Re: [Xen-devel] [PATCH v8 4/7] xen: Add vmware_port support

2015-02-16 Thread Jan Beulich
>>> On 11.02.15 at 18:04, wrote: > On 11/02/15 07:56, Jan Beulich wrote: > On 10.02.15 at 20:30, wrote: >>> While coding this is up I have hit issues that I need input on: >>> >>> As a HVM_PARAM_ item, I would assume I should be following >>> what HVM_PARAM_VIRIDIAN does. It has this comment

Re: [Xen-devel] [RFC v1 0/8] xen: kconfig changes

2015-02-16 Thread Juergen Gross
On 02/17/2015 01:20 AM, Luis R. Rodriguez wrote: On Thu, Feb 12, 2015 at 3:07 AM, David Vrabel wrote: On 12/02/15 06:03, Luis R. Rodriguez wrote: From: "Luis R. Rodriguez" Here's the first shot at the Kconfig changes for Xen as discussed on the mailing list a little while ago [0]. Let me kno

Re: [Xen-devel] [RFC v1 0/8] xen: kconfig changes

2015-02-16 Thread Juergen Gross
On 02/17/2015 01:25 AM, Luis R. Rodriguez wrote: On Mon, Feb 16, 2015 at 4:20 PM, Luis R. Rodriguez wrote: As it is per our agreed upon changes we can in theory enable a XEN_PVHVM system without XEN_PV or XEN_PVH. If this is indeed desirable this poses an issue at build time And this also rai

[Xen-devel] [PATCH V2 3/3] xen: support suspend/resume in pvscsi frontend

2015-02-16 Thread Juergen Gross
Up to now the pvscsi frontend hasn't supported domain suspend and resume. When a domain with an assigned pvscsi device was suspended and resumed again, it was not able to use the device any more: trying to do so resulted in hanging processes. Support suspend and resume of pvscsi devices. Signed-o

[Xen-devel] [PATCH V2 0/3] xen: pvscsi: avoid race, support suspend/resume

2015-02-16 Thread Juergen Gross
In the pvscsi backend copy the frontend request to ensure it is not changed by the frontend during processing it in the backend. Support suspend/resume of the domain to be able to access a pvscsi device n the frontend afterwards. Changes in V2: - changed scsiback_do_cmd_fn() as sugested by Jan Be

[Xen-devel] [PATCH V2 2/3] xen: scsiback: add LUN of restored domain

2015-02-16 Thread Juergen Gross
When a xen domain is being restored the LUN state of a pvscsi device is "Connected" and not "Initialising" as in case of attaching a new pvscsi LUN. This must be taken into account when adding a new pvscsi device for a domain as otherwise the pvscsi LUN won't be connected to the SCSI target associ

[Xen-devel] [PATCH V2 1/3] xen: mark pvscsi frontend request consumed only after last read

2015-02-16 Thread Juergen Gross
A request in the ring buffer mustn't be read after it has been marked as consumed. Otherwise it might already have been reused by the frontend without violating the ring protocol. To avoid inconsistencies in the backend only work on a private copy of the request. This will ensure a malicious guest

[Xen-devel] [PATCH v4] modify the IO_TLB_SEGSIZE and IO_TLB_DEFAULT_SIZE configurable as flexible requirement about SW-IOMMU.

2015-02-16 Thread Wang Xiaoming
The maximum of SW-IOMMU is limited to 2^11*128 = 256K. And the size of IO_TLB_DEFAULT_SIZE is limited to (64UL<<20) 64M. While in different platform and different requirement this seems improper. So modifing the IO_TLB_SEGSIZE to io_tlb_segsize and IO_TLB_DEFAULT_SIZE to io_tlb_default_size which c

[Xen-devel] [RFC PATCH] xen/arm: Vmap allocator fails to allocate beyond 128M

2015-02-16 Thread Vijay Kilari
In vmap_init, map_pages_to_xen() is called for mapping vm_bitmap. Initially one page of vm_bitmap is allocated and mapped using PAGE_HYPERVISOR attribute. For the rest of vm_bitmap pages, MAP_SMALL_PAGES attribute is used to map. In ARM for both PAGE_HYPERVISOR and MAP_SMALL_PAGES, valid bit is se

[Xen-devel] [linux-3.10 test] 34605: regressions - FAIL

2015-02-16 Thread xen . org
flight 34605 linux-3.10 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34605/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303 Tests which are failin

[Xen-devel] [rumpuserxen test] 34615: regressions - FAIL

2015-02-16 Thread xen . org
flight 34615 rumpuserxen real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34615/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-rumpuserxen6 xen-build fail REGR. vs. 33866 build-amd64-rumpuserx

[Xen-devel] [linux-3.16 test] 34602: regressions - FAIL

2015-02-16 Thread xen . org
flight 34602 linux-3.16 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34602/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-credit2 15 guest-localmigrate/x10fail REGR. vs. 34167 test-amd64-i386-pair

Re: [Xen-devel] [PATCH OSSTEST 11/12] Changes on test step of debain hvm guest install

2015-02-16 Thread Hu, Robert
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: Monday, February 16, 2015 6:17 PM > To: Hu, Robert > Cc: Ian Jackson; xen-devel@lists.xen.org; jfeh...@suse.com; > wei.l...@citrix.com; ian.campb...@citrix.com; Pang, LongtaoX > Subject: Re: [PATCH OSSTEST 11/12] Cha

Re: [Xen-devel] [RFC v1 0/8] xen: kconfig changes

2015-02-16 Thread Luis R. Rodriguez
On Mon, Feb 16, 2015 at 4:20 PM, Luis R. Rodriguez wrote: > As it is per our agreed upon changes we can in theory enable a > XEN_PVHVM system without XEN_PV or XEN_PVH. If this is indeed > desirable this poses an issue at build time And this also raises the question of whether or not we should ma

Re: [Xen-devel] [RFC v1 0/8] xen: kconfig changes

2015-02-16 Thread Luis R. Rodriguez
On Thu, Feb 12, 2015 at 3:07 AM, David Vrabel wrote: > On 12/02/15 06:03, Luis R. Rodriguez wrote: >> From: "Luis R. Rodriguez" >> >> Here's the first shot at the Kconfig changes for Xen as discussed >> on the mailing list a little while ago [0]. Let me know if you spot >> any issues or if you'd

Re: [Xen-devel] [PATCH v3] modify the IO_TLB_SEGSIZE and IO_TLB_DEFAULT_SIZE configurable as flexible requirement about SW-IOMMU.

2015-02-16 Thread Wang, Xiaoming
Dear Wilk > -Original Message- > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > Sent: Tuesday, February 17, 2015 6:13 AM > To: Wang, Xiaoming > Cc: r...@linux-mips.org; boris.ostrov...@oracle.com; > david.vra...@citrix.com; linux-m...@linux-mips.org; linux- > ker...@vger.ker

[Xen-devel] [PATCH v9 09/13] Add xentrace to vmware_port

2015-02-16 Thread Don Slutz
Also added missing TRAP_DEBUG & VLAPIC. Signed-off-by: Don Slutz --- v9: Dropped unneed VMPORT_UNHANDLED, VMPORT_DECODE. v7: Dropped some of the new traces. Added HVMTRACE_ND7. v6: Dropped the attempt to use svm_nextrip_insn_length via __get_instruction_length (added i

[Xen-devel] [PATCH v9 02/13] xen: Add support for VMware cpuid leaves

2015-02-16 Thread Don Slutz
This is done by adding HVM_PARAM_VMWARE_HW. It is set to the VMware virtual hardware version. Currently 0, 3-4, 6-11 are good values. However the code only checks for == 0 or != 0 or >= 7. If non-zero then Return VMware's cpuid leaves. If >= 7 return data, else return 0. The support of hyp

[Xen-devel] [OPTIONAL][PATCH v9 13/13] Add xen-hvm-param

2015-02-16 Thread Don Slutz
A tool to get and set hvm param. Signed-off-by: Don Slutz --- v9: Change to output number as weel as string. Made all string only lower case. Rebase changes. v7: Was a later patch. Still optional. Fixed formatting. Adjust for drop of VMware RPC. .gitignore

[Xen-devel] [PATCH v9 10/13] test_x86_emulator.c: Add typedef for boot_t

2015-02-16 Thread Don Slutz
This is needed by me to build this test Signed-off-by: Don Slutz --- tools/tests/x86_emulator/test_x86_emulator.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/tests/x86_emulator/test_x86_emulator.c b/tools/tests/x86_emulator/test_x86_emulator.c index 6f67fc7..03cd0e8 100644 --- a

[Xen-devel] [PATCH v9 12/13] test_x86_emulator.c: Add tests for #GP usage

2015-02-16 Thread Don Slutz
Signed-off-by: Don Slutz --- tools/tests/x86_emulator/test_x86_emulator.c | 155 +++ 1 file changed, 155 insertions(+) diff --git a/tools/tests/x86_emulator/test_x86_emulator.c b/tools/tests/x86_emulator/test_x86_emulator.c index 02a9f0a..985c80e 100644 --- a/tools/tests

[Xen-devel] [PATCH v9 03/13] tools: Add vmware_hwver support

2015-02-16 Thread Don Slutz
This is used to set HVM_PARAM_VMWARE_HWVER. It is set to the emulated VMware virtual hardware version. Currently 0, 3-4, 6-11 are good values. However the code only checks for == 0, != 0, or < 7. If non-zero then default VGA to VMware's VGA. Also now allows vga=vmware Signed-off-by: Don Slut

[Xen-devel] [PATCH v9 11/13] test_x86_emulator.c: Add emacs block

2015-02-16 Thread Don Slutz
Signed-off-by: Don Slutz --- tools/tests/x86_emulator/test_x86_emulator.c | 9 + 1 file changed, 9 insertions(+) diff --git a/tools/tests/x86_emulator/test_x86_emulator.c b/tools/tests/x86_emulator/test_x86_emulator.c index 03cd0e8..02a9f0a 100644 --- a/tools/tests/x86_emulator/test_x86

[Xen-devel] [PATCH v9 00/13] Xen VMware tools support

2015-02-16 Thread Don Slutz
Changes v8 to v9: Overview of changes: s/vmware_hw/vmware_hwver/i Switch to x86_emulator to handle #GP New patch: Move MAX_INST_LEN into x86_emulate.h Add QEMU usage, patch #8 "Add IOREQ_TYPE_VMWARE_PORT" Split patch "xen: Add vmware_port support" into 2. 1st has same name

[Xen-devel] [PATCH v9 08/13] Add IOREQ_TYPE_VMWARE_PORT

2015-02-16 Thread Don Slutz
This adds synchronization of the 6 vcpu registers (only 32bits of them) that vmport.c needs between Xen and QEMU. This is to avoid a 2nd and 3rd exchange between QEMU and Xen to fetch and put these 6 vcpu registers used by the code in vmport.c and vmmouse.c In the tools, enable usage of QEMU's vm

[Xen-devel] [PATCH v9 04/13] vmware: Add VMware provided include file.

2015-02-16 Thread Don Slutz
This file: backdoor_def.h comes from: http://packages.vmware.com/tools/esx/3.5latest/rhel4/SRPMS/index.html open-vm-tools-kmod-7.4.8-396269.423167.src.rpm open-vm-tools-kmod-7.4.8.tar.gz vmhgfs/backdoor_def.h and is unchanged. Added the badly named include file includeCheck.h also. It onl

[Xen-devel] [PATCH v9 05/13] xen: Add vmware_port support

2015-02-16 Thread Don Slutz
This includes adding is_vmware_port_enabled This is a new domain_create() flag, DOMCRF_vmware_port. It is passed to domctl as XEN_DOMCTL_CDF_vmware_port. This enables limited support of VMware's hyper-call. This is both a more complete support then in currently provided by QEMU and/or KVM and l

[Xen-devel] [PATCH v9 01/13] hvm: Move MAX_INST_LEN into x86_emulate.h

2015-02-16 Thread Don Slutz
Change some hard coded 15 into MAX_INST_LEN Signed-off-by: Don Slutz --- xen/arch/x86/hvm/svm/emulate.c | 2 -- xen/arch/x86/hvm/svm/svm.c | 4 ++-- xen/arch/x86/hvm/vmx/vmx.c | 2 +- xen/arch/x86/x86_emulate/x86_emulate.c | 4 ++-- xen/arch/x86/x86_emulate/x86_em

[Xen-devel] [PATCH v9 07/13] tools: Add vmware_port support

2015-02-16 Thread Don Slutz
This new libxl_domain_create_info field is used to set XEN_DOMCTL_CDF_vmware_port for the xc_domain_create() routine. In xen it is is_vmware_port_enabled. If is_vmware_port_enabled then enable a limited support of VMware's hyper-call. VMware's hyper-call is also known as VMware Backdoor I/O Po

[Xen-devel] [PATCH v9 06/13] xen: Add ring 3 vmware_port support

2015-02-16 Thread Don Slutz
Summary is that VMware treats "in (%dx),%eax" (or "out %eax,(%dx)") to port 0x5658 specially. Note: since many operations return data in EAX, "in (%dx),%eax" is the one to use. The other lengths like "in (%dx),%al" will still do things, only AL part of EAX will be changed. For "out %eax,(%dx)" o

[Xen-devel] [PATCH v18 00/16] x86/PMU: Xen PMU PV(H) support

2015-02-16 Thread Boris Ostrovsky
Changes in v18: * Return 1 (i.e. "handled") in vpmu_do_interrupt() if PMU_CACHED is set. This is needed since we can get an interrupt while this flag is set on AMD processors when multiple counters are in use (**) (AMD processor don't mask LVTPC when PMC interrupt happens and so there is a

[Xen-devel] [PATCH v18 10/16] x86/VPMU: Add support for PMU register handling on PV guests

2015-02-16 Thread Boris Ostrovsky
Intercept accesses to PMU MSRs and process them in VPMU module. If vpmu ops for VCPU are not initialized (which is the case, for example, for PV guests that are not "VPMU-enlightened") access to MSRs will return failure. Dump VPMU state for all domains (HVM and PV) when requested. Signed-off-by:

[Xen-devel] [PATCH v18 12/16] x86/VPMU: Merge vpmu_rdmsr and vpmu_wrmsr

2015-02-16 Thread Boris Ostrovsky
The two routines share most of their logic. Signed-off-by: Boris Ostrovsky --- xen/arch/x86/hvm/vpmu.c| 77 -- xen/include/asm-x86/hvm/vpmu.h | 14 ++-- 2 files changed, 42 insertions(+), 49 deletions(-) diff --git a/xen/arch/x86/hvm/vpmu.c b/

[Xen-devel] [PATCH v18 04/16] x86/VPMU: Replace vcpu with vpmu as argument to some routines

2015-02-16 Thread Boris Ostrovsky
A subsequent patch will add an inline routine to vpmu.h that will call vpmu_load(). This inline will try to access vcpu->vpmu which is not possible since struct vcpu may not be fully defined at that point. So we will have that inline pass vpmu pointer to vpmu_load() instead. This change slightly

[Xen-devel] [PATCH v18 11/16] x86/VPMU: Handle PMU interrupts for PV guests

2015-02-16 Thread Boris Ostrovsky
Add support for handling PMU interrupts for PV guests. VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush hypercall. This allows the guest to access PMU MSR values that are stored in VPMU context which is shared between hypervisor and domain, thus avoiding traps to hyper

[Xen-devel] [PATCH v18 14/16] x86/VPMU: NMI-based VPMU support

2015-02-16 Thread Boris Ostrovsky
Add support for using NMIs as PMU interrupts to allow profiling hypervisor when interrupts are disabled. Most of processing is still performed by vpmu_do_interrupt(). However, since certain operations are not NMI-safe we defer them to a softint that vpmu_do_interrupt() will schedule: * For PV gue

[Xen-devel] [PATCH v18 05/16] x86/VPMU: Interface for setting PMU mode and flags

2015-02-16 Thread Boris Ostrovsky
Add runtime interface for setting PMU mode and flags. Three main modes are provided: * XENPMU_MODE_OFF: PMU is not virtualized * XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts. * XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for non-proviledged guests, dom0 can profile itself

[Xen-devel] [PATCH v18 03/16] x86/VPMU: Make vpmu not HVM-specific

2015-02-16 Thread Boris Ostrovsky
vpmu structure will be used for both HVM and PV guests. Move it from hvm_vcpu to arch_vcpu. Signed-off-by: Boris Ostrovsky Acked-by: Jan Beulich Reviewed-by: Kevin Tian Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn --- xen/include/asm-x86/domain.h | 2 ++ xen/include/asm-x86/hvm/vcpu.h

[Xen-devel] [PATCH v18 06/16] x86/VPMU: Initialize VPMUs with __initcall

2015-02-16 Thread Boris Ostrovsky
Move some VPMU initilization operations into __initcalls to avoid performing same tests and calculations for each vcpu. Signed-off-by: Boris Ostrovsky --- xen/arch/x86/hvm/svm/vpmu.c | 112 xen/arch/x86/hvm/vmx/vpmu_core2.c | 151 +++

[Xen-devel] [PATCH v18 16/16] x86/VPMU: Move VPMU files up from hvm/ directory

2015-02-16 Thread Boris Ostrovsky
Since PMU is now not HVM specific we can move VPMU-related files up from arch/x86/hvm/ directory. Specifically: arch/x86/hvm/vpmu.c -> arch/x86/cpu/vpmu.c arch/x86/hvm/svm/vpmu.c -> arch/x86/cpu/vpmu_amd.c arch/x86/hvm/vmx/vpmu_core2.c -> arch/x86/cpu/vpmu_intel.c include/asm-x86/h

[Xen-devel] [PATCH v18 02/16] x86/VPMU: Add public xenpmu.h

2015-02-16 Thread Boris Ostrovsky
Add pmu.h header files, move various macros and structures that will be shared between hypervisor and PV guests to it. Move MSR banks out of architectural PMU structures to allow for larger sizes in the future. The banks are allocated immediately after the context and PMU structures store offsets

[Xen-devel] [PATCH v18 15/16] x86/VPMU: VPMU should not exist when vpmu_initialise() is called

2015-02-16 Thread Boris Ostrovsky
We don't need to try to destroy it since it can't be already allocated at the time we try to initialize it. Signed-off-by: Boris Ostrovsky Suggested-by: Andrew Cooper --- xen/arch/x86/hvm/vpmu.c | 6 ++ 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/xen/arch/x86/hvm/vpmu.c b/

[Xen-devel] [PATCH v18 09/16] x86/VPMU: When handling MSR accesses, leave fault injection to callers

2015-02-16 Thread Boris Ostrovsky
With this patch return value of 1 of vpmu_do_msr() will now indicate whether an error was encountered during MSR processing (instead of stating that the access was to a VPMU register). As part of this patch we also check for validity of certain MSR accesses right when we determine which register i

[Xen-devel] [PATCH v18 08/16] x86/VPMU: Save VPMU state for PV guests during context switch

2015-02-16 Thread Boris Ostrovsky
Save VPMU state during context switch for both HVM and PV(H) guests. A subsequent patch ("x86/VPMU: NMI-based VPMU support") will make it possible for vpmu_switch_to() to call vmx_vmcs_try_enter()->vcpu_pause() which needs is_running to be correctly set/cleared. To prepare for that, call context_

[Xen-devel] [PATCH v18 07/16] x86/VPMU: Initialize PMU for PV(H) guests

2015-02-16 Thread Boris Ostrovsky
Code for initializing/tearing down PMU for PV guests Signed-off-by: Boris Ostrovsky Acked-by: Kevin Tian Acked-by: Daniel De Graaf --- tools/flask/policy/policy/modules/xen/xen.te | 4 ++ xen/arch/x86/domain.c| 2 + xen/arch/x86/hvm/hvm.c | 1

[Xen-devel] [PATCH v18 01/16] common/symbols: Export hypervisor symbols to privileged guest

2015-02-16 Thread Boris Ostrovsky
Export Xen's symbols as {} triplet via new XENPF_get_symbol hypercall Signed-off-by: Boris Ostrovsky Acked-by: Daniel De Graaf Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Dietmar Hahn Tested-by: Dietmar Hahn --- xen/arch/x86/platform_hypercall.c | 28 +++ xen/common/sym

[Xen-devel] [PATCH v18 13/16] x86/VPMU: Add privileged PMU mode

2015-02-16 Thread Boris Ostrovsky
Add support for privileged PMU mode (XENPMU_MODE_ALL) which allows privileged domain (dom0) profile both itself (and the hypervisor) and the guests. While this mode is on profiling in guests is disabled. Signed-off-by: Boris Ostrovsky Acked-by: Jan Beulich Reviewed-by: Dietmar Hahn Tested-by: D

[Xen-devel] [qemu-mainline test] 34596: regressions - FAIL

2015-02-16 Thread xen . org
flight 34596 qemu-mainline real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34596/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64 7 debian-hvm-install fail REGR. vs. 33480 test-amd64-i38

Re: [Xen-devel] [PATCH v3] modify the IO_TLB_SEGSIZE and IO_TLB_DEFAULT_SIZE configurable as flexible requirement about SW-IOMMU.

2015-02-16 Thread Konrad Rzeszutek Wilk
On Mon, Feb 16, 2015 at 10:38:18AM +0800, Wang Xiaoming wrote: > The maximum of SW-IOMMU is limited to 2^11*128 = 256K. > And the maximum of IO_TLB_DEFAULT_SIZE is limited to (64UL<<20) 64M. > While in different platform and different requirement this seems improper. > So modifing the IO_TLB_SEGSIZ

Re: [Xen-devel] Xen 4.6 Development Update

2015-02-16 Thread Meng Xu
Hi Wei, 2015-02-16 7:38 GMT-05:00 : > > Hi all > > We are now one month into 4.6 development window. This is an email to keep > track of all the patch series I gathered. It is by no means complete and / or > acurate. Feel free to reply this email with new projects or correct my > misunderstanding.

Re: [Xen-devel] [PATCH] tools/xenconsoled: Increase file descriptor limit

2015-02-16 Thread Don Slutz
On 02/16/15 13:17, Andrew Cooper wrote: > XenServer's VM density testing uncovered a regression when moving from > sysvinit to systemd where the file descriptor limit dropped from 4096 to > 1024. (XenServer had previously inserted a ulimit statement into its > initscripts.) > > One solution is to

[Xen-devel] Bug nestedhvm: staging-4.5, stable-4.5, staging and master. xen in xen and hvm

2015-02-16 Thread Don Slutz
I have tried several of these xen versions both as host and as guest. They all do the same thing for me. Not sure I have tried all possible. So far I have not found a way to use nestedhvm and xen. When I try and start a HVM guest, I get: [root@xen-in-xen ~]# xl -vvv cre -V /home/don/C63-min-too

Re: [Xen-devel] [PATCH v5 22/24] libxlu: introduce new APIs

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 07:10:46PM +, Wei Liu wrote: [...] > > (being a function or macro which always returns EINVAL), or some such. > > > > Do feel very keen about this since the format string differs from Don't... > functions. And it's only one printf anyway. > > Wei. > > > Thanks, > >

Re: [Xen-devel] pvSCSI test

2015-02-16 Thread Kristian Hagsted Rasmussen
On Monday, February 16, 2015 07:32, Juergen Gross wrote: > To: Kristian Hagsted Rasmussen; Olaf Hering; xen-de...@lists.xensource.com > Subject: Re: [Xen-devel] pvSCSI test > > On 02/12/2015 05:43 PM, Kristian Hagsted Rasmussen wrote: >> On Monday, February 9, 2015 07:02, Juergen Gross wrote: >>

Re: [Xen-devel] [PATCH v5 22/24] libxlu: introduce new APIs

2015-02-16 Thread Wei Liu
On Fri, Feb 13, 2015 at 02:12:29PM +, Ian Jackson wrote: > Wei Liu writes ("[PATCH v5 22/24] libxlu: introduce new APIs"): > > These APIs can be used to manipulate XLU_ConfigValue and XLU_ConfigList. > > > > +if (value->type != XLU_STRING) { > > +if (!dont_warn) > > +fp

[Xen-devel] [ovmf test] 34582: regressions - FAIL

2015-02-16 Thread xen . org
flight 34582 ovmf real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34582/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 7 debian-hvm-install fail REGR. vs. 33686 test-amd64-i386-xl-qemuu-ovm

Re: [Xen-devel] [PATCH RFC 00/20] Change parts of the shadow interface to be domain based

2015-02-16 Thread Tim Deegan
At 13:35 + on 16 Feb (1424090147), Andrew Cooper wrote: > On 16/02/15 12:29, Tim Deegan wrote: > > Hi, > > > > Thanks for this; I think the code looks a lot saner with all the > > vcpu<->domain fiddling removed. :) > > > > At 17:15 + on 12 Feb (1423757759), Andrew Cooper wrote: > >> The pur

[Xen-devel] [PATCH] tools/xenconsoled: Increase file descriptor limit

2015-02-16 Thread Andrew Cooper
XenServer's VM density testing uncovered a regression when moving from sysvinit to systemd where the file descriptor limit dropped from 4096 to 1024. (XenServer had previously inserted a ulimit statement into its initscripts.) One solution is to use LimitNOFILE=4096 in xenconsoled.service to match

Re: [Xen-devel] PML (Page Modification Logging) design for Xen

2015-02-16 Thread Tim Deegan
Hi, At 22:01 +0800 on 16 Feb (1424120474), Kai Huang wrote: > On Fri, Feb 13, 2015 at 10:50 AM, Kai Huang wrote: > > > > On 02/12/2015 08:34 PM, Tim Deegan wrote: > >> > >> Hi, > >> > >> Thanks for posting this design! > >> > >> At 16:28 +0800 on 11 Feb (1423668493), Kai Huang wrote: > >>> > >>>

Re: [Xen-devel] [PATCH v5 05/24] libxc: allocate memory with vNUMA information for PV guest

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 04:58:11PM +, Dario Faggioli wrote: > On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote: > > > @@ -760,7 +760,8 @@ static int x86_shadow(xc_interface *xch, domid_t domid) > > int arch_setup_meminit(struct xc_dom_image *dom) > > { > > int rc; > > -xen_pfn_t pfn

Re: [Xen-devel] [PATCH v5 06/24] libxl: introduce vNUMA types

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 04:51:43PM +, Dario Faggioli wrote: > On Mon, 2015-02-16 at 16:11 +, Wei Liu wrote: > > On Mon, Feb 16, 2015 at 03:56:21PM +, Dario Faggioli wrote: > > > On Mon, 2015-02-16 at 15:17 +, Wei Liu wrote: > > > > > And there is no way to > > > > specify priority

Re: [Xen-devel] [PATCH v5 09/24] libxl: x86: factor out e820_host_sanitize

2015-02-16 Thread Dario Faggioli
On Fri, 2015-02-13 at 15:42 +, Andrew Cooper wrote: > On 12/02/15 19:44, Wei Liu wrote: > > This function gets the machine E820 map and sanitize it according to PV > > guest configuration. > > > > This will be used in later patch. No functional change introduced in > > this patch. > > > > Signe

Re: [Xen-devel] [PATCH v5 05/24] libxc: allocate memory with vNUMA information for PV guest

2015-02-16 Thread Dario Faggioli
On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote: > @@ -760,7 +760,8 @@ static int x86_shadow(xc_interface *xch, domid_t domid) > int arch_setup_meminit(struct xc_dom_image *dom) > { > int rc; > -xen_pfn_t pfn, allocsz, i, j, mfn; > +xen_pfn_t pfn, allocsz, mfn, total, pfn_base; > +

Re: [Xen-devel] [PATCH v5 06/24] libxl: introduce vNUMA types

2015-02-16 Thread Dario Faggioli
On Mon, 2015-02-16 at 16:11 +, Wei Liu wrote: > On Mon, Feb 16, 2015 at 03:56:21PM +, Dario Faggioli wrote: > > On Mon, 2015-02-16 at 15:17 +, Wei Liu wrote: > > > And there is no way to > > > specify priority among the group of nodes you specify with a single > > > bitmap. > > > > >

Re: [Xen-devel] [PATCH v3 7/7] libxl: Add interface for querying hypervisor about PCI topology

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 10:54:11AM -0500, Boris Ostrovsky wrote: [...] > >>+if (valid_devs == 0) > >>+printf("No device topology data available\n"); > >>+ > >>+libxl_pcitopology_list_free(pciinfo, nr); > >>+#endif > >> > >And for implementation too, I think. > > > I am not sure wh

Re: [Xen-devel] [PATCH V5] x86 spinlock: Fix memory corruption on completing completions

2015-02-16 Thread David Vrabel
On 15/02/15 17:30, Raghavendra K T wrote: > --- a/arch/x86/xen/spinlock.c > +++ b/arch/x86/xen/spinlock.c > @@ -41,7 +41,7 @@ static u8 zero_stats; > static inline void check_zero(void) > { > u8 ret; > - u8 old = ACCESS_ONCE(zero_stats); > + u8 old = READ_ONCE(zero_stats); > i

Re: [Xen-devel] [PATCH v5 07/24] libxl: add vmemrange to libxl__domain_build_state

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 04:00:19PM +, Dario Faggioli wrote: > On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote: > > A vnode consists of one or more vmemranges (virtual memory range). One > > example of multiple vmemranges is that there is a hole in one vnode. > > > > Currently we haven't expo

Re: [Xen-devel] [PATCH v5 06/24] libxl: introduce vNUMA types

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 03:56:21PM +, Dario Faggioli wrote: > On Mon, 2015-02-16 at 15:17 +, Wei Liu wrote: > > On Mon, Feb 16, 2015 at 02:58:32PM +, Dario Faggioli wrote: > > > > > +libxl_vnode_info = Struct("vnode_info", [ > > > > +("memkb", MemKB), > > > > +("distances", Arr

Re: [Xen-devel] [PATCH v3 7/7] libxl: Add interface for querying hypervisor about PCI topology

2015-02-16 Thread Dario Faggioli
On Mon, 2015-02-16 at 10:54 -0500, Boris Ostrovsky wrote: > I am not sure what the standard practice is for LIBXL_HAVE_ macros. I > see a couple of examples where '#ifdef LIBXL_HAVE_*" is used in libxl > code, which is why I have it here as well. > Yes, that is the case for two of them, AFAICS:

Re: [Xen-devel] [PATCH v5 07/24] libxl: add vmemrange to libxl__domain_build_state

2015-02-16 Thread Dario Faggioli
On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote: > A vnode consists of one or more vmemranges (virtual memory range). One > example of multiple vmemranges is that there is a hole in one vnode. > > Currently we haven't exported vmemrange interface to libxl user. > Vmemranges are generated during

Re: [Xen-devel] Xen 4.6 Development Update

2015-02-16 Thread Fabio Fantoni
Il 16/02/2015 16:21, Wei Liu ha scritto: On Mon, Feb 16, 2015 at 02:39:40PM +, David Vrabel wrote: On 16/02/15 12:38, wei.l...@citrix.com wrote: = Prognosis = Does anyone find this section useful? I do find it useful. I also find it useful, thanks. If can be useful there is also small

Re: [Xen-devel] [PATCH v3 3/7] sysctl: Make topologyinfo and numainfo sysctls a little more efficient

2015-02-16 Thread Boris Ostrovsky
On 02/16/2015 09:08 AM, Dario Faggioli wrote: On Mon, 2015-02-09 at 15:04 -0500, Boris Ostrovsky wrote: Currently both of these sysctls make a copy to userspace for each index of various query arrays. We should try to copy whole arrays instead. This requires some changes in sysctl's public data

Re: [Xen-devel] [PATCH v5 06/24] libxl: introduce vNUMA types

2015-02-16 Thread Dario Faggioli
On Mon, 2015-02-16 at 15:17 +, Wei Liu wrote: > On Mon, Feb 16, 2015 at 02:58:32PM +, Dario Faggioli wrote: > > > +libxl_vnode_info = Struct("vnode_info", [ > > > +("memkb", MemKB), > > > +("distances", Array(uint32, "num_distances")), # distances from this > > > node to other nod

Re: [Xen-devel] [PATCH v3 7/7] libxl: Add interface for querying hypervisor about PCI topology

2015-02-16 Thread Boris Ostrovsky
On 02/16/2015 08:45 AM, Dario Faggioli wrote: @@ -1070,6 +1078,12 @@ void libxl_vminfo_list_free(libxl_vminfo *list, int nb_vm); libxl_cputopology *libxl_get_cpu_topology(libxl_ctx *ctx, int *nb_cpu_out); void libxl_cputopology_list_free(libxl_cputopology *, int nb_cpu); +#ifdef LIBXL_H

Re: [Xen-devel] Xen 4.6 Development Update

2015-02-16 Thread Wei Liu
Thanks. I will update my list. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] Xen 4.6 Development Update

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 03:20:44PM +0100, Vitaly Kuznetsov wrote: > writes: > > > Hi all > > > > We are now one month into 4.6 development window. This is an email to keep > > track of all the patch series I gathered. It is by no means complete and / > > or > > acurate. Feel free to reply this e

Re: [Xen-devel] Xen 4.6 Development Update

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 02:39:40PM +, David Vrabel wrote: > On 16/02/15 12:38, wei.l...@citrix.com wrote: > > > > = Prognosis = > > Does anyone find this section useful? > I do find it useful. > I imagine its a non-trivial amount of work to keep up-to-date. > Yes. But it's better than lo

Re: [Xen-devel] [PATCH v5 06/24] libxl: introduce vNUMA types

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 02:58:32PM +, Dario Faggioli wrote: > On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote: > > A domain can contain several virtual NUMA nodes, hence we introduce an > > array in libxl_domain_build_info. > > > > libxl_vnode_info contains the size of memory in that node, th

Re: [Xen-devel] [PATCH v5 06/24] libxl: introduce vNUMA types

2015-02-16 Thread Dario Faggioli
On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote: > A domain can contain several virtual NUMA nodes, hence we introduce an > array in libxl_domain_build_info. > > libxl_vnode_info contains the size of memory in that node, the distance > from that node to every nodes, the underlying pnode and a bit

Re: [Xen-devel] [PATCH qemu-trad] cirrus: fix an uninitialized variable

2015-02-16 Thread Ian Jackson
Ian Jackson writes ("Re: [PATCH qemu-trad] cirrus: fix an uninitialized variable"): > Jan Beulich writes ("[PATCH qemu-trad] cirrus: fix an uninitialized > variable"): > > Noticed by paying attention to a compiler warning (reported for the > > only caller of the function modified, vga_ioport_read

Re: [Xen-devel] [PATCH v2] libxc: introduce a per architecture scratch pfn for temporary grant mapping

2015-02-16 Thread Andrew Cooper
On 16/02/15 14:49, Ian Jackson wrote: > Ian Jackson writes ("Re: [PATCH v2] libxc: introduce a per architecture > scratch pfn for temporary grant mapping"): >> Ian Campbell writes ("Re: [PATCH v2] libxc: introduce a per architecture >> scratch pfn for temporary grant mapping"): >>> Ian, Julien ha

[Xen-devel] [PATCH v3 11/15] xen/arm: vgic-v2: Correctly handle RAZ/WI registers

2015-02-16 Thread Julien Grall
All the GICv2 registers are word-accessible. Some them are also byte-accessible (see GICD_IPRIORITYR*). Those registers are incorrectly implemented when they should be RAZ. Only word-access size are currently allowed for them. To avoid further issues, introduce different label following the acces

[Xen-devel] [PATCH v3 10/15] xen/arm: vgic-v2: Correctly set GICD_TYPER.CPUNumber

2015-02-16 Thread Julien Grall
The number of implemented CPU interfaces is one more than the value of this field. Also avoid hardcoding the shift and remove useless mask. Signed-off-by: Julien Grall Acked-by: Ian Campbell --- This patch should be backported to Xen 4.4 and Xen 4.5. Although this patch won't apply di

[Xen-devel] [PATCH v3 07/15] xen/arm: vgic-v3: Use a struct to describe contiguous rdist regions

2015-02-16 Thread Julien Grall
Also update the different comment to make clear that we register one MMIO region per contiguous regions and not per re-distributor. Signed-off-by: Julien Grall Acked-by: Ian Campbell --- Changes in v3: - Add Ian's ack Changes in v2: - Patch added --- xen/arch/arm/gic-v

[Xen-devel] [PATCH v3 04/15] xen/arm: vgic-v3: Correctly handle RAZ/WI registers

2015-02-16 Thread Julien Grall
Some of the registers are accessible via multiple size (see GICD_IPRIORITYR*). Those registers are incorrectly implemented when they should be RAZ. Only word-access size are currently allowed for them. The paragraph 5.3.1 in the GICv3 spec (PRD03-GENC-010745 24.0) indicates the different access-s

[Xen-devel] [PATCH v3 15/15] xen/arm: gic-v3: Update some comments in the code

2015-02-16 Thread Julien Grall
- Drop wrong comment about the default stride. It's not always 2 * SZ_64K. When the re-distributor support VLPIs (from GICv4), the default stride is 4 * SZ_64K - Explain why SZ_64K * 2 Signed-off-by: Julien Grall --- Changes in v3: - Update commit message Change

[Xen-devel] [PATCH v3 09/15] xen/arm: vgic-v3: Clarify which distributor is used in the common emulation

2015-02-16 Thread Julien Grall
The messages in the common emulation doesn't specify which distributor (redistributor or distributor) is used. This make difficult to find the correct registers. Signed-off-by: Julien Grall Acked-by: Ian Campbell --- Changes in v3: - Add Ian's ack Changes in v2: - Patch

[Xen-devel] [PATCH v3 12/15] xen/arm: vgic-v2: Take the lock when writing into GICD_CTLR

2015-02-16 Thread Julien Grall
This register is shared between every vCPUs and the lock was already taken for read. Signed-off-by: Julien Grall Acked-by: Ian Campbell --- This patch should be backported to Xen 4.4 and Xen 4.5. Although, it won't apply directly for Xen 4.4. Changes in v2: - Add Ian's ack

[Xen-devel] [PATCH v3 08/15] xen/arm: vgic-v3: Emulate correctly the re-distributor

2015-02-16 Thread Julien Grall
There is a one-to-one mapping between each re-distributors and processors. Each re-distributors can be accessed by any processor at any time. For instance during the initialization of the GIC, the drivers will browse the re-distributor to find the one associated to the current processor (via GICR_T

[Xen-devel] [PATCH v3 05/15] xen/arm: vgic-v3: Correctly implement read into GICR_NSACR

2015-02-16 Thread Julien Grall
The 32-bit register GICR_NSACR is RAZ/WI on non-secure state. Therefore we should not inject a data abort to the guest. Signed-off-by: Julien Grall Acked-by: Ian Campbell --- This patch should be backport to Xen 4.5. The current implementation will inject a data abort into the guest.

[Xen-devel] [PATCH v3 14/15] xen/arm: vgic: Drop iactive, ipend, pendsgi field

2015-02-16 Thread Julien Grall
The current VGIC code doesn't support to change the pending and active status of an IRQ via the (re-)distributor. Futhermore, all the access size wasn't support correctly and some registers was implemented as write-ignore. The latter make very difficult for a kernel developer to find that we don't

[Xen-devel] [PATCH v3 06/15] xen/arm: vgic-v3: Set stride during domain initialization

2015-02-16 Thread Julien Grall
The stride may not be set if the hardware GIC is using the default layout. It happens on the Foundation model. On GICv3, the default stride is 2 * 64K. Therefore it's possible to avoid checking at every redistributor MMIO access if the stride is not set. Because domU uses a static stride configur

[Xen-devel] [PATCH v3 13/15] xen/arm: vgic-v2: GICD_I{S, C}PENDR* are only word-accessible

2015-02-16 Thread Julien Grall
Signed-off-by: Julien Grall Acked-by: Ian Campbell --- This patch is candidate for backporting to Xen 4.4 and Xen 4.5. Although, this patch won't apply directly to Xen 4.4. Changes in v3: - Add Ian's ack Changes in v2: - Patch added --- xen/arch/arm/vgic-v2.c

[Xen-devel] [PATCH v3 00/15] xen/arm: Bug fixes for the vGIC

2015-02-16 Thread Julien Grall
Hello, The first goal of this series is to fix Linux 3.19 DOM0 boot on GICv3 systems (see patch #1). It turns out to a bigger series because there were some outstanding bugs in the vGIC emulation. The most important one is the way we emulate the re-distributor. Each re-distributor should be assoc

[Xen-devel] [PATCH v3 03/15] xen/arm: vgic-v3: Correctly handle GICD_CTLR

2015-02-16 Thread Julien Grall
As backward GICv2 compatibility is not supported in the vGICv3 driver, the bit ARE_NS is RAO/WI. Furthermore, when ARE_NS is set, the guest can only modify EnableGrp1A. At same time take the vgic_lock to write into domain.arch.vgic.ctrl. It was already taken during read. Signed-off-by: Julien Gr

[Xen-devel] [PATCH v3 02/15] xen/arm: vgic-v3: Correctly set GICD_TYPER.CPUNumber

2015-02-16 Thread Julien Grall
On GICv3, the value (CPUNumber + 1) indicates the number of processor that may be used as interrupts targets when ARE bit is zero. The maximum is 8 processors. Signed-off-by: Julien Grall Acked-by: Ian Campbell --- The current code of the vGIC doesn't support ARE = 0. Nonetheless, the pa

[Xen-devel] [PATCH v3 01/15] xen/arm: vgic-v3: Correctly set GICD_TYPER.IDbits

2015-02-16 Thread Julien Grall
>From Linux 3.19, the GICv3 drivers is using GICD_TYPER.IDbits to check the validity of the hardware interrupt number. The field IDBits in the register GICD_TYPER is used to know the number of interrupt identifiers (SPI, PPIs, SGIs, LPIs) supported by GIC Stream Protocol Interface. This field con

Re: [Xen-devel] Xen 4.6 Development Update

2015-02-16 Thread Julien Grall
On 16/02/15 13:24, Julien Grall wrote: > (Strimming the cc list) Sorry I forgot to add back xen-devel. > On 16/02/15 12:38, wei.l...@citrix.com wrote: >> Hi all > > Hi Wei, > >> We are now one month into 4.6 development window. This is an email to keep >> track of all the patch series I gather

Re: [Xen-devel] [PATCH v5 04/24] libxc: add p2m_size to xc_dom_image

2015-02-16 Thread Wei Liu
On Mon, Feb 16, 2015 at 02:46:54PM +, Dario Faggioli wrote: > On Thu, 2015-02-12 at 19:44 +, Wei Liu wrote: > > Add a new field p2m_size to keep track of the number of pages covert by > > > Here and in the code (comment): is it 'covert' or 'covered' (or maybe > even something else)? Should

Re: [Xen-devel] [PATCH v2] rump kernels: use new platform macro [and 1 more messages]

2015-02-16 Thread Ian Jackson
Ian Jackson writes ("Re: [PATCH v2] rump kernels: use new platform macro"): > Wei Liu writes ("[PATCH v2] rump kernels: use new platform macro"): > > Starting from rump kernel changeset 91d5623 ("Renaming platform macros, > > app-tools and autoconf target string"), __RUMPUSER_XEN__ and __RUMPAPP__

  1   2   >