gets memory chunks starting from start symbol and goes down. Sadly this does not work when Xen is loaded using multiboot2 protocol because then the start lives on 1 MiB address and we should not

[Xen-devel] [PATCH v3 1/5] x86: add multiboot2 protocol support

2017-01-17 Thread Doug Goldstein
From: Daniel Kiper Add multiboot2 protocol support. Alter min memory limit handling as we now may not find it from either multiboot (v1) or multiboot2. This way we are laying the foundation for EFI + GRUB2 + Xen development. Signed-off-by: Daniel Kiper Reviewed-by: Jan Beulich Reviewed-by: Do

[Xen-devel] [PATCH v3 4/5] x86: add multiboot2 protocol support for EFI platforms

2017-01-17 Thread Doug Goldstein
From: Daniel Kiper This way Xen can be loaded on EFI platforms using GRUB2 and other boot loaders which support multiboot2 protocol. Signed-off-by: Daniel Kiper Reviewed-by: Doug Goldstein Tested-by: Doug Goldstein --- Doug v2 - dropped all my changes and moved them into their own patch Doug

[Xen-devel] [PATCH v3 5/5] fix: add multiboot2 protocol support for EFI platforms

2017-01-17 Thread Doug Goldstein
This should be squashed into the 4/4 patch 'x86: add multiboot2 protocol support for EFI platforms'. - fix incorrect assembly (identified by Andrew Cooper) - fix issue where the trampoline size was left as 0 and the way the memory is allocated for the trampolines we would go to the end of an a

Re: [Xen-devel] [PATCH] xen/common: Drop function calls for Xen compile/version information

2017-01-17 Thread Andrew Cooper
On 17/01/17 19:00, Konrad Rzeszutek Wilk wrote: > On Tue, Jan 17, 2017 at 01:42:54PM -0500, Konrad Rzeszutek Wilk wrote: >> On Tue, Jan 17, 2017 at 06:16:36PM +, Andrew Cooper wrote: >>> On 17/01/17 18:05, Konrad Rzeszutek Wilk wrote: On Mon, Jan 16, 2017 at 01:04:09PM +, Andrew Cooper

Re: [Xen-devel] [PATCH v3] kexec: implement STATUS hypercall to check if image is loaded

2017-01-17 Thread Andrew Cooper
On 17/01/17 17:29, Eric DeVolder wrote: > The tools that use kexec are asynchronous in nature and do not keep > state changes. As such provide an hypercall to find out whether an > image has been loaded for either type. > > Note: No need to modify XSM as it has one size fits all check and > does no

Re: [Xen-devel] [PATCH] xen/common: Drop function calls for Xen compile/version information

2017-01-17 Thread Konrad Rzeszutek Wilk
> > Is this patch of yours that neccessary? Could at least some of the > > functions still exist? > > Well. This patch is manually doing what LTO would do automatically when > it has a cross-translation-unit view of things, and come to the > conclusion that in all cases, inlining cross-unit will

[Xen-devel] [PATCH v2 2/2] xen-netback: protect resource cleaning on XenBus disconnect

2017-01-17 Thread Igor Druzhinin
vif->lock is used to protect statistics gathering agents from using the queue structure during cleaning. Signed-off-by: Igor Druzhinin --- drivers/net/xen-netback/interface.c | 6 -- drivers/net/xen-netback/xenbus.c| 2 ++ 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/dr

[Xen-devel] [PATCH v2 0/2] xen-netback: fix memory leaks on XenBus disconnect

2017-01-17 Thread Igor Druzhinin
Just split the initial patch in two as proposed by Wei. Since the approach for locking netdev statistics is inconsistent (tends not to have any locking at all) accross the kernel we'd better to rely on our internal lock for this purpose. Igor Druzhinin (2): xen-netback: fix memory leaks on XenB

[Xen-devel] [PATCH v2 1/2] xen-netback: fix memory leaks on XenBus disconnect

2017-01-17 Thread Igor Druzhinin
Eliminate memory leaks introduced several years ago by cleaning the queue resources which are allocated on XenBus connection event. Namely, queue structure array and pages used for IO rings. Signed-off-by: Igor Druzhinin --- drivers/net/xen-netback/xenbus.c | 11 +++ 1 file changed, 11 i

[Xen-devel] [seabios test] 104213: tolerable FAIL - PUSHED

2017-01-17 Thread osstest service owner
flight 104213 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/104213/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 104000 test-amd64-amd64-xl-qemuu-win7-a

Re: [Xen-devel] [PATCH v3] kexec: implement STATUS hypercall to check if image is loaded

2017-01-17 Thread Daniel Kiper
On Tue, Jan 17, 2017 at 11:29:16AM -0600, Eric DeVolder wrote: > The tools that use kexec are asynchronous in nature and do not keep > state changes. As such provide an hypercall to find out whether an > image has been loaded for either type. > > Note: No need to modify XSM as it has one size fits

[Xen-devel] [RFC] Device memory mappings for Dom0 on ARM64 ACPI systems

2017-01-17 Thread Stefano Stabellini
Hi all, I would like to discuss with ARM64 and ACPI Linux maintainers the best way to complete ACPI support in Linux for Dom0 on ARM64. As a reminder, Xen can only parse static ACPI tables. It doesn't have a bytecode interpreter. Xen maps all ACPI tables to Dom0, which parses them as it does on

Re: [Xen-devel] [PATCH] x86: Use ACPI reboot method for Dell OptiPlex 9020

2017-01-17 Thread Jan Beulich
>>> On 14.12.16 at 14:15, wrote: > On 14/12/16 12:58, Jan Beulich wrote: > On 14.12.16 at 12:12, wrote: >>> When EFI booting the Dell OptiPlex 9020, it sometimes GP faults in the >>> EFI runtime instead of rebooting. >> Has it been understood what the #GP is due to? I.e. is it namely >> not b

Re: [Xen-devel] [PATCH v2 1/3] xen: clean up xenbus internal headers

2017-01-17 Thread Boris Ostrovsky
On 01/16/2017 09:15 AM, Juergen Gross wrote: > The xenbus driver has an awful mixture of internally and globally > visible headers: some of the internally used only stuff is defined in > the global header include/xen/xenbus.h while some stuff defined in > internal headers is used by other drivers,

Re: [Xen-devel] Reading network data going into a VM from netback.c

2017-01-17 Thread Dario Faggioli
On Tue, 2017-01-17 at 06:02 +, #PATHANGI JANARDHANAN JATINSHRAVAN# wrote: > But I am not able to parse the hexadecimal string as shown above.  > > Can anyone point me in the right direction regarding this? > I'm afraid I can't. At the same time, I'm quite sure that by sending the same exact

Re: [Xen-devel] [PATCH] xen/arm: bootfdt.c is only used during initialization

2017-01-17 Thread Stefano Stabellini
On Tue, 17 Jan 2017, Julien Grall wrote: > This file contains data and code only used at initialization. Mark the > file as such in the build system and correct kind_guess. > > Signed-off-by: Julien Grall Reviewed-by: Stefano Stabellini > xen/arch/arm/Makefile | 2 +- > xen/arch/arm/bootfdt

Re: [Xen-devel] [PATCH] xen/arm: Don't mix GFN and MFN when using iomem_deny_access

2017-01-17 Thread Stefano Stabellini
On Tue, 17 Jan 2017, Julien Grall wrote: > iomem_deny_access is working on MFN and not GFN. Make it clear by > renaming the local variables. > > Signed-off-by: Julien Grall Reviewed-by: Stefano Stabellini > xen/arch/arm/domain_build.c | 6 +++--- > xen/arch/arm/gic-v2.c | 18 +

Re: [Xen-devel] PV audio drivers for Linux

2017-01-17 Thread Stefano Stabellini
On Tue, 17 Jan 2017, Ughreja, Rakesh A wrote: > Hi, > > I am trying to develop PV audio drivers and facing one issue to > achieve zero copy of the buffers between Front End (DOM1) and > Back End (DOM0) drivers. You might want to take a look at the existing PV sound proposal: http://marc.info/?

[Xen-devel] [PATCH] xen: credit2: clear bit instead of skip step in runq_tickle()

2017-01-17 Thread Dario Faggioli
Since we are doing cpumask manipulation already, clear a bit in the mask at once. Doing that will save us an if, later in the code. No functional change intended. Signed-off-by: Dario Faggioli --- Cc: George Dunlap --- xen/common/sched_credit2.c |5 ++--- 1 file changed, 2 insertions(+), 3

  1   2   >