[Xen-devel] [ovmf baseline-only test] 75045: tolerable FAIL

2018-08-03 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75045 ovmf real [real] http://osstest.xensource.com/osstest/logs/75045/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail like 75044 test

[Xen-devel] [ovmf test] 125755: all pass - PUSHED

2018-08-03 Thread osstest service owner
flight 125755 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/125755/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 526dd0245bf0db6a01c21943201a4572747bca7f baseline version: ovmf dd4cae4d82c7477273f3d

Re: [Xen-devel] [RESEND] Spectre-v2 (IBPB/IBRS) and SSBD fixes for 4.4.y

2018-08-03 Thread Srivatsa S. Bhat
On 8/2/18 3:22 PM, Kees Cook wrote: > On Thu, Aug 2, 2018 at 12:22 PM, Srivatsa S. Bhat > wrote: >> On 7/26/18 4:09 PM, Kees Cook wrote: >>> On Tue, Jul 24, 2018 at 3:02 PM, Jiri Kosina wrote: On Tue, 24 Jul 2018, Srivatsa S. Bhat wrote: > However, if you are proposing that you'd li

Re: [Xen-devel] [PATCH v6 1/7] xen: xsm: flask: introduce XENMAPSPACE_gmfn_share for memory sharing

2018-08-03 Thread Stefano Stabellini
On Fri, 3 Aug 2018, Jan Beulich wrote: > >>> On 02.08.18 at 22:57, wrote: > > On Thu, 2 Aug 2018, Jan Beulich wrote: > >> >> > +/* > >> >> > + * This action also requires that @current targets @d, but it has > >> >> > already been > >> >> > + * checked somewhere higher in the call stack. > >> >>

Re: [Xen-devel] [PATCH v5 11/15] mm / iommu: split need_iommu() into has_iommu_pt() and sync_iommu_pt()

2018-08-03 Thread Razvan Cojocaru
On 08/03/2018 08:22 PM, Paul Durrant wrote: > The name 'need_iommu' is a little confusing as it suggests a domain needs > to use the IOMMU but something might not be set up yet, when in fact it > doesn't become true until IOMMU mappings for the domain have been created. > > Two different meanings

Re: [Xen-devel] [Notes for xen summit 2018 design session] Graphic virtualization

2018-08-03 Thread Stefano Stabellini
On Fri, 3 Aug 2018, Artem Mygaiev wrote: > > Unfortunately, PV OpenGL is not available upstream at the moment. It was not > > clear whether the backend and frontend would ever be upstreamed and when. > > > > However, the work looks quite similar to virgil > > (https://virgil3d.github.io/). It is G

[Xen-devel] [PATCH v5 11/15] mm / iommu: split need_iommu() into has_iommu_pt() and sync_iommu_pt()

2018-08-03 Thread Paul Durrant
The name 'need_iommu' is a little confusing as it suggests a domain needs to use the IOMMU but something might not be set up yet, when in fact it doesn't become true until IOMMU mappings for the domain have been created. Two different meanings are also inferred from it in various places in the cod

[Xen-devel] [PATCH v5 10/15] mm / iommu: include need_iommu() test in iommu_use_hap_pt()

2018-08-03 Thread Paul Durrant
The name 'iommu_use_hap_pt' suggests that that P2M table is in use as the domain's IOMMU pagetable which, prior to this patch, is not strictly true since the macro did not test whether the domain actually has IOMMU mappings. Signed-off-by: Paul Durrant --- Cc: Jun Nakajima Cc: Kevin Tian Cc: Ge

[Xen-devel] [PATCH v5 14/15] x86: add iommu_ops to modify and flush IOMMU mappings

2018-08-03 Thread Paul Durrant
This patch adds iommu_ops to add (map) or remove (unmap) frames in the domain's IOMMU mappings, and an iommu_op to synchronize (flush) those manipulations with the hardware. Mappings added by the map operation are tracked and only those mappings may be removed by a subsequent unmap operation. Fram

[Xen-devel] [PATCH v5 13/15] memory: add get_paged_gfn() as a wrapper...

2018-08-03 Thread Paul Durrant
...for some uses of get_page_from_gfn(). There are many occurences of the following pattern in the code: q = ? P2M_ALLOC : P2M_UNSHARE; page = get_page_from_gfn(d, gfn, &p2mt, q); if ( p2m_is_paging(p2mt) ) { if ( page ) put_page(page); p2m_mem_pagin

[Xen-devel] [PATCH v5 12/15] x86: add iommu_op to enable modification of IOMMU mappings

2018-08-03 Thread Paul Durrant
This patch adds an iommu_op which checks whether it is possible or safe for a domain to modify its own IOMMU mappings and, if so, creates a rangeset to track modifications. NOTE: The actual map and unmap operations are introduced by subsequent patches. Signed-off-by: Paul Durrant --- Cc: J

[Xen-devel] [PATCH v5 15/15] x86: extend the map and unmap iommu_ops to support grant references

2018-08-03 Thread Paul Durrant
This patch allows a domain to add or remove foreign frames from its IOMMU mappings by grant reference as well as GFN. This is necessary, for example, to support a PV network backend that needs to construct a packet buffer that can be directly accessed by a NIC. Signed-off-by: Paul Durrant --- Cc:

Re: [Xen-devel] [PATCH v4 22/32] libxl_qmp: Handle messages from QEMU

2018-08-03 Thread Anthony PERARD
On Thu, Aug 02, 2018 at 01:17:37PM +0200, Roger Pau Monné wrote: > On Fri, Jul 27, 2018 at 03:06:04PM +0100, Anthony PERARD wrote: > > This will handles messages received, and calls callbacks associated with > ^ handle > > I'm not sure I understand what's 'This' in the context. Would b

[Xen-devel] [PATCH v5 00/15] paravirtual IOMMU interface

2018-08-03 Thread Paul Durrant
The idea of a paravirtual IOMMU interface was last discussed on xen-devel several years ago and narrowed down on a draft specification [1]. There was also an RFC patch series posted with an implementation, however this was never followed through. In this patch series I have tried to simplify the i

[Xen-devel] [PATCH v5 03/15] iommu: make use of type-safe BFN and MFN in exported functions

2018-08-03 Thread Paul Durrant
This patch modifies the declaration of the entry points to the IOMMU sub-system to use bfn_t and mfn_t in place of unsigned long. A subsequent patch will similarly modify the methods in the iommu_ops structure. Signed-off-by: Paul Durrant Reviewed-by: Wei Liu --- Cc: Jan Beulich Cc: Andrew Coop

[Xen-devel] [PATCH v5 01/15] iommu: turn need_iommu back into a boolean.

2018-08-03 Thread Paul Durrant
As noted in [1] the tri-state nature of need_iommu after commit 3e06b989 is confusing. Because arch_iommu_populate_page_table() removes pages from the page list as it maps them it is actually safe to re-invoke multiple times without the need for any specific indication it has been called before, s

[Xen-devel] [PATCH v5 04/15] iommu: push use of type-safe BFN and MFN into iommu_ops

2018-08-03 Thread Paul Durrant
This patch modifies the methods in struct iommu_ops to use type-safe BFN and MFN. This follows on from the prior patch that modified the functions exported in xen/iommu.h. Signed-off-by: Paul Durrant Reviewed-by: Wei Liu --- Cc: Suravee Suthikulpanit Cc: Jan Beulich Cc: Kevin Tian Cc: Andrew

[Xen-devel] [PATCH v5 09/15] vtd: add lookup_page method to iommu_ops

2018-08-03 Thread Paul Durrant
This patch adds a new method to the VT-d IOMMU implementation to find the MFN currently mapped by the specified BFN along with a wrapper function in generic IOMMU code to call the implementation if it exists. This functionality will be used by a subsequent patch. Signed-off-by: Paul Durrant Revi

[Xen-devel] [PATCH v5 06/15] public / x86: introduce __HYPERCALL_iommu_op

2018-08-03 Thread Paul Durrant
This patch introduces the boilerplate for a new hypercall to allow a domain to control IOMMU mappings for its own pages. Whilst there is duplication of code between the native and compat entry points which appears ripe for some form of combination, I think it is better to maintain the separation as

[Xen-devel] [PATCH v5 05/15] iommu: don't domain_crash() inside iommu_map/unmap_page()

2018-08-03 Thread Paul Durrant
Turn iommu_map/unmap_page() into straightforward wrappers that check the existence of the relevant iommu_op and call through to it. This makes them usable by PV IOMMU code to be delivered in future patches. Leave the decision on whether to invoke domain_crash() up to the caller. This has the added

[Xen-devel] [PATCH v5 07/15] iommu: track reserved ranges using a rangeset

2018-08-03 Thread Paul Durrant
Ranges that should be considered reserved in the IOMMU are not necessarily limited to RMRRs. If iommu_inclusive_mapping is set then any frame number falling within an E820 reserved region should also be considered as reserved in the IOMMU. This patch adds a rangeset to the domain_iommu structure th

[Xen-devel] [PATCH v5 02/15] iommu: introduce the concept of BFN...

2018-08-03 Thread Paul Durrant
...meaning 'bus frame number' i.e. a frame number mapped in the IOMMU rather than the MMU. This patch is a largely cosmetic change that substitutes the terms 'gfn' and 'gaddr' for 'bfn' and 'baddr' in all the places where the frame number or address relate to the IOMMU rather than the MMU. The pa

[Xen-devel] [PATCH v5 08/15] x86: add iommu_op to query reserved ranges

2018-08-03 Thread Paul Durrant
This patch adds an iommu_op to allow the domain IOMMU reserved ranges to be queried by the guest. NOTE: The number of reserved ranges is determined by system firmware, in conjunction with Xen command line options, and is expected to be small. Thus, to avoid over-complicating the code,

Re: [Xen-devel] [PATCH v4 20/32] libxl_qmp: Handle write to QMP socket

2018-08-03 Thread Anthony PERARD
On Thu, Aug 02, 2018 at 01:02:13PM +0200, Roger Pau Monné wrote: > On Fri, Jul 27, 2018 at 03:06:02PM +0100, Anthony PERARD wrote: > > The libxl__ev_qmp_* will now send the command to QEMU when the socket is > > ready for writes. > > > > Signed-off-by: Anthony PERARD > > Reviewed-by: Roger Pau M

Re: [Xen-devel] [PATCH v4 19/32] libxl_qmp: Prepare the command to be sent

2018-08-03 Thread Anthony PERARD
On Thu, Aug 02, 2018 at 12:41:26PM +0200, Roger Pau Monné wrote: > On Fri, Jul 27, 2018 at 03:06:01PM +0100, Anthony PERARD wrote: > > The actual sent will be done in a separate patch. > > > > Signed-off-by: Anthony PERARD > > --- > > tools/libxl/libxl_internal.h | 4 > > tools/libxl/libxl

Re: [Xen-devel] [PATCH v4 18/32] libxl_qmp: Separate QMP message generation from qmp_send_prepare

2018-08-03 Thread Anthony PERARD
On Thu, Aug 02, 2018 at 12:34:31PM +0200, Roger Pau Monné wrote: > On Fri, Jul 27, 2018 at 03:06:00PM +0100, Anthony PERARD wrote: > > To be able to re-use qmp_prepare_qmp_cmd with libxl__ev_qmp. > > > > Also, add the QMP end of command '\r\n' into the generated string. > > > > Signed-off-by: Ant

Re: [Xen-devel] [PATCH v4 17/32] libxl_qmp: Parse JSON input from QMP

2018-08-03 Thread Anthony PERARD
On Thu, Aug 02, 2018 at 12:25:53PM +0200, Roger Pau Monné wrote: > On Fri, Jul 27, 2018 at 03:05:59PM +0100, Anthony PERARD wrote: > > +/* workaround strstr limitation */ > > +ev->rx_buf[ev->buf_used] = '\0'; > > Why not use strnstr to limit the size of the rx_buf that's searched? I > thin

Re: [Xen-devel] [PATCH v4 12/32] libxl: Design of an async API to issue QMP commands to QEMUç

2018-08-03 Thread Roger Pau Monné
On Fri, Aug 03, 2018 at 03:45:39PM +0100, Anthony PERARD wrote: > On Fri, Aug 03, 2018 at 03:55:48PM +0200, Roger Pau Monné wrote: > > On Fri, Aug 03, 2018 at 12:18:02PM +0100, Anthony PERARD wrote: > > > On Thu, Aug 02, 2018 at 11:01:43AM +0200, Roger Pau Monné wrote: > > > > On Fri, Jul 27, 2018

Re: [Xen-devel] [PATCH] drop {,acpi_}reserve_bootmem()

2018-08-03 Thread Andrew Cooper
On 03/08/18 16:23, Jan Beulich wrote: > Both are entirely unused (to be fair, reserve_bootmem() has a use inside > an "#if 0" section in x86's mpparse.c, but if we were to re-enable that > code, it would need doing differently anyway). > > Signed-off-by: Jan Beulich Acked-by: Andrew Cooper Can

Re: [Xen-devel] [PATCH v4 14/32] libxl_qmp: Implement fd callback and read data

2018-08-03 Thread Roger Pau Monné
On Fri, Aug 03, 2018 at 03:32:09PM +0100, Anthony PERARD wrote: > On Thu, Aug 02, 2018 at 11:56:11AM +0200, Roger Pau Monné wrote: > > On Fri, Jul 27, 2018 at 03:05:56PM +0100, Anthony PERARD wrote: > > > +/* The -1 is because there is always space for a NUL character */ > > > +r =

Re: [Xen-devel] [PATCH] drop {,acpi_}reserve_bootmem()

2018-08-03 Thread Wei Liu
On Fri, Aug 03, 2018 at 09:23:06AM -0600, Jan Beulich wrote: > Both are entirely unused (to be fair, reserve_bootmem() has a use inside > an "#if 0" section in x86's mpparse.c, but if we were to re-enable that > code, it would need doing differently anyway). > > Signed-off-by: Jan Beulich Review

[Xen-devel] [PATCH] drop {,acpi_}reserve_bootmem()

2018-08-03 Thread Jan Beulich
Both are entirely unused (to be fair, reserve_bootmem() has a use inside an "#if 0" section in x86's mpparse.c, but if we were to re-enable that code, it would need doing differently anyway). Signed-off-by: Jan Beulich --- a/xen/include/asm-x86/acpi.h +++ b/xen/include/asm-x86/acpi.h @@ -98,9 +9

Re: [Xen-devel] [PATCH v2 1/4] automation: standardize containerize env names

2018-08-03 Thread Wei Liu
On Fri, Aug 03, 2018 at 09:46:46AM -0500, Doug Goldstein wrote: > Standardized all the environment variable names that the containerize > script uses to start with CONTAINER_ > > Signed-off-by: Doug Goldstein Reviewed-by: Wei Liu ___ Xen-devel mailin

[Xen-devel] [PATCH v2 3/4] automation: remove dead code from containerize

2018-08-03 Thread Doug Goldstein
This is more dead code. Signed-off-by: Doug Goldstein Reviewed-by: Wei Liu --- automation/scripts/containerize | 5 - 1 file changed, 5 deletions(-) diff --git a/automation/scripts/containerize b/automation/scripts/containerize index 7f0eb0a..7bdfc21 100755 --- a/automation/scripts/contain

[Xen-devel] [PATCH v2 0/4] This series improves the containerize script to hopefully make it more

2018-08-03 Thread Doug Goldstein
friendly for folks to use to locally do build tests under different distros. change from v1: - first patch switch to -z as it makes more sense Doug Goldstein (4): automation: standardize containerize env names automation: drop container name from containerize automation: remove dead code fr

[Xen-devel] [PATCH v2 2/4] automation: drop container name from containerize

2018-08-03 Thread Doug Goldstein
This was something that existed for some scripting support for a totally unrelated project and when I copied this script I failed to remove it so this removes it. Build containers for Xen are best as ephemeral environments and should just utilizes Docker's default container naming behavior. Signed

[Xen-devel] [PATCH v2 1/4] automation: standardize containerize env names

2018-08-03 Thread Doug Goldstein
Standardized all the environment variable names that the containerize script uses to start with CONTAINER_ Signed-off-by: Doug Goldstein --- automation/build/README.md | 10 +- automation/scripts/containerize | 10 -- 2 files changed, 9 insertions(+), 11 deletions(-) diff -

[Xen-devel] [PATCH v2 4/4] automation: ensure created are not owned as root

2018-08-03 Thread Doug Goldstein
By default the container runs as the root user and since the source tree is bind mounted into the container, any file is created and owned by the root user which harms ergonomics when working outside of the container environment. This maps the root user within the container to the uid of the user o

Re: [Xen-devel] [PATCH v4 12/32] libxl: Design of an async API to issue QMP commands to QEMUç

2018-08-03 Thread Anthony PERARD
On Fri, Aug 03, 2018 at 03:55:48PM +0200, Roger Pau Monné wrote: > On Fri, Aug 03, 2018 at 12:18:02PM +0100, Anthony PERARD wrote: > > On Thu, Aug 02, 2018 at 11:01:43AM +0200, Roger Pau Monné wrote: > > > On Fri, Jul 27, 2018 at 03:05:54PM +0100, Anthony PERARD wrote: > > > > +/* > > > > + * This

Re: [Xen-devel] [PATCH v4 14/32] libxl_qmp: Implement fd callback and read data

2018-08-03 Thread Anthony PERARD
On Thu, Aug 02, 2018 at 11:56:11AM +0200, Roger Pau Monné wrote: > On Fri, Jul 27, 2018 at 03:05:56PM +0100, Anthony PERARD wrote: > > +/* The -1 is because there is always space for a NUL character */ > > +r = read(fd, ev->rx_buf + ev->buf_used, > > + ev->buf_size -

Re: [Xen-devel] [PATCH v4 13/32] libxl_qmp: Connect to QMP socket

2018-08-03 Thread Roger Pau Monné
On Fri, Aug 03, 2018 at 02:54:20PM +0100, Anthony PERARD wrote: > On Thu, Aug 02, 2018 at 11:35:53AM +0200, Roger Pau Monné wrote: > > On Fri, Jul 27, 2018 at 03:05:55PM +0100, Anthony PERARD wrote: > > > +typedef enum { > > > +qmp_state_disconnected = 1, > > > +qmp_state_connecting, > > >

Re: [Xen-devel] [PATCH v4 12/32] libxl: Design of an async API to issue QMP commands to QEMUç

2018-08-03 Thread Roger Pau Monné
On Fri, Aug 03, 2018 at 12:18:02PM +0100, Anthony PERARD wrote: > On Thu, Aug 02, 2018 at 11:01:43AM +0200, Roger Pau Monné wrote: > > On Fri, Jul 27, 2018 at 03:05:54PM +0100, Anthony PERARD wrote: > > > +/* > > > + * This facility allows a command to be sent to QEMU, and the response > > > to be

[Xen-devel] [PATCH v15 09/14] x86/hvm: Introduce lapic_save_regs_one func

2018-08-03 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/vlapic.c | 27 +++ 1 file changed, 19 insertions(+), 8 deletions(-) diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arch/x86/hvm/vlapic.c index 0795161..d35810e 100644 ---

Re: [Xen-devel] [PATCH v4 13/32] libxl_qmp: Connect to QMP socket

2018-08-03 Thread Anthony PERARD
On Thu, Aug 02, 2018 at 11:35:53AM +0200, Roger Pau Monné wrote: > On Fri, Jul 27, 2018 at 03:05:55PM +0100, Anthony PERARD wrote: > > +typedef enum { > > +qmp_state_disconnected = 1, > > +qmp_state_connecting, > > +qmp_state_greeting, > > +qmp_state_capability_negociation, > > +

[Xen-devel] [PATCH v15 02/14] x86/hvm: Introduce hvm_save_tsc_adjust_one() func

2018-08-03 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- Changes since V13: - Moved tsc_adjust to the initializer. --- xen/arch/x86/hvm/hvm.c | 13 ++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch

[Xen-devel] [PATCH v15 13/14] x86/hvm: Remove redundant save functions

2018-08-03 Thread Alexandru Isaila
This patch removes the redundant save functions and renames the save_one* to save. It then changes the domain param to vcpu in the save funcs. Signed-off-by: Alexandru Isaila --- Changes since V14: - Change vcpu to v - Remove extra space - Rename save_one handler to save

[Xen-devel] [PATCH v15 10/14] x86/hvm: Add handler for save_one funcs

2018-08-03 Thread Alexandru Isaila
Signed-off-by: Alexandru Isaila --- Changes since V14: - Change handler name from hvm_save_one_handler to hvm_save_vcpu_handler. --- xen/arch/x86/cpu/mcheck/vmce.c | 1 + xen/arch/x86/hvm/hpet.c| 2 +- xen/arch/x86/hvm/hvm.c | 6 +- xen/arch/x86/hvm/i8254.c

[Xen-devel] [PATCH v15 05/14] x86/hvm: Introduce hvm_save_cpu_msrs_one func

2018-08-03 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila Reviewed-by: Paul Durrant --- Changes since V14: - Remove err init - Add blank line ahead of return. --- xen/arch/x86/hvm/hvm.c | 106 +++-- 1 file chan

[Xen-devel] [PATCH v15 01/14] x86/cpu: Introduce vmce_save_vcpu_ctxt_one() func

2018-08-03 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- Changes since V11: - Removed the memset and added init with {}. --- xen/arch/x86/cpu/mcheck/vmce.c | 21 + 1 file changed, 13 insertions(+), 8 deletions(-) diff --git a/xen/arch/x8

[Xen-devel] [PATCH v15 00/14] x86/domctl: Save info for one vcpu instance

2018-08-03 Thread Alexandru Isaila
Hi all, This patch series addresses the ideea of saving data from a single vcpu instance. First it starts by adding *save_one functions, then it introduces a handler for the new save_one* funcs and makes use of it in the hvm_save and hvm_save_one funcs. The final patches are used for clean up an

[Xen-devel] [PATCH v15 04/14] x86/hvm: Introduce hvm_save_cpu_xsave_states_one

2018-08-03 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- Changes since V14: - Remove err init - Add blank line ahead of return - Move xsave_enabled() check to the save_one func. --- xen/arch/x86/hvm/hvm.c | 47 +---

[Xen-devel] [PATCH v15 06/14] x86/hvm: Introduce hvm_save_mtrr_msr_one func

2018-08-03 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- Changes since v14: - Fix style violations - Use structure fields over cast - Use memcpy for fixed_ranges. Note: This patch is based on Roger Pau Monne's series[1] --- xen/arch/x86/hvm/

[Xen-devel] [PATCH v15 11/14] x86/domctl: Use hvm_save_vcpu_handler

2018-08-03 Thread Alexandru Isaila
This patch is aimed on using the new save_one fuctions in the hvm_save Signed-off-by: Alexandru Isaila --- Changes since V14: - Removed the modification from the hvm_save_one - Removed vcpu init - Declared rc as int - Add vcpu id to the log print. --- xen/arch/x8

[Xen-devel] [PATCH v15 08/14] x86/hvm: Introduce lapic_save_hidden_one

2018-08-03 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/vlapic.c | 22 ++ 1 file changed, 14 insertions(+), 8 deletions(-) diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arch/x86/hvm/vlapic.c index 1b9f00a..0795161 100644 --- a/xe

[Xen-devel] [PATCH v15 12/14] x86/hvm: Drop the use of save functions

2018-08-03 Thread Alexandru Isaila
This patch drops the use of save functions in hvm_save. Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/save.c | 25 - 1 file changed, 4 insertions(+), 21 deletions(-) diff --git a/xen/arch/x86/hvm/save.c b/xen/arch/x86/hvm/save.c index 61565fe..363695c 100644 --- a

[Xen-devel] [PATCH v15 03/14] x86/hvm: Introduce hvm_save_cpu_ctxt_one func

2018-08-03 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- Changes since V14: - Move all free fields to the initializer - Add blank line to before the return - Move v->pause_flags check to the save_one function. --- xen/arch/x86/hvm/hvm.c | 219

[Xen-devel] [PATCH v15 14/14] x86/domctl: Don't pause the whole domain if only getting vcpu state

2018-08-03 Thread Alexandru Isaila
This patch is focused on moving changing hvm_save_one() to save one typecode from one vcpu and now that the save functions get data from a single vcpu we can pause the specific vcpu instead of the domain. Signed-off-by: Alexandru Isaila --- xen/arch/x86/domctl.c | 4 ++-- xen/arch/x86/hvm/sav

[Xen-devel] [PATCH v15 07/14] x86/hvm: Introduce viridian_save_vcpu_ctxt_one() func

2018-08-03 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila Reviewed-by: Paul Durrant --- Changes since V14: - Moved all the operations in the initializer. --- xen/arch/x86/hvm/viridian.c | 30 +++--- 1 file changed, 19 insertions(+), 11 de

Re: [Xen-devel] [PATCH] qemu-trad: stop using the default IOREQ server

2018-08-03 Thread Andrew Cooper
On 03/08/18 14:20, Paul Durrant wrote: > Because qemu-trad is using the legacy HVM param mechanism of hooking into > Xen, it means that Xen has to maintain the notion of a 'default' IOREQ > server which is where all I/O goes if no other device model claims it. > Maintaining this code in Xen has a c

[Xen-devel] [PATCH] qemu-trad: stop using the default IOREQ server

2018-08-03 Thread Paul Durrant
Because qemu-trad is using the legacy HVM param mechanism of hooking into Xen, it means that Xen has to maintain the notion of a 'default' IOREQ server which is where all I/O goes if no other device model claims it. Maintaining this code in Xen has a cost and it would be good if the project no long

[Xen-devel] [freebsd-master test] 125754: regressions - trouble: blocked/fail

2018-08-03 Thread osstest service owner
flight 125754 freebsd-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/125754/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-freebsd 7 freebsd-buildfail REGR. vs. 125317 Tests which did

[Xen-devel] [ovmf baseline-only test] 75044: tolerable FAIL

2018-08-03 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75044 ovmf real [real] http://osstest.xensource.com/osstest/logs/75044/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail like 75043 test

Re: [Xen-devel] [PATCH v4 12/32] libxl: Design of an async API to issue QMP commands to QEMUç

2018-08-03 Thread Anthony PERARD
On Thu, Aug 02, 2018 at 11:01:43AM +0200, Roger Pau Monné wrote: > On Fri, Jul 27, 2018 at 03:05:54PM +0100, Anthony PERARD wrote: > > All the functions will be implemented in later patches. > > > > This patch includes the API that libxl can use to send QMP commands to > > QEMU. > > > > Signed-of

Re: [Xen-devel] [PATCH RFC] tools/kdd: avoid adversarial optimisation hazard

2018-08-03 Thread Wei Liu
On Fri, Aug 03, 2018 at 10:54:19AM +0100, Tim Deegan wrote: > Hi, > > Apologies for the delay. Several of my other hats were on fire. > > > > I suspect the address, from which offset is derived, is bounded. But I > > > haven't found the spec for KD. > > > > I don’t think there is one. > > Inde

Re: [Xen-devel] [PATCH v2 3/5] iommu: make iommu_inclusive_mapping a suboption of dom0-iommu

2018-08-03 Thread Roger Pau Monné
On Thu, Aug 02, 2018 at 07:58:48AM +, Tian, Kevin wrote: > > +void __hwdom_init arch_iommu_hwdom_init(struct domain *d) > > +{ > > +unsigned long i, top, max_pfn; > > + > > +BUG_ON(!is_hardware_domain(d)); > > + > > +/* Set the default value of inclusive depending on the hardware. *

Re: [Xen-devel] [Notes for xen summit 2018 design session] Graphic virtualization

2018-08-03 Thread Artem Mygaiev
Hi Julien On 03.08.18 12:37, Julien Grall wrote: On 08/02/2018 04:26 PM, Artem Mygaiev wrote: Hello Julien Hi Artem, Thank you for the feedback! On 02.08.18 12:56, Julien Grall wrote: Hi, Sorry for the late posting. The notes were taken by Stefano Stabellini. Thank you. This has some c

Re: [Xen-devel] [PATCH RFC] tools/kdd: avoid adversarial optimisation hazard

2018-08-03 Thread Tim Deegan
Hi, Apologies for the delay. Several of my other hats were on fire. > > I suspect the address, from which offset is derived, is bounded. But I > > haven't found the spec for KD. > > I don’t think there is one. Indeed not. The official way to extend windbg &c is to write a plugin that runs on

[Xen-devel] [ovmf test] 125752: all pass - PUSHED

2018-08-03 Thread osstest service owner
flight 125752 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/125752/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf dd4cae4d82c7477273f3da455084844db5cca0c0 baseline version: ovmf 1d802e234e813a6726f4c

Re: [Xen-devel] [Notes for xen summit 2018 design session] Graphic virtualization

2018-08-03 Thread Julien Grall
On 08/02/2018 04:26 PM, Artem Mygaiev wrote: Hello Julien Hi Artem, Thank you for the feedback! On 02.08.18 12:56, Julien Grall wrote: Hi, Sorry for the late posting. The notes were taken by Stefano Stabellini. Thank you. This has some clarifications requested from EPAM regarding PowerV

Re: [Xen-devel] [PATCH v2 2/5] iommu: introduce dom0-iommu option

2018-08-03 Thread Paul Durrant
> -Original Message- [snip] > > The problem then is what does, say, reserved + no-inclusive mean? I guess > we could have a flag for each non ram E820 range type? > > reserved + no-inclusive would make sense for a PV Dom0 running on > Intel hardware in order to map only the reserved region

Re: [Xen-devel] [PATCH v2 2/5] iommu: introduce dom0-iommu option

2018-08-03 Thread Roger Pau Monné
On Fri, Aug 03, 2018 at 10:14:49AM +0100, Paul Durrant wrote: > > -Original Message- > > From: Roger Pau Monne > > Sent: 03 August 2018 10:09 > > To: Paul Durrant > > Cc: Jan Beulich ; Kevin Tian ; > > Stefano Stabellini ; Wei Liu ; > > George Dunlap ; Andrew Cooper > > ; Ian Jackson ; Tim

Re: [Xen-devel] [PATCH v1] x86/hvm: Drop hvm_sr_handlers initializer

2018-08-03 Thread Andrew Cooper
On 03/08/2018 10:27, Alexandru Isaila wrote: > This initializer is flawed and only sets .name of array entry 0 > to a non-NULL string. > > Signed-off-by: Alexandru Isaila > Suggested-by: Jan Beulich Acked-by: Andrew Cooper ___ Xen-devel mailing list

[Xen-devel] [PATCH v1] x86/hvm: Drop hvm_sr_handlers initializer

2018-08-03 Thread Alexandru Isaila
This initializer is flawed and only sets .name of array entry 0 to a non-NULL string. Signed-off-by: Alexandru Isaila Suggested-by: Jan Beulich --- xen/arch/x86/hvm/save.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/x86/hvm/save.c b/xen/arch/x86/hvm/save.c index

[Xen-devel] [ovmf baseline-only test] 75043: tolerable FAIL

2018-08-03 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75043 ovmf real [real] http://osstest.xensource.com/osstest/logs/75043/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail like 75041 test

Re: [Xen-devel] [PATCH v2 2/5] iommu: introduce dom0-iommu option

2018-08-03 Thread Paul Durrant
> -Original Message- > From: Roger Pau Monne > Sent: 03 August 2018 10:09 > To: Paul Durrant > Cc: Jan Beulich ; Kevin Tian ; > Stefano Stabellini ; Wei Liu ; > George Dunlap ; Andrew Cooper > ; Ian Jackson ; Tim > (Xen.org) ; Julien Grall ; Suravee > Suthikulpanit ; xen-devel de...@lists

Re: [Xen-devel] [PATCH v6 7/7] xen/arm: export shared memory regions as reserved-memory on device tree

2018-08-03 Thread Julien Grall
Hi Stefano, On 08/01/2018 11:25 PM, Stefano Stabellini wrote: On Wed, 1 Aug 2018, Julien Grall wrote: Hi, On 31/07/18 19:23, Stefano Stabellini wrote: Shared memory regions need to be advertised to the guest. Fortunately, a device tree binding for special memory regions already exist: reserve

[Xen-devel] [distros-debian-jessie test] 75042: tolerable FAIL

2018-08-03 Thread Platform Team regression test user
flight 75042 distros-debian-jessie real [real] http://osstest.xensource.com/osstest/logs/75042/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-armhf-jessie-netboot-pygrub 10 debian-di-install fail like 75015 baseline version: flight

Re: [Xen-devel] [PATCH v2 3/5] iommu: make iommu_inclusive_mapping a suboption of dom0-iommu

2018-08-03 Thread Julien Grall
Hi Roger, On 08/01/2018 12:03 PM, Roger Pau Monne wrote: Introduce a new dom0-iommu=inclusive generic option that supersedes iommu_inclusive_mapping. The prevcious behaviour is preserved and the option should only be enabled by default on Intel hardware. No functional change intended. Signed-o

Re: [Xen-devel] [PATCH v2 2/5] iommu: introduce dom0-iommu option

2018-08-03 Thread Roger Pau Monné
On Fri, Aug 03, 2018 at 10:05:19AM +0100, Paul Durrant wrote: > > -Original Message- > > From: Roger Pau Monne > > Sent: 03 August 2018 09:52 > > To: Paul Durrant > > Cc: Jan Beulich ; Kevin Tian ; > > Stefano Stabellini ; Wei Liu ; > > George Dunlap ; Andrew Cooper > > ; Ian Jackson ; Tim

Re: [Xen-devel] [PATCH v2 2/5] iommu: introduce dom0-iommu option

2018-08-03 Thread Paul Durrant
> -Original Message- > From: Roger Pau Monne > Sent: 03 August 2018 09:52 > To: Paul Durrant > Cc: Jan Beulich ; Kevin Tian ; > Stefano Stabellini ; Wei Liu ; > George Dunlap ; Andrew Cooper > ; Ian Jackson ; Tim > (Xen.org) ; Julien Grall ; Suravee > Suthikulpanit ; xen-devel de...@lists

Re: [Xen-devel] [PATCH v2 2/5] iommu: introduce dom0-iommu option

2018-08-03 Thread Roger Pau Monné
On Fri, Aug 03, 2018 at 09:35:58AM +0100, Paul Durrant wrote: > > -Original Message- > > From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf > > Of Roger Pau Monné > > Sent: 03 August 2018 09:14 > > To: Jan Beulich > > Cc: Kevin Tian ; Stefano Stabellini > > ; Wei Liu

Re: [Xen-devel] [PATCH v2 2/5] iommu: introduce dom0-iommu option

2018-08-03 Thread Paul Durrant
> -Original Message- > From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf > Of Roger Pau Monné > Sent: 03 August 2018 09:14 > To: Jan Beulich > Cc: Kevin Tian ; Stefano Stabellini > ; Wei Liu ; George Dunlap > ; Andrew Cooper > ; Ian Jackson ; Tim > (Xen.org) ; Julie

Re: [Xen-devel] [PATCH v2 2/5] iommu: introduce dom0-iommu option

2018-08-03 Thread Roger Pau Monné
On Thu, Aug 02, 2018 at 02:23:23AM -0600, Jan Beulich wrote: > >>> On 02.08.18 at 09:46, wrote: > >> From: Roger Pau Monne [mailto:roger@citrix.com] > >> Sent: Wednesday, August 1, 2018 7:04 PM > >> --- a/docs/misc/xen-command-line.markdown > >> +++ b/docs/misc/xen-command-line.markdown > >>

[Xen-devel] [ovmf test] 125750: all pass - PUSHED

2018-08-03 Thread osstest service owner
flight 125750 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/125750/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 1d802e234e813a6726f4c6fd161ae9bd146bc552 baseline version: ovmf 6fb8b96d9bab1281f0208