[Xen-devel] [linux-linus test] 63654: regressions - FAIL

2015-11-05 Thread osstest service owner
flight 63654 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/63654/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-rumpuserxen-amd64 6 xen-bootfail REGR. vs. 59254 test-amd64-amd64-xl-p

[Xen-devel] [seabios baseline-only test] 38253: regressions - FAIL

2015-11-05 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38253 seabios real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38253/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 7 host-ping-che

Re: [Xen-devel] [PATCH v12 3/3] iommu: add rmrr Xen command line option for extra rmrrs

2015-11-05 Thread Elena Ufimtseva
On Wed, Oct 28, 2015 at 10:05:31AM -0600, Jan Beulich wrote: > >>> On 27.10.15 at 21:36, wrote: > > +static void __init add_extra_rmrr(void) > > +{ > > +struct acpi_rmrr_unit *acpi_rmrr; > > +struct acpi_rmrr_unit *rmrru; > > +unsigned int dev, seg, i; > > +unsigned long pfn; > > +

Re: [Xen-devel] [PATCH] x86/mm: Skip the hypervisor range when walking PGD

2015-11-05 Thread Boris Ostrovsky
On 11/05/2015 05:31 PM, H. Peter Anvin wrote: On 11/05/15 10:56, Boris Ostrovsky wrote: The range between 0x8000 and 0x87ff is reserved for hypervisor and therefore we should not try to follow PGD's indexes corresponding to those addresses. While this has alsways been

[Xen-devel] [qemu-mainline baseline-only test] 38252: regressions - FAIL

2015-11-05 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38252 qemu-mainline real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38252/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-amd64 20 guest-start

Re: [Xen-devel] [V9 1/3] x86/xsaves: enable xsaves/xrstors/xsavec in xen

2015-11-05 Thread Shuai Ruan
On Thu, Nov 05, 2015 at 03:13:01AM -0700, Jan Beulich wrote: > >>> On 05.11.15 at 10:57, wrote: > > Ok. So alternative_input will not used here (means use the way > > xrstor in Patch 8)? Or put the XSTATE_FIXUP into alternative_input ? > > Which one is ok to you ? > > The latter, if necessary by

[Xen-devel] [linux-3.14 test] 63634: regressions - FAIL

2015-11-05 Thread osstest service owner
flight 63634 linux-3.14 real [real] http://logs.test-lab.xenproject.org/osstest/logs/63634/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 5 kernel-build fail REGR. vs. 62648 Tests which are failin

[Xen-devel] [seabios test] 63602: tolerable FAIL - PUSHED

2015-11-05 Thread osstest service owner
flight 63602 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/63602/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 17 guest-stop fail like 6 Tests which did not succeed, but a

[Xen-devel] [linux-3.10 test] 63601: regressions - FAIL

2015-11-05 Thread osstest service owner
flight 63601 linux-3.10 real [real] http://logs.test-lab.xenproject.org/osstest/logs/63601/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 5 kernel-build fail REGR. vs. 62642 Tests which are failin

Re: [Xen-devel] [PATCH] x86/mm: Skip the hypervisor range when walking PGD

2015-11-05 Thread H. Peter Anvin
On 11/05/15 10:56, Boris Ostrovsky wrote: > The range between 0x8000 and 0x87ff is reserved > for hypervisor and therefore we should not try to follow PGD's indexes > corresponding to those addresses. > > While this has alsways been a problem, with commit e1a58320a38d ("x86

[Xen-devel] [ovmf baseline-only test] 38251: all pass

2015-11-05 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38251 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38251/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf b9ffeab7b0856db6409b53efbba51b8c336b7491 baseline version: ovm

Re: [Xen-devel] [VOTE] Release cycle scheme

2015-11-05 Thread Konrad Rzeszutek Wilk
On Mon, Nov 02, 2015 at 01:47:21PM +, Wei Liu wrote: > Hi committers, > > There doesn't seem to be consensus on how release cycle should be > managed. In the survey [0] about release cycle there were following > proposed schemes: > > #1. 6 months release cycle + current stable release scheme

Re: [Xen-devel] 2016 Xen Dev Summit Location (input needed before next Thu)

2015-11-05 Thread Konrad Rzeszutek Wilk
On Thu, Nov 05, 2015 at 06:31:22PM +, Lars Kurth wrote: > Hi all, > > I was just informed that it is not going to be possible to hold the Developer > Summit alongside LinuxCon in Berlin, unless we make some hard choices. I had > originally had booked the space and all looked fine when it was

[Xen-devel] [qemu-mainline test] 63585: tolerable FAIL - PUSHED

2015-11-05 Thread osstest service owner
flight 63585 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/63585/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-credit2 16 guest-start/debian.repeatfail like 63466 test-armhf-armhf-xl-rtds

Re: [Xen-devel] Hackathon 2016 Location Preferences

2015-11-05 Thread Konrad Rzeszutek Wilk
On Thu, Nov 05, 2015 at 03:21:18PM +, Lars Kurth wrote: > Hi all, > > I wanted to do quick straw-poll regarding Hackathon Locations for next year. > Before I do this though, I wanted to let you know that the 2016 Developer > Summit will most likely be in Berlin in October (I am in the proces

Re: [Xen-devel] [PATCH v1 07/11] xsplice: Implement payload loading

2015-11-05 Thread Konrad Rzeszutek Wilk
On Thu, Nov 05, 2015 at 11:15:34AM +, Ross Lagerwall wrote: > On 11/04/2015 10:21 PM, Konrad Rzeszutek Wilk wrote: > snip > >> > >>+ > >>+/* > >>+ * The following functions prepare an xSplice module to be executed by > >>+ * allocating space, loading the allocated sections, resolving symbols, >

Re: [Xen-devel] [PATCH v1 08/11] xsplice: Implement support for applying patches

2015-11-05 Thread Konrad Rzeszutek Wilk
On Thu, Nov 05, 2015 at 11:45:42AM +, Ross Lagerwall wrote: > On 11/05/2015 03:17 AM, Konrad Rzeszutek Wilk wrote: > snip > >>diff --git a/xen/arch/x86/xsplice.c b/xen/arch/x86/xsplice.c > >>index dbff0d5..31e4124 100644 > >>--- a/xen/arch/x86/xsplice.c > >>+++ b/xen/arch/x86/xsplice.c > >>@@ -

Re: [Xen-devel] [PATCH v1 01/11] xsplice: Design document (v2).

2015-11-05 Thread Konrad Rzeszutek Wilk
On Thu, Nov 05, 2015 at 10:49:51AM +, Ross Lagerwall wrote: > On 11/04/2015 09:10 PM, Konrad Rzeszutek Wilk wrote: > snip > >>+The payload **MUST** contain enough data to allow us to apply the update > >>+and also safely reverse it. As such we **MUST** know: > >>+ > >>+ * The locations in memor

Re: [Xen-devel] [PATCH v4 10/10] xen/blkback: make pool of persistent grants and free pages per-queue

2015-11-05 Thread Konrad Rzeszutek Wilk
On Thu, Nov 05, 2015 at 10:46:05AM +0800, Bob Liu wrote: > > On 11/05/2015 10:43 AM, Konrad Rzeszutek Wilk wrote: > > On Mon, Nov 02, 2015 at 12:21:46PM +0800, Bob Liu wrote: > >> Make pool of persistent grants and free pages per-queue/ring instead of > >> per-device to get better scalability. > >

[Xen-devel] [ovmf test] 63599: all pass - PUSHED

2015-11-05 Thread osstest service owner
flight 63599 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/63599/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf b9ffeab7b0856db6409b53efbba51b8c336b7491 baseline version: ovmf fad21b7c57336bbf0ae363d56e35cbccca6

Re: [Xen-devel] [PATCH v1 11/11] xsplice: Add support for alternatives

2015-11-05 Thread Konrad Rzeszutek Wilk
On Tue, Nov 03, 2015 at 06:16:08PM +, Ross Lagerwall wrote: > Add support for applying alternative sections within xsplice modules. At > module load time, apply any alternative sections that are found. > > Signed-off-by: Ross Lagerwall > --- > xen/arch/x86/Makefile | 2 +- > xen

Re: [Xen-devel] [PATCH v1 10/11] xsplice: Add support for exception tables

2015-11-05 Thread Konrad Rzeszutek Wilk
On Tue, Nov 03, 2015 at 06:16:07PM +, Ross Lagerwall wrote: > Add support for exception tables contained within xsplice modules. If an > exception occurs search either the main exception table or a particular > active module's exception table depending on the instruction pointer. s/module/payl

Re: [Xen-devel] [PATCH v1 09/11] xsplice: Add support for bug frames

2015-11-05 Thread Konrad Rzeszutek Wilk
On Tue, Nov 03, 2015 at 06:16:06PM +, Ross Lagerwall wrote: > Add support for handling bug frames contained with xsplice modules. If a > trap occurs search either the kernel bug table or an applied module's payload. > bug table depending on the instruction pointer. > > Signed-off-by: Ross Lag

[Xen-devel] Xen on Arm Arndale Exynos5250

2015-11-05 Thread ed sandberg
I am trying to get xen running on an arndale Exynos5250. I think I am close to success because I can boot the hypervisor and interact with the debug console and I don't see any errors. I can switch the debug console from xen mode to Dom0 mode by pressing CTRL-a three times, however I am not promp

Re: [Xen-devel] [PATCH 3/3] xen/arm: set the system time in Xen via the XENPF_settime hypercall

2015-11-05 Thread Arnd Bergmann
On Thursday 05 November 2015 17:09:45 Stefano Stabellini wrote: > If Linux is running as dom0, call XENPF_settime to update the system > time in Xen on pvclock_gtod notifications. > > Signed-off-by: Stefano Stabellini > Signed-off-by: Ian Campbell > --- > arch/arm/xen/enlighten.c | 52 >

[Xen-devel] [PATCH] x86/mm: Skip the hypervisor range when walking PGD

2015-11-05 Thread Boris Ostrovsky
The range between 0x8000 and 0x87ff is reserved for hypervisor and therefore we should not try to follow PGD's indexes corresponding to those addresses. While this has alsways been a problem, with commit e1a58320a38d ("x86/mm: Warn on W^X mappings") ptdump_walk_pgd_level_co

Re: [Xen-devel] [PATCH 1/3] xen/arm: introduce xen_read_wallclock

2015-11-05 Thread Arnd Bergmann
On Thursday 05 November 2015 17:09:43 Stefano Stabellini wrote: > Read the wallclock from the shared info page at boot time. > > Signed-off-by: Stefano Stabellini Please use the appropriate timespec64 based functions here, we are in the process of converting all callers of struct timespec. > --

[Xen-devel] 2016 Xen Dev Summit Location (input needed before next Thu)

2015-11-05 Thread Lars Kurth
Hi all, I was just informed that it is not going to be possible to hold the Developer Summit alongside LinuxCon in Berlin, unless we make some hard choices. I had originally had booked the space and all looked fine when it was originally arranged several months ago. Seems that the LinuxCon orga

[Xen-devel] [linux-next test] 63579: regressions - FAIL

2015-11-05 Thread osstest service owner
flight 63579 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/63579/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-multivcpu 6 xen-boot fail REGR. vs. 63473 test-amd64-amd64-pygru

Re: [Xen-devel] [PATCH 2/2] arm: export platform_op XENPF_settime

2015-11-05 Thread Andrew Cooper
On 05/11/15 17:34, Julien Grall wrote: > Hi Stefano, > > You forgot to CC Daniel for the XSM part. Please use > scripts/get_maintainers.pl to get the relevant maintainers. > > On 05/11/15 16:57, Stefano Stabellini wrote: >> Call update_domain_wallclock_time at domain initialization. > It's not real

[Xen-devel] [PATCH v2 2/2] xen/serial: Return actual bytes stored in TX FIFO for OMAP

2015-11-05 Thread Oleksandr Tyshchenko
This is intended to decrease a time spending in transmitter while waiting for the free space in TX FIFO. And as result to reduce the impact of hvc on the entire system running on OMAP5/DRA7XX based platforms. Signed-off-by: Oleksandr Tyshchenko CC: Ian Campbell CC: Julien Grall CC: Stefano Stab

[Xen-devel] [PATCH v2 1/2] xen/serial: Move any OMAP specific things to OMAP UART driver

2015-11-05 Thread Oleksandr Tyshchenko
The 8250-uart.h contains extra serial register definitions for the internal UARTs in TI OMAP SoCs which are used in OMAP UART driver only. In order to clean up code move these definitions to omap-uart.c. Also rename some definitions to follow to the UART_OMAP* prefix. Signed-off-by: Oleksandr Tysh

[Xen-devel] [PATCH v2 0/2] xen/serial: Return actual bytes stored in TX FIFO for OMAP

2015-11-05 Thread Oleksandr Tyshchenko
Hi all, Only second patch is related to the subject of the cover letter. The first patch is clean up that was suggested during discussion of initial version: http://www.gossamer-threads.com/lists/xen/devel/403859?page=last Oleksandr Tyshchenko (2): xen/serial: Move any OMAP specific things to OM

Re: [Xen-devel] [PATCH 3/3] xen/arm: set the system time in Xen via the XENPF_settime hypercall

2015-11-05 Thread David Vrabel
On 05/11/15 17:09, Stefano Stabellini wrote: > If Linux is running as dom0, call XENPF_settime to update the system > time in Xen on pvclock_gtod notifications. Isn't this a cut-and-paste from x86? Can you make it common? David ___ Xen-devel mailing l

Re: [Xen-devel] [PATCH v4 2/9] xen: add generic flag to elf_dom_parms indicating support of unmapped initrd

2015-11-05 Thread Andrew Cooper
On 05/11/15 14:36, Juergen Gross wrote: > Support of an unmapped initrd is indicated by the kernel of the domain > via elf notes. In order not to have to use raw elf data in the tools > for support of an unmapped initrd add a flag to the parsed data area > to indicate the kernel supporting this fea

Re: [Xen-devel] [PATCH 2/2] arm: export platform_op XENPF_settime

2015-11-05 Thread Julien Grall
Hi Stefano, You forgot to CC Daniel for the XSM part. Please use scripts/get_maintainers.pl to get the relevant maintainers. On 05/11/15 16:57, Stefano Stabellini wrote: > Call update_domain_wallclock_time at domain initialization. It's not really what you are doing in the code. You are calling

Re: [Xen-devel] [PATCH v11 2/5] missing include asm/paravirt.h in cputime.c

2015-11-05 Thread Stefano Stabellini
On Thu, 5 Nov 2015, Peter Zijlstra wrote: > How can this be missing? Things compile fine now, right? Fair enough. > So please better explain why we do this change. asm/paravirt.h is included by one of the other headers included in kernel/sched/cputime.c on x86, but not on other architecures. On

Re: [Xen-devel] Linux 4.4 MW: Boot under Xen fails with CONFIG_DEBUG_WX enabled: RIP: ptdump_walk_pgd_level_core

2015-11-05 Thread Sander Eikelenboom
Thursday, November 5, 2015, 2:53:40 PM, you wrote: > On 11/05/2015 04:13 AM, Sander Eikelenboom wrote: >> >> It makes "cat /sys/kernel/debug/kernel_page_tables" work and >> prevents a kernel with CONFIG_DEBUG_WX=y from crashing at boot. > Great. Our nightly runs also failed spectacularly due to

Re: [Xen-devel] [VOTE] Release cycle scheme

2015-11-05 Thread Stefano Stabellini
On Mon, 2 Nov 2015, Wei Liu wrote: > Hi committers, I am not a xen.git committer, but I am the qemu-xen.git committer, and since I maintain all the qemu-xen stable trees and releases, I think that my vote should count, at least for this proposal. > There doesn't seem to be consensus on how relea

Re: [Xen-devel] Linux 4.4 MW: Boot under Xen fails with CONFIG_DEBUG_WX enabled: RIP: ptdump_walk_pgd_level_core

2015-11-05 Thread Boris Ostrovsky
On 11/05/2015 04:13 AM, Sander Eikelenboom wrote: It makes "cat /sys/kernel/debug/kernel_page_tables" work and prevents a kernel with CONFIG_DEBUG_WX=y from crashing at boot. Great. Our nightly runs also failed spectacularly due to this bug. It now does give a warning about an insecure W+X

Re: [Xen-devel] [PATCH 2/3] xen/arm: introduce HYPERVISOR_dom0_op on arm and arm64

2015-11-05 Thread Jan Beulich
>>> On 05.11.15 at 18:09, wrote: > --- a/arch/arm/xen/hypercall.S > +++ b/arch/arm/xen/hypercall.S > @@ -89,6 +89,7 @@ HYPERCALL2(memory_op); > HYPERCALL2(physdev_op); > HYPERCALL3(vcpu_op); > HYPERCALL1(tmem_op); > +HYPERCALL1(dom0_op); Assuming this somehow tries to mirror x86 naming - time

Re: [Xen-devel] [PATCH 1/2] rwlock: add per-cpu reader-writer locks

2015-11-05 Thread Marcos E. Matsunaga
Hi Malcolm, I tried your patches against staging yesterday and as soon as I started a guest, it panic. I have lock_profile enabled and applied your patches against: 6f04de658574833688c3f9eab310e7834d56a9c0 x86: cleanup of early cpuid handling (XEN) HVM1 save: CPU (XEN) HVM1 save: PIC (XE

Re: [Xen-devel] [PATCH 1/2] xen: move wallclock functions from x86 to common

2015-11-05 Thread Julien Grall
Hi, You forgot to CC the x86 maintainers. Regards, On 05/11/15 16:57, Stefano Stabellini wrote: > Remove dummy arm implementation of wallclock_time. > Use shared_info() in common code rather than x86-ism to access it. > > Signed-off-by: Stefano Stabellini > Signed-off-by: Ian Campbell > --- >

Re: [Xen-devel] [PATCH 1/2] xen: move wallclock functions from x86 to common

2015-11-05 Thread Jan Beulich
>>> On 05.11.15 at 17:57, wrote: > --- a/xen/common/time.c > +++ b/xen/common/time.c > @@ -16,7 +16,13 @@ > */ > > #include > +#include > +#include > +#include > #include > +#include > +#include > + > > /* Nonzero if YEAR is a leap year (every 4 years, Stray blank line being added

Re: [Xen-devel] [MirageOS-devel] Hackathon 2016 Location Preferences

2015-11-05 Thread Richard Mortier
On 5 November 2015 at 16:24, Wei Liu wrote: >> We do have two options for a Hackathon: China (either Shanghai, >> Hangzhou or Beijing - details TBC) and Cambridge, UK. We are still in >> the early planning phase and the budget for the Hackathon has not yet >> been approved. > > I lived in Hangzhou

Re: [Xen-devel] [PATCH RFC] domain: Compile with lock_profile=y enabled.

2015-11-05 Thread Jan Beulich
>>> On 02.11.15 at 18:12, wrote: > --- a/xen/arch/x86/domain.c > +++ b/xen/arch/x86/domain.c > @@ -237,6 +237,7 @@ struct domain *alloc_domain_struct(void) > #ifdef CONFIG_BIGMEM > const unsigned int bits = 0; > #else > +int order = get_order_from_bytes(sizeof(*d)); unsigned int > @@

[Xen-devel] [PATCH 1/3] xen/arm: introduce xen_read_wallclock

2015-11-05 Thread Stefano Stabellini
Read the wallclock from the shared info page at boot time. Signed-off-by: Stefano Stabellini --- arch/arm/Kconfig |1 + arch/arm/xen/enlighten.c | 31 +++ 2 files changed, 32 insertions(+) diff --git a/arch/arm/Kconfig b/arch/arm/Kconfig index 60be104..

[Xen-devel] [PATCH 2/3] xen/arm: introduce HYPERVISOR_dom0_op on arm and arm64

2015-11-05 Thread Stefano Stabellini
Signed-off-by: Stefano Stabellini --- arch/arm/include/asm/xen/hypercall.h |2 ++ arch/arm/xen/enlighten.c |1 + arch/arm/xen/hypercall.S |1 + arch/arm64/xen/hypercall.S |1 + 4 files changed, 5 insertions(+) diff --git a/arch/arm/include/asm/xe

[Xen-devel] [PATCH 3/3] xen/arm: set the system time in Xen via the XENPF_settime hypercall

2015-11-05 Thread Stefano Stabellini
If Linux is running as dom0, call XENPF_settime to update the system time in Xen on pvclock_gtod notifications. Signed-off-by: Stefano Stabellini Signed-off-by: Ian Campbell --- arch/arm/xen/enlighten.c | 52 +- 1 file changed, 51 insertions(+), 1 d

[Xen-devel] [PATCH 0/3] Xen wallclock on arm and arm64

2015-11-05 Thread Stefano Stabellini
Hi all, this series introduces PV wallclock time support on arm and arm64. Stefano Stabellini (3): xen/arm: introduce xen_read_wallclock xen/arm: introduce HYPERVISOR_dom0_op on arm and arm64 xen/arm: set the system time in Xen via the XENPF_settime hypercall arch/arm/Kconfig

Re: [Xen-devel] [PATCH RFC] vmalloc/vzalloc: Add memflags parameter.

2015-11-05 Thread Jan Beulich
>>> On 02.11.15 at 18:12, wrote: > --- a/xen/common/domain.c > +++ b/xen/common/domain.c > @@ -1223,7 +1223,7 @@ long do_vcpu_op(int cmd, unsigned int vcpuid, > XEN_GUEST_HANDLE_PARAM(void) arg) > if ( v->vcpu_info == &dummy_vcpu_info ) > return -EINVAL; > > -if (

Re: [Xen-devel] [PATCH 2/2] arm: export platform_op XENPF_settime

2015-11-05 Thread David Vrabel
On 05/11/15 16:57, Stefano Stabellini wrote: > +case XENPF_settime32: > +do_settime(op->u.settime32.secs, > + op->u.settime32.nsecs, > + op->u.settime32.system_time); > +break; I don't think you want to provide this hypercall -- only provide

[Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 6

2015-11-05 Thread Shannon Zhao
This document is going to explain the design details of Xen booting with ACPI on ARM. Any comments are welcome. Changes v5->v6: * add a new node "uefi" under /hypervisor to pass UEFI informations to Dom0 instead of the nodes under /chosen. * change creation of MADT table, get the information fro

[Xen-devel] [PATCH 1/2] xen: move wallclock functions from x86 to common

2015-11-05 Thread Stefano Stabellini
Remove dummy arm implementation of wallclock_time. Use shared_info() in common code rather than x86-ism to access it. Signed-off-by: Stefano Stabellini Signed-off-by: Ian Campbell --- xen/arch/arm/time.c |5 --- xen/arch/x86/time.c | 92 + x

Re: [Xen-devel] [PATCH v11 5/5] xen/arm: account for stolen ticks

2015-11-05 Thread Mark Rutland
> static void xen_percpu_init(void) > { > struct vcpu_register_vcpu_info info; > @@ -104,6 +120,8 @@ static void xen_percpu_init(void) > BUG_ON(err); > per_cpu(xen_vcpu, cpu) = vcpup; > > + xen_setup_runstate_info(cpu); Does the runstate memory area get unregsitered when

[Xen-devel] [PATCH 2/2] arm: export platform_op XENPF_settime

2015-11-05 Thread Stefano Stabellini
Call update_domain_wallclock_time at domain initialization. Signed-off-by: Stefano Stabellini Signed-off-by: Ian Campbell --- xen/arch/arm/Makefile |1 + xen/arch/arm/domain.c |3 ++ xen/arch/arm/platform_hypercall.c | 62 +

[Xen-devel] [PATCH 0/2] wallclock time on arm

2015-11-05 Thread Stefano Stabellini
Hi all, this small series enables the wallclock time on arm and it consists mostly in code movement from x86 to common. Stefano Stabellini (2): xen: move wallclock functions from x86 to common arm: export platform_op XENPF_settime xen/arch/arm/Makefile |1 + xen/arc

Re: [Xen-devel] [PATCH v11 1/5] xen: move xen_setup_runstate_info and get_runstate_snapshot to drivers/xen/time.c

2015-11-05 Thread Mark Rutland
Hi, > +static u64 get64(const u64 *p) > +{ > + u64 ret; > + > + if (BITS_PER_LONG < 64) { > + u32 *p32 = (u32 *)p; > + u32 h, l; > + > + /* > + * Read high then low, and then make sure high is > + * still the same; this will onl

Re: [Xen-devel] [PATCH] x86/PoD: tighten conditions for checking super page

2015-11-05 Thread Jan Beulich
>>> On 02.11.15 at 17:29, wrote: > * steal_for_cache may now be wrong. I realize that since now ram == 0 > that all the subsequent "steal_for_cache" expressions will end up as > "false" anyway, but leaving invariants in an invalid state is sort of > asking for trouble. > > I'd prefer you just up

Re: [Xen-devel] [PATCH v11 2/5] missing include asm/paravirt.h in cputime.c

2015-11-05 Thread Peter Zijlstra
How can this be missing? Things compile fine now, right? So please better explain why we do this change. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [win-pv-devel] Hackathon 2016 Location Preferences

2015-11-05 Thread Paul Durrant
> -Original Message- > From: win-pv-devel-boun...@lists.xenproject.org [mailto:win-pv-devel- > boun...@lists.xenproject.org] On Behalf Of Lars Kurth > Sent: 05 November 2015 15:21 > To: Xen-devel; mirageos-devel; xen-...@lists.xenproject.org; Win-pv- > de...@lists.xenproject.org > Subject:

Re: [Xen-devel] [Xen-API] Hackathon 2016 Location Preferences

2015-11-05 Thread Anil Madhavapeddy
On 5 Nov 2015, at 15:21, Lars Kurth wrote: > > Hi all, > > I wanted to do quick straw-poll regarding Hackathon Locations for next year. > Before I do this though, I wanted to let you know that the 2016 Developer > Summit will most likely be in Berlin in October (I am in the process of > final

Re: [Xen-devel] ovmf fail to compile

2015-11-05 Thread Wei Liu
On Thu, Nov 05, 2015 at 02:07:26PM +, Hao, Xudong wrote: > > -Original Message- > > From: Wei Liu [mailto:wei.l...@citrix.com] > > Sent: Wednesday, November 4, 2015 6:19 PM > > To: Hao, Xudong > > Cc: Wei Liu ; xen-devel@lists.xen.org > > Subject: Re: [Xen-devel] ovmf fail to compile >

Re: [Xen-devel] Hackathon 2016 Location Preferences

2015-11-05 Thread Wei Liu
On Thu, Nov 05, 2015 at 03:21:18PM +, Lars Kurth wrote: > Hi all, > > I wanted to do quick straw-poll regarding Hackathon Locations for next > year. Before I do this though, I wanted to let you know that the 2016 > Developer Summit will most likely be in Berlin in October (I am in the > proces

[Xen-devel] [PATCH v4 3/9] libxc: rename domain builder count_pgtables to alloc_pgtables

2015-11-05 Thread Juergen Gross
Rename the count_pgtables hook of the domain builder to alloc_pgtables and do the allocation of the guest memory for page tables inside this hook. This will remove the need for accessing the x86 specific pgtables member of struct xc_dom_image in the generic domain builder code. Signed-off-by: Juer

[Xen-devel] [PATCH] tools: pygrub: if partition table is empty, try treating as a whole disk

2015-11-05 Thread Ian Campbell
pygrub (in identify_disk_image()) detects a DOS style partition table via the presence of the 0xaa55 signature at the end of the first sector of the disk. However this signature is also present in whole-disk configurations when there is an MBR on the disk. Many filesystems (e.g. ext[234]) include

[Xen-devel] [PATCH v4 2/9] xen: add generic flag to elf_dom_parms indicating support of unmapped initrd

2015-11-05 Thread Juergen Gross
Support of an unmapped initrd is indicated by the kernel of the domain via elf notes. In order not to have to use raw elf data in the tools for support of an unmapped initrd add a flag to the parsed data area to indicate the kernel supporting this feature. Switch using this flag in the hypervisor

[Xen-devel] [PATCH v4 0/9] libxc: support building large pv-domains

2015-11-05 Thread Juergen Gross
The Xen hypervisor supports starting a dom0 with large memory (up to the TB range) by not including the initrd and p2m list in the initial kernel mapping. Especially the p2m list can grow larger than the available virtual space in the initial mapping. The started kernel is indicating the support o

[Xen-devel] [PATCH v4 4/9] libxc: introduce domain builder architecture specific data

2015-11-05 Thread Juergen Gross
Reorganize struct xc_dom_image to contain a pointer to domain builder architecture specific private data. This will abstract the architecture or domain type specific data from the general used data. The new area is allocated as soon as the domain type is known. Signed-off-by: Juergen Gross Acked

[Xen-devel] [PATCH v4 5/9] libxc: use domain builder architecture private data for x86 pv domains

2015-11-05 Thread Juergen Gross
Move some data private to the x86 domain builder to the private data section. Remove extra_pages as they are used nowhere. Signed-off-by: Juergen Gross Acked-by: Wei Liu --- tools/libxc/include/xc_dom.h | 8 tools/libxc/xc_dom_x86.c | 48 +--

[Xen-devel] [linux-3.4 test] 63567: regressions - FAIL

2015-11-05 Thread osstest service owner
flight 63567 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/63567/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rumpuserxen-i386 6 xen-boot fail REGR. vs. 62277 test-amd64-i386-qemuu-r

[Xen-devel] [PATCH v4 8/9] libxc: rework of domain builder's page table handler

2015-11-05 Thread Juergen Gross
In order to prepare a p2m list outside of the initial kernel mapping do a rework of the domain builder's page table handler. The goal is to be able to use common helpers for page table allocation and setup for initial kernel page tables and page tables mapping the p2m list. This is achieved by supp

[Xen-devel] [PATCH v4 6/9] libxc: create unmapped initrd in domain builder if supported

2015-11-05 Thread Juergen Gross
In case the kernel of a new pv-domU indicates it is supporting an unmapped initrd, don't waste precious virtual space for the initrd, but allocate only guest physical memory for it. Signed-off-by: Juergen Gross Acked-by: Wei Liu --- tools/libxc/include/xc_dom.h | 5 + tools/libxc/xc_dom_co

[Xen-devel] [PATCH v4 7/9] libxc: split p2m allocation in domain builder from other magic pages

2015-11-05 Thread Juergen Gross
Carve out the p2m list allocation from the .alloc_magic_pages hook of the domain builder in order to prepare allocating the p2m list outside of the initial kernel mapping. This will be needed to support loading domains with huge memory (>512 GB). Signed-off-by: Juergen Gross Acked-by: Ian Campbel

[Xen-devel] [PATCH v4 9/9] libxc: create p2m list outside of kernel mapping if supported

2015-11-05 Thread Juergen Gross
In case the kernel of a new pv-domU indicates it is supporting a p2m list outside the initial kernel mapping by specifying INIT_P2M, let the domain builder allocate the memory for the p2m list from physical guest memory only and map it to the address the kernel is expecting. This will enable loadi

[Xen-devel] [PATCH v4 1/9] libxc: reorganize domain builder guest memory allocator

2015-11-05 Thread Juergen Gross
Guest memory allocation in the domain builder of libxc is done via virtual addresses only. In order to be able to support preallocated areas not virtually mapped reorganize the memory allocator to keep track of allocated pages globally and in allocated segments. This requires an interface change o

Re: [Xen-devel] [PATCH v7 16/32] xen/x86: allow disabling the pmtimer

2015-11-05 Thread Andrew Cooper
On 03/11/15 12:41, Jan Beulich wrote: On 03.11.15 at 11:57, wrote: >> On 03/11/15 07:21, Jan Beulich wrote: >> On 30.10.15 at 16:36, wrote: On 30/10/15 13:16, Jan Beulich wrote: On 30.10.15 at 13:50, wrote: >> El 14/10/15 a les 16.37, Jan Beulich ha escrit: >>

Re: [Xen-devel] [PATCH V8 3/7] libxl: add pvusb API

2015-11-05 Thread George Dunlap
On Wed, Nov 4, 2015 at 6:31 AM, Chun Yan Liu wrote: > Ian & George, any comments? Hey Chunyan, I did actually spend a chunk of time looking at this last week. Looking at the diff-of-diffs, it looks like you've addressed everything I asked you to address. I still want to take a longer look at it

Re: [Xen-devel] Getting the XSAVE size from userspace

2015-11-05 Thread Andrew Cooper
On 05/11/15 12:26, Razvan Cojocaru wrote: > On 11/05/2015 01:44 PM, Andrew Cooper wrote: >> On 05/11/15 11:35, Andrei LUTAS wrote: >>> The use-case is the following: whenever an EPT violation is triggered >>> inside a monitored VM, the introspection logic needs to know how many >>> bytes were acces

Re: [Xen-devel] [PATCH 1/2] rwlock: add per-cpu reader-writer locks

2015-11-05 Thread Marcos E. Matsunaga
Hi Malcolm, If you can post the updated patches, that would be great. I think it would be better for me to test with your update. Thanks again. On 11/05/2015 10:20 AM, Malcolm Crossley wrote: On 05/11/15 13:48, Marcos E. Matsunaga wrote: Hi Malcolm, I tried your patches against staging yes

Re: [Xen-devel] ovmf fail to compile

2015-11-05 Thread Hao, Xudong
> -Original Message- > From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: Wednesday, November 4, 2015 6:19 PM > To: Hao, Xudong > Cc: Wei Liu ; xen-devel@lists.xen.org > Subject: Re: [Xen-devel] ovmf fail to compile > > On Wed, Nov 04, 2015 at 08:27:56AM +, Hao, Xudong wrote: > > "git

Re: [Xen-devel] [PATCH v7 16/32] xen/x86: allow disabling the pmtimer

2015-11-05 Thread Andrew Cooper
On 04/11/15 16:17, Jan Beulich wrote: On 04.11.15 at 17:05, wrote: >> El 03/11/15 a les 13.41, Jan Beulich ha escrit: >> On 03.11.15 at 11:57, wrote: On 03/11/15 07:21, Jan Beulich wrote: On 30.10.15 at 16:36, wrote: >> On 30/10/15 13:16, Jan Beulich wrote: >>

Re: [Xen-devel] [xen-unstable test] 63540: regressions - FAIL

2015-11-05 Thread Ian Campbell
On Thu, 2015-11-05 at 03:49 -0700, Jan Beulich wrote: > > > > On 05.11.15 at 04:01, wrote: > > flight 63540 xen-unstable real [real] > > http://logs.test-lab.xenproject.org/osstest/logs/63540/ > > > > Regressions :-( > > > > Tests which did not succeed and are blocking, > > including tests whic

Re: [Xen-devel] [PATCH 1/2] rwlock: add per-cpu reader-writer locks

2015-11-05 Thread Malcolm Crossley
On 05/11/15 13:48, Marcos E. Matsunaga wrote: > Hi Malcolm, > > I tried your patches against staging yesterday and as soon as I started a > guest, it panic. I have > lock_profile enabled and applied your patches against: I tested with a non debug version of Xen (because I was analysing the perf

[Xen-devel] [PATCH v11 1/5] xen: move xen_setup_runstate_info and get_runstate_snapshot to drivers/xen/time.c

2015-11-05 Thread Stefano Stabellini
Signed-off-by: Stefano Stabellini Acked-by: Ian Campbell Reviewed-by: Konrad Rzeszutek Wilk CC: konrad.w...@oracle.com --- Changes in v10: - rebase --- arch/x86/xen/time.c | 76 + drivers/xen/Makefile |2 +- drivers/xen/time.c| 91 +++

[Xen-devel] [PATCH v11 0/5] xen/arm/arm64: CONFIG_PARAVIRT and stolen ticks accounting

2015-11-05 Thread Stefano Stabellini
Hi all, I dusted off this series from Jan 2014. Patch #2 and #3 still need an ack. This patch series introduces stolen ticks accounting for Xen on ARM and ARM64. Stolen ticks are clocksource ticks that have been "stolen" from the cpu, typically because Linux is running in a virtual machine and

[Xen-devel] [PATCH v11 4/5] arm64: introduce CONFIG_PARAVIRT, PARAVIRT_TIME_ACCOUNTING and pv_time_ops

2015-11-05 Thread Stefano Stabellini
Introduce CONFIG_PARAVIRT and PARAVIRT_TIME_ACCOUNTING on ARM64. Necessary duplication of paravirt.h and paravirt.c with ARM. The only paravirt interface supported is pv_time_ops.steal_clock, so no runtime pvops patching needed. This allows us to make use of steal_account_process_tick for stolen

Re: [Xen-devel] Getting the XSAVE size from userspace

2015-11-05 Thread Razvan Cojocaru
On 11/05/2015 04:05 PM, Andrew Cooper wrote: > On 05/11/15 12:26, Razvan Cojocaru wrote: >> On 11/05/2015 01:44 PM, Andrew Cooper wrote: >>> On 05/11/15 11:35, Andrei LUTAS wrote: The use-case is the following: whenever an EPT violation is triggered inside a monitored VM, the introspectio

[Xen-devel] [PATCH v11 3/5] arm: introduce CONFIG_PARAVIRT, PARAVIRT_TIME_ACCOUNTING and pv_time_ops

2015-11-05 Thread Stefano Stabellini
Introduce CONFIG_PARAVIRT and PARAVIRT_TIME_ACCOUNTING on ARM. The only paravirt interface supported is pv_time_ops.steal_clock, so no runtime pvops patching needed. This allows us to make use of steal_account_process_tick for stolen ticks accounting. Signed-off-by: Stefano Stabellini Acked-by:

[Xen-devel] [PATCH v11 2/5] missing include asm/paravirt.h in cputime.c

2015-11-05 Thread Stefano Stabellini
Add include asm/paravirt.h to cputime.c, as steal_account_process_tick calls paravirt_steal_clock, which is defined in asm/paravirt.h. The ifdef CONFIG_PARAVIRT is necessary because not all archs have an asm/paravirt.h to include. Signed-off-by: Stefano Stabellini CC: mi...@redhat.com CC: pet...

[Xen-devel] [PATCH v11 5/5] xen/arm: account for stolen ticks

2015-11-05 Thread Stefano Stabellini
Register the runstate_memory_area with the hypervisor. Use pv_time_ops.steal_clock to account for stolen ticks. Signed-off-by: Stefano Stabellini --- Changes in v4: - don't use paravirt_steal_rq_enabled: we do not support retrieving stolen ticks for vcpus other than one we are running on. Chan

[Xen-devel] Hackathon 2016 Location Preferences

2015-11-05 Thread Lars Kurth
Hi all, I wanted to do quick straw-poll regarding Hackathon Locations for next year. Before I do this though, I wanted to let you know that the 2016 Developer Summit will most likely be in Berlin in October (I am in the process of finalising space, budget and contract details which will need to

Re: [Xen-devel] [VOTE] Release cycle scheme

2015-11-05 Thread Tim Deegan
At 13:47 + on 02 Nov (1446472041), Wei Liu wrote: > So I propose we use the following scheme: > > - 6 months release cycle from unstable branch. > - 4 months development. > - 2 months freeze. > - Eat into next cycle if doesn't release on time. > - Fixed cut-off date: the Fridays of the w

[Xen-devel] [PATCH v10] run QEMU as non-root

2015-11-05 Thread Stefano Stabellini
Try to use "xen-qemuuser-domid$domid" first, then "xen-qemuuser-shared" and root if everything else fails. The uids need to be manually created by the user or, more likely, by the xen package maintainer. Expose a device_model_user setting in libxl_domain_build_info, so that opinionated callers, s

Re: [Xen-devel] [PATCH v9] run QEMU as non-root

2015-11-05 Thread Stefano Stabellini
On Tue, 3 Nov 2015, Ian Campbell wrote: > On Tue, 2015-11-03 at 16:49 +, Ian Campbell wrote: > > On Mon, 2015-11-02 at 12:30 +, Stefano Stabellini wrote: > > > Try to use "xen-qemudepriv-domid$domid" first, then > > > "xen-qemudepriv-shared" and root if everything else fails. > > > > > > Th

[Xen-devel] [PATCH v2] x86/hvm: make sure stdvga cache cannot be re-enabled

2015-11-05 Thread Paul Durrant
As soon as the cache is disabled, it will become out-of-sync with the VGA device model and since no mechanism exists to acquire current VRAM state from the device model, re-enabling it leads to stale data being seen by the guest. The problem was introduced by commit 3bbaaec0 ("x86/hvm: unify stdvg

Re: [Xen-devel] [PATCH] x86/hvm: make sure stdvga cache cannot be re-enabled

2015-11-05 Thread Paul Durrant
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: 05 November 2015 12:32 > To: Paul Durrant; xen-de...@lists.xenproject.org > Cc: Keir (Xen.org); Jan Beulich > Subject: Re: [PATCH] x86/hvm: make sure stdvga cache cannot be re- > enabled > > On 05/11/15 1

Re: [Xen-devel] [PATCH] x86/hvm: make sure stdvga cache cannot be re-enabled

2015-11-05 Thread Andrew Cooper
On 05/11/15 12:17, Paul Durrant wrote: > As soon as the cache is disabled, it will become out-of-sync with the > VGA device model and since no mechanism exists to acquire current VRAM > state from the device model, re-enabling it leads to stale data > being seen by the guest. > > The problem can be

Re: [Xen-devel] Getting the XSAVE size from userspace

2015-11-05 Thread Razvan Cojocaru
On 11/05/2015 01:44 PM, Andrew Cooper wrote: > On 05/11/15 11:35, Andrei LUTAS wrote: >> The use-case is the following: whenever an EPT violation is triggered >> inside a monitored VM, the introspection logic needs to know how many >> bytes were accessed (read/written). This is done by inspecting t

[Xen-devel] [PATCH] x86/hvm: make sure stdvga cache cannot be re-enabled

2015-11-05 Thread Paul Durrant
As soon as the cache is disabled, it will become out-of-sync with the VGA device model and since no mechanism exists to acquire current VRAM state from the device model, re-enabling it leads to stale data being seen by the guest. The problem can be seen by deliberately crashing a Windows guest; th

  1   2   >