[Xen-devel] [Intel-gfx] [GVT-g] [ANNOUNCE] 2018-Q3 release of XenGT (Intel GVT-g for Xen)

2018-10-19 Thread Xu, Terrence
Hi all, We are pleased to announce an update of Intel GVT-g for Xen. Intel GVT-g is a full GPU virtualization solution with mediated pass-through, starting from 4th generation Intel Core(TM) processors with Intel processor graphics. A virtual GPU instance is maintained for each VM, with par

[Xen-devel] [qemu-mainline baseline-only test] 75451: trouble: blocked/broken

2018-10-19 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75451 qemu-mainline real [real] http://osstest.xensource.com/osstest/logs/75451/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64

Re: [Xen-devel] [PATCH v5 1/2] memory_hotplug: Free pages as higher order

2018-10-19 Thread Michal Hocko
On Thu 18-10-18 19:18:25, Andrew Morton wrote: [...] > So this patch needs more work, yes? Yes, I've talked to Arun (he is offline until next week) offlist and he will play with this some more. -- Michal Hocko SUSE Labs ___ Xen-devel mailing list Xen-

Re: [Xen-devel] Ongoing/future speculative mitigation work

2018-10-19 Thread Dario Faggioli
On Thu, 2018-10-18 at 18:46 +0100, Andrew Cooper wrote: > Hello, > Hey, This is very accurate and useful... thanks for it. :-) > 1) A secrets-free hypervisor. > > Basically every hypercall can be (ab)used by a guest, and used as an > arbitrary cache-load gadget. Logically, this is the first ha

Re: [Xen-devel] [PATCH 2/2] x86/altp2m: fix display frozen when switching to a new view early

2018-10-19 Thread Razvan Cojocaru
On 10/18/18 1:57 PM, Andrew Cooper wrote: > On 18/10/18 11:07, Razvan Cojocaru wrote: >> When an new altp2m view is created very early on guest boot, the >> display will freeze (although the guest will run normally). This >> may also happen on resizing the display. The reason is the way >> Xen curr

[Xen-devel] [ovmf test] 128874: all pass - PUSHED

2018-10-19 Thread osstest service owner
flight 128874 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/128874/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf a2e61f341d26a78751b2f19b5004c6bbfc8b4fa9 baseline version: ovmf 7b500c606ad101fad5232

Re: [Xen-devel] [RFC PATCH v2 03/17] libxl: Handle Linux stubdomain specific QEMU options.

2018-10-19 Thread Roger Pau Monné
On Tue, Oct 16, 2018 at 06:16:41PM +0100, Ian Jackson wrote: > Marek Marczykowski-Górecki writes ("[RFC PATCH v2 03/17] libxl: Handle Linux > stubdomain specific QEMU options."): > > From: Eric Shelton > > > > This patch creates an appropriate command line for the QEMU instance > > running in a

[Xen-devel] [PATCH] idle/x86: remove the call to boot_init_stack_canary() from cpu_startup_entry()

2018-10-19 Thread Christophe Leroy
commit d7880812b359 ("idle: Add the stack canary init to cpu_startup_entry()") added the call to boot_init_stack_canary() in cpu_startup_entry() in an #ifdef CONFIG_X86 statement, with the intention to remove that #ifdef later. While implementing stack protector for powerpc, it has been observed t

Re: [Xen-devel] [PATCH] idle/x86: remove the call to boot_init_stack_canary() from cpu_startup_entry()

2018-10-19 Thread Juergen Gross
On 19/10/2018 11:29, Christophe Leroy wrote: > commit d7880812b359 ("idle: Add the stack canary init to > cpu_startup_entry()") added the call to boot_init_stack_canary() > in cpu_startup_entry() in an #ifdef CONFIG_X86 statement, with > the intention to remove that #ifdef later. > > While impleme

[Xen-devel] [freebsd-master test] 128877: regressions - trouble: blocked/broken

2018-10-19 Thread osstest service owner
flight 128877 freebsd-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/128877/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-freebsd broken build-amd64-freebsd 6 host-bu

[Xen-devel] [PATCH v2] idle/x86: remove the call to boot_init_stack_canary() from cpu_startup_entry()

2018-10-19 Thread Christophe Leroy
commit d7880812b359 ("idle: Add the stack canary init to cpu_startup_entry()") added the call to boot_init_stack_canary() in cpu_startup_entry() in an #ifdef CONFIG_X86 statement, with the intention to remove that #ifdef later. While implementing stack protector for powerpc, it has been observed t

Re: [Xen-devel] [PATCH] idle/x86: remove the call to boot_init_stack_canary() from cpu_startup_entry()

2018-10-19 Thread Christophe LEROY
Le 19/10/2018 à 12:01, Juergen Gross a écrit : On 19/10/2018 11:29, Christophe Leroy wrote: commit d7880812b359 ("idle: Add the stack canary init to cpu_startup_entry()") added the call to boot_init_stack_canary() in cpu_startup_entry() in an #ifdef CONFIG_X86 statement, with the intention to

[Xen-devel] [xen-4.10-testing test] 128855: tolerable FAIL - PUSHED

2018-10-19 Thread osstest service owner
flight 128855 xen-4.10-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/128855/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 10 debian-hvm-install fail never pass test-amd64-i386-xl

Re: [Xen-devel] [PATCH v2 07/18] xen: add PVH specific defines to offset.h

2018-10-19 Thread Daniel Kiper
On Tue, Oct 09, 2018 at 01:03:06PM +0200, Juergen Gross wrote: > include/grub/offsets.h needs some defines for Xen PVH mode. > > Add them. While at it line up the values in the surrounding lines to > start at the same column. > > Signed-off-by: Juergen Gross > --- > include/grub/offsets.h | 21 ++

[Xen-devel] [ovmf baseline-only test] 75452: trouble: blocked/broken

2018-10-19 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75452 ovmf real [real] http://osstest.xensource.com/osstest/logs/75452/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xsm

Re: [Xen-devel] [PATCH v2 08/18] xen: add basic hooks for PVH in current code

2018-10-19 Thread Daniel Kiper
On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote: > Add the hooks to current code needed for Xen PVH. I am not against the code itself but it would be nice to know why you add, AIUI, just stubs here which will be filled with proper code later. Daniel

Re: [Xen-devel] Ongoing/future speculative mitigation work

2018-10-19 Thread Andrew Cooper
On 19/10/18 09:09, Dario Faggioli wrote: > On Thu, 2018-10-18 at 18:46 +0100, Andrew Cooper wrote: >> Hello, >> > Hey, > > This is very accurate and useful... thanks for it. :-) > >> 1) A secrets-free hypervisor. >> >> Basically every hypercall can be (ab)used by a guest, and used as an >> arbitrar

[Xen-devel] [linux-3.18 test] 128858: tolerable FAIL - PUSHED

2018-10-19 Thread osstest service owner
flight 128858 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/128858/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-arndale 7 xen-boot fail in 128841 pass in 128858 test-amd64-amd64-libvirt-pair 24 g

Re: [Xen-devel] [PATCH v2 09/18] xen: add PVH boot entry code

2018-10-19 Thread Daniel Kiper
On Tue, Oct 09, 2018 at 01:03:08PM +0200, Juergen Gross wrote: > Add the code for the Xen PVH mode boot entry. > > Signed-off-by: Juergen Gross > --- > grub-core/kern/i386/xen/startup_pvh.S | 50 > +++ > 1 file changed, 50 insertions(+) > > diff --git a/grub-core/

Re: [Xen-devel] [PATCH v2 10/18] xen: setup hypercall page for PVH

2018-10-19 Thread Daniel Kiper
On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote: > Add the needed code to setup the hypercall page for calling into the > Xen hypervisor. > > Signed-off-by: Juergen Gross > --- > grub-core/kern/i386/xen/pvh.c | 70 > +++ > 1 file changed, 70

Re: [Xen-devel] [PATCH v2 11/18] xen: get memory map from hypervisor for PVH

2018-10-19 Thread Daniel Kiper
On Tue, Oct 09, 2018 at 01:03:10PM +0200, Juergen Gross wrote: > Retrieve the memory map from the hypervisor and normalize it to contain > no overlapping entries and to be sorted by address. > > Signed-off-by: Juergen Gross > --- > grub-core/kern/i386/xen/pvh.c | 98 > +++

Re: [Xen-devel] [PATCH v2 12/18] xen: setup Xen specific data for PVH

2018-10-19 Thread Daniel Kiper
On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote: > Initialize the needed Xen specific data. This is: > > - the Xen start of day page containing the console and Xenstore ring > page PFN and event channel > - the grant table > - the shared info page > > Set the RSDP address for the gu

Re: [Xen-devel] [PATCH v2 10/18] xen: setup hypercall page for PVH

2018-10-19 Thread Andrew Cooper
On 19/10/18 13:30, Daniel Kiper wrote: > On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote: >> + >> + __arg0 = a0; >> + __arg1 = a1; >> + __arg2 = a2; >> + __arg3 = a3; >> + __arg4 = a4; >> + asm volatile ("call *%[callno]" >> +: "=r" (__res), "+r" (__arg0), "+r" (__ar

Re: [Xen-devel] [PATCH] Make credit2 the default scheduler

2018-10-19 Thread George Dunlap
On Thu, Sep 13, 2018 at 5:39 PM George Dunlap wrote: > > Credit2 was declared "supported" in 4.8, and as of 4.10 had two other > critical features implemented (soft affinity / NUMA and caps). > > Why change the default? > > The code is better: more predictable, less jitter, easier to determine > h

Re: [Xen-devel] [PATCH V2] xen-swiotlb: use actually allocated size on check physical continuous

2018-10-19 Thread Konrad Rzeszutek Wilk
On Thu, Oct 18, 2018 at 07:16:04PM -0700, Joe Jin wrote: > On 10/18/18 4:52 PM, Konrad Rzeszutek Wilk wrote: > > On Tue, Oct 16, 2018 at 03:21:16PM -0700, Joe Jin wrote: > >> xen_swiotlb_{alloc,free}_coherent() allocate/free memory by order, > >> but passed required size to range_straddles_page_bou

[Xen-devel] [PATCH] xen/arm: Don't build GICv3 with the new vGIC

2018-10-19 Thread Julien Grall
Commit 54ec59f6b0 "xen/arm: vgic-v3: Don't create empty re-distributor regions" breaks compilation when using the new vGIC. This is because the field nr_regions is not existing in the vgic structure. For simplicity, as vGICv3 is not yet imported, disable GICv3. Reported-by: Andrew Cooper Signed-

Re: [Xen-devel] [PATCH RFC] VMX: fix vmx_handle_eoi()

2018-10-19 Thread Chao Gao
On Fri, Oct 12, 2018 at 03:32:59AM -0600, Jan Beulich wrote: >In commit 303066fdb1e ("VMX: fix interaction of APIC-V and Viridian >emulation") I screwed up quite heavily: Instead of clearing SVI, RVI was >cleared. Furthermore, unconditional clearing of SVI is wrong too - other >ISR bits should be t

[Xen-devel] [PATCH v2 05/16] x86/pv: make guest_io_{read, write} local functions

2018-10-19 Thread Wei Liu
Signed-off-by: Wei Liu --- v2: new --- xen/arch/x86/pv/emul-priv-op.c | 8 xen/include/asm-x86/traps.h| 5 - 2 files changed, 4 insertions(+), 9 deletions(-) diff --git a/xen/arch/x86/pv/emul-priv-op.c b/xen/arch/x86/pv/emul-priv-op.c index 6422f91..b85c65f 100644 --- a/xen/arch

[Xen-devel] [PATCH v2 02/16] x86: put some code in arch_set_info_guest under CONFIG_PV

2018-10-19 Thread Wei Liu
This function is called by both PV and HVM. Unfortunately the code is very convoluted. We can reason that code between the call to hvm_set_info_guest and out label is PV only. Put that portion under CONFIG_PV. Signed-off-by: Wei Liu --- v2: new --- xen/arch/x86/domain.c | 12 +--- 1 file

[Xen-devel] [PATCH v2 03/16] x86: make traps.c build with !CONFIG_PV

2018-10-19 Thread Wei Liu
Provide a stub for pv_inject_event, put code that accesses PV fields and GDT / LDT fault handling code under CONFIG_PV. Signed-off-by: Wei Liu --- v2: reduce the amount of ifdefs --- xen/arch/x86/traps.c | 23 +++ xen/include/asm-x86/domain.h | 7 +++ 2 files cha

[Xen-devel] [PATCH v2 09/16] x86: don't setup PV hypercall stubs and entries when !CONFIG_PV

2018-10-19 Thread Wei Liu
Signed-off-by: Wei Liu --- v2: new --- xen/arch/x86/x86_64/traps.c | 6 ++ 1 file changed, 6 insertions(+) diff --git a/xen/arch/x86/x86_64/traps.c b/xen/arch/x86/x86_64/traps.c index 27154f2..2b7ec7d 100644 --- a/xen/arch/x86/x86_64/traps.c +++ b/xen/arch/x86/x86_64/traps.c @@ -267,6 +267,7

[Xen-devel] [PATCH v2 08/16] x86: connect guest creation with CONFIG_PV

2018-10-19 Thread Wei Liu
This is a bit more complicated than the HVM case because system domains have PV guest type. Leave them like that. Signed-off-by: Wei Liu --- v2: 1. Remove useless ASSERTs. 2. Rewrite comment. --- xen/common/domain.c | 23 +-- 1 file changed, 21 insertions(+), 2 deletions(-)

[Xen-devel] [PATCH v2 04/16] x86: make construct_dom0 build with !CONFIG_PV

2018-10-19 Thread Wei Liu
Signed-off-by: Wei Liu --- v2: panic instead. --- xen/arch/x86/dom0_build.c | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c index dcd7afb..0f0977d 100644 --- a/xen/arch/x86/dom0_build.c +++ b/xen/arch/x86/dom0_bui

[Xen-devel] [PATCH v2 01/16] x86: make mm.c build with !CONFIG_PV

2018-10-19 Thread Wei Liu
Start by putting hypercall handlers which are supposed to be PV only under CONFIG_PV. Shuffle some code around to avoid introducing excessive numbers of CONFIG_PV. Signed-off-by: Wei Liu --- v2: rebase --- xen/arch/x86/hvm/hypercall.c| 2 +- xen/arch/x86/mm.c | 168 ++

[Xen-devel] [PATCH v2 00/16] Make CONFIG_PV work on x86

2018-10-19 Thread Wei Liu
Hi all This series makes CONFIG_PV work. Booting a hypervisor with PVH Dom0 works. Due to an issue in Xen implementation, XTF tests cause hypervisor to crash (seen on staging as well). But with a local patch to work around the issue, all XTF HVM tests passed. See v1 cover letter for more inform

[Xen-devel] [PATCH v2 06/16] x86/amd: call post outb hook for both PV and HVM

2018-10-19 Thread Wei Liu
The issue described in 10d03342912 is applicable to both PV and HVM domains that have access to that SMI CMD port. Move the hook to AMD code, remove its pv_ prefix and call it in both PV and HVM code. Signed-off-by: Wei Liu --- v2: rewritten --- xen/arch/x86/cpu/amd.c | 4 +++- xen/arc

[Xen-devel] [PATCH v2 07/16] x86: put XEN_DOMCTL_{set, get}_address_size under CONFIG_PV

2018-10-19 Thread Wei Liu
They are useful to PV only. Signed-off-by: Wei Liu --- v2: new --- xen/arch/x86/domctl.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c index 115ddf6..8ec0b9b 100644 --- a/xen/arch/x86/domctl.c +++ b/xen/arch/x86/domctl.c @@ -608,6 +608,7 @@ l

Re: [Xen-devel] [PATCH v2 07/18] xen: add PVH specific defines to offset.h

2018-10-19 Thread Juergen Gross
On 19/10/2018 13:54, Daniel Kiper wrote: > On Tue, Oct 09, 2018 at 01:03:06PM +0200, Juergen Gross wrote: >> include/grub/offsets.h needs some defines for Xen PVH mode. >> >> Add them. While at it line up the values in the surrounding lines to >> start at the same column. >> >> Signed-off-by: Juerg

Re: [Xen-devel] [PATCH v2 08/18] xen: add basic hooks for PVH in current code

2018-10-19 Thread Juergen Gross
On 19/10/2018 14:05, Daniel Kiper wrote: > On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote: >> Add the hooks to current code needed for Xen PVH. > > I am not against the code itself but it would be nice to know why you > add, AIUI, just stubs here which will be filled with proper cod

Re: [Xen-devel] [PATCH v2 09/18] xen: add PVH boot entry code

2018-10-19 Thread Juergen Gross
On 19/10/2018 14:17, Daniel Kiper wrote: > On Tue, Oct 09, 2018 at 01:03:08PM +0200, Juergen Gross wrote: >> Add the code for the Xen PVH mode boot entry. >> >> Signed-off-by: Juergen Gross >> --- >> grub-core/kern/i386/xen/startup_pvh.S | 50 >> +++ >> 1 file cha

[Xen-devel] [PATCH v2 10/16] x86: don't setup legacy syscall vector when !CONFIG_PV

2018-10-19 Thread Wei Liu
Put the code in smpboot.c under CONFIG_PV. Not that we don't need to set up a stub here because entry.S already does that. Signed-off-by: Wei Liu --- v2: new --- xen/arch/x86/smpboot.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/arch/x86/smpboot.c b/xen/arch/x86/smpboot.c index 35a

[Xen-devel] [PATCH v2 11/16] x86: don't set sysenter_entry in vmcs when !CONFIG_PV

2018-10-19 Thread Wei Liu
The symbol will not be available when PV is disabled. Signed-off-by: Wei Liu --- v2: new --- xen/arch/x86/hvm/vmx/vmcs.c | 7 +++ 1 file changed, 7 insertions(+) diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c index d9747b4..282677a 100644 --- a/xen/arch/x86/hvm/vmx/v

[Xen-devel] [PATCH v2 12/16] x86: stub out PV only code in do_debug

2018-10-19 Thread Wei Liu
When PV is disabled those symbols won't be available. It is impossible for Xen to hit #DB there. Signed-off-by: Wei Liu --- v2: new --- xen/arch/x86/traps.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c index 002e98f..7cca072 100644 --- a/xen/a

[Xen-devel] [PATCH v2 14/16] x86: make entry point code build when !CONFIG_PV

2018-10-19 Thread Wei Liu
Skip building x86_64/compat/entry.S and put CONFIG_PV in x86_64/entry.S. Signed-off-by: Wei Liu --- v2: new --- xen/arch/x86/x86_64/Makefile | 2 +- xen/arch/x86/x86_64/entry.S | 30 -- 2 files changed, 29 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/x86

[Xen-devel] [PATCH v2 16/16] x86: update help string for CONFIG_HVM

2018-10-19 Thread Wei Liu
Change "guest" to "domain" where appropriate because "guest" doesn't include Domain 0. Signed-off-by: Wei Liu --- v2: new --- xen/arch/x86/Kconfig | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig index c7e97e2..b4bd83e 100644

[Xen-devel] [PATCH v2 13/16] x86: rearrange x86_64/entry.S

2018-10-19 Thread Wei Liu
Split the file into two halves. The first half pertains to PV guest code while the second half is mostly used by the hypervisor itself to handle interrupts and exceptions. No functional change intended. Signed-off-by: Wei Liu --- v2: new, requested by Andrew --- xen/arch/x86/x86_64/entry.S | 94

[Xen-devel] [PATCH v2 15/16] x86: expose CONFIG_PV

2018-10-19 Thread Wei Liu
Signed-off-by: Wei Liu --- v2: guest -> domain --- xen/arch/x86/Kconfig | 8 1 file changed, 8 insertions(+) diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig index 548cbf9..c7e97e2 100644 --- a/xen/arch/x86/Kconfig +++ b/xen/arch/x86/Kconfig @@ -37,6 +37,14 @@ source "arch/Kconf

Re: [Xen-devel] [PATCH v2 10/18] xen: setup hypercall page for PVH

2018-10-19 Thread Juergen Gross
On 19/10/2018 14:30, Daniel Kiper wrote: > On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote: >> Add the needed code to setup the hypercall page for calling into the >> Xen hypervisor. >> >> Signed-off-by: Juergen Gross >> --- >> grub-core/kern/i386/xen/pvh.c | 70 >>

Re: [Xen-devel] [PATCH v2 04/16] x86: make construct_dom0 build with !CONFIG_PV

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > Signed-off-by: Wei Liu > --- > v2: panic instead. > --- > xen/arch/x86/dom0_build.c | 9 +++-- > 1 file changed, 7 insertions(+), 2 deletions(-) > > diff --git a/xen/arch/x86/dom0_build.c b/xen/arch/x86/dom0_build.c > index dcd7afb..0f0977d 100644 > --- a/

Re: [Xen-devel] [PATCH v2 11/18] xen: get memory map from hypervisor for PVH

2018-10-19 Thread Juergen Gross
On 19/10/2018 14:40, Daniel Kiper wrote: > On Tue, Oct 09, 2018 at 01:03:10PM +0200, Juergen Gross wrote: >> Retrieve the memory map from the hypervisor and normalize it to contain >> no overlapping entries and to be sorted by address. >> >> Signed-off-by: Juergen Gross >> --- >> grub-core/kern/i

Re: [Xen-devel] [PATCH v2 05/16] x86/pv: make guest_io_{read, write} local functions

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > Signed-off-by: Wei Liu Nice.  Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] [PATCH v2 12/18] xen: setup Xen specific data for PVH

2018-10-19 Thread Juergen Gross
On 19/10/2018 14:48, Daniel Kiper wrote: > On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote: >> Initialize the needed Xen specific data. This is: >> >> - the Xen start of day page containing the console and Xenstore ring >> page PFN and event channel >> - the grant table >> - the sha

[Xen-devel] [PATCH] x86: Consolidate the storage of MSR_AMD64_DR{0-3}_ADDRESS_MASK

2018-10-19 Thread Andrew Cooper
The PV and HVM code both have a copy of these, which gives the false impression in the context switch code that they are PV/HVM specific. Move the storage into struct vcpu_msrs, and update all users to match. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Wei Liu CC: Roger Pau Monné CC:

Re: [Xen-devel] [PATCH v2 07/16] x86: put XEN_DOMCTL_{set, get}_address_size under CONFIG_PV

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > They are useful to PV only. > > Signed-off-by: Wei Liu How easy is this to turn into a domaincreate flag?  It is yet another singleton operation which complicated Xen's init/cleanup path having to cope with it being enabled after the fact. (This is a slightly

[Xen-devel] [PATCH v2 1/7] x86/pvh: fix TSC mode setup for PVH Dom0

2018-10-19 Thread Roger Pau Monne
A PVH Dom0 might use TSC scaling or other HVM specific TSC adjustments, so only short-circuit the TSC setup for a classic PV Dom0. Signed-off-by: Roger Pau Monné --- Cc: Jan Beulich Cc: Andrew Cooper Cc: Wei Liu --- xen/arch/x86/time.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) di

[Xen-devel] [PATCH v2 4/7] vpci: fix updating the command register

2018-10-19 Thread Roger Pau Monne
When switching the memory decoding bit in the command register the rest of the changes where dropped, leading to only the memory decoding bit being updated. Fix this by unconditionally writing the guest-requested command except for the memory decoding bit, which will be updated once the p2m change

[Xen-devel] [PATCH v2 7/7] amd/pvh: enable ACPI C1E disable quirk on PVH Dom0

2018-10-19 Thread Roger Pau Monne
PV Dom0 has a quirk for some AMD processors, where enabling ACPI can also enable C1E mode. Apply the same workaround as done on PV for a PVH Dom0, which consist on trapping accesses to the SMI command IO port and disabling C1E if ACPI is enabled. Reported-by: Jan Beulich Signed-off-by: Roger Pau

[Xen-devel] [PATCH v2 6/7] vpci/msix: carve p2m hole for MSIX MMIO regions

2018-10-19 Thread Roger Pau Monne
Make sure the MSIX MMIO regions don't have p2m entries setup, so that accesses to them trap into the hypervisor and can be handled by vpci. This is a side-effect of commit 042678762 for PVH Dom0, which added mappings for all the reserved regions into the Dom0 p2m. Signed-off-by: Roger Pau Monné

[Xen-devel] [PATCH v2 5/7] vpci: fix execution of long running operations

2018-10-19 Thread Roger Pau Monne
BAR map/unmap is a long running operation that needs to be preempted in order to avoid overrunning the assigned vCPU time (or even triggering the watchdog). Current logic for this preemption is wrong, and won't work at all for AMD since only Intel makes use of hvm_io_pending (and even in that case

[Xen-devel] [PATCH v2 3/7] x86/pvh: allow PVH Dom0 to use the debug IO port console

2018-10-19 Thread Roger Pau Monne
Add an option to allow trapping accesses to IO port 0xe9 for a PVH Dom0, so it can print to the HVM debug console. Note this is not enabled by default in order to prevent clashes with hardware on the system using 0xe9. Signed-off-by: Roger Pau Monné --- Cc: Jan Beulich Cc: Andrew Cooper Cc: Wei

[Xen-devel] [PATCH v2 0/7] x86/pvh: fix fixes for PVH Dom0

2018-10-19 Thread Roger Pau Monne
Hello, The following series contain miscellaneous fixes for a PVH Dom0. I've found out this issues while trying to boot on an AMD EPYC box. The series can be found on my git repo: git://xenbits.xen.org/people/royger/xen.git fixes-pvh-v2 Thanks, Roger. Roger Pau Monne (7): x86/pvh: fix TSC mo

[Xen-devel] [PATCH v2 2/7] x86/hvm: introduce a define for the debug output IO port

2018-10-19 Thread Roger Pau Monne
No functional change intended. Signed-off-by: Roger Pau Monné --- Cc: Jan Beulich Cc: Andrew Cooper Cc: Wei Liu Cc: George Dunlap Cc: Ian Jackson Cc: Julien Grall Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan --- xen/arch/x86/hvm/hvm.c| 4 ++-- xen/drivers/

Re: [Xen-devel] [PATCH v2 08/18] xen: add basic hooks for PVH in current code

2018-10-19 Thread Roger Pau Monné
On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote: > Add the hooks to current code needed for Xen PVH. > > Signed-off-by: Juergen Gross > --- > grub-core/kern/i386/xen/pvh.c | 36 > +++ > grub-core/kern/i386/xen/startup_pvh.S | 29

Re: [Xen-devel] [PATCH v2 08/16] x86: connect guest creation with CONFIG_PV

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > This is a bit more complicated than the HVM case because system > domains have PV guest type. Leave them like that. > > Signed-off-by: Wei Liu > --- > v2: > 1. Remove useless ASSERTs. > 2. Rewrite comment. > --- > xen/common/domain.c | 23 +-

Re: [Xen-devel] [PATCH v2 7/7] amd/pvh: enable ACPI C1E disable quirk on PVH Dom0

2018-10-19 Thread Wei Liu
On Fri, Oct 19, 2018 at 04:20:21PM +0100, Roger Pau Monne wrote: > PV Dom0 has a quirk for some AMD processors, where enabling ACPI can > also enable C1E mode. Apply the same workaround as done on PV for a > PVH Dom0, which consist on trapping accesses to the SMI command IO > port and disabling C1E

Re: [Xen-devel] [PATCH v2 10/18] xen: setup hypercall page for PVH

2018-10-19 Thread Roger Pau Monné
On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote: > Add the needed code to setup the hypercall page for calling into the > Xen hypervisor. > > Signed-off-by: Juergen Gross > --- > grub-core/kern/i386/xen/pvh.c | 70 > +++ > 1 file changed, 70

Re: [Xen-devel] [PATCH v2 11/16] x86: don't set sysenter_entry in vmcs when !CONFIG_PV

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > The symbol will not be available when PV is disabled. > > Signed-off-by: Wei Liu > --- > v2: new > --- > xen/arch/x86/hvm/vmx/vmcs.c | 7 +++ > 1 file changed, 7 insertions(+) > > diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c > inde

Re: [Xen-devel] [PATCH v2 12/16] x86: stub out PV only code in do_debug

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > When PV is disabled those symbols won't be available. It is impossible > for Xen to hit #DB there. > > Signed-off-by: Wei Liu Acked-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https:/

Re: [Xen-devel] [PATCH v2 12/18] xen: setup Xen specific data for PVH

2018-10-19 Thread Roger Pau Monné
On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote: > Initialize the needed Xen specific data. This is: > > - the Xen start of day page containing the console and Xenstore ring > page PFN and event channel > - the grant table > - the shared info page > > Set the RSDP address for the

Re: [Xen-devel] [PATCH v2 15/16] x86: expose CONFIG_PV

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > Signed-off-by: Wei Liu > --- > v2: guest -> domain > --- > xen/arch/x86/Kconfig | 8 > 1 file changed, 8 insertions(+) > > diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig > index 548cbf9..c7e97e2 100644 > --- a/xen/arch/x86/Kconfig > +++ b/xen

Re: [Xen-devel] [PATCH v2 08/18] xen: add basic hooks for PVH in current code

2018-10-19 Thread Juergen Gross
On 19/10/2018 17:33, Roger Pau Monné wrote: > On Tue, Oct 09, 2018 at 01:03:07PM +0200, Juergen Gross wrote: >> Add the hooks to current code needed for Xen PVH. >> >> Signed-off-by: Juergen Gross >> --- >> grub-core/kern/i386/xen/pvh.c | 36 >> +++ >> gru

Re: [Xen-devel] [PATCH v2 06/16] x86/amd: call post outb hook for both PV and HVM

2018-10-19 Thread Wei Liu
On Fri, Oct 19, 2018 at 03:28:32PM +0100, Wei Liu wrote: > The issue described in 10d03342912 is applicable to both PV and HVM > domains that have access to that SMI CMD port. > > Move the hook to AMD code, remove its pv_ prefix and call it in both > PV and HVM code. > > Signed-off-by: Wei Liu

[Xen-devel] [RFC PATCH v2] tools: libxl/xl: run NUMA placement even when an hard-affinity is set

2018-10-19 Thread Dario Faggioli
Right now, if either an hard or soft-affinity are explicitly specified in a domain's config file, automatic NUMA placement is skipped. However, automatic NUMA placement affects only the soft-affinity of the domain which is being created. Therefore, it is ok to let it run if an hard-affinity is spe

Re: [Xen-devel] [PATCH v2 16/16] x86: update help string for CONFIG_HVM

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > Change "guest" to "domain" where appropriate because "guest" doesn't > include Domain 0. > > Signed-off-by: Wei Liu > --- > v2: new > --- > xen/arch/x86/Kconfig | 8 > 1 file changed, 4 insertions(+), 4 deletions(-) > > diff --git a/xen/arch/x86/Kconfi

Re: [Xen-devel] [PATCH v2 09/16] x86: don't setup PV hypercall stubs and entries when !CONFIG_PV

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > Signed-off-by: Wei Liu > --- > v2: new > --- > xen/arch/x86/x86_64/traps.c | 6 ++ > 1 file changed, 6 insertions(+) > > diff --git a/xen/arch/x86/x86_64/traps.c b/xen/arch/x86/x86_64/traps.c > index 27154f2..2b7ec7d 100644 > --- a/xen/arch/x86/x86_64/traps

Re: [Xen-devel] [PATCH v2 10/18] xen: setup hypercall page for PVH

2018-10-19 Thread Juergen Gross
On 19/10/2018 17:40, Roger Pau Monné wrote: > On Tue, Oct 09, 2018 at 01:03:09PM +0200, Juergen Gross wrote: >> Add the needed code to setup the hypercall page for calling into the >> Xen hypervisor. >> >> Signed-off-by: Juergen Gross >> --- >> grub-core/kern/i386/xen/pvh.c | 70 >> +

Re: [Xen-devel] [PATCH v2 11/16] x86: don't set sysenter_entry in vmcs when !CONFIG_PV

2018-10-19 Thread Wei Liu
On Fri, Oct 19, 2018 at 04:42:24PM +0100, Andrew Cooper wrote: > On 19/10/18 15:28, Wei Liu wrote: > > The symbol will not be available when PV is disabled. > > > > Signed-off-by: Wei Liu > > --- > > v2: new > > --- > > xen/arch/x86/hvm/vmx/vmcs.c | 7 +++ > > 1 file changed, 7 insertions(+)

[Xen-devel] dom0/pvh: Dom0 PVH with PCI passthrough support status

2018-10-19 Thread Vasile, Alexandru-catalin
Hello, I would like to use Dom0 with PVH mode together with PCI passthrough in order to compare PVH and HVM in a real test scenario for early adoption of PVH. The minimum setup needed is to have the possibility to assign to a domain a PCI device that is passthrough. Are there any patches in re

Re: [Xen-devel] [PATCH v2 10/16] x86: don't setup legacy syscall vector when !CONFIG_PV

2018-10-19 Thread Andrew Cooper
On 19/10/18 15:28, Wei Liu wrote: > Put the code in smpboot.c under CONFIG_PV. Not that we don't need to > set up a stub here because entry.S already does that. > > Signed-off-by: Wei Liu The stub isn't the purpose of the code.  This code is to switch between SYS_DESC_trap_gate and SYS_DESC_irq_g

Re: [Xen-devel] [PATCH v2 12/18] xen: setup Xen specific data for PVH

2018-10-19 Thread Roger Pau Monné
On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote: > Initialize the needed Xen specific data. This is: > > - the Xen start of day page containing the console and Xenstore ring > page PFN and event channel > - the grant table > - the shared info page > > Set the RSDP address for the

Re: [Xen-devel] [PATCH v2 11/16] x86: don't set sysenter_entry in vmcs when !CONFIG_PV

2018-10-19 Thread Andrew Cooper
On 19/10/18 17:00, Wei Liu wrote: > On Fri, Oct 19, 2018 at 04:42:24PM +0100, Andrew Cooper wrote: >> On 19/10/18 15:28, Wei Liu wrote: >>> The symbol will not be available when PV is disabled. >>> >>> Signed-off-by: Wei Liu >>> --- >>> v2: new >>> --- >>> xen/arch/x86/hvm/vmx/vmcs.c | 7 +++

Re: [Xen-devel] [PATCH V2] xen-swiotlb: use actually allocated size on check physical continuous

2018-10-19 Thread Joe Jin
On 10/19/18 6:43 AM, Konrad Rzeszutek Wilk wrote: > I will fold in the stack trace in later tonight. Thanks! Thank you very much! ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] dom0/pvh: Dom0 PVH with PCI passthrough support status

2018-10-19 Thread Roger Pau Monné
Hello, Thanks for your interest and testing of PVH Dom0! On Fri, Oct 19, 2018 at 04:08:45PM +, Vasile, Alexandru-catalin wrote: > Hello, > > I would like to use Dom0 with PVH mode together with PCI passthrough in order > to compare PVH and HVM in a real test scenario for early adoption of P

[Xen-devel] [xen-unstable-smoke test] 128878: regressions - FAIL

2018-10-19 Thread osstest service owner
flight 128878 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/128878/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386 16 guest-localmigrate/x10 fail REGR. vs. 128857 T

Re: [Xen-devel] [PATCH v2 12/18] xen: setup Xen specific data for PVH

2018-10-19 Thread Juergen Gross
On 19/10/2018 18:10, Roger Pau Monné wrote: > On Tue, Oct 09, 2018 at 01:03:11PM +0200, Juergen Gross wrote: >> Initialize the needed Xen specific data. This is: >> >> - the Xen start of day page containing the console and Xenstore ring >> page PFN and event channel >> - the grant table >> - the

[Xen-devel] [libvirt test] 128859: regressions - FAIL

2018-10-19 Thread osstest service owner
flight 128859 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/128859/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-libvirt-qcow2 10 debian-di-install fail REGR. vs. 128833 Tests which did not suc

[Xen-devel] per-domain configuration and inappropriate use of globals

2018-10-19 Thread Andrew Cooper
Hello, I noticed this most recently in the AVIC series from Janakarajan.  The global svm_avic boolean was left off-by-default because it doesn't work with nested virt yet.  The code in question was actually inherited from the VT-x side, and the general problem is systemic with how Xen has been dev

Re: [Xen-devel] per-domain configuration and inappropriate use of globals

2018-10-19 Thread Juergen Gross
On 19/10/2018 18:57, Andrew Cooper wrote: > In practice, having fine grain control of all the features like would be > excellent for testing purposes, because it allows you to boot two > otherwise-identical VMs with one configuration difference between them. > > In the spirit of the already in pro

Re: [Xen-devel] Intel Z270 support

2018-10-19 Thread Aaron Gray
On Thu, 18 Oct 2018 at 23:42, Andrew Cooper wrote: > On 18/10/2018 19:45, Aaron Gray wrote: > > On Thu, 18 Oct 2018 at 19:11, Andrew Cooper > wrote: > >> On 18/10/2018 18:57, Aaron Gray wrote: >> > I have two ASUS PRIME Z270-A machines based on Intel Z270 chipset and >> > am wondering about when

[Xen-devel] [xen-unstable-smoke test] 128882: tolerable all pass - PUSHED

2018-10-19 Thread osstest service owner
flight 128882 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/128882/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] [PATCH] idle/x86: remove the call to boot_init_stack_canary() from cpu_startup_entry()

2018-10-19 Thread kbuild test robot
Hi Christophe, Thank you for the patch! Yet something to improve: [auto build test ERROR on xen-tip/linux-next] [also build test ERROR on v4.19-rc8 next-20181019] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day

Re: [Xen-devel] [PATCH] xen/arm: Don't build GICv3 with the new vGIC

2018-10-19 Thread Stefano Stabellini
On Fri, 19 Oct 2018, Julien Grall wrote: > Commit 54ec59f6b0 "xen/arm: vgic-v3: Don't create empty re-distributor > regions" breaks compilation when using the new vGIC. > > This is because the field nr_regions is not existing in the vgic > structure. For simplicity, as vGICv3 is not yet imported,

[Xen-devel] [distros-debian-jessie test] 75454: trouble: blocked/broken

2018-10-19 Thread Platform Team regression test user
flight 75454 distros-debian-jessie real [real] http://osstest.xensource.com/osstest/logs/75454/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvopsbroken build-i386

Re: [Xen-devel] [PATCH] idle/x86: remove the call to boot_init_stack_canary() from cpu_startup_entry()

2018-10-19 Thread kbuild test robot
Hi Christophe, Thank you for the patch! Yet something to improve: [auto build test ERROR on xen-tip/linux-next] [also build test ERROR on v4.19-rc8 next-20181019] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day

[Xen-devel] [linux-3.18 baseline-only test] 75457: trouble: blocked/broken

2018-10-19 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75457 linux-3.18 real [real] http://osstest.xensource.com/osstest/logs/75457/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64

Re: [Xen-devel] Xen optimization

2018-10-19 Thread Stefano Stabellini
On Wed, 17 Oct 2018, Milan Boberic wrote: > Hi, > > > > The device tree with everything seems to be system.dts, that was enough > > :-) I don't need the dtsi files you used to build the final dts, I only > > need the one you use in uboot and for your guest. > > I wasn't sure so I sent everything

Re: [Xen-devel] [PATCH v8 0/8] Allow setting up shared memory areas between VMs from xl config files

2018-10-19 Thread Stefano Stabellini
Hi Wei, Any chances you can review this series soon? I would love for it to be merged before the 4.12 code freeze. FYI I am making progress upstreaming the device tree binding, they asked for a very minor change, which I am happy to include in the next version of the series: https://marc.info/?l

Re: [Xen-devel] [PATCH v4 22/23] xen/arm: move kernel.h to asm-arm/

2018-10-19 Thread Stefano Stabellini
On Wed, 17 Oct 2018, Julien Grall wrote: > On 17/10/2018 15:42, Stefano Stabellini wrote: > > On Mon, 15 Oct 2018, Julien Grall wrote: > > > Hi Stefano, > > > > > > On 05/10/2018 19:47, Stefano Stabellini wrote: > > > > It will be #included by a file in a xen/arch/arm subdirectory. > > > > > > >

[Xen-devel] [xen-unstable-smoke test] 128884: tolerable all pass - PUSHED

2018-10-19 Thread osstest service owner
flight 128884 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/128884/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] [PATCH v4 10/23] xen/arm: introduce allocate_memory

2018-10-19 Thread Stefano Stabellini
On Mon, 15 Oct 2018, Julien Grall wrote: > Hi, > > On 05/10/2018 19:47, Stefano Stabellini wrote: > > Introduce an allocate_memory function able to allocate memory for DomUs > > and map it at the right guest addresses, according to the guest memory > > map: GUEST_RAM0_BASE and GUEST_RAM1_BASE. >

  1   2   >