Re: [Xen-devel] [PATCH v15 04/11] x86/hvm/ioreq: defer mapping gfns until they are actually requsted

2017-12-14 Thread Chao Gao
On Thu, Dec 14, 2017 at 05:41:37PM +, Paul Durrant wrote: >A subsequent patch will introduce a new scheme to allow an emulator to >map ioreq server pages directly from Xen rather than the guest P2M. > >This patch lays the groundwork for that change by deferring mapping of >gfns until their valu

[Xen-devel] [xen-unstable-smoke test] 117173: regressions - trouble: blocked/broken/fail/pass

2017-12-14 Thread osstest service owner
flight 117173 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/117173/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-xsm broken build-armhf 6 xen

Re: [Xen-devel] [RFC Patch v4 2/8] ioreq: bump the number of IOREQ page to 4 pages

2017-12-14 Thread Chao Gao
On Thu, Dec 14, 2017 at 02:50:17PM +, Paul Durrant wrote: >> -Original Message- >> > >> > Hmm. That looks like it is because the ioreq server pages are not owned by >> > the correct domain. The Xen patch series underwent some changes later in >> > review and I did not re-test my QEMU pa

[Xen-devel] [xen-4.10-testing test] 117130: tolerable FAIL - PUSHED

2017-12-14 Thread osstest service owner
flight 117130 xen-4.10-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/117130/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-pvhv2-intel 12 guest-start fail never pass test-amd64-amd64-libvirt-xsm 13

[Xen-devel] [GIT PULL] xen: fixes for 4.15-rc4

2017-12-14 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.15-rc4-tag xen: fixes for 4.15-rc4 It contains two minor fixes for running as Xen dom0: - when built as 32 bit kernel on large machines the Xen LAPIC emulation should report a rat

[Xen-devel] [xen-unstable-smoke test] 117169: trouble: broken/pass

2017-12-14 Thread osstest service owner
flight 117169 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/117169/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-xsm broken Tests which di

[Xen-devel] [xen-4.9-testing test] 117129: regressions - FAIL

2017-12-14 Thread osstest service owner
flight 117129 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/117129/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-ws16-amd64 14 guest-localmigrate fail REGR. vs. 116619 test-amd64-i

[Xen-devel] [PATCH v4 24/43] misc: remove old i386 dependency

2017-12-14 Thread Philippe Mathieu-Daudé
Signed-off-by: Philippe Mathieu-Daudé Reviewed-by: Thomas Huth Reviewed-by: Anthony PERARD --- hw/audio/pcspk.c| 1 - hw/i386/xen/xen_platform.c | 1 - hw/isa/vt82c686.c | 1 - hw/misc/ivshmem.c | 1 - hw/misc/sga.c

[Xen-devel] [PATCH v4 13/43] misc: remove duplicated includes

2017-12-14 Thread Philippe Mathieu-Daudé
exec: housekeeping (funny since 02d0e095031) applied using ./scripts/clean-includes Signed-off-by: Philippe Mathieu-Daudé Reviewed-by: Peter Maydell Acked-by: Cornelia Huck Reviewed-by: Anthony PERARD --- accel/tcg/translate-all.c | 1 - exec.c | 3 --- h

[Xen-devel] XSA machine readable feeds

2017-12-14 Thread Doug Goldstein
Hello all, Looking to see if there is interest from anyone in having machine readable feeds for the XSA content (e.g. JSON). I mentioned it on IRC but figured I should post this on the ML to get interest and see if anyone has strong feelings about a format. I am currently converting the HTML index

[Xen-devel] Memory usage on Aarch64

2017-12-14 Thread Michael.rosswood
Hello, I'm trying to understand how Xen and each domain use RAM on Aarch64 systems. My understanding is that during Xen startup, Xen will copy itself to upper physical memory, and continue to run from there, correct? Is there any information on how the heap is handled here compared to Xen on ARM

[Xen-devel] [xen-unstable-smoke test] 117166: trouble: broken/pass

2017-12-14 Thread osstest service owner
flight 117166 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/117166/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-xsm broken Tests which di

[Xen-devel] [xen-unstable test] 117122: FAIL

2017-12-14 Thread osstest service owner
flight 117122 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/117122/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win10-i386 broken in 117010 test-amd6

[Xen-devel] [PULL 5/6] xenfb: activate input handlers for raw pointer devices

2017-12-14 Thread Stefano Stabellini
From: Owen Smith If the frontend requests raw pointers, the input handlers must be activated to have the input events delivered to the xenfb backend. Without activation, the input events are delivered to handlers registered earlier, which would be the emulated USB tablet or emulated PS/2 mouse. H

[Xen-devel] [PULL 6/6] xen/pt: Set is_express to avoid out-of-bounds write

2017-12-14 Thread Stefano Stabellini
From: Simon Gaiser The passed-through device might be an express device. In this case the old code allocated a too small emulated config space in pci_config_alloc() since pci_config_size() returned the size for a non-express device. This leads to an out-of-bound write in xen_pt_config_reg_init(),

[Xen-devel] [PULL 0/6] xen-20171214-tag

2017-12-14 Thread Stefano Stabellini
The following changes since commit 0a0dc59d27527b78a195c2d838d28b7b49e5a639: Update version for v2.11.0 release (2017-12-13 14:31:09 +) are available in the git repository at: git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xen-20171214-tag for you to fetch changes up to

[Xen-devel] [PULL 4/6] xenfb: Add [feature|request]-raw-pointer

2017-12-14 Thread Stefano Stabellini
From: Owen Smith Writes "feature-raw-pointer" during init to indicate the backend can pass raw unscaled values for absolute axes to the frontend. Frontends set "request-raw-pointer" to indicate the backend should not attempt to scale absolute values to console size. "request-raw-pointer" is only

[Xen-devel] [PULL 2/6] ui: generate qcode to linux mappings

2017-12-14 Thread Stefano Stabellini
From: Owen Smith Use keycodedb to generate a qcode to linux mapping Signed-off-by: Owen Smith Reviewed-by: Gerd Hoffmann Signed-off-by: Stefano Stabellini --- Makefile | 1 + include/ui/input.h | 3 +++ ui/input-keymap.c | 1 + 3 files changed, 5 insertions(+) diff --git a/Makefi

[Xen-devel] [PULL 3/6] xenfb: Use Input Handlers directly

2017-12-14 Thread Stefano Stabellini
From: Owen Smith Avoid the unneccessary calls through the input-legacy.c file by using the qemu_input_handler_*() calls directly. This did require reworking the event and sync handlers to use the reverse mapping from qcode to linux using qemu_input_qcode_to_linux(). Removes the scancode2linux map

[Xen-devel] [PULL 1/6] xen-disk: use an IOThread per instance

2017-12-14 Thread Stefano Stabellini
From: Paul Durrant This patch allocates an IOThread object for each xen_disk instance and sets the AIO context appropriately on connect. This allows processing of I/O to proceed in parallel. The patch also adds tracepoints into xen_disk to make it possible to follow the state transtions of an in

Re: [Xen-devel] [PATCH V3 1/2] Drivers/PCI: Export pcie_has_flr() interface

2017-12-14 Thread Bjorn Helgaas
On Thu, Dec 14, 2017 at 04:52:06AM -0800, Christoph Hellwig wrote: > On Wed, Dec 13, 2017 at 03:24:21PM -0600, Bjorn Helgaas wrote: > > Prior to a60a2b73ba69, we had > > > > int pcie_flr(struct pci_dev *dev, int probe); > > > > like all the other reset methods. AFAICT, the addition of > > pcie

[Xen-devel] [xen-unstable-smoke test] 117162: trouble: broken/pass

2017-12-14 Thread osstest service owner
flight 117162 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/117162/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-xsm broken Tests which di

[Xen-devel] [PATCH v2] kexec-tools: Perform run-time linking of libxenctrl.so

2017-12-14 Thread Eric DeVolder
When kexec is utilized in a Xen environment, it has an explicit run-time dependency on libxenctrl.so. This dependency occurs during the configure stage and when building kexec-tools. When kexec is utilized in a non-Xen environment (either bare metal or KVM), the configure and build of kexec-tools

[Xen-devel] [linux-4.1 baseline-only test] 72798: trouble: blocked/broken

2017-12-14 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72798 linux-4.1 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72798/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64

Re: [Xen-devel] [PATCH V1 1/1] Xen/libxl: Perform PCI reset using 'reset' SysFS attribute

2017-12-14 Thread Håkon Alstadheim
Den 14. des. 2017 21:22, skrev Govinda Tatti: > In which case, xl needs to be backwards-compatible with kernels that don't have your new feature: it will have to check for %s/reset, and if it's not there, then try %/do_flr. >>> I think this fix was planned more than a year back an

[Xen-devel] [xen-unstable-smoke test] 117157: trouble: broken/pass

2017-12-14 Thread osstest service owner
flight 117157 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/117157/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-xsm broken Tests which di

Re: [Xen-devel] [PATCH V1 1/1] Xen/libxl: Perform PCI reset using 'reset' SysFS attribute

2017-12-14 Thread Govinda Tatti
In which case, xl needs to be backwards-compatible with kernels that don't have your new feature: it will have to check for %s/reset, and if it's not there, then try %/do_flr. I think this fix was planned more than a year back and even we pushed libxl fix ("do_flr" SysFSattribute) but linux ker

[Xen-devel] [linux-4.9 test] 117119: tolerable FAIL - PUSHED

2017-12-14 Thread osstest service owner
flight 117119 linux-4.9 real [real] http://logs.test-lab.xenproject.org/osstest/logs/117119/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop fail like 117011 test-amd64-i386-xl-qemuu-win7-amd64 17

[Xen-devel] [xen-4.5-testing test] 117121: regressions - FAIL

2017-12-14 Thread osstest service owner
flight 117121 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/117121/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs. 116658 Tests whi

[Xen-devel] [xen-unstable-smoke test] 117152: trouble: broken/pass

2017-12-14 Thread osstest service owner
flight 117152 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/117152/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-xsm broken Tests which di

[Xen-devel] [PATCH v15 11/11] tools/libxenctrl: use new xenforeignmemory API to seed grant table

2017-12-14 Thread Paul Durrant
A previous patch added support for priv-mapping guest resources directly (rather than having to foreign-map, which requires P2M modification for HVM guests). This patch makes use of the new API to seed the guest grant table unless the underlying infrastructure (i.e. privcmd) doesn't support it, in

[Xen-devel] [PATCH v15 10/11] common: add a new mappable resource type: XENMEM_resource_grant_table

2017-12-14 Thread Paul Durrant
This patch allows grant table frames to be mapped using the XENMEM_acquire_resource memory op. NOTE: This patch expands the on-stack mfn_list array in acquire_resource() but it is still small enough to remain on-stack. Signed-off-by: Paul Durrant Reviewed-by: Jan Beulich --- Cc: Andrew Co

[Xen-devel] [PATCH v15 02/11] x86/hvm/ioreq: simplify code and use consistent naming

2017-12-14 Thread Paul Durrant
This patch re-works much of the ioreq server initialization and teardown code: - The hvm_map/unmap_ioreq_gfn() functions are expanded to call through to hvm_alloc/free_ioreq_gfn() rather than expecting them to be called separately by outer functions. - Several functions now test the validity o

[Xen-devel] [PATCH v15 06/11] x86/hvm/ioreq: add a new mappable resource type...

2017-12-14 Thread Paul Durrant
... XENMEM_resource_ioreq_server This patch adds support for a new resource type that can be mapped using the XENMEM_acquire_resource memory op. If an emulator makes use of this resource type then, instead of mapping gfns, the IOREQ server will allocate pages from the heap. These pages will never

[Xen-devel] [PATCH v15 04/11] x86/hvm/ioreq: defer mapping gfns until they are actually requsted

2017-12-14 Thread Paul Durrant
A subsequent patch will introduce a new scheme to allow an emulator to map ioreq server pages directly from Xen rather than the guest P2M. This patch lays the groundwork for that change by deferring mapping of gfns until their values are requested by an emulator. To that end, the pad field of the

[Xen-devel] [PATCH v15 08/11] tools/libxenforeignmemory: add support for resource mapping

2017-12-14 Thread Paul Durrant
A previous patch introduced a new HYPERVISOR_memory_op to acquire guest resources for direct priv-mapping. This patch adds new functionality into libxenforeignmemory to make use of a new privcmd ioctl [1] that uses the new memory op to make such resources available via mmap(2). [1] http://xenbit

[Xen-devel] [PATCH v15 03/11] x86/hvm/ioreq: use gfn_t in struct hvm_ioreq_page

2017-12-14 Thread Paul Durrant
This patch adjusts the ioreq server code to use type-safe gfn_t values where possible. No functional change. Signed-off-by: Paul Durrant Reviewed-by: Roger Pau Monné Reviewed-by: Wei Liu Acked-by: Jan Beulich --- Cc: Andrew Cooper --- xen/arch/x86/hvm/ioreq.c | 44 +++

[Xen-devel] [PATCH v15 01/11] x86/hvm/ioreq: maintain an array of ioreq servers rather than a list

2017-12-14 Thread Paul Durrant
A subsequent patch will remove the current implicit limitation on creation of ioreq servers which is due to the allocation of gfns for the ioreq structures and buffered ioreq ring. It will therefore be necessary to introduce an explicit limit and, since this limit should be small, it simplifies th

[Xen-devel] [PATCH v15 09/11] tools/libxenforeignmemory: reduce xenforeignmemory_restrict code footprint

2017-12-14 Thread Paul Durrant
By using a static inline stub in private.h for OS where this functionality is not implemented, the various duplicate stubs in the OS-specific source modules can be avoided. Signed-off-by: Paul Durrant Reviewed-by: Roger Pau Monné Acked-by: Wei Liu --- Cc: Ian Jackson v4: - Removed extraneous

[Xen-devel] [PATCH v15 05/11] x86/mm: add HYPERVISOR_memory_op to acquire guest resources

2017-12-14 Thread Paul Durrant
Certain memory resources associated with a guest are not necessarily present in the guest P2M. This patch adds the boilerplate for new memory op to allow such a resource to be priv-mapped directly, by either a PV or HVM tools domain. NOTE: Whilst the new op is not intrinsicly specific to the x86

[Xen-devel] [PATCH v15 07/11] x86/mm: add an extra command to HYPERVISOR_mmu_update...

2017-12-14 Thread Paul Durrant
...to allow the calling domain to prevent translation of specified l1e value. Despite what the comment in public/xen.h might imply, specifying a command value of MMU_NORMAL_PT_UPDATE will not simply update an l1e with the specified value. Instead, mod_l1_entry() tests whether foreign_dom has PG_tr

[Xen-devel] [PATCH v15 00/11] x86: guest resource mapping

2017-12-14 Thread Paul Durrant
This series introduces support for direct mapping of guest resources. The resources are: - IOREQ server pages - Grant tables v15: - Correct page ownership of ioreq pages v14: - Responded to more comments from Jan. v13: - Responded to more comments from Jan and Julien. - Build-tested using

[Xen-devel] [distros-debian-wheezy test] 72780: trouble: blocked/broken

2017-12-14 Thread Platform Team regression test user
flight 72780 distros-debian-wheezy real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72780/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvopsbroken build-i38

Re: [Xen-devel] [OSSTEST PATCH 11/11] production-config: Update jessie amd64 kernel for NUMA bugfix

2017-12-14 Thread Ian Jackson
Ian Jackson writes ("[OSSTEST PATCH 11/11] production-config: Update jessie amd64 kernel for NUMA bugfix"): > Bump TftpDiVersion_jessie. This installer was generated by me today, > with the git branch including the di_special_kernel series, using this > rune: > > > OSSTEST_SPECIALKERNELDEB_jes

Re: [Xen-devel] [xen-unstable-smoke test] 117145: trouble: broken/pass

2017-12-14 Thread Ian Jackson
osstest service owner writes ("[xen-unstable-smoke test] 117145: trouble: broken/pass"): > flight 117145 xen-unstable-smoke real [real] > http://logs.test-lab.xenproject.org/osstest/logs/117145/ > > Failures and problems with tests :-( > > Tests which did not succeed and are blocking, > includin

[Xen-devel] [linux-4.1 test] 117118: tolerable FAIL - PUSHED

2017-12-14 Thread osstest service owner
flight 117118 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/117118/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemut-win7-amd64 17 guest-stop fail like 116145 test-armhf-armhf-libvirt-xsm 14 saveres

[Xen-devel] [OSSTEST PATCH 2/2] smoke tests: Fix job reuse globs in cr-daily-branch

2017-12-14 Thread Ian Jackson
A symptom that the old patterns lack !build-arm64-xsm, so the xsm job might be reused. The overall cause is that it contained a (partial) list of architectures. Instead, we observe that: * The things we want to avoid reusing are Xen and libvirt (which builds against Xen. * Non-Xen builds are

[Xen-devel] [OSSTEST PATCH 1/2] smoke tests: Build arm64 with XSM, instead of without

2017-12-14 Thread Ian Jackson
The smoke flight contains test-arm64-arm64-xl-xsm so it should contain build-arm64-xsm (and not contain build-arm64). I have checked the results with OSSTEST_CONFIG=standalone-config-example eatmydata ./standalone-generate-dump-flight-runvars and looking at the diff shows precisely the expected

[Xen-devel] [OSSTEST PATCH 11/11] production-config: Update jessie amd64 kernel for NUMA bugfix

2017-12-14 Thread Ian Jackson
Bump TftpDiVersion_jessie. This installer was generated by me today, with the git branch including the di_special_kernel series, using this rune: OSSTEST_SPECIALKERNELDEB_jessie_amd64=$PWD/linux-image-3.16.0-4-amd64_3.16.51-3~a.test_amd64.deb ./mg-debian-installer-update-all The file linux-im

[Xen-devel] [OSSTEST PATCH 09/11] mg-debian-installer-update: Introduce $specialkernel

2017-12-14 Thread Ian Jackson
* In the first half of the backports kernel processing, set the new variable specialkernel to the string "backports". (This token occurs in the output .deb and kernel name, and is also referenced by hostflags of the form need-kernel-deb--backports.) * Break out the second half of the ba

[Xen-devel] [OSSTEST PATCH 08/11] di_special_kernel: Use in preseed_create

2017-12-14 Thread Ian Jackson
This abolishes yet another open-coding of need-kernel-deb-* handling. Again, there is little functional change. A significant change is that now if the special kernel deb does not exist, we do not fail. Signed-off-by: Ian Jackson --- Osstest/Debian.pm | 10 -- 1 file changed, 4 inserti

[Xen-devel] [OSSTEST PATCH 01/11] Debian: Factor out di_special_kernel from ts-host-install

2017-12-14 Thread Ian Jackson
No functional change. Signed-off-by: Ian Jackson --- Osstest/Debian.pm | 31 +++ ts-host-install | 29 + 2 files changed, 36 insertions(+), 24 deletions(-) diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm index 845027a..ba39ad2 100644

[Xen-devel] [OSSTEST PATCH 07/11] di_special_kernel: Provide $tp; Regularise $kernel, $cpio

2017-12-14 Thread Ian Jackson
Make both of these paths relative to $ho->{Tftp}{Path}. Previously $kernel was relative to that, but $cpio contained it. Adjust all callers, so no functional change. Signed-off-by: Ian Jackson --- Osstest/Debian.pm | 28 ts-host-install | 8 2 files cha

[Xen-devel] [OSSTEST PATCH 05/11] di_installer_path: Use in ts-host-install

2017-12-14 Thread Ian Jackson
No significant functional change. We now honour cfg_tftp_di_version if the $ho doesn't have the information. Signed-off-by: Ian Jackson --- ts-host-install | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ts-host-install b/ts-host-install index 520983f..a5cf93b 100755 --- a/t

[Xen-devel] [OSSTEST PATCH 02/11] di_special_kernel: Pass $kp to $fn

2017-12-14 Thread Ian Jackson
Adjust the one current caller. No functional change Signed-off-by: Ian Jackson --- Osstest/Debian.pm | 4 ++-- ts-host-install | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm index ba39ad2..6a1babf 100644 --- a/Osstest/Debian.pm +++

[Xen-devel] [OSSTEST PATCH 10/11] mg-debian-installer-update: Honour OSSTEST_SPECIALKERNELDEB__

2017-12-14 Thread Ian Jackson
This variable can be set to the absolute pathname of a kernel .deb to use. It will be used only for hosts for which the corresponding hostflag "need-kernel-deb--special" is set. There is not currently any facility for more than one special kernel for each architecture. As with backports kernels,

[Xen-devel] [OSSTEST PATCH 03/11] di_special_kernel: Replace open-coding in ts-host-install

2017-12-14 Thread Ian Jackson
The effect is simply to reuse the loop in di_special_kernel. The extra tests etc. to compute $k and $c in di_special_kernel are of no import here, and are harmless. We have already called di_special_kernel so if it was going to fail due to this extra computation, it would do so earlier. No overa

[Xen-devel] [OSSTEST PATCH 06/11] di_special_kernel: Use di_installer_path

2017-12-14 Thread Ian Jackson
This avoids the caller having to supply $d_i. This is good because there is a site we want to call this from which uses that name for a different value! No functional change. Signed-off-by: Ian Jackson --- Osstest/Debian.pm | 5 +++-- ts-host-install | 4 ++-- 2 files changed, 5 insertions(+

[Xen-devel] [OSSTEST PATCH 04/11] di_installer_path: Break out of preseed_create

2017-12-14 Thread Ian Jackson
No functional change. Signed-off-by: Ian Jackson --- Osstest/Debian.pm | 16 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm index 6a1babf..7664194 100644 --- a/Osstest/Debian.pm +++ b/Osstest/Debian.pm @@ -34,7 +34,7 @@ BEGIN

[Xen-devel] Tree is open again

2017-12-14 Thread Juergen Gross
Committers, as 4.10 has been released, feel free to commit patches again. Juergen ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel

[Xen-devel] [xen-unstable-smoke test] 117145: trouble: broken/pass

2017-12-14 Thread osstest service owner
flight 117145 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/117145/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-xsm broken Tests which di

Re: [Xen-devel] [RFC Patch v4 2/8] ioreq: bump the number of IOREQ page to 4 pages

2017-12-14 Thread Paul Durrant
> -Original Message- > > > > Hmm. That looks like it is because the ioreq server pages are not owned by > > the correct domain. The Xen patch series underwent some changes later in > > review and I did not re-test my QEMU patch after that so I wonder if > > mapping IOREQ pages has simply be

Re: [Xen-devel] [PATCH] x86/domctl: Avoid redundant zeroing in XEN_DOMCTL_get_vcpu_msrs

2017-12-14 Thread Jan Beulich
>>> On 13.12.17 at 11:58, wrote: > Zero the msr structure once at initialisation time, and avoid re-zeroing the > reserved field every time the structure is used. > > Signed-off-by: Andrew Cooper Acked-by: Jan Beulich ___ Xen-devel mailing list Xe

Re: [Xen-devel] [PATCH v2 2/2] x86/vmx: Drop enum handler_return

2017-12-14 Thread Jan Beulich
>>> On 13.12.17 at 11:50, wrote: > @@ -3158,24 +3153,23 @@ static int vmx_msr_write_intercept(unsigned int msr, > uint64_t msr_content) > > switch ( long_mode_do_msr_write(msr, msr_content) ) > { > -case HNDL_unhandled: > -if ( (vmx_write_guest_msr(

Re: [Xen-devel] [PATCH v2 1/2] x86/vmx: Don't use hvm_inject_hw_exception() in long_mode_do_msr_write()

2017-12-14 Thread Jan Beulich
>>> On 13.12.17 at 11:50, wrote: > Since c/s 49de10f3c1718 "x86/hvm: Don't raise #GP behind the emulators back > for MSR accesses", returning X86EMUL_EXCEPTION has pushed the exception > generation to the top of the call tree. > > Using hvm_inject_hw_exception() and returning X86EMUL_EXCEPTION ca

Re: [Xen-devel] [PATCH] x86/efer: Make {read, write}_efer() into inline helpers

2017-12-14 Thread Jan Beulich
>>> On 13.12.17 at 11:36, wrote: > There is no need for the overhead of a call to a separate translation unit. Indeed, the more that the per-CPU variable wasn't even static. > While moving the implementation, update them to use uint64_t over u64 > > Signed-off-by: Andrew Cooper Acked-by: Jan

[Xen-devel] [xen-4.6-testing baseline-only test] 72775: trouble: blocked/broken

2017-12-14 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72775 xen-4.6-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72775/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64

Re: [Xen-devel] [PATCH 1/2] x86: consider effective protection attributes in W+X check

2017-12-14 Thread Juergen Gross
On 14/12/17 15:15, Jan Beulich wrote: On 14.12.17 at 15:04, wrote: >> On 12/12/17 11:31, Jan Beulich wrote: >>> @@ -335,42 +346,45 @@ static inline bool kasan_page_table(stru >>> >>> #if PTRS_PER_PMD > 1 >>> >>> -static void walk_pmd_level(struct seq_file *m, struct pg_state *st, pud_t

Re: [Xen-devel] [PATCH 1/2] x86: consider effective protection attributes in W+X check

2017-12-14 Thread Thomas Gleixner
On Thu, 14 Dec 2017, Jan Beulich wrote: > >>> On 14.12.17 at 15:04, wrote: > > On 12/12/17 11:31, Jan Beulich wrote: > >> @@ -335,42 +346,45 @@ static inline bool kasan_page_table(stru > >> > >> #if PTRS_PER_PMD > 1 > >> > >> -static void walk_pmd_level(struct seq_file *m, struct pg_state *st

Re: [Xen-devel] [PATCH 1/2] x86: consider effective protection attributes in W+X check

2017-12-14 Thread Jan Beulich
>>> On 14.12.17 at 15:04, wrote: > On 12/12/17 11:31, Jan Beulich wrote: >> @@ -335,42 +346,45 @@ static inline bool kasan_page_table(stru >> >> #if PTRS_PER_PMD > 1 >> >> -static void walk_pmd_level(struct seq_file *m, struct pg_state *st, pud_t >> addr, unsigned long P) >> +static void wal

[Xen-devel] [PATCH] libxl: add libxl__is_driver_domain function

2017-12-14 Thread Oleksandr Grytsov
From: Oleksandr Grytsov libxl__is_driver_domain determines the driver domain by presence of libxl entry in the domain xen store. Use this function on device destroy to properly manage cleanup in case backends are located on domain with non zero id. Signed-off-by: Oleksandr Grytsov --- tools/li

[Xen-devel] [PATCH] libxl: add libxl__is_driver_domain function

2017-12-14 Thread Oleksandr Grytsov
From: Oleksandr Grytsov We have following arm-based setup: - Dom0 with xen and xen tools; - Dom1 with device backends (but it is not the driver domain); - Dom2 with device frontend; On Dom2 destroying we have timeout error. Because xl treats our Dom1 as driver domain and waits for backend path

Re: [Xen-devel] [PATCH 1/2] x86: consider effective protection attributes in W+X check

2017-12-14 Thread Thomas Gleixner
On Thu, 14 Dec 2017, Juergen Gross wrote: > On 12/12/17 11:31, Jan Beulich wrote: > > for (i = 0; i < PTRS_PER_PMD; i++) { > > st->current_address = normalize_addr(P + i * PMD_LEVEL_MULT); > > if (!pmd_none(*start)) { > > + prot = pmd_flags(*start); > >

Re: [Xen-devel] Xen release cycle revisited

2017-12-14 Thread Jan Beulich
>>> On 14.12.17 at 08:56, wrote: > 4. Should we try harder to negotiate embargo dates of security issues to >match the (targeted) release dates? Personally I don't think embargo dates should be made match release dates; if anything, the other way around. Holding back security issues is just b

Re: [Xen-devel] Xen release cycle revisited

2017-12-14 Thread Jan Beulich
>>> On 14.12.17 at 12:38, wrote: > Next try: > > 2. Should we have released 4.10 without those late security patches, >resulting in the need for 4.10.1 at once? We don't make point releases just for security issues on other branches - why would we do so right after a .0 release? We really ha

Re: [Xen-devel] [PATCH 1/2] x86: consider effective protection attributes in W+X check

2017-12-14 Thread Juergen Gross
On 12/12/17 11:31, Jan Beulich wrote: > Using just the leaf page table entry flags would cause a false warning > in case _PAGE_RW is clear or _PAGE_NX is set in a higher level entry. > Hand through both the current entry's flags as well as the accumulated > effective value (the latter as pgprotval_

Re: [Xen-devel] [PATCH v3 1/4] x86emul: Support GFNI insns

2017-12-14 Thread Yang Zhong
On Mon, Nov 27, 2017 at 08:42:29AM -0700, Jan Beulich wrote: > >>> On 10.11.17 at 11:36, wrote: > > Signed-off-by: Yang Zhong > > First and foremost - did you try out your own patch? There not being > any (minimal) test added makes this at least questionable. > > > --- a/xen/arch/x86/x86_emulat

Re: [Xen-devel] [PATCH v14 07/11] x86/mm: add an extra command to HYPERVISOR_mmu_update...

2017-12-14 Thread Jan Beulich
>>> On 13.12.17 at 18:03, wrote: > Looking through the code, the only one thing that bothers me is the > page_set_owner() done in shadow_enable() for the page used for HVM guest > vcpus that have paging disabled. AFAICT that page would become mappable by an > emulating domain with MMU_PT_UPDATE

Re: [Xen-devel] [PATCH v3 2/4] x86emul: Support vpclmulqdq

2017-12-14 Thread Yang Zhong
On Mon, Nov 27, 2017 at 08:53:24AM -0700, Jan Beulich wrote: > >>> On 10.11.17 at 11:36, wrote: > > @@ -7672,7 +7673,12 @@ x86_emulate( > > host_and_vcpu_must_have(pclmulqdq); > > if ( vex.opcx == vex_none ) > > goto simd_0f3a_common; > > -generate_exception_

Re: [Xen-devel] [PATCH v14 06/11] x86/hvm/ioreq: add a new mappable resource type...

2017-12-14 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 14 December 2017 13:46 > To: Paul Durrant > Cc: Julien Grall ; Andrew Cooper > ; George Dunlap > ; Ian Jackson ; Wei Liu > ; Stefano Stabellini ; xen- > de...@lists.xenproject.org; Tim (Xen.org) > Subject: Re: [PA

Re: [Xen-devel] [PATCH v14 06/11] x86/hvm/ioreq: add a new mappable resource type...

2017-12-14 Thread Jan Beulich
>>> On 14.12.17 at 10:51, wrote: >> From: Paul Durrant [mailto:paul.durr...@citrix.com] >> Sent: 28 November 2017 15:09 >> +static int hvm_alloc_ioreq_mfn(struct hvm_ioreq_server *s, bool buf) >> +{ >> +struct domain *currd = current->domain; >> +struct hvm_ioreq_page *iorp = buf ? &s->buf

Re: [Xen-devel] [PATCH v3 3/4] x86emul: Support vaes insns

2017-12-14 Thread Yang Zhong
On Mon, Nov 27, 2017 at 09:30:15AM -0700, Jan Beulich wrote: > >>> On 10.11.17 at 11:36, wrote: > > --- a/xen/arch/x86/x86_emulate/x86_emulate.c > > +++ b/xen/arch/x86/x86_emulate/x86_emulate.c > > @@ -1626,6 +1626,7 @@ static bool vcpu_has( > > #define vcpu_has_clwb()vcpu_has( 7,

Re: [Xen-devel] Xen release cycle revisited

2017-12-14 Thread Juergen Gross
On 14/12/17 13:43, Julien Grall wrote: > > > On 14/12/17 11:38, Juergen Gross wrote: >> On 14/12/17 12:28, Julien Grall wrote: >>> >>> >>> On 14/12/17 07:56, Juergen Gross wrote: Hi all, >>> >>> Hi Juergen, >>> >>> I would recommend to CC committers on that thread, so your thread don't >>> g

[Xen-devel] [xen-unstable-smoke test] 117139: trouble: broken/pass

2017-12-14 Thread osstest service owner
flight 117139 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/117139/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl-xsm broken Tests which di

[Xen-devel] [xen-4.8-testing test] 117097: trouble: blocked/broken/pass

2017-12-14 Thread osstest service owner
flight 117097 xen-4.8-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/117097/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 broken build-amd64-prev

Re: [Xen-devel] [PATCH V3 1/2] Drivers/PCI: Export pcie_has_flr() interface

2017-12-14 Thread Christoph Hellwig
On Wed, Dec 13, 2017 at 03:24:21PM -0600, Bjorn Helgaas wrote: > Prior to a60a2b73ba69, we had > > int pcie_flr(struct pci_dev *dev, int probe); > > like all the other reset methods. AFAICT, the addition of > pcie_has_flr() was to optimize the path slightly because when drivers > call pcie_flr

Re: [Xen-devel] Xen release cycle revisited

2017-12-14 Thread Julien Grall
On 14/12/17 11:38, Juergen Gross wrote: On 14/12/17 12:28, Julien Grall wrote: On 14/12/17 07:56, Juergen Gross wrote: Hi all, Hi Juergen, I would recommend to CC committers on that thread, so your thread don't get lost in the xen-devel meanders :). with 4.10 more or less finished it i

[Xen-devel] [linux-linus test] 117092: trouble: blocked/broken/pass

2017-12-14 Thread osstest service owner
flight 117092 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/117092/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 broken build-i386

[Xen-devel] Xen 4.10.0 is released

2017-12-14 Thread Julien Grall
Dear community members, I'm pleased to announce that Xen 4.10.0 is released. Please find the tarball and its signature at: https://xenproject.org/downloads/xen-archives/xen-project-410-series/xen-project-4100.html You can also check out the tag in xen.git: https://xenbits.xen.org/git-http

[Xen-devel] [xen-4.7-testing test] 117115: regressions - FAIL

2017-12-14 Thread osstest service owner
flight 117115 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/117115/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-1 49 xtf/test-hvm64-lbr-tsx-vmentry fail REGR. vs. 116665 test-amd64-i386

Re: [Xen-devel] [PATCH 0/8] xen: add pvh guest support

2017-12-14 Thread Juergen Gross
On 14/12/17 12:32, Daniel Kiper wrote: > On Thu, Dec 14, 2017 at 12:26:02PM +0100, Juergen Gross wrote: >> On 14/12/17 12:19, Daniel Kiper wrote: >>> On Fri, Dec 01, 2017 at 12:12:50PM +0100, Daniel Kiper wrote: On Fri, Dec 01, 2017 at 06:37:37AM +0100, Juergen Gross wrote: > On 30/11/17 2

Re: [Xen-devel] Xen release cycle revisited

2017-12-14 Thread Juergen Gross
On 14/12/17 12:28, Julien Grall wrote: > > > On 14/12/17 07:56, Juergen Gross wrote: >> Hi all, > > Hi Juergen, > > I would recommend to CC committers on that thread, so your thread don't > get lost in the xen-devel meanders :). > >> with 4.10 more or less finished it is time to plan for the n

Re: [Xen-devel] [PATCH 0/8] xen: add pvh guest support

2017-12-14 Thread Daniel Kiper
On Thu, Dec 14, 2017 at 12:26:02PM +0100, Juergen Gross wrote: > On 14/12/17 12:19, Daniel Kiper wrote: > > On Fri, Dec 01, 2017 at 12:12:50PM +0100, Daniel Kiper wrote: > >> On Fri, Dec 01, 2017 at 06:37:37AM +0100, Juergen Gross wrote: > >>> On 30/11/17 22:03, Daniel Kiper wrote: > On Wed, N

Re: [Xen-devel] Xen release cycle revisited

2017-12-14 Thread Julien Grall
On 14/12/17 07:56, Juergen Gross wrote: Hi all, Hi Juergen, I would recommend to CC committers on that thread, so your thread don't get lost in the xen-devel meanders :). with 4.10 more or less finished it is time to plan for the next release 4.11. Since 4.7 we are using a 6 month releas

Re: [Xen-devel] [PATCH 0/8] xen: add pvh guest support

2017-12-14 Thread Juergen Gross
On 14/12/17 12:19, Daniel Kiper wrote: > On Fri, Dec 01, 2017 at 12:12:50PM +0100, Daniel Kiper wrote: >> On Fri, Dec 01, 2017 at 06:37:37AM +0100, Juergen Gross wrote: >>> On 30/11/17 22:03, Daniel Kiper wrote: On Wed, Nov 29, 2017 at 02:46:42PM +0100, Juergen Gross wrote: > This patch se

Re: [Xen-devel] [PATCH 0/8] xen: add pvh guest support

2017-12-14 Thread Daniel Kiper
On Fri, Dec 01, 2017 at 12:12:50PM +0100, Daniel Kiper wrote: > On Fri, Dec 01, 2017 at 06:37:37AM +0100, Juergen Gross wrote: > > On 30/11/17 22:03, Daniel Kiper wrote: > > > On Wed, Nov 29, 2017 at 02:46:42PM +0100, Juergen Gross wrote: > > >> This patch series adds support for booting Linux as P

[Xen-devel] Please welcome our new release manager

2017-12-14 Thread Julien Grall
Dear community members, I'm pleased to announce that Jurgen Gross will be the Release Manager for the next Xen release. Jurgen has been an active developer for the past few years, making significant code contributions to advance Xen support in Linux. He is a virtualization kernel developer

[Xen-devel] [qemu-mainline test] 117078: trouble: blocked/broken/pass

2017-12-14 Thread osstest service owner
flight 117078 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/117078/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-xl broken test-arm64-arm64-xl

[Xen-devel] [xen-unstable-smoke test] 117135: trouble: blocked/broken/pass

2017-12-14 Thread osstest service owner
flight 117135 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/117135/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 broken test-arm64-arm

Re: [Xen-devel] [PATCH V1 1/1] Xen/libxl: Perform PCI reset using 'reset' SysFS attribute

2017-12-14 Thread George Dunlap
On Wed, Dec 13, 2017 at 9:05 PM, Govinda Tatti wrote: > > Thanks George for your review comments. Please see below for my comments. > > > On 12/13/2017 8:01 AM, George Dunlap wrote: >> >> On Thu, Dec 7, 2017 at 10:26 PM, Govinda Tatti >> wrote: >>> >>> The life-cycle of a PCI device in Xen pcibac

  1   2   >