Re: [Xen-devel] VT-d faults with Integrated Intel graphics on 4.6

2015-08-24 Thread Chen, Tiejun
On 8/25/2015 8:19 AM, Tamas K Lengyel wrote: Hi everyone, I saw some people passingly mention this on the list before but just in case it has been missed, my serial is also being spammed with the following printouts with both Xen 4.6 RC1 and the latest staging build: ... (XEN) [VT-D]DMAR:[DMA Re

[Xen-devel] [ovmf test] 60835: all pass - PUSHED

2015-08-24 Thread osstest service owner
flight 60835 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/60835/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf b199d9418820b873d0e05190fe5dc947a6f72b14 baseline version: ovmf 70bd69912ad2fb6e99271b418f87b98ebb3

Re: [Xen-devel] Question: Redirect guest kernel's message via serial port to a file on dom0

2015-08-24 Thread Meng Xu
Hi Andrew, Thank you so much for your suggestion! I tried but have some questions. 2015-08-24 4:10 GMT-04:00 Andrew Cooper : > > On 24/08/2015 04:01, Meng Xu wrote: > > Hi, > > I'm trying to use a PV guest VM on Xen to help debug Linux. > I was using VirtualBox to help debug Linux kernel by redir

Re: [Xen-devel] [PATCH v3] xen/blkfront: convert to blk-mq APIs

2015-08-24 Thread Bob Liu
Hi Rafal, Please have a try adding "--iodepth_batch=32 --iodepth_batch_complete=32" to the fio command line. I didn't see this issue any more, neither for domU. Thanks, -Bob On 08/21/2015 04:46 PM, Rafal Mielniczuk wrote: > On 19/08/15 12:12, Bob Liu wrote: >> Hi Jens & Christoph, >> >> Rafal r

[Xen-devel] [PATCH v6 16/18] vmx: Add some scheduler hooks for VT-d posted interrupts

2015-08-24 Thread Feng Wu
This patch adds the following arch hooks in scheduler: - vmx_pre_ctx_switch_pi(): It is called before context switch, we update the posted interrupt descriptor when the vCPU is preempted, go to sleep, or is blocked. - vmx_post_ctx_switch_pi() It is called after context switch, we update the posted

[Xen-devel] [PATCH v6 13/18] Update IRTE according to guest interrupt config changes

2015-08-24 Thread Feng Wu
When guest changes its interrupt configuration (such as, vector, etc.) for direct-assigned devices, we need to update the associated IRTE with the new guest vector, so external interrupts from the assigned devices can be injected to guests without VM-Exit. For lowest-priority interrupts, we use ve

[Xen-devel] [PATCH v6 07/18] vmx: Initialize VT-d Posted-Interrupts Descriptor

2015-08-24 Thread Feng Wu
This patch initializes the VT-d Posted-interrupt Descriptor. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu Acked-by: Kevin Tian Reviewed-by: Konrad Rzeszutek Wilk --- v3: - Move pi_desc_init() to xen/arch/x86/hvm/vmx/vmcs.c - Remove the 'inline' fla

[Xen-devel] [PATCH v6 06/18] vmx: Add some helper functions for Posted-Interrupts

2015-08-24 Thread Feng Wu
This patch adds some helper functions to manipulate the Posted-Interrupts Descriptor. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu Reviewed-by: Konrad Rzeszutek Wilk --- v4: - Newly added xen/include/asm-x86/hvm/vmx/vmx.h | 21

[Xen-devel] [PATCH v6 03/18] iommu: Add iommu_intpost to control VT-d Posted-Interrupts feature

2015-08-24 Thread Feng Wu
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. With VT-d Posted-Interrupts enabled, external interrupts from direct-assigned devices can be delivered to guests without VMM intervention when guest is running in non-root mode. This patch adds variable 'iommu_intpost' to contr

[Xen-devel] [PATCH v6 02/18] Add cmpxchg16b support for x86-64

2015-08-24 Thread Feng Wu
This patch adds cmpxchg16b support for x86-64, so software can perform 128-bit atomic write/read. CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu --- v6: - Fix a typo v5: - Change back the parameters of __cmpxchg16b() to __uint128_t * - Remove pointless cast for 'ptr'

[Xen-devel] [PATCH v6 00/18] Add VT-d Posted-Interrupts support

2015-08-24 Thread Feng Wu
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. With VT-d Posted-Interrupts enabled, external interrupts from direct-assigned devices can be delivered to guests without VMM intervention when guest is running in non-root mode. You can find the VT-d Posted-Interrtups Spec. in

[Xen-devel] [PATCH v6 11/18] vt-d: Add API to update IRTE when VT-d PI is used

2015-08-24 Thread Feng Wu
This patch adds an API which is used to update the IRTE for posted-interrupt when guest changes MSI/MSI-X information. CC: Yang Zhang CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu Acked-by: Kevin Tian --- v6: - In some error cases, the desc->lock wi

[Xen-devel] [PATCH v6 01/18] VT-d Posted-intterrupt (PI) design

2015-08-24 Thread Feng Wu
Add the design doc for VT-d PI. CC: Kevin Tian CC: Yang Zhang CC: Jan Beulich CC: Keir Fraser CC: Andrew Cooper CC: George Dunlap Signed-off-by: Feng Wu Reviewed-by: Kevin Tian Reviewed-by: Konrad Rzeszutek Wilk --- v6: - Better description in English docs/misc/vtd-pi.txt | 332

[Xen-devel] [PATCH v6 18/18] Add a command line parameter for VT-d posted-interrupts

2015-08-24 Thread Feng Wu
Enable VT-d Posted-Interrupts and add a command line parameter for it. Signed-off-by: Feng Wu Reviewed-by: Kevin Tian --- v6: - Change the default value to 'false' in xen-command-line.markdown docs/misc/xen-command-line.markdown | 9 - xen/drivers/passthrough/iommu.c | 3 +++ 2 fil

[Xen-devel] [PATCH v6 04/18] vt-d: VT-d Posted-Interrupts feature detection

2015-08-24 Thread Feng Wu
VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. With VT-d Posted-Interrupts enabled, external interrupts from direct-assigned devices can be delivered to guests without VMM intervention when guest is running in non-root mode. CC: Yang Zhang CC: Kevin Tian Signed-off-by: Fe

[Xen-devel] [PATCH v6 08/18] vmx: Suppress posting interrupts when 'SN' is set

2015-08-24 Thread Feng Wu
Currently, we don't support urgent interrupt, all interrupts are recognized as non-urgent interrupt, so we cannot send posted-interrupt when 'SN' is set. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu Reviewed-by: Konrad Rzeszutek Wilk --- v6: - Add s

[Xen-devel] [PATCH v6 15/18] vmx: Properly handle notification event when vCPU is running

2015-08-24 Thread Feng Wu
When a vCPU is running in Root mode and a notification event has been injected to it. we need to set VCPU_KICK_SOFTIRQ for the current cpu, so the pending interrupt in PIRR will be synced to vIRR before VM-Exit in time. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-of

[Xen-devel] [PATCH v6 14/18] vmx: posted-interrupt handling when vCPU is blocked

2015-08-24 Thread Feng Wu
This patch includes the following aspects: - Add a global vector to wake up the blocked vCPU when an interrupt is being posted to it (This part was sugguested by Yang Zhang ). - Adds a new per-vCPU tasklet to wakeup the blocked vCPU. It can be used in the case vcpu_unblock cannot be called

[Xen-devel] [PATCH v6 17/18] VT-d: Dump the posted format IRTE

2015-08-24 Thread Feng Wu
Add the utility to dump the posted format IRTE. CC: Yang Zhang CC: Kevin Tian Signed-off-by: Feng Wu --- v6: - Fix a typo v4: - Newly added xen/drivers/passthrough/vtd/utils.c | 43 +++-- 1 file changed, 41 insertions(+), 2 deletions(-) diff --git a/xen/drive

[Xen-devel] [PATCH v6 12/18] x86: move some APIC related macros to apicdef.h

2015-08-24 Thread Feng Wu
Move some APIC related macros to apicdef.h, so they can be used outside of vlapic.c. Signed-off-by: Feng Wu --- v6: - Newly introduced. xen/arch/x86/hvm/vlapic.c | 5 - xen/include/asm-x86/apicdef.h | 4 2 files changed, 4 insertions(+), 5 deletions(-) diff --git a/xen/arch/x86/hv

[Xen-devel] [PATCH v6 09/18] VT-d: Remove pointless casts

2015-08-24 Thread Feng Wu
Remove pointless casts. Signed-off-by: Feng Wu Reviewed-by: Konrad Rzeszutek Wilk --- v5: - Newly added. xen/drivers/passthrough/vtd/utils.c | 16 +++- 1 file changed, 7 insertions(+), 9 deletions(-) diff --git a/xen/drivers/passthrough/vtd/utils.c b/xen/drivers/passthrough/vtd/u

[Xen-devel] [PATCH v6 10/18] vt-d: Extend struct iremap_entry to support VT-d Posted-Interrupts

2015-08-24 Thread Feng Wu
Extend struct iremap_entry according to VT-d Posted-Interrupts Spec. CC: Yang Zhang CC: Kevin Tian Signed-off-by: Feng Wu Acked-by: Kevin Tian --- v4: - res_4 is not a bitfiled, correct it. - Expose 'im' to remapped irte as well. v3: - Use u32 instead of u64 to define the bitfields in 'struct

[Xen-devel] [PATCH v6 05/18] vmx: Extend struct pi_desc to support VT-d Posted-Interrupts

2015-08-24 Thread Feng Wu
Extend struct pi_desc according to VT-d Posted-Interrupts Spec. CC: Kevin Tian CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Feng Wu Reviewed-by: Andrew Cooper Acked-by: Kevin Tian Reviewed-by: Konrad Rzeszutek Wilk --- v3: - Use u32 instead of u64 for the bitfield in 's

[Xen-devel] VT-d faults with Integrated Intel graphics on 4.6

2015-08-24 Thread Tamas K Lengyel
Hi everyone, I saw some people passingly mention this on the list before but just in case it has been missed, my serial is also being spammed with the following printouts with both Xen 4.6 RC1 and the latest staging build: ... (XEN) [VT-D]DMAR:[DMA Read] Request device [:00:02.0] fault addr 33

Re: [Xen-devel] [PATCH] x86/vmx: fix vmx_is_singlestep_supported return value

2015-08-24 Thread Tamas K Lengyel
>> @@ -1768,7 +1768,7 @@ static void vmx_enable_msr_exit_interception(struct >> domain *d) >> >> static bool_t vmx_is_singlestep_supported(void) >> { >> -return cpu_has_monitor_trap_flag; >> +return cpu_has_monitor_trap_flag ? 1 : 0; > > Prevailing style would tend towards !!cpu_has_moni

Re: [Xen-devel] [PATCH for-4.6 1/2] docs: Template for feature documents

2015-08-24 Thread Juergen Gross
On 08/25/2015 12:52 AM, Andrew Cooper wrote: On 24/08/2015 20:27, Juergen Gross wrote: On 08/24/2015 07:37 PM, Andrew Cooper wrote: Signed-off-by: Andrew Cooper --- docs/Makefile |2 +- docs/features/template.pandoc | 55 + 2

Re: [Xen-devel] [PATCH] x86/vmx: fix vmx_is_singlestep_supported return value

2015-08-24 Thread Andrew Cooper
On 24/08/2015 20:55, Tamas K Lengyel wrote: > The function supposed to return a boolean but instead it returned > the value 0x800 which is the Intel internal flag for MTF. This has > caused various checks using this function to falsely report no MTF > capability. Ouch. Given than bool_t is cu

Re: [Xen-devel] [PATCH for-4.6 1/2] docs: Template for feature documents

2015-08-24 Thread Andrew Cooper
On 24/08/2015 20:27, Juergen Gross wrote: > On 08/24/2015 07:37 PM, Andrew Cooper wrote: >> Signed-off-by: Andrew Cooper >> --- >> docs/Makefile |2 +- >> docs/features/template.pandoc | 55 >> + >> 2 files changed, 56 insertions(+)

[Xen-devel] [linux-next test] 60829: regressions - FAIL

2015-08-24 Thread osstest service owner
flight 60829 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/60829/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 60773 test-armhf-armhf-xl-cu

Re: [Xen-devel] [PATCH v2 10/23] efi: build xen.gz with EFI code

2015-08-24 Thread Daniel Kiper
On Mon, Aug 24, 2015 at 05:35:21AM -0600, Jan Beulich wrote: > >>> On 22.08.15 at 15:59, wrote: > > On Thu, Aug 20, 2015 at 09:39:39AM -0600, Jan Beulich wrote: > >> >>> On 20.07.15 at 16:29, wrote: > >> > Build xen.gz with EFI code. We need this to support multiboot2 > >> > protocol on EFI platf

[Xen-devel] [PATCH] x86/vmx: fix vmx_is_singlestep_supported return value

2015-08-24 Thread Tamas K Lengyel
The function supposed to return a boolean but instead it returned the value 0x800 which is the Intel internal flag for MTF. This has caused various checks using this function to falsely report no MTF capability. Signed-off-by: Tamas K Lengyel --- xen/arch/x86/hvm/vmx/vmx.c | 2 +- 1 file cha

Re: [Xen-devel] Build failres with Xen 4.6.0-rc1 (firmware/etherboot/ipxe)

2015-08-24 Thread Konrad Rzeszutek Wilk
On Mon, Aug 24, 2015 at 06:29:31AM -0600, Jan Beulich wrote: > >>> On 21.08.15 at 19:51, wrote: > > I don't think we can rev ipxe.git to the latest in Xen 4.6 time-frame. > > But having that patch should help with compile issues, like mine. > > Agreed. > > > So how do we want to fix this in 4.6

[Xen-devel] [PATCH v1 for v4.6] etherboot: Build fix for GCC 5.1.1

2015-08-24 Thread Konrad Rzeszutek Wilk
Specificially we are pulling in the upstream patch (commit 1b56452121672e6408c38ac8926bdd6998a39004)): [ath9k] Remove confusing logic inversion in an ANI variable Signed-off-by: Konrad Rzeszutek Wilk --- tools/firmware/etherboot/patches/build_fix_4.patch | 225 + tools/firmwa

Re: [Xen-devel] [PATCH for-4.6 1/2] docs: Template for feature documents

2015-08-24 Thread Juergen Gross
On 08/24/2015 07:37 PM, Andrew Cooper wrote: Signed-off-by: Andrew Cooper --- docs/Makefile |2 +- docs/features/template.pandoc | 55 + 2 files changed, 56 insertions(+), 1 deletion(-) create mode 100644 docs/features/template.

[Xen-devel] [PATCH v4 08/11] drivers/video/fbdev/vt8623fb: Use arch_phys_wc_add() and pci_iomap_wc()

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" This driver uses the same area for MTRR as for the ioremap(). Convert the driver from using the x86-specific MTRR code to the architecture-agnostic arch_phys_wc_add(). It will avoid MTRRs if write-combining is available. In order to take advantage of that also ensure th

[Xen-devel] [PATCH v4 06/11] drivers/video/fbdev/arkfb.c: Use arch_phys_wc_add() and pci_iomap_wc()

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" Convert the driver from using the x86-specific MTRR code to the architecture-agnostic arch_phys_wc_add(). It will avoid MTRRs if write-combining is available. In order to take advantage of that also ensure the ioremapped area is requested as write-combining. There are a

[Xen-devel] [PATCH v4 01/11] PCI: Add pci_ioremap_wc_bar()

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" This lets drivers take advantage of PAT when available. It should help with the transition of converting video drivers over to ioremap_wc() to help with the goal of eventually using _PAGE_CACHE_UC over _PAGE_CACHE_UC_MINUS on x86 on ioremap_nocache(), see: de33c442ed2

[Xen-devel] [PATCH v4 00/11] x86/dma: RIP MTRR and dma write-combine API rename

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" Ingo, This is my pending series of patches for both write-combining and moving Linux' use of MTRR into the grave. It combines three set of straggler patch series which have been pending integration for a while now. The rename patches do not depend in any way with the MT

[Xen-devel] [PATCH v4 11/11] mtrr: bury MTRR - unexport mtrr_add() and mtrr_del()

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" The crusade to replace mtrr_add() with architecture agnostic arch_phys_wc_add() is complete, this will ensure write-combining implementations (PAT on x86) is taken advantage instead of using MTRR. With the crusade done now, hide direct MTRR access for drivers. Update x8

[Xen-devel] [PATCH v4 09/11] drivers/dma/iop-adma: Use dma_alloc_writecombine() kernel-style

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" dma_alloc_writecombine()'s call and return value check is tangled in all in one call. Untangle both calls according to kernel coding style. Signed-off-by: Luis R. Rodriguez Acked-by: Vinod Koul Cc: Vinod Koul Cc: Dan Williams Cc: dmaeng...@vger.kernel.org Cc: x...@k

[Xen-devel] [PATCH v4 10/11] dma: rename dma_*_writecombine() to dma_*_wc()

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" Rename dma_*_writecombine() to dma_*_wc(), so that the naming is coherent across the various write-combining APIs. The following Coccinelle SmPL patch was used for this simple transformation: @ rename_dma_alloc_writecombine @ expression dev, size, dma_addr, gfp; @@ -d

[Xen-devel] [PATCH v4 05/11] PCI: Add pci_iomap_wc() variants

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" PCI BARs tell us whether prefetching is safe, but they don't say anything about write combining (WC). WC changes ordering rules and allows writes to be collapsed, so it's not safe in general to use it on a prefetchable region. Add pci_iomap_wc() and pci_iomap_wc_range()

[Xen-devel] [PATCH v4 03/11] drivers/video/fbdev/kyrofb: Use arch_phys_wc_add() and pci_ioremap_wc_bar()

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" Convert the driver from using the x86-specific MTRR code to the architecture-agnostic arch_phys_wc_add(). It will avoid MTRR if write-combining is available, in order to take advantage of that also ensure the ioremapped area is requested as write-combining. There are a

[Xen-devel] [PATCH v4 02/11] drivers/video/fbdev/i740fb: Use arch_phys_wc_add() and pci_ioremap_wc_bar()

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" Convert the driver from using the x86-specific MTRR code to the architecture-agnostic arch_phys_wc_add(). It will avoid MTRR if write-combining is available, in order to take advantage of that also ensure the ioremapped area is requested as write-combining. There are a

[Xen-devel] [PATCH v4 04/11] drivers/video/fbdev/gxt4500: Use pci_ioremap_wc_bar() to map framebuffer

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" The driver doesn't use mtrr_add() or arch_phys_wc_add() but since we know the framebuffer is isolated already on an ioremap() we can take advantage of write combining for performance where possible. In this case there are a few motivations for this: a) Take advantage o

[Xen-devel] [PATCH v4 07/11] drivers/video/fbdev/s3fb: Use arch_phys_wc_add() and pci_iomap_wc()

2015-08-24 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" This driver uses the same area for MTRR as for the ioremap(). Convert the driver from using the x86-specific MTRR code to the architecture-agnostic arch_phys_wc_add(). It will avoid MTRRs if write-combining is available. In order to take advantage of that also ensure th

Re: [Xen-devel] [PATCH v5 07/28] libxc: rework BSP initialization

2015-08-24 Thread Konrad Rzeszutek Wilk
On Fri, Aug 21, 2015 at 06:53:20PM +0200, Roger Pau Monne wrote: > Place the calls to xc_vcpu_setcontext and the allocation of the hypercall > buffer into the arch-specific vcpu hooks. This is needed for the next patch, s/next patch/$title/ please > so x86 HVM guests can initialize the BSP using

[Xen-devel] [PATCH for-4.6 1/2] docs: Template for feature documents

2015-08-24 Thread Andrew Cooper
Signed-off-by: Andrew Cooper --- docs/Makefile |2 +- docs/features/template.pandoc | 55 + 2 files changed, 56 insertions(+), 1 deletion(-) create mode 100644 docs/features/template.pandoc diff --git a/docs/Makefile b/docs/Makefile

[Xen-devel] [PATCH for-4.6 2/2] docs: Migration feature document

2015-08-24 Thread Andrew Cooper
Signed-off-by: Andrew Cooper --- docs/features/migration.pandoc | 90 1 file changed, 90 insertions(+) create mode 100644 docs/features/migration.pandoc diff --git a/docs/features/migration.pandoc b/docs/features/migration.pandoc new file mode 100644 i

[Xen-devel] [RFC for-4.6 0/2] In-tree feature documentation

2015-08-24 Thread Andrew Cooper
An issue which Xen has is an uncertain support statement for features. Given the success seen with docs/misc/xen-command-line.markdown, and in particular keeping it up to date, introduce a similar system for features. Patch 1 introduces a proposed template (and a makefile tweak to include the new

Re: [Xen-devel] [PATCH v2 0/6] multiboot2: Add two extensions and fix some issues

2015-08-24 Thread Daniel Kiper
Guys, especially GRUB2 maintainers, On Mon, Jul 20, 2015 at 04:35:48PM +0200, Daniel Kiper wrote: > Hi, > > This patch series: > - enables EFI boot services usage in loaded images > by multiboot2 protocol, > - add support for multiboot2 protocol compatible > relocatable images, > - f

Re: [Xen-devel] [PATCH v5 26/28] libxc/xen: introduce a start info structure for HVMlite guests

2015-08-24 Thread Roger Pau Monné
El 21/08/15 a les 23.00, Andrew Cooper ha escrit: > On 21/08/15 17:53, Roger Pau Monne wrote: >> --- a/xen/include/public/xen.h >> +++ b/xen/include/public/xen.h >> @@ -784,6 +784,25 @@ struct start_info { >> }; >> typedef struct start_info start_info_t; >> >> +/* >> + * Start of day structure

[Xen-devel] Xen 4.6 test report from XenServer

2015-08-24 Thread Andrew Cooper
Hi, While the Developer Summit was happening in Seattle, I set up a XenServer nightly test on -rc1(ish). There were no identified issues, which is a clear testament to quality of the 4.6, and shows a substantial improvement over previous releases. As 4.6 has matched our quality bars for inclusio

Re: [Xen-devel] Xen x86 host memory limit issues

2015-08-24 Thread Andrew Cooper
On 24/08/15 12:47, Jan Beulich wrote: On 24.08.15 at 12:36, wrote: >> The infrastructure around xenheap_max_mfn() is supposed cause all >> xenheap page allocations to fall within the Xen direct mapped region, >> but experimentally doesn't work correctly. >> >> In all cases I have seen, the ba

Re: [Xen-devel] Build failres with Xen 4.6.0-rc1 (firmware/etherboot/ipxe)

2015-08-24 Thread Jan Beulich
>>> On 21.08.15 at 19:51, wrote: > I don't think we can rev ipxe.git to the latest in Xen 4.6 time-frame. > But having that patch should help with compile issues, like mine. Agreed. > So how do we want to fix this in 4.6 time-frame? Pull the one patch (or a few more hand selected ones if need b

Re: [Xen-devel] [PATCH for 4.7] xen: Replace alloc_vcpu_guest_context() with vmalloc()

2015-08-24 Thread Jan Beulich
>>> On 21.08.15 at 19:51, wrote: > This essentially reverts c/s 2037f2adb "x86: introduce > alloc_vcpu_guest_context()", including the newer arm bits, but achieves > the same end goal by using the newer vmalloc() infrastructure. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich _

Re: [Xen-devel] [PATCH for 4.7] xen: Replace alloc_vcpu_guest_context() with vmalloc()

2015-08-24 Thread Jan Beulich
>>> On 21.08.15 at 20:10, wrote: > On 21/08/15 18:55, Konrad Rzeszutek Wilk wrote: >> On Fri, Aug 21, 2015 at 06:51:46PM +0100, Andrew Cooper wrote: >>> This essentially reverts c/s 2037f2adb "x86: introduce >>> alloc_vcpu_guest_context()", including the newer arm bits, but achieves >>> the same e

Re: [Xen-devel] [PATCH v5 24/28] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs

2015-08-24 Thread Andrew Cooper
On 24/08/15 11:43, Roger Pau Monné wrote: > El 21/08/15 a les 22.36, Andrew Cooper ha escrit: >> On 21/08/15 17:53, Roger Pau Monne wrote: >>> Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and >>> VCPUOP_is_up hypercalls from HVM guests. >>> >>> This patch introduces a new struct

Re: [Xen-devel] Xen x86 host memory limit issues

2015-08-24 Thread Jan Beulich
>>> On 24.08.15 at 12:36, wrote: > The infrastructure around xenheap_max_mfn() is supposed cause all > xenheap page allocations to fall within the Xen direct mapped region, > but experimentally doesn't work correctly. > > In all cases I have seen, the bad xenheap allocations have been from > call

Re: [Xen-devel] [PATCH v2 10/23] efi: build xen.gz with EFI code

2015-08-24 Thread Jan Beulich
>>> On 22.08.15 at 15:59, wrote: > On Thu, Aug 20, 2015 at 09:39:39AM -0600, Jan Beulich wrote: >> >>> On 20.07.15 at 16:29, wrote: >> > Build xen.gz with EFI code. We need this to support multiboot2 >> > protocol on EFI platforms. >> > >> > If we wish to load not ELF file using multiboot (v1) or

Re: [Xen-devel] [PATCH v2 09/23] efi: create efi_enabled()

2015-08-24 Thread Jan Beulich
>>> On 22.08.15 at 14:33, wrote: > On Thu, Aug 20, 2015 at 09:18:17AM -0600, Jan Beulich wrote: >> >>> On 20.07.15 at 16:29, wrote: >> > --- a/xen/arch/x86/efi/stub.c >> > +++ b/xen/arch/x86/efi/stub.c >> > @@ -4,9 +4,14 @@ >> > #include >> > #include >> > >> > -#ifndef efi_enabled >> > -cons

Re: [Xen-devel] [PATCH v5 24/28] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs

2015-08-24 Thread Roger Pau Monné
El 21/08/15 a les 22.36, Andrew Cooper ha escrit: > On 21/08/15 17:53, Roger Pau Monne wrote: >> Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and >> VCPUOP_is_up hypercalls from HVM guests. >> >> This patch introduces a new structure (vcpu_hvm_context) that should be used >> in

[Xen-devel] Xen x86 host memory limit issues

2015-08-24 Thread Andrew Cooper
(Following up from a discussion at the Seattle Summit). While the theoretical Xen x86 host memory limit is 16TB (or 123TB with CONFIG_BIGMEM), Xen doesn't actually function correctly if host ram exceeds the addressable range in the directmap region, which is at the 5TB boundary (or 3.5TB with CONF

Re: [Xen-devel] [PATCH] xen/tmem: Pass page instead of pfn to xen_tmem_get_page()

2015-08-24 Thread Murilo Opsfelder Araújo
On Wed, Aug 19, 2015 at 9:23 PM, Julien Grall wrote: > Hi, > > On 19/08/2015 06:25, Murilo Opsfelder Araujo wrote: >> >> The commit 091208a676dfdabb2b8fe86ee155c6fc80081b69 "xen/tmem: Use >> xen_page_to_gfn rather than pfn_to_gfn" left behind a call to >> xen_tmem_get_page() receiving pfn instead

Re: [Xen-devel] [PATCH] xen/tmem: Pass page instead of pfn to xen_tmem_get_page()

2015-08-24 Thread Murilo Opsfelder Araújo
On Thu, Aug 20, 2015 at 8:27 AM, David Vrabel wrote: > On 19/08/15 14:25, Murilo Opsfelder Araujo wrote: >> The commit 091208a676dfdabb2b8fe86ee155c6fc80081b69 "xen/tmem: Use >> xen_page_to_gfn rather than pfn_to_gfn" left behind a call to >> xen_tmem_get_page() receiving pfn instead of page. >> >

[Xen-devel] [PATCH 3.12 48/82] x86/xen: Probe target addresses in set_aliased_prot() before the hypercall

2015-08-24 Thread Jiri Slaby
From: Andy Lutomirski 3.12-stable review patch. If anyone has any objections, please let me know. === commit aa1acff356bbedfd03b544051f5b371746735d89 upstream. The update_va_mapping hypercall can fail if the VA isn't present in the guest's page tables. Under certain loads, this c

Re: [Xen-devel] Question: Redirect guest kernel's message via serial port to a file on dom0

2015-08-24 Thread Andrew Cooper
On 24/08/2015 04:01, Meng Xu wrote: > Hi, > > I'm trying to use a PV guest VM on Xen to help debug Linux. > I was using VirtualBox to help debug Linux kernel by redirecting the > output of the serial port of the VM to a file in the host. I can do it > in VirtualBox. > > [Why do I want to achieve th