Re: [Xen-devel] PROBLEM: Kernel BUG with raid5 soft + Xen + DRBD - invalid opcode

2017-01-09 Thread Shaohua Li
On Sun, Jan 08, 2017 at 02:31:15PM +0100, MasterPrenium wrote: > Hello, > > Replies below + : > - I don't know if this can help but after the crash, when the system > reboots, the Raid 5 stack is re-synchronizing > [ 37.028239] md10: Warning: Device sdc1 is misaligned > [ 37.028541] created

[Xen-devel] [qemu-mainline test] 104086: tolerable FAIL - PUSHED

2017-01-09 Thread osstest service owner
flight 104086 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/104086/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 104073 test-armhf-armhf-libvirt

Re: [Xen-devel] [PATCH v2 14/25] x86/svm: Improvements using named features

2017-01-09 Thread Boris Ostrovsky
On 01/09/2017 06:03 AM, Andrew Cooper wrote: > This avoids calling into hvm_cpuid() to obtain information which is directly > available. In particular, this avoids the need to overload flag_dr_dirty > because of hvm_cpuid() being unavailable in svm_save_dr(). > > flag_dr_dirty is returned to a

Re: [Xen-devel] [PATCH v2 01/25] x86/cpuid: Introduce guest_cpuid() and struct cpuid_leaf

2017-01-09 Thread Boris Ostrovsky
On 01/09/2017 06:03 AM, Andrew Cooper wrote: > Longterm, pv_cpuid() and hvm_cpuid() will be merged into a single > guest_cpuid(), which is also capable of working outside of current context. > > To aid this transtion, introduce guest_cpuid() with the intended API, which > simply defers back to

[Xen-devel] [ovmf baseline-only test] 68347: all pass

2017-01-09 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68347 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68347/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 7ecfa0aa38a3601c958a81dc36f69b5e04e40584 baseline

Re: [Xen-devel] [PATCH] xen: do not re-use pirq number cached in pci device msi msg data

2017-01-09 Thread Stefano Stabellini
On Mon, 9 Jan 2017, Konrad Rzeszutek Wilk wrote: > On Mon, Jan 09, 2017 at 10:42:41AM -0500, Dan Streetman wrote: > > On Mon, Jan 9, 2017 at 9:59 AM, Boris Ostrovsky > > wrote: > > > On 01/06/2017 08:06 PM, Konrad Rzeszutek Wilk wrote: > > >> On Thu, Jan 05, 2017 at

Re: [Xen-devel] [PATCH 3/3] xen: optimize xenbus driver for multiple concurrent xenstore accesses

2017-01-09 Thread Boris Ostrovsky
On 01/06/2017 10:05 AM, Juergen Gross wrote: > Handling of multiple concurrent Xenstore accesses through xenbus driver > either from the kernel or user land is rather lame today: xenbus is > capable to have one access active only at one point of time. > > Rewrite xenbus to handle multiple requests

[Xen-devel] [xen-unstable test] 104084: regressions - trouble: blocked/broken/fail/pass

2017-01-09 Thread osstest service owner
flight 104084 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/104084/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm 4 host-build-prep fail REGR. vs. 104078 Regressions which

[Xen-devel] [ovmf test] 104087: all pass - PUSHED

2017-01-09 Thread osstest service owner
flight 104087 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/104087/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 7ecfa0aa38a3601c958a81dc36f69b5e04e40584 baseline version: ovmf

[Xen-devel] [ovmf baseline-only test] 68346: regressions - FAIL

2017-01-09 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68346 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68346/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 20

Re: [Xen-devel] [PATCH v11 01/13] x86: add multiboot2 protocol support

2017-01-09 Thread Doug Goldstein
On 12/5/16 4:25 PM, Daniel Kiper wrote: > Add multiboot2 protocol support. Alter min memory limit handling as we > now may not find it from either multiboot (v1) or multiboot2. > > This way we are laying the foundation for EFI + GRUB2 + Xen development. > > Signed-off-by: Daniel Kiper

Re: [Xen-devel] [PATCH v11 03/13] x86: allow EFI reboot method neither on EFI platforms...

2017-01-09 Thread Doug Goldstein
On 12/7/16 7:18 AM, Jan Beulich wrote: On 05.12.16 at 23:25, wrote: >> ..nor EFI platforms with runtime services enabled. > > Btw, was the title meant to read "... neither on non-EFI platforms ..."? > > Jan > Could we reduce the amount of negatives? "disallow

Re: [Xen-devel] [PATCH v11 07/13] x86: add multiboot2 protocol support for EFI platforms

2017-01-09 Thread Doug Goldstein
On 12/5/16 4:25 PM, Daniel Kiper wrote: > This way Xen can be loaded on EFI platforms using GRUB2 and > other boot loaders which support multiboot2 protocol. > > Signed-off-by: Daniel Kiper > --- > v10 - suggestions/fixes: > - replace ljmpl with lretq >

Re: [Xen-devel] [PATCH v2 05/10] x86/HVM/SVM: Add AVIC initialization code

2017-01-09 Thread Suravee Suthikulpanit
Hi Andrew, On 1/2/17 23:37, Andrew Cooper wrote: +ma = d->avic_phy_apic_id_table_mfn; +vmcb->avic_phy_apic_id = (ma << PAGE_SHIFT) & AVIC_HPA_MASK; +vmcb->avic_phy_apic_id |= AVIC_PHY_APIC_ID_MAX; Surely this should be some calculation derived from d->max_vcpus? This is actually

Re: [Xen-devel] [PATCH v11 11/13] x86: make Xen early boot code relocatable

2017-01-09 Thread Doug Goldstein
On 12/5/16 4:25 PM, Daniel Kiper wrote: > Every multiboot protocol (regardless of version) compatible image must > specify its load address (in ELF or multiboot header). Multiboot protocol > compatible loader have to load image at specified address. However, there > is no guarantee that the

[Xen-devel] [xen-unstable test] 104090: regressions - FAIL

2017-01-09 Thread osstest service owner
flight 104090 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/104090/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm 4 host-build-prep fail in 104084 REGR. vs. 104078 Tests which are

Re: [Xen-devel] [PATCH 3/3] xen: optimize xenbus driver for multiple concurrent xenstore accesses

2017-01-09 Thread Juergen Gross
On 09/01/17 22:17, Boris Ostrovsky wrote: > On 01/06/2017 10:05 AM, Juergen Gross wrote: >> Handling of multiple concurrent Xenstore accesses through xenbus driver >> either from the kernel or user land is rather lame today: xenbus is >> capable to have one access active only at one point of time.

Re: [Xen-devel] [PATCH v4 22/24] tools: L2 CAT: support show cbm for L2 CAT.

2017-01-09 Thread Yi Sun
On 17-01-09 10:08:04, Wei Liu wrote: > On Mon, Jan 09, 2017 at 09:24:54AM +0800, Yi Sun wrote: > > On 17-01-06 12:04:43, Wei Liu wrote: > > > On Wed, Dec 14, 2016 at 12:08:02PM +0800, Yi Sun wrote: > > > > diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl > > > > index

Re: [Xen-devel] [PATCH 2/2] xen/kbdif: add multi-touch support

2017-01-09 Thread Oleksandr Andrushchenko
On 01/07/2017 12:37 AM, Stefano Stabellini wrote: On Fri, 6 Jan 2017, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko Signed-off-by: Oleksandr Andrushchenko --- xen/include/public/io/kbdif.h | 228

Re: [Xen-devel] [PATCH v2 01/10] x86/HVM: Introduce struct hvm_pi_ops

2017-01-09 Thread Suravee Suthikulpanit
Jan, On 01/05/2017 10:51 PM, Jan Beulich wrote: On 31.12.16 at 06:45, wrote: --- a/xen/include/asm-x86/hvm/domain.h +++ b/xen/include/asm-x86/hvm/domain.h @@ -72,6 +72,67 @@ struct hvm_ioreq_server { bool_t bufioreq_atomic; }; +struct

[Xen-devel] [RFC 03/16] x86: change 'cbm_type' to 'psr_val_type' to make it general.

2017-01-09 Thread Yi Sun
This patch changes 'cbm_type' to 'psr_val_type' to make it general. Then, we can reuse this for every psr allocation feature. Signed-off-by: Yi Sun --- xen/arch/x86/domctl.c | 16 +- xen/arch/x86/psr.c| 80

[Xen-devel] [RFC 00/16] Enable Memory Bandwidth Allocation in Xen

2017-01-09 Thread Yi Sun
Hi, all, We plan to bring a new PSR (Platform Shared Resource) feature called Intel Memory Bandwidth Allocation (MBA) to Xen. Besides the MBA enabling, we change some interfaces to make them more general but not only for CAT. The implementation bases on below patch set which is being reviewed.

[Xen-devel] [RFC 01/16] docs: create Memory Bandwidth Allocation (MBA) feature document.

2017-01-09 Thread Yi Sun
This patch creates MBA feature document in doc/features/. It describes details for MBA. Signed-off-by: Yi Sun --- docs/features/intel_psr_mba.pandoc | 226 + 1 file changed, 226 insertions(+) create mode 100644

[Xen-devel] [qemu-mainline baseline-only test] 68348: regressions - FAIL

2017-01-09 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68348 qemu-mainline real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68348/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-amd64-pvgrub 10 guest-start

Re: [Xen-devel] [PATCH v2 02/10] x86/vLAPIC: Declare vlapic_read_aligned() and vlapic_reg_write() as non-static

2017-01-09 Thread Suravee Suthikulpanit
On 01/05/2017 10:53 PM, Jan Beulich wrote: On 31.12.16 at 06:45, wrote: Expose vlapic_read_aligned and vlapic_reg_write() to be used by AVIC. Signed-off-by: Suravee Suthikulpanit Reviewed-by: Konrad Rzeszutek Wilk

Re: [Xen-devel] [PATCH 1/2] xen/kbdif: update protocol documentation

2017-01-09 Thread Oleksandr Andrushchenko
On 01/07/2017 12:20 AM, Stefano Stabellini wrote: On Fri, 6 Jan 2017, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko Signed-off-by: Oleksandr Andrushchenko --- xen/include/public/io/kbdif.h | 249

[Xen-devel] [PATCH] x86/cpuid: Add AVX512_VPOPCNTDQ support

2017-01-09 Thread He Chen
AVX512_VPOPCNTDQ: Vector POPCNT instructions for word and qwords. variable precision. Signed-off-by: He Chen --- xen/include/public/arch-x86/cpufeatureset.h | 1 + xen/tools/gen-cpuid.py | 3 ++- 2 files changed, 3 insertions(+), 1 deletion(-) diff

[Xen-devel] [RFC 05/16] x86: parse config parameters for MBA.

2017-01-09 Thread Yi Sun
This patch parses MBA parameters in configuration file. The parameter means whether MBA is supported. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/arch/x86/psr.c b/xen/arch/x86/psr.c index 58d3555..eca9c43 100644

[Xen-devel] [RFC 13/16] tools: implemet get hw info flow for MBA.

2017-01-09 Thread Yi Sun
This patch implements get HW info flow in tools for MBA. Signed-off-by: Yi Sun --- tools/libxc/include/xenctrl.h | 7 +++ tools/libxc/xc_psr.c | 14 + tools/libxl/libxl_psr.c | 12 ++- tools/libxl/libxl_types.idl | 6 ++

[Xen-devel] [RFC 07/16] x86: implement get hw info flow for MBA.

2017-01-09 Thread Yi Sun
This patch implements get HW info flow for MBA including its callback function and sysctl interface. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c | 15 +++ xen/arch/x86/sysctl.c | 16 xen/include/asm-x86/psr.h | 3 +++

[Xen-devel] [RFC 16/16] docs: add MBA description in docs.

2017-01-09 Thread Yi Sun
This patch adds MBA description in related documents. Signed-off-by: Yi Sun --- docs/man/xl.pod.1.in | 35 +++ docs/misc/xl-psr.markdown | 60 +++ 2 files changed, 95 insertions(+) diff --git

[Xen-devel] [RFC 06/16] x86: implement init flow for MBA.

2017-01-09 Thread Yi Sun
This patch implements init flow for MBA including its callback functions. Signed-off-by: Yi Sun --- xen/arch/x86/psr.c| 83 ++- xen/include/asm-x86/psr.h | 1 + 2 files changed, 83 insertions(+), 1 deletion(-) diff

[Xen-devel] [RFC 12/16] tools: refactor codes to make set val be more general.

2017-01-09 Thread Yi Sun
This patch refactors some codes in tools/ to make set value be more general. Signed-off-by: Yi Sun --- tools/libxc/include/xenctrl.h | 6 +++--- tools/libxc/xc_psr.c | 6 +++--- tools/libxl/libxl_psr.c | 4 ++-- 3 files changed, 8 insertions(+), 8

[Xen-devel] [RFC 10/16] tools: refactor codes to make get hw info interface be general.

2017-01-09 Thread Yi Sun
This patch changes some interfaces in tools/ to make get hw info be general but not only for CAT. Add 'LIBXL_HAVE_PSR_MBA' to indicate interface change. Signed-off-by: Yi Sun --- tools/libxc/include/xenctrl.h | 23 +++-- tools/libxc/xc_psr.c | 32

[Xen-devel] [RFC 11/16] tools: refactor codes to make get val be more general.

2017-01-09 Thread Yi Sun
This patch refactors some codes in tools/ to make get value be more general. Signed-off-by: Yi Sun --- tools/libxc/include/xenctrl.h | 12 +++ tools/libxc/xc_psr.c | 8 ++--- tools/libxl/libxl_psr.c | 80 +++

[Xen-devel] [RFC 09/16] x86: implement set value flow for MBA.

2017-01-09 Thread Yi Sun
This patch implements set value flow for MBA including its callback function and domctl interface. Signed-off-by: Yi Sun --- xen/arch/x86/domctl.c | 6 ++ xen/arch/x86/psr.c | 152 +---

[Xen-devel] [RFC 14/16] tools: implemet get value flow for MBA.

2017-01-09 Thread Yi Sun
This patch implements get value flow in tools for MBA. Signed-off-by: Yi Sun --- tools/libxc/include/xenctrl.h | 1 + tools/libxc/xc_psr.c | 3 ++ tools/libxl/libxl.h | 3 ++ tools/libxl/libxl_psr.c | 21 +

[Xen-devel] [RFC 08/16] x86: implement get value flow for MBA.

2017-01-09 Thread Yi Sun
This patch implements get value callback function and domctl interface for MBA. Signed-off-by: Yi Sun --- xen/arch/x86/domctl.c | 7 +++ xen/arch/x86/psr.c | 15 +++ xen/include/public/domctl.h | 1 + 3 files changed, 23 insertions(+)

[Xen-devel] [RFC 15/16] tools: implemet set value flow for MBA.

2017-01-09 Thread Yi Sun
This patch implements set value flow in tools for MBA. Signed-off-by: Yi Sun --- tools/libxc/xc_psr.c | 3 +++ tools/libxl/libxl.h | 3 +++ tools/libxl/libxl_psr.c | 33 tools/libxl/xl.h | 1 +

Re: [Xen-devel] [PATCH v2] get_maintainer.pl: Teach brace expansion

2017-01-09 Thread Doug Goldstein
On 1/9/17 9:22 AM, Anthony PERARD wrote: > Simpler non-nested brace expansion. > > Some entries in the MAINTAINER are not understood by the script, the > ones that contain {,}. This patch fixes it. > > This will convert brace expansion style use in MAINTAINER into a regex > that

[Xen-devel] [replace tabs with spaces] convert tabs into spaces; preserving indentation

2017-01-09 Thread Eric DeVolder
Convert tabs into spaces; preserving indentation No functional changes Signed-off-by: Eric DeVolder --- tools/libxc/xc_kexec.c | 16 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/tools/libxc/xc_kexec.c b/tools/libxc/xc_kexec.c index

[Xen-devel] [PATCH] convert tabs into spaces; preserving indentation

2017-01-09 Thread Eric DeVolder
Convert tabs into spaces; preserving indentation No functional changes Signed-off-by: Eric DeVolder --- tools/libxc/xc_kexec.c | 16 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/tools/libxc/xc_kexec.c b/tools/libxc/xc_kexec.c index

Re: [Xen-devel] [PATCH v2] ns16550: Add command line parsing adjustments

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 16:40, wrote: > On 01/09/2017 02:10 AM, Jan Beulich wrote: > > On 06.01.17 at 19:34, wrote: >>> Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing >>> adjustments"): On 06.01.17 at 17:24,

Re: [Xen-devel] [PATCH v2 02/25] x86/cpuid: Introduce struct cpuid_policy

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 12:03, wrote: > @@ -67,6 +80,58 @@ static void __init sanitise_featureset(uint32_t *fs) >(fs[FEATURESET_e1d] & ~CPUID_COMMON_1D_FEATURES)); > } > > +static void __init calculate_raw_policy(void) > +{ > +struct

Re: [Xen-devel] [PATCH v2 06/25] x86/hvm: Dispatch cpuid_viridian_leaves() from guest_cpuid()

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 12:03, wrote: > ... rather than from the legacy path. Update the API to match guest_cpuid(), > and remove its dependence on current. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich

Re: [Xen-devel] [PATCH v2] ns16550: Add command line parsing adjustments

2017-01-09 Thread Swapnil Paratey
On 01/09/2017 02:10 AM, Jan Beulich wrote: On 06.01.17 at 19:34, wrote: Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing adjustments"): On 06.01.17 at 17:24, wrote: Well, as you may have seen, things are getting

Re: [Xen-devel] [PATCH v2 01/25] x86/cpuid: Introduce guest_cpuid() and struct cpuid_leaf

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 16:09, wrote: > On 09/01/17 15:04, Jan Beulich wrote: > On 09.01.17 at 12:03, wrote: >>> @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t > feature) >>> return NULL; >>> } >>> >>> +void

Re: [Xen-devel] [PATCH] xen: do not re-use pirq number cached in pci device msi msg data

2017-01-09 Thread Dan Streetman
On Mon, Jan 9, 2017 at 9:59 AM, Boris Ostrovsky wrote: > On 01/06/2017 08:06 PM, Konrad Rzeszutek Wilk wrote: >> On Thu, Jan 05, 2017 at 02:28:56PM -0500, Dan Streetman wrote: >>> Do not read a pci device's msi message data to see if a pirq was >>> previously

Re: [Xen-devel] [PATCH v2 01/25] x86/cpuid: Introduce guest_cpuid() and struct cpuid_leaf

2017-01-09 Thread Andrew Cooper
On 09/01/17 15:40, Jan Beulich wrote: On 09.01.17 at 16:09, wrote: >> On 09/01/17 15:04, Jan Beulich wrote: >> On 09.01.17 at 12:03, wrote: @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t >> feature)

Re: [Xen-devel] [PATCH] xen: do not re-use pirq number cached in pci device msi msg data

2017-01-09 Thread Konrad Rzeszutek Wilk
On Mon, Jan 09, 2017 at 10:42:41AM -0500, Dan Streetman wrote: > On Mon, Jan 9, 2017 at 9:59 AM, Boris Ostrovsky > wrote: > > On 01/06/2017 08:06 PM, Konrad Rzeszutek Wilk wrote: > >> On Thu, Jan 05, 2017 at 02:28:56PM -0500, Dan Streetman wrote: > >>> Do not read a

Re: [Xen-devel] [PATCH v4 04/12] xenstore: add per-node generation counter

2017-01-09 Thread Juergen Gross
On 09/01/17 15:38, Jan Beulich wrote: On 05.12.16 at 08:48, wrote: >> --- a/tools/xenstore/include/xenstore_lib.h >> +++ b/tools/xenstore/include/xenstore_lib.h >> @@ -44,6 +44,7 @@ struct xs_permissions >> >> /* Header of the node record in tdb. */ >> struct

Re: [Xen-devel] [PATCH v2 02/25] x86/cpuid: Introduce struct cpuid_policy

2017-01-09 Thread Andrew Cooper
On 09/01/17 15:15, Jan Beulich wrote: On 09.01.17 at 12:03, wrote: >> @@ -67,6 +80,58 @@ static void __init sanitise_featureset(uint32_t *fs) >>(fs[FEATURESET_e1d] & ~CPUID_COMMON_1D_FEATURES)); >> } >> >> +static void __init

Re: [Xen-devel] [PATCH v2 01/25] x86/cpuid: Introduce guest_cpuid() and struct cpuid_leaf

2017-01-09 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: 09 January 2017 11:03 > To: Xen-devel > Cc: Andrew Cooper ; Jan Beulich > ; Paul Durrant ; Jun > Nakajima

Re: [Xen-devel] [PATCH v2 0/7] uapi: export all headers under uapi directories

2017-01-09 Thread Arnd Bergmann
On Friday, January 6, 2017 10:43:52 AM CET Nicolas Dichtel wrote: > Here is the v2 of this series. The first 5 patches are just cleanup: some > exported headers were still under a non-uapi directory. Since this is meant as a cleanup, I commented on this to point out a cleaner way to do the same.

Re: [Xen-devel] Ubuntu 16.04.1 LTS kernel 4.4.0-57 over-allocation and xen-access fail

2017-01-09 Thread Razvan Cojocaru
On 01/09/2017 01:52 PM, Jan Beulich wrote: On 09.01.17 at 12:36, wrote: >> We've come across a weird phenomenon: an Ubuntu 16.04.1 LTS HVM guest >> running kernel 4.4.0 installed via XenCenter in XenServer Dundee seems >> to eat up all the RAM it can: >> >> (XEN) [

[Xen-devel] [PATCH] xenstore: bump TDB_VERSION

2017-01-09 Thread Jan Beulich
Commit 9e49dcf67f ("xenstore: add per-node generation counter) changed the TDB layout, which - in order to not break older xenstored running on the same system - need to be accompanied by a version bump. Signed-off-by: Jan Beulich --- a/tools/xenstore/tdb.c +++

[Xen-devel] [PATCH v6 07/14] firmware: port built-in section to linker table

2017-01-09 Thread Luis R. Rodriguez
This ports built-in firmware to use linker tables, this replaces the custom section solution with a generic solution. This also demos the use of the .rodata linker table. Tested with 0 built-in firmware, 1 and 2 built-in firmwares successfully. v6: rename table macro as suggested by Andy

[Xen-devel] [PATCH v6 09/14] jump_label: port __jump_table to linker tables

2017-01-09 Thread Luis R. Rodriguez
Move the __jump_table from the a custom section solution to a generic solution, this avoiding extra vmlinux.lds.h customizations. This also demos the use of the .data linker table and of the shared asm call push_section_tbl(). Built-in kernel functionality was tested with

[Xen-devel] [PATCH v6 12/14] kprobes: port .kprobes.text to section range

2017-01-09 Thread Luis R. Rodriguez
kprobe makes use of two custom sections, each custom section is folded into one of the standard Linux sections types as follows, it currently relies on the linker script to fold the custom section onto the respective Linux section: type Linux-section custom section name begin

[Xen-devel] [PATCH v6 13/14] kprobes: port blacklist kprobes to linker table

2017-01-09 Thread Luis R. Rodriguez
kprobe makes use of two sections, the one dealing with the actual kprobes was recently ported using the standard section range API. The blacklist functionality of kprobes is still using a custom section and declaring its custom section using the linker script as follows: type Linux-section

[Xen-devel] [PATCH v6 14/14] lib: add linker tables test driver

2017-01-09 Thread Luis R. Rodriguez
Add a test drivers for linker tables. v6: rename table macro as suggested by Andy Shevchenko v5: added this commit for the first time in this series. Signed-off-by: Luis R. Rodriguez --- lib/Kconfig.debug| 6 + lib/Makefile

[Xen-devel] [PATCH v3 0/6] tools: add linker table userspace sandbox

2017-01-09 Thread Luis R. Rodriguez
This v3 only modifies the tools sandbox to adjust for the linker tables macro renames suggested by Andy Shevchenko. It applies after the kernel changes, a public tree is available with both series applied [0] based on linux-next tag next-20170109, if you pull from there please drop the last patch

[Xen-devel] [PATCH v3 2/6] tools: add init.h for tools

2017-01-09 Thread Luis R. Rodriguez
Start off with just __ref -- we enalbe you to override, if you do that then you can define your own. The way you'd use this, if you do override, is define your own __ref and then use include_next. Signed-off-by: Luis R. Rodriguez --- tools/include/linux/init.h | 9 +

[Xen-devel] [PATCH v3 4/6] tools: expand export.h with VMLINUX_SYMBOL()

2017-01-09 Thread Luis R. Rodriguez
This will be used later by the linker-table userspace sandbox. Signed-off-by: Luis R. Rodriguez --- tools/include/linux/export.h | 22 ++ 1 file changed, 22 insertions(+) diff --git a/tools/include/linux/export.h b/tools/include/linux/export.h index

[Xen-devel] [PATCH v3 3/6] tools: add __used and enable to override

2017-01-09 Thread Luis R. Rodriguez
This adds __used, to be used later in the userspace linker-tables sandbox. If any userspace applicaiton wants to override they can add their own definition and then use include_next. This definition should probably suffice for most uses cases though. Signed-off-by: Luis R. Rodriguez

[Xen-devel] [PATCH v3 5/6] tools: add __section() to compiler.h

2017-01-09 Thread Luis R. Rodriguez
This will be used later by the userspace linker table. Signed-off-by: Luis R. Rodriguez --- tools/include/linux/compiler.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/include/linux/compiler.h b/tools/include/linux/compiler.h index 556c991de212..6321265df00a

Re: [Xen-devel] [PATCH v2 01/25] x86/cpuid: Introduce guest_cpuid() and struct cpuid_leaf

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 12:03, wrote: > @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t > feature) > return NULL; > } > > +void guest_cpuid(const struct vcpu *v, uint32_t leaf, > + uint32_t subleaf, struct cpuid_leaf *res) > +{

Re: [Xen-devel] [PATCH v2 01/25] x86/cpuid: Introduce guest_cpuid() and struct cpuid_leaf

2017-01-09 Thread Andrew Cooper
On 09/01/17 15:04, Jan Beulich wrote: On 09.01.17 at 12:03, wrote: >> @@ -215,6 +218,39 @@ const uint32_t * __init lookup_deep_deps(uint32_t >> feature) >> return NULL; >> } >> >> +void guest_cpuid(const struct vcpu *v, uint32_t leaf, >> +

Re: [Xen-devel] [PATCH v2] ns16550: Add command line parsing adjustments

2017-01-09 Thread Ian Jackson
Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing adjustments"): > See e.g. the cpufreq=, i.e. we're talking of > > com1=:,:,... I think we will have to use `=', so com1==,=,... Since we already have BDFs which I think contain `:', and that would be more confusing than

Re: [Xen-devel] [PATCH v2 07/25] x86/cpuid: Dispatch cpuid_hypervisor_leaves() from guest_cpuid()

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 17:28, wrote: > On 09/01/17 16:21, Jan Beulich wrote: > On 09.01.17 at 12:03, wrote: >>> --- a/xen/arch/x86/cpuid.c >>> +++ b/xen/arch/x86/cpuid.c >>> @@ -346,7 +346,10 @@ void guest_cpuid(const struct vcpu *v, uint32_t

Re: [Xen-devel] [PATCH v6 00/14] linux: generalize sections, ranges and linker tables

2017-01-09 Thread Luis R. Rodriguez
of month. > v4.10-rc3 can't be compiled either. You mean an avr32 board ? >> The debug patch which force enables the test driver is not submitted >> for >> upstream inclusion but is kept as part of the public tree for those >> curious, >> its the last patch [1].

Re: [Xen-devel] [PATCH v2] get_maintainer.pl: Teach brace expansion

2017-01-09 Thread Ian Jackson
Anthony PERARD writes ("[PATCH v2] get_maintainer.pl: Teach brace expansion"): > It is done by using two different regex, the first one will take care of > converting ',' inside '{}' to a '|', one by one, as long as there is at > least two commas. The second regex will do the final convertion of

Re: [Xen-devel] [PATCH] convert tabs into spaces; preserving indentation

2017-01-09 Thread Ian Jackson
Eric DeVolder writes ("[PATCH] convert tabs into spaces; preserving indentation"): > Convert tabs into spaces; preserving indentation > > No functional changes > > Signed-off-by: Eric DeVolder Acked-by: Ian Jackson Although did you mean

Re: [Xen-devel] [PATCH v2 14/25] x86/svm: Improvements using named features

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 12:03, wrote: > This avoids calling into hvm_cpuid() to obtain information which is directly > available. In particular, this avoids the need to overload flag_dr_dirty > because of hvm_cpuid() being unavailable in svm_save_dr(). > > flag_dr_dirty is

Re: [Xen-devel] [PATCH qemu-xen-traditional 1/2] xen_platform: unplug also SCSI disks [and 1 more messages]

2017-01-09 Thread Olaf Hering
On Mon, Jan 09, Ian Jackson wrote: > Olaf Hering writes ("[PATCH qemu-xen-traditional 2/2] xen_platform: SUSE > xenlinux unplug for emulated PCI"): > > From: Olaf Hering > > > > Implement SUSE specific unplug protocol for emulated PCI devices > > in PVonHVM guests. Its a

Re: [Xen-devel] [PATCH v2 08/25] x86/cpuid: Introduce named feature bitfields

2017-01-09 Thread Andrew Cooper
On 09/01/17 16:31, Jan Beulich wrote: On 09.01.17 at 12:03, wrote: >> --- a/xen/include/asm-x86/cpuid.h >> +++ b/xen/include/asm-x86/cpuid.h >> @@ -92,6 +92,10 @@ struct cpuid_policy >> * Everything else should be considered inaccurate, and not necesserily

Re: [Xen-devel] [PATCH v2 20/25] x86/cpuid: Perform max_leaf calculations in guest_cpuid()

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 12:03, wrote: > Clamp the toolstack-providied max_leaf values in recalculate_cpuid_policy(), > causing the per-domain policy to have guest-accurate data. > > Have guest_cpuid() exit early if a requested leaf is out of range, rather than > falling

[Xen-devel] [PATCH v4 05/12] xenstore: add support for reading directory with many children

2017-01-09 Thread Ian Jackson
Juergen Gross writes ("[PATCH v4 05/12] xenstore: add support for reading directory with many children"): > Output is the generation count of the node (which will change each time > the node is being modified) and a list of child names starting with > the specified index. The end of the list is

Re: [Xen-devel] [PATCH v2 21/25] x86/cpuid: Move all leaf 7 handling into guest_cpuid()

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 12:03, wrote: > @@ -396,12 +403,47 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf, > case 0x8000 ... 0x8000 + CPUID_GUEST_NR_EXTD - 1: > if ( leaf > p->extd.max_leaf ) > return; > -break; > +

Re: [Xen-devel] [PATCH v2] ns16550: Add command line parsing adjustments

2017-01-09 Thread Jan Beulich
>>> On 09.01.17 at 17:34, wrote: > Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing > adjustments"): >> See e.g. the cpufreq=, i.e. we're talking of >> >> com1=:,:,... > > I think we will have to use `=', so > com1==,=,... > > Since we already

Re: [Xen-devel] [PATCH v2] ns16550: Add command line parsing adjustments

2017-01-09 Thread Ian Jackson
Jan Beulich writes ("Re: [PATCH v2] ns16550: Add command line parsing adjustments"): > Right, I had been thinking of this too, but then wasn't sure to > suggest such a mixture. Perhaps the first two options could > even remain completely nameless then (I think those are the > ones which had been

Re: [Xen-devel] [RFC] netif: staging grants for requests

2017-01-09 Thread Paul Durrant
> -Original Message- > From: Joao Martins [mailto:joao.m.mart...@oracle.com] > Sent: 06 January 2017 20:09 > To: Paul Durrant > Cc: xen-de...@lists.xenproject.org; Andrew Cooper > ; Wei Liu ; Stefano > Stabellini

[Xen-devel] [PATCH v2 13/25] x86/hvm: Improve CPUID and MSR handling using named features

2017-01-09 Thread Andrew Cooper
This avoids hvm_cpuid() recursing into itself, and the MSR paths using hvm_cpuid() to obtain information which is directly available. Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich --- xen/arch/x86/hvm/hvm.c | 95

[Xen-devel] [PATCH v2 12/25] x86/pv: Improve pv_cpuid() using named features

2017-01-09 Thread Andrew Cooper
This avoids refering back to domain_cpuid() or native CPUID to obtain information which is directly available. Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich --- xen/arch/x86/traps.c | 22 +- 1 file changed, 5

[Xen-devel] [PATCH v2 19/25] x86/cpuid: Calculate appropriate max_leaf values for the global policies

2017-01-09 Thread Andrew Cooper
Derive host_policy from raw_policy, and {pv,hvm}_max_policy from host_policy. Clamp the raw values to the maximum we will offer to guests. This simplifies the PV and HVM policy calculations, removing the need for an intermediate linear host_featureset bitmap. Signed-off-by: Andrew Cooper

[Xen-devel] [PATCH v2 24/25] x86/cpuid: Effectively remove pv_cpuid() and hvm_cpuid()

2017-01-09 Thread Andrew Cooper
All callers of pv_cpuid() and hvm_cpuid() (other than guest_cpuid() legacy path) have been removed from the codebase. Move them into cpuid.c to avoid any further use, leaving guest_cpuid() as the sole API to use. This is purely code motion, with no functional change. Signed-off-by: Andrew

[Xen-devel] [PATCH v2 11/25] x86/vvmx: Use hvm_cr4_guest_valid_bits() to calculate MSR_IA32_VMX_CR4_FIXED1

2017-01-09 Thread Andrew Cooper
Reuse the logic in hvm_cr4_guest_valid_bits() instead of duplicating it. This fixes a bug to do with the handling of X86_CR4_PCE. The RDPMC instruction predate the architectural performance feature, and has been around since the P6. X86_CR4_PCE is like X86_CR4_TSD and only controls whether

[Xen-devel] [PATCH v2 18/25] x86/cpuid: Drop the temporary linear feature bitmap from struct cpuid_policy

2017-01-09 Thread Andrew Cooper
With most uses of the *_featureset API removed, the remaining uses are only during XEN_SYSCTL_get_cpu_featureset, init_guest_cpuid(), and recalculate_cpuid_policy(), none of which are hot paths. Drop the temporary infrastructure, and have the current users recreate the linear bitmap using

[Xen-devel] [PATCH v2 16/25] x86/pv: Use per-domain policy information in pv_cpuid()

2017-01-09 Thread Andrew Cooper
... rather than performing runtime adjustments. This is safe now that recalculate_cpuid_policy() perfoms suitable sanitisation when the policy data is loaded. Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich --- xen/arch/x86/traps.c | 44

[Xen-devel] [PATCH v2 15/25] x86/pv: Use per-domain policy information when calculating the cpumasks

2017-01-09 Thread Andrew Cooper
... rather than dynamically clamping against the PV maximum policy. Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich --- v2: * Spelling fix in the commit message --- xen/arch/x86/domctl.c | 12 ++-- 1 file changed, 6 insertions(+), 6

[Xen-devel] [PATCH v2 14/25] x86/svm: Improvements using named features

2017-01-09 Thread Andrew Cooper
This avoids calling into hvm_cpuid() to obtain information which is directly available. In particular, this avoids the need to overload flag_dr_dirty because of hvm_cpuid() being unavailable in svm_save_dr(). flag_dr_dirty is returned to a boolean (as it was before c/s c097f549 which introduced

[Xen-devel] [PATCH v2 21/25] x86/cpuid: Move all leaf 7 handling into guest_cpuid()

2017-01-09 Thread Andrew Cooper
All per-domain policy data concerning leaf 7 is accurate. Handle it all in guest_cpuid() by reading out of the raw array block, and introduing a dynamic adjustment for OSPKE. Signed-off-by: Andrew Cooper --- CC: Jan Beulich v2: * Extend the

[Xen-devel] [PATCH v2 10/25] x86/hvm: Improve CR4 verification using named features

2017-01-09 Thread Andrew Cooper
Alter the function to return the valid CR4 bits, rather than the invalid CR4 bits. This will allow reuse in other areas of code. Pick the appropriate cpuid_policy object rather than using hvm_cpuid() or boot_cpu_data. This breaks the dependency on current. Signed-off-by: Andrew Cooper

[Xen-devel] [PATCH v2 22/25] x86/hvm: Use guest_cpuid() rather than hvm_cpuid()

2017-01-09 Thread Andrew Cooper
More work is required before maxphysaddr can be read straight out of the cpuid_policy block, but in the meantime hvm_cpuid() wants to disappear so update the code to use the newer interface. Use the behaviour of max_leaf handling (returning all zeros) to avoid a double call into guest_cpuid().

[Xen-devel] [PATCH v2 20/25] x86/cpuid: Perform max_leaf calculations in guest_cpuid()

2017-01-09 Thread Andrew Cooper
Clamp the toolstack-providied max_leaf values in recalculate_cpuid_policy(), causing the per-domain policy to have guest-accurate data. Have guest_cpuid() exit early if a requested leaf is out of range, rather than falling into the legacy path. Signed-off-by: Andrew Cooper

[Xen-devel] [xen-unstable test] 104078: tolerable FAIL

2017-01-09 Thread osstest service owner
flight 104078 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/104078/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-freebsd10-amd64 15 guest-saverestore.2 fail pass in 104075 Regressions which are regarded

[Xen-devel] [PATCH v2 04/25] x86/cpuid: Allocate a CPUID policy for every domain

2017-01-09 Thread Andrew Cooper
Introduce init_domain_cpuid_policy() to allocate an appropriate cpuid policy for the domain (currently the domains maximum applicable policy), and call it during domain construction. init_guest_cpuid() now needs calling before dom0 is constructed. Signed-off-by: Andrew Cooper

[Xen-devel] [PATCH v2 00/25] xen/x86: Per-domain CPUID policies

2017-01-09 Thread Andrew Cooper
Presented herewith is v2 of the first part of improvement work to support full per-domain CPUID policies. More work is pending on top of this series. This series is available in git form from: http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/xen-cpuid-v2

Re: [Xen-devel] [PATCH v4 21/24] tools: L2 CAT: support get HW info for L2 CAT.

2017-01-09 Thread Wei Liu
On Mon, Jan 09, 2017 at 01:31:35AM -0700, Jan Beulich wrote: > >>> On 09.01.17 at 02:19, wrote: > > On 17-01-06 12:04:36, Wei Liu wrote: > >> On Wed, Dec 14, 2016 at 12:08:01PM +0800, Yi Sun wrote: > >> > This patch implements xl/xc changes to support get HW info > >> >

Re: [Xen-devel] [Xen-users] Xen 4.7.1 - Issue with NIC's saying network cable unplugged on reboot of domU

2017-01-09 Thread George Dunlap
On Sun, Jan 8, 2017 at 4:20 AM, Marc Tousignant wrote: > I first tried upgrading to 4.8 but then none of my VM’s would launch. I’m > guessing there was a change to the config files that I did not look in to. > > I then tried going to 4.6.2 before, but the issue happens there as

  1   2   >