[Xen-devel] [xen-unstable-smoke test] 114059: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114059 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114059/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972 Tests which

Re: [Xen-devel] [PATCH v2 12/13] fuzz/x86_emulate: Set and fuzz more CPU state

2017-10-05 Thread Jan Beulich
>>> George Dunlap 10/05/17 7:08 PM >>> >On 10/04/2017 09:28 AM, Jan Beulich wrote: > On 25.09.17 at 16:26, wrote: >>> @@ -597,6 +599,47 @@ static const struct x86_emulate_ops all_fuzzer_ops = { >>> }; >>> #undef SET >>> >>> +static void _set_fpu_state(char *fxsave, bool store) >>> +{ >>>

Re: [Xen-devel] [PATCH v2 11/13] fuzz/x86_emulate: Add --rerun option to try to track down instability

2017-10-05 Thread Jan Beulich
>>> George Dunlap 10/05/17 6:13 PM >>> >On 10/04/2017 09:27 AM, Jan Beulich wrote: > On 25.09.17 at 16:26, wrote: >>> +if ( memcmp(&state[0], &state[1], sizeof(struct fuzz_state)) ) >>> +{ >>> +int i; >> >> unsigned int (and then %u in the format strings below) > >Is there re

[Xen-devel] [qemu-mainline test] 114042: tolerable FAIL - PUSHED

2017-10-05 Thread osstest service owner
flight 114042 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/114042/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 113974 Tests which did not succee

Re: [Xen-devel] [PATCH v3 5/9] x86/vvmx: make updating shadow EPTP value more efficient

2017-10-05 Thread Nakajima, Jun
On 10/5/17, 6:13 AM, "Andrew Cooper" wrote: On 05/10/17 14:04, Sergey Dyasli wrote: > On Thu, 2017-10-05 at 03:27 -0600, Jan Beulich wrote: > On 05.10.17 at 10:18, wrote: >>> --- a/xen/arch/x86/hvm/vmx/entry.S >>> +++ b/xen/arch/x86/hvm/vmx/entry.S >>> @@ -80,7 +80,7 @

[Xen-devel] [xen-unstable-smoke test] 114056: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114056 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114056/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972 Tests which

[Xen-devel] [qemu-upstream-4.8-testing test] 114038: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114038 qemu-upstream-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/114038/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 111049 Tests

[Xen-devel] [qemu-upstream-unstable baseline-only test] 72204: regressions - trouble: blocked/broken/fail/pass

2017-10-05 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72204 qemu-upstream-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72204/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-intel 1

[Xen-devel] [linux-4.9 test] 114036: tolerable FAIL - PUSHED

2017-10-05 Thread osstest service owner
flight 114036 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/114036/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 113872 Tests which did not succeed, b

[Xen-devel] [xen-unstable-smoke test] 114054: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114054 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114054/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972 Tests which

[Xen-devel] [linux-3.18 test] 114034: tolerable FAIL - PUSHED

2017-10-05 Thread osstest service owner
flight 114034 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/114034/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 113869 Tests which did not succeed,

[Xen-devel] [qemu-upstream-4.7-testing baseline-only test] 72202: tolerable trouble: blocked/broken/fail/pass

2017-10-05 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72202 qemu-upstream-4.7-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72202/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-libvirt-xsm 1 build-check(1)

[Xen-devel] [xen-unstable-smoke test] 114053: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114053 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114053/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972 Tests which

[Xen-devel] [libvirt test] 114030: tolerable all pass - PUSHED

2017-10-05 Thread osstest service owner
flight 114030 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/114030/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 113990 test-armhf-armhf-libvirt 14 saveresto

Re: [Xen-devel] PROBLEM: Kernel BUG with raid5 soft + Xen + DRBD - invalid opcode

2017-10-05 Thread MasterPrenium
Hi Shaohua, It seems this patch fixed my issue ! Had the issue remaining in 4.13.3, after patched with the following patch, issue seems to be gone. I can't reproduce it anymore. Thanks anyway ;) From: Shaohua Li commit 3664847d95e60a9a943858b7800f8484669740fc upstream. We have a race condi

Re: [Xen-devel] [PATCH 1/3] arm/xen: don't inclide rwlock.h directly.1~B

2017-10-05 Thread Sebastian Andrzej Siewior
On 2017-10-05 12:58:32 [-0700], Stefano Stabellini wrote: > Let me know if you want this patch to go via the xen tree. Yes, please. Sebastian ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

[Xen-devel] [xen-unstable-smoke test] 114049: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114049 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114049/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972 Tests which

[Xen-devel] [qemu-upstream-unstable test] 114029: tolerable FAIL - PUSHED

2017-10-05 Thread osstest service owner
flight 114029 qemu-upstream-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/114029/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail in 114014 pass in 114029 test-armhf-ar

Re: [Xen-devel] [PATCH 11/13] x86/paravirt: Add paravirt alternatives infrastructure

2017-10-05 Thread Boris Ostrovsky
> #ifdef CONFIG_PARAVIRT > +/* > + * Paravirt alternatives are applied much earlier than normal alternatives. > + * They are only applied when running on a hypervisor. They replace some > + * native instructions with calls to pv ops. > + */ > +void __init apply_pv_alternatives(void) > +{ > +

[Xen-devel] [linux-linus test] 114027: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114027 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/114027/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win7-amd64 15 guest-saverestore.2 fail REGR. vs. 113982 Tests which did

Re: [Xen-devel] [PATCH 1/3] arm/xen: don't inclide rwlock.h directly.1~B

2017-10-05 Thread Stefano Stabellini
On Thu, 5 Oct 2017, Sebastian Andrzej Siewior wrote: > rwlock.h should not be included directly. Instead linux/splinlock.h > should be included. One thing it does is to break the RT build. > > Cc: Stefano Stabellini > Cc: xen-de...@lists.xenproject.org > Cc: linux-arm-ker...@lists.infradead.org >

[Xen-devel] [qemu-upstream-4.6-testing baseline-only test] 72200: regressions - FAIL

2017-10-05 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72200 qemu-upstream-4.6-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72200/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-midway 16 gu

[Xen-devel] [distros-debian-wheezy test] 72201: tolerable trouble: broken/pass

2017-10-05 Thread Platform Team regression test user
flight 72201 distros-debian-wheezy real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72201/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: build-arm64 2 hosts-allocate broken like 72167 build-arm64-pvops

Re: [Xen-devel] [PATCH v2 9/9] xen: Convert __page_to_mfn and __mfn_to_page to use typesafe MFN

2017-10-05 Thread Razvan Cojocaru
On 10/05/2017 08:42 PM, Julien Grall wrote: > Most of the users of page_to_mfn and mfn_to_page are either overriding > the macros to make them work with mfn_t or use mfn_x/_mfn because the > rest of the function use mfn_t. > > So make __page_to_mfn and __mfn_to_page return mfn_t by default. > > O

[Xen-devel] [PATCH for-4.10 2/5] tools/dombuilder: Remove clear_page() from xc_dom_boot.c

2017-10-05 Thread Andrew Cooper
pfn 0 is a legitimate (albeit unlikely) frame to use for translated domains, so skipping it is wrong. (This behaviour appears to exists simply to cover the fact that zero is the default value of an uninitialised field in dom.) ARM already clears the frames at the point that the pfns are allocated

[Xen-devel] [PATCH for-4.10 4/5] tools/dombuilder: Fix asymetry when setting up console and xenstore rings

2017-10-05 Thread Andrew Cooper
libxl always uses xc_dom_gnttab_init(), which internally calls xc_dom_gnttab{_hvm,}_seed() to set up the grants point at the console and xenstore rings. For HVM guests, libxl then asks Xen for the information set up previously, and calls xc_dom_gnttab_hvm_seed() a second time, which is wasteful.

[Xen-devel] [PATCH for-4.10 5/5] tools/dombuilder: Prevent failures of xc_dom_gnttab_init()

2017-10-05 Thread Andrew Cooper
Recent changes in grant table configuration have caused calls to xc_dom_gnttab_init() to fail if not proceeded with a call to xc_domain_set_gnttab_limits(). This is backwards from the point of view of 3rd party dombuilder users. Add max_{grant,maptrack}_frames parameters to struct xc_dom_image, a

[Xen-devel] [PATCH for-4.10 1/5] tools/dombuilder: Drop more PVH v1 leftovers

2017-10-05 Thread Andrew Cooper
alloc_magic_pages() is renamed to alloc_magic_pages_pv() to mirror its alloc_magic_pages_hvm() counterpart. Delete a redundant comment, introduce some newlines clarity, and remove a logically dead allocation of shared info. Signed-off-by: Andrew Cooper --- CC: Ian Jackson CC: Wei Liu CC: Julie

[Xen-devel] [PATCH for-4.10 4/5] tools/dombuilder: Fix asymmetry when setting up console and xenstore rings

2017-10-05 Thread Andrew Cooper
libxl always uses xc_dom_gnttab_init(), which internally calls xc_dom_gnttab{_hvm,}_seed() to set up the grants point at the console and xenstore rings. For HVM guests, libxl then asks Xen for the information set up previously, and calls xc_dom_gnttab_hvm_seed() a second time, which is wasteful.

[Xen-devel] [PATCH for-4.10 0/5] tools/dombuilder: Fixes and improvements to grant handling

2017-10-05 Thread Andrew Cooper
A git tree version is available: http://xenbits.xen.org/gitweb/?p=people/andrewcoop/xen.git;a=shortlog;h=refs/heads/dombuilder-gnt-v1 Andrew Cooper (5): tools/dombuilder: Drop more PVH v1 leftovers tools/dombuilder: Remove clear_page() from xc_dom_boot.c tools/dombuilder: Switch to using gf

[Xen-devel] [PATCH for-4.10 3/5] tools/dombuilder: Switch to using gfn terminology for console and xenstore rings

2017-10-05 Thread Andrew Cooper
The sole use of xc_dom_translated() and xc_dom_p2m() outside of the domain builder is for libxl_dom() to translate the console and xenstore pfns back into useful values. PV guest pfns are only interesting to the domain builder, and gfns are the address space used by all other hypercalls. Renaming

[Xen-devel] [xen-unstable-smoke test] 114047: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114047 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114047/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972 Tests which

Re: [Xen-devel] [PATCH v2 9/9] xen: Convert __page_to_mfn and __mfn_to_page to use typesafe MFN

2017-10-05 Thread Andrew Cooper
On 05/10/17 18:42, Julien Grall wrote: > @@ -1114,7 +1115,7 @@ int arch_set_info_guest( > l4_pgentry_t *l4tab; > > l4tab = > map_domain_page(_mfn(pagetable_get_pfn(v->arch.guest_table))); > -*l4tab = l4e_from_pfn(page_to_mfn(cr3_page), > +*l4tab = l4e_from_pfn(m

Re: [Xen-devel] 4.9.52: INFO: task XXX blocked for more than 300 seconds.

2017-10-05 Thread Ankur Arora
On 2017-10-05 06:20 AM, Konrad Rzeszutek Wilk wrote: On Wed, Oct 04, 2017 at 08:26:27PM +0200, Philipp Hahn wrote: Hello, Adding Ankur to this as I think he saw something similar. But in the meantime - do you see this with the latest version of Linux? with linux-4.9.52 running on Debian-Whe

Re: [Xen-devel] [PATCH v2 3/9] xen/x86: mem_sharing: Use copy_domain_page in __mem_sharing_unshare_page

2017-10-05 Thread Tamas K Lengyel
On Thu, Oct 5, 2017 at 11:42 AM, Julien Grall wrote: > The function __mem_sharing_unshare_page contains an open-code version of > copy_domain_page. Use the function to simplify a bit the code. > > At the same time replace _mfn(__page_to_mfn(...)) by page_to_mfn(...) > given that the file given alr

Re: [Xen-devel] [PATCH v2 6/9] xen/kexec, kimage: Convert kexec and kimage to use typesafe mfn_t

2017-10-05 Thread Andrew Cooper
On 05/10/17 18:42, Julien Grall wrote: > At the same time, correctly align one the prototype changed. > > Signed-off-by: Julien Grall Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 3/9] xen/x86: mem_sharing: Use copy_domain_page in __mem_sharing_unshare_page

2017-10-05 Thread Andrew Cooper
On 05/10/17 18:42, Julien Grall wrote: > The function __mem_sharing_unshare_page contains an open-code version of > copy_domain_page. Use the function to simplify a bit the code. > > At the same time replace _mfn(__page_to_mfn(...)) by page_to_mfn(...) > given that the file given already provides a

[Xen-devel] [PATCH v2 4/9] xen/x86: Use maddr_to_page and maddr_to_mfn to avoid open-coded >> PAGE_SHIFT

2017-10-05 Thread Julien Grall
The constructions _mfn(... > PAGE_SHIFT) and mfn_to_page(... >> PAGE_SHIFT) could respectively be replaced by maddr_to_mfn(...) and maddr_to_page(...). Signed-off-by: Julien Grall Reviewed-by: Andrew Cooper --- Cc: Elena Ufimtseva Cc: Jan Beulich Cc: Andrew Cooper Cc: Tim Deegan Cc: George

[Xen-devel] [PATCH v2 2/9] xen/arm32: mm: Rework is_xen_heap_page to avoid nameclash

2017-10-05 Thread Julien Grall
The arm32 version of the function is_xen_heap_page currently define a variable _mfn. This will lead to a compiler when use typesafe MFN in a folow-up patch: called object '_mfn' is not a function or function pointer Fix it by renaming the local variable _mfn to mfn_. Signed-off-by: Julien Grall

[Xen-devel] [PATCH v2 5/9] xen/kimage: Remove defined but unused variables

2017-10-05 Thread Julien Grall
In the function kimage_alloc_normal_control_page, the variables mfn and emfn are defined but not used. Remove them. Signed-off-by: Julien Grall Reviewed-by: Andrew Cooper --- Cc: Andrew Cooper Changes in v3: - Add Andrew's reviewed-by --- xen/common/kimage.c | 3 --- 1 file chan

[Xen-devel] [PATCH v2 9/9] xen: Convert __page_to_mfn and __mfn_to_page to use typesafe MFN

2017-10-05 Thread Julien Grall
Most of the users of page_to_mfn and mfn_to_page are either overriding the macros to make them work with mfn_t or use mfn_x/_mfn because the rest of the function use mfn_t. So make __page_to_mfn and __mfn_to_page return mfn_t by default. Only reasonable clean-ups are done in this patch because it

[Xen-devel] [PATCH v2 0/9] xen: Convert __page_to_mfn and __mfn_to_page to use typesafe MFN

2017-10-05 Thread Julien Grall
Hi all, Most of the users of page_to_mfn and mfn_to_page are either overriding the macros to make them work with mfn_t or use mfn_x/_mfn becaue the rest of the function use mfn_t. So I think it is time to make __page_to_mfn and __mfn_to_page using typesafe MFN. The first 8 patches will convert o

[Xen-devel] [PATCH v2 3/9] xen/x86: mem_sharing: Use copy_domain_page in __mem_sharing_unshare_page

2017-10-05 Thread Julien Grall
The function __mem_sharing_unshare_page contains an open-code version of copy_domain_page. Use the function to simplify a bit the code. At the same time replace _mfn(__page_to_mfn(...)) by page_to_mfn(...) given that the file given already provides a typesafe version of page_to_mfn. Signed-off-by

[Xen-devel] [PATCH v2 8/9] xen/tmem: Convert the file common/tmem_xen.c to use typesafe MFN

2017-10-05 Thread Julien Grall
The file common/tmem_xen.c is now converted to use typesafe. This is requiring to override the macro page_to_mfn to make it work with mfn_t. Note that all variables converted to mfn_t havem there initial value, when set, switch from 0 to INVALID_MFN. This is fine because the initial values was alw

[Xen-devel] [PATCH v2 7/9] xen/xenoprof: Convert the file to use typesafe MFN

2017-10-05 Thread Julien Grall
The file common/xenoprof.c is now converted to use typesafe. This is requiring to override the macros virt_to_mfn and mfn_to_page to make them work with mfn_t. Also, add a couple of missing newlines in the code modified. Signed-off-by: Julien Grall Reviewed-by: Andrew Cooper --- Cc: Andrew Co

[Xen-devel] [PATCH v2 1/9] xen/arm: domain_build: Clean-up insert_11_bank

2017-10-05 Thread Julien Grall
- Remove spurious () - Add missing spaces - Turn 1 << to 1UL << - Rename spfn to smfn and switch to mfn_t Signed-off-by: Julien Grall --- Cc: Stefano Stabellini Changes in v2: - Remove double space - s/spfn/smfn/ and switch to mfn_t --- xen/arch/arm/domain

[Xen-devel] [PATCH v2 6/9] xen/kexec, kimage: Convert kexec and kimage to use typesafe mfn_t

2017-10-05 Thread Julien Grall
At the same time, correctly align one the prototype changed. Signed-off-by: Julien Grall --- xen/common/kexec.c | 16 xen/common/kimage.c | 30 ++ xen/include/xen/kimage.h | 4 ++-- 3 files changed, 28 insertions(+), 22 deletions(-) diff

Re: [Xen-devel] [PATCH] MAINTAINERS: update entries to new email address.

2017-10-05 Thread Stefano Stabellini
On Thu, 5 Oct 2017, Dario Faggioli wrote: > Replace, in the 'M:' fields of the components I co-maintain > ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix > email, to which I don't have access any longer, with my > personal email. > > Signed-off-by: Dario Faggioli Acked-by: Stefano S

[Xen-devel] [xen-unstable test] 114024: tolerable FAIL

2017-10-05 Thread osstest service owner
flight 114024 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/114024/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-libvirt-xsm 6 xen-installfail pass in 114003 Tests which did not succeed, but

Re: [Xen-devel] [PATCH] Changing my email address

2017-10-05 Thread Meng Xu
Hi Dario, On Thu, Oct 5, 2017 at 10:28 AM, Dario Faggioli wrote: > > Hello, > > Soon I won't have access to dario.faggi...@citrix.com email address. It's sad to hear this. :( > > Therefore, replace it, in my entries in MAINTAINERS, with an email address > that > I actually can, and will actual

Re: [Xen-devel] [PATCH v2 12/13] fuzz/x86_emulate: Set and fuzz more CPU state

2017-10-05 Thread George Dunlap
On 10/04/2017 09:28 AM, Jan Beulich wrote: On 25.09.17 at 16:26, wrote: >> @@ -597,6 +599,47 @@ static const struct x86_emulate_ops all_fuzzer_ops = { >> }; >> #undef SET >> >> +static void _set_fpu_state(char *fxsave, bool store) >> +{ >> +if ( cpu_has_fxsr ) >> +{ >> +st

Re: [Xen-devel] [RFC v3 20/27] x86/ftrace: Adapt function tracing for PIE support

2017-10-05 Thread Thomas Garnier
On Thu, Oct 5, 2017 at 9:11 AM, Steven Rostedt wrote: > On Thu, 5 Oct 2017 09:01:14 -0700 > Thomas Garnier wrote: > >> On Thu, Oct 5, 2017 at 6:06 AM, Steven Rostedt wrote: >> > On Wed, 4 Oct 2017 14:19:56 -0700 >> > Thomas Garnier wrote: >> > >> >> When using -fPIE/PIC with function tracing,

Re: [Xen-devel] [PATCH v2 11/13] fuzz/x86_emulate: Add --rerun option to try to track down instability

2017-10-05 Thread George Dunlap
On 10/04/2017 09:27 AM, Jan Beulich wrote: On 25.09.17 at 16:26, wrote: >> --- a/tools/fuzz/x86_instruction_emulator/afl-harness.c >> +++ b/tools/fuzz/x86_instruction_emulator/afl-harness.c >> @@ -14,6 +14,7 @@ extern unsigned int fuzz_minimal_input_size(void); >> static uint8_t input[INPUT_

Re: [Xen-devel] SRIOV VF reset problems

2017-10-05 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 05 October 2017 17:02 > To: Paul Durrant > Cc: xen-devel (xen-de...@lists.xenproject.org) de...@lists.xenproject.org> > Subject: Re: [Xen-devel] SRIOV VF reset problems > > >>> On 05.10.17 at 16:00, wrote: > > I

Re: [Xen-devel] [RFC v3 20/27] x86/ftrace: Adapt function tracing for PIE support

2017-10-05 Thread Steven Rostedt
On Thu, 5 Oct 2017 09:01:14 -0700 Thomas Garnier wrote: > On Thu, Oct 5, 2017 at 6:06 AM, Steven Rostedt wrote: > > On Wed, 4 Oct 2017 14:19:56 -0700 > > Thomas Garnier wrote: > > > >> When using -fPIE/PIC with function tracing, the compiler generates a > >> call through the GOT (call *__fen

Re: [Xen-devel] SRIOV VF reset problems

2017-10-05 Thread Jan Beulich
>>> On 05.10.17 at 16:00, wrote: > I'm currently looking at a problem with a pass-through SR-IOV device where > the guest driver triggers a VF reset via a back-door interface to the PF. The > reset completes successfully but, in this scenario, it is up to the PF driver > running in dom0 to rest

Re: [Xen-devel] [RFC v3 20/27] x86/ftrace: Adapt function tracing for PIE support

2017-10-05 Thread Thomas Garnier
On Thu, Oct 5, 2017 at 6:06 AM, Steven Rostedt wrote: > On Wed, 4 Oct 2017 14:19:56 -0700 > Thomas Garnier wrote: > >> When using -fPIE/PIC with function tracing, the compiler generates a >> call through the GOT (call *__fentry__@GOTPCREL). This instruction >> takes 6 bytes instead of 5 on the u

[Xen-devel] [PATCH v3] x86/altp2m: Added xc_altp2m_set_mem_access_multi()

2017-10-05 Thread Petre Pircalabu
From: Razvan Cojocaru For the default EPT view we have xc_set_mem_access_multi(), which is able to set an array of pages to an array of access rights with a single hypercall. However, this functionality was lacking for the altp2m subsystem, which could only set page restrictions for one page at a

Re: [Xen-devel] [PATCH v2 10/13] fuzz/x86_emulate: Make input more compact

2017-10-05 Thread Jan Beulich
>>> On 05.10.17 at 17:04, wrote: > On 10/04/2017 09:26 AM, Jan Beulich wrote: > On 25.09.17 at 16:26, wrote: >>> --- a/tools/fuzz/x86_instruction_emulator/fuzz-emul.c >>> +++ b/tools/fuzz/x86_instruction_emulator/fuzz-emul.c >>> @@ -53,6 +53,15 @@ struct fuzz_state >>> }; >>> #define DATA_O

Re: [Xen-devel] DomD: passthroughing an arbitrary device

2017-10-05 Thread Julien Grall
Hi, On 04/10/17 19:10, Oleksandr Andrushchenko wrote: sorry, pressed send too fast On 10/04/2017 09:02 PM, Oleksandr Andrushchenko wrote: On 10/04/2017 08:22 PM, Julien Grall wrote: On 04/10/17 17:32, Oleksandr Andrushchenko wrote: Hi, all! Hello, We have a use-case where we want to pas

[Xen-devel] [xen-unstable-smoke test] 114044: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114044 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114044/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972 build-armhf

Re: [Xen-devel] [PATCH v4 5/5] ARM: ITS: Expose ITS in the MADT table

2017-10-05 Thread Andre Przywara
Hi Manish, On 21/09/17 14:17, mja...@caviumnetworks.com wrote: > From: Manish Jaggi > > Add gicv3_its_make_hwdom_madt to update hwdom MADT ITS information. Thanks for the rework, that looks much better now! > Signed-off-by: Manish Jaggi Reviewed-by: Andre Przywara Cheers, Andre. > --- >

Re: [Xen-devel] [PATCH v4 4/5] ARM: Introduce get_hwdom_madt_size in gic_hw_operations

2017-10-05 Thread Andre Przywara
Hi, On 21/09/17 14:17, mja...@caviumnetworks.com wrote: > From: Manish Jaggi > > estimate_acpi_efi_size needs to be updated to provide correct size of > hardware domains MADT, which now adds ITS information as well. > > Introducing gic_get_hwdom_madt_size. > > Signed-off-by: Manish Jaggi > --

Re: [Xen-devel] [PATCH v4 3/5] ARM: ITS: Deny hardware domain access to ITS

2017-10-05 Thread Andre Przywara
Hi Manish, On 21/09/17 14:17, mja...@caviumnetworks.com wrote: > From: Manish Jaggi > > This patch extends the gicv3_iomem_deny_access functionality by adding > support for ITS region as well. Add function gicv3_its_deny_access. > > Signed-off-by: Manish Jaggi Reviewed-by: Andre Przywara Th

Re: [Xen-devel] [PATCH v4 2/5] ARM: ITS: Populate host_its_list from ACPI MADT Table

2017-10-05 Thread Andre Przywara
Hi, On 04/10/17 06:29, Manish Jaggi wrote: > Hello Julien, > > On 10/3/2017 7:17 PM, Julien Grall wrote: >> Hi Manish, >> >> On 21/09/17 14:17, mja...@caviumnetworks.com wrote: >>> From: Manish Jaggi >>> >>> Added gicv3_its_acpi_init to update host_its_list from MADT table. >>> For ACPI, host_it

Re: [Xen-devel] [PATCH v2 10/13] fuzz/x86_emulate: Make input more compact

2017-10-05 Thread George Dunlap
On 10/04/2017 09:26 AM, Jan Beulich wrote: On 25.09.17 at 16:26, wrote: >> @@ -22,13 +25,17 @@ int main(int argc, char **argv) >> setbuf(stdin, NULL); >> setbuf(stdout, NULL); >> >> +opt_compact = true; > > How about giving the variable an initializer instead? Actually, if w

Re: [Xen-devel] [PATCH] MAINTAINERS: update entries to new email address.

2017-10-05 Thread Meng Xu
On Thu, Oct 5, 2017 at 10:28 AM, Dario Faggioli wrote: > Replace, in the 'M:' fields of the components I co-maintain > ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix > email, to which I don't have access any longer, with my > personal email. > > Signed-off-by: Dario Faggioli > ---

Re: [Xen-devel] [PATCH 7/7] xen: Convert __page_to_mfn and __mfn_to_page to use typesafe MFN

2017-10-05 Thread Julien Grall
Hi Andrew, On 05/10/17 00:27, Andrew Cooper wrote: On 04/10/2017 19:15, Julien Grall wrote: diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index 093ebf1a8e..0753d03aac 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -104,11 +104,11 @@ static

Re: [Xen-devel] [PATCH v7 04/11] public: xen.h: add definitions for UUID handling

2017-10-05 Thread Volodymyr Babchuk
Hi Konrad, On 05.10.17 16:03, Konrad Rzeszutek Wilk wrote: On Thu, Oct 05, 2017 at 12:00:20AM +0300, Volodymyr Babchuk wrote: Added type xen_uuid_t. This type represents UUID as an array of 16 bytes in big endian format. Added macro XEN_DEFINE_UUID that constructs UUID in the usual way: XEN

Re: [Xen-devel] [PATCH] MAINTAINERS: update entries to new email address.

2017-10-05 Thread Konrad Rzeszutek Wilk
On Thu, Oct 05, 2017 at 04:28:46PM +0200, Dario Faggioli wrote: > Replace, in the 'M:' fields of the components I co-maintain > ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix > email, to which I don't have access any longer, with my > personal email. > > Signed-off-by: Dario Faggioli

Re: [Xen-devel] [PATCH] MAINTAINERS: update entries to new email address.

2017-10-05 Thread Wei Liu
On Thu, Oct 05, 2017 at 04:28:46PM +0200, Dario Faggioli wrote: > Replace, in the 'M:' fields of the components I co-maintain > ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix > email, to which I don't have access any longer, with my > personal email. > > Signed-off-by: Dario Faggioli

[Xen-devel] [PATCH] MAINTAINERS: update entries to new email address.

2017-10-05 Thread Dario Faggioli
Replace, in the 'M:' fields of the components I co-maintain ('CPU POOLS', 'SCHEDULING' and 'RTDS SCHEDULER'), the Citrix email, to which I don't have access any longer, with my personal email. Signed-off-by: Dario Faggioli --- Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich

[Xen-devel] [PATCH] Changing my email address

2017-10-05 Thread Dario Faggioli
Hello, Soon I won't have access to dario.faggi...@citrix.com email address. Therefore, replace it, in my entries in MAINTAINERS, with an email address that I actually can, and will actually read. One thing about RTDS. Meng, which one of the following two sentences, better describes your situatio

Re: [Xen-devel] [PATCH v4 01/11] livepatch: Expand check for safe_for_reapply if livepatch has only .rodata.

2017-10-05 Thread Konrad Rzeszutek Wilk
On Thu, Oct 05, 2017 at 02:47:30PM +0100, Ross Lagerwall wrote: > On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote: > > If the livepatch has only .rodata sections then it is OK to also > > apply/revert/apply the livepatch without having to worry about the > > unforseen consequences. > > > > See

Re: [Xen-devel] ARM32 - build-issues with xen/arm: vpl011: Add a new vuart node in the xenstore

2017-10-05 Thread Wei Liu
On Thu, Oct 05, 2017 at 07:44:17PM +0530, Bhupinder Thakur wrote: > Hi Wei, > > On 5 October 2017 at 15:07, Wei Liu wrote: > > On Wed, Oct 04, 2017 at 09:58:32PM -0400, Konrad Rzeszutek Wilk wrote: > >> I get this when compiling under ARM32 (Ubuntu 15.04, > >> gcc (Ubuntu/Linaro 4.9.2-10ubuntu13)

Re: [Xen-devel] ARM32 - build-issues with xen/arm: vpl011: Add a new vuart node in the xenstore

2017-10-05 Thread Bhupinder Thakur
Hi Wei, On 5 October 2017 at 15:07, Wei Liu wrote: > On Wed, Oct 04, 2017 at 09:58:32PM -0400, Konrad Rzeszutek Wilk wrote: >> I get this when compiling under ARM32 (Ubuntu 15.04, >> gcc (Ubuntu/Linaro 4.9.2-10ubuntu13) 4.9.2): >> >> libxl_console.c: In function ‘libxl__device_vuart_add’: >> libx

Re: [Xen-devel] [PATCH 4/4] xen/ubsan: Introduce and use CONFIG_UBSAN

2017-10-05 Thread Wei Liu
On Thu, Oct 05, 2017 at 08:49:36AM -0400, Konrad Rzeszutek Wilk wrote: > > +config UBSAN > > + bool "Undefined behaviour sanitizer" > > + depends on X86 > > + ---help--- > > + Enable undefined behaviour sanitizer. > > + > > + If unsure, say N here. > > Could you perhaps expand it a b

Re: [Xen-devel] [PATCH v4 07/11] livepatch/x86/arm[32, 64]: Force .livepatch.depends section to be uint32_t aligned.

2017-10-05 Thread Ross Lagerwall
On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote: By default when using objcopy we lose the alignment when we copy it from xen-syms - with the result that alignment (on ARM32 for example) can be 1: [Nr] Name TypeAddr OffSize ES Flg Lk Inf Al .. [ 6]

Re: [Xen-devel] [PATCH v4 01/11] livepatch: Expand check for safe_for_reapply if livepatch has only .rodata.

2017-10-05 Thread Ross Lagerwall
On 10/05/2017 02:51 PM, Konrad Rzeszutek Wilk wrote: On Thu, Oct 05, 2017 at 02:47:30PM +0100, Ross Lagerwall wrote: On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote: If the livepatch has only .rodata sections then it is OK to also apply/revert/apply the livepatch without having to worry abo

Re: [Xen-devel] [PATCH v4 03/11] livepatch: Include sizes when an mismatch occurs

2017-10-05 Thread Ross Lagerwall
On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote: If the .bug.frames.X or .livepatch.funcs sizes are different than what the hypervisor expects - we fail the payload. To help in diagnosing this include the expected and the payload sizes. Also make it more natural by having "Multiples" in the

[Xen-devel] SRIOV VF reset problems

2017-10-05 Thread Paul Durrant
Hi, I'm currently looking at a problem with a pass-through SR-IOV device where the guest driver triggers a VF reset via a back-door interface to the PF. The reset completes successfully but, in this scenario, it is up to the PF driver running in dom0 to restore the VF's config space. This is do

Re: [Xen-devel] [PATCH 3/4] xen: sched: improve checking soft-affinity

2017-10-05 Thread Dario Faggioli
On Wed, 2017-10-04 at 14:23 +0100, George Dunlap wrote: > On 09/15/2017 06:35 PM, Dario Faggioli wrote: > > > > diff --git a/xen/common/sched_credit.c b/xen/common/sched_credit.c > > index 3efbfc8..35d0c98 100644 > > --- a/xen/common/sched_credit.c > > +++ b/xen/common/sched_credit.c > > @@ -410,8

Re: [Xen-devel] [PATCH v2 06/13] fuzz/x86_emulate: Rename the file containing the wrapper code

2017-10-05 Thread George Dunlap
On 10/05/2017 10:01 AM, Jan Beulich wrote: On 04.10.17 at 18:34, wrote: >> On 10/04/2017 09:23 AM, Jan Beulich wrote: >> On 25.09.17 at 16:26, wrote: --- a/tools/fuzz/x86_instruction_emulator/Makefile +++ b/tools/fuzz/x86_instruction_emulator/Makefile @@ -18,22 +18,22 @@ a

Re: [Xen-devel] [PATCH v4 01/11] livepatch: Expand check for safe_for_reapply if livepatch has only .rodata.

2017-10-05 Thread Ross Lagerwall
On 09/20/2017 11:31 PM, Konrad Rzeszutek Wilk wrote: If the livepatch has only .rodata sections then it is OK to also apply/revert/apply the livepatch without having to worry about the unforseen consequences. See commit 98b728a7b235c67e210f67f789db5d9eb38ca00c "livepatch: Disallow applying after

[Xen-devel] [xen-unstable-smoke test] 114041: regressions - FAIL

2017-10-05 Thread osstest service owner
flight 114041 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/114041/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 113972 build-armhf

Re: [Xen-devel] 4.9.52: INFO: task XXX blocked for more than 300 seconds.

2017-10-05 Thread Konrad Rzeszutek Wilk
On Wed, Oct 04, 2017 at 08:26:27PM +0200, Philipp Hahn wrote: > Hello, > Adding Ankur to this as I think he saw something similar. But in the meantime - do you see this with the latest version of Linux? > with linux-4.9.52 running on Debian-Wheezy with Xen-4.1 I observed > several stuck process

Re: [Xen-devel] [PATCH v3 5/9] x86/vvmx: make updating shadow EPTP value more efficient

2017-10-05 Thread Andrew Cooper
On 05/10/17 14:04, Sergey Dyasli wrote: > On Thu, 2017-10-05 at 03:27 -0600, Jan Beulich wrote: > On 05.10.17 at 10:18, wrote: >>> --- a/xen/arch/x86/hvm/vmx/entry.S >>> +++ b/xen/arch/x86/hvm/vmx/entry.S >>> @@ -80,7 +80,7 @@ UNLIKELY_END(realmode) >>> mov %rsp,%rdi >>> cal

Re: [Xen-devel] [PATCH v6 08/11] vpci/bars: add handlers to map the BARs

2017-10-05 Thread Jan Beulich
>>> On 05.10.17 at 14:02, wrote: > On Thu, Oct 05, 2017 at 11:55:39AM +, Jan Beulich wrote: >> >>> On 05.10.17 at 13:09, wrote: >> > On Thu, Oct 05, 2017 at 10:01:46AM +, Jan Beulich wrote: >> >> >>> On 05.10.17 at 11:20, wrote: >> >> > On Wed, Oct 04, 2017 at 08:33:33AM +, Jan Beuli

Re: [Xen-devel] [RFC v3 20/27] x86/ftrace: Adapt function tracing for PIE support

2017-10-05 Thread Steven Rostedt
On Wed, 4 Oct 2017 14:19:56 -0700 Thomas Garnier wrote: > When using -fPIE/PIC with function tracing, the compiler generates a > call through the GOT (call *__fentry__@GOTPCREL). This instruction > takes 6 bytes instead of 5 on the usual relative call. > > With this change, function tracing sup

Re: [Xen-devel] [PATCH v3 5/9] x86/vvmx: make updating shadow EPTP value more efficient

2017-10-05 Thread Sergey Dyasli
On Thu, 2017-10-05 at 03:27 -0600, Jan Beulich wrote: > > > > On 05.10.17 at 10:18, wrote: > > > > --- a/xen/arch/x86/hvm/vmx/entry.S > > +++ b/xen/arch/x86/hvm/vmx/entry.S > > @@ -80,7 +80,7 @@ UNLIKELY_END(realmode) > > mov %rsp,%rdi > > call vmx_vmenter_helper > > c

Re: [Xen-devel] [PATCH v7 04/11] public: xen.h: add definitions for UUID handling

2017-10-05 Thread Konrad Rzeszutek Wilk
On Thu, Oct 05, 2017 at 12:00:20AM +0300, Volodymyr Babchuk wrote: > Added type xen_uuid_t. This type represents UUID as an array of 16 > bytes in big endian format. > > Added macro XEN_DEFINE_UUID that constructs UUID in the usual way: > > XEN_DEFINE_UUID(0x00112233, 0x4455, 0x6677, 0x8899, >

[Xen-devel] [PATCH 1/3] arm/xen: don't inclide rwlock.h directly.

2017-10-05 Thread Sebastian Andrzej Siewior
rwlock.h should not be included directly. Instead linux/splinlock.h should be included. One thing it does is to break the RT build. Cc: Stefano Stabellini Cc: xen-de...@lists.xenproject.org Cc: linux-arm-ker...@lists.infradead.org Signed-off-by: Sebastian Andrzej Siewior --- arch/arm/xen/p2m.c

Re: [Xen-devel] [PATCH 4/4] xen/ubsan: Introduce and use CONFIG_UBSAN

2017-10-05 Thread Konrad Rzeszutek Wilk
> +config UBSAN > + bool "Undefined behaviour sanitizer" > + depends on X86 > + ---help--- > + Enable undefined behaviour sanitizer. > + > + If unsure, say N here. Could you perhaps expand it a bit? How does it sanitize it? With soap :-)? And what 'undefinded behaviour's ar

Re: [Xen-devel] [PATCH 1/4] xen/tmem: Drop unnecessary noinline attribute

2017-10-05 Thread Konrad Rzeszutek Wilk
On Tue, Oct 03, 2017 at 07:07:50PM +0100, Andrew Cooper wrote: > tmem_mempool_page_get() is only referenced by address, so isn't eligable for > inlining in the first place. > > Signed-off-by: Andrew Cooper > --- > CC: Konrad Rzeszutek Wilk Reviewed-by: Konrad Rzeszutek Wilk > > Not related t

[Xen-devel] [PATCH] xen/pt: Mark TYPE_XEN_PT_DEVICE as hybrid

2017-10-05 Thread Eduardo Habkost
xen-pt doesn't set the is_express field, but is supposed to be able to handle PCI Express devices too. Mark it as hybrid. Suggested-by: Jan Beulich Signed-off-by: Eduardo Habkost --- hw/xen/xen_pt.c | 1 + 1 file changed, 1 insertion(+) diff --git a/hw/xen/xen_pt.c b/hw/xen/xen_pt.c index 01d

Re: [Xen-devel] 4.9.52: INFO: task XXX blocked for more than 300 seconds.

2017-10-05 Thread Philipp Hahn
Hello Jan, thank you for you answer. Am 05.10.2017 um 12:12 schrieb Jan Beulich: On 04.10.17 at 20:26, wrote: >> with linux-4.9.52 running on Debian-Wheezy with Xen-4.1 I observed >> several stuck processes: Here is one (truncated) dump of the Linux >> kernel messages: >> >>> [] ? __schedu

Re: [Xen-devel] [PATCH v6 08/11] vpci/bars: add handlers to map the BARs

2017-10-05 Thread Roger Pau Monné
On Thu, Oct 05, 2017 at 11:55:39AM +, Jan Beulich wrote: > >>> On 05.10.17 at 13:09, wrote: > > On Thu, Oct 05, 2017 at 10:01:46AM +, Jan Beulich wrote: > >> >>> On 05.10.17 at 11:20, wrote: > >> > On Wed, Oct 04, 2017 at 08:33:33AM +, Jan Beulich wrote: > >> >> >>> On 19.09.17 at 17:

Re: [Xen-devel] [PATCH v6 08/11] vpci/bars: add handlers to map the BARs

2017-10-05 Thread Jan Beulich
>>> On 05.10.17 at 13:09, wrote: > On Thu, Oct 05, 2017 at 10:01:46AM +, Jan Beulich wrote: >> >>> On 05.10.17 at 11:20, wrote: >> > On Wed, Oct 04, 2017 at 08:33:33AM +, Jan Beulich wrote: >> >> >>> On 19.09.17 at 17:29, wrote: >> >> > --- a/xen/include/xen/vpci.h >> >> > +++ b/xen/incl

Re: [Xen-devel] [PATCH 23/24] libxl: dm_restrict: Support uid range user

2017-10-05 Thread Wei Liu
On Wed, Oct 04, 2017 at 04:57:29PM +0100, Ian Jackson wrote: > Signed-off-by: Ian Jackson Acked-by: Wei Liu ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 24/24] tools: xentoolcore_restrict_all: use domid_t

2017-10-05 Thread Wei Liu
On Wed, Oct 04, 2017 at 04:57:30PM +0100, Ian Jackson wrote: > This necessitates adding $(CFLAGS_xeninclude) to all the depending > libraries (which can be done via Rules.mk), so that the definition of > domid_t (in xen.h) can be found. > > Signed-off-by: Ian Jackson Acked-by: Wei Liu

  1   2   >