Re: [Xen-devel] [PATCHv6 2/2] x86/ept: defer the invalidation until the p2m lock is released

2016-02-01 Thread Tian, Kevin
> From: David Vrabel [mailto:david.vra...@citrix.com] > Sent: Monday, February 01, 2016 10:50 PM > > On 20/12/15 06:56, Tian, Kevin wrote: > >> From: David Vrabel [mailto:david.vra...@citrix.com] > >> Sent: Friday, December 18, 2015 9:51 PM > >> > >> Holding the p2m lock while calling ept_sync_dom

Re: [Xen-devel] [PATCH v3 2/2] x86/hvm: Don't intercept #UD exceptions in general

2016-02-01 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Saturday, January 30, 2016 3:18 AM > > c/s 0f1cb96e "x86 hvm: Allow cross-vendor migration" caused HVM domains to > unconditionally intercept #UD exceptions. While cross-vendor migration is > cool as a demo, it is extremely niche. >

Re: [Xen-devel] [PATCH] xen: recalculate per-cpupool credits when updating timeslice

2016-02-01 Thread Alan Robinson
On Fri, Jan 29, 2016 at 11:21:48AM +0100, Juergen Gross wrote: > When modifying the timeslice of the credit scheduler in a cpupool the > cpupool global credit value (n_cpus * credits_per_tslice) isn't > recalculated. This will lead to wrong scheduling decisions later. > > Do the recalculation when

Re: [Xen-devel] [PATCH 1/2] x86/vmx: Don't clobber exception_bitmap when entering/leaving emulated real mode

2016-02-01 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Thursday, January 28, 2016 2:11 AM > > Most updates to the exception bitmaps set or clear an individual bits. > > However, entering or exiting emulated real mode unilaterally clobbers it, > leaving the exit code to recalculate what

Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support for Xen

2016-02-01 Thread Zhang, Haozhong
On 02/02/16 15:48, Tian, Kevin wrote: > > From: Zhang, Haozhong > > Sent: Tuesday, February 02, 2016 3:39 PM > > > > > btw, how is persistency guaranteed in KVM/QEMU, cross guest > > > power off/on? I guess since Qemu process is killed the allocated pmem > > > will be freed so you may switch to fi

Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support for Xen

2016-02-01 Thread Tian, Kevin
> From: Zhang, Haozhong > Sent: Tuesday, February 02, 2016 3:39 PM > > > btw, how is persistency guaranteed in KVM/QEMU, cross guest > > power off/on? I guess since Qemu process is killed the allocated pmem > > will be freed so you may switch to file-backed method to keep > > persistency (however

Re: [Xen-devel] [vfio-users] [PATCH v3 00/11] igd passthrough chipset tweaks

2016-02-01 Thread Gerd Hoffmann
Hi, > +realloc: > +opregion = malloc_high(size * 1024); memalign_high(PAGE_SIZE, size * 1024); > > I'd have qemu copy the data on 0xfc write then, so things continue to > > work without updating seabios. So, the firmware has to allocate space, > > reserve it etc., and programming the 0xf

Re: [Xen-devel] Xen 4.7 Development Update

2016-02-01 Thread Shuai Ruan
On Mon, Feb 01, 2016 at 12:19:23PM +, Wei Liu wrote: > On Mon, Feb 01, 2016 at 05:11:19AM -0700, Jan Beulich wrote: > > >>> On 01.02.16 at 11:45, wrote: > > > * xsave/xrtors support > > > - Shuai Ruan > > > > As per > > http://lists.xenproject.org/archives/html/xen-devel/2016-01/msg03264.

Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support for Xen

2016-02-01 Thread Zhang, Haozhong
Hi Kevin, Thanks for your review! On 02/02/16 14:33, Tian, Kevin wrote: > > From: Zhang, Haozhong > > Sent: Monday, February 01, 2016 1:44 PM > > > [...] > > > > 1.2 ACPI Support > > > > ACPI provides two factors of support for NVDIMM. First, NVDIMM > > devices are described by firmware (BIO

[Xen-devel] [PATCH V8 4/5] xen/mm: Clean up pfec handling in gva_to_gfn

2016-02-01 Thread Huaitong Han
From: George Dunlap At the moment, the pfec argument to gva_to_gfn has two functions: * To inform guest_walk what kind of access is happenind * As a value to pass back into the guest in the event of a fault. Unfortunately this is not quite treated consistently: the hvm_fetch_* function will "p

[Xen-devel] [PATCH V8 3/5] x86/hvm: pkeys, add xstate support for pkeys

2016-02-01 Thread Huaitong Han
The XSAVE feature set can operate on PKRU state only if the feature set is enabled (CR4.OSXSAVE = 1) and has been configured to manage PKRU state (XCR0[9] = 1). And XCR0.PKRU is disabled on PV mode without PKU feature enabled. Signed-off-by: Huaitong Han Reviewed-by: Andrew Cooper --- Changes in

[Xen-devel] [PATCH V8 0/5] x86/hvm: pkeys, add memory protection-key support

2016-02-01 Thread Huaitong Han
Changes in v8: *Add the comment describing for paging_gva_to_gfn. *Abstract out _write_cr4. Changes in v7: *Add static for pkey_fault. *Add a comment for page present check and adjust indentation. *Init pkru_ad and pkru_wd. *Delete l3e_get_pkey the outer parentheses. *The first parameter of read_p

[Xen-devel] [PATCH V8 1/5] x86/hvm: pkeys, disable pkeys for guests in non-paging mode

2016-02-01 Thread Huaitong Han
This patch disables pkeys for guest in non-paging mode, However XEN always uses paging mode to emulate guest non-paging mode, To emulate this behavior, pkeys needs to be manually disabled when guest switches to non-paging mode. Signed-off-by: Huaitong Han Reviewed-by: Andrew Cooper --- Changes i

[Xen-devel] [PATCH V8 5/5] x86/hvm: pkeys, add pkeys support for cpuid handling

2016-02-01 Thread Huaitong Han
This patch adds pkeys support for cpuid handing. Pkeys hardware support is CPUID.7.0.ECX[3]:PKU. software support is CPUID.7.0.ECX[4]:OSPKE and it reflects the support setting of CR4.PKE. X86_FEATURE_OSXSAVE depends on guest X86_FEATURE_XSAVE, but cpu_has_xsave function reflects hypervisor X86_FE

[Xen-devel] [PATCH V8 2/5] x86/hvm: pkeys, add pkeys support for guest_walk_tables

2016-02-01 Thread Huaitong Han
Protection keys define a new 4-bit protection key field(PKEY) in bits 62:59 of leaf entries of the page tables. PKRU register defines 32 bits, there are 16 domains and 2 attribute bits per domain in pkru, for each i (0 ≤ i ≤ 15), PKRU[2i] is the access-disable bit for protection key i (ADi); PKRU[

[Xen-devel] [PATCH 2/2] x86/xsave: use alternative asm on xsave side.

2016-02-01 Thread Shuai Ruan
This patch use alternavtive asm on the xsave side. As xsaves use modified optimization like xsaveopt, xsaves may not writing the FPU portion of the save image too. So xsaves also need some extra tweaks. Signed-off-by: Shuai Ruan --- xen/arch/x86/xstate.c | 49

[Xen-devel] [PATCH 0/2] use alternative asm on xsave side

2016-02-01 Thread Shuai Ruan
This patch add alternative_io_2/3 to support alternative with 2/3 features. Also use alternavitive asm on xsave side. Shuai Ruan (2): x86: add alternavive_io_2/3 to support alternative with 2/3 features. x86/xsave: use alternative asm on xsave side. xen/arch/x86/xstate.c | 49 +++

[Xen-devel] [PATCH 1/2] x86: add alternavive_io_2/3 to support alternative with 2/3 features.

2016-02-01 Thread Shuai Ruan
Most of the code is porting from linux with some changes. alternative_io_2 replaces old instruction with new instructions based on two features. alternative_io_3 replaces old instruction with new instructions based on three features. Signed-off-by: Shuai Ruan --- xen/include/asm-x86/alternative.

Re: [Xen-devel] [iGVT-g] [vfio-users] [PATCH v3 00/11] igd passthrough chipset tweaks

2016-02-01 Thread Tian, Kevin
> From: Kay, Allen M > Sent: Saturday, January 30, 2016 5:58 AM > > First of all, I would like to clarify I'm talking about general IGD > passthrough case - not > specific to KVMGT. In IGD passthrough configuration, one of the following > will happen > when the driver accesses OpRegion: > > 1)

Re: [Xen-devel] [iGVT-g] [vfio-users] [PATCH v3 00/11] igd passthrough chipset tweaks

2016-02-01 Thread Tian, Kevin
> From: Gerd Hoffmann > Sent: Monday, February 01, 2016 8:49 PM > > Hi, > > > Thanks for the tip that seabios allocated pages automatically become > > e820 reserved, that simplifies things a bit. > > It's common practice for all firmware. The e820 table from qemu is just > a starting point, i

[Xen-devel] gfn_lock() seems useless.

2016-02-01 Thread Zhangbo (Oscar)
Hi all: In patch e1e40bccee7490a01ac7d1f759ec2bbafd3c7185, it says that"many routines can logically assert holding the p2m *FOR A SPECIFIC GFN.*" , But I find out that it did nothing for locking a single gfn, in fact it still locked the entire p2m list. -#define p2m_lock_recursive(p) mm_lock_

[Xen-devel] [linux-linus test] 79778: regressions - FAIL

2016-02-01 Thread osstest service owner
flight 79778 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/79778/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-rumpuserxen6 xen-build fail REGR. vs. 59254 build-amd64-rumpuserx

[Xen-devel] [PATCH 1/1] xen-netfront: uninitialized fields in xenvif_rx_action

2016-02-01 Thread Dongli Zhang
While npo.copy and npo.meta are initialized in xenvif_rx_action, fields such as npo.meta_prod are directly used later in xenvif_gop_skb without being initialized first. Although the output of xenvif_rx_action is based on the difference between new npo->meta_prod and old npo->meta_prod, it is better

Re: [Xen-devel] [iGVT-g] [vfio-users] [PATCH v3 00/11] igd passthrough chipset tweaks

2016-02-01 Thread Tian, Kevin
> From: Kay, Allen M > Sent: Tuesday, February 02, 2016 8:04 AM > > > > David notes in the latter commit above: > > > > "We should be able to successfully assign graphics devices to guests too, as > > long as the initial handling of stolen memory is reconfigured > > appropriately." > > > > What co

Re: [Xen-devel] XSAVE flavors

2016-02-01 Thread Shuai Ruan
On Tue, Jan 26, 2016 at 08:12:20AM -0700, Jan Beulich wrote: > >>> On 26.01.16 at 15:33, wrote: > > originally I only meant to inquire about the state of the promised > > alternatives improvement to the XSAVE code. However, while > > looking over the code in question again I stumbled across a > >

Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support for Xen

2016-02-01 Thread Tian, Kevin
> From: Zhang, Haozhong > Sent: Monday, February 01, 2016 1:44 PM > [...] > > 1.2 ACPI Support > > ACPI provides two factors of support for NVDIMM. First, NVDIMM > devices are described by firmware (BIOS/EFI) to OS via ACPI-defined > NVDIMM Firmware Interface Table (NFIT). Second, several fun

[Xen-devel] [Bug] sched: credit2: Assertion failed

2016-02-01 Thread Tianyang Chen
The following script caused an unresponsive dom0 and it can not be reproduced all the time. The dom0 is using credit2 scheduler. #!/bin/bash xl cpupool-list -c xl cpupool-cpu-remove Pool-0 3 xl cpupool-cpu-remove Pool-0 2 xl cpupool-create name=\"r\" sched=\"credit\" xl cpupool-create name=\"t

Re: [Xen-devel] [PATCH v7 0/2] public/io/netif.h: support for toeplitz hashing

2016-02-01 Thread Bob Liu
Hi Paul, On 01/12/2016 05:58 PM, Paul Durrant wrote: > This series documents changes needed to support toeplitz hashing in a > backend, configurable by the frontend. > > Patch #1 adds further clarifications to the receive and transmit wire > formats. > > Patch #2 documents a new 'control ring' f

Re: [Xen-devel] [PATCH v11 1/2] vmx: VT-d posted-interrupt core logic handling

2016-02-01 Thread Wu, Feng
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Friday, January 29, 2016 5:32 PM > To: Wu, Feng > Cc: Andrew Cooper ; Dario Faggioli > ; George Dunlap ; > Tian, Kevin ; xen-devel@lists.xen.org; Keir Fraser > > Subject: RE: [PATCH v11 1/2] vmx: VT-d posted-int

Re: [Xen-devel] Error booting Xen

2016-02-01 Thread Shuai Ruan
On Wed, Jan 20, 2016 at 03:06:09AM -0700, Jan Beulich wrote: > >>> On 19.01.16 at 20:55, wrote: Sorry for late response. I am away from the mail list for a couple weeks. > > I tried booting staging branch but results were identical. Following > > line repeats endlessly. > > (XEN) traps.c:3290: GP

Re: [Xen-devel] [PATCH v3 2/5] libxl: make GC_FREE reachable in libxl_get_scheduler()

2016-02-01 Thread czylin
Quoting Ian Campbell : On Mon, 2016-01-25 at 11:59 +, Ian Campbell wrote: On Sun, 2016-01-24 at 19:45 -0500, Chester Lin wrote: > Coverity CID 1343309 > > Make GC_FREE reachable in all cases in libxl_get_scheduler() by > eliminating the error-path return and instead storing the error code i

[Xen-devel] 82599 passthrough problem

2016-02-01 Thread Norton.Zhu
Hi,all: I met a problem when passthrough 82599 to domU(for some reasons, I use pci passthrough not SRIOV). It works well after passthrough, but the host hung after destroy domU. Btw, no log prints even from serial port, but I found it hung afer unbind irq. anyone knows what's wrong with it? thank

Re: [Xen-devel] [PATCH V13 3/5] libxl: add pvusb API

2016-02-01 Thread Chun Yan Liu
>>> On 1/27/2016 at 12:21 AM, in message , George Dunlap wrote: > On Tue, Jan 26, 2016 at 7:43 AM, Chun Yan Liu wrote: > > > > > On 1/20/2016 at 12:56 PM, in message > > <569f83f502660009e...@relay2.provo.novell.com>, "Chun Yan Liu" > > wrote: > > > >> > > On 1/19/2016 at

Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support for Xen

2016-02-01 Thread Haozhong Zhang
On 02/01/16 18:25, Andrew Cooper wrote: > On 01/02/16 05:44, Haozhong Zhang wrote: > > Hi, > > > > The following document describes the design of adding vNVDIMM support > > for Xen. Any comments are welcome. > > > > Thanks, > > Haozhong > > Thankyou for doing this. It is a very comprehensive docu

Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support for Xen

2016-02-01 Thread Tian, Kevin
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Tuesday, February 02, 2016 2:25 AM > > On 01/02/16 05:44, Haozhong Zhang wrote: > > Hi, > > > > The following document describes the design of adding vNVDIMM support > > for Xen. Any comments are welcome. > > > > Thanks, > > Haozhong

[Xen-devel] [linux-next test] 79738: regressions - trouble: blocked/broken/fail/pass

2016-02-01 Thread osstest service owner
flight 79738 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/79738/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-xsm 11 guest-start fail REGR. vs. 79587 test-armhf-armhf-libvi

[Xen-devel] [ovmf test] 79772: regressions - FAIL

2016-02-01 Thread osstest service owner
flight 79772 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/79772/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 65543 test-amd64-i386-

Re: [Xen-devel] [PATCH v3 2/3] libxl: move begin phase job handling

2016-02-01 Thread Jim Fehlig
On 01/20/2016 12:00 PM, Joao Martins wrote: > . From libxlMigrationBegin to libxlDomainMigrateBegin3Params(). > This is a preparatory patch to be able to begin a job in the > perform phase. > > Signed-off-by: Joao Martins > --- > src/libxl/libxl_driver.c| 18 +- > src/libxl/li

Re: [Xen-devel] [PATCH v3 1/3] libxl: add p2p migration

2016-02-01 Thread Jim Fehlig
On 01/20/2016 12:00 PM, Joao Martins wrote: > Introduce support for VIR_MIGRATE_PEER2PEER in libvirt migration. > Most of the changes occur at the source and no modifications > at the receiver. > > In P2P mode there is only the Perform phase so we must handle > the connection with the destination a

[Xen-devel] [linux-3.14 baseline-only test] 38719: regressions - FAIL

2016-02-01 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38719 linux-3.14 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38719/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 6 xen-build

Re: [Xen-devel] [iGVT-g] [vfio-users] [PATCH v3 00/11] igd passthrough chipset tweaks

2016-02-01 Thread Kay, Allen M
> -Original Message- > From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Sunday, January 31, 2016 9:42 AM > To: Kay, Allen M; Gerd Hoffmann; David Woodhouse > Cc: igv...@ml01.01.org; xen-de...@lists.xensource.com; Eduardo Habkost; > Stefano Stabellini; qemu-de...@nongnu.or

Re: [Xen-devel] Clarifying PVH mode requirements

2016-02-01 Thread Brendan Gregg
On Mon, Feb 1, 2016 at 11:58 AM, Boris Ostrovsky wrote: > On 02/01/2016 02:27 PM, PGNet Dev wrote: > >> On 02/01/2016 11:14 AM, Boris Ostrovsky wrote: >> >>> Is 'HVMLite' replacing 'PVH'? Or are they separate modes? >>> >>> Yes, HVMlite is replacing PVH. Probably once we get dom0 support. >>

[Xen-devel] [linux-3.14 test] 79698: regressions - FAIL

2016-02-01 Thread osstest service owner
flight 79698 linux-3.14 real [real] http://logs.test-lab.xenproject.org/osstest/logs/79698/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 78986 build-i386-rumpuserxen

Re: [Xen-devel] [vfio-users] [PATCH v3 00/11] igd passthrough chipset tweaks

2016-02-01 Thread Alex Williamson
On Mon, 2016-02-01 at 13:49 +0100, Gerd Hoffmann wrote: > > > Maybe we should define the interface as "guest writes 0xfc to pick > > > address, qemu takes care to place opregion there".  That gives us the > > > freedom to change the qemu implementation (either copy host opregion or > > > map the ho

Re: [Xen-devel] [PATCH v6 9/9] vring: Use the DMA API on Xen

2016-02-01 Thread Wei Liu
On Mon, Feb 01, 2016 at 10:00:59AM -0800, Andy Lutomirski wrote: > Signed-off-by: Andy Lutomirski Reviewed-by: Wei Liu ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v5 09/10] vring: Use the DMA API on Xen

2016-02-01 Thread Wei Liu
On Sun, Jan 31, 2016 at 10:09:07PM +0200, Michael S. Tsirkin wrote: > On Fri, Jan 29, 2016 at 10:34:59AM +, David Vrabel wrote: > > On 29/01/16 02:31, Andy Lutomirski wrote: > > > Signed-off-by: Andy Lutomirski > > > --- > > > drivers/virtio/virtio_ring.c | 12 > > > 1 file chang

Re: [Xen-devel] [PATCH v5 00/10] virtio DMA API, yet again

2016-02-01 Thread Wei Liu
On Mon, Feb 01, 2016 at 10:04:07AM -0800, Andy Lutomirski wrote: > On Mon, Feb 1, 2016 at 3:00 AM, Wei Liu wrote: > > Nice work, Andy. > > > > On Thu, Jan 28, 2016 at 06:31:13PM -0800, Andy Lutomirski wrote: > >> This switches virtio to use the DMA API on Xen and if requested by > >> module option

[Xen-devel] [linux-3.10 baseline-only test] 38720: tolerable trouble: blocked/broken/fail/pass

2016-02-01 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38720 linux-3.10 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38720/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) bro

Re: [Xen-devel] Clarifying PVH mode requirements

2016-02-01 Thread Boris Ostrovsky
On 02/01/2016 02:27 PM, PGNet Dev wrote: On 02/01/2016 11:14 AM, Boris Ostrovsky wrote: Is 'HVMLite' replacing 'PVH'? Or are they separate modes? Yes, HVMlite is replacing PVH. Probably once we get dom0 support. If that's a 'done deal', and it sounds like it is, it'd be useful to have it in

Re: [Xen-devel] Clarifying PVH mode requirements

2016-02-01 Thread PGNet Dev
On 02/01/2016 11:14 AM, Boris Ostrovsky wrote: Is 'HVMLite' replacing 'PVH'? Or are they separate modes? Yes, HVMlite is replacing PVH. Probably once we get dom0 support. If that's a 'done deal', and it sounds like it is, it'd be useful to have it integrated into: http://wiki.xen.org/wik

[Xen-devel] [xen-unstable test] 79622: regressions - FAIL

2016-02-01 Thread osstest service owner
flight 79622 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/79622/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-prev 5 xen-build fail REGR. vs. 79422 build-i386

Re: [Xen-devel] Clarifying PVH mode requirements

2016-02-01 Thread Boris Ostrovsky
On 02/01/2016 11:56 AM, Jan Beulich wrote: On 01.02.16 at 15:54, wrote: This looks very much like it needs backport of 33c19df9a ("x86/PCI: intercept accesses to RO MMIO from dom0s in HVM containers") from unstable, which fixes PVH regression introduced by 9256f66c1606 ("x86/PCI: intercept all

Re: [Xen-devel] Clarifying PVH mode requirements

2016-02-01 Thread Boris Ostrovsky
On 02/01/2016 10:49 AM, PGNet Dev wrote: On 02/01/2016 06:11 AM, Boris Ostrovsky wrote: This actually never happened for Linux: HVMlite showed up fast enough that it didn't make sense anymore to add 32-bit support to Linux (especially given that AMD was still not supported). Is 'HVMLite' repla

Re: [Xen-devel] [RFC Design Doc] Add vNVDIMM support for Xen

2016-02-01 Thread Andrew Cooper
On 01/02/16 05:44, Haozhong Zhang wrote: > Hi, > > The following document describes the design of adding vNVDIMM support > for Xen. Any comments are welcome. > > Thanks, > Haozhong Thankyou for doing this. It is a very comprehensive document, and a fantastic example for future similar situations.

[Xen-devel] [PATCH v6 8/9] virtio_pci: Use the DMA API if enabled

2016-02-01 Thread Andy Lutomirski
This switches to vring_create_virtqueue, simplifying the driver and adding DMA API support. This fixes virtio-pci on platforms and busses that have IOMMUs. This will break the experimental QEMU Q35 IOMMU support until QEMU is fixed. In exchange, it fixes physical virtio hardware as well as virti

[Xen-devel] [PATCH v6 5/9] virtio_ring: Support DMA APIs

2016-02-01 Thread Andy Lutomirski
virtio_ring currently sends the device (usually a hypervisor) physical addresses of its I/O buffers. This is okay when DMA addresses and physical addresses are the same thing, but this isn't always the case. For example, this never works on Xen guests, and it is likely to fail if a physical "virt

Re: [Xen-devel] [PATCH v5 00/10] virtio DMA API, yet again

2016-02-01 Thread Andy Lutomirski
On Mon, Feb 1, 2016 at 3:00 AM, Wei Liu wrote: > Nice work, Andy. > > On Thu, Jan 28, 2016 at 06:31:13PM -0800, Andy Lutomirski wrote: >> This switches virtio to use the DMA API on Xen and if requested by >> module option. >> >> This fixes virtio on Xen, and it should break anything because it's >

Re: [Xen-devel] [PATCH v6 9/9] vring: Use the DMA API on Xen

2016-02-01 Thread David Vrabel
On 01/02/16 18:00, Andy Lutomirski wrote: > Signed-off-by: Andy Lutomirski Reviewed-by: David Vrabel Thanks. David ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

[Xen-devel] [PATCH v6 1/9] dma: Provide simple noop dma ops

2016-02-01 Thread Andy Lutomirski
From: Christian Borntraeger We are going to require dma_ops for several common drivers, even for systems that do have an identity mapping. Lets provide some minimal no-op dma_ops that can be used for that purpose. Signed-off-by: Christian Borntraeger Reviewed-by: Joerg Roedel --- include/linu

[Xen-devel] [PATCH v6 0/9] virtio DMA API, yet again

2016-02-01 Thread Andy Lutomirski
This switches virtio to use the DMA API on Xen and if requested by module option. This fixes virtio on Xen, and it should break anything because it's off by default on everything except Xen PV on x86. To the Xen people: is this okay? If it doesn't work on other Xen variants (PVH? HVM?), can you

[Xen-devel] [PATCH v6 3/9] s390/dma: Allow per device dma ops

2016-02-01 Thread Andy Lutomirski
From: Christian Borntraeger As virtio-ccw will have dma ops, we can no longer default to the zPCI ones. Make use of dev_archdata to keep the dma_ops per device. The pci devices now use that to override the default, and the default is changed to use the noop ops for everything that does not specif

[Xen-devel] [PATCH v6 7/9] virtio_mmio: Use the DMA API if enabled

2016-02-01 Thread Andy Lutomirski
This switches to vring_create_virtqueue, simplifying the driver and adding DMA API support. Signed-off-by: Andy Lutomirski --- drivers/virtio/virtio_mmio.c | 67 ++-- 1 file changed, 15 insertions(+), 52 deletions(-) diff --git a/drivers/virtio/virtio_mmi

[Xen-devel] [PATCH v6 6/9] virtio: Add improved queue allocation API

2016-02-01 Thread Andy Lutomirski
This leaves vring_new_virtqueue alone for compatbility, but it adds two new improved APIs: vring_create_virtqueue: Creates a virtqueue backed by automatically allocated coherent memory. (Some day it this could be extended to support non-coherent memory, too, if there ends up being a platform on w

[Xen-devel] [PATCH v6 9/9] vring: Use the DMA API on Xen

2016-02-01 Thread Andy Lutomirski
Signed-off-by: Andy Lutomirski --- drivers/virtio/virtio_ring.c | 12 1 file changed, 12 insertions(+) diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c index cf2840c7e500..2a921e5b1809 100644 --- a/drivers/virtio/virtio_ring.c +++ b/drivers/virtio/virtio_ring

[Xen-devel] [PATCH v6 4/9] vring: Introduce vring_use_dma_api()

2016-02-01 Thread Andy Lutomirski
This is a kludge, but no one has come up with a a better idea yet. We'll introduce DMA API support guarded by vring_use_dma_api(). Eventually we may be able to return true on more and more systems, and hopefully we can get rid of vring_use_dma_api() entirely some day. Signed-off-by: Andy Lutomirsk

[Xen-devel] [PATCH v6 2/9] alpha/dma: use common noop dma ops

2016-02-01 Thread Andy Lutomirski
From: Christian Borntraeger Some of the alpha pci noop dma ops are identical to the common ones. Use them. Signed-off-by: Christian Borntraeger Reviewed-by: Joerg Roedel --- arch/alpha/kernel/pci-noop.c | 46 1 file changed, 4 insertions(+), 42 del

[Xen-devel] [PATCH] x86/hvm: Fix use-after-free introduced by c/s 428607a

2016-02-01 Thread Andrew Cooper
c/s 428607a "x86: shrink 'struct domain', was already PAGE_SIZE" introduced a use-after-free error during domain destruction, because of the order in which timers are torn down. (XEN) Xen call trace: (XEN)[] spinlock.c#check_lock+0x1e/0x40 (XEN)[] _spin_lock+0x11/0x52 (XEN)[] v

[Xen-devel] [linux-4.1 test] 79642: regressions - FAIL

2016-02-01 Thread osstest service owner
flight 79642 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/79642/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-rumpuserxen6 xen-build fail REGR. vs. 66399 build-amd64

Re: [Xen-devel] [PATCHv2] x86: only check for two watchdog NMIs

2016-02-01 Thread Andrew Cooper
On 01/02/16 17:09, David Vrabel wrote: > Since the NMI handler can now recognize watchdog NMIs, make > check_nmi_watchdog() only check for at least two watchdog NMIs. This > prevents false negatives caused by other processors (which may be > being power managed by the BIOS) running at reduced cloc

Re: [Xen-devel] [PATCH] x86/PV: fix unintended dependency of m2p-strict mode on migration-v2

2016-02-01 Thread Andrew Cooper
On 01/02/16 16:51, Jan Beulich wrote: On 01.02.16 at 17:34, wrote: >> On 01/02/16 16:28, Jan Beulich wrote: >> On 01.02.16 at 15:07, wrote: On 01/02/16 13:20, Jan Beulich wrote: > Ping? (I'd really like to get this resolved, so we don't need to > indefinitely run with non-up

[Xen-devel] [linux-mingo-tip-master test] 79697: regressions - FAIL

2016-02-01 Thread osstest service owner
flight 79697 linux-mingo-tip-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/79697/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-rumpuserxen6 xen-build fail REGR. vs. 60684 build-amd6

[Xen-devel] [PATCHv2] x86: only check for two watchdog NMIs

2016-02-01 Thread David Vrabel
Since the NMI handler can now recognize watchdog NMIs, make check_nmi_watchdog() only check for at least two watchdog NMIs. This prevents false negatives caused by other processors (which may be being power managed by the BIOS) running at reduced clock frequencies. We check for more than one NMI

Re: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter max_wp_ram_ranges.

2016-02-01 Thread Ian Jackson
Yu, Zhang writes ("Re: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter max_wp_ram_ranges."): > On 2/2/2016 12:35 AM, Jan Beulich wrote: >> On 01.02.16 at 17:19, wrote: > >> So, we need also validate this param in hvm_allow_set_param, > >> current although hvm_allow_set_param has not perform

Re: [Xen-devel] [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 17:58, wrote: > Jan Beulich writes ("Re: [PATCH v2 1/2] altp2m: Merge > p2m_set_altp2m_mem_access and p2m_set_mem_access"): >> On 01.02.16 at 16:22, wrote: >> > It's not like we're short of memory op values. >> >> Are we not? They need to fit in 6 bits (unless we want to play

Re: [Xen-devel] [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access

2016-02-01 Thread Ian Jackson
Jan Beulich writes ("Re: [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access"): > On 01.02.16 at 16:22, wrote: > > It's not like we're short of memory op values. > > Are we not? They need to fit in 6 bits (unless we want to play tricks), > and numbers up to 27 are alrea

Re: [Xen-devel] Clarifying PVH mode requirements

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 15:54, wrote: > On 02/01/2016 08:38 AM, PGNet Dev wrote: >> >> Loading Xen 4.6.0_08-405 with Linux 4.4.0-8.g9f68b90-default >> ...Loading Xen 4.6.0_08-405 with Linux 4.4.0-8.g9f68b90-default ... >> >> /EndEntire >> /EndEntire >> file path: file path: >> > /ACPI(a0341d0,0)/ACP

Re: [Xen-devel] [PATCH OSSTEST v1 5/5] mg-show-flight-runvars: recurse on buildjobs upon request

2016-02-01 Thread Ian Jackson
Ian Campbell writes ("Re: [PATCH OSSTEST v1 5/5] mg-show-flight-runvars: recurse on buildjobs upon request"): > ITIYM: > >    foreach my $row (map { $_->[1] } >                     sort { $a->[0] cmp $b->[0] } >                     map { $xform->($_) } >                     @rows) { >         ...

Re: [Xen-devel] [PATCH] x86/PV: fix unintended dependency of m2p-strict mode on migration-v2

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 17:34, wrote: > On 01/02/16 16:28, Jan Beulich wrote: > On 01.02.16 at 15:07, wrote: >>> On 01/02/16 13:20, Jan Beulich wrote: Ping? (I'd really like to get this resolved, so we don't need to indefinitely run with non-upstream behavior in our distros.) >>> My rema

Re: [Xen-devel] [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 17:35, wrote: > On Mon, Feb 1, 2016 at 9:30 AM, Ian Campbell > wrote: > >> On Mon, 2016-02-01 at 09:21 -0700, Jan Beulich wrote: >> > > > > On 01.02.16 at 15:45, wrote: >> > > On Fri, 2016-01-29 at 09:47 -0700, Jan Beulich wrote: >> > > > > > > On 29.01.16 at 17:32, wrote: >

Re: [Xen-devel] [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 16:22, wrote: > Ian Campbell writes ("Re: [PATCH v2 1/2] altp2m: Merge > p2m_set_altp2m_mem_access and p2m_set_mem_access"): >> It's unfortunate that we've found ourselves here, but I think rather than >> deprecating the current and adding a new op alongside we should just acce

Re: [Xen-devel] [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 17:30, wrote: > On Mon, 2016-02-01 at 09:21 -0700, Jan Beulich wrote: >> > > > On 01.02.16 at 15:45, wrote: >> > On Fri, 2016-01-29 at 09:47 -0700, Jan Beulich wrote: >> > > > > > On 29.01.16 at 17:32, wrote: >> > > > On Fri, Jan 29, 2016 at 9:19 AM, Jan Beulich >> > > > wrot

Re: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter max_wp_ram_ranges.

2016-02-01 Thread Yu, Zhang
On 2/2/2016 12:35 AM, Jan Beulich wrote: On 01.02.16 at 17:19, wrote: After a second thought, I guess one of the security concern is when some APP is trying to trigger the HVMOP_set_param directly with some illegal values. Not sure what "directly" is supposed to mean here. I mean with no

Re: [Xen-devel] [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access

2016-02-01 Thread Lengyel, Tamas
On Mon, Feb 1, 2016 at 9:21 AM, Jan Beulich wrote: > >>> On 01.02.16 at 15:45, wrote: > > On Fri, 2016-01-29 at 09:47 -0700, Jan Beulich wrote: > >> > > > On 29.01.16 at 17:32, wrote: > >> > On Fri, Jan 29, 2016 at 9:19 AM, Jan Beulich > wrote: > >> > > > > > On 29.01.16 at 17:12, wrote: > >>

Re: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter max_wp_ram_ranges.

2016-02-01 Thread Yu, Zhang
On 2/1/2016 11:14 PM, Yu, Zhang wrote: On 2/1/2016 9:07 PM, Jan Beulich wrote: On 01.02.16 at 13:49, wrote: On Mon, Feb 01, 2016 at 05:15:16AM -0700, Jan Beulich wrote: On 01.02.16 at 13:02, wrote: On Mon, Feb 01, 2016 at 12:52:51AM -0700, Jan Beulich wrote: On 30.01.16 at 15:38, wrot

Re: [Xen-devel] [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access

2016-02-01 Thread Lengyel, Tamas
On Mon, Feb 1, 2016 at 9:30 AM, Ian Campbell wrote: > On Mon, 2016-02-01 at 09:21 -0700, Jan Beulich wrote: > > > > > On 01.02.16 at 15:45, wrote: > > > On Fri, 2016-01-29 at 09:47 -0700, Jan Beulich wrote: > > > > > > > On 29.01.16 at 17:32, wrote: > > > > > On Fri, Jan 29, 2016 at 9:19 AM, Ja

Re: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter max_wp_ram_ranges.

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 17:19, wrote: > After a second thought, I guess one of the security concern > is when some APP is trying to trigger the HVMOP_set_param > directly with some illegal values. Not sure what "directly" is supposed to mean here. > So, we need also validate this param in hvm_allow_s

Re: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter max_wp_ram_ranges.

2016-02-01 Thread Yu, Zhang
On 2/2/2016 12:16 AM, Jan Beulich wrote: On 01.02.16 at 16:14, wrote: But I still do not quite understand. :) If tool stack can guarantee the validity of a parameter, under which circumstances will hypervisor be threatened? At least in disaggregated environments the hypervisor cannot trust

Re: [Xen-devel] [PATCH] x86/PV: fix unintended dependency of m2p-strict mode on migration-v2

2016-02-01 Thread Andrew Cooper
On 01/02/16 16:28, Jan Beulich wrote: On 01.02.16 at 15:07, wrote: >> On 01/02/16 13:20, Jan Beulich wrote: >>> Ping? (I'd really like to get this resolved, so we don't need to >>> indefinitely run with non-upstream behavior in our distros.) >> My remaining issue is whether this loop gets exe

Re: [Xen-devel] [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access

2016-02-01 Thread Ian Campbell
On Mon, 2016-02-01 at 09:21 -0700, Jan Beulich wrote: > > > > On 01.02.16 at 15:45, wrote: > > On Fri, 2016-01-29 at 09:47 -0700, Jan Beulich wrote: > > > > > > On 29.01.16 at 17:32, wrote: > > > > On Fri, Jan 29, 2016 at 9:19 AM, Jan Beulich > > > > wrote: > > > > > > > > On 29.01.16 at 17:12,

Re: [Xen-devel] [PATCH] MAINTAINERS: cover non-x86 vm_event files

2016-02-01 Thread Tamas K Lengyel
> Once vm_event.c is added to ARM: > > I don't think that's a prerequisite for accepting this patch, is it? (In > some ways that's the point -- it covers all future ARCH vm_event.c) > Oh yea, good point. I just found it odd to list files here that don't (yet) exist. Tamas

Re: [Xen-devel] [PATCH] x86/PV: fix unintended dependency of m2p-strict mode on migration-v2

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 15:07, wrote: > On 01/02/16 13:20, Jan Beulich wrote: >> Ping? (I'd really like to get this resolved, so we don't need to >> indefinitely run with non-upstream behavior in our distros.) > > My remaining issue is whether this loop gets executed by default. > > I realise that th

[Xen-devel] [PATCHv7] x86/ept: defer the invalidation until the p2m lock is released

2016-02-01 Thread David Vrabel
Holding the p2m lock while calling ept_sync_domain() is very expensive since it does a on_selected_cpus() call. IPIs on many socket machines can be very slows and on_selected_cpus() is serialized. It is safe to defer the invalidate until the p2m lock is released except for two cases: 1. When fre

[Xen-devel] [PATCHv7 0/1] x86/ept: reduce translation invalidation impact

2016-02-01 Thread David Vrabel
This series improves the performance of EPT by further reducing the impact of the translation invalidations (ept_sync_domain()). By: a) Deferring invalidations until the p2m write lock is released. Prior to this change a 16 VCPU guest could not be successfully migrated on an (admittedly slow) 160

Re: [Xen-devel] [PATCH v2 1/2] altp2m: Merge p2m_set_altp2m_mem_access and p2m_set_mem_access

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 15:45, wrote: > On Fri, 2016-01-29 at 09:47 -0700, Jan Beulich wrote: >> > > > On 29.01.16 at 17:32, wrote: >> > On Fri, Jan 29, 2016 at 9:19 AM, Jan Beulich wrote: >> > > > > > On 29.01.16 at 17:12, wrote: >> > > > On Fri, Jan 29, 2016 at 4:03 AM, Jan Beulich >> > > > wrote

Re: [Xen-devel] [PATCH v3 3/3] tools: introduce parameter max_wp_ram_ranges.

2016-02-01 Thread Jan Beulich
>>> On 01.02.16 at 16:14, wrote: > But I still do not quite understand. :) > If tool stack can guarantee the validity of a parameter, > under which circumstances will hypervisor be threatened? At least in disaggregated environments the hypervisor cannot trust the (parts of the) tool stack(s) livi

Re: [Xen-devel] [PATCH OSSTEST v1 5/5] mg-show-flight-runvars: recurse on buildjobs upon request

2016-02-01 Thread Ian Campbell
On Mon, 2016-02-01 at 15:19 +, Ian Jackson wrote: > Ian Campbell writes ("[PATCH OSSTEST v1 5/5] mg-show-flight-runvars: > recurse on buildjobs upon request"): > > By looping over @rows looking for buildjobs runvars and adding those > > jobs to the output until nothing changes. > ... > > Note t

[Xen-devel] [xen-unstable-smoke test] 79786: tolerable all pass - PUSHED

2016-02-01 Thread osstest service owner
flight 79786 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/79786/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH v5 04/10] vring: Introduce vring_use_dma_api()

2016-02-01 Thread David Woodhouse
On Mon, 2016-02-01 at 07:39 -0800, Andy Lutomirski wrote: > > >> Could we have an arch_vring_eschew_dma_api(dev) function which the > >> affected architectures could provide (as a prelude to fixing it so that > >> the DMA API does the right thing for *itself*)? > > > > I'm fine with this. > > I m

Re: [Xen-devel] [PATCHv6 2/2] x86/ept: defer the invalidation until the p2m lock is released

2016-02-01 Thread David Vrabel
On 22/12/15 12:23, George Dunlap wrote: > On 18/12/15 13:50, David Vrabel wrote: >> Holding the p2m lock while calling ept_sync_domain() is very expensive >> since it does a on_selected_cpus() call. IPIs on many socket machines >> can be very slows and on_selected_cpus() is serialized. >> >> It is

Re: [Xen-devel] Clarifying PVH mode requirements

2016-02-01 Thread PGNet Dev
On 02/01/2016 06:11 AM, Boris Ostrovsky wrote: This actually never happened for Linux: HVMlite showed up fast enough that it didn't make sense anymore to add 32-bit support to Linux (especially given that AMD was still not supported). Is 'HVMLite' replacing 'PVH'? Or are they separate modes? _

  1   2   3   >