[Xen-devel] [PATCH v7 07/11] KVM: Introduce kvm_write_guest_offset_cached

2016-11-01 Thread Pan Xinhui
It allows us to update some status or field of one struct partially. We can also save one kvm_read_guest_cached if we just update one filed of the struct regardless of its current value. Signed-off-by: Pan Xinhui Acked-by: Paolo Bonzini --- include/linux/kvm_host.h | 2 ++ virt/kvm/kvm_main.c

[Xen-devel] [PATCH v7 11/11] Documentation: virtual: kvm: Support vcpu preempted check

2016-11-01 Thread Pan Xinhui
Commit ("x86, kvm: support vcpu preempted check") add one field "__u8 preempted" into struct kvm_steal_time. This field tells if one vcpu is running or not. It is zero if 1) some old KVM deos not support this filed. 2) the vcpu is not preempted. Other values means the vcpu has been preempted. Sig

[Xen-devel] [PATCH v7 06/11] x86, paravirt: Add interface to support kvm/xen vcpu preempted check

2016-11-01 Thread Pan Xinhui
This is to fix some lock holder preemption issues. Some other locks implementation do a spin loop before acquiring the lock itself. Currently kernel has an interface of bool vcpu_is_preempted(int cpu). It takes the cpu as parameter and return true if the cpu is preempted. Then kernel can break the

[Xen-devel] [PATCH v7 08/11] x86, kvm/x86.c: support vcpu preempted check

2016-11-01 Thread Pan Xinhui
Support the vcpu_is_preempted() functionality under KVM. This will enhance lock performance on overcommitted hosts (more runnable vcpus than physical cpus in the system) as doing busy waits for preempted vcpus will hurt system performance far worse than early yielding. Use one field of struct kvm_

[Xen-devel] [PATCH v7 10/11] x86, xen: support vcpu preempted check

2016-11-01 Thread Pan Xinhui
From: Juergen Gross Support the vcpu_is_preempted() functionality under Xen. This will enhance lock performance on overcommitted hosts (more runnable vcpus than physical cpus in the system) as doing busy waits for preempted vcpus will hurt system performance far worse than early yielding. A quic

[Xen-devel] [PATCH v7 09/11] x86, kernel/kvm.c: support vcpu preempted check

2016-11-01 Thread Pan Xinhui
Support the vcpu_is_preempted() functionality under KVM. This will enhance lock performance on overcommitted hosts (more runnable vcpus than physical cpus in the system) as doing busy waits for preempted vcpus will hurt system performance far worse than early yielding. struct kvm_steal_time::preem

[Xen-devel] [PATCH v7 02/11] locking/osq: Drop the overload of osq_lock()

2016-11-01 Thread Pan Xinhui
An over-committed guest with more vCPUs than pCPUs has a heavy overload in osq_lock(). This is because vCPU A hold the osq lock and yield out, vCPU B wait per_cpu node->locked to be set. IOW, vCPU B wait vCPU A to run and unlock the osq lock. Kernel has an interface bool vcpu_is_preempted(int cpu

[Xen-devel] [PATCH v7 00/11] implement vcpu preempted check

2016-11-01 Thread Pan Xinhui
change from v6: fix typos and remove uncessary comments. change from v5: spilt x86/kvm patch into guest/host part. introduce kvm_write_guest_offset_cached. fix some typos. rebase patch onto 4.9.2 change from v4: spilt x86 kvm vcpu preempted check into

[Xen-devel] [PATCH v7 04/11] powerpc/spinlock: support vcpu preempted check

2016-11-01 Thread Pan Xinhui
This is to fix some lock holder preemption issues. Some other locks implementation do a spin loop before acquiring the lock itself. Currently kernel has an interface of bool vcpu_is_preempted(int cpu). It takes the cpu as parameter and return true if the cpu is preempted. Then kernel can break the

[Xen-devel] [PATCH v7 01/11] kernel/sched: introduce vcpu preempted check interface

2016-11-01 Thread Pan Xinhui
This patch support to fix lock holder preemption issue. For kernel users, we could use bool vcpu_is_preempted(int cpu) to detect if one vcpu is preempted or not. The default implementation is a macro defined by false. So compiler can wrap it out if arch dose not support such vcpu preempted check.

[Xen-devel] [PATCH v7 05/11] s390/spinlock: Provide vcpu_is_preempted

2016-11-01 Thread Pan Xinhui
From: Christian Borntraeger this implements the s390 backend for commit "kernel/sched: introduce vcpu preempted check interface" by reworking the existing smp_vcpu_scheduled into arch_vcpu_is_preempted. We can then also get rid of the local cpu_is_preempted function by moving the CIF_ENABLED_WAIT

[Xen-devel] [PATCH v7 03/11] kernel/locking: Drop the overload of {mutex, rwsem}_spin_on_owner

2016-11-01 Thread Pan Xinhui
An over-committed guest with more vCPUs than pCPUs has a heavy overload in the two spin_on_owner. This blames on the lock holder preemption issue. Kernel has an interface bool vcpu_is_preempted(int cpu) to see if a vCPU is currently running or not. So break the spin loops on true condition. test-

[Xen-devel] [ovmf baseline-only test] 67977: all pass

2016-11-01 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67977 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67977/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 63998d7cd4f573c41fe0e018257f6d7012218cc2 baseline v

[Xen-devel] [PATCH 1/1] xen-netfront: cast grant table reference first to type int

2016-11-01 Thread Dongli Zhang
IS_ERR_VALUE() in commit 87557efc27f6a50140fb20df06a917f368ce3c66 ("xen-netfront: do not cast grant table reference to signed short") would not return true for error code unless we cast ref first to type int. Signed-off-by: Dongli Zhang --- drivers/net/xen-netfront.c | 4 ++-- 1 file changed, 2

Re: [Xen-devel] qeustion: a panic in __do_update_va_mapping()

2016-11-01 Thread Xuquan (Quan Xu)
On November 01, 2016 9:21 PM, Andrew Cooper wrote: >On 01/11/16 12:07, Xuquan (Quan Xu) wrote: >> On November 01, 2016 8:00 PM, Andrew Cooper wrote: >>> On 01/11/16 11:57, Xuquan (Quan Xu) wrote: On November 01, 2016 7:41 PM, Andrew Cooper >>> wrote: > On 01/11/16 11:23, Xuquan (Quan Xu

[Xen-devel] [qemu-mainline baseline-only test] 67975: tolerable FAIL

2016-11-01 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67975 qemu-mainline real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67975/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta

Re: [Xen-devel] xc_hvm_inject_trap() races

2016-11-01 Thread Andrew Cooper
On 01/11/2016 22:17, Andrei Vlad LUTAS wrote: >>> First of all, to answer your original question: the injection decision >>> is made when the introspection logic needs to inspect a page that is >>> not present in the physical memory. We don't really care if the current >>> instruction triggers mult

Re: [Xen-devel] [PATCH v2] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Stefano Stabellini
On Tue, 1 Nov 2016, Eduardo Habkost wrote: > On Tue, Nov 01, 2016 at 05:44:16PM +, Wei Liu wrote: > > Introduce this field to control whether ACPI build is enabled by a > > particular machine or accelerator. > > > > It defaults to true if the machine itself supports ACPI build. Xen > > acceler

Re: [Xen-devel] xc_hvm_inject_trap() races

2016-11-01 Thread Andrei Vlad LUTAS
-Original Message- From: Jan Beulich [mailto:jbeul...@suse.com] Sent: 1 November, 2016 18:40 To: rcojoc...@bitdefender.com; Andrei Vlad LUTAS Cc: andrew.coop...@citrix.com; xen-de...@lists.xenproject.org; ta...@tklengyel.com Subject: Re: RE: [Xen-devel] xc_hvm_inject_trap() races >>> And

Re: [Xen-devel] [PATCH v2] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Eduardo Habkost
On Tue, Nov 01, 2016 at 05:44:16PM +, Wei Liu wrote: > Introduce this field to control whether ACPI build is enabled by a > particular machine or accelerator. > > It defaults to true if the machine itself supports ACPI build. Xen > accelerator will disable it because Xen is in charge of buildi

[Xen-devel] [qemu-mainline test] 101842: regressions - FAIL

2016-11-01 Thread osstest service owner
flight 101842 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/101842/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-xsm 15 guest-start/debian.repeat fail REGR. vs. 101835 Regressions which

[Xen-devel] [ovmf test] 101843: all pass - PUSHED

2016-11-01 Thread osstest service owner
flight 101843 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/101843/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 63998d7cd4f573c41fe0e018257f6d7012218cc2 baseline version: ovmf 90d6dfb9871bcf7e73b88

[Xen-devel] [xen-unstable test] 101841: regressions - FAIL

2016-11-01 Thread osstest service owner
flight 101841 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/101841/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-xsm 9 debian-install fail REGR. vs. 101673 Regressions which

[Xen-devel] [linux-3.4 test] 101840: regressions - FAIL

2016-11-01 Thread osstest service owner
flight 101840 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/101840/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 92983 test-amd64-i386-qemut

[Xen-devel] [distros-debian-snapshot test] 67973: tolerable FAIL

2016-11-01 Thread Platform Team regression test user
flight 67973 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67973/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-armhf-daily-netboot-pygrub 9 debian-di-install fail like 67930 test-amd64-i3

Re: [Xen-devel] [PATCH v2] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Stefano Stabellini
On Tue, 1 Nov 2016, Wei Liu wrote: > Introduce this field to control whether ACPI build is enabled by a > particular machine or accelerator. > > It defaults to true if the machine itself supports ACPI build. Xen > accelerator will disable it because Xen is in charge of building ACPI > tables for t

Re: [Xen-devel] [PATCH 0/2] Fix Xen boot on XGene

2016-11-01 Thread Stefano Stabellini
On Mon, 31 Oct 2016, Julien Grall wrote: > Hi Stefano, > > On 26/10/16 23:12, Stefano Stabellini wrote: > > On Wed, 26 Oct 2016, Julien Grall wrote: > > > Hi, > > > Apologize for not respecting the netiquette. > > > > > > On Tue, 25 Oct 2016, 5:49 p.m. Stefano Stabellini, > > > wrote: > > >

[Xen-devel] [PATCH v2] build: make debug option affect tools only

2016-11-01 Thread Wei Liu
The debug option in Config.mk affects hypervisor, tools and stubdom by appending different flags to CFLAGS. Mini-os under extra is not affected because it already has its own build system when it is separated from xen.git. It is undesirable because now hypervisor build is affected by both Kconfig

Re: [Xen-devel] [PATCH v2] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Sander Eikelenboom
On 2016-11-01 18:44, Wei Liu wrote: Introduce this field to control whether ACPI build is enabled by a particular machine or accelerator. It defaults to true if the machine itself supports ACPI build. Xen accelerator will disable it because Xen is in charge of building ACPI tables for the guest.

Re: [Xen-devel] [RFC PATCH 03/24] ARM: GICv3 ITS: allocate device and collection table

2016-11-01 Thread Julien Grall
Hi Andre, On 28/09/2016 19:24, Andre Przywara wrote: Each ITS maps a pair of a DeviceID (usually the PCI b/d/f triplet) and an EventID (the MSI payload or interrupt ID) to a pair of LPI number and collection ID, which points to the target CPU. This mapping is stored in the device and collection

Re: [Xen-devel] [PATCH V4] xen/arm: domain_build: allocate lowmem for dom0 as much as possible

2016-11-01 Thread Stefano Stabellini
On Tue, 1 Nov 2016, Julien Grall wrote: > Hi Peng, > > Sorry for the late answer. > > On 23/09/2016 03:55, Peng Fan wrote: > > On AArch64 SoCs, some IPs may only have the capability to access > > 32 bits address space. The physical memory assigned for Dom0 maybe > > not in 4GB address space, then

Re: [Xen-devel] [PATCH] Don't clear HCR_VM bit when updating VTTBR.

2016-11-01 Thread Stefano Stabellini
On Tue, 1 Nov 2016, Julien Grall wrote: > Hi Stefano, > > On 31/10/2016 22:18, Stefano Stabellini wrote: > > On Mon, 31 Oct 2016, Steve Capper wrote: > > > On Wed, Oct 19, 2016 at 12:59:45PM -0700, Stefano Stabellini wrote: > > > > On Mon, 10 Oct 2016, Jun Sun wrote: > > > > > Currently function p

Re: [Xen-devel] [OSSTEST PATCH] ts-xen-build: set CONFIG_DEBUG for KConfig

2016-11-01 Thread Ian Jackson
Wei Liu writes ("[OSSTEST PATCH] ts-xen-build: set CONFIG_DEBUG for KConfig"): > Starting from Xen 4.8 the hypervisor debug build is controlled by > Kconfig. Set it correctly in xen/.config. > > Signed-off-by: Wei Liu Acked-by: Ian Jackson Thanks. Pushed to osstest pretest. Ian. ___

[Xen-devel] [OSSTEST PATCH] ts-xen-build: set CONFIG_DEBUG for KConfig

2016-11-01 Thread Wei Liu
Starting from Xen 4.8 the hypervisor debug build is controlled by Kconfig. Set it correctly in xen/.config. Signed-off-by: Wei Liu --- ts-xen-build | 1 + 1 file changed, 1 insertion(+) diff --git a/ts-xen-build b/ts-xen-build index 07a69ec..3e53d74 100755 --- a/ts-xen-build +++ b/ts-xen-build

[Xen-devel] [PATCH for-4.8 v2] tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc on x86_32

2016-11-01 Thread Ian Jackson
The current build fails with GCC6 on Debian sid i386 (unstable): /tmp/ccqjaueF.s: Assembler messages: /tmp/ccqjaueF.s:3713: Error: missing or invalid displacement expression `vmovd_to_reg_len@GOT' This is due to the combination of GCC6, and Debian's decision to enable some hardening flags by d

Re: [Xen-devel] [DOC v7] PV Calls protocol design

2016-11-01 Thread Stefano Stabellini
ping? On Thu, 13 Oct 2016, Stefano Stabellini wrote: > Hi all, > > This is the design document of the PV Calls protocol. You can find > prototypes of the Linux frontend and backend drivers here: > > git://git.kernel.org/pub/scm/linux/kernel/git/sstabellini/xen.git pvcalls-7 > > To use them, mak

Re: [Xen-devel] [PATCH for-4.8] tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc

2016-11-01 Thread Ian Jackson
Ian Jackson writes ("Re: [PATCH for-4.8] tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc"): > Ian Jackson writes ("[PATCH] tools/tests/x86_emulator: Pass -no-pie -fno-pic > to gcc"): > > The current build fails with GCC6 on Debian sid (unstable): > > Something seems wrong with this patch.

Re: [Xen-devel] [PATCH for-4.8] tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc

2016-11-01 Thread Ian Jackson
Ian Jackson writes ("[PATCH] tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc"): > The current build fails with GCC6 on Debian sid (unstable): > Something seems wrong with this patch. I will get back to you. Ian. ___ Xen-devel mailing list Xen

[Xen-devel] [PATCH v2] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Wei Liu
Introduce this field to control whether ACPI build is enabled by a particular machine or accelerator. It defaults to true if the machine itself supports ACPI build. Xen accelerator will disable it because Xen is in charge of building ACPI tables for the guest. Signed-off-by: Wei Liu --- Cc: Igor

Re: [Xen-devel] [RFC PATCH 03/24] ARM: GICv3 ITS: allocate device and collection table

2016-11-01 Thread Julien Grall
Hi Stefano, On 26/10/2016 23:57, Stefano Stabellini wrote: +int pagesz; +int order; +void *buffer = NULL; + +attr = GIC_BASER_InnerShareable << GITS_BASER_SHAREABILITY_SHIFT; +attr |= GIC_BASER_CACHE_SameAsInner << GITS_BASER_OUTER_CACHEABILITY_SHIFT; +attr |= GIC_BASER_

Re: [Xen-devel] [PATCH RFC] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Eduardo Habkost
On Tue, Nov 01, 2016 at 05:12:37PM +, Wei Liu wrote: > On Tue, Nov 01, 2016 at 03:02:31PM -0200, Eduardo Habkost wrote: > > On Tue, Nov 01, 2016 at 04:43:11PM +, Wei Liu wrote: > > [...] > > > @@ -114,6 +115,11 @@ static void xen_change_state_handler(void *opaque, > > > int running, > > >

Re: [Xen-devel] [RFC PATCH 02/24] ARM: GICv3: allocate LPI pending and property table

2016-11-01 Thread Julien Grall
Hi Andre, On 28/09/2016 19:24, Andre Przywara wrote: The ARM GICv3 ITS provides a new kind of interrupt called LPIs. The pending bits and the configuration data (priority, enable bits) for those LPIs are stored in tables in normal memory, which software has to provide to the hardware. Allocate t

Re: [Xen-devel] [PATCH RFC] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Wei Liu
On Tue, Nov 01, 2016 at 03:02:31PM -0200, Eduardo Habkost wrote: > On Tue, Nov 01, 2016 at 04:43:11PM +, Wei Liu wrote: > [...] > > @@ -114,6 +115,11 @@ static void xen_change_state_handler(void *opaque, int > > running, > > > > static int xen_init(MachineState *ms) > > { > > +PCMachin

Re: [Xen-devel] [PATCH] tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc

2016-11-01 Thread Ian Jackson
Andrew Cooper writes ("Re: [PATCH] tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc"): > On 01/11/16 16:58, Ian Jackson wrote: > > Jan Beulich writes ("Re: [PATCH] tools/tests/x86_emulator: Pass -no-pie > > -fno-pic to gcc"): > >> Ian Jackson 11/01/16 5:46 PM >>> > >>> --- a/tools/tests/x8

Re: [Xen-devel] [PATCH RFC] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Eduardo Habkost
On Tue, Nov 01, 2016 at 04:43:11PM +, Wei Liu wrote: [...] > @@ -114,6 +115,11 @@ static void xen_change_state_handler(void *opaque, int > running, > > static int xen_init(MachineState *ms) > { > +PCMachineState *pcms = PC_MACHINE(ms); > + > +/* Disable ACPI build because Xen handl

Re: [Xen-devel] [PATCH RFC] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Wei Liu
On Tue, Nov 01, 2016 at 02:59:25PM -0200, Eduardo Habkost wrote: > On Tue, Nov 01, 2016 at 04:53:17PM +, Wei Liu wrote: > > On Tue, Nov 01, 2016 at 02:48:27PM -0200, Eduardo Habkost wrote: > > [...] > > > > static void pc_machine_set_nvdimm(Object *obj, bool value, Error > > > > **errp) > > >

Re: [Xen-devel] [PATCH RFC] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Eduardo Habkost
On Tue, Nov 01, 2016 at 04:53:17PM +, Wei Liu wrote: > On Tue, Nov 01, 2016 at 02:48:27PM -0200, Eduardo Habkost wrote: > [...] > > > static void pc_machine_set_nvdimm(Object *obj, bool value, Error **errp) > > > { > > > PCMachineState *pcms = PC_MACHINE(obj); > > > @@ -2159,6 +2173,8 @@

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Andrew Cooper
On 01/11/16 16:56, Ian Jackson wrote: > Wei Liu writes ("Re: [PATCH for-4.8 2/2] Config.mk: fix comment for debug > option"): >> On Mon, Oct 31, 2016 at 05:09:46PM +, Wei Liu wrote: >>> -# A debug build of Xen and tools? >>> +# A debug build of tools? >> For this to hold true, a patch like thi

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Wei Liu
On Tue, Nov 01, 2016 at 10:42:37AM -0600, Jan Beulich wrote: > >>> Wei Liu 11/01/16 5:38 PM >>> > >On Tue, Nov 01, 2016 at 10:33:54AM -0600, Jan Beulich wrote: > >> >>> Wei Liu 11/01/16 5:20 PM >>> > >> >On Tue, Nov 01, 2016 at 10:18:46AM -0600, Jan Beulich wrote: > >> >> >>> Wei Liu 11/01/16 2:

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Ian Jackson
Wei Liu writes ("Re: [PATCH for-4.8 2/2] Config.mk: fix comment for debug option"): > On Mon, Oct 31, 2016 at 05:09:46PM +, Wei Liu wrote: > > -# A debug build of Xen and tools? > > +# A debug build of tools? > > For this to hold true, a patch like this is needed: > > Please let me know what

Re: [Xen-devel] [PATCH RFC] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Wei Liu
On Tue, Nov 01, 2016 at 02:48:27PM -0200, Eduardo Habkost wrote: [...] > > static void pc_machine_set_nvdimm(Object *obj, bool value, Error **errp) > > { > > PCMachineState *pcms = PC_MACHINE(obj); > > @@ -2159,6 +2173,8 @@ static void pc_machine_initfn(Object *obj) > > pcms->vmport = O

Re: [Xen-devel] [PATCH RFC] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Eduardo Habkost
On Tue, Nov 01, 2016 at 04:43:11PM +, Wei Liu wrote: > Introduce this field to control whether ACPI build is enabled by a > particular machine or accelerator. > > It defaults to true so that PC machine has ACPI build by default. Xen > accelerator will disable it because Xen is in charge of bui

[Xen-devel] [PATCH RFC] PCMachineState: introduce acpi_build_enabled field

2016-11-01 Thread Wei Liu
Introduce this field to control whether ACPI build is enabled by a particular machine or accelerator. It defaults to true so that PC machine has ACPI build by default. Xen accelerator will disable it because Xen is in charge of building ACPI tables for the guest. Signed-off-by: Wei Liu --- Cc: I

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Jan Beulich
>>> Wei Liu 11/01/16 5:38 PM >>> >On Tue, Nov 01, 2016 at 10:33:54AM -0600, Jan Beulich wrote: >> >>> Wei Liu 11/01/16 5:20 PM >>> >> >On Tue, Nov 01, 2016 at 10:18:46AM -0600, Jan Beulich wrote: >> >> >>> Wei Liu 11/01/16 2:48 PM >>> >> >> >config/StdGNU.mk | 8 >> >> >config/SunOS.mk

Re: [Xen-devel] xc_hvm_inject_trap() races

2016-11-01 Thread Jan Beulich
>>> Andrei Vlad LUTAS 11/01/16 5:13 PM >>> First of all, please don't top post. >First of all, to answer your original question: the injection decision is made >when the introspection logic needs to inspect a page that is not present in >the physical memory. We don't really care if the current i

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Wei Liu
On Tue, Nov 01, 2016 at 10:33:54AM -0600, Jan Beulich wrote: > >>> Wei Liu 11/01/16 5:20 PM >>> > >On Tue, Nov 01, 2016 at 10:18:46AM -0600, Jan Beulich wrote: > >> >>> Wei Liu 11/01/16 2:48 PM >>> > >> >config/StdGNU.mk | 8 > >> >config/SunOS.mk | 7 --- > >> >tools/Rules.mk | 4 +

[Xen-devel] [PATCH for-4.8] tools/tests/x86_emulator: Pass -no-pie -fno-pic to gcc

2016-11-01 Thread Ian Jackson
[resending with slightly improved headers] The current build fails with GCC6 on Debian sid (unstable): /tmp/ccqjaueF.s: Assembler messages: /tmp/ccqjaueF.s:3713: Error: missing or invalid displacement expression `vmovd_to_reg_len@GOT' This is due to the combination of GCC6, and Debian's decis

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Jan Beulich
>>> Wei Liu 11/01/16 5:20 PM >>> >On Tue, Nov 01, 2016 at 10:18:46AM -0600, Jan Beulich wrote: >> >>> Wei Liu 11/01/16 2:48 PM >>> >> >config/StdGNU.mk | 8 >> >config/SunOS.mk | 7 --- >> >tools/Rules.mk | 4 +++- >> >xen/Rules.mk | 6 ++ >> >4 files changed, 9 insertions(+),

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Wei Liu
On Tue, Nov 01, 2016 at 10:18:46AM -0600, Jan Beulich wrote: > >>> Wei Liu 11/01/16 2:48 PM >>> > >config/StdGNU.mk | 8 > >config/SunOS.mk | 7 --- > >tools/Rules.mk | 4 +++- > >xen/Rules.mk | 6 ++ > >4 files changed, 9 insertions(+), 16 deletions(-) > > Considering this di

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Jan Beulich
>>> Wei Liu 11/01/16 2:48 PM >>> >config/StdGNU.mk | 8 >config/SunOS.mk | 7 --- >tools/Rules.mk | 4 +++- >xen/Rules.mk | 6 ++ >4 files changed, 9 insertions(+), 16 deletions(-) Considering this diffstat - did the original global settings not get inherited by any of the oth

[Xen-devel] [linux-3.10 test] 101837: regressions - FAIL

2016-11-01 Thread osstest service owner
flight 101837 linux-3.10 real [real] http://logs.test-lab.xenproject.org/osstest/logs/101837/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-amd64-pvgrub 6 xen-bootfail REGR. vs. 100648 test-amd64-i386-xl-x

Re: [Xen-devel] xc_hvm_inject_trap() races

2016-11-01 Thread Andrei Vlad LUTAS
Hello, First of all, to answer your original question: the injection decision is made when the introspection logic needs to inspect a page that is not present in the physical memory. We don't really care if the current instruction triggers multiple faults or not (and here I'm not sure what you

Re: [Xen-devel] xc_hvm_inject_trap() races

2016-11-01 Thread Jan Beulich
>>> Razvan Cojocaru 11/01/16 11:53 AM >>> >On 11/01/2016 12:30 PM, Jan Beulich wrote: > Razvan Cojocaru 11/01/16 10:04 AM >>> >>> We've stumbled across the following scenario: we're injecting a #PF to >>> try to bring a swapped page back, but Xen already have a pending >>> interrupt, and the

Re: [Xen-devel] [RFC PATCH 01/24] ARM: GICv3 ITS: parse and store ITS subnodes from hardware DT

2016-11-01 Thread Julien Grall
Hi Andre, On 28/09/2016 19:24, Andre Przywara wrote: Parse the DT GIC subnodes to find every ITS MSI controller the hardware offers. Store that information in a list to both propagate all of them later to Dom0, but also to be able to iterate over all ITSes. This introduces an ITS Kconfig option.

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Wei Liu
On Tue, Nov 01, 2016 at 02:58:22PM +, Andrew Cooper wrote: > On 01/11/16 13:47, Wei Liu wrote: > > On Mon, Oct 31, 2016 at 05:09:46PM +, Wei Liu wrote: > >> Signed-off-by: Wei Liu > >> --- > >> Cc: Andrew Cooper > >> Cc: George Dunlap > >> Cc: Ian Jackson > >> Cc: Jan Beulich > >> Cc:

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Andrew Cooper
On 01/11/16 13:47, Wei Liu wrote: > On Mon, Oct 31, 2016 at 05:09:46PM +, Wei Liu wrote: >> Signed-off-by: Wei Liu >> --- >> Cc: Andrew Cooper >> Cc: George Dunlap >> Cc: Ian Jackson >> Cc: Jan Beulich >> Cc: Konrad Rzeszutek Wilk >> Cc: Stefano Stabellini >> Cc: Tim Deegan >> Cc: Wei L

Re: [Xen-devel] PCIe devices that are hotplugged after MMIO has been setup fail due to _CRS not covering 64-bit area

2016-11-01 Thread Konrad Rzeszutek Wilk
. snip.. > I modified it be subtractive, and got it to start with > large areas and then smaller and smaller: > > (d2) - CPU0 ... 36-bit phys ... fixed MTRRs ... Cover @04344(MB) to > 65536(M > (d2) B) with 7 MTRRs. > (d2) MTRR 1 @04344(MB) 37112(MB) > (d2) MTRR 2 @3

Re: [Xen-devel] [PATCH RFC 3/6] xen/arm: Allow platforms to hook IRQ routing.

2016-11-01 Thread Julien Grall
Hello Kyle, On 05/09/2016 11:13, Kyle Temkin wrote: diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index 52c9a01..402c766 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c [...] + +bool_t platform_irq_is_routable(struct dt_raw_irq * rirq) We

Re: [Xen-devel] [PATCH 1/1] xen-netfront: do not cast grant table reference to signed short

2016-11-01 Thread David Miller
From: Dongli Zhang Date: Mon, 31 Oct 2016 21:46:09 -0700 (PDT) > David, I am very sorry for this error and I will be careful the next time. > Would you please let me know if I should resend a new patch or an incremental > based on previous one at > https://git.kernel.org/cgit/linux/kernel/git/da

Re: [Xen-devel] [PATCH V4] xen/arm: domain_build: allocate lowmem for dom0 as much as possible

2016-11-01 Thread Julien Grall
Hi Peng, Sorry for the late answer. On 23/09/2016 03:55, Peng Fan wrote: On AArch64 SoCs, some IPs may only have the capability to access 32 bits address space. The physical memory assigned for Dom0 maybe not in 4GB address space, then the IPs will not work properly. So need to allocate memory

Re: [Xen-devel] PCIe devices that are hotplugged after MMIO has been setup fail due to _CRS not covering 64-bit area

2016-11-01 Thread Konrad Rzeszutek Wilk
On Thu, Oct 13, 2016 at 03:20:24AM -0600, Jan Beulich wrote: > >>> On 12.10.16 at 23:15, wrote: > > On Wed, Sep 28, 2016 at 03:21:08AM -0600, Jan Beulich wrote: > >> >>> On 27.09.16 at 16:43, wrote: > >> > If the guest is booted with 'pci' we nicely expand the MMIO region below > >> > 4GB and try

Re: [Xen-devel] [PATCH] Don't clear HCR_VM bit when updating VTTBR.

2016-11-01 Thread Julien Grall
Hi Stefano, On 31/10/2016 22:18, Stefano Stabellini wrote: On Mon, 31 Oct 2016, Steve Capper wrote: On Wed, Oct 19, 2016 at 12:59:45PM -0700, Stefano Stabellini wrote: On Mon, 10 Oct 2016, Jun Sun wrote: Currently function p2m_restore_state() would clear HCR_VM bit, i.e., disabling stage2 tra

Re: [Xen-devel] [xen-unstable test] 101833: regressions - trouble: blocked/broken/fail/pass

2016-11-01 Thread Wei Liu
On Tue, Nov 01, 2016 at 09:48:38AM +, Andrew Cooper wrote: > On 01/11/2016 07:22, osstest service owner wrote: > > flight 101833 xen-unstable real [real] > > http://logs.test-lab.xenproject.org/osstest/logs/101833/ > > > > Regressions :-( > > > > Tests which did not succeed and are blocking, >

Re: [Xen-devel] [RFC] Shared coprocessor framework

2016-11-01 Thread Artem Mygaiev
Let me explain a bit background of this work. We see growing amount of use cases for different "co-processors" like - GPUs (inside of most modern SoCs) - low-power side CPU cores (like ARM Cortex M or R on board with Cortex A cores to handle PM or other tasks) - DSPs (for example, TI C6000 fami

Re: [Xen-devel] [PATCH for-4.8 2/2] Config.mk: fix comment for debug option

2016-11-01 Thread Wei Liu
On Mon, Oct 31, 2016 at 05:09:46PM +, Wei Liu wrote: > Signed-off-by: Wei Liu > --- > Cc: Andrew Cooper > Cc: George Dunlap > Cc: Ian Jackson > Cc: Jan Beulich > Cc: Konrad Rzeszutek Wilk > Cc: Stefano Stabellini > Cc: Tim Deegan > Cc: Wei Liu > --- > Config.mk | 3 ++- > 1 file chang

Re: [Xen-devel] qeustion: a panic in __do_update_va_mapping()

2016-11-01 Thread Andrew Cooper
On 01/11/16 12:07, Xuquan (Quan Xu) wrote: > On November 01, 2016 8:00 PM, Andrew Cooper wrote: >> On 01/11/16 11:57, Xuquan (Quan Xu) wrote: >>> On November 01, 2016 7:41 PM, Andrew Cooper >> wrote: On 01/11/16 11:23, Xuquan (Quan Xu) wrote: > On November 01, 2016 7:16 PM, Andrew Cooper

[Xen-devel] [ovmf baseline-only test] 67974: all pass

2016-11-01 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67974 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67974/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 90d6dfb9871bcf7e73b8884b1c1b1fc0029fcb2e baseline v

Re: [Xen-devel] qeustion: a panic in __do_update_va_mapping()

2016-11-01 Thread Xuquan (Quan Xu)
On November 01, 2016 8:00 PM, Andrew Cooper wrote: >On 01/11/16 11:57, Xuquan (Quan Xu) wrote: >> On November 01, 2016 7:41 PM, Andrew Cooper > wrote: >>> On 01/11/16 11:23, Xuquan (Quan Xu) wrote: On November 01, 2016 7:16 PM, Andrew Cooper < >>> andrew.coop...@citrix.com > wrote: > On 01

Re: [Xen-devel] qeustion: a panic in __do_update_va_mapping()

2016-11-01 Thread Andrew Cooper
On 01/11/16 11:57, Xuquan (Quan Xu) wrote: > On November 01, 2016 7:41 PM, Andrew Cooper > wrote: >> On 01/11/16 11:23, Xuquan (Quan Xu) wrote: >>> On November 01, 2016 7:16 PM, Andrew Cooper < >> andrew.coop...@citrix.com > wrote: On 01/11/16 11:01, Xuquan (Quan Xu) wrote: > Hi Andrew,

Re: [Xen-devel] qeustion: a panic in __do_update_va_mapping()

2016-11-01 Thread Xuquan (Quan Xu)
On November 01, 2016 7:41 PM, Andrew Cooper wrote: >On 01/11/16 11:23, Xuquan (Quan Xu) wrote: >> On November 01, 2016 7:16 PM, Andrew Cooper < >andrew.coop...@citrix.com > wrote: >>> On 01/11/16 11:01, Xuquan (Quan Xu) wrote: Hi Andrew, When I run some application with Xen, I encou

Re: [Xen-devel] qeustion: a panic in __do_update_va_mapping()

2016-11-01 Thread Andrew Cooper
On 01/11/16 11:23, Xuquan (Quan Xu) wrote: > On November 01, 2016 7:16 PM, Andrew Cooper < andrew.coop...@citrix.com > > wrote: >> On 01/11/16 11:01, Xuquan (Quan Xu) wrote: >>> Hi Andrew, >>> >>> When I run some application with Xen, I encounter a Panic with log as the >> bottom of this email. >>

Re: [Xen-devel] qeustion: a panic in __do_update_va_mapping()

2016-11-01 Thread Xuquan (Quan Xu)
On November 01, 2016 7:16 PM, Andrew Cooper < andrew.coop...@citrix.com > wrote: >On 01/11/16 11:01, Xuquan (Quan Xu) wrote: >> Hi Andrew, >> >> When I run some application with Xen, I encounter a Panic with log as the >bottom of this email. >> I find this panic is as similar as your fix e4e9d2d4e7

Re: [Xen-devel] qeustion: a panic in __do_update_va_mapping()

2016-11-01 Thread Andrew Cooper
On 01/11/16 11:01, Xuquan (Quan Xu) wrote: > Hi Andrew, > > When I run some application with Xen, I encounter a Panic with log as the > bottom of this email. > I find this panic is as similar as your fix e4e9d2d4e76bd8fe22 'x86/p2m-ept: > don't unmap the EPT pagetable while it is still in use'.

[Xen-devel] qeustion: a panic in __do_update_va_mapping()

2016-11-01 Thread Xuquan (Quan Xu)
Hi Andrew, When I run some application with Xen, I encounter a Panic with log as the bottom of this email. I find this panic is as similar as your fix e4e9d2d4e76bd8fe22 'x86/p2m-ept: don't unmap the EPT pagetable while it is still in use'. _iiuc_, in __do_update_va_mapping(), 'va' is unmappe

Re: [Xen-devel] xc_hvm_inject_trap() races

2016-11-01 Thread Razvan Cojocaru
On 11/01/2016 12:30 PM, Jan Beulich wrote: Razvan Cojocaru 11/01/16 10:04 AM >>> >> We've stumbled across the following scenario: we're injecting a #PF to >> try to bring a swapped page back, but Xen already have a pending >> interrupt, and the two collide. >> >> I've logged what happens in h

[Xen-devel] [PATCH 2/3] xen/err: Support an optional per-arch slide for the error region

2016-11-01 Thread Andrew Cooper
No functional change. Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/include/xen/err.h | 15 --- 1 file changed, 12 insertions(+), 3 deletions(-) diff --git a/xen/include/xen/err.h b/xen/include/xen/err.h index ef77992..bea7fa3 100644 --- a/xen/include/xen/err.h +++ b/xen

[Xen-devel] [PATCH for-4.9 0/3] Improvements to ERR_PTR() infrastructure

2016-11-01 Thread Andrew Cooper
One XenServer issue I am looking in to requires improvements to the memory allocation logic, mostly to avoid losing error information internally. As a result, I am choosing to make these ERR_PTR() improvements a prerequisite to avoid accidentally introducing further issues. Andrew Cooper (3): x

[Xen-devel] [PATCH 3/3] xen/x86: Use non-canonical pointers for ERR_PTR() errors

2016-11-01 Thread Andrew Cooper
The top of the virutal address space is owned by 64bit PV kernels. Code which fails to correctly check an ERR_PTR() value might follow the pointer into guest space. Mitigate this risk by sliding the ERR_PTR() error range into the non-canonical region. As this comes with a small overhead, and isn

[Xen-devel] [PATCH 1/3] xen/err: Use static inlines and boolean types

2016-11-01 Thread Andrew Cooper
IS_ERR() and IS_ERR_OR_NULL() both return boolean values. No functional change. Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/include/xen/err.h | 10 +++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/xen/include/xen/err.h b/xen/include/xen/err.h index 2f29b57.

Re: [Xen-devel] [PATCH v3.1 03/15] xen/x86: allow calling {sh/hap}_set_allocation with the idle domain

2016-11-01 Thread Tim Deegan
At 10:34 -0600 on 31 Oct (1477910088), Jan Beulich wrote: > >>> On 29.10.16 at 10:59, wrote: > > ... and using the "preempted" parameter. The solution relies on just calling > > softirq_pending if the current domain is the idle domain. If such preemption > > happens, the caller should then call pr

Re: [Xen-devel] xc_hvm_inject_trap() races

2016-11-01 Thread Jan Beulich
>>> Razvan Cojocaru 11/01/16 10:04 AM >>> >We've stumbled across the following scenario: we're injecting a #PF to >try to bring a swapped page back, but Xen already have a pending >interrupt, and the two collide. > >I've logged what happens in hvm_do_resume() at the point of injection, >and stumbl

Re: [Xen-devel] [PATCH v3.1 05/15] x86/paging: introduce paging_set_allocation

2016-11-01 Thread Tim Deegan
At 10:42 -0600 on 31 Oct (1477910532), Jan Beulich wrote: > >>> On 29.10.16 at 10:59, wrote: > > --- a/xen/arch/x86/mm/shadow/common.c > > +++ b/xen/arch/x86/mm/shadow/common.c > > @@ -1609,13 +1609,7 @@ shadow_free_p2m_page(struct domain *d, struct > > page_info *pg) > > paging_unlock(d); >

Re: [Xen-devel] [xen-unstable test] 101833: regressions - trouble: blocked/broken/fail/pass

2016-11-01 Thread Jan Beulich
>>> Andrew Cooper 11/01/16 10:50 AM >>> >On 01/11/2016 07:22, osstest service owner wrote: >> test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 17 >> guest-start/debianhvm.repeat fail REGR. vs. 101673 > >This attempted to ssh to dom0 and got Destination Host Unreachable. I >notice from the serial lo

Re: [Xen-devel] [xen-unstable test] 101833: regressions - trouble: blocked/broken/fail/pass

2016-11-01 Thread Andrew Cooper
On 01/11/2016 07:22, osstest service owner wrote: > flight 101833 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/101833/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-i386-xl-qemut-stubdom-d

Re: [Xen-devel] [PATCH 06/12] xen: make use of xenbus_read_unsigned() in xen-netback

2016-11-01 Thread Paul Durrant
> -Original Message- > From: Juergen Gross [mailto:jgr...@suse.com] > Sent: 31 October 2016 16:48 > To: linux-ker...@vger.kernel.org; xen-devel@lists.xen.org > Cc: David Vrabel ; boris.ostrov...@oracle.com; > Juergen Gross ; Wei Liu ; Paul > Durrant ; net...@vger.kernel.org > Subject: [PATC

[Xen-devel] [qemu-mainline test] 101835: tolerable FAIL - PUSHED

2016-11-01 Thread osstest service owner
flight 101835 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/101835/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-rtds 6 xen-boot fail REGR. vs. 101826 test-amd64-i386-xl-qemuu-w

[Xen-devel] xc_hvm_inject_trap() races

2016-11-01 Thread Razvan Cojocaru
Hello, We've stumbled across the following scenario: we're injecting a #PF to try to bring a swapped page back, but Xen already have a pending interrupt, and the two collide. I've logged what happens in hvm_do_resume() at the point of injection, and stumbled across this: (XEN) [ 252.878389] vec

[Xen-devel] [libvirt test] 101839: tolerable all pass - PUSHED

2016-11-01 Thread osstest service owner
flight 101839 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/101839/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-raw 12 saverestore-support-checkfail like 101773 test-armhf-armhf-libvirt-xsm 13

[Xen-devel] [ovmf test] 101838: all pass - PUSHED

2016-11-01 Thread osstest service owner
flight 101838 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/101838/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 90d6dfb9871bcf7e73b8884b1c1b1fc0029fcb2e baseline version: ovmf ac55b925548f3b33f2bc9

[Xen-devel] [xen-unstable test] 101833: regressions - trouble: blocked/broken/fail/pass

2016-11-01 Thread osstest service owner
flight 101833 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/101833/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 101673

  1   2   >