[Xen-devel] [qemu-upstream-4.7-testing test] 106815: regressions - trouble: blocked/broken/fail/pass

2017-03-22 Thread osstest service owner
flight 106815 qemu-upstream-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/106815/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt 4 host-ping-check-native fail REGR. vs. 105971 Regre

Re: [Xen-devel] [PATCH v10 1/6] VT-d: Introduce new fields in msi_desc to track binding with guest interrupt

2017-03-22 Thread Chao Gao
On Wed, Mar 22, 2017 at 01:59:19PM +0800, Tian, Kevin wrote: >> From: Gao, Chao >> Sent: Wednesday, March 15, 2017 1:11 PM >> >> Currently, msi_msg_to_remap_entry is buggy when the live IRTE is in posted >> format. Straightforwardly, we can let caller specify which format of IRTE >> they >> want

Re: [Xen-devel] [PATCH v2 02/10] x86: assembly, FUNC_START for fn, DATA_START for data

2017-03-22 Thread Ingo Molnar
* Pavel Machek wrote: > Hi! > > > -ENTRY(saved_rbp) .quad 0 > > -ENTRY(saved_rsi) .quad 0 > > -ENTRY(saved_rdi) .quad 0 > > -ENTRY(saved_rbx) .quad 0 > > +SYM_DATA_START(saved_rbp) .quad 0 > > +SYM_DATA_START(saved_rsi) .quad 0 > > +SYM_DATA_START(saved_rdi

Re: [Xen-devel] [PATCH v2 03/10] x86: assembly, use SYM_FUNC_END for functions

2017-03-22 Thread Ingo Molnar
* Josh Poimboeuf wrote: > On Mon, Mar 20, 2017 at 01:32:15PM +0100, Jiri Slaby wrote: > > ENTRY(ftrace_caller) > > /* save_mcount_regs fills in first two parameters */ > > @@ -184,11 +184,12 @@ GLOBAL(ftrace_epilogue) > > GLOBAL(ftrace_graph_call) > > jmp ftrace_stub > > #endif > > +S

Re: [Xen-devel] [PATCH v2 02/10] x86: assembly, FUNC_START for fn, DATA_START for data

2017-03-22 Thread Jiri Slaby
On 03/22/2017, 08:25 AM, Ingo Molnar wrote: > > * Pavel Machek wrote: > >> Hi! >> >>> -ENTRY(saved_rbp) .quad 0 >>> -ENTRY(saved_rsi) .quad 0 >>> -ENTRY(saved_rdi) .quad 0 >>> -ENTRY(saved_rbx) .quad 0 >>> +SYM_DATA_START(saved_rbp) .quad 0 >>> +SYM_DATA_START(saved_rs

Re: [Xen-devel] [PATCH v2 02/10] x86: assembly, FUNC_START for fn, DATA_START for data

2017-03-22 Thread Ingo Molnar
* Jiri Slaby wrote: > On 03/22/2017, 08:25 AM, Ingo Molnar wrote: > > > > * Pavel Machek wrote: > > > >> Hi! > >> > >>> -ENTRY(saved_rbp) .quad 0 > >>> -ENTRY(saved_rsi) .quad 0 > >>> -ENTRY(saved_rdi) .quad 0 > >>> -ENTRY(saved_rbx) .quad 0 > >>> +SYM_DATA_START(saved_rbp)

Re: [Xen-devel] [PATCH v9 2/5] x86/ioreq server: Add DMOP to map guest ram with p2m_ioreq_server to an ioreq server.

2017-03-22 Thread Tian, Kevin
> From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com] > Sent: Tuesday, March 21, 2017 10:53 AM > > A new DMOP - XEN_DMOP_map_mem_type_to_ioreq_server, is added to let > one ioreq server claim/disclaim its responsibility for the handling of guest > pages with p2m type p2m_ioreq_server. Users of this

Re: [Xen-devel] [PATCH v4] altp2m: Allow specifying external-only use-case

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 18:25, wrote: > On Tue, Mar 21, 2017 at 11:19 AM, Jan Beulich wrote: >> Hmm, the original (abstract) VMFUNC use case, as I have >> understood it, allows a guest to actively select between EPT >> variants without having (direct) control over their contents. > > Correct. But eve

Re: [Xen-devel] [PATCH v9 4/5] x86/ioreq server: Asynchronously reset outstanding p2m_ioreq_server entries.

2017-03-22 Thread Tian, Kevin
> From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com] > Sent: Tuesday, March 21, 2017 10:53 AM > > After an ioreq server has unmapped, the remaining p2m_ioreq_server > entries need to be reset back to p2m_ram_rw. This patch does this > asynchronously with the current p2m_change_entry_type_global()

[Xen-devel] [qemu-upstream-4.8-testing test] 106816: regressions - trouble: blocked/broken/fail/pass

2017-03-22 Thread osstest service owner
flight 106816 qemu-upstream-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/106816/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-xsm3 host-install(3)broken REGR. vs. 105957 test-

Re: [Xen-devel] [PATCH 01/11] xen/arm: vpl011: Add pl011 uart emulation in Xen

2017-03-22 Thread Julien Grall
On 03/21/2017 01:27 PM, Bhupinder Thakur wrote: Hi Julien, Hi Bhupinder, On 26 February 2017 at 22:37, Julien Grall wrote: +break; +case VPL011_UARTDR_OFFSET: +vpl011_read_data(v->domain, &ch); Should not you check the return value of vpl011_read_data? Als

Re: [Xen-devel] [RFC PATCH 1/23] VIOMMU: Add vIOMMU helper functions to create, destroy and query capabilities

2017-03-22 Thread Julien Grall
Hello Tinayu Lan, On 03/17/2017 11:27 AM, Lan Tianyu wrote: This patch is to introduct an abstract layer for arch vIOMMU implementation s/introduct/introduce/ to deal with requests from dom0. Arch vIOMMU code needs to provide callback to perform create, destroy and query capabilities operati

Re: [Xen-devel] [PATCH 15/18] xen/arm: Introduce a helper to synchronize SError

2017-03-22 Thread Wei Chen
Hi Stefano, On 2017/3/21 5:44, Stefano Stabellini wrote: > On Mon, 20 Mar 2017, Stefano Stabellini wrote: >> On Mon, 13 Mar 2017, Wei Chen wrote: >>> We may have to isolate the SError between the context switch of >>> 2 vCPUs or may have to prevent slipping hypervisor SError to guest. >> >> I thou

Re: [Xen-devel] [PATCH v9 5/5] x86/ioreq server: Synchronously reset outstanding p2m_ioreq_server entries when an ioreq server unmaps.

2017-03-22 Thread Tian, Kevin
> From: Yu Zhang > Sent: Tuesday, March 21, 2017 10:53 AM > > After an ioreq server has unmapped, the remaining p2m_ioreq_server > entries need to be reset back to p2m_ram_rw. This patch does this > synchronously by iterating the p2m table. > > The synchronous resetting is necessary because we ne

Re: [Xen-devel] [PATCH v10 1/6] VT-d: Introduce new fields in msi_desc to track binding with guest interrupt

2017-03-22 Thread Tian, Kevin
> From: Gao, Chao > Sent: Wednesday, March 22, 2017 8:19 AM > > On Wed, Mar 22, 2017 at 01:59:19PM +0800, Tian, Kevin wrote: > >> From: Gao, Chao > >> Sent: Wednesday, March 15, 2017 1:11 PM > >> > >> Currently, msi_msg_to_remap_entry is buggy when the live IRTE is in > >> posted format. Straightf

Re: [Xen-devel] [RFC PATCH 1/23] VIOMMU: Add vIOMMU helper functions to create, destroy and query capabilities

2017-03-22 Thread Tian, Kevin
> From: Julien Grall [mailto:julien.gr...@arm.com] > Sent: Wednesday, March 22, 2017 3:57 AM > > > > > diff --git a/xen/common/Makefile b/xen/common/Makefile index > > 0fed30b..b58de63 100644 > > --- a/xen/common/Makefile > > +++ b/xen/common/Makefile > > @@ -60,6 +60,7 @@ obj-y += vm_event.o > >

Re: [Xen-devel] [GSoC] GSoC Introduction : Fuzzing Xen hypercall interface

2017-03-22 Thread Felix Schmoll
2017-03-21 17:14 GMT+01:00 Wei Liu : > On Tue, Mar 21, 2017 at 04:13:24PM +, Wei Liu wrote: > > On Mon, Mar 20, 2017 at 09:12:54AM +0100, Felix Schmoll wrote: > > [...] > > > From 7e50f50b2a1e95cbc813354d68c71315d4d1394b Mon Sep 17 00:00:00 2001 > > > From: Felix Schmoll > > > Date: Thu, 16 M

Re: [Xen-devel] [Qemu-devel] [PATCH v4 0/8] xen/9pfs: introduce the Xen 9pfs backend

2017-03-22 Thread Greg Kurz
On Tue, 21 Mar 2017 13:14:02 -0700 (PDT) Stefano Stabellini wrote: > On Tue, 21 Mar 2017, Greg Kurz wrote: > > On Mon, 20 Mar 2017 11:18:46 -0700 (PDT) > > Stefano Stabellini wrote: > > > > > Hi all, > > > > > > This patch series implements a new transport for 9pfs, aimed at Xen > > > system

Re: [Xen-devel] [PATCH] add xen-9p-backend to MAINTAINERS under Xen

2017-03-22 Thread Greg Kurz
On Tue, 21 Mar 2017 14:01:26 -0700 Stefano Stabellini wrote: > Signed-off-by: Stefano Stabellini > Signed-off-by: Stefano Stabellini > CC: gr...@kaod.org > CC: anthony.per...@citrix.com > --- Reviewed-by: Greg Kurz > This patch is meant to be on top of > http://marc.info/?l=xen-devel&m=14900

Re: [Xen-devel] [PATCH 14/18] xen/arm: Unmask the Abort/SError bit in the exception entries

2017-03-22 Thread Wei Chen
Hi Stefano, On 2017/3/21 5:38, Stefano Stabellini wrote: > On Mon, 13 Mar 2017, Wei Chen wrote: >> Currently, we masked the Abort/SError bit in Xen exception entries. >> So Xen could not capture any Abort/SError while it's running. >> Now, Xen has the ability to handle the Abort/SError, we should

Re: [Xen-devel] [GSoC] GSoC Introduction : Fuzzing Xen hypercall interface

2017-03-22 Thread Wei Liu
On Wed, Mar 22, 2017 at 09:47:06AM +0100, Felix Schmoll wrote: > 2017-03-21 17:14 GMT+01:00 Wei Liu : > > > On Tue, Mar 21, 2017 at 04:13:24PM +, Wei Liu wrote: > > > On Mon, Mar 20, 2017 at 09:12:54AM +0100, Felix Schmoll wrote: > > > [...] > > > > From 7e50f50b2a1e95cbc813354d68c71315d4d1394

Re: [Xen-devel] [PATCH 16/18] xen/arm: Isolate the SError between the context switch of 2 vCPUs

2017-03-22 Thread Wei Chen
Hi Stefano, On 2017/3/21 5:46, Stefano Stabellini wrote: > On Mon, 13 Mar 2017, Wei Chen wrote: >> If there is a pending SError while we are doing context switch, if the >> SError handle option is "FORWARD", We have to guranatee this serror to >> be caught by current vCPU, otherwise it will be cau

Re: [Xen-devel] [RFC PATCH 1/23] VIOMMU: Add vIOMMU helper functions to create, destroy and query capabilities

2017-03-22 Thread Lan Tianyu
Hi Julien: Thanks for review. On 2017年03月22日 03:56, Julien Grall wrote: > === > > diff --git a/xen/include/public/viommu.h b/xen/include/public/viommu.h > new file mode 100644 > index 000..ca2419b > > --- /dev/null > > +++ b/xen/include/public/vi

Re: [Xen-devel] [PATCH v9 5/5] x86/ioreq server: Synchronously reset outstanding p2m_ioreq_server entries when an ioreq server unmaps.

2017-03-22 Thread Jan Beulich
>>> On 22.03.17 at 09:28, wrote: >> From: Yu Zhang >> Sent: Tuesday, March 21, 2017 10:53 AM >> --- a/xen/arch/x86/hvm/dm.c >> +++ b/xen/arch/x86/hvm/dm.c >> @@ -385,16 +385,51 @@ static int dm_op(domid_t domid, >> >> case XEN_DMOP_map_mem_type_to_ioreq_server: >> { >> -const s

Re: [Xen-devel] [PATCH v9 5/5] x86/ioreq server: Synchronously reset outstanding p2m_ioreq_server entries when an ioreq server unmaps.

2017-03-22 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Wednesday, March 22, 2017 4:54 PM > > >>> On 22.03.17 at 09:28, wrote: > >> From: Yu Zhang > >> Sent: Tuesday, March 21, 2017 10:53 AM > >> --- a/xen/arch/x86/hvm/dm.c > >> +++ b/xen/arch/x86/hvm/dm.c > >> @@ -385,16 +385,51 @@ static int dm

Re: [Xen-devel] [PATCH 2/2 v2] xen/acpi: upload PM state from init-domain to Xen

2017-03-22 Thread Stanislaw Gruszka
On Tue, Mar 21, 2017 at 03:43:38PM -0700, Ankur Arora wrote: > This was broken in commit cd979883b9ede90643e019f33cb317933eb867b4. > do_suspend (from xen/manage.c) and thus xen_resume_notifier never get > called on the initial-domain at resume (it is if running as guest.) > > The rationale for the

Re: [Xen-devel] [PATCH v2 08/12] x86/vmce: enable injecting LMCE to guest on Intel host

2017-03-22 Thread Haozhong Zhang
On 03/20/17 10:25 -0600, Jan Beulich wrote: > >>> On 17.03.17 at 07:46, wrote: > > @@ -88,18 +89,31 @@ mc_memerr_dhandler(struct mca_binfo *binfo, > > goto vmce_failed; > > } > > > > -if (boot_cpu_data.x86_vendor == X86_VENDOR_INTEL || > > -

Re: [Xen-devel] [PATCH v3] xen: use libxendevice model to restrict operations

2017-03-22 Thread Paul Durrant
> -Original Message- > From: Stefano Stabellini [mailto:sstabell...@kernel.org] > Sent: 21 March 2017 18:59 > To: Paul Durrant > Cc: qemu-de...@nongnu.org; xen-de...@lists.xenproject.org; Stefano > Stabellini ; Anthony Perard > ; Paolo Bonzini > Subject: Re: [PATCH v3] xen: use libxendevi

Re: [Xen-devel] [xen-unstable test] 106812: regressions - FAIL

2017-03-22 Thread Jan Beulich
>>> On 22.03.17 at 06:50, wrote: > flight 106812 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/106812/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-amd64-xl-qcow210 guest-start

[Xen-devel] [PATCH v4] xen: use libxendevice model to restrict operations

2017-03-22 Thread Paul Durrant
This patch adds a command-line option (-xen-domid-restrict) which will use the new libxendevicemodel API to restrict devicemodel [1] operations to the specified domid. (Such operations are not applicable to the xenpv machine type). This patch also adds a tracepoint to allow successful enabling of

Re: [Xen-devel] [GSoC] GSoC Introduction : Fuzzing Xen hypercall interface

2017-03-22 Thread Felix Schmoll
2017-03-22 9:52 GMT+01:00 Wei Liu : > On Wed, Mar 22, 2017 at 09:47:06AM +0100, Felix Schmoll wrote: > > 2017-03-21 17:14 GMT+01:00 Wei Liu : > > > > > On Tue, Mar 21, 2017 at 04:13:24PM +, Wei Liu wrote: > > > > On Mon, Mar 20, 2017 at 09:12:54AM +0100, Felix Schmoll wrote: > > > > [...] > >

Re: [Xen-devel] [PATCH v3 1/6] x86/viridian: fix xen-hvmcrash when vp_assist page is present

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 19:17, wrote: > Currently use of xen-hvmcrash will cause an immediate domain_crash() in > initialize_vp_assist() because it is called from viridian_load_vcpu_ctxt() > without having first cleared any previous mapping. > > This patch addes a check into viridian_load_vcpu_ctxt()

Re: [Xen-devel] [PATCH v3 2/6] x86/viridian: don't put Xen version information in CPUID leaf 2

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 19:17, wrote: > --- a/docs/misc/xen-command-line.markdown > +++ b/docs/misc/xen-command-line.markdown > @@ -1616,6 +1616,14 @@ The optional `keep` parameter causes Xen to continue > using the vga > console even after dom0 has been started. The default behaviour is to > relin

Re: [Xen-devel] [PATCH v3 2/6] x86/viridian: don't put Xen version information in CPUID leaf 2

2017-03-22 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 22 March 2017 10:10 > To: Paul Durrant > Cc: Andrew Cooper ; xen- > de...@lists.xenproject.org > Subject: Re: [PATCH v3 2/6] x86/viridian: don't put Xen version information in > CPUID leaf 2 > > >>> On 21.03.17 at

Re: [Xen-devel] [PATCH v9 4/5] x86/ioreq server: Asynchronously reset outstanding p2m_ioreq_server entries.

2017-03-22 Thread Yu Zhang
On 3/22/2017 4:10 PM, Tian, Kevin wrote: From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com] Sent: Tuesday, March 21, 2017 10:53 AM After an ioreq server has unmapped, the remaining p2m_ioreq_server entries need to be reset back to p2m_ram_rw. This patch does this asynchronously with the curren

[Xen-devel] [xen-unstable-coverity test] 106839: regressions - ALL FAIL

2017-03-22 Thread osstest service owner
flight 106839 xen-unstable-coverity real [real] http://logs.test-lab.xenproject.org/osstest/logs/106839/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: coverity-amd646 coverity-upload fail REGR. vs. 106549 version t

Re: [Xen-devel] [PATCH v9 2/5] x86/ioreq server: Add DMOP to map guest ram with p2m_ioreq_server to an ioreq server.

2017-03-22 Thread Yu Zhang
On 3/22/2017 3:49 PM, Tian, Kevin wrote: From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com] Sent: Tuesday, March 21, 2017 10:53 AM A new DMOP - XEN_DMOP_map_mem_type_to_ioreq_server, is added to let one ioreq server claim/disclaim its responsibility for the handling of guest pages with p2m typ

Re: [Xen-devel] [PATCH v2] dm_op: Add xendevicemodel_modified_memory_bulk.

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 14:59, wrote: > This version of this patch removes the need for the 'offset' parameter, > by instead reducing nr_extents, and working backwards from the end of > the array. > > This patch also removes the need to ever write back the passed array of > extents to the guest, but i

Re: [Xen-devel] [PATCH v3 2/6] x86/viridian: don't put Xen version information in CPUID leaf 2

2017-03-22 Thread Jan Beulich
>>> On 22.03.17 at 11:20, wrote: >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: 22 March 2017 10:10 >> >>> On 21.03.17 at 19:17, wrote: >> > --- a/docs/misc/xen-command-line.markdown >> > +++ b/docs/misc/xen-command-line.markdown >> > @@ -1616,6 +1616,14 @@ The optional `keep` parameter

Re: [Xen-devel] inaccurate dirty_count from XEN_DOMCTL_SHADOW_OP

2017-03-22 Thread Olaf Hering
On Tue, Mar 21, Olaf Hering wrote: > I wonder if the usage of xc_shadow_control is correct. The testing was > done with a xen-4.4 based dom0, I will verify with staging once I find > the time. It does work with xen-4.4, but fails with staging. Did the xc_shadow_control API change at some point?

Re: [Xen-devel] inaccurate dirty_count from XEN_DOMCTL_SHADOW_OP

2017-03-22 Thread Andrew Cooper
On 22/03/17 10:46, Olaf Hering wrote: > On Tue, Mar 21, Olaf Hering wrote: > >> I wonder if the usage of xc_shadow_control is correct. The testing was >> done with a xen-4.4 based dom0, I will verify with staging once I find >> the time. > It does work with xen-4.4, but fails with staging. > Did th

Re: [Xen-devel] [xen-unstable test] 106812: regressions - FAIL

2017-03-22 Thread Roger Pau Monne
On Wed, Mar 22, 2017 at 03:32:34AM -0600, Jan Beulich wrote: > >>> On 22.03.17 at 06:50, wrote: > > flight 106812 xen-unstable real [real] > > http://logs.test-lab.xenproject.org/osstest/logs/106812/ > > > > Regressions :-( > > > > Tests which did not succeed and are blocking, > > including tes

Re: [Xen-devel] inaccurate dirty_count from XEN_DOMCTL_SHADOW_OP

2017-03-22 Thread Olaf Hering
On Wed, Mar 22, Olaf Hering wrote: > Did the xc_shadow_control API change at some point? ... staging-4.5 works, while staging-4.6 does not. Olaf signature.asc Description: PGP signature ___ Xen-devel mailing list Xen-devel@lists.xen.org https://list

Re: [Xen-devel] [PATCH v3 6/6] x86/viridian: implement the crash MSRs

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 19:17, wrote: > --- a/tools/libxl/libxl.h > +++ b/tools/libxl/libxl.h > @@ -288,6 +288,12 @@ > #define LIBXL_HAVE_SCHED_CREDIT2_PARAMS 1 > > /* > + * LIBXL_HAVE_CRASH_CTL indicates that the 'crash_ctl' value > + * is present in the viridian enlightenment enumeration. > + */

Re: [Xen-devel] [PATCH v3 6/6] x86/viridian: implement the crash MSRs

2017-03-22 Thread Wei Liu
On Wed, Mar 22, 2017 at 05:07:30AM -0600, Jan Beulich wrote: > >>> On 21.03.17 at 19:17, wrote: > > --- a/tools/libxl/libxl.h > > +++ b/tools/libxl/libxl.h > > @@ -288,6 +288,12 @@ > > #define LIBXL_HAVE_SCHED_CREDIT2_PARAMS 1 > > > > /* > > + * LIBXL_HAVE_CRASH_CTL indicates that the 'crash_c

Re: [Xen-devel] [PATCH v3 6/6] x86/viridian: implement the crash MSRs

2017-03-22 Thread Paul Durrant
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: 22 March 2017 11:10 > To: Jan Beulich > Cc: Paul Durrant ; Wei Liu ; > Andrew Cooper ; Ian Jackson > ; xen-de...@lists.xenproject.org > Subject: Re: [Xen-devel] [PATCH v3 6/6] x86/viridian: implement the crash > MSRs

Re: [Xen-devel] [GSoC] GSoC Introduction : Fuzzing Xen hypercall interface

2017-03-22 Thread Wei Liu
On Wed, Mar 22, 2017 at 10:54:38AM +0100, Felix Schmoll wrote: > > Got it working! Thanks for all the help, will look into the "actual" task > now :D That's good. IIRC the application is now open. Don't forget to submit your proposal. Wei. > > > > > Wei. > > _

[Xen-devel] [PATCH] tools/libxenforeignmemory: add a call to restrict the handle

2017-03-22 Thread Paul Durrant
Commit 8ef5f344d061 "tools/libxendevicemodel: add a call to restrict the handle" added a function to the devicemodel interface to restrict operations through the API to a specific domain, where a capable under- lying privcmd driver exists. This patch adds similar functionality to the xenforeignmem

Re: [Xen-devel] [PATCH 0/2] libxl: fix soft reset for PVHv2 guests

2017-03-22 Thread Wei Liu
On Mon, Mar 20, 2017 at 07:03:09PM +0100, Vitaly Kuznetsov wrote: > Vitaly Kuznetsov (2): > libxl: don't try to rename dm save file for PVH I've pushed this patch. > libxl: preserve console tty across soft reset > I will wait for v2 for this one. > tools/libxl/libxl_console.c | 5 -

Re: [Xen-devel] [PATCH 1/3] xen/x86: split boot trampoline into permanent and temporary part

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 14:10, wrote: > The hypervisor needs a trampoline in low memory for early boot and > later for bringing up cpus and during wakeup from suspend. Today this > trampoline is kept completely even if most of it isn't needed later. > > Split the trampoline into a permanent part and a

Re: [Xen-devel] [PATCH v3 6/6] x86/viridian: implement the crash MSRs

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 19:17, wrote: > +case HV_X64_MSR_CRASH_CTL: > +{ > +HV_CRASH_CTL_REG_CONTENTS ctl = { > +.CrashNotify = 1, > +}; This initializer failed my pre-push build test: Some gcc versions we still support don't allow fields of unnamed union members to

Re: [Xen-devel] [RFC PATCH 1/23] VIOMMU: Add vIOMMU helper functions to create, destroy and query capabilities

2017-03-22 Thread Julien Grall
Hello, On 22/03/17 08:45, Lan Tianyu wrote: Hi Julien: Thanks for review. On 2017年03月22日 03:56, Julien Grall wrote: === diff --git a/xen/include/public/viommu.h b/xen/include/public/viommu.h new file mode 100644 index 000..ca2419b --- /dev/nul

[Xen-devel] [PATCH] arch: drop ALIGN_STR

2017-03-22 Thread Jan Beulich
... as being unused and having been unusable: It was clearly intended for use in asm(), yet was placed inside __ASSEMBLY__ conditionals. Also drop __ALIGN{,_STR} - there's no need to have a second flavor of these constructs with no difference in behavior. Signed-off-by: Jan Beulich --- a/xen/in

[Xen-devel] [xen-4.5-testing test] 106818: regressions - trouble: broken/fail/pass

2017-03-22 Thread osstest service owner
flight 106818 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/106818/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-winxpsp3-vcpus1 3 host-install(3) broken REGR. vs. 106015 test-amd64

Re: [Xen-devel] [PATCH v3 6/6] x86/viridian: implement the crash MSRs

2017-03-22 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 22 March 2017 11:38 > To: Paul Durrant > Cc: Andrew Cooper ; Ian Jackson > ; xen-de...@lists.xenproject.org > Subject: Re: [Xen-devel] [PATCH v3 6/6] x86/viridian: implement the crash > MSRs > > >>> On 21.03.17 at

Re: [Xen-devel] [PATCH 1/3] xen/x86: split boot trampoline into permanent and temporary part

2017-03-22 Thread Juergen Gross
On 22/03/17 12:33, Jan Beulich wrote: On 21.03.17 at 14:10, wrote: >> The hypervisor needs a trampoline in low memory for early boot and >> later for bringing up cpus and during wakeup from suspend. Today this >> trampoline is kept completely even if most of it isn't needed later. >> >> Split

Re: [Xen-devel] [xen-unstable test] 106504: regressions - FAIL

2017-03-22 Thread Chao Gao
On Tue, Mar 07, 2017 at 07:11:22AM -0700, Jan Beulich wrote: On 07.03.17 at 05:24, wrote: >> On Tue, Mar 07, 2017 at 02:16:50AM -0700, Jan Beulich wrote: >> On 07.03.17 at 06:52, wrote: flight 106504 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/1065

Re: [Xen-devel] [PATCH 0/2] libxl: fix soft reset for PVHv2 guests

2017-03-22 Thread Vitaly Kuznetsov
Wei Liu writes: > On Mon, Mar 20, 2017 at 07:03:09PM +0100, Vitaly Kuznetsov wrote: >> Vitaly Kuznetsov (2): >> libxl: don't try to rename dm save file for PVH > > I've pushed this patch. > >> libxl: preserve console tty across soft reset >> > > I will wait for v2 for this one. > Sure, than

Re: [Xen-devel] [PATCH v2 02/10] x86: assembly, FUNC_START for fn, DATA_START for data

2017-03-22 Thread Jiri Slaby
Hi, On 03/21/2017, 03:08 PM, Pavel Machek wrote: >> -ENTRY(saved_rbp).quad 0 >> -ENTRY(saved_rsi).quad 0 >> -ENTRY(saved_rdi).quad 0 >> -ENTRY(saved_rbx).quad 0 >> +SYM_DATA_START(saved_rbp) .quad 0 >> +SYM_DATA_START(saved_rsi) .quad 0 >> +SYM_DATA_

[Xen-devel] [PATCH v4 3/3] x86/viridian: implement the crash MSRs

2017-03-22 Thread Paul Durrant
Section 2.4.4 of the Hypervisor Top Level Functional Specification states that enabling bit 10 in EDX of CPUID leaf 3 advertises to Windows a set of MSRs into which it can write crash information. This patch advertises that bit and implements the MSRs such that Xen can log the information if a Win

[Xen-devel] [PATCH v4 2/3] x86/viridian: make the threshold for HvNotifyLongSpinWait tunable

2017-03-22 Thread Paul Durrant
The current threshold before the guest issues the hypercall is, and always has been, hard-coded to 2047. It is not clear where this number came from so, to at least allow for ease of experimentation, this patch makes the threshold tunable via the Xen command line. Signed-off-by: Paul Durrant Revi

[Xen-devel] [PATCH v4 0/3] viridian updates

2017-03-22 Thread Paul Durrant
Paul Durrant (3): x86/viridian: don't put Xen version information in CPUID leaf 2 x86/viridian: make the threshold for HvNotifyLongSpinWait tunable x86/viridian: implement the crash MSRs docs/man/xl.cfg.pod.5.in| 10 ++- docs/misc/xen-command-line.markdown | 16 tools/lib

[Xen-devel] [PATCH v4 1/3] x86/viridian: don't put Xen version information in CPUID leaf 2

2017-03-22 Thread Paul Durrant
The Hypervisor Top Level Functional Specification v5.0a states in section 2.5: "The hypervisor version information is encoded in leaf 0x4002. Two version numbers are provided: the main version and the service version. The main version includes a major and minor version number and a build numbe

Re: [Xen-devel] [PATCH 02/18] xen/arm: Restore HCR_EL2 register

2017-03-22 Thread Julien Grall
(CC Mark for the TLB question) Hi Stefano, On 21/03/17 00:31, Stefano Stabellini wrote: On Thu, 16 Mar 2017, Julien Grall wrote: Hi Stefano On 03/16/2017 10:33 PM, Stefano Stabellini wrote: On Wed, 15 Mar 2017, Julien Grall wrote: Hi Wei, On 15/03/17 08:34, Wei Chen wrote: On 2017/3/15 8:

Re: [Xen-devel] [PATCH v4 3/3] x86/viridian: implement the crash MSRs

2017-03-22 Thread Paul Durrant
> -Original Message- > From: Paul Durrant [mailto:paul.durr...@citrix.com] > Sent: 22 March 2017 12:15 > To: xen-de...@lists.xenproject.org > Cc: Paul Durrant ; Ian Jackson > ; Andrew Cooper > Subject: [PATCH v4 3/3] x86/viridian: implement the crash MSRs > > Section 2.4.4 of the Hypervis

Re: [Xen-devel] [PATCH 14/18] xen/arm: Unmask the Abort/SError bit in the exception entries

2017-03-22 Thread Julien Grall
Hi Wei, On 22/03/17 08:49, Wei Chen wrote: Hi Stefano, On 2017/3/21 5:38, Stefano Stabellini wrote: On Mon, 13 Mar 2017, Wei Chen wrote: Currently, we masked the Abort/SError bit in Xen exception entries. So Xen could not capture any Abort/SError while it's running. Now, Xen has the ability t

Re: [Xen-devel] [PATCH] arch: drop ALIGN_STR

2017-03-22 Thread Andrew Cooper
On 22/03/17 11:44, Jan Beulich wrote: > ... as being unused and having been unusable: It was clearly intended > for use in asm(), yet was placed inside __ASSEMBLY__ conditionals. > > Also drop __ALIGN{,_STR} - there's no need to have a second flavor of > these constructs with no difference in behav

Re: [Xen-devel] [PATCH v4 3/3] x86/viridian: implement the crash MSRs

2017-03-22 Thread Jan Beulich
>>> On 22.03.17 at 13:17, wrote: >> From: Paul Durrant [mailto:paul.durr...@citrix.com] >> Sent: 22 March 2017 12:15 >> --- a/tools/libxl/libxl.h >> +++ b/tools/libxl/libxl.h >> @@ -288,6 +288,12 @@ >> #define LIBXL_HAVE_SCHED_CREDIT2_PARAMS 1 >> >> /* >> + * LIBXL_HAVE_CRASH_CTL indicates that

Re: [Xen-devel] [PATCH 16/18] xen/arm: Isolate the SError between the context switch of 2 vCPUs

2017-03-22 Thread Julien Grall
Hi Wei, On 22/03/17 08:53, Wei Chen wrote: Hi Stefano, On 2017/3/21 5:46, Stefano Stabellini wrote: On Mon, 13 Mar 2017, Wei Chen wrote: If there is a pending SError while we are doing context switch, if the SError handle option is "FORWARD", We have to guranatee this serror to be caught by c

Re: [Xen-devel] [PATCH] arch: drop ALIGN_STR

2017-03-22 Thread Julien Grall
Hi Jan, On 22/03/17 11:44, Jan Beulich wrote: ... as being unused and having been unusable: It was clearly intended for use in asm(), yet was placed inside __ASSEMBLY__ conditionals. Also drop __ALIGN{,_STR} - there's no need to have a second flavor of these constructs with no difference in beh

Re: [Xen-devel] [RFC PATCH 1/23] VIOMMU: Add vIOMMU helper functions to create, destroy and query capabilities

2017-03-22 Thread Lan, Tianyu
On 3/22/2017 4:36 PM, Tian, Kevin wrote: From: Julien Grall [mailto:julien.gr...@arm.com] Sent: Wednesday, March 22, 2017 3:57 AM diff --git a/xen/common/Makefile b/xen/common/Makefile index 0fed30b..b58de63 100644 --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -60,6 +60,7 @@ obj-y +=

Re: [Xen-devel] [PATCH 02/18] xen/arm: Restore HCR_EL2 register

2017-03-22 Thread Mark Rutland
On Wed, Mar 22, 2017 at 12:16:20PM +, Julien Grall wrote: > (CC Mark for the TLB question) [Adding Marc since he should understand this better than I do] I've trimmed a lot of context here, since it wasn't clear if it was relevant to the question. If there's something I've missed, please poin

Re: [Xen-devel] [xen-unstable test] 106504: regressions - FAIL

2017-03-22 Thread Jan Beulich
>>> On 22.03.17 at 05:53, wrote: > I have written a xtf test case (many codes are from hvmloader) to > trigger this assertion. The test case is in attachments. Thanks for doing this. > Bottom is the output > of this test. This test initializes PIT channel0 to generate periodic timer > interrupt

Re: [Xen-devel] [PATCH] x86/hvm: switch some open-coded dpci access to use the provided macro

2017-03-22 Thread Roger Pau Monne
On Tue, Mar 21, 2017 at 10:33:26AM -0600, Jan Beulich wrote: > >>> On 21.03.17 at 16:41, wrote: > > No functional change. > > The reason it's done the original way is, I guess, that - other than > your title suggests - this is not a macro, and not even an inline > function. In cases where the two

[Xen-devel] [PATCH RESEND] tools/libxl: add support for emulated NVMe drives

2017-03-22 Thread Paul Durrant
Upstream QEMU supports emulation of NVM Express a.k.a. NVMe drives. This patch adds a new vdev type into libxl to allow such drives to be presented to HVM guests. Because the purpose of the new vdev is purely to configure emulation, the syntax only supports specification of whole disks. Also there

Re: [Xen-devel] [xen-unstable test] 106504: regressions - FAIL

2017-03-22 Thread Chao Gao
On Wed, Mar 22, 2017 at 06:47:33AM -0600, Jan Beulich wrote: On 22.03.17 at 05:53, wrote: >> I have written a xtf test case (many codes are from hvmloader) to >> trigger this assertion. The test case is in attachments. > >Thanks for doing this. > >> Bottom is the output >> of this test. This

Re: [Xen-devel] [PATCH 2/3] xen/x86: use trampoline e820 buffer for BIOS interface only

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 14:10, wrote: > @@ -133,7 +134,8 @@ static struct change_member *change_point[2*E820MAX] > __initdata; > static struct e820entry *overlap_list[E820MAX] __initdata; > static struct e820entry new_bios[E820MAX] __initdata; > > -static int __init sanitize_e820_map(struct e820en

Re: [Xen-devel] [PATCH 3/3] xen/x86: support larger memory map from EFI

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 14:10, wrote: > Use a larger e820 map buffer for non-BIOS memory map sources. This > requires to have different defines for the maximum number of E820 map > entries for the raw BIOS buffer and the later used struct e820map. > > While at it use e820.h in mem.S in order to avoid

Re: [Xen-devel] [PATCH v2 01/27] ARM: GICv3 ITS: parse and store ITS subnodes from hardware DT

2017-03-22 Thread Julien Grall
Hi Andre, On 03/16/2017 11:20 AM, Andre Przywara wrote: diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig index 2e023d1..bf64c61 100644 --- a/xen/arch/arm/Kconfig +++ b/xen/arch/arm/Kconfig @@ -45,6 +45,10 @@ config ACPI config HAS_GICV3 bool +config HAS_ITS +bool "GICv3

Re: [Xen-devel] [PATCH v2 02/27] ARM: GICv3: allocate LPI pending and property table

2017-03-22 Thread Julien Grall
Hi Andre, On 03/16/2017 11:20 AM, Andre Przywara wrote: diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig index bf64c61..86f7b53 100644 --- a/xen/arch/arm/Kconfig +++ b/xen/arch/arm/Kconfig @@ -49,6 +49,21 @@ config HAS_ITS bool "GICv3 ITS MSI controller support" depends

Re: [Xen-devel] [RFC PATCH 1/23] VIOMMU: Add vIOMMU helper functions to create, destroy and query capabilities

2017-03-22 Thread Lan, Tianyu
On 3/22/2017 7:40 PM, Julien Grall wrote: Hello, On 22/03/17 08:45, Lan Tianyu wrote: Hi Julien: Thanks for review. On 2017年03月22日 03:56, Julien Grall wrote: === diff --git a/xen/include/public/viommu.h b/xen/include/public/viommu.h new file mode 1006

Re: [Xen-devel] [PATCH] x86/hvm: switch some open-coded dpci access to use the provided macro

2017-03-22 Thread Jan Beulich
>>> On 22.03.17 at 13:49, wrote: > On Tue, Mar 21, 2017 at 10:33:26AM -0600, Jan Beulich wrote: >> >>> On 21.03.17 at 16:41, wrote: >> > No functional change. >> >> The reason it's done the original way is, I guess, that - other than >> your title suggests - this is not a macro, and not even an

Re: [Xen-devel] [xen-unstable test] 106504: regressions - FAIL

2017-03-22 Thread Jan Beulich
>>> On 22.03.17 at 07:13, wrote: > On Wed, Mar 22, 2017 at 06:47:33AM -0600, Jan Beulich wrote: > On 22.03.17 at 05:53, wrote: >>> (d1) [ 1409.741660] --- Xen Test Framework --- >>> (d1) [ 1409.741869] Environment: HVM 32bit (No paging) >>> (d1) [ 1409.741964] Test periodic-timer >>> (d1) [ 1

Re: [Xen-devel] [PATCH 02/18] xen/arm: Restore HCR_EL2 register

2017-03-22 Thread Marc Zyngier
On 22/03/17 12:45, Mark Rutland wrote: > On Wed, Mar 22, 2017 at 12:16:20PM +, Julien Grall wrote: >> (CC Mark for the TLB question) > > [Adding Marc since he should understand this better than I do] > > I've trimmed a lot of context here, since it wasn't clear if it was > relevant to the que

Re: [Xen-devel] [PATCH v2 03/27] ARM: GICv3 ITS: allocate device and collection table

2017-03-22 Thread Julien Grall
Hi Andre, On 03/16/2017 11:20 AM, Andre Przywara wrote: Each ITS maps a pair of a DeviceID (for instance derived from a PCI b/d/f triplet) and an EventID (the MSI payload or interrupt ID) to a pair of LPI number and collection ID, which points to the target CPU. This mapping is stored in the dev

Re: [Xen-devel] [PATCH v4 1/3] x86/viridian: don't put Xen version information in CPUID leaf 2

2017-03-22 Thread Jan Beulich
>>> On 22.03.17 at 13:15, wrote: > --- a/xen/arch/x86/hvm/viridian.c > +++ b/xen/arch/x86/hvm/viridian.c > @@ -164,6 +164,16 @@ typedef struct { > #define CPUID6A_MSR_BITMAPS (1 << 1) > #define CPUID6A_NESTED_PAGING (1 << 3) > > +/* > + * Version and build number reported by CPUID leaf 2

[Xen-devel] [xen-4.7-testing test] 106821: trouble: blocked/broken/fail/pass

2017-03-22 Thread osstest service owner
flight 106821 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/106821/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-33 host-install(3)broken REGR. vs. 10

[Xen-devel] [PATCH v2 1/2] libxl: preserve console tty across soft reset

2017-03-22 Thread Vitaly Kuznetsov
On soft reset we remove the domain from xenstore and introduce it back to have everything reconnected. Console, however, stays attached (as xenconsoled checks if the domain is dying and our domain is not) but we lose the information about tty: before soft reset: console = "" ... type =

[Xen-devel] [PATCH v2 0/2] libxl: fix soft reset for PVHv2 guests

2017-03-22 Thread Vitaly Kuznetsov
Hi, I'm trying to make kexec/kdump work for PVHv2 guests too. PVHv2 guests are almost HVM guests so no major changes to the soft reset procedures are required. A few issues, however, arose during testing. Changes since v1: - PATCH1 was dropped from the series as it was merged [Wei Liu] - Use libx

[Xen-devel] [PATCH v2 2/2] libxl: use libxl__xs_read_checked() instead or raw xs_read() in do_domain_soft_reset()

2017-03-22 Thread Vitaly Kuznetsov
Replace raw xs_read() calls with libxl__xs_read_checked() and bail on error. Signed-off-by: Vitaly Kuznetsov --- tools/libxl/libxl_create.c | 26 -- 1 file changed, 16 insertions(+), 10 deletions(-) diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c ind

[Xen-devel] [xen-unstable-smoke test] 106841: tolerable trouble: broken/fail/pass - PUSHED

2017-03-22 Thread osstest service owner
flight 106841 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/106841/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64-pvops 5 ker

Re: [Xen-devel] [PATCH RESEND] tools/libxl: add support for emulated NVMe drives

2017-03-22 Thread Ian Jackson
Paul Durrant writes ("[PATCH RESEND] tools/libxl: add support for emulated NVMe drives"): > NOTE: QEMU's emulation only supports a single NVMe namespace, so the > vdev syntax does not include specification of a namespace. > Also, current versions of SeaBIOS do not support booting from

Re: [Xen-devel] [PATCH RFC 1/2] xen: credit2: flexible configuration of runqueues

2017-03-22 Thread Dario Faggioli
Hey Praveen, Thanks for working on this and sending the patches! A couple of things on the submission itself. When we send more than 1 patch, we say that we send a "patch series". That basically is a set of related patches. They may be related in various ways. For instance, each patch may be a p

Re: [Xen-devel] [PATCH v9 2/5] x86/ioreq server: Add DMOP to map guest ram with p2m_ioreq_server to an ioreq server.

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 03:52, wrote: > --- > xen/arch/x86/hvm/dm.c| 37 ++-- > xen/arch/x86/hvm/emulate.c | 65 --- > xen/arch/x86/hvm/ioreq.c | 38 + > xen/arch/x86/mm/hap/nested_hap.c | 2 +- > xen/arch/x

Re: [Xen-devel] [PATCH v9 3/5] x86/ioreq server: Handle read-modify-write cases for p2m_ioreq_server pages.

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 03:52, wrote: > @@ -226,6 +249,17 @@ static int hvmemul_do_io( > vio->io_req.state = STATE_IOREQ_NONE; > break; > } > + > +/* > + * This is part of a read-modify-write instruction. > +

Re: [Xen-devel] [PATCH RESEND] tools/libxl: add support for emulated NVMe drives

2017-03-22 Thread Paul Durrant
> -Original Message- > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] > Sent: 22 March 2017 14:17 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org; Wei Liu > Subject: Re: [PATCH RESEND] tools/libxl: add support for emulated NVMe > drives > > Paul Durrant writes ("[PATCH RESE

Re: [Xen-devel] [PATCH RFC 1/2] xen: credit2: flexible configuration of runqueues

2017-03-22 Thread Dario Faggioli
Ok, now about the code. On Fri, 2017-03-10 at 23:56 +0530, Praveen Kumar wrote: > The user can create runqueue per-cpu using Xen boot parameter like > below: > >  credit2_runqueue=cpu > > which would mean the following: >  - pCPU 0 belong to runqueue 0 >  - pCPU 1 belong to runqueue 1 >  - pCPU

Re: [Xen-devel] [PATCH v2 03/10] x86: assembly, use SYM_FUNC_END for functions

2017-03-22 Thread Josh Poimboeuf
On Mon, Mar 20, 2017 at 01:32:15PM +0100, Jiri Slaby wrote: > Somewhere END was used to end a function, elsewhere, nothing was used. > So unify it and mark them all by SYM_FUNC_END. > > Signed-off-by: Jiri Slaby For me these patches would be easier to review if the SYM_FUNC_START and SYM_FUNC_EN

Re: [Xen-devel] [PATCH v9 4/5] x86/ioreq server: Asynchronously reset outstanding p2m_ioreq_server entries.

2017-03-22 Thread Jan Beulich
>>> On 21.03.17 at 03:52, wrote: > --- a/xen/arch/x86/hvm/ioreq.c > +++ b/xen/arch/x86/hvm/ioreq.c > @@ -949,6 +949,14 @@ int hvm_map_mem_type_to_ioreq_server(struct domain *d, > ioservid_t id, > > spin_unlock_recursive(&d->arch.hvm_domain.ioreq_server.lock); > > +if ( rc == 0 && fla

Re: [Xen-devel] [PATCH v4 1/3] x86/viridian: don't put Xen version information in CPUID leaf 2

2017-03-22 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 22 March 2017 13:55 > To: Paul Durrant > Cc: Andrew Cooper ; xen- > de...@lists.xenproject.org > Subject: Re: [PATCH v4 1/3] x86/viridian: don't put Xen version information in > CPUID leaf 2 > > >>> On 22.03.17 at

  1   2   3   >