[Xen-devel] [ovmf test] 112525: all pass - PUSHED

2017-08-08 Thread osstest service owner
flight 112525 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112525/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 2913ebb2b550f50a14f105e26995dd095e627ba4 baseline version: ovmf

[Xen-devel] [ovmf baseline-only test] 71952: all pass

2017-08-08 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71952 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71952/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 9e2a8e928995c3b1bb664b73fd59785055c6b5f6 baseline

Re: [Xen-devel] [RFC v2 04/12] x86: implement data structure and CPU init flow for MBA.

2017-08-08 Thread Yi Sun
On 17-08-09 09:09:10, Chao Peng wrote: > > > @@ -71,7 +78,6 @@ enum psr_feat_type { > >  /* > >   * This structure represents one feature. > >   * cos_max - The max COS registers number got through CPUID. > > - * cbm_len - The length of CBM got through CPUID. > > As you are moving

[Xen-devel] [PATCH] cpufreq: only stop ondemand governor if already started

2017-08-08 Thread Christopher Clark
Avoid panic in cpufreq_gov_stop. Only execute the CPUFREQ_GOV_STOP logic if the governor has actually been started. Patch originated in OpenXT. Signed-off-by: Christopher Clark --- xen/drivers/cpufreq/cpufreq_ondemand.c | 4 1 file changed, 4

[Xen-devel] [qemu-mainline test] 112521: regressions - trouble: blocked/broken/fail/pass

2017-08-08 Thread osstest service owner
flight 112521 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/112521/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm 5 host-build-prep fail REGR. vs. 112456

Re: [Xen-devel] [RFC v2 07/12] x86: implement set value flow for MBA.

2017-08-08 Thread Chao Peng
>  /* write_msr is used to write out feature MSR register. */ >  void (*write_msr)(unsigned int cos, uint32_t val, enum > psr_val_type type); > + > +/* > + * check_change_val is used to check if input val fulfills SDM > requirement. > + * Change it to valid value if SDM

Re: [Xen-devel] [RFC v2 05/12] x86: implement get hw info flow for MBA.

2017-08-08 Thread Chao Peng
> diff --git a/xen/include/asm-x86/psr.h b/xen/include/asm-x86/psr.h > index 551ccf3..81da1c2 100644 > --- a/xen/include/asm-x86/psr.h > +++ b/xen/include/asm-x86/psr.h > @@ -38,7 +38,9 @@ >  /* Used by psr_get_info() */ >  #define PSR_INFO_IDX_COS_MAX0 >  #define

[Xen-devel] [xen-unstable test] 112519: regressions - trouble: blocked/broken/fail/pass

2017-08-08 Thread osstest service owner
flight 112519 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/112519/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-xsm 17 guest-start.2fail REGR. vs. 112496 build-armhf-xsm

[Xen-devel] [PATCH] x86/tboot: tboot_shutdown: disable interrupts after map_pages_to_xen

2017-08-08 Thread Christopher Clark
Move the point where interrupts are disabled in tboot_shutdown to slightly later, to after the call to map_pages_to_xen. This patch originated in OpenXT with the following report: "Disabling interrupts early causes debug assertions. This is only seen with debug builds but since it causes

Re: [Xen-devel] [RFC v2 04/12] x86: implement data structure and CPU init flow for MBA.

2017-08-08 Thread Chao Peng
> @@ -71,7 +78,6 @@ enum psr_feat_type { >  /* >   * This structure represents one feature. >   * cos_max - The max COS registers number got through CPUID. > - * cbm_len - The length of CBM got through CPUID. As you are moving instead of removing the code, the comment can also move

[Xen-devel] [ovmf test] 112522: all pass - PUSHED

2017-08-08 Thread osstest service owner
flight 112522 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112522/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 9e2a8e928995c3b1bb664b73fd59785055c6b5f6 baseline version: ovmf

Re: [Xen-devel] [PATCH v1 1/3] xen:rtds: towards work conserving RTDS

2017-08-08 Thread Meng Xu
On Tue, Aug 8, 2017 at 3:52 PM, Dario Faggioli wrote: > On Tue, 2017-08-08 at 12:06 -0700, Meng Xu wrote: >> On Tue, Aug 8, 2017 at 10:57 AM, Dario Faggioli >> wrote: >> > On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote: >> > > >> > > diff

Re: [Xen-devel] [PATCH v1 3/3] xl: enable per-VCPU extratime flag for RTDS

2017-08-08 Thread Meng Xu
On Tue, Aug 8, 2017 at 3:24 PM, Dario Faggioli wrote: > On Tue, 2017-08-08 at 12:16 -0700, Meng Xu wrote: >> On Tue, Aug 8, 2017 at 9:09 AM, Dario Faggioli >> wrote: >> > On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote: >> > > >> > > As to

Re: [Xen-devel] [PATCH v1 0/3] Towards work-conserving RTDS

2017-08-08 Thread Dario Faggioli
On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote: > This series of patches make RTDS scheduler work-conserving > without breaking real-time guarantees. > VCPUs with extratime flag set can get extra time > from the unreserved system resource. > System administrators can decide which VCPUs have

Re: [Xen-devel] [PATCH v1 1/3] xen:rtds: towards work conserving RTDS

2017-08-08 Thread Dario Faggioli
On Tue, 2017-08-08 at 12:06 -0700, Meng Xu wrote: > On Tue, Aug 8, 2017 at 10:57 AM, Dario Faggioli > wrote: > > On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote: > > > > > > diff --git a/xen/include/public/domctl.h > > > b/xen/include/public/domctl.h > > > index

Re: [Xen-devel] [PATCH v1 3/3] xl: enable per-VCPU extratime flag for RTDS

2017-08-08 Thread Dario Faggioli
On Tue, 2017-08-08 at 12:16 -0700, Meng Xu wrote: > On Tue, Aug 8, 2017 at 9:09 AM, Dario Faggioli > wrote: > > On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote: > > > > > > As to (1), if users want to set some VCPUs with extratime flag > > > set > > > and > > > some

[Xen-devel] [linux-3.18 test] 112517: trouble: blocked/broken/fail/pass

2017-08-08 Thread osstest service owner
flight 112517 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/112517/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvops 3 capture-logs broken REGR. vs. 112102

[Xen-devel] [PATCH v7 4/9] mm: Scrub pages in alloc_heap_pages() if needed

2017-08-08 Thread Boris Ostrovsky
When allocating pages in alloc_heap_pages() first look for clean pages. If none is found then retry, take pages marked as unscrubbed and scrub them. Note that we shouldn't find unscrubbed pages in alloc_heap_pages() yet. However, this will become possible when we stop scrubbing from

[Xen-devel] [PATCH v7 1/9] mm: Clean up free_heap_pages()

2017-08-08 Thread Boris Ostrovsky
Make buddy merging part of free_heap_pages() a bit more readable. Signed-off-by: Boris Ostrovsky --- Changes in v7: * New in this version (this used to be part of patch 2, splitting into separate patch) xen/common/page_alloc.c | 29 ++--- 1

[Xen-devel] [PATCH v7 9/9] mm: Make sure pages are scrubbed

2017-08-08 Thread Boris Ostrovsky
Add a debug Kconfig option that will make page allocator verify that pages that were supposed to be scrubbed are, in fact, clean. Signed-off-by: Boris Ostrovsky Reviewed-by: Jan Beulich --- xen/Kconfig.debug | 7 ++

[Xen-devel] [PATCH v7 5/9] mm: Scrub memory from idle loop

2017-08-08 Thread Boris Ostrovsky
Instead of scrubbing pages during guest destruction (from free_heap_pages()) do this opportunistically, from the idle loop. We might come to scrub_free_pages()from idle loop while another CPU uses mapcache override, resulting in a fault while trying to do __map_domain_page() in scrub_one_page().

[Xen-devel] [PATCH v7 8/9] mm: Print number of unscrubbed pages in 'H' debug handler

2017-08-08 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky Reviewed-by: Wei Liu --- xen/common/page_alloc.c | 7 +++ 1 file changed, 7 insertions(+) diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c index 726f857..675ac0d 100644 ---

[Xen-devel] [PATCH v7 0/9] Memory scrubbing from idle loop

2017-08-08 Thread Boris Ostrovsky
Changes in v7: * Split free_heap_pages() buddy merge changes into a separate patch (patch 1) * Changed type for page_info.u.free.need_tlbflush to bool:1 * Added BUILD_BUG_ON * Adjusted datatype of temp variable in check_and_stop_scrub() * Formatting changes (see per-patch changes) When a domain

[Xen-devel] [PATCH v7 6/9] spinlock: Introduce spin_lock_cb()

2017-08-08 Thread Boris Ostrovsky
While waiting for a lock we may want to periodically run some code. This code may, for example, allow the caller to release resources held by it that are no longer needed in the critical section protected by the lock. Specifically, this feature will be needed by scrubbing code where the scrubber,

[Xen-devel] [PATCH v7 7/9] mm: Keep heap accessible to others while scrubbing

2017-08-08 Thread Boris Ostrovsky
Instead of scrubbing pages while holding heap lock we can mark buddy's head as being scrubbed and drop the lock temporarily. If someone (most likely alloc_heap_pages()) tries to access this chunk it will signal the scrubber to abort scrub by setting head's BUDDY_SCRUB_ABORT bit. The scrubber

[Xen-devel] [PATCH v7 3/9] mm: Extract allocation loop from alloc_heap_pages()

2017-08-08 Thread Boris Ostrovsky
This will make code a bit more readable, especially with changes that will be introduced in subsequent patches. Signed-off-by: Boris Ostrovsky Acked-by: Jan Beulich --- xen/common/page_alloc.c | 139 +++-

[Xen-devel] [PATCH v7 2/9] mm: Place unscrubbed pages at the end of pagelist

2017-08-08 Thread Boris Ostrovsky
.. so that it's easy to find pages that need to be scrubbed (those pages are now marked with _PGC_need_scrub bit). We keep track of the first unscrubbed page in a page buddy using first_dirty field. For now it can have two values, 0 (whole buddy needs scrubbing) or INVALID_DIRTY_IDX (the buddy

Re: [Xen-devel] [PATCH 1/7] arm: traps: psci: use generic register accessors

2017-08-08 Thread Volodymyr Babchuk
Hi Andrew On 08.08.17 23:37, Andrew Cooper wrote: On 08/08/2017 21:08, Volodymyr Babchuk wrote: diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c index 6cf9ee7..ed78b36 100644 --- a/xen/arch/arm/traps.c +++ b/xen/arch/arm/traps.c @@ -1449,13 +1449,12 @@ static void do_debug_trap(struct

Re: [Xen-devel] [PATCH 4/4] arm: traps: handle SMC32 in check_conditional_instr()

2017-08-08 Thread Volodymyr Babchuk
Hi Julien, On 28.07.17 23:37, Julien Grall wrote: Hi, On 07/28/2017 08:43 PM, Volodymyr Babchuk wrote: On ARMv8 architecture SMC instruction in aarch32 state can be conditional. version + paragraph please. Also, ARMv8 supports both AArch32 and AArch64. As I said in my answer on "arm:

Re: [Xen-devel] [PATCH 1/7] arm: traps: psci: use generic register accessors

2017-08-08 Thread Andrew Cooper
On 08/08/2017 21:08, Volodymyr Babchuk wrote: > diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c > index 6cf9ee7..ed78b36 100644 > --- a/xen/arch/arm/traps.c > +++ b/xen/arch/arm/traps.c > @@ -1449,13 +1449,12 @@ static void do_debug_trap(struct cpu_user_regs *regs, > unsigned int code) >

[Xen-devel] [ovmf baseline-only test] 71951: all pass

2017-08-08 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71951 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71951/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 4cf3f37c87ba1f9d58072444bd735e40e4779e70 baseline

[Xen-devel] [PATCH 1/7] arm: traps: psci: use generic register accessors

2017-08-08 Thread Volodymyr Babchuk
From: Volodymyr Babchuk There are standard functions set_user_reg() and get_user_reg(). We can use them in PSCI_SET_RESULT()/PSCI_ARG() macroses instead of relying on CONFIG_ARM_64 definition. Signed-off-by: Volodymyr Babchuk ---

[Xen-devel] [PATCH 7/7] arm: vsmc: remove 64 bit mode check in psci handler

2017-08-08 Thread Volodymyr Babchuk
PSCI handling code had helper routine that checked calling convention. It does not needed anymore, because: - Generic handler checks that 64 bit calls can be made only by 64 bit guests. - SMCCC requires that 64-bit handler should support both 32 and 64 bit calls even if they originate

[Xen-devel] [PATCH 5/7] arm: traps: handle PSCI calls inside `smccc.c`

2017-08-08 Thread Volodymyr Babchuk
PSCI is part of HVC/SMC interface, so it should be handled in appropriate place: `vsmc.c`. This patch just moves PSCI handler calls from `traps.c` to `vsmc.c`. PSCI is considered as two different "services" in terms of SMCCC. Older PSCI 1.0 is treated as "architecture service", while never PSCI

[Xen-devel] [PATCH 6/7] arm: psci: use definitions provided by vsmc.h

2017-08-08 Thread Volodymyr Babchuk
vsmc.h provides definitions to construct SMC call function number according to SMCCC. We don't need multiple definitions for one thing, and definitions in vsmc.h are more generic than ones used in psci.h. So psci.h will only provide function codes and whole SMC function number will be constructed

[Xen-devel] [PATCH 2/7] arm: make processor-specific functions from traps.c globaly visible

2017-08-08 Thread Volodymyr Babchuk
From: Volodymyr Babchuk The following list of functions: - advance_pc() - check_conditional_instr() - inject_undef_exception() - inject_iabt_exception() - inject_dabt_exception() - inject_vabt_exception() are now globaly visible. This change is needed becase we

[Xen-devel] [PATCH 3/7] arm: traps: check if SMC was conditional before handling it

2017-08-08 Thread Volodymyr Babchuk
On certain ARM arhcitectures SMC instruction can be conditional (ARM DDI 0487A.k page D7-1949) and we need to check if that conditional was meet. Signed-off-by: Volodymyr Babchuk --- This patch was separated from the next one --- xen/arch/arm/traps.c | 6 ++ 1

[Xen-devel] [PATCH v3 0/7] Handle SMCs and HVCs in conformance with SMCCC

2017-08-08 Thread Volodymyr Babchuk
Hello all, This is third version. Instead of 4 patches, there are 7 now. As part of the series, I make some functions in traps.c available globally, moved SMC conditional check into separate patch, changed how PSCI functiond numbers are defined. Per-patch changes are described in corresponding

[Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-08 Thread Volodymyr Babchuk
SMCCC (SMC Call Convention) describes how to handle both HVCs and SMCs. SMCCC states that both HVC and SMC are valid conduits to call to a different firmware functions. Thus, for example PSCI calls can be made both by SMC or HVC. Also SMCCC defines function number coding for such calls. Besides

Re: [Xen-devel] [PATCH v1 3/3] xl: enable per-VCPU extratime flag for RTDS

2017-08-08 Thread Meng Xu
On Tue, Aug 8, 2017 at 9:09 AM, Dario Faggioli wrote: > On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote: >> On Sun, Aug 6, 2017 at 12:22 PM, Meng Xu >> wrote: >> > >> > diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c >> > index

Re: [Xen-devel] [PATCH v1 1/3] xen:rtds: towards work conserving RTDS

2017-08-08 Thread Meng Xu
On Tue, Aug 8, 2017 at 10:57 AM, Dario Faggioli wrote: > On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote: >> Make RTDS scheduler work conserving without breaking the real-time >> guarantees. >> >> VCPU model: >> Each real-time VCPU is extended to have an extratime flag

[Xen-devel] [linux-linus test] 112514: regressions - trouble: blocked/broken/fail/pass

2017-08-08 Thread osstest service owner
flight 112514 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/112514/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515

Re: [Xen-devel] [PATCH v8 2/2] x86/monitor: Notify monitor if an emulation fails.

2017-08-08 Thread Tamas K Lengyel
On Tue, Aug 8, 2017 at 12:06 PM, Petre Pircalabu wrote: > If case of a vm_event with the emulate_flags set, if the instruction > is not implemented by the emulator, the monitor should be notified instead > of directly injecting a hw exception. > This behavior can be

[Xen-devel] [PATCH v8 0/2] Singlestep unimplemented x86emul instructions

2017-08-08 Thread Petre Pircalabu
This patchset implements a new way of handling the instructions unimplemented in x86emul. Instead of inserting a hardware exception the monitor will be notified and it will to try to single-step the faulty instruction using the real processor and then resume execution of the normal instruction

[Xen-devel] [PATCH v8 2/2] x86/monitor: Notify monitor if an emulation fails.

2017-08-08 Thread Petre Pircalabu
If case of a vm_event with the emulate_flags set, if the instruction is not implemented by the emulator, the monitor should be notified instead of directly injecting a hw exception. This behavior can be used to re-execute an instruction not supported by the emulator using the real processor (e.g.

[Xen-devel] [PATCH v8 1/2] x86emul: New return code for unimplemented instruction

2017-08-08 Thread Petre Pircalabu
Enforce the distinction between an instruction not implemented by the emulator and the failure to emulate that instruction by defining a new return code, X86EMUL_UNIMPLEMENTED. This value should only be used by the core emulator if it fails to decode the current instruction, and not by any of the

[Xen-devel] [ovmf test] 112518: all pass - PUSHED

2017-08-08 Thread osstest service owner
flight 112518 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112518/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 4cf3f37c87ba1f9d58072444bd735e40e4779e70 baseline version: ovmf

[Xen-devel] [PATCH] common/page_alloc: Drop BOOT_BUG_ON()

2017-08-08 Thread Andrew Cooper
Regular BUG_ON()'s work fine by this point on all architectures, so drop the custom infrastructure. Substitute BUG_ON(1) for BUG(). Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Stefano Stabellini CC: Julien Grall

[Xen-devel] [PATCH] xen/arm: Tighten memory attribute requirement for memory shared

2017-08-08 Thread Julien Grall
Xen allows shared mapping to be Normal inner-cacheable with any inner cache allocation strategy and no restriction of the outer-cacheability. However, Xen is always mapping those region Normal Inner Write-Back Outer Write-Back Inner-shareable. Per B2.8 "Mismatched memory attributes" in ARM DDI

[Xen-devel] [qemu-mainline test] 112516: regressions - trouble: blocked/broken/fail/pass

2017-08-08 Thread osstest service owner
flight 112516 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/112516/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs. 112456

Re: [Xen-devel] stage1-xen for Fedora

2017-08-08 Thread Rajiv Ranganath
Hi Stefano, On Wed, Aug 2, 2017 at 12:15 AM, Stefano Stabellini wrote: [...] > The main thing that will be different is the list of dependencies you > need to install to build Xen. On Fedora it should be (I am using > Raisin[1] as a reference): Thank you for the pointer

Re: [Xen-devel] [RFC PATCH v1 0/7] IPMMU-VMSA support on ARM

2017-08-08 Thread Stefano Stabellini
On Tue, 8 Aug 2017, Julien Grall wrote: > On 01/08/17 18:13, Oleksandr Tyshchenko wrote: > > Hi, Julien > > > > On Tue, Aug 1, 2017 at 3:27 PM, Julien Grall wrote: > > > On 26/07/17 16:09, Oleksandr Tyshchenko wrote: > > > > > > > > From: Oleksandr Tyshchenko

Re: [Xen-devel] [PATCH 2/3] docs: add xen-release-management.pandoc

2017-08-08 Thread Lars Kurth
Wei On 31/07/17 12:22, Wei Liu wrote: > A document for the release manager. > > Signed-off-by: Wei Liu Reviewed-by: Lars Kurth Regards Lars On 08/08/2017, 12:03, "Julien Grall" wrote: Hi Wei,

Re: [Xen-devel] [PATCH v7 13/14] arm/mem_access: Add short-descriptor based gpt

2017-08-08 Thread Sergej Proskurin
On 08/08/2017 06:20 PM, Andrew Cooper wrote: > On 08/08/17 16:28, Sergej Proskurin wrote: >> On 08/08/2017 05:18 PM, Julien Grall wrote: >>> On 08/08/17 16:17, Sergej Proskurin wrote: Hi Julien, On 07/18/2017 02:25 PM, Sergej Proskurin wrote: > This commit adds

Re: [Xen-devel] Renaming p9 to p9s in libxl idl

2017-08-08 Thread Stefano Stabellini
On Tue, 8 Aug 2017, Wei Liu wrote: > On Tue, Aug 08, 2017 at 09:19:21AM -0700, Stefano Stabellini wrote: > > On Tue, 8 Aug 2017, Wei Liu wrote: > > > Ian and Stefano > > > > > > Oleksandr discovered that the p9fs array in libxl_domain_config is name > > > p9 instead of p9s. This causes problem

Re: [Xen-devel] Renaming p9 to p9s in libxl idl

2017-08-08 Thread Wei Liu
On Tue, Aug 08, 2017 at 09:19:21AM -0700, Stefano Stabellini wrote: > On Tue, 8 Aug 2017, Wei Liu wrote: > > Ian and Stefano > > > > Oleksandr discovered that the p9fs array in libxl_domain_config is name > > p9 instead of p9s. This causes problem for his work to rework device > > framework. > >

Re: [Xen-devel] [PATCH v7 13/14] arm/mem_access: Add short-descriptor based gpt

2017-08-08 Thread Andrew Cooper
On 08/08/17 16:28, Sergej Proskurin wrote: > > On 08/08/2017 05:18 PM, Julien Grall wrote: >> >> On 08/08/17 16:17, Sergej Proskurin wrote: >>> Hi Julien, >>> >>> >>> On 07/18/2017 02:25 PM, Sergej Proskurin wrote: This commit adds functionality to walk the guest's page tables using the

Re: [Xen-devel] Renaming p9 to p9s in libxl idl

2017-08-08 Thread Stefano Stabellini
On Tue, 8 Aug 2017, Wei Liu wrote: > Ian and Stefano > > Oleksandr discovered that the p9fs array in libxl_domain_config is name > p9 instead of p9s. This causes problem for his work to rework device > framework. > > Given that p9fs was added only during last release and the only known >

Re: [Xen-devel] [PATCH v1 3/3] xl: enable per-VCPU extratime flag for RTDS

2017-08-08 Thread Dario Faggioli
On Sun, 2017-08-06 at 22:43 -0400, Meng Xu wrote: > On Sun, Aug 6, 2017 at 12:22 PM, Meng Xu > wrote: > > > > diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c > > index 2c71a9f..88933a4 100644 > > --- a/tools/xl/xl_cmdtable.c > > +++ b/tools/xl/xl_cmdtable.c > >

Re: [Xen-devel] [PATCH 00/25 v7] SBSA UART emulation support in Xen

2017-08-08 Thread Julien Grall
Hi Bhupinder, I gave another and I have a couple of comments. Booting Linux with earlycon enabled take quite a while. I can see the characters coming slower than on the minitel. It seems to be a bit better after switching off the bootconsole. Overall Linux is taking ~20 times to boot with

[Xen-devel] [PATCH v2] x86/apic/x2apic: Share IRQ vector between cluster members only when no cpumask is specified

2017-08-08 Thread Boris Ostrovsky
We have limited number (slightly under NR_DYNAMIC_VECTORS=192) of IRQ vectors that are available to each processor. Currently, when x2apic cluster mode is used (which is default), each vector is shared among all processors in the cluster. With many IRQs (as is the case on systems with multiple

Re: [Xen-devel] [PATCH v4 7/9] vpci/msi: add MSI handlers

2017-08-08 Thread Roger Pau Monné
On Wed, Aug 02, 2017 at 07:34:28AM -0600, Jan Beulich wrote: > >>> Roger Pau Monne 06/30/17 5:01 PM >>> > >+int vpci_msi_arch_enable(struct vpci_arch_msi *arch, struct pci_dev *pdev, > >+ uint64_t address, uint32_t data, unsigned int > >vectors) >

Re: [Xen-devel] [PATCH v1 2/3] libxl: enable per-VCPU extratime flag for RTDS

2017-08-08 Thread Dario Faggioli
On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote: > Modify libxl_vcpu_sched_params_get/set and sched_rtds_vcpu_get/set > functions to support per-VCPU extratime flag > > Signed-off-by: Meng Xu > Reviewed-by: Dario Faggioli Of course, if the

Re: [Xen-devel] [PATCH v7 13/14] arm/mem_access: Add short-descriptor based gpt

2017-08-08 Thread Sergej Proskurin
On 08/08/2017 05:18 PM, Julien Grall wrote: > > > On 08/08/17 16:17, Sergej Proskurin wrote: >> Hi Julien, >> >> >> On 07/18/2017 02:25 PM, Sergej Proskurin wrote: >>> This commit adds functionality to walk the guest's page tables using >>> the >>> short-descriptor translation table format for

Re: [Xen-devel] [PATCH v7 13/14] arm/mem_access: Add short-descriptor based gpt

2017-08-08 Thread Julien Grall
On 08/08/17 16:17, Sergej Proskurin wrote: Hi Julien, On 07/18/2017 02:25 PM, Sergej Proskurin wrote: This commit adds functionality to walk the guest's page tables using the short-descriptor translation table format for both ARMv7 and ARMv8. The implementation is based on ARM DDI 0487B-a

Re: [Xen-devel] [PATCH v7 13/14] arm/mem_access: Add short-descriptor based gpt

2017-08-08 Thread Sergej Proskurin
Hi Julien, On 07/18/2017 02:25 PM, Sergej Proskurin wrote: > This commit adds functionality to walk the guest's page tables using the > short-descriptor translation table format for both ARMv7 and ARMv8. The > implementation is based on ARM DDI 0487B-a J1-6002 and ARM DDI 0406C-b > B3-1506. > >

Re: [Xen-devel] [PATCH v3 1/2] libxl: Implement the handler to handle unrecoverable AER errors

2017-08-08 Thread Wei Liu
On Tue, Aug 08, 2017 at 09:51:36AM -0500, Venu Busireddy wrote: > I will implement all your above suggestions in v4. > > > I think a bigger question is whether you agree with Ian's comments > > regarding API design and whether you have more questions? > > Ian suggested that I document the use of

[Xen-devel] Renaming p9 to p9s in libxl idl

2017-08-08 Thread Wei Liu
Ian and Stefano Oleksandr discovered that the p9fs array in libxl_domain_config is name p9 instead of p9s. This causes problem for his work to rework device framework. Given that p9fs was added only during last release and the only known external toolstack libvirt can't possibility use that,

Re: [Xen-devel] [PATCH v4 06/13] libxl: change p9 to use generec add function

2017-08-08 Thread Wei Liu
On Tue, Aug 08, 2017 at 03:39:23PM +0300, Oleksandr Grytsov wrote: > On Fri, Aug 4, 2017 at 2:53 PM, Wei Liu wrote: > > On Wed, Aug 02, 2017 at 02:37:10PM +0300, Oleksandr Grytsov wrote: > > [...] > >> >> >> From other side this rename touches only internals changes: no > >>

Re: [Xen-devel] [PATCH v7 00/14] arm/mem_access: Walk guest page tables in SW if mem_access is active

2017-08-08 Thread Sergej Proskurin
On 08/08/2017 04:58 PM, Andrew Cooper wrote: > On 08/08/17 15:47, Sergej Proskurin wrote: >> Hi Julien, >> >>> The patch belows solve my problem: >>> >>> diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c >>> index b258248322..6ca994e438 100644 >>> --- a/xen/arch/arm/guest_walk.c

Re: [Xen-devel] [PATCH v7 00/14] arm/mem_access: Walk guest page tables in SW if mem_access is active

2017-08-08 Thread Andrew Cooper
On 08/08/17 15:47, Sergej Proskurin wrote: > Hi Julien, > >> The patch belows solve my problem: >> >> diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c >> index b258248322..6ca994e438 100644 >> --- a/xen/arch/arm/guest_walk.c >> +++ b/xen/arch/arm/guest_walk.c >> @@ -112,7 +112,7

Re: [Xen-devel] [PATCH v1 1/3] xen:rtds: towards work conserving RTDS

2017-08-08 Thread Dario Faggioli
On Sun, 2017-08-06 at 12:22 -0400, Meng Xu wrote: > Make RTDS scheduler work conserving without breaking the real-time > guarantees. > > VCPU model: > Each real-time VCPU is extended to have an extratime flag > and a priority_level field. > When a VCPU's budget is depleted in the current period,

Re: [Xen-devel] [PATCH 24/25 v7] xen/arm: vpl011: Add a pl011 uart DT node in the guest device tree

2017-08-08 Thread Bhupinder Thakur
Hi Julien, >> >> diff --git a/tools/libxl/libxl_arm.c b/tools/libxl/libxl_arm.c >> index a33d3c9..6629852 100644 >> --- a/tools/libxl/libxl_arm.c >> +++ b/tools/libxl/libxl_arm.c >> @@ -43,11 +43,29 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc, >> { >> uint32_t nr_spis = 0; >>

Re: [Xen-devel] [PATCH v3 1/2] libxl: Implement the handler to handle unrecoverable AER errors

2017-08-08 Thread Venu Busireddy
On 2017-08-08 15:33:01 +0100, Wei Liu wrote: > On Mon, Aug 07, 2017 at 06:54:56PM -0500, Venu Busireddy wrote: > > Implement the callback function to handle unrecoverable AER errors, and > > also the public APIs that can be used to register/unregister the handler. > > When an AER error occurs, the

Re: [Xen-devel] [PATCH v7 00/14] arm/mem_access: Walk guest page tables in SW if mem_access is active

2017-08-08 Thread Sergej Proskurin
Hi Julien, > The patch belows solve my problem: > > diff --git a/xen/arch/arm/guest_walk.c b/xen/arch/arm/guest_walk.c > index b258248322..6ca994e438 100644 > --- a/xen/arch/arm/guest_walk.c > +++ b/xen/arch/arm/guest_walk.c > @@ -112,7 +112,7 @@ static int guest_walk_sd(const struct vcpu *v, >

Re: [Xen-devel] [PATCH v3 1/2] libxl: Implement the handler to handle unrecoverable AER errors

2017-08-08 Thread Wei Liu
On Tue, Aug 08, 2017 at 03:33:01PM +0100, Wei Liu wrote: > > + > > +int libxl_reg_aer_events_handler(libxl_ctx *ctx, > > + uint32_t domid, > > + libxl_aer_watch **aer_ws_out) > > Afaict libxl_aer_watch is an opaque type to external

Re: [Xen-devel] Xen is not booting with updated kernel 4.13 rc3 from UEFI shell

2017-08-08 Thread Juergen Gross
On 08/08/17 16:26, Asharaf Perinchikkal wrote: > Hi All, > > I am attaching xen boot log when xen fail to boot with updated kernel > from UEFI shell. > It show an error when kernel start booting.. > > N) *** > (XEN) WARNING: CONSOLE OUTPUT IS

Re: [Xen-devel] [PATCH v3 1/2] libxl: Implement the handler to handle unrecoverable AER errors

2017-08-08 Thread Wei Liu
On Mon, Aug 07, 2017 at 06:54:56PM -0500, Venu Busireddy wrote: > Implement the callback function to handle unrecoverable AER errors, and > also the public APIs that can be used to register/unregister the handler. > When an AER error occurs, the handler will forcibly remove the erring > PCIe

Re: [Xen-devel] Xen is not booting with updated kernel 4.13 rc3 from UEFI shell

2017-08-08 Thread Asharaf Perinchikkal
Hi All, I am attaching xen boot log when xen fail to boot with updated kernel from UEFI shell. It show an error when kernel start booting.. N) *** (XEN) WARNING: CONSOLE OUTPUT IS SYNCHRONOUS (XEN) This option is intended to aid debugging of Xen

Re: [Xen-devel] [PATCH 25/25 v7] xen/arm: vpl011: Update documentation for vuart console support

2017-08-08 Thread Julien Grall
Hi, On 07/08/17 09:53, Bhupinder Thakur wrote: 1. Update documentation for a new vuart option added. 2. Update documentation about SPI irq reserved for vuart. Signed-off-by: Bhupinder Thakur Reviewed-by: Stefano Stabellini Acked-by: Wei

Re: [Xen-devel] [PATCH 24/25 v7] xen/arm: vpl011: Add a pl011 uart DT node in the guest device tree

2017-08-08 Thread Julien Grall
On 07/08/17 09:53, Bhupinder Thakur wrote: The SBSA UART node format is as specified in Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below: ARM SBSA defined generic UART -- This UART uses a subset of the PL011 registers and consequently

Re: [Xen-devel] [PATCH] x86/apic/x2apic: Share IRQ vector between cluster members only when no cpumask is specified

2017-08-08 Thread Boris Ostrovsky
On 08/08/2017 09:28 AM, Andrew Cooper wrote: > On 08/08/17 14:25, Boris Ostrovsky wrote: >> On 08/08/2017 05:48 AM, Jan Beulich wrote: >> Andrew Cooper 08/07/17 7:19 PM >>> More than once, we've discussed freeing up the legacy PIC range of vectors, and

Re: [Xen-devel] [PATCH v2 0/3] fix xen hvm guest with kaslr enabled

2017-08-08 Thread Boris Ostrovsky
On 08/08/2017 02:46 AM, Juergen Gross wrote: > On 28/07/17 12:23, Juergen Gross wrote: >> This patch series fixes a regression introduced in 4.13-rc1: A Xen >> HVM guest with KASLR enabled wouldn't boot any longer due to the usage >> of __va() before kernel_randomize_memory() was called. >> >>

Re: [Xen-devel] [PATCH 06/25 v7] xen/arm: vpl011: Add a new domctl API to initialize vpl011

2017-08-08 Thread Julien Grall
Hi Bhupinder, On 07/08/17 09:52, Bhupinder Thakur wrote: diff --git a/tools/libxl/libxl_arch.h b/tools/libxl/libxl_arch.h index 5e1fc60..784ec7f 100644 --- a/tools/libxl/libxl_arch.h +++ b/tools/libxl/libxl_arch.h @@ -44,6 +44,13 @@ int libxl__arch_domain_finalise_hw_description(libxl__gc *gc,

Re: [Xen-devel] [PATCH 22/25 v7] xen/arm: vpl011: Add support for vuart console in xenconsole

2017-08-08 Thread Wei Liu
On Mon, Aug 07, 2017 at 02:23:14PM +0530, Bhupinder Thakur wrote: > This patch finally adds the support for vuart console. It adds > two new fields in the console initialization: > > - optional > - use_gnttab > > optional flag tells whether the console is optional. > > use_gnttab tells whether

Re: [Xen-devel] [PATCH 21/25 v7] xen/arm: vpl011: Add support for multiple consoles in xenconsole

2017-08-08 Thread Wei Liu
On Mon, Aug 07, 2017 at 02:23:13PM +0530, Bhupinder Thakur wrote: > This patch adds the support for multiple consoles and introduces the > iterator functions to operate on multiple consoles. > Please check all the functions called by the iterator functions to make sure they have properly guarded

[Xen-devel] [libvirt test] 112515: tolerable trouble: blocked/broken/pass - PUSHED

2017-08-08 Thread osstest service owner
flight 112515 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/112515/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a build-arm64-libvirt 1

Re: [Xen-devel] [PATCH 06/25 v7] xen/arm: vpl011: Add a new domctl API to initialize vpl011

2017-08-08 Thread Julien Grall
Hi, On 08/08/17 14:30, Wei Liu wrote: On Tue, Aug 08, 2017 at 02:11:08PM +0100, Wei Liu wrote: +else +rc = -EINVAL; Indentation. Ignore this please. You were right, the indentation is wrong :). It is 8 spaces rather than 4. Cheers, -- Julien

Re: [Xen-devel] [PATCH 04/25 v7] xen/arm: vpl011: Add support for vuart in libxl

2017-08-08 Thread Julien Grall
On 08/08/17 14:38, Julien Grall wrote: Hi Bhupinder, On 07/08/17 09:52, Bhupinder Thakur wrote: diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h index 229e289..90eaa20 100644 --- a/tools/libxl/libxl.h +++ b/tools/libxl/libxl.h @@ -306,6 +306,11 @@ #define

Re: [Xen-devel] [PATCH 04/25 v7] xen/arm: vpl011: Add support for vuart in libxl

2017-08-08 Thread Julien Grall
Hi Bhupinder, On 07/08/17 09:52, Bhupinder Thakur wrote: diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h index 229e289..90eaa20 100644 --- a/tools/libxl/libxl.h +++ b/tools/libxl/libxl.h @@ -306,6 +306,11 @@ #define LIBXL_HAVE_BUILDINFO_HVM_ACPI_LAPTOP_SLATE 1 /* + * LIBXL_HAVE_VUART

[Xen-devel] [PATCH v3 2/3] x86/vlapic: Keep timer running when switching between one-shot and periodic mode

2017-08-08 Thread Anthony PERARD
If we take TSC-deadline mode timer out of the picture, the Intel SDM does not say that the timer is disable when the timer mode is change, either from one-shot to periodic or vice versa. After this patch, the timer is no longer disarmed on change of mode, so the counter (TMCCT) keeps counting

[Xen-devel] [PATCH v3 0/3] Rework vlapic timer to behave more like real-hardware

2017-08-08 Thread Anthony PERARD
Hi, When developing PVH for OVMF, I've used the lapic timer. It turns out that the way it is used by OVMF did not work with Xen [1]. I tried to find out how real-hw behave, and write a XTF tests [2]. And this patch series tries to fix the behavior of the vlapic timer. The OVMF driver for the

[Xen-devel] [PATCH v3 1/3] x86/vlapic: Introduce vlapic_update_timer

2017-08-08 Thread Anthony PERARD
There should not be any functionality change with this patch. This function is used when the APIC_TMICT register is updated. vlapic_update_timer is introduce as it will be use also when the registers APIC_LVTT and APIC_TDCR are updated. Signed-off-by: Anthony PERARD

[Xen-devel] [PATCH v3 3/3] x86/vlapic: Apply change to TDCR right away to the timer

2017-08-08 Thread Anthony PERARD
The description in the Intel SDM of how the divide configuration register is used: "The APIC timer frequency will be the processor's bus clock or core crystal clock frequency divided by the value specified in the divide configuration register." Observation of baremetal shown that when the TDCR is

Re: [Xen-devel] [PATCH 19/25 v7] xen/arm: vpl011: Add a new console_open_log function in xenconsole

2017-08-08 Thread Wei Liu
On Mon, Aug 07, 2017 at 02:23:11PM +0530, Bhupinder Thakur wrote: > This patch introduces a console_open_log console_cleanup function. This > function > opens the console log file. > > Signed-off-by: Bhupinder Thakur > Reviewed-by: Stefano Stabellini

Re: [Xen-devel] [PATCH 06/25 v7] xen/arm: vpl011: Add a new domctl API to initialize vpl011

2017-08-08 Thread Wei Liu
On Tue, Aug 08, 2017 at 02:11:08PM +0100, Wei Liu wrote: > > +else > > +rc = -EINVAL; > > Indentation. Ignore this please. ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 18/25 v7] xen/arm: vpl011: Add a new console_cleanup function in xenconsole

2017-08-08 Thread Wei Liu
On Mon, Aug 07, 2017 at 02:23:10PM +0530, Bhupinder Thakur wrote: > This patch introduces a new console_cleanup function. This function > frees up the console resources. > > Signed-off-by: Bhupinder Thakur > Reviewed-by: Stefano Stabellini

Re: [Xen-devel] [PATCH] x86/apic/x2apic: Share IRQ vector between cluster members only when no cpumask is specified

2017-08-08 Thread Andrew Cooper
On 08/08/17 14:25, Boris Ostrovsky wrote: > On 08/08/2017 05:48 AM, Jan Beulich wrote: > Andrew Cooper 08/07/17 7:19 PM >>> >>> More than once, we've discussed freeing up the legacy PIC range of >>> vectors, and freeing up the unallocated vectors in 0xfx. >> And

Re: [Xen-devel] [PATCH] x86/apic/x2apic: Share IRQ vector between cluster members only when no cpumask is specified

2017-08-08 Thread Boris Ostrovsky
On 08/08/2017 05:48 AM, Jan Beulich wrote: Andrew Cooper 08/07/17 7:19 PM >>> >> More than once, we've discussed freeing up the legacy PIC range of >> vectors, and freeing up the unallocated vectors in 0xfx. > And that's something I would prefer over the change

Re: [Xen-devel] [PATCH v7 00/14] arm/mem_access: Walk guest page tables in SW if mem_access is active

2017-08-08 Thread Julien Grall
On 08/08/17 13:33, Julien Grall wrote: > > > On 08/08/17 13:17, Sergej Proskurin wrote: diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c index c07999b518..904abafcae 100644 --- a/xen/arch/arm/traps.c +++ b/xen/arch/arm/traps.c @@ -2688,6 +2688,8 @@ static bool

  1   2   >