Re: [Xen-devel] [PATCH 11/11] xen/arm: Limit the scope of cpregs.h

2017-08-17 Thread Bhupinder Thakur
Hi Julien, On 11 August 2017 at 23:32, Julien Grall wrote: > Currently, cpregs.h is included in pretty much every files even for > arm64. However, the only use for arm64 is when emulating co-processors. > > For arm32, cpregs.h rely on the presence of processor.h (define >

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-17 Thread Jan Beulich
>>> On 16.08.17 at 23:41, wrote: > Hello Jan, > > On Wed, Aug 09, 2017 at 05:58:19AM -0600, Jan Beulich wrote: > >> >> > On 08/08/17 21:08, Volodymyr Babchuk wrote: >> >> +#ifndef __XEN_PUBLIC_ARCH_ARM_SMC_H__ >> >> +#define __XEN_PUBLIC_ARCH_ARM_SMC_H__ >> >> + >>

Re: [Xen-devel] Graphical virtualization in intel® Atom is possible?

2017-08-17 Thread Haozhong Zhang
+Hongbo Wang from Intel GPU virtualization team On 08/17/17 06:36 +, Asharaf Perinchikkal wrote: > Hi All, > > We are trying to do graphical virtualization in intel® Atom™ > E3845(MinnowBoard Turbot Quad-Core board) using xen. > > Is it possible to do graphical virtualization in intel®

Re: [Xen-devel] [PATCH v2 2/4] xen/x86: Drop unnecessary barriers

2017-08-17 Thread Jan Beulich
>>> On 16.08.17 at 19:03, wrote: > On 16/08/17 17:47, Andrew Cooper wrote: >> On 16/08/17 16:23, Jan Beulich wrote: >> On 16.08.17 at 13:22, wrote: --- a/xen/drivers/passthrough/amd/iommu_init.c +++

[Xen-devel] Graphical virtualization in intel® Atom is possible?

2017-08-17 Thread Asharaf Perinchikkal
Hi All, We are trying to do graphical virtualization in intel® Atom™ E3845(MinnowBoard Turbot Quad-Core board) using xen. Is it possible to do graphical virtualization in intel® Atom? If yes,Could you please suggest what are versions of xen and linux recommended to use and steps i need to

[Xen-devel] [xen-unstable baseline-only test] 71983: regressions - trouble: blocked/broken/fail/pass

2017-08-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71983 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71983/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-win7-amd64 16

Re: [Xen-devel] Linux kernel build fails with xen branch for-linus-4.14 commit "xen: get rid of paravirt op adjust_exception_frame"

2017-08-17 Thread Juergen Gross
On 17/08/17 09:12, Sander Eikelenboom wrote: > Hi Juergen, > > Today i pulled > git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.gitfor-linus-4.14 > on top of current 4.13-rc5 linux tree. > > Unfortunately the kernel build fails with: > GEN .version > CHK

[Xen-devel] Graphical virtualization in intel® Atom is possible?

2017-08-17 Thread Asharaf Perinchikkal
Hi All, We are trying to do graphical virtualization in intel® Atom™ E3845(MinnowBoard Turbot Quad-Core board) using xen. Is it possible to do graphical virtualization in intel® Atom? If yes,Could you please suggest what are versions of xen and linux recommended to use and steps i need to

Re: [Xen-devel] [PATCH] x86/mm: Reduce debug overhead of __virt_to_maddr()

2017-08-17 Thread Jan Beulich
>>> On 16.08.17 at 18:17, wrote: > On 16/08/17 16:07, Jan Beulich wrote: > On 16.08.17 at 16:22, wrote: >>> On 16/08/17 15:14, Andrew Cooper wrote: On 16/08/17 15:11, Jan Beulich wrote: On 16.08.17 at 15:58,

Re: [Xen-devel] Building XenGT for Intel embedded board

2017-08-17 Thread Haozhong Zhang
+Hongbo Wang from Intel GPU virtualization team On 08/10/17 22:47 +, Monisha Barooah wrote: > Hi Everyone, > I am currently exploring on bringing up XenGT for an Intel embedded board. > > I came across this document relating to bringing up XenGT for the Sandy > Bridge/Ivy Bridge/Haswell

Re: [Xen-devel] [PATCH v6] VT-d: fix VF of RC integrated PF matched to wrong VT-d unit

2017-08-17 Thread Tian, Kevin
> From: Gao, Chao > Sent: Wednesday, August 16, 2017 1:12 PM > > The problem is for a VF of RC integrated PF (e.g. PF's BDF is > 00:02.0), we would wrongly use 00:00.0 to search VT-d unit. > > If a PF is an extended function, the BDF of a traditional function > within the same device should be

Re: [Xen-devel] [PATCH v2 2/4] xen/x86: Drop unnecessary barriers

2017-08-17 Thread Jan Beulich
>>> On 16.08.17 at 18:47, wrote: > On 16/08/17 16:23, Jan Beulich wrote: > On 16.08.17 at 13:22, wrote: >>> --- a/xen/arch/x86/mm/shadow/multi.c >>> +++ b/xen/arch/x86/mm/shadow/multi.c >>> @@ -3112,7 +3112,6 @@ static int

Re: [Xen-devel] [PATCH v1 06/13] x86: implement get value interface for MBA

2017-08-17 Thread Chao Peng
On Wed, 2017-08-16 at 14:43 +0800, Yi Sun wrote: > On 17-08-16 14:38:28, Chao Peng wrote: > > > > On Wed, 2017-08-09 at 15:41 +0800, Yi Sun wrote: > > > > > > This patch implements get value domctl interface for MBA. > > > > > > Signed-off-by: Yi Sun > > > --- > > >

[Xen-devel] [PATCH AFL] Fuzzing the hypervisor

2017-08-17 Thread Felix Schmoll
Changes based on version 2.43b of AFL --- Makefile | 2 +- afl-fuzz.c | 233 ++--- hash_map.h | 82 ++ 3 files changed, 306 insertions(+), 11 deletions(-) create mode 100644 hash_map.h diff --git a/Makefile

Re: [Xen-devel] [PATCHES v8 1/8] mm: Place unscrubbed pages at the end of pagelist

2017-08-17 Thread Julien Grall
Hi Boris, On 16/08/17 19:33, Boris Ostrovsky wrote: .. so that it's easy to find pages that need to be scrubbed (those pages are now marked with _PGC_need_scrub bit). We keep track of the first unscrubbed page in a page buddy using first_dirty field. For now it can have two values, 0 (whole

Re: [Xen-devel] [PATCH v4 3/3] arm: traps: handle SMC32 in check_conditional_instr()

2017-08-17 Thread Julien Grall
Hi Volodymyr, On 16/08/17 19:44, Volodymyr Babchuk wrote: On ARMv8 architecture we need to ensure that conditional check was passed for a trapped SMC instruction that originates from AArch32 state (ARM DDI 0487B.a page D7-2271). Thus, we should not skip it while checking HSR.EC value. For this

Re: [Xen-devel] "MMIO emulation failed" from booting OVMF on Xen v4.9.0

2017-08-17 Thread Anthony PERARD
On Wed, Aug 16, 2017 at 06:47:23PM +, Andri Möll wrote: > Hey, > > As per Andrew [Cooper]'s suggestion, writing here instead of #xen on > Freenode. > > I'm trying out Xen (4.9.0) with OVMF (r21243.3858b4a1ff-1) and having it > crash right on boot both with the 32b and 64b OVMF binaries. This

Re: [Xen-devel] [PATCH v2 3/4] xen/x86: Replace remaining mandatory barriers with SMP barriers

2017-08-17 Thread Jan Beulich
>>> On 17.08.17 at 11:35, wrote: > On 17/08/17 09:37, Jan Beulich wrote: > On 16.08.17 at 13:22, wrote: >>> --- a/xen/arch/x86/time.c >>> +++ b/xen/arch/x86/time.c >>> @@ -976,10 +976,10 @@ static void __update_vcpu_system_time(struct

Re: [Xen-devel] [PATCH RESEND1 00/12] ALSA: vsnd: Add Xen para-virtualized frontend driver

2017-08-17 Thread Oleksandr Grytsov
On Thu, Aug 10, 2017 at 11:10 AM, Oleksandr Andrushchenko wrote: > Hi, > > thank you very much for valuable comments and your time! > > > On 08/10/2017 06:14 AM, Takashi Sakamoto wrote: >> >> Hi, >> >> On Aug 7 2017 21:22, Oleksandr Andrushchenko wrote: >>> >>> From: Oleksandr

Re: [Xen-devel] [PATCH v4 00/13] libxl: add PV display device driver interface

2017-08-17 Thread Oleksandr Grytsov
On Fri, Jul 28, 2017 at 5:13 PM, Wei Liu wrote: > On Tue, Jul 18, 2017 at 05:25:17PM +0300, Oleksandr Grytsov wrote: >> From: Oleksandr Grytsov >> >> Changes since V3: >> * libxl__device_add renamed to libxl__device_add_async and reworked >>

Re: [Xen-devel] [PATCH 11/11] xen/arm: Limit the scope of cpregs.h

2017-08-17 Thread Julien Grall
On 17/08/17 08:30, Bhupinder Thakur wrote: Hi Julien, Hi Bhupinder, On 11 August 2017 at 23:32, Julien Grall wrote: Currently, cpregs.h is included in pretty much every files even for arm64. However, the only use for arm64 is when emulating co-processors. For

[Xen-devel] [PATCH XTF] Fuzzing the hypervisor

2017-08-17 Thread Felix Schmoll
Changes based on commit 8956f82ce1321b89deda6895d58e5788d2198477 --- include/xen/xen.h | 1 + include/xtf/hypercall.h| 8 +- tests/mk_hcall/.main.c.swo | Bin 0 -> 12288 bytes tests/mk_hcall/Makefile| 9 +++ tests/mk_hcall/main.c | 51 +

[Xen-devel] [PATCH XEN] Fuzzing the hypervisor

2017-08-17 Thread Felix Schmoll
Based on commit 6c9abf0e8022807bb7d677570d0775659950ff1a --- xen/Kconfig.debug | 7 +++- xen/Rules.mk | 4 ++ xen/arch/arm/traps.c | 1 + xen/arch/x86/Makefile | 2 + xen/arch/x86/hvm/hypercall.c | 1 + xen/arch/x86/hypercall.c | 1 +

Re: [Xen-devel] [PATCHES v8 8/8] mm: Make sure pages are scrubbed

2017-08-17 Thread Julien Grall
Hi Boris, On 16/08/17 19:33, Boris Ostrovsky wrote: +static void check_one_page(struct page_info *pg) +{ +#ifdef CONFIG_SCRUB_DEBUG +mfn_t mfn = _mfn(page_to_mfn(pg)); +const uint64_t *ptr; +unsigned int i; + +if ( !boot_scrub_done ) +return; + +ptr =

Re: [Xen-devel] [PATCH v2 4/4] xen/x86: Correct mandatory and SMP barrier definitions

2017-08-17 Thread Jan Beulich
>>> On 16.08.17 at 13:22, wrote: > Barriers are a complicated topic, a source of confusion, and their incorrect > use is a common cause of bugs. It *really* doesn't help when Xen's API is the > same as Linux, but its ABI different. > > Bring the two back in line, so

Re: [Xen-devel] "MMIO emulation failed" from booting OVMF on Xen v4.9.0

2017-08-17 Thread Jan Beulich
>>> On 16.08.17 at 20:47, wrote: > Hey, > > As per Andrew [Cooper]'s suggestion, writing here instead of #xen on > Freenode. > > I'm trying out Xen (4.9.0) with OVMF (r21243.3858b4a1ff-1) and having it > crash right on boot both with the 32b and 64b OVMF binaries. This is on >

[Xen-devel] [PATCH] xen: fix build failure related to removing adjust_exception_frame

2017-08-17 Thread Juergen Gross
A kernel configured with XEN_PV but without KVM_GUEST will fail to build since the patch removing the adjust_exception_frame paravirt op. Fix this failure. Reported-by: Sander Eikelenboom Signed-off-by: Juergen Gross --- arch/x86/xen/xen-asm_64.S | 1 -

[Xen-devel] [xen-4.8-testing test] 112664: tolerable trouble: blocked/broken/fail/pass - PUSHED

2017-08-17 Thread osstest service owner
flight 112664 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/112664/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-rtds 6 xen-install fail in 112649 pass in 112664 test-armhf-armhf-xl-vhd 15

Re: [Xen-devel] [PATCH v2 2.5/4] xen/x86: Replace mandatory barriers with compiler barriers

2017-08-17 Thread Jan Beulich
>>> On 16.08.17 at 19:18, wrote: > In this case, rmb() is being used for its compiler barrier property. Replace > it with an explicit barrer() and comment, to avoid it becoming an > unnecessary > lfence instruction (when rmb() gets fixed) or looking like an SMP issue.

Re: [Xen-devel] [PATCH v2 3/4] xen/x86: Replace remaining mandatory barriers with SMP barriers

2017-08-17 Thread Jan Beulich
>>> On 16.08.17 at 13:22, wrote: > There is no functional change. Xen currently assignes smp_* meaning to > the non-smp_* barriers. > > All of these uses are just to deal with shared memory between multiple > processors, so use the smp_*() which are the correct

Re: [Xen-devel] [PATCH v2 0/4] x86/pvh: implement iommu_inclusive_mapping for PVH Dom0

2017-08-17 Thread Roger Pau Monne
On Thu, Aug 17, 2017 at 03:10:44AM +, Tian, Kevin wrote: > > From: Roger Pau Monne > > Sent: Saturday, August 12, 2017 12:43 AM > > > > Hello, > > > > Currently iommu_inclusive_mapping is not working for PVH Dom0, this > > not working for all platforms or only older boxes? The subject

Re: [Xen-devel] [PATCH v2 3/4] x86/vtd: introduce a PVH implementation of iommu_inclusive_mapping

2017-08-17 Thread Roger Pau Monne
On Thu, Aug 17, 2017 at 03:28:29AM +, Tian, Kevin wrote: > > From: Roger Pau Monne [mailto:roger@citrix.com] > > Sent: Saturday, August 12, 2017 12:43 AM > > > > On certain Intel systems, as far as I can tell almost all pre-Haswell ones, > > trying to boot a PVH Dom0 will freeze the box

[Xen-devel] [GSoC] Fuzzing the Hypervisor

2017-08-17 Thread Felix Schmoll
This email will be a technical description of what I, Felix Schmoll, as a Google Summer of Code student, did over summer. === Introduction / What is the project? === Fuzzing is a recent trend for systematic testing of interfaces by trying more or less random inputs and iterating over them. A

Re: [Xen-devel] x86: PIE support and option to extend KASLR randomization

2017-08-17 Thread Ingo Molnar
* Thomas Garnier wrote: > > > -model=small/medium assume you are on the low 32-bit. It generates > > > instructions where the virtual addresses have the high 32-bit to be zero. > > > > How are these assumptions hardcoded by GCC? Most of the instructions should > > be > >

[Xen-devel] [PATCH RFC] x86: enable RCU based table free when PARAVIRT

2017-08-17 Thread Vitaly Kuznetsov
On x86 software page-table walkers depend on the fact that remote TLB flush does an IPI: walk is performed lockless but with interrupts disabled and in case the pagetable is freed the freeing CPU will get blocked as remote TLB flush is required. On other architecture which don't require an IPI to

Re: [Xen-devel] [PATCH v2 1/4] x86/dom0: prevent access to MMCFG areas for PVH Dom0

2017-08-17 Thread Roger Pau Monne
On Thu, Aug 17, 2017 at 03:12:02AM +, Tian, Kevin wrote: > > From: Roger Pau Monne > > Sent: Saturday, August 12, 2017 12:43 AM > > > > They are emulated by Xen, so they must not be mapped into Dom0 p2m. > > Introduce a helper function to add the MMCFG areas to the list of > > denied iomem

Re: [Xen-devel] [PATCH v2 3/4] xen/x86: Replace remaining mandatory barriers with SMP barriers

2017-08-17 Thread Andrew Cooper
On 17/08/17 09:37, Jan Beulich wrote: On 16.08.17 at 13:22, wrote: >> There is no functional change. Xen currently assignes smp_* meaning to >> the non-smp_* barriers. >> >> All of these uses are just to deal with shared memory between multiple >> processors, so

Re: [Xen-devel] [PATCH v2 2/4] x86/dom0: prevent PVH Dom0 from mapping read-only the IO APIC area

2017-08-17 Thread Roger Pau Monne
On Thu, Aug 17, 2017 at 03:12:45AM +, Tian, Kevin wrote: > > From: Roger Pau Monne > > Sent: Saturday, August 12, 2017 12:43 AM > > > > This is emulated by Xen and must not be mapped into PVH Dom0 p2m. > > same comment as previous one. please send it separately. This will only be mapped

Re: [Xen-devel] [PATCH v1 04/13] x86: implement data structure and CPU init flow for MBA

2017-08-17 Thread Wei Liu
On Wed, Aug 16, 2017 at 03:18:13PM +0800, Yi Sun wrote: > On 17-08-15 11:50:15, Wei Liu wrote: > > > struct feat_node { > > > -/* cos_max and cbm_len are common values for all features so far. */ > > > +/* cos_max is common values for all features so far. */ > > > unsigned int

[Xen-devel] [xen-4.6-testing baseline-only test] 71984: regressions - FAIL

2017-08-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71984 xen-4.6-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71984/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-421

[Xen-devel] [distros-debian-wheezy test] 71985: tolerable trouble: broken/pass

2017-08-17 Thread Platform Team regression test user
flight 71985 distros-debian-wheezy real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71985/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: build-arm64 2 hosts-allocate broken like 71959 build-arm64-pvops

Re: [Xen-devel] [PATCH V2 9/25] tools/libxl: build DMAR table for a guest with one virtual VTD

2017-08-17 Thread Wei Liu
On Thu, Aug 17, 2017 at 12:32:17PM +0100, Wei Liu wrote: > On Wed, Aug 09, 2017 at 04:34:10PM -0400, Lan Tianyu wrote: > > diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c > > index f54fd49..94c9196 100644 > > --- a/tools/libxl/libxl_dom.c > > +++ b/tools/libxl/libxl_dom.c > > @@

Re: [Xen-devel] "MMIO emulation failed" from booting OVMF on Xen v4.9.0

2017-08-17 Thread Andrew Cooper
On 17/08/17 09:49, Jan Beulich wrote: On 16.08.17 at 20:47, wrote: >> Hey, >> >> As per Andrew [Cooper]'s suggestion, writing here instead of #xen on >> Freenode. >> >> I'm trying out Xen (4.9.0) with OVMF (r21243.3858b4a1ff-1) and having it >> crash right on boot both with

Re: [Xen-devel] [PATCH v4 00/13] libxl: add PV display device driver interface

2017-08-17 Thread Wei Liu
On Thu, Aug 17, 2017 at 01:13:39PM +0300, Oleksandr Grytsov wrote: > On Fri, Jul 28, 2017 at 5:13 PM, Wei Liu wrote: > > On Tue, Jul 18, 2017 at 05:25:17PM +0300, Oleksandr Grytsov wrote: > >> From: Oleksandr Grytsov > >> > >> Changes since V3: >

Re: [Xen-devel] [PATCH V2 2/25] VIOMMU: Add irq request callback to deal with irq remapping

2017-08-17 Thread Wei Liu
On Wed, Aug 09, 2017 at 04:34:03PM -0400, Lan Tianyu wrote: > This patch is to add irq request callback for platform implementation > to deal with irq remapping request. > > Signed-off-by: Lan Tianyu > --- > xen/common/viommu.c | 15 + >

Re: [Xen-devel] [PATCH V2 3/25] VIOMMU: Add get irq info callback to convert irq remapping request

2017-08-17 Thread Wei Liu
On Wed, Aug 09, 2017 at 04:34:04PM -0400, Lan Tianyu wrote: > This patch is to add get_irq_info callback for platform implementation > to convert irq remapping request to irq info (E,G vector, dest, dest_mode > and so on). > > Signed-off-by: Lan Tianyu > --- >

Re: [Xen-devel] [PATCH V2 1/25] DOMCTL: Introduce new DOMCTL commands for vIOMMU support

2017-08-17 Thread Wei Liu
On Wed, Aug 09, 2017 at 04:34:02PM -0400, Lan Tianyu wrote: [...] > > +int viommu_domctl(struct domain *d, struct xen_domctl_viommu_op *op, > + bool *need_copy) > +{ > +int rc = -EINVAL, ret; > + > +if ( !viommu_enabled() ) > +return rc; > + > +switch (

Re: [Xen-devel] [PATCH V2 4/25] Xen/doc: Add Xen virtual IOMMU doc

2017-08-17 Thread Wei Liu
On Wed, Aug 09, 2017 at 04:34:05PM -0400, Lan Tianyu wrote: > +Now just suppport single vIOMMU for one VM and introduced domtcls are > compatible > +with multi-vIOMMU support. Is this still true? There is an ID field in the struct which can distinguish multiple viommus, right? > + > +xl vIOMMU

Re: [Xen-devel] [PATCH V2 9/25] tools/libxl: build DMAR table for a guest with one virtual VTD

2017-08-17 Thread Wei Liu
On Wed, Aug 09, 2017 at 04:34:10PM -0400, Lan Tianyu wrote: > diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c > index f54fd49..94c9196 100644 > --- a/tools/libxl/libxl_dom.c > +++ b/tools/libxl/libxl_dom.c > @@ -1060,6 +1060,42 @@ static int libxl__domain_firmware(libxl__gc *gc, >

[Xen-devel] [PATCH v6] x86/hvm: Allow guest_request vm_events coming from userspace

2017-08-17 Thread Alexandru Isaila
In some introspection usecases, an in-guest agent needs to communicate with the external introspection agent. An existing mechanism is HVMOP_guest_request_vm_event, but this is restricted to kernel usecases like all other hypercalls. Introduce a mechanism whereby the introspection agent can

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-17 Thread Volodymyr Babchuk
Hi Jan, On Thu, Aug 17, 2017 at 01:45:54AM -0600, Jan Beulich wrote: > >>> On 16.08.17 at 23:41, wrote: > > Hello Jan, > > > > On Wed, Aug 09, 2017 at 05:58:19AM -0600, Jan Beulich wrote: > > > >> > >> > On 08/08/17 21:08, Volodymyr Babchuk wrote: > >> >> +#ifndef

Re: [Xen-devel] [PATCH XTF] Fuzzing the hypervisor

2017-08-17 Thread Wei Liu
On Thu, Aug 17, 2017 at 12:21:49PM +0200, Felix Schmoll wrote: > Changes based on commit 8956f82ce1321b89deda6895d58e5788d2198477 > --- > include/xen/xen.h | 1 + > include/xtf/hypercall.h| 8 +- > tests/mk_hcall/.main.c.swo | Bin 0 -> 12288 bytes This should not be included.

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-17 Thread Julien Grall
Hi, On 17/08/17 13:35, Volodymyr Babchuk wrote: I wrote this small test program: #include struct test { int a[2]; }; int main (int argc, char* argv[]) { printf("%d\n", ((struct test){{1,2}}).a[0]); return 0; } It is compiles with gcc --std=c89 without warnings.

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-17 Thread Jan Beulich
>>> On 17.08.17 at 14:35, wrote: > On Thu, Aug 17, 2017 at 01:45:54AM -0600, Jan Beulich wrote: >> >>> On 16.08.17 at 23:41, wrote: >> > On Wed, Aug 09, 2017 at 05:58:19AM -0600, Jan Beulich wrote: >> >> > On 08/08/17 21:08, Volodymyr

[Xen-devel] [linux-next test] 112662: regressions - trouble: blocked/broken/fail/pass

2017-08-17 Thread osstest service owner
flight 112662 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/112662/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64 7 xen-boot fail REGR. vs. 112653

Re: [Xen-devel] [PATCH v2 3/6] xen: RCU/x86/ARM: discount CPUs that were idle when grace period started.

2017-08-17 Thread Tim Deegan
Hi, This looks good to me. I have one question: At 18:45 +0200 on 16 Aug (1502909149), Dario Faggioli wrote: > @@ -474,7 +484,41 @@ static struct notifier_block cpu_nfb = { > void __init rcu_init(void) > { > void *cpu = (void *)(long)smp_processor_id(); > + > +

[Xen-devel] [PATCH 1/1] xen-blkback: stop blkback thread of every queue in xen_blkif_disconnect

2017-08-17 Thread Annie Li
If there is inflight I/O in any non-last queue, blkback returns -EBUSY directly, and never stops thread of remaining queue and processs them. When removing vbd device with lots of disk I/O load, some queues with inflight I/O still have blkback thread running even though the corresponding vbd

[Xen-devel] [PATCH 12/12] xen-blkfront: Avoid that gcc 7 warns about fall-through when building with W=1

2017-08-17 Thread Bart Van Assche
Signed-off-by: Bart Van Assche Cc: Konrad Rzeszutek Wilk Cc: Roger Pau Monn303251 Cc: xen-de...@lists.xenproject.org --- drivers/block/xen-blkfront.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git

[Xen-devel] [PATCH 11/12] xen-blkback: Avoid that gcc 7 warns about fall-through when building with W=1

2017-08-17 Thread Bart Van Assche
Signed-off-by: Bart Van Assche Cc: Konrad Rzeszutek Wilk Cc: Roger Pau Monn303251 Cc: xen-de...@lists.xenproject.org --- drivers/block/xen-blkback/blkback.c | 1 + drivers/block/xen-blkback/xenbus.c | 3 ++- 2 files

[Xen-devel] [PATCH 10/12] xen-blkback: Fix indentation

2017-08-17 Thread Bart Van Assche
Avoid that smatch reports the following warning when building with C=2 CHECK="smatch -p=kernel": drivers/block/xen-blkback/blkback.c:710 xen_blkbk_unmap_prepare() warn: inconsistent indenting Signed-off-by: Bart Van Assche Cc: Konrad Rzeszutek Wilk

[Xen-devel] [ovmf baseline-only test] 71988: all pass

2017-08-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71988 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71988/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf d75b8ac278bc9f0159aa7eb9a92fd2cc87a18d8c baseline

Re: [Xen-devel] [PATCH V2 9/25] tools/libxl: build DMAR table for a guest with one virtual VTD

2017-08-17 Thread Chao Gao
On Thu, Aug 17, 2017 at 01:28:21PM +0100, Wei Liu wrote: >On Thu, Aug 17, 2017 at 12:32:17PM +0100, Wei Liu wrote: >> On Wed, Aug 09, 2017 at 04:34:10PM -0400, Lan Tianyu wrote: >> > diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c >> > index f54fd49..94c9196 100644 >> > ---

Re: [Xen-devel] [PATCH v1 07/13] x86: implement set value flow for MBA

2017-08-17 Thread Chao Peng
> +if ( feat->mba_info.linear ) > +{ > +unsigned int mod; > + > +if ( feat->mba_info.thrtl_max >= 100 ) > +return false; Can we do this check earlier, e.g. when it gets enumerated from CPUID? > + > +mod = *thrtl % (100 - feat->mba_info.thrtl_max); > + 

[Xen-devel] [linux-3.18 test] 112675: trouble: blocked/broken/fail/pass

2017-08-17 Thread osstest service owner
flight 112675 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/112675/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvops 3 capture-logs broken REGR. vs. 112102

Re: [Xen-devel] [PATCH RESEND1 00/12] ALSA: vsnd: Add Xen para-virtualized frontend driver

2017-08-17 Thread Oleksandr Andrushchenko
Hello, On 08/18/2017 08:43 AM, Takashi Sakamoto wrote: On Aug 17 2017 19:05, Oleksandr Grytsov wrote: So, from the above we think that period elapsed event derived in the described ways may not improve latency and will complicate the system. So, for that reason we are thinking of the option

Re: [Xen-devel] [PATCH V2 1/25] DOMCTL: Introduce new DOMCTL commands for vIOMMU support

2017-08-17 Thread Lan Tianyu
Hi Wei: Thanks for your review. On 2017年08月17日 19:18, Wei Liu wrote: > On Wed, Aug 09, 2017 at 04:34:02PM -0400, Lan Tianyu wrote: >> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h >> index ff39762..4b10f26 100644 >> --- a/xen/include/public/domctl.h >> +++

[Xen-devel] [libvirt test] 112677: tolerable trouble: blocked/broken/pass - PUSHED

2017-08-17 Thread osstest service owner
flight 112677 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/112677/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a build-arm64-libvirt 1

Re: [Xen-devel] [PATCH for-2.10 v3 2/3] hw/acpi: Move acpi_set_pci_info to pcihp

2017-08-17 Thread Michael S. Tsirkin
On Thu, Aug 17, 2017 at 05:23:46PM +0100, Anthony PERARD wrote: > This means that the function will be call and the property > acpi-pcihp-bsel will be set even if ACPI build is disable. > > To do PCI passthrough with Xen, the property acpi-pcihp-bsel needs to be > set, but this was done only when

Re: [Xen-devel] [PATCH RESEND1 00/12] ALSA: vsnd: Add Xen para-virtualized frontend driver

2017-08-17 Thread Takashi Sakamoto
On Aug 17 2017 19:05, Oleksandr Grytsov wrote: So, from the above we think that period elapsed event derived in the described ways may not improve latency and will complicate the system. So, for that reason we are thinking of the option 2) (Positions of actual data transmission in any serial

Re: [Xen-devel] [PATCHES v8 8/8] mm: Make sure pages are scrubbed

2017-08-17 Thread Boris Ostrovsky
On 08/17/2017 06:27 AM, Julien Grall wrote: > Hi Boris, > > On 16/08/17 19:33, Boris Ostrovsky wrote: >> +static void check_one_page(struct page_info *pg) >> +{ >> +#ifdef CONFIG_SCRUB_DEBUG >> +mfn_t mfn = _mfn(page_to_mfn(pg)); >> +const uint64_t *ptr; >> +unsigned int i; >> + >> +

Re: [Xen-devel] [PATCH for-2.10 v2 1/2] hw/acpi: Call acpi_set_pci_info when no ACPI tables needed

2017-08-17 Thread Anthony PERARD
On Wed, Aug 16, 2017 at 11:10:46AM +0200, Igor Mammedov wrote: > On Tue, 15 Aug 2017 22:24:08 +0300 > "Michael S. Tsirkin" wrote: > > > On Tue, Aug 15, 2017 at 02:07:51PM +0200, Igor Mammedov wrote: > > > On Tue, 15 Aug 2017 12:15:48 +0100 > > > Anthony PERARD

Re: [Xen-devel] [For 4.9] Updating https://wiki.xenproject.org/wiki/Xen_Project_Release_Features to reflect support status of new features

2017-08-17 Thread Julien Grall
Hi, I wanted to bump this thread. I saw that the page still contain "Note that we will add complete information related to Xen Project 4.9, in the week after the 4.9 release.". It looks like to me we added some features, but I am not sure if we added all of them. Cheers, On 27/06/17

Re: [Xen-devel] [PATCH v4 04/31] x86/mm: lift PAGE_CACHE_ATTRS to page.h

2017-08-17 Thread Andrew Cooper
On 17/08/17 15:44, Wei Liu wrote: > Currently all the users are within x86/mm.c. But that will change once > we split PV specific mm code to another file. Lift that to page.h > along side _PAGE_* in preparation for later patches. > > No functional change. Add some spaces around "|" while moving. >

Re: [Xen-devel] [PATCH] hvm: vmx/svm_cpu_up_prepare should be called only once

2017-08-17 Thread Jan Beulich
>>> On 17.08.17 at 16:19, wrote: > --- a/xen/arch/x86/hvm/vmx/vmcs.c > +++ b/xen/arch/x86/hvm/vmx/vmcs.c > @@ -652,7 +652,7 @@ int vmx_cpu_up(void) > > INIT_LIST_HEAD(_cpu(active_vmcs_list)); > > -if ( (rc = vmx_cpu_up_prepare(cpu)) != 0 ) > +if ( (cpu

Re: [Xen-devel] [PATCH] hvm: vmx/svm_cpu_up_prepare should be called only once

2017-08-17 Thread Boris Ostrovsky
On 08/17/2017 10:59 AM, Jan Beulich wrote: On 17.08.17 at 16:19, wrote: >> --- a/xen/arch/x86/hvm/vmx/vmcs.c >> +++ b/xen/arch/x86/hvm/vmx/vmcs.c >> @@ -652,7 +652,7 @@ int vmx_cpu_up(void) >> >> INIT_LIST_HEAD(_cpu(active_vmcs_list)); >> >> -if ( (rc

Re: [Xen-devel] [PATCH] hvm: vmx/svm_cpu_up_prepare should be called only once

2017-08-17 Thread Andrew Cooper
On 17/08/17 15:19, Boris Ostrovsky wrote: > diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c > index 0dc9442..3e7b9fc 100644 > --- a/xen/arch/x86/hvm/svm/svm.c > +++ b/xen/arch/x86/hvm/svm/svm.c > @@ -1538,7 +1538,7 @@ static int _svm_cpu_up(bool bsp) > return -EINVAL;

[Xen-devel] [xen-unstable-smoke test] 112680: tolerable trouble: broken/pass - PUSHED

2017-08-17 Thread osstest service owner
flight 112680 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112680/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64-pvops 2

Re: [Xen-devel] [PATCH] xen: fix build failure related to removing adjust_exception_frame

2017-08-17 Thread Boris Ostrovsky
On 08/17/2017 05:03 AM, Juergen Gross wrote: > A kernel configured with XEN_PV but without KVM_GUEST will fail to > build since the patch removing the adjust_exception_frame paravirt > op. > > Fix this failure. > > Reported-by: Sander Eikelenboom > Signed-off-by: Juergen

Re: [Xen-devel] "MMIO emulation failed" from booting OVMF on Xen v4.9.0

2017-08-17 Thread Alexey G
On Thu, 17 Aug 2017 11:56:06 +0100 Andrew Cooper wrote: > On 17/08/17 09:49, Jan Beulich wrote: > On 16.08.17 at 20:47, wrote: > >> Hey, > >> > >> As per Andrew [Cooper]'s suggestion, writing here instead of #xen on > >> Freenode. > >> > >> I'm

Re: [Xen-devel] preparations for 4.8.2

2017-08-17 Thread Lars Kurth
Jan, it’s been a while. Did you want to pick this up at some point again? I guess the check we have done so far is by now out-of-date. Not sure whether anyone tagged anything It would also be a good opportunity for you guys to test run my script (Wei ran it and it worked fine, but he didn’t

Re: [Xen-devel] x86: PIE support and option to extend KASLR randomization

2017-08-17 Thread Thomas Garnier
On Thu, Aug 17, 2017 at 1:09 AM, Ingo Molnar wrote: > > > * Thomas Garnier wrote: > > > > > -model=small/medium assume you are on the low 32-bit. It generates > > > > instructions where the virtual addresses have the high 32-bit to be > > > > zero. > > > >

Re: [Xen-devel] [kernel-hardening] Re: x86: PIE support and option to extend KASLR randomization

2017-08-17 Thread Boris Lukashev
On Thu, Aug 17, 2017 at 4:09 AM, Ingo Molnar wrote: > > * Thomas Garnier wrote: > >> > > -model=small/medium assume you are on the low 32-bit. It generates >> > > instructions where the virtual addresses have the high 32-bit to be zero. >> > >> > How are

[Xen-devel] [PATCH v4 20/31] x86/mm: move l4 table setup code

2017-08-17 Thread Wei Liu
Move two functions to pv/mm.c. Add prefix to init_guest_l4_table. Export them via pv/mm.h. Fix up call sites. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c| 69 +--- xen/arch/x86/pv/dom0_build.c | 3 +-

[Xen-devel] [PATCH v4 29/31] x86/mm: remove the now unused inclusion of pv/mm.h

2017-08-17 Thread Wei Liu
Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 54256b6a11..c2a73f123f 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -127,8 +127,6 @@ #include #include -#include

[Xen-devel] [PATCH v4 10/31] x86/mm: move {un, }adjust_guest_* to pv/mm.h

2017-08-17 Thread Wei Liu
Those macros will soon be used in different files. They are PV specific so move them to pv/mm.h. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 47 - xen/include/asm-x86/pv/mm.h | 47

[Xen-devel] [PATCH v4 23/31] x86/mm: export more get/put page functions

2017-08-17 Thread Wei Liu
Export some of the get/put functions so that we can move PV mm code trunk by trunk. When moving code is done some of the functions might be made static again. Also fix coding style issues and use bool when appropriate. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c|

[Xen-devel] [PATCH v4 26/31] x86/mm: move pv_{alloc, free}_page_type

2017-08-17 Thread Wei Liu
Move them and the helper functions to pv/mm.c. Use bool in the moved code where appropriate. Put BUG() in the stub because the callers will call BUG or BUG_ON anyway. Signed-off-by: Wei Liu --- v4: add BUG() in stubs --- xen/arch/x86/domain.c | 1 +

[Xen-devel] [PATCH v4 28/31] x86/mm: move PV hypercalls to pv/mm-hypercalls.c

2017-08-17 Thread Wei Liu
Also move pv_new_guest_cr3 there so that we don't have to export mod_l1_entry. Fix coding style issues. Change v to curr and d to currd where appropriate. Signed-off-by: Wei Liu --- I can't convince git diff to produce sensible diff for donate_page and steal_page. Those

[Xen-devel] [PATCH v4 24/31] x86/mm: move and add pv_ prefix to create_pae_xen_mappings

2017-08-17 Thread Wei Liu
And export it via a local header because it is going to be used by several PV specific files. Take the chance to change its return type to bool. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c| 46 -- xen/arch/x86/pv/mm.c | 40

[Xen-devel] [PATCH v4 17/31] x86/mm: move compat descriptor handling code

2017-08-17 Thread Wei Liu
Move them along side the non-compat variants. Signed-off-by: Wei Liu --- xen/arch/x86/pv/descriptor-tables.c | 40 xen/arch/x86/x86_64/compat/mm.c | 41 - 2 files changed, 40 insertions(+), 41

[Xen-devel] [PATCH v4 15/31] x86/mm: split out PV grant table code

2017-08-17 Thread Wei Liu
Move the code to pv/grant_table.c. Fix some coding style issues while moving code. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 363 -- xen/arch/x86/pv/Makefile | 1 + xen/arch/x86/pv/grant_table.c | 398

[Xen-devel] [PATCH v4 31/31] x86/mm: move {get, put}_page_from_l{2, 3, 4}e

2017-08-17 Thread Wei Liu
They are only used by PV code. Fix coding style issues while moving. Move declarations to PV specific header file. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 253 xen/arch/x86/pv/mm.c| 246

[Xen-devel] [PATCH v4 19/31] x86/mm: factor out pv_arch_init_memory

2017-08-17 Thread Wei Liu
Move the split l4 setup code into the new function. The new function is also going to contain other PV specific setup code in later patch. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 73 ++- 1 file changed, 40

[Xen-devel] [PATCH v4 21/31] x86/mm: add "pv_" prefix to new_guest_cr3

2017-08-17 Thread Wei Liu
Also take the chance to change d to currd. This function can't be moved yet. It can only be moved with other functions. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 19 ++- xen/arch/x86/pv/emul-priv-op.c | 3 ++- xen/include/asm-x86/mm.h

[Xen-devel] [PATCH v4 27/31] x86/mm: move and add pv_ prefix to invalidate_shadow_ldt

2017-08-17 Thread Wei Liu
Move the code to pv/mm.c and export it via pv/mm.h. Use bool for flush. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 44 xen/arch/x86/pv/mm.c| 35 +++

[Xen-devel] [PATCH v4 13/31] x86/mm: remove the unused inclusion of pv/emulate.h

2017-08-17 Thread Wei Liu
All emulation code is moved by now. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index a42720c8d1..dd8fa43ef3 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -127,8 +127,6

[Xen-devel] [PATCH v4 18/31] x86/mm: move and rename map_ldt_shadow_page

2017-08-17 Thread Wei Liu
Take the chance to change v to curr and d to currd in code. Also change the return type to bool. Fix up all the call sites. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 43 - xen/arch/x86/pv/descriptor-tables.c | 42

[Xen-devel] [PATCH v4 11/31] x86/mm: split out writable pagetable emulation code

2017-08-17 Thread Wei Liu
Move the code to pv/emul-ptwr-op.c. Fix coding style issues while moving the code. Rename ptwr_emulated_read to pv_emul_ptwr_read and export it via pv/mm.h because it is needed by other emulation code. Signed-off-by: Wei Liu --- xen/arch/x86/mm.c | 308

[Xen-devel] [PATCH v4 22/31] x86: add pv_ prefix to {alloc, free}_page_type

2017-08-17 Thread Wei Liu
They are only useful for PV guests. Also change preemptible to bool. Signed-off-by: Wei Liu --- xen/arch/x86/domain.c| 2 +- xen/arch/x86/mm.c| 12 ++-- xen/include/asm-x86/mm.h | 4 ++-- 3 files changed, 9 insertions(+), 9 deletions(-) diff --git

[Xen-devel] [PATCH v4 16/31] x86/mm: split out descriptor table code

2017-08-17 Thread Wei Liu
Move the code to pv/descriptor-tables.c. Add "pv_" prefix to {set,destroy}_gdt. Fix up call sites. Move the declarations to new header file. Fix coding style issues while moving code. Signed-off-by: Wei Liu --- xen/arch/x86/domain.c | 11 ++-

  1   2   >