Re: [Xen-devel] [PATCH] xen/x86: ensure copying to L1 guest in update_runstate_area()

2017-02-23 Thread Haozhong Zhang
On 02/22/17 00:46 -0700, Jan Beulich wrote: > >>> On 22.02.17 at 03:20, wrote: > > On 02/22/17 09:28 +0800, Haozhong Zhang wrote: > >> On 02/21/17 02:15 -0700, Jan Beulich wrote: > >> > >>> On 21.02.17 at 03:11, wrote: > > [..] > >> > > + * > >> > > + * Therefore, we clear the nested gue

Re: [Xen-devel] [PATCH 16/19] x86/vmce: enable injecting LMCE to guest on Intel host

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 05:48, wrote: > On 02/22/17 08:48 -0700, Jan Beulich wrote: >> >>> On 17.02.17 at 07:39, wrote: >> > --- a/xen/arch/x86/cpu/mcheck/mcaction.c >> > +++ b/xen/arch/x86/cpu/mcheck/mcaction.c >> > @@ -88,17 +88,19 @@ mc_memerr_dhandler(struct mca_binfo *binfo, >> >

Re: [Xen-devel] [PATCH 18/19] xen/mce: add support of vLMCE injection to XEN_MC_inject_v2

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 06:14, wrote: > On 02/22/17 08:59 -0700, Jan Beulich wrote: >> >>> On 17.02.17 at 07:39, wrote: >> > @@ -1552,6 +1553,21 @@ long do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) >> > u_xen_mc) >> > send_IPI_mask(cpumap, cmci_apic_vector); >> > } >> >

Re: [Xen-devel] [PATCH 12/19] x86/mce: handle LMCE locally

2017-02-23 Thread Haozhong Zhang
On 02/23/17 00:42 -0700, Jan Beulich wrote: > >>> On 23.02.17 at 04:06, wrote: > > On 02/22/17 06:53 -0700, Jan Beulich wrote: > >> >>> On 17.02.17 at 07:39, wrote: > >> > @@ -1709,6 +1724,7 @@ static void mce_softirq(void) > >> > { > >> > int cpu = smp_processor_id(); > >> > unsigned

Re: [Xen-devel] [dpdk-dev] [PATCH] maintainers: claim responsability for xen

2017-02-23 Thread Thomas Monjalon
2017-02-20 15:33, Joao Martins: > On 02/17/2017 04:07 PM, Konrad Rzeszutek Wilk wrote: > > On Thu, Feb 16, 2017 at 10:51:44PM +0100, Vincent JARDIN wrote: > >> Le 16/02/2017 à 14:36, Konrad Rzeszutek Wilk a écrit : > Is it time now to officially remove Dom0 support? > >>> So we do have an prot

[Xen-devel] [PATCH] x86/apicv: move posted_intr_vector handler to pi_notification_interrupt

2017-02-23 Thread Xuquan (Quan Xu)
>From e101539e18625cb70dfaee58ae7e73aa5df7b8a9 Mon Sep 17 00:00:00 2001 From: Quan Xu Date: Fri, 24 Feb 2017 08:43:16 +0800 Subject: [PATCH] x86/apicv: move posted_intr_vector handler to pi_notification_interrupt event_check_interrupt is likely used in pair with original delivery logic. Now sinc

Re: [Xen-devel] [PATCH 15/19] x86/vmce: emulate MSR_IA32_MCG_EXT_CTL

2017-02-23 Thread Haozhong Zhang
On 02/23/17 00:53 -0700, Jan Beulich wrote: > >>> On 23.02.17 at 05:26, wrote: > > On 02/22/17 08:36 -0700, Jan Beulich wrote: > >> >>> On 17.02.17 at 07:39, wrote: > >> All of this said - is this really a per-vCPU property, instead of a > >> per-domain one? > > > > Per-vCPU. At least it can be

Re: [Xen-devel] [PATCH 15/19] x86/vmce: emulate MSR_IA32_MCG_EXT_CTL

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 09:54, wrote: > On 02/23/17 00:53 -0700, Jan Beulich wrote: >> >>> On 23.02.17 at 05:26, wrote: >> > On 02/22/17 08:36 -0700, Jan Beulich wrote: >> >> >>> On 17.02.17 at 07:39, wrote: >> >> All of this said - is this really a per-vCPU property, instead of a >> >> per-domain on

Re: [Xen-devel] [PATCH 18/19] xen/mce: add support of vLMCE injection to XEN_MC_inject_v2

2017-02-23 Thread Haozhong Zhang
On 02/23/17 01:26 -0700, Jan Beulich wrote: > >>> On 23.02.17 at 06:14, wrote: > > On 02/22/17 08:59 -0700, Jan Beulich wrote: > >> >>> On 17.02.17 at 07:39, wrote: > >> > @@ -1552,6 +1553,21 @@ long do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) > >> > u_xen_mc) > >> > send_IPI_mask(c

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-23 Thread Edgar E. Iglesias
On Wed, Feb 22, 2017 at 09:22:25AM -0800, Stefano Stabellini wrote: > On Wed, 22 Feb 2017, Edgar E. Iglesias wrote: > > On Tue, Feb 21, 2017 at 07:20:29PM +, Julien Grall wrote: > > > > > > > > > On 21/02/2017 18:30, Stefano Stabellini wrote: > > > >On Tue, 21 Feb 2017, Julien Grall wrote: >

Re: [Xen-devel] [PATCH 18/19] xen/mce: add support of vLMCE injection to XEN_MC_inject_v2

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 10:14, wrote: > On 02/23/17 01:26 -0700, Jan Beulich wrote: >> >>> On 23.02.17 at 06:14, wrote: >> > On 02/22/17 08:59 -0700, Jan Beulich wrote: >> >> >>> On 17.02.17 at 07:39, wrote: >> >> > @@ -1552,6 +1553,21 @@ long do_mca(XEN_GUEST_HANDLE_PARAM(xen_mc_t) > u_xen_mc) >> >

Re: [Xen-devel] [PATCH v2] xen/arm: introduce vwfi parameter

2017-02-23 Thread Edgar E. Iglesias
On Wed, Feb 22, 2017 at 09:29:47AM -0800, Stefano Stabellini wrote: > Introduce new Xen command line parameter called "vwfi", which stands for > virtual wfi. The default is "trap": Xen traps the guest wfi instruction > and calls vcpu_block on the guest vcpu. The behavior can be changed > setting vw

[Xen-devel] [qemu-upstream-4.5-testing baseline-only test] 68606: regressions - FAIL

2017-02-23 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68606 qemu-upstream-4.5-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68606/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd

[Xen-devel] [PATCH] x86/MCE: sanitize domain/vcpu ID handling

2017-02-23 Thread Jan Beulich
Storing -1 into both fields was misleading consumers: We really should have a manifest constant for "invalid vCPU" here, and the already existing DOMID_INVALID should be used. Also correct a bogus (dead code) check in mca_init_global(), at once introducing a manifest constant for the early boot "i

Re: [Xen-devel] [PATCH] x86/apicv: enhance posted-interrupt processing

2017-02-23 Thread Xuquan (Quan Xu)
On February 18, 2017 12:33 AM, Jan Beulich wrote: On 17.02.17 at 09:49, wrote: >> On Fri, Feb 17, 2017 at 09:37:45AM +, Xuquan (Quan Xu) wrote: >>>From a589074281cc22a30ed75a5bccba60e83d2312a6 Mon Sep 17 >00:00:00 2001 >>>From: Quan Xu >>>Date: Sat, 18 Feb 2017 09:27:37 +0800 >>>Subject:

[Xen-devel] [PATCH v3 2/3] x86/vmx: optimize vmx_read/write_guest_msr()

2017-02-23 Thread Sergey Dyasli
Replace linear scan with vmx_find_msr(). This way the time complexity of searching for required MSR reduces from linear to logarithmic. Signed-off-by: Sergey Dyasli Acked-by: Kevin Tian Reviewed-by: Jan Beulich --- v2 --> v3: - no changes xen/arch/x86/hvm/vmx/vmcs.c | 26

Re: [Xen-devel] [PATCH] x86/apicv: move posted_intr_vector handler to pi_notification_interrupt

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 09:50, wrote: > event_check_interrupt is likely used in pair with original delivery logic. > Now since delivery path is changed, we should move to > pi_notification_interrupt > always. I don't think this is sufficient explanation. What change in the delivery path are you talki

[Xen-devel] [PATCH v3 1/3] x86/vmx: introduce vmx_find_msr()

2017-02-23 Thread Sergey Dyasli
Modify vmx_add_msr() to use a variation of insertion sort algorithm: find a place for the new entry and shift all subsequent elements before insertion. The new vmx_find_msr() exploits the fact that MSR list is now sorted and reuses the existing code for binary search. Signed-off-by: Sergey Dyasli

[Xen-devel] [PATCH v3 3/3] x86/vmx: fix vmentry failure with TSX bits in LBR

2017-02-23 Thread Sergey Dyasli
During VM entry, H/W will automatically load guest's MSRs from MSR-load area in the same way as they would be written by WRMSR. However, under the following conditions: 1. LBR (Last Branch Record) MSRs were placed in the MSR-load area 2. Address format of LBR includes TSX bits 61:62 3

[Xen-devel] [PATCH v3 0/3] x86/vmx: fix for vmentry failure with TSX bits in LBR

2017-02-23 Thread Sergey Dyasli
The first 2 patches is a general optimization which is nice to have prior to the 3rd patch which contains the real fix. A similar bug was fixed in Linux's perf subsystem in Jun 2016: commit 19fc9ddd61e059cc45464bdf6e8fa304bb94080f ("perf/x86/intel: Fix MSR_LAST_BRANCH_FROM_x bug when no T

[Xen-devel] [distros-debian-wheezy test] 68607: tolerable trouble: broken/pass

2017-02-23 Thread Platform Team regression test user
flight 68607 distros-debian-wheezy real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68607/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: build-arm64 2 hosts-allocate broken never pass build-arm64-pvops

[Xen-devel] [PATCH v2 2/3] xen/x86: ensure copying to L1 guest in update_secondary_system_time()

2017-02-23 Thread Haozhong Zhang
For a HVM domain, if a vcpu is in the nested guest mode, __copy_field_to_guest() and __copy_to_guest() used by update_secondary_system_time() will copy data to L2 guest rather than L1 guest. This commit temporally clears the nested guest flag before all __copy_field_to_guest() and __copy_to_guest(

[Xen-devel] [PATCH v2 1/3] xen/x86: ensure copying to L1 guest in update_runstate_area()

2017-02-23 Thread Haozhong Zhang
For a HVM domain, if a vcpu is in the nested guest mode, __raw_copy_to_guest() and __copy_to_guest() used by update_runstate_area() will copy data to L2 guest rather than L1 guest. Besides copying to the wrong address, this bug also causes crash in the code path: context_switch(prev, next)

[Xen-devel] [PATCH v2 3/3] x86/hvm: check HAP before enabling nested VMX

2017-02-23 Thread Haozhong Zhang
The current implementation of nested VMX cannot work without HAP. Signed-off-by: Haozhong Zhang --- Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/hvm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 6621d62..b8

Re: [Xen-devel] Xen Security Advisory 209 (CVE-2017-2620) - cirrus_bitblt_cputovideo does not check if memory region is safe

2017-02-23 Thread Roger Pau Monné
On Tue, Feb 21, 2017 at 12:00:03PM +, Xen.org security team wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Xen Security Advisory CVE-2017-2620 / XSA-209 > version 3 > >cirrus_bitblt_cputovideo does not check if memory region is safe

Re: [Xen-devel] [xen-unstable test] 105966: regressions - FAIL

2017-02-23 Thread Jan Beulich
>>> On 22.02.17 at 19:20, wrote: > flight 105966 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/105966/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-amd64-qemuu-nested-amd 13 xen-boot/l

Re: [Xen-devel] [PATCH v3 3/3] x86/vmx: fix vmentry failure with TSX bits in LBR

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 10:33, wrote: > During VM entry, H/W will automatically load guest's MSRs from MSR-load > area in the same way as they would be written by WRMSR. > > However, under the following conditions: > > 1. LBR (Last Branch Record) MSRs were placed in the MSR-load area > 2. Add

Re: [Xen-devel] [PATCH] x86/apicv: enhance posted-interrupt processing

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 10:28, wrote: > On February 18, 2017 12:33 AM, Jan Beulich wrote: > On 17.02.17 at 09:49, wrote: >>> On Fri, Feb 17, 2017 at 09:37:45AM +, Xuquan (Quan Xu) wrote: From a589074281cc22a30ed75a5bccba60e83d2312a6 Mon Sep 17 >>00:00:00 2001 From: Quan Xu Date: S

Re: [Xen-devel] Xen Security Advisory 209 (CVE-2017-2620) - cirrus_bitblt_cputovideo does not check if memory region is safe

2017-02-23 Thread Steven Haigh
On 23/02/17 20:43, Roger Pau Monné wrote: > On Tue, Feb 21, 2017 at 12:00:03PM +, Xen.org security team wrote: >> -BEGIN PGP SIGNED MESSAGE- >> Hash: SHA1 >> >> Xen Security Advisory CVE-2017-2620 / XSA-209 >> version 3 >> >>cirrus_bitblt_cp

Re: [Xen-devel] [PATCH] x86/MCE: sanitize domain/vcpu ID handling

2017-02-23 Thread Haozhong Zhang
On 02/23/17 02:28 -0700, Jan Beulich wrote: > Storing -1 into both fields was misleading consumers: We really should > have a manifest constant for "invalid vCPU" here, and the already > existing DOMID_INVALID should be used. > > Also correct a bogus (dead code) check in mca_init_global(), at once

Re: [Xen-devel] [PATCH] x86/MCE: sanitize domain/vcpu ID handling

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 11:01, wrote: > On 02/23/17 02:28 -0700, Jan Beulich wrote: >> --- a/xen/arch/x86/cpu/mcheck/mcaction.c >> +++ b/xen/arch/x86/cpu/mcheck/mcaction.c >> @@ -100,7 +100,8 @@ mc_memerr_dhandler(struct mca_binfo *bin >> goto vmce_failed; >> } >>

[Xen-devel] [xen-4.5-testing test] 105990: regressions - trouble: broken/fail/pass

2017-02-23 Thread osstest service owner
flight 105990 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/105990/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-43 host-install(3)broken REGR. vs. 105847 test-armhf-armh

Re: [Xen-devel] [PATCH] doc: fix typo in bios_path_override

2017-02-23 Thread Wei Liu
On Wed, Feb 22, 2017 at 04:35:20PM +, Olaf Hering wrote: > Signed-off-by: Olaf Hering Acked-by: Wei Liu ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v3 1/7] xenstore: correct test for opened logfile in reopen_log()

2017-02-23 Thread Wei Liu
On Wed, Feb 22, 2017 at 04:28:45PM +0100, Juergen Gross wrote: > As 0 is a valid file descriptor testing a descriptor to be valid > should be done via >= 0 instead of > 0. > > Signed-off-by: Juergen Gross > --- Acked-by: Wei Liu Ian, this should be backported. > tools/xenstore/xenstored_core

[Xen-devel] [PATCH 6/8] python: use PyLong_* for constructing 'int' type in Python3

2017-02-23 Thread Marek Marczykowski-Górecki
In Python3 'int' and 'long' types are the same, there are no longer separate PyInt_* functions. Provide convenient #defines to limit #if in code. Signed-off-by: Marek Marczykowski-Górecki --- tools/python/xen/lowlevel/xc/xc.c | 51 --- tools/python/xen/lowlev

[Xen-devel] [PATCH 7/8] python: adjust module initalization for Python3

2017-02-23 Thread Marek Marczykowski-Górecki
In Python3, PyTypeObject looks slightly different, and also module initialization is different. Instead of Py_InitModule, PyModule_Create should be called on already defined PyModuleDef structure. And then initialization function should return that module. Additionally initialization function shou

[Xen-devel] [PATCH 3/8] python: use Py_TYPE instead of looking directly into PyObject_HEAD

2017-02-23 Thread Marek Marczykowski-Górecki
Py_TYPE works on both Python2 and Python3, while internals of PyObject_HEAD have changed. Signed-off-by: Marek Marczykowski-Górecki --- tools/python/xen/lowlevel/xc/xc.c | 2 +- tools/python/xen/lowlevel/xs/xs.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/python/

[Xen-devel] [PATCH 4/8] python: initialize specific fields of PyTypeObject

2017-02-23 Thread Marek Marczykowski-Górecki
Fields not named here will be zero-initialized anyway, but using this way will be much easier to support both Python2 and Python3. Signed-off-by: Marek Marczykowski-Górecki --- tools/python/xen/lowlevel/xc/xc.c | 47 --- tools/python/xen/lowlevel/xs/xs.c | 47

[Xen-devel] [PATCH 1/8] python: check return value of PyErr_NewException

2017-02-23 Thread Marek Marczykowski-Górecki
Signed-off-by: Marek Marczykowski-Górecki --- tools/python/xen/lowlevel/xc/xc.c | 4 tools/python/xen/lowlevel/xs/xs.c | 4 2 files changed, 8 insertions(+) diff --git a/tools/python/xen/lowlevel/xc/xc.c b/tools/python/xen/lowlevel/xc/xc.c index 39be1d5..7fbead5 100644 --- a/tools/pyt

[Xen-devel] [PATCH 2/8] python: drop tp_getattr implementation

2017-02-23 Thread Marek Marczykowski-Górecki
tp_getattr method of type object is deprecated already in Python2 and gone in Python3. Default implementation does the same as this custom one. Signed-off-by: Marek Marczykowski-Górecki --- tools/python/xen/lowlevel/xc/xc.c | 7 +-- tools/python/xen/lowlevel/xs/xs.c | 7 +-- 2 files chan

[Xen-devel] [PATCH 8/8] python: handle long type in scripts

2017-02-23 Thread Marek Marczykowski-Górecki
In Python3 'long' type have been merged into 'int', '1L' syntax is no longer valid. Assign 'int' type to a 'long' variable in python3, so 'long(1)' will give correct result in both python2 and python3. Signed-off-by: Marek Marczykowski-Górecki --- tools/python/xen/migration/libxc.py | 32 +++

[Xen-devel] [PATCH 0/8] Python 3 bindings

2017-02-23 Thread Marek Marczykowski-Górecki
This patch series add support for Python3 in tools/python. As most python modules, it looks at $PYTHON variable to what python use, so to use this PYTHON=python3 needs to be defined in a build environment. If both python2 and python3 versions are needed, then python bindings needs to be built twice

[Xen-devel] [PATCH 5/8] python: use PyBytes/PyUnicode instead of PyString

2017-02-23 Thread Marek Marczykowski-Górecki
In Python2 PyBytes is the same as PyString, but in Python3 PyString is gone and 'str' is really PyUnicode in C-API. When handling arbitrary data, use PyBytes - which is the right thing to do in Python3, and pose no API change in Python2. When handling xenstore paths and transaction ids, which have

Re: [Xen-devel] [PATCH] x86/apicv: enhance posted-interrupt processing

2017-02-23 Thread Xuquan (Quan Xu)
On February 23, 2017 5:59 PM, Jan Beulich wrote: On 23.02.17 at 10:28, wrote: >> On February 18, 2017 12:33 AM, Jan Beulich wrote: >> On 17.02.17 at 09:49, wrote: On Fri, Feb 17, 2017 at 09:37:45AM +, Xuquan (Quan Xu) wrote: >From a589074281cc22a30ed75a5bccba60e83d2312a6 Mon

Re: [Xen-devel] [PATCH] x86/apicv: enhance posted-interrupt processing

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 11:53, wrote: > On February 23, 2017 5:59 PM, Jan Beulich wrote: > On 23.02.17 at 10:28, wrote: >>> On February 18, 2017 12:33 AM, Jan Beulich wrote: >>> On 17.02.17 at 09:49, wrote: > On Fri, Feb 17, 2017 at 09:37:45AM +, Xuquan (Quan Xu) wrote: >>From a58

Re: [Xen-devel] [PATCH v3 2/7] xenstore: rename XS_DEBUG wire command

2017-02-23 Thread Wei Liu
On Wed, Feb 22, 2017 at 04:28:46PM +0100, Juergen Gross wrote: > In preparation to support other than pure debug functionality via the > Xenstore XS_DEBUG wire command rename it to XS_CONTROL and make > XS_DEBUG an alias of it. > > Add an alias xs_control_command for the associated xs_debug_comman

Re: [Xen-devel] [PATCH v3 7/7] xenstore: remove memory report command line support

2017-02-23 Thread Wei Liu
On Wed, Feb 22, 2017 at 04:28:51PM +0100, Juergen Gross wrote: > As a memory report can now be triggered via XS_CONTROL support via > command line and signal handler is no longer needed. Remove it. > > Signed-off-by: Juergen Gross Acked-by: Wei Liu _

Re: [Xen-devel] [PATCH v3 6/7] xenstore: make memory report available via XS_CONTROL

2017-02-23 Thread Wei Liu
On Wed, Feb 22, 2017 at 04:28:50PM +0100, Juergen Gross wrote: > Add a XS_CONTROL command to xenstored for doing a talloc report to a > file. Right now this is supported by specifying a command line option > when starting xenstored and sending a signal to the daemon to trigger > the report. > > To

Re: [Xen-devel] [PATCH v3 3/7] xenstore: Split out XS_CONTROL action to dedicated source file

2017-02-23 Thread Wei Liu
On Wed, Feb 22, 2017 at 04:28:47PM +0100, Juergen Gross wrote: > Move the XS_CONTROL handling of xenstored to a new source file > xenstored_control.c. > > In order to avoid making get_string() in xenstored_core.c globally > visible use strlen() instead, which is save in this context due to > xs_co

Re: [Xen-devel] [PATCH v3 4/7] xenstore: enhance control command support

2017-02-23 Thread Wei Liu
On Wed, Feb 22, 2017 at 04:28:48PM +0100, Juergen Gross wrote: > The Xenstore protocol supports the XS_CONTROL command for triggering > various actions in the Xenstore daemon. Enhance that support by using > a command table and adding a help function. > > Support multiple control commands in the a

Re: [Xen-devel] [PATCH v3 5/7] xenstore: add support for changing log functionality dynamically

2017-02-23 Thread Wei Liu
On Wed, Feb 22, 2017 at 04:28:49PM +0100, Juergen Gross wrote: > Today Xenstore supports logging only if specified at start of the > Xenstore daemon. As it can't be disabled during runtime it is not > recommended to start xenstored with logging enabled. > > Add support for switching logging on and

[Xen-devel] [xen-4.6-testing test] 105991: tolerable FAIL - PUSHED

2017-02-23 Thread osstest service owner
flight 105991 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/105991/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 105936 test-amd64-i386-xl-qemuu

Re: [Xen-devel] [PATCH 0/8] Python 3 bindings

2017-02-23 Thread Wei Liu
On Thu, Feb 23, 2017 at 11:48:20AM +0100, Marek Marczykowski-Górecki wrote: > This patch series add support for Python3 in tools/python. As most python > modules, it looks at $PYTHON variable to what python use, so to use this > PYTHON=python3 needs to be defined in a build environment. If both pyt

Re: [Xen-devel] [PATCH] build: add --with-rundir option to configure

2017-02-23 Thread Wei Liu
On Thu, Feb 16, 2017 at 08:47:07AM +0100, Juergen Gross wrote: > There have been reports that Fedora 25 uses /run instead of /var/run. > > Add a --with-rundir option ito configure to be able to specify that > directory. Default is still /var/run. > > A re-run of autogen.sh is required. > > Signe

[Xen-devel] [PATCH 5/5] x86/vioapic: allow PVHv2 Dom0 to have more than one IO APIC

2017-02-23 Thread Roger Pau Monne
The base address, id and number of pins of the vIO APICs exposed to PVHv2 Dom0 is the same as the values found on bare metal. Signed-off-by: Roger Pau Monné --- Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/domain_build.c | 33 +++-- xen/arch/x86/hvm/vioapic.c | 5

[Xen-devel] [PATCH 1/5] x86/vioapic: move domain out of hvm_vioapic struct

2017-02-23 Thread Roger Pau Monne
And then remove hvm_vioapic (since it just contains a hvm_hw_ioapic struct now). This is a preparatory change for introducing support for multiple vIO APICs per domain. Signed-off-by: Roger Pau Monné --- Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/vioapic.c| 40 +

[Xen-devel] [PATCH 4/5] x86/ioapic: add prototype for apic_gsi_base to io_apic.h

2017-02-23 Thread Roger Pau Monne
So that the function can be called from other files without adding prototypes to each of them. Signed-off-by: Roger Pau Monné --- Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/io_apic.c| 2 -- xen/include/asm-x86/io_apic.h | 3 +++ 2 files changed, 3 insertions(+), 2 deletions(-)

[Xen-devel] [PATCH 0/5] x86/vioapic: introduce support for multiple vIO APICs

2017-02-23 Thread Roger Pau Monne
Hello, This patch series introduce support for having a variable number of entries in vIO APICs, and also having a variable number of vIO APICs per domain. This functionality is not used by unprivileged guests, that are still limited to a single IO APIC with 49 entries. The functionality introduc

[Xen-devel] [PATCH 3/5] x86/vioapic: introduce support for multiple vIO APICS

2017-02-23 Thread Roger Pau Monne
Add support for multiple vIO APICs on the same domain, thus turning d->arch.hvm_domain.vioapic into an array of vIO APIC control structures. Note that this functionality is not exposed to unprivileged guests, and will only be used by PVHv2 Dom0. Signed-off-by: Roger Pau Monné --- Cc: Jan Beulich

[Xen-devel] [PATCH 2/5] x86/vioapic: allow the vIO APIC to have a variable number of pins

2017-02-23 Thread Roger Pau Monne
Altough it's still always set to VIOAPIC_NUM_PINS (48). Add a new field to the hvm_hw_ioapic struct to contain the number of pins (number of IO redirection table entries), and add the migration compatibility code. Signed-off-by: Roger Pau Monné --- Cc: Ian Jackson Cc: Wei Liu Cc: Jan Beulich

Re: [Xen-devel] [PATCH] x86/apicv: enhance posted-interrupt processing

2017-02-23 Thread Xuquan (Quan Xu)
On February 23, 2017 7:01 PM, Jan Beulich wrote: On 23.02.17 at 11:53, wrote: >> On February 23, 2017 5:59 PM, Jan Beulich wrote: >> On 23.02.17 at 10:28, wrote: On February 18, 2017 12:33 AM, Jan Beulich wrote: On 17.02.17 at 09:49, wrote: >>>diff --git a/xen/arch/x86

Re: [Xen-devel] [PATCH] x86/MCE: sanitize domain/vcpu ID handling

2017-02-23 Thread Andrew Cooper
On 23/02/17 09:28, Jan Beulich wrote: > Storing -1 into both fields was misleading consumers: We really should > have a manifest constant for "invalid vCPU" here, and the already > existing DOMID_INVALID should be used. > > Also correct a bogus (dead code) check in mca_init_global(), at once > intr

[Xen-devel] [PATCH] tools/libxendevicemodel: Add headers.chk to .gitignore

2017-02-23 Thread Ian Jackson
CC: Paul Durrant Signed-off-by: Ian Jackson --- .gitignore | 1 + 1 file changed, 1 insertion(+) diff --git a/.gitignore b/.gitignore index c8d56d1..7182fe8 100644 --- a/.gitignore +++ b/.gitignore @@ -99,6 +99,7 @@ tools/libs/evtchn/headers.chk tools/libs/gnttab/headers.chk tools/libs/call/h

Re: [Xen-devel] [PATCH] tools/libxendevicemodel: Add headers.chk to .gitignore

2017-02-23 Thread Paul Durrant
> -Original Message- > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] > Sent: 23 February 2017 12:10 > To: xen-de...@lists.xensource.com > Cc: Ian Jackson ; Paul Durrant > ; Ian Jackson > Subject: [PATCH] tools/libxendevicemodel: Add headers.chk to .gitignore > > CC: Paul Durrant >

[Xen-devel] [xen-4.4-testing test] 105992: regressions - FAIL

2017-02-23 Thread osstest service owner
flight 105992 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/105992/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 105835 Regressions

Re: [Xen-devel] [PATCH 0/2] tools: split xl into a separate directory

2017-02-23 Thread Ian Jackson
Wei Liu writes ("[PATCH 0/2] tools: split xl into a separate directory"): > Xl has grown sufficiently large to warrnant its own directory. We also need > clear separation between the client (xl) and library (libxl). This is a fine idea. Both patches, Acked-by: Ian Jackson Thanks, Ian. ___

Re: [Xen-devel] [xen-unstable test] 105966: regressions - FAIL

2017-02-23 Thread Andrew Cooper
On 23/02/17 09:51, Jan Beulich wrote: On 22.02.17 at 19:20, wrote: >> flight 105966 xen-unstable real [real] >> http://logs.test-lab.xenproject.org/osstest/logs/105966/ >> >> Regressions :-( >> >> Tests which did not succeed and are blocking, >> including tests which could not be run: >> te

Re: [Xen-devel] [PATCH] x86/MCE: sanitize domain/vcpu ID handling

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 13:02, wrote: > On 23/02/17 09:28, Jan Beulich wrote: >> --- a/xen/arch/x86/cpu/mcheck/mcaction.c >> +++ b/xen/arch/x86/cpu/mcheck/mcaction.c >> @@ -100,7 +100,8 @@ mc_memerr_dhandler(struct mca_binfo *bin >> goto vmce_failed; >> } >> >> -

Re: [Xen-devel] [xen-unstable test] 105966: regressions - FAIL

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 13:19, wrote: > On 23/02/17 09:51, Jan Beulich wrote: > On 22.02.17 at 19:20, wrote: >>> flight 105966 xen-unstable real [real] >>> http://logs.test-lab.xenproject.org/osstest/logs/105966/ >>> >>> Regressions :-( >>> >>> Tests which did not succeed and are blocking, >>> in

Re: [Xen-devel] [PATCH] tools/libxendevicemodel: Add headers.chk to .gitignore

2017-02-23 Thread Ian Jackson
Paul Durrant writes ("RE: [PATCH] tools/libxendevicemodel: Add headers.chk to .gitignore"): > Oops, yes, I missed that. > > Reviewed-by: Paul Durrant Thanks. I have put it all together and pushed the qemu-trad and xen.git parts to the appropriate places. Please let me know if I have messed up

Re: [Xen-devel] [PATCH] x86/apicv: enhance posted-interrupt processing

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 12:55, wrote: > On February 23, 2017 7:01 PM, Jan Beulich wrote: > On 23.02.17 at 11:53, wrote: >>> IOW, >>> which vcpu does the 'current' refer to? >>> which cpu does the ' smp_processor_id()' refer to? >> >>current: currently running vCPU > > in a SMP machine, are ther

Re: [Xen-devel] [PATCH] tools/libxendevicemodel: Add headers.chk to .gitignore

2017-02-23 Thread Paul Durrant
> -Original Message- > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] > Sent: 23 February 2017 12:25 > To: Paul Durrant > Cc: xen-de...@lists.xensource.com > Subject: RE: [PATCH] tools/libxendevicemodel: Add headers.chk to .gitignore > > Paul Durrant writes ("RE: [PATCH] tools/libxe

Re: [Xen-devel] [PATCH] x86/MCE: sanitize domain/vcpu ID handling

2017-02-23 Thread Andrew Cooper
On 23/02/17 12:21, Jan Beulich wrote: On 23.02.17 at 13:02, wrote: >> On 23/02/17 09:28, Jan Beulich wrote: >>> --- a/xen/arch/x86/cpu/mcheck/mcaction.c >>> +++ b/xen/arch/x86/cpu/mcheck/mcaction.c >>> @@ -100,7 +100,8 @@ mc_memerr_dhandler(struct mca_binfo *bin >>> goto

Re: [Xen-devel] XenGT GPU virtualization

2017-02-23 Thread bharat gohil
Thanks paul and anshul Can you guys point out source code which is audit the GPU command? Thanks Bharat On Mon, Feb 20, 2017 at 9:01 PM, Paul Durrant wrote: > No, that’s not correct. The GPU commands are whitelisted and only the > commands that can be audited are handled. > > > > Paul > > >

Re: [Xen-devel] XenGT GPU virtualization

2017-02-23 Thread Paul Durrant
Hi, I’m not actually sure where the latest public release of the xengt code is. Perhaps someone from Intel can comment? Otherwise, if you grab the source ISOs from xenserver.org you can look in the SRPM for xengt. The xengt kernel module is responsible for auditing the servicing the GPU co

Re: [Xen-devel] [xen-unstable test] 105966: regressions - FAIL

2017-02-23 Thread Andrew Cooper
On 23/02/17 12:24, Jan Beulich wrote: On 23.02.17 at 13:19, wrote: >> On 23/02/17 09:51, Jan Beulich wrote: >> On 22.02.17 at 19:20, wrote: flight 105966 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/105966/ Regressions :-( Tests

Re: [Xen-devel] [xen-unstable test] 105966: regressions - FAIL

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 13:38, wrote: > On 23/02/17 12:24, Jan Beulich wrote: > On 23.02.17 at 13:19, wrote: >>> On 23/02/17 09:51, Jan Beulich wrote: >>> On 22.02.17 at 19:20, wrote: > flight 105966 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/105966/

[Xen-devel] [xen-unstable-smoke test] 106016: tolerable trouble: broken/fail/pass - PUSHED

2017-02-23 Thread osstest service owner
flight 106016 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/106016/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen

Re: [Xen-devel] [PATCH] xen/x86: ensure copying to L1 guest in update_runstate_area()

2017-02-23 Thread Andrew Cooper
On 23/02/17 08:00, Haozhong Zhang wrote: > On 02/22/17 00:46 -0700, Jan Beulich wrote: > On 22.02.17 at 03:20, wrote: >>> On 02/22/17 09:28 +0800, Haozhong Zhang wrote: On 02/21/17 02:15 -0700, Jan Beulich wrote: On 21.02.17 at 03:11, wrote: >>> [..] >> + * >> +

Re: [Xen-devel] Xen ARM - Exposing a PL011 to the guest

2017-02-23 Thread Bhupinder Thakur
Hi, Currently, xenconsoled supports only PV console. To support one additional pl011 console, some of the data structures in struct domain and certain functions such as buffer_append, ring_free_bytes, etc. will have to be be scaled to support now two types of consoles. Some changes are required i

Re: [Xen-devel] [PATCH 0/2] tools: split xl into a separate directory

2017-02-23 Thread Wei Liu
On Thu, Feb 23, 2017 at 12:17:38PM +, Ian Jackson wrote: > Wei Liu writes ("[PATCH 0/2] tools: split xl into a separate directory"): > > Xl has grown sufficiently large to warrnant its own directory. We also need > > clear separation between the client (xl) and library (libxl). > > This is a f

Re: [Xen-devel] [PATCH] x86/MCE: sanitize domain/vcpu ID handling

2017-02-23 Thread Boris Ostrovsky
On 02/23/2017 05:05 AM, Jan Beulich wrote: On 23.02.17 at 11:01, wrote: >> On 02/23/17 02:28 -0700, Jan Beulich wrote: >>> --- a/xen/arch/x86/cpu/mcheck/mcaction.c >>> +++ b/xen/arch/x86/cpu/mcheck/mcaction.c >>> @@ -100,7 +100,8 @@ mc_memerr_dhandler(struct mca_binfo *bin >>>

Re: [Xen-devel] [PATCH v7 2/7] xen/x86: populate PVHv2 Dom0 physical memory map

2017-02-23 Thread Jan Beulich
>>> On 22.02.17 at 15:24, wrote: > Craft the Dom0 e820 memory map and populate it. Introduce a helper to remove > memory pages that are shared between Xen and a domain, and use it in order to > remove low 1MB RAM regions from dom_io in order to assign them to a PVHv2 > Dom0. > > On hardware lack

Re: [Xen-devel] [PATCH v7 3/7] x86/bzimage: change the types from char * to void *

2017-02-23 Thread Jan Beulich
>>> On 22.02.17 at 15:24, wrote: > This allows to also change the types of image_base and image_start in the Dom0 > builder from char * to void *. > > Signed-off-by: Roger Pau Monné Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@list

Re: [Xen-devel] [PATCH v7 4/7] x86/libelf: pass the destination vCPU to libelf for Dom0 build

2017-02-23 Thread Jan Beulich
>>> On 22.02.17 at 15:24, wrote: > Allow setting the destination vCPU for libelf, so that elf_load_image can take > it into account when loading the kernel for Dom0. This is needed for PVHv2 > Dom0 > build, so that hvm_copy_to_guest_phys can be called with a Dom0 vCPU instead > of > current (tha

Re: [Xen-devel] [PATCH v7 5/7] xen/x86: parse Dom0 kernel for PVHv2

2017-02-23 Thread Jan Beulich
>>> On 22.02.17 at 15:24, wrote: > Introduce a helper to parse the Dom0 kernel. > > A new helper is also introduced to libelf, that's used to store the > destination > vcpu of the domain. This parameter is needed when loading the kernel on a HVM > domain (PVHv2), since hvm_copy_to_guest_phys req

Re: [Xen-devel] [PATCH] ACPICA: ACPI 6.0: Add support for IORT table.

2017-02-23 Thread Julien Grall
Hi, On 23/02/17 07:39, Jan Beulich wrote: On 22.02.17 at 21:29, wrote: Please don't top-post. Appreciate the feedback. I want to use these defines for parsing out SMMUv3 components defined in ACPI. Since, I am picking these defines directly from Linux, I did not want to make this a part of

[Xen-devel] [PATCH 5/5] xen: use libxendevicemodel when available

2017-02-23 Thread Paul Durrant
This patch modifies the wrapper functions in xen_common.h to use the new xendevicemodel interface if it is available along with compatibility code to use the old libxenctrl interface if it is not. Signed-off-by: Paul Durrant --- Cc: Stefano Stabellini Cc: Anthony Perard --- include/hw/xen/xen_

[Xen-devel] [PATCH 0/5] xen: use new xendevicemodel library

2017-02-23 Thread Paul Durrant
My recent patches to Xen [1] introduced a new library to support running device models for HVM guests. This series ports QEMU onto the new library if it is available in the build environment. Paul Durrant (5): xen: make use of xen_xc implicit in xen_common.h inlines xen: rename xen_modified_me

[Xen-devel] [PATCH 3/5] xen: create wrappers for all other uses of xc_hvm_XXX() functions

2017-02-23 Thread Paul Durrant
This patch creates inline wrapper functions in xen_common.h for all open coded calls to xc_hvm_XXX() functions outside of xen_common.h so that use of xen_xc can be made implicit. This again is in preparation for the move to using libxendevicemodel. Signed-off-by: Paul Durrant --- Cc: Stefano Stab

[Xen-devel] [PATCH 4/5] configure: detect presence of libxendevicemodel

2017-02-23 Thread Paul Durrant
This patch adds code in configure to set CONFIG_XEN_CTRL_INTERFACE_VERSION to a new value of 490 if libxendevicemodel is present in the build environment. Signed-off-by: Paul Durrant --- Cc: Stefano Stabellini Cc: Anthony Perard --- configure | 19 +++ 1 file changed, 19 insert

[Xen-devel] [PATCH 2/5] xen: rename xen_modified_memory() to xen_hvm_modified_memory()

2017-02-23 Thread Paul Durrant
This patch is a purely cosmetic change that avoids a name collision in a subsequent patch. Signed-off-by: Paul Durrant --- Cc: Paolo Bonzini Cc: Stefano Stabellini Cc: Anthony Perard --- include/exec/ram_addr.h | 4 ++-- include/hw/xen/xen.h| 2 +- xen-hvm-stub.c | 2 +- xen-hvm.

[Xen-devel] [PATCH 1/5] xen: make use of xen_xc implicit in xen_common.h inlines

2017-02-23 Thread Paul Durrant
Doing this will make the transition to using the new libxendevicemodel interface less intrusive on the callers of these functions, since using the new library will require a change of handle. NOTE: The patch also moves the 'externs' for xen_xc and xen_fmem from xen_backend.h to xen_common.h,

Re: [Xen-devel] [PATCH 0/2] tools: split xl into a separate directory

2017-02-23 Thread Wei Liu
On Thu, Feb 23, 2017 at 01:20:25PM +, Wei Liu wrote: > On Thu, Feb 23, 2017 at 12:17:38PM +, Ian Jackson wrote: > > Wei Liu writes ("[PATCH 0/2] tools: split xl into a separate directory"): > > > Xl has grown sufficiently large to warrnant its own directory. We also > > > need > > > clear

Re: [Xen-devel] [PATCH 0/5] xen: use new xendevicemodel library

2017-02-23 Thread Paul Durrant
> -Original Message- > From: Paul Durrant [mailto:paul.durr...@citrix.com] > Sent: 23 February 2017 14:54 > To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org > Cc: Paul Durrant > Subject: [PATCH 0/5] xen: use new xendevicemodel library > > My recent patches to Xen [1] introduced a

Re: [Xen-devel] [PATCH] ACPICA: ACPI 6.0: Add support for IORT table.

2017-02-23 Thread Jan Beulich
>>> On 23.02.17 at 14:59, wrote: > On 23/02/17 07:39, Jan Beulich wrote: > On 22.02.17 at 21:29, wrote: >>> Appreciate the feedback. I want to use these defines for parsing out SMMUv3 >>> components defined in ACPI. Since, I am picking these defines directly from >>> Linux, I did not want to

Re: [Xen-devel] Xen ARM - Exposing a PL011 to the guest

2017-02-23 Thread Wei Liu
On Thu, Feb 23, 2017 at 06:45:50PM +0530, Bhupinder Thakur wrote: > Hi, > > Currently, xenconsoled supports only PV console. To support one > additional pl011 console, some of the data structures in struct domain > and certain functions such as buffer_append, ring_free_bytes, etc. > will have to b

Re: [Xen-devel] [PATCH] ACPICA: ACPI 6.0: Add support for IORT table.

2017-02-23 Thread Julien Grall
Hi Jan, On 23/02/17 15:02, Jan Beulich wrote: On 23.02.17 at 14:59, wrote: On 23/02/17 07:39, Jan Beulich wrote: On 22.02.17 at 21:29, wrote: Appreciate the feedback. I want to use these defines for parsing out SMMUv3 components defined in ACPI. Since, I am picking these defines directly fr

Re: [Xen-devel] [PATCH 00/35] treewide trivial patches converting pr_warning to pr_warn

2017-02-23 Thread Rob Herring
On Fri, Feb 17, 2017 at 1:11 AM, Joe Perches wrote: > There are ~4300 uses of pr_warn and ~250 uses of the older > pr_warning in the kernel source tree. > > Make the use of pr_warn consistent across all kernel files. > > This excludes all files in tools/ as there is a separate > define pr_warning

[Xen-devel] [PATCH] libs/devicemodel: initialise op_bufs in xendevicemodel_xcall

2017-02-23 Thread Wei Liu
To avoid freeing uninitialised buffer when taking the first error exit path. Signed-off-by: Wei Liu --- Cc: Ian Jackson Cc: Paul Durrant --- tools/libs/devicemodel/core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/libs/devicemodel/core.c b/tools/libs/devicemodel/

  1   2   >