Re: [Xen-devel] RFC: making the PVH 64bit ABI as stableo

2015-06-02 Thread Jan Beulich
>>> On 02.06.15 at 19:12, wrote: >- working with shadow code (which is what we use when migrating HVM > guests). But the nice side-benefit is that we can then run PVH on > machines without VMX or SVM support. Without VMX/SVM? What's the H then in PVH? Or did you mean without EPT/NPT? Jan _

[Xen-devel] [PATCH 2/3] driver: xen-blkfront: move talk_to_blkback to a more suitable place

2015-06-02 Thread Bob Liu
The major responsibility of talk_to_blkback() is allocate and initialize the request ring and write the ring info to xenstore. But this work should be done after backend entered 'XenbusStateInitWait' as defined in the protocol file. See xen/include/public/io/blkif.h in XEN git tree: Front

[Xen-devel] [PATCH 3/3] xen/block: add multi-page ring support

2015-06-02 Thread Bob Liu
Extend xen/block to support multi-page ring, so that more requests can be issued by using more than one pages as the request ring between blkfront and backend. As a result, the performance can get improved significantly. We got some impressive improvements on our highend iscsi storage cluster back

[Xen-devel] [PATCH 1/3] drivers: xen-blkback: delay pending_req allocation to connect_ring

2015-06-02 Thread Bob Liu
This is a pre-patch for multi-page ring feature. In connect_ring, we can know exactly how many pages are used for the shared ring, delay pending_req allocation here so that we won't waste too much memory. Signed-off-by: Bob Liu --- drivers/block/xen-blkback/common.h |2 +- drivers/block/xen-

[Xen-devel] [PATCH v9 02/13] x86: detect and initialize Intel CAT feature

2015-06-02 Thread Chao Peng
Detect Intel Cache Allocation Technology(CAT) feature and store the cpuid information for later use. Currently only L3 cache allocation is supported. The L3 CAT features may vary among sockets so per-socket feature information is stored. The initialization can happen either at boot time or when CPU

[Xen-devel] [PATCH v9 08/13] xsm: add CAT related xsm policies

2015-06-02 Thread Chao Peng
Add xsm policies for Cache Allocation Technology(CAT) related hypercalls to restrict the functions visibility to control domain only. Signed-off-by: Chao Peng Acked-by: Daniel De Graaf --- tools/flask/policy/policy/modules/xen/xen.if | 2 +- tools/flask/policy/policy/modules/xen/xen.te | 4 +++

[Xen-devel] [PATCH v9 09/13] tools/libxl: minor name changes for CMT commands

2015-06-02 Thread Chao Peng
Use "-" instead of "_" for monitor types. Signed-off-by: Chao Peng Reviewed-by: Dario Faggioli Acked-by: Ian Campbell --- tools/libxl/xl_cmdimpl.c | 6 +++--- tools/libxl/xl_cmdtable.c | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/tools/libxl/xl_cmdimpl.c b/tools

[Xen-devel] [PATCH v9 11/13] tools/libxl: introduce some socket helpers

2015-06-02 Thread Chao Peng
Add libxl_socket_bitmap_alloc() to allow allocating a socket specific libxl_bitmap (as it is for cpu/node bitmap). Internal function libxl__count_physical_sockets() is introduced together to get the socket count when the size of bitmap is not specified. Signed-off-by: Chao Peng Acked-by: Ian Cam

[Xen-devel] [PATCH v9 06/13] x86: dynamically get/set CBM for a domain

2015-06-02 Thread Chao Peng
For CAT, COS is maintained in hypervisor only while CBM is exposed to user space directly to allow getting/setting domain's cache capacity. For each specified CBM, hypervisor will either use a existed COS which has the same CBM or allocate a new one if the same CBM is not found. If the allocation f

[Xen-devel] [PATCH v9 05/13] x86: expose CBM length and COS number information

2015-06-02 Thread Chao Peng
General CAT information such as maximum COS and CBM length are exposed to user space by a SYSCTL hypercall, to help user space to construct the CBM. Signed-off-by: Chao Peng Reviewed-by: Andrew Cooper --- Changes in v9: * Initialize 'info' explictly so that compiler would not complain. * Simplif

[Xen-devel] [PATCH v9 12/13] tools: add tools support for Intel CAT

2015-06-02 Thread Chao Peng
This is the xc/xl changes to support Intel Cache Allocation Technology(CAT). 'xl psr-hwinfo' is updated to show CAT info and two new commands for CAT are introduced: - xl psr-cat-cbm-set [-s socket] Set cache capacity bitmasks(CBM) for a domain. - xl psr-cat-show Show CAT domain information

[Xen-devel] [PATCH v9 04/13] x86: add COS information for each domain

2015-06-02 Thread Chao Peng
In Xen's implementation, the CAT enforcement granularity is per domain. Due to the length of CBM and the number of COS may be socket-different, each domain has COS ID for each socket. The domain get COS=0 by default and at runtime its COS is then allocated dynamically when user specifies a CBM for

[Xen-devel] [PATCH v9 01/13] x86: add socket_cpumask

2015-06-02 Thread Chao Peng
Maintain socket_cpumask which contains all the HT and core siblings in the same socket. Signed-off-by: Chao Peng --- Changes in v9: * Add comments for set_nr_sockets. * Move set_nr_sockets() invocation from __start_xen() to smp_prepare_cpus(). Changes in v8: * Remove total_cpus and retrofit the a

[Xen-devel] [PATCH v9 03/13] x86: maintain COS to CBM mapping for each socket

2015-06-02 Thread Chao Peng
For each socket, a COS to CBM mapping structure is maintained for each COS. The mapping is indexed by COS and the value is the corresponding CBM. Different VMs may use the same CBM, a reference count is used to indicate if the CBM is available. Signed-off-by: Chao Peng --- Changes in v9: * Alloca

[Xen-devel] [PATCH v9 00/13] enable Cache Allocation Technology (CAT) for VMs

2015-06-02 Thread Chao Peng
Changes in v9: Address comments from Jan, mainly: * Move set_nr_sockets() invocation from __start_xen() to smp_prepare_cpus(). * Add check for cpuid_level. * Add priority for cpu notifier. * Allocate cos_to_cbm with opt_cos_max instead of the actual cos_max from cpuid. * Move CAT initialization cod

[Xen-devel] [PATCH v9 13/13] docs: add xl-psr.markdown

2015-06-02 Thread Chao Peng
Add document to introduce basic concepts and terms in PSR family technologies and the xl interfaces. Signed-off-by: Chao Peng Acked-by: Ian Campbell --- Changes in v7: * Correct 'xl psr-hwinfo'. Changes in v6: * Address comments from Ian. Changes in v5: * Address comments from Andrew/Ian. --- d

[Xen-devel] [PATCH v9 10/13] tools/libxl: add command to show PSR hardware info

2015-06-02 Thread Chao Peng
Add dedicated one to show hardware information. [root@vmm-psr]xl psr-hwinfo Cache Monitoring Technology (CMT): Enabled : 1 Total RMID : 63 Supported monitor types: cache-occupancy total-mem-bandwidth local-mem-bandwidth Signed-off-by: Chao Peng Reviewed-by: Dario Faggioli Acked-by:

[Xen-devel] [PATCH v9 07/13] x86: add scheduling support for Intel CAT

2015-06-02 Thread Chao Peng
On context switch, write the the domain's Class of Service(COS) to MSR IA32_PQR_ASSOC, to notify hardware to use the new COS. For performance reason, the COS mask for current cpu is also cached in the local per-CPU variable. Signed-off-by: Chao Peng Acked-by: Jan Beulich --- Changes in v5: * Re

[Xen-devel] [Patch v3 27/36] x86, irq: Use access helper irq_data_get_affinity_mask()

2015-06-02 Thread Jiang Liu
Use access helper irq_data_get_affinity_mask() to hide implementation details of struct irq_desc. Signed-off-by: Jiang Liu --- Hi Thomas, This version changes the patch to correctly support bisecting. Thanks! Gerry --- arch/x86/kernel/apic/io_apic.c |2 +- arch/x86/kernel/apic/vect

Re: [Xen-devel] [RFC][v2][PATCH 10/14] tools: extend XENMEM_set_memory_map

2015-06-02 Thread Chen, Tiejun
On 2015/6/3 0:42, Wei Liu wrote: On Fri, May 22, 2015 at 05:35:10PM +0800, Tiejun Chen wrote: Here we'll construct a basic guest e820 table via XENMEM_set_memory_map. This table includes lowmem, highmem and RDMs if they exist. And hvmloader would need this info later. Signed-off-by: Tiejun Chen

Re: [Xen-devel] [RFC][v2][PATCH 08/14] tools: extend xc_assign_device() to support rdm reservation policy

2015-06-02 Thread Chen, Tiejun
On 2015/6/3 0:36, Wei Liu wrote: On Fri, May 22, 2015 at 05:35:08PM +0800, Tiejun Chen wrote: This patch passes rdm reservation policy to xc_assign_device() so the policy is checked when assigning devices to a VM. Signed-off-by: Tiejun Chen --- tools/libxc/include/xenctrl.h | 3 ++-

[Xen-devel] [xen-4.2-testing test] 57781: regressions - FAIL

2015-06-02 Thread osstest service user
flight 57781 xen-4.2-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/57781/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xend-winxpsp3 16 guest-stop fail REGR. vs. 53018 test-amd64-i386-x

Re: [Xen-devel] [PATCH v1 4/5] tools/libxl: move toolstack code into libxl_toolstack.c

2015-06-02 Thread Yang Hongyang
On 06/03/2015 12:22 AM, Yang Hongyang wrote: On 06/02/2015 10:48 PM, Ian Campbell wrote: On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote: move toolstack code into libxl_toolstack.c It's not clear to me what "toolstack code" is here, the whole of libxl and xl is "toolstack code". I

Re: [Xen-devel] [RFC][v2][PATCH 04/14] tools/libxl: detect and avoid conflicts with RDM

2015-06-02 Thread Chen, Tiejun
On 2015/6/3 0:29, Wei Liu wrote: On Fri, May 22, 2015 at 05:35:04PM +0800, Tiejun Chen wrote: While building a VM, HVM domain builder provides struct hvm_info_table{} to help hvmloader. Currently it includes two fields to construct guest e820 table by hvmloader, low_mem_pgend and high_mem_pgend.

Re: [Xen-devel] [Patch v3 27/36] x86, irq: Use access helper irq_data_get_affinity_mask()

2015-06-02 Thread Jiang Liu
On 2015/6/3 3:19, Thomas Gleixner wrote: > On Mon, 1 Jun 2015, Jiang Liu wrote: > >> diff --git a/arch/x86/kernel/apic/vector.c b/arch/x86/kernel/apic/vector.c >> index 9b62f690b0ff..dfa3a5f5b3d3 100644 >> --- a/arch/x86/kernel/apic/vector.c >> +++ b/arch/x86/kernel/apic/vector.c >> @@ -494,9 +494

Re: [Xen-devel] [RFC][v2][PATCH 01/14] tools: introduce some new parameters to set rdm policy

2015-06-02 Thread Chen, Tiejun
+=item B Stray space after before and after "RDM_RESERVE_STRING". Sure, =item B + +(HVM/x86 only) Specifies the information about Reserved Device Memory (RDM), +which is necessary to enable robust device passthrough usage. One example of Delete "usage". Okay. +RDM is reported thro

Re: [Xen-devel] RFC: QEMU bumping memory limit and domain restore

2015-06-02 Thread Yang Hongyang
On 06/02/2015 11:49 PM, Ian Campbell wrote: On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote: [...] So here is a proof of concept patch to record and honour that value during migration. A new field is added in IDL. Note that we don't provide xl level config option for it and mandate it to be

Re: [Xen-devel] [PATCHv3] frontswap: allow multiple backends

2015-06-02 Thread Andrew Morton
On Tue, 2 Jun 2015 18:08:46 -0400 Dan Streetman wrote: > Change frontswap single pointer to a singly linked list of frontswap > implementations. Update Xen tmem implementation as register no longer > returns anything. > > Frontswap only keeps track of a single implementation; any implementatio

[Xen-devel] [PATCHv3] frontswap: allow multiple backends

2015-06-02 Thread Dan Streetman
Change frontswap single pointer to a singly linked list of frontswap implementations. Update Xen tmem implementation as register no longer returns anything. Frontswap only keeps track of a single implementation; any implementation that registers second (or later) will replace the previously regis

Re: [Xen-devel] [PATCHv2] frontswap: allow multiple backends

2015-06-02 Thread Dan Streetman
On Tue, Jun 2, 2015 at 5:06 PM, Andrew Morton wrote: > On Mon, 1 Jun 2015 10:22:24 -0400 Dan Streetman wrote: > >> Change frontswap single pointer to a singly linked list of frontswap >> implementations. Update Xen tmem implementation as register no longer >> returns anything. >> >> Frontswap o

[Xen-devel] [PATCH v7 2/4] iommu VT-d: separate rmrr addition function

2015-06-02 Thread elena . ufimtseva
From: Elena Ufimtseva In preparation for auxiliary RMRR data provided on Xen command line, make RMRR adding a separate function. Also free memery for rmrr device scope in error path. Signed-off-by: Elena Ufimtseva --- xen/drivers/passthrough/vtd/dmar.c | 130 ---

[Xen-devel] [PATCH v7 4/4] iommu: add rmrr Xen command line option for extra rmrrs

2015-06-02 Thread elena . ufimtseva
From: Elena Ufimtseva From: Elena Ufimtseva On some platforms RMRR regions may be not specified in ACPI and thus will not be mapped 1:1 in dom0. This causes IO Page Faults and prevents dom0 from booting in PVH mode. New Xen command line option rmrr allows to specify such devices and memory regi

[Xen-devel] [PATCH v7 3/4] pci: add wrapper for parse_pci

2015-06-02 Thread elena . ufimtseva
From: Elena Ufimtseva For sbdf'si parsing in rmrr command line add __parse_pci with addtional parameter def_seg. __parse_pci will help to identify if segment was found in string being parsed or default segment was used. Make a wrapper parse_pci so the rest of the callers are not affected. Signed

[Xen-devel] [PATCH v7 0/4] iommu: add rmrr Xen command line option

2015-06-02 Thread elena . ufimtseva
From: Elena Ufimtseva v7 of rmrr comman line patches. Thank you for comments on v6. Add Xen command line option rmrr to specify RMRR regions for devices that are not defined in ACPI thus

[Xen-devel] [PATCH v7 1/4] pci: add PCI_SBDF and PCI_SEG macros

2015-06-02 Thread elena . ufimtseva
From: Elena Ufimtseva Signed-off-by: Elena Ufimtseva --- xen/include/xen/pci.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h index 3908146..414106a 100644 --- a/xen/include/xen/pci.h +++ b/xen/include/xen/pci.h @@ -33,6 +33,8 @@ #define PCI

[Xen-devel] [PATCH v3] dmar: device scope mem leak fix

2015-06-02 Thread elena . ufimtseva
From: Elena Ufimtseva Third attempt to incorporate memory leak fix. Thanks for comment on v2. Release memory allocated for scope.devices when disabling dmar units. Also set device count after memory allocation when device scope parsing. Changes in v3: - make freeing memory for scope devices an

Re: [Xen-devel] [PATCHv2] frontswap: allow multiple backends

2015-06-02 Thread Andrew Morton
On Mon, 1 Jun 2015 10:22:24 -0400 Dan Streetman wrote: > Change frontswap single pointer to a singly linked list of frontswap > implementations. Update Xen tmem implementation as register no longer > returns anything. > > Frontswap only keeps track of a single implementation; any implementatio

[Xen-devel] [seabios test] 57755: tolerable FAIL - PUSHED

2015-06-02 Thread osstest service user
flight 57755 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/57755/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 12 guest-localmigrate fail never pass test-amd64-amd64-xl-qemuu-debianhvm-am

Re: [Xen-devel] [Patch v3 27/36] x86, irq: Use access helper irq_data_get_affinity_mask()

2015-06-02 Thread Thomas Gleixner
On Mon, 1 Jun 2015, Jiang Liu wrote: > diff --git a/arch/x86/kernel/apic/vector.c b/arch/x86/kernel/apic/vector.c > index 9b62f690b0ff..dfa3a5f5b3d3 100644 > --- a/arch/x86/kernel/apic/vector.c > +++ b/arch/x86/kernel/apic/vector.c > @@ -494,9 +494,8 @@ static int apic_set_affinity(struct irq_data

[Xen-devel] [xen-4.3-testing test] 57749: regressions - trouble: blocked/broken/fail/pass

2015-06-02 Thread osstest service user
flight 57749 xen-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/57749/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 3 host-install(3) broken in 57680 REGR. vs. 53768 test-amd64-i386-x

Re: [Xen-devel] [PATCH v2 23/41] arm : acpi create chosen node for DOM0

2015-06-02 Thread Julien Grall
Hi Parth, On 17/05/15 21:03, Parth Dixit wrote: > Create a chosen node for DOM0 with > - bootargs > - initrd I would have merge this patch with #22. It doesn't contain controversial/difficult code. > Signed-off-by: Naresh Bhat > Signed-off-by: Parth Dixit > --- > xen/arch/arm/domain_build.c

Re: [Xen-devel] RFC: QEMU bumping memory limit and domain restore

2015-06-02 Thread Wei Liu
On Tue, Jun 02, 2015 at 05:11:02PM +0100, Andrew Cooper wrote: > On 02/06/15 16:49, Ian Campbell wrote: > > On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote: > > [...] > >>> So here is a proof of concept patch to record and honour that value > >>> during migration. A new field is added in IDL. Not

Re: [Xen-devel] RFC: QEMU bumping memory limit and domain restore

2015-06-02 Thread Wei Liu
On Tue, Jun 02, 2015 at 04:49:09PM +0100, Ian Campbell wrote: > On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote: > [...] > > > So here is a proof of concept patch to record and honour that value > > > during migration. A new field is added in IDL. Note that we don't > > > provide xl level config

Re: [Xen-devel] [PATCH v2 22/41] arm : acpi create min DT stub for DOM0

2015-06-02 Thread Julien Grall
Hi Parth, On 17/05/15 21:03, Parth Dixit wrote: > Create a DT for DOM0 for ACPI-case only. > DT contains minmal required informations such as s/minmal/minimal/ > DOM0 bootargs, initrd, efi description table > and address of uefi memory table. > Add placeholder for tables to be marked as > reserv

Re: [Xen-devel] [PATCH v4 0/9] add xenalyze to staging

2015-06-02 Thread George Dunlap
On 05/23/2015 09:24 AM, Olaf Hering wrote: > Having xenalyze in the source tree makes it much easier to keep private > debug code in hypervisor and xenalyze in sync. It helped alot while > debugging the root cause for commit 607e8494c42397fb249191904066cace6ac9a880. > > changes between v3 and v4:

Re: [Xen-devel] [PATCH v4 7/9] xenalyze: handle more events in sched_process

2015-06-02 Thread George Dunlap
On 05/23/2015 09:24 AM, Olaf Hering wrote: > Signed-off-by: Olaf Hering > Acked-by: Wei Liu > Cc: Ian Jackson > Cc: Stefano Stabellini > Cc: Ian Campbell > Cc: Wei Liu > --- > tools/xentrace/xenalyze.c | 75 > ++- > 1 file changed, 68 insertions(+

Re: [Xen-devel] RFC: making the PVH 64bit ABI as stableo

2015-06-02 Thread Boris Ostrovsky
On 06/02/2015 12:51 PM, Stefano Stabellini wrote: On Tue, 2 Jun 2015, Jan Beulich wrote: On 02.06.15 at 17:11, wrote: Hello, The document describing the PVH interface was committed 9 months ago [1], and since then there hasn't been any change regarding the interface. PVH is still missing feat

Re: [Xen-devel] RFC: making the PVH 64bit ABI as stableo

2015-06-02 Thread Andrew Cooper
On 02/06/15 17:51, Stefano Stabellini wrote: > On Tue, 2 Jun 2015, Jan Beulich wrote: > On 02.06.15 at 17:11, wrote: >>> Hello, >>> >>> The document describing the PVH interface was committed 9 months ago >>> [1], and since then there hasn't been any change regarding the >>> interface. PVH is

Re: [Xen-devel] [PATCH v4 2/9] xenalyze: add to tools/xentrace/

2015-06-02 Thread George Dunlap
On 05/25/2015 09:34 AM, Wei Liu wrote: > On Sat, May 23, 2015 at 08:24:11AM +, Olaf Hering wrote: >> This merges xenalyze.hg, changeset 150:24308507be1d, >> into tools/xentrace/xenalyze.c to have the tool and >> public/trace.h in one place. >> >> Signed-off-by: Olaf Hering >> Cc: Ian Jackson

Re: [Xen-devel] [PATCH v4 1/9] xentrace: install into sbin

2015-06-02 Thread George Dunlap
On 05/23/2015 09:24 AM, Olaf Hering wrote: > Collecting the trace buffer requires root permissions. Adjust Makefile > to install xentrace and xentrace_setsize into sbindir. Leave the > existing support for BIN in place for upcoming changes. > > Signed-off-by: Olaf Hering > Cc: George Dunlap Ack

Re: [Xen-devel] [PATCH v2] tools: link executables with libtinfo explicitly

2015-06-02 Thread Wei Liu
On Tue, Jun 02, 2015 at 03:33:26PM +0200, Daniel Kiper wrote: > binutils 2.22 changed ld default from --copy-dt-needed-entries > to -no-copy-dt-needed-entries. This revealed that some objects > are linked implicitly with libtinfo and newer ld fails to build > relevant executables. > > Below is sho

Re: [Xen-devel] [PATCH RFC 2/5] blkif: document new blkback path xenstore node

2015-06-02 Thread Wei Liu
On Tue, Jun 02, 2015 at 05:22:04PM +0200, Roger Pau Monné wrote: > El 01/06/15 a les 15.24, Wei Liu ha escrit: > > On Fri, May 22, 2015 at 11:18:55AM +0200, Roger Pau Monne wrote: > >> FreeBSD blkback uses the path xenstore node in order to fetch the path to > >> the underlying backing storage (eit

Re: [Xen-devel] RFC: making the PVH 64bit ABI as stableo

2015-06-02 Thread Stefano Stabellini
On Tue, 2 Jun 2015, Jan Beulich wrote: > >>> On 02.06.15 at 17:11, wrote: > > Hello, > > > > The document describing the PVH interface was committed 9 months ago > > [1], and since then there hasn't been any change regarding the > > interface. PVH is still missing features in order to have featur

Re: [Xen-devel] [PATCH RFC 1/2] libxl: allow /local/domain/0/device-model/$DOMID to be written by $DOMID

2015-06-02 Thread Wei Liu
On Mon, Jun 01, 2015 at 05:01:34PM +0100, Stefano Stabellini wrote: > The device model is going to restrict its xenstore connection to $DOMID > level. Let it access /local/domain/0/device-model/$DOMID, as it is > required by QEMU to read/write the physmap. It doesn't contain any > information the g

Re: [Xen-devel] [PULL 0/11] Xen PCI Passthrough security fixes

2015-06-02 Thread Peter Maydell
On 2 June 2015 at 16:39, Stefano Stabellini wrote: > The following changes since commit 3fc827d591679f3e262b9d1f8b34528eabfca8c0: > > target-arm: Correct check for non-EL3 (2015-06-02 13:22:29 +0100) > > are available in the git repository at: > > git://xenbits.xen.org/people/sstabellini/qemu-

Re: [Xen-devel] [RFC][v2][PATCH 10/14] tools: extend XENMEM_set_memory_map

2015-06-02 Thread Wei Liu
On Fri, May 22, 2015 at 05:35:10PM +0800, Tiejun Chen wrote: > Here we'll construct a basic guest e820 table via > XENMEM_set_memory_map. This table includes lowmem, highmem > and RDMs if they exist. And hvmloader would need this info > later. > > Signed-off-by: Tiejun Chen > --- > tools/libxl/l

[Xen-devel] [xen-4.5-testing test] 57747: tolerable FAIL - PUSHED

2015-06-02 Thread osstest service user
flight 57747 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/57747/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-sedf-pin 3 host-install(3) broken in 57676 pass in 57747 test-armhf-armhf-libvirt 3

Re: [Xen-devel] [RFC][v2][PATCH 08/14] tools: extend xc_assign_device() to support rdm reservation policy

2015-06-02 Thread Wei Liu
On Fri, May 22, 2015 at 05:35:08PM +0800, Tiejun Chen wrote: > This patch passes rdm reservation policy to xc_assign_device() so the policy > is checked when assigning devices to a VM. > > Signed-off-by: Tiejun Chen > --- > tools/libxc/include/xenctrl.h | 3 ++- > tools/libxc/xc_domain.c

[Xen-devel] [PATCHv11 4/4] gnttab: use per-VCPU maptrack free lists

2015-06-02 Thread David Vrabel
Performance analysis of aggregate network throughput with many VMs shows that performance is signficantly limited by contention on the maptrack lock when obtaining/releasing maptrack handles from the free list. Instead of a single free list use a per-VCPU list. This avoids any contention when obta

Re: [Xen-devel] [RFC][v2][PATCH 04/14] tools/libxl: detect and avoid conflicts with RDM

2015-06-02 Thread Wei Liu
On Fri, May 22, 2015 at 05:35:04PM +0800, Tiejun Chen wrote: > While building a VM, HVM domain builder provides struct hvm_info_table{} > to help hvmloader. Currently it includes two fields to construct guest > e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we should > check them to

[Xen-devel] [PATCHv11 1/4] gnttab: per-active entry locking

2015-06-02 Thread David Vrabel
Introduce a per-active entry spin lock to protect active entry state The grant table lock must be locked before acquiring (locking) an active entry. This is a step in reducing contention on the grant table lock, but will only do so once the grant table lock is turned into a read-write lock. Based

[Xen-devel] [PATCHv11 2/4] gnttab: introduce maptrack lock

2015-06-02 Thread David Vrabel
Split grant table lock into two separate locks. One to protect maptrack state (maptrack_lock) and one for everything else (lock). Based on a patch originally by Matt Wilson . Signed-off-by: David Vrabel Reviewed-by: Jan Beulich --- docs/misc/grant-tables.txt|9 + xen/common/gra

[Xen-devel] [PATCHv11 3/4] gnttab: make the grant table lock a read-write lock

2015-06-02 Thread David Vrabel
In combination with the per-active entry locks, the grant table lock can be made a read-write lock since the majority of cases only the read lock is required. The grant table read lock protects against changes to the table version or size (which are done with the write lock held). The write lock i

Re: [Xen-devel] [PATCH v2 for Xen 4.6 1/4] xen: enabling XL to set per-VCPU parameters of a domain for RTDS scheduler

2015-06-02 Thread George Dunlap
On Tue, May 26, 2015 at 1:05 AM, Chong Li wrote: > Add two hypercalls(XEN_DOMCTL_SCHEDOP_getvcpuinfo/putvcpuinfo) to get/set a > domain's > per-VCPU parameters. Hypercalls are handled by newly added hook > (.adjust_vcpu) in the > scheduler interface. > > Add a new data structure (struct xen_domc

[Xen-devel] [PATCHv11 0/4] gnttab: Improve scaleability

2015-06-02 Thread David Vrabel
The series builds on the original series by Matt Wilson and Christoph Egger from Amazon. Performance results for aggregate intrahost network throughput (between 20 VM pairs, with 16 dom0 VCPUs) show substantial improvements. Throughput/Gbit/s Base

[Xen-devel] [rumpuserxen test] 57793: regressions - FAIL

2015-06-02 Thread osstest service user
flight 57793 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/57793/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866 build-i386-rumpuserxe

Re: [Xen-devel] [PATCH v7 00/10] toolstack-based approach to pvhvm guest kexec

2015-06-02 Thread Vitaly Kuznetsov
Ian Campbell writes: > On Thu, 2015-05-28 at 15:41 +0200, Vitaly Kuznetsov wrote: >> > I.e. what you currently implement is David's model without Konrad's >> > later alternative really having been explored? Iiuc David's main >> > reservation (which I share) was against a myriad of reset-this and

Re: [Xen-devel] [PATCH v1 0/5] Misc cleanups for libxl

2015-06-02 Thread Yang Hongyang
Hi Ian, Thank you very much for taking time to review this! On 06/02/2015 10:53 PM, Ian Campbell wrote: On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote: I've just been through this, sorry for the delay. I also have written on my TODO list "Remus on Migration-v2 (v7)", but I have no s

Re: [Xen-devel] [PATCH v1 4/5] tools/libxl: move toolstack code into libxl_toolstack.c

2015-06-02 Thread Yang Hongyang
On 06/02/2015 10:48 PM, Ian Campbell wrote: On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote: move toolstack code into libxl_toolstack.c It's not clear to me what "toolstack code" is here, the whole of libxl and xl is "toolstack code". Is the code being moved stuff to do with adding t

Re: [Xen-devel] "tcp: refine TSO autosizing" causes performance regression on Xen

2015-06-02 Thread Eric Dumazet
On Tue, 2015-06-02 at 10:52 +0100, Wei Liu wrote: > Hi Eric > > Sorry for coming late to the discussion. > > On Thu, Apr 16, 2015 at 05:42:16AM -0700, Eric Dumazet wrote: > > On Thu, 2015-04-16 at 11:01 +0100, George Dunlap wrote: > > > > > He suggested that after he'd been prodded by 4 more e-m

Re: [Xen-devel] RFC: QEMU bumping memory limit and domain restore

2015-06-02 Thread Andrew Cooper
On 02/06/15 16:49, Ian Campbell wrote: > On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote: > [...] >>> So here is a proof of concept patch to record and honour that value >>> during migration. A new field is added in IDL. Note that we don't >>> provide xl level config option for it and mandate it

Re: [Xen-devel] [PATCH v1 3/5] tools/libxl: move remus codes into libxl_remus.c

2015-06-02 Thread Yang Hongyang
On 06/02/2015 10:46 PM, Ian Campbell wrote: On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote: move remus codes into libxl_remus.c "code" Apart from dropping some "static" and adding some prototypes to the header this is purely motion, correct? (I assume this about the last one too).

Re: [Xen-devel] [PATCH v1 2/5] tools/libxl: move domain suspend codes into a separate file

2015-06-02 Thread Yang Hongyang
On 06/02/2015 10:45 PM, Ian Campbell wrote: On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote: diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h index f86fc89..b2eeb89 100644 --- a/tools/libxl/libxl_internal.h +++ b/tools/libxl/libxl_internal.h @@ -3191,6 +3191,12 @

Re: [Xen-devel] [PATCH v1 1/5] libxl/save: Refactor libxl__domain_suspend_state

2015-06-02 Thread Yang Hongyang
On 06/02/2015 10:40 PM, Ian Campbell wrote: On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote: @@ -1762,16 +1762,18 @@ static void libxl__domain_suspend_callback(void *data) { libxl__save_helper_state *shs = data; libxl__egc *egc = shs->egc; -libxl__domain_suspend_state *

Re: [Xen-devel] [PATCH v2 for Xen 4.6 1/4] xen: enabling XL to set per-VCPU parameters of a domain for RTDS scheduler

2015-06-02 Thread George Dunlap
On Fri, May 29, 2015 at 2:51 PM, Dario Faggioli wrote: > On Mon, 2015-05-25 at 19:05 -0500, Chong Li wrote: > >> diff --git a/xen/common/domctl.c b/xen/common/domctl.c >> index 28aea55..8143c44 100644 >> --- a/xen/common/domctl.c >> +++ b/xen/common/domctl.c >> @@ -841,6 +841,11 @@ long do_domctl(

Re: [Xen-devel] [PATCH V8] xen/vm_event: Clean up control-register-write vm_events and add XCR0 event

2015-06-02 Thread Razvan Cojocaru
On 06/02/2015 06:39 PM, Ian Campbell wrote: > On Fri, 2015-05-29 at 16:45 +0300, Razvan Cojocaru wrote: >> As suggested by Andrew Cooper, this patch attempts to remove >> some redundancy and allow for an easier time when adding vm_events >> for new control registers in the future, by having a singl

Re: [Xen-devel] [RFC][v2][PATCH 01/14] tools: introduce some new parameters to set rdm policy

2015-06-02 Thread Wei Liu
On Fri, May 22, 2015 at 05:35:01PM +0800, Tiejun Chen wrote: > This patch introduces user configurable parameters to specify RDM > resource and according policies, > > Global RDM parameter: > rdm = [ 'type=none/host, reserve=strict/relaxed' ] > Per-device RDM parameter: > pci = [ 'sbdf, rd

Re: [Xen-devel] [PATCH V8] xen/vm_event: Clean up control-register-write vm_events and add XCR0 event

2015-06-02 Thread Ian Campbell
On Tue, 2015-06-02 at 16:43 +0100, Andrew Cooper wrote: > On 02/06/15 16:39, Ian Campbell wrote: > > On Fri, 2015-05-29 at 16:45 +0300, Razvan Cojocaru wrote: > >> As suggested by Andrew Cooper, this patch attempts to remove > >> some redundancy and allow for an easier time when adding vm_events >

Re: [Xen-devel] [PATCH 0/11] Xen PCI Passthrough security fixes

2015-06-02 Thread Peter Maydell
On 2 June 2015 at 16:32, Stefano Stabellini wrote: > On Tue, 2 Jun 2015, Stefano Stabellini wrote: >> Hi all, >> >> the following is a collection of QEMU security fixes for PCI Passthrough >> on Xen. Non-Xen usages of QEMU are unaffected. >> >> Although the CVEs have already been made public, give

Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-02 Thread Malcolm Crossley
On 02/06/15 15:34, Konrad Rzeszutek Wilk wrote: > On Tue, Jun 02, 2015 at 11:06:26AM +0100, Malcolm Crossley wrote: >> On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote: >>> On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote: On 01/06/15 16:43, Ross Lagerwall wrote: > On 06/01/2

[Xen-devel] [PULL 11/11] xen/pt: unknown PCI config space fields should be read-only

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich ... by default. Add a per-device "permissive" mode similar to pciback's to allow restoring previous behavior (and hence break security again, i.e. should be used only for trusted guests). This is part of XSA-131. Signed-off-by: Jan Beulich Acked-by: Stefano Stabellini Review

Re: [Xen-devel] RFC: QEMU bumping memory limit and domain restore

2015-06-02 Thread Ian Campbell
On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote: [...] > > So here is a proof of concept patch to record and honour that value > > during migration. A new field is added in IDL. Note that we don't > > provide xl level config option for it and mandate it to be default value > > during domain creat

Re: [Xen-devel] [PATCH 0/11] Xen PCI Passthrough security fixes

2015-06-02 Thread Ian Campbell
On Tue, 2015-06-02 at 16:08 +0100, Stefano Stabellini wrote: > the following is a collection of QEMU security fixes for PCI Passthrough > on Xen. Part of this locks down the PCI cfg space emulation, which means we now need a way for people to request the old "permissive" behaviour for devices whic

Re: [Xen-devel] RFC: making the PVH 64bit ABI as stable

2015-06-02 Thread Jan Beulich
>>> On 02.06.15 at 17:11, wrote: > Hello, > > The document describing the PVH interface was committed 9 months ago > [1], and since then there hasn't been any change regarding the > interface. PVH is still missing features in order to have feature parity > with pure PV, mainly: > > - DomU mirat

Re: [Xen-devel] [PATCH V8] xen/vm_event: Clean up control-register-write vm_events and add XCR0 event

2015-06-02 Thread Andrew Cooper
On 02/06/15 16:39, Ian Campbell wrote: > On Fri, 2015-05-29 at 16:45 +0300, Razvan Cojocaru wrote: >> As suggested by Andrew Cooper, this patch attempts to remove >> some redundancy and allow for an easier time when adding vm_events >> for new control registers in the future, by having a single >>

[Xen-devel] [PULL 07/11] xen/pt: split out calculation of throughable mask in PCI config space handling

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich This is just to avoid having to adjust that calculation later in multiple places. Note that including ->ro_mask in get_throughable_mask()'s calculation is only an apparent (i.e. benign) behavioral change: For r/o fields it doesn't matter > whether they get passed through - eith

[Xen-devel] [PULL 03/11] xen/MSI-X: limit error messages

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich Limit error messages resulting from bad guest behavior to avoid allowing the guest to cause the control domain's disk to fill. The first message in pci_msix_write() can simply be deleted, as this is indeed bad guest behavior, but such out of bounds writes don't really need to b

[Xen-devel] [PULL 04/11] xen/MSI: don't open-code pass-through of enable bit modifications

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich Without this the actual XSA-131 fix would cause the enable bit to not get set anymore (due to the write back getting suppressed there based on the OR of emu_mask, ro_mask, and res_mask). Note that the fiddling with the enable bit shouldn't really be done by qemu, but making thi

[Xen-devel] [PULL 05/11] xen/pt: consolidate PM capability emu_mask

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich There's no point in xen_pt_pmcsr_reg_{read,write}() each ORing PCI_PM_CTRL_STATE_MASK and PCI_PM_CTRL_NO_SOFT_RESET into a local emu_mask variable - we can have the same effect by setting the field descriptor's emu_mask member suitably right away. Note that xen_pt_pmcsr_reg_writ

[Xen-devel] [PULL 06/11] xen/pt: correctly handle PM status bit

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich xen_pt_pmcsr_reg_write() needs an adjustment to deal with the RW1C nature of the not passed through bit 15 (PCI_PM_CTRL_PME_STATUS). This is a preparatory patch for XSA-131. Signed-off-by: Jan Beulich Reviewed-by: Stefano Stabellini --- hw/xen/xen_pt_config_init.c |3 ++

[Xen-devel] [PULL 09/11] xen/pt: mark reserved bits in PCI config space fields

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich The adjustments are solely to make the subsequent patches work right (and hence make the patch set consistent), namely if permissive mode (introduced by the last patch) gets used (as both reserved registers and reserved fields must be similarly protected from guest access in def

[Xen-devel] [PULL 10/11] xen/pt: add a few PCI config space field descriptions

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich Since the next patch will turn all not explicitly described fields read-only by default, those fields that have guest writable bits need to be given explicit descriptors. This is a preparatory patch for XSA-131. Signed-off-by: Jan Beulich --- hw/xen/xen_pt_config_init.c |

[Xen-devel] [PULL 08/11] xen/pt: mark all PCIe capability bits read-only

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich xen_pt_emu_reg_pcie[]'s PCI_EXP_DEVCAP needs to cover all bits as read- only to avoid unintended write-back (just a precaution, the field ought to be read-only in hardware). This is a preparatory patch for XSA-131. Signed-off-by: Jan Beulich Reviewed-by: Stefano Stabellini -

[Xen-devel] [PULL 02/11] xen: don't allow guest to control MSI mask register

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich It's being used by the hypervisor. For now simply mimic a device not capable of masking, and fully emulate any accesses a guest may issue nevertheless as simple reads/writes without side effects. This is XSA-129. Signed-off-by: Jan Beulich Reviewed-by: Stefano Stabellini ---

[Xen-devel] [PULL 01/11] xen: properly gate host writes of modified PCI CFG contents

2015-06-02 Thread Stefano Stabellini
From: Jan Beulich The old logic didn't work as intended when an access spanned multiple fields (for example a 32-bit access to the location of the MSI Message Data field with the high 16 bits not being covered by any known field). Remove it and derive which fields not to write to from the accesse

Re: [Xen-devel] [PATCH V8] xen/vm_event: Clean up control-register-write vm_events and add XCR0 event

2015-06-02 Thread Ian Campbell
On Fri, 2015-05-29 at 16:45 +0300, Razvan Cojocaru wrote: > As suggested by Andrew Cooper, this patch attempts to remove > some redundancy and allow for an easier time when adding vm_events > for new control registers in the future, by having a single > VM_EVENT_REASON_WRITE_CTRLREG vm_event type,

[Xen-devel] [PULL 0/11] Xen PCI Passthrough security fixes

2015-06-02 Thread Stefano Stabellini
The following changes since commit 3fc827d591679f3e262b9d1f8b34528eabfca8c0: target-arm: Correct check for non-EL3 (2015-06-02 13:22:29 +0100) are available in the git repository at: git://xenbits.xen.org/people/sstabellini/qemu-dm.git xen-15-06-02 for you to fetch changes up to c25bbf1545a

Re: [Xen-devel] RFC: making the PVH 64bit ABI as stable

2015-06-02 Thread Andrew Cooper
On 02/06/15 16:11, Roger Pau Monné wrote: > Hello, > > The document describing the PVH interface was committed 9 months ago > [1], and since then there hasn't been any change regarding the > interface. PVH is still missing features in order to have feature parity > with pure PV, mainly: > > - DomU

Re: [Xen-devel] [PATCH 0/11] Xen PCI Passthrough security fixes

2015-06-02 Thread Stefano Stabellini
On Tue, 2 Jun 2015, Stefano Stabellini wrote: > Hi all, > > the following is a collection of QEMU security fixes for PCI Passthrough > on Xen. Non-Xen usages of QEMU are unaffected. > > Although the CVEs have already been made public, given the large amount > of changes, I decided not to send a p

Re: [Xen-devel] [PATCH v7 10/10] (lib)xl: soft reset support

2015-06-02 Thread Ian Campbell
On Wed, 2015-05-27 at 17:25 +0200, Vitaly Kuznetsov wrote: > Perform soft reset when a domain did SHUTDOWN_soft_reset. Migrate the > content with xc_domain_soft_reset(), reload dm and toolstack. > > Signed-off-by: Vitaly Kuznetsov > --- > Changes in v7: > - Save toolstack earlier. > - Introduce L

  1   2   >