Re: [Xen-devel] [PATCH 11/28] ARM: GICv3: forward pending LPIs to guests

2017-03-02 Thread Jan Beulich
>>> On 02.03.17 at 21:56, wrote: > Ping? I'd like the question to be sorted out before Andre is sending a > new version. > > On 02/15/2017 09:25 PM, Stefano Stabellini wrote: >> On Wed, 15 Feb 2017, Julien Grall wrote: >>> Hi Stefano, >>> >>> On 14/02/17 21:00, Stefano Stabellini wrote: On

Re: [Xen-devel] [PATCH] xen/arm: fix affected memory range by dcache clean functions

2017-03-02 Thread Edgar E. Iglesias
On Thu, Mar 02, 2017 at 05:15:26PM -0800, Stefano Stabellini wrote: > clean_dcache_va_range and clean_and_invalidate_dcache_va_range don't > calculate the range correctly when "end" is not cacheline aligned. As a > result, the last cacheline is not skipped. Fix the issue by aligning the > start add

[Xen-devel] [seabios test] 106381: tolerable FAIL - PUSHED

2017-03-02 Thread osstest service owner
flight 106381 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/106381/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 106372 test-amd64-amd64-xl-qemuu-win7-a

[Xen-devel] [qemu-mainline test] 106377: trouble: blocked/broken/fail/pass

2017-03-02 Thread osstest service owner
flight 106377 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/106377/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 3 host-install(3)broken REGR. vs. 1063

[Xen-devel] [ovmf test] 106378: regressions - FAIL

2017-03-02 Thread osstest service owner
flight 106378 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/106378/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963 test-amd64-amd64-xl-qemuu-

[Xen-devel] [linux-linus test] 106375: regressions - FAIL

2017-03-02 Thread osstest service owner
flight 106375 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/106375/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254 test-armhf-armhf-xl

[Xen-devel] [PATCH] xen/arm: fix affected memory range by dcache clean functions

2017-03-02 Thread Stefano Stabellini
clean_dcache_va_range and clean_and_invalidate_dcache_va_range don't calculate the range correctly when "end" is not cacheline aligned. As a result, the last cacheline is not skipped. Fix the issue by aligning the start address to the cacheline size. In addition, make the code simpler and faster i

Re: [Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-02 Thread Stefano Stabellini
On Thu, 2 Mar 2017, Julien Grall wrote: > On 02/03/2017 22:39, Stefano Stabellini wrote: > > On Thu, 2 Mar 2017, Julien Grall wrote: > > > Hi Stefano, > > > > > > On 02/03/17 19:12, Stefano Stabellini wrote: > > > > On Thu, 2 Mar 2017, Julien Grall wrote: > > > > > On 02/03/17 08:53, Edgar E. Igle

Re: [Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-02 Thread Julien Grall
On 02/03/2017 23:07, Stefano Stabellini wrote: On Thu, 2 Mar 2017, Edgar E. Iglesias wrote: On Thu, Mar 02, 2017 at 02:39:55PM -0800, Stefano Stabellini wrote: On Thu, 2 Mar 2017, Julien Grall wrote: Hi Stefano, On 02/03/17 19:12, Stefano Stabellini wrote: On Thu, 2 Mar 2017, Julien Grall

Re: [Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-02 Thread Julien Grall
On 02/03/2017 22:39, Stefano Stabellini wrote: On Thu, 2 Mar 2017, Julien Grall wrote: Hi Stefano, On 02/03/17 19:12, Stefano Stabellini wrote: On Thu, 2 Mar 2017, Julien Grall wrote: On 02/03/17 08:53, Edgar E. Iglesias wrote: On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wr

Re: [Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-02 Thread Stefano Stabellini
On Thu, 2 Mar 2017, Edgar E. Iglesias wrote: > On Thu, Mar 02, 2017 at 02:39:55PM -0800, Stefano Stabellini wrote: > > On Thu, 2 Mar 2017, Julien Grall wrote: > > > Hi Stefano, > > > > > > On 02/03/17 19:12, Stefano Stabellini wrote: > > > > On Thu, 2 Mar 2017, Julien Grall wrote: > > > > > On 02/

[Xen-devel] [PATCH] xen-netback: fix race condition on XenBus disconnect

2017-03-02 Thread Igor Druzhinin
In some cases during XenBus disconnect event handling and subsequent queue resource release there may be some TX handlers active on other processors. Use RCU in order to synchronize with them. Signed-off-by: Igor Druzhinin --- drivers/net/xen-netback/interface.c | 13 - drivers/net/x

Re: [Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-02 Thread Edgar E. Iglesias
On Thu, Mar 02, 2017 at 02:39:55PM -0800, Stefano Stabellini wrote: > On Thu, 2 Mar 2017, Julien Grall wrote: > > Hi Stefano, > > > > On 02/03/17 19:12, Stefano Stabellini wrote: > > > On Thu, 2 Mar 2017, Julien Grall wrote: > > > > On 02/03/17 08:53, Edgar E. Iglesias wrote: > > > > > On Thu, Mar

Re: [Xen-devel] [PATCH v2 5/5] xen: use libxendevicemodel when available

2017-03-02 Thread Stefano Stabellini
On Thu, 2 Mar 2017, Paul Durrant wrote: > This patch modifies the wrapper functions in xen_common.h to use the > new xendevicemodel interface if it is available along with compatibility > code to use the old libxenctrl interface if it is not. > > Signed-off-by: Paul Durrant > --- > Cc: Stefano St

Re: [Xen-devel] [PATCH net] xen-netback: Use GFP_ATOMIC to allocate hash

2017-03-02 Thread David Miller
From: Anoob Soman Date: Thu, 2 Mar 2017 10:50:20 + > Allocation of new_hash, inside xenvif_new_hash(), always happen > in softirq context, so use GFP_ATOMIC instead of GFP_KERNEL for new > hash allocation. > > Signed-off-by: Anoob Soman Applied. ___

Re: [Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-02 Thread Stefano Stabellini
On Thu, 2 Mar 2017, Julien Grall wrote: > Hi Stefano, > > On 02/03/17 19:12, Stefano Stabellini wrote: > > On Thu, 2 Mar 2017, Julien Grall wrote: > > > On 02/03/17 08:53, Edgar E. Iglesias wrote: > > > > On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wrote: > > > > > On Wed, Mar 01,

[Xen-devel] [xen-unstable-smoke test] 106380: tolerable trouble: broken/fail/pass - PUSHED

2017-03-02 Thread osstest service owner
flight 106380 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/106380/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen

[Xen-devel] [linux-linus bisection] complete test-armhf-armhf-xl-cubietruck

2017-03-02 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-armhf-armhf-xl-cubietruck testid guest-start Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemuu git://xenbits.xen.org/qemu-xen.git Tree

[Xen-devel] [xen-unstable test] 106371: regressions - FAIL

2017-03-02 Thread osstest service owner
flight 106371 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/106371/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-vhd 9 debian-di-installfail REGR. vs. 106351 Regressions which

Re: [Xen-devel] [early RFC] ARM PCI Passthrough design document

2017-03-02 Thread Edgar E. Iglesias
On Thu, Feb 23, 2017 at 04:47:19PM +, Julien Grall wrote: > > Hi Edgar, > > On 22/02/17 04:03, Edgar E. Iglesias wrote: > >On Mon, Feb 13, 2017 at 03:35:19PM +, Julien Grall wrote: > >>On 02/02/17 15:33, Edgar E. Iglesias wrote: > >>>On Wed, Feb 01, 2017 at 07:04:43PM +, Julien Grall

[Xen-devel] [seabios test] 106372: tolerable FAIL - PUSHED

2017-03-02 Thread osstest service owner
flight 106372 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/106372/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 105970 test-amd64-amd64-xl-qemuu-win7-a

Re: [Xen-devel] [PATCH 11/28] ARM: GICv3: forward pending LPIs to guests

2017-03-02 Thread Julien Grall
Hi, Ping? I'd like the question to be sorted out before Andre is sending a new version. On 02/15/2017 09:25 PM, Stefano Stabellini wrote: On Wed, 15 Feb 2017, Julien Grall wrote: Hi Stefano, On 14/02/17 21:00, Stefano Stabellini wrote: On Mon, 30 Jan 2017, Andre Przywara wrote: +/* + * Ha

Re: [Xen-devel] [ARM] SMC (and HVC) handling in hypervisor

2017-03-02 Thread Tamas K Lengyel
On Thu, Mar 2, 2017 at 10:54 AM, Volodymyr Babchuk wrote: > Hello, > > Thank you all for the discussion. I want to summarize it a bit. > > Looks like there are no objections about my initial list of > requirements. There was born another requirement in the discussion. > Thanks to Stefano for formu

[Xen-devel] [PATCH] x86/cpuid: Fix booting on AMD Phenom 6-core platform

2017-03-02 Thread Andrew Cooper
c/s 5cecf60f4 "x86/cpuid: Handle leaf 0x1 in guest_cpuid()" causes Linux 4.10 to crash during boot. It turns out to be because of the reported apic_id, which was altered to be more consistent across guests. Revert back to the previous behaviour, by limiting the apic_id adjustment to HVM guests on

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Andrew Cooper
On 02/03/17 19:33, Boris Ostrovsky wrote: >> I expect it might have something to do with fact that this failure to >> boot is a 6-core system, rather than a power of two, at which point I >> doubt the APIC IDs follow a linear trend. >> >> (Properly fixing the reported topology is going to be a can

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Andrew Cooper
On 02/03/17 19:28, Sander Eikelenboom wrote: > On 02/03/17 20:17, Andrew Cooper wrote: >> On 02/03/17 19:15, Boris Ostrovsky wrote: >>> On 03/02/2017 01:56 PM, Andrew Cooper wrote: On 02/03/17 18:51, Sander Eikelenboom wrote: > On 02/03/17 19:29, Andrew Cooper wrote: >> On 02/03/17 18:

Re: [Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-02 Thread Julien Grall
Hi Stefano, On 02/03/17 19:12, Stefano Stabellini wrote: On Thu, 2 Mar 2017, Julien Grall wrote: On 02/03/17 08:53, Edgar E. Iglesias wrote: On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wrote: On Wed, Mar 01, 2017 at 05:05:21PM -0800, Stefano Stabellini wrote: Julien, from loo

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Boris Ostrovsky
> I expect it might have something to do with fact that this failure to > boot is a 6-core system, rather than a power of two, at which point I > doubt the APIC IDs follow a linear trend. > > (Properly fixing the reported topology is going to be a can of worms. > All this series is trying to do i

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Sander Eikelenboom
On 02/03/17 20:17, Andrew Cooper wrote: > On 02/03/17 19:15, Boris Ostrovsky wrote: >> On 03/02/2017 01:56 PM, Andrew Cooper wrote: >>> On 02/03/17 18:51, Sander Eikelenboom wrote: On 02/03/17 19:29, Andrew Cooper wrote: > On 02/03/17 18:25, Sander Eikelenboom wrote: >> On 02/03/17 18:

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Andrew Cooper
On 02/03/17 19:15, Boris Ostrovsky wrote: > On 03/02/2017 01:56 PM, Andrew Cooper wrote: >> On 02/03/17 18:51, Sander Eikelenboom wrote: >>> On 02/03/17 19:29, Andrew Cooper wrote: On 02/03/17 18:25, Sander Eikelenboom wrote: > On 02/03/17 18:38, Andrew Cooper wrote: >> On 02/03/17 17:

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Boris Ostrovsky
On 03/02/2017 01:56 PM, Andrew Cooper wrote: > On 02/03/17 18:51, Sander Eikelenboom wrote: >> On 02/03/17 19:29, Andrew Cooper wrote: >>> On 02/03/17 18:25, Sander Eikelenboom wrote: On 02/03/17 18:38, Andrew Cooper wrote: > On 02/03/17 17:29, Sander Eikelenboom wrote: >> On 02/03/17

Re: [Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-02 Thread Stefano Stabellini
On Thu, 2 Mar 2017, Julien Grall wrote: > On 02/03/17 08:53, Edgar E. Iglesias wrote: > > On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wrote: > > > On Wed, Mar 01, 2017 at 05:05:21PM -0800, Stefano Stabellini wrote: > > > > Hi all, > > > > > > > > Edgar reported a data corruption on

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Andrew Cooper
On 02/03/17 18:51, Sander Eikelenboom wrote: > On 02/03/17 19:29, Andrew Cooper wrote: >> On 02/03/17 18:25, Sander Eikelenboom wrote: >>> On 02/03/17 18:38, Andrew Cooper wrote: On 02/03/17 17:29, Sander Eikelenboom wrote: > On 02/03/17 15:55, Andrew Cooper wrote: >> On 02/03/17 14:42

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Sander Eikelenboom
On 02/03/17 19:29, Andrew Cooper wrote: > On 02/03/17 18:25, Sander Eikelenboom wrote: >> On 02/03/17 18:38, Andrew Cooper wrote: >>> On 02/03/17 17:29, Sander Eikelenboom wrote: On 02/03/17 15:55, Andrew Cooper wrote: > On 02/03/17 14:42, Sander Eikelenboom wrote: >> Hi Andrew / Jan,

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Andrew Cooper
On 02/03/17 18:25, Sander Eikelenboom wrote: > On 02/03/17 18:38, Andrew Cooper wrote: >> On 02/03/17 17:29, Sander Eikelenboom wrote: >>> On 02/03/17 15:55, Andrew Cooper wrote: On 02/03/17 14:42, Sander Eikelenboom wrote: > Hi Andrew / Jan, > > While testing current xen-unstable

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Sander Eikelenboom
On 02/03/17 18:38, Andrew Cooper wrote: > On 02/03/17 17:29, Sander Eikelenboom wrote: >> On 02/03/17 15:55, Andrew Cooper wrote: >>> On 02/03/17 14:42, Sander Eikelenboom wrote: Hi Andrew / Jan, While testing current xen-unstable staging i ran into my host rebooting in early k

Re: [Xen-devel] [PATCH v2 5/5] golang/xenlight: Add tests host related functionality functions

2017-03-02 Thread Ronald Rojas
On Thu, Mar 02, 2017 at 05:53:00PM +, George Dunlap wrote: > On 02/03/17 17:36, Ian Jackson wrote: > > Ronald Rojas writes ("[PATCH v2 5/5] golang/xenlight: Add tests host > > related functionality functions"): > >> Create tests for the following functions: > >> - GetVersionInfo > >> - GetPhys

[Xen-devel] [ovmf test] 106359: regressions - FAIL

2017-03-02 Thread osstest service owner
flight 106359 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/106359/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963 test-amd64-amd64-xl-qemuu-

Re: [Xen-devel] [PATCH v2 5/5] golang/xenlight: Add tests host related functionality functions

2017-03-02 Thread George Dunlap
On 02/03/17 17:55, Ian Jackson wrote: > George Dunlap writes ("Re: [PATCH v2 5/5] golang/xenlight: Add tests host > related functionality functions"): >> On 02/03/17 17:36, Ian Jackson wrote: >>> I assume this whole series is RFC still ? >> >> I think the earlier patches looked pretty close to bei

[Xen-devel] [qemu-mainline test] 106356: tolerable FAIL - PUSHED

2017-03-02 Thread osstest service owner
flight 106356 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/106356/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 106266 test-amd64-amd64-xl-qemuu-

Re: [Xen-devel] xen/arm and swiotlb-xen: possible data corruption

2017-03-02 Thread Julien Grall
Hi Edgar, On 02/03/17 08:53, Edgar E. Iglesias wrote: On Thu, Mar 02, 2017 at 09:38:37AM +0100, Edgar E. Iglesias wrote: On Wed, Mar 01, 2017 at 05:05:21PM -0800, Stefano Stabellini wrote: Hi all, Edgar reported a data corruption on network packets in dom0 when the swiotlb-xen is in use. He a

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Andrew Cooper
On 02/03/17 17:29, Sander Eikelenboom wrote: > On 02/03/17 15:55, Andrew Cooper wrote: >> On 02/03/17 14:42, Sander Eikelenboom wrote: >>> Hi Andrew / Jan, >>> >>> While testing current xen-unstable staging i ran into my host rebooting in >>> early kernel boot. >>> Bisection has turned up: >>>

Re: [Xen-devel] [PATCH v2 5/5] golang/xenlight: Add tests host related functionality functions

2017-03-02 Thread Ian Jackson
George Dunlap writes ("Re: [PATCH v2 5/5] golang/xenlight: Add tests host related functionality functions"): > On 02/03/17 17:36, Ian Jackson wrote: > > I assume this whole series is RFC still ? > > I think the earlier patches looked pretty close to being checked in. I > think having a basic chu

Re: [Xen-devel] [ARM] SMC (and HVC) handling in hypervisor

2017-03-02 Thread Volodymyr Babchuk
Hello, Thank you all for the discussion. I want to summarize it a bit. Looks like there are no objections about my initial list of requirements. There was born another requirement in the discussion. Thanks to Stefano for formulation it: 10. Domains on which the monitor privileged call feature is

[Xen-devel] [PATCH v2 18/21] xen/balloon: decorate PV-only parts with #ifdef CONFIG_XEN_PV

2017-03-02 Thread Vitaly Kuznetsov
Balloon driver uses several PV-only concepts (xen_start_info, xen_extra_mem,..) and it seems the simpliest solution to make HVM-only build happy is to decorate these parts with #ifdefs. Signed-off-by: Vitaly Kuznetsov --- drivers/xen/balloon.c | 30 -- 1 file changed,

[Xen-devel] [PATCH v2 21/21] x86/xen: rename some PV-only functions in smp_pv.c

2017-03-02 Thread Vitaly Kuznetsov
After code split between PV and HVM some functions in xen_smp_ops have xen_pv_ prefix and some only xen_ which makes them look like they're common for both PV and HVM while they're not. Rename all the rest to have xen_pv_ prefix. Signed-off-by: Vitaly Kuznetsov --- - This patch is rather a matter

[Xen-devel] [PATCH v2 06/21] x86/xen: split off enlighten_pv.c

2017-03-02 Thread Vitaly Kuznetsov
Basically, enlighten.c is renamed to enlighten_pv.c and some code moved out to common enlighten.c. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/Makefile |4 +- arch/x86/xen/enlighten.c| 1626 ++- arch/x86/xen/enlighten_pv.c | 1552 +++

[Xen-devel] [PATCH v2 17/21] x86/xen: create stubs for HVM-only builds in page.h

2017-03-02 Thread Vitaly Kuznetsov
__pfn_to_mfn() is only used from PV code (mmu_pv.c, p2m.c) and from page.h where all functions calling it check for xen_feature(XENFEAT_auto_translated_physmap) first so we can replace it with any stub to make build happy. set_foreign_p2m_mapping()/clear_foreign_p2m_mapping() are used from grant-t

[Xen-devel] [PATCH v2 20/21] x86/xen: enable PVHVM-only builds

2017-03-02 Thread Vitaly Kuznetsov
Now everything is in place and we can move PV-only code under CONFIG_XEN_PV. CONFIG_XEN_PV_SMP is created to support the change. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/Kconfig | 4 arch/x86/xen/Makefile | 9 + 2 files changed, 9 insertions(+), 4 deletions(-) diff --git a

[Xen-devel] [PATCH v2 14/21] x86/xen: split suspend.c for PV and PVHVM guests

2017-03-02 Thread Vitaly Kuznetsov
Slit the code in suspend.c into suspend_pv.c and suspend_hvm.c. Reviewed-by: Juergen Gross Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/Makefile | 3 ++- arch/x86/xen/suspend.c | 54 -- arch/x86/xen/suspend_hvm.c | 22 +++

[Xen-devel] [PATCH v2 11/21] x86/xen: split off smp_pv.c

2017-03-02 Thread Vitaly Kuznetsov
Basically, smp.c is renamed to smp_pv.c and some code moved out to common smp.c. struct xen_common_irq delcaration ended up in smp.h. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/Makefile | 2 +- arch/x86/xen/smp.c| 487 +--- arch/x86/xen/smp

[Xen-devel] [PATCH v2 12/21] x86/xen: split off mmu_hvm.c

2017-03-02 Thread Vitaly Kuznetsov
Move PVHVM related code to mmu_hvm.c. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/Makefile | 2 +- arch/x86/xen/mmu.c | 74 -- arch/x86/xen/mmu_hvm.c | 79 ++ 3 files changed, 80 insertions(+),

[Xen-devel] [PATCH v2 16/21] x86/xen: define startup_xen for XEN PV only

2017-03-02 Thread Vitaly Kuznetsov
startup_xen references PV-only code, decorate it with #ifdef CONFIG_XEN_PV to make PV-free builds possible. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/xen-head.S | 4 1 file changed, 4 insertions(+) diff --git a/arch/x86/xen/xen-head.S b/arch/x86/xen/xen-head.S index 37794e4..72a8e6a

[Xen-devel] [PATCH v2 19/21] xen: create xen_create/destroy_contiguous_region() stubs for PVHVM only builds

2017-03-02 Thread Vitaly Kuznetsov
xen_create_contiguous_region()/xen_create_contiguous_region() are PV-only, they both contain xen_feature(XENFEAT_auto_translated_physmap) check and bail in the very beginning. Signed-off-by: Vitaly Kuznetsov --- include/xen/xen-ops.h | 14 ++ 1 file changed, 14 insertions(+) diff --

[Xen-devel] [PATCH v2 04/21] x86/xen: split off enlighten_pvh.c

2017-03-02 Thread Vitaly Kuznetsov
Create enlighten_pvh.c by splitting off PVH related code from enlighten.c, put it under CONFIG_XEN_PVH. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/Makefile| 2 + arch/x86/xen/enlighten.c | 110 - arch/x86/xen/enlighten_pvh.c | 114 +

[Xen-devel] [PATCH v2 15/21] x86/xen: put setup.c, pmu.c and apic.c under CONFIG_XEN_PV

2017-03-02 Thread Vitaly Kuznetsov
xen_pmu_init/finish() functions are used in suspend.c and enlighten.c, add stubs for now. Reviewed-by: Juergen Gross Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/Kconfig | 2 +- arch/x86/xen/Makefile | 6 +++--- arch/x86/xen/pmu.h| 5 + 3 files changed, 9 insertions(+), 4 deletions

[Xen-devel] [PATCH v2 07/21] x86/xen: split xen_smp_intr_init()/xen_smp_intr_free()

2017-03-02 Thread Vitaly Kuznetsov
xen_smp_intr_init() and xen_smp_intr_free() have PV-specific code and as a praparatory change to splitting smp.c we need to split these fucntions. Create xen_smp_intr_init_pv()/xen_smp_intr_free_pv(). Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/enlighten_pv.c | 9 + arch/x86/xen/sm

[Xen-devel] [PATCH v2 09/21] x86/xen: split xen_cpu_die()

2017-03-02 Thread Vitaly Kuznetsov
Split xen_cpu_die() into xen_pv_cpu_die() and xen_hvm_cpu_die() to support further splitting of smp.c. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/smp.c | 26 -- 1 file changed, 20 insertions(+), 6 deletions(-) diff --git a/arch/x86/xen/smp.c b/arch/x86/xen/smp.c in

[Xen-devel] [PATCH v2 02/21] x86/xen: globalize have_vcpu_info_placement

2017-03-02 Thread Vitaly Kuznetsov
have_vcpu_info_placement applies to both PV and HVM and as we're going to split the code we need to make it global. Rename to xen_have_vcpu_info_placement. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/enlighten.c | 12 ++-- arch/x86/xen/xen-ops.h | 2 ++ 2 files changed, 8 insert

[Xen-devel] [PATCH v2 05/21] x86/xen: split off enlighten_hvm.c

2017-03-02 Thread Vitaly Kuznetsov
Move PVHVM related code to enlighten_hvm.c. Three functions: xen_cpuhp_setup(), xen_reboot(), xen_emergency_restart() are shared, drop static qualifier from them. These functions will go to common code once it is split from enlighten.c. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/Makefile

[Xen-devel] [PATCH v2 03/21] x86/xen: add CONFIG_XEN_PV to Kconfig

2017-03-02 Thread Vitaly Kuznetsov
All code to supprot Xen PV will get under this new option. For the beginning, check for it in the common code. Signed-off-by: Vitaly Kuznetsov --- arch/x86/kernel/cpu/hypervisor.c | 4 +++- arch/x86/kernel/process_64.c | 2 +- arch/x86/xen/Kconfig | 23 ++-

[Xen-devel] [PATCH v2 08/21] x86/xen: split xen_smp_prepare_boot_cpu()

2017-03-02 Thread Vitaly Kuznetsov
Split xen_smp_prepare_boot_cpu() into xen_pv_smp_prepare_boot_cpu() and xen_hvm_smp_prepare_boot_cpu() to support further splitting of smp.c. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/smp.c | 49 ++--- 1 file changed, 30 insertions(+), 19 deleti

[Xen-devel] [PATCH v2 10/21] x86/xen: split off smp_hvm.c

2017-03-02 Thread Vitaly Kuznetsov
Move PVHVM related code to smp_hvm.c. Drop 'static' qualifier from xen_smp_send_reschedule(), xen_smp_send_call_function_ipi(), xen_smp_send_call_function_single_ipi(), these functions will be moved to common smp code when smp_pv.c is split. Signed-off-by: Vitaly Kuznetsov --- arch/x86/xen/Kconf

[Xen-devel] [PATCH v2 00/21] x86/xen: untangle PV and PVHVM guest support code

2017-03-02 Thread Vitaly Kuznetsov
Changes since v1: - Patches 1,2 and 3 were split and reordered to avoid adding temporary #ifdefs [Juergen Gross] - Juergen's R-b added to what is now patches 14 and 15 (patches 4 and 5 in v1). Due to re-ordering there are some tiny diffrences but I opted for keeping the tag. Some patches are

[Xen-devel] [PATCH v2 01/21] x86/xen: separate PV and HVM hypervisors

2017-03-02 Thread Vitaly Kuznetsov
As a preparation to splitting the code we need to untangle it: x86_hyper_xen -> x86_hyper_xen_hvm and x86_hyper_xen_pv xen_platform() -> xen_platform_hvm() and xen_platform_pv() xen_cpu_up_prepare() -> xen_cpu_up_prepare_pv() and xen_cpu_up_prepare_hvm() xen_cpu_dead() -> xen_cpu_dead_pv() and xen

Re: [Xen-devel] [PATCH v2 5/5] golang/xenlight: Add tests host related functionality functions

2017-03-02 Thread George Dunlap
On 02/03/17 17:36, Ian Jackson wrote: > Ronald Rojas writes ("[PATCH v2 5/5] golang/xenlight: Add tests host related > functionality functions"): >> Create tests for the following functions: >> - GetVersionInfo >> - GetPhysinfo >> - GetDominfo >> - GetMaxCpus >> - GetOnlineCpus >> - GetMaxNodes >>

[Xen-devel] [xen-unstable-smoke test] 106374: tolerable trouble: broken/fail/pass - PUSHED

2017-03-02 Thread osstest service owner
flight 106374 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/106374/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen

Re: [Xen-devel] [PATCH v2 5/5] golang/xenlight: Add tests host related functionality functions

2017-03-02 Thread Ian Jackson
Ronald Rojas writes ("[PATCH v2 5/5] golang/xenlight: Add tests host related functionality functions"): > Create tests for the following functions: > - GetVersionInfo > - GetPhysinfo > - GetDominfo > - GetMaxCpus > - GetOnlineCpus > - GetMaxNodes > - GetFreeMemory I assume this whole series is RF

Re: [Xen-devel] [RFC PATCH v1 21/21] ARM: NUMA: Enable CONFIG_ACPI_NUMA config

2017-03-02 Thread Julien Grall
Hello Vijay, On 09/02/17 15:57, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Enable CONFIG_ACPI_NUMA to enable ACPI NUMA Signed-off-by: Vijaya Kumar --- xen/arch/arm/Kconfig | 4 1 file changed, 4 insertions(+) diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig index fbc4f

Re: [Xen-devel] Xen-unstable: Bisected Host boot failure on AMD Phenom

2017-03-02 Thread Sander Eikelenboom
On 02/03/17 15:55, Andrew Cooper wrote: > On 02/03/17 14:42, Sander Eikelenboom wrote: >> Hi Andrew / Jan, >> >> While testing current xen-unstable staging i ran into my host rebooting in >> early kernel boot. >> Bisection has turned up: >> 5cecf60f439e828f4bc0d2a368ced9a73b130cb7 is the firs

Re: [Xen-devel] [RFC PATCH v1 20/21] ARM: NUMA: Enable CONFIG_NUMA config

2017-03-02 Thread Julien Grall
Hello Vijay, On 09/02/17 15:57, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Enable CONFIG_NUMA to enable DT NUMA Signed-off-by: Vijaya Kumar --- xen/arch/arm/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig index 2e023d1..fbc4f23

Re: [Xen-devel] [RFC PATCH v1 19/21] ARM: NUMA: Initialize ACPI NUMA

2017-03-02 Thread Julien Grall
Hello Vijay, On 09/02/17 15:57, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Call ACPI NUMA initialization under CONFIG_ACPI_NUMA. Signed-off-by: Vijaya Kumar --- xen/arch/arm/numa.c | 12 +++- xen/common/numa.c | 6 ++ 2 files changed, 17 insertions(+), 1 deletion(-)

Re: [Xen-devel] [RFC PATCH v1 18/21] ARM: NUMA: update node_distance with ACPI support

2017-03-02 Thread Julien Grall
Hello Vijay, On 09/02/17 15:57, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Update node_distance() function to handle ACPI SLIT table information. Signed-off-by: Vijaya Kumar --- xen/arch/arm/numa.c | 20 +++- 1 file changed, 19 insertions(+), 1 deletion(-) diff --gi

Re: [Xen-devel] [RFC PATCH v1 16/21] ARM: NUMA: Extract proximity from SRAT table

2017-03-02 Thread Julien Grall
(+ Jan as ACPI maintainer) Hello Vijay, On 09/02/17 15:57, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Register SRAT entry handler for type ACPI_SRAT_TYPE_GICC_AFFINITY to parse SRAT table and extract proximity for all CPU IDs. Signed-off-by: Vijaya Kumar --- xen/arch/arm/acpi_numa.

Re: [Xen-devel] qdisks and stubdomains

2017-03-02 Thread Gémes Géza
2017-03-02 16:29 keltezéssel, Simon Weald írta: Hello I don't know whether this classifies as a bug or missing functionality, but I'm looking to attach Ceph RBD volumes directly to a guest (as opposed to mapping them on the host and then passing the block device to the guest). The rationale for

Re: [Xen-devel] [RFC PATCH] mm, hotplug: get rid of auto_online_blocks

2017-03-02 Thread Igor Mammedov
On Thu, 2 Mar 2017 15:28:16 +0100 Michal Hocko wrote: > On Thu 02-03-17 14:53:48, Igor Mammedov wrote: > [...] > > When trying to support memory unplug on guest side in RHEL7, > > experience shows otherwise. Simplistic udev rule which onlines > > added block doesn't work in case one wants to onli

Re: [Xen-devel] [RFC PATCH v1 15/21] ARM: NUMA: Extract MPIDR from MADT table

2017-03-02 Thread Julien Grall
On 02/03/17 16:41, Vijay Kilari wrote: On Thu, Mar 2, 2017 at 9:58 PM, Julien Grall wrote: Hello Vijay, On 09/02/17 15:57, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Parse MADT table and extract MPIDR for all CPU IDs in MADT ACPI_MADT_TYPE_GENERIC_INTERRUPT entries and store in c

Re: [Xen-devel] [RFC PATCH v1 15/21] ARM: NUMA: Extract MPIDR from MADT table

2017-03-02 Thread Vijay Kilari
On Thu, Mar 2, 2017 at 9:58 PM, Julien Grall wrote: > Hello Vijay, > > On 09/02/17 15:57, vijay.kil...@gmail.com wrote: >> >> From: Vijaya Kumar K >> >> Parse MADT table and extract MPIDR for all >> CPU IDs in MADT ACPI_MADT_TYPE_GENERIC_INTERRUPT entries >> and store in cpu_uid_to_hwid[]. >> >>

Re: [Xen-devel] [PATCH 7/7] x86/pagewalk: Re-implement the pagetable walker

2017-03-02 Thread Tim Deegan
At 14:03 + on 27 Feb (1488204198), Andrew Cooper wrote: > The existing pagetable walker has complicated return semantics, which squeeze > multiple pieces of information into single integer. This would be fine if the > information didn't overlap, but it does. > > Specifically, _PAGE_INVALID_BI

Re: [Xen-devel] [RFC PATCH v1 13/21] ACPI: Refactor acpi SRAT and SLIT table handling code

2017-03-02 Thread Julien Grall
On 02/03/17 16:31, Vijay Kilari wrote: On Thu, Mar 2, 2017 at 9:00 PM, Julien Grall wrote: Missing emacs magic here. You mean this at the end of the file? Yes. /* * Local variables: * mode: C * c-file-style: "BSD" * c-basic-offset: 4 * indent-tabs-mode: nil * End: */ -- Julien

Re: [Xen-devel] [RFC PATCH v1 13/21] ACPI: Refactor acpi SRAT and SLIT table handling code

2017-03-02 Thread Vijay Kilari
On Thu, Mar 2, 2017 at 9:00 PM, Julien Grall wrote: > Hello Vijay, > > On 09/02/17 15:57, vijay.kil...@gmail.com wrote: >> >> From: Vijaya Kumar K >> >> Move SRAT handling code which is common across >> architecture is moved to new file xen/commom/srat.c >> from xen/arch/x86/srat.c file. New head

Re: [Xen-devel] [RFC PATCH v1 15/21] ARM: NUMA: Extract MPIDR from MADT table

2017-03-02 Thread Julien Grall
Hello Vijay, On 09/02/17 15:57, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Parse MADT table and extract MPIDR for all CPU IDs in MADT ACPI_MADT_TYPE_GENERIC_INTERRUPT entries and store in cpu_uid_to_hwid[]. This mapping is used by SRAT table parsing to extract MPIDR of the CPU ID. Si

Re: [Xen-devel] [RFC PATCH v1 11/21] ARM: NUMA: Add fallback on NUMA failure

2017-03-02 Thread Vijay Kilari
On Thu, Mar 2, 2017 at 9:39 PM, Julien Grall wrote: > Hello Vijay, > > On 09/02/17 15:57, vijay.kil...@gmail.com wrote: >> >> From: Vijaya Kumar K >> >> On NUMA initialization failure, reset all the >> NUMA structures to emulate as single node. >> >> Signed-off-by: Vijaya Kumar >> --- >> xen/ar

Re: [Xen-devel] [RFC PATCH v1 10/21] ARM: NUMA: Add memory NUMA support

2017-03-02 Thread Vijay Kilari
On Thu, Mar 2, 2017 at 9:35 PM, Julien Grall wrote: > Hello Vijay, > > > On 09/02/17 15:57, vijay.kil...@gmail.com wrote: >> >> From: Vijaya Kumar K >> >> For all banks in bootinfo.mem, update nodes[] with >> corresponding nodeid and register these nodes by >> calling setup_node_bootmem(). >> com

Re: [Xen-devel] [PATCH 2/7] x86/shadow: Try to correctly identify implicit supervisor accesses

2017-03-02 Thread Tim Deegan
At 14:03 + on 27 Feb (1488204193), Andrew Cooper wrote: > Signed-off-by: Andrew Cooper Reviewed-by: Tim Deegan ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

[Xen-devel] [linux-linus test] 106354: regressions - FAIL

2017-03-02 Thread osstest service owner
flight 106354 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/106354/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254 test-armhf-armhf-xl

Re: [Xen-devel] [PATCH 6/7] x86/pagewalk: Consistently use guest_walk_*() helpers for translation

2017-03-02 Thread Tim Deegan
At 14:03 + on 27 Feb (1488204197), Andrew Cooper wrote: > hap_p2m_ga_to_gfn() and sh_page_fault() currently use guest_l1e_get_gfn() to > obtain the translation of a pagewalk. This is conceptually wrong (the > semantics of gw.l1e is an internal detail), and will actually be wrong when > PSE36 s

Re: [Xen-devel] [PATCH 3/7] x86/pagewalk: Helpers for reserved bit handling

2017-03-02 Thread Tim Deegan
At 14:03 + on 27 Feb (1488204194), Andrew Cooper wrote: > Some bits are unconditionally reserved in pagetable entries, or reserved > because of alignment restrictions. Other bits are reserved because of control > register configuration. > > Introduce helpers which take an individual vcpu and

Re: [Xen-devel] [PATCH 1/7] x86/hvm: Correctly identify implicit supervisor accesses

2017-03-02 Thread Tim Deegan
At 14:03 + on 27 Feb (1488204192), Andrew Cooper wrote: > All actions which refer to the active ldt/gdt/idt or task register > (e.g. loading a new segment selector) are known as implicit supervisor > accesses, even when the access originates from user code. > > The distinction is necessary in

Re: [Xen-devel] [RFC PATCH v1 11/21] ARM: NUMA: Add fallback on NUMA failure

2017-03-02 Thread Julien Grall
Hello Vijay, On 09/02/17 15:57, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K On NUMA initialization failure, reset all the NUMA structures to emulate as single node. Signed-off-by: Vijaya Kumar --- xen/arch/arm/numa.c | 50 -- 1 file cha

[Xen-devel] [PATCH v2 4/5] golang/xenlight: Implement libxl_domain_info and libxl_domain_unpause

2017-03-02 Thread Ronald Rojas
Add calls for the following host-related functionality: - libxl_domain_info - libxl_domain_unpause Include Golang version for the libxl_domain_info as DomainInfo. Signed-off-by: George Dunlap Signed-off-by: Ronald Rojas --- Changes since last version - Created type and enumeration of DomainType

[Xen-devel] [PATCH v2 2/5] golang/xenlight: Add error constants and standard handling

2017-03-02 Thread Ronald Rojas
Create error type Errorxl for throwing proper xenlight errors. Update Ctx functions to throw Errorxl errors. Signed-off-by: Ronald Rojas --- Changes since last patch: - Whitespace fixes CC: xen-devel@lists.xen.org CC: george.dun...@citrix.com CC: ian.jack...@eu.citrix.com CC: wei.l...@citrix.c

[Xen-devel] [PATCH v2 1/5] golang/xenlight: Create stub package

2017-03-02 Thread Ronald Rojas
Create a basic Makefile to build and install libxenlight Golang bindings. Also add a stub package which only opens libxl context. Include a global xenlight.Ctx variable which can be used as the default context by the entire program if desired. For now, return simple errors. Proper error handling

Re: [Xen-devel] [RFC PATCH v1 10/21] ARM: NUMA: Add memory NUMA support

2017-03-02 Thread Julien Grall
Hello Vijay, On 09/02/17 15:57, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K For all banks in bootinfo.mem, update nodes[] with corresponding nodeid and register these nodes by calling setup_node_bootmem(). compute memnode_shift and initialize memnodemap[] to fetch nodeid for a given phy

Re: [Xen-devel] [PATCH 1/2] x86/hvm: Don't raise #GP behind the emulators back for CR accesses

2017-03-02 Thread Boris Ostrovsky
On 03/02/2017 09:59 AM, Andrew Cooper wrote: > hvm_set_cr{0,4}() are reachable from the emulator, but use > hvm_inject_hw_exception() directly. > > Alter the API to make the callers of hvm_set_cr{0,3,4}() responsible for > raising #GP, and apply this change to all existing callers. > > Signed-off-b

Re: [Xen-devel] [PATCH 1/2] x86/hvm: Don't raise #GP behind the emulators back for CR accesses

2017-03-02 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: 02 March 2017 15:00 > To: Xen-devel > Cc: Andrew Cooper ; Jan Beulich > ; Paul Durrant ; Jun > Nakajima ; Kevin Tian ; > Boris Ostrovsky ; Suravee Suthikulpanit > > Subject: [PATCH 1/2] x86/hvm: Don't ra

Re: [Xen-devel] [PATCH] x86/microcode: Replace sync_core() with cpuid_eax()

2017-03-02 Thread Jan Beulich
>>> On 02.03.17 at 16:39, wrote: > From: Andy Lutomirski > > The Intel microcode driver is using sync_core() to mean "do CPUID > with EAX=1". > > Signed-off-by: Andy Lutomirski > Acked-by: Borislav Petkov > [Linux commit 484d0e5c7943644cc46e7308a8f9d83be598f2b9] > [Ported to Xen] > Signed-off

[Xen-devel] [PATCH] x86/microcode: Replace sync_core() with cpuid_eax()

2017-03-02 Thread Andrew Cooper
From: Andy Lutomirski The Intel microcode driver is using sync_core() to mean "do CPUID with EAX=1". Signed-off-by: Andy Lutomirski Acked-by: Borislav Petkov [Linux commit 484d0e5c7943644cc46e7308a8f9d83be598f2b9] [Ported to Xen] Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/arch

Re: [Xen-devel] [PATCH] xen/common: low performance of lib/sort.c

2017-03-02 Thread Jan Beulich
>>> On 02.03.17 at 16:27, wrote: > From: keios > > It is a non-standard heap-sort algorithm implementation because the index > of child node is wrong . The sort function still outputs right result, but > the performance is O( n * ( log(n) + 1 ) ) , about 10% ~ 20% worse than > standard algorith

Re: [Xen-devel] [PATCH] x86/SVM: correct boot time cpu_data[] handling

2017-03-02 Thread Andrew Cooper
On 02/03/17 15:33, Jan Beulich wrote: On 02.03.17 at 16:06, wrote: >> On 02/03/17 13:08, Jan Beulich wrote: >>> start_svm() already runs after cpu_data[] was set up, so it shouldn't >>> modify it anymore (at least not directly). Constify the involved >>> pointers. >>> >>> Furthermore LMSLE fe

  1   2   3   >