[Xen-devel] [ovmf test] 96220: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96220 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/96220/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 94748 test-amd64-amd64-

Re: [Xen-devel] [edk2] [PATCH v2] ArmVirtPkg/ArmVirtXen: Add ACPI support for Virt Xen ARM

2016-06-24 Thread Shannon Zhao
On 2016/6/25 11:05, Andrew Fish wrote: >> > On Jun 24, 2016, at 7:50 PM, Shannon Zhao wrote: >> > >> > >> > >> > On 2016/6/23 21:42, Ard Biesheuvel wrote: > + // > + // Get the RSDP structure address from DeviceTree > + // > + Status = gBS->LocateProtoc

[Xen-devel] [linux-4.1 test] 96211: tolerable FAIL - PUSHED

2016-06-24 Thread osstest service owner
flight 96211 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/96211/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-libvirt 11 guest-startfail in 96183 pass in 96211 test-amd64-i386-libvirt-qemuu-debianh

Re: [Xen-devel] [PATCH v2 15/17] libxl/arm: Add ACPI module

2016-06-24 Thread Shannon Zhao
On 2016/6/24 2:35, Julien Grall wrote: > Hi Shannon, > > On 23/06/2016 04:17, Shannon Zhao wrote: >> From: Shannon Zhao >> >> Add the ARM Multiboot module for ACPI, so UEFI or DomU can get the base >> address of ACPI tables from it. >> >> Signed-off-by: Shannon Zhao >> --- >> docs/misc/arm/de

Re: [Xen-devel] [edk2] [PATCH v2] ArmVirtPkg/ArmVirtXen: Add ACPI support for Virt Xen ARM

2016-06-24 Thread Andrew Fish
> On Jun 24, 2016, at 7:50 PM, Shannon Zhao wrote: > > > > On 2016/6/23 21:42, Ard Biesheuvel wrote: + // + // Get the RSDP structure address from DeviceTree + // + Status = gBS->LocateProtocol (&gFdtClientProtocolGuid, NULL, >> Please add gFdtClientProtocolGuid to the

Re: [Xen-devel] [PATCH v2] ArmVirtPkg/ArmVirtXen: Add ACPI support for Virt Xen ARM

2016-06-24 Thread Shannon Zhao
On 2016/6/23 21:42, Ard Biesheuvel wrote: >> > + // >> > + // Get the RSDP structure address from DeviceTree >> > + // >> > + Status = gBS->LocateProtocol (&gFdtClientProtocolGuid, NULL, > Please add gFdtClientProtocolGuid to the [Depex] section of this module > Hi Ard, I try to add gFdtCli

[Xen-devel] [xen-unstable test] 96207: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96207 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/96207/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-qcow2 6 xen-bootfail REGR. vs. 96178 Regressions which ar

Re: [Xen-devel] [PATCH 0/3] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Dario Faggioli
On Fri, 2016-06-24 at 13:25 +, Wu, Feng wrote: > >  > > Then, in this case, the reason why we are sure that all the pcpus > > are > > executing the body of the tasklet, is indeed the structure of > > stop_machine_run() and stopmachine_action() themselves, which are > > built > > to make sure of

[Xen-devel] [qemu-upstream-4.3-testing test] 96208: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96208 qemu-upstream-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/96208/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 5 libvirt-build fail REGR. vs. 80927 build-i

Re: [Xen-devel] [PATCH] xen: x86: remove duplicated IA32_FEATURE_CONTROL MSR macro

2016-06-24 Thread Huang, Kai
Hi Kevin, Jan, Thanks for comments. On 6/24/2016 11:31 PM, Jan Beulich wrote: On 24.06.16 at 12:56, wrote: From: kaih.li...@gmail.com [mailto:kaih.li...@gmail.com] Sent: Friday, June 24, 2016 6:45 PM --- a/xen/include/asm-x86/msr-index.h +++ b/xen/include/asm-x86/msr-index.h @@ -133,12 +133,

[Xen-devel] [xen-4.3-testing test] 96202: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96202 xen-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/96202/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-libvirt5 libvirt-build fail REGR. vs. 87893 build-amd64-libvi

Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Razvan Cojocaru
On 06/24/16 21:48, Tamas K Lengyel wrote: >>> { >>> @@ -635,22 +661,22 @@ int main(int argc, char *argv[]) >>> rsp.u.mem_access = req.u.mem_access; >>> break; >>> case VM_EVENT_REASON_SOFTWARE_BREAKPOINT: >>> -printf("Break

[Xen-devel] [qemu-mainline test] 96201: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96201 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/96201/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs. 94856 test-amd64-i3

Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Tamas K Lengyel
>> { >> @@ -635,22 +661,22 @@ int main(int argc, char *argv[]) >> rsp.u.mem_access = req.u.mem_access; >> break; >> case VM_EVENT_REASON_SOFTWARE_BREAKPOINT: >> -printf("Breakpoint: rip=%016"PRIx64", gfn=%"PRIx64" (vcpu >>

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Konrad Rzeszutek Wilk
On Fri, Jun 24, 2016 at 02:02:42PM -0400, Daniel De Graaf wrote: > On 06/24/2016 01:46 PM, Konrad Rzeszutek Wilk wrote: > I can remove the HAS_CHECKPOLICY check completely and make the call to > checkpolicy only conditional on the Kconfig option. I think this is > less complicated than

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Daniel De Graaf
On 06/24/2016 01:46 PM, Konrad Rzeszutek Wilk wrote: I can remove the HAS_CHECKPOLICY check completely and make the call to checkpolicy only conditional on the Kconfig option. I think this is less complicated than stopping the compile one step above the invocation of checkpolicy, and probably ju

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Konrad Rzeszutek Wilk
> >>I can remove the HAS_CHECKPOLICY check completely and make the call to > >>checkpolicy only conditional on the Kconfig option. I think this is > >>less complicated than stopping the compile one step above the invocation > >>of checkpolicy, and probably just as informative (and better, if the >

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Julien Grall
Hello Konrad, On 24/06/16 18:41, Konrad Rzeszutek Wilk wrote: On Fri, Jun 24, 2016 at 01:34:29PM -0400, Daniel De Graaf wrote: On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: I would have expect a warning (if not an error) her

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Julien Grall
Hi Daniel, On 24/06/16 18:34, Daniel De Graaf wrote: On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: diff --git a/xen/xsm/flask/Makefile b/xen/xsm/flask/Makefile index 12fc3a9..eefd37c 100644 --- a/xen/xsm/flask/Makefile +++ b/

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Daniel De Graaf
On 06/24/2016 01:40 PM, Konrad Rzeszutek Wilk wrote: On Fri, Jun 24, 2016 at 01:34:29PM -0400, Daniel De Graaf wrote: On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: Hello Daniel, Please try to CC relevant maintainers on your

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Konrad Rzeszutek Wilk
On Fri, Jun 24, 2016 at 01:34:29PM -0400, Daniel De Graaf wrote: > On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: > >On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: > >>Hello Daniel, > >> > >>Please try to CC relevant maintainers on your patch. I would have missed it > >>if Andr

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Konrad Rzeszutek Wilk
On Fri, Jun 24, 2016 at 01:34:29PM -0400, Daniel De Graaf wrote: > On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: > >On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: > >>Hello Daniel, > >> > >>Please try to CC relevant maintainers on your patch. I would have missed it > >>if Andr

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Daniel De Graaf
On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: Hello Daniel, Please try to CC relevant maintainers on your patch. I would have missed it if Andrew did not ping me on IRC. On 20/06/16 15:04, Daniel De Graaf wrote: This adds a

[Xen-devel] Announcing schedbench, a scheduling micro-benchmark

2016-06-24 Thread George Dunlap
Hey all, I think I'm ready to publicly announce a project I've been working on for a few months called schedbench, a "microbenchmark" for schedulers (and the Xen scheduler in particular). You can find the code, along with a quick README, here: https://github.com/gwd/schedbench This is definitel

Re: [Xen-devel] [PATCH v5 09/14] hvmloader: Check modules whereabouts in perform_tests

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 01:44:30AM -0600, Jan Beulich wrote: > >>> On 22.06.16 at 19:15, wrote: > > +uint64_t cmdline_paddr = modlist[i].cmdline_paddr; > > + > > +if ( check_test_overlap(modlist[i].paddr, modlist[i].size) ) > > +{ > > +printf("Skipping tests due

Re: [Xen-devel] [PATCH v5 08/14] hvmloader: Locate the BIOS blob

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 01:33:45AM -0600, Jan Beulich wrote: > >>> On 22.06.16 at 19:15, wrote: > > --- a/tools/firmware/hvmloader/hvmloader.c > > +++ b/tools/firmware/hvmloader/hvmloader.c > > @@ -253,10 +253,51 @@ static void acpi_enable_sci(void) > > BUG_ON(!(pm1a_cnt_val & ACPI_PM1C_SCI_E

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Konrad Rzeszutek Wilk
On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: > Hello Daniel, > > Please try to CC relevant maintainers on your patch. I would have missed it > if Andrew did not ping me on IRC. > > On 20/06/16 15:04, Daniel De Graaf wrote: > >This adds a Kconfig option and support for including t

Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Tamas K Lengyel
On Fri, Jun 24, 2016 at 5:24 AM, Jan Beulich wrote: On 24.06.16 at 13:20, wrote: >>> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] >>> Sent: Friday, June 24, 2016 1:07 AM >>> >>> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c >>> index 03fcba7..4b69ca6 100644 >>>

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Julien Grall
Hello Daniel, Please try to CC relevant maintainers on your patch. I would have missed it if Andrew did not ping me on IRC. On 20/06/16 15:04, Daniel De Graaf wrote: This adds a Kconfig option and support for including the XSM policy from tools/flask/policy in the hypervisor so that the bootl

[Xen-devel] [libvirt test] 96204: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96204 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/96204/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 96157 Tests which

Re: [Xen-devel] monitor access to pages with a specific p2m_type_t

2016-06-24 Thread Tamas K Lengyel
On Jun 24, 2016 05:19, "Razvan Cojocaru" wrote: > > On 06/24/2016 02:05 PM, George Dunlap wrote: > > On Wed, Jun 22, 2016 at 12:38 PM, sepanta s wrote: > >> Hi, > >> Is it possible to monitor the access on the pages withp2m_type_t > >> p2m_ram_shared? > > > > cc'ing Tamas and Razvan > > Thanks fo

Re: [Xen-devel] [PATCH v1 Altp2m cleanup 1/3] altp2m cleanup work

2016-06-24 Thread Lai, Paul C
[Paul] inlined -Original Message- From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, June 23, 2016 11:19 PM To: Lai, Paul C Cc: Sahita, Ravi ; xen-devel Subject: RE: [PATCH v1 Altp2m cleanup 1/3] altp2m cleanup work >>> On 23.06.16 at 20:23, wrote: First of all - pleas

Re: [Xen-devel] pcie error containment: kill domain and dm without xend

2016-06-24 Thread Elena Ufimtseva
Thanks George! On Fri, Jun 24, 2016 at 4:37 AM, George Dunlap wrote: > On Wed, Jun 22, 2016 at 9:16 PM, Elena Ufimtseva wrote: >> Hello >> >> I am working on PCIe errors containment and XSA-124 relevant problem. >> This is only small part of the problem and I can provide more details later >> i

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread David Vrabel
On 24/06/16 15:25, Jan Beulich wrote: > > And then - what's your expectation? Any parts of this new > interface can subsequently be marked stable if we so wish. I > don't see why this needs to happen right away. Ok. David ___ Xen-devel mailing list Xe

Re: [Xen-devel] [PATCH v2 2/2] xen-pciback: clean up {bar, rom}_init()

2016-06-24 Thread David Vrabel
On 07/06/16 07:31, Jan Beulich wrote: > - drop unused function parameter of read_dev_bar() > - drop rom_init() (now identical to bar_init()) > - fold read_dev_bar() into its now single caller > - simplify determination of 64-bit memory resource > - use const and unsigned Please split this in 5 sep

Re: [Xen-devel] [PATCH 13/17 v3] xen: move FLASK entry under XSM in Kconfig

2016-06-24 Thread Doug Goldstein
On 6/21/16 12:09 PM, Daniel De Graaf wrote: > Since enabling XSM is required to enable FLASK, place the option for > FLASK below the one for XSM. In addition, since it does not make sense > to enable XSM without any XSM providers, and FLASK is the only XSM > provider, hide the option to disable FL

Re: [Xen-devel] Binary compatibility report for Xen base libraries

2016-06-24 Thread Doug Goldstein
On 6/24/16 9:21 AM, Ponomarenko Andrey wrote: > Hello, > > I maintain a new project for backward compatibility analysis of the Linux > ABIs. The report for Xen base libraries has been recently added to the > project: http://abi-laboratory.pro/tracker/timeline/xen/ > > The report is generated da

Re: [Xen-devel] [PATCH v2 0/4] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Dario Faggioli
On Fri, 2016-06-24 at 14:49 +0100, George Dunlap wrote: > On 24/06/16 14:42, Wu, Feng wrote: > > Here is my understanding, if the guest has nothing to do, it will > > call HLT, and Xen hypervisor will call vcpu_block(), if we don't > > block the vCPU and return to guest, guest will continue to run

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread George Dunlap
On 24/06/16 15:25, Jan Beulich wrote: On 24.06.16 at 15:51, wrote: >> On 24/06/16 14:37, Jan Beulich wrote: >> On 24.06.16 at 15:27, wrote: On 24/06/16 11:35, Jan Beulich wrote: On 24.06.16 at 12:29, wrote: >> On 24/06/16 11:21, Jan Beulich wrote: >>> A long while

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 15:51, wrote: > On 24/06/16 14:37, Jan Beulich wrote: > On 24.06.16 at 15:27, wrote: >>> On 24/06/16 11:35, Jan Beulich wrote: >>> On 24.06.16 at 12:29, wrote: > On 24/06/16 11:21, Jan Beulich wrote: >> A long while back separating out all control kind operatio

[Xen-devel] Binary compatibility report for Xen base libraries

2016-06-24 Thread Ponomarenko Andrey
Hello, I maintain a new project for backward compatibility analysis of the Linux ABIs. The report for Xen base libraries has been recently added to the project: http://abi-laboratory.pro/tracker/timeline/xen/ The report is generated daily with the help of the abi-compliance-checker, abi-dumper

Re: [Xen-devel] [PATCH v5 05/14] libxl: Load guest BIOS from file

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 01:23:19AM -0600, Jan Beulich wrote: > >>> On 22.06.16 at 19:15, wrote: > > --- a/tools/libxl/libxl_paths.c > > +++ b/tools/libxl/libxl_paths.c > > @@ -35,6 +35,16 @@ const char *libxl__run_dir_path(void) > > return XEN_RUN_DIR; > > } > > > > +const char *libxl__sea

[Xen-devel] [ovmf test] 96196: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96196 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/96196/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 94748 test-amd64-amd64-

Re: [Xen-devel] [PATCH v3 1/2] xen-pciback: return proper values during BAR sizing

2016-06-24 Thread David Vrabel
On 24/06/16 10:13, Jan Beulich wrote: > Reads following writes with all address bits set to 1 should return all > changeable address bits as one, not the BAR size (nor, as was the case > for the upper half of 64-bit BARs, the high half of the region's end > address). Presumably this didn't cause an

Re: [Xen-devel] [PATCH v3 7/8] xen/arm: Rework the interface of p2m_lookup and use typesafe gfn and mfn

2016-06-24 Thread Andrew Cooper
On 24/06/16 14:58, Julien Grall wrote: > Hi Stefano, > > On 23/06/16 15:14, Stefano Stabellini wrote: >> On Tue, 21 Jun 2016, Julien Grall wrote: >>> The prototype and the declaration of p2m_lookup disagree on how the >>> function should be used. One expect a frame number whilst the other >>> an ad

[Xen-devel] [GIT PULL] xen: bug fixes for 4.7-rc4

2016-06-24 Thread David Vrabel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.7b-rc4-tag xen: bug fixes for 4.7-rc4 - - Fix x86 PV dom0 crash during early boot on some hardware. - - Fix two pciback bugs affects

Re: [Xen-devel] [PATCH v3 7/8] xen/arm: Rework the interface of p2m_lookup and use typesafe gfn and mfn

2016-06-24 Thread Julien Grall
Hi Stefano, On 23/06/16 15:14, Stefano Stabellini wrote: On Tue, 21 Jun 2016, Julien Grall wrote: The prototype and the declaration of p2m_lookup disagree on how the function should be used. One expect a frame number whilst the other an address. Thankfully, everyone is using with an address to

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread David Vrabel
On 24/06/16 14:37, Jan Beulich wrote: On 24.06.16 at 15:27, wrote: >> On 24/06/16 11:35, Jan Beulich wrote: >> On 24.06.16 at 12:29, wrote: On 24/06/16 11:21, Jan Beulich wrote: > A long while back separating out all control kind operations (intended > for use by only the co

Re: [Xen-devel] [PATCH v2 0/4] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread George Dunlap
On 24/06/16 14:42, Wu, Feng wrote: > > >> -Original Message- >> From: Dario Faggioli [mailto:dario.faggi...@citrix.com] >> Sent: Friday, June 24, 2016 6:29 PM >> To: Wu, Feng ; xen-devel@lists.xen.org >> Cc: k...@xen.org; Tian, Kevin ; jbeul...@suse.com; >> andrew.coop...@citrix.com; geor

[Xen-devel] [xen-unstable-smoke test] 96214: tolerable all pass - PUSHED

2016-06-24 Thread osstest service owner
flight 96214 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/96214/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH v2 0/4] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Friday, June 24, 2016 6:29 PM > To: Wu, Feng ; xen-devel@lists.xen.org > Cc: k...@xen.org; Tian, Kevin ; jbeul...@suse.com; > andrew.coop...@citrix.com; george.dun...@eu.citrix.com; > konrad.w...@oracle

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 15:27, wrote: > On 24/06/16 11:35, Jan Beulich wrote: > On 24.06.16 at 12:29, wrote: >>> On 24/06/16 11:21, Jan Beulich wrote: A long while back separating out all control kind operations (intended for use by only the control domain or device model) from the curre

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread David Vrabel
On 24/06/16 11:35, Jan Beulich wrote: On 24.06.16 at 12:29, wrote: >> On 24/06/16 11:21, Jan Beulich wrote: >>> A long while back separating out all control kind operations (intended >>> for use by only the control domain or device model) from the currect >>> hvmop hypercall has been discusse

Re: [Xen-devel] [PATCH 0/3] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Wu, Feng
> > Thanks for your replay. Yes, I think this is point. Here descheduling > > of vCPU3 > > happens, and the reason we will choose the tasklet as the next > > running > > unit for sure (not choosing another vCPU or vCPU3 itself as the next > > running unit) is because tasklet will overrides all othe

Re: [Xen-devel] [PATCH v12 6/6] vt-d: fix vt-d Device-TLB flush timeout issue

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 13:55, wrote: >> --- a/xen/drivers/passthrough/pci.c >> +++ b/xen/drivers/passthrough/pci.c >> @@ -419,7 +419,7 @@ static void free_pdev(struct pci_seg *pseg, struct >> pci_dev *pdev) >> xfree(pdev); >> } >> >> -static void _pci_hide_device(struct pci_dev *pdev) >> +void

Re: [Xen-devel] [PATCH v12 6/6] vt-d: fix vt-d Device-TLB flush timeout issue

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > If Device-TLB flush timed out, we hide the target ATS device > immediately and crash the domain owning this ATS device. If > impacted domain is hardware domain, just throw out a warning. > > By hiding the device, we ma

Re: [Xen-devel] [PATCH v12 5/6] IOMMU: move the domain crash logic up to the generic IOMMU layer

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > Signed-off-by: Quan Xu > > CC: Julien Grall > CC: Kevin Tian > CC: Feng Wu > CC: Jan Beulich > CC: Suravee Suthikulpanit > --- > xen/drivers/passthrough/iommu.c | 30 > -- > xen/d

Re: [Xen-devel] [PATCH v12 4/6] IOMMU/x86: using a struct pci_dev* instead of SBDF

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > a struct pci_dev* instead of SBDF is stored inside struct > pci_ats_dev and parameter to enable_ats_device(). > > Signed-off-by: Quan Xu Can we unify the naming convention throughout the patch, e.g. always using ats

Re: [Xen-devel] pcie error containment: kill domain and dm without xend

2016-06-24 Thread George Dunlap
On Wed, Jun 22, 2016 at 9:16 PM, Elena Ufimtseva wrote: > Hello > > I am working on PCIe errors containment and XSA-124 relevant problem. > This is only small part of the problem and I can provide more details later > if that is of someone's interest. > As the temporary solution, guest domain with

Re: [Xen-devel] [PATCH 1/2] xen: sched: rtds refactor code

2016-06-24 Thread Meng Xu
On Fri, Jun 24, 2016 at 3:45 AM, Dario Faggioli wrote: > On Thu, 2016-06-23 at 11:42 +0100, George Dunlap wrote: >> On 22/06/16 17:16, Meng Xu wrote: >> > >> > I think he is trying to align those comments to make them start >> > from >> > the same column. I was confused at the reason at the very >

Re: [Xen-devel] [PATCH v12 3/6] vt-d: convert conditionals of qi_ctrl->qinval_maddr into ASSERT()s

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > QI ought to have got disabled if any of the IOMMU table setup > failed. A QI function (other than enable_qinval) is unreachable > when qi_ctrl->qinval_maddr is zero. > > Signed-off-by: Quan Xu Acked-by: Kevin Tian

[Xen-devel] [PATCH] xen: fix ram init regression

2016-06-24 Thread Gerd Hoffmann
Commit "8156d48 pc: allow raising low memory via max-ram-below-4g option" causes a regression on xen, because it uses a different memory split. This patch initializes max-ram-below-4g to zero and leaves the initialization to the memory initialization functions. That way they can pick different de

Re: [Xen-devel] [PATCH] get_maintainer.pl: Teach brace expansion

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 12:09:53PM +0100, George Dunlap wrote: > On Wed, Jun 22, 2016 at 6:28 PM, Anthony PERARD > wrote: > > This only implement a simpler non-nested brace expansion. > > > > This will convert brace expansion style use in MAINTAINER into a regex > > that get_maintainer.pl can use

Re: [Xen-devel] [PATCH v12 2/6] vt-d: synchronize for Device-TLB flush one by one

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > Today we do Device-TLB flush synchronization after issuing flush > requests for all ATS devices belonging to a VM. Doing so however > imposes a limitation, i.e. that we can not figure out which flush > request is blocke

Re: [Xen-devel] [PATCH] xen: x86: remove duplicated IA32_FEATURE_CONTROL MSR macro

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 12:56, wrote: >> From: kaih.li...@gmail.com [mailto:kaih.li...@gmail.com] >> Sent: Friday, June 24, 2016 6:45 PM >> --- a/xen/include/asm-x86/msr-index.h >> +++ b/xen/include/asm-x86/msr-index.h >> @@ -133,12 +133,13 @@ >> #define MSR_IA32_VMX_TRUE_EXIT_CTLS 0x48f

Re: [Xen-devel] [PATCH v12 1/6] IOMMU: add a timeout parameter for device IOTLB invalidation

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > The parameter 'iommu_dev_iotlb_timeout' specifies the timeout > of device IOTLB invalidation in milliseconds. By default, the > timeout is 1000 milliseconds, which can be boot-time changed. > > We also confirmed with V

Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 13:20, wrote: >> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] >> Sent: Friday, June 24, 2016 1:07 AM >> >> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c >> index 03fcba7..4b69ca6 100644 >> --- a/xen/arch/x86/hvm/vmx/vmx.c >> +++ b/xen/arch/x86/hvm/

Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Tian, Kevin
> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] > Sent: Friday, June 24, 2016 1:07 AM > > diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c > index 03fcba7..4b69ca6 100644 > --- a/xen/arch/x86/hvm/vmx/vmx.c > +++ b/xen/arch/x86/hvm/vmx/vmx.c > @@ -3373,10 +3373,39 @@ void v

Re: [Xen-devel] monitor access to pages with a specific p2m_type_t

2016-06-24 Thread Razvan Cojocaru
On 06/24/2016 02:05 PM, George Dunlap wrote: > On Wed, Jun 22, 2016 at 12:38 PM, sepanta s wrote: >> Hi, >> Is it possible to monitor the access on the pages withp2m_type_t >> p2m_ram_shared? > > cc'ing Tamas and Razvan Thanks for the CC. Judging by the "if ( npfec.write_access && (p2mt == p2m_r

Re: [Xen-devel] Change of max-ram-below-4g initial value breaks Xen

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 07:46:23AM +0200, Gerd Hoffmann wrote: > On Do, 2016-06-23 at 17:18 +0100, Anthony PERARD wrote: > > On Thu, Jun 23, 2016 at 04:57:54PM +0200, Gerd Hoffmann wrote: > > > Hi, > > > > > > > How could xen_ram_init() find out if the value of max-ram-below-4g is > > > > the de

Re: [Xen-devel] [PATCH] get_maintainer.pl: Teach brace expansion

2016-06-24 Thread George Dunlap
On Wed, Jun 22, 2016 at 6:28 PM, Anthony PERARD wrote: > This only implement a simpler non-nested brace expansion. > > This will convert brace expansion style use in MAINTAINER into a regex > that get_maintainer.pl can use to match a path again a maintainer > section. > > It is done by using two d

Re: [Xen-devel] monitor access to pages with a specific p2m_type_t

2016-06-24 Thread George Dunlap
On Wed, Jun 22, 2016 at 12:38 PM, sepanta s wrote: > Hi, > Is it possible to monitor the access on the pages withp2m_type_t > p2m_ram_shared? cc'ing Tamas and Razvan -George ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-

Re: [Xen-devel] [PATCH v6 4/5] vm_event: clear up return value of vm_event_monitor_traps

2016-06-24 Thread Tian, Kevin
> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] > Sent: Friday, June 24, 2016 1:07 AM > > The return value has not been clearly defined, with the function > never returning 0 which seemingly indicated a condition where the > guest should crash. > > In this patch we define -rc as error condit

Re: [Xen-devel] [PATCH v5 1/9] vm_event: clear up return value of vm_event_monitor_traps

2016-06-24 Thread Tian, Kevin
> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] > Sent: Saturday, June 18, 2016 3:09 AM > > On Thu, Jun 2, 2016 at 4:52 PM, Tamas K Lengyel wrote: > > The return value has not been clearly defined, with the function > > never returning 0 which seemingly indicated a condition where the > > gu

[Xen-devel] [linux-3.18 test] 96188: tolerable FAIL - PUSHED

2016-06-24 Thread osstest service owner
flight 96188 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/96188/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail in 96161 pass in 96188 test-amd64-amd6

Re: [Xen-devel] [PATCH] xen: x86: remove duplicated IA32_FEATURE_CONTROL MSR macro

2016-06-24 Thread Tian, Kevin
> From: kaih.li...@gmail.com [mailto:kaih.li...@gmail.com] > Sent: Friday, June 24, 2016 6:45 PM > > From: Kai Huang > > Below commit introduced a new macro MSR_IA32_FEATURE_CONTROL for > IA32_FEATURE_CONTROL MSR but it didn't remove old IA32_FEATURE_CONTROL_MSR > macro. The new one has better n

[Xen-devel] [PATCH] xen: x86: remove duplicated IA32_FEATURE_CONTROL MSR macro

2016-06-24 Thread kaih . linux
From: Kai Huang Below commit introduced a new macro MSR_IA32_FEATURE_CONTROL for IA32_FEATURE_CONTROL MSR but it didn't remove old IA32_FEATURE_CONTROL_MSR macro. The new one has better naming convention, so remove the old as duplication and replace the relevant code with new one. mwait-idle

[Xen-devel] [xen-unstable-smoke test] 96210: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96210 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/96210/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 96189 Tests which di

Re: [Xen-devel] [PATCH] xen: x86: remove duplicated MSR_IA32_FEATURE_CONTROL definition

2016-06-24 Thread Huang, Kai
On 6/22/2016 11:44 PM, Jan Beulich wrote: On 22.06.16 at 12:17, wrote: @@ -288,7 +289,6 @@ #define MSR_IA32_PLATFORM_ID 0x0017 #define MSR_IA32_EBL_CR_POWERON0x002a #define MSR_IA32_EBC_FREQUENCY_ID 0x002c -#define MSR_IA32_FEATURE_CONTROL 0

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 12:29, wrote: > On 24/06/16 11:21, Jan Beulich wrote: >> A long while back separating out all control kind operations (intended >> for use by only the control domain or device model) from the currect >> hvmop hypercall has been discussed. This series aims at finally making >> th

[Xen-devel] [PATCH v2 11/11] x86/HVM: serialize trap injecting producer and consumer

2016-06-24 Thread Jan Beulich
Since injection works on a remote vCPU, and since there's no enforcement of the subject vCPU being paused, there's a potential race between the producing and consuming sides. Fix this by leveraging the vector field as synchronization variable. Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper

[Xen-devel] [PATCH v2 10/11] hvmctl: convert HVMOP_*ioreq_server*

2016-06-24 Thread Jan Beulich
Note that we can't adjust HVM_IOREQSRV_BUFIOREQ_* to properly obey name space rules, as these constants as in use by callers of the libxc interface. Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Paul Durrant Reviewed-by: Andrew Cooper --- a/tools/libxc/include/xenctrl.h +++ b/t

[Xen-devel] [PATCH v2 09/11] hvmctl: convert HVMOP_inject_msi

2016-06-24 Thread Jan Beulich
Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/libxc/xc_misc.c +++ b/tools/libxc/xc_misc.c @@ -508,27 +508,11 @@ int xc_hvm_set_pci_link_route( int xc_hvm_inject_msi( xc_interface *xch, domid_t dom, uint64_t addr, uint32_t data) { -DECLARE_HYPE

[Xen-devel] [PATCH v2 08/11] hvmctl: convert HVMOP_inject_trap

2016-06-24 Thread Jan Beulich
Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/libxc/xc_misc.c +++ b/tools/libxc/xc_misc.c @@ -584,31 +584,15 @@ int xc_hvm_inject_trap( uint32_t type, uint32_t error_code, uint32_t insn_len, uint64_t cr2) { -DECLARE_HYPERCALL_BUFFER(struct

[Xen-devel] [PATCH v2 07/11] hvmctl: convert HVMOP_set_mem_type

2016-06-24 Thread Jan Beulich
This allows elimination of the (ab)use of the high operation number bits for encoding continuations. Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of the previous 64-bit parameter got ignore so far). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper

[Xen-devel] [PATCH v2 05/11] hvmctl: convert HVMOP_track_dirty_vram

2016-06-24 Thread Jan Beulich
Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of the previous 64-bit parameter got ignore so far). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/libxc/include/xenctrl.h +++ b/tools/libxc/include/xenctrl.h @@ -1613,7 +1613,7 @@ int x

[Xen-devel] [PATCH v2 06/11] hvmctl: convert HVMOP_modified_memory

2016-06-24 Thread Jan Beulich
Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of the previous 64-bit parameter got ignore so far). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/libxc/include/xenctrl.h +++ b/tools/libxc/include/xenctrl.h @@ -1620,7 +1620,7 @@ int x

[Xen-devel] [PATCH v2 04/11] hvmctl: convert HVMOP_set_pci_link_route

2016-06-24 Thread Jan Beulich
Note that this retains the hvmop interface definitions as those had (wrongly) been exposed to non-tool stack consumers (albeit the operation wouldn't have succeeded when requested by a domain for itself). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/li

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread David Vrabel
On 24/06/16 11:21, Jan Beulich wrote: > A long while back separating out all control kind operations (intended > for use by only the control domain or device model) from the currect > hvmop hypercall has been discussed. This series aims at finally making > this reality (at once allowing to streamli

Re: [Xen-devel] [PATCH] xen/arm: map_dev_mmio_region: The iomem permission check should be done on MFN

2016-06-24 Thread Julien Grall
Hi, Ping? Cheers, On 14/06/16 12:50, Julien Grall wrote: The helper iomem_access_permitted expects MFNs in parameters and not GNFs. Thankfully only the hardware domain can call this function and it will always be with GFNS == MFNs for now. Also, fix the printf to use the MFN range and not the

[Xen-devel] [PATCH v2 03/11] hvmctl: convert HVMOP_set_isa_irq_level

2016-06-24 Thread Jan Beulich
Note that this retains the hvmop interface definitions as those had (wrongly) been exposed to non-tool stack consumers (albeit the operation wouldn't have succeeded when requested by a domain for itself). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/li

Re: [Xen-devel] [PATCH v2 0/4] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Dario Faggioli
On Fri, 2016-06-24 at 06:33 +, Wu, Feng wrote: > > -Original Message- > > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > > In your case, AFAICUI, it's: > >  - the vCPU should block, waiting for an event > >  - the event is _not_ arrived, so we indeed should block > >  - we do

[Xen-devel] [PATCH v2 02/11] hvmctl: convert HVMOP_set_pci_intx_level

2016-06-24 Thread Jan Beulich
Note that this adds validation of the "domain" interface structure field, which previously got ignored. Note further that this retains the hvmop interface definitions as those had (wrongly) been exposed to non-tool stack consumers (albeit the operation wouldn't have succeeded when requested by a d

Re: [Xen-devel] [PATCH v4 3/3] x86/ioreq server: Add HVMOP to map guest ram with p2m_ioreq_server to an ioreq server.

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 11:57, wrote: > On 6/24/2016 4:01 PM, Jan Beulich wrote: > On 24.06.16 at 09:12, wrote: >>> On 6/24/2016 2:12 PM, Jan Beulich wrote: And then, thinking about it again especially in the context of the hvmctl series - the unbinding of the type is happening in a

Re: [Xen-devel] [PATCH 0/3] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Dario Faggioli
On Fri, 2016-06-24 at 07:59 +, Wu, Feng wrote: > > -Original Message- > > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > > So, vCPU 3 was running, but then some called stop_machine_run(), > > which > > causes the descheduling of vCPU 3, and the execution of the > > stopmachin

[Xen-devel] [PATCH v2 01/11] public / x86: introduce hvmctl hypercall

2016-06-24 Thread Jan Beulich
... as a means to replace all HVMOP_* which a domain can't issue on itself (i.e. intended for use by only the control domain or device model). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu --- v2: Widen cmd field to 32 bits and opaque one to 64. Drop HVMCTL_iter_*. --- a/xen/arch/x86/hvm/

Re: [Xen-devel] [PATCH v1 Altp2m cleanup 2/3] Move altp2m specific functions to altp2m files.

2016-06-24 Thread George Dunlap
On Tue, Jun 21, 2016 at 5:04 PM, Paul Lai wrote: > Move altp2m specific functions to altp2m files. This makes the code > a little easier to read. > > Signed-off-by: Paul Lai > --- > xen/arch/x86/mm/altp2m.c | 43 > +++ > xen/arch/x86/mm/hap/hap.c

[Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread Jan Beulich
A long while back separating out all control kind operations (intended for use by only the control domain or device model) from the currect hvmop hypercall has been discussed. This series aims at finally making this reality (at once allowing to streamline the associated XSM checking). 01: public /

Re: [Xen-devel] Xen on QEMU

2016-06-24 Thread George Dunlap
On Mon, Jun 20, 2016 at 9:00 AM, Fadwa Messaoudi wrote: > Hi, > is it possible to install Xen on QEMU , and if so could you send me a > details tutorial on how to do it. Did you try it? Also, you might want to read this: http://wiki.xenproject.org/wiki/Asking_Developer_Questions Good luck, -G

Re: [Xen-devel] [PATCH v4 3/3] x86/ioreq server: Add HVMOP to map guest ram with p2m_ioreq_server to an ioreq server.

2016-06-24 Thread Yu Zhang
On 6/24/2016 4:01 PM, Jan Beulich wrote: On 24.06.16 at 09:12, wrote: On 6/24/2016 2:12 PM, Jan Beulich wrote: In any event, I think log-dirty shouldn't be disabled when an ioreq server binds the type, but as long as there are outstanding entries of that type. That way, the "cannot be migrat

  1   2   >