Re: [Xen-devel] [v2 05/11] vmx: add new data structure member to support PML

2015-04-20 Thread Kai Huang
On 04/17/2015 10:31 AM, Kai Huang wrote: On 04/17/2015 06:39 AM, Tian, Kevin wrote: From: Kai Huang [mailto:kai.hu...@linux.intel.com] Sent: Wednesday, April 15, 2015 3:04 PM A new 4K page pointer is added to arch_vmx_struct as PML buffer for vcpu. And a new 'status' field is added to vmx

Re: [Xen-devel] [PATCH] [RFC] x86/cpu: Fix SMAP check in PVOPS environments

2015-04-20 Thread Andy Lutomirski
On 04/20/2015 10:09 AM, Andrew Cooper wrote: There appears to be no formal statement of what pv_irq_ops.save_fl() is supposed to return precisely. Native returns the full flags, while lguest and Xen only return the Interrupt Flag, and both have comments by the implementations stating that only t

Re: [Xen-devel] [PATCH V3 4/6] xl: add pvusb commands

2015-04-20 Thread Chun Yan Liu
>>> On 4/20/2015 at 04:12 PM, in message <5534b4d8.4010...@suse.com>, Juergen >>> Gross wrote: > On 04/19/2015 05:50 AM, Chunyan Liu wrote: > > Add pvusb commands: usb-ctrl-attach, usb-ctrl-detach, usb-list, > > usb-attach and usb-detach. > > > > To attach a usb device to guest through pvu

Re: [Xen-devel] Is it ok to routing periperal irq to any Domain0's vCPU on Xen ARM 4.5.x?

2015-04-20 Thread 신정섭
I have a one more question. In Xen ARM 4.5, All SPI is routed to pcpu0 that run domain0's vcpu0. If domain0's vcpu0 run on pcpu0 All SPI is routed to pcpu0 If domain0's vcpu0 run on pcpu1 All SPI is routed to pcpu1 these mean that Xen ARM 4.5 can inject spi only to domain0's vcpu0 and Xen ARM

Re: [Xen-devel] [PATCH v5 12/13] tools: add tools support for Intel CAT

2015-04-20 Thread Dario Faggioli
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote: > This is the xc/xl changes to support Intel Cache Allocation > Technology(CAT). Two commands are introduced: > - xl psr-cat-hwinfo > Show CAT hardware information. > Examples: > [root@vmm-psr vmm]# xl psr-cat-hwinfo > Cache Allocation Technolo

Re: [Xen-devel] [PATCH v5 11/13] tools/libxl: add command to show CMT hardware info

2015-04-20 Thread Dario Faggioli
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote: > Add dedicated one to show hardware information. > > [root@vmm-psr]xl psr-cmt-hwinfo > Cache Monitoring Technology (CMT): > Enabled : 1 > Total RMID : 63 > Supported monitor types: > cache-occupancy > total-mem-bandwidth > local-mem

Re: [Xen-devel] Xen-unstable-staging: Xen BUG at iommu_map.c:455

2015-04-20 Thread Sander Eikelenboom
Monday, April 20, 2015, 6:11:42 PM, you wrote: On 16.04.15 at 11:28, wrote: >> At 22:35 +0100 on 11 Apr (1428791713), Andrew Cooper wrote: >>> At least we now understand why it happens. I will defer to others CC'd >>> on this thread for their opinions in the matter. >> >> The patch semes

Re: [Xen-devel] [PATCH v4 5/5] Scripts to create and delete xen-scsiback nodes in Linux target framework

2015-04-20 Thread Olaf Hering
On Fri, Apr 17, Olaf Hering wrote: > Just to make them public, not meant for merging: > The scripts used during development to create a bunch of SCSI devices in > dom0 using the Linux target framework. targetcli3 and rtslib3 is used. > > A patch is required for python-rtslib: > http://article.gma

Re: [Xen-devel] [PATCH] xen: Add __GFP_DMA flag when xen_swiotlb_init gets free pages.

2015-04-20 Thread Stefano Stabellini
On Mon, 20 Apr 2015, David Vrabel wrote: > On 20/04/15 12:07, Chen Baozi wrote: > > On Mon, Apr 20, 2015 at 11:53:47AM +0100, David Vrabel wrote: > >> On 20/04/15 11:48, Chen Baozi wrote: > >>> Make sure that xen_swiotlb_init allocates buffers that is DMA capable. > >>> > >>> Signed-off-by: Chen Ba

Re: [Xen-devel] Question about DMA on 1:1 mapping dom0 of arm64

2015-04-20 Thread Stefano Stabellini
On Mon, 20 Apr 2015, Ian Campbell wrote: > On Mon, 2015-04-20 at 11:38 +0100, Stefano Stabellini wrote: > > On Mon, 20 Apr 2015, Ian Campbell wrote: > > > On Mon, 2015-04-20 at 10:58 +0100, Stefano Stabellini wrote: > > > > On Sat, 18 Apr 2015, Chen Baozi wrote: > > > > > On Fri, Apr 17, 2015 at 05

Re: [Xen-devel] Is it ok to routing periperal irq to any Domain0's vCPU on Xen ARM 4.5.x?

2015-04-20 Thread Stefano Stabellini
On Mon, 20 Apr 2015, 신정섭 wrote: > Thanks your rely. But sorry i can't understand your explanation fully. > >   > > I don't want to change GICD setting. I only want to change target Domain0' > vcpu injected SPI. vcpu0 or vcpu1. > >   > > I understand like below. > > In Xen4.4, vgic_vcpu_inject_irq(

Re: [Xen-devel] [PATCH] [RFC] x86/cpu: Fix SMAP check in PVOPS environments

2015-04-20 Thread David Vrabel
On 20/04/15 18:09, Andrew Cooper wrote: > There appears to be no formal statement of what pv_irq_ops.save_fl() is > supposed to return precisely. Native returns the full flags, while lguest and > Xen only return the Interrupt Flag, and both have comments by the > implementations stating that only

Re: [Xen-devel] [PATCH 7/8] raisin: Rework component specification

2015-04-20 Thread Stefano Stabellini
On Mon, 20 Apr 2015, George Dunlap wrote: > On 04/17/2015 11:40 AM, Stefano Stabellini wrote: > > On Thu, 16 Apr 2015, George Dunlap wrote: > >> Allow COMPONENTS to be specified in the config (or on the command-line) > >> > >> Now you can keep all components enabled in your config but build only >

[Xen-devel] Xen Security Advisory 132 - Information leak through XEN_DOMCTL_gettscinfo

2015-04-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory XSA-132 Information leak through XEN_DOMCTL_gettscinfo ISSUE DESCRIPTION = The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding field subsequently copied to guest

[Xen-devel] [PATCH] [RFC] x86/cpu: Fix SMAP check in PVOPS environments

2015-04-20 Thread Andrew Cooper
There appears to be no formal statement of what pv_irq_ops.save_fl() is supposed to return precisely. Native returns the full flags, while lguest and Xen only return the Interrupt Flag, and both have comments by the implementations stating that only the Interrupt Flag is looked at. This may have

Re: [Xen-devel] [PATCH 3/8] raisin: Use fakeroot for mkdeb so we can build the package as non-root

2015-04-20 Thread Stefano Stabellini
On Fri, 17 Apr 2015, Stefano Stabellini wrote: > On Fri, 17 Apr 2015, Ian Campbell wrote: > > On Thu, 2015-04-16 at 17:19 +0100, George Dunlap wrote: > > > Signed-off-by: George Dunlap > > > > AIUI raisin does build dependency handling/tracking. If so then fakeroot > > ought to be added to it I t

Re: [Xen-devel] [PATCH 4/8] raisin: Use PKGTYPE rather than DISTRO to determine how to build a package

2015-04-20 Thread Stefano Stabellini
On Fri, 17 Apr 2015, Stefano Stabellini wrote: > On Thu, 16 Apr 2015, George Dunlap wrote: > > Signed-off-by: George Dunlap > > --- > > CC: Stefano Stabellini > > --- > > lib/common-functions.sh | 18 +- > > 1 file changed, 9 insertions(+), 9 deletions(-) > > > > diff --git a/li

Re: [Xen-devel] [PATCH 5/8] raisin: Fix CentOS build

2015-04-20 Thread Stefano Stabellini
On Mon, 20 Apr 2015, Stefano Stabellini wrote: > On Mon, 20 Apr 2015, George Dunlap wrote: > > On 04/17/2015 11:14 AM, Stefano Stabellini wrote: > > > On Thu, 16 Apr 2015, George Dunlap wrote: > > >> Add package dependencies for CentOS. Also use PKGTYPE rather than > > >> DISTRO to determine if we

Re: [Xen-devel] [PATCH 1/8] raisin: Fix non-verbose case

2015-04-20 Thread Stefano Stabellini
On Mon, 20 Apr 2015, Stefano Stabellini wrote: > On Mon, 20 Apr 2015, George Dunlap wrote: > > On 04/17/2015 11:06 AM, Stefano Stabellini wrote: > > > On Thu, 16 Apr 2015, George Dunlap wrote: > > >> Because we use "set -e", we can't use the "a && b" construct, as it will > > >> fail and stop the

Re: [Xen-devel] [PATCH 0/2] raisin: build qemu-traditional and seabios

2015-04-20 Thread Stefano Stabellini
On Mon, 20 Apr 2015, George Dunlap wrote: > On 04/17/2015 02:08 PM, Stefano Stabellini wrote: > > Hi all, > > > > This patch series builds qemu-traditional and seabios separately from the > > Xen tree. It also change the QEMU build to be more Xen specific, > > installing the QEMU binary under /usr

Re: [Xen-devel] [PATCH 8/8] raisin: RFC Add blktap2 as an external tree

2015-04-20 Thread Stefano Stabellini
On Mon, 20 Apr 2015, George Dunlap wrote: > On 04/17/2015 11:58 AM, Stefano Stabellini wrote: > > On Thu, 16 Apr 2015, George Dunlap wrote: > >> Until we start hosting the blktap repo on xenbits, use the one from github. > >> > >> Also, we need to pass in the directories where to find the > >> libb

Re: [Xen-devel] [PATCH v20 02/13] x86/VPMU: Add public xenpmu.h

2015-04-20 Thread Boris Ostrovsky
On 04/20/2015 04:50 AM, Jan Beulich wrote: On 09.04.15 at 17:44, wrote: --- /dev/null +++ b/xen/include/public/pmu.h @@ -0,0 +1,38 @@ +#ifndef __XEN_PUBLIC_PMU_H__ +#define __XEN_PUBLIC_PMU_H__ + +#include "xen.h" +#if defined(__i386__) || defined(__x86_64__) +#include "arch-x86/pmu.h" +#elif

Re: [Xen-devel] [PATCH V3 1/6] libxl: export some functions for pvusb use

2015-04-20 Thread Olaf Hering
On Sun, Apr 19, Chunyan Liu wrote: > +++ b/tools/libxl/libxl_internal.h > +_hidden int libxl__device_nextid(libxl__gc *gc, uint32_t domid, char > *device); > +_hidden int libxl__resolve_domid(libxl__gc *gc, const char *name, > + uint32_t *domid); > +/* generic ca

Re: [Xen-devel] Xen-unstable-staging: Xen BUG at iommu_map.c:455

2015-04-20 Thread Sander Eikelenboom
Monday, April 20, 2015, 6:11:42 PM, you wrote: On 16.04.15 at 11:28, wrote: >> At 22:35 +0100 on 11 Apr (1428791713), Andrew Cooper wrote: >>> At least we now understand why it happens. I will defer to others CC'd >>> on this thread for their opinions in the matter. >> >> The patch semes

Re: [Xen-devel] [PATCH v5 03/13] x86: detect and initialize Intel CAT feature

2015-04-20 Thread Dario Faggioli
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote: > --- a/xen/arch/x86/psr.c > +++ b/xen/arch/x86/psr.c > @@ -19,14 +19,25 @@ > #include > > #define PSR_CMT(1<<0) > +#define PSR_CAT(1<<1) > + > +struct psr_cat_socket_info { > +bool_t initialized; > +bool_t enabled; >

Re: [Xen-devel] Xen-unstable-staging: Xen BUG at iommu_map.c:455

2015-04-20 Thread Jan Beulich
>>> On 16.04.15 at 11:28, wrote: > At 22:35 +0100 on 11 Apr (1428791713), Andrew Cooper wrote: >> At least we now understand why it happens. I will defer to others CC'd >> on this thread for their opinions in the matter. > > The patch semes like a pretty good check to me, though I'm not > convin

Re: [Xen-devel] [PATCH v5 10/13] tools/libxl: minor name changes for CMT commands

2015-04-20 Thread Dario Faggioli
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote: > Use "-" instead of "_" for monitor types. > This easier to type, so I like it. :-) > Signed-off-by: Chao Peng > Reviewed-by: Dario Faggioli Regards, Dario signature.asc Description: This is a digitally signed message part ___

Re: [Xen-devel] [PATCH v5 07/13] x86: dynamically get/set CBM for a domain

2015-04-20 Thread Andrew Cooper
On 17/04/15 15:33, Chao Peng wrote: > For CAT, COS is maintained in hypervisor only while CBM is exposed to > user space directly to allow getting/setting domain's cache capacity. > For each specified CBM, hypervisor will either use a existed COS which > has the same CBM or allocate a new one if th

Re: [Xen-devel] [PATCH v5 05/13] x86: add COS information for each domain

2015-04-20 Thread Andrew Cooper
On 17/04/15 15:33, Chao Peng wrote: > In Xen's implementation, the CAT enforcement granularity is per domain. > Due to the length of CBM and the number of COS may be socket-different, > each domain has COS ID for each socket. The domain get COS=0 by default > and at runtime its COS is then allocate

Re: [Xen-devel] [PATCH v5 02/13] x86: improve psr scheduling code

2015-04-20 Thread Dario Faggioli
On Fri, 2015-04-17 at 22:33 +0800, Chao Peng wrote: > Switching RMID from previous vcpu to next vcpu only needs to write > MSR_IA32_PSR_ASSOC once. Write it with the value of next vcpu is enough, > no need to write '0' first. Idle domain has RMID set to 0 and because MSR > is already updated lazily

Re: [Xen-devel] [PATCH v3 4/4] sched: credit2: consider per-vcpu soft affinity

2015-04-20 Thread George Dunlap
On Thu, Mar 26, 2015 at 9:48 AM, Justin T. Weaver wrote: > * choose_cpu > > choose_cpu now tries to find the run queue with the most cpus in the given > vcpu's soft affinity. It uses minimum run queue load as a tie breaker. [snip] > * choose_cpu: added balance loop to find cpu for given vcpu tha

Re: [Xen-devel] [PATCH V15 5/9] xen: Make gpfn related memops compatible with wider return values

2015-04-20 Thread Tamas K Lengyel
On Mon, Apr 20, 2015 at 5:22 PM, Andrew Cooper wrote: > On 20/04/15 16:06, Tamas K Lengyel wrote: > > The current implementation of three memops, XENMEM_current_reservation, > > XENMEM_maximum_reservation and XENMEM_maximum_gpfn return values as an > > int. However, in ARM64 we could potentially

Re: [Xen-devel] [PATCH V15 5/9] xen: Make gpfn related memops compatible with wider return values

2015-04-20 Thread Andrew Cooper
On 20/04/15 16:06, Tamas K Lengyel wrote: > The current implementation of three memops, XENMEM_current_reservation, > XENMEM_maximum_reservation and XENMEM_maximum_gpfn return values as an > int. However, in ARM64 we could potentially have 36-bit pfn's, thus > in preparation for the ARM patch, in t

Re: [Xen-devel] Intercepting page access

2015-04-20 Thread Andrew Cooper
On 20/04/15 16:01, HANNAS YAYA Issa wrote: > Hi > I really really need help. I continue trying to make it work but > nothing change. > Please I need help :( > > Please read an x86 architecture manual before trying to play blindly in the dark, and particularly the permission checks in paging mode.

[Xen-devel] [PATCH V15 0/9] Mem_access for ARM

2015-04-20 Thread Tamas K Lengyel
The ARM virtualization extension provides 2-stage paging, a similar mechanisms to Intel's EPT, which can be used to trace the memory accesses performed by the guest systems. This series sets up the necessary infrastructure in the ARM code to deliver the event on R/W/X traps. Finally, we turn on the

[Xen-devel] [PATCH V15 1/9] xen/arm: groundwork for mem_access support on ARM

2015-04-20 Thread Tamas K Lengyel
Add necessary changes for page table construction routines to pass the default access information and hypercall continuation mask. Also, define necessary functions and data fields to be used later by mem_access. The p2m_access_t info will be stored in a Radix tree as the PTE lacks enough software

[Xen-devel] [PATCH V15 8/9] tools/tests: Enable xen-access on ARM

2015-04-20 Thread Tamas K Lengyel
Define the ARM specific test_and_set_bit functions and switch to use maximum gpfn as the limit to setting permissions. Also, move HAS_MEM_ACCESS definition into config. Signed-off-by: Tamas K Lengyel --- v15: - Rebase on staging v6: - Just use xc_domain_maximum_gpfn to get max_gpfn. v5: - Use the

[Xen-devel] [PATCH V15 9/9] xen/arm: Enable mem_access on ARM

2015-04-20 Thread Tamas K Lengyel
Signed-off-by: Tamas K Lengyel Acked-by: Ian Campbell Reviewed-by: Julien Grall --- config/arm32.mk | 1 + config/arm64.mk | 1 + 2 files changed, 2 insertions(+) diff --git a/config/arm32.mk b/config/arm32.mk index 268ca9c..cd97e42 100644 --- a/config/arm32.mk +++ b/config/arm32.mk @@ -14,6 +

[Xen-devel] [PATCH V15 3/9] xen/arm: Data abort exception (R/W) mem_access events

2015-04-20 Thread Tamas K Lengyel
This patch enables to store, set, check and deliver LPAE R/W mem_events. As the LPAE PTE's lack enough available software programmable bits, we store the permissions in a Radix tree. The tree is only looked at if mem_access_enabled is turned on. Signed-off-by: Tamas K Lengyel --- v15: - Style fix

[Xen-devel] [PATCH V15 7/9] tools/libxc: Allocate magic page for mem access on ARM

2015-04-20 Thread Tamas K Lengyel
Signed-off-by: Tamas K Lengyel Reviewed-by: Julien Grall Acked-by: Stefano Stabellini Acked-by: Ian Campbell --- tools/libxc/xc_dom_arm.c | 6 +- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/tools/libxc/xc_dom_arm.c b/tools/libxc/xc_dom_arm.c index b9fa66d..065debb 100644 -

[Xen-devel] [PATCH V15 6/9] xen/arm: Implement domain_get_maximum_gpfn

2015-04-20 Thread Tamas K Lengyel
From: Julien Grall The function domain_get_maximum_gpfn is returning the maximum gpfn ever mapped in the guest. We can use d->arch.p2m.max_mapped_gfn for this purpose. We use this in xenaccess as to avoid the user attempting to set page permissions on pages which don't exist for the domain, as a

[Xen-devel] [PATCH V15 2/9] xen/arm: Allow hypervisor access to mem_access protected pages

2015-04-20 Thread Tamas K Lengyel
The hypervisor may use the MMU to verify that the given guest has read/write access to a given page during hypercalls. As we may have custom mem_access permissions set on these pages, we do a software-based type checking in case the MMU based approach failed, but only if mem_access_enabled is set.

[Xen-devel] [PATCH V15 4/9] xen/arm: Instruction prefetch abort (X) mem_access event handling

2015-04-20 Thread Tamas K Lengyel
Add missing structure definition for iabt and update the trap handling mechanism to only inject the exception if the mem_access checker decides to do so. Signed-off-by: Tamas K Lengyel --- v15: - Use flush_tlb_local Only get gpa if trap was triggered by permission fault v14: - Query HPFAR_

[Xen-devel] [PATCH V15 5/9] xen: Make gpfn related memops compatible with wider return values

2015-04-20 Thread Tamas K Lengyel
The current implementation of three memops, XENMEM_current_reservation, XENMEM_maximum_reservation and XENMEM_maximum_gpfn return values as an int. However, in ARM64 we could potentially have 36-bit pfn's, thus in preparation for the ARM patch, in this patch we update the existing memop routines to

Re: [Xen-devel] Intercepting page access

2015-04-20 Thread HANNAS YAYA Issa
Hi I really really need help. I continue trying to make it work but nothing change. Please I need help :( On Sat, 18 Apr 2015 19:25:52 +0200, HANNAS YAYA Issa wrote: Hi I am working in a research project I want to incercept pages access by guest virtual machine. My approach is setting high

Re: [Xen-devel] [PATCH][XSA-126] xen: limit guest control of PCI command register

2015-04-20 Thread Jan Beulich
>>> On 20.04.15 at 16:32, wrote: > On Mon, Apr 20, 2015 at 03:08:09PM +0100, Jan Beulich wrote: >> >>> On 20.04.15 at 15:43, wrote: >> > did firmware reconfigure this device to report URs as fatal errors then? >> >> No, the Unsupported Request Error Serverity flag is zero. > > OK, that's the co

Re: [Xen-devel] [PATCH][XSA-126] xen: limit guest control of PCI command register

2015-04-20 Thread Michael S. Tsirkin
On Mon, Apr 20, 2015 at 03:08:09PM +0100, Jan Beulich wrote: > >>> On 20.04.15 at 15:43, wrote: > > On Mon, Apr 13, 2015 at 01:51:06PM +0100, Jan Beulich wrote: > >> >>> On 13.04.15 at 14:47, wrote: > >> > Can you check device capabilities register, offset 0x4 within > >> > pci express capability

Re: [Xen-devel] [RFC][PATCH 13/13] hvmloader/e820: construct guest e820 table

2015-04-20 Thread Jan Beulich
>>> On 10.04.15 at 11:22, wrote: > --- a/tools/firmware/hvmloader/e820.c > +++ b/tools/firmware/hvmloader/e820.c > @@ -73,7 +73,8 @@ int build_e820_table(struct e820entry *e820, > unsigned int lowmem_reserved_base, > unsigned int bios_image_base) > { >

[Xen-devel] [libvirt test] 50568: trouble: blocked/broken/pass

2015-04-20 Thread osstest service user
flight 50568 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/50568/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm 3 host-install(3) broken REGR. vs. 50368 buil

Re: [Xen-devel] [PATCH 2/2] libxl: set DISPLAY and XAUTHORITY if sdl is enabled

2015-04-20 Thread Olaf Hering
On Mon, Apr 20, Olaf Hering wrote: > With this change the following domU.cfg will show the VM window on the > local dom0 display, instead of the remote side (it via ssh -X login): > vnc=0 > sdl=1 > display=":0" > xauthority="/run/gdm/auth-for-olaf-nMXhOi/database" libvirt works as well wi

Re: [Xen-devel] [RFC][PATCH 12/13] hvmloader/pci: skip reserved ranges

2015-04-20 Thread Jan Beulich
>>> On 10.04.15 at 11:22, wrote: > --- a/tools/firmware/hvmloader/pci.c > +++ b/tools/firmware/hvmloader/pci.c > @@ -59,8 +59,8 @@ void pci_setup(void) > uint32_t bar_reg; > uint64_t bar_sz; > } *bars = (struct bars *)scratch_start; > -unsigned int i, nr_bars = 0; > -

[Xen-devel] [seabios test] 50650: trouble: blocked/broken/pass

2015-04-20 Thread osstest service user
flight 50650 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/50650/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-pvops 3 host-install(3) broken REGR. vs. 36656 buil

[Xen-devel] Regression: qemu crash of hvm domUs with spice (backtrace included)

2015-04-20 Thread Fabio Fantoni
I updated xen and qemu from xen 4.5.0 with its upstream qemu included to xen 4.5.1-pre with qemu upstream from stable-4.5 (changed Config.mk to use revision "master"). After few minutes I booted windows 7 64 bit domU qemu crash, tried 2 times with same result. In the domU's qemu log: qemu-syst

[Xen-devel] [PATCH] tools/configure.ac: generate Paths.mk if it's not available

2015-04-20 Thread Wei Liu
Xen toolstack references many variables in Paths.mk when building and installing, so tools' configure should generate Paths.mk if it's not available. Also make inclusion of Paths.mk mandatory in Tools.mk. Signed-off-by: Wei Liu Cc: Ian Campbell Cc: Ian Jackson --- Please rerun autogen.sh --- c

Re: [Xen-devel] [PATCH][XSA-126] xen: limit guest control of PCI command register

2015-04-20 Thread Jan Beulich
>>> On 20.04.15 at 15:43, wrote: > On Mon, Apr 13, 2015 at 01:51:06PM +0100, Jan Beulich wrote: >> >>> On 13.04.15 at 14:47, wrote: >> > Can you check device capabilities register, offset 0x4 within >> > pci express capability structure? >> > Bit 15 is 15 Role-Based Error Reporting. >> > Is it se

[Xen-devel] [xen-4.3-testing test] 50565: trouble: blocked/broken/pass

2015-04-20 Thread osstest service user
flight 50565 xen-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/50565/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 3 host-install(3) broken REGR. vs. 367

Re: [Xen-devel] [RFC][PATCH 11/13] hvmloader: get guest memory map into memory_map[]

2015-04-20 Thread Jan Beulich
>>> On 10.04.15 at 11:22, wrote: > --- a/tools/firmware/hvmloader/util.c > +++ b/tools/firmware/hvmloader/util.c > @@ -27,6 +27,16 @@ > #include > #include > > +int check_hole_conflict(uint64_t start, uint64_t size, > +uint64_t reserved_start, uint64_t reserved_size)

Re: [Xen-devel] [RFC][PATCH 10/13] tools: extend XENMEM_set_memory_map

2015-04-20 Thread Jan Beulich
>>> On 10.04.15 at 11:22, wrote: > --- a/tools/libxl/libxl_dom.c > +++ b/tools/libxl/libxl_dom.c > @@ -787,6 +787,70 @@ out: > return rc; > } > > +static int libxl__domain_construct_memmap(libxl_ctx *ctx, > + libxl_domain_config *d_config, > +

Re: [Xen-devel] [RFC][PATCH 09/13] xen: enable XENMEM_set_memory_map in hvm

2015-04-20 Thread Jan Beulich
>>> On 10.04.15 at 11:22, wrote: > --- a/xen/arch/x86/hvm/hvm.c > +++ b/xen/arch/x86/hvm/hvm.c > @@ -4729,7 +4729,6 @@ static long hvm_memory_op(int cmd, > XEN_GUEST_HANDLE_PARAM(void) arg) > > switch ( cmd & MEMOP_CMD_MASK ) > { > -case XENMEM_memory_map: Title and description t

[Xen-devel] [qemu-mainline test] 50696: trouble: blocked/broken/pass

2015-04-20 Thread osstest service user
flight 50696 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/50696/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm 3 host-install(3) broken REGR. vs. 50391

Re: [Xen-devel] [PATCH][XSA-126] xen: limit guest control of PCI command register

2015-04-20 Thread Michael S. Tsirkin
On Mon, Apr 13, 2015 at 01:51:06PM +0100, Jan Beulich wrote: > >>> On 13.04.15 at 14:47, wrote: > > On Mon, Apr 13, 2015 at 01:40:59PM +0100, Jan Beulich wrote: > >> Quite possible. Looking at the ITP log we were provided, the UR > >> severity bit is clear (non-fatal), yet the error got surfaced t

[Xen-devel] [PATCH 2/2] libxl: set DISPLAY and XAUTHORITY if sdl is enabled

2015-04-20 Thread Olaf Hering
With this change the following domU.cfg will show the VM window on the local dom0 display, instead of the remote side (it via ssh -X login): vnc=0 sdl=1 display=":0" xauthority="/run/gdm/auth-for-olaf-nMXhOi/database" Signed-off-by: Olaf Hering Cc: Ian Jackson Cc: Stefano Stabellini Cc:

[Xen-devel] [PATCH 1/2] libxl: pass environment to device model

2015-04-20 Thread Olaf Hering
Prepare device-model setup functions to pass also environment variables to the spawned process. This is required for upcoming changes which will set DISPLAY and XAUTHORITY for SDL. Signed-off-by: Olaf Hering Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/libxl/

[Xen-devel] [PATCH 0/2] tools: enable sdl display and xauth

2015-04-20 Thread Olaf Hering
For some reason DISPLAY and XAUTHORITY are not set by libxl. Thats not an issue for xl(1) because it can reuse the DISPLAY from the calling process. But libvirtd will benefit from being able to pass the configured display and xauth settings. Olaf Olaf Hering (2): libxl: pass environment to dev

Re: [Xen-devel] [RFC][PATCH 08/13] tools: extend xc_assign_device() to support rdm reservation policy

2015-04-20 Thread Jan Beulich
>>> On 10.04.15 at 11:21, wrote: > --- a/tools/libxc/xc_domain.c > +++ b/tools/libxc/xc_domain.c > @@ -1654,13 +1654,15 @@ int xc_domain_setdebugging(xc_interface *xch, > int xc_assign_device( > xc_interface *xch, > uint32_t domid, > -uint32_t machine_sbdf) > +uint32_t machine_s

Re: [Xen-devel] [PATCH] xen: Add __GFP_DMA flag when xen_swiotlb_init gets free pages.

2015-04-20 Thread Konrad Rzeszutek Wilk
On Mon, Apr 20, 2015 at 06:48:24PM +0800, Chen Baozi wrote: > Make sure that xen_swiotlb_init allocates buffers that is DMA capable. > > Signed-off-by: Chen Baozi > --- > drivers/xen/swiotlb-xen.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/drivers/xen/swiotlb-xen

Re: [Xen-devel] [RFC][PATCH 07/13] xen/passthrough: extend hypercall to support rdm reservation policy

2015-04-20 Thread Jan Beulich
>>> On 10.04.15 at 11:21, wrote: > --- a/xen/drivers/passthrough/vtd/iommu.c > +++ b/xen/drivers/passthrough/vtd/iommu.c > @@ -1793,8 +1793,14 @@ static void iommu_set_pgd(struct domain *d) > hd->arch.pgd_maddr = pagetable_get_paddr(pagetable_from_mfn(pgd_mfn)); > } > > +/* > + * In some c

Re: [Xen-devel] [PATCH OSSTEST v2 2/5] Handle osstest's own local push gate in non-master production instances

2015-04-20 Thread Ian Campbell
On Mon, 2015-04-20 at 14:14 +0100, Ian Campbell wrote: > I'm about to kick off an adhoc test on the Cambridge VM Except the filer seems to have just died for the second time today. I suspect I'll be putting a hold on this work until we can switch over to reliable infrastructure (which is in progre

Re: [Xen-devel] [PATCH v9 02/15] libxc/progress: Extend the progress interface

2015-04-20 Thread Andrew Cooper
On 15/04/15 11:55, Ian Campbell wrote: > On Fri, 2015-04-10 at 18:15 +0100, Andrew Cooper wrote: >> Not everything which needs reporting as progress comes with a range. Extend >> the interface to allow reporting of a single statement. >> >> The programming interface now looks like: >> xc_set_pro

Re: [Xen-devel] [PATCH OSSTEST v2 2/5] Handle osstest's own local push gate in non-master production instances

2015-04-20 Thread Ian Campbell
On Wed, 2015-04-15 at 11:04 +0100, Ian Campbell wrote: > If the option is set then osstest branch flights proceed by merging, > the referenced branch into the local pretest branch and testing the > result. This turned out to not be quite right in practice. Since pretest is not updated, in the abse

Re: [Xen-devel] [PATCH v3 0/5] xen: arm: Parse PCI DT nodes' ranges and interrupt-map

2015-04-20 Thread Chen Baozi
On Mon, Apr 20, 2015 at 01:15:29PM +0100, Ian Campbell wrote: > This series adds parsing of the DT ranges and interrupt-map properties > for PCI devices, these contain the MMIOs and IRQs used by children on > the bus. This replaces the specific mapping stuff on xgene. > > Since last time I've adde

[Xen-devel] [rumpuserxen test] 50657: trouble: blocked/broken/pass

2015-04-20 Thread osstest service user
flight 50657 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/50657/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 3 host-install(3) broken REGR. vs. 33866

[Xen-devel] [xen-4.2-testing test] 50437: regressions - trouble: blocked/broken/fail/pass

2015-04-20 Thread osstest service user
flight 50437 xen-4.2-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/50437/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-rumpuserxen3 host-install(3) broken REGR. vs. 36512 test-amd64-i386-p

Re: [Xen-devel] Is it ok to routing periperal irq to any Domain0's vCPU on Xen ARM 4.5.x?

2015-04-20 Thread 신정섭
Thanks your rely. But sorry i can't understand your explanation fully. I don't want to change GICD setting. I only want to change target Domain0' vcpu injected SPI. vcpu0 or vcpu1. I understand like below. In Xen4.4, vgic_vcpu_inject_irq() can inject SPI to any Domain0's vcpu on any pcpu. But

[Xen-devel] [linux-linus test] 50465: regressions - trouble: blocked/broken/fail/pass

2015-04-20 Thread osstest service user
flight 50465 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/50465/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-pvops 3 host-install(3) broken REGR. vs. 50329 test-amd64-amd64-xl-q

[Xen-devel] [PATCH v3 3/5] xen: arm: slightly refactor gic DT node creation for domain 0

2015-04-20 Thread Ian Campbell
all gics. Although in principal #interrupt-cells can vary it must always be 3 for a GIC (and we only support GIC as a guest interrupt controller), so putting it in common code is OK. Signed-off-by: Ian Campbell --- v3: Retitle and reword, was "xen: arm: propagate gic's #interrupt-cells prope

[Xen-devel] [PATCH v3 1/5] xen: dt: add dt_for_each_irq_map helper

2015-04-20 Thread Ian Campbell
This function iterates over a nodes interrupt-map property and calls a callback for each interrupt. For now it only supplies the raw IRQ since my use case has no need of e.g. child unit address. These can be added as needed by any future users. This follows much the same logic as dt_irq_map_raw wh

[Xen-devel] [PATCH v3 2/5] xen: dt: add dt_for_each_range helper

2015-04-20 Thread Ian Campbell
This function iterates over a node's ranges property and calls a callback for each region. For now it only supplies the MMIO range (in terms of CPU addresses, i.e. already translated). Signed-off-by: Ian Campbell --- xen/common/device_tree.c | 85 +

[Xen-devel] [PATCH v3 4/5] xen: arm: map child MMIO and IRQs to dom0 for PCI bus DT nodes.

2015-04-20 Thread Ian Campbell
This uses the dt_for_each_{irq_map,range} helpers to map the interrupt and child MMIO regions to dom0. Since PCI busses are enumerable these resources may not be otherwise described in the DT (although they can be). Although PCI is the only bus we handle this way the code should be generic enough

[Xen-devel] [PATCH v3 5/5] xen: arm: Import of_bus PCI entry from Linux (as a dt_bus entry)

2015-04-20 Thread Ian Campbell
This provides specific handlers for the PCI bus relating to matching and translating. It's mostly similar to the defaults but includes some additional error checks and other PCI specific bits. Functions/types renamed and reindented (because apparently we do that for these). Needs a selection of I

[Xen-devel] [PATCH v3 0/5] xen: arm: Parse PCI DT nodes' ranges and interrupt-map

2015-04-20 Thread Ian Campbell
This series adds parsing of the DT ranges and interrupt-map properties for PCI devices, these contain the MMIOs and IRQs used by children on the bus. This replaces the specific mapping stuff on xgene. Since last time I've added a dt_for_each_range helper, which cleans things up considerably and in

Re: [Xen-devel] [PATCH 2/7] docs/build: Do not open-code $*

2015-04-20 Thread Jan Beulich
>>> On 20.04.15 at 13:55, wrote: > On 20/04/15 12:48, Jan Beulich wrote: > On 20.04.15 at 12:49, wrote: >>> --- a/docs/Makefile >>> +++ b/docs/Makefile >>> @@ -73,13 +73,11 @@ endif >>> >>> man1/%.1: man/%.pod.1 Makefile >>> $(INSTALL_DIR) $(@D) >>> - $(POD2MAN) --release=$(VERSION)

Re: [Xen-devel] [PATCH] xen: Add __GFP_DMA flag when xen_swiotlb_init gets free pages.

2015-04-20 Thread David Vrabel
On 20/04/15 12:07, Chen Baozi wrote: > On Mon, Apr 20, 2015 at 11:53:47AM +0100, David Vrabel wrote: >> On 20/04/15 11:48, Chen Baozi wrote: >>> Make sure that xen_swiotlb_init allocates buffers that is DMA capable. >>> >>> Signed-off-by: Chen Baozi >>> --- >>> drivers/xen/swiotlb-xen.c | 3 ++- >

Re: [Xen-devel] [PATCH 6/7] docs/build: Move install checks into individual build targets

2015-04-20 Thread Andrew Cooper
On 20/04/15 12:57, Jan Beulich wrote: On 20.04.15 at 12:49, wrote: >> @@ -103,12 +88,20 @@ install: install-man-pages install-html >> >> # Individual file build targets >> man1/%.1: man/%.pod.1 Makefile >> +ifdef POD2MAN > Perhaps better to use ifneq($(POD2MAN),) in such cases? I was fol

Re: [Xen-devel] about xenmon

2015-04-20 Thread George Dunlap
On Mon, Apr 20, 2015 at 7:07 AM, 蒋雄伟(蒋冲) wrote: > Hi, everyone, > > I would like to use xenmon to gain insight into xen environment. What I > know about xenmon is that xentrace is used to catch events and xenbaked is > used to processes events and xenmon is used to display and/or log the data. >

Re: [Xen-devel] [PATCH 6/7] docs/build: Move install checks into individual build targets

2015-04-20 Thread Jan Beulich
>>> On 20.04.15 at 12:49, wrote: > @@ -103,12 +88,20 @@ install: install-man-pages install-html > > # Individual file build targets > man1/%.1: man/%.pod.1 Makefile > +ifdef POD2MAN Perhaps better to use ifneq($(POD2MAN),) in such cases? > @$(INSTALL_DIR) $(@D) > $(POD2MAN) --rel

Re: [Xen-devel] [PATCH 2/7] docs/build: Do not open-code $*

2015-04-20 Thread Andrew Cooper
On 20/04/15 12:48, Jan Beulich wrote: On 20.04.15 at 12:49, wrote: >> --- a/docs/Makefile >> +++ b/docs/Makefile >> @@ -73,13 +73,11 @@ endif >> >> man1/%.1: man/%.pod.1 Makefile >> $(INSTALL_DIR) $(@D) >> -$(POD2MAN) --release=$(VERSION) --name=`echo $@ | sed 's/^man1.//'| \ >> -

Re: [Xen-devel] [PATCH 2/7] docs/build: Do not open-code $*

2015-04-20 Thread Jan Beulich
>>> On 20.04.15 at 12:49, wrote: > --- a/docs/Makefile > +++ b/docs/Makefile > @@ -73,13 +73,11 @@ endif > > man1/%.1: man/%.pod.1 Makefile > $(INSTALL_DIR) $(@D) > - $(POD2MAN) --release=$(VERSION) --name=`echo $@ | sed 's/^man1.//'| \ > - sed 's/.1//'` -s 1 -c "Xen" $< $

Re: [Xen-devel] [PATCH 0/2] raisin: build qemu-traditional and seabios

2015-04-20 Thread George Dunlap
On 04/17/2015 02:08 PM, Stefano Stabellini wrote: > Hi all, > > This patch series builds qemu-traditional and seabios separately from the > Xen tree. It also change the QEMU build to be more Xen specific, > installing the QEMU binary under /usr/lib/xen/bin. > > > Changes compared to the previous

Re: [Xen-devel] [RFC][PATCH 04/13] tools/libxl: detect and avoid conflicts with RDM

2015-04-20 Thread Jan Beulich
>>> On 10.04.15 at 11:21, wrote: > --- a/tools/libxc/xc_domain.c > +++ b/tools/libxc/xc_domain.c > @@ -1665,6 +1665,46 @@ int xc_assign_device( > return do_domctl(xch, &domctl); > } > > +struct xen_reserved_device_memory > +*xc_device_get_rdm(xc_interface *xch, > + uint32

Re: [Xen-devel] Question about DMA on 1:1 mapping dom0 of arm64

2015-04-20 Thread Ian Campbell
On Mon, 2015-04-20 at 11:38 +0100, Stefano Stabellini wrote: > On Mon, 20 Apr 2015, Ian Campbell wrote: > > On Mon, 2015-04-20 at 10:58 +0100, Stefano Stabellini wrote: > > > On Sat, 18 Apr 2015, Chen Baozi wrote: > > > > On Fri, Apr 17, 2015 at 05:13:16PM +0100, Stefano Stabellini wrote: > > > > >

Re: [Xen-devel] [PATCH] libxl: initialize vfb defbools in libxlMakeVfb

2015-04-20 Thread Ian Campbell
On Mon, 2015-04-20 at 12:32 +0200, Olaf Hering wrote: > On Mon, Apr 20, Ian Campbell wrote: > > > It makes no sense to do that at init time, the whole purpose of a > > defbool is to allow the calling application to choose a value or to > > explicitly leave it as a request to for the default (which

Re: [Xen-devel] [PATCH] xen: Add __GFP_DMA flag when xen_swiotlb_init gets free pages.

2015-04-20 Thread Chen Baozi
On Mon, Apr 20, 2015 at 11:53:47AM +0100, David Vrabel wrote: > On 20/04/15 11:48, Chen Baozi wrote: > > Make sure that xen_swiotlb_init allocates buffers that is DMA capable. > > > > Signed-off-by: Chen Baozi > > --- > > drivers/xen/swiotlb-xen.c | 3 ++- > > 1 file changed, 2 insertions(+), 1

Re: [Xen-devel] "tcp: refine TSO autosizing" causes performance regression on Xen

2015-04-20 Thread George Dunlap
On Thu, Apr 16, 2015 at 1:42 PM, Eric Dumazet wrote: > On Thu, 2015-04-16 at 11:01 +0100, George Dunlap wrote: > >> He suggested that after he'd been prodded by 4 more e-mails in which two >> of us guessed what he was trying to get at. That's what I was >> complaining about. > > My big complain i

Re: [Xen-devel] [PATCH 8/8] raisin: RFC Add blktap2 as an external tree

2015-04-20 Thread George Dunlap
On 04/17/2015 11:58 AM, Stefano Stabellini wrote: > On Thu, 16 Apr 2015, George Dunlap wrote: >> Until we start hosting the blktap repo on xenbits, use the one from github. >> >> Also, we need to pass in the directories where to find the >> libblktapctl headers in the Xen build. >> >> Signed-off-by

Re: [Xen-devel] [PATCH] xen: Add __GFP_DMA flag when xen_swiotlb_init gets free pages.

2015-04-20 Thread David Vrabel
On 20/04/15 11:48, Chen Baozi wrote: > Make sure that xen_swiotlb_init allocates buffers that is DMA capable. > > Signed-off-by: Chen Baozi > --- > drivers/xen/swiotlb-xen.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotl

Re: [Xen-devel] Is it ok to routing periperal irq to any Domain0's vCPU on Xen ARM 4.5.x?

2015-04-20 Thread Stefano Stabellini
In Xen 4.5 we rely on the fact that the physical irq is routed to the physical cpu running the vcpu of the domain that needs to receive the corresponding virq. So if you want to inject IRQ 100 to CPU 1, while Dom0 is set to receive vIRQ 100 (virtual irq corresponding to IRQ 100) to vcpu0, running

[Xen-devel] [PATCH 0/7] docs/build fixes

2015-04-20 Thread Andrew Cooper
This is the results of shaving a yak which started while introducing a pandoc document in the Migration v2 libxc series Andrew Cooper (7): docs/build: Misc cleanup docs/build: Do not open-code $* docs/build: Move two rules for consistency, and comment sections docs/build: Do not use move-i

[Xen-devel] [PATCH 6/7] docs/build: Move install checks into individual build targets

2015-04-20 Thread Andrew Cooper
For top-level targets which use more than a single program to produce content (txt already, pdf once pandoc is supported), these current checks are unsuitable. By moving the the install checks to the rules which actually use the programs, it is now possible to build a subset of a top-level target

[Xen-devel] osstest outage over the weekend

2015-04-20 Thread Ian Jackson
osstest service user writes ("[qemu-mainline test] 50651: trouble: blocked/broken"): > flight 50651 qemu-mainline real [real] > http://logs.test-lab.xenproject.org/osstest/logs/50651/ > > Failures and problems with tests :-( > > Tests which did not succeed and are blocking, > including tests whi

  1   2   >