[Xen-devel] [qemu-mainline test] 119386: tolerable FAIL - PUSHED

2018-02-16 Thread osstest service owner
flight 119386 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/119386/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 119036 test-armhf-armhf-libvirt-xsm 14 sav

Re: [Xen-devel] [PATCH v2] x86/nmi: start NMI watchdog on CPU0 after SMP bootstrap

2018-02-16 Thread Alexey G
On Fri, 16 Feb 2018 17:46:48 + Igor Druzhinin wrote: >We're noticing a reproducible system boot hang on certain >post-Skylake platforms where the BIOS is configured in >legacy boot mode with x2APIC disabled. The system stalls >immediately after writing the first SMP initialization >sequence i

[Xen-devel] [libvirt test] 119370: regressions - trouble: blocked/broken/pass

2018-02-16 Thread osstest service owner
flight 119370 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/119370/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvopsbroken build-armhf-pvops 5 host-build-pre

[Xen-devel] [linux-linus bisection] complete test-amd64-i386-xl-qemut-win7-amd64

2018-02-16 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-xl-qemut-win7-amd64 testid xen-boot Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-traditi

[Xen-devel] [seabios test] 119427: regressions - FAIL

2018-02-16 Thread osstest service owner
flight 119427 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/119427/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539 Tests which did not suc

Re: [Xen-devel] [PATCH 2/4] xen/arm: read ACTLR on the pcpu where the vcpu will run

2018-02-16 Thread Stefano Stabellini
On Fri, 16 Feb 2018, Julien Grall wrote: > Hi Stefano, > > On 15/02/18 23:16, Stefano Stabellini wrote: > > On big.LITTLE systems not all cores have the same ACTLR. Instead of > > reading ACTLR and setting v->arch.actlr in vcpu_initialise, which is run > > always on pcpu 0, do it later on the same

[Xen-devel] [xen-unstable test] 119358: regressions - FAIL

2018-02-16 Thread osstest service owner
flight 119358 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/119358/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-xsm7 xen-boot fail REGR. vs. 118698 Regressions which

Re: [Xen-devel] [PATCH 4/4] xen/arm: update the docs about heterogeneous computing

2018-02-16 Thread Stefano Stabellini
On Fri, 16 Feb 2018, Julien Grall wrote: > On 16/02/2018 21:15, Stefano Stabellini wrote: > > On Fri, 16 Feb 2018, Julien Grall wrote: > > > On 16/02/2018 20:50, Stefano Stabellini wrote: > > > > On Fri, 16 Feb 2018, Julien Grall wrote: > > > > > Hi Stefano, > > > > > > > > > > On 15/02/18 23:17,

[Xen-devel] [xen-unstable-smoke test] 119436: tolerable all pass - PUSHED

2018-02-16 Thread osstest service owner
flight 119436 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/119436/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[Xen-devel] [xtf test] 119433: tolerable all pass - PUSHED

2018-02-16 Thread osstest service owner
flight 119433 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/119433/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-xtf-amd64-amd64-3 52 xtf/test-hvm64-memop-seg fail never pass test-xtf-amd64-amd64-4 52 xtf/test-hvm6

Re: [Xen-devel] [PATCH 0/4] unsafe big.LITTLE support

2018-02-16 Thread Stefano Stabellini
On Fri, 16 Feb 2018, Julien Grall wrote: > On 15/02/18 23:16, Stefano Stabellini wrote: > > Hi all, > > Hi Stefano, > > > This series changes the initialization of two virtual registers to make > > sure they match the value of the underlying physical cpu. > > > > It also disables cpus different

Re: [Xen-devel] [PATCH 4/4] xen/arm: update the docs about heterogeneous computing

2018-02-16 Thread Julien Grall
On 16/02/2018 21:15, Stefano Stabellini wrote: On Fri, 16 Feb 2018, Julien Grall wrote: On 16/02/2018 20:50, Stefano Stabellini wrote: On Fri, 16 Feb 2018, Julien Grall wrote: Hi Stefano, On 15/02/18 23:17, Stefano Stabellini wrote: Update the documentation of the hmp-unsafe option to expl

Re: [Xen-devel] [PATCH 3/4] xen/arm: set vpidr on the pcpu where the vcpu will run

2018-02-16 Thread Julien Grall
Hi Stefano, On 16/02/2018 21:34, Stefano Stabellini wrote: On Fri, 16 Feb 2018, Julien Grall wrote: Hi Stefano, On 16/02/2018 20:59, Stefano Stabellini wrote: On Fri, 16 Feb 2018, Julien Grall wrote: On 16/02/2018 20:31, Stefano Stabellini wrote: On Fri, 16 Feb 2018, Julien Grall wrote: Hi

Re: [Xen-devel] PV guest with PCI passthrough crash on Xen 4.8.3 inside KVM when booted through OVMF

2018-02-16 Thread Rich Persaud
On Feb 16, 2018, at 14:02, Andrew Cooper wrote: > > IMO, PCI Passthrough is a trainwreck, and it is a miracle it functions > at all. Would that statement apply to other hypervisors like KVM, VMware ESX or Hyper-V, i.e. are the deficiencies in PCI devices/firmware, IOMMUs, platform firmware?

Re: [Xen-devel] [PATCH 3/4] xen/arm: set vpidr on the pcpu where the vcpu will run

2018-02-16 Thread Stefano Stabellini
On Fri, 16 Feb 2018, Julien Grall wrote: > Hi Stefano, > > On 16/02/2018 20:59, Stefano Stabellini wrote: > > On Fri, 16 Feb 2018, Julien Grall wrote: > > > On 16/02/2018 20:31, Stefano Stabellini wrote: > > > > On Fri, 16 Feb 2018, Julien Grall wrote: > > > > > Hi Stefano, > > > > > > > > > > On

Re: [Xen-devel] [PATCH] intel_iommu: allow updating FEADDR and FEUADDR with one 64bit write

2018-02-16 Thread Marek Marczykowski-Górecki
On Wed, Jan 24, 2018 at 03:18:48PM +0100, Marek Marczykowski-Górecki wrote: > Allow updating those two adjacent 32bit fields with one 64bit write. > This fixes qemu crash when booting Xen inside. > > See discussion on Xen side of the thing here: > http://xen.markmail.org/message/6mrmemrnmhxvaxba

Re: [Xen-devel] [PATCH 4/4] xen/arm: update the docs about heterogeneous computing

2018-02-16 Thread Stefano Stabellini
On Fri, 16 Feb 2018, Julien Grall wrote: > On 16/02/2018 20:50, Stefano Stabellini wrote: > > On Fri, 16 Feb 2018, Julien Grall wrote: > > > Hi Stefano, > > > > > > On 15/02/18 23:17, Stefano Stabellini wrote: > > > > Update the documentation of the hmp-unsafe option to explain how to use > > > >

Re: [Xen-devel] [PATCH 3/4] xen/arm: set vpidr on the pcpu where the vcpu will run

2018-02-16 Thread Julien Grall
Hi Stefano, On 16/02/2018 20:59, Stefano Stabellini wrote: On Fri, 16 Feb 2018, Julien Grall wrote: On 16/02/2018 20:31, Stefano Stabellini wrote: On Fri, 16 Feb 2018, Julien Grall wrote: Hi Stefano, On 15/02/18 23:16, Stefano Stabellini wrote: On big.LITTLE systems not all cores have the s

Re: [Xen-devel] [PATCH 4/4] xen/arm: update the docs about heterogeneous computing

2018-02-16 Thread Julien Grall
On 16/02/2018 20:50, Stefano Stabellini wrote: On Fri, 16 Feb 2018, Julien Grall wrote: Hi Stefano, On 15/02/18 23:17, Stefano Stabellini wrote: Update the documentation of the hmp-unsafe option to explain how to use it safely, together with the right cpu affinity setting, on big.LITTLE syst

Re: [Xen-devel] [PATCH 3/4] xen/arm: set vpidr on the pcpu where the vcpu will run

2018-02-16 Thread Stefano Stabellini
On Fri, 16 Feb 2018, Julien Grall wrote: > On 16/02/2018 20:31, Stefano Stabellini wrote: > > On Fri, 16 Feb 2018, Julien Grall wrote: > > > Hi Stefano, > > > > > > On 15/02/18 23:16, Stefano Stabellini wrote: > > > > On big.LITTLE systems not all cores have the same midr. Instead of > > > > initi

[Xen-devel] [linux-linus test] 119350: regressions - FAIL

2018-02-16 Thread osstest service owner
flight 119350 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/119350/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt 7 xen-boot fail REGR. vs. 118324 test-amd64-i386-xl-

Re: [Xen-devel] [PATCH 4/4] xen/arm: update the docs about heterogeneous computing

2018-02-16 Thread Stefano Stabellini
On Fri, 16 Feb 2018, Julien Grall wrote: > Hi Stefano, > > On 15/02/18 23:17, Stefano Stabellini wrote: > > Update the documentation of the hmp-unsafe option to explain how to use > > it safely, together with the right cpu affinity setting, on big.LITTLE > > systems. > > > > Also update the warni

Re: [Xen-devel] [PATCH 3/4] xen/arm: set vpidr on the pcpu where the vcpu will run

2018-02-16 Thread Julien Grall
On 16/02/2018 20:31, Stefano Stabellini wrote: On Fri, 16 Feb 2018, Julien Grall wrote: Hi Stefano, On 15/02/18 23:16, Stefano Stabellini wrote: On big.LITTLE systems not all cores have the same midr. Instead of initializing the vpidr to the boot cpu midr, set it to the value of the midr of

Re: [Xen-devel] [RESEND v2] mm: don't defer struct page initialization for Xen pv guests

2018-02-16 Thread Andrew Morton
On Fri, 16 Feb 2018 16:41:01 +0100 Juergen Gross wrote: > --- a/mm/page_alloc.c > +++ b/mm/page_alloc.c > @@ -347,6 +347,9 @@ static inline bool update_defer_init(pg_data_t *pgdat, > /* Always populate low zones for address-constrained allocations */ > if (zone_end < pgdat_end_pfn(pgd

Re: [Xen-devel] [RESEND v2] mm: don't defer struct page initialization for Xen pv guests

2018-02-16 Thread Andrew Morton
On Fri, 16 Feb 2018 16:41:01 +0100 Juergen Gross wrote: > Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing > memory during allocation in vmemmap") broke Xen pv domains in some > configurations, as the "Pinned" information in struct page of early > page tables could get lost. Thi

Re: [Xen-devel] [PATCH 3/4] xen/arm: set vpidr on the pcpu where the vcpu will run

2018-02-16 Thread Stefano Stabellini
On Fri, 16 Feb 2018, Julien Grall wrote: > Hi Stefano, > > On 15/02/18 23:16, Stefano Stabellini wrote: > > On big.LITTLE systems not all cores have the same midr. Instead of > > initializing the vpidr to the boot cpu midr, set it to the value of the > > midr of the pcpu where the vcpu will run. >

Re: [Xen-devel] PV guest with PCI passthrough crash on Xen 4.8.3 inside KVM when booted through OVMF

2018-02-16 Thread Marek Marczykowski-Górecki
On Fri, Feb 16, 2018 at 07:02:39PM +, Andrew Cooper wrote: > On 16/02/18 18:51, Marek Marczykowski-Górecki wrote: > > On Fri, Feb 16, 2018 at 05:52:50PM +, Andrew Cooper wrote: > >> On 16/02/18 17:48, Marek Marczykowski-Górecki wrote: > >>> Hi, > >>> > >>> As in the subject, the guest crash

Re: [Xen-devel] PV guest with PCI passthrough crash on Xen 4.8.3 inside KVM when booted through OVMF

2018-02-16 Thread Andrew Cooper
On 16/02/18 18:51, Marek Marczykowski-Górecki wrote: > On Fri, Feb 16, 2018 at 05:52:50PM +, Andrew Cooper wrote: >> On 16/02/18 17:48, Marek Marczykowski-Górecki wrote: >>> Hi, >>> >>> As in the subject, the guest crashes on boot, before kernel output >>> anything. I've isolated this to the co

Re: [Xen-devel] PV guest with PCI passthrough crash on Xen 4.8.3 inside KVM when booted through OVMF

2018-02-16 Thread Marek Marczykowski-Górecki
On Fri, Feb 16, 2018 at 05:52:50PM +, Andrew Cooper wrote: > On 16/02/18 17:48, Marek Marczykowski-Górecki wrote: > > Hi, > > > > As in the subject, the guest crashes on boot, before kernel output > > anything. I've isolated this to the conditions below: > > - PV guest have PCI device assigned

Re: [Xen-devel] [PATCH v2] tools: libxenstat: fix format string overflow

2018-02-16 Thread Wei Liu
On Fri, Feb 16, 2018 at 07:38:48PM +0100, Dario Faggioli wrote: > With gcc 7.3.0, the build fails like this: > > src/xenstat_linux.c: In function ‘getBridge’ > src/xenstat_linux.c:78:34: warning: ‘%s’ directive writing up to 255 bytes > into a region of size 241 [-Wformat-overflow=] > sprint

[Xen-devel] [PATCH v2] tools: libxenstat: fix format string overflow

2018-02-16 Thread Dario Faggioli
With gcc 7.3.0, the build fails like this: src/xenstat_linux.c: In function ‘getBridge’ src/xenstat_linux.c:78:34: warning: ‘%s’ directive writing up to 255 bytes into a region of size 241 [-Wformat-overflow=] sprintf(tmp, "/sys/class/net/%s/bridge", de->d_name);

Re: [Xen-devel] RTDS with extra time issue

2018-02-16 Thread Dario Faggioli
On Mon, 2018-02-12 at 20:44 +0200, Andrii Anisov wrote: > Dario, > Hi, > On 12.02.18 12:20, Andrii Anisov wrote: > > Actually as per Meng's explanation and calculations the problem was > > on > > my side - wrong DomR task/VCPU parameters. > > I was running the system with dummy loads and values

[Xen-devel] [seabios test] 119373: regressions - FAIL

2018-02-16 Thread osstest service owner
flight 119373 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/119373/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539 Tests which did not suc

Re: [Xen-devel] [PATCH] tools: libxenstat: fix format string overflow

2018-02-16 Thread Dario Faggioli
On Fri, 2018-02-16 at 17:58 +, Wei Liu wrote: > On Fri, Feb 16, 2018 at 06:55:08PM +0100, Dario Faggioli wrote: > > On Fri, 2018-02-16 at 17:44 +, Wei Liu wrote: > > > > > Right! And what do I do if it fails, 'continue' the while(), I > > guess? > > > > Looking at the error message again

Re: [Xen-devel] [PATCH] tools: libxenstat: fix format string overflow

2018-02-16 Thread Wei Liu
On Fri, Feb 16, 2018 at 06:55:08PM +0100, Dario Faggioli wrote: > On Fri, 2018-02-16 at 17:44 +, Wei Liu wrote: > > On Fri, Feb 16, 2018 at 06:36:51PM +0100, Dario Faggioli wrote: > > > > > > --- a/tools/xenstat/libxenstat/src/xenstat_linux.c > > > +++ b/tools/xenstat/libxenstat/src/xenstat_li

Re: [Xen-devel] [PATCH] tools: libxenstat: fix format string overflow

2018-02-16 Thread Dario Faggioli
On Fri, 2018-02-16 at 17:44 +, Wei Liu wrote: > On Fri, Feb 16, 2018 at 06:36:51PM +0100, Dario Faggioli wrote: > > > > --- a/tools/xenstat/libxenstat/src/xenstat_linux.c > > +++ b/tools/xenstat/libxenstat/src/xenstat_linux.c > > @@ -69,18 +69,20 @@ void getBridge(char *excludeName, char *resu

Re: [Xen-devel] [PATCH] tools: libxenstat: fix format string overflow

2018-02-16 Thread Dario Faggioli
On Fri, 2018-02-16 at 17:44 +, Wei Liu wrote: > On Fri, Feb 16, 2018 at 06:36:51PM +0100, Dario Faggioli wrote: > > > > --- a/tools/xenstat/libxenstat/src/xenstat_linux.c > > +++ b/tools/xenstat/libxenstat/src/xenstat_linux.c > > @@ -69,18 +69,20 @@ void getBridge(char *excludeName, char *resu

Re: [Xen-devel] PV guest with PCI passthrough crash on Xen 4.8.3 inside KVM when booted through OVMF

2018-02-16 Thread Andrew Cooper
On 16/02/18 17:48, Marek Marczykowski-Górecki wrote: > Hi, > > As in the subject, the guest crashes on boot, before kernel output > anything. I've isolated this to the conditions below: > - PV guest have PCI device assigned (e1000e emulated by QEMU in this case), >without PCI device it works >

[Xen-devel] PV guest with PCI passthrough crash on Xen 4.8.3 inside KVM when booted through OVMF

2018-02-16 Thread Marek Marczykowski-Górecki
Hi, As in the subject, the guest crashes on boot, before kernel output anything. I've isolated this to the conditions below: - PV guest have PCI device assigned (e1000e emulated by QEMU in this case), without PCI device it works - Xen (in KVM) is started through OVMF; with seabios it works -

[Xen-devel] [PATCH v2] x86/nmi: start NMI watchdog on CPU0 after SMP bootstrap

2018-02-16 Thread Igor Druzhinin
We're noticing a reproducible system boot hang on certain post-Skylake platforms where the BIOS is configured in legacy boot mode with x2APIC disabled. The system stalls immediately after writing the first SMP initialization sequence into APIC ICR. The cause of the problem is watchdog NMI handler

Re: [Xen-devel] [PATCH] tools: libxenstat: fix format string overflow

2018-02-16 Thread Wei Liu
On Fri, Feb 16, 2018 at 05:44:05PM +, Wei Liu wrote: > On Fri, Feb 16, 2018 at 06:36:51PM +0100, Dario Faggioli wrote: > > With gcc 7.3.0, the build fails like this: > > > > src/xenstat_linux.c: In function ‘getBridge’ > > src/xenstat_linux.c:78:34: warning: ‘%s’ directive writing up to 255 by

Re: [Xen-devel] [PATCH] tools: libxenstat: fix format string overflow

2018-02-16 Thread Wei Liu
On Fri, Feb 16, 2018 at 06:36:51PM +0100, Dario Faggioli wrote: > With gcc 7.3.0, the build fails like this: > > src/xenstat_linux.c: In function ‘getBridge’ > src/xenstat_linux.c:78:34: warning: ‘%s’ directive writing up to 255 bytes > into a region of size 241 [-Wformat-overflow=] > sprint

Re: [Xen-devel] [PATCH] mm: don't defer struct page initialization for Xen pv guests

2018-02-16 Thread Pavel Tatashin
On 02/16/2018 09:02 AM, Juergen Gross wrote: On 16/02/18 14:59, Michal Hocko wrote: [CC Pavel] On Fri 16-02-18 14:37:26, Juergen Gross wrote: Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing memory during allocation in vmemmap") broke Xen pv domains in some configurations, as

Re: [Xen-devel] [PATCH] tools: libxenstat: fix format string overflow

2018-02-16 Thread Andrew Cooper
On 16/02/18 17:36, Dario Faggioli wrote: > With gcc 7.3.0, the build fails like this: > > src/xenstat_linux.c: In function ‘getBridge’ > src/xenstat_linux.c:78:34: warning: ‘%s’ directive writing up to 255 bytes > into a region of size 241 [-Wformat-overflow=] > sprintf(tmp, "/sys/class/net/%

Re: [Xen-devel] [RFC PATCH 33/49] ARM: new VGIC: Add PRIORITY registers handlers

2018-02-16 Thread Julien Grall
Hi Andre, On 09/02/18 14:39, Andre Przywara wrote: The priority register handlers are shared between the v2 and v3 emulation, so their implementation goes into vgic-mmio.c, to be easily referenced from the v3 emulation as well later. There is a corner case when we change the priority of a pendin

[Xen-devel] [PATCH] tools: libxenstat: fix format string overflow

2018-02-16 Thread Dario Faggioli
With gcc 7.3.0, the build fails like this: src/xenstat_linux.c: In function ‘getBridge’ src/xenstat_linux.c:78:34: warning: ‘%s’ directive writing up to 255 bytes into a region of size 241 [-Wformat-overflow=] sprintf(tmp, "/sys/class/net/%s/bridge", de->d_name);

Re: [Xen-devel] [RFC PATCH 32/49] ARM: new VGIC: Add ACTIVE registers handlers

2018-02-16 Thread Julien Grall
Hi Andre, On 09/02/18 14:39, Andre Przywara wrote: The active register handlers are shared between the v2 and v3 emulation, so their implementation goes into vgic-mmio.c, to be easily referenced from the v3 emulation as well later. Since activation/deactivation of an interrupt may happen entirel

Re: [Xen-devel] [RFC PATCH 31/49] ARM: new VGIC: Add PENDING registers handlers

2018-02-16 Thread Julien Grall
Hi Andre, On 09/02/18 14:39, Andre Przywara wrote: The pending register handlers are shared between the v2 and v3 emulation, so their implementation goes into vgic-mmio.c, to be easily referenced from the v3 emulation as well later. For level triggered interrupts the real line level is unaffecte

Re: [Xen-devel] [PATCH] x86: issue branch prediction barrier when switching 64-bit guest to kernel mode

2018-02-16 Thread Andrew Cooper
On 16/02/18 15:39, Jan Beulich wrote: > Since both kernel and user mode run in ring 3, they run in the same > "predictor mode". While the kernel could take care of this itself, doing > so would be yet another item distinguishing PV from native. Additionally > we're in a much better position to issu

Re: [Xen-devel] [PATCH] x86/PV: avoid indirect call/thunk in I/O emulation

2018-02-16 Thread Andrew Cooper
On 16/02/18 16:21, Jan Beulich wrote: On 16.02.18 at 16:50, wrote: >> On 16/02/18 08:00, Jan Beulich wrote: >> On 15.02.18 at 17:53, wrote: On 15/02/18 16:03, Jan Beulich wrote: > --- a/xen/arch/x86/pv/emul-priv-op.c > +++ b/xen/arch/x86/pv/emul-priv-op.c > @@ -73,55 +73

Re: [Xen-devel] [RFC PATCH 30/49] ARM: new VGIC: Add ENABLE registers handlers

2018-02-16 Thread Julien Grall
Hi Andre, On 09/02/18 14:39, Andre Przywara wrote: As the enable register handlers are shared between the v2 and v3 emulation, their implementation goes into vgic-mmio.c, to be easily referenced from the v3 emulation as well later. Signed-off-by: Andre Przywara --- xen/arch/arm/vgic/vgic-mmi

Re: [Xen-devel] [PATCH] shut down domain when last vCPU goes down

2018-02-16 Thread Juergen Gross
On 16/02/18 17:25, Jan Beulich wrote: On 16.02.18 at 16:52, wrote: >> On Fri, Feb 16, 2018 at 08:10:48AM -0700, Jan Beulich wrote: >>> I've just had to deal with an early boot crash of Linux which occurred >>> so early that even "earlyprintk=xen" did not produce any useful output. >>> Hence t

Re: [Xen-devel] [PATCH] shut down domain when last vCPU goes down

2018-02-16 Thread Jan Beulich
>>> On 16.02.18 at 16:52, wrote: > On Fri, Feb 16, 2018 at 08:10:48AM -0700, Jan Beulich wrote: >> I've just had to deal with an early boot crash of Linux which occurred >> so early that even "earlyprintk=xen" did not produce any useful output. >> Hence the domain appeared to hang, while in fact i

Re: [Xen-devel] [PATCH] x86/PV: avoid indirect call/thunk in I/O emulation

2018-02-16 Thread Jan Beulich
>>> On 16.02.18 at 16:50, wrote: > On 16/02/18 08:00, Jan Beulich wrote: > On 15.02.18 at 17:53, wrote: >>> On 15/02/18 16:03, Jan Beulich wrote: --- a/xen/arch/x86/pv/emul-priv-op.c +++ b/xen/arch/x86/pv/emul-priv-op.c @@ -73,55 +73,42 @@ void (*pv_post_outb_hook)(unsigned int

Re: [Xen-devel] [PATCH] shut down domain when last vCPU goes down

2018-02-16 Thread Roger Pau Monné
On Fri, Feb 16, 2018 at 03:59:45PM +, Wei Liu wrote: > On Fri, Feb 16, 2018 at 03:52:48PM +, Roger Pau Monné wrote: > > On Fri, Feb 16, 2018 at 08:10:48AM -0700, Jan Beulich wrote: > > > I've just had to deal with an early boot crash of Linux which occurred > > > so early that even "earlypr

Re: [Xen-devel] [PATCH v1] x86/msr: add Raw and Host domain policies

2018-02-16 Thread Andrew Cooper
On 16/02/18 16:00, Sergey Dyasli wrote: > On Fri, 2018-02-16 at 11:38 +, Andrew Cooper wrote: >> On 16/02/18 11:31, Sergey Dyasli wrote: >>> On Fri, 2018-02-16 at 04:06 -0700, Jan Beulich wrote: >>> On 16.02.18 at 11:33, wrote: > On Thu, 2018-02-15 at 06:33 -0700, Jan Beulich wrote: >>

Re: [Xen-devel] [PATCH v1] x86/msr: add Raw and Host domain policies

2018-02-16 Thread Sergey Dyasli
On Fri, 2018-02-16 at 11:38 +, Andrew Cooper wrote: > On 16/02/18 11:31, Sergey Dyasli wrote: > > On Fri, 2018-02-16 at 04:06 -0700, Jan Beulich wrote: > > > > > > On 16.02.18 at 11:33, wrote: > > > > > > > > On Thu, 2018-02-15 at 06:33 -0700, Jan Beulich wrote: > > > > > > > > On 08.02.18 at

Re: [Xen-devel] [PATCH] shut down domain when last vCPU goes down

2018-02-16 Thread Wei Liu
On Fri, Feb 16, 2018 at 03:52:48PM +, Roger Pau Monné wrote: > On Fri, Feb 16, 2018 at 08:10:48AM -0700, Jan Beulich wrote: > > I've just had to deal with an early boot crash of Linux which occurred > > so early that even "earlyprintk=xen" did not produce any useful output. > > Hence the domain

Re: [Xen-devel] [RFC PATCH 29/49] ARM: new VGIC: Add CTLR, TYPER and IIDR handlers

2018-02-16 Thread Julien Grall
Hi, On 09/02/18 14:39, Andre Przywara wrote: Those three registers are v2 emulation specific, so their implementation lives entirely in vgic-mmio-v2.c. Also they are handled in one function, as their implementation is pretty simple. When the guest enables the distributor, we kick all VCPUs to ge

Re: [Xen-devel] [PATCH] shut down domain when last vCPU goes down

2018-02-16 Thread Roger Pau Monné
On Fri, Feb 16, 2018 at 08:10:48AM -0700, Jan Beulich wrote: > I've just had to deal with an early boot crash of Linux which occurred > so early that even "earlyprintk=xen" did not produce any useful output. > Hence the domain appeared to hang, while in fact it had brought down its > only vCPU. By

Re: [Xen-devel] [PATCH] x86/PV: avoid indirect call/thunk in I/O emulation

2018-02-16 Thread Andrew Cooper
On 16/02/18 08:00, Jan Beulich wrote: On 15.02.18 at 17:53, wrote: >> On 15/02/18 16:03, Jan Beulich wrote: >>> --- a/xen/arch/x86/pv/emul-priv-op.c >>> +++ b/xen/arch/x86/pv/emul-priv-op.c >>> @@ -73,55 +73,42 @@ void (*pv_post_outb_hook)(unsigned int p >>> >>> typedef void io_emul_stub_t

[Xen-devel] [RESEND v2] mm: don't defer struct page initialization for Xen pv guests

2018-02-16 Thread Juergen Gross
Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing memory during allocation in vmemmap") broke Xen pv domains in some configurations, as the "Pinned" information in struct page of early page tables could get lost. This will lead to the kernel trying to write directly into the page t

Re: [Xen-devel] [RFC PATCH 28/49] ARM: new VGIC: Add GICv2 MMIO handling framework

2018-02-16 Thread Julien Grall
Hi Andre, On 09/02/18 14:39, Andre Przywara wrote: Create vgic-mmio-v2.c to describe GICv2 emulation specific handlers using the initializer macros provided by the VGIC MMIO framework. Provide a function to register the GICv2 distributor registers to the Xen MMIO framework. The actual handler fu

[Xen-devel] [PATCH] x86: issue branch prediction barrier when switching 64-bit guest to kernel mode

2018-02-16 Thread Jan Beulich
Since both kernel and user mode run in ring 3, they run in the same "predictor mode". While the kernel could take care of this itself, doing so would be yet another item distinguishing PV from native. Additionally we're in a much better position to issue the barrier command, and we can save a #GP (

Re: [Xen-devel] [RFC PATCH 27/49] ARM: new VGIC: Add MMIO handling framework

2018-02-16 Thread Julien Grall
Hi Andre, On 13/02/18 18:17, Andre Przywara wrote: On 13/02/18 16:52, Julien Grall wrote: +struct vgic_register_region { +    unsigned int reg_offset; +    unsigned int len; +    unsigned int bits_per_irq; +    unsigned int access_flags; +    union +    { +    unsigned long (*read)(struct v

Re: [Xen-devel] [RFC PATCH 24/49] ARM: new VGIC: Add IRQ sync/flush framework

2018-02-16 Thread Julien Grall
On 13/02/18 15:40, Andre Przywara wrote: Hi, On 13/02/18 12:41, Julien Grall wrote: Hi Andre, On 09/02/18 14:39, Andre Przywara wrote: gets called on guest entry and exit. The code talking to the actual GICv2/v3 hardware is added in the following patches. This is based on Linux commit 0919

[Xen-devel] [PATCH v2] mm: don't defer struct page initialization for Xen pv guests

2018-02-16 Thread Juergen Gross
Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing memory during allocation in vmemmap") broke Xen pv domains in some configurations, as the "Pinned" information in struct page of early page tables could get lost. This will lead to the kernel trying to write directly into the page t

Re: [Xen-devel] [PATCH] shut down domain when last vCPU goes down

2018-02-16 Thread Andrew Cooper
On 16/02/18 15:10, Jan Beulich wrote: > --- a/xen/common/domain.c > +++ b/xen/common/domain.c > @@ -1321,6 +1321,22 @@ long do_vcpu_op(int cmd, unsigned int vc > break; > > case VCPUOP_down: > +for_each_vcpu ( d, v ) > +if ( v->vcpu_id != vcpuid && !test_bit(_VPF

Re: [Xen-devel] [RFC PATCH 21/49] ARM: new VGIC: Add acccessor to new struct vgic_irq instance

2018-02-16 Thread Julien Grall
On 13/02/18 11:18, Andre Przywara wrote: Hi, Hi Andre, On 12/02/18 17:42, Julien Grall wrote: Hi Andre, On 09/02/18 14:39, Andre Przywara wrote: The new VGIC implementation centers around a struct vgic_irq instance per virtual IRQ. Provide a function to retrieve the right instance for a

[Xen-devel] [PATCH] shut down domain when last vCPU goes down

2018-02-16 Thread Jan Beulich
I've just had to deal with an early boot crash of Linux which occurred so early that even "earlyprintk=xen" did not produce any useful output. Hence the domain appeared to hang, while in fact it had brought down its only vCPU. By translating this to a shutdown, the situation will be better recogniz

Re: [Xen-devel] [RFC PATCH 15/49] ARM: GIC: Allow tweaking the active state of an IRQ

2018-02-16 Thread Julien Grall
On 13/02/18 15:01, Andre Przywara wrote: Hi, Hi Andre, On 13/02/18 12:02, Julien Grall wrote: On 12/02/18 17:53, Andre Przywara wrote: Hi, Hi Andre, On 12/02/18 13:55, Julien Grall wrote: Hi Andre, On 09/02/18 14:39, Andre Przywara wrote: When playing around with hardware mapped, l

Re: [Xen-devel] [PATCH v2 2/2] vmx/hap: optimize CR4 trapping

2018-02-16 Thread Razvan Cojocaru
On 02/16/2018 02:39 PM, Razvan Cojocaru wrote: > On 02/16/2018 02:37 PM, Roger Pau Monné wrote: >> On Fri, Feb 16, 2018 at 02:30:55PM +0200, Razvan Cojocaru wrote: >>> On 02/16/2018 02:10 PM, Roger Pau Monne wrote: diff --git a/xen/arch/x86/monitor.c b/xen/arch/x86/monitor.c index f229e69

[Xen-devel] [PATCH v2] xen/arm: vgic: Make sure the number of SPIs is a multiple of 32

2018-02-16 Thread Julien Grall
The vGIC relies on having a pending_irq available for every IRQs described in the ranks. As each rank describes 32 interrupts, we need to make sure the number of SPIs is a multiple of 32. Reported-by: Jeff Kubascik Signed-off-by: Julien Grall Cc: Jarvis Roach --- This should be backported

[Xen-devel] [xen-4.8-testing test] 119273: tolerable FAIL - PUSHED

2018-02-16 Thread osstest service owner
flight 119273 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/119273/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-xtf-amd64-amd64-2 49 xtf/test-hvm64-lbr-tsx-vmentry fail like 118818 test-xtf-amd64-amd64-3 49 xt

Re: [Xen-devel] [PATCH] xen/arm: vgic: Make sure the number of SPIs is a multiple of 32

2018-02-16 Thread Julien Grall
(+ Jarvis) Hmmm it looks like my modification in git-send-email to take CC all *-by tags disappeared. So CC jarvis. Cheers, On 16/02/18 14:35, Julien Grall wrote: The vGIC relies on having a pending_irq available for every IRQs described in the ranks. As each rank describes 32 interrupts, we

[Xen-devel] [PATCH] xen/arm: vgic: Make sure the number of SPIs is a multiple of 32

2018-02-16 Thread Julien Grall
The vGIC relies on having a pending_irq available for every IRQs described in the ranks. As each rank describes 32 interrupts, we need to make sure the number of SPIs is a multiple of 32. Reported-by: Jarvis Roach Signed-off-by: Julien Grall --- Jarvis, I don't have Jeff's e-mail address so

Re: [Xen-devel] [PATCH] mm: don't defer struct page initialization for Xen pv guests

2018-02-16 Thread Michal Hocko
On Fri 16-02-18 15:02:17, Juergen Gross wrote: > On 16/02/18 14:59, Michal Hocko wrote: > > [CC Pavel] > > > > On Fri 16-02-18 14:37:26, Juergen Gross wrote: > >> Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing > >> memory during allocation in vmemmap") broke Xen pv domains in s

Re: [Xen-devel] [PATCH] mm: don't defer struct page initialization for Xen pv guests

2018-02-16 Thread Juergen Gross
On 16/02/18 14:59, Michal Hocko wrote: > [CC Pavel] > > On Fri 16-02-18 14:37:26, Juergen Gross wrote: >> Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing >> memory during allocation in vmemmap") broke Xen pv domains in some >> configurations, as the "Pinned" information in struc

Re: [Xen-devel] [PATCH] mm: don't defer struct page initialization for Xen pv guests

2018-02-16 Thread Michal Hocko
[CC Pavel] On Fri 16-02-18 14:37:26, Juergen Gross wrote: > Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing > memory during allocation in vmemmap") broke Xen pv domains in some > configurations, as the "Pinned" information in struct page of early > page tables could get lost. C

[Xen-devel] [PATCH] mm: don't defer struct page initialization for Xen pv guests

2018-02-16 Thread Juergen Gross
Commit f7f99100d8d95dbcf09e0216a143211e79418b9f ("mm: stop zeroing memory during allocation in vmemmap") broke Xen pv domains in some configurations, as the "Pinned" information in struct page of early page tables could get lost. Avoid this problem by not deferring struct page initialization when

Re: [Xen-devel] [PATCH] Propagate microcode update errors

2018-02-16 Thread Shah, Amit
On Fr, 2018-02-16 at 13:19 +, Peter Lawthers wrote: > From: Uwe Dannowski > > Errors on updating the microcode in the processor were silently > dropped when invoked via the microcode_update hypercall. Also, the > log > message was misleading. > > Signed-off-by: Uwe Dannowski > Reviewed-by

[Xen-devel] [PATCH] Propagate microcode update errors

2018-02-16 Thread Peter Lawthers
From: Uwe Dannowski Errors on updating the microcode in the processor were silently dropped when invoked via the microcode_update hypercall. Also, the log message was misleading. Signed-off-by: Uwe Dannowski Reviewed-by: Stefan Nuernberger Reviewed-by: Martin Pohlack CC: David Woodhouse CC:

Re: [Xen-devel] [PATCH] Propagate microcode update errors

2018-02-16 Thread Andrew Cooper
On 16/02/18 13:19, Peter Lawthers wrote: > From: Uwe Dannowski > > Errors on updating the microcode in the processor were silently > dropped when invoked via the microcode_update hypercall. Also, the log > message was misleading. > > Signed-off-by: Uwe Dannowski > Reviewed-by: Stefan Nuernberger

Re: [Xen-devel] [PATCH v2 1/2] x86/hvm: introduce cr_mask to store trapped bits of CR accesses

2018-02-16 Thread Andrew Cooper
On 16/02/18 12:10, Roger Pau Monne wrote: > diff --git a/xen/include/asm-x86/hvm/vcpu.h b/xen/include/asm-x86/hvm/vcpu.h > index d93166fb92..811d4c10ae 100644 > --- a/xen/include/asm-x86/hvm/vcpu.h > +++ b/xen/include/asm-x86/hvm/vcpu.h > @@ -156,6 +156,9 @@ struct hvm_vcpu { > */ > unsi

Re: [Xen-devel] [PATCH v2 2/2] vmx/hap: optimize CR4 trapping

2018-02-16 Thread Razvan Cojocaru
On 02/16/2018 02:37 PM, Roger Pau Monné wrote: > On Fri, Feb 16, 2018 at 02:30:55PM +0200, Razvan Cojocaru wrote: >> On 02/16/2018 02:10 PM, Roger Pau Monne wrote: >>> diff --git a/xen/arch/x86/monitor.c b/xen/arch/x86/monitor.c >>> index f229e69948..4317658c56 100644 >>> --- a/xen/arch/x86/monitor

Re: [Xen-devel] [PATCH v2 2/2] vmx/hap: optimize CR4 trapping

2018-02-16 Thread Roger Pau Monné
On Fri, Feb 16, 2018 at 02:30:55PM +0200, Razvan Cojocaru wrote: > On 02/16/2018 02:10 PM, Roger Pau Monne wrote: > > diff --git a/xen/arch/x86/monitor.c b/xen/arch/x86/monitor.c > > index f229e69948..4317658c56 100644 > > --- a/xen/arch/x86/monitor.c > > +++ b/xen/arch/x86/monitor.c > > @@ -189,10

Re: [Xen-devel] [PATCH v2 2/2] vmx/hap: optimize CR4 trapping

2018-02-16 Thread Razvan Cojocaru
On 02/16/2018 02:10 PM, Roger Pau Monne wrote: > diff --git a/xen/arch/x86/monitor.c b/xen/arch/x86/monitor.c > index f229e69948..4317658c56 100644 > --- a/xen/arch/x86/monitor.c > +++ b/xen/arch/x86/monitor.c > @@ -189,10 +189,11 @@ int arch_monitor_domctl_event(struct domain *d, > ad

Re: [Xen-devel] [PATCH] hvm/monitor: fix usage of the control register mask

2018-02-16 Thread Razvan Cojocaru
On 02/16/2018 02:18 PM, Roger Pau Monne wrote: > Previous usage is not correct and would prevent certain updates from > being notified to the monitor client. > > For example if (value ^ old) == (PGE | PSE) and mask == PGE this > update would not be notified. > > Signed-off-by: Roger Pau Monné >

[Xen-devel] [PATCH] hvm/monitor: fix usage of the control register mask

2018-02-16 Thread Roger Pau Monne
Previous usage is not correct and would prevent certain updates from being notified to the monitor client. For example if (value ^ old) == (PGE | PSE) and mask == PGE this update would not be notified. Signed-off-by: Roger Pau Monné --- Cc: Razvan Cojocaru Cc: Tamas K Lengyel Cc: Jan Beulich

[Xen-devel] [PATCH v2 2/2] vmx/hap: optimize CR4 trapping

2018-02-16 Thread Roger Pau Monne
There a bunch of bits in CR4 that should be allowed to be set directly by the guest without requiring Xen intervention, currently this is already done by passing through guest writes into the CR4 used when running in non-root mode, but taking an expensive vmexit in order to do so. xenalyze reports

[Xen-devel] [PATCH v2 0/2] vmx/hap: optimize CR4 trapping

2018-02-16 Thread Roger Pau Monne
Hello, Following two-patch series optimize CR4 access for vmx/hap. I couldn't figure out a similar approach for AMD, since according to section 15.9 (Instruction Intercepts), you either intercept all access to CR4 or none. In any case a similar optimization for AMD can always be added later. Tha

[Xen-devel] [PATCH v2 1/2] x86/hvm: introduce cr_mask to store trapped bits of CR accesses

2018-02-16 Thread Roger Pau Monne
At the moment this is currently set at VMCS creation and not changed, but further patches are going to change the CR4 mask at runtime. Signed-off-by: Roger Pau Monné --- Cc: Boris Ostrovsky Cc: Suravee Suthikulpanit Cc: Jan Beulich Cc: Andrew Cooper Cc: Jun Nakajima Cc: Kevin Tian --- Chang

Re: [Xen-devel] [PATCH 0/4] unsafe big.LITTLE support

2018-02-16 Thread Julien Grall
On 15/02/18 23:16, Stefano Stabellini wrote: Hi all, Hi Stefano, This series changes the initialization of two virtual registers to make sure they match the value of the underlying physical cpu. It also disables cpus different from the boot cpu, unless a newly introduced command line optio

Re: [Xen-devel] [PATCH] vmx/hap: optimize CR4 trapping

2018-02-16 Thread Razvan Cojocaru
On 02/16/2018 01:25 PM, Roger Pau Monné wrote: > On Thu, Feb 15, 2018 at 09:32:00PM +0200, Razvan Cojocaru wrote: >> On 02/15/2018 08:57 PM, Andrew Cooper wrote: >>> On 15/02/18 16:25, Roger Pau Monne wrote: There a bunch of bits in CR4 that should be allowed to be set directly by the gue

Re: [Xen-devel] Xen-Project apply | Outreachy (interest in 1. High-level Language Support with Unikraft / 2. Xen on ARM: create multiple guests from device tree)

2018-02-16 Thread Lars Kurth
Hi Rupal, I CC'ed two lists and the mentors of projects. Thank you for your interest in the projects. > I went through > https://www.outreachy.org/2018-may-august/communities/xen-project/ > project page and could see that each of these two projects has their own set > of mentors > (2 each, o

Re: [Xen-devel] [PATCH v1] x86/msr: add Raw and Host domain policies

2018-02-16 Thread Andrew Cooper
On 16/02/18 11:31, Sergey Dyasli wrote: > On Fri, 2018-02-16 at 04:06 -0700, Jan Beulich wrote: > On 16.02.18 at 11:33, wrote: >>> On Thu, 2018-02-15 at 06:33 -0700, Jan Beulich wrote: >>> On 08.02.18 at 11:23, wrote: > uint64_t val; > + int rc; > > - if (rdmsr_safe(MS

Re: [Xen-devel] [PATCH v1] x86/msr: add Raw and Host domain policies

2018-02-16 Thread Jan Beulich
>>> On 16.02.18 at 12:31, wrote: > On Fri, 2018-02-16 at 04:06 -0700, Jan Beulich wrote: >> > > > On 16.02.18 at 11:33, wrote: >> > >> > On Thu, 2018-02-15 at 06:33 -0700, Jan Beulich wrote: >> > > > > > On 08.02.18 at 11:23, wrote: >> > > > >> > > >uint64_t val; >> > > > + int rc

Re: [Xen-devel] [PATCH v1] x86/msr: add Raw and Host domain policies

2018-02-16 Thread Sergey Dyasli
On Fri, 2018-02-16 at 04:06 -0700, Jan Beulich wrote: > > > > On 16.02.18 at 11:33, wrote: > > > > On Thu, 2018-02-15 at 06:33 -0700, Jan Beulich wrote: > > > > > > On 08.02.18 at 11:23, wrote: > > > > > > > > uint64_t val; > > > > + int rc; > > > > > > > > - if (rdmsr_saf

Re: [Xen-devel] [PATCH] vmx/hap: optimize CR4 trapping

2018-02-16 Thread Roger Pau Monné
On Thu, Feb 15, 2018 at 09:32:00PM +0200, Razvan Cojocaru wrote: > On 02/15/2018 08:57 PM, Andrew Cooper wrote: > > On 15/02/18 16:25, Roger Pau Monne wrote: > >> There a bunch of bits in CR4 that should be allowed to be set directly > >> by the guest without requiring Xen intervention, currently t

Re: [Xen-devel] [PATCH 4/4] xen/arm: update the docs about heterogeneous computing

2018-02-16 Thread Julien Grall
Hi Stefano, On 15/02/18 23:17, Stefano Stabellini wrote: Update the documentation of the hmp-unsafe option to explain how to use it safely, together with the right cpu affinity setting, on big.LITTLE systems. Also update the warning message to point users to the docs. Signed-off-by: Stefano St

  1   2   >