Re: [Xen-devel] [Patch V4 1/3] usb: Add Xen pvUSB protocol description

2015-07-22 Thread Juergen Gross
On 07/23/2015 06:36 AM, Greg KH wrote: On Thu, Jul 23, 2015 at 06:04:39AM +0200, Juergen Gross wrote: On 07/23/2015 01:46 AM, Greg KH wrote: On Tue, Jun 23, 2015 at 08:53:23AM +0200, Juergen Gross wrote: Add the definition of pvUSB protocol used between the pvUSB frontend in a Xen domU and the

[Xen-devel] [PATCH v3 4/4] arm64: Add the introduction of xen boot commands in docs/grub.texi

2015-07-22 Thread fu . wei
From: Fu Wei xen_hypervisor xen_linux xen_initrd xen_xsm xen_module Signed-off-by: Fu Wei --- docs/grub.texi | 56 1 file changed, 56 insertions(+) diff --git a/docs/grub.texi b/docs/grub.texi index b9f41a7..e94b03c

[Xen-devel] [PATCH v3 0/4] arm64: Add Xen boot support (via fdt)

2015-07-22 Thread fu . wei
From: Fu Wei - This adds support for the Xen boot on ARM specification for arm64. - Add and export some accessor functions of "loaded" flag and grub_linux_get_fdt function in include/grub/arm64/linux.h for xen boot. - Introduce xen_hypervisor, xen_linux, xen_initrd and xen_xsm to

[Xen-devel] [PATCH v3 3/4] * util/grub.d/20_linux_xen.in: Add support of the XEN boot on aarch64

2015-07-22 Thread fu . wei
From: Fu Wei This patch adds the support of boot command on aarch64 for XEN: xen_hypervisor xen_linux xen_initrd Signed-off-by: Fu Wei --- util/grub.d/20_linux_xen.in | 16 +--- 1 file changed, 13 insertions(+), 3 deletions(-) diff --git a/util/grub.d/20_linux_xen.in b

[Xen-devel] [PATCH v3 2/4] arm64: Add xen_boot module file

2015-07-22 Thread fu . wei
From: Fu Wei grub-core/loader/arm64/xen_boot.c - This adds support for the Xen boot on ARM specification for arm64. - Introduce xen_hypervisor, xen_linux, xen_initrd and xen_xsm to load different binaries for xen boot; Introduce xen_module to load common or custom module for xen boot

[Xen-devel] [PATCH v3 1/4] arm64: Add and export some accessor functions for xen boot

2015-07-22 Thread fu . wei
From: Fu Wei Add accessor functions of "loaded" flag in grub-core/loader/arm64/linux.c. Export accessor functions of "loaded" flag and grub_linux_get_fdt function in include/grub/arm64/linux.h. Purpose: Reuse the existing code of devicetree in linux module. Signed-off-by: Fu Wei --- grub-cor

Re: [Xen-devel] PV-vNUMA issue: topology is misinterpreted by the guest

2015-07-22 Thread Juergen Gross
On 07/22/2015 04:44 PM, Boris Ostrovsky wrote: On 07/22/2015 10:09 AM, Juergen Gross wrote: On 07/22/2015 03:58 PM, Boris Ostrovsky wrote: On 07/22/2015 09:50 AM, Juergen Gross wrote: On 07/22/2015 03:36 PM, Dario Faggioli wrote: On Tue, 2015-07-21 at 16:00 -0400, Boris Ostrovsky wrote: On 0

Re: [Xen-devel] [Patch V4 1/3] usb: Add Xen pvUSB protocol description

2015-07-22 Thread Greg KH
On Thu, Jul 23, 2015 at 06:04:39AM +0200, Juergen Gross wrote: > On 07/23/2015 01:46 AM, Greg KH wrote: > >On Tue, Jun 23, 2015 at 08:53:23AM +0200, Juergen Gross wrote: > >>Add the definition of pvUSB protocol used between the pvUSB frontend in > >>a Xen domU and the pvUSB backend in a Xen driver

[Xen-devel] [qemu-upstream-unstable test] 59819: regressions - FAIL

2015-07-22 Thread osstest service owner
flight 59819 qemu-upstream-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/59819/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 11 guest-saverestore fail REGR. vs. 58880 T

Re: [Xen-devel] [Patch V4 1/3] usb: Add Xen pvUSB protocol description

2015-07-22 Thread Juergen Gross
On 07/23/2015 01:46 AM, Greg KH wrote: On Tue, Jun 23, 2015 at 08:53:23AM +0200, Juergen Gross wrote: Add the definition of pvUSB protocol used between the pvUSB frontend in a Xen domU and the pvUSB backend in a Xen driver domain (usually Dom0). This header was originally provided by Fujitsu fo

[Xen-devel] [linux-3.4 test] 59820: regressions - FAIL

2015-07-22 Thread osstest service owner
flight 59820 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59820/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 5 xen-build fail REGR. vs. 30511 Regressions which are r

[Xen-devel] [linux-next test] 59818: tolerable FAIL

2015-07-22 Thread osstest service owner
flight 59818 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/59818/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-xsm 6 xen-boot fail REGR. vs. 59789 test-amd64-i386-xl-qemut-stubdo

Re: [Xen-devel] [PATCH v13 00/16] Fix RMRR (avoid RDM)

2015-07-22 Thread Chen, Tiejun
Ian, This was supposed to be my responsibility to resend this series so appreciate for your extra effort. git branch here: http://xenbits.xen.org/gitweb/?p=people/iwj/xen.git;a=summary git://xenbits.xen.org/people/iwj/xen.git base.rdm-v13..wip.rdm-v13 I pick all RMRR patches from

Re: [Xen-devel] [PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-22 Thread Chen, Tiejun
Ian, Thanks for your effort. A tiny change may be needed but I don't block this. +libxl__xc_device_get_rdm(libxl__gc *gc, + uint32_t flag, Since now we are sitting on xc_reserved_device_memory_map(, flags, xxx), s/flag/flags may be better. +

Re: [Xen-devel] [arch] WARNING: CPU: 0 PID: 0 at kernel/memremap.c:31 memremap()

2015-07-22 Thread Dan Williams
64e91244e7befaa2317519ea15dc9c89 # 07:24 0- > 19 pmem: convert to generic memremap > # extra tests on tree/branch linus/master > git bisect good 5a5ca73ac0a73c876b62858f0753a25ee430e370 # 07:26 66+ > 2 Merge tag 'arm64-fixes' of > git://git.kernel.or

Re: [Xen-devel] [Patch V4 1/3] usb: Add Xen pvUSB protocol description

2015-07-22 Thread Greg KH
On Tue, Jun 23, 2015 at 08:53:23AM +0200, Juergen Gross wrote: > Add the definition of pvUSB protocol used between the pvUSB frontend in > a Xen domU and the pvUSB backend in a Xen driver domain (usually Dom0). > > This header was originally provided by Fujitsu for Xen based on Linux > 2.6.18. >

[Xen-devel] [arch] WARNING: CPU: 0 PID: 0 at kernel/memremap.c:31 memremap()

2015-07-22 Thread kernel test robot
git bisect good 72a68fd733c8b6cd2e0ebc0586a9103067cd4ed7 # 07:29 65+ 0 Add linux-next specific files for 20150722 This script may reproduce the error. #!/bin/bash kernel=$1 initrd=yocto-minimal-i386.cgz wget --no

[Xen-devel] [PATCH v7 15/15] tools/xen-access: altp2m testcases

2015-07-22 Thread Ed White
From: Tamas K Lengyel Working altp2m test-case. Extended the test tool to support singlestepping to better highlight the core feature of altp2m view switching. Signed-off-by: Tamas K Lengyel Signed-off-by: Ed White Reviewed-by: Razvan Cojocaru Acked-by: Wei Liu --- Changes since v6:

[Xen-devel] [PATCH v7 14/15] tools/libxc: add support to altp2m hvmops

2015-07-22 Thread Ed White
From: Tamas K Lengyel Wrappers to issue altp2m hvmops. Signed-off-by: Tamas K Lengyel Signed-off-by: Ravi Sahita Acked-by: Ian Campbell --- Changes since v6: no changes tools/libxc/Makefile | 1 + tools/libxc/include/xenctrl.h | 22 tools/libxc/xc_altp2m.c |

[Xen-devel] [PATCH v7 13/15] x86/altp2m: XSM hooks for altp2m HVM ops

2015-07-22 Thread Ed White
From: Ravi Sahita Signed-off-by: Ravi Sahita Acked-by: Daniel De Graaf --- Changes since v6: no changes tools/flask/policy/policy/modules/xen/xen.if | 4 ++-- xen/arch/x86/hvm/hvm.c | 6 ++ xen/include/xsm/dummy.h | 12 xe

[Xen-devel] [PATCH v7 12/15] x86/altp2m: Add altp2mhvm HVM domain parameter.

2015-07-22 Thread Ed White
The altp2mhvm and nestedhvm parameters are mutually exclusive and cannot be set together. Signed-off-by: Ed White Reviewed-by: Andrew Cooper Acked-by: Wei Liu --- Changes since v6: no changes docs/man/xl.cfg.pod.5 | 12 tools/libxl/libxl.h | 6

[Xen-devel] [PATCH v7 11/15] x86/altp2m: define and implement alternate p2m HVMOP types.

2015-07-22 Thread Ed White
Signed-off-by: Ed White Acked-by: Jan Beulich --- Changes since v6: fix cmd range check rework domain locking add Jan's ack xen/arch/x86/hvm/hvm.c | 138 xen/include/public/hvm/hvm_op.h | 89 ++

[Xen-devel] [PATCH v7 10/15] x86/altp2m: add remaining support routines.

2015-07-22 Thread Ed White
Add the remaining routines required to support enabling the alternate p2m functionality. Signed-off-by: Ed White Reviewed-by: Andrew Cooper --- Changes since v6: rename altp2m lazy copier, make bool_t, use __put_gfn throughout, and move to p2m.c, eliminating altp2m_hap.c

[Xen-devel] [PATCH v7 08/15] x86/altp2m: add control of suppress_ve.

2015-07-22 Thread Ed White
From: George Dunlap The existing ept_set_entry() and ept_get_entry() routines are extended to optionally set/get suppress_ve. Passing -1 will set suppress_ve on new p2m entries, or retain suppress_ve flag on existing entries. Signed-off-by: George Dunlap Signed-off-by: Ravi Sahita Reviewed-b

[Xen-devel] [PATCH v7 09/15] x86/altp2m: alternate p2m memory events.

2015-07-22 Thread Ed White
Add a flag to indicate that a memory event occurred in an alternate p2m and a field containing the p2m index. Allow any event response to switch to a different alternate p2m using the same flag and field. Modify p2m_mem_access_check() to handle alternate p2m's. Signed-off-by: Ed White Acked-by:

[Xen-devel] [PATCH v7 07/15] VMX: add VMFUNC leaf 0 (EPTP switching) to emulator.

2015-07-22 Thread Ed White
From: Ravi Sahita Signed-off-by: Ravi Sahita Acked-by: Jan Beulich --- Changes since v6: remove incorrect cast add Jan's ack xen/arch/x86/hvm/emulate.c | 18 +++-- xen/arch/x86/hvm/vmx/vmx.c | 36 ++ xen/arch

[Xen-devel] [PATCH v7 05/15] x86/altp2m: basic data structures and support routines.

2015-07-22 Thread Ed White
Add the basic data structures needed to support alternate p2m's and the functions to initialise them and tear them down. Although Intel hardware can handle 512 EPTP's per hardware thread concurrently, only 10 per domain are supported in this patch for performance reasons. This change also splits

[Xen-devel] [PATCH v7 03/15] VMX: implement suppress #VE.

2015-07-22 Thread Ed White
In preparation for selectively enabling #VE in a later patch, set suppress #VE on all EPTE's. Suppress #VE should always be the default condition for two reasons: it is generally not safe to deliver #VE into a guest unless that guest has been modified to receive it; and even then for most EPT viol

[Xen-devel] [PATCH v7 06/15] VMX/altp2m: add code to support EPTP switching and #VE.

2015-07-22 Thread Ed White
Implement and hook up the code to enable VMX support of VMFUNC and #VE. VMFUNC leaf 0 (EPTP switching) emulation is added in a later patch. Signed-off-by: Ed White Reviewed-by: Andrew Cooper Acked-by: Jun Nakajima --- Changes since v6: remove casts around p2midx handling fix v

[Xen-devel] [PATCH v7 02/15] VMX: VMFUNC and #VE definitions and detection.

2015-07-22 Thread Ed White
Currently, neither is enabled globally but may be enabled on a per-VCPU basis by the altp2m code. Remove the check for EPTE bit 63 == zero in ept_split_super_page(), as that bit is now hardware-defined. Signed-off-by: Ed White Reviewed-by: Andrew Cooper Acked-by: George Dunlap Acked-by: Jun N

[Xen-devel] [PATCH v7 04/15] x86/HVM: Hardware alternate p2m support detection.

2015-07-22 Thread Ed White
As implemented here, only supported on platforms with VMX HAP. By default this functionality is force-disabled, it can be enabled by specifying altp2m=1 on the Xen command line. Signed-off-by: Ed White Reviewed-by: Andrew Cooper --- Changes since v6: no changes docs/misc/xen-command-

[Xen-devel] [PATCH v7 01/15] common/domain: Helpers to pause a domain while in context

2015-07-22 Thread Ed White
From: Andrew Cooper For use on codepaths which would need to use domain_pause() but might be in the target domain's context. In the case that the target domain is in context, all other vcpus are paused. Signed-off-by: Andrew Cooper Reviewed-by: George Dunlap --- Changes since v6: add

[Xen-devel] [PATCH v7 00/15] Alternate p2m: support multiple copies of host p2m

2015-07-22 Thread Ed White
This set of patches adds support to hvm domains for EPTP switching by creating multiple copies of the host p2m (currently limited to 10 copies). The primary use of this capability is expected to be in scenarios where access to memory needs to be monitored and/or restricted below the level at which

[Xen-devel] [libvirt test] 59816: regressions - trouble: blocked/broken/fail/pass

2015-07-22 Thread osstest service owner
flight 59816 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/59816/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3863 host-install(3) broken REGR. vs. 58842 build-i386-pvops

Re: [Xen-devel] [PATCH v3 1/3] x86/ldt: Make modify_ldt synchronous

2015-07-22 Thread Boris Ostrovsky
On 07/22/2015 03:23 PM, Andy Lutomirski wrote: modify_ldt has questionable locking and does not synchronize threads. Improve it: redesign the locking and synchronize all threads' LDTs using an IPI on all modifications. This will dramatically slow down modify_ldt in multithreaded programs, but t

[Xen-devel] [PATCH] oxenstored: link in the systemd system library

2015-07-22 Thread Jonathan Creekmore
If systemd is configured for use AND you are building oxenstored, the C systemd library must be linked in to the oxenstored binary instead of just into the static ocaml stub. Signed-off-by: Jonathan Creekmore --- tools/ocaml/xenstored/Makefile | 4 +++- 1 file changed, 3 insertions(+), 1 deletio

[Xen-devel] [linux-linus test] 59815: regressions - FAIL

2015-07-22 Thread osstest service owner
flight 59815 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/59815/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs. 59254 build-i386-pvop

[Xen-devel] [linux-4.1 test] 59811: regressions - FAIL

2015-07-22 Thread osstest service owner
flight 59811 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59811/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 11 guest-saverestore fail REGR. vs. 59393 test-a

[Xen-devel] [PATCH v3 3/3] selftests/x86, x86/ldt: Add a selftest for modify_ldt

2015-07-22 Thread Andy Lutomirski
This tests general modify_ldt behavior (only writes, so far) as well as synchronous updates via IPI. It fails on old kernels. I called this ldt_gdt because I'll add set_thread_area tests to it at some point. Signed-off-by: Andy Lutomirski --- tools/testing/selftests/x86/Makefile | 2 +- too

[Xen-devel] [PATCH v3 2/3] x86/ldt: Make modify_ldt optional

2015-07-22 Thread Andy Lutomirski
The modify_ldt syscall exposes a large attack surface and is unnecessary for modern userspace. Make it optional. Signed-off-by: Andy Lutomirski --- arch/x86/Kconfig | 17 + arch/x86/include/asm/mmu.h | 2 ++ arch/x86/include/asm/mmu_context.h | 31

[Xen-devel] [PATCH v3 0/3] x86: modify_ldt improvement, test, and config option

2015-07-22 Thread Andy Lutomirski
Here's v3. It fixes the "dazed and confused" issue, I hope. It's also probably a good general attack surface reduction, and it replaces some scary code with IMO less scary code. Also, servers and embedded systems should probably turn off modify_ldt. This makes that possible. Xen people, can you

[Xen-devel] [PATCH v3 1/3] x86/ldt: Make modify_ldt synchronous

2015-07-22 Thread Andy Lutomirski
modify_ldt has questionable locking and does not synchronize threads. Improve it: redesign the locking and synchronize all threads' LDTs using an IPI on all modifications. This will dramatically slow down modify_ldt in multithreaded programs, but there shouldn't be any multithreaded programs that

[Xen-devel] [qemu-mainline test] 59810: regressions - FAIL

2015-07-22 Thread osstest service owner
flight 59810 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/59810/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-i386 12 guest-saverestore fail REGR. vs. 59059 test-amd64-i386-xl-

Re: [Xen-devel] PV-vNUMA issue: topology is misinterpreted by the guest

2015-07-22 Thread Boris Ostrovsky
On 07/22/2015 11:49 AM, Dario Faggioli wrote: On Wed, 2015-07-22 at 11:32 -0400, Boris Ostrovsky wrote: On 07/22/2015 10:50 AM, Dario Faggioli wrote: Yep. Exacty. As Boris says, this is a generic scheduling issue, although it's tru that it's only (as far as I can tell) with vNUMA that it bite u

Re: [Xen-devel] [PATCH v5 7/7] x86/PCI: intercept all PV Dom0 MMCFG writes

2015-07-22 Thread Andrew Cooper
On 20/07/15 15:23, Jan Beulich wrote: > ... to hook up pci_conf_write_intercept() even for Dom0 not using > method 1 accesses for the base part of PCI device config space. > > Signed-off-by: Jan Beulich > --- > Not entirely sure whether the complicated logging logic in x86/mm.c is > actually worth

Re: [Xen-devel] [PATCH v5 6/7] x86/MSI: properly track guest masking requests

2015-07-22 Thread Andrew Cooper
On 20/07/15 15:22, Jan Beulich wrote: > ... by monitoring writes to the mask register. > > This allows reverting the main effect of the XSA-129 patches in qemu. > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-d

Re: [Xen-devel] [PATCH] xen/HVM: atomically access pointers in bufioreq handling

2015-07-22 Thread Stefano Stabellini
On Wed, 22 Jul 2015, Stefano Stabellini wrote: > On Wed, 22 Jul 2015, Jan Beulich wrote: > > >>> On 22.07.15 at 16:50, wrote: > > > On Wed, 22 Jul 2015, Jan Beulich wrote: > > >> >> --- a/xen-hvm.c > > >> >> +++ b/xen-hvm.c > > >> >> @@ -981,19 +981,30 @@ static void handle_ioreq(XenIOState *sta >

Re: [Xen-devel] [PATCH] xen/HVM: atomically access pointers in bufioreq handling

2015-07-22 Thread Stefano Stabellini
On Wed, 22 Jul 2015, Jan Beulich wrote: > >>> On 22.07.15 at 16:50, wrote: > > On Wed, 22 Jul 2015, Jan Beulich wrote: > >> >> --- a/xen-hvm.c > >> >> +++ b/xen-hvm.c > >> >> @@ -981,19 +981,30 @@ static void handle_ioreq(XenIOState *sta > >> >> > >> >> static int handle_buffered_iopage(XenIOSt

[Xen-devel] [linux-3.18 test] 59807: regressions - FAIL

2015-07-22 Thread osstest service owner
flight 59807 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59807/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581 Tests which are failin

[Xen-devel] [MINUTES] Monthly Xen.org Technical Call (2015-07-22)

2015-07-22 Thread Ian Campbell
This was the rescheduled 8 July call, on the topic of PVH and related work = Attendees = * Ian Campbell * David Vrabel * Stefano Stabellini * Boris Ostrovsky * Elena Ufimtseva * Wei Liu * George Dunlap * Konrad Rzeszutek Wilk * Jan Beulich * Daniel Kiper * Andrew Cooper * Roger Pau M

[Xen-devel] [PATCH] xenconsole: Allow non-interactive use

2015-07-22 Thread Martin Lucina
If xenconsole is run with stdin closed or redirected to /dev/null, console_loop() will return immediately due to failure to read from STDIN_FILENO. This patch tests if stdin and stdout are both connected to a TTY and, if not, xenconsole will not attempt to read from stdin or modify stdout terminal

Re: [Xen-devel] [v11][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-22 Thread Jan Beulich
>>> On 22.07.15 at 12:04, wrote: > Tiejun Chen writes ("[v11][PATCH 11/16] tools/libxl: detect and avoid > conflicts with RDM"): >> While building a VM, HVM domain builder provides struct hvm_info_table{} >> to help hvmloader. Currently it includes two fields to construct guest >> e820 table by h

Re: [Xen-devel] [PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-22 Thread Wei Liu
On Wed, Jul 22, 2015 at 04:44:14PM +0100, Ian Jackson wrote: > From: Tiejun Chen > > While building a VM, HVM domain builder provides struct hvm_info_table{} > to help hvmloader. Currently it includes two fields to construct guest > e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we

Re: [Xen-devel] [PATCH 08/16] tools/libxc: Expose new hypercall xc_reserved_device_memory_map

2015-07-22 Thread Wei Liu
On Wed, Jul 22, 2015 at 04:44:11PM +0100, Ian Jackson wrote: > From: Tiejun Chen > > We will introduce the hypercall xc_reserved_device_memory_map > approach to libxc. This helps us get rdm entry info according to > different parameters. If flag == PCI_DEV_RDM_ALL, all entries > should be exposed

Re: [Xen-devel] [PATCH v13 00/16] Fix RMRR (avoid RDM)

2015-07-22 Thread Ian Jackson
Ian Jackson writes ("[PATCH v13 00/16] Fix RMRR (avoid RDM)"): > Wei, can you please give your formal ack for the two changed patches ? > > Tiejun, can you please test this series ? Hopefully if you say it > still works after this, we can commit it tomorrow. FAOD, I have not executed it, althoug

Re: [Xen-devel] PV-vNUMA issue: topology is misinterpreted by the guest

2015-07-22 Thread Dario Faggioli
On Wed, 2015-07-22 at 11:32 -0400, Boris Ostrovsky wrote: > On 07/22/2015 10:50 AM, Dario Faggioli wrote: > > Yep. Exacty. As Boris says, this is a generic scheduling issue, although > > it's tru that it's only (as far as I can tell) with vNUMA that it bite > > us so hard... > > I am not sure tha

Re: [Xen-devel] [PATCH v2] x86/HVM: avoid pointer wraparound in bufioreq handling

2015-07-22 Thread Stefano Stabellini
On Wed, 22 Jul 2015, Jan Beulich wrote: > >>> On 22.07.15 at 16:49, wrote: > > On Wed, 22 Jul 2015, Jan Beulich wrote: > >> >>> On 21.07.15 at 18:18, wrote: > >> > On Thu, 18 Jun 2015, Jan Beulich wrote: > >> >> --- a/xen/arch/x86/hvm/hvm.c > >> >> +++ b/xen/arch/x86/hvm/hvm.c > >> >> @@ -921,7 +

[Xen-devel] [PATCH 04/16] xen: enable XENMEM_memory_map in hvm

2015-07-22 Thread Ian Jackson
From: Tiejun Chen This patch enables XENMEM_memory_map in hvm. So hvmloader can use it to setup the e820 mappings. CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Tiejun Chen Reviewed-by: Tim Deegan Reviewed-by: Kevin Tian Acked-by: Jan Beulich Acked-by: George Dunlap --

[Xen-devel] [PATCH 14/16] xen/vtd: enable USB device assignment

2015-07-22 Thread Ian Jackson
From: Tiejun Chen USB RMRR may conflict with guest BIOS region. In such case, identity mapping setup is simply skipped in previous implementation. Now we can handle this scenario cleanly with new policy mechanism so previous hack code can be removed now. CC: Yang Zhang CC: Kevin Tian Signed-of

[Xen-devel] [PATCH 16/16] tools: parse to enable new rdm policy parameters

2015-07-22 Thread Ian Jackson
From: Tiejun Chen This patch parses to enable user configurable parameters to specify RDM resource and according policies which are defined previously, Global RDM parameter: rdm = "strategy=host,policy=strict/relaxed" Per-device RDM parameter: pci = [ 'sbdf, rdm_policy=strict/relaxed' ]

[Xen-devel] [PATCH 02/16] xen/vtd: create RMRR mapping

2015-07-22 Thread Ian Jackson
From: Tiejun Chen RMRR reserved regions must be setup in the pfn space with an identity mapping to reported mfn. However existing code has problem to setup correct mapping when VT-d shares EPT page table, so lead to problem when assigning devices (e.g GPU) with RMRR reported. So instead, this pat

[Xen-devel] [PATCH 03/16] xen/passthrough: extend hypercall to support rdm reservation policy

2015-07-22 Thread Ian Jackson
From: Tiejun Chen This patch extends the existing hypercall to support rdm reservation policy. We return error or just throw out a warning message depending on whether the policy is "strict" or "relaxed" when reserving RDM regions in pfn space. Note in some special cases, e.g. add a device to hwd

[Xen-devel] [PATCH 09/16] tools: extend xc_assign_device() to support rdm reservation policy

2015-07-22 Thread Ian Jackson
From: Tiejun Chen This patch passes rdm reservation policy to xc_assign_device() so the policy is checked when assigning devices to a VM. Note this also bring some fallout to python usage of xc_assign_device(). CC: Ian Jackson CC: Stefano Stabellini CC: Ian Campbell CC: Wei Liu CC: David Sc

[Xen-devel] [PATCH 13/16] libxl: construct e820 map with RDM information for HVM guest

2015-07-22 Thread Ian Jackson
From: Tiejun Chen Here we'll construct a basic guest e820 table via XENMEM_set_memory_map. This table includes lowmem, highmem and RDMs if they exist, and hvmloader would need this info later. Note this guest e820 table would be same as before if the platform has no any RDM or we disable RDM (by

[Xen-devel] [PATCH 12/16] tools: introduce a new parameter to set a predefined rdm boundary

2015-07-22 Thread Ian Jackson
From: Tiejun Chen Previously we always fix that predefined boundary as 2G to handle conflict between memory and rdm, but now this predefined boundar can be changes with the parameter "rdm_mem_boundary" in .cfg file. CC: Ian Jackson CC: Stefano Stabellini CC: Ian Campbell CC: Wei Liu Signed-o

[Xen-devel] [PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-22 Thread Ian Jackson
From: Tiejun Chen This patch introduces user configurable parameters to specify RDM resource and according policies, Global RDM parameter: rdm = "strategy=host,policy=strict/relaxed" Per-device RDM parameter: pci = [ 'sbdf, rdm_policy=strict/relaxed' ] Global RDM parameter, "strategy",

[Xen-devel] [PATCH 05/16] hvmloader: get guest memory map into memory_map[]

2015-07-22 Thread Ian Jackson
From: Tiejun Chen Now we get this map layout by call XENMEM_memory_map then save them into one global variable memory_map[]. It should include lowmem range, rdm range and highmem range. Note rdm range and highmem range may not exist in some cases. And here we need to check if any reserved memory

[Xen-devel] [PATCH 15/16] xen/vtd: prevent from assign the device with shared rmrr

2015-07-22 Thread Ian Jackson
From: Tiejun Chen Currently we're intending to cover this kind of devices with shared RMRR simply since the case of shared RMRR is a rare case according to our previous experiences. But late we can group these devices which shared rmrr, and then allow all devices within a group to be assigned to

[Xen-devel] [PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-22 Thread Ian Jackson
From: Tiejun Chen While building a VM, HVM domain builder provides struct hvm_info_table{} to help hvmloader. Currently it includes two fields to construct guest e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we should check them to fix any conflict with RDM. RMRR can reside in ad

[Xen-devel] [PATCH 08/16] tools/libxc: Expose new hypercall xc_reserved_device_memory_map

2015-07-22 Thread Ian Jackson
From: Tiejun Chen We will introduce the hypercall xc_reserved_device_memory_map approach to libxc. This helps us get rdm entry info according to different parameters. If flag == PCI_DEV_RDM_ALL, all entries should be exposed. Or we just expose that rdm entry specific to a SBDF. CC: Ian Jackson

[Xen-devel] [PATCH 06/16] hvmloader/pci: try to avoid placing BARs in RMRRs

2015-07-22 Thread Ian Jackson
From: George Dunlap Try to avoid placing PCI BARs over RMRRs: - If mmio_hole_size is not specified, and the existing MMIO range has RMRRs in it, and there is space to expand the hole in lowmem without moving more memory, then make the MMIO hole as large as possible. - When placing RMRRs, fi

[Xen-devel] [PATCH 01/16] introduce XENMEM_reserved_device_memory_map

2015-07-22 Thread Ian Jackson
From: Jan Beulich This is a prerequisite for punching holes into HVM and PVH guests' P2M to allow passing through devices that are associated with (on VT-d) RMRRs. Signed-off-by: Jan Beulich Signed-off-by: Tiejun Chen Acked-by: Kevin Tian Acked-by: Ian Campbell --- v12a: Move interface struc

[Xen-devel] [PATCH v13 00/16] Fix RMRR (avoid RDM)

2015-07-22 Thread Ian Jackson
This is about v13 of the RDM series. Compared to v11, I have: - imported it into git (dropping change notices for all previous version) - brought in new versions of 01 (aka "v12a") and 06 from Jan - made adjustments as needed by the new 01 from Jan - double-checked the acks etc., dropping unju

[Xen-devel] [PATCH 07/16] hvmloader/e820: construct guest e820 table

2015-07-22 Thread Ian Jackson
From: Tiejun Chen Now use the hypervisor-supplied memory map to build our final e820 table: * Add regions for BIOS ranges and other special mappings not in the hypervisor map * Add in the hypervisor supplied regions * Adjust the lowmem and highmem regions if we've had to relocate memory (addi

Re: [Xen-devel] [PATCH] xen/HVM: atomically access pointers in bufioreq handling

2015-07-22 Thread Jan Beulich
>>> On 22.07.15 at 16:50, wrote: > On Wed, 22 Jul 2015, Jan Beulich wrote: >> >> --- a/xen-hvm.c >> >> +++ b/xen-hvm.c >> >> @@ -981,19 +981,30 @@ static void handle_ioreq(XenIOState *sta >> >> >> >> static int handle_buffered_iopage(XenIOState *state) >> >> { >> >> +buffered_iopage_t *buf

Re: [Xen-devel] PV-vNUMA issue: topology is misinterpreted by the guest

2015-07-22 Thread Boris Ostrovsky
On 07/22/2015 10:50 AM, Dario Faggioli wrote: On Wed, 2015-07-22 at 16:09 +0200, Juergen Gross wrote: On 07/22/2015 03:58 PM, Boris Ostrovsky wrote: What if I configure a guest to follow HW topology? I.e. I pin VCPUs to appropriate cores/threads? With elfnote I am stuck with disabled topology.

Re: [Xen-devel] [v11][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-22 Thread Chen, Tiejun
I intend to produce a git branch RSN. On the staging? Tomorrow I can pull to check/test this. Thanks Tiejun ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2] x86/HVM: avoid pointer wraparound in bufioreq handling

2015-07-22 Thread Jan Beulich
>>> On 22.07.15 at 16:49, wrote: > On Wed, 22 Jul 2015, Jan Beulich wrote: >> >>> On 21.07.15 at 18:18, wrote: >> > On Thu, 18 Jun 2015, Jan Beulich wrote: >> >> --- a/xen/arch/x86/hvm/hvm.c >> >> +++ b/xen/arch/x86/hvm/hvm.c >> >> @@ -921,7 +921,7 @@ static void hvm_ioreq_server_disable(str >> >

Re: [Xen-devel] [PATCH v4 2/3] libxl: localtime(3) can return NULL

2015-07-22 Thread Ian Campbell
On Wed, 2015-07-22 at 16:09 +0100, Wei Liu wrote: > On Wed, Jul 22, 2015 at 03:19:08PM +0100, Ian Campbell wrote: > > On Fri, 2015-07-17 at 18:12 +0100, Wei Liu wrote: > > > On Fri, Jul 17, 2015 at 06:05:45PM +0100, Ian Jackson wrote: > > > > Wei Liu writes ("[PATCH v4 2/3] libxl: localtime(3) can

Re: [Xen-devel] [v11][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-22 Thread Ian Jackson
Chen, Tiejun writes ("Re: [v11][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM"): > We just need to sync two patches: Thanks. > Note I just compiled with these changes since right now I can't access > any machine to test. I intend to produce a git branch RSN. Ian.

Re: [Xen-devel] [PATCH v4 2/3] libxl: localtime(3) can return NULL

2015-07-22 Thread Wei Liu
On Wed, Jul 22, 2015 at 03:19:08PM +0100, Ian Campbell wrote: > On Fri, 2015-07-17 at 18:12 +0100, Wei Liu wrote: > > On Fri, Jul 17, 2015 at 06:05:45PM +0100, Ian Jackson wrote: > > > Wei Liu writes ("[PATCH v4 2/3] libxl: localtime(3) can return > > > NULL"): > > > > Signed-off-by: Wei Liu > >

Re: [Xen-devel] [v11][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-22 Thread Chen, Tiejun
OOPS! Please refer to this version: (One miss changing flag to flags in patch #11 although we can compile successfully.) #1. To patch #8 diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h index 2991333..9c5ef8b 100644 --- a/tools/libxc/include/xenctrl.h +++ b/tools/libx

Re: [Xen-devel] [v11][PATCH 09/16] tools: extend xc_assign_device() to support rdm reservation policy

2015-07-22 Thread Wei Liu
On Wed, Jul 22, 2015 at 02:06:46PM +0100, Ian Jackson wrote: > Tiejun Chen writes ("[v11][PATCH 09/16] tools: extend xc_assign_device() to > support rdm reservation policy"): > > This patch passes rdm reservation policy to xc_assign_device() so the policy > > is checked when assigning devices to a

Re: [Xen-devel] [v11][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-22 Thread Chen, Tiejun
On 2015/7/22 22:04, Ian Jackson wrote: Chen, Tiejun writes ("Re: [v11][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM"): Sounds you start to merge them into your tree? But now Jan is trying to update patch #1 as you see. I think something needs to be synced on tool sides. Althou

Re: [Xen-devel] [PATCH v2 for-4.6 3/3] xen: remove non-POSIX error codes

2015-07-22 Thread Jan Beulich
>>> On 22.07.15 at 16:16, wrote: > On Wed, 2015-07-22 at 13:07 +0200, Roger Pau Monne wrote: >> Xen was using some non-POSIX error codes that are removed in this >> patch. For >> future reference, the list of POSIX error codes has been obtained >> from: >> >> http://pubs.opengroup.org/onlinepub

Re: [Xen-devel] [PATCH v3] xl: fix vcpus to vnode assignement in config file

2015-07-22 Thread Ian Campbell
On Tue, 2015-07-21 at 19:31 +0200, Dario Faggioli wrote: > In fact, right now, the following (legitimate) > configuration: > > vcpus = '4' > vnuma = [ [ "pnode=0","size=512","vcpus=0,1","vdistances=10,20" ], >[ "pnode=1","size=512","vcpus=2,3","vdistances=20,10" ] ] > > Prod

Re: [Xen-devel] [PATCH] xen/HVM: atomically access pointers in bufioreq handling

2015-07-22 Thread Stefano Stabellini
On Wed, 22 Jul 2015, Jan Beulich wrote: > >> The number of slots per page being 511 (i.e. not a power of two) means > >> that the (32-bit) read and write indexes going beyond 2^32 will likely > >> disturb operation. The hypervisor side gets I/O req server creation > >> extended so we can indicate t

Re: [Xen-devel] [PATCH v2] x86/HVM: avoid pointer wraparound in bufioreq handling

2015-07-22 Thread Stefano Stabellini
On Wed, 22 Jul 2015, Jan Beulich wrote: > >>> On 21.07.15 at 18:18, wrote: > > On Thu, 18 Jun 2015, Jan Beulich wrote: > >> --- a/xen/arch/x86/hvm/hvm.c > >> +++ b/xen/arch/x86/hvm/hvm.c > >> @@ -921,7 +921,7 @@ static void hvm_ioreq_server_disable(str > >> > >> static int hvm_ioreq_server_init

Re: [Xen-devel] PV-vNUMA issue: topology is misinterpreted by the guest

2015-07-22 Thread Dario Faggioli
On Wed, 2015-07-22 at 16:09 +0200, Juergen Gross wrote: > On 07/22/2015 03:58 PM, Boris Ostrovsky wrote: > > What if I configure a guest to follow HW topology? I.e. I pin VCPUs to > > appropriate cores/threads? With elfnote I am stuck with disabled topology. > > Add an option to do exactly that:

Re: [Xen-devel] [PATCH v3 1/2] xen: sched: reorganize cpu_disable_scheduler()

2015-07-22 Thread George Dunlap
On 07/21/2015 05:06 PM, Dario Faggioli wrote: > The function is called both when we want to remove a cpu > from a cpupool, and during cpu teardown, for suspend or > shutdown. If, however, the boot cpu (cpu 0, most of the > times) is not present in the default cpupool, during > suspend or shutdown,

Re: [Xen-devel] PV-vNUMA issue: topology is misinterpreted by the guest

2015-07-22 Thread Boris Ostrovsky
On 07/22/2015 10:09 AM, Juergen Gross wrote: On 07/22/2015 03:58 PM, Boris Ostrovsky wrote: On 07/22/2015 09:50 AM, Juergen Gross wrote: On 07/22/2015 03:36 PM, Dario Faggioli wrote: On Tue, 2015-07-21 at 16:00 -0400, Boris Ostrovsky wrote: On 07/20/2015 10:43 AM, Boris Ostrovsky wrote: On 0

Re: [Xen-devel] [v11][PATCH 16/16] tools: parse to enable new rdm policy parameters

2015-07-22 Thread Wei Liu
On Wed, Jul 22, 2015 at 03:09:55PM +0100, Ian Jackson wrote: > Tiejun Chen writes ("[v11][PATCH 16/16] tools: parse to enable new rdm policy > parameters"): > > This patch parses to enable user configurable parameters to specify > > RDM resource and according policies which are defined previously,

[Xen-devel] [PATCH] hvmloader: don't build with __XEN_TOOLS__ defined

2015-07-22 Thread Jan Beulich
This being an in-guest component, it shouldn't get to see (and even less so use) tools-only public interfaces. Signed-off-by: Jan Beulich --- a/tools/firmware/hvmloader/Makefile +++ b/tools/firmware/hvmloader/Makefile @@ -31,6 +31,9 @@ SMBIOS_REL_DATE ?= $(shell date +%m/%d/% CFLAGS += $(CFLA

Re: [Xen-devel] [PATCH v2 for-4.6 3/3] xen: remove non-POSIX error codes

2015-07-22 Thread Ian Campbell
On Wed, 2015-07-22 at 13:07 +0200, Roger Pau Monne wrote: > Xen was using some non-POSIX error codes that are removed in this > patch. For > future reference, the list of POSIX error codes has been obtained > from: > > http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/errno.h.html > > Th

Re: [Xen-devel] [PATCH v4 2/3] libxl: localtime(3) can return NULL

2015-07-22 Thread Ian Campbell
On Fri, 2015-07-17 at 18:12 +0100, Wei Liu wrote: > On Fri, Jul 17, 2015 at 06:05:45PM +0100, Ian Jackson wrote: > > Wei Liu writes ("[PATCH v4 2/3] libxl: localtime(3) can return > > NULL"): > > > Signed-off-by: Wei Liu > > > > > tm = localtime(&t); > > > +if (!tm) { > > > +

Re: [Xen-devel] [v11][PATCH 16/16] tools: parse to enable new rdm policy parameters

2015-07-22 Thread Ian Jackson
Tiejun Chen writes ("[v11][PATCH 16/16] tools: parse to enable new rdm policy parameters"): > This patch parses to enable user configurable parameters to specify > RDM resource and according policies which are defined previously, > > Global RDM parameter: > rdm = "strategy=host,policy=strict/

Re: [Xen-devel] [PATCH v4 12/17] xen/arm: ITS: Initialize LPI irq descriptors and route

2015-07-22 Thread Julien Grall
On 22/07/15 14:39, Julien Grall wrote: > On 22/07/15 14:31, Vijay Kilari wrote: +p->desc = desc; >>> >>> This should have happened during routing, not now. >> >> While routing we don't have vlpi to update p->desc. > > Why do you need the p->desc? You don't use at all the p->desc during th

Re: [Xen-devel] [PATCH v12a] introduce XENMEM_reserved_device_memory_map

2015-07-22 Thread Jan Beulich
This is a prerequisite for punching holes into HVM and PVH guests' P2M to allow passing through devices that are associated with (on VT-d) RMRRs. Signed-off-by: Jan Beulich Signed-off-by: Tiejun Chen Acked-by: Kevin Tian Acked-by: Ian Campbell --- v12a: Move interface structure union member to

Re: [Xen-devel] PV-vNUMA issue: topology is misinterpreted by the guest

2015-07-22 Thread Juergen Gross
On 07/22/2015 03:58 PM, Boris Ostrovsky wrote: On 07/22/2015 09:50 AM, Juergen Gross wrote: On 07/22/2015 03:36 PM, Dario Faggioli wrote: On Tue, 2015-07-21 at 16:00 -0400, Boris Ostrovsky wrote: On 07/20/2015 10:43 AM, Boris Ostrovsky wrote: On 07/20/2015 10:09 AM, Dario Faggioli wrote: I

Re: [Xen-devel] [PATCH v2 02/23] x86/boot: copy only text section from *.lnk file to *.bin file

2015-07-22 Thread Jan Beulich
>>> On 22.07.15 at 15:31, wrote: > On Wed, Jul 22, 2015 at 02:02:11AM -0600, Jan Beulich wrote: >> >>> On 21.07.15 at 19:23, wrote: >> > First of all ld generates .got.plt section and objcopy copy it to binary >> > file. >> > It is not needed because we do not link our stuff here with shared >> >

  1   2   3   >