Re: [Xen-devel] [PATCH v3] xen, input: try to read screen resolution for xen-kbdfront

2017-02-14 Thread Oleksandr Andrushchenko
Ping as I am also interested in modifying kbdfront... On 02/09/2017 03:45 PM, Juergen Gross wrote: On 30/01/17 16:10, Juergen Gross wrote: Instead of using the default resolution of 800*600 for the pointing device of xen-kbdfront try to read the resolution of the (virtual) framebuffer device. U

Re: [Xen-devel] [PATCH 1/4] x86/vmx: Don't leak host syscall MSR state into HVM guests

2017-02-14 Thread Tian, Kevin
> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew Cooper > Sent: Tuesday, February 14, 2017 3:59 PM > > On 14/02/2017 02:52, Tian, Kevin wrote: > >> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > >> Sent: Monday, February 13, 2017 10:32 PM > >> > >> hvm_hw_cpu->ms

Re: [Xen-devel] [PATCH 1/4] x86/vmx: Don't leak host syscall MSR state into HVM guests

2017-02-14 Thread Andrew Cooper
On 14/02/2017 08:04, Tian, Kevin wrote: >> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew >> Cooper >> Sent: Tuesday, February 14, 2017 3:59 PM >> >> On 14/02/2017 02:52, Tian, Kevin wrote: From: Andrew Cooper [mailto:andrew.coop...@citrix.com] Sent: Monday, Febr

[Xen-devel] [ovmf baseline-only test] 68555: all pass

2017-02-14 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68555 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68555/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 5b97eb4c35316cbe8235ae526209263da818e1a4 baseline v

Re: [Xen-devel] [PATCH 1/4] x86/vmx: Don't leak host syscall MSR state into HVM guests

2017-02-14 Thread Tian, Kevin
> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew Cooper > Sent: Tuesday, February 14, 2017 4:19 PM > > On 14/02/2017 08:04, Tian, Kevin wrote: > >> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew > Cooper > >> Sent: Tuesday, February 14, 2017 3:59 P

[Xen-devel] [PATCH v3 1/2] xen/grants: print grant number and handle in hex format

2017-02-14 Thread Roger Pau Monne
Due to the large number of grants in use it seems more useful to print the grant references and handlers in hex format rather than decimal. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek W

[Xen-devel] [PATCH v3 2/2] build/printf: fix incorrect format specifiers

2017-02-14 Thread Roger Pau Monne
The following incorrect format specifiers and incorrect number of parameters passed to printf like functions are reported by clang: mce.c:601:18: error: data argument not used by format string [-Werror,-Wformat-extra-args] smp_processor_id()); ^ xenpm.c:102:23:

[Xen-devel] [PATCH v3 0/2] Enable Wformat for clang

2017-02-14 Thread Roger Pau Monne
Hello, These patches fix the remaining issues so that Wformat can be enabled for clang. This patches have been tested on FreeBSD with clang 3.8, and travis: https://travis-ci.org/royger/xen/builds/201165863 Thanks, Roger. ___ Xen-devel mailing list X

Re: [Xen-devel] [PATCH] x86/VMX: sanitize VM86 TSS handling

2017-02-14 Thread Jan Beulich
>>> On 13.02.17 at 19:26, wrote: > On 13/02/17 13:19, Jan Beulich wrote: >> --- >> TBD: Do we really want to re-init the TSS every time we are about to >> use it? This can happen quite often during boot, especially while >> grub is running. > > The only case we need worry about is if th

[Xen-devel] [qemu-mainline test] 105781: tolerable FAIL - PUSHED

2017-02-14 Thread osstest service owner
flight 105781 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/105781/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 105279 test-armhf-armhf-libvirt-x

Re: [Xen-devel] [PATCH v3 2/3] xen/privcmd: Add IOCTL_PRIVCMD_DM_OP

2017-02-14 Thread Paul Durrant
My previous reply got bounced because my tablet insisted on using HTML... > -Original Message- > > These need to be static. (I can fix it when committing.) Ok, thanks. > > And I am still not sure about using XEN_PAGE_SIZE. There is no > dependency in the hypervisor on buffers being pag

Re: [Xen-devel] [PATCH] x86/vpmu: fix vpmu can't enabled in guest

2017-02-14 Thread Jan Beulich
>>> On 14.02.17 at 03:19, wrote: > vpmu_enable() can not use for check if vpmu is enabled in guest during > booting up. Because linux kernel get the status of if supported pmu > is earler than xen vpmu initialise. vpmu_enable() will return false > even if vpmu has been enabled in guest. > > Signe

Re: [Xen-devel] [PATCH v2] x86/paravirt: Don't make vcpu_is_preempted() a callee-save function

2017-02-14 Thread Peter Zijlstra
On Mon, Feb 13, 2017 at 05:34:01PM -0500, Waiman Long wrote: > It is the address of &steal_time that will exceed the 32-bit limit. That seems extremely unlikely. That would mean we have more than 4G worth of per-cpu variables declared in the kernel. ___

Re: [Xen-devel] [PATCH v6 3/7] xen/x86: populate PVHv2 Dom0 physical memory map

2017-02-14 Thread Roger Pau Monne
On Mon, Feb 13, 2017 at 06:53:49AM -0700, Jan Beulich wrote: > >>> On 10.02.17 at 13:33, wrote: > > --- > > Changes since v5: > > - Adjust the logic to set need_paging. > > - Remove the usage of the _AC macro. > > - Subtract memory from the end of regions instead of the start. > > - Create the

Re: [Xen-devel] [PATCH 1/4] x86/vmx: Don't leak host syscall MSR state into HVM guests

2017-02-14 Thread Jan Beulich
>>> On 14.02.17 at 09:40, wrote: >> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew >> Cooper >> Sent: Tuesday, February 14, 2017 4:19 PM >> >> On 14/02/2017 08:04, Tian, Kevin wrote: >> >> From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew >> Cooper

Re: [Xen-devel] [PATCH v6 3/7] xen/x86: populate PVHv2 Dom0 physical memory map

2017-02-14 Thread Roger Pau Monne
On Tue, Feb 14, 2017 at 10:10:16AM +, Roger Pau Monne wrote: > On Mon, Feb 13, 2017 at 06:53:49AM -0700, Jan Beulich wrote: > > >>> On 10.02.17 at 13:33, wrote: > > > --- a/xen/include/asm-x86/page.h > > > +++ b/xen/include/asm-x86/page.h > > > @@ -374,6 +374,18 @@ perms_strictly_increased(uin

Re: [Xen-devel] [PATCH v6 3/7] xen/x86: populate PVHv2 Dom0 physical memory map

2017-02-14 Thread Jan Beulich
>>> On 14.02.17 at 11:10, wrote: > On Mon, Feb 13, 2017 at 06:53:49AM -0700, Jan Beulich wrote: >> >>> On 10.02.17 at 13:33, wrote: >> > +static int __init pvh_steal_ram(struct domain *d, unsigned long size, >> > +unsigned long align, paddr_t limit, >> > +

Re: [Xen-devel] [PATCH] configure: disable bash check for FreeBSD

2017-02-14 Thread Wei Liu
On Mon, Feb 13, 2017 at 04:05:19PM +, Roger Pau Monne wrote: > On Mon, Feb 13, 2017 at 03:59:15PM +, Wei Liu wrote: > > On Mon, Feb 13, 2017 at 03:49:14PM +, Roger Pau Monne wrote: > > > Sorry, I've forgot to re-generate the patch after adding the > > > maintainers... > > > > > > On M

Re: [Xen-devel] [PATCH v6 3/7] xen/x86: populate PVHv2 Dom0 physical memory map

2017-02-14 Thread Jan Beulich
>>> On 14.02.17 at 11:19, wrote: > On Tue, Feb 14, 2017 at 10:10:16AM +, Roger Pau Monne wrote: >> On Mon, Feb 13, 2017 at 06:53:49AM -0700, Jan Beulich wrote: >> > >>> On 10.02.17 at 13:33, wrote: >> > > --- a/xen/include/asm-x86/page.h >> > > +++ b/xen/include/asm-x86/page.h >> > > @@ -374,

[Xen-devel] [PATCH 0/2] x86: context switch handling adjustments

2017-02-14 Thread Jan Beulich
1: VMX: fix VMCS race on context-switch paths 2: x86: package up context switch hook pointers Signed-off-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH] x86/vpmu: fix vpmu can't enabled in guest

2017-02-14 Thread Andrew Cooper
On 14/02/17 02:19, Luwei Kang wrote: > vpmu_enable() can not use for check if vpmu is enabled in guest during > booting up. Because linux kernel get the status of if supported pmu > is earler than xen vpmu initialise. vpmu_enable() will return false > even if vpmu has been enabled in guest. Sorry

[Xen-devel] [PATCH 1/2] VMX: fix VMCS race on context-switch paths

2017-02-14 Thread Jan Beulich
When __context_switch() is being bypassed during original context switch handling, the vCPU "owning" the VMCS partially loses control of it: It will appear non-running to remote CPUs, and hence their attempt to pause the owning vCPU will have no effect on it (as it already looks to be paused). At t

[Xen-devel] [PATCH 2/2] x86: package up context switch hook pointers

2017-02-14 Thread Jan Beulich
They're all solely dependent on guest type, so we don't need to repeat all the same four pointers in every vCPU control structure. Instead use static const structures, and store pointers to them in the domain control structure. Since touching it anyway, take the opportunity and move schedule_tail(

Re: [Xen-devel] [PATCH v4 0/3] x86/vvmx: correctly emulate VMREAD and VMWRITE

2017-02-14 Thread Andrew Cooper
On 13/02/17 14:21, Sergey Dyasli wrote: > Sergey Dyasli (3): > x86/vmx: introduce VMX_INSN_SUCCEED > x86/vvmx: correctly emulate VMWRITE > x86/vvmx: correctly emulate VMREAD Committed, thanks. ~Andrew ___ Xen-devel mailing list Xen-devel@lists.xe

Re: [Xen-devel] [PATCH 2/2] tools/libxl: Introduce LIBXL_CPUPOOL_POOLID_ANY

2017-02-14 Thread Wei Liu
On Thu, Feb 09, 2017 at 11:35:16AM +, George Dunlap wrote: > On 09/02/17 11:24, Wei Liu wrote: > > On Thu, Feb 09, 2017 at 11:17:46AM +, George Dunlap wrote: > >> On 09/02/17 10:35, Wei Liu wrote: > >>> On Wed, Feb 08, 2017 at 04:17:58PM +, George Dunlap wrote: > On 08/02/17 16:11,

Re: [Xen-devel] [PATCH 2/5] x86/hvm: Split the hypercall dispatching infrastructure out of hvm.c

2017-02-14 Thread Jan Beulich
>>> On 13.02.17 at 14:03, wrote: > --- /dev/null > +++ b/xen/arch/x86/hvm/hypercall.c > @@ -0,0 +1,332 @@ > +/** > + * arch/hvm/hypercall.c > + * > + * HVM hypercall dispatching routines > + * > + * This program is free so

Re: [Xen-devel] [PATCH 2/5] x86/hvm: Split the hypercall dispatching infrastructure out of hvm.c

2017-02-14 Thread Andrew Cooper
On 14/02/17 10:33, Jan Beulich wrote: On 13.02.17 at 14:03, wrote: >> --- /dev/null >> +++ b/xen/arch/x86/hvm/hypercall.c >> @@ -0,0 +1,332 @@ >> +/** >> + * arch/hvm/hypercall.c >> + * >> + * HVM hypercall dispatchin

Re: [Xen-devel] [PATCH 3/5] x86/hvm: Improve memory_op hypercall dispatching

2017-02-14 Thread Jan Beulich
>>> On 13.02.17 at 14:03, wrote: > --- a/xen/arch/x86/hvm/hypercall.c > +++ b/xen/arch/x86/hvm/hypercall.c > @@ -23,6 +23,29 @@ > > #include > > +static long hvm_memory_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg) > +{ > +struct vcpu *curr = current; const? (yes, you modify *curr->doma

Re: [Xen-devel] [PATCH 4/5] x86/hvm: Improve grant_table_op hypercall dispatching

2017-02-14 Thread Jan Beulich
>>> On 13.02.17 at 14:03, wrote: > hvm_grant_table_op() and hvm_grant_table_op_compat32() are almost identical, > but there is no need to have two functions instantiated at the end of > different function pointers. > > Combine the two into a single hvm_grant_table_op() (folding > grant_table_op_i

[Xen-devel] [PATCH] x86/vmx: fix compilation after 997382

2017-02-14 Thread Roger Pau Monne
997382 introduced the following errors: intr.c:342:46: error: address of array 'vlapic->regs->data' will always evaluate to 'true' [-Werror,-Wpointer-bool-conversion] if ( vlapic && vlapic->regs->data ) ~~ ~~^~~~ intr.c:352:42: error:

Re: [Xen-devel] [PATCH 5/5] x86/hvm: Improve physdev_op hypercall dispatching

2017-02-14 Thread Jan Beulich
>>> On 13.02.17 at 14:03, wrote: > --- a/xen/arch/x86/hvm/hypercall.c > +++ b/xen/arch/x86/hvm/hypercall.c > @@ -73,10 +73,12 @@ static long hvm_grant_table_op( > > static long hvm_physdev_op(int cmd, XEN_GUEST_HANDLE_PARAM(void) arg) > { > +struct vcpu *curr = current; With this constifi

Re: [Xen-devel] [PATCH 2/5] x86/hvm: Split the hypercall dispatching infrastructure out of hvm.c

2017-02-14 Thread Jan Beulich
>>> On 14.02.17 at 11:33, wrote: > On 14/02/17 10:33, Jan Beulich wrote: > On 13.02.17 at 14:03, wrote: >>> --- /dev/null >>> +++ b/xen/arch/x86/hvm/hypercall.c >>> @@ -0,0 +1,332 @@ >>> > +/*** > *** >>> + * arch/hvm/hy

[Xen-devel] [distros-debian-snapshot test] 68556: regressions - trouble: blocked/broken/fail/pass

2017-02-14 Thread Platform Team regression test user
flight 68556 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68556/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-i386-daily-netboot-pygrub 10 guest-start fail REGR. vs. 68530 test-

Re: [Xen-devel] [PATCH] x86/vmx: fix compilation after 997382

2017-02-14 Thread Jan Beulich
>>> On 14.02.17 at 11:37, wrote: > 997382 introduced the following errors: > > intr.c:342:46: error: address of array 'vlapic->regs->data' will always > evaluate to 'true' > [-Werror,-Wpointer-bool-conversion] > if ( vlapic && vlapic->regs->data ) >

Re: [Xen-devel] [PATCH] X86/vmx: Dump PIR and vIRR before ASSERT()

2017-02-14 Thread Jan Beulich
>>> On 07.02.17 at 00:32, wrote: > Commit c7bdecae42 ("x86/apicv: fix RTC periodic timer and apicv issue") has > added a assertion that intack.vector is the highest priority vector. But > according to the osstest, the assertion failed sometimes. More discussion can > be found in the thread > (http

Re: [Xen-devel] [PATCH] x86/vmx: fix compilation after 997382

2017-02-14 Thread Roger Pau Monne
On Tue, Feb 14, 2017 at 03:46:37AM -0700, Jan Beulich wrote: > >>> On 14.02.17 at 11:37, wrote: > > 997382 introduced the following errors: > > > > intr.c:342:46: error: address of array 'vlapic->regs->data' will always > > evaluate to 'true' > > [-Werror,-Wpointer-bool-conversion] > >

Re: [Xen-devel] [PATCH v2 01/11] x86emul: catch exceptions occurring in stubs

2017-02-14 Thread Andrew Cooper
On 13/02/17 16:20, Jan Beulich wrote: On 13.02.17 at 14:58, wrote: >> On 13/02/17 11:40, Jan Beulich wrote: >> On 10.02.17 at 17:38, wrote: On 01/02/17 11:12, Jan Beulich wrote: > Before adding more use of stubs cloned from decoded guest insns, guard > ourselves against mist

Re: [Xen-devel] [PATCH] x86/vpmu: fix vpmu can't enabled in guest

2017-02-14 Thread Kang, Luwei
> >>> On 14.02.17 at 03:19, wrote: > > vpmu_enable() can not use for check if vpmu is enabled in guest during > > booting up. Because linux kernel get the status of if supported pmu is > > earler than xen vpmu initialise. vpmu_enable() will return false even > > if vpmu has been enabled in guest.

[Xen-devel] [libvirt test] 105785: tolerable FAIL - PUSHED

2017-02-14 Thread osstest service owner
flight 105785 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/105785/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 105720 test-armhf-armhf-libvirt 13

Re: [Xen-devel] [PATCH] x86/vpmu: fix vpmu can't enabled in guest

2017-02-14 Thread Kang, Luwei
> On 14/02/17 02:19, Luwei Kang wrote: > > vpmu_enable() can not use for check if vpmu is enabled in guest during > > booting up. Because linux kernel get the status of if supported pmu is > > earler than xen vpmu initialise. vpmu_enable() will return false even > > if vpmu has been enabled in gues

Re: [Xen-devel] [PATCH 2/2] tools/libxl: Introduce LIBXL_CPUPOOL_POOLID_ANY

2017-02-14 Thread George Dunlap
On Tue, Feb 14, 2017 at 10:29 AM, Wei Liu wrote: > On Thu, Feb 09, 2017 at 11:35:16AM +, George Dunlap wrote: >> No. This is why I'm bothering to paint this bikeshed: In every context >> *except* "cpupool create", 0 means cpupool0 -- the one that was created >> at boot, which always contains

[Xen-devel] [PATCH v4 1/4] xen/grants: print grant number and handle in hex format

2017-02-14 Thread Roger Pau Monne
Due to the large number of grants in use it seems more useful to print the grant references and handlers in hex format rather than decimal. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek W

[Xen-devel] [PATCH v4 4/4] build: enable no-parentheses in clang

2017-02-14 Thread Roger Pau Monne
And fix the following errors reported: traps.c:2014:25: error: equality comparison with extraneous parentheses [-Werror,-Wparentheses-equality] else if ( (port == RTC_PORT(0)) ) ~^~ traps.c:2014:25: note: remove extraneous parentheses around the com

[Xen-devel] [PATCH v4 0/4] clang: don't disable any warnings

2017-02-14 Thread Roger Pau Monne
Hello, The following series removes the disable of certain clang warnings, after this all clang warnings are enabled. This supersedes "[PATCH v3 0/2] Enable Wformat for clang". It has been tested in FreeBSD with clang 3.8, and by travis, all OK: https://travis-ci.org/royger/xen/builds/201482055

[Xen-devel] [PATCH v4 2/4] build/printf: fix incorrect format specifiers

2017-02-14 Thread Roger Pau Monne
The following incorrect format specifiers and incorrect number of parameters passed to printf like functions are reported by clang: mce.c:601:18: error: data argument not used by format string [-Werror,-Wformat-extra-args] smp_processor_id()); ^ xenpm.c:102:23:

[Xen-devel] [PATCH v4 3/4] build: enable unused value checks for clang

2017-02-14 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan Cc: Wei Liu --- Config.mk | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/Config.mk b/Config.mk inde

[Xen-devel] [xen-unstable test] 105784: regressions - FAIL

2017-02-14 Thread osstest service owner
flight 105784 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/105784/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 105756 build-a

Re: [Xen-devel] [PATCH v3 0/2] Enable Wformat for clang

2017-02-14 Thread Roger Pau Monne
On Tue, Feb 14, 2017 at 08:46:56AM +, Roger Pau Monne wrote: > Hello, > > These patches fix the remaining issues so that Wformat can be enabled for > clang. This has now been superseded by "[PATCH v4 0/4] clang: don't disable any warnings". Please ignore this series. Roger.

Re: [Xen-devel] [xen-unstable test] 105784: regressions - FAIL

2017-02-14 Thread Roger Pau Monné
On Tue, Feb 14, 2017 at 12:31:00PM +, osstest service owner wrote: > flight 105784 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/105784/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-

[Xen-devel] [xen-unstable-smoke test] 105788: tolerable trouble: broken/fail/pass - PUSHED

2017-02-14 Thread osstest service owner
flight 105788 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/105788/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen

Re: [Xen-devel] [PATCH v4 4/4] build: enable no-parentheses in clang

2017-02-14 Thread Andrew Cooper
On 14/02/17 12:30, Roger Pau Monne wrote: > And fix the following errors reported: > > traps.c:2014:25: error: equality comparison with extraneous parentheses > [-Werror,-Wparentheses-equality] > else if ( (port == RTC_PORT(0)) ) >~^~ > traps.c:2014

Re: [Xen-devel] [PATCH v4 4/4] build: enable no-parentheses in clang

2017-02-14 Thread Jan Beulich
>>> On 14.02.17 at 13:30, wrote: > --- a/Config.mk > +++ b/Config.mk > @@ -212,9 +212,6 @@ CFLAGS += -std=gnu99 > > CFLAGS += -Wall -Wstrict-prototypes > > -# Clang complains about macros that expand to 'if ( ( foo == bar ) ) ...' > -CFLAGS-$(clang) += -Wno-parentheses Taking the comment bei

Re: [Xen-devel] [PATCH v4 3/4] build: enable unused value checks for clang

2017-02-14 Thread Jan Beulich
>>> On 14.02.17 at 13:30, wrote: > --- a/Config.mk > +++ b/Config.mk > @@ -213,8 +213,7 @@ CFLAGS += -std=gnu99 > CFLAGS += -Wall -Wstrict-prototypes > > # Clang complains about macros that expand to 'if ( ( foo == bar ) ) ...' > -# and is a bit too fierce about unused return values > -CFLAGS-

Re: [Xen-devel] [PATCH v4 4/4] build: enable no-parentheses in clang

2017-02-14 Thread Roger Pau Monne
On Tue, Feb 14, 2017 at 06:56:12AM -0700, Jan Beulich wrote: > >>> On 14.02.17 at 13:30, wrote: > > --- a/Config.mk > > +++ b/Config.mk > > @@ -212,9 +212,6 @@ CFLAGS += -std=gnu99 > > > > CFLAGS += -Wall -Wstrict-prototypes > > > > -# Clang complains about macros that expand to 'if ( ( foo =

Re: [Xen-devel] [PATCH v4 3/4] build: enable unused value checks for clang

2017-02-14 Thread Roger Pau Monne
On Tue, Feb 14, 2017 at 07:00:18AM -0700, Jan Beulich wrote: > >>> On 14.02.17 at 13:30, wrote: > > --- a/Config.mk > > +++ b/Config.mk > > @@ -213,8 +213,7 @@ CFLAGS += -std=gnu99 > > CFLAGS += -Wall -Wstrict-prototypes > > > > # Clang complains about macros that expand to 'if ( ( foo == bar

Re: [Xen-devel] [PATCH v4 4/4] build: enable no-parentheses in clang

2017-02-14 Thread Andrew Cooper
On 14/02/17 14:06, Roger Pau Monne wrote: > On Tue, Feb 14, 2017 at 06:56:12AM -0700, Jan Beulich wrote: > On 14.02.17 at 13:30, wrote: >>> --- a/Config.mk >>> +++ b/Config.mk >>> @@ -212,9 +212,6 @@ CFLAGS += -std=gnu99 >>> >>> CFLAGS += -Wall -Wstrict-prototypes >>> >>> -# Clang complai

Re: [Xen-devel] [PATCH v4 4/4] build: enable no-parentheses in clang

2017-02-14 Thread Jan Beulich
>>> On 14.02.17 at 15:13, wrote: > On 14/02/17 14:06, Roger Pau Monne wrote: >> On Tue, Feb 14, 2017 at 06:56:12AM -0700, Jan Beulich wrote: >> On 14.02.17 at 13:30, wrote: --- a/Config.mk +++ b/Config.mk @@ -212,9 +212,6 @@ CFLAGS += -std=gnu99 CFLAGS += -Wall -Ws

Re: [Xen-devel] [PATCH v3 2/3] xen/privcmd: Add IOCTL_PRIVCMD_DM_OP

2017-02-14 Thread Boris Ostrovsky
On 02/14/2017 04:20 AM, Paul Durrant wrote: My previous reply got bounced because my tablet insisted on using HTML... -Original Message- These need to be static. (I can fix it when committing.) Ok, thanks. And I am still not sure about using XEN_PAGE_SIZE. There is no dependency

Re: [Xen-devel] [PATCH 0/2] ocaml: Start on fixing brokenness when no ocamlopt

2017-02-14 Thread Julien Grall
(Resending the e-mail due to SMTP issue) On 02/14/2017 02:18 PM, Julien Grall wrote: Hi, Ping? As Ian mentioned earlier, without this series it is not possible to build Xen tools for ARM64 in osstest. Cheers, On 02/08/2017 07:50 PM, Julien Grall wrote: Hi, On 24/01/17 22:19, David Scott wro

Re: [Xen-devel] [PATCH] X86/vmx: Dump PIR and vIRR before ASSERT()

2017-02-14 Thread Julien Grall
(Resending the e-mail due to SMTP issue) On 02/14/2017 12:12 PM, Julien Grall wrote: Hi Jan, On 02/14/2017 10:51 AM, Jan Beulich wrote: On 07.02.17 at 00:32, wrote: Commit c7bdecae42 ("x86/apicv: fix RTC periodic timer and apicv issue") has added a assertion that intack.vector is the highest

Re: [Xen-devel] HostedXen: Build Instructions

2017-02-14 Thread Konrad Rzeszutek Wilk
On Tue, Feb 14, 2017 at 11:08:11AM +0530, rohan kumbhar wrote: > Hi, > > I am interested to restart Hosted Xen Project. > > I have gone through the presentation of Hosted Xen and Ian Pratt's video in > Xen Summit 9. > I have secured the source code for HostedXen from > https://downloads.xen.org/H

[Xen-devel] [qemu-mainline baseline-only test] 68557: regressions - trouble: blocked/broken/fail/pass

2017-02-14 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68557 qemu-mainline real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68557/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-xsm 6 xen-boot

Re: [Xen-devel] [PATCH v2] x86/paravirt: Don't make vcpu_is_preempted() a callee-save function

2017-02-14 Thread Waiman Long
On 02/14/2017 04:39 AM, Peter Zijlstra wrote: > On Mon, Feb 13, 2017 at 05:34:01PM -0500, Waiman Long wrote: >> It is the address of &steal_time that will exceed the 32-bit limit. > That seems extremely unlikely. That would mean we have more than 4G > worth of per-cpu variables declared in the kern

Re: [Xen-devel] qemu-upstream triggering OOM killer

2017-02-14 Thread Anthony PERARD
On Fri, Feb 10, 2017 at 02:54:23AM -0700, Jan Beulich wrote: > >>> On 09.02.17 at 23:24, wrote: > > On Thu, 9 Feb 2017, Jan Beulich wrote: > >> the recent qemuu update results in the produced binary triggering the > >> OOM killer on the first system I tried the updated code on. Is there > >> anyth

Re: [Xen-devel] [linux-linus test] 104684: regressions - FAIL

2017-02-14 Thread Julien Grall
Hi, On 01/26/2017 09:11 PM, Julien Grall wrote: Hi, On 26/01/2017 19:01, Boris Ostrovsky wrote: On 01/26/2017 12:18 PM, Ian Jackson wrote: Boris Ostrovsky writes ("Re: [Xen-devel] [linux-linus test] 104684: regressions - FAIL"): On 01/26/2017 08:23 AM, osstest service owner wrote: flight 10

Re: [Xen-devel] [PATCH] Make it compiler under Xen 4.7.

2017-02-14 Thread Konrad Rzeszutek Wilk
On Mon, Feb 13, 2017 at 08:46:29AM +, Paul Durrant wrote: > > -Original Message- > > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > > Sent: 10 February 2017 21:52 > > To: Paul Durrant ; xen-de...@lists.xenproject.org > > Cc: Konrad Rzeszutek Wilk > > Subject: [PATCH] Mak

Re: [Xen-devel] [PATCH v1] Make demu.git compiler under Xen 4.7 (and later)

2017-02-14 Thread Konrad Rzeszutek Wilk
On Mon, Feb 13, 2017 at 08:58:42AM +, Paul Durrant wrote: > > -Original Message- > > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > > Sent: 10 February 2017 21:52 > > To: Paul Durrant ; xen-de...@lists.xenproject.org > > Subject: [PATCH v1] Make demu.git compiler under Xe

Re: [Xen-devel] [PATCH 1/2] VMX: fix VMCS race on context-switch paths

2017-02-14 Thread Andrew Cooper
On 14/02/17 10:28, Jan Beulich wrote: > --- a/xen/arch/x86/hvm/vmx/vmcs.c > +++ b/xen/arch/x86/hvm/vmx/vmcs.c > @@ -552,6 +552,27 @@ static void vmx_load_vmcs(struct vcpu *v > local_irq_restore(flags); > } > > +void vmx_vmcs_reload(struct vcpu *v) > +{ > +/* > + * As we're running w

Re: [Xen-devel] [PATCH] Make it compiler under Xen 4.7.

2017-02-14 Thread Paul Durrant
> -Original Message- > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of > Konrad Rzeszutek Wilk > Sent: 14 February 2017 15:15 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org > Subject: Re: [Xen-devel] [PATCH] Make it compiler under Xen 4.7. > > On Mon, Feb 13

Re: [Xen-devel] [PATCH 2/2] x86: package up context switch hook pointers

2017-02-14 Thread Andrew Cooper
On 14/02/17 10:29, Jan Beulich wrote: > They're all solely dependent on guest type, so we don't need to repeat > all the same four pointers in every vCPU control structure. Instead use > static const structures, and store pointers to them in the domain > control structure. > > Since touching it any

Re: [Xen-devel] [PATCH v1] Make demu.git compiler under Xen 4.7 (and later)

2017-02-14 Thread Paul Durrant
> -Original Message- > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > Sent: 14 February 2017 15:16 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org > Subject: Re: [PATCH v1] Make demu.git compiler under Xen 4.7 (and later) > > On Mon, Feb 13, 2017 at 08:58:42AM +

Re: [Xen-devel] [PATCH v1] Make demu.git compiler under Xen 4.7 (and later)

2017-02-14 Thread Konrad Rzeszutek Wilk
On Tue, Feb 14, 2017 at 03:26:34PM +, Paul Durrant wrote: > > -Original Message- > > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > > Sent: 14 February 2017 15:16 > > To: Paul Durrant > > Cc: xen-de...@lists.xenproject.org > > Subject: Re: [PATCH v1] Make demu.git compil

[Xen-devel] [qemu-mainline test] 105787: tolerable FAIL - PUSHED

2017-02-14 Thread osstest service owner
flight 105787 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/105787/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 105781 test-armhf-armhf-libvirt-x

Re: [Xen-devel] [PATCH v1] Make demu.git compiler under Xen 4.7 (and later)

2017-02-14 Thread Paul Durrant
> -Original Message- > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > Sent: 14 February 2017 15:32 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org > Subject: Re: [PATCH v1] Make demu.git compiler under Xen 4.7 (and later) > > On Tue, Feb 14, 2017 at 03:26:34PM +

Re: [Xen-devel] [PATCH v1] Make demu.git compiler under Xen 4.7 (and later)

2017-02-14 Thread Konrad Rzeszutek Wilk
On Tue, Feb 14, 2017 at 03:39:00PM +, Paul Durrant wrote: > > -Original Message- > > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > > Sent: 14 February 2017 15:32 > > To: Paul Durrant > > Cc: xen-de...@lists.xenproject.org > > Subject: Re: [PATCH v1] Make demu.git compil

[Xen-devel] [linux-linus test] 105786: regressions - trouble: blocked/broken/fail/pass

2017-02-14 Thread osstest service owner
flight 105786 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/105786/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 15 guest-localmigrate/x10 fail REGR. vs. 592

Re: [Xen-devel] [PATCH] X86/vmx: Dump PIR and vIRR before ASSERT()

2017-02-14 Thread Julien Grall
Hi Jan, On 02/14/2017 10:51 AM, Jan Beulich wrote: On 07.02.17 at 00:32, wrote: Commit c7bdecae42 ("x86/apicv: fix RTC periodic timer and apicv issue") has added a assertion that intack.vector is the highest priority vector. But according to the osstest, the assertion failed sometimes. More di

Re: [Xen-devel] [PATCH] x86/VMX: sanitize VM86 TSS handling

2017-02-14 Thread Andrew Cooper
On 14/02/17 08:55, Jan Beulich wrote: On 13.02.17 at 19:26, wrote: >> On 13/02/17 13:19, Jan Beulich wrote: >>> --- >>> TBD: Do we really want to re-init the TSS every time we are about to >>> use it? This can happen quite often during boot, especially while >>> grub is running. >>

Re: [Xen-devel] [PATCH v7 01/24] docs: create Cache Allocation Technology (CAT) and Code and Data Prioritization (CDP) feature document

2017-02-14 Thread Konrad Rzeszutek Wilk
On Mon, Feb 13, 2017 at 02:32:13PM +0800, Yi Sun wrote: > This patch creates CAT and CDP feature document in doc/features/. It describes > key points to implement L3 CAT/CDP and L2 CAT which is described in details in > Intel SDM "INTEL® RESOURCE DIRECTOR TECHNOLOGY (INTEL® RDT) ALLOCATION > FEATU

Re: [Xen-devel] [PATCH] x86/mm: Alter is_xen_fixed_mfn() to use mfn_t

2017-02-14 Thread Julien Grall
Hi Andrew, On 02/07/2017 06:57 PM, Andrew Cooper wrote: The predicate is common between x86 and ARM, and is unlikley to be different/ NIT: s/unlikley/unlikely/ on other architectures. Drop the arch declarations and introduce a common static inline in xen/mm.h instead. Signed-off-by: Andrew

Re: [Xen-devel] [PATCH v7 04/24] x86: refactor psr: implement CPU init and free flow.

2017-02-14 Thread Konrad Rzeszutek Wilk
On Mon, Feb 13, 2017 at 02:32:16PM +0800, Yi Sun wrote: > This patch implements the CPU init and free flow including L3 CAT > initialization and feature list free. > > Signed-off-by: Yi Sun > --- > v7: > - initialize 'l3_cat'. > - fix typo. > - correct criteria to call 'free_feature'

Re: [Xen-devel] [PATCH] Make it compiler under Xen 4.7.

2017-02-14 Thread Paul Durrant
> -Original Message- [snip] > > Thank you. Keep in mind that it will likely break against > > older Xen versions (Xen 4.4?) as there is no xenctrl_compat.h > > I'm not sure you actually need to include that directly. I was going to try > just > adding the 'want compat' defines and seeing

Re: [Xen-devel] [PATCH v2] x86/paravirt: Don't make vcpu_is_preempted() a callee-save function

2017-02-14 Thread Peter Zijlstra
On Tue, Feb 14, 2017 at 09:46:17AM -0500, Waiman Long wrote: > On 02/14/2017 04:39 AM, Peter Zijlstra wrote: > > On Mon, Feb 13, 2017 at 05:34:01PM -0500, Waiman Long wrote: > >> It is the address of &steal_time that will exceed the 32-bit limit. > > That seems extremely unlikely. That would mean w

Re: [Xen-devel] [ARM] SMC (and HVC) handling in hypervisor

2017-02-14 Thread Julien Grall
Hi Tamas, On 13/02/17 16:20, Tamas K Lengyel wrote: On Fri, Feb 10, 2017 at 5:14 PM, Volodymyr Babchuk wrote: Hello, This e-mail is sort of follow-up to the two threads: [1] (my thread about TEE interaction) and [2] (Edgar's thread regarding handling SMC calls in platform_hvc). I want to disc

Re: [Xen-devel] [PATCH v2] x86/shadow: Correct guest behaviour when creating PTEs above maxphysaddr

2017-02-14 Thread Andrew Cooper
On 13/02/17 12:36, Jan Beulich wrote: On 13.02.17 at 12:00, wrote: >> @@ -502,11 +503,9 @@ void recalculate_cpuid_policy(struct domain *d) >> >> cpuid_featureset_to_policy(fs, p); >> >> -p->extd.maxphysaddr = min(p->extd.maxphysaddr, max->extd.maxphysaddr); >> p->extd.maxphy

Re: [Xen-devel] [PATCH v2] x86/paravirt: Don't make vcpu_is_preempted() a callee-save function

2017-02-14 Thread Andrew Cooper
On 14/02/17 14:46, Waiman Long wrote: > On 02/14/2017 04:39 AM, Peter Zijlstra wrote: >> On Mon, Feb 13, 2017 at 05:34:01PM -0500, Waiman Long wrote: >>> It is the address of &steal_time that will exceed the 32-bit limit. >> That seems extremely unlikely. That would mean we have more than 4G >> wor

Re: [Xen-devel] [ARM] SMC (and HVC) handling in hypervisor

2017-02-14 Thread Julien Grall
On 13/02/17 16:59, Tamas K Lengyel wrote: On Mon, Feb 13, 2017 at 9:37 AM, Julien Grall wrote: Hi Tamas, On 13/02/17 16:20, Tamas K Lengyel wrote: On Fri, Feb 10, 2017 at 5:14 PM, Volodymyr Babchuk wrote: Hello, This e-mail is sort of follow-up to the two threads: [1] (my thread about

[Xen-devel] [PATCH 3/4] docs: remove odt variant of STAO

2017-02-14 Thread Olaf Hering
Signed-off-by: Olaf Hering --- docs/misc/status-override-table-spec.odt | Bin 20206 -> 0 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/docs/misc/status-override-table-spec.odt b/docs/misc/status-override-table-spec.odt deleted file mode 100644 index 4ea576b2c248a70445a6a5

[Xen-devel] [PATCH 0/4] docs: convert from binary to ASCII

2017-02-14 Thread Olaf Hering
The odt files should have been saved as Flat XML via 'Save as ...'. git send-email warns about lines longer than 998 chars. Hopefully all involved mail services have no silly limits. Olaf Olaf Hering (4): docs: convert STAO from odt to fodt docs: convert XENV from odt to fodt docs: remove

[Xen-devel] [PATCH 4/4] docs: remove odt variant of XENV

2017-02-14 Thread Olaf Hering
Signed-off-by: Olaf Hering --- docs/misc/xen-env-table-spec.odt | Bin 19204 -> 0 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/docs/misc/xen-env-table-spec.odt b/docs/misc/xen-env-table-spec.odt deleted file mode 100644 index c8de7ca7d8e7d00dabe9d7bebef1e8117e47f95e..0

[Xen-devel] [PATCH 1/4] docs: convert STAO from odt to fodt

2017-02-14 Thread Olaf Hering
Fixes 140b31a8de ("Add STAO spec to docs/misc") Signed-off-by: Olaf Hering --- docs/misc/status-override-table-spec.fodt | 707 ++ 1 file changed, 707 insertions(+) diff --git a/docs/misc/status-override-table-spec.fodt b/docs/misc/status-override-table-spec.fodt ne

[Xen-devel] [PATCH 2/4] docs: convert XENV from odt to fodt

2017-02-14 Thread Olaf Hering
Fixes c33b5f013d ("Add XENV to docs/misc") Signed-off-by: Olaf Hering --- docs/misc/xen-env-table-spec.fodt | 852 ++ 1 file changed, 852 insertions(+) diff --git a/docs/misc/xen-env-table-spec.fodt b/docs/misc/xen-env-table-spec.fodt new file mode 100644 in

Re: [Xen-devel] STAO spec in xen.git

2017-02-14 Thread Olaf Hering
On Tue, Jan 17, Stefano Stabellini wrote: > On Tue, 17 Jan 2017, Olaf Hering wrote: > > On Fri, Jan 13, Julien Grall wrote: > > > > > Regarding the format. Does ODT will allow git to do proper diff? > > > > There is flat ODT, "Safe as ..." and pick the better format from the > > pulldown menu.

Re: [Xen-devel] [PATCH biosdevname]: handle dom0 on AMD systems

2017-02-14 Thread Olaf Hering
Hello, and ping. Olaf On Wed, Aug 17, Olaf Hering wrote: > Starting with xen-4.7 cpuid() will return with the hypervisor bit set > in a dom0 when running on an AMD system. As a result biosdevname > thinks it runs in a guest and does nothing. Detect a dom0 by looking > into xenfs. This works wi

[Xen-devel] [xen-unstable-smoke test] 105792: tolerable trouble: broken/fail/pass - PUSHED

2017-02-14 Thread osstest service owner
flight 105792 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/105792/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen

Re: [Xen-devel] [PATCH v2] x86/shadow: Correct guest behaviour when creating PTEs above maxphysaddr

2017-02-14 Thread Tim Deegan
At 16:04 + on 14 Feb (1487088291), Andrew Cooper wrote: > Hmm ok. With the other bugfix of not dropping the first line, this hunk > is now simply: > > @@ -504,7 +505,7 @@ void recalculate_cpuid_policy(struct domain *d) > > p->extd.maxphysaddr = min(p->extd.maxphysaddr, max->extd.maxphy

Re: [Xen-devel] [PATCH 0/2] ocaml: Start on fixing brokenness when no ocamlopt

2017-02-14 Thread Julien Grall
Hi, Ping? As Ian mentioned earlier, without this series it is not possible to build Xen tools for ARM64 in osstest. Cheers, On 02/08/2017 07:50 PM, Julien Grall wrote: Hi, On 24/01/17 22:19, David Scott wrote: On 24 Jan 2017, at 11:35, Ian Jackson wrote: Ian Jackson writes ("[PATCH 0/2

Re: [Xen-devel] [PATCH v4 2/4] build/printf: fix incorrect format specifiers

2017-02-14 Thread Wei Liu
On Tue, Feb 14, 2017 at 12:30:55PM +, Roger Pau Monne wrote: > The following incorrect format specifiers and incorrect number of parameters > passed to printf like functions are reported by clang: > > mce.c:601:18: error: data argument not used by format string > [-Werror,-Wformat-extra-args]

Re: [Xen-devel] [PATCH 1/2] tools/libxc: Introduce XC_CPUPOOL_POOLID_ANY

2017-02-14 Thread Wei Liu
These two patches don't apply anymore. Please rebase. Wei. ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [early RFC] ARM PCI Passthrough design document

2017-02-14 Thread Julien Grall
Hi Stefano, On 02/13/2017 07:59 PM, Stefano Stabellini wrote: > On Mon, 13 Feb 2017, Julien Grall wrote: >> Hi Stefano, >> >> On 10/02/17 01:01, Stefano Stabellini wrote: >>> On Fri, 3 Feb 2017, Edgar E. Iglesias wrote: A possible hack could be to allocate a chunk of DDR dedicated for PCI DMA

  1   2   >