[Xen-devel] [PATCH v5 1/2] libxl: Implement the handler to handle unrecoverable AER errors

2018-03-13 Thread Venu Busireddy
Implement the callback function to handle unrecoverable AER errors, and also the public APIs that can be used to register/unregister the handler. When an AER error occurs, the handler will forcibly remove the erring PCIe device from the guest. Signed-off-by: Venu Busireddy

[Xen-devel] [PATCH v5 2/2] xl: Register the AER event handler that handles AER errors

2018-03-13 Thread Venu Busireddy
When a guest is created, register the AER event handler to handle the AER errors. When an AER error occurs, the handler will forcibly remove the erring PCIe device from the guest. Signed-off-by: Venu Busireddy Signed-off-by: Wim Ten Have ---

[Xen-devel] [xen-unstable-smoke test] 120685: regressions - FAIL

2018-03-13 Thread osstest service owner
flight 120685 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/120685/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 120679 build-armhf

Re: [Xen-devel] Modifying domain creation interface

2018-03-13 Thread Juergen Gross
On 13/03/18 17:08, Wei Liu wrote: > On Wed, Feb 21, 2018 at 03:08:23PM +0100, Juergen Gross wrote: >> Creating a new domain currently is a sequence of hypercalls with many of >> those being mandatory and needed in a specific sequence. Its has been >> discussed before to build a new interface for

[Xen-devel] [PATCH v5 0/2] Containing AER unrecoverable errors

2018-03-13 Thread Venu Busireddy
This patch set is part of a set of patches that together allow containment of unrecoverable AER errors from PCIe devices assigned to guests in passthrough mode. The containment is achieved by forcibly removing the erring PCIe device from the guest. The original xen-pciback patch corresponding to

Re: [Xen-devel] [PATCH] tools/xl: fix uninitialized variable in xl_vdispl

2018-03-13 Thread Jan Beulich
>>> On 13.03.18 at 05:43, wrote: > The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc > uninitialized in main_vdisplattach(). > > Signed-off-by: Doug Goldstein > --- > CC: Oleksandr Grytsov > --- >

Re: [Xen-devel] [PATCH 2/2] x86: use invpcid to do global flushing

2018-03-13 Thread Jan Beulich
>>> On 12.03.18 at 14:10, wrote: > BTW: are you already working on rebasing your XPTI speed up series to > current staging? I'd like my series to use your series as a base unless > you are telling me you won't be able to resend your series soon. Coming back to my reply here

Re: [Xen-devel] [PATCHv3] xen: Add EFI_LOAD_OPTION support

2018-03-13 Thread Jan Beulich
>>> On 12.03.18 at 16:00, wrote: > Patch ping. Jan, I would like to touch base once more to see if we can > get this patch included in 4.11. The patch as-is correctly tells the > difference between buffers provided by both an EFI shell or by the > firmware as an

Re: [Xen-devel] [PATCH 2/2] x86: use invpcid to do global flushing

2018-03-13 Thread Andrew Cooper
On 13/03/2018 10:22, Jan Beulich wrote: On 13.03.18 at 10:48, wrote: >> On 13/03/18 10:35, Jan Beulich wrote: >> On 13.03.18 at 10:27, wrote: On 13/03/18 09:07, Jan Beulich wrote: On 12.03.18 at 14:10, wrote: >> BTW:

[Xen-devel] [qemu-mainline test] 120480: regressions - trouble: broken/fail/pass

2018-03-13 Thread osstest service owner
flight 120480 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/120480/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-arndale broken test-amd64-amd64-qemuu-nested-intel 14

Re: [Xen-devel] [alsa-devel] [PATCH 0/2] sndif: add explicit back and front synchronization

2018-03-13 Thread Oleksandr Andrushchenko
Hi, On 03/12/2018 08:26 AM, Oleksandr Andrushchenko wrote: On 03/11/2018 10:15 AM, Takashi Iwai wrote: Hi, sorry for the long latency. Hi, no problem, thank you On Wed, 07 Mar 2018 09:49:24 +0100, Oleksandr Andrushchenko wrote: Suppose that we negotiate from the frontend to the backend

[Xen-devel] [linux-3.18 test] 120486: regressions - FAIL

2018-03-13 Thread osstest service owner
flight 120486 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/120486/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 10 redhat-install fail REGR. vs. 120276

Re: [Xen-devel] [PATCH 2/2] x86: use invpcid to do global flushing

2018-03-13 Thread Juergen Gross
On 13/03/18 09:07, Jan Beulich wrote: On 12.03.18 at 14:10, wrote: >> BTW: are you already working on rebasing your XPTI speed up series to >> current staging? I'd like my series to use your series as a base unless >> you are telling me you won't be able to resend your

Re: [Xen-devel] [PATCH 1/3] SUPPORT.md: Clarify that the PV keyboard protocol includes mouse support

2018-03-13 Thread Jan Beulich
>>> On 11.03.18 at 16:26, wrote: >> -Original Message- >> From: George Dunlap [mailto:george.dun...@citrix.com] >> Sent: 09 March 2018 18:04 >> To: xen-devel@lists.xenproject.org >> Cc: George Dunlap ; Ian Jackson >>

Re: [Xen-devel] [PATCH] libxl/pvh: force PVH guests to use the xenstore shutdown

2018-03-13 Thread Roger Pau Monné
On Tue, Mar 06, 2018 at 03:56:58PM +, Ian Jackson wrote: > Roger Pau Monné writes ("Re: [PATCH] libxl/pvh: force PVH guests to use the > xenstore shutdown"): > > On Tue, Dec 19, 2017 at 02:48:47PM +, Ian Jackson wrote: > > > I think this is a candidate for backporting as far as 4.9 ? > >

Re: [Xen-devel] [PATCH v1] Rename DEBUG_DIR to XEN_DEBUG_DIR

2018-03-13 Thread Roger Pau Monné
On Mon, Mar 12, 2018 at 04:45:51PM +0100, Olaf Hering wrote: > The usage of DEBUG_DIR breaks OVMF build. Rename it to XEN_DEBUG_DIR. > > The default DEBUG_DIR=/usr/lib/debug can not be used for rpm builds > because that directory is "owned" by rpm-packaging itself to store the > autogenerated

Re: [Xen-devel] [PATCH 1/2] make xen ocaml safe-strings compliant

2018-03-13 Thread Christian Lindig
On 12/03/18 19:35, Michael Young wrote: Here is version 4 of the patch where I have replaced the uses of s with b where the patch changes it from string to bytes. I have also removed the two trailing spaces and changed stmp back to s. Michael Young

Re: [Xen-devel] [PATCH v4] tools: detect appropriate debug optimization level

2018-03-13 Thread Wei Liu
On Mon, Mar 12, 2018 at 11:06:51PM -0500, Doug Goldstein wrote: > When building debug use -Og as the optimization level if its available, > otherwise retain the use of -O0. -Og has been added by GCC to enable all > optimizations that to not affect debugging while retaining full > debugability. >

[Xen-devel] [linux-4.9 test] 120487: regressions - FAIL

2018-03-13 Thread osstest service owner
flight 120487 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/120487/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemuu-rhel6hvm-amd 10 redhat-install fail REGR. vs. 120260 Tests which did not

Re: [Xen-devel] [PATCH] x86: ignore guest microcode loading attempts

2018-03-13 Thread Andrew Cooper
On 13/03/2018 10:13, Jan Beulich wrote: > The respective MSRs are write-only, and hence attempts by guests to > write to these are - as of 1f1d183d49 ("x86/HVM: don't give the wrong > impression of WRMSR succeeding") no longer ignored. Restore original > behavior for the two affected MSRs. > >

[Xen-devel] [PATCH 0/2] libxl: Update of QMP xen-save-devices-state

2018-03-13 Thread Anthony PERARD
Handle a new parameter of an existing QMP command. See patch 2 (libxl_qmp: Tell QEMU about live migration or snapshot) for more information. Anthony PERARD (2): libxl: Add a version check of QEMU for QMP commands libxl_qmp: Tell QEMU about live migration or snapshot

Re: [Xen-devel] [PATCH 3/3] docs: Remove redundant qemu-xen-security document

2018-03-13 Thread Jan Beulich
>>> On 12.03.18 at 13:09, wrote: > On 03/11/2018 08:29 PM, Stefano Stabellini wrote: >> On Fri, 9 Mar 2018, George Dunlap wrote: >>> All this information is now covered in SUPPORT.md. >>> >>> Most of the emulated hardware is obvious a couple of the items are >>> worth

Re: [Xen-devel] [PATCH 2/2] x86: use invpcid to do global flushing

2018-03-13 Thread Jan Beulich
>>> On 13.03.18 at 10:27, wrote: > On 13/03/18 09:07, Jan Beulich wrote: > On 12.03.18 at 14:10, wrote: >>> BTW: are you already working on rebasing your XPTI speed up series to >>> current staging? I'd like my series to use your series as a base unless >>>

Re: [Xen-devel] [PATCH 2/2] x86: use invpcid to do global flushing

2018-03-13 Thread Juergen Gross
On 13/03/18 10:35, Jan Beulich wrote: On 13.03.18 at 10:27, wrote: >> On 13/03/18 09:07, Jan Beulich wrote: >> On 12.03.18 at 14:10, wrote: BTW: are you already working on rebasing your XPTI speed up series to current staging? I'd like my

Re: [Xen-devel] [PATCH 2/2] x86: use invpcid to do global flushing

2018-03-13 Thread Jan Beulich
>>> On 13.03.18 at 10:48, wrote: > On 13/03/18 10:35, Jan Beulich wrote: > On 13.03.18 at 10:27, wrote: >>> On 13/03/18 09:07, Jan Beulich wrote: >>> On 12.03.18 at 14:10, wrote: > BTW: are you already working on rebasing your XPTI

[Xen-devel] [seabios test] 120514: regressions - FAIL

2018-03-13 Thread osstest service owner
flight 120514 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/120514/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539 Tests which are

Re: [Xen-devel] [PATCH] tools/xl: fix uninitialized variable in xl_vdispl

2018-03-13 Thread George Dunlap
On 03/13/2018 04:43 AM, Doug Goldstein wrote: > The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc > uninitialized in main_vdisplattach(). > > Signed-off-by: Doug Goldstein It looks like that was designed on purpose to use the uninitialized warnings to

[Xen-devel] [PATCH 2/2] libxl_qmp: Tell QEMU about live migration or snapshot

2018-03-13 Thread Anthony PERARD
Since version 2.10, QEMU will lock the disk images so a second QEMU instance will not try to open it. This would prevent live migration from working correctly. A new parameter as been added to the QMP command "xen-save-devices-state" in QEMU version 2.11 which allow to unlock the disk image for a

[Xen-devel] [PATCH 1/2] libxl: Add a version check of QEMU for QMP commands

2018-03-13 Thread Anthony PERARD
On connection to QEMU via QMP, the version of QEMU is provided, store it for later use. Add a function qmp_qemu_check_version that can be used to check if QEMU is new enough for certain fonctionnality. This will be used in a moment. As it's a static function, it is commented out until first use,

[Xen-devel] [libvirt test] 120496: tolerable all pass - PUSHED

2018-03-13 Thread osstest service owner
flight 120496 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/120496/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 120326 test-armhf-armhf-libvirt 14

Re: [Xen-devel] [Qemu-devel] [RFC PATCH 00/30] Xen Q35 Bringup patches + support for PCIe Extended Capabilities for passed through devices

2018-03-13 Thread Daniel P . Berrangé
The subject line says to expect 30 patches, but you've only sent 18 to the list here. I eventually figured out that the first 12 patches were in Xen code and so not sent to qemu-devel. For future if you have changes that affect multiple completely separate projects, send them as separate series.

[Xen-devel] [PATCH] x86: ignore guest microcode loading attempts

2018-03-13 Thread Jan Beulich
The respective MSRs are write-only, and hence attempts by guests to write to these are - as of 1f1d183d49 ("x86/HVM: don't give the wrong impression of WRMSR succeeding") no longer ignored. Restore original behavior for the two affected MSRs. Signed-off-by: Jan Beulich ---

Re: [Xen-devel] [PATCH] tools/xl: fix uninitialized variable in xl_vdispl

2018-03-13 Thread Oleksandr Grytsov
On Tue, Mar 13, 2018 at 10:03 AM, Jan Beulich wrote: > >>> On 13.03.18 at 05:43, wrote: > > The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc > > uninitialized in main_vdisplattach(). > > > > Signed-off-by: Doug Goldstein

Re: [Xen-devel] [Qemu-devel] [RFC PATCH 00/30] Xen Q35 Bringup patches + support for PCIe Extended Capabilities for passed through devices

2018-03-13 Thread Daniel P . Berrangé
On Tue, Mar 13, 2018 at 09:37:55PM +1000, Alexey G wrote: > On Tue, 13 Mar 2018 09:21:54 + > Daniel P. Berrangé wrote: > > >The subject line says to expect 30 patches, but you've only sent 18 to > >the list here. I eventually figured out that the first 12 patches were >

[Xen-devel] [rumprun bisection] complete build-amd64-rumprun

2018-03-13 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job build-amd64-rumprun testid rumprun-build Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git Tree: qemuu git://xenbits.xen.org/qemu-xen.git Tree: rumprun https://github.com/rumpkernel/rumprun Tree: rumprun_buildrumpsh

Re: [Xen-devel] [PATCH 4/7] x86/domain: Remove unused parameters from {hvm, pv}_domain_initialise()

2018-03-13 Thread Roger Pau Monné
On Fri, Mar 09, 2018 at 01:18:39PM +, Andrew Cooper wrote: > Neither domcr_flags nor config are used on either side. Drop them, making > {hvm,pv}_domain_initialise() symmetric with all the other domain/vcpu > initialise/destroy calls. > > Signed-off-by: Andrew Cooper

Re: [Xen-devel] [PATCH 2/3] SUPPORT.md: Specify support for various image formats

2018-03-13 Thread Jan Beulich
>>> On 09.03.18 at 19:03, wrote: > QEMU supports various image formats, but we only provide security > support for raw, qcow, qcow2, and vhd formats. > > Rather than duplicate this information under the "x86/Emulated > storage" section, just refer to the "Blkback"

Re: [Xen-devel] [PATCH] xl: remove apic option for PVH guests

2018-03-13 Thread Roger Pau Monné
On Mon, Mar 05, 2018 at 08:43:48AM -0600, Doug Goldstein wrote: > On 3/2/18 5:29 AM, Jan Beulich wrote: > On 02.03.18 at 12:09, wrote: > >> On Thu, Mar 01, 2018 at 05:01:55PM +, Roger Pau Monné wrote: > >>> On Thu, Mar 01, 2018 at 04:01:23PM +, Wei Liu wrote: >

Re: [Xen-devel] [PATCH 1/1] x86/PVHv2: Add memory map pointer to hvm_start_info struct

2018-03-13 Thread Roger Pau Monné
On Fri, Mar 02, 2018 at 12:54:29PM -0800, Maran Wilson wrote: > The start info structure that is defined as part of the x86/HVM direct boot > ABI and used for starting Xen PVH guests would be more versatile if it also > included a way to pass information about the memory map to the guest. This >

Re: [Xen-devel] [Qemu-devel] [RFC PATCH 00/30] Xen Q35 Bringup patches + support for PCIe Extended Capabilities for passed through devices

2018-03-13 Thread Alexey G
On Tue, 13 Mar 2018 09:21:54 + Daniel P. Berrangé wrote: >The subject line says to expect 30 patches, but you've only sent 18 to >the list here. I eventually figured out that the first 12 patches were >in Xen code and so not sent to qemu-devel. > >For future if you have

Re: [Xen-devel] [Qemu-devel] [RFC PATCH 16/30] q35/xen: Add Xen platform device support for Q35

2018-03-13 Thread Daniel P . Berrangé
On Tue, Mar 13, 2018 at 04:34:01AM +1000, Alexey Gerasimenko wrote: > Current Xen/QEMU method to control Xen Platform device on i440 is a bit > odd -- enabling/disabling Xen platform device actually modifies the QEMU > emulated machine type, namely xenfv <--> pc. > > In order to avoid multiplying

Re: [Xen-devel] [PATCH] x86: ignore guest microcode loading attempts

2018-03-13 Thread Jan Beulich
>>> On 13.03.18 at 11:36, wrote: > On 13/03/2018 10:13, Jan Beulich wrote: >> The respective MSRs are write-only, and hence attempts by guests to >> write to these are - as of 1f1d183d49 ("x86/HVM: don't give the wrong >> impression of WRMSR succeeding") no longer

Re: [Xen-devel] [PATCH 01/12] arm:Kconfig Rename menu text

2018-03-13 Thread Julien Grall
Hi, On 12/03/18 12:42, mja...@caviumnetworks.com wrote: From: Manish Jaggi Rename the menu text to Errata Workarounds. Subsequent patches will add config options for SoC specific erratas. Well, your SoC is an Arm SoC, right? So what is the benefits of this new

Re: [Xen-devel] [PATCH 5/7] x86/domain: Optimise the order of actions in arch_domain_create()

2018-03-13 Thread Roger Pau Monné
On Fri, Mar 09, 2018 at 01:18:40PM +, Andrew Cooper wrote: > The only relevent initialisation for the idle domain is the context switch and ^ relevant > poisoned pointers. Collect these bits together early in the function and exit > when complete (although as a consequence, the

[Xen-devel] [PATCH v3 4/6] x86/XPTI: use %r12 to write zero into xen_cr3

2018-03-13 Thread Jan Beulich
Now that we zero all registers early on all entry paths, use that to avoid a couple of immediates here. Signed-off-by: Jan Beulich --- We may want to consider eliminating a few more $0 this way. But especially for byte ones I'm not sure it's worth it, due to the REX prefix the

Re: [Xen-devel] [PATCH 04/12] Enable Group1 Traps by default for Cavium ThunderX1

2018-03-13 Thread Julien Grall
Hi, title: "arm64: ...". On 12/03/18 12:42, mja...@caviumnetworks.com wrote: From: Manish Jaggi Enable trapping for Group1 register access when CONFIG_CAVIUM_ERRATUM_30115 is enabled. This is really odd to enable group1 trapping before the sysreg are actually

Re: [Xen-devel] [PATCH 7/7] xen/mm: Clean up share_xen_page_with_guest() API

2018-03-13 Thread Roger Pau Monné
On Fri, Mar 09, 2018 at 01:18:42PM +, Andrew Cooper wrote: > The share_xen_page_with_guest() functions are used by common code, and are > implemented the same by each arch. Move the declarations into the common mm.h > rather than duplicating them in each arch/mm.h > > Turn an int readonly

[Xen-devel] [PATCH v2 1/8] drm/xen-front: Introduce Xen para-virtualized frontend driver

2018-03-13 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Introduce skeleton of the para-virtualized Xen display frontend driver. This patch only adds required essential stubs. Signed-off-by: Oleksandr Andrushchenko --- drivers/gpu/drm/Kconfig

[Xen-devel] [PATCH v3 2/6] x86: disable XPTI when RDCL_NO

2018-03-13 Thread Jan Beulich
Use the respective ARCH_CAPABILITIES MSR bit, but don't expose the MSR to guests yet. Signed-off-by: Jan Beulich Tested-by: Juergen Gross Reviewed-by: Juergen Gross --- v3: Re-base. v2: New. --- a/tools/libxl/libxl_cpuid.c +++

[Xen-devel] [PATCH v3 3/6] x86: log XPTI enabled status

2018-03-13 Thread Jan Beulich
At the same time also report the state of the two defined ARCH_CAPABILITIES MSR bits. To avoid further complicating the conditional around that printk(), drop it (it's a debug level one only anyway). Signed-off-by: Jan Beulich Tested-by: Juergen Gross

[Xen-devel] [PATCH v2 2/6] x86: fix OLDINSTR_2()

2018-03-13 Thread Jan Beulich
Its as_max() invocation was wrongly parenthesized. Signed-off-by: Jan Beulich --- v3: New. --- a/xen/include/asm-x86/alternative.h +++ b/xen/include/asm-x86/alternative.h @@ -54,8 +54,8 @@ extern void alternative_instructions(voi #define OLDINSTR_2(oldinstr, n1, n2)

[Xen-devel] [PATCH v2 1/6] x86: remove page.h and processor.h inclusion from asm_defns.h

2018-03-13 Thread Jan Beulich
Subsequent changes require this (too wide anyway imo) dependency to be dropped. Signed-off-by: Jan Beulich --- a/xen/arch/x86/boot/head.S +++ b/xen/arch/x86/boot/head.S @@ -5,6 +5,7 @@ #include #include #include +#include #include #include #include ---

Re: [Xen-devel] [PATCH] tools/xl: fix uninitialized variable in xl_vdispl

2018-03-13 Thread Wei Liu
On Tue, Mar 13, 2018 at 10:56:35AM +, George Dunlap wrote: > On 03/13/2018 04:43 AM, Doug Goldstein wrote: > > The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc > > uninitialized in main_vdisplattach(). > > > > Signed-off-by: Doug Goldstein > > It

Re: [Xen-devel] [PATCH 03/12] arm64: Add config for Cavium Thunder erratum 30115

2018-03-13 Thread Julien Grall
Hi, On 12/03/18 12:42, mja...@caviumnetworks.com wrote: From: Manish Jaggi Some Cavium Thunder CPUs suffer a problem where a KVM guest may inadvertently cause the host kernel to quit receiving interrupts. This patch adds CONFIG_CAVIUM_ERRATUM_30115. Subsequent patches

Re: [Xen-devel] Regression with commit "x86/pv: Drop int80_bounce from struct pv_vcpu" f75b1a5247b3b311d3aa50de4c0e5f2d68085cb1

2018-03-13 Thread Juergen Gross
On 13/03/18 12:34, Sander Eikelenboom wrote: > On 12/03/18 21:04, Boris Ostrovsky wrote: >> On 03/12/2018 03:05 PM, Andrew Cooper wrote: >>> On 10/03/18 16:27, Andrew Cooper wrote: On 10/03/2018 16:14, Sander Eikelenboom wrote: > Hi Andrew, > > It seems commit "x86/pv: Drop

[Xen-devel] [PATCH v3 0/6] x86: Meltdown band-aid overhead reduction

2018-03-13 Thread Jan Beulich
1: NOP out most XPTI entry/exit code when it's not in use 2: disable XPTI when RDCL_NO 3: x86: log XPTI enabled status 4: use %r12 to write zero into xen_cr3 5: reduce .text.entry 6: avoid double CR3 reload when switching to guest user mode Signed-off-by: Jan Beulich

[Xen-devel] [PATCH v3 1/6] x86: NOP out XPTI entry/exit code when it's not in use

2018-03-13 Thread Jan Beulich
Introduce a synthetic feature flag to use alternative instruction patching to NOP out all code on entry/exit paths. Having NOPs here is generally better than using conditional branches. Also change the limit on the number of bytes we can patch in one go to that resulting from the encoding in

[Xen-devel] [PATCH v2 4/6] x86: use PDEP/PEXT for maddr/direct-map-offset conversion when available

2018-03-13 Thread Jan Beulich
Both replace 6 instructions by a single one, further reducing code size, cache, and TLB footprint (in particular on systems supporting BMI2). Signed-off-by: Jan Beulich --- v2: Avoid quoted symbols; use gcc's new V operand modifier instead. Re-base. ---

[Xen-devel] [PATCH v2 3/6] x86: use PDEP for PTE flags insertion when available

2018-03-13 Thread Jan Beulich
This allows to fold 5 instructions into a single one, reducing code size quite a bit, especially when not considering the fallback functions (which won't ever need to be brought into iCache or their mappings into iTLB on systems supporting BMI2). Make use of gcc's new V operand modifier, even if

Re: [Xen-devel] [PATCH v1] Rename DEBUG_DIR to XEN_DEBUG_DIR

2018-03-13 Thread Olaf Hering
Am Tue, 13 Mar 2018 11:56:51 + schrieb Roger Pau Monné : > Do you think that would solve your issues? This will most likely work, yes. Thanks. Olaf pgpOkexrAA35u.pgp Description: Digitale Signatur von OpenPGP ___ Xen-devel

[Xen-devel] [PATCH v2 2/8] drm/xen-front: Implement Xen bus state handling

2018-03-13 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Initial handling for Xen bus states: implement Xen bus state machine for the frontend driver according to the state diagram and recovery flow from display para-virtualized protocol: xen/interface/io/displif.h. Signed-off-by:

[Xen-devel] [PATCH v2 7/8] drm/xen-front: Implement GEM operations and backend communication

2018-03-13 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Implement GEM handling depending on driver mode of operation: depending on the requirements for the para-virtualized environment, namely requirements dictated by the accompanying DRM/(v)GPU drivers running in both host and guest

[Xen-devel] [PATCH v2 4/8] drm/xen-front: Implement Xen event channel handling

2018-03-13 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Handle Xen event channels: - create for all configured connectors and publish corresponding ring references and event channels in Xen store, so backend can connect - implement event channels interrupt handlers - create

[Xen-devel] [PATCH v2 5/8] drm/xen-front: Implement handling of shared display buffers

2018-03-13 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Implement shared buffer handling according to the para-virtualized display device protocol at xen/interface/io/displif.h: - handle page directories according to displif protocol: - allocate and share page directories -

[Xen-devel] [PATCH v2 0/8] drm/xen-front: Add support for Xen PV display frontend

2018-03-13 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Hello! This patch series adds support for Xen [1] para-virtualized frontend display driver. It implements the protocol from include/xen/interface/io/displif.h [2]. Accompanying backend [3] is implemented as a user-space application

[Xen-devel] [PATCH v2 3/8] drm/xen-front: Read driver configuration from Xen store

2018-03-13 Thread Oleksandr Andrushchenko
From: Oleksandr Andrushchenko Read configuration values from Xen store according to xen/interface/io/displif.h protocol: - read connector(s) configuration - read buffer allocation mode (backend/frontend) Signed-off-by: Oleksandr Andrushchenko

[Xen-devel] [PATCH v2 0/6] x86: improve PDX <-> PFN and alike translations

2018-03-13 Thread Jan Beulich
1: remove page.h and processor.h inclusion from asm_defns.h 2: x86: fix OLDINSTR_2() 3: use PDEP for PTE flags insertion when available 4: use PDEP/PEXT for maddr/direct-map-offset conversion when available 5: use PDEP/PEXT for PFN/PDX conversion when available 6: use MOV for PFN/PDX conversion

[Xen-devel] [PATCH v2 6/6] x86: use MOV for PFN/PDX conversion when possible

2018-03-13 Thread Jan Beulich
... and (of course) also maddr / direct-map-offset ones. Most x86 systems don't actually require the use of PDX compression. Now that we have patching for the conversion code in place anyway, extend it to use simple MOV when possible. Introduce a new pseudo-CPU-feature to key the patching off of.

[Xen-devel] [PATCH v2 5/6] x86: use PDEP/PEXT for PFN/PDX conversion when available

2018-03-13 Thread Jan Beulich
Both replace 6 instructions by a single one, further reducing code size, cache, and TLB footprint (in particular on systems supporting BMI2). Signed-off-by: Jan Beulich --- v2: Avoid quoted symbols; use gcc's new V operand modifier instead. Re-base. ---

Re: [Xen-devel] [PATCH] xl: remove apic option for PVH guests

2018-03-13 Thread Wei Liu
On Tue, Mar 13, 2018 at 10:31:20AM +, Roger Pau Monné wrote: > On Mon, Mar 05, 2018 at 08:43:48AM -0600, Doug Goldstein wrote: > > On 3/2/18 5:29 AM, Jan Beulich wrote: > > On 02.03.18 at 12:09, wrote: > > >> On Thu, Mar 01, 2018 at 05:01:55PM +, Roger Pau Monné

Re: [Xen-devel] [PATCH 00/12] arm64: Mediate access to GICv3 sysregs at EL2

2018-03-13 Thread Julien Grall
Hi, Manish, I don't monitor my linaro email and would appreciate if you use the e-mail address provided by MAINTAINERS. Cheers, On 12/03/18 12:42, mja...@caviumnetworks.com wrote: From: Manish Jaggi This patchset is a Xen port of Marc's patchset. arm64: KVM:

[Xen-devel] [PATCH v3 5/6] x86/XPTI: reduce .text.entry

2018-03-13 Thread Jan Beulich
This exposes less code pieces and at the same time reduces the range covered from slightly above 3 pages to a little below 2 of them. The code being moved is unchanged, except for the removal of trailing blanks, insertion of blanks between operands, and a pointless q suffix from "retq". A few

[Xen-devel] [PATCH v3 6/6] x86: avoid double CR3 reload when switching to guest user mode

2018-03-13 Thread Jan Beulich
When XPTI is active, the CR3 load in restore_all_guest is sufficient when switching to user mode, improving in particular system call and page fault exit paths for the guest. Signed-off-by: Jan Beulich Tested-by: Juergen Gross Reviewed-by: Juergen Gross

Re: [Xen-devel] [PATCH] xl/libxl: add pvcalls support

2018-03-13 Thread Wei Liu
On Tue, Feb 27, 2018 at 01:28:08PM -0800, Stefano Stabellini wrote: > Add pvcalls support to libxl and xl. Create the appropriate pvcalls > entries in xenstore. > > Signed-off-by: Stefano Stabellini The code looks fine. I only want to have a second opinion on > @@ -829,6

Re: [Xen-devel] [PATCH 02/12] arm64: cputype: Add MIDR values for Cavium ThunderX1 CPUs

2018-03-13 Thread Julien Grall
Hi, On 12/03/18 12:42, mja...@caviumnetworks.com wrote: From: Manish Jaggi Add MIDR values for Cavium ThunderX1 SoC's (88xx, 81xx, 83xx). Signed-off-by: Manish Jaggi --- xen/include/asm-arm/processor.h | 9 + 1 file changed, 9

[Xen-devel] [xen-4.9-testing test] 120538: regressions - FAIL

2018-03-13 Thread osstest service owner
flight 120538 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/120538/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-ws16-amd64 10 windows-install fail REGR. vs. 12

Re: [Xen-devel] [PATCH] xl: remove apic option for PVH guests

2018-03-13 Thread Roger Pau Monné
On Mon, Mar 05, 2018 at 11:36:58AM +, Ian Jackson wrote: > Roger Pau Monne writes ("[PATCH] xl: remove apic option for PVH guests"): > > XSA-256 forces the local APIC to always be enabled for PVH guests, so > > ignore any apic option for PVH guests. Update the documentation > > accordingly. >

Re: [Xen-devel] [PATCH 05/12] Placeholder for handling Group1 register traps

2018-03-13 Thread Julien Grall
Hi Manish, On 12/03/18 12:42, mja...@caviumnetworks.com wrote: From: Manish Jaggi Since this is a SoC errata and trapping of certain group1 registers should not affect the normal flow. A new file vsysreg_errata.c is added. Function vgic_v3_handle_cpuif_access is

Re: [Xen-devel] [PATCH 3/7] RFC arm/domain: Reject invalid combinations of domain creation flags

2018-03-13 Thread Julien Grall
Hi, On 12/03/18 16:32, Wei Liu wrote: On Sun, Mar 11, 2018 at 07:59:16PM +, Julien Grall wrote: Hi Andrew, On 03/09/2018 01:18 PM, Andrew Cooper wrote: ARM guests are HVM and have hardware assisted paging. There are no PV guests or shadow paging, and all other creation flags are x86

Re: [Xen-devel] [PATCH v2 1/5] x86/hvm: Handle viridian MSRs via the new guest_{rd, wr}msr() infrastructure

2018-03-13 Thread Jan Beulich
>>> On 07.03.18 at 19:58, wrote: > @@ -554,13 +551,11 @@ static void update_reference_tsc(struct domain *d, > bool_t initialize) > put_page_and_type(page); > } > > -int wrmsr_viridian_regs(uint32_t idx, uint64_t val) > +int guest_wrmsr_viridian(struct vcpu *v,

Re: [Xen-devel] [PATCH v2 2/5] x86: Handle the Xen MSRs via the new guest_{rd, wr}msr() infrastructure

2018-03-13 Thread Jan Beulich
>>> On 07.03.18 at 19:58, wrote: > --- a/xen/arch/x86/msr.c > +++ b/xen/arch/x86/msr.c > @@ -185,6 +185,10 @@ int guest_rdmsr(const struct vcpu *v, uint32_t msr, > uint64_t *val) > } > > /* Fallthrough. */ > +case MSR_XEN_ALT_START ...

Re: [Xen-devel] [PATCH v2 3/5] x86: Fix APIC MSR constant names

2018-03-13 Thread Jan Beulich
>>> On 07.03.18 at 19:58, wrote: > --- a/xen/include/asm-x86/msr-index.h > +++ b/xen/include/asm-x86/msr-index.h > @@ -312,18 +312,21 @@ > > #define MSR_IA32_TSC_ADJUST 0x003b > > -#define MSR_IA32_APICBASE0x001b > -#define

Re: [Xen-devel] [PATCH] xl/libxl: add pvcalls support

2018-03-13 Thread George Dunlap
On Tue, Mar 13, 2018 at 2:13 PM, Wei Liu wrote: > On Tue, Feb 27, 2018 at 01:28:08PM -0800, Stefano Stabellini wrote: >> Add pvcalls support to libxl and xl. Create the appropriate pvcalls >> entries in xenstore. >> >> Signed-off-by: Stefano Stabellini >

Re: [Xen-devel] [PATCH 00/13] acpi: arm: Add IORT Support

2018-03-13 Thread Julien Grall
Hi, I got duplicated e-mails on my inbox for this series. Each version have a different series and all in the same threading. I have no idea which emails to answer properly. So please do a proper resend of this series and this time with my correct e-mail address. Cheers, On 12/03/18

Re: [Xen-devel] [RFC PATCH 1/6] ci: add Dockerfile for CentOS 7.2

2018-03-13 Thread Julien Grall
Hi Doug, On 13/03/18 03:31, Doug Goldstein wrote: +# work around https://github.com/moby/moby/issues/10180 +# and install Xen depends +RUN rpm --rebuilddb && \ +yum -y install \ +yum-plugin-ovl \ +gcc \ +gcc-c++ \ +ncurses-devel \ +zlib-devel \ +

Re: [Xen-devel] [PATCH 00/13] acpi: arm: Add IORT Support

2018-03-13 Thread Manish Jaggi
On 03/13/2018 08:09 PM, Julien Grall wrote: Hi, I got duplicated e-mails on my inbox for this series. Each version have a different series and all in the same threading. I have no idea which emails to answer properly. So please do a proper resend of this series and this time with my

Re: [Xen-devel] [PATCH 01/12] checkpatch: Add xendevicemodel_handle to the list of types

2018-03-13 Thread Paolo Bonzini
On 08/03/2018 20:02, Ian Jackson wrote: > This avoids checkpatch misparsing (as statements) long function > definitions or declarations, which sometimes start with constructs > like this: > > static inline int xendevicemodel_relocate_memory( > xendevicemodel_handle *dmod, domid_t domid,

Re: [Xen-devel] [PATCH] tools/xl: fix uninitialized variable in xl_vdispl

2018-03-13 Thread Doug Goldstein
On 3/13/18 3:03 AM, Jan Beulich wrote: On 13.03.18 at 05:43, wrote: >> The code added in 7a48622a78a0b452e8afa55b8442c958abd226a7 could use rc >> uninitialized in main_vdisplattach(). >> >> Signed-off-by: Doug Goldstein >> --- >> CC: Oleksandr Grytsov

Re: [Xen-devel] [PATCH 1/2] make xen ocaml safe-strings compliant

2018-03-13 Thread Wei Liu
On Tue, Mar 13, 2018 at 09:29:49AM +, Christian Lindig wrote: > On 12/03/18 19:35, Michael Young wrote: > > > Here is version 4 of the patch where I have replaced the uses of s with b > > where the patch changes it from string to bytes. I have also removed the > > two trailing spaces and

[Xen-devel] [xen-4.9-testing bisection] complete test-amd64-amd64-xl-qemut-ws16-amd64

2018-03-13 Thread osstest service owner
branch xen-4.9-testing xenbranch xen-4.9-testing job test-amd64-amd64-xl-qemut-ws16-amd64 testid windows-install Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git Tree:

[Xen-devel] [PATCH resend 02/13] acpi: arm: query estimated size of hardware domain's IORT.

2018-03-13 Thread mjaggi
From: Manish Jaggi Code to query estimated IORT size for hardware domain. IORT for hardware domain is generated using the requesterid and deviceid map. Xen code requires the size to be predeterminded. Signed-off-by: Manish Jaggi ---

[Xen-devel] [PATCH resend 03/13] acpi: arm: Code to generate Hardware Domains IORT

2018-03-13 Thread mjaggi
From: Manish Jaggi Structure of Hardware domain's (hwdom) IORT hwdom's IORT will only have PCIRC nodes and ITS group nodes in the following order. SMMU nodes as they are hidden from hardware domain. [IORT Header] [ITS Group 1 ] ... [ITS Group n ] [PCIRC Node 1]

[Xen-devel] [PATCH resend 08/13] asm: arm: pci: Fix the #include label in asm-arm/pci.h

2018-03-13 Thread mjaggi
From: Manish Jaggi asm-arm/pci.h has an incorrect #ifndef label. Fixing it to ARM Signed-off-by: Manish Jaggi --- xen/include/asm-arm/pci.h | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/xen/include/asm-arm/pci.h

[Xen-devel] [PATCH resend 05/13] acpi: arm: Import acpi_iort.h verbatim from linux 4.14

2018-03-13 Thread mjaggi
From: Manish Jaggi Import acpi_iort.h verbatim from linux 4.14 Signed-off-by: Manish Jaggi --- xen/include/asm-arm/acpi/acpi_iort.h | 57 1 file changed, 57 insertions(+) diff --git

[Xen-devel] [PATCH resend 12/13] acpi: arm: Provide support for iort iommu configuration hooks

2018-03-13 Thread mjaggi
From: Manish Jaggi This patch copies the basic code from linux (iort.c) required to parse IORT and hooks for iommu configuration and initializes smmu device. Provides a top level initcall acpi_iort_init which would call parse_iort (next patch) to parse and prepare the

[Xen-devel] [PATCH resend 07/13] arm: Adding ACPI_IORT in arm Kconfig

2018-03-13 Thread mjaggi
From: Manish Jaggi Signed-off-by: Manish Jaggi --- xen/arch/arm/Kconfig | 4 1 file changed, 4 insertions(+) diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig index 2782ee6589..d3fbcbcc6f 100644 --- a/xen/arch/arm/Kconfig +++

[Xen-devel] [PATCH resend 00/13] acpi: arm: Add IORT Support

2018-03-13 Thread mjaggi
From: Manish Jaggi This patch aims to add the support of IORT in Xen. Below is the list of major components which this patchset provides. a. Add support for parsing the IORT b. Provides API to populate/query requesterid - streamID mappings and reuqesterid -

[Xen-devel] [PATCH resend 09/13] asm: arm: to_pci_dev

2018-03-13 Thread mjaggi
From: Manish Jaggi to_pci_dev for ARM was todo till now. Provide definition for this macro. Signed-off-by: Manish Jaggi --- xen/drivers/passthrough/arm/smmu.c | 3 ++- xen/include/asm-arm/pci.h | 6 ++ 2 files changed, 8

[Xen-devel] [PATCH resend 06/13] acpi: arm: Update acpi_iort.h with xen specific changes

2018-03-13 Thread mjaggi
From: Manish Jaggi Remove the parts of acpi_iort.h which are not required for Xen. Signed-off-by: Manish Jaggi --- xen/include/asm-arm/acpi/acpi_iort.h | 10 ++ 1 file changed, 2 insertions(+), 8 deletions(-) diff --git

[Xen-devel] [PATCH resend 11/13] asm: arm: add pci_domain_nr

2018-03-13 Thread mjaggi
From: Manish Jaggi Provide definition for this macro. Signed-off-by: Manish Jaggi --- xen/include/xen/pci.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h index dd5ec43a70..ee1d4dbf93

  1   2   >