[Xen-devel] [xen-4.9-testing test] 125876: regressions - trouble: blocked/broken/fail/pass

2018-08-13 Thread osstest service owner
flight 125876 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/125876/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64 broken build-arm64-xsm

[Xen-devel] [linux-3.18 test] 125874: trouble: blocked/broken/fail/pass

2018-08-13 Thread osstest service owner
flight 125874 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/125874/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64

[Xen-devel] [xen-unstable-smoke test] 125897: tolerable all pass - PUSHED

2018-08-13 Thread osstest service owner
flight 125897 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/125897/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-armhf-armhf-xl 1

[Xen-devel] [linux-linus test] 125872: regressions - trouble: blocked/broken/fail/pass

2018-08-13 Thread osstest service owner
flight 125872 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/125872/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64-xsm

Re: [Xen-devel] Emulation and active (valid) interrupts

2018-08-13 Thread Razvan Cojocaru
On 8/13/18 4:45 PM, Razvan Cojocaru wrote: > On 8/13/18 4:38 PM, Jan Beulich wrote: > On 13.08.18 at 15:19, wrote: >>> On 8/13/18 3:58 PM, Jan Beulich wrote: >>> On 13.08.18 at 14:51, wrote: > So first we've got that vmx_idtv_reinject() call writing to the VMCS, > then we emulate

[Xen-devel] [PATCH] libs/foreignmemory: Avoid printing an error for ENOTSUPP

2018-08-13 Thread Julien Grall
Resource mapping is not supported on Arm and results to an error message at every guest boot: xenforeignmemory: error: ioctl failed: Operation not supported Hide the error message when errnor is ENOTSUPP. Signed-off-by: Julien Grall --- tools/libs/foreignmemory/linux.c | 2 +- 1 file changed,

[Xen-devel] [xen-unstable-smoke test] 125891: trouble: blocked/broken/pass

2018-08-13 Thread osstest service owner
flight 125891 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/125891/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken Regressions wh

[Xen-devel] [linux-4.9 test] 125869: trouble: blocked/broken/fail/pass

2018-08-13 Thread osstest service owner
flight 125869 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/125869/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64

Re: [Xen-devel] [PATCH v2] xen-netfront: fix warn message as irq device name has '/'

2018-08-13 Thread David Miller
From: Xiao Liang Date: Sat, 11 Aug 2018 23:21:37 +0800 > There is a call trace generated after commit > 2d408c0d4574b01b9ed45e02516888bf925e11a9( > xen-netfront: fix queue name setting). There is no 'device/vif/xx-q0-tx' file > found > under /proc/irq/xx/. > > This patch only picks up device t

Re: [Xen-devel] Xen ballooning interface

2018-08-13 Thread Juergen Gross
On 13/08/18 17:29, Jan Beulich wrote: On 13.08.18 at 16:20, wrote: >> On 13/08/18 15:54, Jan Beulich wrote: >> On 13.08.18 at 15:06, wrote: Suggested new interface --- Hypercalls, memory map(s) and ACPI tables should stay the same (for compatibilit

Re: [Xen-devel] Xen ballooning interface

2018-08-13 Thread Jan Beulich
>>> On 13.08.18 at 16:20, wrote: > On 13/08/18 15:54, Jan Beulich wrote: > On 13.08.18 at 15:06, wrote: >>> Suggested new interface >>> --- >>> Hypercalls, memory map(s) and ACPI tables should stay the same (for >>> compatibility reasons or because they are architectural i

Re: [Xen-devel] Armv8-A: Not able to enable secondary CPUs in Hikey960 board

2018-08-13 Thread Julien Grall
Hello, On 13/08/18 14:01, Konrad Rzeszutek Wilk wrote: On Mon, Aug 13, 2018 at 11:16:14AM +0530, Omkar Bolla wrote: Please check below log: Using modules provided by bootloader in FDT Xen 4.11.1-pre (c/s Mon Jul 30 11:30:09 2018 +0200 git:33ced72) EFI loader

Re: [Xen-devel] [OSSTEST PATCH] production-config: Temporarily drop arm64

2018-08-13 Thread Julien Grall
On 13/08/18 15:57, Ian Jackson wrote: Both our arm64 boxes are out of commission and repairing them is taking too long. CC: Julien Grall Signed-off-by: Ian Jackson Acked-by: Julien Grall Cheers, --- production-config | 3 +++ 1 file changed, 3 insertions(+) diff --git a/production-co

Re: [Xen-devel] Xen ballooning interface

2018-08-13 Thread Roger Pau Monné
On Mon, Aug 13, 2018 at 04:27:06PM +0200, Juergen Gross wrote: > On 13/08/18 16:12, Roger Pau Monné wrote: > > On Mon, Aug 13, 2018 at 03:06:10PM +0200, Juergen Gross wrote: > > Currently as you say there's a difference between the xenstore target > > and the guest memory map, because some memory i

[Xen-devel] [OSSTEST PATCH] production-config: Temporarily drop arm64

2018-08-13 Thread Ian Jackson
Both our arm64 boxes are out of commission and repairing them is taking too long. CC: Julien Grall Signed-off-by: Ian Jackson --- production-config | 3 +++ 1 file changed, 3 insertions(+) diff --git a/production-config b/production-config index df02cd3..fae31ea 100644 --- a/production-config

Re: [Xen-devel] [PATCH v3 25/25] xen/arm: split domain_build.c

2018-08-13 Thread Julien Grall
Hi, On 01/08/18 00:28, Stefano Stabellini wrote: domain_build.c is too large. Move all the ACPI specific device tree generating functions from domain_build.c to acpi/acpi_dt_build.c. The directory is called "acpi" so there is no point to duplicate in the filename. Also, looking at the code

Re: [Xen-devel] Xen ballooning interface

2018-08-13 Thread Juergen Gross
On 13/08/18 16:12, Roger Pau Monné wrote: > On Mon, Aug 13, 2018 at 03:06:10PM +0200, Juergen Gross wrote: >> Today's interface of Xen for memory ballooning is quite a mess. There >> are some shortcomings which should be addressed somehow. After a >> discussion on IRC there was consensus we should

Re: [Xen-devel] [PATCH v3 24/25] xen/vpl011: buffer out chars when the backend is xen

2018-08-13 Thread Julien Grall
Hi, On 01/08/18 00:28, Stefano Stabellini wrote: To avoid mixing the output of different domains on the console, buffer the output chars and print line by line. Unless the domain has input from the serial, in which case we want to print char by char for a smooth user experience. The size of SBS

Re: [Xen-devel] Xen ballooning interface

2018-08-13 Thread Juergen Gross
On 13/08/18 15:54, Jan Beulich wrote: On 13.08.18 at 15:06, wrote: >> Suggested new interface >> --- >> Hypercalls, memory map(s) and ACPI tables should stay the same (for >> compatibility reasons or because they are architectural interfaces). >> >> As the main confusion i

[Xen-devel] [xen-unstable test] 125866: trouble: blocked/broken/fail/pass

2018-08-13 Thread osstest service owner
flight 125866 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/125866/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-arm64

Re: [Xen-devel] Xen ballooning interface

2018-08-13 Thread Roger Pau Monné
On Mon, Aug 13, 2018 at 03:06:10PM +0200, Juergen Gross wrote: > Today's interface of Xen for memory ballooning is quite a mess. There > are some shortcomings which should be addressed somehow. After a > discussion on IRC there was consensus we should try to design a new > interface addressing the

Re: [Xen-devel] [PATCH v3 22/25] xen/arm: Allow vpl011 to be used by DomU

2018-08-13 Thread Julien Grall
Hi Stefano, On 01/08/18 00:28, Stefano Stabellini wrote: Make vpl011 being able to be used without a userspace component in Dom0. In that case, output is printed to the Xen serial and input is received from the Xen serial one character at a time. Call domain_vpl011_init during construct_domU if

[Xen-devel] [PATCH v3 3/5] xen/blkfront: reorder tests in xlblk_init()

2018-08-13 Thread Juergen Gross
In case we don't want pv block devices we should not test parameters for sanity and eventually print out error messages. So test precluding conditions before checking parameters. Signed-off-by: Juergen Gross Reviewed-by: Roger Pau Monné --- drivers/block/xen-blkfront.c | 18 +-

[Xen-devel] [PATCH v3 2/5] xen/blkfront: cleanup stale persistent grants

2018-08-13 Thread Juergen Gross
Add a periodic cleanup function to remove old persistent grants which are no longer in use on the backend side. This avoids starvation in case there are lots of persistent grants for a device which no longer is involved in I/O business. Signed-off-by: Juergen Gross Reviewed-by: Roger Pau Monné -

[Xen-devel] [PATCH v3 5/5] xen/blkback: remove unused pers_gnts_lock from struct xen_blkif_ring

2018-08-13 Thread Juergen Gross
pers_gnts_lock isn't being used anywhere. Remove it. Signed-off-by: Juergen Gross Reviewed-by: Roger Pau Monné --- drivers/block/xen-blkback/common.h | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/block/xen-blkback/common.h b/drivers/block/xen-blkback/common.h index 2339b8d39c5e..1

[Xen-devel] [PATCH v3 0/5] xen/blk: persistent grant rework

2018-08-13 Thread Juergen Gross
Persistent grants are used in the Xen's blkfront/blkback drivers to avoid mapping/unmapping of I/O buffers in the backend for each I/O. While this speeds up processing quite a bit there are problems related to persistent grants in some configurations: domains with multiple block devices making use

[Xen-devel] [PATCH v3 1/5] xen/blkback: don't keep persistent grants too long

2018-08-13 Thread Juergen Gross
Persistent grants are allocated until a threshold per ring is being reached. Those grants won't be freed until the ring is being destroyed meaning there will be resources kept busy which might no longer be used. Instead of freeing only persistent grants until the threshold is reached add a timesta

[Xen-devel] [PATCH v3 4/5] xen/blkback: move persistent grants flags to bool

2018-08-13 Thread Juergen Gross
The struct persistent_gnt flags member is meant to be a bitfield of different flags. There is only PERSISTENT_GNT_ACTIVE flag left, so convert it to a bool named "active". Signed-off-by: Juergen Gross Reviewed-by: Roger Pau Monné --- drivers/block/xen-blkback/blkback.c | 13 ++--- drive

Re: [Xen-devel] [PATCH v3 23/25] xen: support console_switching between Dom0 and DomUs on ARM

2018-08-13 Thread Julien Grall
Hi Stefano, OOI, on the previous version you said you will explore the CTRL-x N solution (where N is the domID console to switch too). What was the result here? On 01/08/18 00:28, Stefano Stabellini wrote: Today Ctrl-AAA is used to switch between Xen and Dom0. Extend the mechanism to allow f

Re: [Xen-devel] Xen ballooning interface

2018-08-13 Thread Jan Beulich
>>> On 13.08.18 at 15:06, wrote: > Suggested new interface > --- > Hypercalls, memory map(s) and ACPI tables should stay the same (for > compatibility reasons or because they are architectural interfaces). > > As the main confusion in the current interface is related to the >

Re: [Xen-devel] Emulation and active (valid) interrupts

2018-08-13 Thread Razvan Cojocaru
On 8/13/18 4:38 PM, Jan Beulich wrote: On 13.08.18 at 15:19, wrote: >> On 8/13/18 3:58 PM, Jan Beulich wrote: >> On 13.08.18 at 14:51, wrote: So first we've got that vmx_idtv_reinject() call writing to the VMCS, then we emulate a CLI, then the failed vmentry. I can't tell if th

Re: [Xen-devel] Emulation and active (valid) interrupts

2018-08-13 Thread Razvan Cojocaru
On 8/13/18 4:38 PM, Jan Beulich wrote: On 13.08.18 at 15:19, wrote: >> On 8/13/18 3:58 PM, Jan Beulich wrote: >> On 13.08.18 at 14:51, wrote: So first we've got that vmx_idtv_reinject() call writing to the VMCS, then we emulate a CLI, then the failed vmentry. I can't tell if th

Re: [Xen-devel] [PATCH v3 22/25] xen/arm: Allow vpl011 to be used by DomU

2018-08-13 Thread Julien Grall
On 01/08/18 00:28, Stefano Stabellini wrote: Make vpl011 being able to be used without a userspace component in Dom0. In that case, output is printed to the Xen serial and input is received from the Xen serial one character at a time. Call domain_vpl011_init during construct_domU if vpl011 is

Re: [Xen-devel] Emulation and active (valid) interrupts

2018-08-13 Thread Jan Beulich
>>> On 13.08.18 at 15:19, wrote: > On 8/13/18 3:58 PM, Jan Beulich wrote: > On 13.08.18 at 14:51, wrote: >>> So first we've got that vmx_idtv_reinject() call writing to the VMCS, >>> then we emulate a CLI, then the failed vmentry. I can't tell if the CLI >>> ran first and then an interrupt po

Re: [Xen-devel] [PATCH v3 21/25] xen/arm: refactor vpl011_data_avail

2018-08-13 Thread Julien Grall
Hi Stefano, On 01/08/18 00:28, Stefano Stabellini wrote: Move the code to calculate in_fifo_level and out_fifo_level out of vpl011_data_avail, to the caller. This change will make it possible to reuse vpl011_data_avail with different ring structures in a later patch. Signed-off-by: Stefano Stab

Re: [Xen-devel] Emulation and active (valid) interrupts

2018-08-13 Thread Razvan Cojocaru
On 8/13/18 3:58 PM, Jan Beulich wrote: On 13.08.18 at 14:51, wrote: >> So first we've got that vmx_idtv_reinject() call writing to the VMCS, >> then we emulate a CLI, then the failed vmentry. I can't tell if the CLI >> ran first and then an interrupt popped up, or if an interrupt had >> alrea

[Xen-devel] [xen-unstable-smoke test] 125890: trouble: blocked/broken/pass

2018-08-13 Thread osstest service owner
flight 125890 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/125890/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken Regressions wh

Re: [Xen-devel] Armv8-A: Not able to enable secondary CPUs in Hikey960 board

2018-08-13 Thread Konrad Rzeszutek Wilk
On Mon, Aug 13, 2018 at 11:16:14AM +0530, Omkar Bolla wrote: > Hi, > > Thankyou very much Konrad, > As you suggested, I just have started testing previous versions of Xen, and > it is working with xen-4.7 stable branch. Does Xen 4.8 or Xen 4.9 or Xen 4.10 work? Trying to get a bisection point wo

[Xen-devel] Xen ballooning interface

2018-08-13 Thread Juergen Gross
Today's interface of Xen for memory ballooning is quite a mess. There are some shortcomings which should be addressed somehow. After a discussion on IRC there was consensus we should try to design a new interface addressing the current and probably future needs. Current interface -

Re: [Xen-devel] Emulation and active (valid) interrupts

2018-08-13 Thread Jan Beulich
>>> On 13.08.18 at 14:51, wrote: > So first we've got that vmx_idtv_reinject() call writing to the VMCS, > then we emulate a CLI, then the failed vmentry. I can't tell if the CLI > ran first and then an interrupt popped up, or if an interrupt had > already been __vmwrit()ten and then CLI caused th

[Xen-devel] Emulation and active (valid) interrupts

2018-08-13 Thread Razvan Cojocaru
On 8/13/18 3:22 PM, Jan Beulich wrote: On 13.08.18 at 13:55, wrote: >> On 8/9/18 11:35 AM, Jan Beulich wrote: >> On 09.08.18 at 10:20, wrote: On 8/9/18 10:54 AM, Jan Beulich wrote: On 08.08.18 at 16:26, wrote: >> 1. Is it possible to already have a valid interrupt writ

Re: [Xen-devel] [PATCH v1 4/4] xen/arm: Reuse R-Car Gen2 platform code for Stout board

2018-08-13 Thread Oleksandr Tyshchenko
On Fri, Aug 10, 2018 at 3:50 PM, Julien Grall wrote: > Hi Oleksandr, Hi Julien. > > On 08/10/2018 12:47 PM, Oleksandr Tyshchenko wrote: >> >> On Fri, Aug 10, 2018 at 12:44 PM, Julien Grall >> wrote: >>> >>> On 08/09/2018 07:18 PM, Oleksandr Tyshchenko wrote: On Thu, Aug 9, 2018 at 7:20

Re: [Xen-devel] [PATCH] x86/ptwr: Misc cleanup to ptwr_emulated_update()

2018-08-13 Thread Jan Beulich
>>> On 10.08.18 at 20:27, wrote: > On Fri, Aug 10, 2018 at 06:49:12PM +0100, Andrew Cooper wrote: >> All but one user wants mfn as mfn_t, so switch its type. offset is only ever >> used when multipled by 8, so fold that into its initial calculation. Fold >> all >> the pointer arithmic on pl1e t

Re: [Xen-devel] Emulation and active (valid) interrupts

2018-08-13 Thread Jan Beulich
>>> On 13.08.18 at 13:55, wrote: > On 8/9/18 11:35 AM, Jan Beulich wrote: > On 09.08.18 at 10:20, wrote: >>> On 8/9/18 10:54 AM, Jan Beulich wrote: >>> On 08.08.18 at 16:26, wrote: > 1. Is it possible to already have a valid interrupt written in > VM_ENTRY_INTR_INFO at EXIT_REASO

Re: [Xen-devel] Emulation and active (valid) interrupts

2018-08-13 Thread Razvan Cojocaru
On 8/9/18 11:35 AM, Jan Beulich wrote: On 09.08.18 at 10:20, wrote: >> On 8/9/18 10:54 AM, Jan Beulich wrote: >> On 08.08.18 at 16:26, wrote: 1. Is it possible to already have a valid interrupt written in VM_ENTRY_INTR_INFO at EXIT_REASON_EPT_VIOLATION-time in vmx_vmexit_h

[Xen-devel] [freebsd-master test] 125889: regressions - trouble: blocked/fail

2018-08-13 Thread osstest service owner
flight 125889 freebsd-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/125889/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-freebsd 7 freebsd-buildfail REGR. vs. 125317 Tests which did

Re: [Xen-devel] [PATCH v3 20/25] xen/arm: introduce a union in vpl011

2018-08-13 Thread Julien Grall
Hi Stefano, On 01/08/18 00:28, Stefano Stabellini wrote: Introduce a union in struct vpl011 to contain the console ring members. A later patch will add another member of the union for the case where the backend is in Xen. Signed-off-by: Stefano Stabellini --- Changes in v3: - rename ring field

Re: [Xen-devel] [PATCH v3 19/25] xen/arm: generate vpl011 node on device tree for domU

2018-08-13 Thread Julien Grall
Hi Stefano, On 01/08/18 00:28, Stefano Stabellini wrote: Introduce vpl011 support to guests started from Xen: it provides a simple way to print output from a guest, as most guests come with a pl011 driver. It is also able to provide a working console with interrupt support. The UART exposed to

Re: [Xen-devel] [PATCH v3 18/25] xen/arm: generate a simple device tree for domUs

2018-08-13 Thread Julien Grall
Hi Stefano, On 01/08/18 00:28, Stefano Stabellini wrote: Introduce functions to generate a basic domU device tree, similar to the existing functions in tools/libxl/libxl_arm.c. Signed-off-by: Stefano Stabellini --- Changes in v3: - remove CONFIG_ACPI for make_chosen_node - remove make_hypervis

Re: [Xen-devel] [PATCH v3 16/25] xen/arm: rename allocate_memory to allocate_memory_11

2018-08-13 Thread Julien Grall
Hi, On 01/08/18 00:27, Stefano Stabellini wrote: allocate_memory only deals with directly mapped memory. Rename it to allocate_memory_11. Signed-off-by: Stefano Stabellini --- Changes in v3: - add patch --- xen/arch/arm/domain_build.c | 7 --- 1 file changed, 4 insertions(+), 3 deletio

Re: [Xen-devel] [PATCH v3 14/25] xen/arm: introduce construct_domU

2018-08-13 Thread Julien Grall
Hi, Title: You don't really introduce "construct_domU". You implement it. So a better title would be "Implement construct_domU". On 01/08/18 00:27, Stefano Stabellini wrote: Similar to construct_dom0, construct_domU creates a barebone DomU guest. The device tree node passed as argument is co

Re: [Xen-devel] [PATCH v3 13/25] xen/arm: introduce create_domUs

2018-08-13 Thread Julien Grall
On 01/08/18 00:27, Stefano Stabellini wrote: Call a new function, "create_domUs", from setup_xen to start DomU VMs. Introduce support for the "xen,domU" compatible node on device tree. Create new DomU VMs based on the information found on device tree under "xen,domU". Calls construct_domU for

[Xen-devel] [PATCH v2 11/12] xen/dom0: Arrange for dom0_cfg to contain the real max_vcpus value

2018-08-13 Thread Andrew Cooper
Make dom0_max_vcpus() a common interface, and implement it on ARM by splitting the existing alloc_dom0_vcpu0() function in half. As domain_create() doesn't yet set up the vcpu array, the max value is also passed into alloc_dom0_vcpu0(). This is temporary for bisectibility and removed in the follo

[Xen-devel] [PATCH v2 12/12] xen/domain: Allocate d->vcpu[] in domain_create()

2018-08-13 Thread Andrew Cooper
For ARM, the call to arch_domain_create() needs to have completed before domain_max_vcpus() will return the correct upper bound. For each arch's dom0's, drop the temporary max_vcpus parameter, and allocation of dom0->vcpu. With d->max_vcpus now correctly configured before evtchn_init(), the poll

[Xen-devel] [PATCH v2 10/12] tools: Pass max_vcpus to XEN_DOMCTL_createdomain

2018-08-13 Thread Andrew Cooper
XEN_DOMCTL_max_vcpus is a mandatory hypercall, but nothing actually prevents a toolstack from unpausing a domain with no vcpus. Originally, d->vcpus[] was an embedded array in struct domain, but c/s fb442e217 "x86_64: allow more vCPU-s per guest" in Xen 4.0 altered it to being dynamically allocate

Re: [Xen-devel] [PATCH v3 13/25] xen/arm: introduce create_domUs

2018-08-13 Thread Julien Grall
Hi Stefano, On 01/08/18 00:27, Stefano Stabellini wrote: Call a new function, "create_domUs", from setup_xen to start DomU VMs. Introduce support for the "xen,domU" compatible node on device tree. Create new DomU VMs based on the information found on device tree under "xen,domU". Calls construc

Re: [Xen-devel] [PATCH v3 12/25] xen/arm: refactor construct_dom0

2018-08-13 Thread Julien Grall
Hi Stefano, On 01/08/18 00:27, Stefano Stabellini wrote: Move generic initializations out of construct_dom0 so that they can be reused. Rename prepare_dtb to prepare_dtb_hwdom to avoid confusion. No functional changes in this patch. Signed-off-by: Stefano Stabellini --- Changes in v3: - mov

[Xen-devel] [xen-unstable-smoke test] 125887: trouble: blocked/broken/pass

2018-08-13 Thread osstest service owner
flight 125887 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/125887/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken Regressions wh

[Xen-devel] [PATCH v2 02/12] tools: Rework xc_domain_create() to take a full xen_domctl_createdomain

2018-08-13 Thread Andrew Cooper
In future patches, the structure will be extended with further information, and this is far cleaner than adding extra parameters. The python stubs are the only user which passes NULL for the existing config option (which is actually the arch substructure). Therefore, the #ifdefary moves to compen

[Xen-devel] [PATCH v2 09/12] xen/domain: Call arch_domain_create() as early as possible in domain_create()

2018-08-13 Thread Andrew Cooper
This is in preparation to set up d->max_cpus and d->vcpu[] in domain_create(), and allow later parts of domain construction to have access to the values. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Stefano Stabellini CC: Julien Grall CC: Wei Liu --- xen/common/domain.c | 34

[Xen-devel] [PATCH v2 08/12] xen/gnttab: Fold grant_table_{create, set_limits}() into grant_table_init()

2018-08-13 Thread Andrew Cooper
Now that the max_{grant,maptrack}_frames are specified from the very beginning of grant table construction, the various initialisation functions can be folded together and simplified as a result. Leave grant_table_init() as the public interface, which is more consistent with other subsystems. Sig

[Xen-devel] [PATCH v2 00/12] Improvements to domain creation

2018-08-13 Thread Andrew Cooper
The main purpose of this series is to move the allocation of d->vcpu[] into XEN_DOMCTL_createdomain, which resolves a longstanding issue since Xen 4.0 whereby the toolstack can cause NULL pointer deferences in Xen by issuing hypercalls in an unexpected order. Due to the way cleanup is currently pe

[Xen-devel] [PATCH v2 06/12] xen/gnttab: Pass max_{grant, maptrack}_frames into grant_table_create()

2018-08-13 Thread Andrew Cooper
... rather than setting the limits up after domain_create() has completed. This removes all the gnttab infrastructure for calculating the number of dom0 grant frames, opting instead to require the dom0 construction code to pass a sane value in via the configuration. In practice, this now means th

[Xen-devel] [PATCH v2 04/12] xen/evtchn: Pass max_evtchn_port into evtchn_init()

2018-08-13 Thread Andrew Cooper
... rather than setting it up once domain_create() has completed. This involves constructing a default value for dom0. No practical change in functionality. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Stefano Stabellini CC: Julien Grall CC: Wei Liu --- xen/arch/arm/setup.c |

[Xen-devel] [PATCH v2 03/12] xen/domctl: Merge set_max_evtchn into createdomain

2018-08-13 Thread Andrew Cooper
set_max_evtchn is somewhat weird. It was introduced with the event_fifo work, but has never been used. Still, it is a bounding on resources consumed by the event channel infrastructure, and should be part of createdomain, rather than editable after the fact. Drop XEN_DOMCTL_set_max_evtchn comple

[Xen-devel] [PATCH v2 07/12] xen/domctl: Remove XEN_DOMCTL_set_gnttab_limits

2018-08-13 Thread Andrew Cooper
Now that XEN_DOMCTL_createdomain handles the grant table limits, remove XEN_DOMCTL_set_gnttab_limits (including XSM hooks and libxc wrappers). Signed-off-by: Andrew Cooper Acked-by: Daniel De Graaf Acked-by: Wei Liu --- CC: Jan Beulich v2: * Split/rearrange to avoid the post-domain-create er

[Xen-devel] [PATCH v2 05/12] tools: Pass grant table limits to XEN_DOMCTL_set_gnttab_limits

2018-08-13 Thread Andrew Cooper
XEN_DOMCTL_set_gnttab_limits is a fairly new hypercall, and is strictly mandatory. As it pertains to domain limits, it should be provided at createdomain time. In preparation to remove the hypercall, extend xen_domctl_createdomain with the fields and arrange for all callers to pass appropriate de

[Xen-devel] [PATCH v2 01/12] tools/ocaml: Pass a full domctl_create_config into stub_xc_domain_create()

2018-08-13 Thread Andrew Cooper
The underlying C function is about to make the same change, and the structure is going to gain extra fields. Signed-off-by: Andrew Cooper Acked-by: Christian Lindig --- v2: * Fix indirection bug with xen_x86_arch_domctlconfig --- tools/ocaml/libs/xc/xenctrl.ml | 14 +++--- tools/ocaml

[Xen-devel] [distros-debian-sid test] 75064: tolerable FAIL

2018-08-13 Thread Platform Team regression test user
flight 75064 distros-debian-sid real [real] http://osstest.xensource.com/osstest/logs/75064/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-amd64-sid-netboot-pygrub 10 debian-di-install fail like 75048 test-amd64-amd64-i386-sid-netboot-pygru

Re: [Xen-devel] x86 Community Call - Wed Aug 15, 14:00 - 15:00 UTC - Agenda items

2018-08-13 Thread Jan Beulich
>>> On 13.08.18 at 09:46, wrote: > proposed topics so far: > * 4.10+ changes to Xen's memory scrubbing: discussion of the changes > that made to it in recent versions of Xen (4.10+) - Christopher > * Project Management stuff to keep the Momentum going - primarily > looking for Intel upda

Re: [Xen-devel] x86 Community Call - Wed Aug 15, 14:00 - 15:00 UTC - Agenda items

2018-08-13 Thread Lars Kurth
Hi all, proposed topics so far: * 4.10+ changes to Xen's memory scrubbing: discussion of the changes that made to it in recent versions of Xen (4.10+) - Christopher * Project Management stuff to keep the Momentum going - primarily looking for Intel updates Regards Lars On 07/08/2018, 1

[Xen-devel] [PATCH v2 09/11] x86/paravirt: move the Xen-only pv_irq_ops under the PARAVIRT_XXL umbrella

2018-08-13 Thread Juergen Gross
Some of the paravirt ops defined in pv_irq_ops are for Xen PV guests only. Define them only if CONFIG_PARAVIRT_XXL is set. Signed-off-by: Juergen Gross --- arch/x86/include/asm/irqflags.h | 38 ++- arch/x86/include/asm/paravirt.h | 2 -- arch/x86/incl

[Xen-devel] [xen-unstable-smoke test] 125886: trouble: blocked/broken/pass

2018-08-13 Thread osstest service owner
flight 125886 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/125886/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken Regressions wh

[Xen-devel] [PATCH v2 08/11] x86/paravirt: move the Xen-only pv_cpu_ops under the PARAVIRT_XXL umbrella

2018-08-13 Thread Juergen Gross
Most of the paravirt ops defined in pv_cpu_ops are for Xen PV guests only. Define them only if CONFIG_PARAVIRT_XXL is set. Signed-off-by: Juergen Gross --- arch/x86/include/asm/debugreg.h | 2 +- arch/x86/include/asm/desc.h | 4 ++-- arch/x86/include/asm/irqflags.h | 16 +

[Xen-devel] [PATCH v2 01/11] x86/paravirt: make paravirt_patch_call() and paravirt_patch_jmp() static

2018-08-13 Thread Juergen Gross
paravirt_patch_call() and paravirt_patch_jmp() are used in paravirt.c only. Convert them to static. Signed-off-by: Juergen Gross --- arch/x86/include/asm/paravirt_types.h | 6 -- arch/x86/kernel/paravirt.c| 12 ++-- 2 files changed, 6 insertions(+), 12 deletions(-) diff

[Xen-devel] [PATCH v2 05/11] x86/paravirt: remove unused paravirt bits

2018-08-13 Thread Juergen Gross
The macros ENABLE_INTERRUPTS_SYSEXIT, GET_CR0_INTO_EAX and PARAVIRT_ADJUST_EXCEPTION_FRAME are used nowhere. Remove their definitions. Signed-off-by: Juergen Gross --- arch/x86/include/asm/irqflags.h | 4 arch/x86/include/asm/paravirt.h | 9 + arch/x86/kernel/asm-offsets.c | 1 -

[Xen-devel] [PATCH v2 04/11] x86/paravirt: use a single ops structure

2018-08-13 Thread Juergen Gross
Instead of using six globally visible paravirt ops structures combine them in a single structure, keeping the original structures as sub-structures. This avoids the need to assemble struct paravirt_patch_template at runtime on the stack each time apply_paravirt() is being called (i.e. when loading

[Xen-devel] [PATCH v2 11/11] x86/paravirt: remove unneeded mmu related paravirt ops bits

2018-08-13 Thread Juergen Gross
There is no need to have 32-bit code for CONFIG_PGTABLE_LEVELS >= 4. Remove it. Signed-off-by: Juergen Gross --- arch/x86/include/asm/paravirt.h | 20 +++- 1 file changed, 3 insertions(+), 17 deletions(-) diff --git a/arch/x86/include/asm/paravirt.h b/arch/x86/include/asm/paravi

[Xen-devel] [PATCH v2 10/11] x86/paravirt: move the Xen-only pv_mmu_ops under the PARAVIRT_XXL umbrella

2018-08-13 Thread Juergen Gross
Most of the paravirt ops defined in pv_mmu_ops are for Xen PV guests only. Define them only if CONFIG_PARAVIRT_XXL is set. Signed-off-by: Juergen Gross --- arch/x86/include/asm/fixmap.h | 2 +- arch/x86/include/asm/mmu_context.h| 4 +- arch/x86/include/asm/paravirt.h | 115

[Xen-devel] [PATCH v2 07/11] x86/paravirt: move items in pv_info under PARAVIRT_XXL umbrella

2018-08-13 Thread Juergen Gross
All items but name in pv_info are needed by Xen PV only. Define them with CONFIG_PARAVIRT_XXL set only. Signed-off-by: Juergen Gross --- arch/x86/include/asm/paravirt.h | 2 ++ arch/x86/include/asm/paravirt_types.h | 2 ++ arch/x86/include/asm/pgtable-3level_types.h | 2 +- arc

[Xen-devel] [PATCH v2 06/11] x86/paravirt: introduce new config option PARAVIRT_XXL

2018-08-13 Thread Juergen Gross
A large amount of paravirt ops is used by Xen PV guests only. Add a new config option PARAVIRT_XXL which is selected by XEN_PV. Later we can put the Xen PV only paravirt ops under the PARACVIRT_XXL umbrella. Signed-off-by: Juergen Gross --- arch/x86/Kconfig | 3 +++ arch/x86/xen/Kconfig | 1

[Xen-devel] [PATCH v2 02/11] x86/paravirt: remove clobbers parameter from paravirt patch functions

2018-08-13 Thread Juergen Gross
The clobbers parameter from paravirt_patch_default() et al isn't used any longer. Remove it. Signed-off-by: Juergen Gross --- arch/x86/include/asm/paravirt_types.h | 7 +++ arch/x86/kernel/alternative.c | 2 +- arch/x86/kernel/paravirt.c| 14 +- arch/x86/ker

[Xen-devel] [PATCH v2 03/11] x86/paravirt: remove clobbers from struct paravirt_patch_site

2018-08-13 Thread Juergen Gross
There is no need any longer to store the clobbers in struct paravirt_patch_site. Remove clobbers from the struct and from the related macros. While at it fix some lines longer than 80 characters. Signed-off-by: Juergen Gross --- arch/x86/include/asm/paravirt.h | 33 +++

[Xen-devel] [PATCH v2 00/11] x86/paravirt: several cleanups

2018-08-13 Thread Juergen Gross
This series removes some no longer needed stuff from paravirt infrastructure and puts large quantities of paravirt ops under a new config option PARAVIRT_XXL which is selected by XEN_PV only. A pvops kernel without XEN_PV being configured is about 2.5% smaller with this series applied. tip commit