Re: [Xen-devel] [PATCH 1/2] arm: smccc: handle SMCs/HVCs according to SMCCC

2017-08-02 Thread Stefano Stabellini
On Tue, 1 Aug 2017, Julien Grall wrote: > Hi Edgar, > > On 01/08/2017 22:22, Edgar E. Iglesias wrote: > > On Tue, Aug 01, 2017 at 10:02:45PM +0100, Julien Grall wrote: > > > Hi, > > > > > > On 01/08/2017 21:40, Stefano Stabellini wrote: > > > > On Tue, 1 Aug 2017, Edgar E. Iglesias wrote: > > >

Re: [Xen-devel] [PATCH] tools/libxl: Fix a segment fault when mmio_hole is set in hvm.cfg

2017-08-02 Thread Christopher Clark
On Wed, Jul 12, 2017 at 3:15 AM, Wei Liu wrote: > > On Thu, Jul 13, 2017 at 10:03:39AM +0800, Xiong Zhang wrote: > > When valid mmio_hole is set in hvm.cfg, segment fault happens at accessing > > localents pointer. > > > > Because the size of localents pointer isn't enough to

Re: [Xen-devel] [PATCH] xen-platform: constify pci_device_id.

2017-08-02 Thread Boris Ostrovsky
On 08/02/2017 01:46 PM, Arvind Yadav wrote: > pci_device_id are not supposed to change at runtime. All functions > working with pci_device_id provided by work with > const pci_device_id. So mark the non-const structs as const. > > Signed-off-by: Arvind Yadav

Re: [Xen-devel] Xen 4.9 + kernel 4.13rc2 -- ballooning regression? reappearance of "Over-allocation for domain 1" errors

2017-08-02 Thread Boris Ostrovsky
On 08/02/2017 08:01 AM, Juergen Gross wrote: > On 01/08/17 16:28, PGNet Dev wrote: >> On 7/28/17 9:02 AM, PGNet Dev wrote: >>> On 7/27/17 11:23 PM, Juergen Gross wrote: Can you please post the domain's config file used to create the domain and the kernel config? >>> Sure. >>> >>>

Re: [Xen-devel] [PATCH v2 00/13] "Non-shared" IOMMU support on ARM

2017-08-02 Thread Tian, Kevin
> From: Oleksandr Tyshchenko [mailto:olekst...@gmail.com] > Sent: Tuesday, August 1, 2017 7:08 PM > > Hi, Kevin > > On Tue, Aug 1, 2017 at 6:06 AM, Tian, Kevin wrote: > >> From: Oleksandr Tyshchenko [mailto:olekst...@gmail.com] > >> Sent: Monday, July 31, 2017 7:58 PM > >>

[Xen-devel] OSSTest hardware maintenance

2017-08-02 Thread Wei Liu
Hi all OSSTest is shut down for maintenance at the moment. It will be brought back either later today or tomorrow. I will send out another email when the maintenance is done. Wei. ___ Xen-devel mailing list Xen-devel@lists.xen.org

[Xen-devel] [distros-debian-squeeze test] 71930: tolerable trouble: broken/fail/pass

2017-08-02 Thread Platform Team regression test user
flight 71930 distros-debian-squeeze real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71930/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: build-arm64-pvops 2 hosts-allocate broken like 71702 build-arm64

Re: [Xen-devel] Is possible to do GPU virtualization in Intel® Atom?

2017-08-02 Thread Roger Pau Monné
On Tue, Aug 01, 2017 at 10:01:01AM +, Asharaf Perinchikkal wrote: > Hi All, > > > In Intel® Atom™ E3845(MinnowBoard Turbot Quad-Core board) has only support > for Virtualization Technology (VT-x). > > No support for Intel® Virtualization Technology for Directed I/O (VT-d). >

Re: [Xen-devel] [RFC v4]Proposal to allow setting up shared memory areas between VMs from xl config file

2017-08-02 Thread Edgar E. Iglesias
On Wed, Aug 02, 2017 at 07:10:25PM +0100, Julien Grall wrote: > Hi, > > On 01/08/17 00:53, Stefano Stabellini wrote: > >On Mon, 31 Jul 2017, Edgar E. Iglesias wrote: > > @role Can only be 'master' or 'slave', it defaults to > > 'slave'. > > > > @prot

Re: [Xen-devel] Next Xen ARM community call - Wednesday 2nd August 2017

2017-08-02 Thread Stefano Stabellini
Hi everybody, the Xen based suspend notification interface is implemented in Linux by drivers/xen/manage.c. The guest monitors a node on xenstore named "control/shutdown", one of the possible commands is "suspend". See the corresponding libxl__domain_pvcontrol_* functions and their callers under

Re: [Xen-devel] [PATCH v5 4/8] mm: Scrub memory from idle loop

2017-08-02 Thread Jan Beulich
>>> Boris Ostrovsky 07/31/17 6:16 PM >>> >On 07/31/2017 11:20 AM, Jan Beulich wrote: > Boris Ostrovsky 07/23/17 4:14 AM >>> > @@ -1050,17 +1120,42 @@ static void scrub_free_pages(unsigned int node) > -if (

Re: [Xen-devel] [PATCH v5 6/8] mm: Keep heap accessible to others while scrubbing

2017-08-02 Thread Jan Beulich
>>> Boris Ostrovsky 07/23/17 4:28 AM >>> >On 06/27/2017 03:28 PM, Jan Beulich wrote: > Boris Ostrovsky 06/22/17 8:56 PM >>> >>> +static void check_and_stop_scrub(struct page_info *head) >>> +{ >>> +if ( head->u.free.scrub_state ==

[Xen-devel] [PATCH 4/5] tools/libxenforeignmemory: add support for resource mapping

2017-08-02 Thread Paul Durrant
A previous patch introduced a new HYPERVISOR_memory_op to acquire guest resources for direct priv-mapping. This patch adds new functionality into libxenforeignmemory to make use of a new privcmd ioctl [1] that uses the new memory op to make such resources available via mmap(2). [1]

[Xen-devel] [PATCH 1/5] [x86|arm]: remove code duplication

2017-08-02 Thread Paul Durrant
There is a substantial amount of code duplicated between the x86 and arm implementations of mm.c:xenmem_add_to_physmap_one() for XENMAPSPACE_grant_table. Also, the code in question looks like it really should be in common/grant_table.c This patch introduces a new function in common/grant_table.c

[Xen-devel] [PATCH 3/5] x86/mm: add HYPERVISOR_memory_op to acquire guest resources

2017-08-02 Thread Paul Durrant
Certain memory resources associated with a guest are not necessarily present in the guest P2M and so are not necessarily available to be foreign-mapped by a tools domain unless they are inserted, which risks shattering a super-page mapping. This patch adds a new memory op to allow such resourced

[Xen-devel] [PATCH 0/5] x86: guest resource mepping

2017-08-02 Thread Paul Durrant
This series introduces support for direct mapping of guest resources. Mapping is currently limited to grant tables but support for other resources will be added by subsequent patches. Paul Durrant (5): arch/[x86|arm]: remove code duplication x86/mm: allow a privileged PV domain to map guest

[Xen-devel] [PATCH 2/5] x86/mm: allow a privileged PV domain to map guest mfns

2017-08-02 Thread Paul Durrant
In the case where a PV domain is mapping guest resources then it needs make the HYPERVISOR_mmu_update call using DOMID_SELF, rather than the guest domid, so that the passed in gmfn values are correctly treated as mfns rather than gfns present in the guest p2m. This patch removes a check which

[Xen-devel] [PATCH 5/5] tools/libxenctrl: use new xenforeignmemory API to seed grant table

2017-08-02 Thread Paul Durrant
A previous patch added support for priv-mapping guest resources directly (rather than having to foreign-map, which requires P2M modification for HVM guests). This patch makes use of the new API to seed the guest grant table unless the underlying infrastructure (i.e. privcmd) doesn't support it,

Re: [Xen-devel] Xenstore filling information about Dom0

2017-08-02 Thread Juergen Gross
On 02/08/17 12:12, Waseem, Amna wrote: > Hello All, > > Can anyone tell me how xenstore filesystem gets populated about information > about Dom0. see tools/helpers/xen-init-dom0.c > Which function or script creates node for local domain? see tools/libxl/ (various source files) > I want to

Re: [Xen-devel] [PATCH 5/5] xen: RCU: avoid busy waiting until the end of grace period.

2017-08-02 Thread Dario Faggioli
Hey, apologies in advance, for the very long email! :-O On Tue, 2017-08-01 at 12:13 -0700, Stefano Stabellini wrote: > Given the description below, it's possible that the new timer has to > fire several times before the callback can be finally invoked, right? > > I would make some measurements

Re: [Xen-devel] [PATCH v2 3/5] xen/livepatch/ARM32: Don't load and crash on livepatches loaded with wrong alignment.

2017-08-02 Thread Jan Beulich
>>> Konrad Rzeszutek Wilk 07/31/17 6:04 PM >>> >On Mon, Jul 31, 2017 at 07:55:34AM -0600, Jan Beulich wrote: >> >>> Konrad Rzeszutek Wilk 07/26/17 9:50 PM >>> >> >--- a/docs/misc/livepatch.markdown >> >+++ b/docs/misc/livepatch.markdown >> >@@ -279,6

[Xen-devel] Xenstore filling information about Dom0

2017-08-02 Thread Waseem, Amna
Hello All, Can anyone tell me how xenstore filesystem gets populated about information about Dom0. Which function or script creates node for local domain? I want to statically configure the xenstore about guest parameters. I want to statically create nodes before bringing up xenstored daemon.

Re: [Xen-devel] [PATCH v2] xen: get rid of paravirt op adjust_exception_frame

2017-08-02 Thread Juergen Gross
On 01/08/17 21:45, Andy Lutomirski wrote: > On Tue, Aug 1, 2017 at 3:39 AM, Juergen Gross wrote: >> When running as Xen pv-guest the exception frame on the stack contains >> %r11 and %rcx additional to the other data pushed by the processor. >> >> Instead of having a paravirt op

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-08-02 Thread Jan Beulich
>>> Razvan Cojocaru 08/01/17 9:22 PM >>> >Since this seems to be blocked as-is, I propose transforming this patch >into a series, with one patch adding a new return code specifically for >unsupported instructions (X86_EMUL_UNIMPLEMENTED or >X86_EMUL_UNSUPPORTED?), and

Re: [Xen-devel] Is possible to do GPU virtualization in Intel® Atom?

2017-08-02 Thread Asharaf Perinchikkal
Is possible to achieve GPU virtualization in Intel® Atom using para virtualization? From: Roger Pau Monné [roger@citrix.com] Sent: Wednesday, August 02, 2017 1:04 PM To: Asharaf Perinchikkal Cc: xen-devel@lists.xen.org; Anoop Babu Subject: Re:

Re: [Xen-devel] PV drivers and zero copying

2017-08-02 Thread Julien Grall
Hi, On 01/08/17 20:07, Stefano Stabellini wrote: On Tue, 1 Aug 2017, Oleksandr Andrushchenko wrote: Hi, Stefano! On 07/31/2017 11:28 PM, Stefano Stabellini wrote: On Mon, 31 Jul 2017, Oleksandr Andrushchenko wrote: 3 Sharing with page exchange (XENMEM_exchange)

Re: [Xen-devel] xen/link: Move .data.rel.ro sections into .rodata for final link

2017-08-02 Thread Jan Beulich
>>> David Woodhouse 07/31/17 5:57 PM >>> >There is a first call to efi_arch_relocate_image(0) before the >ExitBootServices() call. However I'm missing something because I can't >see how that call achieves anything *other* than to trigger the fault >we're concerned about. >

Re: [Xen-devel] [PATCH v5 1/8] mm: Place unscrubbed pages at the end of pagelist

2017-08-02 Thread Jan Beulich
>>> Boris Ostrovsky 07/31/17 6:03 PM >>> On 07/31/2017 10:45 AM, Jan Beulich wrote: Boris Ostrovsky 07/23/17 4:01 AM >>> >> On 06/27/2017 01:06 PM, Jan Beulich wrote: >> Boris Ostrovsky 06/22/17 8:55 PM

Re: [Xen-devel] [PATCH v2] rombios: prevent building with PIC/PIE

2017-08-02 Thread George Dunlap
On Mon, Jun 26, 2017 at 3:37 PM, Andrew Cooper wrote: > On 26/06/17 14:00, Andrew Cooper wrote: >> On 26/06/17 13:55, Olaf Hering wrote: >>> If the default compiler silently defaults to to -fPIC/-fPIE building >>> rombios fails: >>> >>> ld -melf_i386 -s -r 32bitbios.o

Re: [Xen-devel] DESIGN v2: CPUID part 3

2017-08-02 Thread Joao Martins
On 08/01/2017 07:34 PM, Andrew Cooper wrote: > On 31/07/2017 20:49, Konrad Rzeszutek Wilk wrote: >> On Wed, Jul 05, 2017 at 02:22:00PM +0100, Joao Martins wrote: >>> On 07/05/2017 12:16 PM, Andrew Cooper wrote: On 05/07/17 10:46, Joao Martins wrote: > Hey Andrew, > > On 07/04/2017

Re: [Xen-devel] [XenSummit 2017] Shared coprocessor framework followup

2017-08-02 Thread Andrii Anisov
Hello Edgar, On 01.08.17 20:13, Edgar E. Iglesias wrote: Are master ports behind IOMMU? Yes, they are. What IOMMU IP is used? It's possible to reprogram the configuration of the PL and swap accelerators in and out on the fly. It's probably going to be too slow for trying to context switch

Re: [Xen-devel] DESIGN v2: CPUID part 3

2017-08-02 Thread Dario Faggioli
On Wed, 2017-08-02 at 11:34 +0100, Joao Martins wrote: > On 08/01/2017 07:34 PM, Andrew Cooper wrote: > > > On Wed, Jul 05, 2017 at 02:22:00PM +0100, Joao Martins wrote: > > > > > > > > There could be other uses too on passing this info to Xen, say > > > > e.g. the > > > > scheduler knowing the

Re: [Xen-devel] [PATCH RFC v1 0/3] Enable XL to set and get per-VCPU work conserving flag for RTDS scheduler

2017-08-02 Thread Meng Xu
On Wed, Aug 2, 2017 at 1:49 PM, Dario Faggioli wrote: > On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote: >> This series of patches enable the toolstack to >> set and get per-VCPU work-conserving flag. >> With the toolstack, system administrators can decide >> which

[Xen-devel] [PATCH v5] xen: rtds: only tickle non-already tickled CPUs

2017-08-02 Thread Meng Xu
When more than one idle VCPUs that have the same PCPU as their previous running core invoke runq_tickle(), they will tickle the same PCPU. The tickled PCPU will only pick at most one VCPU, i.e., the highest-priority one, to execute. The other VCPUs will not be scheduled for a period, even when

Re: [Xen-devel] [PATCH RFC v1] xen:rtds: towards work conserving RTDS

2017-08-02 Thread Meng Xu
On Wed, Aug 2, 2017 at 1:46 PM, Dario Faggioli wrote: > Hey, Meng! > > It's really cool to see progress on this... There was quite a bit of > interest in scheduling in general at the Summit in Budapest, and one > important thing for making sure RTDS will be really

Re: [Xen-devel] Is possible to do GPU virtualization in Intel® Atom?

2017-08-02 Thread Haozhong Zhang
+Hongbo from Intel GPU virtualization team On 08/02/17 09:41 +, Asharaf Perinchikkal wrote: > Is possible to achieve GPU virtualization in Intel® Atom using para > virtualization? > > From: Roger Pau Monné [roger@citrix.com] > Sent: Wednesday,

[Xen-devel] [PATCH v15.1 13/23] x86: refactor psr: CDP: implement CPU init flow.

2017-08-02 Thread Yi Sun
This patch implements the CPU init flow for CDP. The flow is almost same as L3 CAT. Signed-off-by: Yi Sun --- v15: - refine process in 'psr_cpu_init' to remove the 'goto'. (suggested by Jan Beulich) v14: - remove the 'Notes' in commit message because a

Re: [Xen-devel] [PATCH] x86/efi: Do not write relocations in efi_arch_relocate_image() first pass

2017-08-02 Thread David Woodhouse
On Wed, 2017-08-02 at 05:56 -0600, Jan Beulich wrote: > > > > > > > > > > > > > David Woodhouse 08/02/17 1:30 PM >>> > > --- a/xen/arch/x86/efi/efi-boot.h > > +++ b/xen/arch/x86/efi/efi-boot.h > > @@ -87,7 +87,8 @@ static void __init efi_arch_relocate_image(unsigned long

[Xen-devel] [PATCH] x86/efi: Do not write relocations in efi_arch_relocate_image() first pass

2017-08-02 Thread David Woodhouse
The function is invoked with delta=0 before ExitBootServices() is called, as a dummy run purely to validate that all the relocations can be handled. This allows us to exit gracefully with an error message. However, we have relocations in read-only sections such as .rodata and .init.te(xt). Recent

Re: [Xen-devel] xen/link: Move .data.rel.ro sections into .rodata for final link

2017-08-02 Thread David Woodhouse
On Wed, 2017-08-02 at 03:17 -0600, Jan Beulich wrote: > > >... but then again, if the whole function is really doing nothing at > >all when invoked with delta==0 then perhaps it would just be easier to > >remove the first pass altogether. I feel sure I'm missing something, > > The reason is even

Re: [Xen-devel] [PATCH v4 7/9] vpci/msi: add MSI handlers

2017-08-02 Thread Jan Beulich
>>> Roger Pau Monne 06/30/17 5:01 PM >>> >Add handlers for the MSI control, address, data and mask fields in >order to detect accesses to them and setup the interrupts as requested >by the guest. > >Note that the pending register is not trapped, and the guest can >freely

[Xen-devel] [PATCH OSSTEST v3 1/8] HostDB: introduce set_property

2017-08-02 Thread Roger Pau Monne
And provide a helper in TestSupport to use it. This allows osstest to set host properties from test script themselves (instead of using the mg-hosts clu). Note that the setting of host properties is limited to flights with intended blessing real, and it will fail for any other blessing.

[Xen-devel] [PATCH OSSTEST v3 5/8] ts-memdisk-try-append: introduce a script to test memdisk options

2017-08-02 Thread Roger Pau Monne
The intended usage is to run this script against every host in order to record the possible needed memdisk flags. Signed-off-by: Roger Pau Monné Acked-by: Ian Jackson --- Changes since v1: - Get the arch of the job and exit with 0 if it's not

Re: [Xen-devel] [XenSummit 2017] Shared coprocessor framework followup

2017-08-02 Thread Edgar E. Iglesias
On Wed, Aug 02, 2017 at 02:07:17PM +0300, Andrii Anisov wrote: > Hello Edgar, Hi Andrii, > > > On 01.08.17 20:13, Edgar E. Iglesias wrote: > >>Are master ports behind IOMMU? > >Yes, they are. > What IOMMU IP is used? Today it's an SMMUv2. > > >>>It's possible to reprogram the configuration

Re: [Xen-devel] xen/arm: Software Step ARMv8 - PC stuck on instruction

2017-08-02 Thread Julien Grall
Hi Florian, Sorry for the late answer. On 26/07/17 14:12, Florian Jakobsmeier wrote: Hello, i was just testing the single step implementation and realized that the before mentioned solution is not fully working. I'm still trying to enable SS for a VM on Xen. Would you mind sharing the

Re: [Xen-devel] [PATCH v2] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-02 Thread Razvan Cojocaru
On 01.08.2017 19:07, Tamas K Lengyel wrote: On Tue, Aug 1, 2017 at 4:30 AM, Andrew Cooper wrote: On 01/08/17 10:46, Alexandru Isaila wrote: Allow guest userspace code to request that a vm_event be sent out via VMCALL. This functionality seems to be handy for a

Re: [Xen-devel] [PATCH 2/3] docs: add xen-release-management.pandoc

2017-08-02 Thread Juergen Gross
On 31/07/17 13:22, Wei Liu wrote: > A document for the release manager. > > Signed-off-by: Wei Liu With two minor corrections (see below): Reviewed-by: Juergen Gross > --- > docs/process/xen-release-management.pandoc | 594 >

Re: [Xen-devel] [PATCH v4 06/13] libxl: change p9 to use generec add function

2017-08-02 Thread Oleksandr Grytsov
On Tue, Aug 1, 2017 at 4:00 PM, Wei Liu wrote: > On Tue, Aug 01, 2017 at 02:58:19PM +0300, Oleksandr Grytsov wrote: >> On Mon, Jul 31, 2017 at 5:36 PM, Wei Liu wrote: >> > On Sun, Jul 30, 2017 at 09:42:09PM +0300, Oleksandr Grytsov wrote: >> >> On Fri,

[Xen-devel] [PATCH OSSTEST v3 4/8] ts-freebsd-host-install: add arguments to test memdisk append options

2017-08-02 Thread Roger Pau Monne
This is needed in order to figure out which memdisk options should be used to boot the images on each specific box. Note that when passed the --recordappend argument upon success the script stores the tentative host property in the runvars. Signed-off-by: Roger Pau Monné

[Xen-devel] [PATCH OSSTEST v3 8/8] sg-run-job: hook the memdisk test into examine

2017-08-02 Thread Roger Pau Monne
Hook the memdisk parameter detection and the saving of the host properties into the examine jobs. Signed-off-by: Roger Pau Monné --- Changes since v2: - Do not pass a host ident to ts-examine-hostprops-save. - Use .- for ts-memdisk-try-append so that the rest of the job

[Xen-devel] [PATCH OSSTEST v3 0/8] Add support to examine the needed memdisk flags for each hos

2017-08-02 Thread Roger Pau Monne
Hello, This is the remaining memdisk examine series (ie: starting with the first non-acked patch) and it's rebased on top of the previous FreeBSD host install series. The series expands the examine flight in order to test which memdisk options should be used for each host. Hopefully all of this

[Xen-devel] [PATCH OSSTEST v3 6/8] ts-examine-hostprops-save: introduce a script to save properties

2017-08-02 Thread Roger Pau Monne
This script turns the properties stored in the runvars using the format hostprop/$ident/$prop=$val into host properties stored in the database. Signed-off-by: Roger Pau Monné --- Changes since v2: - Call selecthost based on the idents passed in the putative hostprops

[Xen-devel] [PATCH OSSTEST v3 2/8] mfi-common: move set_freebsd_runvars to mfi-common

2017-08-02 Thread Roger Pau Monne
So that it can also be used by make-hosts-flight. No functional change intended. Signed-off-by: Roger Pau Monné Acked-by: Ian Jackson --- make-freebsd-flight | 31 --- mfi-common | 31

[Xen-devel] [PATCH OSSTEST v3 3/8] TestSupport: introduce hostprop_putative_record

2017-08-02 Thread Roger Pau Monne
This is used to store tentative host properties in the runvars of a job, with the expectation that at some point (ie: at the end of the job) they will be turned into real properties stored in the database. Signed-off-by: Roger Pau Monné Acked-by: Ian Jackson

[Xen-devel] [PATCH OSSTEST v3 7/8] make-hosts-flight: set runvars for FreeBSD test

2017-08-02 Thread Roger Pau Monne
This is needed in order to run the memdisk test. Signed-off-by: Roger Pau Monné Acked-by: Ian Jackson --- make-hosts-flight | 3 +++ 1 file changed, 3 insertions(+) diff --git a/make-hosts-flight b/make-hosts-flight index 0152dfe1..d5670857

Re: [Xen-devel] Xen 4.9 + kernel 4.13rc2 -- ballooning regression? reappearance of "Over-allocation for domain 1" errors

2017-08-02 Thread Juergen Gross
On 01/08/17 16:28, PGNet Dev wrote: > On 7/28/17 9:02 AM, PGNet Dev wrote: >> On 7/27/17 11:23 PM, Juergen Gross wrote: >>> Can you please post the domain's config file used to create the domain >>> and the kernel config? >> >> Sure. >> >>https://pastebin.com/M6cr2pX7 >> > > Any add'l info

Re: [Xen-devel] [PATCH v15 13/23] x86: refactor psr: CDP: implement CPU init flow.

2017-08-02 Thread Jan Beulich
>>> Yi Sun 08/01/17 11:04 AM >>> >@@ -1278,15 +1339,31 @@ static void psr_cpu_init(void) >cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 0, ®s); >if ( regs.b & PSR_RESOURCE_TYPE_L3 ) >{ >+bool do_l3_cat_init = true; >+ >cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 1, ®s); >

Re: [Xen-devel] [XenSummit 2017] Shared coprocessor framework followup

2017-08-02 Thread Andrii Anisov
On 02.08.17 15:58, Edgar E. Iglesias wrote: Today it's an SMMUv2. You would need to implement additional ops like [1]. I don't necessarily think so. The context-switch would involve saving and restoring accelerator state aswell as re-programming the PL. With allocate/release, we only need to

Re: [Xen-devel] [PATCH v4 9/9] vpci/msix: add MSI-X handlers

2017-08-02 Thread Jan Beulich
>>> Roger Pau Monne 06/30/17 5:01 PM >>> >Note that accesses to the Table Offset, Table BIR, PBA Offset and PBA >BIR are not trapped by Xen at the moment. They're mandated r/o by the spec anyway. >@@ -113,6 +148,35 @@ static int vpci_modify_bar(struct domain *d, const

Re: [Xen-devel] [PATCH v5 1/8] mm: Place unscrubbed pages at the end of pagelist

2017-08-02 Thread Boris Ostrovsky
On 08/02/2017 05:24 AM, Jan Beulich wrote: Boris Ostrovsky 07/31/17 6:03 PM >>> > On 07/31/2017 10:45 AM, Jan Beulich wrote: > Boris Ostrovsky 07/23/17 4:01 AM >>> >>> On 06/27/2017 01:06 PM, Jan Beulich wrote: >>> Boris

[Xen-devel] FYI qemu-xen updated to v2.9

2017-08-02 Thread Anthony PERARD
Hi, I've just pushed QEMU v2.9.0 to our qemu-xen tree. Regards, -- Anthony PERARD ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v15 13/23] x86: refactor psr: CDP: implement CPU init flow.

2017-08-02 Thread Yi Sun
On 17-08-02 06:35:46, Jan Beulich wrote: > >>> Yi Sun 08/01/17 11:04 AM >>> > >@@ -1278,15 +1339,31 @@ static void psr_cpu_init(void) > >cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 0, ®s); > >if ( regs.b & PSR_RESOURCE_TYPE_L3 ) > >{ > >+bool do_l3_cat_init = true; >

Re: [Xen-devel] [PATCH] x86/efi: Do not write relocations in efi_arch_relocate_image() first pass

2017-08-02 Thread Jan Beulich
>>> David Woodhouse 08/02/17 4:45 PM >>> >On Wed, 2017-08-02 at 07:58 -0600, Jan Beulich wrote: >> > > > David Woodhouse 08/02/17 2:11 PM >>> >> > This change is sufficient (we believe) to make EFI builds of Xen >> > actually boot again on current EDK2,

Re: [Xen-devel] [PATCH v15 13/23] x86: refactor psr: CDP: implement CPU init flow.

2017-08-02 Thread Jan Beulich
>>> Yi Sun 08/02/17 5:12 PM >>> >On 17-08-02 06:35:46, Jan Beulich wrote: >> >>> Yi Sun 08/01/17 11:04 AM >>> >> >@@ -1278,15 +1339,31 @@ static void psr_cpu_init(void) >> >cpuid_count_leaf(PSR_CPUID_LEVEL_CAT, 0, ®s); >> >if ( regs.b &

Re: [Xen-devel] [PATCH] x86/efi: Do not write relocations in efi_arch_relocate_image() first pass

2017-08-02 Thread Jan Beulich
>>> David Woodhouse 08/02/17 2:11 PM >>> >On Wed, 2017-08-02 at 05:56 -0600, Jan Beulich wrote: >> > > > David Woodhouse 08/02/17 1:30 PM >>> >> > --- a/xen/arch/x86/efi/efi-boot.h >> > +++ b/xen/arch/x86/efi/efi-boot.h >> > @@ -87,7 +87,8 @@ static void

Re: [Xen-devel] [PATCH v4 8/9] vpci: add a priority parameter to the vPCI register initializer

2017-08-02 Thread Jan Beulich
>>> Roger Pau Monne 06/30/17 5:02 PM >>> >--- a/xen/drivers/vpci/header.c >+++ b/xen/drivers/vpci/header.c >@@ -459,7 +459,7 @@ static int vpci_init_bars(struct pci_dev *pdev) >return 0; >} > >-REGISTER_VPCI_INIT(vpci_init_bars); >+REGISTER_VPCI_INIT(vpci_init_bars,

Re: [Xen-devel] [PATCH] x86/efi: Do not write relocations in efi_arch_relocate_image() first pass

2017-08-02 Thread David Woodhouse
On Wed, 2017-08-02 at 07:58 -0600, Jan Beulich wrote: > > > > David Woodhouse 08/02/17 2:11 PM >>> > > This change is sufficient (we believe) to make EFI builds of Xen > > actually boot again on current EDK2, is it not? > > It is safe / sufficient only with the specific

Re: [Xen-devel] [PATCH] x86/efi: Do not write relocations in efi_arch_relocate_image() first pass

2017-08-02 Thread Jan Beulich
>>> David Woodhouse 08/02/17 1:30 PM >>> >--- a/xen/arch/x86/efi/efi-boot.h >+++ b/xen/arch/x86/efi/efi-boot.h >@@ -87,7 +87,8 @@ static void __init efi_arch_relocate_image(unsigned long >delta) >case PE_BASE_RELOC_DIR64: >if ( in_page_tables(addr) ) >blexit(L"Unexpected

[Xen-devel] [PATCH v1] tools/libxc: use superpages during restore of HVM guest

2017-08-02 Thread Olaf Hering
During creating of a HVM domU meminit_hvm() tries to map superpages. After save/restore or migration this mapping is lost, everything is allocated in single pages. This causes a performance degradition after migration. Add neccessary code to preallocate a superpage for the chunk of pfns that is

Re: [Xen-devel] [RFC 16/22] x86/percpu: Adapt percpu for PIE support

2017-08-02 Thread Thomas Garnier
On Thu, Jul 20, 2017 at 7:26 AM, Thomas Garnier wrote: > On Wed, Jul 19, 2017 at 4:33 PM, H. Peter Anvin wrote: >> On 07/19/17 11:26, Thomas Garnier wrote: >>> On Tue, Jul 18, 2017 at 8:08 PM, Brian Gerst wrote: On Tue, Jul 18, 2017

Re: [Xen-devel] [RFC 16/22] x86/percpu: Adapt percpu for PIE support

2017-08-02 Thread Kees Cook
On Wed, Aug 2, 2017 at 9:42 AM, Thomas Garnier wrote: > I noticed that not only we have the problem of gs:0x40 not being > accessible. The compiler will default to the fs register if > mcmodel=kernel is not set. > > On the next patch set, I am going to add support for >

Re: [Xen-devel] Next Xen ARM community call - Wednesday 2nd August 2017

2017-08-02 Thread Mirela Simonovic
Hi, Thanks for the invite, please find the presentation here: https://docs.google.com/presentation/d/1PhK9bdLyY_DSr8RbSs7LDdLWADbSW7YGwwnkpMLWeQg/edit#slide=id.g24c05965d7_0_15 Regards, Mirela On Tue, Aug 1, 2017 at 7:43 PM, Stefano Stabellini wrote: > On Tue, 1 Aug

Re: [Xen-devel] [PATCH] x86/efi: Do not write relocations in efi_arch_relocate_image() first pass

2017-08-02 Thread David Woodhouse
On Wed, 2017-08-02 at 09:16 -0600, Jan Beulich wrote: > > Well, I've seen breakage in all sorts of places I wouldn't have expected > anyone to fine a need to fiddle with. This is the nature of 'value subtract', I suppose.  How about something like this? Somewhat complicated by the fact that

Re: [Xen-devel] Next Xen ARM community call - Wednesday 2nd August 2017

2017-08-02 Thread Stefano Stabellini
Just a reminder that we are going to use the following conf bridge: Join the call: https://www.uberconference.com/stefano-stabellini US dial-in number: 669-999-0613 No PIN needed For the international numbers, go to https://www.uberconference.com/stefano-stabellini and choose "Join by Phone", a

Re: [Xen-devel] [PATCH v4] xen: rtds: only tickle non-already tickled CPUs

2017-08-02 Thread Dario Faggioli
On Tue, 2017-08-01 at 15:24 -0400, Meng Xu wrote: > The initial discussion of this patch can be found at > https://lists.xenproject.org/archives/html/xen-devel/2017-02/msg02857 > .html > > Changes in v4: > 1) Take Dario's suggestions: >    Search the new->cpu first for the cpu to tickle. >    

Re: [Xen-devel] [PATCH RFC v1] xen:rtds: towards work conserving RTDS

2017-08-02 Thread Dario Faggioli
Hey, Meng! It's really cool to see progress on this... There was quite a bit of interest in scheduling in general at the Summit in Budapest, and one important thing for making sure RTDS will be really useful, is for it to have a work conserving mode! :-) On Tue, 2017-08-01 at 14:13 -0400, Meng

Re: [Xen-devel] [PATCH v2 00/13] "Non-shared" IOMMU support on ARM

2017-08-02 Thread Oleksandr Tyshchenko
Hi, Kevin On Wed, Aug 2, 2017 at 9:12 AM, Tian, Kevin wrote: >> From: Oleksandr Tyshchenko [mailto:olekst...@gmail.com] >> Sent: Tuesday, August 1, 2017 7:08 PM >> >> Hi, Kevin >> >> On Tue, Aug 1, 2017 at 6:06 AM, Tian, Kevin wrote: >> >> From:

Re: [Xen-devel] [PATCH RFC v1 0/3] Enable XL to set and get per-VCPU work conserving flag for RTDS scheduler

2017-08-02 Thread Dario Faggioli
On Tue, 2017-08-01 at 14:33 -0400, Meng Xu wrote: > This series of patches enable the toolstack to > set and get per-VCPU work-conserving flag. > With the toolstack, system administrators can decide > which VCPUs will be made work-conserving. > Thanks for this series as well, Meng. I'll look at

[Xen-devel] [PATCH] xen-platform: constify pci_device_id.

2017-08-02 Thread Arvind Yadav
pci_device_id are not supposed to change at runtime. All functions working with pci_device_id provided by work with const pci_device_id. So mark the non-const structs as const. Signed-off-by: Arvind Yadav --- drivers/xen/platform-pci.c | 2 +- 1 file changed, 1

Re: [Xen-devel] [RFC 16/22] x86/percpu: Adapt percpu for PIE support

2017-08-02 Thread Thomas Garnier
On Wed, Aug 2, 2017 at 9:56 AM, Kees Cook wrote: > On Wed, Aug 2, 2017 at 9:42 AM, Thomas Garnier wrote: >> I noticed that not only we have the problem of gs:0x40 not being >> accessible. The compiler will default to the fs register if >>

Re: [Xen-devel] [RFC v4]Proposal to allow setting up shared memory areas between VMs from xl config file

2017-08-02 Thread Julien Grall
Hi, On 01/08/17 00:53, Stefano Stabellini wrote: On Mon, 31 Jul 2017, Edgar E. Iglesias wrote: @role Can only be 'master' or 'slave', it defaults to 'slave'. @prot When @role = master, this means the largest set of stage-2 permission