Re: [Xen-devel] [PATCH] smpboot: Add smpboot state variables instead of reusing CPU hotplug states

2015-11-06 Thread Paul E. McKenney
On Thu, Oct 15, 2015 at 01:32:44PM +0200, Daniel Wagner wrote: > The cpu hotplug state machine in smpboot.c is reusing the states from > cpu.h. That is confusing when it comes to the CPU_DEAD_FROZEN usage. > Paul explained to me that he was in need of an additional state > for destinguishing betwee

[Xen-devel] [qemu-mainline baseline-only test] 38257: tolerable FAIL

2015-11-06 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38257 qemu-mainline real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38257/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-qcow2 7 host-ping-check-xen

[Xen-devel] [linux-3.10 test] 63706: regressions - FAIL

2015-11-06 Thread osstest service owner
flight 63706 linux-3.10 real [real] http://logs.test-lab.xenproject.org/osstest/logs/63706/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 5 kernel-build fail REGR. vs. 62642 Tests which are failin

[Xen-devel] [linux-3.4 test] 63703: regressions - FAIL

2015-11-06 Thread osstest service owner
flight 63703 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/63703/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rumpuserxen-i386 6 xen-boot fail REGR. vs. 62277 test-amd64-i386-qemuu-r

[Xen-devel] [qemu-mainline test] 63705: tolerable FAIL - PUSHED

2015-11-06 Thread osstest service owner
flight 63705 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/63705/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds 11 guest-start fail like 63585 Tests which did not succeed,

[Xen-devel] [ovmf baseline-only test] 38256: all pass

2015-11-06 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38256 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38256/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf 45419de6ca5bad34567e0ca2a16a4bc78f6a6f63 baseline version: ovm

[Xen-devel] [ovmf test] 63704: all pass - PUSHED

2015-11-06 Thread osstest service owner
flight 63704 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/63704/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf 45419de6ca5bad34567e0ca2a16a4bc78f6a6f63 baseline version: ovmf b9ffeab7b0856db6409b53efbba51b8c336

[Xen-devel] [xen-unstable baseline-only test] 38255: tolerable FAIL

2015-11-06 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38255 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38255/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-rumpuserxen-amd64 13 rumpuserxen-demo-x

Re: [Xen-devel] Critique of the Xen Security Process

2015-11-06 Thread James Bulpin
On Fri, Nov 06, 2015, Joanna Rutkowska wrote > [snip] I was then asked to share some more > thoughts about how I thought Xen could actually improve its security > process [4]. Thanks Joanna for taking the time to put these thoughts into writing. I think there are a number of actionable things here

Re: [Xen-devel] [PATCH RFC] domain: Compile with lock_profile=y enabled.

2015-11-06 Thread Konrad Rzeszutek Wilk
On Thu, Nov 05, 2015 at 10:12:26AM -0700, Jan Beulich wrote: > >>> On 02.11.15 at 18:12, wrote: > > --- a/xen/arch/x86/domain.c > > +++ b/xen/arch/x86/domain.c > > @@ -237,6 +237,7 @@ struct domain *alloc_domain_struct(void) > > #ifdef CONFIG_BIGMEM > > const unsigned int bits = 0; > > #els

[Xen-devel] [PATCH v2 2/3] XENVER_build_id: Provide ld-embedded build-ids

2015-11-06 Thread Konrad Rzeszutek Wilk
From: Martin Pohlack The mechanism to get this is via the XENVER_build_id and we add a new subsequent sub-command to retrieve the binary build-id. The hypercall allows an arbitrary size (the buffer and len is provided to the hypervisor). Note that one can also retrieve the value by 'readelf -h x

[Xen-devel] [PATCH v2] Add build-id to XENVER hypercall.

2015-11-06 Thread Konrad Rzeszutek Wilk
Since v1 (http://lists.xen.org/archives/html/xen-devel/2015-10/msg01090.html) - Made it work on EFI - Compiles on ARM - Redid it per comments. Attached are the three patches that will add XENVER_build_id and add the proper bits in libxl/libxc. However they also change the behavior of the exist

[Xen-devel] [PATCH v2 3/3] libxl: info: Display build_id of the hypervisor.

2015-11-06 Thread Konrad Rzeszutek Wilk
If the hypervisor is built with we will display it. Signed-off-by: Konrad Rzeszutek Wilk --- v2: Include HAVE_*, use libxl_zalloc, s/rc/ret/ --- tools/libxl/libxl.c | 24 tools/libxl/libxl.h | 5 + tools/libxl/libxl_types.idl | 1 + tools/libxl/xl_c

[Xen-devel] [PATCH v2 1/3] xsm/xen_version: Add XSM for the xen_version hypercall.

2015-11-06 Thread Konrad Rzeszutek Wilk
All of XENVER_* have now an XSM check. The subops for XENVER_[compile_info|changeset|commandline| extraversion] are now priviliged operations. To not break guests we still return an string - but it is just ''. The rest: XENVER_[version|capabilities| parameters|get_features|page_size|guest_handle]

[Xen-devel] [xen-4.3-testing test] 63700: regressions - FAIL

2015-11-06 Thread osstest service owner
flight 63700 xen-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/63700/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-migrupgrade 21 guest-migrate/src_host/dst_host fail REGR. vs. 63212 Tests whic

Re: [Xen-devel] Xen on Arm Arndale Exynos5250

2015-11-06 Thread ed sandberg
> Does your kernel have the Xen drivers (CONFIG_XEN and all which is > gated on that) enabled. In particular CONFIG_HVC_XEN. > Yes the config file I used to compile has CONFIG_XEN=y and CONFIG_HVC_XEN=y. Config file is attached. # # Automatically generated file; DO NOT EDIT. # Linux/arm 4.3.0-rc

Re: [Xen-devel] Question about Xilinx ZynqMP

2015-11-06 Thread Meng Xu
HI Edgar, Thank you so much for your reply! 2015-11-06 13:25 GMT-05:00 Edgar E. Iglesias : > On Fri, Nov 06, 2015 at 01:19:04PM -0500, Meng Xu wrote: > > Hi, > > Hi Meng, > > > > > I saw Xen is supported on Xilinx ZynqMP platform at [1]. > > I want to have a look at the real hardware of the Xil

[Xen-devel] [linux-mingo-tip-master test] 63678: regressions - FAIL

2015-11-06 Thread osstest service owner
flight 63678 linux-mingo-tip-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/63678/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-debianhvm-amd64 6 xen-boot fail REGR. vs. 60684 test-amd64

Re: [Xen-devel] [PATCHv1 3/3] x86/ept: defer the invalidation until the p2m lock is released

2015-11-06 Thread Andrew Cooper
On 06/11/15 17:37, David Vrabel wrote: > out: > if ( fdom ) > rcu_unlock_domain(fdom); > return rc; > } > + > +int p2m_setup(void) > +{ > +unsigned int cpu; > + > +for_each_present_cpu(cpu) > +INIT_PAGE_LIST_HEAD(&per_cpu(p2m_deferred_free_pages, cpu)); > + > +

Re: [Xen-devel] [PATCHv1 1/3] x86/ept: remove unnecessary sync after resolving misconfigured entries

2015-11-06 Thread Andrew Cooper
On 06/11/15 17:37, David Vrabel wrote: > When using EPT, type changes are done with the following steps: > > 1. Set entry as invalid (misconfigured) by settings a reserved memory > type. > > 2. Flush all EPT and combined translations (ept_sync_domain()). > > 3. Fixup misconfigured entries as requir

Re: [Xen-devel] Question about Xilinx ZynqMP

2015-11-06 Thread Edgar E. Iglesias
On Fri, Nov 06, 2015 at 01:19:04PM -0500, Meng Xu wrote: > Hi, Hi Meng, > > I saw Xen is supported on Xilinx ZynqMP platform at [1]. > I want to have a look at the real hardware of the Xilinx ZynqMP > platform and probably buy on to play with it. > > However, after several googling, I couldn't

[Xen-devel] Question about Xilinx ZynqMP

2015-11-06 Thread Meng Xu
Hi, I saw Xen is supported on Xilinx ZynqMP platform at [1]. I want to have a look at the real hardware of the Xilinx ZynqMP platform and probably buy on to play with it. However, after several googling, I couldn't find anywhere to buy it. I'm wondering (a) if Xilinx has the real hardware now a

Re: [Xen-devel] [PATCH 4/4] docs: Document xenstore paths for domain network address information

2015-11-06 Thread Andrew Cooper
On 06/11/15 17:21, Paul Durrant wrote: > It is useful to be able to see the network addresses in use by a domain > for a particular vif in xenstore, for example so that ssh can be invoked > by a toolstack to log into the guest domain. > > This patch documents paths to allow a domain to advertise MA

Re: [Xen-devel] [PATCH 3/4] docs: Document xenstore paths for domain hotplug features

2015-11-06 Thread Andrew Cooper
On 06/11/15 17:21, Paul Durrant wrote: > Without some indication from an HVM domain it is not possible for a > toolstack to know whether instantiation of a new vbd or vif should > result in a new PV device of the appropriate type being instantiated > in a guest. (In other words whether PV drivers a

[Xen-devel] [BUG] Boot failures with mpt2sas / Intel RMS25JB080 module

2015-11-06 Thread Matthew Vernon
Hi, [These lists are in the MAINTAINERS file for mpt2sas; I hope this is the correct place to report this problem. Xen-devel CCd as this is failing on trying to boot Xen] When booting Xen, mpt2sas finds my Intel RMS25JB080, but fails to load it correctly. This is a Debian jessie (stable) system,

Re: [Xen-devel] [PATCH 2/4] docs: Document a xenstore path for PV driver version information...

2015-11-06 Thread Andrew Cooper
On 06/11/15 17:21, Paul Durrant wrote: > ...to be advertised by a guest. > > For domain management purposes it is convenient to be able to see > PV driver version information in xenstore. The XAPI toolstack in > XenServer has always created a ~/drivers path for this purpose. > > This patch document

[Xen-devel] [libvirt test] 63702: regressions - FAIL

2015-11-06 Thread osstest service owner
flight 63702 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/63702/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 5 libvirt-build fail REGR. vs. 63340 Tests which did not succe

[Xen-devel] [linux-3.18 test] 63676: regressions - FAIL

2015-11-06 Thread osstest service owner
flight 63676 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/63676/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 63369 Regre

Re: [Xen-devel] [PATCH 1/2] xen: move wallclock functions from x86 to common

2015-11-06 Thread Stefano Stabellini
On Thu, 5 Nov 2015, Jan Beulich wrote: > >>> On 05.11.15 at 17:57, wrote: > > --- a/xen/common/time.c > > +++ b/xen/common/time.c > > @@ -16,7 +16,13 @@ > > */ > > > > #include > > +#include > > +#include > > +#include > > #include > > +#include > > +#include > > + > > > > /* Nonze

[Xen-devel] [PATCHv1 1/3] x86/ept: remove unnecessary sync after resolving misconfigured entries

2015-11-06 Thread David Vrabel
When using EPT, type changes are done with the following steps: 1. Set entry as invalid (misconfigured) by settings a reserved memory type. 2. Flush all EPT and combined translations (ept_sync_domain()). 3. Fixup misconfigured entries as required (on EPT_MISCONFIG vmexits or when explicitly sett

[Xen-devel] [PATCHv1 3/3] x86/ept: defer the invalidation until the p2m lock is released

2015-11-06 Thread David Vrabel
Holding the p2m lock while calling ept_sync_domain() is very expensive since it does a on_selected_cpus() call. IPIs on many socket machines can be very slows and on_selected_cpus() is serialized. Defer the invalidate until the p2m lock is released. Since the processor may cache partial translat

[Xen-devel] [PATCHv1 2/3] mm: don't free pages until mm locks are released

2015-11-06 Thread David Vrabel
If a page is freed without translations being invalidated, and the page is subsequently allocated to another domain, a guest with a cached translation will still be able to access the page. Currently translations are invalidated before releasing the page ref, but while still holding the mm locks.

[Xen-devel] [RFC PATCHv1 0/3]: x86/ept: reduce translation invalidation impact

2015-11-06 Thread David Vrabel
This RFC series improves the performance of EPT by reducing the impact of the translation invalidations (ept_sync_domain()). Two approaches are used: a) Removing unnecessary invalidations after fixing misconfigured entries (after a type change). b) Deferring invalidations until the p2m write

[Xen-devel] [RFC PATCH] Feature doc: Added Feature Maturity Lifecycle

2015-11-06 Thread Lars Kurth
- Incorporated feedback from http://lists.xenproject.org/archives/html/xen-devel/2015-06/msg01992.html Open Issues: - Did not build and test the doc yet (want to get the content right first) - Decide on supported status in MAINTAINER file - Resolve loose ends on where and how to record Feature S

Re: [Xen-devel] [PATCH 2/4] docs: Document a path for PV driver version information...

2015-11-06 Thread Paul Durrant
> -Original Message- > From: Paul Durrant [mailto:paul.durr...@citrix.com] > Sent: 06 November 2015 17:22 > To: xen-de...@lists.xenproject.org > Cc: Paul Durrant > Subject: [PATCH 2/4] docs: Document a path for PV driver version > information... > > ...to be advertised by a guest. > > For

Re: [Xen-devel] [PATCH v12 3/3] iommu: add rmrr Xen command line option for extra rmrrs

2015-11-06 Thread Elena Ufimtseva
On Fri, Nov 06, 2015 at 04:05:25AM -0700, Jan Beulich wrote: > >>> On 06.11.15 at 05:22, wrote: > > On Wed, Oct 28, 2015 at 10:05:31AM -0600, Jan Beulich wrote: > >> >>> On 27.10.15 at 21:36, wrote: > >> > +static void __init add_extra_rmrr(void) > >> > +{ > >> > +struct acpi_rmrr_unit *acpi_

[Xen-devel] [PATCH 2/4] docs: Document a xenstore path for PV driver version information...

2015-11-06 Thread Paul Durrant
...to be advertised by a guest. For domain management purposes it is convenient to be able to see PV driver version information in xenstore. The XAPI toolstack in XenServer has always created a ~/drivers path for this purpose. This patch documents that path and also adds a specification of how it

[Xen-devel] [PATCH 3/4] docs: Document xenstore paths for domain hotplug features

2015-11-06 Thread Paul Durrant
Without some indication from an HVM domain it is not possible for a toolstack to know whether instantiation of a new vbd or vif should result in a new PV device of the appropriate type being instantiated in a guest. (In other words whether PV drivers are present and functioning). This patch docume

[Xen-devel] [PATCH 2/4] docs: Document a path for PV driver version information...

2015-11-06 Thread Paul Durrant
...to be advertised by a guest. For domain management purposes it is convenient to be able to see PV driver version information in xenstore. The XAPI toolstack in XenServer has always created a ~/drivers path for this purpose. This patch documents that path and also adds a specification of how it

[Xen-devel] [PATCH 4/4] docs: Document xenstore paths for domain network address information

2015-11-06 Thread Paul Durrant
It is useful to be able to see the network addresses in use by a domain for a particular vif in xenstore, for example so that ssh can be invoked by a toolstack to log into the guest domain. This patch documents paths to allow a domain to advertise MAC (unicast and multicast) and IP (versions 4 and

[Xen-devel] [PATCH 0/4] docs: Document xenstore paths

2015-11-06 Thread Paul Durrant
Patch #1 documents paths, some already in used by XenServer, which can be used by guests to advertise contol capabilities. Patch #2 documents paths which can be used to advertise PV driver versions. Patch #3 documents paths which can be used by guests to advertise hotplug capabilities. Patch #4

[Xen-devel] Critique of the Xen Security Process

2015-11-06 Thread Joanna Rutkowska
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello, Recently Xen has released the XSA-148 advisory [1] addressing a fatal bug in the hypervisor. The bug has been lurking there for the last 7 years! We, the Qubes OS Project, have commented on this in our Security Bulletin #22 [2]. And far from en

[Xen-devel] [PATCH 1/4] docs: Document control features the can be advertised by guests...

2015-11-06 Thread Paul Durrant
...via xenstore. XenServer already makes use of ~/control/feature-suspend being written to advertise guest capability of responding to 'suspend' when written to ~/control/shutdown and, since they are derived from XenServer drivers, the Xen Project Windows PV drivers attempt to write this value. Th

[Xen-devel] [xen-unstable-smoke test] 63720: tolerable all pass - PUSHED

2015-11-06 Thread osstest service owner
flight 63720 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/63720/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-xl 12 migrate-support-checkfail never pass test-armhf-armhf-xl 13

Re: [Xen-devel] [PATCH v8 02/21] xen/vlapic: fixes for HVM code when running without a vlapic

2015-11-06 Thread Andrew Cooper
On 06/11/15 16:05, Roger Pau Monne wrote: > The HVM related code (SVM, VMX) generally assumed that a local apic is > always present. With the introduction of a HVM mode were the local apic can > be removed, some of this broken code paths arised. > > The SVM exit/resume paths unconditionally checked

[Xen-devel] [PATCH v8 18/21] libxc/xen: introduce a start info structure for HVMlite guests

2015-11-06 Thread Roger Pau Monne
This structure contains the physical address of the command line, as well as the physical address of the list of loaded modules. The physical address of this structure is passed to the guest at boot time in the %ebx register. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: We

[Xen-devel] [PATCH v8 17/21] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs

2015-11-06 Thread Roger Pau Monne
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and VCPUOP_is_up hypercalls from HVM guests. This patch introduces a new structure (vcpu_hvm_context) that should be used in conjuction with the VCPUOP_initialise hypercall in order to initialize vCPUs for HVM guests. Signed-off-by:

[Xen-devel] [PATCH v8 10/21] xen/x86: allow disabling the emulated VGA

2015-11-06 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v4: - Add Andrew Cooper Acked-by. --- xen/arch/x86/hvm/stdvga.c | 6 ++ 1 file changed, 6 insertions(+) diff --git a/xen/arch/x86/hvm/stdvga.c b/xen/arch/x86/hvm/stdvga.c index 02a9

[Xen-devel] [PATCH v8 02/21] xen/vlapic: fixes for HVM code when running without a vlapic

2015-11-06 Thread Roger Pau Monne
The HVM related code (SVM, VMX) generally assumed that a local apic is always present. With the introduction of a HVM mode were the local apic can be removed, some of this broken code paths arised. The SVM exit/resume paths unconditionally checked the state of the lapic, which is wrong if it's bee

[Xen-devel] [PATCH v8 12/21] xen/x86: allow disabling the emulated PIT

2015-11-06 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Reported by: Boris Ostrovsky Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v7: - Patch added. --- xen/arch/x86/hvm/i8254.c | 18 ++ 1 file changed, 18 insertions(+) diff --git a/xen/arch/x86/hvm/i8254.c b/xen/arch/x86/hvm/i8254.c index 8a9

[Xen-devel] [PATCH v8 15/21] elfnotes: intorduce a new PHYS_ENTRY elfnote

2015-11-06 Thread Roger Pau Monne
This new elfnote contains the 32bit entry point into the kernel. Xen will use this entry point in order to launch the guest kernel in 32bit protected mode with paging disabled. Signed-off-by: Roger Pau Monné Acked-by: Wei Liu Reviewed-by: Andrew Cooper Cc: Ian Jackson Cc: Stefano Stabellini C

[Xen-devel] [PATCH v8 00/21] Introduce HVM without dm and new boot ABI

2015-11-06 Thread Roger Pau Monne
This series is split in the following order: - Patches from 1 to 12 allow disabling the devices emulated inside of Xen, with the exception of patch 2 which is a bugfix for the vlapic. - Patches from 13 to 21 introduce the creation of HVM guests without a device model and without the devic

[Xen-devel] [PATCH v8 21/21] libxl: add support for migrating HVM guests without a device model

2015-11-06 Thread Roger Pau Monne
Only some minor libxl changes are needed in order to be able to migrate HVM guests without a device model, no hypervisor changes are needed. This change prevents sending the emulator context if the device model version is set to none. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Ian Campb

[Xen-devel] [PATCH v8 04/21] xen/x86: allow disabling the emulated HPET

2015-11-06 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v6: - Return ENODEV in hpet_load if the vhpet is disabled. Changes since v4: - Add Andrew Cooper Acked-by. --- xen/arch/x86/hvm/hpet.c | 13 + xen/arch/x86/hvm/hvm.c | 1

[Xen-devel] [PATCH v8 05/21] xen/x86: allow disabling power management

2015-11-06 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v7: - Add Andrew Cooper Reviewed-by. - Apply renaming from earlier patch (s/PMTIMER/PM/). Changes since v6: - Return ENODEV in pmtimer_load if the timer is disabled. - hvm_acpi_pow

[Xen-devel] [PATCH v8 19/21] libxc: switch xc_dom_elfloader to be used with HVMlite domains

2015-11-06 Thread Roger Pau Monne
Allow xc_dom_elfloader to report a guest type as hvm-3.0-x86_32 if it's running inside of a HVM container and has the PHYS32_ENTRY elfnote set. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu ---

[Xen-devel] [PATCH v8 06/21] xen/x86: allow disabling the emulated RTC

2015-11-06 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v6: - Return ENODEV in rtc_load if rtc is disabled. - Add checks to rtc_reset and rtc_update_clock to prevent calling them if rtc is disabled. Changes since v4: - Add Andrew Cooper

[Xen-devel] [PATCH v8 16/21] libxc: allow creating domains without emulated devices.

2015-11-06 Thread Roger Pau Monne
Introduce a new flag in xc_dom_image that turns on and off the emulated devices. This prevents creating the VGA hole, the hvm_info page and the ioreq server pages. libxl unconditionally sets it to true for all HVM domains at the moment. Signed-off-by: Roger Pau Monné Acked-by: Wei Liu Reviewed-b

[Xen-devel] [PATCH v8 20/21] libxl: allow the creation of HVM domains without a device model.

2015-11-06 Thread Roger Pau Monne
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM builder now uses the PV xc_dom_* set of functions this kernel will be parsed and loaded inside the guest like on PV, but the container is a pure HVM guest. Also, if device_model_version is set to none or a device model fo

[Xen-devel] [PATCH v8 11/21] xen/x86: allow disabling the emulated IOMMU

2015-11-06 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Acked-by: Aravind Gopalakrishnan Cc: Suravee Suthikulpanit Cc: Aravind Gopalakrishnan --- Changes since v4: - Add Andrew Cooper Acked-by. --- xen/drivers/passthrough/amd/iommu_guest.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(

[Xen-devel] [PATCH v8 01/21] xen/x86: add bitmap of enabled emulated devices

2015-11-06 Thread Roger Pau Monne
Introduce a bitmap in x86 xen_arch_domainconfig that allows enabling or disabling specific devices emulated inside of Xen for HVM guests. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Jan B

[Xen-devel] [PATCH v8 09/21] xen/x86: set the vPMU interface based on the presence of a lapic

2015-11-06 Thread Roger Pau Monne
Instead of choosing the interface to expose to guests based on the guest type, do it based on whether the guest has an emulated local apic or not. Signed-off-by: Roger Pau Monné Signed-off-by: Boris Ostrovsky Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v7: - Merge vpmu work from Boris

[Xen-devel] [PATCH v8 14/21] xen/x86: allow disabling all emulated devices inside of Xen

2015-11-06 Thread Roger Pau Monne
Only allow enabling or disabling all the emulated devices inside of Xen, right now Xen doesn't support enabling specific emulated devices only. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v7: - Rework if condition. Changes sin

[Xen-devel] [PATCH v8 13/21] xen/x86: make sure the HVM callback vector is correctly set

2015-11-06 Thread Roger Pau Monne
If certain devices (like the local or the io apic) are disabled some modes of operation of the HVM event channel callback cannot be used. Make sure Xen doesn't try to setup them. Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/irq.c | 4 1 file change

[Xen-devel] [PATCH v8 03/21] xen/x86: allow disabling the emulated local apic

2015-11-06 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Jan Beulich Cc: Jan Beulich Cc: Andrew Cooper Cc: Jun Nakajima Cc: Eddie Dong Cc: Kevin Tian --- Changes since v7: - Return 0 on vlapic_msr_set to note an error if the vlapic is disabled. - Add Andrew Cooper Reviewed-by.

[Xen-devel] [PATCH v8 07/21] xen/x86: allow disabling the emulated IO APIC

2015-11-06 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v6: - Return ENODEV in ioapic_load if the ioapic is disabled. - Add an assert to make sure vioapic_update_EOI and vioapic_irq_positive_edge is only called when the vioapic is enabled.

[Xen-devel] [PATCH v8 08/21] xen/x86: allow disabling the emulated PIC

2015-11-06 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v6: - Return ENODEV in vpic_load if the vpic is disabled. - Add asserts to vpic_irq_{negative/positive}_edge and vpic_ack_pending_irq to make sure they are not called when the vpic is

Re: [Xen-devel] [PATCH 1/3] xen/arm: introduce xen_read_wallclock

2015-11-06 Thread Arnd Bergmann
On Friday 06 November 2015 15:09:53 Stefano Stabellini wrote: > > > --- > > > +static void xen_read_wallclock(struct timespec *ts) > > > +{ > > > + u32 version; > > > + u64 delta; > > > + struct timespec now; > > > + struct shared_info *s = HYPERVISOR_shared_info; > > > + struct pvclock_w

Re: [Xen-devel] Xen on Arm Arndale Exynos5250

2015-11-06 Thread Ian Campbell
On Fri, 2015-11-06 at 08:38 -0600, ed sandberg wrote: Please don't top post. > Thanks for the help Ian, > # setenv xen_bootargs 'console=dtuart dtuart=/serial@12C2 > dom0_mem=512M' > # setenv dom0_bootargs 'console=hvc0 console=ttySAC2,115200n8 > ignore_loglevel psci=enable clk_ignore_unused

Re: [Xen-devel] [PATCH 1/3] xen/arm: introduce xen_read_wallclock

2015-11-06 Thread Stefano Stabellini
On Thu, 5 Nov 2015, Arnd Bergmann wrote: > On Thursday 05 November 2015 17:09:43 Stefano Stabellini wrote: > > Read the wallclock from the shared info page at boot time. > > > > Signed-off-by: Stefano Stabellini > > Please use the appropriate timespec64 based functions here, > we are in the proc

Re: [Xen-devel] [PATCH 3/3] xen/arm: set the system time in Xen via the XENPF_settime hypercall

2015-11-06 Thread Stefano Stabellini
On Thu, 5 Nov 2015, David Vrabel wrote: > On 05/11/15 17:09, Stefano Stabellini wrote: > > If Linux is running as dom0, call XENPF_settime to update the system > > time in Xen on pvclock_gtod notifications. > > Isn't this a cut-and-paste from x86? Can you make it common? Not exactly, for the way

Re: [Xen-devel] [PATCH 2/3] xen/arm: introduce HYPERVISOR_dom0_op on arm and arm64

2015-11-06 Thread Stefano Stabellini
On Thu, 5 Nov 2015, Jan Beulich wrote: > >>> On 05.11.15 at 18:09, wrote: > > --- a/arch/arm/xen/hypercall.S > > +++ b/arch/arm/xen/hypercall.S > > @@ -89,6 +89,7 @@ HYPERCALL2(memory_op); > > HYPERCALL2(physdev_op); > > HYPERCALL3(vcpu_op); > > HYPERCALL1(tmem_op); > > +HYPERCALL1(dom0_op); >

Re: [Xen-devel] [PATCH 1/3] xen/arm: introduce xen_read_wallclock

2015-11-06 Thread Stefano Stabellini
On Fri, 6 Nov 2015, Mark Rutland wrote: > > + delta = arch_timer_read_counter(); /* time since system boot */ > > + delta += now.tv_sec * (u64)NSEC_PER_SEC + now.tv_nsec; > > The arch counter value is not a number of nanoseconds (unless CNTFRQ > reads as 100), so this doesn't look rig

Re: [Xen-devel] Xen on Arm Arndale Exynos5250

2015-11-06 Thread ed sandberg
Thanks for the help Ian, I tried using ttySAC2 in /etc/init/ttySAC2.conf but I still am not prompted to login on the serial output. I also tried creating /etc/init/ttyhvc0.conf. I think that is the correct place to start getty from. There are other similar files in that location and this page:

Re: [Xen-devel] [PATCH RFC for-4.6 1/4] libxl: Move check for local access to a funciton

2015-11-06 Thread Wei Liu
This is sent by mistake. Please ignore this email until I finish the whole series. Wei. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 2/2] arm: export platform_op XENPF_settime

2015-11-06 Thread Stefano Stabellini
On Thu, 5 Nov 2015, David Vrabel wrote: > On 05/11/15 16:57, Stefano Stabellini wrote: > > +case XENPF_settime32: > > +do_settime(op->u.settime32.secs, > > + op->u.settime32.nsecs, > > + op->u.settime32.system_time); > > +break; > > I don't t

Re: [Xen-devel] [PATCH RFC for-4.6 1/4] libxl: Move check for local access to a funciton

2015-11-06 Thread Wei Liu
On Mon, Aug 10, 2015 at 08:11:22PM +0100, George Dunlap wrote: > Move pygrub checks for local access ability into a separate function. > > Also reorganize libxl__device_disk_local_initiate_attach so that we > don't initialize dls->disk unless we actually end up doing a local > attach. > > Signed-

Re: [Xen-devel] [PATCH v11 5/5] xen/arm: account for stolen ticks

2015-11-06 Thread Vitaly Kuznetsov
Mark Rutland writes: > On Fri, Nov 06, 2015 at 11:41:49AM +, David Vrabel wrote: >> On 06/11/15 11:39, Stefano Stabellini wrote: >> > On Thu, 5 Nov 2015, Mark Rutland wrote: >> >>> static void xen_percpu_init(void) >> >>> { >> >>> struct vcpu_register_vcpu_info info; >> >>> @@ -104

Re: [Xen-devel] [PATCH v11 5/5] xen/arm: account for stolen ticks

2015-11-06 Thread Vitaly Kuznetsov
David Vrabel writes: > On 06/11/15 11:39, Stefano Stabellini wrote: >> On Thu, 5 Nov 2015, Mark Rutland wrote: static void xen_percpu_init(void) { struct vcpu_register_vcpu_info info; @@ -104,6 +120,8 @@ static void xen_percpu_init(void) BUG_ON(err); per_c

[Xen-devel] [xen-unstable test] 63662: tolerable FAIL - PUSHED

2015-11-06 Thread osstest service owner
flight 63662 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/63662/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail like 63475 test-amd64-amd64-

Re: [Xen-devel] 2016 Xen Dev Summit Location (input needed before next Thu)

2015-11-06 Thread Lars Kurth
> On 6 Nov 2015, at 11:44, David Vrabel wrote: > > On 05/11/15 18:31, Lars Kurth wrote: >> Hi all, >> >> We have the following options * Hold it on Monday Oct 3 - to Tue Oct >> 4 : the problem is that Oct 3 is a public holiday in Germany, which >> would affect German participants > > The emai

Re: [Xen-devel] [win-pv-devel] 2016 Xen Dev Summit Location (input needed before next Thu)

2015-11-06 Thread Lars Kurth
> On 6 Nov 2015, at 11:24, Paul Durrant wrote: >> >> We have the following options >> * Hold it on Monday Oct 3 - to Tue Oct 4 : the problem is that Oct 3 is a >> public >> holiday in Germany, which would affect German participants >> * Do a 1 day event only on Oct 4 : I don't think this is pra

Re: [Xen-devel] [PATCH 1/3] xen/arm: introduce xen_read_wallclock

2015-11-06 Thread Mark Rutland
> + delta = arch_timer_read_counter(); /* time since system boot */ > + delta += now.tv_sec * (u64)NSEC_PER_SEC + now.tv_nsec; The arch counter value is not a number of nanoseconds (unless CNTFRQ reads as 100), so this doesn't look right; the units don't match. Thanks, Mark. ___

Re: [Xen-devel] [PATCH 4/4] xen/public: arm: rework the macro set_xen_guest_handle_raw

2015-11-06 Thread Ian Campbell
On Wed, 2015-11-04 at 16:50 +, Ian Jackson wrote: > Jan Beulich writes ("Re: [PATCH 4/4] xen/public: arm: rework the > macro set_xen_guest_handle_raw"): > > All quite interesting, but pretty moot with there not being any > > get_xen_guest_handle() anymore. > > If we don't provide a get_xen_gue

Re: [Xen-devel] [PATCH v11 1/5] xen: move xen_setup_runstate_info and get_runstate_snapshot to drivers/xen/time.c

2015-11-06 Thread Mark Rutland
On Fri, Nov 06, 2015 at 11:11:40AM +, Stefano Stabellini wrote: > On Thu, 5 Nov 2015, Mark Rutland wrote: > > Hi, > > > > > +static u64 get64(const u64 *p) > > > +{ > > > + u64 ret; > > > + > > > + if (BITS_PER_LONG < 64) { > > > + u32 *p32 = (u32 *)p; > > > + u32 h, l; > > > +

Re: [Xen-devel] [PATCH v11 5/5] xen/arm: account for stolen ticks

2015-11-06 Thread Mark Rutland
On Fri, Nov 06, 2015 at 11:41:49AM +, David Vrabel wrote: > On 06/11/15 11:39, Stefano Stabellini wrote: > > On Thu, 5 Nov 2015, Mark Rutland wrote: > >>> static void xen_percpu_init(void) > >>> { > >>> struct vcpu_register_vcpu_info info; > >>> @@ -104,6 +120,8 @@ static void xen_percpu_in

Re: [Xen-devel] 2016 Xen Dev Summit Location (input needed before next Thu)

2015-11-06 Thread David Vrabel
On 05/11/15 18:31, Lars Kurth wrote: > Hi all, > > We have the following options * Hold it on Monday Oct 3 - to Tue Oct > 4 : the problem is that Oct 3 is a public holiday in Germany, which > would affect German participants The email from Angela below says there's no rooms available on the Tues

Re: [Xen-devel] [PATCH v11 5/5] xen/arm: account for stolen ticks

2015-11-06 Thread Stefano Stabellini
On Thu, 5 Nov 2015, Mark Rutland wrote: > > static void xen_percpu_init(void) > > { > > struct vcpu_register_vcpu_info info; > > @@ -104,6 +120,8 @@ static void xen_percpu_init(void) > > BUG_ON(err); > > per_cpu(xen_vcpu, cpu) = vcpup; > > > > + xen_setup_runstate_info(cpu); > >

Re: [Xen-devel] [PATCH v11 5/5] xen/arm: account for stolen ticks

2015-11-06 Thread David Vrabel
On 06/11/15 11:39, Stefano Stabellini wrote: > On Thu, 5 Nov 2015, Mark Rutland wrote: >>> static void xen_percpu_init(void) >>> { >>> struct vcpu_register_vcpu_info info; >>> @@ -104,6 +120,8 @@ static void xen_percpu_init(void) >>> BUG_ON(err); >>> per_cpu(xen_vcpu, cpu) = vcpup; >>

Re: [Xen-devel] 2016 Xen Dev Summit Location (input needed before next Thu)

2015-11-06 Thread Juergen Gross
On Thu, 5 Nov 2015, Lars Kurth wrote: Hi all, I was just informed that it is not going to be possible to hold the Developer Summit alongside LinuxCon in Berlin, unless we make some hard choices. I had originally had booked the space and all looked fine when it was originally arranged several

Re: [Xen-devel] [PATCH v2 1/2] xen/serial: Move any OMAP specific things to OMAP UART driver

2015-11-06 Thread Jan Beulich
>>> On 05.11.15 at 18:53, wrote: > The 8250-uart.h contains extra serial register definitions > for the internal UARTs in TI OMAP SoCs which are used in > OMAP UART driver only. > In order to clean up code move these definitions to omap-uart.c. > Also rename some definitions to follow to the UART_

Re: [Xen-devel] 2016 Xen Dev Summit Location (input needed before next Thu)

2015-11-06 Thread Stefano Stabellini
On Thu, 5 Nov 2015, Lars Kurth wrote: > Hi all, > > I was just informed that it is not going to be possible to hold the Developer > Summit alongside LinuxCon in Berlin, unless we make some hard choices. I had > originally had booked the space and all looked fine when it was originally > arrange

Re: [Xen-devel] [win-pv-devel] 2016 Xen Dev Summit Location (input needed before next Thu)

2015-11-06 Thread Paul Durrant
> -Original Message- > From: win-pv-devel-boun...@lists.xenproject.org [mailto:win-pv-devel- > boun...@lists.xenproject.org] On Behalf Of Lars Kurth > Sent: 05 November 2015 18:31 > To: Xen-devel; mirageos-de...@xenproject.org; xen- > a...@lists.xenproject.org; win-pv-de...@lists.xenproject

Re: [Xen-devel] [PATCH v11 1/5] xen: move xen_setup_runstate_info and get_runstate_snapshot to drivers/xen/time.c

2015-11-06 Thread Stefano Stabellini
On Thu, 5 Nov 2015, Mark Rutland wrote: > Hi, > > > +static u64 get64(const u64 *p) > > +{ > > + u64 ret; > > + > > + if (BITS_PER_LONG < 64) { > > + u32 *p32 = (u32 *)p; > > + u32 h, l; > > + > > + /* > > +* Read high then low, and then make sure high

Re: [Xen-devel] [PATCH v12 3/3] iommu: add rmrr Xen command line option for extra rmrrs

2015-11-06 Thread Jan Beulich
>>> On 06.11.15 at 05:22, wrote: > On Wed, Oct 28, 2015 at 10:05:31AM -0600, Jan Beulich wrote: >> >>> On 27.10.15 at 21:36, wrote: >> > +static void __init add_extra_rmrr(void) >> > +{ >> > +struct acpi_rmrr_unit *acpi_rmrr; >> > +struct acpi_rmrr_unit *rmrru; >> > +unsigned int dev,

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 6

2015-11-06 Thread Stefano Stabellini
The document looks good to me. I would appreciate if the linux guys could give a look at the last three paragraphs under section 5. On Thu, 5 Nov 2015, Shannon Zhao wrote: > This document is going to explain the design details of Xen booting with > ACPI on ARM. Any comments are welcome. > > Chang

Re: [Xen-devel] [chg req] console: provide a way to send escape char

2015-11-06 Thread John Nemeth
On Nov 6, 10:37am, Wei Liu wrote: } On Fri, Nov 06, 2015 at 02:31:22AM -0800, John Nemeth wrote: } > I would like to request that there be a way in the xen console } > to send the escape char. The problem I faced was that I did: } > } > xl console } > domU> telnet } } As a workaround, you

Re: [Xen-devel] [chg req] console: provide a way to send escape char

2015-11-06 Thread Wei Liu
On Fri, Nov 06, 2015 at 02:31:22AM -0800, John Nemeth wrote: > I would like to request that there be a way in the xen console > to send the escape char. The problem I faced was that I did: > > xl console > domU> telnet As a workaround, you can try telnet -e escapechar ? > ... > >

Re: [Xen-devel] ovmf fail to compile

2015-11-06 Thread Wei Liu
On Fri, Nov 06, 2015 at 08:53:27AM +, Hao, Xudong wrote: > > -Original Message- > > From: Wei Liu [mailto:wei.l...@citrix.com] > > Sent: Wednesday, November 4, 2015 6:19 PM > > To: Hao, Xudong > > Cc: Wei Liu ; xen-devel@lists.xen.org > > Subject: Re: [Xen-devel] ovmf fail to compile >

[Xen-devel] [distros-debian-jessie test] 38254: tolerable all pass

2015-11-06 Thread Platform Team regression test user
flight 38254 distros-debian-jessie real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38254/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-armhf-jessie-netboot-pygrub 12 saverestore-support-check fail never pass test-armhf-ar

  1   2   >