Re: [Xen-devel] [PATCH] x86/hvm: Fix the use of "hap=0" following c/s c0902a9a143a

2019-10-10 Thread Jan Beulich
On 09.10.2019 20:56, Paul Durrant wrote: > On Wed, 9 Oct 2019 at 19:21, Andrew Cooper wrote: >> >> c/s c0902a9a143a refactored hvm_enable() a little, but dropped the logic >> which >> cleared hap_supported in the case that the user had asked for it off. >> >> This results in Xen booting up, claim

Re: [Xen-devel] [PATCH for-4.13 v2 1/3] efi/boot: add missing pointer dereference in set_color

2019-10-10 Thread Jan Beulich
On 09.10.2019 22:40, Igor Druzhinin wrote: > Signed-off-by: Igor Druzhinin Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] [PATCH for-4.13 v2 2/3] x86/efi: properly handle 0 in pixel reserved bitmask

2019-10-10 Thread Jan Beulich
On 09.10.2019 22:40, Igor Druzhinin wrote: > --- a/xen/arch/x86/efi/efi-boot.h > +++ b/xen/arch/x86/efi/efi-boot.h > @@ -528,9 +528,15 @@ static void __init > efi_arch_video_init(EFI_GRAPHICS_OUTPUT_PROTOCOL *gop, > bpp = set_color(mode_info->PixelInformation.BlueMask, bpp, >

Re: [Xen-devel] [PATCH for-4.13 v2 3/3] efi/boot: make sure graphics mode is set while booting through MB2

2019-10-10 Thread Jan Beulich
On 09.10.2019 22:40, Igor Druzhinin wrote: > If a bootloader is using native driver instead of EFI GOP it might > reset graphics mode to be different from what has been originally set > by firmware. While booting through MB2 Xen either need to parse video > setting passed by MB2 and use them instea

Re: [Xen-devel] [PATCH for-4.13 v2 0/3] EFI GOP fixes

2019-10-10 Thread Jürgen Groß
On 09.10.19 22:40, Igor Druzhinin wrote: Igor Druzhinin (3): efi/boot: add missing pointer dereference in set_color x86/efi: properly handle 0 in pixel reserved bitmask efi/boot: make sure graphics mode is set while booting through MB2 xen/arch/x86/efi/efi-boot.h | 12 +--- x

[Xen-devel] [linux-next test] 142487: tolerable FAIL

2019-10-10 Thread osstest service owner
flight 142487 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/142487/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-examine 8 reboot fail like 142431 test-amd64-i386-libvirt-pair 10 xen-bo

[Xen-devel] [PATCH] xen/grant-table: remove unnecessary printing

2019-10-10 Thread Fuqian Huang
xen_auto_xlat_grant_frames.vaddr is definitely NULL in this case. So the address printing is unnecessary. Signed-off-by: Fuqian Huang --- drivers/xen/grant-table.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/xen/grant-table.c b/drivers/xen/grant-table.c index 7e

Re: [Xen-devel] [PATCH v2] pci: clear {host/guest}_maskall field on assign

2019-10-10 Thread Jürgen Groß
On 09.10.19 11:49, Jan Beulich wrote: On 09.10.2019 10:33, Roger Pau Monne wrote: The current implementation of host_maskall makes it sticky across assign and deassign calls, which means that once a guest forces Xen to set host_maskall the maskall bit is not going to be cleared until a call to P

Re: [Xen-devel] [PATCH] xen/grant-table: remove unnecessary printing

2019-10-10 Thread Jürgen Groß
On 10.10.19 10:32, Fuqian Huang wrote: xen_auto_xlat_grant_frames.vaddr is definitely NULL in this case. So the address printing is unnecessary. Signed-off-by: Fuqian Huang Reviewed-by: Juergen Gross Juergen ___ Xen-devel mailing list Xen-devel@

[Xen-devel] [qemu-mainline test] 142502: regressions - FAIL

2019-10-10 Thread osstest service owner
flight 142502 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/142502/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 140282 test-amd64-amd

Re: [Xen-devel] [PATCH v4] xen/arm: domain_build: harden make_cpus_node()

2019-10-10 Thread Julien Grall
Hi Stefano, On 10/10/19 1:42 AM, Stefano Stabellini wrote: make_cpus_node() is using a static buffer to generate the FDT node name. While mpdir_aff is a 64-bit integer, we only ever use the bits [23:0] as only AFF{0, 1, 2} are supported for now. To avoid any potential issues in the future, chec

Re: [Xen-devel] [PATCH v3 1/3] x86/boot: Introduce the kernel_info

2019-10-10 Thread Daniel Kiper
On Wed, Oct 09, 2019 at 05:43:31PM -0700, Randy Dunlap wrote: > Hi, > > Questions and comments below... > Thanks. > > On 10/9/19 3:53 AM, Daniel Kiper wrote: > > > Suggested-by: H. Peter Anvin > > Signed-off-by: Daniel Kiper > > Reviewed-by: Konrad Rzeszutek Wilk > > Reviewed-by: Ross Philipson

Re: [Xen-devel] [PATCH v2] pci: clear {host/guest}_maskall field on assign

2019-10-10 Thread Wei Liu
On Wed, Oct 09, 2019 at 07:13:45PM +0800, Chao Gao wrote: > On Wed, Oct 09, 2019 at 10:33:21AM +0200, Roger Pau Monne wrote: > >The current implementation of host_maskall makes it sticky across > >assign and deassign calls, which means that once a guest forces Xen to > >set host_maskall the maskall

[Xen-devel] [PATCH 0/2] iommu: fixes for interrupt remapping enabling

2019-10-10 Thread Roger Pau Monne
Hello, The following series contain two fixes for issues found when enabling interrupt remapping and the IO-APIC already has unmasked pins. While I'm not aware of any system malfunctioning (apart from reporting IOMMU interrupt remapping faults) I think it would be nice to have those in 4.13. Than

[Xen-devel] [PATCH 2/2] iommu: translate IO-APIC pins when enabling interrupt remapping

2019-10-10 Thread Roger Pau Monne
On Intel hardware there's currently no translation of already enabled IO-APIC pins when interrupt remapping is enabled on the IOMMU, hence introduce a logic similar to the one used in x2apic_bsp_setup in order to save and mask all IO-APIC pins, and then translate and restore them after interrupt re

[Xen-devel] [PATCH 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Roger Pau Monne
When interrupt remapping is enabled as part of enabling x2APIC the IO-APIC entries also need to be translated to the new format and added to the interrupt remapping table. This prevents IOMMU interrupt remapping faults when booting on hardware that has unmasked IO-APIC pins. Reported-by: Andrew C

[Xen-devel] [xen-unstable-smoke test] 142542: tolerable all pass - PUSHED

2019-10-10 Thread osstest service owner
flight 142542 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/142542/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] [PATCH 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Roger Pau Monné
On Thu, Oct 10, 2019 at 01:03:38PM +0200, Roger Pau Monne wrote: > When interrupt remapping is enabled as part of enabling x2APIC the > IO-APIC entries also need to be translated to the new format and added > to the interrupt remapping table. > > This prevents IOMMU interrupt remapping faults when

[Xen-devel] [PATCH v2 2/2] iommu: translate IO-APIC pins when enabling interrupt remapping

2019-10-10 Thread Roger Pau Monne
On Intel hardware there's currently no translation of already enabled IO-APIC pins when interrupt remapping is enabled on the IOMMU, hence introduce a logic similar to the one used in x2apic_bsp_setup in order to save and mask all IO-APIC pins, and then translate and restore them after interrupt re

[Xen-devel] [PATCH v2 0/2] iommu: fixes for interrupt remapping enabling

2019-10-10 Thread Roger Pau Monne
Hello, The following series contain two fixes for issues found when enabling interrupt remapping and the IO-APIC already has unmasked pins. While I'm not aware of any system malfunctioning (apart from reporting IOMMU interrupt remapping faults) I think it would be nice to have those in 4.13. The

[Xen-devel] [PATCH v2 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Roger Pau Monne
When interrupt remapping is enabled as part of enabling x2APIC the IO-APIC entries also need to be translated to the new format and added to the interrupt remapping table. This prevents IOMMU interrupt remapping faults when booting on hardware that has unmasked IO-APIC pins. Reported-by: Andrew C

Re: [Xen-devel] [PATCH v2 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Jan Beulich
On 10.10.2019 13:33, Roger Pau Monne wrote: > When interrupt remapping is enabled as part of enabling x2APIC the Perhaps "unmasked" instead of "the"? > IO-APIC entries also need to be translated to the new format and added > to the interrupt remapping table. > > This prevents IOMMU interrupt rem

Re: [Xen-devel] [PATCH v2 2/2] iommu: translate IO-APIC pins when enabling interrupt remapping

2019-10-10 Thread Jan Beulich
On 10.10.2019 13:33, Roger Pau Monne wrote: > On Intel hardware there's currently no translation of already enabled > IO-APIC pins when interrupt remapping is enabled on the IOMMU, hence > introduce a logic similar to the one used in x2apic_bsp_setup in order > to save and mask all IO-APIC pins, an

Re: [Xen-devel] [PATCH v2 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Roger Pau Monné
On Thu, Oct 10, 2019 at 01:54:06PM +0200, Jan Beulich wrote: > On 10.10.2019 13:33, Roger Pau Monne wrote: > > When interrupt remapping is enabled as part of enabling x2APIC the > > Perhaps "unmasked" instead of "the"? > > > IO-APIC entries also need to be translated to the new format and added >

Re: [Xen-devel] [PATCH for-4.13 v2 2/3] x86/efi: properly handle 0 in pixel reserved bitmask

2019-10-10 Thread Igor Druzhinin
On 10/10/2019 08:13, Jan Beulich wrote: > On 09.10.2019 22:40, Igor Druzhinin wrote: >> --- a/xen/arch/x86/efi/efi-boot.h >> +++ b/xen/arch/x86/efi/efi-boot.h >> @@ -528,9 +528,15 @@ static void __init >> efi_arch_video_init(EFI_GRAPHICS_OUTPUT_PROTOCOL *gop, >> bpp = set_color(mode_info-

[Xen-devel] [RFC] Documentation formats, licenses and file system structure

2019-10-10 Thread Lars Kurth
Hi all, following on from a discussion on IRC and on various other places, I think we need to try and rationalize how we handle documentation. What we have now and what we may get in future * http://xenbits.xen.org/docs/unstable/ (GPL-2) * http://xenbits.xen.org/docs/sphinx-unstable-staging/ (CC

Re: [Xen-devel] [PATCH v2 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Jan Beulich
On 10.10.2019 14:13, Roger Pau Monné wrote: > On Thu, Oct 10, 2019 at 01:54:06PM +0200, Jan Beulich wrote: >> On 10.10.2019 13:33, Roger Pau Monne wrote: >>> When interrupt remapping is enabled as part of enabling x2APIC the >> >> Perhaps "unmasked" instead of "the"? >> >>> IO-APIC entries also ne

Re: [Xen-devel] [PATCH v2 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Roger Pau Monné
On Thu, Oct 10, 2019 at 02:55:02PM +0200, Jan Beulich wrote: > On 10.10.2019 14:13, Roger Pau Monné wrote: > > On Thu, Oct 10, 2019 at 01:54:06PM +0200, Jan Beulich wrote: > >> On 10.10.2019 13:33, Roger Pau Monne wrote: > >>> When interrupt remapping is enabled as part of enabling x2APIC the > >>

Re: [Xen-devel] [PATCH v2 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Roger Pau Monné
On Thu, Oct 10, 2019 at 02:55:02PM +0200, Jan Beulich wrote: > On 10.10.2019 14:13, Roger Pau Monné wrote: > > On Thu, Oct 10, 2019 at 01:54:06PM +0200, Jan Beulich wrote: > >> On 10.10.2019 13:33, Roger Pau Monne wrote: > >>> When interrupt remapping is enabled as part of enabling x2APIC the > >>

Re: [Xen-devel] [PATCH v2 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Jan Beulich
On 10.10.2019 15:12, Roger Pau Monné wrote: > On Thu, Oct 10, 2019 at 02:55:02PM +0200, Jan Beulich wrote: >> On 10.10.2019 14:13, Roger Pau Monné wrote: >>> On Thu, Oct 10, 2019 at 01:54:06PM +0200, Jan Beulich wrote: On 10.10.2019 13:33, Roger Pau Monne wrote: > When interrupt remappin

[Xen-devel] [PATCH v1] Reset iomem's gfn to LIBXL_INVALID_GFN on reboot

2019-10-10 Thread Oleksandr Grytsov
From: Oleksandr Andrushchenko During domain reboot its configuration is partially reused to re-create a new domain, but iomem's GFN field for the iomem is only restored for those memory ranges, which are configured in form of [IOMEM_START,NUM_PAGES[@GFN], but not for those in form of [IOMEM_START

Re: [Xen-devel] [PATCH v2 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Jan Beulich
On 10.10.2019 15:29, Roger Pau Monné wrote: > On Thu, Oct 10, 2019 at 02:55:02PM +0200, Jan Beulich wrote: >> On 10.10.2019 14:13, Roger Pau Monné wrote: >>> On Thu, Oct 10, 2019 at 01:54:06PM +0200, Jan Beulich wrote: On 10.10.2019 13:33, Roger Pau Monne wrote: > When interrupt remappin

Re: [Xen-devel] [PATCH v2] xen: Stop abusing DT of_dma_configure API

2019-10-10 Thread Boris Ostrovsky
On 10/9/19 7:42 AM, Oleksandr Andrushchenko wrote: > On 10/8/19 10:41 PM, Rob Herring wrote: >> As the removed comments say, these aren't DT based devices. >> of_dma_configure() is going to stop allowing a NULL DT node and calling >> it will no longer work. >> >> The comment is also now out of date

[Xen-devel] [PATCH v1] libxl: Add DTB compatible list to config file

2019-10-10 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Some platforms need more compatible property values in device tree root node in addition to "xen,xenvm-%d.%d" and "xen,xenvm" values that are given by Xen by default. Specify in domain configuration file which values should be added by providing "dtb_compatible" list of st

[Xen-devel] [xen-unstable-smoke test] 142556: tolerable all pass - PUSHED

2019-10-10 Thread osstest service owner
flight 142556 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/142556/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] [PATCH v2] xen/arm: domain_build: Print the correct domain in dtb_load()

2019-10-10 Thread Julien Grall
Hi, Hmm, it looks like I forgot this patch before the freeze. Juergen, are you happy with this to go in Xen 4.13? Cheers, On 15/08/2019 18:29, Julien Grall wrote: dtb_load() can be called by other domain than dom0. To avoid confusion in the log, print the correct domain. Signed-off-by: Juli

Re: [Xen-devel] [PATCH v3 1/3] x86/boot: Introduce the kernel_info

2019-10-10 Thread Randy Dunlap
On 10/10/19 2:43 AM, Daniel Kiper wrote: > On Wed, Oct 09, 2019 at 05:43:31PM -0700, Randy Dunlap wrote: >> Hi, >> >> Questions and comments below... >> Thanks. >> >> On 10/9/19 3:53 AM, Daniel Kiper wrote: >> >>> Suggested-by: H. Peter Anvin >>> Signed-off-by: Daniel Kiper >>> Reviewed-by: Konra

Re: [Xen-devel] [PATCH] xen/docs: arm: Update dom0less binding and example

2019-10-10 Thread Julien Grall
Hi, Juergen, would you be happy if this patch is committed for Xen 4.13? Cheers, On 02/10/2019 23:27, Stefano Stabellini wrote: On Tue, 13 Aug 2019, Julien Grall wrote: The binding for the dom0less module does not match Xen implementation. Any module should contain the compatible "multiboot,m

Re: [Xen-devel] [PATCH] xen/docs: arm: Update dom0less binding and example

2019-10-10 Thread Jürgen Groß
On 10.10.19 16:45, Julien Grall wrote: Hi, Juergen, would you be happy if this patch is committed for Xen 4.13? Yes, you can add my: Release-acked-by: Juergen Gross Juergen Cheers, On 02/10/2019 23:27, Stefano Stabellini wrote: On Tue, 13 Aug 2019, Julien Grall wrote: The binding for

Re: [Xen-devel] [PATCH for-4.13] xen/xsm: flask: Prevent NULL deference in flask_assign_{, dt}device()

2019-10-10 Thread Julien Grall
On 09/10/2019 12:57, Artem Mygaiev wrote: Hi Julien Hi, On Fri, 2019-10-04 at 17:42 +0100, Julien Grall wrote: flask_assign_{, dt}device() may be used to check whether you can test if a device is assigned. In this case, the domain will be NULL. However, flask_iommu_resource_use_perm() wil

Re: [Xen-devel] [RESEND][PATCH for-4.13] xen/arm: mm: Clear boot pagetables before bringing-up each secondary CPU

2019-10-10 Thread Julien Grall
+Juergen On 03/10/2019 02:22, Stefano Stabellini wrote: On Sat, 21 Sep 2019, Julien Grall wrote: At the moment, boot pagetables are only cleared once at boot. This means when booting CPU2 (and onwards) then boot pagetables will not be cleared. To keep the interface exactly the same for all sec

Re: [Xen-devel] [PATCH for-4.13] xen/xsm: flask: Prevent NULL deference in flask_assign_{, dt}device()

2019-10-10 Thread Artem Mygaiev
Hi, On Thu, 2019-10-10 at 15:48 +0100, Julien Grall wrote: > > On 09/10/2019 12:57, Artem Mygaiev wrote: > > Hi Julien > > Hi, > > > On Fri, 2019-10-04 at 17:42 +0100, Julien Grall wrote: > > > flask_assign_{, dt}device() may be used to check whether you can test > > > if > > > a device is assi

[Xen-devel] [XEN PATCH for-4.13 v2 2/9] xl: Pass libxl_domain_config to freemem(), instead of b_info

2019-10-10 Thread Ian Jackson
We are going to change the libxl API in a moment and this change will make it simpler. Signed-off-by: Ian Jackson Reviewed-by: Anthony PERARD --- tools/xl/xl_vmcontrol.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/tools/xl/xl_vmcontrol.c b/tools/xl/xl_vmcontrol.c i

[Xen-devel] [XEN PATCH for-4.13 v2 8/9] libxl: create: setdefault: Move physinfo into config_setdefault

2019-10-10 Thread Ian Jackson
No functional change. This will let us refer to it in code we are about to add to this function. Signed-off-by: Ian Jackson --- v2: New patch in this version of the series. --- tools/libxl/libxl_create.c | 17 - tools/libxl/libxl_dm.c | 7 ++- tools/libxl/libxl_inte

[Xen-devel] [XEN PATCH for-4.13 v2 4/9] libxl: libxl_domain_need_memory: Make it take a domain_config

2019-10-10 Thread Ian Jackson
This should calculate the extra memory needed for shadow and iommu, the defaults for which depend on values in c_info. So we need this to have the complete domain config available. And the defaults should actually be updated and stored. So make it non-const. We provide the usual kind of compati

[Xen-devel] [XEN PATCH for-4.13 v2 5/9] libxl: Move shadow_memkb and iommu_memkb defaulting into libxl

2019-10-10 Thread Ian Jackson
Defaulting is supposed to be done by libxl. So these calculations should be here in libxl. libxl__domain_config_setdefault has all the necessary information including the values of max_memkb and max_vcpus. The overall functional effect depends on the caller: For xl, no change. The code moves f

[Xen-devel] [XEN PATCH for-4.13 v2 1/9] libxl: Offer API versions 0x040700 and 0x040800

2019-10-10 Thread Ian Jackson
According to git log -G: 0x040700 was introduced in 304400459ef0 (aka 4.7.0-rc1~481) "tools/libxl: rename remus device to checkpoint device" 0x040800 was introduced in 57f8b13c7240 (aka 4.8.0-rc1~437) "libxl: memory size in kb requires 64 bit variable" It is surprising that no-one noticed th

[Xen-devel] [XEN PATCH for-4.13 v2 3/9] libxl: libxl__domain_config_setdefault: New function

2019-10-10 Thread Ian Jackson
Break out this into a new function. We are going to want to call it from a new call site. Unfortunately not all of the defaults can be moved into the new function without changing the order in which things are done. That does not seem wise at this stage of the release. The effect is that additi

[Xen-devel] [XEN PATCH for-4.13 v2 7/9] libxl: create: setdefault: Make libxl_physinfo info[1]

2019-10-10 Thread Ian Jackson
No functional change. This will let us make it into a pointer without textual change other than to the definition. While we are here, fix some style errors (missing { }). Signed-off-by: Ian Jackson --- v2: New patch in this version of the series. --- tools/libxl/libxl_create.c | 16 ---

[Xen-devel] [XEN PATCH for-4.13 v2 6/9] libxl: Remove/deprecate libxl_get_required_*_memory from the API

2019-10-10 Thread Ian Jackson
These are now redundant because shadow_memkb and iommu_memkb are now defaulted automatically by libxl_domain_need_memory and libxl_domain_create etc. Callers should not now call these; instead, they should just let libxl take care of it. libxl_get_required_shadow_memory was introduced in f89f5558

[Xen-devel] [XEN PATCH for-4.13 v2 0/9] libxl memkb & pt defaulting

2019-10-10 Thread Ian Jackson
This is v2 of my series to sort out the shadow/iommu memory and pci passthrough situation. I think this series will mask the bug which is currently blocking staging propagating to master. I had some difficulty testing this, as the test box under my desk doesn't do PT and I didn't want to wait to

[Xen-devel] [XEN PATCH for-4.13 v2 9/9] libxl/xl: Overhaul passthrough setting logic

2019-10-10 Thread Ian Jackson
LIBXL_PASSTHROUGH_UNKNOWN (aka "ENABLED" in an earlier uncommitted version of this code) is doing double duty. We actually need all of the following to be specificable: * default ("unknown"): enable PT iff we have devices to pass through specified in the initial config file. * "enabled" (a

Re: [Xen-devel] [PATCH for-4.13 v2] xen/arm: domain_build: Don't expose IOMMU specific properties to hwdom

2019-10-10 Thread Julien Grall
Hi, On 10/8/19 4:25 PM, Oleksandr Tyshchenko wrote: From: Oleksandr Tyshchenko We don't passthrough IOMMU device to hwdom even if it is not used by Xen. Therefore exposing the properties that describe relationship between master devices and IOMMUs does not make any sense. According to the: 1.

Re: [Xen-devel] [XEN PATCH for-4.13 v2 0/9] libxl memkb & pt defaulting

2019-10-10 Thread Ian Jackson
Ian Jackson writes ("[XEN PATCH for-4.13 v2 0/9] libxl memkb & pt defaulting"): > This is v2 of my series to sort out the shadow/iommu memory and pci > passthrough situation. I think this series will mask the bug which is > currently blocking staging propagating to master. I have pushed this to:

Re: [Xen-devel] [PATCH v2 1/2] x2APIC: translate IO-APIC entries when enabling the IOMMU

2019-10-10 Thread Roger Pau Monné
On Thu, Oct 10, 2019 at 03:46:45PM +0200, Jan Beulich wrote: > On 10.10.2019 15:12, Roger Pau Monné wrote: > > On Thu, Oct 10, 2019 at 02:55:02PM +0200, Jan Beulich wrote: > >> On 10.10.2019 14:13, Roger Pau Monné wrote: > >>> On Thu, Oct 10, 2019 at 01:54:06PM +0200, Jan Beulich wrote: > On

Re: [Xen-devel] [PATCH for-4.13 v2] xen/arm: domain_build: Don't expose IOMMU specific properties to hwdom

2019-10-10 Thread Oleksandr
On 10.10.19 18:18, Julien Grall wrote: Hi, Hi Julien On 10/8/19 4:25 PM, Oleksandr Tyshchenko wrote: From: Oleksandr Tyshchenko We don't passthrough IOMMU device to hwdom even if it is not used by Xen. Therefore exposing the properties that describe relationship between master devices

Re: [Xen-devel] [PATCH v2] xen: Stop abusing DT of_dma_configure API

2019-10-10 Thread Rob Herring
On Thu, Oct 10, 2019 at 9:00 AM Boris Ostrovsky wrote: > > On 10/9/19 7:42 AM, Oleksandr Andrushchenko wrote: > > On 10/8/19 10:41 PM, Rob Herring wrote: > >> As the removed comments say, these aren't DT based devices. > >> of_dma_configure() is going to stop allowing a NULL DT node and calling >

Re: [Xen-devel] [PATCH for-4.13 v2] xen/arm: domain_build: Don't expose IOMMU specific properties to hwdom

2019-10-10 Thread Julien Grall
Hi, On 10/10/19 4:27 PM, Oleksandr wrote: On 10.10.19 18:18, Julien Grall wrote: Hi, Hi Julien On 10/8/19 4:25 PM, Oleksandr Tyshchenko wrote: From: Oleksandr Tyshchenko We don't passthrough IOMMU device to hwdom even if it is not used by Xen. Therefore exposing the properties that

Re: [Xen-devel] [PATCH] xen/arm: add warning if memory modules overlap

2019-10-10 Thread Julien Grall
Hi Brian, Thank you for the patch. On 10/9/19 8:47 PM, Brian Woods wrote: It's possible for a misconfigured device tree to cause Xen to crash when there are overlapping addresses in the memory modules. Add a warning when printing the addresses to let the user know there's a possible issue when

Re: [Xen-devel] [PATCH for-4.13 v2] xen/arm: domain_build: Don't expose IOMMU specific properties to hwdom

2019-10-10 Thread Oleksandr
On 10.10.19 18:32, Julien Grall wrote: Hi, Hi [1] https://lists.xenproject.org/archives/html/xen-devel/2019-10/msg00104.html ---   xen/arch/arm/domain_build.c | 29 +   1 file changed, 29 insertions(+) diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/

Re: [Xen-devel] [PATCH v2] xen: Stop abusing DT of_dma_configure API

2019-10-10 Thread Boris Ostrovsky
On 10/10/19 11:32 AM, Rob Herring wrote: > On Thu, Oct 10, 2019 at 9:00 AM Boris Ostrovsky > wrote: >> On 10/9/19 7:42 AM, Oleksandr Andrushchenko wrote: >>> On 10/8/19 10:41 PM, Rob Herring wrote: As the removed comments say, these aren't DT based devices. of_dma_configure() is going to

Re: [Xen-devel] [PATCH 2/2] libxl_pci: Fix guest shutdown with PCI PT attached

2019-10-10 Thread Sander Eikelenboom
On 01/10/2019 12:35, Anthony PERARD wrote: > Rewrite of the commit message: > > Before the problematic commit, libxl used to ignore error when > destroying (force == true) a passthrough device, especially error that > happens when dealing with the DM. > > Since fae4880c45fe, if the DM failed to d

Re: [Xen-devel] [[PATCH for-4.13]] xen/arm: mm: Allow generic xen page-tables helpers to be called early

2019-10-10 Thread Julien Grall
Hi Stefano, On 08/10/2019 23:24, Stefano Stabellini wrote: On Tue, 8 Oct 2019, Julien Grall wrote: On 10/8/19 1:18 AM, Stefano Stabellini wrote: On Mon, 7 Oct 2019, Julien Grall wrote: Hi, On 03/10/2019 02:02, Stefano Stabellini wrote: On Fri, 20 Sep 2019, Julien Grall wrote: That's not co

Re: [Xen-devel] [RFC] Documentation formats, licenses and file system structure

2019-10-10 Thread Andrew Cooper
On 10/10/2019 13:34, Lars Kurth wrote: > Hi all, > > following on from a discussion on IRC and on various other places, I think we > need to try and rationalize how we handle documentation. > > What we have now and what we may get in future > * http://xenbits.xen.org/docs/unstable/ (GPL-2) > * htt

[Xen-devel] [PATCH for-4.13] xen/arm: mm: Allow generic xen page-tables helpers to be called early

2019-10-10 Thread Julien Grall
The current implementations of xen_{map, unmap}_table() expect {map, unmap}_domain_page() to be usable. Those helpers are used to map/unmap page tables while update Xen page-tables. Since commit 022387ee1a "xen/arm: mm: Don't open-code Xen PT update in {set, clear}_fixmap()", setup_fixmap() will m

Re: [Xen-devel] [RFC] Documentation formats, licenses and file system structure

2019-10-10 Thread Lars Kurth
On 10/10/2019, 18:05, "Andrew Cooper" wrote: On 10/10/2019 13:34, Lars Kurth wrote: > Hi all, > > following on from a discussion on IRC and on various other places, I think we need to try and rationalize how we handle documentation. > > What we have now and what we may

[Xen-devel] [xen-unstable test] 142518: regressions - trouble: fail/pass/starved

2019-10-10 Thread osstest service owner
flight 142518 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/142518/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt-pair 22 guest-migrate/src_host/dst_host fail REGR. vs. 141822 test-amd6

[Xen-devel] [xen-unstable-smoke test] 142557: tolerable all pass - PUSHED

2019-10-10 Thread osstest service owner
flight 142557 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/142557/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[Xen-devel] [ovmf test] 142533: regressions - FAIL

2019-10-10 Thread osstest service owner
flight 142533 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/142533/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 142423 test-amd64-amd64-xl-qemuu

[Xen-devel] [libvirt test] 142535: regressions - FAIL

2019-10-10 Thread osstest service owner
flight 142535 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/142535/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-libvirt-qcow2 16 guest-start.2 fail REGR. vs. 142252 Tests which did not suc

[Xen-devel] [linux-4.4 test] 142521: regressions - FAIL

2019-10-10 Thread osstest service owner
flight 142521 linux-4.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/142521/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvshim 20 guest-start/debian.repeat fail REGR. vs. 139698 Tests which are faili

[Xen-devel] [xen-unstable-smoke test] 142565: tolerable all pass - PUSHED

2019-10-10 Thread osstest service owner
flight 142565 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/142565/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] [PATCH for-4.13] xen/arm: mm: Allow generic xen page-tables helpers to be called early

2019-10-10 Thread Stefano Stabellini
On Thu, 10 Oct 2019, Julien Grall wrote: > The current implementations of xen_{map, unmap}_table() expect > {map, unmap}_domain_page() to be usable. Those helpers are used to > map/unmap page tables while update Xen page-tables. > > Since commit 022387ee1a "xen/arm: mm: Don't open-code Xen PT upda

Re: [Xen-devel] [[PATCH for-4.13]] xen/arm: mm: Allow generic xen page-tables helpers to be called early

2019-10-10 Thread Stefano Stabellini
On Thu, 10 Oct 2019, Julien Grall wrote: > On 08/10/2019 23:24, Stefano Stabellini wrote: > > On Tue, 8 Oct 2019, Julien Grall wrote: > > > On 10/8/19 1:18 AM, Stefano Stabellini wrote: > > > > On Mon, 7 Oct 2019, Julien Grall wrote: > > > > > Hi, > > > > > > > > > > On 03/10/2019 02:02, Stefano S

Re: [Xen-devel] [RFC] Documentation formats, licenses and file system structure

2019-10-10 Thread Stefano Stabellini
On Thu, 10 Oct 2019, Lars Kurth wrote: > * Would we ever include API docs generated from GPLv2 code? E.g. for safety > use-cases? > @Stefano, @Artem: I guess this one is for you. > I suppose if we would have a similar issue for a safety manual > I am also assuming we would want to use sphinx docs

Re: [Xen-devel] [PATCH v2] xen: Stop abusing DT of_dma_configure API

2019-10-10 Thread Stefano Stabellini
On Tue, 8 Oct 2019, Rob Herring wrote: > As the removed comments say, these aren't DT based devices. > of_dma_configure() is going to stop allowing a NULL DT node and calling > it will no longer work. > > The comment is also now out of date as of commit 9ab91e7c5c51 ("arm64: > default to the direc

[Xen-devel] Commit moratorium for getting a push

2019-10-10 Thread Jürgen Groß
Committers, Please don't push any new patch to staging because we want to have a push to master for 4.13-RC1. Another email will be sent once the moratorium is lifted. Juergen ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.x

[Xen-devel] [qemu-mainline test] 142548: regressions - FAIL

2019-10-10 Thread osstest service owner
flight 142548 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/142548/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 140282 test-amd64-amd

[Xen-devel] [linux-linus test] 142539: regressions - FAIL

2019-10-10 Thread osstest service owner
flight 142539 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/142539/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-i386 7 xen-boot fail REGR. vs. 133580 test-amd64-i386-xl-