[Xen-devel] [PATCH v3 0/2] Add a hvmop for setting the #VE suppress bit

2017-07-18 Thread Adrian Pop
As the code stands right now, after DomU has enabled #VE using HVMOP_altp2m_vcpu_enable_notify, all its pages have the #VE suppress bit cleared, generating #VEs for any EPT violation. There is currently no way to change the value of the #VE suppress bit for a page from a domain; it can only be

[Xen-devel] [PATCH v3 2/2] x86/altp2m: Add a hvmop for setting the suppress #VE bit

2017-07-18 Thread Adrian Pop
Introduce a new hvmop, HVMOP_altp2m_set_suppress_ve, which allows a privileged domain to change the value of the #VE suppress bit for a page. Add a libxc wrapper for invoking this hvmop. Signed-off-by: Adrian Pop Acked-by: Wei Liu --- changes in v3: -

[Xen-devel] [PATCH v3 1/2] x86/mm: Change default value for suppress #VE in set_mem_access()

2017-07-18 Thread Adrian Pop
From: Vlad Ioan Topan The default value for the "suppress #VE" bit set by set_mem_access() currently depends on whether the call is made from the same domain (the bit is set when called from another domain and cleared if called from the same domain). This patch changes

Re: [Xen-devel] [PATCH v6] x86/monitor: Notify monitor if an emulation fails.

2017-07-18 Thread Tamas K Lengyel
On Tue, Jul 18, 2017 at 3:37 AM, Petre Pircalabu wrote: > If case of a vm_event with the emulate_flags set, if the instruction > cannot be emulated, the monitor should be notified instead of directly > injecting a hw exception. > This behavior can be used to re-execute

Re: [Xen-devel] [PATCH] xen/x86: fix cpu hotplug

2017-07-18 Thread Boris Ostrovsky
On 07/05/2017 10:05 AM, Juergen Gross wrote: > Commit dc6416f1d711eb4c1726e845d653235dcaae12e1 ("xen/x86: Call > cpu_startup_entry(CPUHP_AP_ONLINE_IDLE) from xen_play_dead()") > introduced an error leading to a stack overflow of the idle task when > a cpu was brought offline/online many times: by

[Xen-devel] [PATCH XTF v2] Implement pv_read

2017-07-18 Thread Felix Schmoll
Implement reading from PV console. Making use of polling. Signed-off-by: Felix Schmoll --- common/console.c | 22 ++ include/xtf/console.h | 2 ++ 2 files changed, 24 insertions(+) diff --git a/common/console.c b/common/console.c index

Re: [Xen-devel] [PATCH] x86/evtchn: Restrict the ops usable in do_event_channel_op_compat()

2017-07-18 Thread Wei Liu
On Tue, Jul 18, 2017 at 03:23:45PM +0100, Andrew Cooper wrote: > This hypercall is unused by guests these days, but there was no prevention of > usable subops. The following ops have been restricted, as there is no > suitable structure in the evntchn_op union. > > EVTCHNOP_reset >

[Xen-devel] [PATCH v4 09/13] libxl: change disk to use generic getting list functions

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl.h | 9 +++- tools/libxl/libxl_checkpoint_device.c | 7 ++- tools/libxl/libxl_create.c| 3 +- tools/libxl/libxl_disk.c

[Xen-devel] [PATCH v4 13/13] libxl: make pci and usb setdefault function generic

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Due to changes in device framework setdefault function should have same format. Otherwise calling devicetype set_default causes segfault. Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_internal.h | 1 -

[Xen-devel] [PATCH v4 01/13] libxl: add generic function to add device

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add libxl__device_add to simple write XenStore device conifg and libxl__device_add_async to update domain configuration and write XenStore device config asynchroniously. Almost all devices have similar libxl__device__add function. This

[Xen-devel] [PATCH v4 10/13] libxl: change nic to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl.h | 9 +- tools/libxl/libxl_checkpoint_device.c | 9 +- tools/libxl/libxl_colo_save.c | 4 +- tools/libxl/libxl_dm.c

[Xen-devel] [PATCH v4 00/13] libxl: add PV display device driver interface

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Changes since V3: * libxl__device_add renamed to libxl__device_add_async and reworked to match the former design; * libxl__device_add used for devices which don't require updating domain config but simple write to Xen Store (9pfs,

[Xen-devel] [PATCH v4 06/13] libxl: change p9 to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_9pfs.c | 67 +++- tools/libxl/libxl_create.c | 2 +- tools/libxl/libxl_internal.h | 7 +

[Xen-devel] [PATCH v4 04/13] xl: add PV display device commands

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add commands: vdispl-attach, vdispl-list, vdispl-detach and domain config vdispl parser Signed-off-by: Oleksandr Grytsov --- tools/xl/Makefile | 1 + tools/xl/xl.h | 3 + tools/xl/xl_cmdtable.c |

[Xen-devel] [PATCH v4 02/13] libxl: add generic functions to get and free device list

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Add libxl__device_list and libxl__device_list_free functions to handle device list using the device framework. Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_device.c | 66

[Xen-devel] [PATCH v4 11/13] libxl: change vtpm to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl.h | 12 ++- tools/libxl/libxl_vtpm.c | 231 +-- tools/xl/xl_vtpm.c | 3 +- 3 files changed, 73

[Xen-devel] [PATCH v4 12/13] libxl: remove unneeded DEVICE_ADD macro

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_device.c | 6 ++--- tools/libxl/libxl_disk.c | 5 +++-- tools/libxl/libxl_internal.h | 52 +++-

[Xen-devel] [PATCH v4 07/13] libxl: change vkb to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_console.c | 79 tools/libxl/libxl_create.c | 5 +-- tools/libxl/libxl_dm.c | 3 +-

[Xen-devel] [PATCH v4 03/13] libxl: add vdispl device

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/Makefile | 2 +- tools/libxl/libxl.h | 24 +++ tools/libxl/libxl_create.c | 1 + tools/libxl/libxl_internal.h

[Xen-devel] [PATCH v4 05/13] docs: add PV display driver information

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- docs/man/xl.cfg.pod.5.in | 49 docs/man/xl.pod.1.in | 42 + 2 files changed, 91

[Xen-devel] [PATCH v4 08/13] libxl: change vfb to use generec add function

2017-07-18 Thread Oleksandr Grytsov
From: Oleksandr Grytsov Signed-off-by: Oleksandr Grytsov --- tools/libxl/libxl_console.c | 74 tools/libxl/libxl_create.c | 3 +- tools/libxl/libxl_dm.c | 3 +-

[Xen-devel] [PATCH] x86/evtchn: Restrict the ops usable in do_event_channel_op_compat()

2017-07-18 Thread Andrew Cooper
This hypercall is unused by guests these days, but there was no prevention of usable subops. The following ops have been restricted, as there is no suitable structure in the evntchn_op union. EVTCHNOP_reset EVTCHNOP_init_control EVTCHNOP_expand_array EVTCHNOP_set_priority Signed-off-by:

Re: [Xen-devel] [RFC v2]Proposal to allow setting up shared memory areas between VMs from xl config file

2017-07-18 Thread Zhongze Liu
Hi Julien, After our discussion during the summit, I have revised my plan, but I'm still working on it and haven't sent it to the ML yet. I'm planning to send a new version of my proposal together with the parsing code later so that I could reference the proposal in the commit message. But here

[Xen-devel] XEN on R-Car H3 starter kit

2017-07-18 Thread ajmalmalib4u
  Hi, I am using R-Car H3 hardware. ie. R-Car H3 Salvator-X. I am running Xen with Poky linux as Dom0 and DomU. Would i be able to run Xen with the same setup on R-Car H3 Starter Kit? What all should i look in a Hardware to run XEN in it?   regards, Ajeesh

Re: [Xen-devel] [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)

2017-07-18 Thread Tom Lendacky
On 7/18/2017 7:03 AM, Thomas Gleixner wrote: On Mon, 17 Jul 2017, Tom Lendacky wrote: This patch series provides support for AMD's new Secure Memory Encryption (SME) feature. SME can be used to mark individual pages of memory as encrypted through the page tables. A page of memory that is

Re: [Xen-devel] preparations for 4.8.2

2017-07-18 Thread Lars Kurth
On 18/07/2017, 14:53, "Wei Liu" wrote: >On Tue, Jul 18, 2017 at 12:21:42PM +0100, Lars Kurth wrote: >> Wei, >> I attached the list output from xsa-list-send starting from 206 >> If you look at >> >>https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-4

Re: [Xen-devel] A document for Xen release management

2017-07-18 Thread Wei Liu
On Tue, Jul 18, 2017 at 01:45:45PM +0100, Julien Grall wrote: > Hi Wei, > > Thank you for writing down the document :). > > On 17/07/17 16:09, Wei Liu wrote: > > It is agreed during the summit we should write down such document. Here > > is my attempt of doing so. > > > > We should probably

Re: [Xen-devel] preparations for 4.8.2

2017-07-18 Thread Wei Liu
On Tue, Jul 18, 2017 at 12:21:42PM +0100, Lars Kurth wrote: > Wei, > I attached the list output from xsa-list-send starting from 206 > If you look at > https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-481 > .html, you may want to start using from 213+ [$]> ./match-xsa

Re: [Xen-devel] [PATCH 2/6] xl: Add commands for hiding and unhiding pcie passthrough devices

2017-07-18 Thread Wei Liu
On Fri, Jul 07, 2017 at 10:00:01AM -0400, Konrad Rzeszutek Wilk wrote: > > > > 1. PV PCI passthrough is done via pciback, which means the physical > >device is assigned to the driver domain. All events to / from the > >guest / device are handled by the driver domain -- which includes > >

Re: [Xen-devel] [PATCH v3 04/11] libxl: add generic function to add device

2017-07-18 Thread Wei Liu
On Wed, Jul 12, 2017 at 07:13:34PM +0300, Oleksandr Grytsov wrote: > On Tue, Jul 4, 2017 at 12:41 PM, Oleksandr Grytsov wrote: > >>> >> > > I don't see exiting device ported to the new framework, why? > >>> >> > > >>> >> > Good question. I think it is a little dangerous and may

Re: [Xen-devel] [PATCH 22/25 v6] xen/arm: vpl011: Add support for vuart console in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:52PM +0530, Bhupinder Thakur wrote: > This patch finally adds the support for vuart console. It adds > two new fields in the console initialization: > > - optional > - prefer_gnttab > > optional flag tells whether the console is optional. > > prefer_gnttab tells

Re: [Xen-devel] [PATCH 21/25 v6] xen/arm: vpl011: Add support for multiple consoles in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:51PM +0530, Bhupinder Thakur wrote: > This patch adds the support for multiple consoles and introduces the iterator > functions to operate on multiple consoles. > > This patch is in preparation to support a new vuart console. > > Signed-off-by: Bhupinder Thakur

Re: [Xen-devel] [PATCH v2 2/4] arm: smccc: handle SMCs/HVCs according to SMCCC

2017-07-18 Thread Julien Grall
On 30/06/17 16:15, Julien Grall wrote: Now, looking at the documentation for ISS for SMC32 trap (D7-2271 and G6-4957 in ARM DDI 0487B.a), compare to other conditional instruction the ISS has an extra field CCKNOWNPASS (bit 19) to tell you whether CV and COND are valid. But on ARMv7, the ISS

Re: [Xen-devel] [PATCH 20/25 v6] xen/arm: vpl011: Add a new console_close_evtchn function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:50PM +0530, Bhupinder Thakur wrote: > This patch introduces a console_close_evtchn console_cleanup function. This > function > closes the console event channel. > > Signed-off-by: Bhupinder Thakur Acked-by: Wei Liu

Re: [Xen-devel] [PATCH 18/25 v6] xen/arm: vpl011: Add a new console_cleanup function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:48PM +0530, Bhupinder Thakur wrote: > This patch introduces a new console_cleanup function. This function > frees up the console resources. > > Signed-off-by: Bhupinder Thakur > --- > CC: Ian Jackson > CC: Wei

Re: [Xen-devel] [PATCH 17/25 v6] xen/arm: vpl011: Add a new handle_console_tty function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:47PM +0530, Bhupinder Thakur wrote: > This patch introduces a new handle_console_tty function. This function > performs read/write from/to console tty. > > Signed-off-by: Bhupinder Thakur Acked-by: Wei Liu

[Xen-devel] [ovmf baseline-only test] 71701: all pass

2017-07-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71701 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71701/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 5fc3889bb3c64f8cd81d7d387f829f146a1998fd baseline

Re: [Xen-devel] [PATCH 16/25 v6] xen/arm: vpl011: Add a new handle_console_ring function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:46PM +0530, Bhupinder Thakur wrote: > This patch introduces a new handle_console_ring function. This function > reads the data from the ring buffer on receiving an event. > > Signed-off-by: Bhupinder Thakur > --- > CC: Ian Jackson

Re: [Xen-devel] A document for Xen release management

2017-07-18 Thread Julien Grall
Hi Wei, Thank you for writing down the document :). On 17/07/17 16:09, Wei Liu wrote: It is agreed during the summit we should write down such document. Here is my attempt of doing so. We should probably commit something like this into xen.git so that it gets updated regularly. Comments are

[Xen-devel] [xen-unstable-smoke test] 111978: tolerable trouble: broken/pass - PUSHED

2017-07-18 Thread osstest service owner
flight 111978 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/111978/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a test-amd64-amd64-libvirt 13

[Xen-devel] [xen-unstable test] 111957: tolerable FAIL

2017-07-18 Thread osstest service owner
flight 111957 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/111957/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-rumprun-amd64 17 rumprun-demo-xenstorels/xenstorels.repeat fail in 111912 pass in 111957

[Xen-devel] [PATCH v7 11/14] arm/mem_access: Add software guest-page-table walk

2017-07-18 Thread Sergej Proskurin
The function p2m_mem_access_check_and_get_page in mem_access.c translates a gva to an ipa by means of the hardware functionality of the ARM architecture. This is implemented in the function gva_to_ipa. If mem_access is active, hardware-based gva to ipa translation might fail, as gva_to_ipa uses

[Xen-devel] [PATCH v7 12/14] arm/mem_access: Add long-descriptor based gpt

2017-07-18 Thread Sergej Proskurin
This commit adds functionality to walk the guest's page tables using the long-descriptor translation table format for both ARMv7 and ARMv8. Similar to the hardware architecture, the implementation supports different page granularities (4K, 16K, and 64K). The implementation is based on ARM DDI

[Xen-devel] [PATCH v7 10/14] arm/guest_access: Rename vgic_access_guest_memory

2017-07-18 Thread Sergej Proskurin
This commit renames the function vgic_access_guest_memory to access_guest_memory_by_ipa. As the function name suggests, the functions expects an IPA as argument. All invocations of this function have been adapted accordingly. Apart from that, we have adjusted all printk messages for cleanup and to

[Xen-devel] [PATCH v7 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Sergej Proskurin
This commit moves the function vgic_access_guest_memory to guestcopy.c and the header asm/guest_access.h. No functional changes are made. Please note that the function will be renamed in the following commit. Signed-off-by: Sergej Proskurin Acked-by: Julien Grall

[Xen-devel] [PATCH v7 00/14] arm/mem_access: Walk guest page tables in SW if mem_access is active

2017-07-18 Thread Sergej Proskurin
Hi all, The function p2m_mem_access_check_and_get_page is called from the function get_page_from_gva if mem_access is active and the hardware-aided translation of the given guest virtual address (gva) into machine address fails. That is, if the stage-2 translation tables constrain access to the

[Xen-devel] [PATCH v7 04/14] arm/lpae: Introduce lpae_is_page helper

2017-07-18 Thread Sergej Proskurin
This commit introduces a new helper that checks whether the target PTE holds a page mapping or not. This helper will be used as part of the following commits. Signed-off-by: Sergej Proskurin Reviewed-by: Julien Grall --- Cc: Stefano Stabellini

[Xen-devel] [PATCH v7 08/14] arm/mem_access: Introduce GENMASK_ULL bit operation

2017-07-18 Thread Sergej Proskurin
The current implementation of GENMASK is capable of creating bitmasks of 32-bit values on AArch32 and 64-bit values on AArch64. As we need to create masks for 64-bit values on AArch32 as well, in this commit we introduce the GENMASK_ULL bit operation. Please note that the GENMASK_ULL

[Xen-devel] [PATCH v7 13/14] arm/mem_access: Add short-descriptor based gpt

2017-07-18 Thread Sergej Proskurin
This commit adds functionality to walk the guest's page tables using the short-descriptor translation table format for both ARMv7 and ARMv8. The implementation is based on ARM DDI 0487B-a J1-6002 and ARM DDI 0406C-b B3-1506. Signed-off-by: Sergej Proskurin Acked-by:

[Xen-devel] [PATCH v7 02/14] arm/mem_access: Move PAGE_*_* macros to xen/page-defs.h

2017-07-18 Thread Sergej Proskurin
The following commits introduce a software guest page table walk software implementation that supports varying guest page size granularities. This commit moves already existing PAGE_(SHIFT|SIZE|MASK|ALIGN)_(4K|64K) and introduces corresponding defines for 16K page granularity to a common place in

[Xen-devel] [PATCH v7 01/14] arm/mem_access: Add and cleanup (TCR_|TTBCR_)* defines

2017-07-18 Thread Sergej Proskurin
This commit adds (TCR_|TTBCR_)* defines to simplify access to the respective register contents. At the same time, we adjust the macros TCR_T0SZ and TCR_TG0_* by using the newly introduced TCR_T0SZ_SHIFT and TCR_TG0_SHIFT instead of the hardcoded values. Signed-off-by: Sergej Proskurin

[Xen-devel] [PATCH v7 14/14] arm/mem_access: Walk the guest's pt in software

2017-07-18 Thread Sergej Proskurin
In this commit, we make use of the gpt walk functionality introduced in the previous commits. If mem_access is active, hardware-based gva to ipa translation might fail, as gva_to_ipa uses the guest's translation tables, access to which might be restricted by the active VTTBR. To side-step

[Xen-devel] [PATCH v7 07/14] arm/mem_access: Introduce BIT_ULL bit operation

2017-07-18 Thread Sergej Proskurin
We introduce the BIT_ULL macro to using values of unsigned long long as to enable setting bits of 64-bit registers on AArch32. In addition, this commit adds a define holding the register width of 64 bit double-word registers. This define simplifies using the associated constants in the following

[Xen-devel] [PATCH v7 06/14] arm/mem_access: Introduce GV2M_EXEC permission

2017-07-18 Thread Sergej Proskurin
We extend the current implementation by an additional permission, GV2M_EXEC, which will be used to describe execute permissions of PTE's as part of our guest translation table walk implementation. Signed-off-by: Sergej Proskurin Acked-by: Julien Grall

[Xen-devel] [PATCH v7 05/14] arm/mem_access: Add short-descriptor pte typedefs and macros

2017-07-18 Thread Sergej Proskurin
The current implementation does not provide appropriate types for short-descriptor translation table entries. As such, this commit adds new types, which simplify managing the respective translation table entries. Signed-off-by: Sergej Proskurin Acked-by: Julien Grall

[Xen-devel] [PATCH v7 03/14] arm/mem_access: Add defines supporting PTs with varying page sizes

2017-07-18 Thread Sergej Proskurin
AArch64 supports pages with different (4K, 16K, and 64K) sizes. To enable guest page table walks for various configurations, this commit extends the defines and helpers of the current implementation. Signed-off-by: Sergej Proskurin Reviewed-by: Julien Grall

Re: [Xen-devel] A document for Xen release management

2017-07-18 Thread Lars Kurth
On 17/07/2017, 16:09, "Wei Liu" wrote: >It is agreed during the summit we should write down such document. Here >is my attempt of doing so. > >We should probably commit something like this into xen.git so that it >gets updated regularly. > >Comments are welcome. Just to

Re: [Xen-devel] [PATCH v6 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Sergej Proskurin
On 07/18/2017 02:12 PM, Julien Grall wrote: > > > On 18/07/17 12:59, Sergej Proskurin wrote: >> Hi Julien, >> >> >> On 07/18/2017 12:43 PM, Julien Grall wrote: >>> >>> >>> On 18/07/17 10:49, Sergej Proskurin wrote: Hi Julien, >>> >>> Hello Sergej, >>> On 07/17/2017 05:38 PM, Julien

[Xen-devel] Notes Design Session: Making Releases Lessons Learned: Improving Our Release Process and Tooling

2017-07-18 Thread Lars Kurth
Hi all, these are my notes from http://sched.co/AjES These are a little crude and I may have missed some things or misrepresented ACTIONS for * Wei Liu * Julien Grall * Lars Kurth * Ian Jackson Feel free to correct Lars Releases Lessons learned Process issues in 4.9.0

Re: [Xen-devel] [PATCH v6 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Julien Grall
On 18/07/17 12:59, Sergej Proskurin wrote: Hi Julien, On 07/18/2017 12:43 PM, Julien Grall wrote: On 18/07/17 10:49, Sergej Proskurin wrote: Hi Julien, Hello Sergej, On 07/17/2017 05:38 PM, Julien Grall wrote: Hi Sergej, On 06/07/17 12:50, Sergej Proskurin wrote: This commit

Re: [Xen-devel] [RFC v2]Proposal to allow setting up shared memory areas between VMs from xl config file

2017-07-18 Thread Julien Grall
Hi, On 20/06/17 18:18, Zhongze Liu wrote: 1. Motivation and Description Virtual machines use grant table hypercalls to setup a share page for inter-VMs communications. These hypercalls are

Re: [Xen-devel] [PATCH v10 00/38] x86: Secure Memory Encryption (AMD)

2017-07-18 Thread Thomas Gleixner
On Mon, 17 Jul 2017, Tom Lendacky wrote: > This patch series provides support for AMD's new Secure Memory Encryption > (SME) > feature. > > SME can be used to mark individual pages of memory as encrypted through the > page tables. A page of memory that is marked encrypted will be automatically >

Re: [Xen-devel] [PATCH v6 09/14] arm/guest_access: Move vgic_access_guest_memory to guest_access.h

2017-07-18 Thread Sergej Proskurin
Hi Julien, On 07/18/2017 12:43 PM, Julien Grall wrote: > > > On 18/07/17 10:49, Sergej Proskurin wrote: >> Hi Julien, > > Hello Sergej, > >> >> On 07/17/2017 05:38 PM, Julien Grall wrote: >>> Hi Sergej, >>> >>> On 06/07/17 12:50, Sergej Proskurin wrote: This commit moves the function

Re: [Xen-devel] A document for Xen release management

2017-07-18 Thread Ian Jackson
Wei Liu writes ("A document for Xen release management"): > When you think all pending issues are fixed and Xen is ready to be released > from the last RC: Mostly LGTM. Thanks! [Items numbered in quoted text so I can refer to them.] > 1. Send out commit moratorium emails to committers@. > >

Re: [Xen-devel] [PATCH 15/25 v6] xen/arm: vpl011: Add a new console_evtchn_unmask function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:45PM +0530, Bhupinder Thakur wrote: > This patch introduces a new console_evtchn_unmask function. This function > unmasks the console event channel if it is masked for some timeout > period. > > Signed-off-by: Bhupinder Thakur > --- >

Re: [Xen-devel] [PATCH 13/25 v6] xen/arm: vpl011: Add a new add_console_evtchn_fd function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:43PM +0530, Bhupinder Thakur wrote: > This patch introduces a new add_console_evtchn_fd function. This > function adds the console event channel FD to list of polled FDs. > > Signed-off-by: Bhupinder Thakur > --- > CC: Ian Jackson

Re: [Xen-devel] [PATCH 14/25 v6] xen/arm: vpl011: Add a new add_console_tty_fd function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:44PM +0530, Bhupinder Thakur wrote: > This patch introduces a new add_console_tty_fd function. This function > adds the tty fd to the list of polled fds. > > Signed-off-by: Bhupinder Thakur > --- > CC: Ian Jackson

[Xen-devel] [distros-debian-snapshot test] 71699: regressions - trouble: blocked/broken/fail/pass

2017-07-18 Thread Platform Team regression test user
flight 71699 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71699/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-amd64-daily-netboot-pygrub 11 guest-start fail REGR. vs. 71679

Re: [Xen-devel] ARM: Adjusting guest memory size through xl mem-{set|max} fails

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:19:09PM +0200, Sergej Proskurin wrote: > Hi Julien, > > > On 07/17/2017 03:53 PM, Julien Grall wrote: > > (+Wei and Ian) > > > > Hi Sergej > > > > On 17/07/17 13:04, Sergej Proskurin wrote: > >> Hi all, > >> > >> My setup comprises an ARMv7 (Arndale, Linux kernel

[Xen-devel] [RFC PATCH v3 23/24] NUMA: Move CONFIG_NUMA to common Kconfig

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K CONFIG_NUMA is defined in xen/drivers/acpi/Kconfig. Move to common/Kconfig and enabled by default. Also, NUMA feature uses PDX for physical address to memory node mapping. Hence make HAS_PDX dependent for NUMA. Signed-off-by: Vijaya Kumar K

[Xen-devel] [RFC PATCH v3 14/24] ARM: NUMA: DT: Parse NUMA distance information

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Parse distance-matrix and fetch node distance information. Store distance information in node_distance[]. Register dt_node_distance() function pointer with the ARM numa code. This approach can be later used for ACPI. Signed-off-by: Vijaya Kumar K

[Xen-devel] [RFC PATCH v3 24/24] NUMA: Enable ACPI_NUMA config

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Add CONFIG_ACPI_NUMA to xen/drivers/acpi/Kconfig and drop CONFIG_ACPI_NUMA set in asm-x86/config.h. Signed-off-by: Vijaya Kumar K --- xen/drivers/acpi/Kconfig | 4 xen/include/asm-x86/config.h | 1 - 2 files

[Xen-devel] [RFC PATCH v3 12/24] ARM: NUMA: DT: Parse CPU NUMA information

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Parse CPU node and fetch numa-node-id information. For each node-id found, update nodemask_t mask. Refer to Documentation/devicetree/bindings/numa.txt in linux kernel. Signed-off-by: Vijaya Kumar K --- v3: - Parse cpu nodes

[Xen-devel] [RFC PATCH v3 09/24] NUMA: x86: Move common code from srat.c

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Move code from xen/arch/x86/srat.c to xen/common/numa.c so that it can be used by other archs. Apart from moving the code the following changes are done - Coding style of code moved to numa.c is changed to xen style -

[Xen-devel] [RFC PATCH v3 16/24] ARM: NUMA: Add memory NUMA support

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Implement arch_sanitize_nodes_memory() which looks at all banks in bootinfo.mem, update nodes[] with corresponding nodeid. Call numa_scan_nodes() generic function with ram start and end address, which takes care of further computing memnodeshift and

[Xen-devel] [RFC PATCH v3 21/24] ARM: NUMA: ACPI: Extract proximity from SRAT table

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Register SRAT entry handler for type ACPI_SRAT_TYPE_GICC_AFFINITY to parse SRAT table and extract proximity for all CPU IDs. Signed-off-by: Vijaya Kumar --- xen/arch/arm/acpi/boot.c | 2 +

[Xen-devel] [RFC PATCH v3 20/24] ACPI: Move arch specific SRAT parsing

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K SRAT's X2APIC_CPU_AFFINITY and CPU_AFFINITY types are not used by ARM. Hence move handling of this SRAT types to arch specific file and handle them under arch_table_parse_srat(). Signed-off-by: Vijaya Kumar K ---

[Xen-devel] [RFC PATCH v3 22/24] ARM: NUMA: Initialize ACPI NUMA

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Call ACPI NUMA initialization under CONFIG_ACPI_NUMA. Signed-off-by: Vijaya Kumar --- xen/arch/arm/numa/acpi_numa.c | 27 ++- xen/arch/arm/numa/numa.c | 15 +-- xen/common/numa.c

[Xen-devel] [RFC PATCH v3 19/24] ARM: NUMA: Extract MPIDR from MADT table

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Parse MADT table and extract MPIDR for all CPU IDs in MADT ACPI_MADT_TYPE_GENERIC_INTERRUPT entries and store in cpuid_to_hwid_map[] This mapping is used by SRAT table parsing to extract MPIDR of the CPU ID. MADT table is also parsed in

[Xen-devel] [RFC PATCH v3 15/24] ARM: NUMA: DT: Add CPU NUMA support

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K For each cpu, update cpu_to_node[] with node id from the numa-node-id DT property. Also, initialize cpu_to_node[] with node 0. Add macros to access cpu_to_node[] information. Signed-off-by: Vijaya Kumar K --- v3: - Dropped

[Xen-devel] [RFC PATCH v3 17/24] ARM: NUMA: DT: Do not expose numa info to DOM0

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Delete numa-node-id and distance map from DOM0 DT so that NUMA information is not exposed to DOM0. This helps particularly to boot Node 1 devices as if booting on Node0. However this approach has limitation where memory allocation for the devices

[Xen-devel] [RFC PATCH v3 11/24] ARM: fdt: Export and introduce new fdt functions

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Introduce new api device_tree_type_matches() to check for device type. Also export device_tree_get_u32() and device_tree_node_compatible() These functions are later used for parsing NUMA information. Signed-off-by: Vijaya Kumar K

[Xen-devel] [RFC PATCH v3 13/24] ARM: NUMA: DT: Parse memory NUMA information

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Parse memory node and fetch numa-node-id information. For each memory range, store in node_memblk_range[] along with node id. When booting in UEFI mode, UEFI passes memory information to Dom0 using EFI memory descriptor table and deletes the memory

[Xen-devel] [RFC PATCH v3 07/24] ARM: NUMA: Add existing ARM numa code under CONFIG_NUMA

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Right now CONFIG_NUMA is not enabled for ARM and existing code in asm-arm/numa.h is for !CONFIG_NUMA. Hence put this code under #ifndef CONFIG_NUMA. This help to make this changes work when CONFIG_NUMA is not enabled. Though CONFIG_NUMA is enabled

[Xen-devel] [RFC PATCH v3 18/24] ACPI: Refactor acpi SRAT and SLIT table handling code

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Move SRAT handling code which is common across architectures is moved to new file xen/drivers/acpi/srat.c from xen/arch/x86/srat.c file. New header file srat.h is introduced. Other major changes are: - Coding style of code moved is changed. - Moved

[Xen-devel] [RFC PATCH v3 01/24] NUMA: Make number of NUMA nodes configurable

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Introduce NR_NODES config option to specify number of NUMA nodes supported. By default value is set at 64 for x86 and 8 for arm. Dropped NODES_SHIFT macro. Also move NR_NODE_MEMBLKS from asm-x86/acpi.h to xen/numa.h Signed-off-by: Vijaya Kumar K

[Xen-devel] [RFC PATCH v3 00/24] ARM: Add Xen NUMA support

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K With this RFC patch series, NUMA support is added for ARM platform. Both DT and ACPI based NUMA support is added. Only Xen is made aware of NUMA platform. NUMA awareness to DOM0 is not added. As part of this series, the code under x86 architecture

[Xen-devel] [RFC PATCH v3 10/24] NUMA: Allow numa initialization with DT

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K The common code allows numa initialization only when ACPI_NUMA config is enabled. Allow initialization when NUMA config is enabled for DT. In this patch, along with acpi_numa, check for acpi_disabled is added. Signed-off-by: Vijaya Kumar K

[Xen-devel] [RFC PATCH v3 03/24] x86: NUMA: Fix datatypes and attributes

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Change u{8,32,64} to uint{8,32,64}_t, u64 to paddr_t wherever applicable. Fix attributes coding styles. Also changed - Some variables from int to unsigned int - Used pfn_to_paddr/paddr_to_pfn whereever required. - Alloc memnodemap[] of size

[Xen-devel] [RFC PATCH v3 04/24] x86: NUMA: Rename and sanitize memnode shift code

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K memnode_shift variable is changed from int to unsigned int. With this change, compute_memnode_shift() returns error value instead of returning shift value. The memnode_shift is updated inside compute_memnode_shift(). Also, following changes are made

[Xen-devel] [RFC PATCH v3 05/24] x86: NUMA: Add accessors for nodes[] and node_memblk_range[] structs

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Add accessors for nodes[] and other static variables and use those accessors. These variables are later accessed outside the file when the code made generic in later patches. However the coding style is not changed. Signed-off-by: Vijaya Kumar K

[Xen-devel] [RFC PATCH v3 08/24] NUMA: x86: Move numa code and make it generic

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Move code from xen/arch/x86/numa.c to xen/common/numa.c so that it can be used by other archs. The following changes are done: - Few generic static functions in x86/numa.c is made non-static common/numa.c - The generic contents of header file

[Xen-devel] [RFC PATCH v3 02/24] x86: NUMA: Clean up: Fix coding styles and drop unused code

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Fix coding style, trailing spaces, tabs in NUMA code. Also drop unused macros and functions. There is no functional change. Signed-off-by: Vijaya Kumar K Reviewed-by: Wei Liu --- v3: - Change commit

[Xen-devel] [RFC PATCH v3 06/24] x86: NUMA: Rename some generic functions

2017-07-18 Thread vijay . kilari
From: Vijaya Kumar K Rename some function in ACPI code as follow - Rename setup_node to acpi_setup_node - Rename bad_srat to numa_failed - Rename nodes_cover_memory to arch_sanitize_nodes_memory and changed return type to bool - Rename acpi_scan_nodes to

Re: [Xen-devel] [PATCH 12/25 v6] xen/arm: vpl011: Add a new buffer_available function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:42PM +0530, Bhupinder Thakur wrote: > This patch introduces a new buffer_available function to check if > more data is allowed to be buffered. > > Signed-off-by: Bhupinder Thakur Acked-by: Wei Liu

Re: [Xen-devel] [PATCH 11/25 v6] xen/arm: vpl011: Add a new console_init function in xenconsole

2017-07-18 Thread Wei Liu
On Mon, Jul 17, 2017 at 06:36:41PM +0530, Bhupinder Thakur wrote: > This patch introduces a new console_init function. This function > initializes the console structure. > > Signed-off-by: Bhupinder Thakur I don't think this patch compiles, because ... > --- > CC:

Re: [Xen-devel] A document for Xen release management

2017-07-18 Thread Lars Kurth
I added Jan because I think we should probably add a section for point releases, which I assume would be a subset of the steps in this document Lars I will post the notes of the design session also. I am doing the ones first that I moderated and where I took notes in handwriting and/or photos of

Re: [Xen-devel] [PATCH 04/25 v6] xen/arm: vpl011: Add support for vuart in libxl

2017-07-18 Thread Wei Liu
CC x86 maintainers On Tue, Jul 18, 2017 at 12:19:19PM +0100, Julien Grall wrote: > > > > ("arch_arm", Struct(None, [("gic_version", libxl_gic_version), > > + ("vuart", libxl_vuart_type), > > ... here it is ARM specific. I am not convinced that we should tie

Re: [Xen-devel] Pass through in Xen

2017-07-18 Thread Roger Pau Monné
On Tue, Jul 18, 2017 at 04:43:53PM +0530, ajmalmalib4u wrote: >Hi, > >I am trying to learn how Passthrough works in xen. As an initial step I >have tried to do PCI passthrough in my PC with Ubuntu 16.04 LTS (Xenial >Xerus) as Dom0 and DomU. For that I had to rebuild the kernel

Re: [Xen-devel] preparations for 4.8.2

2017-07-18 Thread Lars Kurth
Wei, I attached the list output from xsa-list-send starting from 206 If you look at https://xenproject.org/downloads/xen-archives/xen-project-48-series/xen-481 .html, you may want to start using from 213+ Lars On 17/07/2017, 12:40, "Wei Liu" wrote: >On Mon, Jul 17, 2017 at

<    1   2   3   >