Re: [Xen-devel] [PATCH 0/4] ARM: ACPI: ITS: Add ITS Support for ACPI hardware domain

2017-08-10 Thread Manish Jaggi
On 8/10/2017 6:44 PM, Julien Grall wrote: On 08/10/2017 02:00 PM, Manish Jaggi wrote: HI Julien, On 8/10/2017 5:43 PM, Julien Grall wrote: On 10/08/17 13:00, Manish Jaggi wrote: Hi Julien, On 8/10/2017 4:58 PM, Julien Grall wrote: On 10/08/17 12:21, Manish Jaggi wrote: Hi Julien,

[Xen-devel] [xen-unstable test] 112561: regressions - trouble: blocked/broken/fail/pass

2017-08-10 Thread osstest service owner
flight 112561 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/112561/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xsm 6 xen-buildfail REGR. vs. 112544 test-amd64-amd64-x

[Xen-devel] [ovmf test] 112583: regressions - FAIL

2017-08-10 Thread osstest service owner
flight 112583 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112583/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm6 xen-buildfail REGR. vs. 112539 build-i386

[Xen-devel] [ovmf test] 112571: regressions - FAIL

2017-08-10 Thread osstest service owner
flight 112571 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112571/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm6 xen-buildfail REGR. vs. 112539 build-i386

[Xen-devel] [qemu-mainline test] 112557: tolerable trouble: blocked/broken/fail/pass - PUSHED

2017-08-10 Thread osstest service owner
flight 112557 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/112557/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a test-arm64-arm64-xl 1 build-ch

[Xen-devel] [xtf test] 112567: all pass - PUSHED

2017-08-10 Thread osstest service owner
flight 112567 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112567/ Perfect :-) All tests in this flight passed as required version targeted for testing: xtf 8956f82ce1321b89deda6895d58e5788d2198477 baseline version: xtf 11ae3010a30c89a6aef762

[Xen-devel] [linux-3.18 test] 112553: trouble: blocked/broken/fail/pass

2017-08-10 Thread osstest service owner
flight 112553 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/112553/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvops 3 capture-logs broken REGR. vs. 112102

[Xen-devel] [linux-linus test] 112551: regressions - trouble: blocked/broken/fail/pass

2017-08-10 Thread osstest service owner
flight 112551 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/112551/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515 test-amd64-amd64-xl

[Xen-devel] Building XenGT for Intel embedded board

2017-08-10 Thread Monisha Barooah
Hi Everyone, I am currently exploring on bringing up XenGT for an Intel embedded board. I came across this document relating to bringing up XenGT for the Sandy Bridge/Ivy Bridge/Haswell platform https://www.intel.com/content/dam/www/public/us/en/documents/guides/xgengt-for-ivi-solutions-dev-kit-g

[Xen-devel] [xen-unstable baseline-only test] 71960: regressions - trouble: blocked/broken/fail/pass

2017-08-10 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 71960 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/71960/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-examine 10 examine-serial/

Re: [Xen-devel] Renaming p9 to p9s in libxl idl

2017-08-10 Thread Jim Fehlig
On 08/08/2017 09:09 AM, Wei Liu wrote: Ian and Stefano Oleksandr discovered that the p9fs array in libxl_domain_config is name p9 instead of p9s. This causes problem for his work to rework device framework. Given that p9fs was added only during last release and the only known external toolstack

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-10 Thread Julien Grall
On 10/08/2017 21:09, Volodymyr Babchuk wrote: Hi, On 10.08.17 21:18, Julien Grall wrote: Hi, On 10/08/17 18:40, Volodymyr Babchuk wrote: On 10.08.17 19:11, Julien Grall wrote: On 10/08/17 16:33, Volodymyr Babchuk wrote: Hi Julien, On 09.08.17 13:10, Julien Grall wrote: Hi Volodymyr,

[Xen-devel] [ovmf test] 112563: regressions - FAIL

2017-08-10 Thread osstest service owner
flight 112563 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112563/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm6 xen-buildfail REGR. vs. 112539 build-i386

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-10 Thread Volodymyr Babchuk
Hi, On 10.08.17 21:18, Julien Grall wrote: Hi, On 10/08/17 18:40, Volodymyr Babchuk wrote: On 10.08.17 19:11, Julien Grall wrote: On 10/08/17 16:33, Volodymyr Babchuk wrote: Hi Julien, On 09.08.17 13:10, Julien Grall wrote: Hi Volodymyr, CC "THE REST" maintainers to get an opinion on

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-10 Thread Julien Grall
Hi, On 10/08/17 18:40, Volodymyr Babchuk wrote: On 10.08.17 19:11, Julien Grall wrote: On 10/08/17 16:33, Volodymyr Babchuk wrote: Hi Julien, On 09.08.17 13:10, Julien Grall wrote: Hi Volodymyr, CC "THE REST" maintainers to get an opinion on the public headers. On 08/08/17 21:08, Volod

Re: [Xen-devel] [PATCH v3 00/13] introduce the Xen PV Calls frontend

2017-08-10 Thread Stefano Stabellini
On Thu, 10 Aug 2017, Boris Ostrovsky wrote: > On 07/31/2017 06:57 PM, Stefano Stabellini wrote: > > Hi all, > > > > this series introduces the frontend for the newly introduced PV Calls > > procotol. > > > > PV Calls is a paravirtualized protocol that allows the implementation of > > a set of POSIX

Re: [Xen-devel] [Bug] 4.12 kernel dom0 always reboot on xen 4.9 efi

2017-08-10 Thread Konrad Rzeszutek Wilk
On Thu, Aug 10, 2017 at 11:09:20AM +, Zhang, Xiong Y wrote: > On my SKL/KBL machine, upstream 4.12 kernel dom0 couldn't boot up using > xen.efi which is xen 4.9 > > > (1) Upstream 4.11 kernel doesn't have such issue. > > (2) Upstream 4.12 kernel on my native uefi machine could boot

Re: [Xen-devel] [PATCH 00/25 v7] SBSA UART emulation support in Xen

2017-08-10 Thread Julien Grall
On 10/08/17 17:38, Wei Liu wrote: On Thu, Aug 10, 2017 at 05:11:52PM +0100, Julien Grall wrote: On 10/08/17 17:00, Wei Liu wrote: On Thu, Aug 10, 2017 at 03:26:07PM +0100, Julien Grall wrote: On 09/08/17 11:58, Bhupinder Thakur wrote: Hi Julien, Hi Bhupinder, Thanks for the testing.

Re: [Xen-devel] Xen-unstable / Qemu-upstream: QMP server: Unsupported bus. Bus doesn't have property 'acpi-pcihp-bsel' set

2017-08-10 Thread Sander Eikelenboom
On 10/08/17 18:45, Anthony PERARD wrote: > On Thu, Aug 10, 2017 at 03:00:56PM +0100, Anthony PERARD wrote: >> On Wed, Aug 09, 2017 at 06:34:43PM +0200, Sander Eikelenboom wrote: >>> L.S., >>> >>> It seems the xen qemu-upstream tree got updated from qemu upstream last >>> week. >>> Unfortunately a

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-10 Thread Volodymyr Babchuk
On 10.08.17 19:11, Julien Grall wrote: On 10/08/17 16:33, Volodymyr Babchuk wrote: Hi Julien, On 09.08.17 13:10, Julien Grall wrote: Hi Volodymyr, CC "THE REST" maintainers to get an opinion on the public headers. On 08/08/17 21:08, Volodymyr Babchuk wrote: SMCCC (SMC Call Convention) d

Re: [Xen-devel] [PATCH 50/52] libxl: add libxl_set_parameters() function

2017-08-10 Thread Juergen Gross
On 10/08/17 18:28, Wei Liu wrote: > On Wed, Aug 09, 2017 at 09:07:04AM +0200, Juergen Gross wrote: >> Add a new libxl function to set hypervisor parameters at runtime >> similar to boot time parameters via command line. >> >> Cc: Ian Jackson >> Cc: Wei Liu >> Signed-off-by: Juergen Gross >> ---

Re: [Xen-devel] [PATCH 47/52] xen: add basic support for runtime parameter changing

2017-08-10 Thread Juergen Gross
On 10/08/17 18:17, Wei Liu wrote: > On Wed, Aug 09, 2017 at 09:07:01AM +0200, Juergen Gross wrote: >> Add the needed infrastructure for runtime parameter changing similar >> to that used at boot time via cmdline. We are using the same parsing >> functions as for cmdline parsing, but with a differen

Re: [Xen-devel] [PATCH 1/3] paravirt,xen: remove xen_patch()

2017-08-10 Thread Juergen Gross
On 10/08/17 18:29, Peter Zijlstra wrote: > On Thu, Aug 10, 2017 at 06:24:53PM +0200, Peter Zijlstra wrote: >> -ENTRY(xen_irq_enable_direct) >> -FRAME_BEGIN >> -/* Unmask events */ >> -movb $0, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask >> - >> -/* >> - * Preempt here doesn'

[Xen-devel] [RFC v2 20/23] x86/pie: Add option to build the kernel as PIE for x86_64

2017-08-10 Thread Thomas Garnier
Add the CONFIG_X86_PIE option which builds the kernel as a Position Independent Executable (PIE). The kernel is currently build with the mcmodel=kernel option which forces it to stay on the top 2G of the virtual address space. With PIE, the kernel will be able to move below the -2G limit increasing

[Xen-devel] [RFC v2 15/23] x86/boot/64: Use _text in a global for PIE support

2017-08-10 Thread Thomas Garnier
By default PIE generated code create only relative references so _text points to the temporary virtual address. Instead use a global variable so the relocation is done as expected. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memo

[Xen-devel] [RFC v2 18/23] x86/relocs: Handle DYN relocations for PIE support

2017-08-10 Thread Thomas Garnier
Change the relocation tool to correctly handle DYN/PIE kernel where the relocation table does not reference symbols and percpu support is not needed. Also add support for R_X86_64_RELATIVE relocations that can be handled like a 64-bit relocation due to the usage of -Bsymbolic. Position Independent

[Xen-devel] [RFC v2 23/23] x86/kaslr: Add option to extend KASLR range from 1GB to 3GB

2017-08-10 Thread Thomas Garnier
Add a new CONFIG_RANDOMIZE_BASE_LARGE option to benefit from PIE support. It increases the KASLR range from 1GB to 3GB. The new range stars at 0x just above the EFI memory region. This option is off by default. The boot code is adapted to create the appropriate page table spanning

[Xen-devel] [RFC v2 07/23] x86: relocate_kernel - Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/kernel/relocate_kern

[Xen-devel] [RFC v2 12/23] x86/boot/64: Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Early at boot, the kernel is mapped at a temporary address while preparing the page table. To know the changes needed for the page table with KASLR, the boot code calculate the difference betwe

[Xen-devel] [RFC v2 04/23] x86: Add macro to get symbol address for PIE support

2017-08-10 Thread Thomas Garnier
Add a new _ASM_GET_PTR macro to fetch a symbol address. It will be used to replace "_ASM_MOV $, %dst" code construct that are not compatible with PIE. Signed-off-by: Thomas Garnier --- arch/x86/include/asm/asm.h | 13 + 1 file changed, 13 insertions(+) diff --git a/arch/x86/include/

[Xen-devel] [RFC v2 09/23] x86: pm-trace - Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change assembly to use the new _ASM_GET_PTR macro instead of _ASM_MOV for the assembly to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/include/asm/pm-t

[Xen-devel] [RFC v2 17/23] compiler: Option to default to hidden symbols

2017-08-10 Thread Thomas Garnier
Provide an option to default visibility to hidden except for key symbols. This option is disabled by default and will be used by x86_64 PIE support to remove errors between compilation units. Signed-off-by: Thomas Garnier --- arch/x86/boot/boot.h | 2 +- arch/x86/include/asm/setup.h

[Xen-devel] [RFC v2 21/23] x86/relocs: Add option to generate 64-bit relocations

2017-08-10 Thread Thomas Garnier
The x86 relocation tool generates a list of 32-bit signed integers. There was no need to use 64-bit integers because all addresses where above the 2G top of the memory. This change add a large-reloc option to generate 64-bit unsigned integers. It can be used when the kernel plan to go below the to

[Xen-devel] [RFC v2 19/23] x86: Support global stack cookie

2017-08-10 Thread Thomas Garnier
Add an off-by-default configuration option to use a global stack cookie instead of the default TLS. This configuration option will only be used with PIE binaries. For kernel stack cookie, the compiler uses the mcmodel=kernel to switch between the fs segment to gs segment. A PIE binary does not use

[Xen-devel] [RFC v2 22/23] x86/module: Add support for mcmodel large and PLTs

2017-08-10 Thread Thomas Garnier
With PIE support and KASLR extended range, the modules may be further away from the kernel than before breaking mcmodel=kernel expectations. Add an option to build modules with mcmodel=large. The modules generated code will make no assumptions on placement in memory. Despite this option, modules

[Xen-devel] [RFC v2 13/23] x86/power/64: Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/power/hibernate_asm_

[Xen-devel] [RFC v2 08/23] x86/entry/64: Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/entry/entry_64.S | 2

[Xen-devel] [RFC v2 11/23] x86/acpi: Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/kernel/acpi/wakeup_6

[Xen-devel] [RFC v2 14/23] x86/paravirt: Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
if PIE is enabled, switch the paravirt assembly constraints to be compatible. The %c/i constrains generate smaller code so is kept by default. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garni

[Xen-devel] [RFC v2 01/23] x86/crypto: Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier --- arch/x86/crypto/aes-x86_64-as

[Xen-devel] [RFC v2 16/23] x86/percpu: Adapt percpu for PIE support

2017-08-10 Thread Thomas Garnier
Perpcu uses a clever design where the .percu ELF section has a virtual address of zero and the relocation code avoid relocating specific symbols. It makes the code simple and easily adaptable with or without SMP support. This design is incompatible with PIE because generated code always try to acc

[Xen-devel] [RFC v2 03/23] x86: Use symbol name in jump table for PIE support

2017-08-10 Thread Thomas Garnier
Replace the %c constraint with %P. The %c is incompatible with PIE because it implies an immediate value whereas %P reference a symbol. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier ---

[Xen-devel] [RFC v2 10/23] x86/CPU: Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. Use the new _ASM_GET_PTR macro instead of the 'mov $symbol, %dst' construct to not have an absolute reference. Position Independent Executable (PIE) support will allow to extended the KASLR ran

[Xen-devel] [RFC v2 06/23] kvm: Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change the assembly code to use only relative references of symbols for the kernel to be PIE compatible. The new __ASM_GET_PTR_PRE macro is used to get the address of a symbol on both 32 and 64-bit with PIE support. Position Independent Executable (PIE) support will allow to extended the KASLR ran

[Xen-devel] [RFC v2 05/23] xen: Adapt assembly for PIE support

2017-08-10 Thread Thomas Garnier
Change the assembly code to use the new _ASM_GET_PTR macro which get a symbol reference while being PIE compatible. Modify the RELOC macro that was using an assignment generating a non-relative reference. Position Independent Executable (PIE) support will allow to extended the KASLR randomization

[Xen-devel] x86: PIE support and option to extend KASLR randomization

2017-08-10 Thread Thomas Garnier
Changes: - v2: - Add support for global stack cookie while compiler default to fs without mcmodel=kernel - Change patch 7 to correctly jump out of the identity mapping on kexec load preserve. These patches make the changes necessary to build the kernel as Position Independent Exec

[Xen-devel] [RFC v2 02/23] x86: Use symbol name on bug table for PIE support

2017-08-10 Thread Thomas Garnier
Replace the %c constraint with %P. The %c is incompatible with PIE because it implies an immediate value whereas %P reference a symbol. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier ---

[Xen-devel] [PATCH v2] xen: remove struct domain and vcpu declarations from types.h

2017-08-10 Thread Wei Liu
They don't belong there. Removing them causes build errors in several places. Add the forward declarations in those places. Signed-off-by: Wei Liu --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan Cc: Wei

Re: [Xen-devel] [PATCH v4 9/9] vpci/msix: add MSI-X handlers

2017-08-10 Thread Roger Pau Monné
On Wed, Aug 02, 2017 at 09:07:54AM -0600, Jan Beulich wrote: > >>> Roger Pau Monne 06/30/17 5:01 PM >>> > >Note that accesses to the Table Offset, Table BIR, PBA Offset and PBA > >BIR are not trapped by Xen at the moment. > > They're mandated r/o by the spec anyway. > > >@@ -113,6 +148,35 @@ st

Re: [Xen-devel] Xen-unstable / Qemu-upstream: QMP server: Unsupported bus. Bus doesn't have property 'acpi-pcihp-bsel' set

2017-08-10 Thread Anthony PERARD
On Thu, Aug 10, 2017 at 03:00:56PM +0100, Anthony PERARD wrote: > On Wed, Aug 09, 2017 at 06:34:43PM +0200, Sander Eikelenboom wrote: > > L.S., > > > > It seems the xen qemu-upstream tree got updated from qemu upstream last > > week. > > Unfortunately a change breaks pci-passthrough for HVM's: >

[Xen-devel] [xen-unstable-smoke test] 112559: tolerable trouble: broken/pass - PUSHED

2017-08-10 Thread osstest service owner
flight 112559 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112559/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64-pvops 2 hos

Re: [Xen-devel] [PATCH 00/52] Support for modifying parameters at runtime

2017-08-10 Thread Wei Liu
On Wed, Aug 09, 2017 at 09:06:14AM +0200, Juergen Gross wrote: > Currently parameters of the hypervisor (e.g. console log level) can be > set via boot command line. Instead of having to reboot the system in > case another setting is desired, being able to modify many of those > parameters at runtim

Re: [Xen-devel] [PATCH] xen: remove struct domain and vcpu declarations from types.h

2017-08-10 Thread Wei Liu
On Thu, Aug 10, 2017 at 02:24:04PM +0100, Wei Liu wrote: > They don't belong there. Removing them causes build error in compat.h. > Add a struct domain declaration there because including sched.h > doesn't work. > > Signed-off-by: Wei Liu Unfortunately this version is broken on ARM. I will send

Re: [Xen-devel] [PATCH 00/25 v7] SBSA UART emulation support in Xen

2017-08-10 Thread Wei Liu
On Thu, Aug 10, 2017 at 05:11:52PM +0100, Julien Grall wrote: > > > On 10/08/17 17:00, Wei Liu wrote: > > On Thu, Aug 10, 2017 at 03:26:07PM +0100, Julien Grall wrote: > > > > > > > > > On 09/08/17 11:58, Bhupinder Thakur wrote: > > > > Hi Julien, > > > > > > Hi Bhupinder, > > > > > > > Thank

Re: [Xen-devel] [PATCH 52/52] xen: make some console related parameters settable at runtime

2017-08-10 Thread Wei Liu
On Wed, Aug 09, 2017 at 09:07:06AM +0200, Juergen Gross wrote: > Support modifying conswitch, console_timestamps, loglvl and > guest_loglvl at runtime. > > Cc: Andrew Cooper > Cc: George Dunlap > Cc: Ian Jackson > Cc: Jan Beulich > Cc: Konrad Rzeszutek Wilk > Cc: Stefano Stabellini > Cc: Tim

[Xen-devel] [ovmf test] 112558: regressions - FAIL

2017-08-10 Thread osstest service owner
flight 112558 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112558/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm6 xen-buildfail REGR. vs. 112539 build-i386

Re: [Xen-devel] [PATCH 51/52] xl: add new xl command set-parameters

2017-08-10 Thread Wei Liu
On Wed, Aug 09, 2017 at 09:07:05AM +0200, Juergen Gross wrote: > Add a new xl command "set-parameters" to set hypervisor parameters at > runtime similar to boot time parameters via command line. > > Cc: Ian Jackson > Cc: Wei Liu > Signed-off-by: Juergen Gross Acked-by: Wei Liu __

Re: [Xen-devel] [PATCH 1/3] paravirt,xen: remove xen_patch()

2017-08-10 Thread Josh Poimboeuf
On Thu, Aug 10, 2017 at 02:52:52PM +0200, Juergen Gross wrote: > Xen's paravirt patch function xen_patch() does some special casing for > irq_ops functions to apply relocations when those functions can be > patched inline instead of calls. > > Unfortunately none of the special case function replac

Re: [Xen-devel] [PATCH 1/3] paravirt,xen: remove xen_patch()

2017-08-10 Thread Peter Zijlstra
On Thu, Aug 10, 2017 at 06:24:53PM +0200, Peter Zijlstra wrote: > -ENTRY(xen_irq_enable_direct) > - FRAME_BEGIN > - /* Unmask events */ > - movb $0, PER_CPU_VAR(xen_vcpu_info) + XEN_vcpu_info_mask > - > - /* > - * Preempt here doesn't matter because that will deal with any > -

Re: [Xen-devel] [PATCH 50/52] libxl: add libxl_set_parameters() function

2017-08-10 Thread Wei Liu
On Wed, Aug 09, 2017 at 09:07:04AM +0200, Juergen Gross wrote: > Add a new libxl function to set hypervisor parameters at runtime > similar to boot time parameters via command line. > > Cc: Ian Jackson > Cc: Wei Liu > Signed-off-by: Juergen Gross > --- > tools/libxl/libxl.c | 14 ++

Re: [Xen-devel] [RFC PATCH v2 03/22] ARM: vGIC: move gic_raise_inflight_irq() into vgic_vcpu_inject_irq()

2017-08-10 Thread Julien Grall
Hi Andre, On 21/07/17 20:59, Andre Przywara wrote: Currently there is a gic_raise_inflight_irq(), which serves the very special purpose of handling a newly injected interrupt while an older one is still handled. This has only one user, in vgic_vcpu_inject_irq(). Now with the introduction of the

Re: [Xen-devel] [PATCH 49/52] libxc: add function to set hypervisor parameters

2017-08-10 Thread Wei Liu
On Wed, Aug 09, 2017 at 09:07:03AM +0200, Juergen Gross wrote: > Add a new libxc function to set hypervisor parameters at runtime > similar to boot time parameters via command line. > > Cc: Ian Jackson > Cc: Wei Liu > Signed-off-by: Juergen Gross Acked-by: Wei Liu ___

Re: [Xen-devel] [PATCH 1/3] paravirt,xen: remove xen_patch()

2017-08-10 Thread Peter Zijlstra
On Thu, Aug 10, 2017 at 02:52:52PM +0200, Juergen Gross wrote: > Xen's paravirt patch function xen_patch() does some special casing for > irq_ops functions to apply relocations when those functions can be > patched inline instead of calls. > > Unfortunately none of the special case function replac

[Xen-devel] [xtf test] 112552: all pass - PUSHED

2017-08-10 Thread osstest service owner
flight 112552 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112552/ Perfect :-) All tests in this flight passed as required version targeted for testing: xtf 11ae3010a30c89a6aef762dd03727a5b49e9d8d8 baseline version: xtf 0e04400b8575048ed0b10e

Re: [Xen-devel] [PATCH 47/52] xen: add basic support for runtime parameter changing

2017-08-10 Thread Wei Liu
On Wed, Aug 09, 2017 at 09:07:01AM +0200, Juergen Gross wrote: > Add the needed infrastructure for runtime parameter changing similar > to that used at boot time via cmdline. We are using the same parsing > functions as for cmdline parsing, but with a different array of > parameter definitions. >

Re: [Xen-devel] [PATCH 00/25 v7] SBSA UART emulation support in Xen

2017-08-10 Thread Julien Grall
On 10/08/17 17:00, Wei Liu wrote: On Thu, Aug 10, 2017 at 03:26:07PM +0100, Julien Grall wrote: On 09/08/17 11:58, Bhupinder Thakur wrote: Hi Julien, Hi Bhupinder, Thanks for the testing. On 8 August 2017 at 21:29, Julien Grall wrote: Hi Bhupinder, I gave another and I have a couple

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-10 Thread Julien Grall
On 10/08/17 16:33, Volodymyr Babchuk wrote: Hi Julien, On 09.08.17 13:10, Julien Grall wrote: Hi Volodymyr, CC "THE REST" maintainers to get an opinion on the public headers. On 08/08/17 21:08, Volodymyr Babchuk wrote: SMCCC (SMC Call Convention) describes how to handle both HVCs and SMCs.

Re: [Xen-devel] [PATCH 46/52] xen: carve out a generic parsing function from _cmdline_parse()

2017-08-10 Thread Wei Liu
On Wed, Aug 09, 2017 at 09:07:00AM +0200, Juergen Gross wrote: > In order to support generic parameter parsing carve out the parser from > _cmdline_parse(). As this generic function might be called after boot > remove the __init annotations from all called sub-functions. > > Cc: Andrew Cooper > C

Re: [Xen-devel] [PATCH 00/25 v7] SBSA UART emulation support in Xen

2017-08-10 Thread Wei Liu
On Thu, Aug 10, 2017 at 03:26:07PM +0100, Julien Grall wrote: > > > On 09/08/17 11:58, Bhupinder Thakur wrote: > > Hi Julien, > > Hi Bhupinder, > > > Thanks for the testing. > > > > On 8 August 2017 at 21:29, Julien Grall wrote: > > > Hi Bhupinder, > > > > > > I gave another and I have a cou

[Xen-devel] [xen-unstable test] 112544: tolerable trouble: blocked/broken/fail/pass - PUSHED

2017-08-10 Thread osstest service owner
flight 112544 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/112544/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a test-arm64-arm64-xl 1 build-che

Re: [Xen-devel] [PATCH 00/25 v7] SBSA UART emulation support in Xen

2017-08-10 Thread Wei Liu
On Thu, Aug 10, 2017 at 03:31:57PM +0100, Julien Grall wrote: > Hi, > > On 10/08/17 14:01, Wei Liu wrote: > > On Thu, Aug 10, 2017 at 01:40:07PM +0100, Julien Grall wrote: > > > Hi Wei, > > > > > > On 10/08/17 12:40, Wei Liu wrote: > > > > On Thu, Aug 10, 2017 at 01:29:04PM +0530, Bhupinder Thaku

Re: [Xen-devel] [RFC PATCH v2 01/22] ARM: vGIC: introduce and initialize pending_irq lock

2017-08-10 Thread Julien Grall
Hi, On 21/07/17 20:59, Andre Przywara wrote: Currently we protect the pending_irq structure with the corresponding VGIC VCPU lock. There are problems in certain corner cases (for instance if an IRQ is migrating), so let's introduce a per-IRQ lock, which will protect the consistency of this struc

Re: [Xen-devel] [PATCH 4/7] arm: smccc: handle SMCs according to SMCCC

2017-08-10 Thread Volodymyr Babchuk
Hi Julien, On 09.08.17 13:10, Julien Grall wrote: Hi Volodymyr, CC "THE REST" maintainers to get an opinion on the public headers. On 08/08/17 21:08, Volodymyr Babchuk wrote: SMCCC (SMC Call Convention) describes how to handle both HVCs and SMCs. SMCCC states that both HVC and SMC are valid c

Re: [Xen-devel] [PATCH 3/3] x86/vsmp: remove vsmp paravirt support

2017-08-10 Thread Juergen Gross
On 10/08/17 17:28, Shai Fultheim (s...@scalemp.com) wrote: > NACK. This is needed and used by thousands of installations. Okay, thanks for reacting so fast. Will drop the patch. Juergen > > > > Shai Fultheim | M +1 (408) 480-1612 | E s

Re: [Xen-devel] [PATCH 3/3] x86/vsmp: remove vsmp paravirt support

2017-08-10 Thread Shai Fultheim (s...@scalemp.com)
NACK. This is needed and used by thousands of installations. Shai Fultheim | M +1 (408) 480-1612 | E s...@scalemp.com This email message and any attachments to it are ScaleMP confidential information. -Original Message- From: In

Re: [Xen-devel] [RFC PATCH v2 01/22] ARM: vGIC: introduce and initialize pending_irq lock

2017-08-10 Thread Julien Grall
Hi Andre, On 21/07/17 20:59, Andre Przywara wrote: Currently we protect the pending_irq structure with the corresponding VGIC VCPU lock. There are problems in certain corner cases (for instance if an IRQ is migrating), so let's introduce a per-IRQ lock, which will protect the consistency of this

Re: [Xen-devel] [RFC PATCH v1 2/7] iommu/arm: ipmmu-vmsa: Add Xen changes for main driver

2017-08-10 Thread Julien Grall
Hi, On 10/08/17 15:27, Oleksandr Tyshchenko wrote: On Tue, Aug 8, 2017 at 2:34 PM, Julien Grall wrote: On 26/07/17 16:09, Oleksandr Tyshchenko wrote: @@ -355,6 +557,10 @@ static struct hw_register *root_pgtable[IPMMU_CTX_MAX] = { static bool ipmmu_is_root(struct ipmmu_vmsa_device *mmu) { +

Re: [Xen-devel] [PATCH v3 00/13] introduce the Xen PV Calls frontend

2017-08-10 Thread Boris Ostrovsky
On 07/31/2017 06:57 PM, Stefano Stabellini wrote: > Hi all, > > this series introduces the frontend for the newly introduced PV Calls > procotol. > > PV Calls is a paravirtualized protocol that allows the implementation of > a set of POSIX functions in a different domain. The PV Calls frontend > se

[Xen-devel] [xen-unstable-smoke test] 112554: tolerable trouble: broken/pass - PUSHED

2017-08-10 Thread osstest service owner
flight 112554 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/112554/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64-pvops 2 hos

Re: [Xen-devel] [PATCH 2/4] xen/flask: Switch to using bool

2017-08-10 Thread Daniel De Graaf
On 06/28/2017 07:16 AM, Andrew Cooper wrote: Signed-off-by: Andrew Cooper Acked-by: Daniel De Graaf ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 00/25 v7] SBSA UART emulation support in Xen

2017-08-10 Thread Julien Grall
Hi, On 10/08/17 14:01, Wei Liu wrote: On Thu, Aug 10, 2017 at 01:40:07PM +0100, Julien Grall wrote: Hi Wei, On 10/08/17 12:40, Wei Liu wrote: On Thu, Aug 10, 2017 at 01:29:04PM +0530, Bhupinder Thakur wrote: Hi Wei, On 9 August 2017 at 16:33, Wei Liu wrote: On Wed, Aug 09, 2017 at 04:28:1

Re: [Xen-devel] [RFC PATCH v1 2/7] iommu/arm: ipmmu-vmsa: Add Xen changes for main driver

2017-08-10 Thread Oleksandr Tyshchenko
Hi, Julien On Tue, Aug 8, 2017 at 2:34 PM, Julien Grall wrote: > Hi, > > On 26/07/17 16:09, Oleksandr Tyshchenko wrote: >> >> From: Oleksandr Tyshchenko >> >> Modify the Linux IPMMU driver to be functional inside Xen. >> All devices within a single Xen domain must use the same >> IOMMU context n

Re: [Xen-devel] [PATCH 00/25 v7] SBSA UART emulation support in Xen

2017-08-10 Thread Julien Grall
On 09/08/17 11:58, Bhupinder Thakur wrote: Hi Julien, Hi Bhupinder, Thanks for the testing. On 8 August 2017 at 21:29, Julien Grall wrote: Hi Bhupinder, I gave another and I have a couple of comments. Booting Linux with earlycon enabled take quite a while. I can see the characters comi

[Xen-devel] [ovmf test] 112547: regressions - FAIL

2017-08-10 Thread osstest service owner
flight 112547 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/112547/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm6 xen-buildfail REGR. vs. 112539 build-i386

[Xen-devel] [qemu-mainline test] 112543: regressions - trouble: blocked/broken/fail/pass

2017-08-10 Thread osstest service owner
flight 112543 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/112543/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs. 112456 Tests which

Re: [Xen-devel] [PATCH] xsm/flask: Fix build following "xsm: correct AVC lookups for two sysctls"

2017-08-10 Thread Andrew Cooper
On 10/08/17 15:09, Daniel De Graaf wrote: > On 08/10/2017 09:17 AM, Andrew Cooper wrote: >> avc_current_has_perm() takes 4 arguments, not 3. Spotted by a Travis >> randconfig run which actually turned XSM on. >> >> Signed-off-by: Andrew Cooper > > Whoops, looks like I sent the non-build-tested pa

Re: [Xen-devel] [PATCH] xsm/flask: Fix build following "xsm: correct AVC lookups for two sysctls"

2017-08-10 Thread Daniel De Graaf
On 08/10/2017 09:17 AM, Andrew Cooper wrote: avc_current_has_perm() takes 4 arguments, not 3. Spotted by a Travis randconfig run which actually turned XSM on. Signed-off-by: Andrew Cooper Whoops, looks like I sent the non-build-tested patch by accident. Thanks for catching this! Acked-by: D

Re: [Xen-devel] Xen-unstable / Qemu-upstream: QMP server: Unsupported bus. Bus doesn't have property 'acpi-pcihp-bsel' set

2017-08-10 Thread Anthony PERARD
On Wed, Aug 09, 2017 at 06:34:43PM +0200, Sander Eikelenboom wrote: > L.S., > > It seems the xen qemu-upstream tree got updated from qemu upstream last week. > Unfortunately a change breaks pci-passthrough for HVM's: > libxl: error: libxl_qmp.c:287:qmp_handle_error_response: Domain > 20:rece

Re: [Xen-devel] [PATCH 5/5] xen: RCU: avoid busy waiting until the end of grace period.

2017-08-10 Thread Dario Faggioli
On Wed, 2017-08-09 at 19:34 +0200, Dario Faggioli wrote: > On Mon, 2017-08-07 at 02:54 -0600, Jan Beulich wrote: > > > > > Dario Faggioli 07/27/17 10:01 AM > > > +/* > > > + * Timer for making sure the CPU where a callback is queued does > > > + * periodically poke rcu_pedning(), so that it will i

[Xen-devel] Xen Grant table frames for granting access permissions

2017-08-10 Thread Waseem, Amna
Hello All, I am struggling with fixing the allocation of pages to some known physical pages used for mapping and granting access between guests. I want to fix the allocation of pages i.e. their frame numbers to be be mapped to fixed physical pages. I only want to do this for pages shared betwee

[Xen-devel] Xen Grant table frames for granting access permissions

2017-08-10 Thread Waseem, Amna
Hello All, I am struggling with fixing the allocation of pages to some known physical pages used for mapping and granting access between guests. I want to fix the allocation of pages i.e. their frame numbers to be be mapped to fixed physical pages. I only want to do this for pages shared betwee

Re: [Xen-devel] [PATCH] libxc: correct error message in xc_sr_common.c

2017-08-10 Thread Wei Liu
On Thu, Aug 10, 2017 at 01:24:27PM +0200, Juergen Gross wrote: > When the record length for sending the p2m frames in a migration > stream is too large, the issued error message is not very helpful: > > xc: Record (0x0003, x86 PV P2M frames) length 0x8 exceeds max > (0x80): Internal er

Re: [Xen-devel] [PATCH 39/52] xen: check parameter validity when parsing command line

2017-08-10 Thread Wei Liu
On Thu, Aug 10, 2017 at 03:24:05PM +0200, Juergen Gross wrote: > On 10/08/17 15:02, Wei Liu wrote: > > On Wed, Aug 09, 2017 at 09:06:53AM +0200, Juergen Gross wrote: > >> Where possible check validity of parameters in _cmdline_parse() and > >> issue a warning message in case of an error detected. >

Re: [Xen-devel] [Bug] 4.12 kernel dom0 always reboot on xen 4.9 efi

2017-08-10 Thread Jan Beulich
>>> On 10.08.17 at 13:09, wrote: > On my SKL/KBL machine, upstream 4.12 kernel dom0 couldn't boot up using > xen.efi which is xen 4.9 > > > (1) Upstream 4.11 kernel doesn't have such issue. > > (2) Upstream 4.12 kernel on my native uefi machine could boot up. > > After some debug, I

Re: [Xen-devel] [PATCH 39/52] xen: check parameter validity when parsing command line

2017-08-10 Thread Juergen Gross
On 10/08/17 15:32, Jan Beulich wrote: On 10.08.17 at 15:24, wrote: >> @@ -176,7 +200,8 @@ int __init parse_bool(const char *s) >> !strcmp("on", s) || >> !strcmp("true", s) || >> !strcmp("enable", s) || >> - !strcmp("1", s) ) >> + !strcmp("1", s) |

Re: [Xen-devel] [PATCH] xen: remove struct domain and vcpu declarations from types.h

2017-08-10 Thread Jan Beulich
>>> On 10.08.17 at 15:24, wrote: > They don't belong there. Removing them causes build error in compat.h. > Add a struct domain declaration there because including sched.h > doesn't work. > > Signed-off-by: Wei Liu Acked-by: Jan Beulich ___ Xen-de

Re: [Xen-devel] [PATCH 39/52] xen: check parameter validity when parsing command line

2017-08-10 Thread Jan Beulich
>>> On 10.08.17 at 15:24, wrote: > @@ -176,7 +200,8 @@ int __init parse_bool(const char *s) > !strcmp("on", s) || > !strcmp("true", s) || > !strcmp("enable", s) || > - !strcmp("1", s) ) > + !strcmp("1", s) || > + !strcmp("", s) ) But not strcm

[Xen-devel] [PATCH] xen: remove struct domain and vcpu declarations from types.h

2017-08-10 Thread Wei Liu
They don't belong there. Removing them causes build error in compat.h. Add a struct domain declaration there because including sched.h doesn't work. Signed-off-by: Wei Liu --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini

Re: [Xen-devel] [PATCH 39/52] xen: check parameter validity when parsing command line

2017-08-10 Thread Juergen Gross
On 10/08/17 15:02, Wei Liu wrote: > On Wed, Aug 09, 2017 at 09:06:53AM +0200, Juergen Gross wrote: >> Where possible check validity of parameters in _cmdline_parse() and >> issue a warning message in case of an error detected. >> >> Cc: Andrew Cooper >> Cc: George Dunlap >> Cc: Ian Jackson >> Cc

Re: [Xen-devel] [PATCH] xsm/flask: Fix build following "xsm: correct AVC lookups for two sysctls"

2017-08-10 Thread Andrew Cooper
On 10/08/17 14:17, Andrew Cooper wrote: > avc_current_has_perm() takes 4 arguments, not 3. Spotted by a Travis > randconfig run which actually turned XSM on. Sorry - I intended to add this link to the commit message. ~Andrew https://travis-ci.org/xen-project/xen/jobs/263063220 > > Signed-off-b

  1   2   >