Re: [Xen-devel] Install of Xen 4.8 on Fedora 25 makes the box unbootable.. which is due to /var/run/xen being created, instead of /run/xen

2017-02-16 Thread Olaf Hering
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Am Thu, 16 Feb 2017 08:58:01 +0100 schrieb Juergen Gross : > You can't assume ./configure is running on the same system as Xen is > being built for. I think its easy to decide at build time if the target has and/or uses "/run". And this will not chang

Re: [Xen-devel] Install of Xen 4.8 on Fedora 25 makes the box unbootable.. which is due to /var/run/xen being created, instead of /run/xen

2017-02-16 Thread Olaf Hering
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Am Thu, 16 Feb 2017 08:58:01 +0100 schrieb Juergen Gross : > You can't assume ./configure is running on the same system as Xen is > being built for. I think its easy to decide at build time if the target has and/or uses "/run". And this will not chang

Re: [Xen-devel] [PATCH 1/2] VMX: fix VMCS race on context-switch paths

2017-02-16 Thread Sergey Dyasli
On Wed, 2017-02-15 at 08:15 -0700, Jan Beulich wrote: > > > > On 15.02.17 at 15:55, wrote: > > > > On Wed, 2017-02-15 at 06:20 -0700, Jan Beulich wrote: > > > > > > On 15.02.17 at 11:27, wrote: > > > > > > > > This is what I'm getting during the original test case (32 VMs reboot): > > > > > >

Re: [Xen-devel] [PATCH v3] displif: add ABI for para-virtual display

2017-02-16 Thread Oleksandr Andrushchenko
On 02/15/2017 11:33 PM, Konrad Rzeszutek Wilk wrote: .snip.. I will define 2 sections: *-- Connector Request Transport Parameters --- * * ctrl-event-channel * ctrl-ring-ref * *--- Connector Event Transport Parameters ---

Re: [Xen-devel] [PATCH 1/3] xen/include: Remove explicit xen/config.h includes

2017-02-16 Thread Julien Grall
Hi Andrew, On 15/02/2017 18:10, Andrew Cooper wrote: This file is included automatically via CFLAGS. Signed-off-by: Andrew Cooper For the ARM bits: Acked-by: Julien Grall Regards, -- Julien Grall ___ Xen-devel mailing list Xen-devel@lists.xen.

Re: [Xen-devel] [PATCH 2/3] xen/include: Remove explicit asm/config.h includes

2017-02-16 Thread Julien Grall
Hi Andrew, On 15/02/2017 18:10, Andrew Cooper wrote: xen/config.h includes asm/config.h, and is included automatically via CFLAGS. Signed-off-by: Andrew Cooper Acked-by: Julien Grall Cheers, -- Julien Grall ___ Xen-devel mailing list Xen-devel@

Re: [Xen-devel] [PATCH 3/3] xen/include: Include xen/kconfig.h automatically

2017-02-16 Thread Julien Grall
Hi Andrew, On 15/02/2017 18:10, Andrew Cooper wrote: generated/autoconf.h is already included automatically so CONFIG_* defines are avaialble. However, the companion macros such as IS_ENABLED() are not NIT: s/avaialble/available/ included. Include them uniformally everywhere. Signed-off-b

[Xen-devel] backport of "x86/hvm: don't rely on shared ioreq state for completion handling" ?

2017-02-16 Thread Jan Beulich
Paul, as it looks to be quite non-trivial an operation, did you happen to have to backport commit 480b83162a to 4.4 or older, without backporting all the ioreq server stuff at the same time? It looks to me as if the issue predates the addition of ioreq servers, and us having had customer reports h

Re: [Xen-devel] [PATCH 1/2] VMX: fix VMCS race on context-switch paths

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 09:29, wrote: > On Wed, 2017-02-15 at 08:15 -0700, Jan Beulich wrote: >> > > > On 15.02.17 at 15:55, wrote: >> > Is it worth giving your patch another try with removing ctxt_switch_same() >> > since we figured out that vmx_do_resume() will reload vmcs either way? >> >> Yes, bu

Re: [Xen-devel] Install of Xen 4.8 on Fedora 25 makes the box unbootable.. which is due to /var/run/xen being created, instead of /run/xen

2017-02-16 Thread M A Young
On Thu, 16 Feb 2017, Juergen Gross wrote: > On 16/02/17 08:52, Olaf Hering wrote: > > Am Wed, 15 Feb 2017 15:51:12 -0500 > > schrieb Konrad Rzeszutek Wilk : > >> mkdir /run/xen > >> mkdir /run/xenstored > > > > This must be done by the startup scripts because the "run" directories, > > where ever

Re: [Xen-devel] [PATCH v15 05/10] x86: add multiboot2 protocol support for EFI platforms

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 22:53, wrote: > On Wed, Feb 15, 2017 at 03:22:02AM -0700, Jan Beulich wrote: >> >>> On 14.02.17 at 19:38, wrote: >> > --- a/xen/arch/x86/boot/head.S >> > +++ b/xen/arch/x86/boot/head.S >> > @@ -394,10 +394,18 @@ __start: >> > >> > /* EFI IA-32 platforms are not support

Re: [Xen-devel] Unable to boot Xen 4.8 with iommu=0

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 20:30, wrote: > On Wed, Feb 15, 2017 at 3:03 AM, Jan Beulich wrote: > On 15.02.17 at 00:21, wrote: >>> On 14/02/2017 22:47, Tamas K Lengyel wrote: (XEN) Switched to APIC driver x2apic_cluster. (XEN) XSM Framework v1.0.0 initialized (XEN) Flask: 128 avtab has

Re: [Xen-devel] [PATCH] xen/arm: increase default dom0_mem to 512M

2017-02-16 Thread Julien Grall
Hi Stefano, On 15/02/2017 23:05, Stefano Stabellini wrote: The default dom0_mem is 128M which is not sufficient to boot a Ubuntu based Dom0. Increase it to 512M. Signed-off-by: Stefano Stabellini I am not a big fan of increasing the default value. 128M is plenty enough if you use a small DO

Re: [Xen-devel] Unshared IOMMU issues

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 18:43, wrote: > 1. > I need: > Allow P2M core on ARM to update IOMMU mapping from the first "p2m_set_entry". > I do: > I explicitly set need_iommu flag for *every* guest domain during > iommu_domain_init() on ARM in case if page table is not shared. > At that moment I have no kn

Re: [Xen-devel] [PATCH] ACPICA: ACPI 6.0: Add support for IORT table.

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 23:34, wrote: > From: Lv Zheng > > ACPICA commit 5de82757aef5d6163e37064033aacbce193abbca > > This patch adds support for IORT (IO Remapping Table) in iasl. > > Note that some field names are modified to shrink their length or the > decompiled IORT ASL will contain fields wi

Re: [Xen-devel] backport of "x86/hvm: don't rely on shared ioreq state for completion handling" ?

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 16 February 2017 09:21 > To: Paul Durrant > Cc: xen-devel > Subject: backport of "x86/hvm: don't rely on shared ioreq state for > completion handling" ? > > Paul, > > as it looks to be quite non-trivial an opera

Re: [Xen-devel] backport of "x86/hvm: don't rely on shared ioreq state for completion handling" ?

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 11:13, wrote: >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: 16 February 2017 09:21 >> >> as it looks to be quite non-trivial an operation, did you happen to >> have to backport commit 480b83162a to 4.4 or older, without >> backporting all the ioreq server stuff at th

Re: [Xen-devel] [PATCH 1/2] xen/sched.h Whitespace and bool cleanup

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 18:39, wrote: > Extend the Maptrack comment to point at the Grant table subsystem. > > No functional change. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://l

Re: [Xen-devel] [PATCH 2/2] common/vcpu: Switch v->vcpu_info_mfn to mfn_t

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 18:39, wrote: > No functional change. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 1/3] xen/include: Remove explicit xen/config.h includes

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 19:10, wrote: > This file is included automatically via CFLAGS. > > Signed-off-by: Andrew Cooper Acked-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 3/3] xen/include: Include xen/kconfig.h automatically

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 19:10, wrote: > generated/autoconf.h is already included automatically so CONFIG_* defines are > avaialble. However, the companion macros such as IS_ENABLED() are not > included. > > Include them uniformally everywhere. Well, if you really think this is a good idea, I'm not g

Re: [Xen-devel] backport of "x86/hvm: don't rely on shared ioreq state for completion handling" ?

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 16 February 2017 10:23 > To: Paul Durrant > Cc: xen-devel > Subject: RE: backport of "x86/hvm: don't rely on shared ioreq state for > completion handling" ? > > >>> On 16.02.17 at 11:13, wrote: > >> From: Jan Be

Re: [Xen-devel] [PATCH] xen/multicall: Use the common hcall_preempted boolean

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 20:41, wrote: > The now-common hcall_preempted boolean is perfectly usable for multicalls. Something must have gone in the wrong order here: This is not part of a series, and I can't see hcall_preempted being common in staging. Jan ___

Re: [Xen-devel] [PATCH 3/3] xen/include: Include xen/kconfig.h automatically

2017-02-16 Thread Andrew Cooper
On 16/02/17 10:27, Jan Beulich wrote: On 15.02.17 at 19:10, wrote: >> generated/autoconf.h is already included automatically so CONFIG_* defines >> are >> avaialble. However, the companion macros such as IS_ENABLED() are not >> included. >> >> Include them uniformally everywhere. > Well, if

Re: [Xen-devel] [PATCH] xen/multicall: Use the common hcall_preempted boolean

2017-02-16 Thread Andrew Cooper
On 16/02/17 10:37, Jan Beulich wrote: On 15.02.17 at 20:41, wrote: >> The now-common hcall_preempted boolean is perfectly usable for multicalls. > Something must have gone in the wrong order here: This is not part > of a series, and I can't see hcall_preempted being common in > staging. Sorr

Re: [Xen-devel] [PATCH 1/7] x86/hypercall: Make the HVM hcall_preempted boolean common

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 20:41, wrote: > --- a/xen/include/xen/sched.h > +++ b/xen/include/xen/sched.h > @@ -202,6 +202,8 @@ struct vcpu > bool paused_for_shutdown; > /* VCPU need affinity restored */ > bool affinity_broken; > +/* A hypercall has been preempted

Re: [Xen-devel] backport of "x86/hvm: don't rely on shared ioreq state for completion handling" ?

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 11:36, wrote: >> -Original Message- >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: 16 February 2017 10:23 >> To: Paul Durrant >> Cc: xen-devel >> Subject: RE: backport of "x86/hvm: don't rely on shared ioreq state for >> completion handling" ? >> >> >>> On

Re: [Xen-devel] [PATCH 3/3] xen/include: Include xen/kconfig.h automatically

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 11:40, wrote: > On 16/02/17 10:27, Jan Beulich wrote: > On 15.02.17 at 19:10, wrote: >>> generated/autoconf.h is already included automatically so CONFIG_* defines >>> are >>> avaialble. However, the companion macros such as IS_ENABLED() are not >>> included. >>> >>> Incl

Re: [Xen-devel] backport of "x86/hvm: don't rely on shared ioreq state for completion handling" ?

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 16 February 2017 10:46 > To: Paul Durrant > Cc: xen-devel > Subject: RE: backport of "x86/hvm: don't rely on shared ioreq state for > completion handling" ? > > >>> On 16.02.17 at 11:36, wrote: > >> -Origin

[Xen-devel] [linux-linus test] 105824: regressions - FAIL

2017-02-16 Thread osstest service owner
flight 105824 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/105824/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu 6 xen-boot fail REGR. vs. 59254 test-armhf-armhf-xl

Re: [Xen-devel] backport of "x86/hvm: don't rely on shared ioreq state for completion handling" ?

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 11:53, wrote: >> -Original Message- >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: 16 February 2017 10:46 >> To: Paul Durrant >> Cc: xen-devel >> Subject: RE: backport of "x86/hvm: don't rely on shared ioreq state for >> completion handling" ? >> >> >>> On

Re: [Xen-devel] [PATCH 3/3] xen/include: Include xen/kconfig.h automatically

2017-02-16 Thread Andrew Cooper
On 16/02/17 10:48, Jan Beulich wrote: On 16.02.17 at 11:40, wrote: >> On 16/02/17 10:27, Jan Beulich wrote: >> On 15.02.17 at 19:10, wrote: generated/autoconf.h is already included automatically so CONFIG_* defines are avaialble. However, the companion macros such as IS_

Re: [Xen-devel] [PATCH 2/7] xen/multicall: Use the common hcall_preempted boolean

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 20:41, wrote: > The now-common hcall_preempted boolean is perfectly usable for multicalls. > Remove the multicall-specific preemption mechanism. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich ___ Xen-devel mailing lis

Re: [Xen-devel] [PATCH 4/7] x86/hypercall: Make the HVM hcall_64bit boolean common

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 20:41, wrote: > HVM guests currently make use of arch.hvm_vcpu.hcall_64bit to track the ABI of > the hypercall in use. > > The rest of Xen deals in terms of the comat ABI or not, so rename the boolean > and make it common, guared by CONFIG_COMPAT to avoid bloat if a compat ABI

Re: [Xen-devel] [PATCH 3/3] xen/include: Include xen/kconfig.h automatically

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 12:01, wrote: > On 16/02/17 10:48, Jan Beulich wrote: > On 16.02.17 at 11:40, wrote: >>> On 16/02/17 10:27, Jan Beulich wrote: >>> On 15.02.17 at 19:10, wrote: > generated/autoconf.h is already included automatically so CONFIG_* > defines > are > avaialbl

[Xen-devel] [PATCH v2 0/2] x86: context switch handling adjustments

2017-02-16 Thread Jan Beulich
1: VMX: fix VMCS race on context-switch paths 2: x86: package up context switch hook pointers Signed-off-by: Jan Beulich --- v2: Several changes to patch 1 (see there) requiring adjustment to patch 2 (again, see there). ___ Xen-devel mailing list X

Re: [Xen-devel] [PATCH] x86/VMX: sanitize VM86 TSS handling

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 12:21, wrote: > At 01:18 -0700 on 15 Feb (1487121525), Jan Beulich wrote: >> >>> On 14.02.17 at 18:33, wrote: >> >> TBD: Do we really want to re-init the TSS every time we are about to >> >> use it? >> > >> > No - I think we should init it when the guest writes the param(

[Xen-devel] [PATCH v2 1/2] VMX: fix VMCS race on context-switch paths

2017-02-16 Thread Jan Beulich
When __context_switch() is being bypassed during original context switch handling, the vCPU "owning" the VMCS partially loses control of it: It will appear non-running to remote CPUs, and hence their attempt to pause the owning vCPU will have no effect on it (as it already looks to be paused). At t

[Xen-devel] [PATCH v2 2/2] x86: package up context switch hook pointers

2017-02-16 Thread Jan Beulich
They're all solely dependent on guest type, so we don't need to repeat all the same three pointers in every vCPU control structure. Instead use static const structures, and store pointers to them in the domain control structure. Since touching it anyway, take the opportunity and expand schedule_ta

Re: [Xen-devel] backport of "x86/hvm: don't rely on shared ioreq state for completion handling" ?

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 16 February 2017 11:00 > To: Paul Durrant > Cc: xen-devel > Subject: RE: backport of "x86/hvm: don't rely on shared ioreq state for > completion handling" ? > > >>> On 16.02.17 at 11:53, wrote: > >> -Origin

Re: [Xen-devel] [dpdk-dev] [PATCH] maintainers: claim responsability for xen

2017-02-16 Thread Thomas Monjalon
2016-11-11 04:49, Tan, Jianfeng: > Hi Thomas and Konrad, > > On 11/11/2016 2:59 AM, Konrad Rzeszutek Wilk wrote: > > On Wed, Nov 9, 2016 at 5:03 PM, Thomas Monjalon wrote: > >> 2016-11-07 07:38, Jianfeng Tan: > >>> As some users are still using xen as the hypervisor, I suggest to > >>> continue su

Re: [Xen-devel] [PATCH] x86/hypercall: Split out PV hypercall infrastructure

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 20:41, wrote: > --- a/xen/arch/x86/hypercall.c > +++ b/xen/arch/x86/pv/hypercall.c > @@ -1,5 +1,7 @@ > /** > - * arch/x86/hypercall.c > + * arch/pv/hypercall.c arch/x86/pv/hypercall.c (if we really need

Re: [Xen-devel] backport of "x86/hvm: don't rely on shared ioreq state for completion handling" ?

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 12:17, wrote: > Roger's repro was with FreeBSD which is quite PV aware AFAIK. All my prior > testing was done with Windows. So, maybe this points at a problem with > libxl's behaviour when a guest is shutting down? Not impossible, but with what you say I will want to be even

Re: [Xen-devel] [PATCH] x86/hypercall: Move hypercall continuation logic

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 20:41, wrote: > The newly-repurposed arch/x86/hypercall.c is a more appropriate place for the > hypercall continuation logic to live. > > This is purely code motion. > > Signed-off-by: Andrew Cooper Acked-by: Jan Beulich ___ Xe

Re: [Xen-devel] [PATCH v2 2/2] x86: package up context switch hook pointers

2017-02-16 Thread Andrew Cooper
On 16/02/17 11:16, Jan Beulich wrote: > They're all solely dependent on guest type, so we don't need to repeat > all the same three pointers in every vCPU control structure. Instead use > static const structures, and store pointers to them in the domain > control structure. > > Since touching it an

Re: [Xen-devel] [PATCH] x86/VMX: sanitize VM86 TSS handling

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 12:14, wrote: On 15.02.17 at 12:21, wrote: >> At 01:18 -0700 on 15 Feb (1487121525), Jan Beulich wrote: >>> >>> On 14.02.17 at 18:33, wrote: >>> >> TBD: Do we really want to re-init the TSS every time we are about to >>> >> use it? >>> > >>> > No - I think we should

[Xen-devel] [xen-4.5-testing test] 105827: regressions - FAIL

2017-02-16 Thread osstest service owner
flight 105827 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/105827/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs. 104590 Tests whi

Re: [Xen-devel] [PATCH 3/3] xen/include: Include xen/kconfig.h automatically

2017-02-16 Thread Andrew Cooper
On 16/02/17 11:10, Jan Beulich wrote: On 16.02.17 at 12:01, wrote: >> On 16/02/17 10:48, Jan Beulich wrote: >> On 16.02.17 at 11:40, wrote: On 16/02/17 10:27, Jan Beulich wrote: On 15.02.17 at 19:10, wrote: >> generated/autoconf.h is already included automatically so C

Re: [Xen-devel] [PATCH 3/3] xen/include: Include xen/kconfig.h automatically

2017-02-16 Thread Julien Grall
Hi Jan, On 16/02/17 11:10, Jan Beulich wrote: On 16.02.17 at 12:01, wrote: On 16/02/17 10:48, Jan Beulich wrote: On 16.02.17 at 11:40, wrote: On 16/02/17 10:27, Jan Beulich wrote: On 15.02.17 at 19:10, wrote: generated/autoconf.h is already included automatically so CONFIG_* defines are

[Xen-devel] [RFC 3/6] Drop rangeset_domain_initialise()

2017-02-16 Thread Andrii Anisov
From: Andrii Anisov The rangeset_domain_initialise() does nothing rangeset specific. Even keeping it specific to domain looks not reasonable. So drop it. Signed-off-by: Andrii Anisov --- xen/common/domain.c| 3 ++- xen/common/rangeset.c | 7 --- xen/include/xen/rangeset.h | 4

[Xen-devel] [RFC 1/6] rangeset_new() refactoring

2017-02-16 Thread Andrii Anisov
From: Andrii Anisov rangeset_new is made domain agnostic. The domain specific code is moved to common/domain.c:domain_rangeset_new(). It is still left a rangesets list functionality: rangeset_new() is returning its list head if requested. This would be reconsidered further. Signed-off-by: Andri

[Xen-devel] [RFC 2/6] rangeset_destroy() refactoring

2017-02-16 Thread Andrii Anisov
From: Andrii Anisov rangeset_destroy is made domain agnostic. The domain specific code is moved to common/domain.c:domain_rangeset_destroy(). It is still left a rangesets list functionality: rangeset_destroy() will remove itself from a list. If a spinlock is provided it will be held for list del

[Xen-devel] [RFC 6/6] Drop domain remains from rangeset

2017-02-16 Thread Andrii Anisov
From: Andrii Anisov Signed-off-by: Andrii Anisov --- xen/common/rangeset.c | 3 +-- xen/include/xen/rangeset.h | 1 - 2 files changed, 1 insertion(+), 3 deletions(-) diff --git a/xen/common/rangeset.c b/xen/common/rangeset.c index c18fb21..857615b 100644 --- a/xen/common/rangeset.c +++ b/

[Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Andrii Anisov
From: Andrii Anisov Rangesets in XEN seems to be a pretty generic thing slightly poisoned with. domain specific funtionality in initialization and deinitialization code. So make the rangeset code generic with moving domain specific code to common/domain.c Andrii Anisov (6): rangeset_new() ref

[Xen-devel] [RFC 4/6] rangeset_domain_destroy() refactoring

2017-02-16 Thread Andrii Anisov
From: Andrii Anisov rangeset_domain_destroy() is rather rangeset list helper and does nothing really domain specific. So replace it with rangeset_list_destroy() helper. Signed-off-by: Andrii Anisov --- xen/common/domain.c| 4 ++-- xen/common/rangeset.c | 11 --- xen/inclu

[Xen-devel] [RFC 5/6] rangeset_domain_printk() refactoring

2017-02-16 Thread Andrii Anisov
From: Andrii Anisov rangeset_domain_printk() is split into generic rangeset_list_printk() function and domain specific common/domain.c:domain_rangeset_printk(). Signed-off-by: Andrii Anisov --- xen/common/domain.c| 14 ++ xen/common/keyhandler.c| 2 +- xen/common/range

Re: [Xen-devel] [PATCH] arm/hypercall: Use the common hcall_preempted boolean

2017-02-16 Thread Julien Grall
Hi Andrew, On 15/02/17 19:41, Andrew Cooper wrote: With hcall_preempted having just been made common, ARM can use use it to simplify its hypercall handling. This simplifies the continuation logic and removes the risk of accidentally skipping multiple instructions. Signed-off-by: Andrew Cooper

Re: [Xen-devel] [PATCH] xen/multicall: Use the common hcall_preempted boolean

2017-02-16 Thread Julien Grall
Hi Andrew, On 15/02/17 19:41, Andrew Cooper wrote: The now-common hcall_preempted boolean is perfectly usable for multicalls. Remove the multicall-specific preemption mechanism. Signed-off-by: Andrew Cooper For the ARM bits: Reviewed-by: Julien Grall Cheers, -- Julien Grall

Re: [Xen-devel] [RFC 1/6] rangeset_new() refactoring

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Andrii Anisov [mailto:andrii.ani...@gmail.com] > Sent: 16 February 2017 12:03 > To: xen-de...@lists.xenproject.org > Cc: andrii_ani...@epam.com; Andrew Cooper > ; George Dunlap > ; Ian Jackson ; > jbeul...@suse.com; konrad.w...@oracle.com; Paul Durrant > ; sstab

Re: [Xen-devel] Xen on ARM IRQ latency and scheduler overhead

2017-02-16 Thread Dario Faggioli
On Fri, 2017-02-10 at 10:32 -0800, Stefano Stabellini wrote: > On Fri, 10 Feb 2017, Dario Faggioli wrote: > > Right, interesting use case. I'm glad to see there's some interest > > in > > it, and am happy to help investigating, and trying to make things > > better. > > Thank you! > Hey, FYI, I am

Re: [Xen-devel] [RFC 2/6] rangeset_destroy() refactoring

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Andrii Anisov [mailto:andrii.ani...@gmail.com] > Sent: 16 February 2017 12:03 > To: xen-de...@lists.xenproject.org > Cc: andrii_ani...@epam.com; Andrew Cooper > ; George Dunlap > ; Ian Jackson ; > jbeul...@suse.com; konrad.w...@oracle.com; Paul Durrant > ; sstab

Re: [Xen-devel] [PATCH v2 1/2] VMX: fix VMCS race on context-switch paths

2017-02-16 Thread Andrew Cooper
On 16/02/17 11:15, Jan Beulich wrote: > When __context_switch() is being bypassed during original context > switch handling, the vCPU "owning" the VMCS partially loses control of > it: It will appear non-running to remote CPUs, and hence their attempt > to pause the owning vCPU will have no effect

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Andrii Anisov [mailto:andrii.ani...@gmail.com] > Sent: 16 February 2017 12:03 > To: xen-de...@lists.xenproject.org > Cc: andrii_ani...@epam.com; Andrew Cooper > ; George Dunlap > ; Ian Jackson ; > jbeul...@suse.com; konrad.w...@oracle.com; Paul Durrant > ; sstab

Re: [Xen-devel] [PATCH v2 1/2] VMX: fix VMCS race on context-switch paths

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 13:27, wrote: > On 16/02/17 11:15, Jan Beulich wrote: >> When __context_switch() is being bypassed during original context >> switch handling, the vCPU "owning" the VMCS partially loses control of >> it: It will appear non-running to remote CPUs, and hence their attempt >> to pa

Re: [Xen-devel] [PATCH 3/3] xen/include: Include xen/kconfig.h automatically

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 12:59, wrote: > On 16/02/17 11:10, Jan Beulich wrote: > On 16.02.17 at 12:01, wrote: >>> On 16/02/17 10:48, Jan Beulich wrote: >>> On 16.02.17 at 11:40, wrote: > On 16/02/17 10:27, Jan Beulich wrote: > On 15.02.17 at 19:10, wrote: >>> generated/autocon

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Andrii Anisov
Dear Paul, > The cleanup seems a good thing to do to me. So I would collect comments, rebase it to latest master and push the second version without RFC. > Any particular reason this series is RFC? The reason to make this series was an intention to use rangesets to manage mmio ranges in our sha

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Andrii Anisov [mailto:andrii.ani...@gmail.com] > Sent: 16 February 2017 12:46 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org; andrii_ani...@epam.com; Andrew > Cooper ; George Dunlap > ; Ian Jackson ; > jbeul...@suse.com; konrad.w...@oracle.com; sstabel

Re: [Xen-devel] [PATCH v2] libxl: correct xenstore entry for empty cdrom

2017-02-16 Thread Wei Liu
On Wed, Feb 15, 2017 at 12:11:12PM +0100, Juergen Gross wrote: > Specifying an empty cdrom device will result in a Xenstore entry > > params = aio:(null) > > as the physical device path isn't existing. This lets a domain booted > via OVMF hang as OVMF is checking for "aio:" only in order to detec

Re: [Xen-devel] [PATCH 1/2] tools/libxc: Introduce XC_CPUPOOL_POOLID_ANY

2017-02-16 Thread Wei Liu
Both patches applied. ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Andrii Anisov
Dear Paul, > Many moons ago there were patches to use rbtree for rangesets. Perhaps it > would be worth reviving that idea? rbtree is a thing I think of now for our needs. Even more, currently I think of refactoring ARM mmio ranges managing to use rbtree one day. Currently there is a static array

Re: [Xen-devel] [RFC 1/6] rangeset_new() refactoring

2017-02-16 Thread Andrii Anisov
>> +if ( d != NULL ) > > Shouldn't d == NULL be a hard error now, in which you could pass d->rangesets > directly into rangeset_new() (under lock). It definitely should. Because this is a domain specific code. Sincerely, Andrii Anisov. ___ Xen-dev

[Xen-devel] [xen-4.6-testing test] 105831: tolerable FAIL - PUSHED

2017-02-16 Thread osstest service owner
flight 105831 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/105831/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 105685 test-armhf-armhf-libvirt

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Andrii Anisov
Paul, > Many moons ago there were patches to use rbtree for rangesets. Perhaps it > would be worth reviving that idea? Do you have a link to look at those patches? Sincerely, Andrii Anisov. ___ Xen-devel mailing list Xen-devel@lists.xen.org https://li

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 13:45, wrote: > Dear Paul, > >> The cleanup seems a good thing to do to me. > > So I would collect comments, rebase it to latest master and push the > second version without RFC. > >> Any particular reason this series is RFC? > > The reason to make this series was an intenti

Re: [Xen-devel] [dpdk-dev] [PATCH] maintainers: claim responsability for xen

2017-02-16 Thread Konrad Rzeszutek Wilk
On Thu, Feb 16, 2017 at 12:06:18PM +0100, Thomas Monjalon wrote: > 2016-11-11 04:49, Tan, Jianfeng: > > Hi Thomas and Konrad, > > > > On 11/11/2016 2:59 AM, Konrad Rzeszutek Wilk wrote: > > > On Wed, Nov 9, 2016 at 5:03 PM, Thomas Monjalon wrote: > > >> 2016-11-07 07:38, Jianfeng Tan: > > >>> As s

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Andrii Anisov
Dear Jan, > If this is meant to be per-domain management - how many such > ranges do you expect to be necessary for any one domain? We've > had attempts before to (ab)use rangesets for such a purpose. It is meant to be the per-domain management. To handle per-domain vcoproc register access emulati

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Andrii Anisov
Dear Jan, I'm really sorry, but I did not get your point here: > This concern makes me assume there might be quite many of them, > which then makes this a no-go for unprivileged domains. Could you please provide wider explanation. Sincerely, Andrii Anisov. _

Re: [Xen-devel] [dpdk-dev] [PATCH] maintainers: claim responsability for xen

2017-02-16 Thread Vincent JARDIN
Le 16/02/2017 à 12:06, Thomas Monjalon a écrit : The request (6 month ago) was to give more time for feedbacks: http://dpdk.org/ml/archives/dev/2016-July/044847.html Is it time now to officially remove Dom0 support? yes ___ Xen-devel mailing

Re: [Xen-devel] [PATCH] build: add --with-rundir option to configure

2017-02-16 Thread Boris Ostrovsky
On 02/16/2017 02:47 AM, Juergen Gross wrote: There have been reports that Fedora 25 uses /run instead of /var/run. Add a --with-rundir option ito configure to be able to specify that directory. Default is still /var/run. As discussed on the other thread, why not make default be the location

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Andrii Anisov [mailto:andrii.ani...@gmail.com] > Sent: 16 February 2017 13:24 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org; andrii_ani...@epam.com; Andrew > Cooper ; George Dunlap > ; Ian Jackson ; > jbeul...@suse.com; konrad.w...@oracle.com; sstabel

Re: [Xen-devel] [PATCH] build: add --with-rundir option to configure

2017-02-16 Thread Andrew Cooper
On 16/02/17 13:52, Boris Ostrovsky wrote: > > > On 02/16/2017 02:47 AM, Juergen Gross wrote: >> There have been reports that Fedora 25 uses /run instead of /var/run. >> >> Add a --with-rundir option ito configure to be able to specify that >> directory. Default is still /var/run. > > As discussed o

Re: [Xen-devel] [PATCH] build: add --with-rundir option to configure

2017-02-16 Thread Juergen Gross
On 16/02/17 14:52, Boris Ostrovsky wrote: > > > On 02/16/2017 02:47 AM, Juergen Gross wrote: >> There have been reports that Fedora 25 uses /run instead of /var/run. >> >> Add a --with-rundir option ito configure to be able to specify that >> directory. Default is still /var/run. > > As discusse

Re: [Xen-devel] [RFC 2/6] rangeset_destroy() refactoring

2017-02-16 Thread Andrii Anisov
Dear Paul, >> It is still left a rangesets list functionality: rangeset_destroy() >> will remove itself from a list. If a spinlock is provided it will be >> held for list deletion operation. This would be reconsidered further. >> > > Maybe use the same scheme in patch #1 then and pass the lock, as

[Xen-devel] [distros-debian-wheezy test] 68566: tolerable trouble: broken/pass

2017-02-16 Thread Platform Team regression test user
flight 68566 distros-debian-wheezy real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68566/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: build-arm64 2 hosts-allocate broken never pass build-arm64-pvops

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Andrii Anisov
> The relevant patch is: > > https://lists.xenproject.org/archives/html/xen-devel/2015-12/msg01619.html Thank you for the link. I would try to realize why it is left unmerged. Sincerely, Andrii Anisov. 2017-02-16 16:02 GMT+02:00 Paul Durrant : >> -Original Message- >> From: Andrii Aniso

Re: [Xen-devel] [RFC 2/6] rangeset_destroy() refactoring

2017-02-16 Thread Paul Durrant
> -Original Message- > From: Andrii Anisov [mailto:andrii.ani...@gmail.com] > Sent: 16 February 2017 14:26 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org; andrii_ani...@epam.com; Andrew > Cooper ; George Dunlap > ; Ian Jackson ; > jbeul...@suse.com; konrad.w...@oracle.com; sstabel

Re: [Xen-devel] [RFC 0/6] Rangeset generalisation

2017-02-16 Thread Jan Beulich
>>> On 16.02.17 at 14:42, wrote: > I'm really sorry, but I did not get your point here: > >> This concern makes me assume there might be quite many of them, >> which then makes this a no-go for unprivileged domains. > > Could you please provide wider explanation. Well, as it had been discussed

Re: [Xen-devel] [PATCH 1/1] xen/arm: Add pl011 uart support in Xen for guest domains

2017-02-16 Thread Julien Grall
Hi, On 15/02/17 15:38, Konrad Rzeszutek Wilk wrote: On Wed, Feb 15, 2017 at 12:53:34PM +0530, Bhupinder Thakur wrote: Hi Konrad, Thanks for the feedback. On 7 February 2017 at 00:05, Konrad Rzeszutek Wilk wrote: On Mon, Feb 06, 2017 at 11:39:08PM +0530, Bhupinder Thakur wrote: As per "VM S

Re: [Xen-devel] [PATCH] build: add --with-rundir option to configure

2017-02-16 Thread Juergen Gross
On 16/02/17 15:12, Andrew Cooper wrote: > On 16/02/17 13:52, Boris Ostrovsky wrote: >> >> >> On 02/16/2017 02:47 AM, Juergen Gross wrote: >>> There have been reports that Fedora 25 uses /run instead of /var/run. >>> >>> Add a --with-rundir option ito configure to be able to specify that >>> directo

Re: [Xen-devel] [PATCH] [RFC] x86/kconfig: Introduce CONFIG_PV and CONFIG_HVM

2017-02-16 Thread Jan Beulich
>>> On 15.02.17 at 20:41, wrote: > Making PV and HVM guests individually compilable is useful as a reduction in > hypervisor size, and as an aid to enforcing clean API boundaries. > > Introduce CONFIG_PV and CONFIG_HVM, although there is a lot of work to do > until either can actually be disabled

Re: [Xen-devel] [linux-linus test] 104684: regressions - FAIL

2017-02-16 Thread Julien Grall
Hi, On 14/02/17 17:42, Wei Liu wrote: (test-lab)liuw@osstest:~/testing.git$ ./mg-hosts showprops | grep DTUART | grep arndale arndale-bluewater XenDTUARTPath /serial@12C2 arndale-lakeside XenDTUARTPath /serial@12C2 arndale-metrocentre XenDTUARTPat

Re: [Xen-devel] [PATCH] [RFC] x86/kconfig: Introduce CONFIG_PV and CONFIG_HVM

2017-02-16 Thread Andrew Cooper
On 16/02/17 14:39, Jan Beulich wrote: On 15.02.17 at 20:41, wrote: >> Making PV and HVM guests individually compilable is useful as a reduction in >> hypervisor size, and as an aid to enforcing clean API boundaries. >> >> Introduce CONFIG_PV and CONFIG_HVM, although there is a lot of work to

[Xen-devel] [ovmf test] 105837: all pass - PUSHED

2017-02-16 Thread osstest service owner
flight 105837 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/105837/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf fd12acdeff7a04ad34ccb95103eb6204b8901749 baseline version: ovmf cb8674999c6bf94cdb3be

[Xen-devel] [PATCH] x86/vpmu: Add get/put_vpmu() and VPMU_ENABLED

2017-02-16 Thread Boris Ostrovsky
vpmu_enabled() (used by hvm/pv_cpuid() to properly report 0xa leaf for Intel processors) is based on the value of VPMU_CONTEXT_ALLOCATED bit. This is problematic: * For HVM guests VPMU context is allocated lazily, during the first access to VPMU MSRs. Since the leaf is typically queried before gu

Re: [Xen-devel] Unshared IOMMU issues

2017-02-16 Thread Oleksandr Tyshchenko
Hi, Jan. On Thu, Feb 16, 2017 at 11:36 AM, Jan Beulich wrote: On 15.02.17 at 18:43, wrote: >> 1. >> I need: >> Allow P2M core on ARM to update IOMMU mapping from the first "p2m_set_entry". >> I do: >> I explicitly set need_iommu flag for *every* guest domain during >> iommu_domain_init() on

[Xen-devel] [xen-4.4-testing test] 105835: tolerable trouble: blocked/broken/fail/pass - PUSHED

2017-02-16 Thread osstest service owner
flight 105835 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/105835/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-qemut-rhel6hvm-amd 3 host-install(3)broken pass in 105815 test-amd64-i386-libvirt

Re: [Xen-devel] qemu-upstream triggering OOM killer

2017-02-16 Thread Jan Beulich
>>> On 14.02.17 at 15:56, wrote: > On Fri, Feb 10, 2017 at 02:54:23AM -0700, Jan Beulich wrote: >> Not so far. It appears to happen when grub clears the screen >> before displaying its graphical menu, so I'd rather suspect an issue >> with a graphics related change (the one you pointed out isn't).

[Xen-devel] [xen-4.7-testing test] 105833: regressions - trouble: blocked/broken/fail/pass

2017-02-16 Thread osstest service owner
flight 105833 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/105833/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 15 guest-localmigrate/x10 fail REGR. vs.

[Xen-devel] [xen-unstable-smoke test] 105852: tolerable trouble: broken/fail/pass - PUSHED

2017-02-16 Thread osstest service owner
flight 105852 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/105852/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen

[Xen-devel] [PATCH] libxc: don't pass uninitialized data to do_dm_op()

2017-02-16 Thread Jan Beulich
do_dm_op() expects (void *, size_t) pairs, but with nr being uint32_t the type of the expression of xc_hvm_track_dirty_vram()'s last argument to the function is only a 32 bits one. Neither C nor the ABI require the compiler to promote the type beyond int. Signed-off-by: Jan Beulich --- a/tools/l

  1   2   3   >