[Xen-devel] [PATCH v4 5/7] xen-pciback: use const and unsigned in bar_init()

2016-07-05 Thread Jan Beulich
Signed-off-by: Jan Beulich --- drivers/xen/xen-pciback/conf_space_header.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_header.c +++ 4.7-rc6-xen-pciback/drivers/xen/xen-pciback/conf_space_header.c @@ -211,8 +211,8 @@

[Xen-devel] [PATCH v4 4/7] xen-pciback: simplify determination of 64-bit memory resource

2016-07-05 Thread Jan Beulich
Other than for raw BAR values, flags are properly separated in the internal representation. Signed-off-by: Jan Beulich --- drivers/xen/xen-pciback/conf_space_header.c |5 + 1 file changed, 1 insertion(+), 4 deletions(-) --- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_he

[Xen-devel] [PATCH v4 3/7] xen-pciback: fold read_dev_bar() into its now single caller

2016-07-05 Thread Jan Beulich
Signed-off-by: Jan Beulich --- drivers/xen/xen-pciback/conf_space_header.c | 33 +++- 1 file changed, 13 insertions(+), 20 deletions(-) --- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_header.c +++ 4.7-rc6-xen-pciback/drivers/xen/xen-pciback/conf_space_he

[Xen-devel] [PATCH v4 2/7] xen-pciback: drop rom_init()

2016-07-05 Thread Jan Beulich
It is now identical to bar_init(). Signed-off-by: Jan Beulich --- drivers/xen/xen-pciback/conf_space_header.c | 14 +- 1 file changed, 1 insertion(+), 13 deletions(-) --- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_header.c +++ 4.7-rc6-xen-pciback/drivers/xen/xen-p

[Xen-devel] [PATCH v4 1/7] xen-pciback: drop unused function parameter of read_dev_bar()

2016-07-05 Thread Jan Beulich
Signed-off-by: Jan Beulich --- drivers/xen/xen-pciback/conf_space_header.c |7 +++ 1 file changed, 3 insertions(+), 4 deletions(-) --- 4.7-rc6-xen-pciback.orig/drivers/xen/xen-pciback/conf_space_header.c +++ 4.7-rc6-xen-pciback/drivers/xen/xen-pciback/conf_space_header.c @@ -210,8 +210,7

Re: [Xen-devel] [PATCH v3 09/16] efi: explicitly define efi struct in xen/arch/x86/efi/stub.c

2016-07-05 Thread Jan Beulich
>>> On 05.07.16 at 20:33, wrote: > On Fri, May 27, 2016 at 02:16:09AM -0600, Jan Beulich wrote: >> >>> On 25.05.16 at 18:45, wrote: >> > On Wed, May 25, 2016 at 01:03:42AM -0600, Jan Beulich wrote: >> >> >>> On 15.04.16 at 14:33, wrote: >> >> > --- a/xen/arch/x86/efi/stub.c >> >> > +++ b/xen/arc

[Xen-devel] [PATCH v4 0/7] xen-pciback: misc cleanup

2016-07-05 Thread Jan Beulich
The first five patches are the result of the requested split of "xen-pciback: clean up {bar,rom}_init()", with Boris'es R-b dropped despite there not being any functional change (the mechanical change appears too significant to retain it). The remaining two are a follow-up to the recent "xen/pcibac

Re: [Xen-devel] [PATCH v2] xen: arm64: Add support for Renesas RCar Gen3 H3 Salvator-X platform

2016-07-05 Thread Dirk Behme
Hi Andre, On 05.07.2016 16:29, Andre Przywara wrote: Hi, On 05/07/16 15:22, Dirk Behme wrote: On 05.07.2016 15:45, Andre Przywara wrote: Hi, On 05/07/16 14:34, Julien Grall wrote: (CC Andre) On 05/07/16 14:04, Dirk Behme wrote: On 05.07.2016 14:45, Julien Grall wrote: On 05/07/16 13:09

[Xen-devel] [qemu-mainline test] 96683: regressions - FAIL

2016-07-05 Thread osstest service owner
flight 96683 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/96683/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 94856 test-

[Xen-devel] [PATCH v2 2/3] arm/xen: add support for vm_assist hypercall

2016-07-05 Thread Juergen Gross
Add support for the Xen HYPERVISOR_vm_assist hypercall. Signed-off-by: Juergen Gross Reviewed-by: Boris Ostrovsky Reviewed-by: Julien Grall Reviewed-by: Stefano Stabellini --- arch/arm/include/asm/xen/hypercall.h | 1 + arch/arm/xen/enlighten.c | 1 + arch/arm/xen/hypercall.S

[Xen-devel] [PATCH v2 1/3] xen: update xen headers

2016-07-05 Thread Juergen Gross
Update some Xen headers to be able to use new functionality. Signed-off-by: Juergen Gross Reviewed-by: Boris Ostrovsky Reviewed-by: Stefano Stabellini --- include/xen/interface/vcpu.h | 24 +++- include/xen/interface/xen.h | 17 - 2 files changed, 31 insert

[Xen-devel] [PATCH v2 0/3] xen: add full support for CONFIG_PARAVIRT_TIME_ACCOUNTING

2016-07-05 Thread Juergen Gross
With most recent Xen hypervisor (4.8) it is now possible to add full support of CONFIG_PARAVIRT_TIME_ACCOUNTING. To be applied on top of commit ed2f61fdd2356c2a1d1239aa1507ce4e2e059306 "xen: add steal_clock support on x86" of kernel/git/xen/tip.git Runtime tested on x86_64, compile tested on arm6

[Xen-devel] [PATCH v2 3/3] xen: support runqueue steal time on xen

2016-07-05 Thread Juergen Gross
Up to now reading the stolen time of a remote cpu was not possible in a performant way under Xen. This made support of runqueue steal time via paravirt_steal_rq_enabled impossible. With the addition of an appropriate hypervisor interface this is now possible, so add the support. Signed-off-by: Ju

Re: [Xen-devel] [PATCH 3/3] xen: support runqueue steal time on xen

2016-07-05 Thread Juergen Gross
On 05/07/16 17:23, Stefano Stabellini wrote: > On Wed, 22 Jun 2016, Juergen Gross wrote: >> Up to now reading the stolen time of a remote cpu was not possible in a >> performant way under Xen. This made support of runqueue steal time via >> paravirt_steal_rq_enabled impossible. >> >> With the addit

[Xen-devel] [qemu-mainline bisection] complete test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm

2016-07-05 Thread osstest service owner
branch xen-unstable xenbranch xen-unstable job test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm testid debian-hvm-install Tree: libvirt git://xenbits.xen.org/libvirt.git Tree: libvirt_gnulib git://git.sv.gnu.org/gnulib.git Tree: linux git://xenbits.xen.org/linux-pvops.git Tree: linuxfirmware git

Re: [Xen-devel] Lenovo X200 IOMMU support through Xen 4.6 iommu=no-igfx switch

2016-07-05 Thread Thierry Laurion
I Konrad, first, thanks for your input and your time, it is much appreciated. I understand that those changes are torward the linux kernel, which is used by xen compilation. I applied the changes and i'm rebuilding Qubes with xen 4.6.1 based on a kernel-4.1.24. Will test the build in the next days

Re: [Xen-devel] [PATCH 14/18] arm/altp2m: Add HVMOP_altp2m_set_mem_access.

2016-07-05 Thread Sergej Proskurin
Hello Julien, On 07/05/2016 02:49 PM, Julien Grall wrote: > Hello Sergej, > > On 04/07/16 12:45, Sergej Proskurin wrote: >> +static inline >> +int p2m_set_altp2m_mem_access(struct domain *d, struct p2m_domain *hp2m, >> + struct p2m_domain *ap2m, p2m_access_t a, >> +

Re: [Xen-devel] [PATCH 13/18] arm/altp2m: Make get_page_from_gva ready for altp2m.

2016-07-05 Thread Sergej Proskurin
Hi Julien, On 07/04/2016 10:34 PM, Julien Grall wrote: > Hello Sergej, > > On 04/07/2016 12:45, Sergej Proskurin wrote: >> diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c >> index ce1c3c3..413125f 100644 >> --- a/xen/arch/arm/guestcopy.c >> +++ b/xen/arch/arm/guestcopy.c >> @@ -1

Re: [Xen-devel] [PATCH 11/18] arm/altp2m: Make flush_tlb_domain ready for altp2m.

2016-07-05 Thread Sergej Proskurin
Hi Julien, On 07/05/2016 05:37 PM, Julien Grall wrote: > > > On 05/07/16 15:48, Sergej Proskurin wrote: >> On 07/04/2016 10:32 PM, Julien Grall wrote: >>> On 04/07/2016 12:45, Sergej Proskurin wrote: +p2m_load_altp2m_VTTBR(n); +else +p2m_load_VTTBR(n->domain);

Re: [Xen-devel] [PATCH v8 1/6] monitor: rename and relocate vm_event_monitor_traps

2016-07-05 Thread Razvan Cojocaru
On 07/05/16 21:37, Tamas K Lengyel wrote: > The function vm_event_monitor_traps actually belongs in the monitor subsystem. > As part of this patch we fix the sync input's type to bool_t to match how > the callers use it. > > Signed-off-by: Tamas K Lengyel > --- > Cc: Jan Beulich > Cc: Andrew Coo

[Xen-devel] [PATCH v1 18/20] libxl/acpi: Add ACPI e820 entry

2016-07-05 Thread Boris Ostrovsky
Add entry for ACPI tables created for PVHv2 guests to e820 map. Signed-off-by: Boris Ostrovsky --- New patch tools/libxc/include/xc_dom.h |4 tools/libxl/libxl_dom.c |8 tools/libxl/libxl_x86.c | 11 +++ 3 files changed, 19 insertions(+), 4 deletions(-

[Xen-devel] [ovmf test] 96675: regressions - FAIL

2016-07-05 Thread osstest service owner
flight 96675 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/96675/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 94748 test-amd64-i386-

[Xen-devel] [PATCH v1 00/20] Make ACPI builder available to components other than hvmloader

2016-07-05 Thread Boris Ostrovsky
This is V1 of the series posted earlier as an RFC The goal here is to build ACPI tables for PVHv2/HVMlite guests while reusing existing hvmloader's ACPI builder code. The builder is provided as a library in tools/libacpi. Main changes from RFC are: * Move toolstack code that loads the tables in

[Xen-devel] [PATCH v1 08/20] acpi/hvmloader: Make providing IOAPIC in MADT optional

2016-07-05 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- tools/firmware/hvmloader/acpi/build.c | 68 +-- tools/firmware/hvmloader/acpi/libacpi.h |1 + tools/firmware/hvmloader/util.c |2 +- 3 files changed, 39 insertions(+), 32 deletions(-) diff --git a/tools/firmware/h

[Xen-devel] [PATCH v1 13/20] acpi/hvmloader: Include file/paths adjustments

2016-07-05 Thread Boris Ostrovsky
In prepearation to moving acpi sources into generally available libacpi: 1. Move certain x86-specific definitions into acpi's x86.h 2. Modify include files serach paths to point to acpi 3. Macro-ise include file for build.c that defines various utilities used by that file. Users of libacpi will

[Xen-devel] [PATCH v1 03/20] acpi/hvmloader: Initialize vm_gid data outside ACPI code

2016-07-05 Thread Boris Ostrovsky
This way ACPI code won't use xenstore-read() and hvm_param_set() which are private to hvmloader. Signed-off-by: Boris Ostrovsky --- This is one patch that modifies config->ainfo.vm_gid_addr in build.c, with that change consumed by the caller (when it sets VM_PARAM_VM_GENERATION_ID_ADDR). We cou

[Xen-devel] [PATCH v1 10/20] acpi/hvmloader: Replace mem_alloc() and virt_to_phys() with memory ops

2016-07-05 Thread Boris Ostrovsky
Components that wish to use ACPI builder will need to provide their own mem_alloc() and virt_to_phys() routines. Pointers to these routines will be passed to the builder as memory ops. Signed-off-by: Boris Ostrovsky --- Changes in v1: * Keep memory ops seprate from acpi_config, in struct acpi_co

[Xen-devel] [PATCH v1 09/20] acpi/hvmloader: Build WAET optionally

2016-07-05 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- tools/firmware/hvmloader/acpi/build.c |9 ++--- tools/firmware/hvmloader/acpi/libacpi.h |1 + tools/firmware/hvmloader/util.c |3 ++- 3 files changed, 9 insertions(+), 4 deletions(-) diff --git a/tools/firmware/hvmloader/acpi/build.c

[Xen-devel] [PATCH v1 02/20] acpi/hvmloader: Move acpi_info initialization out of ACPI code

2016-07-05 Thread Boris Ostrovsky
acpi_info can be initialized by hvmloader itself. Now ACPI code doesn't need to use hvmloader-private variables/routines such as uart_exists(), lpt_exists() etc. Signed-off-by: Boris Ostrovsky --- Changes in v1: * Create libacpi.h for libacpi interface definitions * Move RSDP struct acpi_info poi

[Xen-devel] [PATCH v1 06/20] acpi/hvmloader: Collect processor and NUMA info in hvmloader

2016-07-05 Thread Boris Ostrovsky
No need for ACPI code to rely on hvm_info. Signed-off-by: Boris Ostrovsky --- Changes in v1: * Pass hvm_info_table pointer in acpi_config tools/firmware/hvmloader/acpi/build.c | 53 --- tools/firmware/hvmloader/acpi/libacpi.h | 13 +++ tools/firmware/hvmlo

[Xen-devel] [PATCH v1 07/20] acpi/hvmloader: Set TIS header address in hvmloader

2016-07-05 Thread Boris Ostrovsky
Users other than hvmloader may provide TIS address as virtual. Signed-off-by: Boris Ostrovsky --- Changes in v1: * Merged 'if' conditions to make the diff smaller tools/firmware/hvmloader/acpi/build.c |9 - tools/firmware/hvmloader/acpi/libacpi.h |3 +++ tools/firmware/hvmloa

[Xen-devel] [PATCH v1 04/20] acpi/hvmloader: Decide which SSDTs to install in hvmloader

2016-07-05 Thread Boris Ostrovsky
With that, xenstore_read() won't need to be done in ACPI code Signed-off-by: Boris Ostrovsky --- tools/firmware/hvmloader/acpi/build.c | 20 +++- tools/firmware/hvmloader/acpi/libacpi.h |7 +++ tools/firmware/hvmloader/util.c | 12 3 files chang

[Xen-devel] [PATCH v1 05/20] acpi/hvmloader: Move passthrough initialization from ACPI code

2016-07-05 Thread Boris Ostrovsky
Initialize it in hvmloader, avoiding ACPI code's use of xenstore_read() Signed-off-by: Boris Ostrovsky --- Changes in v1: * Rename acpi_pt_length/addr to pt_length/addr tools/firmware/hvmloader/acpi/build.c | 22 +++--- tools/firmware/hvmloader/acpi/libacpi.h |5 +

[Xen-devel] [PATCH v1 01/20] hvmloader: Provide hvmloader_acpi_build_tables()

2016-07-05 Thread Boris Ostrovsky
In preparation for moving out ACPI builder make all BIOSes call hvmloader_acpi_build_tables() instead of calling ACPI code directly. No functional changes. Signed-off-by: Boris Ostrovsky --- Changes in v1: * Added last sentence to commit message tools/firmware/hvmloader/ovmf.c|2 +- t

[Xen-devel] [PATCH v1 11/20] acpi/hvmloader: Translate all addresses when assigning addresses in ACPI tables

2016-07-05 Thread Boris Ostrovsky
Non-hvmloader users may be building tables in virtual address space and therefore we need to make sure that values that end up in tables are physical addresses. Signed-off-by: Boris Ostrovsky --- tools/firmware/hvmloader/acpi/build.c | 47 + 1 files changed, 24

[Xen-devel] [PATCH v1 12/20] acpi/hvmloader: Link ACPI object files directly

2016-07-05 Thread Boris Ostrovsky
ACPI sources will be available to various component which will build them according to their own rules. ACPI's Makefile will only generate necessary source files. Signed-off-by: Boris Ostrovsky --- Changes in v1: * Build ASL and C files in target's (hvmloader) directory .gitignore

[Xen-devel] [PATCH v1 17/20] libacpi: Build DSDT for PVH guests

2016-07-05 Thread Boris Ostrovsky
PVH guests require DSDT with only ACPI INFO (Xen-specific) and Processor objects. We separate ASL's ACPI INFO definition into dsdt_acpi_info.asl so that it can be included in ASLs for both HVM and PVH2. Signed-off-by: Boris Ostrovsky --- New patch tools/libacpi/Makefile | 24 ++

[Xen-devel] [PATCH v1 15/20] x86: Add more checks verifying that PIT/PIC/IOAPIC are emulated

2016-07-05 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- Changes in v1: * More checks, in more approriate places xen/arch/x86/hvm/vlapic.c | 12 ++-- xen/arch/x86/hvm/vpt.c|2 +- 2 files changed, 11 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/hvm/vlapic.c b/xen/arch/x86/hvm/vlapic.c ind

[Xen-devel] [PATCH v1 14/20] acpi: Move ACPI code to tools/libacpi

2016-07-05 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- tools/firmware/hvmloader/Makefile | 14 -- .../{firmware/hvmloader/acpi => libacpi}/Makefile |2 +- tools/{firmware/hvmloader/acpi => libacpi}/README |0 .../{firmware/hvmloader/acpi => libacpi}/acpi2_0.h |0 tools/{f

[Xen-devel] [PATCH v1 19/20] libxl/pvhv2: Include APIC page in MMIO hole for PVHv2 guests

2016-07-05 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- New patch tools/libxl/Makefile|2 ++ tools/libxl/libxl_dom.c | 22 ++ 2 files changed, 20 insertions(+), 4 deletions(-) diff --git a/tools/libxl/Makefile b/tools/libxl/Makefile index 9fee752..3a2d64a 100644 --- a/tools/libxl/Make

[Xen-devel] [PATCH v1 20/20] libxl/acpi: Build ACPI tables for HVMlite guests

2016-07-05 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- Changes in v1: * Move to libxl * Added populate_acpi_pages() * Stash location/size of tables in xc_dom_image (to be used in constructing e820 map) * Use libxl allocator * Only set XEN_X86_EMU_LAPIC flag if 'apic' option is set. * Make acpi_build_tables() return

[Xen-devel] [PATCH v1 16/20] x86: Allow LAPIC-only emulation_flags for HVM guests

2016-07-05 Thread Boris Ostrovsky
PVHv2 guests may request LAPIC emulation (and nothing else) Signed-off-by: Boris Ostrovsky --- Changes in v1: * Refer to PVHv2 (not hvmlite) xen/arch/x86/domain.c | 26 -- 1 files changed, 16 insertions(+), 10 deletions(-) diff --git a/xen/arch/x86/domain.c b/xen/arch

[Xen-devel] [xen-unstable test] 96662: regressions - FAIL

2016-07-05 Thread osstest service owner
flight 96662 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/96662/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-arndale 15 guest-start/debian.repeat fail REGR. vs. 96611 test-amd64-amd64-xl-

[Xen-devel] [PATCH v8 6/6] tools/xen-access: add test-case for ARM SMC

2016-07-05 Thread Tamas K Lengyel
Signed-off-by: Tamas K Lengyel Acked-by: Razvan Cojocaru Acked-by: Wei Liu --- Cc: Ian Jackson --- tools/tests/xen-access/xen-access.c | 45 - 1 file changed, 44 insertions(+), 1 deletion(-) diff --git a/tools/tests/xen-access/xen-access.c b/tools/tests/xe

[Xen-devel] [PATCH v8 1/6] monitor: rename and relocate vm_event_monitor_traps

2016-07-05 Thread Tamas K Lengyel
The function vm_event_monitor_traps actually belongs in the monitor subsystem. As part of this patch we fix the sync input's type to bool_t to match how the callers use it. Signed-off-by: Tamas K Lengyel --- Cc: Jan Beulich Cc: Andrew Cooper Cc: Razvan Cojocaru --- xen/arch/x86/hvm/monitor.c

[Xen-devel] [PATCH v8 3/6] monitor: ARM SMC events

2016-07-05 Thread Tamas K Lengyel
Add support for monitoring ARM SMC events. This patch only adds the required bits to enable/disable monitoring and forwarding the event through vm_event. Signed-off-by: Tamas K Lengyel Acked-by: Razvan Cojocaru --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/Makefile | 1

[Xen-devel] [PATCH v8 2/6] arm: filter SMC exceptions with failed condition checks

2016-07-05 Thread Tamas K Lengyel
In AArch32 state, the ARMv8-A architecture permits, but does not require, this trap to apply to conditional SMC instructions that fail their condition code check, in the same way as with traps on other conditional instructions. Signed-off-by: Tamas K Lengyel Suggested-by: Julien Grall --- Cc: St

[Xen-devel] [PATCH v8 4/6] arm/vm_event: get/set registers

2016-07-05 Thread Tamas K Lengyel
Add support for getting/setting registers through vm_event on ARM. The set of registers can be expanded in the future to include other registers as well if required. The set is limited to the GPRs, PC, CPSR and TTBR0/1 in this patch. Signed-off-by: Tamas K Lengyel Acked-by: Razvan Cojocaru --- C

[Xen-devel] [PATCH v8 5/6] tools/libxc: add xc_monitor_privileged_call

2016-07-05 Thread Tamas K Lengyel
These are the user-space components for the new ARM SMC events. Signed-off-by: Tamas K Lengyel Acked-by: Wei Liu --- Cc: Ian Jackson --- tools/libxc/include/xenctrl.h | 3 +++ tools/libxc/xc_monitor.c | 14 ++ 2 files changed, 17 insertions(+) diff --git a/tools/libxc/includ

Re: [Xen-devel] [PATCH v3 09/16] efi: explicitly define efi struct in xen/arch/x86/efi/stub.c

2016-07-05 Thread Daniel Kiper
On Fri, May 27, 2016 at 02:16:09AM -0600, Jan Beulich wrote: > >>> On 25.05.16 at 18:45, wrote: > > On Wed, May 25, 2016 at 01:03:42AM -0600, Jan Beulich wrote: > >> >>> On 15.04.16 at 14:33, wrote: > >> > Existing solution does not allocate space for this symbol and any > >> > references to acpi

Re: [Xen-devel] [PATCH v3 12/16 - RFC] x86/efi: create new early memory allocator

2016-07-05 Thread Daniel Kiper
On Fri, Apr 15, 2016 at 02:33:12PM +0200, Daniel Kiper wrote: > There is a problem with place_string() which is used as early memory > allocator. It gets memory chunks starting from start symbol and > going down. Sadly this does not work when Xen is loaded using multiboot2 > protocol because start

Re: [Xen-devel] [PATCH v4] xsm: add a default policy to .init.data

2016-07-05 Thread Konrad Rzeszutek Wilk
On Tue, Jul 05, 2016 at 01:44:43PM -0400, Daniel De Graaf wrote: > This adds a Kconfig option and support for including the XSM policy from > tools/flask/policy in the hypervisor so that the bootloader does not > need to provide a policy to get sane behavior from an XSM-enabled > hypervisor. The p

Re: [Xen-devel] [PATCH v2 10/11] hvmctl: convert HVMOP_*ioreq_server*

2016-07-05 Thread Daniel De Graaf
On 06/24/2016 06:34 AM, Jan Beulich wrote: Note that we can't adjust HVM_IOREQSRV_BUFIOREQ_* to properly obey name space rules, as these constants as in use by callers of the libxc interface. Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Paul Durrant Reviewed-by: Andrew Cooper

Re: [Xen-devel] [PATCH v2 09/11] hvmctl: convert HVMOP_inject_msi

2016-07-05 Thread Daniel De Graaf
On 06/24/2016 06:33 AM, Jan Beulich wrote: Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper Acked-by: Daniel De Graaf ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 08/11] hvmctl: convert HVMOP_inject_trap

2016-07-05 Thread Daniel De Graaf
On 06/24/2016 06:32 AM, Jan Beulich wrote: Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper Acked-by: Daniel De Graaf ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 07/11] hvmctl: convert HVMOP_set_mem_type

2016-07-05 Thread Daniel De Graaf
On 06/24/2016 06:32 AM, Jan Beulich wrote: This allows elimination of the (ab)use of the high operation number bits for encoding continuations. Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of the previous 64-bit parameter got ignore so far). Signed-off-by: Jan Beulich Rev

Re: [Xen-devel] [PATCH v2 06/11] hvmctl: convert HVMOP_modified_memory

2016-07-05 Thread Daniel De Graaf
On 06/24/2016 06:31 AM, Jan Beulich wrote: Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of the previous 64-bit parameter got ignore so far). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper Acked-by: Daniel De Graaf _

Re: [Xen-devel] [PATCH v2 05/11] hvmctl: convert HVMOP_track_dirty_vram

2016-07-05 Thread Daniel De Graaf
On 06/24/2016 06:31 AM, Jan Beulich wrote: Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of the previous 64-bit parameter got ignore so far). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper Acked-by: Daniel De Graaf _

Re: [Xen-devel] [PATCH v2 04/11] hvmctl: convert HVMOP_set_pci_link_route

2016-07-05 Thread Daniel De Graaf
On 06/24/2016 06:30 AM, Jan Beulich wrote: Note that this retains the hvmop interface definitions as those had (wrongly) been exposed to non-tool stack consumers (albeit the operation wouldn't have succeeded when requested by a domain for itself). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu

Re: [Xen-devel] [PATCH v2 03/11] hvmctl: convert HVMOP_set_isa_irq_level

2016-07-05 Thread Daniel De Graaf
On 06/24/2016 06:29 AM, Jan Beulich wrote: Note that this retains the hvmop interface definitions as those had (wrongly) been exposed to non-tool stack consumers (albeit the operation wouldn't have succeeded when requested by a domain for itself). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu

Re: [Xen-devel] [PATCH v2 01/11] public / x86: introduce hvmctl hypercall

2016-07-05 Thread Daniel De Graaf
On 06/24/2016 06:28 AM, Jan Beulich wrote: ... as a means to replace all HVMOP_* which a domain can't issue on itself (i.e. intended for use by only the control domain or device model). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Acked-by: Daniel De Graaf _

Re: [Xen-devel] [PATCH v2 2/5] xen/console: allow log level threshold adjustments

2016-07-05 Thread Daniel De Graaf
On 07/04/2016 11:13 AM, Wei Liu wrote: ... from serial console and via sysctl so that one doesn't always need to reboot to see more / less messages. Note that upper thresholds driven from the serial console are sticky, i.e. while they get adjusted upwards when the lower threshold would otherwise

[Xen-devel] [PATCH v4] xsm: add a default policy to .init.data

2016-07-05 Thread Daniel De Graaf
This adds a Kconfig option and support for including the XSM policy from tools/flask/policy in the hypervisor so that the bootloader does not need to provide a policy to get sane behavior from an XSM-enabled hypervisor. The policy provided by the bootloader, if present, will override the built-in

Re: [Xen-devel] [RFC] Hypervisor, x86 emulation deprivileged

2016-07-05 Thread Andrew Cooper
On 05/07/16 12:22, Anthony PERARD wrote: > Hi, > > I've taken over the work from Ben to have a deprivileged mode in the > hypervisor, but I'm unsure about which direction to take. You should begin with an evaluation of available options, identifying which issues are mitigated, those which are not,

Re: [Xen-devel] [RFC] Hypervisor, x86 emulation deprivileged

2016-07-05 Thread Anthony PERARD
On Tue, Jul 05, 2016 at 01:58:16PM +0100, George Dunlap wrote: > On Tue, Jul 5, 2016 at 12:22 PM, Anthony PERARD > wrote: > > Hi, > > > > I've taken over the work from Ben to have a deprivileged mode in the > > hypervisor, but I'm unsure about which direction to take. > > > > First, after understa

Re: [Xen-devel] [PATCH v2 3/7] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-05 Thread Razvan Cojocaru
On 07/05/16 17:28, Corneliu ZUZU wrote: > The arch_vm_event structure is dynamically allocated and freed @ > vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack > user > disables domain monitoring (xc_monitor_disable), which in turn effectively > discards any information tha

Re: [Xen-devel] [PATCH v2 16/17] libxc/xc_dom_arm: Copy ACPI tables to guest space

2016-07-05 Thread Stefano Stabellini
On Thu, 23 Jun 2016, Julien Grall wrote: > Hi Shannon, > > On 23/06/2016 04:17, Shannon Zhao wrote: > > From: Shannon Zhao > > > > Copy all the ACPI tables to guest space so that UEFI or guest could > > access them. > > > > Signed-off-by: Shannon Zhao > > --- > > tools/libxc/xc_dom_arm.c | 51

Re: [Xen-devel] [RFC] Hypervisor, x86 emulation deprivileged

2016-07-05 Thread Anthony PERARD
On Tue, Jul 05, 2016 at 07:02:39AM -0600, Jan Beulich wrote: > >>> On 05.07.16 at 13:22, wrote: > > Hi, > > > > I've taken over the work from Ben to have a deprivileged mode in the > > hypervisor, but I'm unsure about which direction to take. > > > > First, after understanding what have been don

Re: [Xen-devel] [PATCH v2 07/17] libxl/arm: Construct ACPI GTDT table

2016-07-05 Thread Stefano Stabellini
On Mon, 27 Jun 2016, Julien Grall wrote: > Hi Shannon, > > On 27/06/16 02:44, Shannon Zhao wrote: > > On 2016/6/24 0:26, Julien Grall wrote: > > > On 23/06/16 04:16, Shannon Zhao wrote: > > > > From: Shannon Zhao > > > > > > > > Construct GTDT table with the interrupt information of timers. > >

[Xen-devel] [qemu-mainline test] 96652: regressions - FAIL

2016-07-05 Thread osstest service owner
flight 96652 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/96652/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 94856 test-

Re: [Xen-devel] [PATCH v3 1/2] Interface for grant copy operation in libs.

2016-07-05 Thread George Dunlap
On Wed, Jun 22, 2016 at 3:52 PM, Wei Liu wrote: >> I think the best solution is to allow the osdep code to provide the >> implementation of xengnttab_grant_copy_segment_t, allowing the Linux >> code to do: >> >> typedef ioctl_gntdev_grant_copy_segment xengnttab_grant_copy_segment_t >> >> You shoul

Re: [Xen-devel] [PATCH v2 6/7] minor fixes (formatting, comments, unused includes etc.)

2016-07-05 Thread Razvan Cojocaru
On 07/05/16 17:30, Corneliu ZUZU wrote: > Minor fixes: > - remove some empty lines > - remove some unused includes > - multi-line comment fixes > - 80-columns formatting fixes > > Signed-off-by: Corneliu ZUZU > --- > Changed since v1: > --- > xen/arch/arm/domain.c | 1 - > xen/

[Xen-devel] [PULL v2 01/30] xen: fix ram init regression

2016-07-05 Thread Michael S. Tsirkin
From: Gerd Hoffmann Commit "8156d48 pc: allow raising low memory via max-ram-below-4g option" causes a regression on xen, because it uses a different memory split. This patch initializes max-ram-below-4g to zero and leaves the initialization to the memory initialization functions. That way they

Re: [Xen-devel] [PATCH linux 2/8] xen: introduce xen_vcpu_id mapping

2016-07-05 Thread Jan Beulich
>>> On 05.07.16 at 17:34, wrote: > On Thu, Jun 30, 2016 at 03:10:11AM -0600, Jan Beulich wrote: >> >>> On 29.06.16 at 18:27, wrote: >> > On 29/06/16 17:19, Vitaly Kuznetsov wrote: >> >> To explain better what I'm trying to suggest here please take a look at >> >> the attached patch. If we can gua

Re: [Xen-devel] [PATCH 11/18] arm/altp2m: Make flush_tlb_domain ready for altp2m.

2016-07-05 Thread Julien Grall
On 05/07/16 15:48, Sergej Proskurin wrote: On 07/04/2016 10:32 PM, Julien Grall wrote: On 04/07/2016 12:45, Sergej Proskurin wrote: +p2m_load_altp2m_VTTBR(n); +else +p2m_load_VTTBR(n->domain); + isb(); if ( is_32bit_domain(n->domain) ) @@ -119,22 +154,42 @@ vo

Re: [Xen-devel] [PATCH v3] xsm: add a default policy to .init.data

2016-07-05 Thread Konrad Rzeszutek Wilk
On Fri, Jul 01, 2016 at 01:19:51AM -0600, Jan Beulich wrote: > >>> On 30.06.16 at 17:13, wrote: > > On Thu, Jun 30, 2016 at 10:01:18AM -0400, Daniel De Graaf wrote: > >> On 06/30/2016 09:45 AM, Konrad Rzeszutek Wilk wrote: > >> > On Wed, Jun 29, 2016 at 11:09:01AM -0400, Daniel De Graaf wrote: > >

Re: [Xen-devel] [PATCH linux 2/8] xen: introduce xen_vcpu_id mapping

2016-07-05 Thread Konrad Rzeszutek Wilk
On Thu, Jun 30, 2016 at 03:10:11AM -0600, Jan Beulich wrote: > >>> On 29.06.16 at 18:27, wrote: > > On 29/06/16 17:19, Vitaly Kuznetsov wrote: > >> To explain better what I'm trying to suggest here please take a look at > >> the attached patch. If we can guarantee long term that ACPI id always > >

Re: [Xen-devel] [PATCH v2 7/7] minor #include change

2016-07-05 Thread Razvan Cojocaru
On 07/05/16 17:31, Corneliu ZUZU wrote: > Move xen/paging.h #include from hvm/monitor.h to hvm/monitor.c (include > strictly > where needed) and also change to asm/paging.h (include strictly what's > needed). > > Signed-off-by: Corneliu ZUZU > --- > Changed since v1: > * preserve alphabetical

Re: [Xen-devel] [PATCH 3/3] xen: support runqueue steal time on xen

2016-07-05 Thread Stefano Stabellini
On Wed, 22 Jun 2016, Juergen Gross wrote: > Up to now reading the stolen time of a remote cpu was not possible in a > performant way under Xen. This made support of runqueue steal time via > paravirt_steal_rq_enabled impossible. > > With the addition of an appropriate hypervisor interface this is

Re: [Xen-devel] [PATCH 1/3] xen: update xen headers

2016-07-05 Thread Stefano Stabellini
On Wed, 22 Jun 2016, Juergen Gross wrote: > Update some Xen headers to be able to use new functionality. > > Signed-off-by: Juergen Gross Reviewed-by: Stefano Stabellini > include/xen/interface/vcpu.h | 24 +++- > include/xen/interface/xen.h | 17 - > 2 f

Re: [Xen-devel] [PATCH 2/3] arm/xen: add support for vm_assist hypercall

2016-07-05 Thread Stefano Stabellini
On Wed, 22 Jun 2016, Juergen Gross wrote: > Add support for the Xen HYPERVISOR_vm_assist hypercall. > > Signed-off-by: Juergen Gross Reviewed-by: Stefano Stabellini > arch/arm/include/asm/xen/hypercall.h | 1 + > arch/arm/xen/enlighten.c | 1 + > arch/arm/xen/hypercall.S

Re: [Xen-devel] [PATCH v5 1/2] x86/mem-sharing: Bulk mem-sharing entire domains

2016-07-05 Thread Jan Beulich
>>> On 05.07.16 at 16:35, wrote: > On Thu, Jun 23, 2016 at 4:42 PM, Tamas K Lengyel wrote: +if ( !atomic_read(&d->pause_count) || + !atomic_read(&cd->pause_count) ) +{ +rcu_unlock_domain(cd); +rc = -E

Re: [Xen-devel] [PATCH v5 1/2] x86/mem-sharing: Bulk mem-sharing entire domains

2016-07-05 Thread Tamas K Lengyel
On Tue, Jul 5, 2016 at 8:35 AM, George Dunlap wrote: > On Thu, Jun 23, 2016 at 4:42 PM, Tamas K Lengyel wrote: +if ( !atomic_read(&d->pause_count) || + !atomic_read(&cd->pause_count) ) +{ +rcu_unlock_domain(cd); +

Re: [Xen-devel] [PATCH v2] xen: use native disk xenbus protocol if possible

2016-07-05 Thread Stefano Stabellini
On Wed, 29 Jun 2016, Anthony PERARD wrote: > On Wed, Jun 29, 2016 at 05:50:48PM +0200, Juergen Gross wrote: > > The qdisk implementation is using the native xenbus protocol only in > > case of no protocol specified at all. As using the explicit 32- or > > 64-bit protocol is slower than the native o

Re: [Xen-devel] [PATCH 11/18] arm/altp2m: Make flush_tlb_domain ready for altp2m.

2016-07-05 Thread Sergej Proskurin
Hi Julien, On 07/04/2016 10:32 PM, Julien Grall wrote: > Hello Sergej, > > On 04/07/2016 12:45, Sergej Proskurin wrote: >> This commit makes sure that the TLB of a domain considers flushing all >> of the associated altp2m views. Therefore, in case a different domain >> (not the currently active d

Re: [Xen-devel] [PATCH v2 3/7] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-05 Thread George Dunlap
On 05/07/16 15:28, Corneliu ZUZU wrote: > The arch_vm_event structure is dynamically allocated and freed @ > vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack > user > disables domain monitoring (xc_monitor_disable), which in turn effectively > discards any information tha

Re: [Xen-devel] [PATCH v2 7/7] minor #include change

2016-07-05 Thread Tamas K Lengyel
On Tue, Jul 5, 2016 at 8:31 AM, Corneliu ZUZU wrote: > Move xen/paging.h #include from hvm/monitor.h to hvm/monitor.c (include > strictly > where needed) and also change to asm/paging.h (include strictly what's > needed). > > Signed-off-by: Corneliu ZUZU Acked-by: Tamas K Lengyel ___

Re: [Xen-devel] [PATCH v2] xen/arm: register clocks used by the hypervisor

2016-07-05 Thread Stefano Stabellini
On Tue, 5 Jul 2016, Julien Grall wrote: > On 05/07/16 15:04, Stefano Stabellini wrote: > > On Tue, 5 Jul 2016, Julien Grall wrote: > > > On 05/07/16 14:53, Stefano Stabellini wrote: > > > > On Thu, 30 Jun 2016, Dirk Behme wrote: > > > > > +- clocks: one or more clocks to be registered. > > > > > +

Re: [Xen-devel] [PATCH v5 1/2] x86/mem-sharing: Bulk mem-sharing entire domains

2016-07-05 Thread George Dunlap
On Thu, Jun 23, 2016 at 4:42 PM, Tamas K Lengyel wrote: >>> +if ( !atomic_read(&d->pause_count) || >>> + !atomic_read(&cd->pause_count) ) >>> +{ >>> +rcu_unlock_domain(cd); >>> +rc = -EINVAL; >>> +goto out; >>>

[Xen-devel] [PATCH v2 7/7] minor #include change

2016-07-05 Thread Corneliu ZUZU
Move xen/paging.h #include from hvm/monitor.h to hvm/monitor.c (include strictly where needed) and also change to asm/paging.h (include strictly what's needed). Signed-off-by: Corneliu ZUZU --- Changed since v1: * preserve alphabetical ordering --- xen/arch/x86/hvm/monitor.c| 1 + xen/

[Xen-devel] [PATCH v2 6/7] minor fixes (formatting, comments, unused includes etc.)

2016-07-05 Thread Corneliu ZUZU
Minor fixes: - remove some empty lines - remove some unused includes - multi-line comment fixes - 80-columns formatting fixes Signed-off-by: Corneliu ZUZU --- Changed since v1: --- xen/arch/arm/domain.c | 1 - xen/arch/arm/traps.c | 1 - xen/arch/x86/hvm/hvm.c

[Xen-devel] [PATCH v2 5/7] x86/vm-event: minor ASSERT fix, add 'unlikely'

2016-07-05 Thread Corneliu ZUZU
Minor fixes: * vm_event_register_write_resume: ASSERT on non-NULL v->arch.vm_event instead of &v->arch.vm_event->write_data. * add 'unlikely' in if Signed-off-by: Corneliu ZUZU --- xen/arch/x86/hvm/hvm.c | 2 +- xen/arch/x86/vm_event.c | 6 -- 2 files changed, 5 insertions(+), 3 deletion

[Xen-devel] [PATCH v2 4/7] x86/vm_event_resume: surround VM_EVENT_REASON_MOV_TO_MSR w/ CONFIG_X86

2016-07-05 Thread Corneliu ZUZU
VM_EVENT_REASON_MOV_TO_MSR is X86-specific, surround w/ #ifdef accordingly. Signed-off-by: Corneliu ZUZU Acked-by: Razvan Cojocaru --- Changed since v1: --- xen/common/vm_event.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/xen/common/vm_event.c b/xen/common/vm_event.c index 75bbbab..

Re: [Xen-devel] [PATCH v2] xen: arm64: Add support for Renesas RCar Gen3 H3 Salvator-X platform

2016-07-05 Thread Andre Przywara
Hi, On 05/07/16 15:22, Dirk Behme wrote: > On 05.07.2016 15:45, Andre Przywara wrote: >> Hi, >> >> On 05/07/16 14:34, Julien Grall wrote: >>> (CC Andre) >>> >>> On 05/07/16 14:04, Dirk Behme wrote: On 05.07.2016 14:45, Julien Grall wrote: > > > On 05/07/16 13:09, Dirk Behme wrote:

[Xen-devel] [PATCH v2 3/7] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-05 Thread Corneliu ZUZU
The arch_vm_event structure is dynamically allocated and freed @ vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack user disables domain monitoring (xc_monitor_disable), which in turn effectively discards any information that was in arch_vm_event.write_data. But this can yi

[Xen-devel] [PATCH v2 2/7] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-05 Thread Corneliu ZUZU
For readability: * Add function arch_monitor_write_data (in x86/monitor.c) and separate handling of monitor_write_data there (previously done directly in hvm_do_resume). * Separate enabling/disabling of CPU_BASED_CR3_LOAD_EXITING for CR3 monitor vm-events from CR0 node @ vmx_update_guest_cr(v, 0)

[Xen-devel] [PATCH v2 1/7] x86/vmx_update_guest_cr: minor optimization

2016-07-05 Thread Corneliu ZUZU
Minor optimization @ vmx_update_guest_cr: checks if v->arch.hvm_vmx.exec_control was modified before actually calling vmx_update_cpu_exec_control(v). Signed-off-by: Corneliu ZUZU --- Changed since v1: --- xen/arch/x86/hvm/vmx/vmx.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff

[Xen-devel] [PATCH v2 0/7] x86/vm-event: Adjustments & fixes

2016-07-05 Thread Corneliu ZUZU
This patch-series makes some adjustments and fixes to the X86 vm-events code. Summary: 1. minor optimization 2. relocate some code into added vm-event functions Acked-by: Razvan Cojocaru 3. fix monitor_write_data behavior on domain cleanup Acked-by: Razvan Cojocaru

Re: [Xen-devel] [PATCH v2] xen: arm64: Add support for Renesas RCar Gen3 H3 Salvator-X platform

2016-07-05 Thread Dirk Behme
On 05.07.2016 15:45, Andre Przywara wrote: Hi, On 05/07/16 14:34, Julien Grall wrote: (CC Andre) On 05/07/16 14:04, Dirk Behme wrote: On 05.07.2016 14:45, Julien Grall wrote: On 05/07/16 13:09, Dirk Behme wrote: Hi Julien, On 05.07.2016 13:39, Julien Grall wrote: Hi Dirk, On 05/07/16 0

Re: [Xen-devel] Discussion about virtual iommu support for Xen guest

2016-07-05 Thread Lan, Tianyu
On 7/5/2016 9:57 PM, Jan Beulich wrote: On 05.07.16 at 15:37, wrote: Hi Stefano, Andrew and Jan: Could you give us more guides here to move forward virtual iommu development? Thanks. Due to ... On 6/29/2016 11:04 AM, Tian, Kevin wrote: Please let us know your thoughts. If no one has expl

  1   2   >