flight 33108 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33108/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 26303
build-amd64-libvirt
>>> Elena Ufimtseva 01/02/15 7:32 PM >>>
>The last successful command is the reading status register of second IOMMU
>unit:
>
>./xen/drivers/passthrough/vtd/iommu.c>
>
>746:sts = dmar_readl(iommu->reg, DMAR_GSTS_REG);
>747:dmar_writel(iommu->reg, DMAR_GCMD_REG, sts | DMA_GCMD_TE);
>
>
>
>A
>>> Roger Pau Monné 12/22/14 7:44 PM >>>
>To make sure FreeBSD was not playing tricks behind Xen's back, and
>AFAICT FreeBSD is not touching the IO APIC at all. Also Xen doesn't show
>any pending EOI timers ('a' debug key).
Btw, as I'm not sure it was said explicitly earlier: Does use of interrupt
flight 33117 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33117/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 5 libvirt-build fail REGR. vs. 32648
build-i386-libvirt
flight 33111 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33111/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel 7 redhat-installfail REGR. vs. 32598
test-amd64-i386-rhe
El 05/01/15 a les 9.50, Jan Beulich ha escrit:
Roger Pau Monné 12/22/14 7:44 PM >>>
>> To make sure FreeBSD was not playing tricks behind Xen's back, and
>> AFAICT FreeBSD is not touching the IO APIC at all. Also Xen doesn't show
>> any pending EOI timers ('a' debug key).
>
> Btw, as I'm not
On Sun, 2015-01-04 at 09:42 +, xen.org wrote:
> flight 33083 xen-unstable real [real]
> http://www.chiark.greenend.org.uk/~xensrcts/logs/33083/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-armhf-libvirt 5 li
On 19/12/14 16:16, Jan Beulich wrote:
> Using the native code here can't work properly, as the hypervisor would
> normally have cleared the two reason bits by the time Dom0 gets to see
> the NMI (if passed to it at all). There's a shared info field for this,
> and there's an existing hook to use -
Good morning and happy new year,
Currently we have the procedure to install Xen GT on 13.04 or 12.04 ubuntu
environment. As such, this procedure makes us
import graphics libraries for ubuntu. However, we must do with Tizen and
CrossWalk. We miss graphics bookstores. I dont know if anything wil
At 19:12 + on 02 Jan (1420222343), Andrew Cooper wrote:
> supervisor_mode_kernel was an x86_32-only feature which permitted a PV dom0 to
> run in ring 0, but at the expense of not being able to start any domUs.
>
> As the x86_32 Xen build has been removed from tree, removing the remaining
> su
On Thu, 2014-12-18 at 11:13 +, David Vrabel wrote:
> Commit bc96f648df1bbc2729abbb84513cf4f64273a1f1 (xen-netback: make
> feature-rx-notify mandatory) incorrectly assumed that there were no
> frontends in use that did not support this feature. But the frontend
> driver in MiniOS does not and s
On Tue, Dec 23, 2014 at 04:54:38PM +0800, Chao Peng wrote:
[...]
> diff --git a/tools/libxl/xl_cmdimpl.c b/tools/libxl/xl_cmdimpl.c
> index 3737c7e..f4534ec 100644
> --- a/tools/libxl/xl_cmdimpl.c
> +++ b/tools/libxl/xl_cmdimpl.c
> @@ -7845,12 +7845,13 @@ out:
> }
>
> #ifdef LIBXL_HAVE_PSR_CMT
On Mon, 2014-12-22 at 15:47 +, Lars Kurth wrote:
> High all,
>
> I am in the process of cleaning up the 4.5 documentation. One of the pages
> that needs verification is
> * http://wiki.xenproject.org/wiki/XL_vs_Xend_Feature_Comparison
>
> As we are removing XM, I would assume that the only d
On Tue, Dec 23, 2014 at 04:54:39PM +0800, Chao Peng wrote:
[...]
> +static int libxl__psr_cmt_get_mem_bandwidth(libxl__gc *gc, uint32_t domid,
> +xc_psr_cmt_type type, uint32_t socketid, uint32_t *bandwidth)
> +{
> +uint64_t sample1, sample2;
> +uint32_t upscaling_factor;
> +int rc;
Olaf mentioned his concern about handling ballooned pages in
<20141211153029.ga1...@aepfle.de>. Is that point moot now?
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Thu, Dec 18, 2014 at 4:55 AM, Hu, Robert wrote:
>>
>> For this specific problem though I think
>>
>> http://lists.xen.org/archives/html/xen-devel/2014-11/msg01342.html
> We verified this on RC4, it works.
> Will your patch get in Xen 4.5 release? Otherwise hotplug vt-d device with a
> running
Jan Beulich wrote on 2015-01-05:
Elena Ufimtseva 01/02/15 7:32 PM >>>
>> The last successful command is the reading status register of second
>> IOMMU
>> unit:
>>
>> > ./xen/drivers/passthrough/vtd/iommu.c>
>>
>> 746:sts = dmar_readl(iommu->reg, DMAR_GSTS_REG); 747:
>> dmar_writel(io
Wei Liu writes:
> Olaf mentioned his concern about handling ballooned pages in
> <20141211153029.ga1...@aepfle.de>. Is that point moot now?
Well, the limitation is real and some guest-side handling will be
required in case we want to support kexec with ballooning. But as David
validly mentioned
Instead of cloning gnulib manually which can break if upstream gnulib
gets ahead of libvirt.git (which applies patches on the fly etc). By
using submodulefixup we automatically DTRT and use the version of
gnulib specified by the libvirt.git submodule metadata, but with a
runvar override if necessar
You need to CC Jan for hvmloader changes (which I've done for you).
On Tue, Dec 30, 2014 at 11:45:14PM -0500, Quan Xu wrote:
> Signed-off-by: Quan Xu
> ---
> tools/firmware/hvmloader/acpi/build.c | 5 +++--
> tools/libxl/libxl_create.c| 5 -
> tools/libxl/libxl_types.idl
On Tue, Dec 30, 2014 at 11:45:02PM -0500, Quan Xu wrote:
> Signed-off-by: Quan Xu
> ---
> tools/libxl/libxl_create.c | 5 +++--
> 1 file changed, 3 insertions(+), 2 deletions(-)
>
> diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c
> index b1ff5ae..0a09925 100644
> --- a/tools
On Tue, 30 Dec 2014, Rishi Ranjan wrote:
> I am trying to use Xen as accelerator for my Qemu machine. I have created a
> guest domain with following xl config:
> builder = "hvm"
> name = "qemu-hvm"
> memory = "512"
> vcpus = 1
> vif = ['']
> vnc = 1
> boot="c"
>
>
> When I try to run with follo
In case kasprintf() fails in xen_setup_timer() we assign name to the static
string "". We, however, don't check that fact before
issuing kfree() in xen_teardown_timer(), kernel is supposed to crash with
'kernel BUG at mm/slub.c:3341!'
Solve the issue by making name a fixed length string inside str
On Tue, Dec 30, 2014 at 11:45:31PM -0500, Quan Xu wrote:
> Signed-off-by: Quan Xu
> ---
> tools/libxl/libxl.c | 62
>
> tools/libxl/libxl_create.c | 6 +
> tools/libxl/libxl_dm.c | 16
> tools/libxl/libxl_internal.h
FWIW in the future please configure git to chain all your patches to one
thread. :-)
What I usually do is to
git format-patch HEAD~NNN --cover --subject-prefix='PATCH vXX'
... edit -cover-letter.patch ...
git send-email --to xen-devel@ --cc XXX
All patches will be chained to 00/00 cover lett
On 05/01/15 13:06, Vitaly Kuznetsov wrote:
> In case kasprintf() fails in xen_setup_timer() we assign name to the static
> string "". We, however, don't check that fact before
> issuing kfree() in xen_teardown_timer(), kernel is supposed to crash with
> 'kernel BUG at mm/slub.c:3341!'
>
> Solve th
On Tue, 2014-12-30 at 23:44 -0500, Quan Xu wrote:
Please can you arrange for you patch submissions to be correctly
threaded i.e. with all the mails containing a reference header either to
the previous patch or to the 0/N introductory patch.
Take a look at the --chainreplyto and --thread options t
On Mon, 2015-01-05 at 13:18 +, Wei Liu wrote:
> FWIW in the future please configure git to chain all your patches to one
> thread. :-)
>
> What I usually do is to
>
> git format-patch HEAD~NNN --cover --subject-prefix='PATCH vXX'
> ... edit -cover-letter.patch ...
> git send-email --to xe
flight 33112 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33112/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 5 libvirt-build fail REGR. vs. 32877
build-amd64-libvirt
On 01/05/15 14:19, David Vrabel wrote:
> On 05/01/15 13:06, Vitaly Kuznetsov wrote:
>> In case kasprintf() fails in xen_setup_timer() we assign name to the static
>> string "". We, however, don't check that fact before
>> issuing kfree() in xen_teardown_timer(), kernel is supposed to crash with
>>
libxl_dominfo contains a ssid_label pointer which will have memory allocated
for it in libxl_domain_info() if the hypervisor has CONFIG_XSM compiled.
However, the lack of appropriate use of libxl_dominfo_{init,dispose}() will
cause the label string to be leaked, even in success cases.
This was dis
Yang Hongyang writes ("[PATCH] xl/libxl: fix migrate/Remus regression (core
dumped)"):
> When excuting xl migrate/Remus, the following error occurd:
> [root@master xen]# xl migrate 5 slaver
> migration target: Ready to receive domain.
> Saving to migration stream new xl format (info 0x1/0x0/1225)
On Mon, Jan 05, 2015 at 02:19:58PM +, Andrew Cooper wrote:
> libxl_dominfo contains a ssid_label pointer which will have memory allocated
> for it in libxl_domain_info() if the hypervisor has CONFIG_XSM compiled.
> However, the lack of appropriate use of libxl_dominfo_{init,dispose}() will
> ca
On Mon, 2015-01-05 at 14:35 +, Ian Jackson wrote:
> Yang Hongyang writes ("[PATCH] xl/libxl: fix migrate/Remus regression (core
> dumped)"):
> > When excuting xl migrate/Remus, the following error occurd:
> > [root@master xen]# xl migrate 5 slaver
> > migration target: Ready to receive domain.
Instead of cloning gnulib manually which can break if upstream gnulib
gets ahead of libvirt.git (which applies patches on the fly etc). By
using submodulefixup we automatically DTRT and use the version of
gnulib specified by the libvirt.git submodule metadata, but with a
runvar override if necessar
On Fri, 2015-01-02 at 19:12 +, Andrew Cooper wrote:
> supervisor_mode_kernel was an x86_32-only feature which permitted a PV dom0 to
> run in ring 0, but at the expense of not being able to start any domUs.
>
> As the x86_32 Xen build has been removed from tree, removing the remaining
> superv
On Fri, Dec 19, 2014 at 01:13:41PM -0500, Konrad Rzeszutek Wilk wrote:
> On Fri, Dec 19, 2014 at 01:48:18PM +, Jan Beulich wrote:
> > Konrad,
> >
> > any word on
> > http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg01253.html
>
> Release-Acked-by: Konrad Rzeszutek Wilk
> > http
On Mon, Dec 22, 2014 at 04:39:57PM -0800, Andy Lutomirski wrote:
> The pvclock vdso code was too abstracted to understand easily and
> excessively paranoid. Simplify it for a huge speedup.
>
> This opens the door for additional simplifications, as the vdso no
> longer accesses the pvti for any vc
In case kasprintf() fails in xen_setup_timer() we assign name to the static
string "". We, however, don't check that fact before
issuing kfree() in xen_teardown_timer(), kernel is supposed to crash with
'kernel BUG at mm/slub.c:3341!'
Solve the issue by making name a fixed length string inside str
On 05/01/15 15:16, Ian Campbell wrote:
> On Fri, 2015-01-02 at 19:12 +, Andrew Cooper wrote:
>> supervisor_mode_kernel was an x86_32-only feature which permitted a PV dom0
>> to
>> run in ring 0, but at the expense of not being able to start any domUs.
>>
>> As the x86_32 Xen build has been re
On 01/05/15 16:27, Vitaly Kuznetsov wrote:
> In case kasprintf() fails in xen_setup_timer() we assign name to the static
> string "". We, however, don't check that fact before
> issuing kfree() in xen_teardown_timer(), kernel is supposed to crash with
> 'kernel BUG at mm/slub.c:3341!'
>
> Solve th
Instead of cloning gnulib manually which can break if upstream gnulib
gets ahead of libvirt.git (which applies patches on the fly etc). By
using submodulefixup we automatically DTRT and use the version of
gnulib specified by the libvirt.git submodule metadata, but with a
runvar override if necessar
On Mon, 2015-01-05 at 15:35 +, Andrew Cooper wrote:
> Answering out-of-order
>
> This patch has no functional change WRT PVH. The hunk commented on is
> simply changed via indentation due to the removal of the conditional it
> is in. It was never been possible for a PVH kernel boot with
> "!
The BIOS on the machine is:
DMI: LENOVO 10A6S09R01/SHARKBAY, BIOS FBKTA4AUS 12/11/2014
(just flashed it today - earlier versions had the same issue)
And with both Xen 4.4 and Xen 4.5 when rebooting from EFI
I get:
[ 35.278564] reboot: Restarting system
(XEN) Domain 0 shutdown: rebooting mac
On Mon, Jan 05, 2015 at 02:35:37PM +, Ian Jackson wrote:
> Yang Hongyang writes ("[PATCH] xl/libxl: fix migrate/Remus regression (core
> dumped)"):
> > When excuting xl migrate/Remus, the following error occurd:
> > [root@master xen]# xl migrate 5 slaver
> > migration target: Ready to receive
On Mon, Jan 05, 2015 at 12:48:16PM +, George Dunlap wrote:
> On Thu, Dec 18, 2014 at 4:55 AM, Hu, Robert wrote:
> >>
> >> For this specific problem though I think
> >>
> >> http://lists.xen.org/archives/html/xen-devel/2014-11/msg01342.html
> > We verified this on RC4, it works.
> > Will your p
On Mon, Jan 05, 2015 at 02:19:58PM +, Andrew Cooper wrote:
> libxl_dominfo contains a ssid_label pointer which will have memory allocated
> for it in libxl_domain_info() if the hypervisor has CONFIG_XSM compiled.
> However, the lack of appropriate use of libxl_dominfo_{init,dispose}() will
> ca
On Fri, Dec 12, 2014 at 6:29 AM, Tian, Kevin wrote:
>> We're not there in the current design, purely because XenGT has to be
>> in dom0 (so it can trivially DoS Xen by rebooting the host).
>
> Can we really decouple dom0 from DoS Xen? I know there's on-going effort
> like PVH Dom0, however there a
On 01/05/2015 10:27 AM, Konrad Rzeszutek Wilk wrote:
On Mon, Jan 05, 2015 at 12:48:16PM +, George Dunlap wrote:
On Thu, Dec 18, 2014 at 4:55 AM, Hu, Robert wrote:
For this specific problem though I think
http://lists.xen.org/archives/html/xen-devel/2014-11/msg01342.html
We verified this
On Mon, 2015-01-05 at 15:36 +, Ian Campbell wrote:
> Instead of cloning gnulib manually which can break if upstream gnulib
> gets ahead of libvirt.git (which applies patches on the fly etc). By
> using submodulefixup we automatically DTRT and use the version of
> gnulib specified by the libvirt
Boris Ostrovsky writes ("Re: [Xen-devel] Is: Fixes for xl pci-attach for Xen
4.5 confirmed to fix by Intel.Was:Re: [TestDay] VMX test report for Xen
4.5.0-rc1"):
> On 01/05/2015 10:27 AM, Konrad Rzeszutek Wilk wrote:
> > Ian, were you waiting on Boris to repost the patches?
Yes.
> I wasn't plan
On 05/01/15 15:04, Konrad Rzeszutek Wilk wrote:
> The BIOS on the machine is:
>
> DMI: LENOVO 10A6S09R01/SHARKBAY, BIOS FBKTA4AUS 12/11/2014
>
> (just flashed it today - earlier versions had the same issue)
>
> And with both Xen 4.4 and Xen 4.5 when rebooting from EFI
> I get:
>
>
> [ 35.278564]
On Mon, 2014-12-29 at 13:01 +, Wei Liu wrote:
> Please don't top post.
>
> On Fri, Dec 19, 2014 at 10:09:31PM +, Peter Kay wrote:
> > Thanks, see attached :
> >
> > This is on Salix 14.1 running the 3.17.4 kernel. That's not particularly
> > relevant though, as I had exactly the same erro
flight 33116 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33116/
Perfect :-)
All tests in this flight passed
version targeted for testing:
rumpuserxen 21a3f2f128032fa5450f5693c3d00d82fc693123
baseline version:
rumpuserxen 21689d533b9e90721fc8679c2794
On Tue, Dec 23, 2014 at 02:04:28PM -0500, Cathy Avery wrote:
> Starting a vm with memory over 2T resulted in an overflow error.
>
> memory = 2097152 defined as number of megabytes returns the error
> "OverflowError: signed integer is greater than maximum"
>
> The error is the result of the python
On 12/30/2014 11:44 PM, Quan Xu wrote:[...]
diff --git a/extras/mini-os/tpmback.c b/extras/mini-os/tpmback.c
[...]
+ domid = (domtype == T_DOMAIN_TYPE_HVM) ? 0 : tpmif->domid;
Unless I'm missing something, this still assumes that the HVM device
model is located in domain 0, and so it will n
On 12/30/2014 04:02 PM, Quan Xu wrote:
> Signed-off-by: Quan Xu
This message was missing an In-Reply-To header tying it to the 0/5 cover
letter, making it show up as an independent thread. Please see if you
can fix that for the next submission.
> ---
> configure| 14 ++
> h
On 05/01/15 15:41, Ian Campbell wrote:
> On Mon, 2015-01-05 at 15:35 +, Andrew Cooper wrote:
>> Answering out-of-order
>>
>> This patch has no functional change WRT PVH. The hunk commented on is
>> simply changed via indentation due to the removal of the conditional it
>> is in. It was never
On Mon, 2015-01-05 at 16:07 +, Andrew Cooper wrote:
> >> What usecase was supervisor_mode_kernel developed for? It seems
> >> counter-intuitive, but I can't find anything in the history explaining
> >> its use.
> > It was a prototype from the pre-pvops days to see if it would be
> > feasible t
On Mon, Dec 22, 2014 at 11:54:01AM +0100, Julien Grall wrote:
> Hi Ian,
>
> On 21/12/2014 12:18, Ian Campbell wrote:
> >By iterating up to <= mi->nr_mods we are running off the end of the boot
> >modules, but more importantly it causes us to then skip the first FDT
> >reserved
> >region, meaning
On Fri, Dec 19, 2014 at 08:31:51AM +, Jan Beulich wrote:
> The endless story continues.
Intel maintainers, are you folks OK with these patches?
>From my perspective: Release-Acked-by: Konrad Rzeszutek Wilk
>
>
> 1: make XSA-59 workaround fully cover XeonE5/E7 v2
> 2: extend XSA-59 workaroun
Working to resolve this issue, I hope to have a definitive answer by the end of
this week.
--
Don Dugger
"Censeo Toto nos in Kansa esse decisse." - D. Gale
Ph: 303/443-3786
-Original Message-
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
Sent: Monday, January 5, 2015 9:27
On Thu, Dec 18, 2014 at 01:06:40PM -0500, Boris Ostrovsky wrote:
> We need to make sure that last_vcpu is not pointing to VCPU whose
> VPMU is being destroyed. Otherwise we may try to dereference it in
> the future, when VCPU is gone.
>
> We have to do this via IPI since otherwise there is a (some
From: Ian Jackson
do_pci_remove contained this:
if (type == LIBXL_DOMAIN_TYPE_HVM) {
[stuff]
} else if (type != LIBXL_DOMAIN_TYPE_PV)
abort();
{
This is bizarre, and not correct. The effect is that HVM guests end
up running both the proper code and that intended for
On Mon, 2015-01-05 at 16:34 +, Ian Jackson wrote:
> From: Ian Jackson
>
> do_pci_remove contained this:
>
> if (type == LIBXL_DOMAIN_TYPE_HVM) {
>[stuff]
> } else if (type != LIBXL_DOMAIN_TYPE_PV)
> abort();
> {
>
> This is bizarre, and not correct. The effect i
On Mon, Jan 05, 2015 at 04:34:36PM +, Ian Jackson wrote:
> From: Ian Jackson
>
> do_pci_remove contained this:
>
> if (type == LIBXL_DOMAIN_TYPE_HVM) {
>[stuff]
> } else if (type != LIBXL_DOMAIN_TYPE_PV)
> abort();
> {
>
> This is bizarre, and not correct. The e
On Mon, Jan 05, 2015 at 04:28:02PM +, Dugger, Donald D wrote:
> Working to resolve this issue, I hope to have a definitive answer by the end
> of this week.
OK, so past Xen 4.5 release. thanks!
>
> --
> Don Dugger
> "Censeo Toto nos in Kansa esse decisse." - D. Gale
> Ph: 303/443-3786
>
> -
> Acked-by: Ian Campbell
> RElease-Acked-by: Konrad Rzeszutek Wilk
Pushed, thanks.
Ian.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Ian Jackson writes ("Re: [PATCH for-4.5 v2] libxl: Initialise CTX->xce in
domain suspend"):
> Konrad: this should go in 4.5 because it is a bugfix without which
> libxl may dereference NULL.
...
Ian Campbell writes ("Re: [PATCH for-4.5 v2] libxl: Initialise CTX->xce in
domain suspend"):
> Acked-
On Fri, Dec 19, 2014 at 1:21 AM, Tiejun Chen wrote:
> RMRR Fix Design for Xen
>
> This design is a goal to fix RMRR for Xen. It includes four sectors as
> follows:
>
> * Background
> * What is RMRR
> * Current RMRR Issues
> * Design Overview
>
> We hope this can
On 04/01/2015 17:17, Junji Zhi wrote:
> Hi,
>
> I'm Junji, a newbie in Xen and hoping I can contribute to the
> community one day. I have a few questions regarding the writable page
> tables, while reading The Definitive Guide to the Xen Hypervisor by
> David Chisnall:
>
> 1. Writable page tables i
On Mon, Jan 5, 2015 at 7:25 AM, Marcelo Tosatti wrote:
> On Mon, Dec 22, 2014 at 04:39:57PM -0800, Andy Lutomirski wrote:
>> The pvclock vdso code was too abstracted to understand easily and
>> excessively paranoid. Simplify it for a huge speedup.
>>
>> This opens the door for additional simplifi
flight 33115 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33115/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-build fail REGR. vs. 32879
build-amd64-libvirt
Xen 4.5-rc4 was out on Monday (Dec 15th). The GA
General Release is on Jan 7th^H^H^14th!
There are some outstanding patches on which we need to figure
out whether we will commit them in or not.
When we commit a patch in, the OSSTest takes a day or so to push it to 'master'
- and if it fails durin
On 12/17/2014 10:38 AM, Boris Ostrovsky wrote:
Add runtime interface for setting PMU mode and flags. Three main modes are
provided:
* XENPMU_MODE_OFF: PMU is not virtualized
* XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts.
* XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for
On 12/17/2014 10:38 AM, Boris Ostrovsky wrote:
Code for initializing/tearing down PMU for PV guests
Signed-off-by: Boris Ostrovsky
Acked-by: Kevin Tian
Acked-by: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
Acked-by: Daniel De Graaf
_
On Wed, Dec 31, 2014 at 10:31:06AM -0500, Konrad Rzeszutek Wilk wrote:
> On Mon, Dec 22, 2014 at 09:06:40AM +0100, Olaf Hering wrote:
> > On Fri, Dec 19, Konrad Rzeszutek Wilk wrote:
> >
> > > On Fri, Dec 19, 2014 at 12:25:26PM +0100, Olaf Hering wrote:
> > > > This is a resend of these two series
Save VPMU state during context switch for both HVM and PV(H) guests.
A subsequent patch ("x86/VPMU: NMI-based VPMU support") will make it possible
for vpmu_switch_to() to call vmx_vmcs_try_enter()->vcpu_pause() which needs
is_running to be correctly set/cleared. To prepare for that, call
context_
Don't have the hypervisor update APIC_LVTPC when _it_ thinks the vector should
be updated. Instead, handle guest's APIC_LVTPC accesses and write what the guest
explicitly wanted.
Signed-off-by: Boris Ostrovsky
Acked-by: Kevin Tian
Acked-by: Jan Beulich
Reviewed-by: Dietmar Hahn
Tested-by: Diet
The two routines share most of their logic.
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/hvm/vpmu.c| 77 --
xen/include/asm-x86/hvm/vpmu.h | 14 ++--
2 files changed, 42 insertions(+), 49 deletions(-)
diff --git a/xen/arch/x86/hvm/vpmu.c b/
There is a possibility that we set VPMU_CONTEXT_SAVE on VPMU context in
vpmu_load() and never clear it (because vpmu_save_force() will see
VPMU_CONTEXT_LOADED bit clear, which is possible on AMD processors)
The problem is that amd_vpmu_save() assumes that if VPMU_CONTEXT_SAVE is set
then (1) we ne
The failure to initialize VPMU may be temporary so we shouldn'd disable VMPU
forever.
Signed-off-by: Boris Ostrovsky
Reported-by: Jan Beulich
---
xen/arch/x86/hvm/vpmu.c | 21 +
1 file changed, 13 insertions(+), 8 deletions(-)
diff --git a/xen/arch/x86/hvm/vpmu.c b/xen/arch
With this patch return value of 1 of vpmu_do_msr() will now indicate whether an
error was encountered during MSR processing (instead of stating that the access
was to a VPMU register).
As part of this patch we also check for validity of certain MSR accesses right
when we determine which register i
Remove struct pmumsr and core2_pmu_enable. Replace static MSR structures with
fields in core2_vpmu_context.
Call core2_get_pmc_count() once, during initialization.
Properly clean up when core2_vpmu_alloc_resource() fails.
Signed-off-by: Boris Ostrovsky
Acked-by: Kevin Tian
Reviewed-by: Dietmar
A subsequent patch will add an inline routine to vpmu.h that will call
vpmu_load().
This inline will try to access vcpu->vpmu which is not possible since struct
vcpu may not be fully defined at that point. So we will have that inline pass
vpmu pointer to vpmu_load() instead.
This change slightly
Add support for privileged PMU mode (XENPMU_MODE_ALL) which allows privileged
domain (dom0) profile both itself (and the hypervisor) and the guests. While
this mode is on profiling in guests is disabled.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
Reviewed-by: Konrad Rzeszutek Wilk
Rev
MSR_CORE_PERF_GLOBAL_CTRL register should be set zero initially. It is up to
the guest to set it so that counters are enabled.
Signed-off-by: Boris Ostrovsky
Acked-by: Kevin Tian
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/arch/x86/hvm/vmx/vpmu_core2.c | 11 +--
1 file c
Add support for using NMIs as PMU interrupts to allow profiling hypervisor
when interrupts are disabled.
Most of processing is still performed by vpmu_do_interrupt(). However, since
certain operations are not NMI-safe we defer them to a softint that
vpmu_do_interrupt()
will schedule:
* For PV gue
Since PMU is now not HVM specific we can move VPMU-related files up from
arch/x86/hvm/ directory.
Specifically:
arch/x86/hvm/vpmu.c -> arch/x86/cpu/vpmu.c
arch/x86/hvm/svm/vpmu.c -> arch/x86/cpu/vpmu_amd.c
arch/x86/hvm/vmx/vpmu_core2.c -> arch/x86/cpu/vpmu_intel.c
include/asm-x86/h
Intercept accesses to PMU MSRs and process them in VPMU module. If vpmu ops
for VCPU are not initialized (which is the case, for example, for PV guests that
are not "VPMU-enlightened") access to MSRs will return failure.
Dump VPMU state for all domains (HVM and PV) when requested.
Signed-off-by:
Code for initializing/tearing down PMU for PV guests
Signed-off-by: Boris Ostrovsky
Acked-by: Kevin Tian
Acked-by: Jan Beulich
Acked-by: Daniel De Graaf
Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
tools/flask/policy/policy/modules/xen/xen.te |
Export Xen's symbols as {} triplet via new XENPF_get_symbol
hypercall
Signed-off-by: Boris Ostrovsky
Acked-by: Daniel De Graaf
Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/arch/x86/platform_hypercall.c | 28 +++
xen/common/sym
Version 17 of PV(H) PMU patches.
Changes in v17:
* Disable VPMU when unknown CPU vendor is detected (patch #2)
* Remove unnecessary vendor tests in vendor-specific init routines (patch #14)
* Remember first CPU that starts mode change and use it to stop the cycle
(patch #13)
* If vpmu ops is not
In preparation for making VPMU code shared with PV make sure that we we update
MSR bitmaps only for HVM/PVH guests
Signed-off-by: Boris Ostrovsky
Acked-by: Kevin Tian
Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/arch/x86/hvm/svm/vpmu.c |
Add support for handling PMU interrupts for PV guests.
VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush
hypercall. This allows the guest to access PMU MSR values that are stored in
VPMU context which is shared between hypervisor and domain, thus avoiding
traps to hyper
Add runtime interface for setting PMU mode and flags. Three main modes are
provided:
* XENPMU_MODE_OFF: PMU is not virtualized
* XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts.
* XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for non-proviledged guests, dom0
can profile itself
Introduce vpmu_are_all_set that allows testing multiple bits at once. Convert
macros
into inlines for better compiler checking.
Signed-off-by: Boris Ostrovsky
Acked-by: Kevin Tian
Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/arch/x86/hvm/vmx/v
Add pmu.h header files, move various macros and structures that will be
shared between hypervisor and PV guests to it.
Move MSR banks out of architectural PMU structures to allow for larger sizes
in the future. The banks are allocated immediately after the context and
PMU structures store offsets
vpmu structure will be used for both HVM and PV guests. Move it from
hvm_vcpu to arch_vcpu.
Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
Reviewed-by: Kevin Tian
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/include/asm-x86/domain.h | 2 ++
xen/include/asm-x86/hvm/vcpu.h
vmx_add_host_load_msr() and vmx_add_guest_msr() share fair amount of code. Merge
them to simplify code maintenance.
Signed-off-by: Boris Ostrovsky
Acked-by: Kevin Tian
Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: Dietmar Hahn
Tested-by: Dietmar Hahn
---
xen/arch/x86/hvm/vmx/vmcs.c
1 - 100 of 127 matches
Mail list logo