Re: [Xen-devel] [v4][PATCH 04/19] xen/passthrough: extend hypercall to support rdm reservation policy

2015-07-01 Thread Chen, Tiejun
When you say "not tools", I take it to mean that you're not exposing that option through the libxl interface? Yes. tools/libxc/xc_domain.c:xc_assign_dt_device() most certainly does pass it in, and that's the level I'm talking about. Someone reviewing this patch series needs to know, when xc

[Xen-devel] [rumpuserxen test] 59019: regressions - FAIL

2015-07-01 Thread osstest service user
flight 59019 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/59019/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866 build-i386-rumpuserxe

[Xen-devel] [qemu-mainline test] 59010: tolerable FAIL - PUSHED

2015-07-01 Thread osstest service user
flight 59010 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/59010/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-libvirt-xsm 11 guest-start fail like 58973 test-amd64-i386-libvirt

Re: [Xen-devel] [v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy

2015-07-01 Thread Chen, Tiejun
I don't happen to think these "override" semantics are actually going to turn out to be that useful; I do think a "default" semantic would be useful. But I'd be content if the name of the current setting were switched to "override" to make the semantics more clear. We can always add in "default"

Re: [Xen-devel] Fwd: [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-07-01 Thread Wu, Feng
> -Original Message- > From: Wu, Feng > Sent: Thursday, July 02, 2015 12:33 PM > To: Dario Faggioli > Cc: xen-devel; k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; > Tian, Kevin; Zhang, Yang Z; george.dun...@eu.citrix.com; Wu, Feng > Subject: RE: Fwd: [v3 14/15] Update Posted

Re: [Xen-devel] Fwd: [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-07-01 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Tuesday, June 30, 2015 10:58 AM > To: Wu, Feng > Cc: xen-devel; k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; > Tian, Kevin; Zhang, Yang Z; george.dun...@eu.citrix.com; Wu, Feng > Subject:

Re: [Xen-devel] [xen-unstable test] 58974: regressions - FAIL

2015-07-01 Thread Meng Xu
Hi Dario, 2015-06-30 10:14 GMT-07:00 Dario Faggioli : > Hey Meng, > > you wanted to "get in touch" with OSSTest failures for RTDS, didn't you? > Well, Here you go! :-P > Yes. Thank you very much for cc. me and the very useful explanation of how to read the log! > [I'm adding IanC and Julien, as

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-01 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Wednesday, July 01, 2015 9:26 PM > To: Andrew Cooper > Cc: Wu, Feng; xen-devel@lists.xen.org; Zhang, Yang Z; > george.dun...@eu.citrix.com; Tian, Kevin; k...@xen.org; jbeul...@suse.com > Subject: Re: [X

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-01 Thread Wu, Feng
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Tuesday, June 30, 2015 6:12 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; Tian, Kevin; Zhang, Yang Z; > george.dun...@eu.citrix.com > Subject: Re: [v3 12/15] vmx: post

[Xen-devel] [ovmf test] 59006: regressions - FAIL

2015-07-01 Thread osstest service user
flight 59006 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/59006/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-libvirt5 libvirt-build fail REGR. vs. 58988 Regressions which are regard

Re: [Xen-devel] [PATCH] osstest: install libnl3 packages

2015-07-01 Thread Yang Hongyang
On 07/01/2015 11:12 PM, Roger Pau Monne wrote: Install the libnl3 packages needed by the remus code. Those are available on both Wheezy and Jessie, although the Wheezy ones are too old. Thanks! Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Ian Campbell Cc: Shriram Rajagopalan Cc: Y

[Xen-devel] [linux-3.0 test] 59003: regressions - FAIL

2015-07-01 Thread osstest service user
flight 59003 linux-3.0 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59003/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 15418 test-amd64-amd64-xl-qem

Re: [Xen-devel] [v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy

2015-07-01 Thread Chen, Tiejun
If I'm correct, then #3 means it's not possible to have devices for a domain *default* to strict, but to be relaxed in individual instances. If you had five devices you wanted strict, and only one device you wanted to be relaxed (because you knew it didn't matter), you'd have to set reserved=stric

Re: [Xen-devel] [PATCH xen] stubdom: vtpmmgr: Correctly format size_t with %z when printing.

2015-07-01 Thread Samuel Thibault
Ian Campbell, le Fri 26 Jun 2015 12:06:09 +0100, a écrit : > Also contains a fix from Thomas Leonard (to use %u for "4 + 32", not > %lu) previously posted as part of "mini-os: enable compiler check for > printk format types" but with mini-os now having been split a separate > repo most of that chan

Re: [Xen-devel] [PATCH mini-os] Correct printf formatting for tpm_tis message.

2015-07-01 Thread Samuel Thibault
Ian Campbell, le Fri 26 Jun 2015 11:58:40 +0100, a écrit : > This is under #ifdef HAVE_LIBC so went unnoticed before. > > Signed-off-by: Ian Campbell Acked-by: Samuel Thibault > --- > tpm_tis.c |2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/tpm_tis.c b/tpm_tis.c

[Xen-devel] [libvirt test] 59004: regressions - FAIL

2015-07-01 Thread osstest service user
flight 59004 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/59004/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-xsm 11 guest-start fail REGR. vs. 58842 Regressions which are reg

[Xen-devel] [linux-3.18 test] 59001: regressions - FAIL

2015-07-01 Thread osstest service user
flight 59001 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59001/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581 Regressions which are

[Xen-devel] [xen-unstable test] 58999: regressions - FAIL

2015-07-01 Thread osstest service user
flight 58999 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/58999/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 58965 Reg

Re: [Xen-devel] [PATCH v6] run QEMU as non-root

2015-07-01 Thread Jim Fehlig
On 07/01/2015 09:34 AM, Stefano Stabellini wrote: On Wed, 1 Jul 2015, Dario Faggioli wrote: On Wed, 2015-07-01 at 13:50 +0100, Stefano Stabellini wrote: --- /dev/null +++ b/docs/misc/qemu-deprivilege.txt @@ -0,0 +1,31 @@ +For security reasons, libxl tries to pass a non-root username to QEMU as

[Xen-devel] [linux-3.4 test] 58997: regressions - trouble: broken/fail/pass

2015-07-01 Thread osstest service user
flight 58997 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/58997/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511 Tests which are failing

Re: [Xen-devel] [PATCH v12 7/8] Add IOREQ_TYPE_VMWARE_PORT

2015-07-01 Thread Konrad Rzeszutek Wilk
On Sat, Jun 27, 2015 at 07:27:44PM -0400, Don Slutz wrote: > From: Don Slutz > > This adds synchronization of the 6 vcpu registers (only 32bits of > them) that vmport.c needs between Xen and QEMU. > > This is to avoid a 2nd and 3rd exchange between QEMU and Xen to > fetch and put these 6 vcpu re

Re: [Xen-devel] [PATCH v5] run QEMU as non-root

2015-07-01 Thread Jim Fehlig
On 07/01/2015 02:23 AM, Fabio Fantoni wrote: Il 01/07/2015 02:04, Jim Fehlig ha scritto: On 06/30/2015 07:55 AM, Stefano Stabellini wrote: Try to use "xen-qemudepriv-domid$domid" first, then "xen-qemudepriv-shared" and root if everything else fails. The uids need to be manually created by the

Re: [Xen-devel] [PATCH v12 3/8] tools: Add vmware_hwver support

2015-07-01 Thread Konrad Rzeszutek Wilk
On Sat, Jun 27, 2015 at 07:27:40PM -0400, Don Slutz wrote: > From: Don Slutz > > This is used to set xen_arch_domainconfig vmware_hw. It is set to > the emulated VMware virtual hardware version. > > Currently 0, 3-4, 6-11 are good values. However the code only > checks for == 0, != 0, or < 7. >

Re: [Xen-devel] [PATCH v12 2/8] xen: Add support for VMware cpuid leaves

2015-07-01 Thread Konrad Rzeszutek Wilk
> diff --git a/tools/libxl/libxl_x86.c b/tools/libxl/libxl_x86.c > index ed2bd38..651b338 100644 > --- a/tools/libxl/libxl_x86.c > +++ b/tools/libxl/libxl_x86.c > @@ -5,8 +5,8 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc, >libxl_domain_config *d_con

Re: [Xen-devel] [PATCH v3 2/6] libxl: do not add a vkb backend to hvm guests

2015-07-01 Thread Konrad Rzeszutek Wilk
On Wed, Jul 01, 2015 at 11:29:46AM +0100, Stefano Stabellini wrote: > On Tue, 30 Jun 2015, Konrad Rzeszutek Wilk wrote: > > On Tue, Jun 30, 2015 at 03:13:53PM +0100, Ian Campbell wrote: > > > On Tue, 2015-06-30 at 15:02 +0100, Stefano Stabellini wrote: > > > > On Tue, 30 Jun 2015, Ian Campbell wrot

[Xen-devel] [PATCH 3.14 03/34] config: Enable NEED_DMA_MAP_STATE by default when SWIOTLB is selected

2015-07-01 Thread Greg Kroah-Hartman
3.14-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit a6dfa128ce5c414ab46b1d690f7a1b8decb8526d upstream. A huge amount of NIC drivers use the DMA API, however if compiled under 32-bit an very important part of the DMA

[Xen-devel] [PATCH 3.10 03/22] config: Enable NEED_DMA_MAP_STATE by default when SWIOTLB is selected

2015-07-01 Thread Greg Kroah-Hartman
3.10-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk commit a6dfa128ce5c414ab46b1d690f7a1b8decb8526d upstream. A huge amount of NIC drivers use the DMA API, however if compiled under 32-bit an very important part of the DMA

Re: [Xen-devel] [PATCH v3 09/13] x86/altp2m: alternate p2m memory events.

2015-07-01 Thread Lengyel, Tamas
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c > index 58d4951..576b28d 100644 > --- a/xen/arch/x86/mm/p2m.c > +++ b/xen/arch/x86/mm/p2m.c > @@ -1514,6 +1514,13 @@ void p2m_mem_access_emulate_check(struct vcpu *v, > } > } > > +void p2m_altp2m_check(struct vcpu *v, const vm_event_

[Xen-devel] [PATCH v5] dmar: device scope mem leak fix

2015-07-01 Thread elena . ufimtseva
From: Elena Ufimtseva Release memory allocated for scope.devices when disabling dmar units. Also set device count after memory allocation when device scope parsing. This is explanation of why the code should be moved imho and answers Jan question about why I needed to do this. In acpi_parse_one_d

Re: [Xen-devel] [PATCH RFC 4/6] xen: Print and use errno where applicable.

2015-07-01 Thread Konrad Rzeszutek Wilk
On Wed, Jul 01, 2015 at 02:01:07PM +0100, Stefano Stabellini wrote: > On Mon, 29 Jun 2015, Konrad Rzeszutek Wilk wrote: > > In Xen 4.6 commit cd2f100f0f61b3f333d52d1737dd73f02daee592 > > "libxc: Fix do_memory_op to return negative value on errors" > > made the libxc API less odd-ball: On errors, re

Re: [Xen-devel] [PATCH v4] dmar: device scope mem leak fix

2015-07-01 Thread Elena Ufimtseva
On Wed, Jul 01, 2015 at 11:00:45AM +0100, Andrew Cooper wrote: > On 01/07/15 00:20, elena.ufimts...@oracle.com wrote: > > --- a/xen/drivers/passthrough/vtd/dmar.c > > +++ b/xen/drivers/passthrough/vtd/dmar.c > > @@ -81,6 +81,13 @@ static int __init acpi_register_rmrr_unit(struct > > acpi_rmrr_unit

[Xen-devel] [PATCH v3 13/13] x86/altp2m: XSM hooks for altp2m HVM ops

2015-07-01 Thread Ed White
From: Ravi Sahita Signed-off-by: Ravi Sahita --- tools/flask/policy/policy/modules/xen/xen.if | 4 +- xen/arch/x86/hvm/hvm.c | 118 --- xen/include/xsm/dummy.h | 12 +++ xen/include/xsm/xsm.h| 12 +++

[Xen-devel] [PATCH v3 12/13] x86/altp2m: Add altp2mhvm HVM domain parameter.

2015-07-01 Thread Ed White
The altp2mhvm and nestedhvm parameters are mutually exclusive and cannot be set together. Signed-off-by: Ed White --- docs/man/xl.cfg.pod.5 | 12 tools/libxl/libxl_create.c | 1 + tools/libxl/libxl_dom.c | 2 ++ tools/libxl/libxl_types.idl | 1 + tools/

[Xen-devel] [PATCH v3 10/13] x86/altp2m: add remaining support routines.

2015-07-01 Thread Ed White
Add the remaining routines required to support enabling the alternate p2m functionality. Signed-off-by: Ed White --- xen/arch/x86/hvm/hvm.c | 58 +- xen/arch/x86/mm/hap/Makefile | 1 + xen/arch/x86/mm/hap/altp2m_hap.c | 98 ++ xen/arch/x86/mm/p2m-ept.c| 3

[Xen-devel] [PATCH v3 08/13] x86/altp2m: add control of suppress_ve.

2015-07-01 Thread Ed White
The existing ept_set_entry() and ept_get_entry() routines are extended to optionally set/get suppress_ve and renamed. New ept_set_entry() and ept_get_entry() routines are provided as wrappers, where set preserves suppress_ve for an existing entry and sets it for a new entry. Additional function po

[Xen-devel] [PATCH v3 09/13] x86/altp2m: alternate p2m memory events.

2015-07-01 Thread Ed White
Add a flag to indicate that a memory event occurred in an alternate p2m and a field containing the p2m index. Allow any event response to switch to a different alternate p2m using the same flag and field. Modify p2m_memory_access_check() to handle alternate p2m's. Signed-off-by: Ed White --- xe

[Xen-devel] [PATCH v3 11/13] x86/altp2m: define and implement alternate p2m HVMOP types.

2015-07-01 Thread Ed White
Signed-off-by: Ed White --- xen/arch/x86/hvm/hvm.c | 201 xen/include/public/hvm/hvm_op.h | 69 ++ 2 files changed, 270 insertions(+) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index d2d90c8..0d81050 100644 --- a/xe

[Xen-devel] [PATCH v3 03/13] VMX: implement suppress #VE.

2015-07-01 Thread Ed White
In preparation for selectively enabling #VE in a later patch, set suppress #VE on all EPTE's. Suppress #VE should always be the default condition for two reasons: it is generally not safe to deliver #VE into a guest unless that guest has been modified to receive it; and even then for most EPT viol

[Xen-devel] [PATCH v3 00/12] Alternate p2m: support multiple copies of host p2m

2015-07-01 Thread Ed White
This set of patches adds support to hvm domains for EPTP switching by creating multiple copies of the host p2m (currently limited to 10 copies). The primary use of this capability is expected to be in scenarios where access to memory needs to be monitored and/or restricted below the level at which

[Xen-devel] [PATCH v3 05/13] x86/altp2m: basic data structures and support routines.

2015-07-01 Thread Ed White
Add the basic data structures needed to support alternate p2m's and the functions to initialise them and tear them down. Although Intel hardware can handle 512 EPTP's per hardware thread concurrently, only 10 per domain are supported in this patch for performance reasons. The iterator in hap_enab

[Xen-devel] [PATCH v3 07/13] VMX: add VMFUNC leaf 0 (EPTP switching) to emulator.

2015-07-01 Thread Ed White
From: Ravi Sahita Signed-off-by: Ravi Sahita --- xen/arch/x86/hvm/emulate.c | 12 +++-- xen/arch/x86/hvm/vmx/vmx.c | 30 + xen/arch/x86/x86_emulate/x86_emulate.c | 48 +- xen/arch/x86/x86_emulate/x86_emulate.h | 4

[Xen-devel] [PATCH v3 06/13] VMX/altp2m: add code to support EPTP switching and #VE.

2015-07-01 Thread Ed White
Implement and hook up the code to enable VMX support of VMFUNC and #VE. VMFUNC leaf 0 (EPTP switching) emulation is added in a later patch. Signed-off-by: Ed White --- xen/arch/x86/hvm/vmx/vmx.c | 138 + 1 file changed, 138 insertions(+) diff --git a

[Xen-devel] [PATCH v3 01/13] common/domain: Helpers to pause a domain while in context

2015-07-01 Thread Ed White
From: Andrew Cooper For use on codepaths which would need to use domain_pause() but might be in the target domain's context. In the case that the target domain is in context, all other vcpus are paused. Signed-off-by: Andrew Cooper --- xen/common/domain.c | 28

[Xen-devel] [PATCH v3 04/13] x86/HVM: Hardware alternate p2m support detection.

2015-07-01 Thread Ed White
As implemented here, only supported on platforms with VMX HAP. By default this functionality is force-disabled, it can be enabled by specifying altp2m=1 on the Xen command line. Signed-off-by: Ed White Reviewed-by: Andrew Cooper --- docs/misc/xen-command-line.markdown | 7 +++ xen/arch/x8

[Xen-devel] [PATCH v3 02/13] VMX: VMFUNC and #VE definitions and detection.

2015-07-01 Thread Ed White
Currently, neither is enabled globally but may be enabled on a per-VCPU basis by the altp2m code. Remove the check for EPTE bit 63 == zero in ept_split_super_page(), as that bit is now hardware-defined. Signed-off-by: Ed White Reviewed-by: Andrew Cooper --- xen/arch/x86/hvm/vmx/vmcs.c

[Xen-devel] Blktap 3.0.0 improvement

2015-07-01 Thread Akash Talole
Hello, I want to know about Blktap asynchronous i/o read write operations on VHD. I want to know detail flow of program block-VHD.c . How the read write operations are performed on VHD . And any improvement in code would be done for better read write operations. Description about dynamic disk struc

[Xen-devel] [PATCH 1/7] libxc: fix uninitialized variable in xc_cpuid_pv_policy()

2015-07-01 Thread Jennifer Herbert
If xc_domain_get_guest_width were to fail, guest_width is not set, and hence guest_64bit becomes undefined. Fix is to initialise to 0, and report error if call fails. Signed-off-by: Jennifer Herbert --- tools/libxc/xc_cpuid_x86.c |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-)

[Xen-devel] [PATCH 3/7] libxc: Fix uninitialized valiables in xc_cpuid_hvm_policy()

2015-07-01 Thread Jennifer Herbert
If xc_hvm_param_get fails, is_pae and/or is_nestedhvm are left undefined. This patch Indicates error and defaults to false. Signed-off-by: Jennifer Herbert --- tools/libxc/xc_cpuid_x86.c | 18 +- 1 file changed, 13 insertions(+), 5 deletions(-) diff --git a/tools/libxc/xc_cpui

[Xen-devel] [PATCH 6/7] libxc: Fix misleading use of strncpy code in build_hvm_info()

2015-07-01 Thread Jennifer Herbert
hvm_info->signature is not a string, but an 64 bit int, and is not NULL terminated. The use of strncpy to populate it is inappropriate and potentially misleading. A cursory glance might have you thinking someone had miscounted the length of the string literal - not realising it was intentionally

[Xen-devel] [PATCH 4/7] libxc: Prevent dereferencing NULL pointers returned from xc_dom_allocate()

2015-07-01 Thread Jennifer Herbert
The return from xc_dom_allocate is not checked for a NULL value. This patch fixes this, causing it to return from the function with an error. Signed-off-by: Jennifer Herbert --- tools/libxc/xc_dom_compat_linux.c |6 ++ 1 file changed, 6 insertions(+) diff --git a/tools/libxc/xc_dom_comp

[Xen-devel] [PATCH 5/7] libxc: Removing dead code from xc_dom_allocate()

2015-07-01 Thread Jennifer Herbert
The only place that jumps to 'err:' does so because !dom, which is rechecked in 'err:'. This patch simplifies, giving the same result. Signed-off-by: Jennifer Herbert --- tools/libxc/xc_dom_core.c |7 +-- 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/tools/libxc/xc_dom_co

[Xen-devel] [PATCH 7/7] libxc: Prevent NULL pointer dereference in stdiostream_vmessage()

2015-07-01 Thread Jennifer Herbert
Unlikely that it may seem localtime_r could fail, which would result in a null pointer dereference. In this case, one can simply just skip logging the date/time, and logging anything is more useful then nothing. Signed-off-by: Jennifer Herbert --- tools/libxc/xtl_logger_stdio.c |9 +

[Xen-devel] [PATCH 2/7] libxc: Use const pointer in local_file_dump()

2015-07-01 Thread Jennifer Herbert
By adding the const keyword, it is clearer to people and static analysis tools that no changes to the data are to be made. Signed-off-by: Jennifer Herbert --- tools/libxc/xc_core.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/libxc/xc_core.c b/tools/libxc/xc_core.

[Xen-devel] [PATCH 0/7] libxc: Fix a number of coverity issues.

2015-07-01 Thread Jennifer Herbert
Fix a number of coverity issues in libxc. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v5] run QEMU as non-root

2015-07-01 Thread Jim Fehlig
On 07/01/2015 04:42 AM, Stefano Stabellini wrote: On Tue, 30 Jun 2015, Jim Fehlig wrote: On 06/30/2015 07:55 AM, Stefano Stabellini wrote: [...] b/docs/misc/qemu-deprivilege.txt new file mode 100644 index 000..783874b --- /dev/null +++ b/docs/misc/qemu-deprivilege.txt @@ -0,0 +1,26 @@ +For

Re: [Xen-devel] [PATCH v3 for Xen 4.6 3/4] libxl: enable per-VCPU parameter settings for RTDS scheduler

2015-07-01 Thread Chong Li
On Wed, Jul 1, 2015 at 7:50 AM, Dario Faggioli wrote: > On Wed, 2015-07-01 at 09:48 +0100, Ian Campbell wrote: >> On Tue, 2015-06-30 at 17:54 -0700, Meng Xu wrote: >> > 2015-06-30 9:19 GMT-07:00 Ian Campbell : >> > > Note that this field is not the same as the others in this struct, it is >> > > i

Re: [Xen-devel] [PATCH v2 11/22] xen/x86: allow disabling emulated devices for HVM guests

2015-07-01 Thread Andrew Cooper
On 01/07/15 17:13, Stefano Stabellini wrote: > On Wed, 1 Jul 2015, Andrew Cooper wrote: >> On 01/07/15 16:51, Boris Ostrovsky wrote: >>> On 07/01/2015 11:46 AM, Andrew Cooper wrote: On 01/07/15 15:46, Roger Pau Monne wrote: > Introduce a new DOMCTL flag that can be used to disable device >

Re: [Xen-devel] [v4][PATCH 05/19] xen: enable XENMEM_memory_map in hvm

2015-07-01 Thread George Dunlap
On Tue, Jun 23, 2015 at 10:57 AM, Tiejun Chen wrote: > This patch enables XENMEM_memory_map in hvm. So hvmloader can > use it to setup the e820 mappings. > > CC: Keir Fraser > CC: Jan Beulich > CC: Andrew Cooper > Signed-off-by: Tiejun Chen > Reviewed-by: Tim Deegan > Reviewed-by: Kevin Tian

Re: [Xen-devel] [v4][PATCH 04/19] xen/passthrough: extend hypercall to support rdm reservation policy

2015-07-01 Thread George Dunlap
On Tue, Jun 23, 2015 at 10:57 AM, Tiejun Chen wrote: > This patch extends the existing hypercall to support rdm reservation policy. > We return error or just throw out a warning message depending on whether > the policy is "strict" or "relaxed" when reserving RDM regions in pfn space. > Note in so

Re: [Xen-devel] [PATCH v2 11/22] xen/x86: allow disabling emulated devices for HVM guests

2015-07-01 Thread Stefano Stabellini
On Wed, 1 Jul 2015, Andrew Cooper wrote: > On 01/07/15 16:51, Boris Ostrovsky wrote: > > On 07/01/2015 11:46 AM, Andrew Cooper wrote: > >> On 01/07/15 15:46, Roger Pau Monne wrote: > >>> Introduce a new DOMCTL flag that can be used to disable device > >>> emulation > >>> inside of Xen for HVM guest

Re: [Xen-devel] [CALL-FOR-AGENDA] Monthly Xen.org Technical Call (2015-07-08)

2015-07-01 Thread Boris Ostrovsky
On 07/01/2015 11:57 AM, Ian Campbell wrote: The next Xen technical call will be at: Wed 8 Jul 17:00:00 BST 2015 `date -d @1436371200` See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html for more information on the call. Please let me know (CC-ing the list) any topi

Re: [Xen-devel] [CALL-FOR-AGENDA] Monthly Xen.org Technical Call (2015-07-08)

2015-07-01 Thread Andrew Cooper
On 01/07/15 17:15, Boris Ostrovsky wrote: > On 07/01/2015 11:57 AM, Ian Campbell wrote: >> The next Xen technical call will be at: >> Wed 8 Jul 17:00:00 BST 2015 >> `date -d @1436371200` >> >> See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html >> for more information

Re: [Xen-devel] [PATCH 3/3] Convert map_domain_page() to use the new mfn_t type

2015-07-01 Thread Andrew Cooper
On 01/07/15 14:41, Ben Catterall wrote: > Reworked the internals and declaration, applying (un)boxing > where needed. Converted calls to map_domain_page() to > provide mfn_t types, boxing where needed. > > Signed-off-by: Ben Catterall > --- > xen/arch/arm/domain_build.c | 2 +- > x

Re: [Xen-devel] [PATCH 2/3] xen/domain_page: Convert copy/clear_domain_page() to using mfn_t

2015-07-01 Thread David Vrabel
On 01/07/15 14:57, Andrew Cooper wrote: > On 01/07/15 14:41, Ben Catterall wrote: >> From: Andrew Cooper >> >> Signed-off-by: Andrew Cooper >> [Convert grant_table.c to pass mfn_t types and fix ARM compiling] >> >> Signed-off-by: Ben Catterall > > Reviwed-by: Andrew Cooper for the additions >

Re: [Xen-devel] [PATCH 2/3] xen/domain_page: Convert copy/clear_domain_page() to using mfn_t

2015-07-01 Thread Andrew Cooper
On 01/07/15 17:07, David Vrabel wrote: > On 01/07/15 14:57, Andrew Cooper wrote: >> On 01/07/15 14:41, Ben Catterall wrote: >>> From: Andrew Cooper >>> >>> Signed-off-by: Andrew Cooper >>> [Convert grant_table.c to pass mfn_t types and fix ARM compiling] >>> >>> Signed-off-by: Ben Catterall >> R

Re: [Xen-devel] [PATCH v2 11/22] xen/x86: allow disabling emulated devices for HVM guests

2015-07-01 Thread Andrew Cooper
On 01/07/15 16:51, Boris Ostrovsky wrote: > On 07/01/2015 11:46 AM, Andrew Cooper wrote: >> On 01/07/15 15:46, Roger Pau Monne wrote: >>> Introduce a new DOMCTL flag that can be used to disable device >>> emulation >>> inside of Xen for HVM guests. The following emulated devices are >>> disabled >>

[Xen-devel] [CALL-FOR-AGENDA] Monthly Xen.org Technical Call (2015-07-08)

2015-07-01 Thread Ian Campbell
The next Xen technical call will be at: Wed 8 Jul 17:00:00 BST 2015 `date -d @1436371200` See http://lists.xen.org/archives/html/xen-devel/2015-01/msg00414.html for more information on the call. Please let me know (CC-ing the list) any topics which you would like to discuss. It might be

Re: [Xen-devel] [PATCH v2 11/22] xen/x86: allow disabling emulated devices for HVM guests

2015-07-01 Thread Boris Ostrovsky
On 07/01/2015 11:46 AM, Andrew Cooper wrote: On 01/07/15 15:46, Roger Pau Monne wrote: Introduce a new DOMCTL flag that can be used to disable device emulation inside of Xen for HVM guests. The following emulated devices are disabled when the XEN_DOMCTL_CDF_noemu is used: hpet, pmtimer, rtc, ioa

Re: [Xen-devel] [PATCH v2 11/22] xen/x86: allow disabling emulated devices for HVM guests

2015-07-01 Thread Andrew Cooper
On 01/07/15 15:46, Roger Pau Monne wrote: > Introduce a new DOMCTL flag that can be used to disable device emulation > inside of Xen for HVM guests. The following emulated devices are disabled > when the XEN_DOMCTL_CDF_noemu is used: hpet, pmtimer, rtc, ioapic, lapic, > pic and pmu. Also all the MM

Re: [Xen-devel] [v4][PATCH 02/19] xen/x86/p2m: introduce set_identity_p2m_entry

2015-07-01 Thread George Dunlap
On Tue, Jun 23, 2015 at 10:57 AM, Tiejun Chen wrote: > We will create this sort of identity mapping as follows: > > If the gfn space is unoccupied, we just set the mapping. If space > is already occupied by desired identity mapping, do nothing. > Otherwise, failure is returned. > > And we also add

Re: [Xen-devel] [PATCH v2 11/22] xen/x86: allow disabling emulated devices for HVM guests

2015-07-01 Thread Paul Durrant
> -Original Message- > From: Roger Pau Monné [mailto:roger@citrix.com] > Sent: 01 July 2015 16:35 > To: Paul Durrant; xen-de...@lists.xenproject.org > Cc: Kevin Tian; Jan Beulich; Jun Nakajima; Andrew Cooper; Eddie Dong; > Aravind Gopalakrishnan; Suravee Suthikulpanit; Boris Ostrovsky >

Re: [Xen-devel] [PATCH v6] run QEMU as non-root

2015-07-01 Thread Stefano Stabellini
On Wed, 1 Jul 2015, Dario Faggioli wrote: > On Wed, 2015-07-01 at 13:50 +0100, Stefano Stabellini wrote: > > --- /dev/null > > +++ b/docs/misc/qemu-deprivilege.txt > > @@ -0,0 +1,31 @@ > > +For security reasons, libxl tries to pass a non-root username to QEMU as > > +argument. During initialization

Re: [Xen-devel] [PATCH v2 11/22] xen/x86: allow disabling emulated devices for HVM guests

2015-07-01 Thread Roger Pau Monné
El 01/07/15 a les 17.25, Paul Durrant ha escrit: >> -Original Message- >> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel- >> boun...@lists.xen.org] On Behalf Of Roger Pau Monne >> Sent: 01 July 2015 15:46 >> To: xen-de...@lists.xenproject.org >> Cc: Kevin Tian; Jan Beulich; Jun Nak

Re: [Xen-devel] [PATCH v6] run QEMU as non-root

2015-07-01 Thread Dario Faggioli
On Wed, 2015-07-01 at 13:50 +0100, Stefano Stabellini wrote: > --- /dev/null > +++ b/docs/misc/qemu-deprivilege.txt > @@ -0,0 +1,31 @@ > +For security reasons, libxl tries to pass a non-root username to QEMU as > +argument. During initialization QEMU calls setuid and setgid with the > +user ID and

Re: [Xen-devel] [PATCH v2 11/22] xen/x86: allow disabling emulated devices for HVM guests

2015-07-01 Thread Paul Durrant
> -Original Message- > From: xen-devel-boun...@lists.xen.org [mailto:xen-devel- > boun...@lists.xen.org] On Behalf Of Roger Pau Monne > Sent: 01 July 2015 15:46 > To: xen-de...@lists.xenproject.org > Cc: Kevin Tian; Jan Beulich; Jun Nakajima; Andrew Cooper; Eddie Dong; > Aravind Gopalakrish

[Xen-devel] [linux-3.16 test] 58996: regressions - FAIL

2015-07-01 Thread osstest service user
flight 58996 linux-3.16 real [real] http://logs.test-lab.xenproject.org/osstest/logs/58996/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 12 guest-start/redhat.repeat fail REGR. vs. 58447 Regressions w

Re: [Xen-devel] [PATCH V2 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-07-01 Thread Razvan Cojocaru
On 06/26/2015 11:28 AM, Jan Beulich wrote: >> --- a/xen/arch/x86/hvm/vmx/vmx.c >> > +++ b/xen/arch/x86/hvm/vmx/vmx.c >> > @@ -2010,9 +2010,9 @@ static int vmx_cr_access(unsigned long >> > exit_qualification) >> > } >> > case VMX_CONTROL_REG_ACCESS_TYPE_CLTS: { >> > unsigned long

[Xen-devel] [PATCH v2 11/22] xen/x86: allow disabling emulated devices for HVM guests

2015-07-01 Thread Roger Pau Monne
Introduce a new DOMCTL flag that can be used to disable device emulation inside of Xen for HVM guests. The following emulated devices are disabled when the XEN_DOMCTL_CDF_noemu is used: hpet, pmtimer, rtc, ioapic, lapic, pic and pmu. Also all the MMIO handlers are disabled. Signed-off-by: Roger Pa

[Xen-devel] [PATCH v2 17/22] libxc: change the position of the special pages

2015-07-01 Thread Roger Pau Monne
Change the physical memory address of the special pages when there are no emulated devices. On HVM guests the special pages have always been reserved so that they end at the 0xff000 pfn, but there are some problems with this approach when used without emulated devices: - If we want to allow HVMli

[Xen-devel] [PATCH v2 13/22] lib{xc/xl}: allow creating domains without emulated devices.

2015-07-01 Thread Roger Pau Monne
Allow device_model_version to be set to "none" in order to request the creation of a HVM guest without emulated devices. This disables the VGA and MMIO memory holes and the ioreq server pages. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu -

[Xen-devel] [PATCH v2 16/22] xenconsole: try to attach to PV console if HVM fails

2015-07-01 Thread Roger Pau Monne
HVM guests have always used the emulated serial console by default, but if the emulated serial pty cannot be fetched from xenstore try to use the PV console instead. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/console/client/ma

[Xen-devel] [PATCH v2 10/22] libxc: remove dead HVM building code

2015-07-01 Thread Roger Pau Monne
Remove xc_hvm_build_x86.c and xc_hvm_build_arm.c since xc_hvm_build is not longer used in order to create HVM guests. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/libxc/Makefile | 2 - tools/libxc/include/xenguest

[Xen-devel] [PATCH v2 19/22] libxc/xen: introduce HVM_PARAM_FIRST_FREE_PFN

2015-07-01 Thread Roger Pau Monne
This HVM parameter returns the first free pfn after all the special pages. It can be used by guests to figure out the first free memory address after the kernel, ramdisk and special pages. This is interesting for compatibility reasons in case more special pages are later added, older guests can sti

[Xen-devel] [PATCH v2 15/22] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs

2015-07-01 Thread Roger Pau Monne
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and VCPUOP_is_up hypercalls from HVM guests. Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/hvm.c | 8 1 file changed, 8 insertions(+) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arc

[Xen-devel] [PATCH v2 20/22] libxc/xen: introduce HVM_PARAM_MODLIST_PFN

2015-07-01 Thread Roger Pau Monne
This HVM parameter is used to pass a list of loaded modules to the guest. Right now the number of loaded modules is limited to 1 by the current implementation, but this interface allows passing more than one module. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian C

[Xen-devel] [PATCH v2 18/22] libxc/xen: introduce HVM_PARAM_CMDLINE_PFN

2015-07-01 Thread Roger Pau Monne
This HVM parameter returns a PFN that contains the address of the memory page where the guest command line has been placed. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Jan Beulich Cc: Andrew Cooper --- tools/libxc/xc_dom_x86.c

[Xen-devel] [PATCH v2 12/22] elfnotes: intorduce a new PHYS_ENTRY elfnote

2015-07-01 Thread Roger Pau Monne
This new elfnote contains the 32bit entry point into the kernel. Xen will use this entry point in order to launch the guest kernel in 32bit protected mode with paging disabled. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/xcutil

[Xen-devel] [PATCH v2 21/22] libxl: set correct nic type for HVM guests without a device model

2015-07-01 Thread Roger Pau Monne
If there's no device model running nic type is always LIBXL_NIC_TYPE_VIF. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/libxl/libxl_create.c | 5 + 1 file changed, 5 insertions(+) diff --git a/tools/libxl/libxl_create.c b/to

[Xen-devel] [PATCH v2 14/22] xen: allow HVM guests to use XENMEM_memory_map

2015-07-01 Thread Roger Pau Monne
Enable this hypercall for HVM guests in order to fetch the e820 memory map in the absence of an emulated BIOS. The memory map is populated and notified to Xen in arch_setup_meminit_hvm. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Jan

[Xen-devel] [PATCH v2 22/22] lib{xc/xl}: allow the creation of HVM domains with a kernel

2015-07-01 Thread Roger Pau Monne
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM builder now uses the PV xc_dom_* set of functions this kernel will be parsed and loaded inside the guest like on PV, but the container is a pure HVM guest. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stab

[Xen-devel] [PATCH] osstest: install libnl3 packages

2015-07-01 Thread Roger Pau Monne
Install the libnl3 packages needed by the remus code. Those are available on both Wheezy and Jessie, although the Wheezy ones are too old. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Ian Campbell Cc: Shriram Rajagopalan Cc: Yang Hongyang --- ts-xen-build-prep | 8 +--- 1 file chan

Re: [Xen-devel] [v3 12/13] arm: Allow the user to specify the GIC version

2015-07-01 Thread Julien Grall
On 01/07/15 15:50, Ian Campbell wrote: > On Wed, 2015-07-01 at 15:37 +0100, Julien Grall wrote: >>> AFIACT the default is "offer the guest the hardware's native version". >> >> This is true when the domain is firstly created. But this will be >> confusing if the user decide to migrate the guest to

Re: [Xen-devel] [v4][PATCH 04/19] xen/passthrough: extend hypercall to support rdm reservation policy

2015-07-01 Thread Julien Grall
Hi, On 01/07/15 15:39, George Dunlap wrote: > Then make the meaning of the flags as follows: > * for pci devices: > - RDM_RELAXED flag SET: ignore conflicts in set_identity_p2m_entry() > - RDM_RELAXED flag CLEAR: error on conflicts in set_identity_p2m_entry() > * for dt devices: > - Ignore this

Re: [Xen-devel] [PATCH] libxl: Increase device model startup timeout to 1min.

2015-07-01 Thread Stefano Stabellini
On Tue, 30 Jun 2015, Ian Jackson wrote: > > > * The number and nature of parallel operations done in the stress > > > test is unreasonable for the provided hardware: > > > => the timeout is fine > > > > I don't know if it is our place to make this call. Should we really be > > decidin

[Xen-devel] [OSSTEST PATCH] Email reports: Use osstest-output@lists.xenproject

2015-07-01 Thread Ian Jackson
No longer send reports, or copies, to named individuals. Instead, send all output to the new osstest-output list (CC other appropriate lists). After this patch goes live, people interested in bisection progress emails will find them in the new list. (There are a lot of these.) (Configurations f

Re: [Xen-devel] [PATCH OSSTEST v2] mg-all-branch-statuses: Show how up to date each branch is

2015-07-01 Thread Ian Campbell
On Wed, 2015-07-01 at 15:35 +0100, Ian Jackson wrote: > Ian Campbell writes ("Re: [PATCH OSSTEST v2] mg-all-branch-statuses: Show how > up to date each branch is"): > > On Wed, 2015-07-01 at 14:37 +0100, Ian Jackson wrote: > > > These -??-?? are quite visually noisy. > > > > Agreed, I did con

Re: [Xen-devel] [v3 12/13] arm: Allow the user to specify the GIC version

2015-07-01 Thread Ian Campbell
On Wed, 2015-07-01 at 15:37 +0100, Julien Grall wrote: > > AFIACT the default is "offer the guest the hardware's native version". > > This is true when the domain is firstly created. But this will be > confusing if the user decide to migrate the guest to a platform where > the native GIC is differ

[Xen-devel] [PATCH v2 04/22] libxc: introduce a domain loader for HVM guest firmware

2015-07-01 Thread Roger Pau Monne
Introduce a very simple (and dummy) domain loader to be used to load the firmware (hvmloader) into HVM guests. Since hmvloader is just a 32bit elf executable the loader is fairly simple. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- to

[Xen-devel] [PATCH v2 09/22] libxl: switch HVM domain building to use xc_dom_* helpers

2015-07-01 Thread Roger Pau Monne
Now that we have all the code in place HVM domain building in libxl can be switched to use the xc_dom_* family of functions, just like they are used in order to build PV guests. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/libxl

[Xen-devel] [PATCH v2 02/22] libxc: unify xc_dom_p2m_{host/guest}

2015-07-01 Thread Roger Pau Monne
Unify both functions into xc_dom_p2m. Should not introduce any functional change. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Samuel Thibault --- stubdom/grub/kexec.c | 4 ++-- tools/libxc/include/xc_dom.h | 14 ++

  1   2   3   >