Re: [Xen-devel] [PATCH v2 2/2] x86/hvm: add support for pcommit instruction

2016-01-04 Thread Tian, Kevin
> From: Zhang, Haozhong > Sent: Tuesday, January 05, 2016 3:33 PM > > On 01/05/16 15:19, Tian, Kevin wrote: > > > From: Zhang, Haozhong > > > Sent: Tuesday, January 05, 2016 3:15 PM > > > > > > On 01/05/16 15:08, Tian, Kevin wrote: > > > > > From: Zhang, Haozhong > > > > > Sent: Wednesday, Decembe

Re: [Xen-devel] [PATCH v2 2/2] x86/hvm: add support for pcommit instruction

2016-01-04 Thread Zhang, Haozhong
On 01/05/16 15:19, Tian, Kevin wrote: > > From: Zhang, Haozhong > > Sent: Tuesday, January 05, 2016 3:15 PM > > > > On 01/05/16 15:08, Tian, Kevin wrote: > > > > From: Zhang, Haozhong > > > > Sent: Wednesday, December 30, 2015 7:49 PM > > > > > > > > Pass PCOMMIT CPU feature into HMV domain. Curre

[Xen-devel] [seabios baseline-only test] 38591: tolerable FAIL

2016-01-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38591 seabios real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38591/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1

Re: [Xen-devel] [PATCH v2 2/2] x86/hvm: add support for pcommit instruction

2016-01-04 Thread Tian, Kevin
> From: Zhang, Haozhong > Sent: Tuesday, January 05, 2016 3:15 PM > > On 01/05/16 15:08, Tian, Kevin wrote: > > > From: Zhang, Haozhong > > > Sent: Wednesday, December 30, 2015 7:49 PM > > > > > > Pass PCOMMIT CPU feature into HMV domain. Currently, we do not intercept > > > pcommit instruction fo

Re: [Xen-devel] [PATCH v2 2/2] x86/hvm: add support for pcommit instruction

2016-01-04 Thread Zhang, Haozhong
On 01/05/16 15:08, Tian, Kevin wrote: > > From: Zhang, Haozhong > > Sent: Wednesday, December 30, 2015 7:49 PM > > > > Pass PCOMMIT CPU feature into HMV domain. Currently, we do not intercept > > pcommit instruction for L1 guest, and allow L1 to intercept pcommit > > instruction for L2 guest. > >

Re: [Xen-devel] [PATCH v2 2/2] x86/hvm: add support for pcommit instruction

2016-01-04 Thread Tian, Kevin
> From: Zhang, Haozhong > Sent: Wednesday, December 30, 2015 7:49 PM > > Pass PCOMMIT CPU feature into HMV domain. Currently, we do not intercept > pcommit instruction for L1 guest, and allow L1 to intercept pcommit > instruction for L2 guest. Could you elaborate why different policies are used f

Re: [Xen-devel] [PATCH v2 1/2] x86/hvm: allow guest to use clflushopt and clwb

2016-01-04 Thread Tian, Kevin
> From: Zhang, Haozhong > Sent: Wednesday, December 30, 2015 7:49 PM > > Pass CPU features CLFLUSHOPT and CLWB into HVM domain so that those two > instructions can be used by guest. > > The specification of above two instructions can be found in > https://software.intel.com/sites/default/files/ma

Re: [Xen-devel] Xen 4.7 Development Update

2016-01-04 Thread Chun Yan Liu
>>> On 1/4/2016 at 06:15 PM, in message , Wei Liu wrote: > This email only tracks big items for xen.git tree. Please reply for items you > woulk like to see in 4.7 so that people have an idea what is going on and > prioritise accordingly. > > You're welcome to provide description and use c

Re: [Xen-devel] [PATCH] x86/vmx: Fix injection of #DB traps following XSA-156

2016-01-04 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Monday, January 04, 2016 6:00 PM > > Most #DB exceptions are traps rather than faults, meaning that the instruction > pointer in the exception frame points after the instruction rather than at it. > > However, VMX intercepts all hav

Re: [Xen-devel] [PATCH v5] x86/VPMU: implement ipc and arch filter flags

2016-01-04 Thread Tian, Kevin
> From: Brendan Gregg [mailto:bgr...@netflix.com] > Sent: Tuesday, January 05, 2016 9:44 AM > > This introduces a way to have a restricted VPMU, by specifying one of two > predefined groups of PMCs to make available. For secure environments, this > allows the VPMU to be used without needing to ena

Re: [Xen-devel] [XenGT][IGVT-g] Device model creation failed

2016-01-04 Thread Tian, Kevin
For below error: [ 5023.070461] vGT error:(g2h_gm_range:1660) VM(21): invalid address range: g_addr(0x1000), size(0x1000) Likely you didn’t use a XenGT-aware i915 driver inside VM, which is required e.g. to handle address space ballooning. A simple way is to copy same Dom0 kernel/initrd/module

[Xen-devel] [linux-3.16 baseline-only test] 38589: regressions - FAIL

2016-01-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38589 linux-3.16 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38589/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu 14 guest-stop

[Xen-devel] [qemu-upstream-4.6-testing test] 76942: regressions - trouble: broken/fail/pass

2016-01-04 Thread osstest service owner
flight 76942 qemu-upstream-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/76942/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 63071 test-am

Re: [Xen-devel] [PATCH v2 15/32] powerpc: define __smp_xxx

2016-01-04 Thread Boqun Feng
Hi Michael, On Thu, Dec 31, 2015 at 09:07:42PM +0200, Michael S. Tsirkin wrote: > This defines __smp_xxx barriers for powerpc > for use by virtualization. > > smp_xxx barriers are removed as they are > defined correctly by asm-generic/barriers.h > > This reduces the amount of arch-specific boile

Re: [Xen-devel] [PATCH v3 47/62] arm/p2m: Add helper functions to map memory regions

2016-01-04 Thread Shannon Zhao
On 2015/11/30 23:22, Julien Grall wrote: > Hi, > > On 27/11/15 12:04, Stefano Stabellini wrote: >> > On Tue, 17 Nov 2015, shannon.z...@linaro.org wrote: >>> >> From: Parth Dixit >>> >> >>> >> Create a helper function for mapping with cached attributes. >>> >> >>> >> Signed-off-by: Parth Dixit

[Xen-devel] [PATCH v2 2/2] xen: convert XSM_ENABLE to Kconfig

2016-01-04 Thread Doug Goldstein
Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM within Kconfig. This also re-adds the dependency of CONFIG_FLASK on CONFIG_XSM. CC: Daniel De Graaf CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Doug Goldstein Acked-by: Daniel De Graaf --- Change from v2:

[Xen-devel] [xen-unstable test] 76919: regressions - FAIL

2016-01-04 Thread osstest service owner
flight 76919 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/76919/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 66879 Tes

Re: [Xen-devel] [PATCH 2/2] pc-nvdimm acpi: build ACPI tables for pc-nvdimm devices

2016-01-04 Thread Haozhong Zhang
On 01/04/16 16:01, Stefano Stabellini wrote: > CC'ing the Xen tools maintainers and Anthony. > > On Tue, 29 Dec 2015, Haozhong Zhang wrote: > > Reuse existing NVDIMM ACPI code to build ACPI tables for pc-nvdimm > > devices. The resulting tables are then copied into Xen guest domain so > > tha they

[Xen-devel] [PATCH v2 5/5] tools/libxl: remove unused function libxl__domain_save_device_model()

2016-01-04 Thread Wen Congyang
After the commit d77570e7, libxl__domain_save_device_model() can be dropped. Signed-off-by: Wen Congyang --- tools/libxl/libxl_dom.c | 91 tools/libxl/libxl_internal.h | 3 -- 2 files changed, 94 deletions(-) diff --git a/tools/libxl/libxl_dom.

[Xen-devel] [qemu-upstream-4.4-testing test] 76944: regressions - FAIL

2016-01-04 Thread osstest service owner
flight 76944 qemu-upstream-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/76944/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 62702 test-am

[Xen-devel] [PATCH v2 4/5] tools/libxc: error handling for the postcopy() callback

2016-01-04 Thread Wen Congyang
Signed-off-by: Wen Congyang --- tools/libxc/xc_sr_save.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/tools/libxc/xc_sr_save.c b/tools/libxc/xc_sr_save.c index 76ebb34..8090fcf 100644 --- a/tools/libxc/xc_sr_save.c +++ b/tools/libxc/xc_sr_save.c @@ -786,7 +786,9 @@ stati

[Xen-devel] [PATCH v2 3/5] tools/libxc: don't send end record if remus fails

2016-01-04 Thread Wen Congyang
Signed-off-by: Wen Congyang Reviewed-by: Andrew Cooper --- tools/libxc/xc_sr_save.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/libxc/xc_sr_save.c b/tools/libxc/xc_sr_save.c index cefcef5..76ebb34 100644 --- a/tools/libxc/xc_sr_save.c +++ b/tools/libxc/xc_sr_save.c

[Xen-devel] [PATCH v2 2/5] remus: don't write xenstore data if it fails

2016-01-04 Thread Wen Congyang
For example: if the secondary host is down, and we fail to send the data to the secondary host. xc_domain_save() returns 0. So in the function libxl__xc_domain_save_done(), rc is 0(the helper program exits normally), and retval is 0(it is xc_domain_save()'s return value). In such case, we just need

[Xen-devel] [PATCH v2 0/5] migration/remus: bug fix and cleanup

2016-01-04 Thread Wen Congyang
Wen Congyang (5): remus: don't call stream_continue() when doing failover remus: don't write xenstore data if it fails tools/libxc: don't send end record if remus fails tools/libxc: error handling for the postcopy() callback tools/libxl: remove unused function libxl__domain_save_device_mo

[Xen-devel] [PATCH v2 1/5] remus: don't call stream_continue() when doing failover

2016-01-04 Thread Wen Congyang
stream_continue() is used for migration to read emulator xenstore data and emulator context. For remus, if we do failover, we have read it in the checkpoint cycle, and we only need to complete the stream. Signed-off-by: Wen Congyang Reviewed-by: Andrew Cooper --- tools/libxl/libxl_stream_read.c

[Xen-devel] [PATCH v5] x86/VPMU: implement ipc and arch filter flags

2016-01-04 Thread Brendan Gregg
This introduces a way to have a restricted VPMU, by specifying one of two predefined groups of PMCs to make available. For secure environments, this allows the VPMU to be used without needing to enable all PMCs. Signed-off-by: Brendan Gregg Reviewed-by: Boris Ostrovsky --- Changes in v5: * addre

Re: [Xen-devel] [PATCH v4 2/2] x86/VPMU: implement ipc and arch filter flags

2016-01-04 Thread Brendan Gregg
Sorry for the delay... On Thu, Dec 17, 2015 at 10:12 PM, Tian, Kevin wrote: > > From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > > Sent: Tuesday, December 08, 2015 3:14 AM > > > > On 11/30/2015 07:39 PM, Brendan Gregg wrote: > > > This introduces a way to have a restricted VPMU, by sp

Re: [Xen-devel] [PATCH 0/2] add vNVDIMM support for Xen

2016-01-04 Thread Haozhong Zhang
On 01/04/16 15:56, Stefano Stabellini wrote: > On Tue, 29 Dec 2015, Haozhong Zhang wrote: > > This patch series extends current vNVDIMM implementation to provide > > vNVDIMM to HVM domains when QEMU is used as the device model of Xen. > > > > This patch series is based on upstream qemu rather of q

Re: [Xen-devel] [PATCH 0/2] add vNVDIMM support for Xen

2016-01-04 Thread Haozhong Zhang
On 01/04/16 15:57, Stefano Stabellini wrote: > On Tue, 29 Dec 2015, Xiao Guangrong wrote: > > On 12/29/2015 07:28 PM, Haozhong Zhang wrote: > > > This patch series extends current vNVDIMM implementation to provide > > > vNVDIMM to HVM domains when QEMU is used as the device model of Xen. > > > > >

Re: [Xen-devel] [PATCH v3 08/13] x86/hvm: Setup TSC scaling ratio

2016-01-04 Thread Haozhong Zhang
On 01/04/16 13:40, Boris Ostrovsky wrote: > On 12/30/2015 10:03 PM, Haozhong Zhang wrote: > >This patch adds a field tsc_scaling_ratio in struct hvm_vcpu to > >record the TSC scaling ratio, and sets it up when tsc_set_info() is > >called for a vcpu or when a vcpu is restored or reset. > > > >Before

Re: [Xen-devel] [PATCH v3 07/13] x86: Add functions for 64-bit integer arithmetic

2016-01-04 Thread Haozhong Zhang
On 01/04/16 13:26, Boris Ostrovsky wrote: > On 12/30/2015 10:03 PM, Haozhong Zhang wrote: > >This patch adds several functions to take multiplication, division and > >shifting involving 64-bit integers. Those functions are derived from > >Linux kernel and will be used by later patches to calculate

[Xen-devel] [PATCH V2 2/3] xenconfig: support vif bandwidth in xm and xl parser and formatter

2016-01-04 Thread Jim Fehlig
Both xm and xl config have long supported specifying vif rate limiting, e.g. vif = [ 'mac=00:16:3E:74:3d:76,bridge=br0,rate=10MB/s' ] Add support for mapping rate to and from in the xenconfig parser and formatter. rate is mapped to the required 'average' attribute of the element, e.g. .

[Xen-devel] [PATCH V2 0/3] Xen: Support vif outging bandwidth QoS

2016-01-04 Thread Jim Fehlig
Happy New Year! This small series adds support for specifying vif outgoing rate limits in Xen. The first patch adds support for converting rate limits between sexpr config and domXML. The second patch does the same for xl/xm config. The third patch adds outgoing rate limiting to the libxl driver.

[Xen-devel] [PATCH V2 3/3] libxl: support vif outgoing bandwidth QoS

2016-01-04 Thread Jim Fehlig
The libxl_device_nic structure supports specifying an outgoing rate limit based on a time interval and bytes allowed per interval. In xl config a rate limit is specified as "/s@". INTERVAL is optional and defaults to 50ms. libvirt expresses outgoing limits by average (required), peak, burst, and f

[Xen-devel] [PATCH V2 1/3] xenconfig: support vif bandwidth in sexpr parser and formatter

2016-01-04 Thread Jim Fehlig
The xen sexpr config format has long supported specifying vif rate limiting, e.g. (device (vif (mac '00:16:3e:1b:b1:47') (rate '10240KB/s') ... ) ) Add support for mapping rate to and from in the xenconfig sexpr parser and formatter. rate is mapped to the required '

Re: [Xen-devel] [PATCH v3 04/13] x86/time.c: Scale host TSC in pvclock properly

2016-01-04 Thread Haozhong Zhang
On 01/04/16 13:09, Boris Ostrovsky wrote: > On 12/30/2015 10:03 PM, Haozhong Zhang wrote: > >This patch makes the pvclock return the scaled host TSC and > >corresponding scaling parameters to HVM domains if guest TSC is not > >emulated and TSC scaling is enabled. > > > >Signed-off-by: Haozhong Zhan

[Xen-devel] [seabios test] 76941: tolerable FAIL - PUSHED

2016-01-04 Thread osstest service owner
flight 76941 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/76941/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 67110 Tests which did not succeed, but a

Re: [Xen-devel] [PATCH v3 02/13] x86/time.c: Use correct guest TSC frequency in tsc_get_info()

2016-01-04 Thread Haozhong Zhang
On 01/04/16 12:48, Boris Ostrovsky wrote: > On 12/30/2015 10:03 PM, Haozhong Zhang wrote: > >When the TSC mode of a HVM container is TSC_MODE_DEFAULT or > >TSC_MODE_PVRDTSCP and no TSC emulation is used, the existing > >tsc_get_info() uses the host TSC frequency (cpu_khz) as the guest TSC > >freque

[Xen-devel] [xen-4.3-testing test] 76914: regressions - FAIL

2016-01-04 Thread osstest service owner
flight 76914 xen-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/76914/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-prev 5 xen-build fail REGR. vs. 65650 build-i386

Re: [Xen-devel] [PATCH v2 20/32] metag: define __smp_xxx

2016-01-04 Thread James Hogan
Hi Michael, On Thu, Dec 31, 2015 at 09:08:22PM +0200, Michael S. Tsirkin wrote: > This defines __smp_xxx barriers for metag, > for use by virtualization. > > smp_xxx barriers are removed as they are > defined correctly by asm-generic/barriers.h > > Note: as __smp_XX macros should not depend on C

Re: [Xen-devel] [PATCH v2 10/32] metag: reuse asm-generic/barrier.h

2016-01-04 Thread James Hogan
On Thu, Dec 31, 2015 at 09:07:02PM +0200, Michael S. Tsirkin wrote: > On metag dma_rmb, dma_wmb, smp_store_mb, read_barrier_depends, > smp_read_barrier_depends, smp_store_release and smp_load_acquire match > the asm-generic variants exactly. Drop the local definitions and pull in > asm-generic/bar

[Xen-devel] [linux-3.18 baseline-only test] 38588: regressions - FAIL

2016-01-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38588 linux-3.18 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38588/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rumpuserxen-i386 10 guest-start

Re: [Xen-devel] [PATCH 1/3] checkpatch.pl: add missing memory barriers

2016-01-04 Thread Joe Perches
On Mon, 2016-01-04 at 22:45 +0200, Michael S. Tsirkin wrote: > On Mon, Jan 04, 2016 at 08:07:40AM -0800, Joe Perches wrote: > > On Mon, 2016-01-04 at 13:36 +0200, Michael S. Tsirkin wrote: > > > SMP-only barriers were missing in checkpatch.pl > > > > > > Refactor code slightly to make adding more

Re: [Xen-devel] [PATCH 3/3] checkpatch: add virt barriers

2016-01-04 Thread Joe Perches
On Mon, 2016-01-04 at 23:07 +0200, Michael S. Tsirkin wrote: > On Mon, Jan 04, 2016 at 08:47:53AM -0800, Joe Perches wrote: > > On Mon, 2016-01-04 at 13:37 +0200, Michael S. Tsirkin wrote: > > > Add virt_ barriers to list of barriers to check for > > > presence of a comment. > > > > Are these virt

[Xen-devel] [xen-4.4-testing test] 76908: regressions - FAIL

2016-01-04 Thread osstest service owner
flight 76908 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/76908/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-prev 5 xen-build fail REGR. vs. 66458 build-i386-prev

Re: [Xen-devel] [PATCH RFC 2/3] x86/xen/time: setup vcpu 0 time info page

2016-01-04 Thread Boris Ostrovsky
On 01/04/2016 03:41 PM, Joao Martins wrote: On 01/04/2016 04:07 PM, Boris Ostrovsky wrote: On 12/28/2015 04:52 PM, Joao Martins wrote: + + size = PAGE_ALIGN(sizeof(struct pvclock_vsyscall_time_info)); + mem = memblock_alloc(size, PAGE_SIZE); + if (!mem) + retur

Re: [Xen-devel] [PATCH 2/2] pc-nvdimm acpi: build ACPI tables for pc-nvdimm devices

2016-01-04 Thread Konrad Rzeszutek Wilk
On Mon, Jan 04, 2016 at 04:01:08PM +, Stefano Stabellini wrote: > CC'ing the Xen tools maintainers and Anthony. > > On Tue, 29 Dec 2015, Haozhong Zhang wrote: > > Reuse existing NVDIMM ACPI code to build ACPI tables for pc-nvdimm > > devices. The resulting tables are then copied into Xen guest

Re: [Xen-devel] [PATCH 3/3] checkpatch: add virt barriers

2016-01-04 Thread Michael S. Tsirkin
On Mon, Jan 04, 2016 at 08:47:53AM -0800, Joe Perches wrote: > On Mon, 2016-01-04 at 13:37 +0200, Michael S. Tsirkin wrote: > > Add virt_ barriers to list of barriers to check for > > presence of a comment. > > Are these virt_ barriers used anywhere? > > I see some virtio_ barrier like uses. The

Re: [Xen-devel] Xen /dev/mcelog registration in Linux

2016-01-04 Thread Marek Marczykowski-Górecki
On Mon, Jan 04, 2016 at 03:49:11PM -0500, Konrad Rzeszutek Wilk wrote: > On Tue, Dec 15, 2015 at 02:54:31PM +0100, Marek Marczykowski-Górecki wrote: > > Hi, > > > > Booting kernel with both CONFIG_X86_MCE=y and CONFIG_XEN_MCE_LOG=y > > results in "mce: Unable to init device /dev/mcelog (rc: -16)"

Re: [Xen-devel] Xen /dev/mcelog registration in Linux

2016-01-04 Thread Konrad Rzeszutek Wilk
On Tue, Dec 15, 2015 at 02:54:31PM +0100, Marek Marczykowski-Górecki wrote: > Hi, > > Booting kernel with both CONFIG_X86_MCE=y and CONFIG_XEN_MCE_LOG=y > results in "mce: Unable to init device /dev/mcelog (rc: -16)" error. I > think that's because both drivers tries to register that character > d

Re: [Xen-devel] [PATCH 2/2] xen: convert XSM_ENABLE to Kconfig

2016-01-04 Thread Daniel De Graaf
On 04/01/16 15:33, Doug Goldstein wrote: On 1/4/16 2:01 PM, Daniel De Graaf wrote: On 22/12/15 16:26, Doug Goldstein wrote: Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM within Kconfig. This also re-adds the dependency of CONFIG_FLASK on CONFIG_XSM. CC: Keir Fraser CC: Ja

Re: [Xen-devel] [PATCH 1/3] checkpatch.pl: add missing memory barriers

2016-01-04 Thread Michael S. Tsirkin
On Mon, Jan 04, 2016 at 08:07:40AM -0800, Joe Perches wrote: > On Mon, 2016-01-04 at 13:36 +0200, Michael S. Tsirkin wrote: > > SMP-only barriers were missing in checkpatch.pl > > > > Refactor code slightly to make adding more variants easier. > > > > Signed-off-by: Michael S. Tsirkin > > --- >

Re: [Xen-devel] [PATCH v2 06/32] s390: reuse asm-generic/barrier.h

2016-01-04 Thread Michael S. Tsirkin
On Mon, Jan 04, 2016 at 04:03:39PM +0100, Martin Schwidefsky wrote: > On Mon, 4 Jan 2016 14:20:42 +0100 > Peter Zijlstra wrote: > > > On Thu, Dec 31, 2015 at 09:06:30PM +0200, Michael S. Tsirkin wrote: > > > On s390 read_barrier_depends, smp_read_barrier_depends > > > smp_store_mb(), smp_mb__befo

[Xen-devel] [xen-unstable-smoke test] 77025: tolerable all pass - PUSHED

2016-01-04 Thread osstest service owner
flight 77025 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/77025/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH RFC 2/3] x86/xen/time: setup vcpu 0 time info page

2016-01-04 Thread Joao Martins
On 01/04/2016 04:07 PM, Boris Ostrovsky wrote: > On 12/28/2015 04:52 PM, Joao Martins wrote: >> + >> +static int xen_setup_vsyscall_time_info(int cpu) >> +{ >> +struct pvclock_vsyscall_time_info *ti; >> +struct vcpu_register_time_memory_area t; >> +struct pvclock_vcpu_time_info *pvti;

Re: [Xen-devel] [PATCH RFC 3/3] xen/Kconfig: add XEN_TIME_VSYSCALL option

2016-01-04 Thread Joao Martins
On 01/04/2016 04:15 PM, Boris Ostrovsky wrote: > On 01/04/2016 11:12 AM, David Vrabel wrote: >> On 28/12/15 21:52, Joao Martins wrote: >>> This option enables support for pvclock vsyscall/vdso >>> support on Xen. Default is off, since Xen doesn't >>> expose yet the PVCLOCK_TSC_STABLE_BIT flag. >>

Re: [Xen-devel] [PATCH v2 17/32] arm: define __smp_xxx

2016-01-04 Thread Michael S. Tsirkin
On Mon, Jan 04, 2016 at 02:54:20PM +0100, Peter Zijlstra wrote: > On Mon, Jan 04, 2016 at 02:36:58PM +0100, Peter Zijlstra wrote: > > On Sun, Jan 03, 2016 at 11:12:44AM +0200, Michael S. Tsirkin wrote: > > > On Sat, Jan 02, 2016 at 11:24:38AM +, Russell King - ARM Linux wrote: > > > > > > My o

Re: [Xen-devel] [PATCH 2/2] xen: convert XSM_ENABLE to Kconfig

2016-01-04 Thread Doug Goldstein
On 1/4/16 2:01 PM, Daniel De Graaf wrote: > On 22/12/15 16:26, Doug Goldstein wrote: >> Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM >> within Kconfig. This also re-adds the dependency of CONFIG_FLASK on >> CONFIG_XSM. >> >> CC: Keir Fraser >> CC: Jan Beulich >> CC: Andrew C

Re: [Xen-devel] [PATCH v2 06/32] s390: reuse asm-generic/barrier.h

2016-01-04 Thread Michael S. Tsirkin
On Mon, Jan 04, 2016 at 02:20:42PM +0100, Peter Zijlstra wrote: > On Thu, Dec 31, 2015 at 09:06:30PM +0200, Michael S. Tsirkin wrote: > > On s390 read_barrier_depends, smp_read_barrier_depends > > smp_store_mb(), smp_mb__before_atomic and smp_mb__after_atomic match the > > asm-generic variants exac

Re: [Xen-devel] [PATCH v2 22/32] s390: define __smp_xxx

2016-01-04 Thread Michael S. Tsirkin
On Mon, Jan 04, 2016 at 02:45:25PM +0100, Peter Zijlstra wrote: > On Thu, Dec 31, 2015 at 09:08:38PM +0200, Michael S. Tsirkin wrote: > > This defines __smp_xxx barriers for s390, > > for use by virtualization. > > > > Some smp_xxx barriers are removed as they are > > defined correctly by asm-gene

Re: [Xen-devel] [PATCH 2/3] public/io/netif.h: document control ring and toeplitz hashing

2016-01-04 Thread Konrad Rzeszutek Wilk
> > You've put the consumer values into the shared page. I'd rather not have > > to scrutinize your shared ring implementation for other security bugs. > > Similarly, if there's another security issues like XSA-155 I'd rather > > not have to look at another non-standard shared ring implementation.

Re: [Xen-devel] [PATCH v2 17/32] arm: define __smp_xxx

2016-01-04 Thread Michael S. Tsirkin
On Mon, Jan 04, 2016 at 02:36:58PM +0100, Peter Zijlstra wrote: > On Sun, Jan 03, 2016 at 11:12:44AM +0200, Michael S. Tsirkin wrote: > > On Sat, Jan 02, 2016 at 11:24:38AM +, Russell King - ARM Linux wrote: > > > > My only concern is that it gives people an additional handle onto a > > > "new

Re: [Xen-devel] [PATCH 2/2] xen: convert XSM_ENABLE to Kconfig

2016-01-04 Thread Daniel De Graaf
On 22/12/15 16:26, Doug Goldstein wrote: Converts the existing XSM_ENABLE flag from Config.mk to CONFIG_XSM within Kconfig. This also re-adds the dependency of CONFIG_FLASK on CONFIG_XSM. CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Doug Goldstein The dependencies for L

Re: [Xen-devel] [PATCH 1/2] xen: convert FLASK_ENABLE to Kconfig

2016-01-04 Thread Daniel De Graaf
On 22/12/15 16:26, Doug Goldstein wrote: Converts the Config.mk option of FLASK_ENABLE into a Kconfig option for the hypervisor called CONFIG_FLASK. This commit knowingly breaks the dependent relationship on XSM_ENABLE which is addressed when XSM_ENABLE is converted to Kconfig. Signed-off-by: Do

Re: [Xen-devel] blkback name greater than 16 characters issue

2016-01-04 Thread Konrad Rzeszutek Wilk
On Mon, Jan 04, 2016 at 04:13:57PM +, Ian Jackson wrote: > Konrad Rzeszutek Wilk writes ("blkback name greater than 16 characters > issue"): > > Way back in the past Jan pointed out this issue > > http://lists.xenproject.org/archives/html/xen-devel/2015-05/msg03505.html > > > > which is that

Re: [Xen-devel] [PATCH v4] igd-passthrough-i440FX: convert to realize()

2016-01-04 Thread Konrad Rzeszutek Wilk
On Mon, Jan 04, 2016 at 03:41:28PM +, Stefano Stabellini wrote: > On Mon, 4 Jan 2016, Lars Kurth wrote: > > On 04/01/2016 14:47, "Stefano Stabellini" > > wrote: > > > > >Unfortunately I don't have a setup to test this either. Maybe Lars can > > >find out who should be involved on the Intel si

Re: [Xen-devel] [PATCH v3 09/13] x86/hvm: Replace architecture TSC scaling by a common function

2016-01-04 Thread Boris Ostrovsky
On 12/30/2015 10:03 PM, Haozhong Zhang wrote: This patch implements a common function hvm_scale_tsc() to scale TSC by using TSC scaling information collected by architecture code. Signed-off-by: Haozhong Zhang Reviewed-by: Kevin Tian (except the mul64 part) Reviewed-by: Boris Ostrovsky _

Re: [Xen-devel] [PATCH v3 08/13] x86/hvm: Setup TSC scaling ratio

2016-01-04 Thread Boris Ostrovsky
On 12/30/2015 10:03 PM, Haozhong Zhang wrote: This patch adds a field tsc_scaling_ratio in struct hvm_vcpu to record the TSC scaling ratio, and sets it up when tsc_set_info() is called for a vcpu or when a vcpu is restored or reset. Before applying the TSC scaling ratio to CPU, we check its vali

[Xen-devel] [qemu-upstream-4.2-testing test] 76980: regressions - FAIL

2016-01-04 Thread osstest service owner
flight 76980 qemu-upstream-4.2-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/76980/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3865 xen-build fail REGR. vs. 62044 build-a

Re: [Xen-devel] [PATCH v3 07/13] x86: Add functions for 64-bit integer arithmetic

2016-01-04 Thread Boris Ostrovsky
On 12/30/2015 10:03 PM, Haozhong Zhang wrote: This patch adds several functions to take multiplication, division and shifting involving 64-bit integers. Those functions are derived from Linux kernel and will be used by later patches to calculate scaling ratio and scaled TSC. Signed-off-by: Haozh

Re: [Xen-devel] [PATCH v3 04/13] x86/time.c: Scale host TSC in pvclock properly

2016-01-04 Thread Boris Ostrovsky
On 12/30/2015 10:03 PM, Haozhong Zhang wrote: This patch makes the pvclock return the scaled host TSC and corresponding scaling parameters to HVM domains if guest TSC is not emulated and TSC scaling is enabled. Signed-off-by: Haozhong Zhang --- Changes in v3: (addressing Boris Ostrovsky's com

Re: [Xen-devel] question about migration

2016-01-04 Thread Andrew Cooper
On 04/01/16 17:46, Ian Jackson wrote: > Andrew Cooper writes ("Re: [Xen-devel] question about migration"): >> On 04/01/16 15:31, Ian Jackson wrote: >>> * It is not possible to resume the domain in the source after it has >>> suspended. >> This functionality exists and is already used in several c

Re: [Xen-devel] [PATCH v3 02/13] x86/time.c: Use correct guest TSC frequency in tsc_get_info()

2016-01-04 Thread Boris Ostrovsky
On 12/30/2015 10:03 PM, Haozhong Zhang wrote: When the TSC mode of a HVM container is TSC_MODE_DEFAULT or TSC_MODE_PVRDTSCP and no TSC emulation is used, the existing tsc_get_info() uses the host TSC frequency (cpu_khz) as the guest TSC frequency. However, tsc_set_info() may set the guest TSC fre

Re: [Xen-devel] question about migration

2016-01-04 Thread Ian Jackson
Andrew Cooper writes ("Re: [Xen-devel] question about migration"): > On 04/01/16 15:31, Ian Jackson wrote: > > * It is not possible to resume the domain in the source after it has > > suspended. > > This functionality exists and is already used in several circumstances, > both by libxl, and othe

Re: [Xen-devel] [PATCH v3 01/13] x86/time.c: Use correct guest TSC frequency in tsc_set_info()

2016-01-04 Thread Boris Ostrovsky
On 12/30/2015 10:03 PM, Haozhong Zhang wrote: When TSC_MODE_PVRDTSCP is used for a HVM container and TSC scaling is available, use the non-zero value of argument gtsc_khz of tsc_set_info() as the guest TSC frequency rather than using the host TSC frequency. Otherwise, TSC scaling will not be able

[Xen-devel] [xen-unstable-smoke test] 77012: tolerable all pass - PUSHED

2016-01-04 Thread osstest service owner
flight 77012 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/77012/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH v4 5/5] xl: Return error codes for pci* commands

2016-01-04 Thread Ian Jackson
George Dunlap writes ("[PATCH v4 5/5] xl: Return error codes for pci* commands"): > Add return codes for pci-detach, pci-attach, pci-asssignable-add, and > pci-assignable-remove. > > Returning error codes makes it easier for shell scripts to tell if a > command has failed or succeeded. > > NB th

Re: [Xen-devel] [PATCH v4 4/5] xl: Return an error on failed cd-insert

2016-01-04 Thread Ian Jackson
George Dunlap writes ("[PATCH v4 4/5] xl: Return an error on failed cd-insert"): > This makes xl more useful in scripts. Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v4 3/5] xl: Make set_memory_target return an error code on failure

2016-01-04 Thread Ian Jackson
George Dunlap writes ("[PATCH v4 3/5] xl: Make set_memory_target return an error code on failure"): > Also move the rc -> shell code translation into set_memory_max() to > make the two functions consistent with each other, and with other > similar examples in xl_cmdimpl.c Acked-by: Ian Jackson

Re: [Xen-devel] Xen Security Advisory 155 (CVE-2015-8550) - paravirtualized drivers incautious about shared memory

2016-01-04 Thread David Vrabel
On 04/01/16 16:56, Marek Marczykowski-Górecki wrote: > On Mon, Jan 04, 2016 at 04:22:32PM +, David Vrabel wrote: >> On 04/01/16 13:06, Marek Marczykowski-Górecki wrote: >>> On Tue, Dec 22, 2015 at 10:06:25AM -0500, Eric Shelton wrote: The XSA mentions that "PV frontend patches will be deve

Re: [Xen-devel] [PATCH v4 2/5] libxl: Fix libxl_set_memory_target return value

2016-01-04 Thread Ian Jackson
George Dunlap writes ("[PATCH v4 2/5] libxl: Fix libxl_set_memory_target return value"): > 2. Use 'r' for return values to functions whose return values are a > different error space (like xc_domain_setmaxmem and > xc_domain_set_pod_target), or where a failure means retry, rather than > fail the w

Re: [Xen-devel] [PATCH v4 1/5] libxl: Remove pointless hypercall from libxl_set_memory_target

2016-01-04 Thread Ian Jackson
George Dunlap writes ("[PATCH v4 1/5] libxl: Remove pointless hypercall from libxl_set_memory_target"): > There's no obvious reason for the call to xc_domain_getinfolist -- all > it seems to be doing is checking that the domain exists; but if it > doesn't exist, it will have already failed by this

[Xen-devel] [GIT PULL] (xen) stable/for-jens-4.5

2016-01-04 Thread Konrad Rzeszutek Wilk
Hey Jens, Please pull in your "for-4.5/drivers" branch the following branch: git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git stable/for-jens-4.5 which is based on "bcache: Change refill_dirty() to always scan entire disk if necessary" (the tip of your branch as of today) The pull

[Xen-devel] [3.16.y-ckt stable] Patch "x86/cpu: Fix SMAP check in PVOPS environments" has been added to staging queue

2016-01-04 Thread Luis Henriques
This is a note to let you know that I have just added a patch titled x86/cpu: Fix SMAP check in PVOPS environments to the linux-3.16.y-queue branch of the 3.16.y-ckt extended stable tree which can be found at: http://kernel.ubuntu.com/git/ubuntu/linux.git/log/?h=linux-3.16.y-queue This

Re: [Xen-devel] [Xen-users] Crashes on image file backed VMs

2016-01-04 Thread Stefano Stabellini
On Mon, 4 Jan 2016, Ian Campbell wrote: > On Sat, 2015-12-19 at 11:18 +, Andre Fucs wrote: > > Ian, > > > > Thanks for the reply. > > > > coredumpctl gbd PID_OF_PROCESS printed the following: > > A SIGBUS in QEMU's blk_handle_requests, how exciting! > > Copying xen-devel and some relevant maint

Re: [Xen-devel] [PATCH v5 COLOPre 00/18] Prerequisite patches for COLO

2016-01-04 Thread Ian Jackson
Wen Congyang writes ("[PATCH v5 COLOPre 00/18] Prerequisite patches for COLO"): > This patchset is Prerequisite for COLO feature. Refer to: > http://wiki.xen.org/wiki/COLO_-_Coarse_Grain_Lock_Stepping Thanks for this. I see no-one has replied yet. I wanted to reply to say that this is on my rada

Re: [Xen-devel] [PATCH] tools: allow configure time choice of libexec subdirectory.

2016-01-04 Thread Ian Jackson
Ian Campbell writes ("Re: [PATCH] tools: allow configure time choice of libexec subdirectory."): > I somehow slipped a stray ` in there and didn't notice, sorry. This looks like a reasonable change aside from that but we should definitely do some build tests at commit time. With the stray ` remo

Re: [Xen-devel] Xen Security Advisory 155 (CVE-2015-8550) - paravirtualized drivers incautious about shared memory

2016-01-04 Thread Marek Marczykowski-Górecki
On Mon, Jan 04, 2016 at 04:22:32PM +, David Vrabel wrote: > On 04/01/16 13:06, Marek Marczykowski-Górecki wrote: > > On Tue, Dec 22, 2015 at 10:06:25AM -0500, Eric Shelton wrote: > >> The XSA mentions that "PV frontend patches will be developed and > >> released (publicly) after the embargo dat

Re: [Xen-devel] [PATCH OSSTEST] Add a weekly coverity flight

2016-01-04 Thread Andrew Cooper
On 04/01/16 16:47, Ian Jackson wrote: > Ian Campbell writes ("[PATCH OSSTEST] Add a weekly coverity flight"): >> Move collectversions into Osstest::BuildSupport rather than >> duplicating with ts-xen-build (nothing else is really duplicated) > This could profitably be split into a separate patch IM

Re: [Xen-devel] [PATCH 3/3] checkpatch: add virt barriers

2016-01-04 Thread Joe Perches
On Mon, 2016-01-04 at 13:37 +0200, Michael S. Tsirkin wrote: > Add virt_ barriers to list of barriers to check for > presence of a comment. Are these virt_ barriers used anywhere? I see some virtio_ barrier like uses. ___ Xen-devel mailing list Xen-de

Re: [Xen-devel] [PATCH OSSTEST] Add a weekly coverity flight

2016-01-04 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST] Add a weekly coverity flight"): > Move collectversions into Osstest::BuildSupport rather than > duplicating with ts-xen-build (nothing else is really duplicated) This could profitably be split into a separate patch IMO. > For the cr-* integration we treat bra

[Xen-devel] [OSSTEST PATCH 0/2] ms-* html generation: Provide s

2016-01-04 Thread Ian Jackson
These two patches provide proper HTML titles for the planner output. I have tested them by running them in the Citrix Cambridge instance, where they are currently live. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

[Xen-devel] [OSSTEST PATCH 2/2] ms-* html generation: Provide right title for projection

2016-01-04 Thread Ian Jackson
When ms-queuedaemon generates a resource-projection.html, it sometimes does so from data-plan.pl (see proc report-plan). This means that ms-planner does not get a reliable indication of whether it is being run for the plan or the projection, and the resource-project.html sometimes claims to be the

[Xen-devel] [OSSTEST PATCH 1/2] ms-* html generation: Provide

2016-01-04 Thread Ian Jackson
This means that these browser windows will actually get titles! Signed-off-by: Ian Jackson --- ms-flights-summary |2 ++ ms-planner |5 - 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/ms-flights-summary b/ms-flights-summary index ec8fa18..ea72088 100755 --- a/

Re: [Xen-devel] [PATCH] xen/tools/get-fields.sh: Use printf for POSIX compat

2016-01-04 Thread Ian Campbell
On Mon, 2016-01-04 at 16:28 +, Ian Jackson wrote: > Alex Xu writes ("Re: [PATCH] xen/tools/get-fields.sh: Use printf for > POSIX compat"): > > Argh, claws mangled the formatting. Please ignore. > > Indeed.  But, your code is good.  When you repost please add my ack. Jan already committed it.

Re: [Xen-devel] [PATCH 5/5] libxl: Add explicit cast to libxl_psr_cat_set_cbm

2016-01-04 Thread Ian Campbell
On Mon, 2015-12-28 at 00:16 -0500, Joshua Otto wrote: > From: Chester Lin > > Fixes Coverity CID 1343299. The call to xc_psr_cat_set_domain_data() > expects type xc_psr_cat_type but is provided libxl_psr_cbm_type which > is defined in IDL. I assume the values are the same by construction in the

Re: [Xen-devel] [PATCH OSSTEST] Debian: Support runvar to set flask mode

2016-01-04 Thread Ian Jackson
Ian Campbell writes ("Re: [PATCH OSSTEST] Debian: Support runvar to set flask mode"): > On Mon, 2015-12-14 at 18:58 +, Ian Jackson wrote: > > I thought we were hoping to eventually do away with our copy of this > > file.  Has this change gone upstream ? > > Sadly there has not been a peep fro

Re: [Xen-devel] [PATCH 3/5] ns16550: widen an integer constant for Coverity.

2016-01-04 Thread Ian Campbell
On Mon, 2015-12-28 at 00:16 -0500, Joshua Otto wrote: Please check MAINTAINERS (perhaps using ./scripts/get_maintainers.pl) to determine the maintainers in order to CC them. (Hrm, I see now in your cover letter you have, I wonder why Jan et al are missing?) > From: Harley Armstrong > > Fix CID

Re: [Xen-devel] question about migration

2016-01-04 Thread Andrew Cooper
On 04/01/16 15:31, Ian Jackson wrote: > Andrew Cooper writes ("Re: [Xen-devel] question about migration"): >> On 25/12/2015 03:06, Wen Congyang wrote: >>> Another problem: >>> If migration fails after the guest is suspended, we will resume it in the >>> source. >>> In this case, we cannot shutdown

Re: [Xen-devel] [PATCH v2 3/3] xenstat: handle more than 1024 domains

2016-01-04 Thread Wei Liu
On Mon, Jan 04, 2016 at 03:55:53PM +0100, Juergen Gross wrote: > get_domain_ids() in libxenstat used by read_attributes_qdisk() is > limited to 1024 domains. Remove that limit. > > Signed-off-by: Juergen Gross Reviewed-by: Wei Liu > --- > tools/xenstat/libxenstat/src/xenstat_qmp.c | 67 > +++

  1   2   3   >