Re: [Xen-devel] [PATCH] dm_op: Add xendevicemodel_modified_memory_bulk.

2017-03-20 Thread Jan Beulich
>>> On 16.03.17 at 15:44, wrote: > --- a/xen/arch/x86/hvm/dm.c > +++ b/xen/arch/x86/hvm/dm.c > @@ -119,56 +119,96 @@ static int set_isa_irq_level(struct domain *d, uint8_t > isa_irq, > } > > static int modified_memory(struct domain *d, > -

[Xen-devel] [ovmf test] 106782: all pass - PUSHED

2017-03-20 Thread osstest service owner
flight 106782 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/106782/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3df29b5d16d39b335b7daca625b3781e1da9920c baseline version: ovmf

[Xen-devel] [PATCH V2] common/mem_access: merged mem_access setting interfaces

2017-03-20 Thread Razvan Cojocaru
xc_altp2m_set_mem_access() and xc_set_mem_access() end up doing the same thing in the hypervisor, but the former is a HVMOP and the latter a DOMCTL. Since nobody is currently using, or has stated intent to use, this functionality specifically as an HVMOP, this patch removes the HVMOP while adding

Re: [Xen-devel] [PATCH v10 5/6] passthrough/io: don't migrate pirq when it is delivered through VT-d PI

2017-03-20 Thread Chao Gao
On Mon, Mar 20, 2017 at 03:18:18AM -0600, Jan Beulich wrote: On 20.03.17 at 02:59, wrote: >> On Fri, Mar 17, 2017 at 04:43:08AM -0600, Jan Beulich wrote: >> On 15.03.17 at 06:11, wrote: +if ( iommu_intpost ) +{ +

Re: [Xen-devel] [PATCH v10 5/6] passthrough/io: don't migrate pirq when it is delivered through VT-d PI

2017-03-20 Thread Jan Beulich
>>> On 20.03.17 at 02:59, wrote: > On Fri, Mar 17, 2017 at 04:43:08AM -0600, Jan Beulich wrote: > On 15.03.17 at 06:11, wrote: >>> +if ( iommu_intpost ) >>> +{ >>> +vcpu = pi_find_dest_vcpu(d, dest, dest_mode, delivery_mode,

Re: [Xen-devel] [PATCH v2 9/9] x86/pagewalk: non-functional cleanup

2017-03-20 Thread Jan Beulich
>>> On 16.03.17 at 17:31, wrote: > * Drop trailing whitespace > * Consistently apply Xen style > * Introduce a local variable block > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich

Re: [Xen-devel] [PATCH v2 8/9] x86/pagewalk: Improve the logic behind setting access and dirty bits

2017-03-20 Thread Jan Beulich
>>> On 16.03.17 at 17:31, wrote: > @@ -413,24 +417,33 @@ guest_walk_tables(struct vcpu *v, struct p2m_domain > *p2m, > * success. Although the PRMs say higher-level _PAGE_ACCESSED bits > * get set whenever a lower-level PT is used, at least some hardware >

Re: [Xen-devel] [PATCH v10 5/6] passthrough/io: don't migrate pirq when it is delivered through VT-d PI

2017-03-20 Thread Chao Gao
On Fri, Mar 17, 2017 at 04:43:08AM -0600, Jan Beulich wrote: On 15.03.17 at 06:11, wrote: >> @@ -441,6 +442,15 @@ int pt_irq_create_bind( >> >> dest_vcpu_id = hvm_girq_dest_2_vcpu_id(d, dest, dest_mode); >> pirq_dpci->gmsi.dest_vcpu_id = dest_vcpu_id;

[Xen-devel] [PATCH v4] displif: add ABI for para-virtual display

2017-03-20 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko This is the ABI for the two halves of a para-virtualized display driver. This protocol aims to provide a unified protocol which fits more sophisticated use-cases than a framebuffer device can handle. At the moment basic

[Xen-devel] [PATCH v4] displif: add ABI for para-virtual display

2017-03-20 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko This is the ABI for the two halves of a para-virtualized display driver. This protocol aims to provide a unified protocol which fits more sophisticated use-cases than a framebuffer device can handle. At the moment basic

Re: [Xen-devel] [PATCH v2 7/9] x86/shadow: Use the pagewalk reserved bits helpers

2017-03-20 Thread Jan Beulich
>>> On 16.03.17 at 17:31, wrote: > The shadow logic should not create a valid/present shadow of a guest PTE which > contains reserved bits from the guests point of view. It is not guaranteed > that the hardware pagewalk will come to the same conclusion, and raise a >

Re: [Xen-devel] [PATCH v2 5/9] x86/pagewalk: Helpers for reserved bit handling

2017-03-20 Thread Jan Beulich
>>> On 16.03.17 at 17:31, wrote: > Some bits are unconditionally reserved in pagetable entries, or reserved > because of alignment restrictions. Other bits are reserved because of control > register configuration. > > Introduce helpers which take an individual vcpu

Re: [Xen-devel] [PATCH v2 4/9] x86/pagewalk: Clean up guest_supports_* predicates

2017-03-20 Thread Jan Beulich
>>> On 16.03.17 at 17:31, wrote: > Switch them to returning bool, and taking const parameters. > > Rename guest_supports_superpages() to guest_supports_l2_superpages() to > indicate which level of pagetables it is actually referring to, and rename >

Re: [Xen-devel] [Qemu-devel] [PATCH] xen: use libxendevice model to restrict operations

2017-03-20 Thread Paul Durrant
> -Original Message- > From: Philippe Mathieu-Daudé [mailto:philippe.mathieu.da...@gmail.com] > On Behalf Of Philippe Mathieu-Daudé > Sent: 17 March 2017 21:21 > To: Paul Durrant ; qemu-de...@nongnu.org; xen- > de...@lists.xenproject.org > Cc: Anthony Perard

[Xen-devel] Ping#2: [PATCH] AMD-Vi: allocate root table on demand

2017-03-20 Thread Jan Beulich
Suravee? Or alternatively, Sherry, is Suravee unavailable for an extended period of time? Jan >>> On 10.03.17 at 17:19, wrote: On 03.03.17 at 15:29, wrote: >> This was my originally intended fix for the AMD side of XSA-207: >> There's no need to

Re: [Xen-devel] [PATCH v3] x86/time: Don't use virtual TSC if host and guest frequencies are equal

2017-03-20 Thread Jan Beulich
>>> On 17.03.17 at 19:15, wrote: > Commit 82713ec8d2 ("x86: use native RDTSC(P) execution when guest and > host frequencies are the same") left out optimization for PV guests > when host and guest run at the same frequency. > > For such a case we should be able not to

Re: [Xen-devel] [PATCH v2 1/2] xen: sched: don't call hooks of the wrong scheduler via VCPU2OP

2017-03-20 Thread Jan Beulich
>>> On 17.03.17 at 19:29, wrote: > On 17/03/17 19:19, Dario Faggioli wrote: >> Within context_saved(), we call the context_saved hook, >> and we use VCPU2OP() to determine from what scheduler. >> VCPU2OP uses DOM2OP, which uses d->cpupool, which is >> NULL when d is the idle

[Xen-devel] [PATCH 1/2] xenstore: set correct error code when violating quota

2017-03-20 Thread Juergen Gross
When the number of permitted xenstore entries for a domain is being exceeded the operation trying to create a new entry is denied. Unfortunately errno isn't being set in this case so the error code returned to the client is undefined. Set errno to ENOSPC in this case. Signed-off-by: Juergen

[Xen-devel] [PATCH 0/2] xensore: fixing two bugs

2017-03-20 Thread Juergen Gross
Two small patches to fix bugs: one error path correction (setting correct error code for caller) and add some missing checks for allocation failures. Juergen Gross (2): xenstore: set correct error code when violating quota xenstore: add missing checks for allocation failure

[Xen-devel] [PATCH 2/2] xenstore: add missing checks for allocation failure

2017-03-20 Thread Juergen Gross
Add a missing allocation failure checks. Signed-off-by: Juergen Gross --- tools/xenstore/xenstored_core.c | 12 1 file changed, 12 insertions(+) diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c index ed80345..fe11ff2 100644 ---

Re: [Xen-devel] question: xen/qemu - mmio mapping issues for device pass-through

2017-03-20 Thread Jan Beulich
>>> On 20.03.17 at 02:58, wrote: > On March 16, 2017 11:32 PM, Jan Beulich wrote: > On 16.03.17 at 15:21, wrote: >>> On March 16, 2017 10:06 PM, Jan Beulich wrote: >>> On 16.03.17 at 14:55, wrote: > I try to pass-through a

[Xen-devel] [libvirt test] 106780: tolerable trouble: blocked/broken/fail/pass - PUSHED

2017-03-20 Thread osstest service owner
flight 106780 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/106780/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-libvirt-xsm 3 host-install(3) broken in 106769 pass in 106780

[Xen-devel] [PATCH v18] xen/sndif: Add sound-device ABI

2017-03-20 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Add ABI for the two halves of a para-virtualized sound driver to communicate with each other. The ABI allows implementing audio playback and capture as well as volume control and possibility to mute/unmute audio sources. Note:

[Xen-devel] [PATCH v18] xen/sndif: Add sound-device ABI

2017-03-20 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Hi, all! Please find the next version of the ABI for the PV sound after addressing review comments. Thank you, Oleksandr Andrushchenko Oleksandr Grytsov Oleksandr Andrushchenko (1): xen/sndif: Add sound-device ABI

Re: [Xen-devel] [PATCH 08/18] xen/arm: Introduce a initcall to update cpu_hwcaps by serror_op

2017-03-20 Thread Wei Chen
Hi Stefano, On 2017/3/18 1:21, Stefano Stabellini wrote: > On Fri, 17 Mar 2017, Wei Chen wrote: >> Hi Stefano, >> On 2017/3/17 7:30, Stefano Stabellini wrote: >>> On Mon, 13 Mar 2017, Wei Chen wrote: In the later patches of this series, we want to use the alternative patching framework

Re: [Xen-devel] [PATCH 1/2] xen/arm32: Introduce alternative runtime patching

2017-03-20 Thread Wei Chen
Hi Konrad, On 2017/3/17 22:34, Konrad Rzeszutek Wilk wrote: > On Thu, Mar 16, 2017 at 05:53:38PM +0800, Wei Chen wrote: >> This patch is based on the implementation of ARM64, it introduces >> alternative runtime patching to ARM32. This allows to patch assembly >> instruction at runtime to either

[Xen-devel] [linux-linus test] 106777: regressions - trouble: blocked/broken/fail/pass

2017-03-20 Thread osstest service owner
flight 106777 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/106777/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-cubietruck 11 guest-start fail REGR. vs. 59254

<    1   2   3