Re: [Xen-devel] [PATCH v3 2/4] x86/compat: Test both PV and PVH guests for compat mode

2015-08-11 Thread Jan Beulich
>>> On 11.08.15 at 19:21, wrote: > On 08/11/2015 05:19 AM, Jan Beulich wrote: > On 24.07.15 at 19:54, wrote: >>> On 07/23/2015 10:07 AM, Jan Beulich wrote: Plus - is this in line with what the tools are doing? Aren't they assuming !PV <=> native format context? I.e. don't you need >

Re: [Xen-devel] OSSTEST -- nested test case development, RFC: ts-guest-destroy doesn't call guest_await_dhcp_tcp() if guest has fixed IP

2015-08-11 Thread Hu, Robert
> -Original Message- > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] > Sent: Tuesday, August 11, 2015 8:55 PM > To: Ian Campbell > Cc: Hu, Robert; wei.l...@citrix.com; xen-devel@lists.xen.org > Subject: Re: OSSTEST -- nested test case development, RFC: ts-guest-destroy > doesn't cal

[Xen-devel] linux-next: manual merge of the xen-tip tree with the tip tree

2015-08-11 Thread Stephen Rothwell
Hi all, Today's linux-next merge of the xen-tip tree got a conflict in: arch/x86/xen/enlighten.c between commit: 9261e050b686 ("x86/asm/tsc, x86/paravirt: Remove read_tsc() and read_tscp() paravirt hooks") from the tip tree and commit: cd6f350a5460 ("xen/PMU: Initialization code for Xe

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen

2015-08-11 Thread Shannon Zhao
On 2015/8/12 4:43, Konrad Rzeszutek Wilk wrote: > On Wed, Aug 05, 2015 at 09:03:06PM +0800, Shannon Zhao wrote: >> >> >> On 2015/8/5 20:48, Julien Grall wrote: >>> On 05/08/15 12:49, Shannon Zhao wrote: >>> That's great! >>> Keep in mind that many ARM platforms have non-PCI busses, so I t

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Shannon Zhao
Hi Julien, On 2015/8/12 0:19, Julien Grall wrote: > Hi Shannon, > > On 07/08/15 03:11, Shannon Zhao wrote: >> 2. Create minimal DT to pass required information to Dom0 >> -- >> The minimal DT mainly passes Dom0 bootargs, address and size of

Re: [Xen-devel] [PATCH V3 1/6] x86/xsaves: enable xsaves/xrstors for pv guest

2015-08-11 Thread Shuai Ruan
On Tue, Aug 11, 2015 at 11:24:24AM +0100, Andrew Cooper wrote: > On 11/08/15 08:50, Shuai Ruan wrote: > > On Fri, Aug 07, 2015 at 01:44:41PM +0100, Andrew Cooper wrote: > >> On 07/08/15 09:00, Shuai Ruan wrote: > > +goto skip; > > +} > > + > > +

[Xen-devel] [PATCH v5 17/17] Add a command line parameter for VT-d posted-interrupts

2015-08-11 Thread Feng Wu
Enable VT-d Posted-Interrupts and add a command line parameter for it. Signed-off-by: Feng Wu Reviewed-by: Kevin Tian --- docs/misc/xen-command-line.markdown | 9 - xen/drivers/passthrough/iommu.c | 3 +++ 2 files changed, 11 insertions(+), 1 deletion(-) diff --git a/docs/misc/xen-

[Xen-devel] [PATCH v5 10/17] vt-d: Extend struct iremap_entry to support VT-d Posted-Interrupts

2015-08-11 Thread Feng Wu
Extend struct iremap_entry according to VT-d Posted-Interrupts Spec. CC: Yang Zhang CC: Kevin Tian Signed-off-by: Feng Wu Acked-by: Kevin Tian --- v4: - res_4 is not a bitfiled, correct it. - Expose 'im' to remapped irte as well. v3: - Use u32 instead of u64 to define the bitfields in 'struct

[Xen-devel] [PATCH v5 13/17] vmx: posted-interrupt handling when vCPU is blocked

2015-08-11 Thread Feng Wu
This patch includes the following aspects: - Add a global vector to wake up the blocked vCPU when an interrupt is being posted to it (This part was sugguested by Yang Zhang ). - Adds a new per-vCPU tasklet to wakeup the blocked vCPU. It can be used in the case vcpu_unblock cannot be called

[Xen-devel] [PATCH v5 15/17] vmx: Add some scheduler hooks for VT-d posted interrupts

2015-08-11 Thread Feng Wu
This patch adds the following arch hooks in scheduler: - vmx_pre_ctx_switch_pi(): It is called before context switch, we update the posted interrupt descriptor when the vCPU is preempted, go to sleep, or is blocked. - vmx_post_ctx_switch_pi() It is called after context switch, we update the posted

[Xen-devel] [PATCH v5 12/17] Update IRTE according to guest interrupt config changes

2015-08-11 Thread Feng Wu
When guest changes its interrupt configuration (such as, vector, etc.) for direct-assigned devices, we need to update the associated IRTE with the new guest vector, so external interrupts from the assigned devices can be injected to guests without VM-Exit. For lowest-priority interrupts, we use ve

[Xen-devel] [PATCH v5 11/17] vt-d: Add API to update IRTE when VT-d PI is used

2015-08-11 Thread Feng Wu
This patch adds an API which is used to update the IRTE for posted-interrupt when guest changes MSI/MSI-X information. CC: Yang Zhang CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu Acked-by: Kevin Tian --- v5: - Make some function parameters const -

[Xen-devel] [PATCH v5 16/17] VT-d: Dump the posted format IRTE

2015-08-11 Thread Feng Wu
Add the utility to dump the posted format IRTE. CC: Yang Zhang CC: Kevin Tian Signed-off-by: Feng Wu --- v4: - Newly added xen/drivers/passthrough/vtd/utils.c | 41 - 1 file changed, 40 insertions(+), 1 deletion(-) diff --git a/xen/drivers/passthrough/vtd/

[Xen-devel] [PATCH v5 14/17] vmx: Properly handle notification event when vCPU is running

2015-08-11 Thread Feng Wu
When a vCPU is running in Root mode and a notification event has been injected to it. we need to set VCPU_KICK_SOFTIRQ for the current cpu, so the pending interrupt in PIRR will be synced to vIRR before VM-Exit in time. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-of

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Shannon Zhao
On 2015/8/11 23:52, Boris Ostrovsky wrote: > On 08/11/2015 11:35 AM, Ian Campbell wrote: >> On Tue, 2015-08-11 at 11:29 -0400, Boris Ostrovsky wrote: >>> On 08/11/2015 10:21 AM, Ian Campbell wrote: On Tue, 2015-08-11 at 15:19 +0100, Ian Campbell wrote: > On Fri, 2015-08-07 at 10:11 +0800

[Xen-devel] [PATCH v5 06/17] vmx: Add some helper functions for Posted-Interrupts

2015-08-11 Thread Feng Wu
This patch adds some helper functions to manipulate the Posted-Interrupts Descriptor. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu --- v4: - Newly added xen/include/asm-x86/hvm/vmx/vmx.h | 21 + 1 file changed, 21 insertions(+)

[Xen-devel] [PATCH v5 07/17] vmx: Initialize VT-d Posted-Interrupts Descriptor

2015-08-11 Thread Feng Wu
This patch initializes the VT-d Posted-interrupt Descriptor. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu Acked-by: Kevin Tian --- v3: - Move pi_desc_init() to xen/arch/x86/hvm/vmx/vmcs.c - Remove the 'inline' flag of pi_desc_init() xen/arch/x86/h

[Xen-devel] [PATCH v5 09/17] VT-d: Remove pointless casts

2015-08-11 Thread Feng Wu
Remove pointless casts. Signed-off-by: Feng Wu --- v5: - Newly added. xen/drivers/passthrough/vtd/utils.c | 16 +++- 1 file changed, 7 insertions(+), 9 deletions(-) diff --git a/xen/drivers/passthrough/vtd/utils.c b/xen/drivers/passthrough/vtd/utils.c index 44c4ef5..162b764 100644

[Xen-devel] [PATCH v5 04/17] vt-d: VT-d Posted-Interrupts feature detection

2015-08-11 Thread Feng Wu
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. With VT-d Posted-Interrupts enabled, external interrupts from direct-assigned devices can be delivered to guests without VMM intervention when guest is running in non-root mode. CC: Yang Zhang CC: Kevin Tian Signed-off-by: Fe

[Xen-devel] [PATCH v5 05/17] vmx: Extend struct pi_desc to support VT-d Posted-Interrupts

2015-08-11 Thread Feng Wu
Extend struct pi_desc according to VT-d Posted-Interrupts Spec. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu Reviewed-by: Andrew Cooper Acked-by: Kevin Tian --- v3: - Use u32 instead of u64 for the bitfield in 'struct pi_desc' xen/include/asm-x86

[Xen-devel] [PATCH v5 01/17] VT-d Posted-intterrupt (PI) design

2015-08-11 Thread Feng Wu
Add the design doc for VT-d PI. CC: Kevin Tian CC: Yang Zhang CC: Jan Beulich CC: Keir Fraser CC: Andrew Cooper CC: George Dunlap Signed-off-by: Feng Wu Reviewed-by: Kevin Tian --- docs/misc/vtd-pi.txt | 333 +++ 1 file changed, 333 insertio

[Xen-devel] [PATCH v5 03/17] iommu: Add iommu_intpost to control VT-d Posted-Interrupts feature

2015-08-11 Thread Feng Wu
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. With VT-d Posted-Interrupts enabled, external interrupts from direct-assigned devices can be delivered to guests without VMM intervention when guest is running in non-root mode. This patch adds variable 'iommu_intpost' to contr

[Xen-devel] [PATCH v5 02/17] Add cmpxchg16b support for x86-64

2015-08-11 Thread Feng Wu
This patch adds cmpxchg16b support for x86-64, so software can perform 128-bit atomic write/read. CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu --- v5: - Change back the parameters of __cmpxchg16b() to __uint128_t * - Remove pointless cast for 'ptr' - Remove pointles

[Xen-devel] [PATCH v5 00/17] Add VT-d Posted-Interrupts support

2015-08-11 Thread Feng Wu
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. With VT-d Posted-Interrupts enabled, external interrupts from direct-assigned devices can be delivered to guests without VMM intervention when guest is running in non-root mode. You can find the VT-d Posted-Interrtups Spec. in

[Xen-devel] [PATCH v5 08/17] vmx: Suppress posting interrupts when 'SN' is set

2015-08-11 Thread Feng Wu
Currently, we don't support urgent interrupt, all interrupts are recognized as non-urgent interrupt, so we cannot send posted-interrupt when 'SN' is set. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu --- v5: - keep the vcpu_kick() at the end of vmx_de

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Shannon Zhao
On 2015/8/12 0:01, Julien Grall wrote: > On 11/08/15 16:19, Ian Campbell wrote: >>> IIRC we talked about it few months ago and you said that using balloon >>> page will split in 4K the 1G/2M mapping done in the stage-2 p2m. >> >> Did I? Odd because I'm also of the opinion that alloc_ballooned_pag

Re: [Xen-devel] [PATCH V6 2/7] libxl_read_file_contents: add new entry to read sysfs file

2015-08-11 Thread Chun Yan Liu
>>> On 8/11/2015 at 07:26 PM, in message <2015082655.ge7...@zion.uk.xensource.com>, Wei Liu wrote: > On Mon, Aug 10, 2015 at 06:35:23PM +0800, Chunyan Liu wrote: > > Sysfs file has size=4096 but actual file content is less than that. > > Current libxl_read_file_contents will treat it as e

Re: [Xen-devel] [PATCH V6 3/7] libxl: add pvusb API

2015-08-11 Thread Chun Yan Liu
>>> On 8/11/2015 at 07:27 PM, in message <2015082702.gf7...@zion.uk.xensource.com>, Wei Liu wrote: > On Mon, Aug 10, 2015 at 06:35:24PM +0800, Chunyan Liu wrote: > > Add pvusb APIs, including: > > - attach/detach (create/destroy) virtual usb controller. > > - attach/detach usb device

[Xen-devel] [linux-3.18 test] 60653: regressions - FAIL

2015-08-11 Thread osstest service owner
flight 60653 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/60653/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581 Regressions which are

Re: [Xen-devel] [PATCH OSSTEST] Toolstack/libvirt: use URI in migration command

2015-08-11 Thread Jim Fehlig
Wei Liu wrote: > Virsh migrate expects an URI, not a host. We don't actually care what > kind of transport it uses, the main objective is to test migration, so > use xen+ssh for the time being. > > Signed-off-by: Wei Liu > Cc: Ian Campbell > Cc: Ian Jackson > --- > Cc: Jim Fehlig > > I once had

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen

2015-08-11 Thread Konrad Rzeszutek Wilk
On Wed, Aug 05, 2015 at 09:03:06PM +0800, Shannon Zhao wrote: > > > On 2015/8/5 20:48, Julien Grall wrote: > >On 05/08/15 12:49, Shannon Zhao wrote: > >That's great! > >Keep in mind that many ARM platforms have non-PCI busses, so I think > >we'll need an amba and a platform bus_notifi

Re: [Xen-devel] PCI Passthrough Design - Draft 3

2015-08-11 Thread Konrad Rzeszutek Wilk
On Tue, Aug 04, 2015 at 05:57:24PM +0530, Manish Jaggi wrote: > - > | PCI Pass-through in Xen ARM | > - > manish.ja...@caviumnetworks.com > --- > >

[Xen-devel] [PATCH OSSTEST] Toolstack/libvirt: use URI in migration command

2015-08-11 Thread Wei Liu
Virsh migrate expects an URI, not a host. We don't actually care what kind of transport it uses, the main objective is to test migration, so use xen+ssh for the time being. Signed-off-by: Wei Liu Cc: Ian Campbell Cc: Ian Jackson --- Cc: Jim Fehlig I once had email exchange with Jim and he sai

Re: [Xen-devel] [Xen-users] "xl restore" leaks a file descriptor?

2015-08-11 Thread Wei Liu
On Tue, Aug 11, 2015 at 06:21:18PM +0100, Andrew Cooper wrote: > On 11/08/15 18:07, Wei Liu wrote: > > On Tue, Aug 11, 2015 at 04:48:13PM +0100, Ian Campbell wrote: > >> On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote: > >>> It's the checkpoint file - i.e. the command line argument to xl >

Re: [Xen-devel] [PATCH v10 11/11] (lib)xl: soft reset support

2015-08-11 Thread Konrad Rzeszutek Wilk
On Tue, Jul 28, 2015 at 03:28:16PM +0200, Vitaly Kuznetsov wrote: > Use existing create/restore path to perform 'soft reset' for HVM > domains. Tear everything down, e.g. destroy domain's device model, > remove the domain from xenstore, save toolstack record and start > over. > > Signed-off-by: Vi

Re: [Xen-devel] [PATCH v10 08/11] xen: arch-specific hooks for domain_soft_reset()

2015-08-11 Thread Konrad Rzeszutek Wilk
On Tue, Jul 28, 2015 at 03:28:13PM +0200, Vitaly Kuznetsov wrote: > x86-specific hook cleans up the pirq-emuirq mappings, destroys all ioreq > servers and and replaces the shared_info frame with an empty page to support > subsequent XENMAPSPACE_shared_info call. > > ARM-specific hook is -ENOSYS fo

Re: [Xen-devel] [PATCH v10 06/11] xen: Introduce XEN_DOMCTL_soft_reset

2015-08-11 Thread Konrad Rzeszutek Wilk
On Tue, Jul 28, 2015 at 03:28:11PM +0200, Vitaly Kuznetsov wrote: > New domctl resets state for a domain allowing it to 'start over': register > vcpu_info, switch to FIFO ABI for event channels. Still active grants are > being logged to help debugging misbehaving backends. > > Signed-off-by: Vital

Re: [Xen-devel] [PATCH v10 02/11] libxl: support SHUTDOWN_soft_reset shutdown reason

2015-08-11 Thread Konrad Rzeszutek Wilk
On Tue, Jul 28, 2015 at 03:28:07PM +0200, Vitaly Kuznetsov wrote: > Use letter 'S' to indicate a domain in such state. Introduce new > 'on_soft_reset' action and default it to 'restart' for now. > > Signed-off-by: Vitaly Kuznetsov Reviewed-by: Konrad Rzeszutek Wilk > --- > Changes since v9: > -

[Xen-devel] [PATCH V4 1/2] x86/microcode: Cleanup int type usage for cpu numbers

2015-08-11 Thread Aravind Gopalakrishnan
CPU numbers can't be negative. Fixing the microcode* files to properly use unsigned type in this patch. No functional change is introduced. Signed-off-by: Aravind Gopalakrishnan --- xen/arch/x86/microcode.c| 6 +++--- xen/arch/x86/microcode_amd.c| 12 +++- xen/arch/x86/micr

[Xen-devel] [PATCH V4 2/2] x86, amd_ucode: Skip microcode updates for final levels

2015-08-11 Thread Aravind Gopalakrishnan
Some of older[Fam10h] systems require that certain number of applied microcode patch levels should not be overwritten by the microcode loader. Otherwise, system hangs are known to occur. The 'final_levels' of patch ids have been obtained empirically. Refer bug https://bugzilla.suse.com/show_bug.cg

[Xen-devel] [PATCH V4 0/2] Update microcode driver

2015-08-11 Thread Aravind Gopalakrishnan
Patch 1: Cleans up integer types used for cpu numbers per Jan's suggestion Patch 2: Fix HW issue by skipping certain microcode levels and aborting microcode update process as otherwise system hangs are known to occur Changes from V3 (per Jan) - const-ify final_levels a

Re: [Xen-devel] [PATCH v2 6/6] multiboot2: Do not pass memory maps to image if EFI boot services are enabled

2015-08-11 Thread Konrad Rzeszutek Wilk
On Mon, Jul 20, 2015 at 04:35:54PM +0200, Daniel Kiper wrote: > Do not pass memory maps to image if it asked for EFI boot services. Maps are > usually invalid in that case and they can confuse potential user. Image should > get memory map itself just before ExitBootServices() call. Can we point to

Re: [Xen-devel] [PATCH v2 5/6] multiboot2: Add support for relocatable images

2015-08-11 Thread Konrad Rzeszutek Wilk
On Mon, Jul 20, 2015 at 04:35:53PM +0200, Daniel Kiper wrote: This parts needs a bit of details I think. As in why can't the ELF note that is present in the binary be satisfied. Or under what conditions would the existing code not work? > Signed-off-by: Daniel Kiper > --- > grub-core/loader/i3

Re: [Xen-devel] [PATCH v2 4/6] multiboot2: Add tags used to pass ImageHandle to loaded image

2015-08-11 Thread Konrad Rzeszutek Wilk
On Mon, Jul 20, 2015 at 04:35:52PM +0200, Daniel Kiper wrote: > Add tags used to pass ImageHandle to loaded image. It is used s/loaded image/loaded image if requested./ > by at least ExitBootServices() function. > > Signed-off-by: Daniel Kiper > --- > grub-core/loader/multiboot_mbi2.c | 46 >

Re: [Xen-devel] [RFC 3/4] HVM x86 deprivileged mode: Code for switching into/out of deprivileged mode

2015-08-11 Thread Boris Ostrovsky
On 08/11/2015 01:19 PM, Andrew Cooper wrote: On 11/08/15 18:05, Tim Deegan wrote: * Under this model, PV exception handlers should copy themselves onto the privileged execution stack. * Currently, the IST handlers copy themselves onto the primary stack if they interrupt guest context. * AMD Tas

Re: [Xen-devel] [PATCH 3.2 110/110] x86/ldt: Make modify_ldt synchronous

2015-08-11 Thread Ben Hutchings
On Mon, 2015-08-10 at 09:47 -0700, Andy Lutomirski wrote: > On Mon, Aug 10, 2015 at 3:12 AM, Ben Hutchings wrote: > > 3.2.71-rc1 review patch. If anyone has any objections, please let me know. > > > > -- > > > > From: Andy Lutomirski > > > > commit 37868fe113ff2ba814b3b4eb12df

[Xen-devel] [PATCH for-4.6] xen/mm: populate_physmap: validate correctly the gfn for direct mapped domain

2015-08-11 Thread Julien Grall
Direct mapped domain has already the memory allocated 1:1, so we are directly using the gfn as mfn to map the RAM in the guest. While we are validating that the page associated to the first mfn belongs to the domain, the subsequent MFN are not validated when the extent_order is > 0. This may resu

Re: [Xen-devel] [PATCH v3 0/9] Use correctly the Xen memory terminologies

2015-08-11 Thread David Vrabel
On 07/08/15 17:34, Julien Grall wrote: > Hi all, > > This patch series aims to use the memory terminologies described in > include/xen/mm.h [1] for Linux xen code. Applied to for-linus-4.3, thanks. David ___ Xen-devel mailing list Xen-devel@lists.xen.

Re: [Xen-devel] [PATCH RFC v2 0/5] Multi-queue support for xen-blkfront and xen-blkback

2015-08-11 Thread Jens Axboe
On 08/11/2015 03:45 AM, Rafal Mielniczuk wrote: On 11/08/15 07:08, Bob Liu wrote: On 08/10/2015 11:52 PM, Jens Axboe wrote: On 08/10/2015 05:03 AM, Rafal Mielniczuk wrote: On 01/07/15 04:03, Jens Axboe wrote: On 06/30/2015 08:21 AM, Marcus Granado wrote: Hi, Our measurements for the multiqu

Re: [Xen-devel] [PATCH v3 2/4] x86/compat: Test both PV and PVH guests for compat mode

2015-08-11 Thread Boris Ostrovsky
On 08/11/2015 05:19 AM, Jan Beulich wrote: On 24.07.15 at 19:54, wrote: On 07/23/2015 10:07 AM, Jan Beulich wrote: Plus - is this in line with what the tools are doing? Aren't they assuming !PV <=> native format context? I.e. don't you need to treat differently v->domain == current->domain and

Re: [Xen-devel] [Xen-users] "xl restore" leaks a file descriptor?

2015-08-11 Thread Andrew Cooper
On 11/08/15 18:07, Wei Liu wrote: > On Tue, Aug 11, 2015 at 04:48:13PM +0100, Ian Campbell wrote: >> On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote: >>> It's the checkpoint file - i.e. the command line argument to xl >>> restore - that is being leaked. >> Thanks. >> >> [...] >>> So the che

Re: [Xen-devel] [RFC 3/4] HVM x86 deprivileged mode: Code for switching into/out of deprivileged mode

2015-08-11 Thread Andrew Cooper
On 11/08/15 18:05, Tim Deegan wrote: > * Under this model, PV exception handlers should copy themselves onto the privileged execution stack. * Currently, the IST handlers copy themselves onto the primary stack if they interrupt guest context. * AMD Task Register on vmexit.

[Xen-devel] [seabios test] 60652: tolerable FAIL - PUSHED

2015-08-11 Thread osstest service owner
flight 60652 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/60652/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail like 60609 Tests which did not succeed, but a

Re: [Xen-devel] [Xen-users] "xl restore" leaks a file descriptor?

2015-08-11 Thread Wei Liu
On Tue, Aug 11, 2015 at 04:48:13PM +0100, Ian Campbell wrote: > On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote: > > It's the checkpoint file - i.e. the command line argument to xl > > restore - that is being leaked. > > Thanks. > > [...] > > So the checkpoint file is clearly being leaked

Re: [Xen-devel] [RFC 3/4] HVM x86 deprivileged mode: Code for switching into/out of deprivileged mode

2015-08-11 Thread Tim Deegan
Hi, At 17:51 +0100 on 11 Aug (1439315508), Ben Catterall wrote: > On 11/08/15 10:55, Tim Deegan wrote: > > At 11:14 +0100 on 10 Aug (1439205273), Andrew Cooper wrote: > >> On 10/08/15 10:49, Tim Deegan wrote: > >>> Hi, > >>> > >>> At 17:45 +0100 on 06 Aug (1438883118), Ben Catterall wrote: >

Re: [Xen-devel] [PATCH v2 3/6] i386/relocator: Add grub_relocator64_efi relocator

2015-08-11 Thread Konrad Rzeszutek Wilk
On Mon, Jul 20, 2015 at 04:35:51PM +0200, Daniel Kiper wrote: > Add grub_relocator64_efi relocator. It will be used on EFI 64-bit platforms > when multiboot2 compatible image requests MULTIBOOT_TAG_TYPE_EFI_BS. Relocator > will set lower parts of %rax and %rbx accordingly to multiboot2 specificatio

Re: [Xen-devel] [PATCH v2 1/6] gitignore: Ignore *.orig, *.rej and *.swp files

2015-08-11 Thread Konrad Rzeszutek Wilk
On Mon, Jul 20, 2015 at 04:35:49PM +0200, Daniel Kiper wrote: > Signed-off-by: Daniel Kiper Reviewed-by: Konrad Rzeszutek Wilk but really - this is quite easy to review :-) > --- > .gitignore |3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/.gitignore b/.gitignore > index 18ab8

Re: [Xen-devel] [PATCH OSSTEST v4] Arrange to test migration from the previous Xen version

2015-08-11 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v4] Arrange to test migration from the previous Xen version"): > It would be nice to try and reuse the builds from the last flight > which tested the $prevxenbranch baseline. I've not dont that here. Acked-by: Ian Jackson

Re: [Xen-devel] [PATCH v2 23/23] x86: add multiboot2 protocol support for relocatable images

2015-08-11 Thread Konrad Rzeszutek Wilk
On Mon, Jul 20, 2015 at 04:29:18PM +0200, Daniel Kiper wrote: > Add multiboot2 protocol support for relocatable images. Only GRUB2 > with relevant patches understands that feature. Older multiboot You may want to enumerate what those 'relevant' patches are. > protocol (regardless of version) comp

Re: [Xen-devel] [RFC 3/4] HVM x86 deprivileged mode: Code for switching into/out of deprivileged mode

2015-08-11 Thread Ben Catterall
On 11/08/15 10:55, Tim Deegan wrote: At 11:14 +0100 on 10 Aug (1439205273), Andrew Cooper wrote: On 10/08/15 10:49, Tim Deegan wrote: Hi, At 17:45 +0100 on 06 Aug (1438883118), Ben Catterall wrote: The process to switch into and out of deprivileged mode can be likened to setjmp/longjmp. To

Re: [Xen-devel] [PATCH v2 22/23] x86: make Xen early boot code relocatable

2015-08-11 Thread Konrad Rzeszutek Wilk
On Mon, Jul 20, 2015 at 04:29:17PM +0200, Daniel Kiper wrote: > Every multiboot protocol (regardless of version) compatible image must > specify its load address (in ELF or multiboot header). Multiboot protocol > compatible loader have to load image at specified address. However, there > is no guar

[Xen-devel] [PATCH OSSTEST v4] Arrange to test migration from the previous Xen version

2015-08-11 Thread Ian Campbell
There are several steps to this: - Identify $prevxenbranch, that is the branch which precedes $xenbranch. - Create appropriate build jobs. - Add support in ts-xen-install for overriding {xen,}buildjob on a per-ident basis - Add a new receipt test-pair-oneway which only migrates from src_host

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Julien Grall
Hi Shannon, On 07/08/15 03:11, Shannon Zhao wrote: > 2. Create minimal DT to pass required information to Dom0 > -- > The minimal DT mainly passes Dom0 bootargs, address and size of initrd > (if available), address and size of uefi system tab

Re: [Xen-devel] [PATCH] x86/hvm: don't rely on shared ioreq state for completion handling

2015-08-11 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 11 August 2015 17:03 > To: Paul Durrant > Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org) > Subject: RE: [PATCH] x86/hvm: don't rely on shared ioreq state for > completion handling > > >>> On 11.0

[Xen-devel] [libvirt test] 60650: tolerable FAIL - PUSHED

2015-08-11 Thread osstest service owner
flight 60650 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/60650/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-vhd 9 debian-di-installfail never pass test-armhf-armhf-libvirt-qcow2 9 debian-di

Re: [Xen-devel] [PATCH OSSTEST v2] Arrange to test migration from the previous Xen version

2015-08-11 Thread Ian Campbell
On Tue, 2015-08-11 at 12:30 +0100, Ian Campbell wrote: > On Mon, 2015-08-03 at 17:01 +0100, Ian Campbell wrote: > > On Fri, 2015-07-24 at 17:28 +0100, Ian Campbell wrote: > > > @@ -191,6 +208,27 @@ create_build_jobs () { > > > revision_ovmf=$REVISION_OVMF > > > done > > > >

Re: [Xen-devel] [PATCH] x86/hvm: don't rely on shared ioreq state for completion handling

2015-08-11 Thread Jan Beulich
>>> On 11.08.15 at 17:49, wrote: >> -Original Message- >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: 11 August 2015 16:46 >> To: Paul Durrant >> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org) >> Subject: RE: [PATCH] x86/hvm: don't rely on shared ioreq state f

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Julien Grall
On 11/08/15 16:19, Ian Campbell wrote: >> IIRC we talked about it few months ago and you said that using balloon >> page will split in 4K the 1G/2M mapping done in the stage-2 p2m. > > Did I? Odd because I'm also of the opinion that alloc_ballooned_pages > should operate in chunks of 2M at the hyp

Re: [Xen-devel] [PATCH] x86/HVM: honor p2m_ram_ro in hvm_map_guest_frame_rw()

2015-08-11 Thread Jan Beulich
>>> On 11.08.15 at 17:45, wrote: > At 09:37 -0600 on 11 Aug (1439285833), Jan Beulich wrote: >> >>> On 11.08.15 at 16:34, wrote: >> > At 07:51 -0600 on 11 Aug (1439279513), Jan Beulich wrote: >> >> >>> On 27.07.15 at 13:09, wrote: >> >> > At 13:02 +0100 on 24 Jul (1437742964), Andrew Cooper wrot

Re: [Xen-devel] [PATCH OSSTEST] get_hostflags: return an empty list when there is no flight/job.

2015-08-11 Thread Ian Campbell
On Wed, 2015-08-05 at 11:50 +0100, Ian Campbell wrote: > On Fri, 2015-07-31 at 16:39 +0100, Ian Campbell wrote: > > On Fri, 2015-07-31 at 16:31 +0100, Ian Jackson wrote: > > > Ian Campbell writes ("[PATCH OSSTEST] get_hostflags: return an empty > > > list > > > when there is no flight/job."): > >

Re: [Xen-devel] [PATCH V3] x86, amd_ucode: Skip microcode updates for final levels

2015-08-11 Thread Jan Beulich
>>> On 11.08.15 at 17:43, wrote: > On 8/11/2015 10:32 AM, Jan Beulich wrote: >>> +static bool_t check_final_patch_levels(int cpu) >> unsigned int >> > I can change this too, but- Any specific reason for this? > The other sanity checker or verification functions like > verif

Re: [Xen-devel] [PATCH for-4.6] x86/gdt: Drop write-only, xalloc()'d array from set_gdt()

2015-08-11 Thread Jan Beulich
>>> On 05.08.15 at 11:58, wrote: > Perhaps there should be a patch to MAINTAINERS to add arch/x86/mm.c to the > relevant subsection? (Or maybe the file is just horribly named?) Yeah, the file, while mostly about (PV) memory management, holds more than just that; mm/ otoh is pretty properly limite

Re: [Xen-devel] [xen-unstable test] 60660: trouble: pass/preparing/queued

2015-08-11 Thread Ian Jackson
osstest service owner writes ("[xen-unstable test] 60660: trouble: pass/preparing/queued"): > flight 60660 xen-unstable running [real] > http://logs.test-lab.xenproject.org/osstest/logs/60660/ > > Failures and problems with tests :-( > > Tests which did not succeed and are blocking, > including

Re: [Xen-devel] [Xen-users] "xl restore" leaks a file descriptor?

2015-08-11 Thread Andrew Cooper
On 11/08/15 16:48, Ian Campbell wrote: > On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote: >> It's the checkpoint file - i.e. the command line argument to xl >> restore - that is being leaked. > Thanks. > > [...] >> So the checkpoint file is clearly being leaked. > Indeed. I confirmed this e

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Boris Ostrovsky
On 08/11/2015 11:35 AM, Ian Campbell wrote: On Tue, 2015-08-11 at 11:29 -0400, Boris Ostrovsky wrote: On 08/11/2015 10:21 AM, Ian Campbell wrote: On Tue, 2015-08-11 at 15:19 +0100, Ian Campbell wrote: On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote: This document is going to explain the

Re: [Xen-devel] [PATCH for-4.6] x86/gdt: Drop write-only, xalloc()'d array from set_gdt()

2015-08-11 Thread Jan Beulich
>>> On 04.08.15 at 15:59, wrote: > On Tue, 2015-08-04 at 10:34 +0100, Wei Liu wrote: >> On Mon, Aug 03, 2015 at 06:05:43PM +0100, Andrew Cooper wrote: >> > It is not used, and can cause a spurious failure of the set_gdt() >> > hypercall in >> > low memory situations. >> > >> > Signed-off-by: And

Re: [Xen-devel] [PATCH] x86/hvm: don't rely on shared ioreq state for completion handling

2015-08-11 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 11 August 2015 16:46 > To: Paul Durrant > Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org) > Subject: RE: [PATCH] x86/hvm: don't rely on shared ioreq state for > completion handling > > >>> On 11.0

Re: [Xen-devel] [Xen-users] "xl restore" leaks a file descriptor?

2015-08-11 Thread Ian Campbell
On Tue, 2015-08-11 at 11:13 -0400, Andrew Armenia wrote: > It's the checkpoint file - i.e. the command line argument to xl > restore - that is being leaked. Thanks. [...] > So the checkpoint file is clearly being leaked. Indeed. I confirmed this even with the current development version using ls

Re: [Xen-devel] [PATCH] x86/HVM: honor p2m_ram_ro in hvm_map_guest_frame_rw()

2015-08-11 Thread Tim Deegan
At 09:37 -0600 on 11 Aug (1439285833), Jan Beulich wrote: > >>> On 11.08.15 at 16:34, wrote: > > At 07:51 -0600 on 11 Aug (1439279513), Jan Beulich wrote: > >> >>> On 27.07.15 at 13:09, wrote: > >> > At 13:02 +0100 on 24 Jul (1437742964), Andrew Cooper wrote: > >> >> On 24/07/15 10:41, Jan Beulic

Re: [Xen-devel] [PATCH] x86/hvm: don't rely on shared ioreq state for completion handling

2015-08-11 Thread Jan Beulich
>>> On 11.08.15 at 17:32, wrote: >> -Original Message- >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: 11 August 2015 16:20 >> To: Paul Durrant >> Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org) >> Subject: Re: [PATCH] x86/hvm: don't rely on shared ioreq state f

[Xen-devel] [xen-unstable test] 60660: trouble: pass/preparing/queued

2015-08-11 Thread osstest service owner
flight 60660 xen-unstable running [real] http://logs.test-lab.xenproject.org/osstest/logs/60660/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-vhd queued test-armhf-armhf-libvi

Re: [Xen-devel] [PATCH V3] x86, amd_ucode: Skip microcode updates for final levels

2015-08-11 Thread Aravind Gopalakrishnan
On 8/11/2015 10:32 AM, Jan Beulich wrote: +static bool_t check_final_patch_levels(int cpu) unsigned int I can change this too, but- Any specific reason for this? The other sanity checker or verification functions like verify_patch_size() or microcode_fits() return a bool_t too.. "int cpu" is

Re: [Xen-devel] [PATCH] x86/HVM: honor p2m_ram_ro in hvm_map_guest_frame_rw()

2015-08-11 Thread Jan Beulich
>>> On 11.08.15 at 16:34, wrote: > At 07:51 -0600 on 11 Aug (1439279513), Jan Beulich wrote: >> >>> On 27.07.15 at 13:09, wrote: >> > At 13:02 +0100 on 24 Jul (1437742964), Andrew Cooper wrote: >> >> On 24/07/15 10:41, Jan Beulich wrote: >> >> > Beyond that log-dirty handling in _hvm_map_guest_fr

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Ian Campbell
On Tue, 2015-08-11 at 11:29 -0400, Boris Ostrovsky wrote: > On 08/11/2015 10:21 AM, Ian Campbell wrote: > > On Tue, 2015-08-11 at 15:19 +0100, Ian Campbell wrote: > > > On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote: > > > > This document is going to explain the design details of Xen booting

[Xen-devel] [ovmf test] 60651: all pass - PUSHED

2015-08-11 Thread osstest service owner
flight 60651 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/60651/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf 5c02fc49aea514609bdb6ee21d6375fc66f0d4d6 baseline version: ovmf 21d0e75065eabe7a6bd9e4b92af54f07025

Re: [Xen-devel] [PATCH] x86/hvm: don't rely on shared ioreq state for completion handling

2015-08-11 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 11 August 2015 16:20 > To: Paul Durrant > Cc: Andrew Cooper; xen-de...@lists.xenproject.org; Keir (Xen.org) > Subject: Re: [PATCH] x86/hvm: don't rely on shared ioreq state for > completion handling > > >>> On 31.0

Re: [Xen-devel] [PATCH V3] x86, amd_ucode: Skip microcode updates for final levels

2015-08-11 Thread Jan Beulich
>>> On 11.08.15 at 17:28, wrote: > On 8/11/2015 10:17 AM, Andrew Cooper wrote: >>> > +0x0198, > +0x019f, > +0x01af > +}; > + > +static bool_t check_final_patch_levels(int cpu) unsigned int >>> I can change this too, but- Any specific reason

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Boris Ostrovsky
On 08/11/2015 10:21 AM, Ian Campbell wrote: On Tue, 2015-08-11 at 15:19 +0100, Ian Campbell wrote: On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote: This document is going to explain the design details of Xen booting with ACPI on ARM. Maybe parts of it may not be appropriate. Any comments

Re: [Xen-devel] [PATCH V3] x86, amd_ucode: Skip microcode updates for final levels

2015-08-11 Thread Jan Beulich
>>> On 11.08.15 at 17:17, wrote: > On 11/08/15 16:14, Aravind Gopalakrishnan wrote: >> On 8/11/2015 9:53 AM, Jan Beulich wrote: >> On 03.08.15 at 21:34, wrote: +static bool_t check_final_patch_levels(int cpu) >>> unsigned int >>> >> >> I can change this too, but- Any specific reason for

Re: [Xen-devel] [PATCH V3] x86, amd_ucode: Skip microcode updates for final levels

2015-08-11 Thread Aravind Gopalakrishnan
On 8/11/2015 10:17 AM, Andrew Cooper wrote: +0x0198, +0x019f, +0x01af +}; + +static bool_t check_final_patch_levels(int cpu) unsigned int I can change this too, but- Any specific reason for this? The other sanity checker or verification functions like verify_patch_siz

Re: [Xen-devel] Should hvm_hw_cpu's sysenter_eip always be zero after xc_domain_hvm_getcontext_partial()?

2015-08-11 Thread Jan Beulich
>>> On 31.07.15 at 17:36, wrote: > On 31/07/15 16:30, Razvan Cojocaru wrote: >> On 07/31/2015 06:13 PM, Andrew Cooper wrote: >>> Are you certain that the guest is actually setting it? If the guest >>> never sets it in the first place, 0 will be the expected value. >> That might be it, I'll need t

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread David Vrabel
On 11/08/15 16:19, Ian Campbell wrote: > On Tue, 2015-08-11 at 16:11 +0100, Julien Grall wrote: >> On 11/08/15 15:59, Ian Campbell wrote: >>> On Tue, 2015-08-11 at 15:51 +0100, David Vrabel wrote: On 11/08/15 15:12, Ian Campbell wrote: > On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrot

Re: [Xen-devel] [PATCH v2 20/23] x86: add multiboot2 protocol support for EFI platforms

2015-08-11 Thread Konrad Rzeszutek Wilk
> +run_bs: > +push%rax > +push%rdi > + > +/* Initialize BSS (no nasty surprises!). */ > +lea __bss_start(%rip),%rdi > +lea __bss_end(%rip),%rcx > +sub %rdi,%rcx > +shr $3,%rcx > +xor %eax,%eax > +rep

Re: [Xen-devel] [PATCH] x86/hvm: don't rely on shared ioreq state for completion handling

2015-08-11 Thread Jan Beulich
>>> On 31.07.15 at 17:34, wrote: > Both hvm_io_pending() and hvm_wait_for_io() use the shared (with emulator) > ioreq structure to determined whether there is a pending I/O. The latter > will > misbehave if the shared state is driven to STATE_IOREQ_NONE by the emulator, > or when the shared ioreq

Re: [Xen-devel] [PATCH V3] x86, amd_ucode: Skip microcode updates for final levels

2015-08-11 Thread Andrew Cooper
On 11/08/15 16:14, Aravind Gopalakrishnan wrote: > On 8/11/2015 9:53 AM, Jan Beulich wrote: > On 03.08.15 at 21:34, wrote: >>> --- a/xen/arch/x86/microcode_amd.c >>> +++ b/xen/arch/x86/microcode_amd.c >>> @@ -347,6 +347,43 @@ static int container_fast_forward(const void >>> *data, size_t size_

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Ian Campbell
On Tue, 2015-08-11 at 16:11 +0100, Julien Grall wrote: > On 11/08/15 15:59, Ian Campbell wrote: > > On Tue, 2015-08-11 at 15:51 +0100, David Vrabel wrote: > > > On 11/08/15 15:12, Ian Campbell wrote: > > > > On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote: > > > > > > > > > [...] > > > > > 3

Re: [Xen-devel] [PATCH V3] x86, amd_ucode: Skip microcode updates for final levels

2015-08-11 Thread Aravind Gopalakrishnan
On 8/11/2015 9:53 AM, Jan Beulich wrote: On 03.08.15 at 21:34, wrote: --- a/xen/arch/x86/microcode_amd.c +++ b/xen/arch/x86/microcode_amd.c @@ -347,6 +347,43 @@ static int container_fast_forward(const void *data, size_t size_left, size_t *of return 0; } +/* + * The 'final_levels' o

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread Julien Grall
On 11/08/15 15:59, Ian Campbell wrote: > On Tue, 2015-08-11 at 15:51 +0100, David Vrabel wrote: >> On 11/08/15 15:12, Ian Campbell wrote: >>> On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote: >>> [...] 3. Dom0 gets grant table and event channel irq information --

Re: [Xen-devel] [PATCH v2] arm: reduce power use by contented spin locks with WFE/SEV

2015-08-11 Thread Jan Beulich
>>> On 03.08.15 at 13:29, wrote: > From: David Vrabel > > Instead of cpu_relax() while spinning and observing the ticket head, > introduce arch_lock_relax() which executes a WFE instruction. After > the ticket head is changed call arch_lock_signal() to execute an SEV > instruction (with the req

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-11 Thread David Vrabel
On 11/08/15 15:59, Ian Campbell wrote: > On Tue, 2015-08-11 at 15:51 +0100, David Vrabel wrote: >> On 11/08/15 15:12, Ian Campbell wrote: >>> On Fri, 2015-08-07 at 10:11 +0800, Shannon Zhao wrote: >>> [...] 3. Dom0 gets grant table and event channel irq information --

  1   2   3   >