Re: [Xen-devel] [PATCH 2/3] xen/kbdif: Add unique input device identifier

2018-06-07 Thread Konrad Rzeszutek Wilk
On Wed, May 23, 2018 at 09:19:22AM +0300, Oleksandr Andrushchenko wrote: > From: Oleksandr Andrushchenko > > If frontend is configured to expose multiple input device instances > then backend may require a way to uniquely identify concrete input > device within the frontend. This is useful for

Re: [Xen-devel] [PATCH 3/3] xen/displif: Add unique display connector identifier

2018-06-07 Thread Konrad Rzeszutek Wilk
On Wed, May 23, 2018 at 09:19:23AM +0300, Oleksandr Andrushchenko wrote: > From: Oleksandr Andrushchenko > > If frontend is configured to expose multiple connectors then backend may > require a way to uniquely identify concrete virtual connector within the > frontend. This is useful for

Re: [Xen-devel] [PATCH 3/3] xen/displif: Add unique display connector identifier

2018-06-07 Thread Oleksandr Andrushchenko
On 06/07/2018 04:29 PM, Konrad Rzeszutek Wilk wrote: On Wed, May 23, 2018 at 09:19:23AM +0300, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko If frontend is configured to expose multiple connectors then backend may require a way to uniquely identify concrete virtual connector

[Xen-devel] [PATCH] CODING_STYLE: discourage use of underscores where alternatives exist

2018-06-07 Thread Jan Beulich
Underscores commonly require two keypresses while hyphen / dash requires just one, and the visual separation effect of both is basically the same. Signed-off-by: Jan Beulich --- a/CODING_STYLE 2017-08-09 14:07:41.565057836 +0200 +++ b/CODING_STYLE 2018-06-07 15:52:55.136611092 +0200

Re: [Xen-devel] [xen-unstable test] 123379: regressions - FAIL

2018-06-07 Thread Juergen Gross
On 06/06/18 11:40, Juergen Gross wrote: > On 06/06/18 11:35, Jan Beulich wrote: > On 05.06.18 at 18:19, wrote: > test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 14 guest-saverestore.2 >>> >>> I thought I would reply again with the key point from my earlier mail >>> highlighted, and go

[Xen-devel] [PATCH 3.16 311/410] x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend

2018-06-07 Thread Ben Hutchings
3.16.57-rc1 review patch. If anyone has any objections, please let me know. -- From: Juergen Gross commit 71c208dd54ab971036d83ff6d9837bae4976e623 upstream. Older Xen versions (4.5 and before) might have problems migrating pv guests with MSR_IA32_SPEC_CTRL having a non-zero

[Xen-devel] [linux-next test] 123847: regressions - FAIL

2018-06-07 Thread osstest service owner
flight 123847 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/123847/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-shadow 10 debian-install fail REGR. vs. 123792 test-amd64-amd64-xl

Re: [Xen-devel] [RFC] OVMF NVRAM Variable Retention

2018-06-07 Thread aaron . young
On 06/07/18 01:59, Ross Lagerwall wrote: On 06/06/2018 04:01 PM, aaron.yo...@oracle.com wrote: Hello all, I have been tasked with the issue of UEFI NVRAM variable retention with Xen HVM/OVMF based guests and wanted to consult the experts before I undertake any significant coding

Re: [Xen-devel] [PATCH 1/3] xen/kbdif: Move multi-touch device parameters to backend nodes

2018-06-07 Thread Juergen Gross
On 07/06/18 15:29, Konrad Rzeszutek Wilk wrote: > On Wed, May 23, 2018 at 09:19:21AM +0300, Oleksandr Andrushchenko wrote: >> From: Oleksandr Andrushchenko >> >> In current kbdif protocol definition multi-touch device parameters >> are described as a part of frontend's XenBus configuration nodes

Re: [Xen-devel] [xen-unstable test] 123831: trouble: broken/fail/pass

2018-06-07 Thread Juergen Gross
On 07/06/18 12:29, Ian Jackson wrote: > Juergen Gross writes ("Re: [Xen-devel] [xen-unstable test] 123831: trouble: > broken/fail/pass"): >> The same host (italia1) that had the failed xtf test yesterday. The two >> failures are looking very similar to me. >> >> Again the question: should we do a

Re: [Xen-devel] [PATCH 5/7] public / x86: introduce __HYPERCALL_iommu_op

2018-06-07 Thread Jan Beulich
>>> On 07.06.18 at 13:42, wrote: >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: 16 March 2018 12:25 >> >>> On 12.02.18 at 11:47, wrote: >> > --- a/xen/arch/x86/Makefile >> > +++ b/xen/arch/x86/Makefile >> > @@ -33,6 +33,7 @@ obj-$(CONFIG_CRASH_DEBUG) += gdbstub.o >> > obj-y +=

Re: [Xen-devel] [PATCH] xen/privcmd: fix static checker warning

2018-06-07 Thread Juergen Gross
On 07/06/18 13:23, Paul Durrant wrote: >> -Original Message- >> From: Andrew Cooper >> Sent: 07 June 2018 11:28 >> To: Paul Durrant ; xen-devel@lists.xenproject.org; >> linux-ker...@vger.kernel.org >> Cc: Juergen Gross ; Boris Ostrovsky >> ; Dan Carpenter >> >> Subject: Re: [Xen-devel]

Re: [Xen-devel] [PATCH 5/7] public / x86: introduce __HYPERCALL_iommu_op

2018-06-07 Thread Ian Jackson
Paul Durrant writes ("RE: [PATCH 5/7] public / x86: introduce __HYPERCALL_iommu_op"): > FWIW Linux appears to use a single '_' prefix and no suffix. This practice of scattering underscores about, apparently at random, is baffling to me. It doesn't look like most of the people who do it are

Re: [Xen-devel] [PATCH 5/7] public / x86: introduce __HYPERCALL_iommu_op

2018-06-07 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 16 March 2018 12:25 > To: Paul Durrant > Cc: Andrew Cooper ; Wei Liu > ; George Dunlap ; Ian > Jackson ; Stefano Stabellini > ; xen-devel@lists.xenproject.org; KonradRzeszutek > Wilk ; Daniel De Graaf ; > Tim

Re: [Xen-devel] [PATCH 1/3] xen/kbdif: Move multi-touch device parameters to backend nodes

2018-06-07 Thread Konrad Rzeszutek Wilk
On Wed, May 23, 2018 at 09:19:21AM +0300, Oleksandr Andrushchenko wrote: > From: Oleksandr Andrushchenko > > In current kbdif protocol definition multi-touch device parameters > are described as a part of frontend's XenBus configuration nodes while > they belong to backend's configuration. Fix

Re: [Xen-devel] [PATCH 2/3] xen/kbdif: Add unique input device identifier

2018-06-07 Thread Oleksandr Andrushchenko
On 06/07/2018 04:28 PM, Konrad Rzeszutek Wilk wrote: On Wed, May 23, 2018 at 09:19:22AM +0300, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko If frontend is configured to expose multiple input device instances then backend may require a way to uniquely identify concrete input

Re: [Xen-devel] [PATCH 5/7] public / x86: introduce __HYPERCALL_iommu_op

2018-06-07 Thread George Dunlap
On 06/07/2018 02:21 PM, Jan Beulich wrote: On 07.06.18 at 13:42, wrote: >>> From: Jan Beulich [mailto:jbeul...@suse.com] >>> Sent: 16 March 2018 12:25 >> On 12.02.18 at 11:47, wrote: --- a/xen/arch/x86/Makefile +++ b/xen/arch/x86/Makefile @@ -33,6 +33,7 @@

Re: [Xen-devel] [xen-unstable test] 123831: trouble: broken/fail/pass

2018-06-07 Thread Ian Jackson
Juergen Gross writes ("Re: [Xen-devel] [xen-unstable test] 123831: trouble: broken/fail/pass"): > Are you fine then to lift the current commit moratorium? That seems sensible, if you don't expect to be trying to branch RSN because of the save/restore bug. Ian.

[Xen-devel] [OSSTEST PATCH] sg-report-flight: When justifying, disregard out-of-flight build jobs

2018-06-07 Thread Ian Jackson
When we are looking for a previous job which justifies a failure, we need to check that the putative justifying job used the same revision as the baseline we are judging against. So we investigate the build jobs referred to by that putative justifying job. However, there are cases where this is

Re: [Xen-devel] [xen-unstable test] 123831: trouble: broken/fail/pass

2018-06-07 Thread Juergen Gross
On 07/06/18 13:58, Ian Jackson wrote: > Juergen Gross writes ("Re: [Xen-devel] [xen-unstable test] 123831: trouble: > broken/fail/pass"): >> Are you fine then to lift the current commit moratorium? > > That seems sensible, if you don't expect to be trying to branch RSN > because of the

[Xen-devel] [PATCH v9] new config option vtsc_tolerance_khz to avoid TSC emulation

2018-06-07 Thread Olaf Hering
Add an option to control when vTSC emulation will be activated for a domU with tsc_mode=default. Without such option each TSC access from domU will be emulated, which causes a significant perfomance drop for workloads that make use of rdtsc. One option to avoid the TSC option is to run domUs with

Re: [Xen-devel] [PATCH v9] new config option vtsc_tolerance_khz to avoid TSC emulation

2018-06-07 Thread Jan Beulich
>>> On 07.06.18 at 15:08, wrote: > Add an option to control when vTSC emulation will be activated for a > domU with tsc_mode=default. Without such option each TSC access from > domU will be emulated, which causes a significant perfomance drop for > workloads that make use of rdtsc. > > One

Re: [Xen-devel] [PATCH 5/7] public / x86: introduce __HYPERCALL_iommu_op

2018-06-07 Thread Paul Durrant
> -Original Message- > From: George Dunlap [mailto:george.dun...@citrix.com] > Sent: 07 June 2018 14:45 > To: Jan Beulich ; Paul Durrant > > Cc: Andrew Cooper ; Ian Jackson > ; Wei Liu ; Stefano Stabellini > ; xen-devel ; > Konrad Rzeszutek Wilk ; Daniel de Graaf > ; Tim (Xen.org) >

Re: [Xen-devel] [PATCH] multiboot2: clarify usage of the address tag

2018-06-07 Thread Roger Pau Monné
On Wed, Jun 06, 2018 at 07:28:20PM +0200, Daniel Kiper wrote: > On Tue, Jun 05, 2018 at 11:55:36AM +0200, Roger Pau Monne wrote: > > Add a note to spell out that if the address tag is not present the > > file should be loaded using the elf header. > > > > Signed-off-by: Roger Pau Monné > > --- >

Re: [Xen-devel] [PATCH 5/7] public / x86: introduce __HYPERCALL_iommu_op

2018-06-07 Thread Paul Durrant
> -Original Message- > From: Ian Jackson [mailto:ian.jack...@citrix.com] > Sent: 07 June 2018 15:21 > To: Paul Durrant > Cc: George Dunlap ; Jan Beulich > ; Andrew Cooper ; Wei > Liu ; Stefano Stabellini ; xen- > devel ; Konrad Rzeszutek Wilk > ; Daniel de Graaf ; Tim > (Xen.org) >

Re: [Xen-devel] [PATCH v9] new config option vtsc_tolerance_khz to avoid TSC emulation

2018-06-07 Thread Jan Beulich
>>> On 07.06.18 at 16:49, wrote: > Am Thu, 07 Jun 2018 08:44:41 -0600 > schrieb "Jan Beulich" : > >> The re-use of the field is acceptable only if all existing senders reliably >> fill zero in there. > > How do we know all senders? I just know about write_tsc_info from xen-4.6+. I don't think

Re: [Xen-devel] [PATCH] multiboot2: clarify usage of the address tag

2018-06-07 Thread Daniel Kiper
On Thu, Jun 07, 2018 at 04:46:37PM +0200, Roger Pau Monné wrote: > On Wed, Jun 06, 2018 at 07:28:20PM +0200, Daniel Kiper wrote: > > On Tue, Jun 05, 2018 at 11:55:36AM +0200, Roger Pau Monne wrote: > > > Add a note to spell out that if the address tag is not present the > > > file should be loaded

Re: [Xen-devel] [PATCH v9] new config option vtsc_tolerance_khz to avoid TSC emulation

2018-06-07 Thread Jan Beulich
>>> On 07.06.18 at 15:47, wrote: > Am Thu, 07 Jun 2018 07:31:26 -0600 > schrieb "Jan Beulich" : > >> Hmm, I find this description concerning. Is the field reliably zero when >> coming from older Xen, or is it not? > > It depends on how old. > If the other sending side has write_tsc_info from

[Xen-devel] [PATCH v7 14/15] x86/hvm: Remove loop from viridian_save_vcpu_ctxt() func

2018-06-07 Thread Alexandru Isaila
Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/viridian.c | 22 +++--- 1 file changed, 7 insertions(+), 15 deletions(-) diff --git a/xen/arch/x86/hvm/viridian.c b/xen/arch/x86/hvm/viridian.c index bab606e..86a43ee 100644 --- a/xen/arch/x86/hvm/viridian.c +++

[Xen-devel] [PATCH v7 03/15] x86/hvm: Introduce hvm_save_cpu_ctxt_one func

2018-06-07 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/hvm.c | 195 + 1 file changed, 100 insertions(+), 95 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index

[Xen-devel] [PATCH v7 02/15] x86/hvm: Introduce hvm_save_tsc_adjust_one() func

2018-06-07 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/hvm.c | 7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index c23983c..76f7db9 100644 --- a/xen/arch/x86/hvm/hvm.c +++

[Xen-devel] [PATCH v7 09/15] x86/hvm: Remove loop from hvm_save_tsc_adjust() func

2018-06-07 Thread Alexandru Isaila
Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/hvm.c | 19 +++ 1 file changed, 3 insertions(+), 16 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 7e90bf2..701e81c 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -740,26

[Xen-devel] [PATCH v7 13/15] x86/hvm: Remove loop from hvm_save_mtrr_msr func

2018-06-07 Thread Alexandru Isaila
Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/mtrr.c | 33 - 1 file changed, 12 insertions(+), 21 deletions(-) diff --git a/xen/arch/x86/hvm/mtrr.c b/xen/arch/x86/hvm/mtrr.c index d311031..4c1e850 100644 --- a/xen/arch/x86/hvm/mtrr.c +++

[Xen-devel] [PATCH v7 05/15] x86/hvm: Introduce hvm_save_cpu_msrs_one func

2018-06-07 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- Changes since V5: - Check the return value of hvm_save_cpu_msrs_one() --- xen/arch/x86/hvm/hvm.c | 60 -- 1 file changed, 34 insertions(+), 26

[Xen-devel] [PATCH v7 06/15] x86/hvm: Introduce hvm_save_mtrr_msr_one func

2018-06-07 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/mtrr.c | 52 +++-- 1 file changed, 29 insertions(+), 23 deletions(-) diff --git a/xen/arch/x86/hvm/mtrr.c b/xen/arch/x86/hvm/mtrr.c index

[Xen-devel] [PATCH v7 07/15] x86/hvm: Introduce viridian_save_vcpu_ctxt_one() func

2018-06-07 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- Changes since V6: - Add memset to 0 for ctxt --- xen/arch/x86/hvm/viridian.c | 14 ++ 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/xen/arch/x86/hvm/viridian.c

[Xen-devel] [PATCH v7 04/15] x86/hvm: Introduce hvm_save_cpu_xsave_states_one

2018-06-07 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/hvm.c | 11 --- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index b254378..e8ecabf 100644 --- a/xen/arch/x86/hvm/hvm.c

[Xen-devel] [PATCH v7 12/15] x86/hvm: Remove loop from hvm_save_cpu_msrs func

2018-06-07 Thread Alexandru Isaila
Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/hvm.c | 58 +++--- 1 file changed, 22 insertions(+), 36 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 2542cbd..a88efeb 100644 --- a/xen/arch/x86/hvm/hvm.c +++

[Xen-devel] [PATCH v7 00/15] x86/domctl: Save info for one vcpu instance

2018-06-07 Thread Alexandru Isaila
Hi all, This patch series addresses the ideea of saving data from a single vcpu instance. First it starts by adding *save_one functions, then it removes the for loops from the *save functions and it merges them to the *save_one functions. In the final patch, the hvm_save and hvm_save_one

[Xen-devel] [PATCH v7 10/15] x86/hvm: Remove loop from hvm_save_cpu_ctxt func

2018-06-07 Thread Alexandru Isaila
Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/hvm.c| 166 ++ xen/include/asm-x86/hvm/support.h | 2 + 2 files changed, 80 insertions(+), 88 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 701e81c..38e5e96

[Xen-devel] [PATCH v7 11/15] x86/hvm: Remove loop from hvm_save_cpu_xsave_states

2018-06-07 Thread Alexandru Isaila
Signed-off-by: Alexandru Isaila --- xen/arch/x86/hvm/hvm.c | 35 +-- 1 file changed, 13 insertions(+), 22 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 38e5e96..2542cbd 100644 --- a/xen/arch/x86/hvm/hvm.c +++

[Xen-devel] [PATCH v7 01/15] x86/cpu: Introduce vmce_save_vcpu_ctxt_one() func

2018-06-07 Thread Alexandru Isaila
This is used to save data from a single instance. Signed-off-by: Alexandru Isaila --- xen/arch/x86/cpu/mcheck/vmce.c | 16 ++-- 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/xen/arch/x86/cpu/mcheck/vmce.c b/xen/arch/x86/cpu/mcheck/vmce.c index e07cd2f..404f27e

[Xen-devel] [PATCH v7 08/15] x86/cpu: Remove loop form vmce_save_vcpu_ctxt() func

2018-06-07 Thread Alexandru Isaila
Signed-off-by: Alexandru Isaila --- xen/arch/x86/cpu/mcheck/vmce.c | 27 +++ 1 file changed, 7 insertions(+), 20 deletions(-) diff --git a/xen/arch/x86/cpu/mcheck/vmce.c b/xen/arch/x86/cpu/mcheck/vmce.c index 404f27e..ead1f73 100644 --- a/xen/arch/x86/cpu/mcheck/vmce.c

[Xen-devel] [PATCH v2] multiboot2: clarify usage of the address tag

2018-06-07 Thread Roger Pau Monne
Add a note to spell out that if the address tag is not present the file should be loaded using the elf header. Signed-off-by: Roger Pau Monné --- Cc: Daniel Kiper Cc: xen-devel@lists.xenproject.org --- Changes since v1: - s/elf/@sc{elf}/ - s/Multiboot/Multiboot2/ --- doc/multiboot.texi | 6

Re: [Xen-devel] [PATCH 2/3] xen/kbdif: Add unique input device identifier

2018-06-07 Thread Konrad Rzeszutek Wilk
On Thu, Jun 07, 2018 at 04:40:48PM +0300, Oleksandr Andrushchenko wrote: > On 06/07/2018 04:28 PM, Konrad Rzeszutek Wilk wrote: > > On Wed, May 23, 2018 at 09:19:22AM +0300, Oleksandr Andrushchenko wrote: > > > From: Oleksandr Andrushchenko > > > > > > If frontend is configured to expose

[Xen-devel] [xen-4.7-testing test] 123852: regressions - FAIL

2018-06-07 Thread osstest service owner
flight 123852 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/123852/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-debianhvm-amd64 7 xen-bootfail REGR. vs. 123144

Re: [Xen-devel] [PATCH v9] new config option vtsc_tolerance_khz to avoid TSC emulation

2018-06-07 Thread Olaf Hering
Am Thu, 07 Jun 2018 08:44:41 -0600 schrieb "Jan Beulich" : > The re-use of the field is acceptable only if all existing senders reliably > fill zero in there. How do we know all senders? I just know about write_tsc_info from xen-4.6+. Olaf pgp7WNmQ7W4Jd.pgp Description: Digitale Signatur von

[Xen-devel] [PATCH v7 15/15] x86/domctl: Don't pause the whole domain if only getting vcpu state

2018-06-07 Thread Alexandru Isaila
This patch is focused moving the for loop to the caller so now we can save info for a single vcpu instance. Signed-off-by: Alexandru Isaila --- xen/arch/x86/cpu/mcheck/vmce.c | 3 +- xen/arch/x86/hvm/hpet.c| 3 +- xen/arch/x86/hvm/hvm.c | 12 ++--- xen/arch/x86/hvm/i8254.c

Re: [Xen-devel] [PATCH 5/7] public / x86: introduce __HYPERCALL_iommu_op

2018-06-07 Thread Jan Beulich
>>> On 07.06.18 at 17:21, wrote: >> -Original Message- >> From: Ian Jackson [mailto:ian.jack...@citrix.com] >> Sent: 07 June 2018 15:21 >> To: Paul Durrant >> Cc: George Dunlap ; Jan Beulich >> ; Andrew Cooper ; Wei >> Liu ; Stefano Stabellini ; xen- >> devel ; Konrad Rzeszutek Wilk >>

[Xen-devel] [libvirt bisection] complete build-amd64-libvirt

2018-06-07 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job build-amd64-libvirt testid libvirt-build Tree: libvirt git://libvirt.org/libvirt.git Tree: libvirt_gnulib https://git.savannah.gnu.org/git/gnulib.git/ Tree: libvirt_keycodemapdb https://gitlab.com/keycodemap/keycodemapdb.git Tree: qemu

[Xen-devel] [xen-unstable-smoke test] 123894: tolerable all pass - PUSHED

2018-06-07 Thread osstest service owner
flight 123894 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/123894/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

[Xen-devel] Xen or Bhyve?

2018-06-07 Thread Jason Long
Hello. For BSD distros, Xen is better or Bhyve? Can Bhyve be a replacement for Xen? Have Bhyve all Xen features? Thank you. ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel

Re: [Xen-devel] [PATCH v2 5/9] xen/gntdev: Allow mappings for DMA buffers

2018-06-07 Thread Boris Ostrovsky
(Stefano, question for you at the end) On 06/07/2018 02:39 AM, Oleksandr Andrushchenko wrote: > On 06/07/2018 12:19 AM, Boris Ostrovsky wrote: >> On 06/06/2018 04:14 AM, Oleksandr Andrushchenko wrote: >>> On 06/04/2018 11:12 PM, Boris Ostrovsky wrote: On 06/01/2018 07:41 AM, Oleksandr

[Xen-devel] [xen-4.6-testing test] 123858: regressions - FAIL

2018-06-07 Thread osstest service owner
flight 123858 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/123858/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-rumprun-amd64 7 xen-boot fail REGR. vs. 122997

Re: [Xen-devel] [PATCH v9] new config option vtsc_tolerance_khz to avoid TSC emulation

2018-06-07 Thread Olaf Hering
On Thu, Jun 07, Jan Beulich wrote: > >>> On 07.06.18 at 16:49, wrote: > > Am Thu, 07 Jun 2018 08:44:41 -0600 > > schrieb "Jan Beulich" : > >> The re-use of the field is acceptable only if all existing senders reliably > >> fill zero in there. > > How do we know all senders? I just know about

[Xen-devel] [linux-4.14 test] 123864: trouble: broken/fail/pass

2018-06-07 Thread osstest service owner
flight 123864 linux-4.14 real [real] http://logs.test-lab.xenproject.org/osstest/logs/123864/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl broken Tests which are

[Xen-devel] [linux-4.9 test] 123861: regressions - FAIL

2018-06-07 Thread osstest service owner
flight 123861 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/123861/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-shadow7 xen-boot fail REGR. vs. 122969

Re: [Xen-devel] PROBLEM: xen-netfront: ethtool settings changed in 4.4.134 causing packet loss

2018-06-07 Thread Liam Shepherd
Thank you. As a side point David Vrabel is listed in the maintainers file for xen hypervisor interface in 4.4.135 but his email is no longer active it seems. On 7 Jun 2018 09:35, "Ross Lagerwall" wrote: On 06/05/2018 04:43 PM, Liam Shepherd wrote: > When upgrading from 4.4.132 to 4.4.135 I

Re: [Xen-devel] [PATCH] CODING_STYLE: discourage use of underscores where alternatives exist

2018-06-07 Thread Julien Grall
Hi Jan, On 07/06/2018 14:56, Jan Beulich wrote: Underscores commonly require two keypresses while hyphen / dash requires just one, and the visual separation effect of both is basically the same. I don't buy this argument. A good programmer is lazy by definition but not that much. C does not

[Xen-devel] [v3 2/6] passthrough/arm: Modify SMMU driver to use generic device definition

2018-06-07 Thread Sameer Goel
Modify the SMMU code to use generic device instead of dt_device_node for functions that can be used for ACPI based systems too. Signed-off-by: Sameer Goel Acked-by: Julien Grall --- xen/drivers/passthrough/arm/smmu.c | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) diff

[Xen-devel] [libvirt test] 123876: regressions - FAIL

2018-06-07 Thread osstest service owner
flight 123876 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/123876/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 123814 build-i386-libvirt

[Xen-devel] [PATCH v2 6/9] xen/gntdev: Add initial support for dma-buf UAPI

2018-06-07 Thread Boris Ostrovsky
On 06/07/2018 03:17 AM, Oleksandr Andrushchenko wrote: > On 06/07/2018 12:32 AM, Boris Ostrovsky wrote: >> On 06/06/2018 05:06 AM, Oleksandr Andrushchenko wrote: >>> On 06/04/2018 11:49 PM, Boris Ostrovsky wrote: > diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c > index

[Xen-devel] [v3 6/6] xen/smmu: Add a new config define for legacy SMMU

2018-06-07 Thread Sameer Goel
Add a new config item to control compilation for legacy arm SMMU. Signed-off-by: Sameer Goel --- xen/drivers/passthrough/arm/Kconfig | 6 ++ xen/drivers/passthrough/arm/Makefile | 2 +- 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/xen/drivers/passthrough/arm/Kconfig

[Xen-devel] [v3 4/6] xen/iommu: smmu-v3: Add Xen specific code to enable the ported driver

2018-06-07 Thread Sameer Goel
This driver follows an approach similar to smmu driver. The intent here is to reuse as much Linux code as possible. - Glue code has been introduced to bridge the API calls. - Called Linux functions from the Xen IOMMU function calls. - Xen modifications are preceded by /*Xen: comment */ -

[Xen-devel] [v3 3/6] Add verbatim copy of arm-smmu-v3.c from Linux

2018-06-07 Thread Sameer Goel
Based on commit 7aa8619a66aea52b145e04cbab4f8d6a4e5f3f3b This is a verbatim snapshot of arm-smmu-v3.c from Linux kernel source code. No Xen code has been added and the file is not built. Signed-off-by: Sameer Goel --- xen/drivers/passthrough/arm/smmu-v3.c | 2885 + 1

[Xen-devel] [v3 0/6] SMMUv3 driver

2018-06-07 Thread Sameer Goel
This patch adds support for the SMMUv3 driver. List of changes: - Addition of a linux_compat header. - Addition of a common header for arm smmu defines. - Rebase of the SMMUv3 driver to the driver in linux kernel 4.14 rc7. - New config defines for ARM SMMU drivers. Changes in v3 - Changes to

[Xen-devel] [v3 1/6] Define WARN_ON_ONCE() macro to mirror Linux functionality

2018-06-07 Thread Sameer Goel
Define WARN_ON_ONCE() macro to mirror Linux functionality. Signed-off-by: Sameer Goel Acked-by: Julien Grall --- xen/arch/arm/xen.lds.S | 1 + xen/arch/x86/xen.lds.S | 1 + xen/include/xen/lib.h | 13 + 3 files changed, 15 insertions(+) diff --git a/xen/arch/arm/xen.lds.S

[Xen-devel] [v3 5/6] drivers/passthrough/arm: Refactor code for arm smmu drivers

2018-06-07 Thread Sameer Goel
Pull common defines for SMMU drives in a local header. Signed-off-by: Sameer Goel --- xen/drivers/passthrough/arm/smmu-v3.c | 96 +--- xen/drivers/passthrough/arm/smmu.c| 104 + xen/drivers/passthrough/arm/smmu.h| 125 ++ 3

[Xen-devel] [qemu-mainline test] 123870: tolerable FAIL - PUSHED

2018-06-07 Thread osstest service owner
flight 123870 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/123870/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stopfail like 123828 test-armhf-armhf-libvirt 14

[Xen-devel] [linux-3.18 baseline-only test] 74795: tolerable FAIL

2018-06-07 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 74795 linux-3.18 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74795/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-xsm 14 saverestore-support-check fail

Re: [Xen-devel] [PATCH v2 7/9] xen/gntdev: Implement dma-buf export functionality

2018-06-07 Thread Boris Ostrovsky
On 06/07/2018 04:44 AM, Oleksandr Andrushchenko wrote: > On 06/07/2018 12:48 AM, Boris Ostrovsky wrote: >> On 06/06/2018 08:10 AM, Oleksandr Andrushchenko wrote: >>> On 06/05/2018 01:07 AM, Boris Ostrovsky wrote: On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote: >> + +static

[Xen-devel] [GIT PULL] xen: fixes and features for v4-18-rc1

2018-06-07 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.18-rc1-tag xen: fixes and features for v4-18-rc1 It contains some minor code cleanups (fixing return types of functions), some fixes for Linux running as Xen PVH guest, and adding

Re: [Xen-devel] [v3 5/6] drivers/passthrough/arm: Refactor code for arm smmu drivers

2018-06-07 Thread Manish Jaggi
Hi Sameer, On 06/08/2018 05:17 AM, Sameer Goel wrote: Pull common defines for SMMU drives in a local header. Can add more detail in commit message? Signed-off-by: Sameer Goel --- xen/drivers/passthrough/arm/smmu-v3.c | 96 +--- xen/drivers/passthrough/arm/smmu.c|

Re: [Xen-devel] [PATCH 2/3] xen/kbdif: Add unique input device identifier

2018-06-07 Thread Oleksandr Andrushchenko
On 06/07/2018 06:47 PM, Konrad Rzeszutek Wilk wrote: On Thu, Jun 07, 2018 at 04:40:48PM +0300, Oleksandr Andrushchenko wrote: On 06/07/2018 04:28 PM, Konrad Rzeszutek Wilk wrote: On Wed, May 23, 2018 at 09:19:22AM +0300, Oleksandr Andrushchenko wrote: From: Oleksandr Andrushchenko If

Re: [Xen-devel] Xen 4.11.0 RC5 test result

2018-06-07 Thread Hao, Xudong
Nested Xen on Xen, KVM on Xen, VMware on Xen, and hyperv on Xen all failed. Already updated the result: https://wiki.xenproject.org/wiki/Nested_Virtualization_in_Xen Thanks, -Xudong From: Andrew Cooper [mailto:andrew.coop...@citrix.com] Sent: Tuesday, June 5, 2018 6:28 PM To: Hao, Xudong ;

[Xen-devel] [linux-3.18 test] 123837: tolerable FAIL - PUSHED

2018-06-07 Thread osstest service owner
flight 123837 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/123837/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-arm64-arm64-libvirt-xsm 1

Re: [Xen-devel] [PATCH v2 6/9] xen/gntdev: Add initial support for dma-buf UAPI

2018-06-07 Thread Oleksandr Andrushchenko
On 06/07/2018 12:32 AM, Boris Ostrovsky wrote: On 06/06/2018 05:06 AM, Oleksandr Andrushchenko wrote: On 06/04/2018 11:49 PM, Boris Ostrovsky wrote: On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote: +struct gntdev_dmabuf_export_args { +    int dummy; +}; Please define the full structure

Re: [Xen-devel] [PATCH v2 9/9] xen/gntdev: Expose gntdev's dma-buf API for in-kernel use

2018-06-07 Thread Oleksandr Andrushchenko
On 06/07/2018 01:05 AM, Dongwon Kim wrote: On Wed, Jun 06, 2018 at 05:51:38PM -0400, Boris Ostrovsky wrote: On 06/06/2018 08:46 AM, Oleksandr Andrushchenko wrote: On 06/05/2018 01:36 AM, Boris Ostrovsky wrote: On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote: From: Oleksandr

Re: [Xen-devel] Xentop issues

2018-06-07 Thread Dongli Zhang
Isn't the page https://wiki.xen.org/wiki/Reporting_Bugs_against_Xen_Project Dongli Zhang - Original Message - From: sc...@viviotech.net To: xen-de...@lists.xen.org Sent: Thursday, June 7, 2018 1:30:47 PM GMT +08:00 Beijing / Chongqing / Hong Kong / Urumqi Subject: [Xen-devel] Xentop

[Xen-devel] [bug report] xen/privcmd: add IOCTL_PRIVCMD_MMAP_RESOURCE

2018-06-07 Thread Dan Carpenter
Hello Paul Durrant, The patch 3ad0876554ca: "xen/privcmd: add IOCTL_PRIVCMD_MMAP_RESOURCE" from May 9, 2018, leads to the following static checker warning: drivers/xen/privcmd.c:827 privcmd_ioctl_mmap_resource() warn: passing casted pointer 'pfns' to

Re: [Xen-devel] PROBLEM: xen-netfront: ethtool settings changed in 4.4.134 causing packet loss

2018-06-07 Thread Ross Lagerwall
On 06/05/2018 04:43 PM, Liam Shepherd wrote: When upgrading from 4.4.132 to 4.4.135 I started observing about 3% packet loss on PV on HVM domU interfaces. Specifically TX dropped packets (As reported by ifconfig). It seems that the default ethtool settings have changed. Previously (4.4.132):

Re: [Xen-devel] [bug report] xen/privcmd: add IOCTL_PRIVCMD_MMAP_RESOURCE

2018-06-07 Thread Paul Durrant
> -Original Message- > From: Dan Carpenter [mailto:dan.carpen...@oracle.com] > Sent: 07 June 2018 09:32 > To: Paul Durrant > Cc: xen-devel@lists.xenproject.org > Subject: [bug report] xen/privcmd: add IOCTL_PRIVCMD_MMAP_RESOURCE > > Hello Paul Durrant, > > The patch 3ad0876554ca:

Re: [Xen-devel] [PATCH v2 7/9] xen/gntdev: Implement dma-buf export functionality

2018-06-07 Thread Oleksandr Andrushchenko
On 06/07/2018 12:48 AM, Boris Ostrovsky wrote: On 06/06/2018 08:10 AM, Oleksandr Andrushchenko wrote: On 06/05/2018 01:07 AM, Boris Ostrovsky wrote: On 06/01/2018 07:41 AM, Oleksandr Andrushchenko wrote: + +static struct sg_table * +dmabuf_exp_ops_map_dma_buf(struct dma_buf_attachment

[Xen-devel] [qemu-mainline baseline-only test] 74793: tolerable FAIL

2018-06-07 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 74793 qemu-mainline real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74793/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stopfail

Re: [Xen-devel] [RFC] OVMF NVRAM Variable Retention

2018-06-07 Thread Ross Lagerwall
On 06/06/2018 04:01 PM, aaron.yo...@oracle.com wrote:   Hello all,   I have been tasked with the issue of UEFI NVRAM variable retention with Xen HVM/OVMF based guests and wanted to consult the experts before I undertake any significant coding effort. I am new to Xen so any help/direction

[Xen-devel] [ovmf test] 123855: regressions - FAIL

2018-06-07 Thread osstest service owner
flight 123855 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/123855/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 15 guest-saverestore.2 fail REGR. vs. 123829 version targeted for

[Xen-devel] [xen-4.8-testing test] 123844: regressions - FAIL

2018-06-07 Thread osstest service owner
flight 123844 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/123844/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-2 broken in 123492

[Xen-devel] [distros-debian-wheezy test] 74794: all pass

2018-06-07 Thread Platform Team regression test user
flight 74794 distros-debian-wheezy real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/74794/ Perfect :-) All tests in this flight passed as required baseline version: flight 74767 jobs: build-amd64 pass

Re: [Xen-devel] [RFC] OVMF NVRAM Variable Retention

2018-06-07 Thread Roger Pau Monné
On Thu, Jun 07, 2018 at 09:59:10AM +0100, Ross Lagerwall wrote: > On 06/06/2018 04:01 PM, aaron.yo...@oracle.com wrote: > >   Any comments/suggestions/opinions/caveats on this approach? > > I did this a while back. It is easy enough to do: > > 1) Have Xen load OVMF_code.fd rather than the

Re: [Xen-devel] [PATCH] xen/privcmd: fix static checker warning

2018-06-07 Thread Andrew Cooper
On 07/06/18 11:21, Paul Durrant wrote: > Commit 3ad0876554ca ("xen/privcmd: add IOCTL_PRIVCMD_MMAP_RESOURCE") > introduced a static checker warning: > > drivers/xen/privcmd.c:827 privcmd_ioctl_mmap_resource() > warn: passing casted pointer 'pfns' to 'xen_remap_domain_mfn_array()' > 64

Re: [Xen-devel] [xen-unstable test] 123831: trouble: broken/fail/pass

2018-06-07 Thread Ian Jackson
Juergen Gross writes ("Re: [Xen-devel] [xen-unstable test] 123831: trouble: broken/fail/pass"): > The same host (italia1) that had the failed xtf test yesterday. The two > failures are looking very similar to me. > > Again the question: should we do a force push? I think the final decision is

Re: [Xen-devel] ARM: Issues while Enabling hibernation in domU(linux) on jacinto-j6

2018-06-07 Thread Mirela Simonovic
Hi, On Wed, Jun 6, 2018 at 8:00 PM, Julien Grall wrote: > (+ Stefano, Mirela, Juergen and Boris) > > On 06/06/18 09:17, moin anjnawala wrote: >> >> Hi Julien, > > > Hi, > >> As you specified earlier I am now able to boot using xen4.10. I am >> using linux4.4 as dom0 as well as domU.In domU, I

Re: [Xen-devel] [PATCH v5 01/10] xen/arm64: Added handling of the trapped access to OSLSR register

2018-06-07 Thread Mirela Simonovic
Hi Julien, On Tue, Jun 5, 2018 at 8:00 PM, Julien Grall wrote: > > > On 05/06/18 18:24, Julien Grall wrote: > >> Hi Mirela, >> >> On 01/06/18 14:17, Mirela Simonovic wrote: >> >>> Linux/dom0 accesses OSLSR register when saving CPU context during the >>> suspend procedure. Xen traps access to

Re: [Xen-devel] [PATCH 06/11] x86: Reorganise and rename debug register fields in struct vcpu

2018-06-07 Thread Jan Beulich
>>> On 06.06.18 at 17:21, wrote: > On 06/06/18 16:00, Jan Beulich wrote: > On 04.06.18 at 15:59, wrote: >>> @@ -518,7 +524,10 @@ struct arch_vcpu >>> void *fpu_ctxt; >>> unsigned long vgc_flags; >>> struct cpu_user_regs user_regs; >>> -unsigned long

Re: [Xen-devel] [PATCH 02/11] x86/vmx: Don't clobber %dr6 while debugging state is lazy

2018-06-07 Thread Jan Beulich
>>> On 06.06.18 at 16:16, wrote: > On 06/06/18 14:50, Jan Beulich wrote: > On 04.06.18 at 15:59, wrote: >>> --- a/xen/arch/x86/hvm/vmx/vmx.c >>> +++ b/xen/arch/x86/hvm/vmx/vmx.c >>> @@ -3696,6 +3696,7 @@ void vmx_vmexit_handler(struct cpu_user_regs *regs) >>> */ >>>

Re: [Xen-devel] [PATCH] xen/privcmd: fix static checker warning

2018-06-07 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper > Sent: 07 June 2018 11:28 > To: Paul Durrant ; xen-devel@lists.xenproject.org; > linux-ker...@vger.kernel.org > Cc: Juergen Gross ; Boris Ostrovsky > ; Dan Carpenter > > Subject: Re: [Xen-devel] [PATCH] xen/privcmd: fix static checker warning >