[Xen-devel] [linux-4.1 test] 81983: regressions - trouble: blocked/broken/fail/pass

2016-02-12 Thread osstest service owner
flight 81983 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/81983/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 6 xen-build fail REGR. vs. 66399 build-i386-rumpuserxen

[Xen-devel] [libvirt test] 81975: regressions - FAIL

2016-02-12 Thread osstest service owner
flight 81975 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/81975/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-xsm 6 xen-boot fail REGR. vs. 80121 Tests which did not succe

[Xen-devel] [qemu-upstream-4.4-testing test] 81918: regressions - FAIL

2016-02-12 Thread osstest service owner
flight 81918 qemu-upstream-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/81918/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-intel 9 debian-hvm-install fail REGR. vs. 77834 test-am

Re: [Xen-devel] Two linkers - EFI one (mingw64) and normal GNU one [Fedora]

2016-02-12 Thread Konrad Rzeszutek Wilk
On February 12, 2016 5:17:42 PM EST, Doug Goldstein wrote: >On 2/12/16 11:19 AM, Konrad Rzeszutek Wilk wrote: >> Hey, >> >> Fedora for the longest time seems to have two linkers - one normal >for GNU >> applications and then another - mingw64 - for building EFI >applications. >> >> Which means t

Re: [Xen-devel] Two linkers - EFI one (mingw64) and normal GNU one [Fedora]

2016-02-12 Thread Doug Goldstein
On 2/12/16 11:19 AM, Konrad Rzeszutek Wilk wrote: > Hey, > > Fedora for the longest time seems to have two linkers - one normal for GNU > applications and then another - mingw64 - for building EFI applications. > > Which means that to compile ELF binaries on Fedora requires this patch > (taken fr

[Xen-devel] [xen-unstable test] 81888: regressions - FAIL

2016-02-12 Thread osstest service owner
flight 81888 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/81888/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 81620 Regression

[Xen-devel] [PATCH v3 MISSING/23] xsplice: Design document (v7).

2016-02-12 Thread Konrad Rzeszutek Wilk
A mechanism is required to binarily patch the running hypervisor with new opcodes that have come about due to primarily security updates. This document describes the design of the API that would allow us to upload to the hypervisor binary patches. This document has been shaped by the input from:

Re: [Xen-devel] [PATCH v3] xSplice v1 implementation and design.

2016-02-12 Thread Konrad Rzeszutek Wilk
> Konrad Rzeszutek Wilk (13): > xsplice: Design document (v7). Somehow this patch disappeared in this patchset posting! To not spam everybody's mailbox I am just sending this simple sub-thread which has the design document. ___ Xen-devel mailing

Re: [Xen-devel] [Qemu-devel] [PULL v2 44/45] fix MSI injection on Xen

2016-02-12 Thread Daniel P. Berrange
On Sat, Feb 06, 2016 at 09:15:13PM +0200, Michael S. Tsirkin wrote: > From: Stefano Stabellini > > On Xen MSIs can be remapped into pirqs, which are a type of event > channels. It's mostly for the benefit of PCI passthrough devices, to > avoid the overhead of interacting with the emulated lapic.

Re: [Xen-devel] [PATCH v3 13/23] XENVER_build_id: Provide ld-embedded build-ids (v10)

2016-02-12 Thread Daniel De Graaf
On 12/02/16 13:05, Konrad Rzeszutek Wilk wrote: The mechanism to get this is via the XENVER hypercall and we add a new sub-command to retrieve the binary build-id called XENVER_build_id. The sub-hypercall parameter allows an arbitrary size (the buffer and len is provided to the hypervisor). A NUL

Re: [Xen-devel] [BUG] pci-passthrough generates "xen:events: Failed to obtain physical IRQ" for some devices

2016-02-12 Thread Tommi Airikka
Yes, you can put the 'Tested-by' from me, I'm perfectly fine with that. Thank you for your help! Br, Tommi On Fri, Feb 05, 2016 at 12:35:10AM +0100, Tommi Airikka wrote: > Hi, > > I patched the deb8u2 source with all four patches and built a new deb. .. snip.. > > Next, I upgraded dom0 with the n

Re: [Xen-devel] [PATCH v3 12/23] xsm/xen_version: Add XSM for the xen_version hypercall (v8).

2016-02-12 Thread Daniel De Graaf
On 12/02/16 13:05, Konrad Rzeszutek Wilk wrote: All of XENVER_* have now an XSM check for their sub-ops. The subop for XENVER_commandline is now a priviliged operation. To not break guests we still return an string - but it is just '\0'. The rest: XENVER_[version|extraversion|capabilities| para

Re: [Xen-devel] [BUG] pci-passthrough generates "xen:events: Failed to obtain physical IRQ" for some devices

2016-02-12 Thread Konrad Rzeszutek Wilk
On Fri, Feb 05, 2016 at 12:35:10AM +0100, Tommi Airikka wrote: > Hi, > > I patched the deb8u2 source with all four patches and built a new deb. .. snip.. > > Next, I upgraded dom0 with the new linux-image deb and rebooted the machine. > > dom0 "uname -a": > Linux dom0 3.16.0-4-amd64 #1 SMP Debia

Re: [Xen-devel] [PATCH v2] x86/boot: add BIT() to boot/bitops.h

2016-02-12 Thread Konrad Rzeszutek Wilk
On Fri, Feb 05, 2016 at 08:49:35PM -0800, Luis R. Rodriguez wrote: > The boot/bitops.h has guards against including the > regular bitops (include/asm-generic/bitops.h), it only > implements what we need at early boot. We'll be making > use of BIT() later so add it. > > Users of boot/boot.h must in

Re: [Xen-devel] [PATCH v3 01/23] xen/xsplice: Hypervisor implementation of XEN_XSPLICE_op (v10)

2016-02-12 Thread Andrew Cooper
On 12/02/16 20:40, Konrad Rzeszutek Wilk wrote: >>> diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h >>> index 96680eb..d549e7a 100644 >>> --- a/xen/include/public/sysctl.h >>> +++ b/xen/include/public/sysctl.h >>> @@ -766,6 +766,160 @@ struct xen_sysctl_tmem_op { >>> typedef

Re: [Xen-devel] [PATCH v3 05/23] xsplice: Add helper elf routines (v4)

2016-02-12 Thread Andrew Cooper
On 12/02/16 20:47, Konrad Rzeszutek Wilk wrote: >>> +struct xsplice_elf_sec *xsplice_elf_sec_by_name(const struct xsplice_elf >>> *elf, >>> +const char *name) >>> +{ >>> +unsigned int i; >>> + >>> +for ( i = 0; i < elf->hdr->e_shnum; i++ ) >>

Re: [Xen-devel] [PATCH v3 06/23] xsplice: Implement payload loading (v4)

2016-02-12 Thread Andrew Cooper
On 12/02/16 18:05, Konrad Rzeszutek Wilk wrote: I will refrain from repeating the same review from previous patches. > +int xsplice_verify_elf(struct xsplice_elf *elf, uint8_t *data) > +{ > + > +Elf_Ehdr *hdr = (Elf_Ehdr *)data; > + > +if ( elf->len < (sizeof *hdr) || > + !IS_ELF(

Re: [Xen-devel] [PATCH v3 05/23] xsplice: Add helper elf routines (v4)

2016-02-12 Thread Konrad Rzeszutek Wilk
> > +struct xsplice_elf_sec *xsplice_elf_sec_by_name(const struct xsplice_elf > > *elf, > > +const char *name) > > +{ > > +unsigned int i; > > + > > +for ( i = 0; i < elf->hdr->e_shnum; i++ ) > > +{ > > +if ( !strcmp(name, elf->se

Re: [Xen-devel] [PATCH v3 01/23] xen/xsplice: Hypervisor implementation of XEN_XSPLICE_op (v10)

2016-02-12 Thread Konrad Rzeszutek Wilk
> > diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h > > index 96680eb..d549e7a 100644 > > --- a/xen/include/public/sysctl.h > > +++ b/xen/include/public/sysctl.h > > @@ -766,6 +766,160 @@ struct xen_sysctl_tmem_op { > > typedef struct xen_sysctl_tmem_op xen_sysctl_tmem_op_t;

Re: [Xen-devel] [PATCH v2] libxl: fix handling of returns in libxl_get_version_info()

2016-02-12 Thread Harmandeep Kaur
On Fri, Feb 12, 2016 at 6:39 PM, Dario Faggioli wrote: > On Fri, 2016-02-12 at 12:31 +, Wei Liu wrote: >> On Fri, Feb 12, 2016 at 05:00:40PM +0530, Harmandeep Kaur wrote: >> > >> > +info->xen_version_major = r >> 16; >> > +info->xen_version_minor = r & 0xFF; >> > >> > -xc_version(c

[Xen-devel] [PATCH v3] libxl: fix handling of returns in libxl_get_version_info()

2016-02-12 Thread Harmandeep Kaur
Check the return value of xc_version() and return NULL if it fails. libxl_get_version_info() can also return NULL now. Callers of the function libxl_get_version_info() are already prepared to deal with returning NULL on failure of xc_version(). Group all calls to xc_version() , so that data copies

[Xen-devel] [xen-unstable-smoke test] 82185: tolerable all pass - PUSHED

2016-02-12 Thread osstest service owner
flight 82185 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/82185/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH v3 05/23] xsplice: Add helper elf routines (v4)

2016-02-12 Thread Andrew Cooper
On 12/02/16 18:05, Konrad Rzeszutek Wilk wrote: > From: Ross Lagerwall > > Add Elf routines and data structures in preparation for loading an > xSplice payload. > > We also add an macro that will print where we failed during > the ELF parsing - which is only available during debug builds. > In pro

Re: [Xen-devel] [PATCH v3 04/23] elf: Add relocation types to elfstructs.h

2016-02-12 Thread Andrew Cooper
On 12/02/16 18:05, Konrad Rzeszutek Wilk wrote: > From: Ross Lagerwall > > Signed-off-by: Ross Lagerwall > Signed-off-by: Konrad Rzeszutek Wilk Reviewed-by: Andrew Cooper (this patch looks like it can be fast-tracked in the series?) > --- > v2: Slim the list as we do not use all of them. > -

Re: [Xen-devel] [PATCH v3 01/23] xen/xsplice: Hypervisor implementation of XEN_XSPLICE_op (v10)

2016-02-12 Thread Andrew Cooper
On 12/02/16 18:05, Konrad Rzeszutek Wilk wrote: > diff --git a/xen/common/Kconfig b/xen/common/Kconfig > index 6f404b4..619aa9e 100644 > --- a/xen/common/Kconfig > +++ b/xen/common/Kconfig > @@ -152,4 +152,14 @@ config SCHED_DEFAULT > > endmenu > > +# Enable/Disable xsplice support > +config X

Re: [Xen-devel] [PATCH v2 2/6] relocator: Do not use memory region if its starta is smaller than size

2016-02-12 Thread Daniel Kiper
On Fri, Feb 12, 2016 at 07:12:52PM +, Vladimir 'phcoder' Serbinenko wrote: > Le ven. 12 févr. 2016 20:01, Daniel Kiper a > écrit : > > > On Fri, Feb 12, 2016 at 03:57:59PM +0100, Vladimir 'φ-coder/phcoder' > > Serbinenko wrote: > > > Applied, thanks > > > > Thanks but here > > http://lists.gnu

[Xen-devel] [qemu-upstream-unstable test] 81831: regressions - FAIL

2016-02-12 Thread osstest service owner
flight 81831 qemu-upstream-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/81831/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemuu-rhel6hvm-intel 9 redhat-installfail REGR. vs. 80694 test-amd64

[Xen-devel] [PATCH] tools/libxc: Fix use of zlib-options when building the domain builder

2016-02-12 Thread Andrew Cooper
c/s de0f8c7c changed the use of zlib-options, and moved it from being locally generated to coming from ./configure. However, it neglected to modify the users of zlib-options. The curious use of $(call ...) was to select either the -D or -l options as appropriate, but c/s de0f8c7c broke this by lo

Re: [Xen-devel] [PATCH v2 2/6] relocator: Do not use memory region if its starta is smaller than size

2016-02-12 Thread Vladimir 'phcoder' Serbinenko
Le ven. 12 févr. 2016 20:01, Daniel Kiper a écrit : > On Fri, Feb 12, 2016 at 03:57:59PM +0100, Vladimir 'φ-coder/phcoder' > Serbinenko wrote: > > Applied, thanks > > Thanks but here > http://lists.gnu.org/archive/html/grub-devel/2015-07/msg00100.html > Andrei and later here > http://lists.gnu.or

[Xen-devel] RFC: configuring QEMU virtfs for Xen PV(H) guests

2016-02-12 Thread Wei Liu
# Background To configure virtfs, there is two methods in QEMU command line: 1. Use -fsdev and -device virtio-9p-pci,XXX directives 2. Use -virtfs directive The second method is actually shorthand for the first method. It constructs fsdev and device options behind the scene. In the end, there wi

Re: [Xen-devel] Status of multiboot2 support on EFI?

2016-02-12 Thread Daniel Kiper
On Wed, Feb 03, 2016 at 06:03:50PM +0100, Daniel Kiper wrote: > On Wed, Feb 03, 2016 at 05:08:44PM +0100, Daniel Kiper wrote: > > On Tue, Feb 02, 2016 at 03:50:17PM -0600, Doug Goldstein wrote: > > > On 2/2/16 3:20 PM, Daniel Kiper wrote: > > > > On Tue, Feb 02, 2016 at 01:02:56PM -0800, PGNet Dev

[Xen-devel] [PATCH] tools/xenalyze: Fix build with clang

2016-02-12 Thread Andrew Cooper
1) EXIT_REASON_EXCEPTION_NMI is 0, and Clang complains: xenalyze.c:513:33: error: initializer overrides prior initialization of this subobject [-Werror,-Winitializer-overrides] [EXIT_REASON_EXCEPTION_NMI]="EXCEPTION_NMI", ^~~ xenalyze.c:512:11: note

Re: [Xen-devel] [PATCH v2 2/6] relocator: Do not use memory region if its starta is smaller than size

2016-02-12 Thread Daniel Kiper
On Fri, Feb 12, 2016 at 03:57:59PM +0100, Vladimir 'φ-coder/phcoder' Serbinenko wrote: > Applied, thanks Thanks but here http://lists.gnu.org/archive/html/grub-devel/2015-07/msg00100.html Andrei and later here http://lists.gnu.org/archive/html/grub-devel/2015-11/msg00110.html you expressed conc

Re: [Xen-devel] [PULL 0/5] tags/xen-2016-02-12

2016-02-12 Thread Peter Maydell
On 12 February 2016 at 17:30, Stefano Stabellini wrote: > The following changes since commit f075c89f0a9cb31daf38892371d2822177505706: > > Merge remote-tracking branch 'remotes/stefanha/tags/block-pull-request' > into staging (2016-02-09 17:56:46 +) > > are available in the git repository a

Re: [Xen-devel] [PATCH v8 5/5] Scripts to create and delete xen-scsiback nodes in Linux target framework

2016-02-12 Thread Olaf Hering
On Fri, Feb 12, Wei Liu wrote: > On Thu, Feb 11, 2016 at 03:43:31PM +, Olaf Hering wrote: > > Just to make them public, not meant for merging: > > I might be mistaken, but if you don't provide a hotplug script or some > sort for Xen how do you expect user to make use vscsi? The xenlinux back

Re: [Xen-devel] [PATCH v8 3/5] libxl: add support for vscsi

2016-02-12 Thread Olaf Hering
On Fri, Feb 12, Wei Liu wrote: > There seems to be a lot of places in this patch where the lines are > longer than 80 characters. I'm not going to point them out one by one. > Can you fix as many of those as you can where sensible? Many lines are slightly longer than 80 chars already, as can be s

[Xen-devel] [PATCH v3 09/23] xsplice: Add support for bug frames. (v4)

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Add support for handling bug frames contained with xsplice modules. If a trap occurs search either the kernel bug table or an applied payload's bug table depending on the instruction pointer. Signed-off-by: Ross Lagerwall Signed-off-by: Konrad Rzeszutek Wilk --- v2:- s/mod

[Xen-devel] [PATCH v3 19/23] xsplice, symbols: Implement symbol name resolution on address. (v2)

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall If in the payload we do not have the old_addr we can resolve the virtual address based on the UNDEFined symbols. Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Ross Lagerwall --- v1: Ross original version. v2: Include test-case and document update. --- docs/misc/xspl

[Xen-devel] [PATCH v3 06/23] xsplice: Implement payload loading (v4)

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Add support for loading xsplice payloads. This is somewhat similar to the Linux kernel module loader, implementing the following steps: - Verify the elf file. - Parse the elf file. - Allocate a region of memory mapped within a free area of [xen_virt_end, XEN_VIRT_END]. - Co

[Xen-devel] [PATCH v3 16/23] xsplice: basic build-id dependency checking.

2016-02-12 Thread Konrad Rzeszutek Wilk
We now expect that the ELF payloads be built with the --build-id. Also the .xsplice.deps section has to have the contents of the hypervisor (or a preceding payload) build-id. We already have the code to verify the Elf_Note build-id so export parts of it. This dependency means the hypervisor MUST

[Xen-devel] [PATCH v3 04/23] elf: Add relocation types to elfstructs.h

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Signed-off-by: Ross Lagerwall Signed-off-by: Konrad Rzeszutek Wilk --- v2: Slim the list as we do not use all of them. --- xen/include/xen/elfstructs.h | 8 1 file changed, 8 insertions(+) diff --git a/xen/include/xen/elfstructs.h b/xen/include/xen/elfstructs.h i

[Xen-devel] [PATCH v3 10/23] xsplice: Add support for exception tables. (v2)

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Add support for exception tables contained within xSplice payloads. If an exception occurs search either the main exception table or a particular active payload's exception table depending on the instruction pointer. Signed-off-by: Ross Lagerwall Signed-off-by: Konrad Rzesz

[Xen-devel] [PATCH v3 07/23] xsplice: Implement support for applying/reverting/replacing patches. (v5)

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Implement support for the apply, revert and replace actions. To perform and action on a payload, the hypercall sets up a data structure to schedule the work. A hook is added in all the return-to-guest paths to check for work to do and execute it if needed. In this way, patc

[Xen-devel] [PATCH v3 20/23] x86, xsplice: Print payload's symbol name and module in backtraces

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Signed-off-by: Ross Lagerwall Signed-off-by: Konrad Rzeszutek Wilk --- xen/arch/x86/traps.c | 6 +++--- xen/common/vsprintf.c | 18 ++-- xen/common/xsplice.c | 52 +++ xen/include/xen/xsplice.h | 11 +++

[Xen-devel] [PATCH v3 15/23] xsplice: Print build_id in keyhandler.

2016-02-12 Thread Konrad Rzeszutek Wilk
As it should be an useful debug mechanism. Signed-off-by: Konrad Rzeszutek Wilk --- xen/common/xsplice.c | 18 +- 1 file changed, 17 insertions(+), 1 deletion(-) diff --git a/xen/common/xsplice.c b/xen/common/xsplice.c index 65b1f11..34719fc 100644 --- a/xen/common/xsplice.c +++

[Xen-devel] [PATCH v3] xSplice v1 implementation and design.

2016-02-12 Thread Konrad Rzeszutek Wilk
Hey! Changelog: v2: http://lists.xen.org/archives/html/xen-devel/2016-01/msg01597.html - Updated code/docs/design with review comments. - Make xen also have an PT_NOTE - Added more of Ross's patches - Combined build-id patchset with this. (since the RFC and the Seattle Xen presentation) - Fin

[Xen-devel] [PATCH v3 11/23] xsplice: Add support for alternatives

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Add support for applying alternative sections within xsplice modules. At module load time, apply an alternative sections that are found. Signed-off-by: Ross Lagerwall Signed-off-by: Konrad Rzeszutek Wilk --- xen/arch/x86/Makefile | 2 +- xen/arch/x86/alternat

[Xen-devel] [PATCH v3 01/23] xen/xsplice: Hypervisor implementation of XEN_XSPLICE_op (v10)

2016-02-12 Thread Konrad Rzeszutek Wilk
The implementation does not actually do any patching. It just adds the framework for doing the hypercalls, keeping track of ELF payloads, and the basic operations: - query which payloads exist, - query for specific payloads, - check*1, apply*1, replace*1, and unload payloads. *1: Which of cour

[Xen-devel] [PATCH v3 12/23] xsm/xen_version: Add XSM for the xen_version hypercall (v8).

2016-02-12 Thread Konrad Rzeszutek Wilk
All of XENVER_* have now an XSM check for their sub-ops. The subop for XENVER_commandline is now a priviliged operation. To not break guests we still return an string - but it is just '\0'. The rest: XENVER_[version|extraversion|capabilities| parameters|get_features|page_size|guest_handle|changes

[Xen-devel] [PATCH v3 18/23] xsplice: Prevent duplicate payloads to be loaded.

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Signed-off-by: Ross Lagerwall Signed-off-by: Konrad Rzeszutek Wilk --- xen/common/xsplice.c | 17 + 1 file changed, 17 insertions(+) diff --git a/xen/common/xsplice.c b/xen/common/xsplice.c index 8c5557e..3f1da13 100644 --- a/xen/common/xsplice.c +++ b/xen

[Xen-devel] [PATCH v3 02/23] libxc: Implementation of XEN_XSPLICE_op in libxc (v5).

2016-02-12 Thread Konrad Rzeszutek Wilk
The underlaying toolstack code to do the basic operations when using the XEN_XSPLICE_op syscalls: - upload the payload, - get status of an payload, - list all the payloads, - apply, check, replace, and revert the payload. Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Ross Lagerwall ---

[Xen-devel] [PATCH v3 13/23] XENVER_build_id: Provide ld-embedded build-ids (v10)

2016-02-12 Thread Konrad Rzeszutek Wilk
The mechanism to get this is via the XENVER hypercall and we add a new sub-command to retrieve the binary build-id called XENVER_build_id. The sub-hypercall parameter allows an arbitrary size (the buffer and len is provided to the hypervisor). A NULL parameter will probe the hypervisor for the leng

[Xen-devel] [PATCH v3 08/23] x86/xen_hello_world.xsplice: Test payload for patching 'xen_extra_version'. (v2)

2016-02-12 Thread Konrad Rzeszutek Wilk
This change demonstrates how to generate an xSplice ELF payload. The idea here is that we want to patch in the hypervisor the 'xen_version_extra' function with an function that will return 'Hello World'. The 'xl info | grep extraversion' will reflect the new value after the patching. To generate

[Xen-devel] [PATCH v3 21/23] xsplice: Add support for shadow variables

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Shadow variables are a piece of infrastructure to be used by xsplice modules. They are used to attach a new piece of data to an existing structure in memory. Signed-off-by: Ross Lagerwall --- xen/common/Makefile | 1 + xen/common/xsplice_shadow.c | 105 ++

[Xen-devel] [PATCH v3 03/23] xen-xsplice: Tool to manipulate xsplice payloads (v4)

2016-02-12 Thread Konrad Rzeszutek Wilk
A simple tool that allows an system admin to perform basic xsplice operations: - Upload a xsplice file (with an unique name) - List all the xsplice payloads loaded. - Apply, revert, replace, unload, or check the payload using the unique name. - Do all three - upload, check, and apply the

[Xen-devel] [PATCH v3 22/23] xsplice: Add hooks functions and other macros

2016-02-12 Thread Konrad Rzeszutek Wilk
Add hook functions which run during patch apply and patch revert. Hook functions are used by xsplice modules to manipulate data structures during patching, etc. Also add macros to be used by modules for excluding functions or sections from being included in a patch. Signed-off-by: Ross Lagerwall

[Xen-devel] [PATCH v3 14/23] libxl: info: Display build_id of the hypervisor.

2016-02-12 Thread Konrad Rzeszutek Wilk
If the hypervisor is built with we will display it. Signed-off-by: Konrad Rzeszutek Wilk --- v2: Include HAVE_*, use libxl_zalloc, s/rc/ret/ v3: Retry with different size if 1020 is not enough. --- tools/libxl/libxl.c | 45 + tools/libxl/libxl.

[Xen-devel] [PATCH v3 23/23] xsplice, hello_world: Use the XSPLICE_[UN|]LOAD_HOOK hooks for two functions.

2016-02-12 Thread Konrad Rzeszutek Wilk
Signed-off-by: Konrad Rzeszutek Wilk --- xen/arch/x86/test/xen_hello_world.c | 15 +++ 1 file changed, 15 insertions(+) diff --git a/xen/arch/x86/test/xen_hello_world.c b/xen/arch/x86/test/xen_hello_world.c index 6200fbe..b6fa05e 100644 --- a/xen/arch/x86/test/xen_hello_world.c +++

[Xen-devel] [PATCH v3 17/23] xsplice: Print dependency and payloads build_id in the keyhandler.

2016-02-12 Thread Konrad Rzeszutek Wilk
Signed-off-by: Konrad Rzeszutek Wilk --- xen/common/xsplice.c | 36 1 file changed, 28 insertions(+), 8 deletions(-) diff --git a/xen/common/xsplice.c b/xen/common/xsplice.c index 2ba5bb5..8c5557e 100644 --- a/xen/common/xsplice.c +++ b/xen/common/xsplice.c @

[Xen-devel] [PATCH v3 05/23] xsplice: Add helper elf routines (v4)

2016-02-12 Thread Konrad Rzeszutek Wilk
From: Ross Lagerwall Add Elf routines and data structures in preparation for loading an xSplice payload. We also add an macro that will print where we failed during the ELF parsing - which is only available during debug builds. In production (debug=n) we only return the error value. Signed-off-

Re: [Xen-devel] Two linkers - EFI one (mingw64) and normal GNU one [Fedora]

2016-02-12 Thread Ian Jackson
Konrad Rzeszutek Wilk writes ("Two linkers - EFI one (mingw64) and normal GNU one [Fedora]"): > Would it be OK if the configure.ac jammed an config.h in 'xen' > directory? But then somehow the Config.mk has to read this and > figure this out? Which is kind of hackish. Until now, hypervisor develo

Re: [Xen-devel] [PATCH v3 2/5] arm/config: Declare ELFSIZE_[32|64] respectively.

2016-02-12 Thread Konrad Rzeszutek Wilk
On Fri, Feb 12, 2016 at 03:57:25PM +, Stefano Stabellini wrote: > On Fri, 12 Feb 2016, Konrad Rzeszutek Wilk wrote: > > On Fri, Feb 12, 2016 at 03:26:14PM +, Stefano Stabellini wrote: > > > On Fri, 12 Feb 2016, Jan Beulich wrote: > > > > >>> On 12.02.16 at 15:17, wrote: > > > > > --- a/xen

Re: [Xen-devel] [PATCH v2 10/30] xen/x86: Annotate VM applicability in featureset

2016-02-12 Thread Andrew Cooper
On 12/02/16 17:05, Jan Beulich wrote: On 05.02.16 at 14:42, wrote: >> Use attributes to specify whether a feature is applicable to be exposed to: >> 1) All guests >> 2) HVM guests >> 3) HVM HAP guests > No provisions for PV-only or shadow-only features? No. There are not currently any, a

[Xen-devel] [PULL 2/5] xen: drop xen_xc_hvm_inject_msi wrapper

2016-02-12 Thread Stefano Stabellini
From: Ian Campbell The xc version is now always present. Signed-off-by: Ian Campbell Reviewed-by: Stefano Stabellini Signed-off-by: Stefano Stabellini --- include/hw/xen/xen_common.h |6 -- xen-hvm.c |2 +- 2 files changed, 1 insertion(+), 7 deletions(-) diff -

[Xen-devel] [PULL 3/5] xen: drop XenXC and associated interface wrappers

2016-02-12 Thread Stefano Stabellini
From: Ian Campbell Now that 4.2 and earlier are no longer supported "xc_interface *" is always the right type for the xc interface handle. With this we can also simplify the handling of the xenforeignmemory compatibility wrapper by making xenforeignmemory_handle == xc_interface, instead of an xc

[Xen-devel] [PULL 4/5] xen: move xenforeignmemory compat layer into common place

2016-02-12 Thread Stefano Stabellini
From: Ian Campbell Now that we no longer support Xen 4.2 and earlier only the <470 case needs this so it can live with all the others. Signed-off-by: Ian Campbell Reviewed-by: Stefano Stabellini Signed-off-by: Stefano Stabellini --- include/hw/xen/xen_common.h | 34 ++--

[Xen-devel] [PULL 5/5] xen: Drop __XEN_LATEST_INTERFACE_VERSION__ checks from prior to Xen 4.2

2016-02-12 Thread Stefano Stabellini
From: Ian Campbell We assume (and check for in configure) 4.2 or later now. In reality all of the removed checks are for far older versions. FMT_ioreq_size is no longer needed. Signed-off-by: Ian Campbell Reviewed-by: Stefano Stabellini Signed-off-by: Stefano Stabellini --- hw/display/xenfb

[Xen-devel] [PULL 1/5] xen: drop support for Xen 4.1 and older.

2016-02-12 Thread Stefano Stabellini
From: Ian Campbell Xen 4.2 become unsupported upstream in 09/2015 (see http://wiki.xen.org/wiki/Xen_Release_Features). However as far as the interfaces provided by the toolstack libraries go 4.2 and 4.3 are indistinguishable. Therefore drop support for Xen 4.1 and earlier which removes a whole p

[Xen-devel] [PULL 0/5] tags/xen-2016-02-12

2016-02-12 Thread Stefano Stabellini
The following changes since commit f075c89f0a9cb31daf38892371d2822177505706: Merge remote-tracking branch 'remotes/stefanha/tags/block-pull-request' into staging (2016-02-09 17:56:46 +) are available in the git repository at: git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xe

Re: [Xen-devel] [PATCH v8 2/5] docs: add vscsi to xenstore-paths.markdown

2016-02-12 Thread Wei Liu
On Thu, Feb 11, 2016 at 03:43:28PM +, Olaf Hering wrote: > Signed-off-by: Olaf Hering > Acked-by: Ian Campbell > Cc: Ian Campbell > Cc: Ian Jackson > Cc: Jan Beulich > Cc: Keir Fraser > Cc: Tim Deegan Acked-by: Wei Liu > --- > docs/misc/xenstore-paths.markdown | 10 ++ > 1 fi

Re: [Xen-devel] [PATCH v8 1/5] vscsiif.h: fix WWN notation for p-dev property

2016-02-12 Thread Wei Liu
On Thu, Feb 11, 2016 at 03:43:27PM +, Olaf Hering wrote: > The pvops kernel expects either "naa.WWN:LUN" or "h:c:t:l" in the p-dev > property. Add the missing :LUN part to the comment. > > Signed-off-by: Olaf Hering > Acked-by: Ian Campbell > Cc: Ian Campbell > Cc: Ian Jackson > Cc: Jan Be

Re: [Xen-devel] [PATCH v8 3/5] libxl: add support for vscsi

2016-02-12 Thread Wei Liu
I notice you posted several enquiries in your previous patch, but I'm not sure if any of them still requires answers because you seemed to have posted answers to your own enquiries. I skip all of them and start from this version. There seems to be a lot of places in this patch where the lines are

Re: [Xen-devel] [PATCH v8 4/5] vscsiif.h: add some notes about xenstore layout

2016-02-12 Thread Wei Liu
On Thu, Feb 11, 2016 at 03:43:30PM +, Olaf Hering wrote: > Signed-off-by: Olaf Hering > Acked-by: Ian Campbell > Cc: Ian Campbell > Cc: Ian Jackson > Cc: Jan Beulich > Cc: Keir Fraser > Cc: Tim Deegan Acked-by: Wei Liu ___ Xen-devel mailing

Re: [Xen-devel] [PATCH v8 5/5] Scripts to create and delete xen-scsiback nodes in Linux target framework

2016-02-12 Thread Wei Liu
On Thu, Feb 11, 2016 at 03:43:31PM +, Olaf Hering wrote: > Just to make them public, not meant for merging: I might be mistaken, but if you don't provide a hotplug script or some sort for Xen how do you expect user to make use vscsi? Wei. ___ Xen-d

Re: [Xen-devel] [PATCH v2 09/30] xen/x86: Store antifeatures inverted in a featureset

2016-02-12 Thread Jan Beulich
>>> On 12.02.16 at 17:50, wrote: > On 12/02/16 16:47, Jan Beulich wrote: > On 05.02.16 at 14:42, wrote: >>> Awkwardly, some new feature bits mean "Feature $X no longer works". >>> Store these inverted in a featureset. >>> >>> This permits safe zero-extending of a smaller featureset as part of

[Xen-devel] Two linkers - EFI one (mingw64) and normal GNU one [Fedora]

2016-02-12 Thread Konrad Rzeszutek Wilk
Hey, Fedora for the longest time seems to have two linkers - one normal for GNU applications and then another - mingw64 - for building EFI applications. Which means that to compile ELF binaries on Fedora requires this patch (taken from Fedora build): >From 078f2d6155e940a91c1f668b86dcb9534d76b8b

Re: [Xen-devel] [PATCH v2 08/30] xen/x86: Mask out unknown features from Xen's capabilities

2016-02-12 Thread Jan Beulich
>>> On 12.02.16 at 17:48, wrote: > On 12/02/16 16:43, Jan Beulich wrote: > On 05.02.16 at 14:42, wrote: >>> --- /dev/null >>> +++ b/xen/arch/x86/cpuid.c >>> @@ -0,0 +1,19 @@ >>> +#include >>> +#include >>> + >>> +const uint32_t known_features[] = INIT_KNOWN_FEATURES; >>> + >>> +static void

Re: [Xen-devel] [PATCH v3] travis: add initial Travis CI script to do builds [and 2 more messages]

2016-02-12 Thread Ian Jackson
Doug Goldstein writes ("[PATCH v3] travis: add initial Travis CI script to do builds"): > This is just suppose to do a simple compile test on Travis CI. Currently > due to linux86 (bcc/bin86/dev86) not being whitelisted the tools cannot > be built. > > Signed-off-by: Doug Goldstein Andrew Cooper

Re: [Xen-devel] [PATCH v2 10/30] xen/x86: Annotate VM applicability in featureset

2016-02-12 Thread Jan Beulich
>>> On 05.02.16 at 14:42, wrote: > Use attributes to specify whether a feature is applicable to be exposed to: > 1) All guests > 2) HVM guests > 3) HVM HAP guests No provisions for PV-only or shadow-only features? > +#define X86_FEATURE_MTRR ( 0*32+12) /*S Memory Type Range > Regis

Re: [Xen-devel] [PATCH net-next v1 0/8] xen-netback: support toeplitz hashing

2016-02-12 Thread Paul Durrant
> -Original Message- > From: David Miller [mailto:da...@davemloft.net] > Sent: 12 February 2016 16:42 > To: Paul Durrant > Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org > Subject: Re: [PATCH net-next v1 0/8] xen-netback: support toeplitz hashing > > From: Paul Durrant > Date:

Re: [Xen-devel] xl dev-detach hangs with missing frontends

2016-02-12 Thread Wei Liu
On Fri, Feb 12, 2016 at 03:53:06PM +0100, Olaf Hering wrote: > On Fri, Feb 12, Wei Liu wrote: > > > CC'ing other tools maintainer. > > > > On Thu, Feb 11, 2016 at 11:37:49AM +0100, Olaf Hering wrote: > > > How should libxl__initiate_device_generic_remove deal with devices which > > > > I think y

Re: [Xen-devel] [PATCH v2 09/30] xen/x86: Store antifeatures inverted in a featureset

2016-02-12 Thread Andrew Cooper
On 12/02/16 16:47, Jan Beulich wrote: On 05.02.16 at 14:42, wrote: >> Awkwardly, some new feature bits mean "Feature $X no longer works". >> Store these inverted in a featureset. >> >> This permits safe zero-extending of a smaller featureset as part of a >> comparison, and safe reasoning (sub

Re: [Xen-devel] [PATCH v2 08/30] xen/x86: Mask out unknown features from Xen's capabilities

2016-02-12 Thread Andrew Cooper
On 12/02/16 16:43, Jan Beulich wrote: On 05.02.16 at 14:42, wrote: >> --- /dev/null >> +++ b/xen/arch/x86/cpuid.c >> @@ -0,0 +1,19 @@ >> +#include >> +#include >> + >> +const uint32_t known_features[] = INIT_KNOWN_FEATURES; >> + >> +static void __maybe_unused build_assertions(void) >> +{ >>

Re: [Xen-devel] [PATCH v2 09/30] xen/x86: Store antifeatures inverted in a featureset

2016-02-12 Thread Jan Beulich
>>> On 05.02.16 at 14:42, wrote: > Awkwardly, some new feature bits mean "Feature $X no longer works". > Store these inverted in a featureset. > > This permits safe zero-extending of a smaller featureset as part of a > comparison, and safe reasoning (subset?, superset?, compatible? etc.) > withou

Re: [Xen-devel] [PATCH v2 08/30] xen/x86: Mask out unknown features from Xen's capabilities

2016-02-12 Thread Jan Beulich
>>> On 05.02.16 at 14:42, wrote: > --- /dev/null > +++ b/xen/arch/x86/cpuid.c > @@ -0,0 +1,19 @@ > +#include > +#include > + > +const uint32_t known_features[] = INIT_KNOWN_FEATURES; > + > +static void __maybe_unused build_assertions(void) > +{ > +BUILD_BUG_ON(ARRAY_SIZE(known_features) != F

Re: [Xen-devel] [PATCH v2 06/30] xen/x86: Script to automatically process featureset information

2016-02-12 Thread Andrew Cooper
On 12/02/16 16:36, Jan Beulich wrote: On 05.02.16 at 14:41, wrote: >> This script consumes include/public/arch-x86/cpufeatureset.h and generates a >> single include/asm-x86/cpuid-autogen.h containing all the processed >> information. >> >> Signed-off-by: Andrew Cooper > Acked-by: Jan Beulich

Re: [Xen-devel] [PATCH net-next v1 0/8] xen-netback: support toeplitz hashing

2016-02-12 Thread David Miller
From: Paul Durrant Date: Fri, 12 Feb 2016 11:07:50 + > Windows *requires* use of Teoplitz so your position completely rules > out being able to support receive side scaling in Windows PV > frontends on Linux kernel backends, not only for Xen but for any > other hypervisor, which I think is to

[Xen-devel] [ovmf test] 81861: regressions - FAIL

2016-02-12 Thread osstest service owner
flight 81861 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/81861/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 65543 version targeted

Re: [Xen-devel] [PATCH v2 07/30] xen/x86: Collect more cpuid feature leaves

2016-02-12 Thread Jan Beulich
>>> On 05.02.16 at 14:42, wrote: > New words are: > * 0x8007.edx - Contains Invarient TSC > * 0x8008.ebx - Newly used for AMD Zen processors > > In addition, replace some open-coded ITSC and EFRO manipulation. > > Signed-off-by: Andrew Cooper Acked-by: Jan Beulich

Re: [Xen-devel] [PATCH v2 06/30] xen/x86: Script to automatically process featureset information

2016-02-12 Thread Jan Beulich
>>> On 05.02.16 at 14:41, wrote: > This script consumes include/public/arch-x86/cpufeatureset.h and generates a > single include/asm-x86/cpuid-autogen.h containing all the processed > information. > > Signed-off-by: Andrew Cooper Acked-by: Jan Beulich albeit ... > --- /dev/null > +++ b/xen/to

[Xen-devel] [PATCH v3 2/2] xen: credit1: avoid boosting vCPUs being "just" migrated

2016-02-12 Thread Dario Faggioli
Moving a vCPU to a different pCPU means offlining it and then waking it up, on the new pCPU. Credit1 grants BOOST priority to vCPUs that wakes up, with the aim of improving I/O latency. The net effect of this all is that vCPUs get boosted when migrating, which shouldn't happen. For instance, this

[Xen-devel] [PATCH v3 1/2] xen: credit1: trace vCPU boost/unboost

2016-02-12 Thread Dario Faggioli
Add tracepoints and a performance counter for boosting and unboosting in Credit1. Note that they (the trace points) do not cover the case of the idle vCPU being boosted to run a tasklet, as there already is TRC_CSCHED_SCHED_TASKLET for that. Signed-off-by: Dario Faggioli --- Cc: George Dunlap

[Xen-devel] [PATCH v3 0/2] xen: sched: Credit1 shouldn't boost vcpus being migrated.

2016-02-12 Thread Dario Faggioli
Hi, take 3 of this series. Only change wrt v2 is the atomic-safeness fix in patch 2. While there, I've also added a comment about the need for such atomic-safeness when accessing Credit1's svc->flags. History is here: v2: http://lists.xenproject.org/archives/html/xen-devel/2016-02/msg01750.htm

Re: [Xen-devel] [PATCH v2 05/30] xen/public: Export cpu featureset information in the public API

2016-02-12 Thread Jan Beulich
>>> On 05.02.16 at 14:41, wrote: > +/* Intel-defined CPU features, CPUID level 0x0001.edx, word 0 */ > +#define X86_FEATURE_FPU ( 0*32+ 0) /* Onboard FPU */ Regardless of you limiting the interface to tools only, I'm not convinced exposing constants starting with X86_* here is app

Re: [Xen-devel] Clang tools build

2016-02-12 Thread Andrew Cooper
On 12/02/16 16:04, Jan Beulich wrote: On 12.02.16 at 16:25, wrote: >> Hello, >> >> Now that Clang 3.5 can build the hypervisor, I was just preparing a >> patch to README, and encountered this: >> >> In file included from xc_altp2m.c:23: >> In file included from ./xc_private.h:35: >> In file i

Re: [Xen-devel] Clang tools build

2016-02-12 Thread Jan Beulich
>>> On 12.02.16 at 16:25, wrote: > Hello, > > Now that Clang 3.5 can build the hypervisor, I was just preparing a > patch to README, and encountered this: > > In file included from xc_altp2m.c:23: > In file included from ./xc_private.h:35: > In file included from ./include/xenctrl.h:53: > /local

Re: [Xen-devel] [PATCH v3 2/5] arm/config: Declare ELFSIZE_[32|64] respectively.

2016-02-12 Thread Stefano Stabellini
On Fri, 12 Feb 2016, Konrad Rzeszutek Wilk wrote: > On Fri, Feb 12, 2016 at 03:26:14PM +, Stefano Stabellini wrote: > > On Fri, 12 Feb 2016, Jan Beulich wrote: > > > >>> On 12.02.16 at 15:17, wrote: > > > > --- a/xen/include/asm-arm/config.h > > > > +++ b/xen/include/asm-arm/config.h > > > > @

Re: [Xen-devel] [PATCH v3 2/5] arm/config: Declare ELFSIZE_[32|64] respectively.

2016-02-12 Thread Konrad Rzeszutek Wilk
On Fri, Feb 12, 2016 at 03:26:14PM +, Stefano Stabellini wrote: > On Fri, 12 Feb 2016, Jan Beulich wrote: > > >>> On 12.02.16 at 15:17, wrote: > > > --- a/xen/include/asm-arm/config.h > > > +++ b/xen/include/asm-arm/config.h > > > @@ -15,8 +15,10 @@ > > > > > > #if defined(CONFIG_ARM_64) >

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2016-02-12 Thread Konrad Rzeszutek Wilk
On Fri, Feb 12, 2016 at 02:53:21PM +, Stefano Stabellini wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > I agree to the conditions in the XenProject Coverity contribution > guidelines [0]. +1 > > I'm a developer working for Citrix Systems UK, Ltd. I've been active > in the Xen

Re: [Xen-devel] [PATCH v3 2/5] arm/config: Declare ELFSIZE_[32|64] respectively.

2016-02-12 Thread Stefano Stabellini
On Fri, 12 Feb 2016, Jan Beulich wrote: > >>> On 12.02.16 at 15:17, wrote: > > --- a/xen/include/asm-arm/config.h > > +++ b/xen/include/asm-arm/config.h > > @@ -15,8 +15,10 @@ > > > > #if defined(CONFIG_ARM_64) > > # define LONG_BYTEORDER 3 > > +# define ELFSIZE 64 > > #else > > # define LON

  1   2   >