[Xen-devel] [ovmf test] 135431: regressions - FAIL

2019-04-30 Thread osstest service owner
flight 135431 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/135431/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 21 leak-check/check fail REGR. vs. 135318 version targeted for testi

[Xen-devel] [qemu-upstream-4.12-testing test] 135419: regressions - FAIL

2019-04-30 Thread osstest service owner
flight 135419 qemu-upstream-4.12-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/135419/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow216 guest-saverestore.2 fail REGR. vs. 133734 Test

[Xen-devel] [qemu-mainline test] 135416: regressions - FAIL

2019-04-30 Thread osstest service owner
flight 135416 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/135416/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-vhd 18 leak-check/check fail REGR. vs. 135251 Tests which did n

[Xen-devel] [qemu-upstream-4.11-testing test] 135418: regressions - FAIL

2019-04-30 Thread osstest service owner
flight 135418 qemu-upstream-4.11-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/135418/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xsm 6 xen-buildfail REGR. vs. 125575 test

[Xen-devel] [PATCH] x86/vm_event: correctly gather gs_shadow value

2019-04-30 Thread Tamas K Lengyel
Currently the gs_shadow value is only cached when the vCPU is being scheduled out by Xen. Reporting this (usually) stale value through vm_event is incorrect, since it doesn't represent the actual state of the vCPU at the time the event was recorded. This prevents vm_event subscribers from correctly

[Xen-devel] [qemu-upstream-4.10-testing test] 135417: regressions - FAIL

2019-04-30 Thread osstest service owner
flight 135417 qemu-upstream-4.10-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/135417/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 124921 buil

Re: [Xen-devel] [Intel-gfx] [PATCH] dma-buf: add struct dma_buf_attach_info v2

2019-04-30 Thread kbuild test robot
Hi "Christian, I love your patch! Perhaps something to improve: [auto build test WARNING on linus/master] [also build test WARNING on v5.1-rc7 next-20190430] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0d

[Xen-devel] [linux-linus test] 135426: regressions - FAIL

2019-04-30 Thread osstest service owner
flight 135426 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/135426/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-examine11 examine-serial/bootloader fail REGR. vs. 133580 test-amd64-amd64-xl

[Xen-devel] [PATCH v2 06/10] xen/arm: extend device_tree_for_each_node

2019-04-30 Thread Stefano Stabellini
Add two new paramters to device_tree_for_each_node: node and depth. Node is the node to start the search from and depth is the min depth of the search. Passing 0, 0 triggers the old behavior. Signed-off-by: Stefano Stabellini --- Changes in v2: - new --- xen/arch/arm/acpi/boot.c | 2 +- x

[Xen-devel] [PATCH v2 02/10] xen: rename un/map_mmio_regions to un/map_regions

2019-04-30 Thread Stefano Stabellini
Now that map_mmio_regions takes a p2mt parameter, there is no need to keep "mmio" in the name. The p2mt parameter does a better job at expressing what the mapping is about. Let's save the environment 5 characters at a time. Also fix the comment on top of map_mmio_regions. Signed-off-by: Stefano S

[Xen-devel] [PATCH v2 0/10] iomem memory policy

2019-04-30 Thread Stefano Stabellini
Hi all, This series introduces a memory policy parameter for the iomem option, so that we can map an iomem region into a guest as cacheable memory. Then, this series fixes the way Xen handles reserved memory regions on ARM: they should be mapped as normal memory, instead today they are treated as

[Xen-devel] [PATCH v2 10/10] xen/arm: add reserved-memory regions to the dom0 memory node

2019-04-30 Thread Stefano Stabellini
Reserved memory regions are automatically remapped to dom0. Their device tree nodes are also added to dom0 device tree. However, the dom0 memory node is not currently extended to cover the reserved memory regions ranges as required by the spec. This commit fixes it. Signed-off-by: Stefano Stabell

[Xen-devel] [PATCH v2 08/10] xen/arm: keep track of reserved-memory regions

2019-04-30 Thread Stefano Stabellini
As we parse the device tree in Xen, keep track of the reserved-memory regions as they need special treatment (follow-up patches will make use of the stored information.) Reuse process_memory_node to add reserved-memory regions to the bootinfo.reserved_mem array. Remove the warning if there is no r

[Xen-devel] [PATCH v2 07/10] xen/arm: make process_memory_node a device_tree_node_func

2019-04-30 Thread Stefano Stabellini
Change the signature of process_memory_node to match device_tree_node_func. Signed-off-by: Stefano Stabellini --- Changes in v2: - new --- xen/arch/arm/bootfdt.c | 16 ++-- 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/xen/arch/arm/bootfdt.c b/xen/arch/arm/bootfdt.c

[Xen-devel] [PATCH v2 04/10] libxc: introduce xc_domain_mem_map_policy

2019-04-30 Thread Stefano Stabellini
Introduce a new libxc function that makes use of the new memory_policy parameter added to the XEN_DOMCTL_memory_mapping hypercall. The parameter values are the same for the XEN_DOMCTL_memory_mapping hypercall (0 is MEMORY_POLICY_DEFAULT). Pass MEMORY_POLICY_DEFAULT by default -- no changes in beha

[Xen-devel] [PATCH v2 05/10] libxl/xl: add memory policy option to iomem

2019-04-30 Thread Stefano Stabellini
Add a new memory policy option for the iomem parameter. Possible values are: - arm_devmem, device nGRE, the default on ARM - arm_memory, WB cachable memory - x86_uc: uncachable memory, the default on x86 Store the parameter in a new field in libxl_iomem_range. Pass the memory policy option to xc_

[Xen-devel] [PATCH v2 03/10] xen: extend XEN_DOMCTL_memory_mapping to handle memory policy

2019-04-30 Thread Stefano Stabellini
Reuse the existing padding field to pass memory policy information. On Arm, the caller can specify whether the memory should be mapped as device nGRE, which is the default and the only possibility today, or cacheable memory write-back. On x86, the only option is uncachable. The current behavior be

[Xen-devel] [PATCH v2 09/10] xen/arm: map reserved-memory regions as normal memory in dom0

2019-04-30 Thread Stefano Stabellini
reserved-memory regions should be mapped as normal memory. At the moment, they get remapped as device memory in dom0 because Xen doesn't know any better. Add an explicit check for it. reserved-memory regions overlap with memory nodes. The overlapping memory is reserved-memory and should be handled

[Xen-devel] [PATCH v2 01/10] xen: add a p2mt parameter to map_mmio_regions

2019-04-30 Thread Stefano Stabellini
Add a p2mt parameter to map_mmio_regions, pass p2m_mmio_direct_dev on ARM and p2m_mmio_direct on x86 -- no changes in behavior. On ARM, given the similarity between map_mmio_regions after the change and map_regions_p2mt, remove un/map_regions_p2mt. Signed-off-by: Stefano Stabellini CC: jbeul...@

Re: [Xen-devel] [patch 2/2] xen/arm: Use p2m entry with lock protection

2019-04-30 Thread Stefano Stabellini
On Tue, 30 Apr 2019, Stefano Stabellini wrote: > On Tue, 30 Apr 2019, Hillf Danton wrote: > > A new local variable is introduced for accessing p2m entry with lock > > protection. > > > > Same comment about html and space damage. But the change looks correct. I fixed up the patches and committed

Re: [Xen-devel] [PATCH v2 1/4] xen: add hypercall for getting parameters at runtime

2019-04-30 Thread Vasilis Liaskovitis
Sorry for the delay, I was on a long vacation. On Fri, 2019-04-05 at 17:01 +0200, Jan Beulich wrote:On 22.03.19 at 20:28, wrote: > > Limitations: > > - Custom runtime parameters (OPT_CUSTOM) are not supported yet. > > - For integer parameters (OPT_UINT), only unsigned parameters are > > printed >

Re: [Xen-devel] [PATCH] dma-buf: add struct dma_buf_attach_info v2

2019-04-30 Thread Russell King - ARM Linux admin
On Tue, Apr 30, 2019 at 01:10:02PM +0200, Christian König wrote: > Add a structure for the parameters of dma_buf_attach, this makes it much > easier > to add new parameters later on. I don't understand this reasoning. What are the "new parameters" that are being proposed, and why do we need to p

Re: [Xen-devel] [PATCH] dma-buf: add struct dma_buf_attach_info v2

2019-04-30 Thread Boris Ostrovsky
On 4/30/19 7:10 AM, Christian König wrote: > diff --git a/drivers/xen/gntdev-dmabuf.c b/drivers/xen/gntdev-dmabuf.c > index 2c4f324f8626..cacca830b482 100644 > --- a/drivers/xen/gntdev-dmabuf.c > +++ b/drivers/xen/gntdev-dmabuf.c > @@ -608,6 +608,7 @@ dmabuf_imp_to_refs(struct gntdev_dmabuf_priv *p

Re: [Xen-devel] [PATCH] x86/pt: skip setup of posted format IRTE when gvec is 0

2019-04-30 Thread Andrew Cooper
On 30/04/2019 17:24, Chao Gao wrote: > On Tue, Apr 30, 2019 at 11:08:54AM +0200, Roger Pau Monné wrote: >> On Tue, Apr 30, 2019 at 01:19:19PM +0800, Chao Gao wrote: >>> When testing with an UP guest with a pass-thru device with vt-d pi >>> enabled in host, we observed that guest couldn't receive in

Re: [edk2-devel] [PATCH v3 3/3] OvmfPkg/XenSupport: turn off address decoding before BAR sizing

2019-04-30 Thread Laszlo Ersek
On 04/30/19 18:35, Anthony PERARD wrote: > On Fri, Apr 26, 2019 at 08:15:07PM +0200, Laszlo Ersek wrote: >> On 04/25/19 22:23, Igor Druzhinin wrote: >>> On Xen, hvmloader firmware leaves address decoding enabled for >>> enumerated PCI device before jumping into OVMF. OVMF seems to >>> expect it to

Re: [Xen-devel] [PATCH] x86/pt: skip setup of posted format IRTE when gvec is 0

2019-04-30 Thread Chao Gao
On Tue, Apr 30, 2019 at 11:30:33AM +0200, Roger Pau Monné wrote: >On Tue, Apr 30, 2019 at 05:01:21PM +0800, Chao Gao wrote: >> On Tue, Apr 30, 2019 at 01:56:31AM -0600, Jan Beulich wrote: >> On 30.04.19 at 07:19, wrote: >> >> When testing with an UP guest with a pass-thru device with vt-d pi

Re: [edk2-devel] [PATCH v3 3/3] OvmfPkg/XenSupport: turn off address decoding before BAR sizing

2019-04-30 Thread Anthony PERARD
On Fri, Apr 26, 2019 at 08:15:07PM +0200, Laszlo Ersek wrote: > On 04/25/19 22:23, Igor Druzhinin wrote: > > On Xen, hvmloader firmware leaves address decoding enabled for > > enumerated PCI device before jumping into OVMF. OVMF seems to > > expect it to be disabled and tries to size PCI BARs in se

Re: [Xen-devel] [patch 2/2] xen/arm: Use p2m entry with lock protection

2019-04-30 Thread Stefano Stabellini
On Tue, 30 Apr 2019, Hillf Danton wrote: > A new local variable is introduced for accessing p2m entry with lock > protection. > Same comment about html and space damage. But the change looks correct. > > Cc: Stefano Stabellini > > Signed-off-by: Hillf Danton > > --- > >   > > --- a/arch

Re: [Xen-devel] [PATCH] x86/pt: skip setup of posted format IRTE when gvec is 0

2019-04-30 Thread Chao Gao
On Tue, Apr 30, 2019 at 11:08:54AM +0200, Roger Pau Monné wrote: >On Tue, Apr 30, 2019 at 01:19:19PM +0800, Chao Gao wrote: >> When testing with an UP guest with a pass-thru device with vt-d pi >> enabled in host, we observed that guest couldn't receive interrupts >> from that pass-thru device. Dum

Re: [Xen-devel] [patch 1/2] xen/arm: Free p2m entry if fail to add it to RB tree

2019-04-30 Thread Stefano Stabellini
Hi Hillf, Thanks for the patch. Please send emails in plain text, no html. Refer to Documentation/process/submitting-patches.rst. On Tue, 30 Apr 2019, Hillf Danton wrote: > Release the newly allocated p2m entry if we detect a duplicate in the RB tree. Space damage aside due to html, the patch l

Re: [Xen-devel] linux 4.19 xenstore memory allocation failure Re: [linux-4.19 test] 135420: regressions - FAIL

2019-04-30 Thread Roger Pau Monné
On Tue, Apr 30, 2019 at 03:33:00PM +0100, Ian Jackson wrote: > Jan Beulich writes ("Re: [Xen-devel] linux 4.19 xenstore memory allocation > failure Re: [linux-4.19 test] 135420: regressions - FAIL"): > > On 30.04.19 at 15:02, wrote: > > > ISTM that there are *two* bugs here: > > > > > > 1. What

Re: [Xen-devel] [PATCH v3 2/4] x86/mem_sharing: introduce and use page_lock_memshr instead of page_lock

2019-04-30 Thread George Dunlap
On 4/30/19 4:06 PM, Jan Beulich wrote: On 30.04.19 at 16:43, wrote: >> On 4/30/19 9:44 AM, Jan Beulich wrote: >> On 30.04.19 at 10:28, wrote: On Tue, Apr 30, 2019 at 1:15 AM Jan Beulich wrote: > I've outlined a solution already: Make a mem-sharing private variant > of page_

Re: [Xen-devel] [Intel-gfx] [PATCH] dma-buf: add struct dma_buf_attach_info v2

2019-04-30 Thread kbuild test robot
linux/commits/Christian-K-nig/dma-buf-add-struct-dma_buf_attach_info-v2/20190430-221017 config: xtensa-allyesconfig (attached as .config) compiler: xtensa-linux-gcc (GCC) 8.1.0 reproduce: wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross

Re: [Xen-devel] [PATCH v3 2/4] x86/mem_sharing: introduce and use page_lock_memshr instead of page_lock

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 16:43, wrote: > On 4/30/19 9:44 AM, Jan Beulich wrote: > On 30.04.19 at 10:28, wrote: >>> On Tue, Apr 30, 2019 at 1:15 AM Jan Beulich wrote: I've outlined a solution already: Make a mem-sharing private variant of page_{,un}lock(), derived from the PV ones (but wi

Re: [Xen-devel] [PATCH v3 2/4] x86/mem_sharing: introduce and use page_lock_memshr instead of page_lock

2019-04-30 Thread Tamas K Lengyel
On Tue, Apr 30, 2019 at 8:43 AM George Dunlap wrote: > > On 4/30/19 9:44 AM, Jan Beulich wrote: > On 30.04.19 at 10:28, wrote: > >> On Tue, Apr 30, 2019 at 1:15 AM Jan Beulich wrote: > >>> > >> On 29.04.19 at 18:35, wrote: > On Mon, Apr 29, 2019 at 9:18 AM Jan Beulich wrote: > >>

Re: [Xen-devel] [PATCH v3 2/4] x86/mem_sharing: introduce and use page_lock_memshr instead of page_lock

2019-04-30 Thread George Dunlap
On 4/30/19 9:44 AM, Jan Beulich wrote: On 30.04.19 at 10:28, wrote: >> On Tue, Apr 30, 2019 at 1:15 AM Jan Beulich wrote: >>> >> On 29.04.19 at 18:35, wrote: On Mon, Apr 29, 2019 at 9:18 AM Jan Beulich wrote: On 26.04.19 at 19:21, wrote: >> --- a/xen/arch/x86/mm.c >>

Re: [Xen-devel] linux 4.19 xenstore memory allocation failure Re: [linux-4.19 test] 135420: regressions - FAIL

2019-04-30 Thread Ian Jackson
Jan Beulich writes ("Re: [Xen-devel] linux 4.19 xenstore memory allocation failure Re: [linux-4.19 test] 135420: regressions - FAIL"): > On 30.04.19 at 15:02, wrote: > > ISTM that there are *two* bugs here: > > > > 1. Whatever caused the memory allocation failure > > An order-5 allocation is s

Re: [Xen-devel] linux 4.19 xenstore memory allocation failure Re: [linux-4.19 test] 135420: regressions - FAIL

2019-04-30 Thread Juergen Gross
On 30/04/2019 15:02, Ian Jackson wrote: > osstest service owner writes ("[linux-4.19 test] 135420: regressions - FAIL"): >> flight 135420 linux-4.19 real [real] >> http://logs.test-lab.xenproject.org/osstest/logs/135420/ >> >> Regressions :-( >> >> Tests which did not succeed and are blocking, >> i

Re: [Xen-devel] linux 4.19 xenstore memory allocation failure Re: [linux-4.19 test] 135420: regressions - FAIL

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 15:02, wrote: > ISTM that there are *two* bugs here: > > 1. Whatever caused the memory allocation failure An order-5 allocation is set to fail at any time (afaict). I find it surprising that struct blkfront_ring_info instances (even arrays of them when using multiple rings) g

Re: [Xen-devel] [OSSTEST PATCH 00/21] Abandon jobs which are unreasonably delaying their flight

2019-04-30 Thread Julien Grall
Hi Ian, On 29/04/2019 15:46, Ian Jackson wrote: Julien Grall writes ("Re: [OSSTEST PATCH 00/21] Abandon jobs which are unreasonably delaying their flight"): As we discussed on IRC, I understand this will have an impact on Arm32 testing. Do you have an estimate how likely the tests will be skip

Re: [Xen-devel] [PATCH v3 2/4] x86/mem_sharing: introduce and use page_lock_memshr instead of page_lock

2019-04-30 Thread Tamas K Lengyel
On Tue, Apr 30, 2019 at 2:44 AM Jan Beulich wrote: > > >>> On 30.04.19 at 10:28, wrote: > > On Tue, Apr 30, 2019 at 1:15 AM Jan Beulich wrote: > >> > >> >>> On 29.04.19 at 18:35, wrote: > >> > On Mon, Apr 29, 2019 at 9:18 AM Jan Beulich wrote: > >> >> >>> On 26.04.19 at 19:21, wrote: > >> >>

[Xen-devel] qcom_scm: Incompatible pointer type build failure

2019-04-30 Thread Julien Grall
Hi Ian, Thank you for the report. On 30/04/2019 13:44, Ian Jackson wrote: osstest service owner writes ("[linux-4.19 test] 135420: regressions - FAIL"): flight 135420 linux-4.19 real [real] http://logs.test-lab.xenproject.org/osstest/logs/135420/ Regressions :-( Tests which did not succeed a

Re: [Xen-devel] linux 4.19 does not build on armhf Re: [linux-4.19 test] 135420: regressions - FAIL

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 14:44, wrote: > osstest service owner writes ("[linux-4.19 test] 135420: regressions - FAIL"): >> flight 135420 linux-4.19 real [real] >> http://logs.test-lab.xenproject.org/osstest/logs/135420/ >> >> Regressions :-( >> >> Tests which did not succeed and are blocking, >> incl

[Xen-devel] [linux-3.18 test] 135415: regressions - trouble: blocked/broken/fail/pass

2019-04-30 Thread osstest service owner
flight 135415 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/135415/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64-pvops 4 host-instal

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 15:35, wrote: > On 30/04/2019 14:33, Jan Beulich wrote: > On 30.04.19 at 15:16, wrote: >>> On 30/04/2019 12:48, Jan Beulich wrote: >>> On 30.04.19 at 12:44, wrote: > Then we could drop this #ifndef section. Not sure about this - I'm actually unconvinced t

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Julien Grall
On 30/04/2019 14:33, Jan Beulich wrote: On 30.04.19 at 15:16, wrote: On 30/04/2019 12:48, Jan Beulich wrote: On 30.04.19 at 12:44, wrote: An alternative would be memory barriers between the writes on ARM, right? Or a strong ordered set_bit() variant (we had that discussion recently related

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 15:16, wrote: > On 30/04/2019 12:48, Jan Beulich wrote: > On 30.04.19 at 12:44, wrote: >>> An alternative would be memory barriers between the writes on ARM, >>> right? Or a strong ordered set_bit() variant (we had that discussion >>> recently related to a barrier in ARM-sp

Re: [Xen-devel] [livepatch-build-tools part2 6/6] create-diff-object: Do not include all .rodata sections

2019-04-30 Thread Wieczorkiewicz, Pawel
> On 29. Apr 2019, at 18:11, Ross Lagerwall wrote: > > On 4/16/19 1:07 PM, Pawel Wieczorkiewicz wrote: >> Starting with the "2af6f1aa6233 Fix patch creation with GCC 6.1+" commit >> all .rodata sections are included by default (regardless of whether they >> are needed or not). >> During stacked

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Julien Grall
Hi, On 30/04/2019 12:48, Jan Beulich wrote: On 30.04.19 at 12:44, wrote: An alternative would be memory barriers between the writes on ARM, right? Or a strong ordered set_bit() variant (we had that discussion recently related to a barrier in ARM-specific __cpu_disable()). I am not entirely a

[Xen-devel] linux 4.19 xenstore memory allocation failure Re: [linux-4.19 test] 135420: regressions - FAIL

2019-04-30 Thread Ian Jackson
osstest service owner writes ("[linux-4.19 test] 135420: regressions - FAIL"): > flight 135420 linux-4.19 real [real] > http://logs.test-lab.xenproject.org/osstest/logs/135420/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test

Re: [Xen-devel] [livepatch-build-tools part2 5/6] create-diff-object: Add new entries to special sections array

2019-04-30 Thread Wieczorkiewicz, Pawel
On 29. Apr 2019, at 17:47, Ross Lagerwall mailto:ross.lagerw...@citrix.com>> wrote: On 4/16/19 1:07 PM, Pawel Wieczorkiewicz wrote: Handle .livepatch.hooks* and .altinstr_replacement sections as the special sections with assigned group_size resolution function. By default each .livepatch.hooks*

[Xen-devel] linux 4.19 does not build on armhf Re: [linux-4.19 test] 135420: regressions - FAIL

2019-04-30 Thread Ian Jackson
osstest service owner writes ("[linux-4.19 test] 135420: regressions - FAIL"): > flight 135420 linux-4.19 real [real] > http://logs.test-lab.xenproject.org/osstest/logs/135420/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > build

Re: [Xen-devel] [livepatch-build-tools part2 3/6] create-diff-object: Add is_special_section() helper function

2019-04-30 Thread Wieczorkiewicz, Pawel
> On 29. Apr 2019, at 17:25, Ross Lagerwall wrote: > > On 4/16/19 1:07 PM, Pawel Wieczorkiewicz wrote: >> This function determines, based on the given section name, if the >> sections belongs to the special sections category. >> It treats a name from the special_sections array as a prefix. Any >

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 12:44, wrote: > An alternative would be memory barriers between the writes on ARM, > right? Or a strong ordered set_bit() variant (we had that discussion > recently related to a barrier in ARM-specific __cpu_disable()). Yes. > Then we could drop this #ifndef section. Not sure

[Xen-devel] [linux-4.19 test] 135420: regressions - FAIL

2019-04-30 Thread osstest service owner
flight 135420 linux-4.19 real [real] http://logs.test-lab.xenproject.org/osstest/logs/135420/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow217 guest-localmigrate/x10 fail REGR. vs. 129313 test-amd64-amd64-lib

[Xen-devel] [PATCH] dma-buf: add struct dma_buf_attach_info v2

2019-04-30 Thread Christian König
Add a structure for the parameters of dma_buf_attach, this makes it much easier to add new parameters later on. v2: rebase cleanup and fix all new implementations as well Signed-off-by: Christian König --- drivers/dma-buf/dma-buf.c | 13 +++-- drivers/gpu/drm/armad

Re: [Xen-devel] [PATCH V4 5/5] xen/arm: Add early printk support for SCIFA compatible UARTs

2019-04-30 Thread Oleksandr
On 29.04.19 17:30, Julien Grall wrote: Hi Oleksandr, Hi, Julien @@ -22,10 +22,13 @@   #ifdef EARLY_PRINTK_VERSION_NONE   #define STATUS_REG    SCIF_SCFSR   #define TX_FIFO_REG   SCIF_SCFTDR +#elif EARLY_PRINTK_VERSION_A +#define STATUS_REG    SCIFA_SCASSR +#define TX_FIFO_REG   SCIFA_SCAFTD

Re: [Xen-devel] [PATCH V4 4/5] xen/arm: Extend SCIF early prink code to handle other interfaces

2019-04-30 Thread Oleksandr
On 29.04.19 17:29, Julien Grall wrote: Hi Oleksandr, Hi Julien ---   docs/misc/arm/early-printk.txt    |  6 ++   xen/arch/arm/Rules.mk |  7 +++   xen/arch/arm/arm32/debug-scif.inc | 13 +   3 files changed, 22 insertions(+), 4 deletions(-) diff --git a/docs

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Juergen Gross
On 30/04/2019 12:38, Jan Beulich wrote: On 30.04.19 at 12:31, wrote: > >> >> On 30/04/2019 11:27, Jan Beulich wrote: >> On 30.04.19 at 11:13, wrote: In xen/common/schedule.c there is a weird "#ifndef CONFIG_X86" in do_poll(). It was introduced way before anyone would

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 12:31, wrote: > > On 30/04/2019 11:27, Jan Beulich wrote: > On 30.04.19 at 11:13, wrote: >>> In xen/common/schedule.c there is a weird "#ifndef CONFIG_X86" in >>> do_poll(). >>> >>> It was introduced way before anyone would think about ARM by commit >>> ef4c6b079cc55e (I

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Julien Grall
On 30/04/2019 11:27, Jan Beulich wrote: On 30.04.19 at 11:13, wrote: In xen/common/schedule.c there is a weird "#ifndef CONFIG_X86" in do_poll(). It was introduced way before anyone would think about ARM by commit ef4c6b079cc55e (I couldn't find any xen-devel mail related to that commit), so

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 11:13, wrote: > In xen/common/schedule.c there is a weird "#ifndef CONFIG_X86" in > do_poll(). > > It was introduced way before anyone would think about ARM by commit > ef4c6b079cc55e (I couldn't find any xen-devel mail related to that > commit), so I guess it is related to IA6

Re: [Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Dario Faggioli
On Tue, 2019-04-30 at 11:13 +0200, Juergen Gross wrote: > In xen/common/schedule.c there is a weird "#ifndef CONFIG_X86" in > do_poll(). > > It was introduced way before anyone would think about ARM by commit > ef4c6b079cc55e (I couldn't find any xen-devel mail related to that > commit), so I gues

Re: [Xen-devel] [PATCH v6] x86/altp2m: Aggregate get entry and populate into common funcs

2019-04-30 Thread Andrew Cooper
On 29/04/2019 15:53, Jan Beulich wrote: On 23.04.19 at 16:30, wrote: >> --- a/xen/arch/x86/mm/p2m.c >> +++ b/xen/arch/x86/mm/p2m.c >> @@ -478,6 +478,43 @@ void p2m_unlock_and_tlb_flush(struct p2m_domain *p2m) >> mm_write_unlock(&p2m->lock); >> } >> >> +int altp2m_get_effective_ent

Re: [Xen-devel] [PATCH v2] python: Adjust xc_physinfo wrapper for updated virt_caps bits

2019-04-30 Thread Ian Jackson
Marek Marczykowski-Górecki writes ("[PATCH v2] python: Adjust xc_physinfo wrapper for updated virt_caps bits"): > Commit f089fddd94 "xen: report PV capability in sysctl and use it in > toolstack" changed meaning of virt_caps bit 1 - previously it was > "directio", but was changed to "pv" and "dire

Re: [Xen-devel] Xen project CI systems and committer workflow

2019-04-30 Thread Wei Liu
On Thu, Apr 18, 2019 at 10:54:05AM -0700, Stefano Stabellini wrote: > On Thu, 18 Apr 2019, Wei Liu wrote: > > Hi all > > > > We now have Gitlab CI as a complementary system to Osstest and have planned > > to > > add bots. It's high time we think about how we integrate them and how it may > > impr

Re: [Xen-devel] [PATCH] x86/pt: skip setup of posted format IRTE when gvec is 0

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 11:01, wrote: > On Tue, Apr 30, 2019 at 01:56:31AM -0600, Jan Beulich wrote: >>In any event it doesn't look correct to skip migration altogether in >>that case. I'd rather expect it to require getting done differently. >>After all there still is a (CPU, vector) tuple associated

Re: [Xen-devel] [PATCH] x86/pt: skip setup of posted format IRTE when gvec is 0

2019-04-30 Thread Roger Pau Monné
On Tue, Apr 30, 2019 at 05:01:21PM +0800, Chao Gao wrote: > On Tue, Apr 30, 2019 at 01:56:31AM -0600, Jan Beulich wrote: > On 30.04.19 at 07:19, wrote: > >> When testing with an UP guest with a pass-thru device with vt-d pi > >> enabled in host, we observed that guest couldn't receive interru

Re: [Xen-devel] [PATCH v2] python: Adjust xc_physinfo wrapper for updated virt_caps bits

2019-04-30 Thread Wei Liu
On Tue, Apr 30, 2019 at 12:42:52AM +0200, Marek Marczykowski-Górecki wrote: > Commit f089fddd94 "xen: report PV capability in sysctl and use it in > toolstack" changed meaning of virt_caps bit 1 - previously it was > "directio", but was changed to "pv" and "directio" was moved to bit 2. > Adjust py

[Xen-devel] vcpu_block() and do_poll() question

2019-04-30 Thread Juergen Gross
In xen/common/schedule.c there is a weird "#ifndef CONFIG_X86" in do_poll(). It was introduced way before anyone would think about ARM by commit ef4c6b079cc55e (I couldn't find any xen-devel mail related to that commit), so I guess it is related to IA64? Question is: can we just drop it, or does

Re: [Xen-devel] [PATCH] x86/pt: skip setup of posted format IRTE when gvec is 0

2019-04-30 Thread Roger Pau Monné
On Tue, Apr 30, 2019 at 01:19:19PM +0800, Chao Gao wrote: > When testing with an UP guest with a pass-thru device with vt-d pi > enabled in host, we observed that guest couldn't receive interrupts > from that pass-thru device. Dumping IRTE, we found the corresponding > IRTE is set to posted format

Re: [Xen-devel] [PATCH] x86/pt: skip setup of posted format IRTE when gvec is 0

2019-04-30 Thread Chao Gao
On Tue, Apr 30, 2019 at 01:56:31AM -0600, Jan Beulich wrote: On 30.04.19 at 07:19, wrote: >> When testing with an UP guest with a pass-thru device with vt-d pi >> enabled in host, we observed that guest couldn't receive interrupts >> from that pass-thru device. Dumping IRTE, we found the corr

Re: [Xen-devel] [PATCH v3 2/4] x86/mem_sharing: introduce and use page_lock_memshr instead of page_lock

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 10:28, wrote: > On Tue, Apr 30, 2019 at 1:15 AM Jan Beulich wrote: >> >> >>> On 29.04.19 at 18:35, wrote: >> > On Mon, Apr 29, 2019 at 9:18 AM Jan Beulich wrote: >> >> >>> On 26.04.19 at 19:21, wrote: >> >> > --- a/xen/arch/x86/mm.c >> >> > +++ b/xen/arch/x86/mm.c >> >> > @@

Re: [Xen-devel] [PATCH v3 2/4] x86/mem_sharing: introduce and use page_lock_memshr instead of page_lock

2019-04-30 Thread Tamas K Lengyel
On Tue, Apr 30, 2019 at 1:15 AM Jan Beulich wrote: > > >>> On 29.04.19 at 18:35, wrote: > > On Mon, Apr 29, 2019 at 9:18 AM Jan Beulich wrote: > >> >>> On 26.04.19 at 19:21, wrote: > >> > --- a/xen/arch/x86/mm.c > >> > +++ b/xen/arch/x86/mm.c > >> > @@ -2030,12 +2030,11 @@ static inline bool >

Re: [Xen-devel] [PATCH] x86/pt: skip setup of posted format IRTE when gvec is 0

2019-04-30 Thread Jan Beulich
>>> On 30.04.19 at 07:19, wrote: > When testing with an UP guest with a pass-thru device with vt-d pi > enabled in host, we observed that guest couldn't receive interrupts > from that pass-thru device. Dumping IRTE, we found the corresponding > IRTE is set to posted format with "vector" field as 0

Re: [Xen-devel] [PATCH for 4.11 2/2] xen: Fix backport of "x86/tsx: Implement controls for RTM force-abort mode"

2019-04-30 Thread Jan Beulich
>>> On 29.04.19 at 18:16, wrote: > The posted version of this patch depends on c/s 3c555295 "x86/vpmu: Improve > documentation and parsing for vpmu=" (Xen 4.12 and later) to prevent > `vpmu=rtm-abort` impliying `vpmu=1`, which is outside of security support. > > Signed-off-by: Andrew Cooper Rev

Re: [Xen-devel] [PATCH for-4.{11, 10} 1/2] xen: Fix backport of "xen/cmdline: Fix buggy strncmp(s, LITERAL, ss - s) construct"

2019-04-30 Thread Jan Beulich
>>> On 29.04.19 at 18:16, wrote: > These were missed as a consequence of being rebased over other cmdline > cleanup. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.

Re: [Xen-devel] [PATCH v3 2/4] x86/mem_sharing: introduce and use page_lock_memshr instead of page_lock

2019-04-30 Thread Jan Beulich
>>> On 29.04.19 at 18:35, wrote: > On Mon, Apr 29, 2019 at 9:18 AM Jan Beulich wrote: >> >>> On 26.04.19 at 19:21, wrote: >> > --- a/xen/arch/x86/mm.c >> > +++ b/xen/arch/x86/mm.c >> > @@ -2030,12 +2030,11 @@ static inline bool >> > current_locked_page_ne_check(struct page_info *page) { >> > #

Re: [Xen-devel] [PATCH v3 2/4] x86/mem_sharing: introduce and use page_lock_memshr instead of page_lock

2019-04-30 Thread Jan Beulich
>>> On 29.04.19 at 18:42, wrote: > On 4/29/19 4:18 PM, Jan Beulich wrote: > On 26.04.19 at 19:21, wrote: >>> Patch cf4b30dca0a "Add debug code to detect illegal page_lock and > put_page_type >>> ordering" added extra sanity checking to page_lock/page_unlock for debug > builds >>> with the a