[Xen-devel] [PATCH 0/3] docs: add some missing xenstore documentation

2017-05-08 Thread Juergen Gross
There were some bits missing in docs/misc/xenstore.txt, so add them. We might want to include this in 4.9, but I'm not feeling really strong about this. Juergen Gross (3): docs: specify endianess of xenstore protocol header docs: add DIRECTORY_PART specification do xenstore protocol doc doc

[Xen-devel] [PATCH 2/3] docs: add DIRECTORY_PART specification do xenstore protocol doc

2017-05-08 Thread Juergen Gross
DIRECTORY_PART was missing in docs/misc/xenstore.txt. Add it. Signed-off-by: Juergen Gross --- docs/misc/xenstore.txt | 9 + 1 file changed, 9 insertions(+) diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt index 5051340227..fd38d781e2 100644 --- a/docs/misc/xenstore.txt +++

[Xen-devel] [PATCH 2/3] docs: add DIRECTORY_PART specification do xenstore protocol doc

2017-05-08 Thread Juergen Gross
DIRECTORY_PART was missing in docs/misc/xenstore.txt. Add it. Signed-off-by: Juergen Gross --- docs/misc/xenstore.txt | 9 + 1 file changed, 9 insertions(+) diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt index 5051340227..fd38d781e2 100644 --- a/docs/misc/xenstore.txt +++

[Xen-devel] [PATCH 3/3] docs: document CONTROL command of xenstore protocol

2017-05-08 Thread Juergen Gross
The CONTROL command (former DEBUG command) isn't specified in the xenstore protocol doc. Add it. Signed-off-by: Juergen Gross --- docs/misc/xenstore.txt | 29 +++-- 1 file changed, 23 insertions(+), 6 deletions(-) diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.

[Xen-devel] [PATCH 1/3] docs: specify endianess of xenstore protocol header

2017-05-08 Thread Juergen Gross
The endianess of the xenstore protocol header should be specified. Signed-off-by: Juergen Gross --- docs/misc/xenstore.txt | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/docs/misc/xenstore.txt b/docs/misc/xenstore.txt index ae1b6a8c6e..5051340227 100644 --- a/docs/misc/xen

[Xen-devel] [PATCH 0/3] docs: add some missing xenstore documentation

2017-05-08 Thread Juergen Gross
There were some bits missing in docs/misc/xenstore.txt, so add them. We might want to include this in 4.9, but I'm not feeling really strong about this. Resending with correct email address of Julien. Juergen Gross (3): docs: specify endianess of xenstore protocol header docs: add DIRECTORY_

Re: [Xen-devel] [PATCH] x86/ioreq server: Fix DomU couldn't reboot when using p2m_ioreq_server p2m_type

2017-05-08 Thread Jan Beulich
>>> On 06.05.17 at 03:51, wrote: >> >>> On 05.05.17 at 05:52, wrote: >> > 'commit 1679e0df3df6 ("x86/ioreq server: asynchronously reset >> > outstanding p2m_ioreq_server entries")' will call >> > p2m_change_entry_type_global() which set entry.recalc=1. Then >> > the following get_entry(p2m_ioreq_

[Xen-devel] [xen-unstable test] 109136: regressions - FAIL

2017-05-08 Thread osstest service owner
flight 109136 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/109136/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-winxpsp3 16 guest-stop fail REGR. vs. 107900 Tests which are fa

Re: [Xen-devel] [PATCH v3 4/9] mm: Scrub memory from idle loop

2017-05-08 Thread Jan Beulich
>>> On 05.05.17 at 18:49, wrote: > On 05/05/2017 12:05 PM, Jan Beulich wrote: > On 05.05.17 at 17:23, wrote: >>> On 05/05/2017 10:51 AM, Jan Beulich wrote: >>> On 05.05.17 at 16:27, wrote: > On 05/05/2017 10:14 AM, Jan Beulich wrote: > On 05.05.17 at 16:10, wrote: >>

Re: [Xen-devel] [PATCH v2 for-next] x86/mm: Fix the odd indentation of the pin_page block of do_mmuext_op()

2017-05-08 Thread Jan Beulich
>>> On 05.05.17 at 18:32, wrote: > The pin_page block is missing one level of indentation, which makes the > MMUEXT_UNPIN_TABLE case label appear to be outside of the switch statement. > > However, the block isn't needed at all if page is declared with switch level > scope. This allows for the r

[Xen-devel] [ovmf test] 109159: all pass - PUSHED

2017-05-08 Thread osstest service owner
flight 109159 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/109159/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3654c4623c9b37ddc64426995fa399d8626b7ced baseline version: ovmf d7b96017ccf5922b798f4

[Xen-devel] [ovmf baseline-only test] 71262: tolerable trouble: blocked/broken

2017-05-08 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71262 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71262/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-i386-pvops 3 host-install(3) broken bas

Re: [Xen-devel] [PATCH 0/4] mitigate the per-pCPU blocking list may be too long

2017-05-08 Thread Chao Gao
On Wed, May 03, 2017 at 04:21:27AM -0600, Jan Beulich wrote: On 03.05.17 at 12:08, wrote: >> On 02/05/17 06:45, Chao Gao wrote: >>> On Wed, Apr 26, 2017 at 05:39:57PM +0100, George Dunlap wrote: On 26/04/17 01:52, Chao Gao wrote: > I compared the maximum of #entry in one list and #ev

Re: [Xen-devel] [PATCH 0/4] mitigate the per-pCPU blocking list may be too long

2017-05-08 Thread Jan Beulich
>>> On 08.05.17 at 18:15, wrote: > On Wed, May 03, 2017 at 04:21:27AM -0600, Jan Beulich wrote: > On 03.05.17 at 12:08, wrote: >>> On 02/05/17 06:45, Chao Gao wrote: On Wed, Apr 26, 2017 at 05:39:57PM +0100, George Dunlap wrote: > On 26/04/17 01:52, Chao Gao wrote: >> I compared

Re: [Xen-devel] [PATCH 0/4] mitigate the per-pCPU blocking list may be too long

2017-05-08 Thread Chao Gao
On Mon, May 08, 2017 at 02:39:25AM -0600, Jan Beulich wrote: On 08.05.17 at 18:15, wrote: >> On Wed, May 03, 2017 at 04:21:27AM -0600, Jan Beulich wrote: >> On 03.05.17 at 12:08, wrote: On 02/05/17 06:45, Chao Gao wrote: > On Wed, Apr 26, 2017 at 05:39:57PM +0100, George Dunlap

Re: [Xen-devel] null domains after xl destroy

2017-05-08 Thread Juergen Gross
On 04/05/17 00:17, Glenn Enright wrote: > On 04/05/17 04:58, Steven Haigh wrote: >> On 04/05/17 01:53, Juergen Gross wrote: >>> On 03/05/17 12:45, Steven Haigh wrote: Just wanted to give this a little nudge now people seem to be back on deck... >>> >>> Glenn, could you please give the att

Re: [Xen-devel] [PATCH 0/4] mitigate the per-pCPU blocking list may be too long

2017-05-08 Thread George Dunlap
On 08/05/17 17:15, Chao Gao wrote: > On Wed, May 03, 2017 at 04:21:27AM -0600, Jan Beulich wrote: > On 03.05.17 at 12:08, wrote: >>> On 02/05/17 06:45, Chao Gao wrote: On Wed, Apr 26, 2017 at 05:39:57PM +0100, George Dunlap wrote: > On 26/04/17 01:52, Chao Gao wrote: >> I compared

Re: [Xen-devel] [RFC PATCH 01/10] ARM: vGIC: remove rank lock from IRQ routing functions

2017-05-08 Thread Andre Przywara
Hi, On 04/05/17 16:53, Julien Grall wrote: > Hi Andre, > > On 04/05/17 16:31, Andre Przywara wrote: >> gic_route_irq_to_guest() and gic_remove_irq_from_guest() take the rank >> lock, however never actually access the rank structure. >> Avoid taking the lock in those two functions and remove some

Re: [Xen-devel] [RFC PATCH 4/4] arm/mem_access: Add software guest-page-table walk

2017-05-08 Thread Sergej Proskurin
Hi Julien, On 05/02/2017 05:17 PM, Julien Grall wrote: > Hi Sergej, > > On 30/04/17 20:48, Sergej Proskurin wrote: >> The function p2m_mem_access_check_and_get_page in mem_access.c >> translates a gva to an ipa by means of the hardware functionality >> implemented in the function gva_to_ipa. If m

Re: [Xen-devel] [PATCH 0/4] mitigate the per-pCPU blocking list may be too long

2017-05-08 Thread Jan Beulich
(Chao Gao got lost from the recipients list again; re-adding) >>> On 08.05.17 at 11:13, wrote: > On 08/05/17 17:15, Chao Gao wrote: >> On Wed, May 03, 2017 at 04:21:27AM -0600, Jan Beulich wrote: >> On 03.05.17 at 12:08, wrote: On 02/05/17 06:45, Chao Gao wrote: > On Wed, Apr 26, 20

[Xen-devel] Xen Project Developer Summit Design Sessions

2017-05-08 Thread Lars Kurth
Dear community members (I CC'ed people who submitted design sessions so far) I got a few questions regarding "acceptance" and scheduling of Design Sessions for the Developer and Design Summit. As you may recall, the Developer and Design Summit mixes the formats of past Summits and Hackathons. Th

Re: [Xen-devel] [PATCH 0/4] mitigate the per-pCPU blocking list may be too long

2017-05-08 Thread Chao Gao
On Mon, May 08, 2017 at 03:24:47AM -0600, Jan Beulich wrote: >(Chao Gao got lost from the recipients list again; re-adding) > On 08.05.17 at 11:13, wrote: >> On 08/05/17 17:15, Chao Gao wrote: >>> On Wed, May 03, 2017 at 04:21:27AM -0600, Jan Beulich wrote: >>> On 03.05.17 at 12:08, wrot

[Xen-devel] [linux-4.9 test] 109142: regressions - FAIL

2017-05-08 Thread osstest service owner
flight 109142 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/109142/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358 test-amd64-i386-xl-qe

[Xen-devel] [for-4.9] Re: [PATCH v2] libxl/libxl_dm.c: u.hvm.usbdevice_list is checked for emptiness

2017-05-08 Thread Ian Jackson
Robin Lee writes ("[PATCH v2] libxl/libxl_dm.c: u.hvm.usbdevice_list is checked for emptiness"): > Currently usbdevice_list is only checked for nullity. But the OCaml binding > will convert empty list to a pointer to NULL, instead of a NULL pointer. That > means the OCaml binding will fail to disa

[Xen-devel] [PATCH for-4.9 0/2] x86/pv: Misc fixes

2017-05-08 Thread Andrew Cooper
Two fixes for bugs which I have found while trying to raise {compat_,}create_bounce_frame() up into C. They should both be fixed in all releases of Xen. Andrew Cooper (2): x86/pv: Fix bugs with the handling of int80_bounce x86/pv: Align %rsp before pushing the failsafe stack frame xen/arch/

[Xen-devel] [PATCH 2/2] x86/pv: Align %rsp before pushing the failsafe stack frame

2017-05-08 Thread Andrew Cooper
Architecturally, all 64bit stacks are aligned on a 16 byte boundary before an exception frame is pushed. The failsafe frame is not special in this regard. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Julien Grall This change should be backported to all releases, and included in Xen 4.

[Xen-devel] [PATCH 1/2] x86/pv: Fix bugs with the handling of int80_bounce

2017-05-08 Thread Andrew Cooper
Testing has revealed two issues: 1) Passing a NULL handle to set_trap_table() is intended to flush the entire table. The 64bit guest case (and 32bit guest on 32bit Xen, when it existed) called init_int80_direct_trap() to reset int80_bounce, but c/s cda335c279 which introduced the 32b

Re: [Xen-devel] [PATCH 1/3] docs: specify endianess of xenstore protocol header

2017-05-08 Thread Ian Jackson
Juergen Gross writes ("[PATCH 1/3] docs: specify endianess of xenstore protocol header"): > The endianess of the xenstore protocol header should be specified. ... > -followed by xsd_sockmsg.len bytes of payload. > +followed by xsd_sockmsg.len bytes of payload. The header fields are > +all in littl

Re: [Xen-devel] [PATCH 2/3] docs: add DIRECTORY_PART specification do xenstore protocol doc

2017-05-08 Thread Ian Jackson
Juergen Gross writes ("[PATCH 2/3] docs: add DIRECTORY_PART specification do xenstore protocol doc"): > DIRECTORY_PART was missing in docs/misc/xenstore.txt. Add it. ... > +DIRECTORY_PART | > ||* > + Same as DIRECTORY, but to be used for children lists longer than > +

Re: [Xen-devel] [PATCH 3/3] docs: document CONTROL command of xenstore protocol

2017-05-08 Thread Ian Jackson
Juergen Gross writes ("[PATCH 3/3] docs: document CONTROL command of xenstore protocol"): > The CONTROL command (former DEBUG command) isn't specified in the > xenstore protocol doc. Add it. ... > -DEBUGprint||?? sends to > debug log > -DEBUG

Re: [Xen-devel] [PATCH 1/3] docs: specify endianess of xenstore protocol header

2017-05-08 Thread Ian Jackson
(resending this one with Julien's right address.) Ian Jackson writes ("Re: [PATCH 1/3] docs: specify endianess of xenstore protocol header"): > Juergen Gross writes ("[PATCH 1/3] docs: specify endianess of xenstore > protocol header"): > > The endianess of the xenstore protocol header should be

Re: [Xen-devel] [PATCH 1/3] docs: specify endianess of xenstore protocol header

2017-05-08 Thread Juergen Gross
On 08/05/17 12:07, Ian Jackson wrote: > Juergen Gross writes ("[PATCH 1/3] docs: specify endianess of xenstore > protocol header"): >> The endianess of the xenstore protocol header should be specified. > ... >> -followed by xsd_sockmsg.len bytes of payload. >> +followed by xsd_sockmsg.len bytes of

Re: [Xen-devel] [PATCH 3/3] docs: document CONTROL command of xenstore protocol

2017-05-08 Thread Juergen Gross
On 08/05/17 12:13, Ian Jackson wrote: > Juergen Gross writes ("[PATCH 3/3] docs: document CONTROL command of xenstore > protocol"): >> The CONTROL command (former DEBUG command) isn't specified in the >> xenstore protocol doc. Add it. > ... >> -DEBUG print||?? sends

Re: [Xen-devel] [PATCH 1/3] docs: specify endianess of xenstore protocol header

2017-05-08 Thread Ian Jackson
Juergen Gross writes ("Re: [PATCH 1/3] docs: specify endianess of xenstore protocol header"): > On 08/05/17 12:07, Ian Jackson wrote: > > Yes, but this is not correct. On a big-endian cpu, they would be in > > big-endian. > > We don't support big-endian cpus, right? Do we want to specify the > p

[Xen-devel] [linux-linus bisection] complete test-amd64-i386-qemuu-rhel6hvm-intel

2017-05-08 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-i386-qemuu-rhel6hvm-intel testid xen-boot Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/qemu-xen-tradit

Re: [Xen-devel] [PATCH v2 0/3] xen/arm: Survive unknown traps from guests

2017-05-08 Thread Julien Grall
Hi Stefano, On 05/05/17 20:09, Stefano Stabellini wrote: On Fri, 5 May 2017, Julien Grall wrote: Hi all, This small patch series ensure that Xen will not die when receiving unknown trap from the guests. I am not aware of any issue with platform we currently support, so I am not sure whether it

Re: [Xen-devel] [PATCH v3] x86/vpmu_intel: Fix hypervisor crash by masking PC bit in MSR_P6_EVNTSEL

2017-05-08 Thread Julien Grall
Hi Jan, On 05/05/17 11:16, Jan Beulich wrote: On 04.05.17 at 23:30, wrote: Setting Pin Control (PC) bit (19) in MSR_P6_EVNTSEL results in a General Protection Fault and thus results in a hypervisor crash. This behavior has been observed on two generations of Intel processors namely, Haswell an

Re: [Xen-devel] [PATCH 2/3] docs: add DIRECTORY_PART specification do xenstore protocol doc

2017-05-08 Thread Juergen Gross
On 08/05/17 12:09, Ian Jackson wrote: > Juergen Gross writes ("[PATCH 2/3] docs: add DIRECTORY_PART specification do > xenstore protocol doc"): >> DIRECTORY_PART was missing in docs/misc/xenstore.txt. Add it. > ... >> +DIRECTORY_PART | >> ||* >> +Same as DIRECTORY, but to

[Xen-devel] [qemu-mainline test] 109162: regressions - FAIL

2017-05-08 Thread osstest service owner
flight 109162 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/109162/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 5 xen-buildfail REGR. vs. 107636 build-arm64

Re: [Xen-devel] [for-4.9] Re: [PATCH v2] libxl/libxl_dm.c: u.hvm.usbdevice_list is checked for emptiness

2017-05-08 Thread Julien Grall
Hi Ian, On 08/05/17 10:54, Ian Jackson wrote: Robin Lee writes ("[PATCH v2] libxl/libxl_dm.c: u.hvm.usbdevice_list is checked for emptiness"): Currently usbdevice_list is only checked for nullity. But the OCaml binding will convert empty list to a pointer to NULL, instead of a NULL pointer. Th

Re: [Xen-devel] [PATCH 0/3] docs: add some missing xenstore documentation

2017-05-08 Thread Julien Grall
Hi Juergen, On 08/05/17 08:00, Juergen Gross wrote: There were some bits missing in docs/misc/xenstore.txt, so add them. We might want to include this in 4.9, but I'm not feeling really strong about this. I think any documentation patch should go in the release. Better documentation will mak

Re: [Xen-devel] [PATCH 1/3] docs: specify endianess of xenstore protocol header

2017-05-08 Thread Juergen Gross
On 08/05/17 12:24, Ian Jackson wrote: > Juergen Gross writes ("Re: [PATCH 1/3] docs: specify endianess of xenstore > protocol header"): >> On 08/05/17 12:07, Ian Jackson wrote: >>> Yes, but this is not correct. On a big-endian cpu, they would be in >>> big-endian. >> >> We don't support big-endia

Re: [Xen-devel] [ARM] Native application design and discussion (I hope)

2017-05-08 Thread George Dunlap
On 05/05/17 20:28, Stefano Stabellini wrote: > On Fri, 5 May 2017, Andrii Anisov wrote: >> Hello Stefano, >> >> On 24.04.17 21:08, Stefano Stabellini wrote: >>> Stubdomains (stubdoms in short) are small domains, each running a single >>> application. Typically they run unikernels rather than a full

Re: [Xen-devel] [PATCH 1/2] x86/pv: Fix bugs with the handling of int80_bounce

2017-05-08 Thread Jan Beulich
>>> On 08.05.17 at 12:04, wrote: > Testing has revealed two issues: > > 1) Passing a NULL handle to set_trap_table() is intended to flush the entire > table. The 64bit guest case (and 32bit guest on 32bit Xen, when it > existed) called init_int80_direct_trap() to reset int80_bounce, but

Re: [Xen-devel] [PATCH] x86/ioreq server: Fix DomU couldn't reboot when using p2m_ioreq_server p2m_type

2017-05-08 Thread Zhang, Xiong Y
> >>> On 06.05.17 at 03:51, wrote: > >> >>> On 05.05.17 at 05:52, wrote: > >> > 'commit 1679e0df3df6 ("x86/ioreq server: asynchronously reset > >> > outstanding p2m_ioreq_server entries")' will call > >> > p2m_change_entry_type_global() which set entry.recalc=1. Then > >> > the following get_entr

Re: [Xen-devel] [PATCH 2/2] x86/pv: Align %rsp before pushing the failsafe stack frame

2017-05-08 Thread Jan Beulich
>>> On 08.05.17 at 12:04, wrote: > Architecturally, all 64bit stacks are aligned on a 16 byte boundary before an > exception frame is pushed. The failsafe frame is not special in this regard. I'd prefer "should not be" as effectively is has been so far, but other than that ... > Signed-off-by:

Re: [Xen-devel] [PATCH 2/2] x86/pv: Align %rsp before pushing the failsafe stack frame

2017-05-08 Thread Andrew Cooper
On 08/05/17 11:56, Jan Beulich wrote: On 08.05.17 at 12:04, wrote: >> Architecturally, all 64bit stacks are aligned on a 16 byte boundary before an >> exception frame is pushed. The failsafe frame is not special in this regard. > I'd prefer "should not be" as effectively is has been so far,

Re: [Xen-devel] [PATCH 1/3] docs: specify endianess of xenstore protocol header

2017-05-08 Thread Julien Grall
Hi Juergen, On 08/05/17 11:17, Juergen Gross wrote: On 08/05/17 12:07, Ian Jackson wrote: Juergen Gross writes ("[PATCH 1/3] docs: specify endianess of xenstore protocol header"): The endianess of the xenstore protocol header should be specified. ... -followed by xsd_sockmsg.len bytes of pa

[Xen-devel] [distros-debian-sid test] 71263: trouble: blocked/broken/pass

2017-05-08 Thread Platform Team regression test user
flight 71263 distros-debian-sid real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71263/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf 3 host-install(3) broken REGR.

Re: [Xen-devel] [PATCH] x86/ioreq server: Fix DomU couldn't reboot when using p2m_ioreq_server p2m_type

2017-05-08 Thread George Dunlap
On 08/05/17 11:52, Zhang, Xiong Y wrote: > On 06.05.17 at 03:51, wrote: >>> On 05.05.17 at 05:52, wrote: > 'commit 1679e0df3df6 ("x86/ioreq server: asynchronously reset > outstanding p2m_ioreq_server entries")' will call > p2m_change_entry_type_global() which set entry.recalc=

Re: [Xen-devel] [RFC PATCH 2/4] arm/mem_access: Change value of TTBCR_SZ_MASK

2017-05-08 Thread Julien Grall
On 08/05/17 07:40, Sergej Proskurin wrote: Hi Julien, On 05/02/2017 02:01 PM, Julien Grall wrote: On 02/05/17 12:56, Julien Grall wrote: Hi Sergej, On 30/04/17 20:48, Sergej Proskurin wrote: The TTBCR_SZ holds only 3 bits and thus must be masked with the value 0x7 instead of the previou

Re: [Xen-devel] [RFC PATCH 4/4] arm/mem_access: Add software guest-page-table walk

2017-05-08 Thread Julien Grall
Hi, On 08/05/17 10:22, Sergej Proskurin wrote: On 05/02/2017 05:17 PM, Julien Grall wrote: On 30/04/17 20:48, Sergej Proskurin wrote: Also s/ttbcr/tcr/ +struct domain *d = p2m->domain; + +const unsigned int offsets[4] = { +#ifdef CONFIG_ARM_64 +zeroeth_table_offset(gva), +#end

Re: [Xen-devel] [PATCH 2/3] docs: add DIRECTORY_PART specification do xenstore protocol doc

2017-05-08 Thread Ian Jackson
Juergen Gross writes ("Re: [PATCH 2/3] docs: add DIRECTORY_PART specification do xenstore protocol doc"): > On 08/05/17 12:09, Ian Jackson wrote: > > The "generation count" is not defined anywhere else in this protocol > > spec, so shouldn't be referred to here without definition. We should > > e

Re: [Xen-devel] [PATCH] x86/ioreq server: Fix DomU couldn't reboot when using p2m_ioreq_server p2m_type

2017-05-08 Thread Zhang, Xiong Y
> On 08/05/17 11:52, Zhang, Xiong Y wrote: > > On 06.05.17 at 03:51, wrote: > >>> On 05.05.17 at 05:52, wrote: > > 'commit 1679e0df3df6 ("x86/ioreq server: asynchronously reset > > outstanding p2m_ioreq_server entries")' will call > > p2m_change_entry_type_global() which set e

Re: [Xen-devel] [PATCH v3] x86: correct create_bounce_frame

2017-05-08 Thread Julien Grall
Hi, On 05/05/17 15:41, Andrew Cooper wrote: On 05/05/17 14:11, Jan Beulich wrote: Commit d9b7ef209a7 ("x86: drop failsafe callback invocation from assembly") didn't go quite far enough with the cleanup it did: The changed maximum frame size should also have been reflected in the early address r

Re: [Xen-devel] [PATCH] x86/ioreq server: Fix DomU couldn't reboot when using p2m_ioreq_server p2m_type

2017-05-08 Thread Jan Beulich
>>> On 08.05.17 at 13:59, wrote: >> On 08/05/17 11:52, Zhang, Xiong Y wrote: >> > On 06.05.17 at 03:51, wrote: >> >>> On 05.05.17 at 05:52, wrote: >> > 'commit 1679e0df3df6 ("x86/ioreq server: asynchronously reset >> > outstanding p2m_ioreq_server entries")' will call >> > p

Re: [Xen-devel] [PATCH V3 0/2] Fix vm_event resume path race condition

2017-05-08 Thread Julien Grall
On 05/05/17 15:19, Andrew Cooper wrote: On 04/05/17 10:00, Razvan Cojocaru wrote: This small series first creates hvm/vm_event.{h,c}, in order to bring under vm_event maintainership the code that has previously lived in hvm_do_resume(), and then fixes a __context_switch()-related race conditio

Re: [Xen-devel] [PATCH] x86: correct boot time page table setup

2017-05-08 Thread Julien Grall
Hi, On 05/05/17 16:08, Andrew Cooper wrote: On 05/05/17 14:12, Jan Beulich wrote: While using alloc_domheap_pages() and assuming the allocated memory is directly accessible is okay at boot time (as we run on the idle page tables there), memory hotplug code too assumes it can access the resultin

Re: [Xen-devel] [PATCH 1/2] x86/pv: Fix bugs with the handling of int80_bounce

2017-05-08 Thread Andrew Cooper
On 08/05/17 11:52, Jan Beulich wrote: On 08.05.17 at 12:04, wrote: >> Testing has revealed two issues: >> >> 1) Passing a NULL handle to set_trap_table() is intended to flush the entire >> table. The 64bit guest case (and 32bit guest on 32bit Xen, when it >> existed) called init_int

[Xen-devel] [linux-3.18 test] 109161: tolerable FAIL - PUSHED

2017-05-08 Thread osstest service owner
flight 109161 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/109161/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail REGR. vs. 108152 Tests which did not succeed,

Re: [Xen-devel] [PATCH 2/3] docs: add DIRECTORY_PART specification do xenstore protocol doc

2017-05-08 Thread Juergen Gross
On 08/05/17 13:53, Ian Jackson wrote: > Juergen Gross writes ("Re: [PATCH 2/3] docs: add DIRECTORY_PART specification > do xenstore protocol doc"): >> On 08/05/17 12:09, Ian Jackson wrote: >>> The "generation count" is not defined anywhere else in this protocol >>> spec, so shouldn't be referred t

Re: [Xen-devel] [PATCH 1/2] x86/pv: Fix bugs with the handling of int80_bounce

2017-05-08 Thread Jan Beulich
>>> On 08.05.17 at 14:23, wrote: > Overall, I expect that Xenolinux purposefully never asked for an > interrupt gate (as Xen would have rejected that in the 32bit case), and > this point was never considered at all when PVOps was developed, which > followed Linux's normal expectation that int80 wa

[Xen-devel] [PATCH for-next] xen/x86: Remove APIC_INTEGRATED() checks

2017-05-08 Thread Andrew Cooper
All 64bit processors have integrated APICs. Xen has no need to attempt to cope with external APICs. Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/arch/x86/apic.c | 9 +++-- xen/arch/x86/smpboot.c| 6 +- xen/include/asm-x86/apicdef.h | 1 - 3 files changed,

Re: [Xen-devel] [PATCH V3 1/2] x86/vm_event: added hvm/vm_event.{h, c}

2017-05-08 Thread Jan Beulich
>>> On 04.05.17 at 11:00, wrote: > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -404,6 +404,7 @@ S:Supported > F: tools/tests/xen-access > F: xen/arch/*/monitor.c > F: xen/arch/*/vm_event.c > +F: xen/arch/*/hvm/vm_event.c > F: xen/arch/arm/mem_access.c > F: xen/arch/x86/mm/m

Re: [Xen-devel] [PATCH V3 1/2] x86/vm_event: added hvm/vm_event.{h, c}

2017-05-08 Thread Razvan Cojocaru
On 05/08/17 15:44, Jan Beulich wrote: On 04.05.17 at 11:00, wrote: >> --- a/MAINTAINERS >> +++ b/MAINTAINERS >> @@ -404,6 +404,7 @@ S: Supported >> F: tools/tests/xen-access >> F: xen/arch/*/monitor.c >> F: xen/arch/*/vm_event.c >> +F: xen/arch/*/hvm/vm_event.c >> F: xen/arch/a

Re: [Xen-devel] [PATCH 1/2] x86/pv: Fix bugs with the handling of int80_bounce

2017-05-08 Thread Andrew Cooper
On 08/05/17 13:39, Jan Beulich wrote: On 08.05.17 at 14:23, wrote: >> Overall, I expect that Xenolinux purposefully never asked for an >> interrupt gate (as Xen would have rejected that in the 32bit case), and >> this point was never considered at all when PVOps was developed, which >> follow

Re: [Xen-devel] [PATCH for-next] xen/x86: Remove APIC_INTEGRATED() checks

2017-05-08 Thread Jan Beulich
>>> On 08.05.17 at 14:40, wrote: > All 64bit processors have integrated APICs. Xen has no need to attempt to > cope with external APICs. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org

Re: [Xen-devel] [PATCH 1/2] x86/pv: Fix bugs with the handling of int80_bounce

2017-05-08 Thread Jan Beulich
>>> On 08.05.17 at 14:54, wrote: > On 08/05/17 13:39, Jan Beulich wrote: > On 08.05.17 at 14:23, wrote: >>> Overall, I expect that Xenolinux purposefully never asked for an >>> interrupt gate (as Xen would have rejected that in the 32bit case), and >>> this point was never considered at all w

Re: [Xen-devel] [PATCH] x86/ioreq server: Fix DomU couldn't reboot when using p2m_ioreq_server p2m_type

2017-05-08 Thread George Dunlap
On 05/05/17 15:40, Jan Beulich wrote: On 05.05.17 at 05:52, wrote: >> 'commit 1679e0df3df6 ("x86/ioreq server: asynchronously reset >> outstanding p2m_ioreq_server entries")' will call >> p2m_change_entry_type_global() which set entry.recalc=1. Then >> the following get_entry(p2m_ioreq_server

Re: [Xen-devel] [PATCH for-next] xen/x86: Remove APIC_INTEGRATED() checks

2017-05-08 Thread Wei Liu
On Mon, May 08, 2017 at 01:40:36PM +0100, Andrew Cooper wrote: > All 64bit processors have integrated APICs. Xen has no need to attempt to > cope with external APICs. > > Signed-off-by: Andrew Cooper Reviewed-by: Wei Liu ___ Xen-devel mailing list X

Re: [Xen-devel] [for-4.9] Re: [PATCH v2] libxl/libxl_dm.c: u.hvm.usbdevice_list is checked for emptiness

2017-05-08 Thread Ian Jackson
Julien Grall writes ("Re: [for-4.9] Re: [PATCH v2] libxl/libxl_dm.c: u.hvm.usbdevice_list is checked for emptiness"): > On 08/05/17 10:54, Ian Jackson wrote: > > Julien, this is a candidate for 4.9. It's a minor bugfix. > > Release-acked-by: Julien Grall Thanks. Committed. Ian.

Re: [Xen-devel] [PATCH] x86/ioreq server: Fix DomU couldn't reboot when using p2m_ioreq_server p2m_type

2017-05-08 Thread George Dunlap
On 08/05/17 14:26, George Dunlap wrote: > On 05/05/17 15:40, Jan Beulich wrote: > On 05.05.17 at 05:52, wrote: >>> 'commit 1679e0df3df6 ("x86/ioreq server: asynchronously reset >>> outstanding p2m_ioreq_server entries")' will call >>> p2m_change_entry_type_global() which set entry.recalc=1. Th

[Xen-devel] [xen-unstable-smoke test] 109174: regressions - trouble: broken/fail/pass

2017-05-08 Thread osstest service owner
flight 109174 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/109174/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 11 guest-start fail REGR. vs. 109036 Tests which

Re: [Xen-devel] [RFC PATCH 01/10] ARM: vGIC: remove rank lock from IRQ routing functions

2017-05-08 Thread Julien Grall
Hi Andre, On 08/05/17 10:15, Andre Przywara wrote: On 04/05/17 16:53, Julien Grall wrote: Hi Andre, On 04/05/17 16:31, Andre Przywara wrote: gic_route_irq_to_guest() and gic_remove_irq_from_guest() take the rank lock, however never actually access the rank structure. Avoid taking the lock in

Re: [Xen-devel] Security response; public holidays [and 1 more messages]

2017-05-08 Thread Ian Jackson
Ian Jackson writes ("Security response; public holidays"): > It would perhaps be possible to find a holiday calendar listing all > known public holidays throughout the world. But we are interested in > public holidays affecting Xen Project community members. > > I was wondering if we should start

Re: [Xen-devel] [PATCH v6 3/5] shutdown: Add source information to SHUTDOWN and RESET

2017-05-08 Thread Eric Blake
On 05/08/2017 12:26 AM, David Gibson wrote: > On Fri, May 05, 2017 at 02:38:08PM -0500, Eric Blake wrote: >> Time to wire up all the call sites that request a shutdown or >> reset to use the enum added in the previous patch. >> >> It would have been less churn to keep the common case with no >> arg

Re: [Xen-devel] [RFC PATCH v2 06/25] x86: NUMA: Add accessors for nodes[] and node_memblk_range[] structs

2017-05-08 Thread Julien Grall
Hi Vijay, On 28/03/17 16:53, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Add accessor for nodes[] and other static variables and s/accessor/accessors/ used those accessors. Also, I am not sure to understand the usefulness of those accessors over a global variable. Signed-off-b

Re: [Xen-devel] Security response; public holidays [and 1 more messages]

2017-05-08 Thread Lars Kurth
> On 8 May 2017, at 15:29, Ian Jackson wrote: > > Ian Jackson writes ("Security response; public holidays"): >> It would perhaps be possible to find a holiday calendar listing all >> known public holidays throughout the world. But we are interested in >> public holidays affecting Xen Project co

Re: [Xen-devel] [Qemu-devel] [PATCH v5 06/10] qobject: Use simpler QDict/QList scalar insertion macros

2017-05-08 Thread Alberto Garcia
On Fri 28 Apr 2017 10:33:36 AM CEST, Markus Armbruster wrote: >> v5: rebase to master (Coccinelle found a couple new spots), squash 3 >> patches into 1, adjust R-b to only list Markus (while there were other >> reviews on the pre-squashed patches, Markus was the only one on all 3) > > The block: pa

Re: [Xen-devel] Security response; public holidays [and 1 more messages]

2017-05-08 Thread George Dunlap
On 08/05/17 15:29, Ian Jackson wrote: > Ian Jackson writes ("Security response; public holidays"): >> It would perhaps be possible to find a holiday calendar listing all >> known public holidays throughout the world. But we are interested in >> public holidays affecting Xen Project community membe

Re: [Xen-devel] Security response; public holidays [and 1 more messages] [and 1 more messages]

2017-05-08 Thread Ian Jackson
Lars Kurth writes ("Re: Security response; public holidays [and 1 more messages]"): > I think this makes sense. It is probably also worth looking at > http://www.officeholidays.com/ (or something similar) I deliberately decided to avoid one of those portmanteau sites because the set of holidays

Re: [Xen-devel] [PATCH] x86/mm: add temporary debugging code to get_page_from_gfn_p2m()

2017-05-08 Thread George Dunlap
On 04/05/17 10:09, Jan Beulich wrote: > See the code comment. > > Signed-off-by: Jan Beulich Acked-by: George Dunlap > > --- a/xen/arch/x86/mm/p2m.c > +++ b/xen/arch/x86/mm/p2m.c > @@ -480,6 +480,22 @@ struct page_info *get_page_from_gfn_p2m( > p2m_access_t _a; > p2m_type_t _t; >

Re: [Xen-devel] Security response; public holidays [and 1 more messages] [and 1 more messages]

2017-05-08 Thread George Dunlap
On 08/05/17 15:50, Ian Jackson wrote: > Lars Kurth writes ("Re: Security response; public holidays [and 1 more > messages]"): >> I think this makes sense. It is probably also worth looking at >> http://www.officeholidays.com/ (or something similar) > > I deliberately decided to avoid one of thos

Re: [Xen-devel] Security response; public holidays [and 1 more messages] [and 1 more messages]

2017-05-08 Thread Lars Kurth
> On 8 May 2017, at 16:07, George Dunlap wrote: > > On 08/05/17 15:50, Ian Jackson wrote: >> Lars Kurth writes ("Re: Security response; public holidays [and 1 more >> messages]"): >>> I think this makes sense. It is probably also worth looking at >>> http://www.officeholidays.com/ (or somethin

[Xen-devel] [ovmf baseline-only test] 71264: tolerable trouble: blocked/broken/fail/pass

2017-05-08 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71264 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71264/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-amd64-xsm 3 host-install(3) broken bas

Re: [Xen-devel] [PATCH] x86/ioreq server: Fix DomU couldn't reboot when using p2m_ioreq_server p2m_type

2017-05-08 Thread Jan Beulich
>>> On 08.05.17 at 15:55, wrote: > On 08/05/17 14:26, George Dunlap wrote: >> On 05/05/17 15:40, Jan Beulich wrote: >> On 05.05.17 at 05:52, wrote: 'commit 1679e0df3df6 ("x86/ioreq server: asynchronously reset outstanding p2m_ioreq_server entries")' will call p2m_change_entry_t

[Xen-devel] [PATCH 1/4] x86/pv: Drop int80_bounce from struct pv_vcpu

2017-05-08 Thread Andrew Cooper
The int80_bounce field of struct pv_vcpu is a bit of an odd special case, because it is a simple derivation of trap_ctxt[0x80], which is also stored. It is also the only use of {compat_,}create_bounce_frame() which isn't referencing the plain trap_bounce field of struct pv_vcpu. (And altering thi

[Xen-devel] [PATCH RFC for-next 0/4] Reimpliement {compat_, }create_bounce_frame() in C

2017-05-08 Thread Andrew Cooper
Bloat-o-meter reports: add/remove: 1/1 grow/shrink: 0/1 up/down: 1211/-2587 (-1376) function old new delta pv_create_exception_frame -1211 +1211 asm_domain_crash_synchronous 65 - -65 context_sw

[Xen-devel] [PATCH 3/4] x86/pv: Drop {compat_, }create_bounce_frame() and use the C version instead

2017-05-08 Thread Andrew Cooper
The clobbering of TRAPBOUNCE_flags in .L{compat_}bounce_exception is subsumed by the logic at the end of pv_create_bounce_frame(). This cleanup removes all callers of asm_domain_crash_synchronous(), which is therefore dropped as well. Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/ar

[Xen-devel] [PATCH 4/4] x86/pv: Implement the failsafe callback using the general path

2017-05-08 Thread Andrew Cooper
Reintroduce TBF_FAILSAFE and update pv_create_exception_frame() to cope with the additional data segment registers. load_segments() now fills in trap_bounce, and lets the general return-to-guest path inject the exception. Bloat-o-meter reports: add/remove: 0/0 grow/shrink: 1/1 up/down: 123/-252

[Xen-devel] [PATCH 2/4] x86/pv: Introduce pv_create_exception_frame()

2017-05-08 Thread Andrew Cooper
This is a C implementation of {compat_,}create_bounce_frame(), based loosely on the existing failsafe implementation in load_segments(). It picks up all injection information from the trap_bounce structure. One minor improvement is that at not point is regs->cs left with an rpl of 0 on the root s

Re: [Xen-devel] [PATCH v3 9/9] mm: Make sure pages are scrubbed

2017-05-08 Thread Konrad Rzeszutek Wilk
On Fri, May 05, 2017 at 09:05:54AM -0600, Jan Beulich wrote: > >>> On 14.04.17 at 17:37, wrote: > > --- a/xen/Kconfig.debug > > +++ b/xen/Kconfig.debug > > @@ -114,6 +114,13 @@ config DEVICE_TREE_DEBUG > > logged in the Xen ring buffer. > > If unsure, say N here. > > > > +config SCRU

Re: [Xen-devel] [RFC PATCH v2 09/25] ARM: NUMA: Add existing ARM numa code under CONFIG_NUMA

2017-05-08 Thread Julien Grall
Hi Vijay, On 28/03/17 16:53, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Right now CONFIG_NUMA is not enabled for ARM and existing code in asm-arm/numa.h is for !CONFIG_NUMA. Hence put this code under #ifndef CONFIG_NUMA. This help to make this changes work when CONFIG_NUMA is not enab

Re: [Xen-devel] Security support scope (apropos of Xen and CNA)

2017-05-08 Thread Ian Jackson
Tim Deegan writes ("Re: Security support scope (apropos of Xen and CNA)"): > Ah, so it is. So there is information on the wiki page that's not in > MAINTAINERS. Could that be moved into MAINTAINERS? There are > a few things that don't map well to maintainership of specific > files, e.g. "vMCE" o

Re: [Xen-devel] Security support scope (apropos of Xen and CNA)

2017-05-08 Thread Andrew Cooper
On 08/05/17 17:04, Ian Jackson wrote: > Tim Deegan writes ("Re: Security support scope (apropos of Xen and CNA)"): >> Ah, so it is. So there is information on the wiki page that's not in >> MAINTAINERS. Could that be moved into MAINTAINERS? There are >> a few things that don't map well to mainta

[Xen-devel] [PATCH] x86/efi: Reserve EFI properties table

2017-05-08 Thread Ross Lagerwall
Some EFI firmware implementations may place the EFI properties table in RAM marked as BootServicesData, which Xen does not consider as reserved. When dom0 tries to access the EFI properties table (which Linux >= 4.4 does), it crashes with a page fault. Fix this by unconditionally marking the EFI p

Re: [Xen-devel] [PATCH v3 9/9] mm: Make sure pages are scrubbed

2017-05-08 Thread Boris Ostrovsky
>>> --- a/xen/common/page_alloc.c >>> +++ b/xen/common/page_alloc.c >>> @@ -694,6 +694,31 @@ static void page_list_add_scrub(struct page_info *pg, >>> unsigned int node, >>> page_list_add(pg, &heap(node, zone, order)); >>> } >>> >>> +#define SCRUB_BYTE_PATTERN 0xc2c2c2c2c2c2c2c2 >> Th

Re: [Xen-devel] Security support scope (apropos of Xen and CNA)

2017-05-08 Thread Lars Kurth
> On 8 May 2017, at 17:11, Andrew Cooper wrote: > > On 08/05/17 17:04, Ian Jackson wrote: >> Tim Deegan writes ("Re: Security support scope (apropos of Xen and CNA)"): >>> Ah, so it is. So there is information on the wiki page that's not in >>> MAINTAINERS. Could that be moved into MAINTAINERS

Re: [Xen-devel] [PATCH] x86/efi: Reserve EFI properties table

2017-05-08 Thread Andrew Cooper
On 08/05/17 17:17, Ross Lagerwall wrote: > Some EFI firmware implementations may place the EFI properties table in > RAM marked as BootServicesData, which Xen does not consider as reserved. > When dom0 tries to access the EFI properties table (which Linux >= 4.4 > does), it crashes with a page faul

[Xen-devel] [PATCH for-next] x86/tlb: Don't use locked operations in tlbflush_filter()

2017-05-08 Thread Andrew Cooper
All passed cpumask_t's are context-local and not at risk of concurrent updates. Signed-off-by: Andrew Cooper --- CC: Jan Beulich --- xen/include/asm-x86/flushtlb.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/include/asm-x86/flushtlb.h b/xen/include/asm-x86/flushtlb.h

  1   2   >