Re: [Xen-devel] [PATCH v4] VT-d: fix VF of RC integrated PF matched to wrong VT-d unit

2017-07-04 Thread Tian, Kevin
> From: Gao, Chao > Sent: Wednesday, July 5, 2017 12:28 PM > > On Wed, Jul 05, 2017 at 10:46:39AM +0800, Tian, Kevin wrote: > >> From: Gao, Chao > >> Sent: Monday, July 3, 2017 12:37 PM > >> > >> On Fri, Jun 30, 2017 at 05:19:52PM +0800, Tian, Kevin wrote: > >> >> From: Gao, Chao > >> >> Sent:

[Xen-devel] make tools error

2017-07-04 Thread Chen, Farrah
Hi, When I compile xen with commit a7d802bca13489d303749177127089af48844f29, it failed when make tools. "ERROR 404: Not Found" showed when wget http://xenbits.xen.org/xen-extfiles/ipxe-git-356f6c1b64d7a97746d1816cef8ca22bdd8d0b5d.tar.gz Then I checked above URL, the following error occurred:

Re: [Xen-devel] [PATCH v4] VT-d: fix VF of RC integrated PF matched to wrong VT-d unit

2017-07-04 Thread Chao Gao
On Wed, Jul 05, 2017 at 10:46:39AM +0800, Tian, Kevin wrote: >> From: Gao, Chao >> Sent: Monday, July 3, 2017 12:37 PM >> >> On Fri, Jun 30, 2017 at 05:19:52PM +0800, Tian, Kevin wrote: >> >> From: Gao, Chao >> >> Sent: Friday, June 30, 2017 9:17 AM >> >> >> >> The problem is for a VF of RC

Re: [Xen-devel] [PATCH v1 3/6] vmx: refactor vmx_init_vmcs_config()

2017-07-04 Thread Tian, Kevin
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com] > Sent: Monday, June 26, 2017 6:45 PM > > 1. Remove RDMSRs of VMX MSRs since all values are already available in >raw_vmx_msr_policy. > 2. Replace bit operations involving VMX bitmasks with accessing VMX >features by name and using

Re: [Xen-devel] [PATCH 5/25] Xen/doc: Add Xen virtual IOMMU doc

2017-07-04 Thread Lan Tianyu
Hi Julien: Thanks for your review. On 2017年07月04日 18:39, Julien Grall wrote: >> +vIOMMU hypercall >> + >> +Introduce new domctl hypercall "xen_domctl_viommu_op" to create/destroy >> +vIOMMU and query vIOMMU capabilities that device model can support. >> + >> +* vIOMMU

[Xen-devel] [PATCH v6 06/11] x86/vmce: emulate MSR_IA32_MCG_EXT_CTL

2017-07-04 Thread Haozhong Zhang
If MCG_LMCE_P is present in guest MSR_IA32_MCG_CAP, then allow guest to read/write MSR_IA32_MCG_EXT_CTL. Signed-off-by: Haozhong Zhang --- Changes in v6: * Remove Jan's R-b. * Handle hvm_vmce_vcpu::mcg_ext_ctl in XEN_DOMCTL_{set,get}_ext_vcpucontext. ---

Re: [Xen-devel] [PATCH v1 1/6] vmx: add struct vmx_msr_policy

2017-07-04 Thread Tian, Kevin
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com] > Sent: Monday, June 26, 2017 6:45 PM > > This structure provides a convenient way of accessing contents of > VMX MSRs: every bit value is accessible by its name. Bit names match > existing Xen's definitions as close as possible. > > The

Re: [Xen-devel] [PATCH v1 0/6] VMX MSRs policy for Nested Virt: part 1

2017-07-04 Thread Tian, Kevin
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com] > Sent: Monday, June 26, 2017 6:44 PM > > The end goal of having VMX MSRs policy is to be able to manage > L1 VMX features. This patch series is the first part of this work. > There is no functional change to what L1 sees in VMX MSRs at this

[Xen-devel] [linux-linus test] 111374: regressions - FAIL

2017-07-04 Thread osstest service owner
flight 111374 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/111374/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 16 guest-localmigrate fail REGR. vs. 110515

Re: [Xen-devel] [PATCH v4] VT-d: fix VF of RC integrated PF matched to wrong VT-d unit

2017-07-04 Thread Tian, Kevin
> From: Gao, Chao > Sent: Monday, July 3, 2017 12:37 PM > > On Fri, Jun 30, 2017 at 05:19:52PM +0800, Tian, Kevin wrote: > >> From: Gao, Chao > >> Sent: Friday, June 30, 2017 9:17 AM > >> > >> The problem is for a VF of RC integrated PF (e.g. PF's BDF is 00:02.0), > >> we would wrongly use

Re: [Xen-devel] [PATCH v12 13/23] x86: refactor psr: CDP: implement CPU init flow.

2017-07-04 Thread Yi Sun
On 17-07-04 01:28:32, Jan Beulich wrote: > >>> On 04.07.17 at 03:40, wrote: > > On 17-06-30 03:18:53, Jan Beulich wrote: > >> >>> Yi Sun 06/30/17 10:05 AM >>> > >> >On 17-06-30 01:33:02, Jan Beulich wrote: > >> >> >>> Yi Sun

[Xen-devel] [xen-unstable baseline-only test] 71641: regressions - trouble: blocked/broken/fail/pass

2017-07-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71641 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71641/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-intel 16

Re: [Xen-devel] OOPS new Xen 4.9.0_08 / kernel 4.12.0 Dom0 crash @ domain_crash_sync called from entry.S: fault at ffff82d080342328 entry.o#create_bounce_frame+0x135/0x14d

2017-07-04 Thread PGNet Dev
Hi On 7/4/17 12:54 PM, Andrew Cooper wrote: > On 04/07/17 20:48, PGNet Dev wrote: >> [0.00] NX (Execute Disable) protection: active >> [0.00] efi: EFI v2.31 by American Megatrends >> [0.00] efi: ESRT=0x9ef8d998 ACPI 2.0=0x9e819000 >> ACPI=0x9e819000

[Xen-devel] [qemu-mainline test] 111373: regressions - FAIL

2017-07-04 Thread osstest service owner
flight 111373 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/111373/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 111359

[Xen-devel] [linux-3.18 test] 111375: regressions - FAIL

2017-07-04 Thread osstest service owner
flight 111375 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/111375/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win7-amd64 18 guest-start/win.repeat fail in 111255 REGR. vs. 110441

Re: [Xen-devel] I was able to cross-compile the hypervisor on an amd64 host for the aarch64 target ... However, I can't build the Xen toolset

2017-07-04 Thread Nick Garnett
From: Julien Grall [mailto:julien.gr...@arm.com] Sent: Tuesday, July 04, 2017 09:47 On 07/04/2017 05:42 PM, Nick Garnett wrote: > I tried installing the tools with an ARM64 chroot also and had a similar > issue. In that case, the package > "crossbuild_essential_arm64" wouldn't install because

Re: [Xen-devel] [PATCH v5 08/12] arm/mem_access: Introduce GENMASK_ULL bit operation

2017-07-04 Thread Sergej Proskurin
Hi Julien, On 07/04/2017 10:46 PM, Sergej Proskurin wrote: > Hi Julien, > > On 07/04/2017 06:28 PM, Julien Grall wrote: >> Hi Sergej, >> >> On 06/27/2017 12:52 PM, Sergej Proskurin wrote: >>> The current implementation of GENMASK is capable of creating bitmasks of >>> 32-bit values on AArch32

Re: [Xen-devel] [PATCH v5 03/12] arm/mem_access: Add defines supporting PTs with varying page sizes

2017-07-04 Thread Sergej Proskurin
Hi Julien, On 07/04/2017 06:15 PM, Julien Grall wrote: > Hi Sergej, > [...] >> + >> +#define GUEST_TABLE_OFFSET(offs, gran) ((paddr_t)(offs) & >> lpae_entry_mask(gran)) >> +#define >> GUEST_TABLE_OFFSET_HELPERS(gran) >> >> \ >> +static

Re: [Xen-devel] [PATCH v5 08/12] arm/mem_access: Introduce GENMASK_ULL bit operation

2017-07-04 Thread Sergej Proskurin
Hi Julien, On 07/04/2017 06:28 PM, Julien Grall wrote: > Hi Sergej, > > On 06/27/2017 12:52 PM, Sergej Proskurin wrote: >> The current implementation of GENMASK is capable of creating bitmasks of >> 32-bit values on AArch32 and 64-bit values on AArch64. As we need to >> create masks for 64-bit

[Xen-devel] Possible bug on ARM with irq passthrough

2017-07-04 Thread Ivan Pavić2
Hello, I'm testing IRQ latency on exynos5422. I'm using Xen 4.10-unstable. I used device passthrough for SPI irq 64. For guest domain I used  FreeRTOS. When I use credit scheduler after destruction of domain, IRQ is released. I changed scheduler to credit2 and rtds at boot time and IRQ wasn't

Re: [Xen-devel] [PATCH v5 09/12] arm/mem_access: Add software guest-page-table walk

2017-07-04 Thread Sergej Proskurin
Hi Julien, On 07/04/2017 06:58 PM, Julien Grall wrote: > Hi Sergej, > > On 06/27/2017 12:52 PM, Sergej Proskurin wrote: >> The function p2m_mem_access_check_and_get_page in mem_access.c >> translates a gva to an ipa by means of the hardware functionality of the >> ARM architecture. This is

Re: [Xen-devel] OOPS new Xen 4.9.0_08 / kernel 4.12.0 Dom0 crash @ domain_crash_sync called from entry.S: fault at ffff82d080342328 entry.o#create_bounce_frame+0x135/0x14d

2017-07-04 Thread Andrew Cooper
On 04/07/17 20:48, PGNet Dev wrote: > [0.00] NX (Execute Disable) protection: active > [0.00] efi: EFI v2.31 by American Megatrends > [0.00] efi: ESRT=0x9ef8d998 ACPI 2.0=0x9e819000 > ACPI=0x9e819000 SMBIOS=0xf04c0 MPS=0xfd490 > (XEN)

[Xen-devel] OOPS new Xen 4.9.0_08 / kernel 4.12.0 Dom0 crash @ domain_crash_sync called from entry.S: fault at ffff82d080342328 entry.o#create_bounce_frame+0x135/0x14d

2017-07-04 Thread PGNet Dev
> As a general remark, I think such issues should rather be brought up on > xen-devel. upgrading a working Xen server to kernel 4.12.0-2.gb8e7496-default Xen 4.9.0_08-512 now, boot crashes @ domain_crash_sync called from entry.S: fault at 82d080342328

[Xen-devel] [distros-debian-snapshot test] 71633: regressions - trouble: blocked/broken/fail/pass

2017-07-04 Thread Platform Team regression test user
flight 71633 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71633/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-i386-daily-netboot-pvgrub 9 debian-di-install fail REGR. vs. 71604

[Xen-devel] [PATCH] xen: selfballoon: remove unnecessary static in frontswap_selfshrink()

2017-07-04 Thread Gustavo A. R. Silva
Remove unnecessary static on local variables last_frontswap_pages and tgt_frontswap_pages. Such variables are initialized before being used, on every execution path throughout the function. The statics have no benefit and, removing them reduce the code size. This issue was detected using

Re: [Xen-devel] xen/arm: Software Step ARMv8 - PC stuck on instruction

2017-07-04 Thread Julien Grall
On 07/04/2017 01:30 PM, Florian Jakobsmeier wrote: Hello all, Hi Florian, asmlinkage void leave_hypervisor_tail(void) { +/*This methode will be called after the 'guest_entry' macro in /arch/arm64/entry.S set guest registers +Check single_step_enabled flag in

[Xen-devel] [xen-unstable test] 111368: tolerable FAIL - PUSHED

2017-07-04 Thread osstest service owner
flight 111368 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/111368/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemut-win7-amd64 16 guest-localmigrate/x10 fail like 111249 test-armhf-armhf-libvirt 14

Re: [Xen-devel] [PATCH 2/2] CODING_STYLE: Forbid nested block in the hypervisor code

2017-07-04 Thread Julien Grall
Hi, On 07/04/2017 03:17 PM, Andrew Cooper wrote: On 04/07/17 13:20, Jan Beulich wrote: On 04.07.17 at 14:12, wrote: When removing if/for/while statements, the code should be reworked to remove the { } and the extra indentation. Yes. This is improving code

[Xen-devel] [xen-unstable-smoke test] 111376: tolerable trouble: broken/pass - PUSHED

2017-07-04 Thread osstest service owner
flight 111376 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/111376/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13

Re: [Xen-devel] [PATCH v5 10/12] arm/mem_access: Add long-descriptor based gpt

2017-07-04 Thread Julien Grall
Hi Sergej, On 06/27/2017 12:52 PM, Sergej Proskurin wrote: Also, create a macro CHECK_BASE_SIZE which simply reduces the code size and simplifies readability. No, it makes more confusing because you have the return within the macro. It is not that bad too have an helper checking

Re: [Xen-devel] What is provided with the Xen Tools and why do I need them?

2017-07-04 Thread 'Roger Pau Monné'
On Tue, Jul 04, 2017 at 09:45:19AM -0700, Nick Garnett wrote: > > > -Original Message- > From: Roger Pau Monné [mailto:roger@citrix.com] > Sent: Tuesday, July 04, 2017 09:40 > To: Nick Garnett > Cc: xen-devel@lists.xen.org > Subject: Re: [Xen-devel] What is provided

Re: [Xen-devel] [PATCH] xen-blkfront: emit KOBJ_OFFLINE uevent when detaching device

2017-07-04 Thread Roger Pau Monné
On Tue, Jul 04, 2017 at 01:48:32PM +0200, Vincent Legout wrote: > Devices are not unmounted inside a domU after a xl block-detach. > > After xl block-detach, blkfront_closing() is called with state == > XenbusStateConnected, it detects that the device is still in use and > only switches state to

Re: [Xen-devel] [PATCH v5 09/12] arm/mem_access: Add software guest-page-table walk

2017-07-04 Thread Julien Grall
Hi Sergej, On 06/27/2017 12:52 PM, Sergej Proskurin wrote: The function p2m_mem_access_check_and_get_page in mem_access.c translates a gva to an ipa by means of the hardware functionality of the ARM architecture. This is implemented in the function gva_to_ipa. If mem_access is active,

Re: [Xen-devel] What is provided with the Xen Tools and why do I need them?

2017-07-04 Thread Wei Liu
On Tue, Jul 04, 2017 at 09:34:17AM -0700, Nick Garnett wrote: > Is "xl" the application that is installed following the "Xen ARM with > Virtualization Extensions/CrossCompiling" page, "Build arm64 tools" section? > I suppose so. > I was able to install the "xen-tools" package with no issues,

Re: [Xen-devel] [PATCH v2 3/4] xen/mapcache: introduce xen_replace_cache_entry()

2017-07-04 Thread Igor Druzhinin
On 04/07/17 17:42, Paul Durrant wrote: >> -Original Message- >> From: Igor Druzhinin >> Sent: 04 July 2017 17:34 >> To: Paul Durrant ; xen-de...@lists.xenproject.org; >> qemu-de...@nongnu.org >> Cc: sstabell...@kernel.org; Anthony Perard

Re: [Xen-devel] I was able to cross-compile the hypervisor on an amd64 host for the aarch64 target ... However, I can't build the Xen toolset

2017-07-04 Thread Julien Grall
Hello Nick, Please avoid top-posting and keep mailing list CCed. On 07/04/2017 05:42 PM, Nick Garnett wrote: I tried installing the tools with an ARM64 chroot also and had a similar issue. In that case, the package "crossbuild_essential_arm64" wouldn't install because it depended on a

Re: [Xen-devel] What is provided with the Xen Tools and why do I need them?

2017-07-04 Thread Nick Garnett
-Original Message- From: Roger Pau Monné [mailto:roger@citrix.com] Sent: Tuesday, July 04, 2017 09:40 To: Nick Garnett Cc: xen-devel@lists.xen.org Subject: Re: [Xen-devel] What is provided with the Xen Tools and why do I need them? Hello, Please avoid top-posting,

Re: [Xen-devel] [PATCH v2 3/4] xen/mapcache: introduce xen_replace_cache_entry()

2017-07-04 Thread Paul Durrant
> -Original Message- > From: Igor Druzhinin > Sent: 04 July 2017 17:34 > To: Paul Durrant ; xen-de...@lists.xenproject.org; > qemu-de...@nongnu.org > Cc: sstabell...@kernel.org; Anthony Perard ; > pbonz...@redhat.com > Subject: Re: [PATCH

Re: [Xen-devel] What is provided with the Xen Tools and why do I need them?

2017-07-04 Thread Roger Pau Monné
Hello, Please avoid top-posting, it breaks the flow of the conversation. On Tue, Jul 04, 2017 at 09:34:17AM -0700, Nick Garnett wrote: > Is "xl" the application that is installed following the "Xen ARM with > Virtualization Extensions/CrossCompiling" page, "Build arm64 tools" section? Yes,

Re: [Xen-devel] What is provided with the Xen Tools and why do I need them?

2017-07-04 Thread Nick Garnett
Is "xl" the application that is installed following the "Xen ARM with Virtualization Extensions/CrossCompiling" page, "Build arm64 tools" section? I was able to install the "xen-tools" package with no issues, following the "xen-tools – a straightforward VM provisioning/installation tool" page

Re: [Xen-devel] What is provided with the Xen Tools and why do I need them?

2017-07-04 Thread Nick Garnett
Is "xl" the application that is installed following the "Xen ARM with Virtualization Extensions/CrossCompiling" page, "Build arm64 tools" section? I was able to install the "xen-tools" package with no issues, following the "xen-tools – a straightforward VM provisioning/installation tool" page

[Xen-devel] time does not move forward in HVM guests

2017-07-04 Thread Olaf Hering
In my testing with sysbench in a HVM domU running a linux-4.4 based pvops kernel on a xen-4.7 based dom0 the time does not move forward properly: There (URL below) is basically code like this: clock_gettime(CLOCK_MONOTONIC, a) do_work clock_gettime(CLOCK_MONOTONIC, b) diff_time(a,b) All

Re: [Xen-devel] [PATCH v2 3/4] xen/mapcache: introduce xen_replace_cache_entry()

2017-07-04 Thread Igor Druzhinin
On 04/07/17 17:27, Paul Durrant wrote: >> -Original Message- >> From: Igor Druzhinin >> Sent: 04 July 2017 16:48 >> To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org >> Cc: Igor Druzhinin ; sstabell...@kernel.org; >> Anthony Perard

Re: [Xen-devel] [PATCH v2 3/4] xen/mapcache: introduce xen_replace_cache_entry()

2017-07-04 Thread Paul Durrant
> -Original Message- > From: Igor Druzhinin > Sent: 04 July 2017 16:48 > To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org > Cc: Igor Druzhinin ; sstabell...@kernel.org; > Anthony Perard ; Paul Durrant >

Re: [Xen-devel] [PATCH v5 08/12] arm/mem_access: Introduce GENMASK_ULL bit operation

2017-07-04 Thread Julien Grall
Hi Sergej, On 06/27/2017 12:52 PM, Sergej Proskurin wrote: The current implementation of GENMASK is capable of creating bitmasks of 32-bit values on AArch32 and 64-bit values on AArch64. As we need to create masks for 64-bit values on AArch32 as well, in this commit we introduce the GENMASK_ULL

Re: [Xen-devel] [PATCH v5 07/12] arm/mem_access: Introduce BIT_ULL bit operation

2017-07-04 Thread Julien Grall
Hi Sergej, On 06/27/2017 12:52 PM, Sergej Proskurin wrote: We introduce the BIT_ULL macro to using values of unsigned long long as to enable setting bits of 64-bit registers on AArch32. In addition, this commit adds a define holding the register width of 64 bit double-word registers. This

Re: [Xen-devel] [PATCH v5 05/12] arm/mem_access: Add short-descriptor pte typedefs and macros

2017-07-04 Thread Julien Grall
Hi Sergej, On 06/27/2017 12:52 PM, Sergej Proskurin wrote: The current implementation does not provide appropriate types for short-descriptor translation table entries. As such, this commit adds new types, which simplify managing the respective translation table entries. Signed-off-by: Sergej

Re: [Xen-devel] [PATCH v4 3/9] arm/mem_access: Add short-descriptor pte typedefs

2017-07-04 Thread Julien Grall
On 07/04/2017 05:22 PM, Julien Grall wrote: Hi Sergekj, On 06/20/2017 09:33 PM, Sergej Proskurin wrote: The current implementation does not provide appropriate types for short-descriptor translation table entries. As such, this commit adds new types, which simplify managing the respective

Re: [Xen-devel] [PATCH v5 04/12] arm/lpae: Introduce lpae_page helper

2017-07-04 Thread Julien Grall
Hi Sergej, On 06/27/2017 12:52 PM, Sergej Proskurin wrote: This commit introduces a new helper that checks whether the target PTE holds a page mapping or not. This helper will be used as part of the following commits. Signed-off-by: Sergej Proskurin Reviewed-by:

Re: [Xen-devel] [PATCH v4 3/9] arm/mem_access: Add short-descriptor pte typedefs

2017-07-04 Thread Julien Grall
Hi Sergekj, On 06/20/2017 09:33 PM, Sergej Proskurin wrote: The current implementation does not provide appropriate types for short-descriptor translation table entries. As such, this commit adds new types, which simplify managing the respective translation table entries. Signed-off-by: Sergej

Re: [Xen-devel] [PATCH v5 03/12] arm/mem_access: Add defines supporting PTs with varying page sizes

2017-07-04 Thread Julien Grall
Hi Sergej, On 06/27/2017 12:52 PM, Sergej Proskurin wrote: The ARMv8 architecture supports pages with different (4K, 16K, and 64K) sizes. To enable guest page table walks for various configurations, this commit extends the defines and helpers of the current implementation. Signed-off-by:

Re: [Xen-devel] [PATCH v2 2/4] xen/mapcache: add an ability to create dummy mappings

2017-07-04 Thread Paul Durrant
> -Original Message- > From: Igor Druzhinin > Sent: 04 July 2017 16:48 > To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org > Cc: Igor Druzhinin ; sstabell...@kernel.org; > Anthony Perard ; Paul Durrant >

Re: [Xen-devel] [PATCH v2 1/4] xen: move physmap saving into a separate function

2017-07-04 Thread Paul Durrant
> -Original Message- > From: Igor Druzhinin > Sent: 04 July 2017 16:48 > To: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org > Cc: Igor Druzhinin ; sstabell...@kernel.org; > Anthony Perard ; Paul Durrant >

Re: [Xen-devel] [PATCH v5 01/12] arm/mem_access: Add and cleanup (TCR_|TTBCR_)* defines

2017-07-04 Thread Julien Grall
Hi Sergej, On 06/27/2017 12:52 PM, Sergej Proskurin wrote: diff --git a/xen/include/asm-arm/processor.h b/xen/include/asm-arm/processor.h index 855ded1b07..3dd439de33 100644 --- a/xen/include/asm-arm/processor.h +++ b/xen/include/asm-arm/processor.h @@ -94,6 +94,13 @@ #define TTBCR_N_2KB

[Xen-devel] [PATCH v2 3/4] xen/mapcache: introduce xen_replace_cache_entry()

2017-07-04 Thread Igor Druzhinin
This new call is trying to update a requested map cache entry according to the changes in the physmap. The call is searching for the entry, unmaps it and maps again at the same place using a new guest address. If the mapping is dummy this call will make it real. This function makes use of a new

[Xen-devel] [PATCH v2 0/4] xen: don't save/restore the physmap on VM save/restore

2017-07-04 Thread Igor Druzhinin
Saving/restoring the physmap to/from xenstore was introduced to QEMU majorly in order to cover up the VRAM region restore issue. The sequence of restore operations implies that we should know the effective guest VRAM address *before* we have the VRAM region restored (which happens later).

[Xen-devel] [PATCH v2 4/4] xen: don't use xenstore to save/restore physmap anymore

2017-07-04 Thread Igor Druzhinin
If we have a system with xenforeignmemory_map2() implemented we don't need to save/restore physmap on suspend/restore anymore. In case we resume a VM without physmap - try to recreate the physmap during memory region restore phase and remap map cache entries accordingly. The old code is left for

[Xen-devel] [PATCH v2 1/4] xen: move physmap saving into a separate function

2017-07-04 Thread Igor Druzhinin
Non-functional change. Signed-off-by: Igor Druzhinin --- hw/i386/xen/xen-hvm.c | 57 --- 1 file changed, 31 insertions(+), 26 deletions(-) diff --git a/hw/i386/xen/xen-hvm.c b/hw/i386/xen/xen-hvm.c index

[Xen-devel] [PATCH v2 2/4] xen/mapcache: add an ability to create dummy mappings

2017-07-04 Thread Igor Druzhinin
Dummys are simple anonymous mappings that are placed instead of regular foreign mappings in certain situations when we need to postpone the actual mapping but still have to give a memory region to QEMU to play with. This is planned to be used for restore on Xen. Signed-off-by: Igor Druzhinin

Re: [Xen-devel] [PATCH 1/6] xen: Add support for hiding and unhiding pcie passthrough devices

2017-07-04 Thread Jan Beulich
>>> On 27.06.17 at 19:14, wrote: First of all, please Cc all maintainers of code you modify. > xen: Add support for hiding and unhiding pcie passthrough devices Please don't repeat the subject in the body of the mail. > Add support for hiding and unhiding (by

Re: [Xen-devel] [PATCH 1/7] xen/arm: SMMU: Implement the add_device callback in SMMU

2017-07-04 Thread Julien Grall
Hi Wei, On 06/30/2017 04:15 AM, Wei Chen wrote: This add_device callback function is taking care of adding a device to SMMU and make sure it is fully prepare to be used by the SMMU afterwards. In previous code, we don't implement the add_device callback in iommu_ops for ARM SMMU. We placed the

Re: [Xen-devel] I was able to cross-compile the hypervisor on an amd64 host for the aarch64 target ... However, I can't build the Xen toolset

2017-07-04 Thread Julien Grall
Hi, On 07/04/2017 03:41 PM, Wei Liu wrote: CC Julien and Stefano -- not sure if the wiki page should be updated I don't cross-compile the tools usually but either build on the target or using an ARM chroot (setup with qemu-debootstrap). Stefano seems to have updated the wiki page recently,

Re: [Xen-devel] RT-Xen on ARM

2017-07-04 Thread Meng Xu
On Tue, Jul 4, 2017 at 8:28 AM, Andrii Anisov wrote: > > > On 03.07.17 21:42, Meng Xu wrote: >> >> As far as I know, there is no known issue for ARM as long as that >> version Xen runs on the ARM board. > > That's good. >> >> I assume you have your own workloads to run,

Re: [Xen-devel] [PATCH v1 5/6] vvmx: add per domain vmx msr policy

2017-07-04 Thread Jan Beulich
>>> On 26.06.17 at 12:44, wrote: > @@ -2085,7 +2097,7 @@ int nvmx_msr_read_intercept(unsigned int msr, u64 > *msr_content) > { > struct vcpu *v = current; > struct domain *d = v->domain; > -struct vmx_msr_policy *p = _max_vmx_msr_policy; > +struct

Re: [Xen-devel] [PATCH v1 4/6] vvmx: add hvm_max_vmx_msr_policy

2017-07-04 Thread Jan Beulich
>>> On 26.06.17 at 12:44, wrote: > --- a/xen/arch/x86/hvm/vmx/vmcs.c > +++ b/xen/arch/x86/hvm/vmx/vmcs.c > @@ -244,6 +244,8 @@ static u32 adjust_vmx_controls( > return ctl; > } > > +void calculate_hvm_max_policy(void); As said for a prior patch, this once again

[Xen-devel] DESIGN v2: CPUID part 3

2017-07-04 Thread Andrew Cooper
Presented herewith is the a plan for the final part of CPUID work, which primarily covers better Xen/Toolstack interaction for configuring the guests CPUID policy. A PDF version of this document is available from: http://xenbits.xen.org/people/andrewcoop/cpuid-part-3-rev2.pdf Changes from v1:

Re: [Xen-devel] [PATCH 1/1] gitignore: add tools/misc/xen-diag to .gitignore

2017-07-04 Thread Wei Liu
On Tue, Jul 04, 2017 at 10:35:28PM +0800, Dongli Zhang wrote: > Signed-off-by: Dongli Zhang Acked-by: Wei Liu This section of the list isn't ordered alphabetically so it isn't really your fault. But I wouldn't want to make things worse, so I would

[Xen-devel] Xen Community Call 21/06/17 meeting minutes

2017-07-04 Thread Julien Grall
Hi all, Sorry, I forgot to write the list of attendees. I only wrote down the company name. Feel free to forward the e-mail to any people interested. During the previous community call, we discussed about potential embedded/automative boards. Stefano Stabellini brought up 3 names: -

Re: [Xen-devel] I was able to cross-compile the hypervisor on an amd64 host for the aarch64 target ... However, I can't build the Xen toolset

2017-07-04 Thread Wei Liu
CC Julien and Stefano -- not sure if the wiki page should be updated On Mon, Jul 03, 2017 at 11:41:37AM -0700, Nick Garnett wrote: > I was able to cross-compile the hypervisor on an amd64 host for the aarch64 > target. However, I can't build the Xen toolset. > > I am following the "Xen ARM with

[Xen-devel] [PATCH 1/1] gitignore: add tools/misc/xen-diag to .gitignore

2017-07-04 Thread Dongli Zhang
Signed-off-by: Dongli Zhang --- .gitignore | 1 + 1 file changed, 1 insertion(+) diff --git a/.gitignore b/.gitignore index 068f430..e1009e0 100644 --- a/.gitignore +++ b/.gitignore @@ -211,6 +211,7 @@ tools/misc/xenperf tools/misc/xenpm tools/misc/xen-hvmctx

Re: [Xen-devel] [PATCH v2 2/2] tools: utility to dump guest grant table info

2017-07-04 Thread Dongli Zhang
Hi Wei, I will send the patch based on staging. Dongli Zhang On 07/04/2017 10:10 PM, Wei Liu wrote: > I pushed your two patches and discovered you also need to patch > .gitignore. Could you please send a patch for that? thanks > > ___ > Xen-devel

Re: [Xen-devel] [PATCH v1 3/6] vmx: refactor vmx_init_vmcs_config()

2017-07-04 Thread Jan Beulich
>>> On 26.06.17 at 12:44, wrote: > --- a/xen/arch/x86/hvm/vmx/vmcs.c > +++ b/xen/arch/x86/hvm/vmx/vmcs.c > @@ -227,7 +227,8 @@ static u32 adjust_vmx_controls( > { > u32 vmx_msr_low, vmx_msr_high, ctl = ctl_min | ctl_opt; > > -rdmsr(msr, vmx_msr_low,

Re: [Xen-devel] [PATCH 2/2] CODING_STYLE: Forbid nested block in the hypervisor code

2017-07-04 Thread Andrew Cooper
On 04/07/17 13:20, Jan Beulich wrote: On 04.07.17 at 14:12, wrote: >> When removing if/for/while statements, the code should be reworked to >> remove the { } and the extra indentation. > Yes. > >> This is improving code maintainability and code readability. > For the

Re: [Xen-devel] [PATCH v1 2/6] vmx: add raw_vmx_msr_policy

2017-07-04 Thread Jan Beulich
>>> On 26.06.17 at 12:44, wrote: > --- a/xen/arch/x86/hvm/vmx/vmcs.c > +++ b/xen/arch/x86/hvm/vmx/vmcs.c > @@ -144,6 +144,8 @@ static void __init vmx_display_features(void) > printk(" - none\n"); > } > > +struct vmx_msr_policy __read_mostly

Re: [Xen-devel] [PATCH 1/2] CODING_STYLE: removing trailing whitespaces

2017-07-04 Thread Wei Liu
On Tue, Jul 04, 2017 at 01:12:13PM +0100, Julien Grall wrote: > Signed-off-by: Julien Grall Applied this patch. ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 2/2] tools: utility to dump guest grant table info

2017-07-04 Thread Wei Liu
I pushed your two patches and discovered you also need to patch .gitignore. Could you please send a patch for that? thanks ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

[Xen-devel] [xen-unstable-smoke test] 111372: tolerable trouble: broken/pass - PUSHED

2017-07-04 Thread osstest service owner
flight 111372 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/111372/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13

Re: [Xen-devel] [PATCH v1 1/6] vmx: add struct vmx_msr_policy

2017-07-04 Thread Jan Beulich
>>> On 26.06.17 at 12:44, wrote: > --- a/xen/arch/x86/hvm/vmx/vmcs.c > +++ b/xen/arch/x86/hvm/vmx/vmcs.c > @@ -144,6 +144,14 @@ static void __init vmx_display_features(void) > printk(" - none\n"); > } > > +bool vmx_msr_available(struct vmx_msr_policy *p,

[Xen-devel] [linux-3.18 test] 111365: regressions - FAIL

2017-07-04 Thread osstest service owner
flight 111365 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/111365/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win7-amd64 18 guest-start/win.repeat fail in 111255 REGR. vs. 110441

Re: [Xen-devel] Question about "xen: Revert commits da72ff5bfcb0 and 72a9b186292d"

2017-07-04 Thread Jean-Louis Dupond
Op 2017-07-04 14:51, schreef Juergen Gross: On 04/07/17 14:44, Jean-Louis Dupond wrote: Hi Juergen, We run Xen as dom0 with Windows domU's. Now with older 4.9.x kernels, we had BSOD's when we booted a domU with old Xen drivers in it. With the newest kernel (4.9.34), this seems to be resolved.

[Xen-devel] [PATCH] arm/p2m: Cleanup access to the host's p2m

2017-07-04 Thread Sergej Proskurin
This commit substitutes the direct access of the host's p2m (>arch.p2m) for the macro "p2m_get_hostp2m". This macro simplifies readability and also the differentiation between the host's p2m and alternative p2m's, i.e., as part of the altp2m subsystem that will be submitted in the future.

[Xen-devel] [linux-linus test] 111363: regressions - FAIL

2017-07-04 Thread osstest service owner
flight 111363 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/111363/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs. 110515 Tests which

Re: [Xen-devel] Question about "xen: Revert commits da72ff5bfcb0 and 72a9b186292d"

2017-07-04 Thread Juergen Gross
On 04/07/17 14:44, Jean-Louis Dupond wrote: > Hi Juergen, > > We run Xen as dom0 with Windows domU's. > > Now with older 4.9.x kernels, we had BSOD's when we booted a domU with > old Xen drivers in it. > With the newest kernel (4.9.34), this seems to be resolved. > > I was wondering what caused

Re: [Xen-devel] Question about "xen: Revert commits da72ff5bfcb0 and 72a9b186292d"

2017-07-04 Thread Jean-Louis Dupond
Hi Juergen, We run Xen as dom0 with Windows domU's. Now with older 4.9.x kernels, we had BSOD's when we booted a domU with old Xen drivers in it. With the newest kernel (4.9.34), this seems to be resolved. I was wondering what caused this. And that patch triggered my attention :) Thanks

Re: [Xen-devel] Question about "xen: Revert commits da72ff5bfcb0 and 72a9b186292d"

2017-07-04 Thread Juergen Gross
On 04/07/17 13:54, Jean-Louis Dupond wrote: > Hi All, > > We had some issues with BSOD's on Windows at startup when using some old > Xen drivers inside Windows. > Now when we upgrade to the most recent 4.9.x kernel. The issue seems to > be resolved. > > Could it be that the following commit

[Xen-devel] xen/arm: Software Step ARMv8 - PC stuck on instruction

2017-07-04 Thread Florian Jakobsmeier
Hello all, I'm trying to implement a single step functionality for XEN on ARMv8 using "Software Step Exceptions". My problem with this is, that after taking the exception the PC will stay on the same instruction. By adding a "singlestep_enabled" flag in the "struct arch_domain" (based on the

Re: [Xen-devel] RT-Xen on ARM

2017-07-04 Thread Andrii Anisov
On 03.07.17 21:42, Meng Xu wrote: As far as I know, there is no known issue for ARM as long as that version Xen runs on the ARM board. That's good. I assume you have your own workloads to run, which are periodically activated task. The workloads in [1] are independent periodic CPU-intensive

Re: [Xen-devel] [PATCH 2/2] CODING_STYLE: Forbid nested block in the hypervisor code

2017-07-04 Thread Jan Beulich
>>> On 04.07.17 at 14:12, wrote: > When removing if/for/while statements, the code should be reworked to > remove the { } and the extra indentation. Yes. > This is improving code maintainability and code readability. For the given example, yes. However, there are (rare)

[Xen-devel] [PATCH RFC] x86emul: add read-modify-write hook

2017-07-04 Thread Jan Beulich
In order to correctly emulate read-modify-write insns, especially LOCKed ones, we should not issue reads and writes separately. Use a new hook to combine both, and don't uniformly read the memory destination anymore. Instead, DstMem opcodes without Mov now need to have done so in their respective

[Xen-devel] [PATCH 1/2] CODING_STYLE: removing trailing whitespaces

2017-07-04 Thread Julien Grall
Signed-off-by: Julien Grall --- CODING_STYLE | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/CODING_STYLE b/CODING_STYLE index 4c3b53a754..6cc5b774cf 100644 --- a/CODING_STYLE +++ b/CODING_STYLE @@ -4,11 +4,11 @@ Coding Style for the Xen Hypervisor

[Xen-devel] [PATCH 2/2] CODING_STYLE: Forbid nested block in the hypervisor code

2017-07-04 Thread Julien Grall
When removing if/for/while statements, the code should be reworked to remove the { } and the extra indentation. This is improving code maintainability and code readability. Signed-off-by: Julien Grall --- This patch was triggered whilst reviewing a patch [1] on ARM

[Xen-devel] Question about "xen: Revert commits da72ff5bfcb0 and 72a9b186292d"

2017-07-04 Thread Jean-Louis Dupond
Hi All, We had some issues with BSOD's on Windows at startup when using some old Xen drivers inside Windows. Now when we upgrade to the most recent 4.9.x kernel. The issue seems to be resolved. Could it be that the following commit fixes the issue:

[Xen-devel] [ovmf baseline-only test] 71632: tolerable FAIL

2017-07-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71632 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71632/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-i386-libvirt5 libvirt-build

[Xen-devel] [PATCH] xen-blkfront: emit KOBJ_OFFLINE uevent when detaching device

2017-07-04 Thread Vincent Legout
Devices are not unmounted inside a domU after a xl block-detach. After xl block-detach, blkfront_closing() is called with state == XenbusStateConnected, it detects that the device is still in use and only switches state to XenbusStateClosing. blkfront_closing() is called a second time but returns

Re: [Xen-devel] [PATCH v2 4/4] vsmc: psci: remove 64 bit mode check

2017-07-04 Thread Julien Grall
Hi, On 07/03/2017 06:29 PM, Stefano Stabellini wrote: On Sun, 2 Jul 2017, Julien Grall wrote: Hi, On 06/30/2017 10:19 PM, Stefano Stabellini wrote: On Thu, 22 Jun 2017, Volodymyr Babchuk wrote: PSCI handling code had helper routine that checked calling convention. It does not needed

Re: [Xen-devel] [PATCH v2 1/2] tools/libxl/libxl_pci.c: Extract sysfs_dev_get_class from libxl__grant_vga_iomem_permission

2017-07-04 Thread Wei Liu
On Tue, Jul 04, 2017 at 12:30:58PM +0100, Roger Pau Monné wrote: > On Tue, Jul 04, 2017 at 12:07:30PM +0100, Wei Liu wrote: > > On Mon, Jul 03, 2017 at 03:25:52AM +0800, Xiong Zhang wrote: > > > No functional change. Just extract this function for next patch and avoid > > > code repetition. > > >

Re: [Xen-devel] [PATCH] xl console: Add interactive option

2017-07-04 Thread Wei Liu
On Mon, Jul 03, 2017 at 08:34:22AM +0200, Felix Schmoll wrote: > Added an interactive option to the 'xl console'-command that > forwards the input stream of the console to the underlying pty. > > Made corresponding changes to libxl, xl and xenconsole. > > Signed-off-by: Felix Schmoll

Re: [Xen-devel] [PATCH v2 1/2] tools/libxl/libxl_pci.c: Extract sysfs_dev_get_class from libxl__grant_vga_iomem_permission

2017-07-04 Thread Roger Pau Monné
On Tue, Jul 04, 2017 at 12:07:30PM +0100, Wei Liu wrote: > On Mon, Jul 03, 2017 at 03:25:52AM +0800, Xiong Zhang wrote: > > No functional change. Just extract this function for next patch and avoid > > code repetition. > > > > Signed-off-by: Xiong Zhang > > Acked-by:

[Xen-devel] [xen-unstable-smoke test] 111371: tolerable trouble: broken/pass - PUSHED

2017-07-04 Thread osstest service owner
flight 111371 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/111371/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13

Re: [Xen-devel] [PATCH v2 1/2] tools/libxl/libxl_pci.c: Extract sysfs_dev_get_class from libxl__grant_vga_iomem_permission

2017-07-04 Thread Wei Liu
On Mon, Jul 03, 2017 at 03:25:52AM +0800, Xiong Zhang wrote: > No functional change. Just extract this function for next patch and avoid > code repetition. > > Signed-off-by: Xiong Zhang Acked-by: Wei Liu Note to self: maybe add some blank lines

  1   2   >