[Xen-devel] [xen-unstable-smoke test] 130678: regressions - trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130678 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130678/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-amd64 6 xen

[Xen-devel] [PATCH v1] restore the fake x2apic value for cpuid

2018-11-21 Thread Xin Li
From: Talons Lee Commit e657fcc clears cpu x2apic capability bit instead of using fake cpuid value. However, with cpuid x2apic bit on, xen_read_msr_safe() will not clear the EXTD bit, which leads to uncessary msr write trying to disable x2apic in __x2apic_disable(). So restore the fake x2apic val

Re: [Xen-devel] [PATCH] mm: convert totalram_pages, totalhigh_pages and managed_pages to atomic.

2018-11-21 Thread Guo Ren
On Mon, Oct 22, 2018 at 10:53:22PM +0530, Arun KS wrote: > Remove managed_page_count_lock spinlock and instead use atomic > variables. > > Suggested-by: Michal Hocko > Suggested-by: Vlastimil Babka > Signed-off-by: Arun KS > > --- > As discussed here, > https://patchwork.kernel.org/patch/10627

[Xen-devel] [xen-unstable-smoke test] 130675: regressions - trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130675 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130675/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-amd64 6 xen

[Xen-devel] [xen-unstable-smoke test] 130670: regressions - trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130670 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130670/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-amd64 6 xen

[Xen-devel] [xen-unstable test] 130620: regressions - trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130620 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/130620/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64 broken build-arm64-pvops

[Xen-devel] [PATCH] pvcalls-front: fixes incorrect error handling

2018-11-21 Thread Pan Bian
kfree() is incorrectly used to release the pages allocated by __get_free_page() and __get_free_pages(). Use the matching deallocators i.e., free_page() and free_pages(), respectively. Signed-off-by: Pan Bian --- drivers/xen/pvcalls-front.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-

Re: [Xen-devel] [Qemu-devel] [PATCH v5 00/24] ACPI reorganization for hardware-reduced API addition

2018-11-21 Thread Samuel Ortiz
On Wed, Nov 21, 2018 at 03:15:26PM +0100, Igor Mammedov wrote: > On Wed, 21 Nov 2018 07:35:47 -0500 > "Michael S. Tsirkin" wrote: > > > On Mon, Nov 19, 2018 at 04:31:10PM +0100, Igor Mammedov wrote: > > > On Fri, 16 Nov 2018 17:37:54 +0100 > > > Paolo Bonzini wrote: > > > > > > > On 16/11/18

Re: [Xen-devel] [PATCH 00/14] XSA-277 followup

2018-11-21 Thread Andrew Cooper
On 21/11/2018 22:42, Tamas K Lengyel wrote: > On Wed, Nov 21, 2018 at 2:22 PM Andrew Cooper > wrote: >> On 21/11/2018 17:19, Tamas K Lengyel wrote: >>> On Wed, Nov 21, 2018 at 6:21 AM Andrew Cooper >>> wrote: This covers various fixes related to XSA-277 which weren't in security suppo

Re: [Xen-devel] [Qemu-devel] [PATCH v5 20/24] hw: acpi: Define ACPI tables builder interface

2018-11-21 Thread Samuel Ortiz
On Fri, Nov 16, 2018 at 05:02:26PM +0100, Igor Mammedov wrote: > On Mon, 5 Nov 2018 02:40:43 +0100 > Samuel Ortiz wrote: > > > In order to decouple ACPI APIs from specific machine types, we are > > creating an ACPI builder interface that each ACPI platform can choose to > > implement. > > This w

Re: [Xen-devel] [Qemu-devel] [PATCH v5 15/24] hw: i386: Export the i386 ACPI SRAT build method

2018-11-21 Thread Samuel Ortiz
On Thu, Nov 15, 2018 at 02:28:54PM +0100, Igor Mammedov wrote: > On Mon, 5 Nov 2018 02:40:38 +0100 > Samuel Ortiz wrote: > > > This is the standard way of building SRAT on x86 platfoms. But future > > machine types could decide to define their own custom SRAT build method > > through the ACPI bu

Re: [Xen-devel] [Qemu-devel] [PATCH v5 12/24] hw: acpi: Export the MCFG getter

2018-11-21 Thread Samuel Ortiz
Hi Igor, On Thu, Nov 15, 2018 at 01:36:58PM +0100, Igor Mammedov wrote: > On Mon, 5 Nov 2018 02:40:35 +0100 > Samuel Ortiz wrote: > > > From: Yang Zhong > > > > The ACPI MCFG getter is not x86 specific and could be called from > > anywhere within generic ACPI API, so let's export it. > So far

Re: [Xen-devel] [Qemu-devel] [PATCH v5 11/24] hw: acpi: Export and generalize the PCI host AML API

2018-11-21 Thread Samuel Ortiz
Hi Igor, On Wed, Nov 14, 2018 at 11:55:37AM +0100, Igor Mammedov wrote: > On Mon, 5 Nov 2018 02:40:34 +0100 > Samuel Ortiz wrote: > > > From: Yang Zhong > > > > The AML build routines for the PCI host bridge and the corresponding > > DSDT addition are neither x86 nor PC machine type specific.

[Xen-devel] [xen-unstable-smoke test] 130666: regressions - trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130666 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130666/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-amd64 6 xen

Re: [Xen-devel] [PATCH 00/14] XSA-277 followup

2018-11-21 Thread Tamas K Lengyel
On Wed, Nov 21, 2018 at 2:22 PM Andrew Cooper wrote: > > On 21/11/2018 17:19, Tamas K Lengyel wrote: > > On Wed, Nov 21, 2018 at 6:21 AM Andrew Cooper > > wrote: > >> This covers various fixes related to XSA-277 which weren't in security > >> supported areas, and associated cleanup. > >> > >> Th

Re: [Xen-devel] [PATCH] xen: sched: Credit2: during scheduling, update the idle mask before using it

2018-11-21 Thread Dario Faggioli
On Wed, 2018-11-21 at 15:57 +, George Dunlap wrote: > On 10/11/18 2:44 PM, Dario Faggioli wrote: > > > Reviewed-by: George Dunlap > > One comment: The title seems to have excessive tags. You only need > enough for people scrolling through to figure out the domain; > "xen/credit2:", or even

[Xen-devel] [ovmf test] 130628: regressions - FAIL

2018-11-21 Thread osstest service owner
flight 130628 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/130628/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm6 xen-buildfail REGR. vs. 129475 build-i386

[Xen-devel] [xen-4.10-testing test] 130611: regressions - trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130611 xen-4.10-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/130611/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64 broken build-arm64-xsm

Re: [Xen-devel] [PATCH 00/14] XSA-277 followup

2018-11-21 Thread Andrew Cooper
On 21/11/2018 17:19, Tamas K Lengyel wrote: > On Wed, Nov 21, 2018 at 6:21 AM Andrew Cooper > wrote: >> This covers various fixes related to XSA-277 which weren't in security >> supported areas, and associated cleanup. >> >> The biggest issue noticed here is that altp2m's use of hardware #VE supp

Re: [Xen-devel] [PATCH 0/9] Use vm_insert_range

2018-11-21 Thread Boris Ostrovsky
On 11/21/18 2:56 PM, Souptick Joarder wrote: > On Thu, Nov 22, 2018 at 1:08 AM Boris Ostrovsky > wrote: >> On 11/21/18 1:24 AM, Souptick Joarder wrote: >>> On Thu, Nov 15, 2018 at 9:09 PM Souptick Joarder >>> wrote: Previouly drivers have their own way of mapping range of kernel pages/

Re: [Xen-devel] [PATCH 0/9] Use vm_insert_range

2018-11-21 Thread Souptick Joarder
On Thu, Nov 22, 2018 at 1:08 AM Boris Ostrovsky wrote: > > On 11/21/18 1:24 AM, Souptick Joarder wrote: > > On Thu, Nov 15, 2018 at 9:09 PM Souptick Joarder > > wrote: > >> Previouly drivers have their own way of mapping range of > >> kernel pages/memory into user vma and this was done by > >> i

Re: [Xen-devel] [PATCH 0/9] Use vm_insert_range

2018-11-21 Thread Boris Ostrovsky
On 11/21/18 1:24 AM, Souptick Joarder wrote: > On Thu, Nov 15, 2018 at 9:09 PM Souptick Joarder wrote: >> Previouly drivers have their own way of mapping range of >> kernel pages/memory into user vma and this was done by >> invoking vm_insert_page() within a loop. >> >> As this pattern is common a

[Xen-devel] [PATCH] x86/atomic: Improvements and simplifications to assembly constraints

2018-11-21 Thread Andrew Cooper
* Some of the single-byte versions specify "=q" as the output. AFAICT, there was not a legitimate reason to restrict the use of %esi/%edi in the 32-bit build. Either way, in 64-bit, it is equivelent to "=r". * Constraints in the form "=r" (x) : "0" (x) can be folded to just "+r" (x) * Sw

[Xen-devel] [xen-unstable-smoke test] 130661: regressions - trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130661 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130661/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-amd64 6 xen

Re: [Xen-devel] [PATCH v1] x86/hvm: Generic instruction re-execution mechanism for execute faults

2018-11-21 Thread Razvan Cojocaru
On 11/16/18 7:04 PM, Roger Pau Monné wrote: >> +if ( a == v ) >> +continue; >> + >> +/* Pause, synced. */ >> +while ( !a->arch.in_host ) > Why not use a->is_running as a way to know whether the vCPU is > running? > > I think the logic of using vc

[Xen-devel] LLVM optimizations and .init variables usage

2018-11-21 Thread Roger Pau Monné
Hello, As some of you know might already know by discussions on IRC newer versions of Xen compiled with LLVM will trigger a page fault shortly after boot. This is due to the usage of opt_bootscrub in init_heap_pages. opt_bootscrub is defined in the .init section, while init_heap_pages is not an i

Re: [Xen-devel] [PATCH] automation: git clean between builds

2018-11-21 Thread Doug Goldstein
> On Nov 21, 2018, at 11:07 AM, Wei Liu wrote: > >> On Wed, Nov 21, 2018 at 10:51:55AM -0600, Doug Goldstein wrote: >> >>> On Nov 21, 2018, at 10:32 AM, Wei Liu wrote: >>> >>> Currently randconfig tests are more likely to fail than to succeed >>> because of a bug in xen's build system: symbol

Re: [Xen-devel] [PATCH] xen/common: Drop unnecessary #ifdef CONFIG_KEXEC

2018-11-21 Thread Wei Liu
On Wed, Nov 21, 2018 at 05:58:51PM +, Andrew Cooper wrote: > kexec.h itself has suitable stubs for the !CONFIG_KEXEC case, so calls to > kexec_crash() don't need guarding. > > Signed-off-by: Andrew Cooper Acked-by: Wei Liu ___ Xen-devel mailing l

[Xen-devel] [PATCH] xen/common: Drop unnecessary #ifdef CONFIG_KEXEC

2018-11-21 Thread Andrew Cooper
kexec.h itself has suitable stubs for the !CONFIG_KEXEC case, so calls to kexec_crash() don't need guarding. Signed-off-by: Andrew Cooper --- CC: George Dunlap CC: Jan Beulich CC: Konrad Rzeszutek Wilk CC: Stefano Stabellini CC: Tim Deegan CC: Wei Liu CC: Julien Grall --- xen/common/shutd

[Xen-devel] [xen-4.11-testing test] 130614: trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130614 xen-4.11-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/130614/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64 broken build-arm64-pvop

Re: [Xen-devel] [PATCH 00/14] XSA-277 followup

2018-11-21 Thread Tamas K Lengyel
On Wed, Nov 21, 2018 at 6:21 AM Andrew Cooper wrote: > > This covers various fixes related to XSA-277 which weren't in security > supported areas, and associated cleanup. > > The biggest issue noticed here is that altp2m's use of hardware #VE support > will cause general memory corruption if the g

Re: [Xen-devel] [PATCH v6 07/11] libxl_dm: Pre-open QMP socket for QEMU

2018-11-21 Thread Anthony PERARD
On Fri, Nov 16, 2018 at 11:52:52AM +, Ian Jackson wrote: > > +r = listen(fd, 1); > > What is the reasoning behind the choice of 1 for the listen queue > parameter ? I may have simply copy that from QEMU, or libvirt. They both call listen with 1. It is probably to allow at least one connec

Re: [Xen-devel] [PATCH] automation: git clean between builds

2018-11-21 Thread Wei Liu
On Wed, Nov 21, 2018 at 10:51:55AM -0600, Doug Goldstein wrote: > > > On Nov 21, 2018, at 10:32 AM, Wei Liu wrote: > > > > Currently randconfig tests are more likely to fail than to succeed > > because of a bug in xen's build system: symbols-dummy.o's dependency > > is wrong, which causes it to

Re: [Xen-devel] [PATCH 09/14] x86/p2m: Switch the two_gfns infrastructure to using gfn_t

2018-11-21 Thread Tamas K Lengyel
On Wed, Nov 21, 2018 at 6:21 AM Andrew Cooper wrote: > > Additionally, drop surrounding trailing whitespace. > > Signed-off-by: Andrew Cooper Acked-by: Tamas K Lengyel ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject

Re: [Xen-devel] [PATCH 02/14] x86/mem-sharing: Don't leave the altp2m lock held when nominating a page

2018-11-21 Thread Tamas K Lengyel
On Wed, Nov 21, 2018 at 6:21 AM Andrew Cooper wrote: > > get_gfn_type_access() internally takes the p2m lock, and nothing ever unlocks > it. Switch to using the unlocked accessor instead. > > This wasn't included in XSA-277 because neither mem-sharing nor altp2m are > supported. > > Signed-off-by

Re: [Xen-devel] [PATCH] automation: git clean between builds

2018-11-21 Thread Doug Goldstein
> On Nov 21, 2018, at 10:32 AM, Wei Liu wrote: > > Currently randconfig tests are more likely to fail than to succeed > because of a bug in xen's build system: symbols-dummy.o's dependency > is wrong, which causes it to not get rebuild between runs, which > eventually causes linking to fail. The

Re: [Xen-devel] [PATCH v6 08/11] libxl: QEMU startup sync based on QMP

2018-11-21 Thread Anthony PERARD
On Fri, Nov 16, 2018 at 12:14:43PM +, Ian Jackson wrote: > Anthony PERARD writes ("[PATCH v6 08/11] libxl: QEMU startup sync based on > QMP"): > > This is only activated when dm_restrict=1, as explained in the previous > > patch "libxl_dm: Pre-open QMP socket for QEMU" > ... > > Signed-off-by:

[Xen-devel] [PATCH] automation: git clean between builds

2018-11-21 Thread Wei Liu
Currently randconfig tests are more likely to fail than to succeed because of a bug in xen's build system: symbols-dummy.o's dependency is wrong, which causes it to not get rebuild between runs, which eventually causes linking to fail. There may also be other corner cases we haven't discovered. Th

[Xen-devel] [xen-unstable-smoke test] 130656: regressions - trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130656 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/130656/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm broken build-amd64 6 xen

Re: [Xen-devel] [RFC PATCH v1 6/8] xen: sched: Credit2 group-scheduling: selecting next vcpu to run

2018-11-21 Thread George Dunlap
On 10/12/18 6:44 PM, Dario Faggioli wrote: > When chosing which vcpu to run next, on a CPU which is in a group where > other vcpus are running already, only consider vcpus of the same domain > (of those vcpus that are running already!). > > This is as easy as, in runq_candidate(), while traversing

Re: [Xen-devel] [PATCH 10/14] x86/mm: Switch {get, put}_gfn() infrastructure to using gfn_t

2018-11-21 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: 21 November 2018 13:21 > To: Xen-devel > Cc: Andrew Cooper ; Jan Beulich > ; Wei Liu ; Roger Pau Monne > ; Razvan Cojocaru ; Tamas > K Lengyel ; George Dunlap ; > Tim (Xen.org) ; Paul Durrant ; Jun > Naka

Re: [Xen-devel] [PATCH] xen: sched: Credit2: during scheduling, update the idle mask before using it

2018-11-21 Thread George Dunlap
On 10/11/18 2:44 PM, Dario Faggioli wrote: > Load balancing, when happening, at the end of a "scheduler epoch", can > trigger vcpu migration, which in its turn may call runq_tickle(). If the > cpu where this happens was idle, but we're now going to schedule a vcpu > on it, let's update the runq's i

Re: [Xen-devel] [Qemu-devel] [PATCH v5 10/24] hw: acpi: Export the PCI host and holes getters

2018-11-21 Thread Samuel Ortiz
On Tue, Nov 13, 2018 at 04:59:18PM +0100, Igor Mammedov wrote: > On Mon, 5 Nov 2018 02:40:33 +0100 > Samuel Ortiz wrote: > > > This is going to be needed by the hardware reduced implementation, so > > let's export it. > > Once the ACPI builder methods and getters will be implemented, the > > acp

Re: [Xen-devel] [PATCH v1] makedumpfile: exclude pages that are logically offline

2018-11-21 Thread David Hildenbrand
On 21.11.18 15:58, Kazuhito Hagio wrote: > Hi David, > >> Linux marks pages that are logically offline via a page flag (map count). >> Such pages e.g. include pages infated as part of a balloon driver or >> pages that were not actually onlined when onlining the whole section. >> >> While the hyper

Re: [Xen-devel] [PATCH] xen: sched: Credit2: avoid looping too much (over runqueues) during load balancing

2018-11-21 Thread George Dunlap
On 10/11/18 2:47 PM, Dario Faggioli wrote: > For doing load balancing between runqueues, we check the load of each > runqueue, select the one more "distant" than our own load, and then take > the proper runq lock and attempt vcpu migrations. > > If we fail to take such lock, we try again, and the

[Xen-devel] [PATCH 13/18] xen: purge 'blk' and 'ioreq' from function names in dataplane/xen-qdisk.c

2018-11-21 Thread Paul Durrant
This is a purely cosmetic patch that purges remaining use of 'blk' and 'ioreq' in local function names. No functional change. Signed-off-by: Paul Durrant --- Cc: Stefano Stabellini Cc: Anthony Perard Cc: Stefan Hajnoczi Cc: Kevin Wolf Cc: Max Reitz --- hw/block/dataplane/xen-qdisk.c | 86 +

[Xen-devel] [PATCH 10/18] xen: add header and build dataplane/xen-qdisk.c

2018-11-21 Thread Paul Durrant
This patch adds the transformations necessary to get dataplane/xen-qdisk.c to build against the new XenBus/XenDevice framework. MAINTAINERS is also updated due to the introduction of dataplane/xen-qdisk.h. NOTE: Existing data structure names are retained for the moment. These will be modifie

[Xen-devel] [PATCH 17/18] MAINTAINERS: add myself as a Xen maintainer

2018-11-21 Thread Paul Durrant
I have made many significant contributions to the Xen code in QEMU, particularly the recent patches introducing a new PV device framework. I intend to make further significant contributions, porting other PV back- ends to the new framework with the intent of eventually removing the legacy code. It

[Xen-devel] [PATCH 16/18] xen: automatically create XenQdiskDevice-s

2018-11-21 Thread Paul Durrant
This patch adds a creator function for XenQdiskDevice-s so that they can be created automatically when the Xen toolstack instantiates a new PV backend. When the XenQdiskDevice is created this way it is also necessary to create a drive which matches the configuration that the Xen toolstack has writt

[Xen-devel] [PATCH 18/18] xen: remove the legacy 'xen_disk' backend

2018-11-21 Thread Paul Durrant
This backend has now been replaced by the 'xen-qdisk' XenDevice. Signed-off-by: Paul Durrant --- Cc: Kevin Wolf Cc: Max Reitz --- hw/block/Makefile.objs |1 - hw/block/xen_disk.c| 1011 2 files changed, 1012 deletions(-) delete mode 100

[Xen-devel] [PATCH 12/18] xen: remove 'ioreq' struct/varable/field names from dataplane/xen-qdisk.c

2018-11-21 Thread Paul Durrant
This is a purely cosmetic patch that purges the name 'ioreq' from struct, variable and field names. (This name has been problematic for a long time as 'ioreq' is the name used for generic I/O requests coming from Xen). The patch replaces 'struct ioreq' with a new 'XenQdiskRequest' type and 'ioreq'

[Xen-devel] [PATCH 11/18] xen: remove 'XenBlkDev' and 'blkdev' names from dataplane/xen-qdisk

2018-11-21 Thread Paul Durrant
This is a purely cosmetic patch that substitutes the old 'struct XenBlkDev' name with 'XenQdiskDataPlane' and 'blkdev' field/variable names with 'dataplane', and then does necessary fix-up to adhere to coding style. No functional change. Signed-off-by: Paul Durrant --- Cc: Stefano Stabellini Cc

[Xen-devel] [PATCH 14/18] xen: add implementations of xen-qdisk connect and disconnect functions...

2018-11-21 Thread Paul Durrant
...and wire in the dataplane. This patch adds the remaining code to make the xen-qdisk XenDevice functional. The parameters that a block frontend expects to find are populated in the backend xenstore area, and the 'ring-ref' and 'event-channel' values specified in the frontend xenstore area are ma

[Xen-devel] [PATCH 15/18] xen: add a mechanism to automatically create XenDevice-s...

2018-11-21 Thread Paul Durrant
...that maintains compatibility with existing Xen toolstacks. Xen toolstacks instantiate PV backends by simply writing information into xenstore and expecting a backend implementation to be watching for this. This patch adds a new 'xen-backend' module to allow individual XenDevice implementations

Re: [Xen-devel] [PATCH v2] x86-64/Xen: fix stack switching

2018-11-21 Thread Andy Lutomirski
On Wed, Nov 21, 2018 at 2:10 AM Jan Beulich wrote: > > While in the native case entry into the kernel happens on the trampoline > stack, PV Xen kernels get entered with the current thread stack right > away. Hence source and destination stacks are identical in that case, > and special care is need

[Xen-devel] [PATCH 07/18] xen: add event channel interface for XenDevice-s

2018-11-21 Thread Paul Durrant
The legacy PV backend infrastructure provides functions to bind, unbind and send notifications to event channnels. Similar functionality will be required by XenDevice implementations so this patch adds the necessary support. Signed-off-by: Paul Durrant --- Cc: Stefano Stabellini Cc: Anthony Pera

[Xen-devel] [PATCH 04/18] xen: create xenstore areas for XenDevice-s

2018-11-21 Thread Paul Durrant
This patch adds a new source module, xen-bus-helper.c, which builds on basic libxenstore primitives to provide functions to create (setting permissions appropriately) and destroy xenstore areas, and functions to 'printf' and 'scanf' nodes therein. The main xen-bus code then uses these primitives [1

[Xen-devel] [PATCH 03/18] xen: introduce 'xen-qdisk'

2018-11-21 Thread Paul Durrant
This patch adds a new XenDevice: 'xen-qdisk' [1]. This will eventually replace the 'xen_disk' legacy PV backend but it is illustrative to build up the implementation incrementally, along with the XenBus/XenDevice framework. Subsequent patches will therefore add to this device's implementation as ne

[Xen-devel] [PATCH 01/18] xen: re-name XenDevice to XenLegacyDevice...

2018-11-21 Thread Paul Durrant
...and xen_backend.h to xen-legacy-backend.h Rather than attempting to convert the existing backend infrastructure to be QOM compliant (which would be hard to do in an incremental fashion), subsequent patches will introduce a completely new framework for Xen PV backends. Hence it is necessary to r

[Xen-devel] [PATCH 06/18] xen: add grant table interface for XenDevice-s

2018-11-21 Thread Paul Durrant
The legacy PV backend infrastructure provides functions to map, unmap and copy pages granted by frontends. Similar functionality will be required by XenDevice implementations so this patch adds the necessary support. Signed-off-by: Paul Durrant --- Cc: Stefano Stabellini Cc: Anthony Perard ---

[Xen-devel] [PATCH 08/18] xen: duplicate xen_disk.c as basis of dataplane/xen-qdisk.c

2018-11-21 Thread Paul Durrant
The new xen-qdisk XenDevice implementation requires the same core dataplane as the legacy xen_disk implementation it will eventually replace. This patch therefore copies the legacy xen_disk.c source module into a new dataplane/xen-qdisk.c source module as the basis for the new dataplane and adjusts

[Xen-devel] [PATCH 00/18] Xen PV backend 'qdevification'

2018-11-21 Thread Paul Durrant
This series introduces a new QOM compliant framework for Xen PV backends. This is achieved by first moving the current non-compliant framework aside, before building up a new framework incrementally. This series was prompted by a thread [1] started by Kevin Wolf in response to patches against xen_

[Xen-devel] [PATCH 05/18] xen: add xenstore watcher infratructure

2018-11-21 Thread Paul Durrant
A Xen PV frontend communicates its state to the PV backend by writing to the 'state' key in the frontend area in xenstore. It is therefore necessary for a XenDevice implementation to be notified whenever the value of this key changes. This patch adds code to do this as follows: - an 'fd handler'

[Xen-devel] [PATCH 09/18] xen: remove unnecessary code from dataplane/xen-qdisk.c

2018-11-21 Thread Paul Durrant
Not all of the code duplicated from xen_disk.c is required as the basis for the new dataplane implementation so this patch removes extraneous code, along with the legacy #includes and calls to the legacy xen_pv_printf() function. Error messages are changed to be reported using error_report(). NOTE

[Xen-devel] [PATCH 02/18] xen: introduce new 'XenBus' and 'XenDevice' object hierarchy

2018-11-21 Thread Paul Durrant
This patch adds the basic boilerplate for a 'XenBus' object that will act as a parent to 'XenDevice' PV backends. A new 'XenBridge' object is also added to connect XenBus to the system bus. The XenBus object is instantiated by a new xen_bus_init() function called from the same sites as the legacy

Re: [Xen-devel] [PATCH v1] makedumpfile: exclude pages that are logically offline

2018-11-21 Thread Kazuhito Hagio
Hi David, > Linux marks pages that are logically offline via a page flag (map count). > Such pages e.g. include pages infated as part of a balloon driver or > pages that were not actually onlined when onlining the whole section. > > While the hypervisor usually allows to read such inflated memory

Re: [Xen-devel] [Qemu-devel] [PATCH v5 07/24] hw: acpi: Generalize AML build routines

2018-11-21 Thread Samuel Ortiz
Hi Igor, On Fri, Nov 09, 2018 at 02:37:33PM +0100, Igor Mammedov wrote: > On Mon, 5 Nov 2018 02:40:30 +0100 > Samuel Ortiz wrote: > > > From: Yang Zhong > > > > Most of the AML build routines under acpi-build are not even > > architecture specific. They can be moved to the more generic hw/acp

[Xen-devel] [xen-4.9-testing test] 130613: regressions - trouble: blocked/broken/fail/pass

2018-11-21 Thread osstest service owner
flight 130613 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/130613/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-pvopsbroken build-arm64-xsm

Re: [Xen-devel] [PATCH 10/14] x86/mm: Switch {get, put}_gfn() infrastructure to using gfn_t

2018-11-21 Thread Razvan Cojocaru
On 11/21/18 3:21 PM, Andrew Cooper wrote: > Seemingly, a majority of users either override the helpers anyway, or have an > gfn_t in their hands. > > Update the API, and adjust all users to match. > > Doing this highlighted a gaping altp2m security hole in > vmx_vcpu_update_vmfunc_ve(), which wil

Re: [Xen-devel] [PATCH 06/14] x86/hvm: Make the altp2m locking easier to follow

2018-11-21 Thread Razvan Cojocaru
On 11/21/18 3:21 PM, Andrew Cooper wrote: > Drop the ap2m_active boolean, and consistently use the unlocking form: > > if ( p2m != hostp2m ) >__put_gfn(p2m, gfn); > __put_gfn(hostp2m, gfn); > > which makes it clear that we always unlock the altp2m's gfn if it is in use, > and always u

Re: [Xen-devel] [Qemu-devel] [PATCH v5 01/24] hw: i386: Decouple the ACPI build from the PC machine type

2018-11-21 Thread Samuel Ortiz
Hi Igor, On Fri, Nov 09, 2018 at 03:23:16PM +0100, Igor Mammedov wrote: > On Mon, 5 Nov 2018 02:40:24 +0100 > Samuel Ortiz wrote: > > > ACPI tables are platform and machine type and even architecture > > agnostic, and as such we want to provide an internal ACPI API that > > only depends on plat

Re: [Xen-devel] [PATCH v2] x86/dom0: use MEMF_no_scrub during Dom0 construction

2018-11-21 Thread Jan Beulich
>>> On 21.11.18 at 15:13, wrote: > Now that idle scrub is the default option, all memory is marked as dirty > and alloc_domheap_pages() will do eager scrubbing by default. This can > lead to longer Dom0 construction and potentially to a watchdog timeout, > especially on older H/W (e.g. Harpertown)

Re: [Xen-devel] [PATCH v5 02/24] hw: acpi: Export ACPI build alignment API

2018-11-21 Thread Samuel Ortiz
On Fri, Nov 09, 2018 at 03:27:16PM +0100, Igor Mammedov wrote: > On Mon, 5 Nov 2018 02:40:25 +0100 > Samuel Ortiz wrote: > > > This is going to be needed by the Hardware-reduced ACPI routines. > > > > Reviewed-by: Philippe Mathieu-Daudé > > Tested-by: Philippe Mathieu-Daudé > > Signed-off-by:

Re: [Xen-devel] [Qemu-devel] [PATCH v5 05/24] hw: acpi: Implement XSDT support for RSDP

2018-11-21 Thread Samuel Ortiz
Hi Igor, On Thu, Nov 08, 2018 at 03:16:23PM +0100, Igor Mammedov wrote: > On Mon, 5 Nov 2018 02:40:28 +0100 > Samuel Ortiz wrote: > > > XSDT is the 64-bit version of the legacy ACPI RSDT (Root System > > Description Table). RSDT only allow for 32-bit addressses and have thus > > been deprecated

Re: [Xen-devel] [Qemu-devel] [PATCH v5 00/24] ACPI reorganization for hardware-reduced API addition

2018-11-21 Thread Samuel Ortiz
Igor, On Wed, Nov 21, 2018 at 03:15:26PM +0100, Igor Mammedov wrote: > On Wed, 21 Nov 2018 07:35:47 -0500 > "Michael S. Tsirkin" wrote: > > > On Mon, Nov 19, 2018 at 04:31:10PM +0100, Igor Mammedov wrote: > > > On Fri, 16 Nov 2018 17:37:54 +0100 > > > Paolo Bonzini wrote: > > > > > > > On 16

[Xen-devel] [PATCH v5 05/20] xen: add some dummy headers for PVH mode

2018-11-21 Thread Juergen Gross
With Xen PVH mode adding a new machine type the machine related headers need to be present for the build to succeed. Most of the headers just need to include the related common i386 headers. Add those to the tree. Note that xen_pvh/int.h needs to include pc/int_types.h instead of pc/int.h in order

Re: [Xen-devel] [PATCH 1/9] mm: Introduce new vm_insert_range API

2018-11-21 Thread William Kucharski
> On Nov 21, 2018, at 5:35 AM, Matthew Wilcox wrote: > > It's probably better to be more explicit and answer Randy's question: > > * If we fail to insert any page into the vma, the function will return > * immediately leaving any previously-inserted pages present. Callers > * from the mmap ha

[Xen-devel] [PATCH v5 11/20] xen: setup hypercall page for PVH

2018-11-21 Thread Juergen Gross
Add the needed code to setup the hypercall page for calling into the Xen hypervisor. Import the XEN_HVM_DEBUGCONS_IOPORT define from Xen unstable into include/xen/arch-x86/xen.h Signed-off-by: Juergen Gross --- V3: grub_xen_early_halt->grub_xen_panic (Roger Pau Monné) issue panic message (Ro

[Xen-devel] [PATCH v5 03/20] xen: carve out grant tab initialization into dedicated function

2018-11-21 Thread Juergen Gross
Initialize the grant tab in a dedicated function. This will enable using it for PVH guests, too. Call the new function from grub_machine_init() as this will later be common between Xen PV and Xen PVH mode. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V2: update commit message (Dan

[Xen-devel] [PATCH v5 14/20] xen: init memory regions for PVH

2018-11-21 Thread Juergen Gross
Add all usable memory regions to grub memory management and add the needed mmap iterate code, which will be used by grub core (e.g. grub-core/lib/relocator.c or grub-core/mmap/mmap.c). As we are running in 32-bit mode don't add memory above 4GB. Signed-off-by: Juergen Gross Reviewed-by: Daniel K

[Xen-devel] [PATCH v5 17/20] xen: use elfnote defines instead of plain numbers

2018-11-21 Thread Juergen Gross
In order to avoid using plain integers for the ELF notes use the available Xen include instead. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V5: new patch (Daniel Kiper) --- util/grub-mkimagexx.c | 14 -- 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/ut

[Xen-devel] [PATCH v5 19/20] xen_pvh: support grub-install for xen_pvh

2018-11-21 Thread Juergen Gross
Add xen_pvh support to grub-install. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- include/grub/util/install.h | 1 + util/grub-install-common.c | 1 + util/grub-install.c | 7 +++ 3 files changed, 9 insertions(+) diff --git a/include/grub/util/install.h b/include/gru

[Xen-devel] [PATCH v5 00/20] xen: add pvh guest support

2018-11-21 Thread Juergen Gross
This patch series adds support for booting Linux as PVH guest. Similar to i386/xen and x86_64/xen platforms the new i386/xenpvh platform grub is booted as a standalone image directly by Xen. For booting Linux kernel it is using the standard linux kernel loader. The only modification of the linux

[Xen-devel] [PATCH v5 16/20] grub-module-verifier: Ignore all_video for xenpvh

2018-11-21 Thread Juergen Gross
From: Hans van Kranenburg This solves the build failing with "Error: no symbol table and no .moddeps section" Also see: - 6371e9c10433578bb236a8284ddb9ce9e201eb59 - https://savannah.gnu.org/bugs/?49012 Signed-off-by: Hans van Kranenburg Reviewed-by: Daniel Kiper --- V2: new patch Signed-off-b

[Xen-devel] [PATCH v5 01/20] xen: add some xen headers

2018-11-21 Thread Juergen Gross
In order to support grub2 in Xen PVH environment some additional Xen headers are needed as grub2 will be started in PVH mode requiring to use several HVM hypercalls and structures. Add the needed headers from Xen 4.10 being the first Xen version with full (not only experimental) PVH guest support.

[Xen-devel] [PATCH v5 12/20] xen: get memory map from hypervisor for PVH

2018-11-21 Thread Juergen Gross
Retrieve the memory map from the hypervisor and normalize it to contain no overlapping entries and to be sorted by address. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V3: use grub_e820_mmap_entry instead of own struct (Daniel Kiper) --- grub-core/kern/i386/xen/pvh.c | 94 +++

[Xen-devel] [PATCH v5 08/20] xen: add PVH specific defines to offset.h

2018-11-21 Thread Juergen Gross
include/grub/offsets.h needs some defines for Xen PVH mode. Add them. While at it line up the values in the surrounding lines to start at the same column. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V3: XENPVH->XEN_PVH (Daniel Kiper) --- include/grub/offsets.h | 21 -

[Xen-devel] [PATCH v5 20/20] xen_pvh: add support to configure

2018-11-21 Thread Juergen Gross
Support platform i386/xen_pvh in configure. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- configure.ac | 3 +++ 1 file changed, 3 insertions(+) diff --git a/configure.ac b/configure.ac index 5e63c4af3..81a19afd5 100644 --- a/configure.ac +++ b/configure.ac @@ -151,6 +151,7 @@ case

[Xen-devel] [PATCH v5 04/20] xen: prepare common code for Xen PVH support

2018-11-21 Thread Juergen Gross
Some common code needs to be special cased for Xen PVH mode. This hits mostly Xen PV mode specific areas. Split include/grub/i386/pc/int_types.h off from include/grub/i386/pc/int.h to support including this file later from xen_pvh code without the grub_bios_interrupt definition. Move definition o

[Xen-devel] [PATCH v5 18/20] xen_pvh: support building a standalone image

2018-11-21 Thread Juergen Gross
Support mkimage for xen_pvh. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V2: some style adjustments (Daniel Kiper) use defines for elf-notes (Daniel Kiper) V5: move elf-note define usage into new patch (Daniel Kiper) I didn't replace the 4096 by a PAGE_SIZE macro as requested

[Xen-devel] [PATCH v5 13/20] xen: setup Xen specific data for PVH

2018-11-21 Thread Juergen Gross
Initialize the needed Xen specific data. This is: - the Xen start of day page containing the console and Xenstore ring page PFN and event channel - the grant table - the shared info page Write back the possibly modified memory map to the hypervisor in case the guest is reading it from there aga

[Xen-devel] [PATCH v5 02/20] loader/linux: support passing rsdp address via boot params

2018-11-21 Thread Juergen Gross
Xen PVH guests will have the RSDP at an arbitrary address. Support that by passing the RSDP address via the boot parameters to Linux. Signed-off-by: Juergen Gross --- V2: add oring 0x8000 to version field V3: move including machine/kernel.h to patch 8 (Daniel Kiper) V5: move acpi_rsdp_addr to str

[Xen-devel] [PATCH v5 06/20] xen: rearrange xen/init.c to prepare it for Xen PVH mode

2018-11-21 Thread Juergen Gross
Rearrange grub-core/kern/xen/init.c to prepare adding PVH mode support to it. This includes putting some code under #ifdef GRUB_MACHINE_XEN as it will not be used when running as PVH. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- grub-core/kern/xen/init.c | 60 +

[Xen-devel] [PATCH v5 07/20] xen: modify grub_xen_ptr2mfn() for xen-pvh

2018-11-21 Thread Juergen Gross
grub_xen_ptr2mfn() returns the machine frame number for a given pointer value. For Xen-PVH guests this is just the PFN. Add the PVH specific variant. Signed-off-by: Juergen Gross --- V5: new patch (Daniel Kiper) --- grub-core/kern/xen/init.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/

[Xen-devel] [PATCH v5 15/20] xen_pvh: add build runes for grub-core

2018-11-21 Thread Juergen Gross
Add the modifications to the build system needed to build a xen_pvh grub. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V3: sorted some filenames (Daniel Kiper) V4: add bus/pci.c to xen_pvh --- gentpl.py | 4 ++-- grub-core/Makefile.am | 12 gr

[Xen-devel] [PATCH v5 09/20] xen: add basic hooks for PVH in current code

2018-11-21 Thread Juergen Gross
Add the hooks to current code needed for Xen PVH. They will be filled with code later when the related functionality is being added. loader/i386/linux.c needs to include machine/kernel.h now as it needs to get GRUB_KERNEL_USE_RSDP_ADDR from there. Signed-off-by: Juergen Gross --- V3: xenpvh->xen

[Xen-devel] [PATCH v5 10/20] xen: add PVH boot entry code

2018-11-21 Thread Juergen Gross
Add the code for the Xen PVH mode boot entry. Signed-off-by: Juergen Gross Reviewed-by: Daniel Kiper --- V3: clear %fs and %gs, too (Daniel Kiper) use GRUB_MEMORY_MACHINE_PROT_STACK_SIZE for stack size (Daniel Kiper) V5: reorder clearing segment regs (Daniel Kiper) --- grub-core/kern/i386/x

Re: [Xen-devel] [Qemu-devel] [PATCH v5 00/24] ACPI reorganization for hardware-reduced API addition

2018-11-21 Thread Igor Mammedov
On Wed, 21 Nov 2018 07:35:47 -0500 "Michael S. Tsirkin" wrote: > On Mon, Nov 19, 2018 at 04:31:10PM +0100, Igor Mammedov wrote: > > On Fri, 16 Nov 2018 17:37:54 +0100 > > Paolo Bonzini wrote: > > > > > On 16/11/18 17:29, Igor Mammedov wrote: > > > > General suggestions for this series: > >

[Xen-devel] [PATCH v2] x86/dom0: use MEMF_no_scrub during Dom0 construction

2018-11-21 Thread Sergey Dyasli
Now that idle scrub is the default option, all memory is marked as dirty and alloc_domheap_pages() will do eager scrubbing by default. This can lead to longer Dom0 construction and potentially to a watchdog timeout, especially on older H/W (e.g. Harpertown). Pass MEMF_no_scrub to optimise this pro

Re: [Xen-devel] FOSDEM Devrooms (CfP deadlines for relevant DevRooms from Dec 1-10) and Xen Project Stand

2018-11-21 Thread Lars Kurth
Just a quick reminder that the CfP deadline is coming up Note that FOSDEM has not yet announced the stands Lars From: Lars Kurth Date: Monday, 29 October 2018 at 17:01 To: xen-devel , "mirageos-de...@lists.xenproject.org" , "minios-de...@lists.xenproject.org" , "mirageos-de...@lists.xenproject

  1   2   >