>>> On 02.06.15 at 19:12, wrote:
>- working with shadow code (which is what we use when migrating HVM
> guests). But the nice side-benefit is that we can then run PVH on
> machines without VMX or SVM support.
Without VMX/SVM? What's the H then in PVH? Or did you mean
without EPT/NPT?
Jan
_
The major responsibility of talk_to_blkback() is allocate and initialize
the request ring and write the ring info to xenstore.
But this work should be done after backend entered 'XenbusStateInitWait' as
defined in the protocol file.
See xen/include/public/io/blkif.h in XEN git tree:
Front
Extend xen/block to support multi-page ring, so that more requests can be
issued by using more than one pages as the request ring between blkfront
and backend.
As a result, the performance can get improved significantly.
We got some impressive improvements on our highend iscsi storage cluster
back
This is a pre-patch for multi-page ring feature.
In connect_ring, we can know exactly how many pages are used for the shared
ring, delay pending_req allocation here so that we won't waste too much memory.
Signed-off-by: Bob Liu
---
drivers/block/xen-blkback/common.h |2 +-
drivers/block/xen-
Detect Intel Cache Allocation Technology(CAT) feature and store the
cpuid information for later use. Currently only L3 cache allocation is
supported. The L3 CAT features may vary among sockets so per-socket
feature information is stored. The initialization can happen either at
boot time or when CPU
Add xsm policies for Cache Allocation Technology(CAT) related hypercalls
to restrict the functions visibility to control domain only.
Signed-off-by: Chao Peng
Acked-by: Daniel De Graaf
---
tools/flask/policy/policy/modules/xen/xen.if | 2 +-
tools/flask/policy/policy/modules/xen/xen.te | 4 +++
Use "-" instead of "_" for monitor types.
Signed-off-by: Chao Peng
Reviewed-by: Dario Faggioli
Acked-by: Ian Campbell
---
tools/libxl/xl_cmdimpl.c | 6 +++---
tools/libxl/xl_cmdtable.c | 6 +++---
2 files changed, 6 insertions(+), 6 deletions(-)
diff --git a/tools/libxl/xl_cmdimpl.c b/tools
Add libxl_socket_bitmap_alloc() to allow allocating a socket specific
libxl_bitmap (as it is for cpu/node bitmap).
Internal function libxl__count_physical_sockets() is introduced together
to get the socket count when the size of bitmap is not specified.
Signed-off-by: Chao Peng
Acked-by: Ian Cam
For CAT, COS is maintained in hypervisor only while CBM is exposed to
user space directly to allow getting/setting domain's cache capacity.
For each specified CBM, hypervisor will either use a existed COS which
has the same CBM or allocate a new one if the same CBM is not found. If
the allocation f
General CAT information such as maximum COS and CBM length are exposed to
user space by a SYSCTL hypercall, to help user space to construct the CBM.
Signed-off-by: Chao Peng
Reviewed-by: Andrew Cooper
---
Changes in v9:
* Initialize 'info' explictly so that compiler would not complain.
* Simplif
This is the xc/xl changes to support Intel Cache Allocation
Technology(CAT).
'xl psr-hwinfo' is updated to show CAT info and two new commands
for CAT are introduced:
- xl psr-cat-cbm-set [-s socket]
Set cache capacity bitmasks(CBM) for a domain.
- xl psr-cat-show
Show CAT domain information
In Xen's implementation, the CAT enforcement granularity is per domain.
Due to the length of CBM and the number of COS may be socket-different,
each domain has COS ID for each socket. The domain get COS=0 by default
and at runtime its COS is then allocated dynamically when user specifies
a CBM for
Maintain socket_cpumask which contains all the HT and core siblings
in the same socket.
Signed-off-by: Chao Peng
---
Changes in v9:
* Add comments for set_nr_sockets.
* Move set_nr_sockets() invocation from __start_xen() to smp_prepare_cpus().
Changes in v8:
* Remove total_cpus and retrofit the a
For each socket, a COS to CBM mapping structure is maintained for each
COS. The mapping is indexed by COS and the value is the corresponding
CBM. Different VMs may use the same CBM, a reference count is used to
indicate if the CBM is available.
Signed-off-by: Chao Peng
---
Changes in v9:
* Alloca
Changes in v9:
Address comments from Jan, mainly:
* Move set_nr_sockets() invocation from __start_xen() to smp_prepare_cpus().
* Add check for cpuid_level.
* Add priority for cpu notifier.
* Allocate cos_to_cbm with opt_cos_max instead of the actual cos_max from cpuid.
* Move CAT initialization cod
Add document to introduce basic concepts and terms in PSR family
technologies and the xl interfaces.
Signed-off-by: Chao Peng
Acked-by: Ian Campbell
---
Changes in v7:
* Correct 'xl psr-hwinfo'.
Changes in v6:
* Address comments from Ian.
Changes in v5:
* Address comments from Andrew/Ian.
---
d
Add dedicated one to show hardware information.
[root@vmm-psr]xl psr-hwinfo
Cache Monitoring Technology (CMT):
Enabled : 1
Total RMID : 63
Supported monitor types:
cache-occupancy
total-mem-bandwidth
local-mem-bandwidth
Signed-off-by: Chao Peng
Reviewed-by: Dario Faggioli
Acked-by:
On context switch, write the the domain's Class of Service(COS) to MSR
IA32_PQR_ASSOC, to notify hardware to use the new COS.
For performance reason, the COS mask for current cpu is also cached in
the local per-CPU variable.
Signed-off-by: Chao Peng
Acked-by: Jan Beulich
---
Changes in v5:
* Re
Use access helper irq_data_get_affinity_mask() to hide implementation
details of struct irq_desc.
Signed-off-by: Jiang Liu
---
Hi Thomas,
This version changes the patch to correctly support bisecting.
Thanks!
Gerry
---
arch/x86/kernel/apic/io_apic.c |2 +-
arch/x86/kernel/apic/vect
On 2015/6/3 0:42, Wei Liu wrote:
On Fri, May 22, 2015 at 05:35:10PM +0800, Tiejun Chen wrote:
Here we'll construct a basic guest e820 table via
XENMEM_set_memory_map. This table includes lowmem, highmem
and RDMs if they exist. And hvmloader would need this info
later.
Signed-off-by: Tiejun Chen
On 2015/6/3 0:36, Wei Liu wrote:
On Fri, May 22, 2015 at 05:35:08PM +0800, Tiejun Chen wrote:
This patch passes rdm reservation policy to xc_assign_device() so the policy
is checked when assigning devices to a VM.
Signed-off-by: Tiejun Chen
---
tools/libxc/include/xenctrl.h | 3 ++-
flight 57781 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57781/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xend-winxpsp3 16 guest-stop fail REGR. vs. 53018
test-amd64-i386-x
On 06/03/2015 12:22 AM, Yang Hongyang wrote:
On 06/02/2015 10:48 PM, Ian Campbell wrote:
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
move toolstack code into libxl_toolstack.c
It's not clear to me what "toolstack code" is here, the whole of libxl
and xl is "toolstack code".
I
On 2015/6/3 0:29, Wei Liu wrote:
On Fri, May 22, 2015 at 05:35:04PM +0800, Tiejun Chen wrote:
While building a VM, HVM domain builder provides struct hvm_info_table{}
to help hvmloader. Currently it includes two fields to construct guest
e820 table by hvmloader, low_mem_pgend and high_mem_pgend.
On 2015/6/3 3:19, Thomas Gleixner wrote:
> On Mon, 1 Jun 2015, Jiang Liu wrote:
>
>> diff --git a/arch/x86/kernel/apic/vector.c b/arch/x86/kernel/apic/vector.c
>> index 9b62f690b0ff..dfa3a5f5b3d3 100644
>> --- a/arch/x86/kernel/apic/vector.c
>> +++ b/arch/x86/kernel/apic/vector.c
>> @@ -494,9 +494
+=item B
Stray space after before and after "RDM_RESERVE_STRING".
Sure,
=item B
+
+(HVM/x86 only) Specifies the information about Reserved Device Memory (RDM),
+which is necessary to enable robust device passthrough usage. One example of
Delete "usage".
Okay.
+RDM is reported thro
On 06/02/2015 11:49 PM, Ian Campbell wrote:
On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote:
[...]
So here is a proof of concept patch to record and honour that value
during migration. A new field is added in IDL. Note that we don't
provide xl level config option for it and mandate it to be
On Tue, 2 Jun 2015 18:08:46 -0400 Dan Streetman wrote:
> Change frontswap single pointer to a singly linked list of frontswap
> implementations. Update Xen tmem implementation as register no longer
> returns anything.
>
> Frontswap only keeps track of a single implementation; any implementatio
Change frontswap single pointer to a singly linked list of frontswap
implementations. Update Xen tmem implementation as register no longer
returns anything.
Frontswap only keeps track of a single implementation; any implementation
that registers second (or later) will replace the previously regis
On Tue, Jun 2, 2015 at 5:06 PM, Andrew Morton wrote:
> On Mon, 1 Jun 2015 10:22:24 -0400 Dan Streetman wrote:
>
>> Change frontswap single pointer to a singly linked list of frontswap
>> implementations. Update Xen tmem implementation as register no longer
>> returns anything.
>>
>> Frontswap o
From: Elena Ufimtseva
In preparation for auxiliary RMRR data provided on Xen
command line, make RMRR adding a separate function.
Also free memery for rmrr device scope in error path.
Signed-off-by: Elena Ufimtseva
---
xen/drivers/passthrough/vtd/dmar.c | 130 ---
From: Elena Ufimtseva
From: Elena Ufimtseva
On some platforms RMRR regions may be not specified
in ACPI and thus will not be mapped 1:1 in dom0. This
causes IO Page Faults and prevents dom0 from booting
in PVH mode.
New Xen command line option rmrr allows to specify
such devices and memory regi
From: Elena Ufimtseva
For sbdf'si parsing in rmrr command line add __parse_pci with addtional
parameter def_seg. __parse_pci will help to identify if segment was
found
in string being parsed or default segment was used.
Make a wrapper parse_pci so the rest of the callers are not affected.
Signed
From: Elena Ufimtseva
v7 of rmrr comman line patches.
Thank you for comments on v6.
Add Xen command line option rmrr to specify RMRR
regions for devices that are not defined in ACPI thus
From: Elena Ufimtseva
Signed-off-by: Elena Ufimtseva
---
xen/include/xen/pci.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h
index 3908146..414106a 100644
--- a/xen/include/xen/pci.h
+++ b/xen/include/xen/pci.h
@@ -33,6 +33,8 @@
#define PCI
From: Elena Ufimtseva
Third attempt to incorporate memory leak fix.
Thanks for comment on v2.
Release memory allocated for scope.devices when disabling
dmar units. Also set device count after memory allocation when
device scope parsing.
Changes in v3:
- make freeing memory for scope devices an
On Mon, 1 Jun 2015 10:22:24 -0400 Dan Streetman wrote:
> Change frontswap single pointer to a singly linked list of frontswap
> implementations. Update Xen tmem implementation as register no longer
> returns anything.
>
> Frontswap only keeps track of a single implementation; any implementatio
flight 57755 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57755/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 12 guest-localmigrate fail never
pass
test-amd64-amd64-xl-qemuu-debianhvm-am
On Mon, 1 Jun 2015, Jiang Liu wrote:
> diff --git a/arch/x86/kernel/apic/vector.c b/arch/x86/kernel/apic/vector.c
> index 9b62f690b0ff..dfa3a5f5b3d3 100644
> --- a/arch/x86/kernel/apic/vector.c
> +++ b/arch/x86/kernel/apic/vector.c
> @@ -494,9 +494,8 @@ static int apic_set_affinity(struct irq_data
flight 57749 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57749/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 3 host-install(3) broken in 57680 REGR. vs. 53768
test-amd64-i386-x
Hi Parth,
On 17/05/15 21:03, Parth Dixit wrote:
> Create a chosen node for DOM0 with
> - bootargs
> - initrd
I would have merge this patch with #22. It doesn't contain
controversial/difficult code.
> Signed-off-by: Naresh Bhat
> Signed-off-by: Parth Dixit
> ---
> xen/arch/arm/domain_build.c
On Tue, Jun 02, 2015 at 05:11:02PM +0100, Andrew Cooper wrote:
> On 02/06/15 16:49, Ian Campbell wrote:
> > On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote:
> > [...]
> >>> So here is a proof of concept patch to record and honour that value
> >>> during migration. A new field is added in IDL. Not
On Tue, Jun 02, 2015 at 04:49:09PM +0100, Ian Campbell wrote:
> On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote:
> [...]
> > > So here is a proof of concept patch to record and honour that value
> > > during migration. A new field is added in IDL. Note that we don't
> > > provide xl level config
Hi Parth,
On 17/05/15 21:03, Parth Dixit wrote:
> Create a DT for DOM0 for ACPI-case only.
> DT contains minmal required informations such as
s/minmal/minimal/
> DOM0 bootargs, initrd, efi description table
> and address of uefi memory table.
> Add placeholder for tables to be marked as
> reserv
On 05/23/2015 09:24 AM, Olaf Hering wrote:
> Having xenalyze in the source tree makes it much easier to keep private
> debug code in hypervisor and xenalyze in sync. It helped alot while
> debugging the root cause for commit 607e8494c42397fb249191904066cace6ac9a880.
>
> changes between v3 and v4:
On 05/23/2015 09:24 AM, Olaf Hering wrote:
> Signed-off-by: Olaf Hering
> Acked-by: Wei Liu
> Cc: Ian Jackson
> Cc: Stefano Stabellini
> Cc: Ian Campbell
> Cc: Wei Liu
> ---
> tools/xentrace/xenalyze.c | 75
> ++-
> 1 file changed, 68 insertions(+
On 06/02/2015 12:51 PM, Stefano Stabellini wrote:
On Tue, 2 Jun 2015, Jan Beulich wrote:
On 02.06.15 at 17:11, wrote:
Hello,
The document describing the PVH interface was committed 9 months ago
[1], and since then there hasn't been any change regarding the
interface. PVH is still missing feat
On 02/06/15 17:51, Stefano Stabellini wrote:
> On Tue, 2 Jun 2015, Jan Beulich wrote:
> On 02.06.15 at 17:11, wrote:
>>> Hello,
>>>
>>> The document describing the PVH interface was committed 9 months ago
>>> [1], and since then there hasn't been any change regarding the
>>> interface. PVH is
On 05/25/2015 09:34 AM, Wei Liu wrote:
> On Sat, May 23, 2015 at 08:24:11AM +, Olaf Hering wrote:
>> This merges xenalyze.hg, changeset 150:24308507be1d,
>> into tools/xentrace/xenalyze.c to have the tool and
>> public/trace.h in one place.
>>
>> Signed-off-by: Olaf Hering
>> Cc: Ian Jackson
On 05/23/2015 09:24 AM, Olaf Hering wrote:
> Collecting the trace buffer requires root permissions. Adjust Makefile
> to install xentrace and xentrace_setsize into sbindir. Leave the
> existing support for BIN in place for upcoming changes.
>
> Signed-off-by: Olaf Hering
> Cc: George Dunlap
Ack
On Tue, Jun 02, 2015 at 03:33:26PM +0200, Daniel Kiper wrote:
> binutils 2.22 changed ld default from --copy-dt-needed-entries
> to -no-copy-dt-needed-entries. This revealed that some objects
> are linked implicitly with libtinfo and newer ld fails to build
> relevant executables.
>
> Below is sho
On Tue, Jun 02, 2015 at 05:22:04PM +0200, Roger Pau Monné wrote:
> El 01/06/15 a les 15.24, Wei Liu ha escrit:
> > On Fri, May 22, 2015 at 11:18:55AM +0200, Roger Pau Monne wrote:
> >> FreeBSD blkback uses the path xenstore node in order to fetch the path to
> >> the underlying backing storage (eit
On Tue, 2 Jun 2015, Jan Beulich wrote:
> >>> On 02.06.15 at 17:11, wrote:
> > Hello,
> >
> > The document describing the PVH interface was committed 9 months ago
> > [1], and since then there hasn't been any change regarding the
> > interface. PVH is still missing features in order to have featur
On Mon, Jun 01, 2015 at 05:01:34PM +0100, Stefano Stabellini wrote:
> The device model is going to restrict its xenstore connection to $DOMID
> level. Let it access /local/domain/0/device-model/$DOMID, as it is
> required by QEMU to read/write the physmap. It doesn't contain any
> information the g
On 2 June 2015 at 16:39, Stefano Stabellini
wrote:
> The following changes since commit 3fc827d591679f3e262b9d1f8b34528eabfca8c0:
>
> target-arm: Correct check for non-EL3 (2015-06-02 13:22:29 +0100)
>
> are available in the git repository at:
>
> git://xenbits.xen.org/people/sstabellini/qemu-
On Fri, May 22, 2015 at 05:35:10PM +0800, Tiejun Chen wrote:
> Here we'll construct a basic guest e820 table via
> XENMEM_set_memory_map. This table includes lowmem, highmem
> and RDMs if they exist. And hvmloader would need this info
> later.
>
> Signed-off-by: Tiejun Chen
> ---
> tools/libxl/l
flight 57747 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57747/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-sedf-pin 3 host-install(3) broken in 57676 pass in 57747
test-armhf-armhf-libvirt 3
On Fri, May 22, 2015 at 05:35:08PM +0800, Tiejun Chen wrote:
> This patch passes rdm reservation policy to xc_assign_device() so the policy
> is checked when assigning devices to a VM.
>
> Signed-off-by: Tiejun Chen
> ---
> tools/libxc/include/xenctrl.h | 3 ++-
> tools/libxc/xc_domain.c
Performance analysis of aggregate network throughput with many VMs
shows that performance is signficantly limited by contention on the
maptrack lock when obtaining/releasing maptrack handles from the free
list.
Instead of a single free list use a per-VCPU list. This avoids any
contention when obta
On Fri, May 22, 2015 at 05:35:04PM +0800, Tiejun Chen wrote:
> While building a VM, HVM domain builder provides struct hvm_info_table{}
> to help hvmloader. Currently it includes two fields to construct guest
> e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we should
> check them to
Introduce a per-active entry spin lock to protect active entry state
The grant table lock must be locked before acquiring (locking) an
active entry.
This is a step in reducing contention on the grant table lock, but
will only do so once the grant table lock is turned into a read-write
lock.
Based
Split grant table lock into two separate locks. One to protect
maptrack state (maptrack_lock) and one for everything else (lock).
Based on a patch originally by Matt Wilson .
Signed-off-by: David Vrabel
Reviewed-by: Jan Beulich
---
docs/misc/grant-tables.txt|9 +
xen/common/gra
In combination with the per-active entry locks, the grant table lock
can be made a read-write lock since the majority of cases only the
read lock is required. The grant table read lock protects against
changes to the table version or size (which are done with the write
lock held).
The write lock i
On Tue, May 26, 2015 at 1:05 AM, Chong Li wrote:
> Add two hypercalls(XEN_DOMCTL_SCHEDOP_getvcpuinfo/putvcpuinfo) to get/set a
> domain's
> per-VCPU parameters. Hypercalls are handled by newly added hook
> (.adjust_vcpu) in the
> scheduler interface.
>
> Add a new data structure (struct xen_domc
The series builds on the original series by Matt Wilson and Christoph
Egger from Amazon.
Performance results for aggregate intrahost network throughput
(between 20 VM pairs, with 16 dom0 VCPUs) show substantial
improvements.
Throughput/Gbit/s
Base
flight 57793 rumpuserxen real [real]
http://logs.test-lab.xenproject.org/osstest/logs/57793/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866
build-i386-rumpuserxe
Ian Campbell writes:
> On Thu, 2015-05-28 at 15:41 +0200, Vitaly Kuznetsov wrote:
>> > I.e. what you currently implement is David's model without Konrad's
>> > later alternative really having been explored? Iiuc David's main
>> > reservation (which I share) was against a myriad of reset-this and
Hi Ian,
Thank you very much for taking time to review this!
On 06/02/2015 10:53 PM, Ian Campbell wrote:
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
I've just been through this, sorry for the delay.
I also have written on my TODO list "Remus on Migration-v2 (v7)", but I
have no s
On 06/02/2015 10:48 PM, Ian Campbell wrote:
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
move toolstack code into libxl_toolstack.c
It's not clear to me what "toolstack code" is here, the whole of libxl
and xl is "toolstack code".
Is the code being moved stuff to do with adding t
On Tue, 2015-06-02 at 10:52 +0100, Wei Liu wrote:
> Hi Eric
>
> Sorry for coming late to the discussion.
>
> On Thu, Apr 16, 2015 at 05:42:16AM -0700, Eric Dumazet wrote:
> > On Thu, 2015-04-16 at 11:01 +0100, George Dunlap wrote:
> >
> > > He suggested that after he'd been prodded by 4 more e-m
On 02/06/15 16:49, Ian Campbell wrote:
> On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote:
> [...]
>>> So here is a proof of concept patch to record and honour that value
>>> during migration. A new field is added in IDL. Note that we don't
>>> provide xl level config option for it and mandate it
On 06/02/2015 10:46 PM, Ian Campbell wrote:
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
move remus codes into libxl_remus.c
"code"
Apart from dropping some "static" and adding some prototypes to the
header this is purely motion, correct? (I assume this about the last one
too).
On 06/02/2015 10:45 PM, Ian Campbell wrote:
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
diff --git a/tools/libxl/libxl_internal.h
b/tools/libxl/libxl_internal.h
index f86fc89..b2eeb89 100644
--- a/tools/libxl/libxl_internal.h
+++ b/tools/libxl/libxl_internal.h
@@ -3191,6 +3191,12 @
On 06/02/2015 10:40 PM, Ian Campbell wrote:
On Wed, 2015-05-20 at 18:01 +0800, Yang Hongyang wrote:
@@ -1762,16 +1762,18 @@ static void libxl__domain_suspend_callback(void *data)
{
libxl__save_helper_state *shs = data;
libxl__egc *egc = shs->egc;
-libxl__domain_suspend_state *
On Fri, May 29, 2015 at 2:51 PM, Dario Faggioli
wrote:
> On Mon, 2015-05-25 at 19:05 -0500, Chong Li wrote:
>
>> diff --git a/xen/common/domctl.c b/xen/common/domctl.c
>> index 28aea55..8143c44 100644
>> --- a/xen/common/domctl.c
>> +++ b/xen/common/domctl.c
>> @@ -841,6 +841,11 @@ long do_domctl(
On 06/02/2015 06:39 PM, Ian Campbell wrote:
> On Fri, 2015-05-29 at 16:45 +0300, Razvan Cojocaru wrote:
>> As suggested by Andrew Cooper, this patch attempts to remove
>> some redundancy and allow for an easier time when adding vm_events
>> for new control registers in the future, by having a singl
On Fri, May 22, 2015 at 05:35:01PM +0800, Tiejun Chen wrote:
> This patch introduces user configurable parameters to specify RDM
> resource and according policies,
>
> Global RDM parameter:
> rdm = [ 'type=none/host, reserve=strict/relaxed' ]
> Per-device RDM parameter:
> pci = [ 'sbdf, rd
On Tue, 2015-06-02 at 16:43 +0100, Andrew Cooper wrote:
> On 02/06/15 16:39, Ian Campbell wrote:
> > On Fri, 2015-05-29 at 16:45 +0300, Razvan Cojocaru wrote:
> >> As suggested by Andrew Cooper, this patch attempts to remove
> >> some redundancy and allow for an easier time when adding vm_events
>
On 2 June 2015 at 16:32, Stefano Stabellini
wrote:
> On Tue, 2 Jun 2015, Stefano Stabellini wrote:
>> Hi all,
>>
>> the following is a collection of QEMU security fixes for PCI Passthrough
>> on Xen. Non-Xen usages of QEMU are unaffected.
>>
>> Although the CVEs have already been made public, give
On 02/06/15 15:34, Konrad Rzeszutek Wilk wrote:
> On Tue, Jun 02, 2015 at 11:06:26AM +0100, Malcolm Crossley wrote:
>> On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote:
>>> On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
On 01/06/15 16:43, Ross Lagerwall wrote:
> On 06/01/2
From: Jan Beulich
... by default. Add a per-device "permissive" mode similar to pciback's
to allow restoring previous behavior (and hence break security again,
i.e. should be used only for trusted guests).
This is part of XSA-131.
Signed-off-by: Jan Beulich
Acked-by: Stefano Stabellini
Review
On Tue, 2015-06-02 at 15:08 +0100, Wei Liu wrote:
[...]
> > So here is a proof of concept patch to record and honour that value
> > during migration. A new field is added in IDL. Note that we don't
> > provide xl level config option for it and mandate it to be default value
> > during domain creat
On Tue, 2015-06-02 at 16:08 +0100, Stefano Stabellini wrote:
> the following is a collection of QEMU security fixes for PCI Passthrough
> on Xen.
Part of this locks down the PCI cfg space emulation, which means we now
need a way for people to request the old "permissive" behaviour for
devices whic
>>> On 02.06.15 at 17:11, wrote:
> Hello,
>
> The document describing the PVH interface was committed 9 months ago
> [1], and since then there hasn't been any change regarding the
> interface. PVH is still missing features in order to have feature parity
> with pure PV, mainly:
>
> - DomU mirat
On 02/06/15 16:39, Ian Campbell wrote:
> On Fri, 2015-05-29 at 16:45 +0300, Razvan Cojocaru wrote:
>> As suggested by Andrew Cooper, this patch attempts to remove
>> some redundancy and allow for an easier time when adding vm_events
>> for new control registers in the future, by having a single
>>
From: Jan Beulich
This is just to avoid having to adjust that calculation later in
multiple places.
Note that including ->ro_mask in get_throughable_mask()'s calculation
is only an apparent (i.e. benign) behavioral change: For r/o fields it
doesn't matter > whether they get passed through - eith
From: Jan Beulich
Limit error messages resulting from bad guest behavior to avoid allowing
the guest to cause the control domain's disk to fill.
The first message in pci_msix_write() can simply be deleted, as this
is indeed bad guest behavior, but such out of bounds writes don't
really need to b
From: Jan Beulich
Without this the actual XSA-131 fix would cause the enable bit to not
get set anymore (due to the write back getting suppressed there based
on the OR of emu_mask, ro_mask, and res_mask).
Note that the fiddling with the enable bit shouldn't really be done by
qemu, but making thi
From: Jan Beulich
There's no point in xen_pt_pmcsr_reg_{read,write}() each ORing
PCI_PM_CTRL_STATE_MASK and PCI_PM_CTRL_NO_SOFT_RESET into a local
emu_mask variable - we can have the same effect by setting the field
descriptor's emu_mask member suitably right away. Note that
xen_pt_pmcsr_reg_writ
From: Jan Beulich
xen_pt_pmcsr_reg_write() needs an adjustment to deal with the RW1C
nature of the not passed through bit 15 (PCI_PM_CTRL_PME_STATUS).
This is a preparatory patch for XSA-131.
Signed-off-by: Jan Beulich
Reviewed-by: Stefano Stabellini
---
hw/xen/xen_pt_config_init.c |3 ++
From: Jan Beulich
The adjustments are solely to make the subsequent patches work right
(and hence make the patch set consistent), namely if permissive mode
(introduced by the last patch) gets used (as both reserved registers
and reserved fields must be similarly protected from guest access in
def
From: Jan Beulich
Since the next patch will turn all not explicitly described fields
read-only by default, those fields that have guest writable bits need
to be given explicit descriptors.
This is a preparatory patch for XSA-131.
Signed-off-by: Jan Beulich
---
hw/xen/xen_pt_config_init.c |
From: Jan Beulich
xen_pt_emu_reg_pcie[]'s PCI_EXP_DEVCAP needs to cover all bits as read-
only to avoid unintended write-back (just a precaution, the field ought
to be read-only in hardware).
This is a preparatory patch for XSA-131.
Signed-off-by: Jan Beulich
Reviewed-by: Stefano Stabellini
-
From: Jan Beulich
It's being used by the hypervisor. For now simply mimic a device not
capable of masking, and fully emulate any accesses a guest may issue
nevertheless as simple reads/writes without side effects.
This is XSA-129.
Signed-off-by: Jan Beulich
Reviewed-by: Stefano Stabellini
---
From: Jan Beulich
The old logic didn't work as intended when an access spanned multiple
fields (for example a 32-bit access to the location of the MSI Message
Data field with the high 16 bits not being covered by any known field).
Remove it and derive which fields not to write to from the accesse
On Fri, 2015-05-29 at 16:45 +0300, Razvan Cojocaru wrote:
> As suggested by Andrew Cooper, this patch attempts to remove
> some redundancy and allow for an easier time when adding vm_events
> for new control registers in the future, by having a single
> VM_EVENT_REASON_WRITE_CTRLREG vm_event type,
The following changes since commit 3fc827d591679f3e262b9d1f8b34528eabfca8c0:
target-arm: Correct check for non-EL3 (2015-06-02 13:22:29 +0100)
are available in the git repository at:
git://xenbits.xen.org/people/sstabellini/qemu-dm.git xen-15-06-02
for you to fetch changes up to c25bbf1545a
On 02/06/15 16:11, Roger Pau Monné wrote:
> Hello,
>
> The document describing the PVH interface was committed 9 months ago
> [1], and since then there hasn't been any change regarding the
> interface. PVH is still missing features in order to have feature parity
> with pure PV, mainly:
>
> - DomU
On Tue, 2 Jun 2015, Stefano Stabellini wrote:
> Hi all,
>
> the following is a collection of QEMU security fixes for PCI Passthrough
> on Xen. Non-Xen usages of QEMU are unaffected.
>
> Although the CVEs have already been made public, given the large amount
> of changes, I decided not to send a p
On Wed, 2015-05-27 at 17:25 +0200, Vitaly Kuznetsov wrote:
> Perform soft reset when a domain did SHUTDOWN_soft_reset. Migrate the
> content with xc_domain_soft_reset(), reload dm and toolstack.
>
> Signed-off-by: Vitaly Kuznetsov
> ---
> Changes in v7:
> - Save toolstack earlier.
> - Introduce L
1 - 100 of 194 matches
Mail list logo