Re: [Xen-devel] [PATCH V6] x86/altp2m: Add a subop for obtaining the mem access of a page

2018-10-17 Thread Razvan Cojocaru
On 10/16/18 7:26 PM, George Dunlap wrote: > On 09/27/2018 08:58 AM, Razvan Cojocaru wrote: >> Currently there is a subop for setting the memaccess of a page, but not >> for consulting it. The new HVMOP_altp2m_get_mem_access adds this >> functionality. >> >> Both altp2m get/set mem access functions

Re: [Xen-devel] [PATCH] x86/mm/p2m: don't needlessly limit MMIO mapping order to 4k

2018-10-17 Thread Paul Durrant
> -Original Message- > From: Roger Pau Monne > Sent: 16 October 2018 17:27 > To: Paul Durrant > Cc: xen-devel@lists.xenproject.org; George Dunlap > ; Andrew Cooper ; Wei > Liu ; Jan Beulich > Subject: Re: [Xen-devel] [PATCH] x86/mm/p2m: don't needlessly limit MMIO > mapping order to 4k >

[Xen-devel] [ovmf test] 128846: all pass - PUSHED

2018-10-17 Thread osstest service owner
flight 128846 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/128846/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf b7dcf31402f410c53242839271ba3b94b619 baseline version: ovmf 25d310d9b6187ca2e770b

Re: [Xen-devel] [PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project

2018-10-17 Thread Paul Durrant
> -Original Message- > From: Xen-devel [mailto:xen-devel-boun...@lists.xenproject.org] On Behalf > Of Alexander Schulz - XCP-ng Project Member > Sent: 16 October 2018 21:28 > To: xen-devel@lists.xenproject.org > Cc: Wei Liu ; Ian Jackson ; > c...@schulzalex.de > Subject: [Xen-devel] [PATCH]

[Xen-devel] [PATCH] iommu / p2m: add a page_order parameter to iommu_map/unmap_page()

2018-10-17 Thread Paul Durrant
The P2M code currently contains many loops to deal with the fact that, while it may be require to handle page orders greater than 4k, the IOMMU map and unmap functions do not. This patch adds a page_order parameter to those functions and implements the necessary loops within. This allows the P2M co

Re: [Xen-devel] [PATCH] x86: remove redundant 'default n' from Kconfig-s

2018-10-17 Thread Borislav Petkov
Hi Bart, On Tue, Oct 16, 2018 at 03:42:16PM +0200, Bartlomiej Zolnierkiewicz wrote: > 'default n' is the default value for any bool or tristate Kconfig > setting so there is no need to write it explicitly. > > Also since commit f467c5640c29 ("kconfig: only write '# CONFIG_FOO > is not set' for vi

Re: [Xen-devel] [PATCH] xen: remove redundant 'default n' from Kconfig

2018-10-17 Thread Juergen Gross
On 16/10/2018 16:33, Bartlomiej Zolnierkiewicz wrote: > 'default n' is the default value for any bool or tristate Kconfig > setting so there is no need to write it explicitly. > > Also since commit f467c5640c29 ("kconfig: only write '# CONFIG_FOO > is not set' for visible symbols") the Kconfig beh

[Xen-devel] [linux-4.9 test] 128822: regressions - FAIL

2018-10-17 Thread osstest service owner
flight 128822 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/128822/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64-shadow 16 guest-localmigrate/x10 fail in 128696 REGR. vs.

[Xen-devel] [freebsd-master test] 128850: regressions - trouble: blocked/broken

2018-10-17 Thread osstest service owner
flight 128850 freebsd-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/128850/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-freebsd broken build-amd64-freebsd 6 host-bu

[Xen-devel] [PATCH v2] arch/x86: Add registers to vm_event

2018-10-17 Thread Alexandru Stefan ISAILA
This patch adds a couple of regs to the vm_event that are used by the introspection. The base, limit and ar bits are compressed into a uint64_t union so as not to enlarge the vm_event. Signed-off-by: Alexandru Isaila --- Changes since V1: - Add helper function for packing - Chang

[Xen-devel] [xen-unstable-coverity test] 128849: all pass - PUSHED

2018-10-17 Thread osstest service owner
flight 128849 xen-unstable-coverity real [real] http://logs.test-lab.xenproject.org/osstest/logs/128849/ Perfect :-) All tests in this flight passed as required version targeted for testing: xen 7559ab7830c3e1594cd73efd3f1acbb171036728 baseline version: xen 9266

Re: [Xen-devel] [PATCH v2] arch/x86: Add registers to vm_event

2018-10-17 Thread Andrew Cooper
On 17/10/18 10:39, Alexandru Stefan ISAILA wrote: > This patch adds a couple of regs to the vm_event that are used by > the introspection. The base, limit and ar > bits are compressed into a uint64_t union so as not to enlarge the > vm_event. > > Signed-off-by: Alexandru Isaila > > --- > Changes s

Re: [Xen-devel] [RFC PATCH v2 00/17] Add support for qemu-xen runnning in a Linux-based stubdomain.

2018-10-17 Thread Ian Jackson
Marek Marczykowski-Górecki writes ("Re: [RFC PATCH v2 00/17] Add support for qemu-xen runnning in a Linux-based stubdomain."): > From those two options I'd prefer multiple xenstore keys as much > cleaner. We do have them as an array in libxl already. > > So, let image/dmargs be actually a directo

[Xen-devel] [ovmf baseline-only test] 75437: trouble: blocked/broken

2018-10-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75437 ovmf real [real] http://osstest.xensource.com/osstest/logs/75437/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xsm

Re: [Xen-devel] [PATCH v2] arch/x86: Add registers to vm_event

2018-10-17 Thread Alexandru Stefan ISAILA
On 17.10.2018 12:49, Andrew Cooper wrote: > On 17/10/18 10:39, Alexandru Stefan ISAILA wrote: >> This patch adds a couple of regs to the vm_event that are used by >> the introspection. The base, limit and ar >> bits are compressed into a uint64_t union so as not to enlarge the >> vm_event. >> >>

Re: [Xen-devel] [PATCH v2] arch/x86: Add registers to vm_event

2018-10-17 Thread Andrew Cooper
On 17/10/18 12:11, Alexandru Stefan ISAILA wrote: > >>> +uint16_t sel; >>> +union >>> +{ >>> +uint64_t bytes; >>> +struct >>> +{ >>> +uint64_t base :32; >> Better known as... ? > Sorry I don't follow here An aligned 32-bit bitfield of a uin64_t

Re: [Xen-devel] [PATCH] iommu / p2m: add a page_order parameter to iommu_map/unmap_page()

2018-10-17 Thread Andrew Cooper
On 17/10/18 09:19, Paul Durrant wrote: > diff --git a/xen/arch/x86/mm/p2m-pt.c b/xen/arch/x86/mm/p2m-pt.c > index 55df18501e..b264a97bd8 100644 > --- a/xen/arch/x86/mm/p2m-pt.c > +++ b/xen/arch/x86/mm/p2m-pt.c > @@ -683,41 +684,13 @@ p2m_pt_set_entry(struct p2m_domain *p2m, gfn_t gfn_, > mfn_t mfn

Re: [Xen-devel] [PATCH] iommu / p2m: add a page_order parameter to iommu_map/unmap_page()

2018-10-17 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper > Sent: 17 October 2018 12:20 > To: Paul Durrant ; xen-devel@lists.xenproject.org > Cc: Jan Beulich ; Wei Liu ; George > Dunlap ; Ian Jackson ; > Julien Grall ; Konrad Rzeszutek Wilk > ; Stefano Stabellini ; Tim > (Xen.org) ; Jun Nakajima ; Kevin T

[Xen-devel] [qemu-mainline test] 128824: tolerable FAIL - PUSHED

2018-10-17 Thread osstest service owner
flight 128824 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/128824/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stopfail like 128688 test-armhf-armhf-libvirt 14 sav

[Xen-devel] Ping AMD maintainers? [PATCH] x86/svm: Fix svm_update_guest_efer() for domains using shadow paging

2018-10-17 Thread Andrew Cooper
On 05/10/18 18:02, Andrew Cooper wrote: > When using shadow paging, EFER.NX is a Xen controlled bit, and is required by > the shadow pagefault handler to distinguish instruction fetches from data > accesses. > > This can be observed by a guest which has NX and SMEP clear but SMAP active by > attemp

Re: [Xen-devel] Xen PV: Sample new PV driver for buffer sharing between domains

2018-10-17 Thread Omkar Bolla
Hi, I have started finding which patch introduced Armv8 Secondary CPUs issue. I just want to start PV vdevb before domainU debian rootfs mount. Is it possible? Thanks, Omkar B On Mon, Oct 8, 2018 at 4:00 PM Julien Grall wrote: > > > On 08/10/2018 10:12, Omkar Bolla wrote: > > Hi, > > Hi, > >

[Xen-devel] [PATCH] x86/svm: Remove the pdpe fields from struct vmcb

2018-10-17 Thread Andrew Cooper
These fields have existed since the SVM code was first introduced. The earliest reference I can find is c/s d1bd157fbc9 which is unforunately a rebase & squash of a separate dev tree. Looking a the commit message, I'm guessing it was introduced by: > user:twol...@xen-trw1.site > date

Re: [Xen-devel] [PATCH] x86/mm/p2m: don't needlessly limit MMIO mapping order to 4k

2018-10-17 Thread Andrew Cooper
On 16/10/18 15:41, Paul Durrant wrote: > The P2M common code currently restricts the MMIO mapping order of any > domain with IOMMU mappings, but that is not using shared tables, to 4k. > This has been shown to have a huge performance cost when passing through > a PCI device with a very large BAR (e

Re: [Xen-devel] [PATCH RFC] x86/altp2m: fix display frozen when switching to a new view early

2018-10-17 Thread Razvan Cojocaru
On 10/4/18 6:20 PM, Jan Beulich wrote: > Roger recently has posted a patch adding rangeset_merge(), which I think > is more general than your rangeset_copy(). That said, I'm in no way > convinced copying (and then keeping in sync) the range sets across the > altp2m-s is the best approach. It may we

Re: [Xen-devel] [PATCH RFC] x86/altp2m: fix display frozen when switching to a new view early

2018-10-17 Thread Andrew Cooper
On 17/10/18 14:26, Razvan Cojocaru wrote: > On 10/4/18 6:20 PM, Jan Beulich wrote: >> Roger recently has posted a patch adding rangeset_merge(), which I think >> is more general than your rangeset_copy(). That said, I'm in no way >> convinced copying (and then keeping in sync) the range sets across

Re: [Xen-devel] [PATCH RFC] x86/altp2m: fix display frozen when switching to a new view early

2018-10-17 Thread Razvan Cojocaru
On 10/17/18 4:30 PM, Andrew Cooper wrote: > On 17/10/18 14:26, Razvan Cojocaru wrote: >> On 10/4/18 6:20 PM, Jan Beulich wrote: >>> Roger recently has posted a patch adding rangeset_merge(), which I think >>> is more general than your rangeset_copy(). That said, I'm in no way >>> convinced copying

Re: [Xen-devel] [PATCH] mem_access: Fix npfec.kind propagation

2018-10-17 Thread Razvan Cojocaru
On 10/5/18 2:00 PM, Razvan Cojocaru wrote: > On 9/27/18 2:25 PM, George Dunlap wrote: >> The name of the "with_gla" flag is confusing; it has nothing to do >> with the existence or lack thereof of a faulting GLA, but rather where >> the fault originated. The npfec.kind value is always valid, and >

[Xen-devel] [PATCH] add myself as reviewer for Xen support in Linux

2018-10-17 Thread Stefano Stabellini
It would be good for me to keep an eye on the patches that touch Xen support in Linux to try to spot changes that break Xen on ARM early on. Signed-off-by: Stefano Stabellini diff --git a/MAINTAINERS b/MAINTAINERS index 40082e4..0c1984e 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -16013,6 +160

Re: [Xen-devel] [PATCH 2/4] xen/arm: initialize access

2018-10-17 Thread Stefano Stabellini
On Tue, 16 Oct 2018, Tamas K Lengyel wrote: > On Mon, Oct 15, 2018 at 7:14 PM Stefano Stabellini > wrote: > > > > On Mon, 15 Oct 2018, Tamas K Lengyel wrote: > > > On Mon, Oct 15, 2018 at 3:57 AM Stefano Stabellini > > > wrote: > > > > > > > > Initialize variable *access before returning it back

Re: [Xen-devel] [PATCH v3 4/6] xen/arm: zynqmp: eemi access control

2018-10-17 Thread Stefano Stabellini
On Tue, 16 Oct 2018, Julien Grall wrote: > Hi Stefano, > > On 10/16/2018 03:39 AM, Stefano Stabellini wrote: > > On 15/10/2018 08:25, Julien Grall wrote: > > > Hi, > > > > > > On 10/10/2018 11:35 PM, Stefano Stabellini wrote: > > > > On Tue, 28 Aug 2018, Julien Grall wrote: > > > > > On 11/08/18

Re: [Xen-devel] [PATCH] x86/mm/p2m: don't needlessly limit MMIO mapping order to 4k

2018-10-17 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper > Sent: 17 October 2018 14:24 > To: Paul Durrant ; xen-devel@lists.xenproject.org > Cc: George Dunlap ; Jan Beulich > ; Wei Liu > Subject: Re: [PATCH] x86/mm/p2m: don't needlessly limit MMIO mapping order > to 4k > > On 16/10/18 15:41, Paul Durra

Re: [Xen-devel] [PATCH v3 4/6] xen/arm: zynqmp: eemi access control

2018-10-17 Thread Stefano Stabellini
On Tue, 16 Oct 2018, Julien Grall wrote: > Hi, > > Sorry I forgot to answer to the rest of the e-mail. > > On 10/16/2018 03:39 AM, Stefano Stabellini wrote: > > On 15/10/2018 08:25, Julien Grall wrote: > > > > > > +    bool hwdom_access;    /* HW domain gets access regardless.  */ > > > > > > +};

Re: [Xen-devel] [PATCH v3 4/6] xen/arm: zynqmp: eemi access control

2018-10-17 Thread Julien Grall
Hi Stefano, On 17/10/2018 15:03, Stefano Stabellini wrote: On Tue, 16 Oct 2018, Julien Grall wrote: Hi, Sorry I forgot to answer to the rest of the e-mail. On 10/16/2018 03:39 AM, Stefano Stabellini wrote: On 15/10/2018 08:25, Julien Grall wrote: +    bool hwdom_access;    /* HW domain gets

[Xen-devel] [PATCH v2 0/4] misc safety certification fixes

2018-10-17 Thread Stefano Stabellini
Hi all, This short patch series fixes a few issues discovered by the safety certifications code scanner. The first two patches address simple variable initializations concerns. The third patch introduces a new macro that is used throughout the code in patch #4 to access _stext, _etext pointers and

[Xen-devel] [PATCH v2 1/4] xen/arm: initialize target

2018-10-17 Thread Stefano Stabellini
Initialize variable target before passing it as a parameter. It makes the code a bit nicer and it is a safety certification requirement. Signed-off-by: Stefano Stabellini --- Changes in v2: - improve comment --- xen/arch/arm/vgic-v2.c | 2 +- xen/arch/arm/vgic-v3.c | 2 +- 2 files changed, 2 ins

[Xen-devel] [PATCH v2 2/4] xen/arm: initialize access

2018-10-17 Thread Stefano Stabellini
Initialize variable *access before returning it back to the caller. It makes the code a bit nicer and it is a safety certification requirement. Signed-off-by: Stefano Stabellini CC: rcojoc...@bitdefender.com CC: Tamas K Lengyel --- Changes in v2: - improve comment - use p2m->default_access ---

[Xen-devel] [PATCH v2 3/4] xen: introduce __symbol

2018-10-17 Thread Stefano Stabellini
Introduce a macro, __symbol, which is a simple wrapper around RELOC_HIDE to be used everywhere symbols such as _stext and _etext are used in the code. RELOC_HIDE is needed when accessing symbols such as _stext and _etext because the C standard forbids comparisons between pointers pointing to diffe

[Xen-devel] [PATCH v2 4/4] xen: use __symbol everywhere

2018-10-17 Thread Stefano Stabellini
Use __symbol everywhere _stext, _etext, etc. are used. Technically, it is only required when comparing pointers, but use it everywhere to avoid confusion. Signed-off-by: Stefano Stabellini CC: jbeul...@suse.com CC: andrew.coop...@citrix.com --- Changes in v2: - cast return of __symbol to char* wh

Re: [Xen-devel] [PATCH v2 2/4] xen/arm: initialize access

2018-10-17 Thread Razvan Cojocaru
On 10/17/18 5:31 PM, Stefano Stabellini wrote: > Initialize variable *access before returning it back to the caller. > It makes the code a bit nicer and it is a safety certification > requirement. > > Signed-off-by: Stefano Stabellini > CC: rcojoc...@bitdefender.com > CC: Tamas K Lengyel Acked-

Re: [Xen-devel] [PATCH v2 1/4] xen/arm: initialize target

2018-10-17 Thread Julien Grall
Hi, On 17/10/2018 15:31, Stefano Stabellini wrote: Initialize variable target before passing it as a parameter. It makes the code a bit nicer and it is a safety certification requirement. While I know why this is a certification requirement, it may not be the case for other on the mailing lis

Re: [Xen-devel] [PATCH v2 2/4] xen/arm: initialize access

2018-10-17 Thread Julien Grall
On 17/10/2018 15:31, Stefano Stabellini wrote: Initialize variable *access before returning it back to the caller. It makes the code a bit nicer and it is a safety certification requirement. Same as previous patch. Signed-off-by: Stefano Stabellini CC: rcojoc...@bitdefender.com CC: Tamas

Re: [Xen-devel] [PATCH v4 22/23] xen/arm: move kernel.h to asm-arm/

2018-10-17 Thread Stefano Stabellini
On Mon, 15 Oct 2018, Julien Grall wrote: > Hi Stefano, > > On 05/10/2018 19:47, Stefano Stabellini wrote: > > It will be #included by a file in a xen/arch/arm subdirectory. > > > > Signed-off-by: Stefano Stabellini > > --- > > xen/arch/arm/domain_build.c | 2 +- > > xen/arch/arm/kernel.c

Re: [Xen-devel] [PATCH v2 3/4] xen: introduce __symbol

2018-10-17 Thread Julien Grall
On 17/10/2018 15:31, Stefano Stabellini wrote: Introduce a macro, __symbol, which is a simple wrapper around RELOC_HIDE to be used everywhere symbols such as _stext and _etext are used in the code. RELOC_HIDE is needed when accessing symbols such as _stext and _etext because the C standard for

Re: [Xen-devel] Ping AMD maintainers? [PATCH] x86/svm: Fix svm_update_guest_efer() for domains using shadow paging

2018-10-17 Thread Boris Ostrovsky
On 10/17/18 8:08 AM, Andrew Cooper wrote: > On 05/10/18 18:02, Andrew Cooper wrote: >> When using shadow paging, EFER.NX is a Xen controlled bit, and is required by >> the shadow pagefault handler to distinguish instruction fetches from data >> accesses. >> >> This can be observed by a guest which

Re: [Xen-devel] [PATCH] x86/svm: Remove the pdpe fields from struct vmcb

2018-10-17 Thread Boris Ostrovsky
On 10/17/18 8:47 AM, Andrew Cooper wrote: > These fields have existed since the SVM code was first introduced. > > The earliest reference I can find is c/s d1bd157fbc9 which is unforunately a > rebase & squash of a separate dev tree. Looking a the commit message, I'm > guessing it was introduced b

Re: [Xen-devel] [PATCH] add myself as reviewer for Xen support in Linux

2018-10-17 Thread Boris Ostrovsky
On 10/17/18 9:44 AM, Stefano Stabellini wrote: > It would be good for me to keep an eye on the patches that touch Xen > support in Linux to try to spot changes that break Xen on ARM early on. > > Signed-off-by: Stefano Stabellini Reviewed-by: Boris Ostrovsky > > diff --git a/MAINTAINERS b/MAIN

Re: [Xen-devel] [PATCH v2 4/4] xen: use __symbol everywhere

2018-10-17 Thread Julien Grall
Hi, On 17/10/2018 15:31, Stefano Stabellini wrote: Use __symbol everywhere _stext, _etext, etc. are used. Technically, it is only required when comparing pointers, but use it everywhere to avoid Well no. It is also required when substracting pointers (see [1]). confusion. [...] diff --gi

Re: [Xen-devel] [PATCH v4 16/23] xen/arm: generate vpl011 node on device tree for domU

2018-10-17 Thread Stefano Stabellini
On Mon, 15 Oct 2018, Julien Grall wrote: > Hi, > > On 05/10/2018 19:47, Stefano Stabellini wrote: > > Introduce vpl011 support to guests started from Xen: it provides a > > simple way to print output from a guest, as most guests come with a > > pl011 driver. It is also able to provide a working co

Re: [Xen-devel] [PATCH v4 11/23] xen/arm: refactor construct_dom0

2018-10-17 Thread Stefano Stabellini
On Mon, 15 Oct 2018, Julien Grall wrote: > Hi, > > On 05/10/2018 19:47, Stefano Stabellini wrote: > > Move generic initializations out of construct_dom0 so that they can be > > reused. > > > > Rename prepare_dtb to prepare_dtb_hwdom to avoid confusion. > > > > No functional changes in this patch

Re: [Xen-devel] [PATCH v4 14/23] xen/arm: generate a simple device tree for domUs

2018-10-17 Thread Stefano Stabellini
On Mon, 15 Oct 2018, Julien Grall wrote: > Hi Stefano, > > On 05/10/2018 19:47, Stefano Stabellini wrote: > > +static int __init make_gic_domU_node(const struct domain *d, void *fdt) > > +{ > > +switch ( gic_hw_version() ) > > While I understand that today domains will use the same GIC versio

Re: [Xen-devel] [PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project

2018-10-17 Thread Ian Jackson
Alexander Schulz - XCP-ng Project Member writes ("[PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project"): > We are the XCP-ng project (https://xcp-ng.org) and want to distribute > our own PV-Tools (maybe also per windows updates) so we need an extra range. Thanks. I acked you

Re: [Xen-devel] [RFC PATCH v2 00/17] Add support for qemu-xen runnning in a Linux-based stubdomain.

2018-10-17 Thread Ian Jackson
Marek Marczykowski-Górecki writes ("Re: [RFC PATCH v2 00/17] Add support for qemu-xen runnning in a Linux-based stubdomain."): > [stuff] So, I only got a little way through this series, but it was a while ago and you say things are done differently now. I'm not sure if it is useful for me to rev

Re: [Xen-devel] Xen optimization

2018-10-17 Thread Milan Boberic
Hi, > > The device tree with everything seems to be system.dts, that was enough > :-) I don't need the dtsi files you used to build the final dts, I only > need the one you use in uboot and for your guest. I wasn't sure so I sent everything, sorry for being bombarded with all those files. :-) >

Re: [Xen-devel] [PATCH v4 21/23] xen/vpl011: buffer out chars when the backend is xen

2018-10-17 Thread Stefano Stabellini
On Mon, 15 Oct 2018, Julien Grall wrote: > Hi, > > On 05/10/2018 19:47, Stefano Stabellini wrote: > > To avoid mixing the output of different domains on the console, buffer > > the output chars and print line by line. Unless the domain has input > > from the serial, in which case we want to print

Re: [Xen-devel] [PATCH] mem_access: Fix npfec.kind propagation

2018-10-17 Thread Tamas Lengyel
On Wed, Oct 17, 2018 at 7:41 AM Razvan Cojocaru wrote: > > On 10/5/18 2:00 PM, Razvan Cojocaru wrote: > > On 9/27/18 2:25 PM, George Dunlap wrote: > >> The name of the "with_gla" flag is confusing; it has nothing to do > >> with the existence or lack thereof of a faulting GLA, but rather where > >

[Xen-devel] [PATCH v2] x86/mm/p2m: don't needlessly limit MMIO mapping order to 4k

2018-10-17 Thread Paul Durrant
The P2M common code currently restricts the MMIO mapping order of any domain with IOMMU mappings, but that is not using shared tables, to 4k. This has been shown to have a huge performance cost when passing through a PCI device with a very large BAR (e.g. NVIDIA P40), increasing the guest boot time

Re: [Xen-devel] [PATCH] devicetree, xen: add xen, shared-memory binding

2018-10-17 Thread Rob Herring
On Mon, Oct 08, 2018 at 04:03:54PM -0700, Stefano Stabellini wrote: > Introduce a device tree binding for Xen reserved-memory regions. They > are used to share memory across VMs from the VM config files. (See > static_shm config option.) > > Signed-off-by: Stefano Stabellini checkpatch.pl compl

[Xen-devel] [distros-debian-squeeze test] 75438: trouble: blocked/broken

2018-10-17 Thread Platform Team regression test user
flight 75438 distros-debian-squeeze real [real] http://osstest.xensource.com/osstest/logs/75438/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvopsbroken build-i386

Re: [Xen-devel] [PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project

2018-10-17 Thread code
Am 17.10.2018 um 17:14 schrieb Ian Jackson: Alexander Schulz - XCP-ng Project Member writes ("[PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project"): We are the XCP-ng project (https://xcp-ng.org) and want to distribute our own PV-Tools (maybe also per windows updates) so we

Re: [Xen-devel] [PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project

2018-10-17 Thread Wei Liu
On Tue, Oct 16, 2018 at 10:28:04PM +0200, Alexander Schulz - XCP-ng Project Member wrote: > We are the XCP-ng project (https://xcp-ng.org) and want to distribute our > own PV-Tools (maybe also per windows updates) so we need an extra range. > > We also registered a PCI-Device: > > "XCP-ng Projec

[Xen-devel] [OSSTEST PATCH] cr-for-branches: Add linux 4.4 branch as that is an LTS

2018-10-17 Thread Ian Jackson
--- cr-for-branches | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cr-for-branches b/cr-for-branches index 6f544379..f7e4caea 100755 --- a/cr-for-branches +++ b/cr-for-branches @@ -31,7 +31,7 @@ scriptoptions="$1"; shift LOGFILE=tmp/cr-for-branches.log export LOGFILE -: ${

Re: [Xen-devel] [RFC PATCH v2 00/17] Add support for qemu-xen runnning in a Linux-based stubdomain.

2018-10-17 Thread Marek Marczykowski-Górecki
On Wed, Oct 17, 2018 at 04:16:03PM +0100, Ian Jackson wrote: > Marek Marczykowski-Górecki writes ("Re: [RFC PATCH v2 00/17] Add support for > qemu-xen runnning in a Linux-based stubdomain."): > > [stuff] > > So, I only got a little way through this series, but it was a while > ago and you say thi

Re: [Xen-devel] [PATCH v4 22/23] xen/arm: move kernel.h to asm-arm/

2018-10-17 Thread Julien Grall
On 17/10/2018 15:42, Stefano Stabellini wrote: On Mon, 15 Oct 2018, Julien Grall wrote: Hi Stefano, On 05/10/2018 19:47, Stefano Stabellini wrote: It will be #included by a file in a xen/arch/arm subdirectory. Signed-off-by: Stefano Stabellini --- xen/arch/arm/domain_build.c | 2 +-

Re: [Xen-devel] [PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project

2018-10-17 Thread Ian Jackson
Alexander Schulz - XCP-ng Project Member writes ("[PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project"): > We are the XCP-ng project (https://xcp-ng.org) and want to distribute > our own PV-Tools (maybe also per windows updates) so we need an extra range. > > We also register

[Xen-devel] [xen-unstable-smoke test] 128852: tolerable all pass - PUSHED

2018-10-17 Thread osstest service owner
flight 128852 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/128852/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [Xen-devel] [PATCH v4 22/23] xen/arm: move kernel.h to asm-arm/

2018-10-17 Thread Andrew Cooper
On 17/10/18 17:11, Julien Grall wrote: > > > On 17/10/2018 15:42, Stefano Stabellini wrote: >> On Mon, 15 Oct 2018, Julien Grall wrote: >>> Hi Stefano, >>> >>> On 05/10/2018 19:47, Stefano Stabellini wrote: It will be #included by a file in a xen/arch/arm subdirectory. Signed-off-by:

Re: [Xen-devel] [PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project

2018-10-17 Thread Wei Liu
On Tue, Oct 16, 2018 at 10:28:04PM +0200, Alexander Schulz - XCP-ng Project Member wrote: > We are the XCP-ng project (https://xcp-ng.org) and want to distribute our > own PV-Tools (maybe also per windows updates) so we need an extra range. > > We also registered a PCI-Device: > > "XCP-ng Projec

Re: [Xen-devel] [PATCH] Reservation of PCI device range 0xc200-0xc2ff to XCP-ng Project

2018-10-17 Thread code
Thanks for all your support! Alex Am 17. Oktober 2018 18:33:45 MESZ schrieb Wei Liu : >On Tue, Oct 16, 2018 at 10:28:04PM +0200, Alexander Schulz - XCP-ng >Project Member wrote: >> We are the XCP-ng project (https://xcp-ng.org) and want to distribute >our >> own PV-Tools (maybe also per windows

[Xen-devel] [xen-4.10-testing test] 128829: regressions - trouble: blocked/broken/fail/pass

2018-10-17 Thread osstest service owner
flight 128829 xen-4.10-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/128829/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvopsbroken build-armhf-pvops 5 host-

[Xen-devel] [xen-unstable-smoke test] 128854: tolerable all pass - PUSHED

2018-10-17 Thread osstest service owner
flight 128854 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/128854/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[Xen-devel] [ovmf baseline-only test] 75440: trouble: blocked/broken

2018-10-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75440 ovmf real [real] http://osstest.xensource.com/osstest/logs/75440/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xsm

Re: [Xen-devel] [RFC PATCH v1 00/16] xen: sched: implement core-scheduling

2018-10-17 Thread Tamas K Lengyel
On Fri, Aug 24, 2018 at 5:36 PM Dario Faggioli wrote: > > Hello, > > As anticipated here: > https://lists.xenproject.org/archives/html/xen-devel/2018-08/msg02052.html > > Here's a preliminary version of my work, trying to implement > core-scheduling in Xen. > > First of all, this deals with Credit

[Xen-devel] [qemu-mainline baseline-only test] 75441: trouble: blocked/broken

2018-10-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75441 qemu-mainline real [real] http://osstest.xensource.com/osstest/logs/75441/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64

[Xen-devel] [linux-3.18 test] 128841: regressions - FAIL

2018-10-17 Thread osstest service owner
flight 128841 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/128841/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 16 guest-localmigrate/x10 fail REGR. vs. 128258 test-armhf-arm

[Xen-devel] [libvirt test] 128833: tolerable all pass - PUSHED

2018-10-17 Thread osstest service owner
flight 128833 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/128833/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 128724 test-armhf-armhf-libvirt-raw 13 saveresto

[Xen-devel] [xen-unstable-smoke test] 128857: tolerable all pass - PUSHED

2018-10-17 Thread osstest service owner
flight 128857 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/128857/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[Xen-devel] [ovmf test] 128856: all pass - PUSHED

2018-10-17 Thread osstest service owner
flight 128856 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/128856/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3a0329bed2a2c7d1ba45bd2376a2320141ef2bec baseline version: ovmf b7dcf31402f410c53

[Xen-devel] [linux-linus test] 128835: regressions - FAIL

2018-10-17 Thread osstest service owner
flight 128835 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/128835/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 10 debian-hvm-install fail REGR. vs. 125898 test-amd

[Xen-devel] [ovmf test] 128860: regressions - FAIL

2018-10-17 Thread osstest service owner
flight 128860 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/128860/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 16 guest-localmigrate/x10 fail REGR. vs. 128856 version targeted fo

[Xen-devel] [ovmf baseline-only test] 75444: trouble: blocked/broken

2018-10-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 75444 ovmf real [real] http://osstest.xensource.com/osstest/logs/75444/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xsm

[Xen-devel] [xen-4.7-testing test] 128837: FAIL

2018-10-17 Thread osstest service owner
flight 128837 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/128837/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 broken in 128744 Tests