[Xen-devel] [PATCH 3/3] xen-sndfront: add capture support

2015-01-19 Thread Oleksandr Dmytryshyn
From: Iurii Konovalenko Now both play and capture is supported. Signed-off-by: Iurii Konovalenko Signed-off-by: Oleksandr Dmytryshyn --- include/xen/interface/io/sndif.h | 93 +--- sound/drivers/xen-sndfront.c | 222 ++- 2 files changed, 25

[Xen-devel] [PATCH 2/3] xen-sndfront: switch to the v2 driver

2015-01-19 Thread Oleksandr Dmytryshyn
From: Iurii Konovalenko Now this driver registers an virtual sound card and sends an PCM streams to the backend driver. Backend driver is an user-space application and uses ALSA with dmix plugin to play audio. Signed-off-by: Iurii Konovalenko Signed-off-by: Oleksandr Dmytryshyn --- include/xe

[Xen-devel] [PATCH 1/3] xen-sndfront: add sound frontend driver

2015-01-19 Thread Oleksandr Dmytryshyn
This is Para-virtual sound driver. This driver creates sound files in /dev/snd/: controlC0, pcmC0D0p, etc. Then it intercepts some IOCTLs and redirects them to the backend driver. Backend driver is build-in the kernel. It issues those IOCTLs on the real sound files and returns the result to the fr

[Xen-devel] [PATCH 0/3] Add sound frontend driver

2015-01-19 Thread Oleksandr Dmytryshyn
Hi to all. Next series of patches introduces Para-virtual sound driver CONFIG_XEN_SND_FRONTEND should be selected to use this driver. Frontend driver registers an virtual sound card and sends/receives an PCM streams to/from the backend driver. Backend driver is an user-space application which us

[Xen-devel] [PATCH RFC V2 5/5] domcreate: support pvusb in configuration file

2015-01-19 Thread Chunyan Liu
Add code to support pvusb from domain create. One could specify usb in domain's configuration file and create domain, then usb device would be attached to guest automatically. One could specify usb device in config file like this: usb=['2-1.1'] Signed-off-by: Chunyan Liu Signed-off-by: Simon Cao

[Xen-devel] [PATCH RFC V2 2/5] libxl: export some functions for pvusb use

2015-01-19 Thread Chunyan Liu
Signed-off-by: Chunyan Liu Signed-off-by: Simon Cao --- tools/libxl/libxl.c | 6 +++--- tools/libxl/libxl_internal.h | 5 + 2 files changed, 8 insertions(+), 3 deletions(-) diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c index 11cf0e1..3cd13db 100644 --- a/tools/libxl/libxl.

[Xen-devel] [PATCH RFC V2 3/5] libxl: add pvusb API

2015-01-19 Thread Chunyan Liu
Add pvusb APIs, including: - attach/detach (create/destroy) virtual usb controller. - attach/detach usb device - list assignable usb devices in host - some other helper functions Signed-off-by: Chunyan Liu Signed-off-by: Simon Cao --- tools/libxl/Makefile |2 +- tools/libxl/libx

[Xen-devel] [PATCH RFC V2 4/5] xl: add pvusb commands

2015-01-19 Thread Chunyan Liu
Add pvusb commands. To attach a usb device to guest through pvusb, one could follow following example: #xl usb-ctrl-attach test_vm version=1 num_ports=8 #xl usb-list test_vm will show the usb controllers and port usage under the domain. #xl usb-assignable-list will list all assignable usb

[Xen-devel] [PATCH RFC V2 0/5] pvusb toolstack work

2015-01-19 Thread Chunyan Liu
This patch series is based on Simon's work. Since there is no progress after last August, I hope we can make this work proceed. Any comment will be very appreciated. It adds pvusb toolstack implementation, with pvusb kernel side work, one could attach/detach a usb device to guest. Changes to Simo

[Xen-devel] [PATCH RFC V2 1/5] libxl: add pvusb definitions

2015-01-19 Thread Chunyan Liu
To attach a usb device, a virtual usb controller should be created first. This patch defines usbctrl and usbdevice related structs. Signed-off-by: Chunyan Liu Signed-off-by: Simon Cao --- tools/libxl/libxl_types.idl | 58 +++- tools/libxl/libxl_types_int

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Jan Beulich
>>> On 18.01.15 at 09:36, wrote: >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: Thursday, January 15, 2015 6:06 PM >> >> > The composed reserved region list is then passed to domain builder, >> > which tries to detect and avoid conflicts when populating guest RAM. >> > To avoid breakin

[Xen-devel] [xen-4.4-testing test] 33516: regressions - FAIL

2015-01-19 Thread xen . org
flight 33516 xen-4.4-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33516/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 33292 Tests which did n

Re: [Xen-devel] [PATCH 07/11] x86/altp2m: introduce p2m_ram_rw_ve type.

2015-01-19 Thread Jan Beulich
>>> On 16.01.15 at 18:14, wrote: > On 01/16/2015 12:20 AM, Jan Beulich wrote: > On 15.01.15 at 21:38, wrote: >>> On 01/15/2015 09:03 AM, Tim Deegan wrote: At 13:26 -0800 on 09 Jan (1420806397), Ed White wrote: > This is treated exactly like p2m_ram_rw, except that suppress_ve is not

Re: [Xen-devel] [PATCH 08/11] x86/altp2m: add remaining support routines.

2015-01-19 Thread Jan Beulich
>>> On 16.01.15 at 18:17, wrote: > On 01/16/2015 12:24 AM, Jan Beulich wrote: > On 15.01.15 at 22:00, wrote: >>> On 01/15/2015 09:33 AM, Tim Deegan wrote: Hi, Sorry for the fractured replies - my notes are confused about which functions were defined where. At 13:

Re: [Xen-devel] [PATCH v2 2/4] sysctl: Make XEN_SYSCTL_topologyinfo sysctl a little more efficient

2015-01-19 Thread Jan Beulich
>>> On 16.01.15 at 18:07, wrote: > On 01/16/2015 11:57 AM, Andrew Cooper wrote: >> On 16/01/15 16:45, Jan Beulich wrote: >> On 16.01.15 at 17:38, wrote: On Fri, 2015-01-16 at 16:34 +, Jan Beulich wrote: On 16.01.15 at 17:16, wrote: >> On Fri, 2015-01-16 at 16:06 +,

[Xen-devel] [RFC] Add the panic info when disable VT-d

2015-01-19 Thread Liang Li
Before the chang, if setting iommu=0 option in xen boot option, the painc info is "Couldn't enable IOMMU and iomm=required/force", this will confuse the users because the iommu has been disabled. Signed-off-by: Liang Li --- xen/arch/x86/apic.c | 5 + 1 file changed, 5 insertions(+) diff --g

Re: [Xen-devel] [xen-unstable bisection] complete test-amd64-i386-freebsd10-amd64

2015-01-19 Thread Ian Campbell
On Sat, 2015-01-17 at 03:51 +, xen.org wrote: > branch xen-unstable > xen branch xen-unstable > job test-amd64-i386-freebsd10-amd64 > test guest-start > > Tree: linux git://xenbits.xen.org/linux-pvops.git > Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git > Tree: qemu git:/

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Jan Beulich
>>> On 18.01.15 at 09:58, wrote: > still one open to hear suggestion though, regarding to how we want > to pass the reserved regions to domain builder and hvmloader (for Xen > we will extend related assignment hypercall to include per device override). > > one simple solution is to extend xc_hv

[Xen-devel] [linux-3.10 test] 33521: regressions - FAIL

2015-01-19 Thread xen . org
flight 33521 linux-3.10 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33521/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt 5 xen-boot fail REGR. vs. 26303 test-amd64-i386-rhel6h

Re: [Xen-devel] [libvirt bisection] complete build-armhf-libvirt

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 04:48 +, xen.org wrote: > branch xen-unstable > xen branch xen-unstable > job build-armhf-libvirt > test libvirt-build > > Tree: libvirt git://libvirt.org/libvirt.git > Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git > Tree: xen git://xenbits.xen.org/

Re: [Xen-devel] [libvirt bisection] complete build-armhf-libvirt

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 09:37 +, Ian Campbell wrote: > On Mon, 2015-01-19 at 04:48 +, xen.org wrote: > > branch xen-unstable > > xen branch xen-unstable > > job build-armhf-libvirt > > test libvirt-build > > > > Tree: libvirt git://libvirt.org/libvirt.git > > Tree: qemuu git://xenbits.xen.or

[Xen-devel] ping: two patches pending for a week

2015-01-19 Thread Jan Beulich
All, is there any chance I could get an ack or otherwise on http://lists.xenproject.org/archives/html/xen-devel/2015-01/msg00869.html http://lists.xenproject.org/archives/html/xen-devel/2015-01/msg00876.html which both have seen reviews, but no suitable acks allowing me to commit? There were a f

Re: [Xen-devel] ping: two patches pending for a week

2015-01-19 Thread Tim Deegan
At 09:48 + on 19 Jan (1421657335), Jan Beulich wrote: > All, > > is there any chance I could get an ack or otherwise on > > http://lists.xenproject.org/archives/html/xen-devel/2015-01/msg00869.html > http://lists.xenproject.org/archives/html/xen-devel/2015-01/msg00876.html > > which both hav

Re: [Xen-devel] [xen-4.4-testing test] 33516: regressions - FAIL

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 09:49, wrote: > flight 33516 xen-4.4-testing real [real] > http://www.chiark.greenend.org.uk/~xensrcts/logs/33516/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-amd64-i386-pair 17 guest-migrate/src_ho

Re: [Xen-devel] [xen-unstable test] 33476: tolerable FAIL - PUSHED

2015-01-19 Thread Jan Beulich
>>> On 18.01.15 at 21:50, wrote: > Regressions which are regarded as allowable (not blocking): > test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like > 33112 Or, continuing from the 4.4 test reply just sent, does that tree simply need a one time force push so that the test m

Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission

2015-01-19 Thread Jan Beulich
>>> On 16.01.15 at 20:52, wrote: > --- a/security_vulnerability_process.html > +++ b/security_vulnerability_process.html > @@ -212,6 +212,17 @@ following: >The assigned XSA number >The planned disclosure date > > +List members may, if (and only if) the Security Team grants > +permission,

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread George Dunlap
On 01/18/2015 08:58 AM, Tian, Kevin wrote: >> From: George Dunlap >> Sent: Thursday, January 15, 2015 7:45 PM >> >>> >>> If above high level flow can be agreed, then we can move forward to >>> discuss next level detail e.g. how to pass the rmrr list cross different >>> components. :-) >> >> I think

[Xen-devel] [PATCH SECURITY-POLICY 0/9] Re: Security policy ambiguities - XSA-108 process post-mortem

2015-01-19 Thread Jan Beulich
>>> On 16.01.15 at 20:48, wrote: > Lars Kurth writes ("Re: [Xen-devel] Security policy ambiguities - XSA-108 > process post-mortem"): >> I would say, give it a week for further feedback and then prepare a patch. > > It's been rather longer than a week - sorry. > > I would like to propose the fo

Re: [Xen-devel] Using Libvirtd with virt-manager on aarch64

2015-01-19 Thread Stefano Stabellini
On Fri, 16 Jan 2015, Jaggi, Manish wrote: > Hi Stefano /clark, > Thanks for sharing the link. For dom0 I am using openSuse. > I have followed the steps listed on > the(https://libvirt.org/compiling.html#building) to build and install. I > believe build-librvit-deb would be doing the same steps or

Re: [Xen-devel] [PATCH 3/6] xen/arm: kernel: Move kernel loading code in init section

2015-01-19 Thread Ian Campbell
On Fri, 2015-01-16 at 17:49 +, Julien Grall wrote: > Hello, > > On 16/01/15 17:33, Vitaly Kuznetsov wrote: > > Julien Grall writes: > > > >> The code to load the kernel is only used when Xen builds dom0. It > >> happens during the boot. > > > > I suppose we don't have dom0 kexec for ARM now

Re: [Xen-devel] [PATCH] physdev: hide compatibility definitions for new enough interface version

2015-01-19 Thread Ian Campbell
On Thu, 2015-01-15 at 15:27 +, Jan Beulich wrote: > There's no point in continuing to expose those. There's a chance someone might have been using them for __XEN_INTERFACE_VERSION__ >= 0x00030202, I think. Given that we missed the opportunity to gate these when the change was made we should p

Re: [Xen-devel] [RFC] Add the panic info when disable VT-d

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 10:00, wrote: > --- a/xen/arch/x86/apic.c > +++ b/xen/arch/x86/apic.c > @@ -915,6 +915,11 @@ void __init x2apic_bsp_setup(void) > return; > } > printk("x2APIC: Already enabled by BIOS: Ignoring cmdline > disable.\n"); > +} else { > +

Re: [Xen-devel] Xen server on Snapdragon 810 ARM processor

2015-01-19 Thread Stefano Stabellini
Hello Shaukat, Xen should be able to run on Snapdragon 810 platforms. The porting efforts should just take a few days, if you know the characteristics of your dev board well, see: http://wiki.xen.org/wiki/Xen_ARM_with_Virtualization_Extensions_whitepaper Just to clarify, XenServer is a Citrix pr

[Xen-devel] [PATCH] xen/many: xfree() can tolerate NULL pointers

2015-01-19 Thread Andrew Cooper
Replace instances of "if ( p ) xfree(p)" with just "xfree(p)" Signed-off-by: Andrew Cooper CC: Keir Fraser CC: Jan Beulich CC: Tim Deegan CC: Ian Campbell CC: Ian Jackson --- This was from some experimentation with semantic patches. 'spatch' can't currently parse some of our macros (e.g.

[Xen-devel] [PATCH] x86/cpuid: Correct parameter types for cpuid_count()

2015-01-19 Thread Andrew Cooper
About half of the cpuid space has the top bit of op set, and op it always specified with unsigned integers. There are no problematic uses in tree at the moment. Signed-off-by: Andrew Cooper CC: Keir Fraser CC: Jan Beulich --- xen/include/asm-x86/processor.h |4 ++-- 1 file changed, 2 inse

[Xen-devel] [PATCH] x86/domain: Improvements to switch_native() and switch_compat()

2015-01-19 Thread Andrew Cooper
Both are called with known-good domains, making the NULL check redundant. Both also have open-coded forms of for_each_vcpu() which are replaced. To aid the cleanup in switch_compat(), release_compat_l4() is updated to make it safe to call on a vcpu without an existing compat l4. Finally, switch_c

[Xen-devel] [PATCH] xsm/evtchn: Never pretend to have successfully created a Xen event channel

2015-01-19 Thread Andrew Cooper
Xen event channels are not internal resources. They still have one end in a domain, and are created at the request of privileged domains. This logic which "successfully" creates a Xen event channel opens up undesirable failure cases with ill-specified XSM policies. If a domain is permitted to cr

Re: [Xen-devel] [PATCH v2 2/4] sysctl: Make XEN_SYSCTL_topologyinfo sysctl a little more efficient

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 08:57 +, Jan Beulich wrote: > >>> On 16.01.15 at 18:07, wrote: > > Also, a side question --- how is platform ops interface considered > > stable if it is versioned? I may have a different understanding of what > > "stable" means. > > I'm not sure why this has a version

Re: [Xen-devel] [PATCH 0/3] Add sound frontend driver

2015-01-19 Thread David Vrabel
On 19/01/15 08:19, Oleksandr Dmytryshyn wrote: > Hi to all. > > Next series of patches introduces Para-virtual sound driver > > CONFIG_XEN_SND_FRONTEND should be selected to use this driver. > > Frontend driver registers an virtual sound card and sends/receives > an PCM streams to/from the backe

Re: [Xen-devel] [PATCH] xen/many: xfree() can tolerate NULL pointers

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 10:42 +, Andrew Cooper wrote: > Replace instances of "if ( p ) xfree(p)" with just "xfree(p)" > > Signed-off-by: Andrew Cooper > CC: Keir Fraser > CC: Jan Beulich > CC: Tim Deegan > CC: Ian Campbell > CC: Ian Jackson > > --- > > This was from some experimentation

Re: [Xen-devel] [PATCH] physdev: hide compatibility definitions for new enough interface version

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 11:36, wrote: > On Thu, 2015-01-15 at 15:27 +, Jan Beulich wrote: >> There's no point in continuing to expose those. > > There's a chance someone might have been using them for > __XEN_INTERFACE_VERSION__ >= 0x00030202, I think. > > Given that we missed the opportunity to

Re: [Xen-devel] [PATCH 1/3] xen-sndfront: add sound frontend driver

2015-01-19 Thread David Vrabel
On 19/01/15 08:19, Oleksandr Dmytryshyn wrote: > + > +struct sndif_request_open { > + unsigned int dev_num; > + unsigned int card_num; > + unsigned int dev_type; > + unsigned int _pad1; > + uint64_t id; /* private guest value, echoed in resp */ > + unsigned in

Re: [Xen-devel] [PATCH 2/3] xen-sndfront: switch to the v2 driver

2015-01-19 Thread David Vrabel
On 19/01/15 08:19, Oleksandr Dmytryshyn wrote: > From: Iurii Konovalenko > > Now this driver registers an virtual sound card > and sends an PCM streams to the backend driver. > Backend driver is an user-space application and > uses ALSA with dmix plugin to play audio. > [...] > struct sndif_req

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 10:21 +, George Dunlap wrote: > On 01/18/2015 08:58 AM, Tian, Kevin wrote: > >> From: George Dunlap > >> Sent: Thursday, January 15, 2015 7:45 PM > >> > >>> > >>> If above high level flow can be agreed, then we can move forward to > >>> discuss next level detail e.g. how t

Re: [Xen-devel] [PATCH] hvm/hpet: Correctly gate the virtual HPET on HVM_PARAM_HPET_ENABLE

2015-01-19 Thread Jan Beulich
>>> On 15.01.15 at 16:49, wrote: > On 15/01/15 15:34, Jan Beulich wrote: > On 15.01.15 at 15:40, wrote: >>> c/s 3f8e22de7 "x86 hvm: Allow HPET to be configured as a per-domain config >>> option" introduced the parameter to conditionally enable the HPET. >>> >>> However, having the check in hp

Re: [Xen-devel] [PATCH] xen/many: xfree() can tolerate NULL pointers

2015-01-19 Thread Andrew Cooper
On 19/01/15 10:54, Ian Campbell wrote: > On Mon, 2015-01-19 at 10:42 +, Andrew Cooper wrote: >> Replace instances of "if ( p ) xfree(p)" with just "xfree(p)" >> >> Signed-off-by: Andrew Cooper >> CC: Keir Fraser >> CC: Jan Beulich >> CC: Tim Deegan >> CC: Ian Campbell >> CC: Ian Jackson >

Re: [Xen-devel] [PATCH 1/3] xen-sndfront: add sound frontend driver

2015-01-19 Thread Oleksandr Dmytryshyn
On Mon, Jan 19, 2015 at 12:55 PM, David Vrabel wrote: > On 19/01/15 08:19, Oleksandr Dmytryshyn wrote: >> + >> +struct sndif_request_open { >> + unsigned int dev_num; >> + unsigned int card_num; >> + unsigned int dev_type; >> + unsigned int _pad1; >> + uint64_t id;

Re: [Xen-devel] [PATCH 0/3] Add sound frontend driver

2015-01-19 Thread Oleksandr Dmytryshyn
On Mon, Jan 19, 2015 at 12:50 PM, David Vrabel wrote: > On 19/01/15 08:19, Oleksandr Dmytryshyn wrote: >> Hi to all. >> >> Next series of patches introduces Para-virtual sound driver >> >> CONFIG_XEN_SND_FRONTEND should be selected to use this driver. >> >> Frontend driver registers an virtual sou

Re: [Xen-devel] [PATCH 2/3] xen-sndfront: switch to the v2 driver

2015-01-19 Thread Oleksandr Dmytryshyn
On Mon, Jan 19, 2015 at 12:57 PM, David Vrabel wrote: > On 19/01/15 08:19, Oleksandr Dmytryshyn wrote: >> From: Iurii Konovalenko >> >> Now this driver registers an virtual sound card >> and sends an PCM streams to the backend driver. >> Backend driver is an user-space application and >> uses ALS

Re: [Xen-devel] [PATCH] xen/many: xfree() can tolerate NULL pointers

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 11:12 +, Andrew Cooper wrote: > On 19/01/15 10:54, Ian Campbell wrote: > > Anyway, could you include the spatch in the commit log, for completeness > > and for future cargo culting ;-) (unless it's huge, I guess) > > It was tiny, but sadly scummed to a `git clean`. I can

Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission

2015-01-19 Thread Lars Kurth
On 19 Jan 2015, at 10:20, Jan Beulich wrote: On 16.01.15 at 20:52, wrote: >> +List members may, if (and only if) the Security Team grants >> +permission, deploy fixed versions during the embargo. Permission for > > Better: List members may deploy fixed versions during the embargo, if (.

[Xen-devel] [PATCH 2/4] xen/evtchn: Reduce the size of the poll_mask where possible

2015-01-19 Thread Andrew Cooper
Use domain_max_vcpus(d) in preference to MAX_VIRT_CPUS when allocating the poll mask. This allows x86 HVM guests to have a poll mask of 128 bits rather than 8k bits. While changing this, use xzalloc_array() in preference to xmalloc_array() to avoid needing the subsequent call to bitmap_zero(). S

[Xen-devel] [PATCH 1/4] xen/domain: Introduce domain_max_vcpus() helper and implement per arch

2015-01-19 Thread Andrew Cooper
This allows the common XEN_DOMCTL_max_vcpus handler to loose some x86-specific architecture knowledge. It turns out that Xen had the same magic number twice in-tree with different names (HVM_MAX_VCPUS and MAX_HVM_VCPUS). This removes all use of MAX_HVM_VCPUS, and x86 uses HVM_MAX_VCPUS from the p

[Xen-devel] [PATCH 3/4] sched/arinc653: Remove MAX_VIRT_CPUS bounds check

2015-01-19 Thread Andrew Cooper
The arinc653 interface is capable of specifying a domain in the schedule (from the toolstack) before the domain itself exists, or is present in the cpupool (The domain is identified by UUID rather than domid). As a result, the schedule can't be validated at this point. The vcpu_id from userspace i

[Xen-devel] [PATCH 4/4] xen/many: Drop redundant MAX_VIRT_CPUS bounds checks

2015-01-19 Thread Andrew Cooper
In all 4 cases, visible in the context are bounds check against d->max_vcpus. Domain building will ensure that d->max_vcpus never exceeds an appropriate bound. In the x86 case, different types of domains have different maxima for vcpus, making the checks wrong as opposed to simply redundant. For

[Xen-devel] [PATCH 0/4] Reduce the use of MAX_VIRT_CPUS in tree

2015-01-19 Thread Andrew Cooper
MAX_VIRT_CPUS used to be an appropriate upper bound for vcpus when it was the length of the fixed-size vcpus array in a struct domain. When the vcpu array became dynamically allocated in Xen 4.0, it ceased to be an appropriate bound. Andrew Cooper (4): xen/domain: Introduce domain_max_vcpus() h

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Monday, January 19, 2015 5:33 PM > > >>> On 18.01.15 at 09:58, wrote: > > still one open to hear suggestion though, regarding to how we want > > to pass the reserved regions to domain builder and hvmloader (for Xen > > we will extend related

Re: [Xen-devel] [PATCH] xen/many: xfree() can tolerate NULL pointers

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 12:12, wrote: > On 19/01/15 10:54, Ian Campbell wrote: >> On Mon, 2015-01-19 at 10:42 +, Andrew Cooper wrote: >>> Replace instances of "if ( p ) xfree(p)" with just "xfree(p)" >>> >>> Signed-off-by: Andrew Cooper >>> CC: Keir Fraser >>> CC: Jan Beulich >>> CC: Tim Deegan

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Tim Deegan
At 11:24 + on 19 Jan (1421663081), Tian, Kevin wrote: > > From: Jan Beulich [mailto:jbeul...@suse.com] > > Sent: Monday, January 19, 2015 5:33 PM > > > > >>> On 18.01.15 at 09:58, wrote: > > > still one open to hear suggestion though, regarding to how we want > > > to pass the reserved region

Re: [Xen-devel] [PATCH] x86/domain: Improvements to switch_native() and switch_compat()

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 11:44, wrote: > To aid the cleanup in switch_compat(), release_compat_l4() is updated to > make > it safe to call on a vcpu without an existing compat l4. For this part of the change: > --- a/xen/arch/x86/domain.c > +++ b/xen/arch/x86/domain.c > @@ -349,6 +349,8 @@ static int

Re: [Xen-devel] [PATCH] xsm/evtchn: Never pretend to have successfully created a Xen event channel

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 11:45, wrote: > --- a/xen/common/event_channel.c > +++ b/xen/common/event_channel.c > @@ -1155,21 +1155,25 @@ int alloc_unbound_xen_event_channel( > > spin_lock(&d->event_lock); > > -if ( (port = get_free_port(d)) < 0 ) > +rc = get_free_port(d); > +if ( rc <

Re: [Xen-devel] [xen-4.4-testing test] 33516: regressions - FAIL [and 2 more messages]

2015-01-19 Thread Ian Jackson
Jan Beulich writes ("Re: [Xen-devel] [xen-4.4-testing test] 33516: regressions - FAIL"): > > test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. > > 33292 > > this continues to suffer from the swiotlb issue, and prevents the push > from happening that would allow RC1s to be

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 12:33, wrote: > FWIW, I don't like adding hypervisor state (and even more so > hypervisor mechanism like a new hypercall) for things that the > hypervisor doesn't need to know about. Since the e820 is only shared > between the tools and the guest, I'd prefer it to go in either

Re: [Xen-devel] [PATCH] xsm/evtchn: Never pretend to have successfully created a Xen event channel

2015-01-19 Thread Andrew Cooper
On 19/01/15 11:37, Jan Beulich wrote: On 19.01.15 at 11:45, wrote: >> --- a/xen/common/event_channel.c >> +++ b/xen/common/event_channel.c >> @@ -1155,21 +1155,25 @@ int alloc_unbound_xen_event_channel( >> >> spin_lock(&d->event_lock); >> >> -if ( (port = get_free_port(d)) < 0 )

Re: [Xen-devel] [xen-4.4-testing test] 33516: regressions - FAIL [and 2 more messages]

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 12:40, wrote: > Jan Beulich writes ("Re: [Xen-devel] [xen-4.4-testing test] 33516: > regressions - > FAIL"): >> > test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. >> > 33292 >> >> this continues to suffer from the swiotlb issue, and prevents the push

Re: [Xen-devel] [PATCH] xen/many: xfree() can tolerate NULL pointers

2015-01-19 Thread Ian Jackson
Ian Campbell writes ("Re: [PATCH] xen/many: xfree() can tolerate NULL pointers"): > On Mon, 2015-01-19 at 10:42 +, Andrew Cooper wrote: > > This was from some experimentation with semantic patches. 'spatch' can't > > currently parse some of our macros (e.g. XEN_GUEST_HANDLE()), which cases it

Re: [Xen-devel] [PATCH] xen/many: xfree() can tolerate NULL pointers

2015-01-19 Thread Ian Jackson
Ian Campbell writes ("Re: [PATCH] xen/many: xfree() can tolerate NULL pointers"): > On Mon, 2015-01-19 at 11:12 +, Andrew Cooper wrote: > > On 19/01/15 10:54, Ian Campbell wrote: > > > Anyway, could you include the spatch in the commit log, for completeness > > > and for future cargo culting ;

Re: [Xen-devel] [xen-4.4-testing test] 33516: regressions - FAIL [and 2 more messages]

2015-01-19 Thread Ian Jackson
Jan Beulich writes ("Re: [xen-4.4-testing test] 33516: regressions - FAIL [and 2 more messages]"): > On 19.01.15 at 12:40, wrote: > > So, just to confirm, what I will do (if you give your permission) is > > to force push 30f10d4d2b102bd7184b84c9cc3d2246f060706a to stable-4.4. > > Yes, please. D

Re: [Xen-devel] [PATCH] xen/many: xfree() can tolerate NULL pointers

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 12:47, wrote: > Ian Campbell writes ("Re: [PATCH] xen/many: xfree() can tolerate NULL > pointers"): >> On Mon, 2015-01-19 at 11:12 +, Andrew Cooper wrote: >> > On 19/01/15 10:54, Ian Campbell wrote: >> > > Anyway, could you include the spatch in the commit log, for complete

Re: [Xen-devel] [PATCH] xsm/evtchn: Never pretend to have successfully created a Xen event channel

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 12:41, wrote: > On 19/01/15 11:37, Jan Beulich wrote: > On 19.01.15 at 11:45, wrote: >>> --- a/xen/common/event_channel.c >>> +++ b/xen/common/event_channel.c >>> @@ -1155,21 +1155,25 @@ int alloc_unbound_xen_event_channel( >>> >>> spin_lock(&d->event_lock); >>> >>

Re: [Xen-devel] [PATCH 00/11] Alternate p2m: support multiple copies of host p2m

2015-01-19 Thread Tim Deegan
Hi, At 15:01 + on 17 Jan (1421503283), Andrew Cooper wrote: > With this altp2m code, I have been thinking about migration and passthrough. > > Migration and passthrough are themselves mutually exclusive features, as > logdirty cant identify DMA writes (and the toolstack can probably be > forg

Re: [Xen-devel] [PATCH 1/4] xen/domain: Introduce domain_max_vcpus() helper and implement per arch

2015-01-19 Thread Simon Rowe
On 19/01/15 11:21, Andrew Cooper wrote: This allows the common XEN_DOMCTL_max_vcpus handler to loose some x86-specific architecture knowledge. Sp. "lose" +unsigned int domain_max_vcpus(const struct domain *d) +{ +return MAX_VIRT_CPUS; +} + inline? Simon

Re: [Xen-devel] [PATCH] xen/many: xfree() can tolerate NULL pointers

2015-01-19 Thread Ian Jackson
Jan Beulich writes ("Re: [PATCH] xen/many: xfree() can tolerate NULL pointers"): > On 19.01.15 at 12:47, wrote: > > Umm, further to my last mail, we (the Free Software world in general) > > should treat this the same way we would any other case where the > > source code has been genuinely lost. W

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Tim Deegan
At 11:41 + on 19 Jan (1421664109), Jan Beulich wrote: > >>> On 19.01.15 at 12:33, wrote: > > FWIW, I don't like adding hypervisor state (and even more so > > hypervisor mechanism like a new hypercall) for things that the > > hypervisor doesn't need to know about. Since the e820 is only shared

Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission

2015-01-19 Thread Ian Campbell
On Fri, 2015-01-16 at 19:52 +, Ian Jackson wrote: > Permitting deployment during embargo seemed to have rough consensus on > the principle. We seemed to be converging on the idea that the > Security Team should explicitly set deployment restrictions for each > set of patches. > > Signed-off-b

Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 10:20 +, Jan Beulich wrote: > >>> On 16.01.15 at 20:52, wrote: > > --- a/security_vulnerability_process.html > > +++ b/security_vulnerability_process.html > > @@ -212,6 +212,17 @@ following: > >The assigned XSA number > >The planned disclosure date > > > > +List

[Xen-devel] [RFC][PATCH v1] xen-fbfront: replace deferred io with buffer queue

2015-01-19 Thread Sergiy Kibrik
Use N-buffering instead of old deferred I/O, which is not suitable for high frame rates. This includes new event type -- xenfb_in_released, to track buffers not being used by backend. Also use grants for fb pages, as they allow backend to map them to video devices. Signed-off-by: Sergiy Kibrik --

Re: [Xen-devel] [PATCH SECURITY-POLICY 4/9] Use a public mailing list for predisclosure membership applications.

2015-01-19 Thread Ian Campbell
On Fri, 2015-01-16 at 19:52 +, Ian Jackson wrote: > Signed-off-by: Ian Jackson > Signed-off-by: Ian Jackson > --- > security_vulnerability_process.html |5 +++-- > 1 file changed, 3 insertions(+), 2 deletions(-) > > diff --git a/security_vulnerability_process.html > b/security_vulnerab

Re: [Xen-devel] [PATCH 1/4] xen/domain: Introduce domain_max_vcpus() helper and implement per arch

2015-01-19 Thread Andrew Cooper
On 19/01/15 12:16, Simon Rowe wrote: > On 19/01/15 11:21, Andrew Cooper wrote: >> This allows the common XEN_DOMCTL_max_vcpus handler to loose some >> x86-specific >> architecture knowledge. > Sp. "lose" >> +unsigned int domain_max_vcpus(const struct domain *d) >> +{ >> +return MAX_VIRT_CPUS;

Re: [Xen-devel] [PATCH 1/4] xen/domain: Introduce domain_max_vcpus() helper and implement per arch

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 12:52 +, Andrew Cooper wrote: > I considered that but, while there is an asm-x86/domain.h, there is not > an asm-arm/domain.h which would be the logical location for it to live. I think you've just missed it? $ ls -l xen/include/asm-arm/domain.h -rw-rw-r-- 1 ianc xendev

Re: [Xen-devel] Hypercall overhead measurement on Xen/ARM

2015-01-19 Thread Stefano Stabellini
On Fri, 16 Jan 2015, Jintack Lim wrote: > Hi, > > I'm trying to measure number of cycles for hypercalls. > I'm working on ARM v7 and v8. > > Xentrace seems to be a right tool to use according to this discussion. > http://lists.xen.org/archives/html/xen-devel/2008-10/msg00480.html > > However whe

Re: [Xen-devel] [PATCH 1/4] xen/domain: Introduce domain_max_vcpus() helper and implement per arch

2015-01-19 Thread Andrew Cooper
On 19/01/15 12:57, Ian Campbell wrote: > On Mon, 2015-01-19 at 12:52 +, Andrew Cooper wrote: >> I considered that but, while there is an asm-x86/domain.h, there is not >> an asm-arm/domain.h which would be the logical location for it to live. > I think you've just missed it? > > $ ls -l xen/inc

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread George Dunlap
On 01/19/2015 12:23 PM, Tim Deegan wrote: > At 11:41 + on 19 Jan (1421664109), Jan Beulich wrote: > On 19.01.15 at 12:33, wrote: >>> FWIW, I don't like adding hypervisor state (and even more so >>> hypervisor mechanism like a new hypercall) for things that the >>> hypervisor doesn't need t

Re: [Xen-devel] [RFC PATCH V2 0/8] xen: Clean-up of mem_event subsystem

2015-01-19 Thread Andrew Cooper
On 18/01/15 15:17, Tamas K Lengyel wrote: > This patch series aims to clean up the mem_event subsystem within Xen. The > original use-case for this system was to allow external helper applications > running in privileged domains to control various memory operations performed > by Xen. Amongs these

Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission

2015-01-19 Thread Ian Jackson
Ian Campbell writes ("Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission"): > On Fri, 2015-01-16 at 19:52 +, Ian Jackson wrote: > > +List members may, if (and only if) the Security Team grants > > +permission, deploy fixed versions during the embargo. Permiss

Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 13:08 +, Ian Jackson wrote: > Ian Campbell writes ("Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment > with Security Team Permission"): > > On Fri, 2015-01-16 at 19:52 +, Ian Jackson wrote: > > > +List members may, if (and only if) the Security Team grants > > >

Re: [Xen-devel] [PATCH SECURITY-POLICY 4/9] Use a public mailing list for predisclosure membership applications.

2015-01-19 Thread Ian Jackson
Ian Campbell writes ("Re: [Xen-devel] [PATCH SECURITY-POLICY 4/9] Use a public mailing list for predisclosure membership applications."): > On Fri, 2015-01-16 at 19:52 +, Ian Jackson wrote: > > -security@xenproject if they wish to receive pre-disclosure of > > -advisories. Please include in th

[Xen-devel] [xen-unstable test] 33542: tolerable FAIL

2015-01-19 Thread xen . org
flight 33542 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33542/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 33476 Tests which did not succeed,

Re: [Xen-devel] [PATCH SECURITY-POLICY 4/9] Use a public mailing list for predisclosure membership applications.

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 13:10 +, Ian Jackson wrote: > Ian Campbell writes ("Re: [Xen-devel] [PATCH SECURITY-POLICY 4/9] Use a > public mailing list for predisclosure membership applications."): > > On Fri, 2015-01-16 at 19:52 +, Ian Jackson wrote: > > > -security@xenproject if they wish to r

[Xen-devel] [PATCH] xen/manage: Fix USB interaction issues when resuming

2015-01-19 Thread Ross Lagerwall
Commit 61a734d305e1 ("xen/manage: Always freeze/thaw processes when suspend/resuming") ensured that userspace processes were always frozen before suspending to reduce interaction issues when resuming devices. However, freeze_processes() does not freeze kernel threads. Freeze kernel threads as well

Re: [Xen-devel] [RFC][PATCH v1] xen-fbfront: replace deferred io with buffer queue

2015-01-19 Thread Stefano Stabellini
On Mon, 19 Jan 2015, Sergiy Kibrik wrote: > Use N-buffering instead of old deferred I/O, which is not suitable for high > frame rates. This includes new event type -- xenfb_in_released, > to track buffers not being used by backend. > Also use grants for fb pages, as they allow backend to map them >

Re: [Xen-devel] [RFC][PATCH v1] xen-fbfront: replace deferred io with buffer queue

2015-01-19 Thread Stefano Stabellini
On Mon, 19 Jan 2015, Stefano Stabellini wrote: > On Mon, 19 Jan 2015, Sergiy Kibrik wrote: > > Use N-buffering instead of old deferred I/O, which is not suitable for high > > frame rates. This includes new event type -- xenfb_in_released, > > to track buffers not being used by backend. > > Also use

Re: [Xen-devel] Xen's Linux kernel config options V2

2015-01-19 Thread Ian Campbell
On Tue, 2014-12-16 at 17:21 +0100, Juergen Gross wrote: > Option Selects Depends > -- Could you annotate (maybe not a new column, perhaps with a * or something) which options are supposed t

Re: [Xen-devel] [RFC][PATCH v1] xen-fbfront: replace deferred io with buffer queue

2015-01-19 Thread Ian Campbell
On Mon, 2015-01-19 at 14:03 +0200, Sergiy Kibrik wrote: > include/xen/interface/io/fbif.h |9 +- Please get the any protocol changes reviewed and accepted into xen.git first, including e.g. the switch to grant tables, if that requires front/back end coordination. Ian.

[Xen-devel] [PATCH SECURITY-POLICY 0/9] Re: Security policy ambiguities - XSA-108 process post-mortem

2015-01-19 Thread Ian Jackson
Jan Beulich writes ("[Xen-devel] [PATCH SECURITY-POLICY 0/9] Re: Security policy ambiguities - XSA-108 process post-mortem"): > LGTM, but I think there's no point in ack-ing the series as the > changes need to be voted on anyway. Indeed. I will post a v2 with the minor fixes from this thread inc

Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission

2015-01-19 Thread Ian Jackson
Lars Kurth writes ("Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission"): > On 19 Jan 2015, at 10:20, Jan Beulich wrote: > > On 16.01.15 at 20:52, wrote: > >> +List members may, if (and only if) the Security Team grants > >> +permission, deploy fixed versions du

Re: [Xen-devel] [PATCH SECURITY-POLICY 3/9] Deployment with Security Team Permission

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 13:36, wrote: > On Mon, 2015-01-19 at 10:20 +, Jan Beulich wrote: >> >>> On 16.01.15 at 20:52, wrote: >> > --- a/security_vulnerability_process.html >> > +++ b/security_vulnerability_process.html >> > @@ -212,6 +212,17 @@ following: >> >The assigned XSA number >> >T

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 13:23, wrote: > At 11:41 + on 19 Jan (1421664109), Jan Beulich wrote: >> >>> On 19.01.15 at 12:33, wrote: >> > FWIW, I don't like adding hypervisor state (and even more so >> > hypervisor mechanism like a new hypercall) for things that the >> > hypervisor doesn't need to kn

Re: [Xen-devel] Xen's Linux kernel config options V2

2015-01-19 Thread Jan Beulich
>>> On 19.01.15 at 14:28, wrote: > I think it is still the case that selecting an option which is user > visible is frowned upon? I don't think so; iirc there are cases where things deliberately get set up that way (for example library code that is explicitly meant to be available also to out-of-

Re: [Xen-devel] [Bugfix 0/3] Fix regressions in Xen IRQ management

2015-01-19 Thread Jiang Liu
and i also don't know for sure if it's even due to this patch set > or not): > [ 2361.607881] irq 18: nobody cared (try booting with the > "irqpoll" option) > [ 2361.650103] CPU: 0 PID: 0 Comm: swapper/0 Not tainted > 3.19.0-rc5-creanuc-20150119-dofl

  1   2   3   >