Re: [Xen-devel] xenstored crashes with SIGSEGV

2015-01-05 Thread Philipp Hahn
Hello, happy new year to everyone. On 19.12.2014 13:36, Philipp Hahn wrote: > On 18.12.2014 11:17, Ian Campbell wrote: >> On Tue, 2014-12-16 at 16:13 +, Frediano Ziglio wrote: >>> Do we have a bug in Xen that affect SSE instructions (possibly already >>> fixed after Philipp version) ? >> >> I

[Xen-devel] [linux-next test] 33122: regressions - FAIL

2015-01-05 Thread xen . org
flight 33122 linux-next real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33122/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 33087 Regressions which are

[Xen-devel] Fw: Dataset for pre-copy while migrating VM???

2015-01-05 Thread Minalkumar Patel
i want to extract dirty page bitmap so it can able to make possible statistics of those pages - historical analysis i am forwarding previous email with this I request to give me little idea. How people use Xen hypervisor for this task on MATLAB/R language/Other tool On Friday, 2 January

[Xen-devel] [qemu-mainline bisection] complete test-amd64-i386-xl-qemuu-ovmf-amd64

2015-01-05 Thread xen . org
branch xen-unstable xen branch xen-unstable job test-amd64-i386-xl-qemuu-ovmf-amd64 test debian-hvm-install Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git Tree: qe

Re: [Xen-devel] [OSSTEST PATCH 3/4] Add nested testcase of installing L2 guest VM

2015-01-05 Thread Pang, LongtaoX
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: Thursday, December 11, 2014 7:44 PM > To: Pang, LongtaoX > Cc: xen-devel@lists.xen.org; ian.jack...@eu.citrix.com; > ian.campb...@citrix.com; wei.l...@citrix.com; Hu, Robert; Zheng, Di > Subject: Re: [OSSTEST PATCH

Re: [Xen-devel] [OSSTEST PATCH 4/4] Insert nested test job name and runvars into

2015-01-05 Thread Pang, LongtaoX
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: Thursday, December 11, 2014 7:46 PM > To: Pang, LongtaoX > Cc: xen-devel@lists.xen.org; ian.jack...@eu.citrix.com; > ian.campb...@citrix.com; wei.l...@citrix.com; Hu, Robert; Zheng, Di > Subject: Re: [OSSTEST PATCH

[Xen-devel] [linux-3.10 test] 33120: regressions - FAIL

2015-01-05 Thread xen . org
flight 33120 linux-3.10 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33120/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 5 libvirt-build fail REGR. vs. 26303 build-i386-libvirt

Re: [Xen-devel] [PATCH v2 0/5] vTPM: Xen stubdom vTPM for HVM virtual machine

2015-01-05 Thread Xu, Quan
> -Original Message- > From: Ian Campbell [mailto:ian.campb...@citrix.com] > Sent: Monday, January 05, 2015 9:21 PM > To: Xu, Quan > Cc: xen-devel@lists.xen.org; dgde...@tycho.nsa.gov; > samuel.thiba...@ens-lyon.org; ian.jack...@eu.citrix.com; > stefano.stabell...@eu.citrix.com; wei.l...@

Re: [Xen-devel] [PATCH v2 0/5] vTPM: Xen stubdom vTPM for HVM virtual machine

2015-01-05 Thread Xu, Quan
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: Monday, January 05, 2015 9:19 PM > To: Xu, Quan > Cc: xen-devel@lists.xen.org; dgde...@tycho.nsa.gov; > samuel.thiba...@ens-lyon.org; ian.jack...@eu.citrix.com; > stefano.stabell...@eu.citrix.com; ian.campb...@citri

Re: [Xen-devel] [PATCH xen-4.6] xen: Remove CONFIG_X86_SUPERVISOR_MODE_KERNEL as x86_32 builds are unsupported

2015-01-05 Thread Mukesh Rathor
On Mon, 5 Jan 2015 15:35:27 + Andrew Cooper wrote: > On 05/01/15 15:16, Ian Campbell wrote: > > On Fri, 2015-01-02 at 19:12 +, Andrew Cooper wrote: > >> supervisor_mode_kernel was an x86_32-only feature which permitted > >> a PV dom0 to run in ring 0, but at the expense of not being able

Re: [Xen-devel] [PATCH v2 2/5] vTPM: limit libxl__add_vtpms() function to para virtual machine

2015-01-05 Thread Xu, Quan
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: Monday, January 05, 2015 8:53 PM > To: Xu, Quan > Cc: xen-devel@lists.xen.org; ian.jack...@eu.citrix.com; > stefano.stabell...@eu.citrix.com; ian.campb...@citrix.com; > wei.l...@citrix.com > Subject: Re: [PATCH v2 2

Re: [Xen-devel] [Testday]Xen 4.5 RC4

2015-01-05 Thread Robert Hu
On Fri, 2015-01-02 at 16:47 +, Jan Beulich wrote: > >>> Boris Ostrovsky 12/26/14 9:12 PM >>> > >> On Thu, Dec 25, 2014 at 02:58:06AM +, Hu, Robert wrote: > >> Issue 1 -- detach a vt-d assigned device from guest, then reattach it to > >> guest, will fail. > >> http://lists.xen.org/archives

[Xen-devel] [PATCH v2 2/4] sysctl: Make XEN_SYSCTL_topologyinfo sysctl a little more efficient

2015-01-05 Thread Boris Ostrovsky
Instead of copying data for each field in xen_sysctl_topologyinfo separately put cpu/socket/node into a single structure and do a single copy for each processor. There is also no need to copy whole op to user at the end, max_cpu_index is sufficient Rename xen_sysctl_topologyinfo and XEN_SYSCTL_to

[Xen-devel] [PATCH v2 4/4] libxl: Add interface for querying hypervisor about PCI topology

2015-01-05 Thread Boris Ostrovsky
.. and use this new interface to display it along with CPU topology and NUMA information when 'xl info -n' command is issued Signed-off-by: Boris Ostrovsky --- tools/libxc/include/xenctrl.h |2 + tools/libxc/xc_misc.c | 18 ++ tools/libxl/libxl.c | 58 ++

[Xen-devel] [PATCH v2 3/4] sysctl: Add sysctl interface for querying PCI topology

2015-01-05 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- xen/common/sysctl.c | 60 +++ xen/include/public/sysctl.h | 35 - 2 files changed, 94 insertions(+), 1 deletions(-) diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c index 1254a24.

[Xen-devel] [PATCH v2 1/4] pci: Do not ignore device's PXM information

2015-01-05 Thread Boris Ostrovsky
If ACPI provides PXM data for IO devices then dom0 will pass it to hypervisor during PHYSDEVOP_pci_device_add call. This information, however, is currently ignored. We will store this information (in the form of nodeID) in pci_dev structure so that we can provide it, for example, to the toolstack

[Xen-devel] [PATCH v2 0/4] Display IO topology when PXM data is available

2015-01-05 Thread Boris Ostrovsky
Changes in v2: * Split topology sysctls into two --- one for CPU topology and the other for devices * Avoid long loops in the hypervisor by using continuations. (I am not particularly happy about using first_dev in the interface, suggestions for a better interface would be appreciated) * Use

[Xen-devel] [libvirt bisection] complete build-amd64-libvirt

2015-01-05 Thread xen . org
branch xen-unstable xen branch xen-unstable job build-amd64-libvirt test libvirt-build Tree: gnulib_libvirt git://drall.uk.xensource.com:9419/git://git.sv.gnu.org/gnulib.git%20[fetch=try] Tree: libvirt git://libvirt.org/libvirt.git Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git Tr

Re: [Xen-devel] RMRR Fix Design for Xen

2015-01-05 Thread Chen, Tiejun
On 2015/1/6 1:01, George Dunlap wrote: On Fri, Dec 19, 2014 at 1:21 AM, Tiejun Chen wrote: RMRR Fix Design for Xen This design is a goal to fix RMRR for Xen. It includes four sectors as follows: * Background * What is RMRR * Current RMRR Issues * Desig

Re: [Xen-devel] Parallel make supported?

2015-01-05 Thread Peter Kay
root[xen-4.5.0-rc4]# ls -l tools/xenstore/libxenstore* -rw-r--r-- 1 root root 98580 Dec 19 22:02 tools/xenstore/libxenstore.a -rwxr-xr-x 1 root root 82624 Dec 19 22:02 tools/xenstore/libxenstore.so.3.0.3 Please see output of make -d -C tools/xenstore init-xenstore-domain attached - it's quite long

Re: [Xen-devel] [Qemu-devel] bind interdomain ioctl error xen-kvm.c

2015-01-05 Thread Don Slutz
On 01/05/15 14:10, Rishi Ranjan wrote: > Hi Stefano, > Please find my answers inline. > > However Anthony (CC'ed) should have some patches for it. > Anthony, can you please share any patch that can help me with this? > > > Can you post the full output of the logs? > I h

Re: [Xen-devel] [RFC 2/2] x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader

2015-01-05 Thread Andy Lutomirski
On Mon, Jan 5, 2015 at 2:48 PM, Marcelo Tosatti wrote: > On Mon, Jan 05, 2015 at 02:38:46PM -0800, Andy Lutomirski wrote: >> On Mon, Jan 5, 2015 at 11:17 AM, Marcelo Tosatti wrote: >> > On Mon, Jan 05, 2015 at 10:56:07AM -0800, Andy Lutomirski wrote: >> >> On Mon, Jan 5, 2015 at 7:25 AM, Marcelo

Re: [Xen-devel] [RFC 2/2] x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader

2015-01-05 Thread Marcelo Tosatti
On Mon, Jan 05, 2015 at 02:38:46PM -0800, Andy Lutomirski wrote: > On Mon, Jan 5, 2015 at 11:17 AM, Marcelo Tosatti wrote: > > On Mon, Jan 05, 2015 at 10:56:07AM -0800, Andy Lutomirski wrote: > >> On Mon, Jan 5, 2015 at 7:25 AM, Marcelo Tosatti > >> wrote: > >> > On Mon, Dec 22, 2014 at 04:39:57

Re: [Xen-devel] [RFC 2/2] x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader

2015-01-05 Thread Andy Lutomirski
On Mon, Jan 5, 2015 at 11:17 AM, Marcelo Tosatti wrote: > On Mon, Jan 05, 2015 at 10:56:07AM -0800, Andy Lutomirski wrote: >> On Mon, Jan 5, 2015 at 7:25 AM, Marcelo Tosatti wrote: >> > On Mon, Dec 22, 2014 at 04:39:57PM -0800, Andy Lutomirski wrote: >> >> The pvclock vdso code was too abstracted

Re: [Xen-devel] [RFC 2/2] x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader

2015-01-05 Thread Marcelo Tosatti
On Mon, Jan 05, 2015 at 10:56:07AM -0800, Andy Lutomirski wrote: > On Mon, Jan 5, 2015 at 7:25 AM, Marcelo Tosatti wrote: > > On Mon, Dec 22, 2014 at 04:39:57PM -0800, Andy Lutomirski wrote: > >> The pvclock vdso code was too abstracted to understand easily and > >> excessively paranoid. Simplify

Re: [Xen-devel] [RFC 2/2] x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader

2015-01-05 Thread Paolo Bonzini
On 05/01/2015 19:56, Andy Lutomirski wrote: >> > 1) State: all pvtis marked as PVCLOCK_TSC_STABLE_BIT. >> > 1) Update request for all vcpus, for a TSC_STABLE_BIT -> ~TSC_STABLE_BIT >> > transition. >> > 2) vCPU-1 updates its pvti with new values. >> > 3) vCPU-0 still has not updated its pvti with

[Xen-devel] [PATCH v17 14/23] x86/VPMU: Initialize VPMUs with __initcall

2015-01-05 Thread Boris Ostrovsky
Move some VPMU initilization operations into __initcalls to avoid performing same tests and calculations for each vcpu. Signed-off-by: Boris Ostrovsky Tested-by: Dietmar Hahn --- xen/arch/x86/hvm/svm/vpmu.c | 112 xen/arch/x86/hvm/vmx/vpmu_core2.c | 151 ++

[Xen-devel] [PATCH v17 10/23] x86/VPMU: Add public xenpmu.h

2015-01-05 Thread Boris Ostrovsky
Add pmu.h header files, move various macros and structures that will be shared between hypervisor and PV guests to it. Move MSR banks out of architectural PMU structures to allow for larger sizes in the future. The banks are allocated immediately after the context and PMU structures store offsets

[Xen-devel] [PATCH v17 13/23] x86/VPMU: Interface for setting PMU mode and flags

2015-01-05 Thread Boris Ostrovsky
Add runtime interface for setting PMU mode and flags. Three main modes are provided: * XENPMU_MODE_OFF: PMU is not virtualized * XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts. * XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for non-proviledged guests, dom0 can profile itself

[Xen-devel] [PATCH v17 05/23] x86/VPMU: Make vpmu macros a bit more efficient

2015-01-05 Thread Boris Ostrovsky
Introduce vpmu_are_all_set that allows testing multiple bits at once. Convert macros into inlines for better compiler checking. Signed-off-by: Boris Ostrovsky Acked-by: Kevin Tian Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn --- xen/arch/x86/hvm/vmx/v

[Xen-devel] [PATCH v17 11/23] x86/VPMU: Make vpmu not HVM-specific

2015-01-05 Thread Boris Ostrovsky
vpmu structure will be used for both HVM and PV guests. Move it from hvm_vcpu to arch_vcpu. Signed-off-by: Boris Ostrovsky Acked-by: Jan Beulich Reviewed-by: Kevin Tian Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn --- xen/include/asm-x86/domain.h | 2 ++ xen/include/asm-x86/hvm/vcpu.h

[Xen-devel] [PATCH v17 07/23] vmx: Merge MSR management routines

2015-01-05 Thread Boris Ostrovsky
vmx_add_host_load_msr() and vmx_add_guest_msr() share fair amount of code. Merge them to simplify code maintenance. Signed-off-by: Boris Ostrovsky Acked-by: Kevin Tian Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn --- xen/arch/x86/hvm/vmx/vmcs.c

[Xen-devel] [PATCH v17 04/23] x86/VPMU: Set MSR bitmaps only for HVM/PVH guests

2015-01-05 Thread Boris Ostrovsky
In preparation for making VPMU code shared with PV make sure that we we update MSR bitmaps only for HVM/PVH guests Signed-off-by: Boris Ostrovsky Acked-by: Kevin Tian Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn --- xen/arch/x86/hvm/svm/vpmu.c |

[Xen-devel] [PATCH v17 19/23] x86/VPMU: Handle PMU interrupts for PV guests

2015-01-05 Thread Boris Ostrovsky
Add support for handling PMU interrupts for PV guests. VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush hypercall. This allows the guest to access PMU MSR values that are stored in VPMU context which is shared between hypervisor and domain, thus avoiding traps to hyper

[Xen-devel] [PATCH v17 01/23] common/symbols: Export hypervisor symbols to privileged guest

2015-01-05 Thread Boris Ostrovsky
Export Xen's symbols as {} triplet via new XENPF_get_symbol hypercall Signed-off-by: Boris Ostrovsky Acked-by: Daniel De Graaf Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn --- xen/arch/x86/platform_hypercall.c | 28 +++ xen/common/sym

[Xen-devel] [PATCH v17 00/23] x86/PMU: Xen PMU PV(H) support

2015-01-05 Thread Boris Ostrovsky
Version 17 of PV(H) PMU patches. Changes in v17: * Disable VPMU when unknown CPU vendor is detected (patch #2) * Remove unnecessary vendor tests in vendor-specific init routines (patch #14) * Remember first CPU that starts mode change and use it to stop the cycle (patch #13) * If vpmu ops is not

[Xen-devel] [PATCH v17 22/23] x86/VPMU: NMI-based VPMU support

2015-01-05 Thread Boris Ostrovsky
Add support for using NMIs as PMU interrupts to allow profiling hypervisor when interrupts are disabled. Most of processing is still performed by vpmu_do_interrupt(). However, since certain operations are not NMI-safe we defer them to a softint that vpmu_do_interrupt() will schedule: * For PV gue

[Xen-devel] [PATCH v17 23/23] x86/VPMU: Move VPMU files up from hvm/ directory

2015-01-05 Thread Boris Ostrovsky
Since PMU is now not HVM specific we can move VPMU-related files up from arch/x86/hvm/ directory. Specifically: arch/x86/hvm/vpmu.c -> arch/x86/cpu/vpmu.c arch/x86/hvm/svm/vpmu.c -> arch/x86/cpu/vpmu_amd.c arch/x86/hvm/vmx/vpmu_core2.c -> arch/x86/cpu/vpmu_intel.c include/asm-x86/h

[Xen-devel] [PATCH v17 18/23] x86/VPMU: Add support for PMU register handling on PV guests

2015-01-05 Thread Boris Ostrovsky
Intercept accesses to PMU MSRs and process them in VPMU module. If vpmu ops for VCPU are not initialized (which is the case, for example, for PV guests that are not "VPMU-enlightened") access to MSRs will return failure. Dump VPMU state for all domains (HVM and PV) when requested. Signed-off-by:

[Xen-devel] [PATCH v17 15/23] x86/VPMU: Initialize PMU for PV(H) guests

2015-01-05 Thread Boris Ostrovsky
Code for initializing/tearing down PMU for PV guests Signed-off-by: Boris Ostrovsky Acked-by: Kevin Tian Acked-by: Jan Beulich Acked-by: Daniel De Graaf Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn --- tools/flask/policy/policy/modules/xen/xen.te |

[Xen-devel] [PATCH v17 09/23] intel/VPMU: MSR_CORE_PERF_GLOBAL_CTRL should be initialized to zero

2015-01-05 Thread Boris Ostrovsky
MSR_CORE_PERF_GLOBAL_CTRL register should be set zero initially. It is up to the guest to set it so that counters are enabled. Signed-off-by: Boris Ostrovsky Acked-by: Kevin Tian Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn --- xen/arch/x86/hvm/vmx/vpmu_core2.c | 11 +-- 1 file c

[Xen-devel] [PATCH v17 12/23] x86/VPMU: Replace vcpu with vpmu as argument to some routines

2015-01-05 Thread Boris Ostrovsky
A subsequent patch will add an inline routine to vpmu.h that will call vpmu_load(). This inline will try to access vcpu->vpmu which is not possible since struct vcpu may not be fully defined at that point. So we will have that inline pass vpmu pointer to vpmu_load() instead. This change slightly

[Xen-devel] [PATCH v17 21/23] x86/VPMU: Add privileged PMU mode

2015-01-05 Thread Boris Ostrovsky
Add support for privileged PMU mode (XENPMU_MODE_ALL) which allows privileged domain (dom0) profile both itself (and the hypervisor) and the guests. While this mode is on profiling in guests is disabled. Signed-off-by: Boris Ostrovsky Acked-by: Jan Beulich Reviewed-by: Konrad Rzeszutek Wilk Rev

[Xen-devel] [PATCH v17 06/23] intel/VPMU: Clean up Intel VPMU code

2015-01-05 Thread Boris Ostrovsky
Remove struct pmumsr and core2_pmu_enable. Replace static MSR structures with fields in core2_vpmu_context. Call core2_get_pmc_count() once, during initialization. Properly clean up when core2_vpmu_alloc_resource() fails. Signed-off-by: Boris Ostrovsky Acked-by: Kevin Tian Reviewed-by: Dietmar

[Xen-devel] [PATCH v17 17/23] x86/VPMU: When handling MSR accesses, leave fault injection to callers

2015-01-05 Thread Boris Ostrovsky
With this patch return value of 1 of vpmu_do_msr() will now indicate whether an error was encountered during MSR processing (instead of stating that the access was to a VPMU register). As part of this patch we also check for validity of certain MSR accesses right when we determine which register i

[Xen-devel] [PATCH v17 03/23] x86/VPMU: Manage VPMU_CONTEXT_SAVE flag in vpmu_save_force()

2015-01-05 Thread Boris Ostrovsky
There is a possibility that we set VPMU_CONTEXT_SAVE on VPMU context in vpmu_load() and never clear it (because vpmu_save_force() will see VPMU_CONTEXT_LOADED bit clear, which is possible on AMD processors) The problem is that amd_vpmu_save() assumes that if VPMU_CONTEXT_SAVE is set then (1) we ne

[Xen-devel] [PATCH v17 02/23] x86/VPMU: Don't globally disable VPMU if initialization fails.

2015-01-05 Thread Boris Ostrovsky
The failure to initialize VPMU may be temporary so we shouldn'd disable VMPU forever. Signed-off-by: Boris Ostrovsky Reported-by: Jan Beulich --- xen/arch/x86/hvm/vpmu.c | 21 + 1 file changed, 13 insertions(+), 8 deletions(-) diff --git a/xen/arch/x86/hvm/vpmu.c b/xen/arch

[Xen-devel] [PATCH v17 08/23] x86/VPMU: Handle APIC_LVTPC accesses

2015-01-05 Thread Boris Ostrovsky
Don't have the hypervisor update APIC_LVTPC when _it_ thinks the vector should be updated. Instead, handle guest's APIC_LVTPC accesses and write what the guest explicitly wanted. Signed-off-by: Boris Ostrovsky Acked-by: Kevin Tian Acked-by: Jan Beulich Reviewed-by: Dietmar Hahn Tested-by: Diet

[Xen-devel] [PATCH v17 20/23] x86/VPMU: Merge vpmu_rdmsr and vpmu_wrmsr

2015-01-05 Thread Boris Ostrovsky
The two routines share most of their logic. Signed-off-by: Boris Ostrovsky --- xen/arch/x86/hvm/vpmu.c| 77 -- xen/include/asm-x86/hvm/vpmu.h | 14 ++-- 2 files changed, 42 insertions(+), 49 deletions(-) diff --git a/xen/arch/x86/hvm/vpmu.c b/

[Xen-devel] [PATCH v17 16/23] x86/VPMU: Save VPMU state for PV guests during context switch

2015-01-05 Thread Boris Ostrovsky
Save VPMU state during context switch for both HVM and PV(H) guests. A subsequent patch ("x86/VPMU: NMI-based VPMU support") will make it possible for vpmu_switch_to() to call vmx_vmcs_try_enter()->vcpu_pause() which needs is_running to be correctly set/cleared. To prepare for that, call context_

Re: [Xen-devel] [PATCH 0/7 v3] tools/hotplug: systemd changes for 4.5

2015-01-05 Thread Konrad Rzeszutek Wilk
On Wed, Dec 31, 2014 at 10:31:06AM -0500, Konrad Rzeszutek Wilk wrote: > On Mon, Dec 22, 2014 at 09:06:40AM +0100, Olaf Hering wrote: > > On Fri, Dec 19, Konrad Rzeszutek Wilk wrote: > > > > > On Fri, Dec 19, 2014 at 12:25:26PM +0100, Olaf Hering wrote: > > > > This is a resend of these two series

Re: [Xen-devel] [PATCH v16 13/23] x86/VPMU: Interface for setting PMU mode and flags

2015-01-05 Thread Daniel De Graaf
On 12/17/2014 10:38 AM, Boris Ostrovsky wrote: Add runtime interface for setting PMU mode and flags. Three main modes are provided: * XENPMU_MODE_OFF: PMU is not virtualized * XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts. * XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for

Re: [Xen-devel] [PATCH v16 15/23] x86/VPMU: Initialize PMU for PV(H) guests

2015-01-05 Thread Daniel De Graaf
On 12/17/2014 10:38 AM, Boris Ostrovsky wrote: Code for initializing/tearing down PMU for PV guests Signed-off-by: Boris Ostrovsky Acked-by: Kevin Tian Acked-by: Jan Beulich Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn Acked-by: Daniel De Graaf _

[Xen-devel] Xen 4.5 Development Update (GA slip by a week)

2015-01-05 Thread konrad . wilk
Xen 4.5-rc4 was out on Monday (Dec 15th). The GA General Release is on Jan 7th^H^H^14th! There are some outstanding patches on which we need to figure out whether we will commit them in or not. When we commit a patch in, the OSSTest takes a day or so to push it to 'master' - and if it fails durin

[Xen-devel] [linux-linus test] 33115: regressions - FAIL

2015-01-05 Thread xen . org
flight 33115 linux-linus real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33115/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-libvirt5 libvirt-build fail REGR. vs. 32879 build-amd64-libvirt

Re: [Xen-devel] [RFC 2/2] x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader

2015-01-05 Thread Andy Lutomirski
On Mon, Jan 5, 2015 at 7:25 AM, Marcelo Tosatti wrote: > On Mon, Dec 22, 2014 at 04:39:57PM -0800, Andy Lutomirski wrote: >> The pvclock vdso code was too abstracted to understand easily and >> excessively paranoid. Simplify it for a huge speedup. >> >> This opens the door for additional simplifi

Re: [Xen-devel] Writable page tables questions

2015-01-05 Thread Andrew Cooper
On 04/01/2015 17:17, Junji Zhi wrote: > Hi, > > I'm Junji, a newbie in Xen and hoping I can contribute to the > community one day. I have a few questions regarding the writable page > tables, while reading The Definitive Guide to the Xen Hypervisor by > David Chisnall: > > 1. Writable page tables i

Re: [Xen-devel] RMRR Fix Design for Xen

2015-01-05 Thread George Dunlap
On Fri, Dec 19, 2014 at 1:21 AM, Tiejun Chen wrote: > RMRR Fix Design for Xen > > This design is a goal to fix RMRR for Xen. It includes four sectors as > follows: > > * Background > * What is RMRR > * Current RMRR Issues > * Design Overview > > We hope this can

Re: [Xen-devel] [PATCH for-4.5 v2] libxl: Initialise CTX->xce in domain suspend [and 2 more messages]

2015-01-05 Thread Ian Jackson
Ian Jackson writes ("Re: [PATCH for-4.5 v2] libxl: Initialise CTX->xce in domain suspend"): > Konrad: this should go in 4.5 because it is a bugfix without which > libxl may dereference NULL. ... Ian Campbell writes ("Re: [PATCH for-4.5 v2] libxl: Initialise CTX->xce in domain suspend"): > Acked-

Re: [Xen-devel] [PATCH for-4.5] libxl: Fix if{} nesting in do_pci_remove [and 1 more messages]

2015-01-05 Thread Ian Jackson
> Acked-by: Ian Campbell > RElease-Acked-by: Konrad Rzeszutek Wilk Pushed, thanks. Ian. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 0/2] VT-d: extend XSA-59 workaround

2015-01-05 Thread Konrad Rzeszutek Wilk
On Mon, Jan 05, 2015 at 04:28:02PM +, Dugger, Donald D wrote: > Working to resolve this issue, I hope to have a definitive answer by the end > of this week. OK, so past Xen 4.5 release. thanks! > > -- > Don Dugger > "Censeo Toto nos in Kansa esse decisse." - D. Gale > Ph: 303/443-3786 > > -

Re: [Xen-devel] [PATCH for-4.5] libxl: Fix if{} nesting in do_pci_remove

2015-01-05 Thread Konrad Rzeszutek Wilk
On Mon, Jan 05, 2015 at 04:34:36PM +, Ian Jackson wrote: > From: Ian Jackson > > do_pci_remove contained this: > > if (type == LIBXL_DOMAIN_TYPE_HVM) { >[stuff] > } else if (type != LIBXL_DOMAIN_TYPE_PV) > abort(); > { > > This is bizarre, and not correct. The e

Re: [Xen-devel] [PATCH for-4.5] libxl: Fix if{} nesting in do_pci_remove

2015-01-05 Thread Ian Campbell
On Mon, 2015-01-05 at 16:34 +, Ian Jackson wrote: > From: Ian Jackson > > do_pci_remove contained this: > > if (type == LIBXL_DOMAIN_TYPE_HVM) { >[stuff] > } else if (type != LIBXL_DOMAIN_TYPE_PV) > abort(); > { > > This is bizarre, and not correct. The effect i

[Xen-devel] [PATCH for-4.5] libxl: Fix if{} nesting in do_pci_remove

2015-01-05 Thread Ian Jackson
From: Ian Jackson do_pci_remove contained this: if (type == LIBXL_DOMAIN_TYPE_HVM) { [stuff] } else if (type != LIBXL_DOMAIN_TYPE_PV) abort(); { This is bizarre, and not correct. The effect is that HVM guests end up running both the proper code and that intended for

Re: [Xen-devel] [PATCH v4 for 4.5] x86/VPMU: Clear last_vcpu when destroying VPMU

2015-01-05 Thread Konrad Rzeszutek Wilk
On Thu, Dec 18, 2014 at 01:06:40PM -0500, Boris Ostrovsky wrote: > We need to make sure that last_vcpu is not pointing to VCPU whose > VPMU is being destroyed. Otherwise we may try to dereference it in > the future, when VCPU is gone. > > We have to do this via IPI since otherwise there is a (some

Re: [Xen-devel] [PATCH 0/2] VT-d: extend XSA-59 workaround

2015-01-05 Thread Dugger, Donald D
Working to resolve this issue, I hope to have a definitive answer by the end of this week. -- Don Dugger "Censeo Toto nos in Kansa esse decisse." - D. Gale Ph: 303/443-3786 -Original Message- From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] Sent: Monday, January 5, 2015 9:27

Re: [Xen-devel] [PATCH 0/2] VT-d: extend XSA-59 workaround

2015-01-05 Thread Konrad Rzeszutek Wilk
On Fri, Dec 19, 2014 at 08:31:51AM +, Jan Beulich wrote: > The endless story continues. Intel maintainers, are you folks OK with these patches? >From my perspective: Release-Acked-by: Konrad Rzeszutek Wilk > > > 1: make XSA-59 workaround fully cover XeonE5/E7 v2 > 2: extend XSA-59 workaroun

Re: [Xen-devel] [PATCH] xen: arm: correct off-by-one error in consider_modules

2015-01-05 Thread Konrad Rzeszutek Wilk
On Mon, Dec 22, 2014 at 11:54:01AM +0100, Julien Grall wrote: > Hi Ian, > > On 21/12/2014 12:18, Ian Campbell wrote: > >By iterating up to <= mi->nr_mods we are running off the end of the boot > >modules, but more importantly it causes us to then skip the first FDT > >reserved > >region, meaning

Re: [Xen-devel] [PATCH xen-4.6] xen: Remove CONFIG_X86_SUPERVISOR_MODE_KERNEL as x86_32 builds are unsupported

2015-01-05 Thread Ian Campbell
On Mon, 2015-01-05 at 16:07 +, Andrew Cooper wrote: > >> What usecase was supervisor_mode_kernel developed for? It seems > >> counter-intuitive, but I can't find anything in the history explaining > >> its use. > > It was a prototype from the pre-pvops days to see if it would be > > feasible t

Re: [Xen-devel] [PATCH xen-4.6] xen: Remove CONFIG_X86_SUPERVISOR_MODE_KERNEL as x86_32 builds are unsupported

2015-01-05 Thread Andrew Cooper
On 05/01/15 15:41, Ian Campbell wrote: > On Mon, 2015-01-05 at 15:35 +, Andrew Cooper wrote: >> Answering out-of-order >> >> This patch has no functional change WRT PVH. The hunk commented on is >> simply changed via indentation due to the removal of the conditional it >> is in. It was never

Re: [Xen-devel] [v3 1/5] Qemu-Xen-vTPM: Support for Xen stubdom vTPM command line options

2015-01-05 Thread Eric Blake
On 12/30/2014 04:02 PM, Quan Xu wrote: > Signed-off-by: Quan Xu This message was missing an In-Reply-To header tying it to the 0/5 cover letter, making it show up as an independent thread. Please see if you can fix that for the next submission. > --- > configure| 14 ++ > h

Re: [Xen-devel] [PATCH v2 1/5] vTPM: event channel bind interdomain with para/hvm virtual machine

2015-01-05 Thread Daniel De Graaf
On 12/30/2014 11:44 PM, Quan Xu wrote:[...] diff --git a/extras/mini-os/tpmback.c b/extras/mini-os/tpmback.c [...] + domid = (domtype == T_DOMAIN_TYPE_HVM) ? 0 : tpmif->domid; Unless I'm missing something, this still assumes that the HVM device model is located in domain 0, and so it will n

Re: [Xen-devel] [PATCH] xc Python ext lib: Xen 4.6 Unable to start a 2T guest without OverflowError

2015-01-05 Thread Konrad Rzeszutek Wilk
On Tue, Dec 23, 2014 at 02:04:28PM -0500, Cathy Avery wrote: > Starting a vm with memory over 2T resulted in an overflow error. > > memory = 2097152 defined as number of megabytes returns the error > "OverflowError: signed integer is greater than maximum" > > The error is the result of the python

[Xen-devel] [rumpuserxen test] 33116: all pass - PUSHED

2015-01-05 Thread xen . org
flight 33116 rumpuserxen real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33116/ Perfect :-) All tests in this flight passed version targeted for testing: rumpuserxen 21a3f2f128032fa5450f5693c3d00d82fc693123 baseline version: rumpuserxen 21689d533b9e90721fc8679c2794

Re: [Xen-devel] Parallel make supported?

2015-01-05 Thread Ian Campbell
On Mon, 2014-12-29 at 13:01 +, Wei Liu wrote: > Please don't top post. > > On Fri, Dec 19, 2014 at 10:09:31PM +, Peter Kay wrote: > > Thanks, see attached : > > > > This is on Salix 14.1 running the 3.17.4 kernel. That's not particularly > > relevant though, as I had exactly the same erro

Re: [Xen-devel] Crash on efi_reset_machine on Lenovo ThinkCentre m93 (Haswell)

2015-01-05 Thread Andrew Cooper
On 05/01/15 15:04, Konrad Rzeszutek Wilk wrote: > The BIOS on the machine is: > > DMI: LENOVO 10A6S09R01/SHARKBAY, BIOS FBKTA4AUS 12/11/2014 > > (just flashed it today - earlier versions had the same issue) > > And with both Xen 4.4 and Xen 4.5 when rebooting from EFI > I get: > > > [ 35.278564]

Re: [Xen-devel] Is: Fixes for xl pci-attach for Xen 4.5 confirmed to fix by Intel.Was:Re: [TestDay] VMX test report for Xen 4.5.0-rc1

2015-01-05 Thread Ian Jackson
Boris Ostrovsky writes ("Re: [Xen-devel] Is: Fixes for xl pci-attach for Xen 4.5 confirmed to fix by Intel.Was:Re: [TestDay] VMX test report for Xen 4.5.0-rc1"): > On 01/05/2015 10:27 AM, Konrad Rzeszutek Wilk wrote: > > Ian, were you waiting on Boris to repost the patches? Yes. > I wasn't plan

Re: [Xen-devel] [PATCH OSSTEST v3] ts-libvirt-build: use Osstest::BuildSupport::submodulefixup

2015-01-05 Thread Ian Campbell
On Mon, 2015-01-05 at 15:36 +, Ian Campbell wrote: > Instead of cloning gnulib manually which can break if upstream gnulib > gets ahead of libvirt.git (which applies patches on the fly etc). By > using submodulefixup we automatically DTRT and use the version of > gnulib specified by the libvirt

Re: [Xen-devel] Is: Fixes for xl pci-attach for Xen 4.5 confirmed to fix by Intel.Was:Re: [TestDay] VMX test report for Xen 4.5.0-rc1

2015-01-05 Thread Boris Ostrovsky
On 01/05/2015 10:27 AM, Konrad Rzeszutek Wilk wrote: On Mon, Jan 05, 2015 at 12:48:16PM +, George Dunlap wrote: On Thu, Dec 18, 2014 at 4:55 AM, Hu, Robert wrote: For this specific problem though I think http://lists.xen.org/archives/html/xen-devel/2014-11/msg01342.html We verified this

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2015-01-05 Thread George Dunlap
On Fri, Dec 12, 2014 at 6:29 AM, Tian, Kevin wrote: >> We're not there in the current design, purely because XenGT has to be >> in dom0 (so it can trivially DoS Xen by rebooting the host). > > Can we really decouple dom0 from DoS Xen? I know there's on-going effort > like PVH Dom0, however there a

Re: [Xen-devel] [PATCH for-4.5] tools/libxl: Use of init()/dispose() to avoid leaking libxl_dominfo.ssid_label

2015-01-05 Thread Konrad Rzeszutek Wilk
On Mon, Jan 05, 2015 at 02:19:58PM +, Andrew Cooper wrote: > libxl_dominfo contains a ssid_label pointer which will have memory allocated > for it in libxl_domain_info() if the hypervisor has CONFIG_XSM compiled. > However, the lack of appropriate use of libxl_dominfo_{init,dispose}() will > ca

Re: [Xen-devel] Is: Fixes for xl pci-attach for Xen 4.5 confirmed to fix by Intel.Was:Re: [TestDay] VMX test report for Xen 4.5.0-rc1

2015-01-05 Thread Konrad Rzeszutek Wilk
On Mon, Jan 05, 2015 at 12:48:16PM +, George Dunlap wrote: > On Thu, Dec 18, 2014 at 4:55 AM, Hu, Robert wrote: > >> > >> For this specific problem though I think > >> > >> http://lists.xen.org/archives/html/xen-devel/2014-11/msg01342.html > > We verified this on RC4, it works. > > Will your p

Re: [Xen-devel] [PATCH for-4.5 v2] libxl: Initialise CTX->xce in domain suspend

2015-01-05 Thread Konrad Rzeszutek Wilk
On Mon, Jan 05, 2015 at 02:35:37PM +, Ian Jackson wrote: > Yang Hongyang writes ("[PATCH] xl/libxl: fix migrate/Remus regression (core > dumped)"): > > When excuting xl migrate/Remus, the following error occurd: > > [root@master xen]# xl migrate 5 slaver > > migration target: Ready to receive

[Xen-devel] Crash on efi_reset_machine on Lenovo ThinkCentre m93 (Haswell)

2015-01-05 Thread Konrad Rzeszutek Wilk
The BIOS on the machine is: DMI: LENOVO 10A6S09R01/SHARKBAY, BIOS FBKTA4AUS 12/11/2014 (just flashed it today - earlier versions had the same issue) And with both Xen 4.4 and Xen 4.5 when rebooting from EFI I get: [ 35.278564] reboot: Restarting system (XEN) Domain 0 shutdown: rebooting mac

Re: [Xen-devel] [PATCH xen-4.6] xen: Remove CONFIG_X86_SUPERVISOR_MODE_KERNEL as x86_32 builds are unsupported

2015-01-05 Thread Ian Campbell
On Mon, 2015-01-05 at 15:35 +, Andrew Cooper wrote: > Answering out-of-order > > This patch has no functional change WRT PVH. The hunk commented on is > simply changed via indentation due to the removal of the conditional it > is in. It was never been possible for a PVH kernel boot with > "!

[Xen-devel] [PATCH OSSTEST v3] ts-libvirt-build: use Osstest::BuildSupport::submodulefixup

2015-01-05 Thread Ian Campbell
Instead of cloning gnulib manually which can break if upstream gnulib gets ahead of libvirt.git (which applies patches on the fly etc). By using submodulefixup we automatically DTRT and use the version of gnulib specified by the libvirt.git submodule metadata, but with a runvar override if necessar

Re: [Xen-devel] [PATCH v2] x86/xen: avoid freeing static 'name' when kasprintf() fails

2015-01-05 Thread Laszlo Ersek
On 01/05/15 16:27, Vitaly Kuznetsov wrote: > In case kasprintf() fails in xen_setup_timer() we assign name to the static > string "". We, however, don't check that fact before > issuing kfree() in xen_teardown_timer(), kernel is supposed to crash with > 'kernel BUG at mm/slub.c:3341!' > > Solve th

Re: [Xen-devel] [PATCH xen-4.6] xen: Remove CONFIG_X86_SUPERVISOR_MODE_KERNEL as x86_32 builds are unsupported

2015-01-05 Thread Andrew Cooper
On 05/01/15 15:16, Ian Campbell wrote: > On Fri, 2015-01-02 at 19:12 +, Andrew Cooper wrote: >> supervisor_mode_kernel was an x86_32-only feature which permitted a PV dom0 >> to >> run in ring 0, but at the expense of not being able to start any domUs. >> >> As the x86_32 Xen build has been re

[Xen-devel] [PATCH v2] x86/xen: avoid freeing static 'name' when kasprintf() fails

2015-01-05 Thread Vitaly Kuznetsov
In case kasprintf() fails in xen_setup_timer() we assign name to the static string "". We, however, don't check that fact before issuing kfree() in xen_teardown_timer(), kernel is supposed to crash with 'kernel BUG at mm/slub.c:3341!' Solve the issue by making name a fixed length string inside str

Re: [Xen-devel] [RFC 2/2] x86, vdso, pvclock: Simplify and speed up the vdso pvclock reader

2015-01-05 Thread Marcelo Tosatti
On Mon, Dec 22, 2014 at 04:39:57PM -0800, Andy Lutomirski wrote: > The pvclock vdso code was too abstracted to understand easily and > excessively paranoid. Simplify it for a huge speedup. > > This opens the door for additional simplifications, as the vdso no > longer accesses the pvti for any vc

Re: [Xen-devel] patch ping

2015-01-05 Thread Konrad Rzeszutek Wilk
On Fri, Dec 19, 2014 at 01:13:41PM -0500, Konrad Rzeszutek Wilk wrote: > On Fri, Dec 19, 2014 at 01:48:18PM +, Jan Beulich wrote: > > Konrad, > > > > any word on > > http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg01253.html > > Release-Acked-by: Konrad Rzeszutek Wilk > > http

Re: [Xen-devel] [PATCH xen-4.6] xen: Remove CONFIG_X86_SUPERVISOR_MODE_KERNEL as x86_32 builds are unsupported

2015-01-05 Thread Ian Campbell
On Fri, 2015-01-02 at 19:12 +, Andrew Cooper wrote: > supervisor_mode_kernel was an x86_32-only feature which permitted a PV dom0 to > run in ring 0, but at the expense of not being able to start any domUs. > > As the x86_32 Xen build has been removed from tree, removing the remaining > superv

[Xen-devel] [PATCH OSSTEST v2] ts-libvirt-build: use Osstest::BuildSupport::submodulefixup

2015-01-05 Thread Ian Campbell
Instead of cloning gnulib manually which can break if upstream gnulib gets ahead of libvirt.git (which applies patches on the fly etc). By using submodulefixup we automatically DTRT and use the version of gnulib specified by the libvirt.git submodule metadata, but with a runvar override if necessar

Re: [Xen-devel] [PATCH for-4.5 v2] libxl: Initialise CTX->xce in domain suspend

2015-01-05 Thread Ian Campbell
On Mon, 2015-01-05 at 14:35 +, Ian Jackson wrote: > Yang Hongyang writes ("[PATCH] xl/libxl: fix migrate/Remus regression (core > dumped)"): > > When excuting xl migrate/Remus, the following error occurd: > > [root@master xen]# xl migrate 5 slaver > > migration target: Ready to receive domain.

Re: [Xen-devel] [PATCH for-4.5] tools/libxl: Use of init()/dispose() to avoid leaking libxl_dominfo.ssid_label

2015-01-05 Thread Wei Liu
On Mon, Jan 05, 2015 at 02:19:58PM +, Andrew Cooper wrote: > libxl_dominfo contains a ssid_label pointer which will have memory allocated > for it in libxl_domain_info() if the hypervisor has CONFIG_XSM compiled. > However, the lack of appropriate use of libxl_dominfo_{init,dispose}() will > ca

Re: [Xen-devel] [PATCH for-4.5 v2] libxl: Initialise CTX->xce in domain suspend

2015-01-05 Thread Ian Jackson
Yang Hongyang writes ("[PATCH] xl/libxl: fix migrate/Remus regression (core dumped)"): > When excuting xl migrate/Remus, the following error occurd: > [root@master xen]# xl migrate 5 slaver > migration target: Ready to receive domain. > Saving to migration stream new xl format (info 0x1/0x0/1225)

[Xen-devel] [PATCH for-4.5] tools/libxl: Use of init()/dispose() to avoid leaking libxl_dominfo.ssid_label

2015-01-05 Thread Andrew Cooper
libxl_dominfo contains a ssid_label pointer which will have memory allocated for it in libxl_domain_info() if the hypervisor has CONFIG_XSM compiled. However, the lack of appropriate use of libxl_dominfo_{init,dispose}() will cause the label string to be leaked, even in success cases. This was dis

Re: [Xen-devel] [PATCH] x86/xen: avoid freeing static 'name' when kasprintf() fails

2015-01-05 Thread Laszlo Ersek
On 01/05/15 14:19, David Vrabel wrote: > On 05/01/15 13:06, Vitaly Kuznetsov wrote: >> In case kasprintf() fails in xen_setup_timer() we assign name to the static >> string "". We, however, don't check that fact before >> issuing kfree() in xen_teardown_timer(), kernel is supposed to crash with >>

[Xen-devel] [xen-unstable test] 33112: regressions - FAIL

2015-01-05 Thread xen . org
flight 33112 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33112/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 5 libvirt-build fail REGR. vs. 32877 build-amd64-libvirt

Re: [Xen-devel] [PATCH v2 0/5] vTPM: Xen stubdom vTPM for HVM virtual machine

2015-01-05 Thread Ian Campbell
On Mon, 2015-01-05 at 13:18 +, Wei Liu wrote: > FWIW in the future please configure git to chain all your patches to one > thread. :-) > > What I usually do is to > > git format-patch HEAD~NNN --cover --subject-prefix='PATCH vXX' > ... edit -cover-letter.patch ... > git send-email --to xe

  1   2   >