Re: [Xen-devel] tg3 NIC driver bug in 3.14.x under Xen

2015-04-08 Thread Prashant Sreedharan
On Tue, 2015-04-07 at 16:21 -0700, Michael Chan wrote: > On Tue, 2015-04-07 at 19:13 +0100, Ian Jackson wrote: > > root@bedbug:~# ethtool -S xenbr0 | grep -v ': 0$' > > no stats available > > root@bedbug:~# > > Please provide ethtool -S on the tg3 device. Ian, in your previous mail you indicated

Re: [Xen-devel] sudden hang on boot on AMD Notebook

2015-04-08 Thread Olaf Hering
On Tue, Apr 07, Konrad Rzeszutek Wilk wrote: > You might also want to use 'sync_console'. This does not give any extra info in the case of the reported hang. Olaf ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH] x86/hvm: Fix the unknown nested vmexit reason 80000021 bug

2015-04-08 Thread Tian, Kevin
> From: Li, Liang Z > Sent: Tuesday, April 07, 2015 9:27 PM > > This bug will be trigged when NMI happen in the L2 guest. The current > code handles the NMI incorrectly. According to Intel SDM 31.7.1.2 > (Resuming Guest Software after Handling an Exception), If bit 31 of the > IDT-vectoring inform

Re: [Xen-devel] [PATCH] hvmloader: fix building error

2015-04-08 Thread Olaf Hering
On Wed, Apr 08, Wen Congyang wrote: > commit b9245b75 introduces a building error: > make[1]: Entering directory `/root/work/xen/tools/firmware/hvmloader' > gcc -O1 -fno-omit-frame-pointer -m32 -march=i686 -g -fno-strict-aliasing > -std=gnu99 -Wall -Wstrict-prototypes -Wdeclaration-after-statem

Re: [Xen-devel] [PATCH] hvmloader: fix building error

2015-04-08 Thread Wen Congyang
On 04/08/2015 03:21 PM, Olaf Hering wrote: > On Wed, Apr 08, Wen Congyang wrote: > >> commit b9245b75 introduces a building error: >> make[1]: Entering directory `/root/work/xen/tools/firmware/hvmloader' >> gcc -O1 -fno-omit-frame-pointer -m32 -march=i686 -g -fno-strict-aliasing >> -std=gnu99 -

Re: [Xen-devel] [PATCH] hvmloader: fix building error

2015-04-08 Thread Olaf Hering
On Wed, Apr 08, Wen Congyang wrote: > On 04/08/2015 03:21 PM, Olaf Hering wrote: > > On Wed, Apr 08, Wen Congyang wrote: > > > >> commit b9245b75 introduces a building error: > >> make[1]: Entering directory `/root/work/xen/tools/firmware/hvmloader' > >> gcc -O1 -fno-omit-frame-pointer -m32 -ma

Re: [Xen-devel] [PATCH] hvmloader: fix building error

2015-04-08 Thread Wen Congyang
On 04/08/2015 03:28 PM, Olaf Hering wrote: > On Wed, Apr 08, Wen Congyang wrote: > >> On 04/08/2015 03:21 PM, Olaf Hering wrote: >>> On Wed, Apr 08, Wen Congyang wrote: >>> commit b9245b75 introduces a building error: make[1]: Entering directory `/root/work/xen/tools/firmware/hvmloader'

Re: [Xen-devel] [RFC PATCH 0/7] Intel Cache Monitoring: Current Status and Future Opportunities

2015-04-08 Thread Dario Faggioli
On Wed, 2015-04-08 at 13:59 +0800, Chao Peng wrote: > > Mostly, I was curious to learn why that is not reflected in the current > > implementation, i.e., whether there are any reasons why we should not > > take advantage of per-socketness of RMIDs, as reported by SDM, as that > > can greatly help

Re: [Xen-devel] [PATCH] xen: arm: X-Gene Storm check GIC DIST address for EOI quirk

2015-04-08 Thread Christoffer Dall
Hi Pranav, On Mon, Apr 06, 2015 at 02:24:01PM +0530, Pranavkumar Sawargaonkar wrote: > In old X-Gene Storm firmware and DT, secure mode addresses have been > mentioned in GICv2 node. In this case maintenance interrupt is used > instead of EOI HW method. > > This patch checks the GIC Distributor B

[Xen-devel] tools/libxl - Async Task Cancellation Query

2015-04-08 Thread Koushik Chakravarty
Hi Ian, I am currently looking into the asynchronous task cancellation in libxl and have a few very specific queries, if you could answer. 1.In libxl_domain_resume(),why is libxl_ao_complete called before AO_INPROGRESS? 2.In libxl_ao_cancel() - the function goes through the ctx->aos_i

Re: [Xen-devel] [PATCH] hvmloader: fix building error

2015-04-08 Thread Andrew Cooper
On 08/04/15 08:33, Wen Congyang wrote: > On 04/08/2015 03:28 PM, Olaf Hering wrote: >> On Wed, Apr 08, Wen Congyang wrote: >> >>> On 04/08/2015 03:21 PM, Olaf Hering wrote: On Wed, Apr 08, Wen Congyang wrote: > commit b9245b75 introduces a building error: > make[1]: Entering direc

Re: [Xen-devel] [RFC v1 13/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-04-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Thursday, April 02, 2015 4:40 PM > > > -Original Message- > > From: Tian, Kevin > > Sent: Thursday, April 02, 2015 2:25 PM > > To: Wu, Feng; xen-devel@lists.xen.org > > Cc: jbeul...@suse.com; k...@xen.org; Zhang, Yang Z > > Subject: RE: [RFC v1 13/15] Update Posted

Re: [Xen-devel] [RFC PATCH 0/7] Intel Cache Monitoring: Current Status and Future Opportunities

2015-04-08 Thread Andrew Cooper
On 08/04/15 09:23, Dario Faggioli wrote: > On Wed, 2015-04-08 at 13:59 +0800, Chao Peng wrote: > >>> Mostly, I was curious to learn why that is not reflected in the current >>> implementation, i.e., whether there are any reasons why we should not >>> take advantage of per-socketness of RMIDs, as re

Re: [Xen-devel] [RFC PATCH 0/7] Intel Cache Monitoring: Current Status and Future Opportunities

2015-04-08 Thread Chao Peng
On Wed, Apr 08, 2015 at 08:23:11AM +, Dario Faggioli wrote: > On Wed, 2015-04-08 at 13:59 +0800, Chao Peng wrote: > > > > Mostly, I was curious to learn why that is not reflected in the current > > > implementation, i.e., whether there are any reasons why we should not > > > take advantage of

Re: [Xen-devel] [RFC v1 11/15] vmx: Add a global wake-up vector for VT-d Posted-Interrupts

2015-04-08 Thread Tian, Kevin
> From: Wu, Feng > Sent: Thursday, April 02, 2015 3:18 PM > > > -Original Message- > > From: Tian, Kevin > > Sent: Thursday, April 02, 2015 2:01 PM > > To: Wu, Feng; xen-devel@lists.xen.org > > Cc: jbeul...@suse.com; k...@xen.org; Zhang, Yang Z > > Subject: RE: [RFC v1 11/15] vmx: Add a gl

Re: [Xen-devel] Performance evaluation and Questions: Eliminating Xen (RTDS) scheduler overhead on dedicated CPU

2015-04-08 Thread George Dunlap
On 04/07/2015 09:25 PM, Meng Xu wrote: > Hi George, Dario and Konrad, > > I finished a prototype of the RTDS scheduler with the dedicated CPU > feature and did some quick evaluation on this feature. Right now, I > need to refactor the code (because it is kind of messy when I was > exploring differ

Re: [Xen-devel] [PATCH] x86/hvm: Fix the unknown nested vmexit reason 80000021 bug

2015-04-08 Thread George Dunlap
On Tue, Apr 7, 2015 at 5:11 PM, Andrew Cooper wrote: > On 07/04/15 14:27, Liang Li wrote: >> This bug will be trigged when NMI happen in the L2 guest. The current >> code handles the NMI incorrectly. According to Intel SDM 31.7.1.2 >> (Resuming Guest Software after Handling an Exception), If bit 3

Re: [Xen-devel] Issue With Patch Compilation Fails ( xen/arm: Introduce a generic way to describe device) with HAS_PCI and HAS_PASSTHROUGH.

2015-04-08 Thread Stefano Stabellini
On Wed, 8 Apr 2015, Manish Jaggi wrote: > On Wednesday 08 April 2015 11:05 AM, Manish Jaggi wrote: > > > > On Tuesday 07 April 2015 10:13 PM, Stefano Stabellini wrote: > > > On Tue, 7 Apr 2015, Jaggi, Manish wrote: > > > > Hi Julien, > > > > > > > > > > > > Following patch generated compiler err

[Xen-devel] [PATCH v2] increase size of irq from uint8_t to uint32_t

2015-04-08 Thread Iurii Konovalenko
From: Iurii Konovalenko Changes in v2: - Commit message edited - Signed-off is set Iurii Konovalenko (1): arm: irq: increase size of irq from uint8_t to uint32_t tools/libxc/include/xenctrl.h | 10 +- tools/libxc/xc_domain.c | 10 +- xen/include/public/domctl.h

[Xen-devel] [PATCH v2] arm: irq: increase size of irq from uint8_t to uint32_t

2015-04-08 Thread Iurii Konovalenko
From: Iurii Konovalenko Changes are dedicated to XEN_DOMCTL_irq_permission and IRQ pssthrough API functions. Signed-off-by: Iurii Konovalenko --- tools/libxc/include/xenctrl.h | 10 +- tools/libxc/xc_domain.c | 10 +- xen/include/public/domctl.h | 2 +- 3 files changed

Re: [Xen-devel] Issue With Patch Compilation Fails ( xen/arm: Introduce a generic way to describe device) with HAS_PCI and HAS_PASSTHROUGH.

2015-04-08 Thread Manish Jaggi
On Wednesday 08 April 2015 02:53 PM, Stefano Stabellini wrote: On Wed, 8 Apr 2015, Manish Jaggi wrote: On Wednesday 08 April 2015 11:05 AM, Manish Jaggi wrote: On Tuesday 07 April 2015 10:13 PM, Stefano Stabellini wrote: On Tue, 7 Apr 2015, Jaggi, Manish wrote: Hi Julien, Following patch g

Re: [Xen-devel] Issue With Patch Compilation Fails ( xen/arm: Introduce a generic way to describe device) with HAS_PCI and HAS_PASSTHROUGH.

2015-04-08 Thread Julien Grall
On 08/04/2015 10:31, Manish Jaggi wrote: There are lot of issues with pci_to_dev approach a) iommu_ops callbacks have a pci_dev parameter in x86 but have a device parameter in arm (smmu.c) b) hack is done to make device as pci_dev and that is not a good way of doing. I prefer having minimal/so

Re: [Xen-devel] [PATCH] hvmloader: fix building error

2015-04-08 Thread Wen Congyang
On 04/08/2015 04:46 PM, Andrew Cooper wrote: > On 08/04/15 08:33, Wen Congyang wrote: >> On 04/08/2015 03:28 PM, Olaf Hering wrote: >>> On Wed, Apr 08, Wen Congyang wrote: >>> On 04/08/2015 03:21 PM, Olaf Hering wrote: > On Wed, Apr 08, Wen Congyang wrote: > >> commit b9245b75 intr

Re: [Xen-devel] [PATCH 5/6] x86/smp: Allocate pcpu stacks on their local numa node

2015-04-08 Thread Dario Faggioli
On Tue, 2015-04-07 at 18:26 +0100, Andrew Cooper wrote: > Previously, all pcpu stacks tended to be allocated on node 0. > > Signed-off-by: Andrew Cooper > CC: Keir Fraser > CC: Jan Beulich > Again, FWIW: Reviewed-by: Dario Faggioli Out of curiosity... > xen/arch/x86/smpboot.c |2 +- >

Re: [Xen-devel] How to set "full update mode" in QEMU (in regards to display output)

2015-04-08 Thread Wei Liu
CC Anthony who once told me a trick to do that. On Tue, Apr 07, 2015 at 10:44:18PM -0400, mailing lists wrote: > Following the guide for nested virtualization here: > > http://wiki.xenproject.org/wiki/Nested_Virtualization_in_Xen > > It states that one option for display issues is to force "full

Re: [Xen-devel] [PATCH 3/6] x86/smp: Clean up use of memflags in cpu_smpboot_alloc()

2015-04-08 Thread Dario Faggioli
On Tue, 2015-04-07 at 18:26 +0100, Andrew Cooper wrote: > Hoist MEMF_node(cpu_to_node(cpu)) to the start of the function, and avoid > passing (potentially bogus) memflags if node information is not available. > > Signed-off-by: Andrew Cooper > CC: Keir Fraser > CC: Jan Beulich > FWIW, Reviewed

Re: [Xen-devel] [PATCH 2/6] x86/numa: Correct the extern of cpu_to_node

2015-04-08 Thread Dario Faggioli
On Tue, 2015-04-07 at 18:26 +0100, Andrew Cooper wrote: > This was missed by c/s 54ce2db "x86/numa: adjust datatypes for node and pxm" > which changed the array definition in numa.c > > Signed-off-by: Andrew Cooper > CC: Keir Fraser > CC: Jan Beulich > CC: Boris Ostrovsky > Reviewed-by: Dario

Re: [Xen-devel] [PATCH 2/3] blkif: enable multi-page ring supporting

2015-04-08 Thread David Vrabel
On 03/04/15 07:45, Bob Liu wrote: > Remove the 'DEPRECATED' and next patch will follow the protocol defined here > to > support multi-page ring. Why are you un-deprecating this instead of using max-ring-page-order? Are you allowing for non power of two counts? If so, the documentation needs to be

Re: [Xen-devel] [PATCH] hvmloader: fix building error

2015-04-08 Thread Ian Jackson
Wen Congyang writes ("[Xen-devel] [PATCH] hvmloader: fix building error"): > commit b9245b75 introduces a building error: ... > smbios.c:384:46: error: invalid digit "8" in octal constant > smbios.c:792:46: error: invalid digit "8" in octal constant > make[1]: *** [smbios.o] Error 1 Thanks for thi

Re: [Xen-devel] [PATCH] hvmloader: fix building error

2015-04-08 Thread Andrew Cooper
On 08/04/15 11:46, Ian Jackson wrote: > Wen Congyang writes ("[Xen-devel] [PATCH] hvmloader: fix building error"): >> commit b9245b75 introduces a building error: > ... >> smbios.c:384:46: error: invalid digit "8" in octal constant >> smbios.c:792:46: error: invalid digit "8" in octal constant >> m

Re: [Xen-devel] [RFC v1 13/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-04-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, April 08, 2015 4:54 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: jbeul...@suse.com; k...@xen.org; Zhang, Yang Z > Subject: RE: [RFC v1 13/15] Update Posted-Interrupts Descriptor during vCPU > scheduling > > > From: Wu, Feng

Re: [Xen-devel] [PATCH 2/2] libxl: Cope with pipes which signal POLLHUP|POLLIN on read eof

2015-04-08 Thread Wei Liu
On Tue, Apr 07, 2015 at 02:05:28PM +0100, Ian Jackson wrote: > Some operating systems (including Linux and FreeBSD[1]) signal not > (only) POLLIN when a reading pipe reaches EOF, but POLLHUP (with or > without POLLIN). This is permitted[2]. The implications are that in > the general case it is no

Re: [Xen-devel] [RFC v1 11/15] vmx: Add a global wake-up vector for VT-d Posted-Interrupts

2015-04-08 Thread Wu, Feng
> -Original Message- > From: Tian, Kevin > Sent: Wednesday, April 08, 2015 5:02 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: jbeul...@suse.com; k...@xen.org; Zhang, Yang Z > Subject: RE: [RFC v1 11/15] vmx: Add a global wake-up vector for VT-d > Posted-Interrupts > > > From: Wu, Feng

Re: [Xen-devel] [RFC PATCH 0/7] Intel Cache Monitoring: Current Status and Future Opportunities

2015-04-08 Thread George Dunlap
On 04/07/2015 11:27 AM, Andrew Cooper wrote: > On 04/04/2015 03:14, Dario Faggioli wrote: >> Hi Everyone, >> >> This RFC series is the outcome of an investigation I've been doing about >> whether we can take better advantage of features like Intel CMT (and of PSR >> features in general). By "take b

Re: [Xen-devel] [RFC PATCH 0/7] Intel Cache Monitoring: Current Status and Future Opportunities

2015-04-08 Thread George Dunlap
On 04/04/2015 03:14 AM, Dario Faggioli wrote: > ### Per-vCPU cache monitoring > > This means being able to tell how much of the L3 is being used by each vCPU. > Monitoring the cache occupancy of a specific domain, would still be possible, > just by summing up the contributions from all the domain'

Re: [Xen-devel] [PATCH v2] arm: irq: increase size of irq from uint8_t to uint32_t

2015-04-08 Thread Julien Grall
Hi Iurii, On 08/04/15 10:29, Iurii Konovalenko wrote: > From: Iurii Konovalenko > > Changes are dedicated to XEN_DOMCTL_irq_permission and > IRQ pssthrough API functions. s/pssthrough/passthrough It's worth noticing that PHYSDEV_* operations already using 32 bits type but signed one. Many plac

Re: [Xen-devel] [PATCH V2] xen/arm64: Use virtual address when setting up early_printk fixmap

2015-04-08 Thread Julien Grall
Hi Chen, On 07/04/15 12:24, Chen Baozi wrote: > We have already had the boot pagetable when reaching the point s/had/added/ ? > of early_printk fixmap setup. Thus there is no longer necessary s/there is/it is/ ? > to calculate physical address of xen_fixmap. > > Signed-off-by: Chen Baozi Ot

Re: [Xen-devel] tools/libxl - Async Task Cancellation Query

2015-04-08 Thread Ian Jackson
Koushik Chakravarty writes ("tools/libxl - Async Task Cancellation Query"): > I am currently looking into the asynchronous task cancellation in libxl and > have a few very specific queries, if you could answer. Sure. Thanks for what has evidently been a careful review of the code. > 1.In li

[Xen-devel] [PATCH 29/28] libxl: ao internal API docs: Mention synchronous ao completion

2015-04-08 Thread Ian Jackson
This doc comment about ao lifecycle failed to mention the option of completing the ao during the initiator function. (Indeed, the most obvious reading would forbid it.) Restructure the comment, describe this situation, and generally improve the wording. Also, fix a grammar problem (missing word

[Xen-devel] [PATCH RFC UNTESTED 30/28] squash! libxl: cancellation: Provide public ao cancellation API

2015-04-08 Thread Ian Jackson
[ In v4 of the series I will combine this fixup with the named patch using git-rebase -i --autosquash -iwj. ] v4: Actually record aos on aos_inprogress. (Report from Koushik Chakravarty at Citrix.) Signed-off-by: Ian Jackson --- tools/libxl/libxl_event.c |5 - 1 file changed, 4 in

Re: [Xen-devel] How to set "full update mode" in QEMU (in regards to display output)

2015-04-08 Thread Anthony PERARD
On Wed, Apr 08, 2015 at 11:10:00AM +0100, Wei Liu wrote: > CC Anthony who once told me a trick to do that. > > On Tue, Apr 07, 2015 at 10:44:18PM -0400, mailing lists wrote: > > Following the guide for nested virtualization here: > > > > http://wiki.xenproject.org/wiki/Nested_Virtualization_in_Xe

Re: [Xen-devel] [PATCH v15 12/15] pvqspinlock, x86: Enable PV qspinlock for Xen

2015-04-08 Thread David Vrabel
On 07/04/15 03:55, Waiman Long wrote: > This patch adds the necessary Xen specific code to allow Xen to > support the CPU halting and kicking operations needed by the queue > spinlock PV code. This basically looks the same as the version I wrote, except I think you broke it. > +static void xen_ql

Re: [Xen-devel] tools/libxl - Async Task Cancellation Query

2015-04-08 Thread Koushik Chakravarty
Thanks Ian for the answers. I have a follow - up on the below: "Can I suggest adding a unique private 'id' field to the libxl_asyncop_how structure, that will be populated by AO_CREATE? This will help finding the matching corresponding libxl_ao from the ctx->aos_inprogress in libxl_ao_cancel()

Re: [Xen-devel] [PATCH] xen/arm64: Avoid sending SGI when kicking secondary cpus with spin_table

2015-04-08 Thread Julien Grall
Hi Chen, Subject: I think you can drop the "_" in spin_table. On 07/04/15 08:33, Chen Baozi wrote: > From: Chen Baozi > > On arm64, either firmware or xen's smp_up_cpu gate uses WFE on secondary > cpus to stand-by when booting. Thus, using SEV is enough for the boot > cpu to kick other secondar

Re: [Xen-devel] [PATCH v2] arm: irq: increase size of irq from uint8_t to uint32_t

2015-04-08 Thread Iurii Konovalenko
Hi, Julien! Do you mean I need to add your comment to commit message? Best regards. Iurii Konovalenko | Senior Software Engineer GlobalLogic On Wed, Apr 8, 2015 at 2:26 PM, Julien Grall wrote: > > Hi Iurii, > > On 08/04/15 10:29, Iurii Konovalenko wrote: > > From: Iurii Konovalenko > > > > Ch

Re: [Xen-devel] [PATCH v2] arm: irq: increase size of irq from uint8_t to uint32_t

2015-04-08 Thread Julien Grall
On 08/04/15 13:29, Iurii Konovalenko wrote: > Do you mean I need to add your comment to commit message? Yes please. It will keep track of why you only changes xc_domctl_*irq* Cheers, -- Julien Grall ___ Xen-devel mailing list Xen-devel@lists.xen.org

[Xen-devel] [PATCH v1 0/2] relocate Xen in over 4GB space for arm32

2015-04-08 Thread Iurii Konovalenko
From: Iurii Konovalenko The following patch series adds ability to relocate Xen in over 4GB space for 32-bit arm cores with LPAE. Iurii Konovalenko (2): arm: Add ability to relocate Xen in over 4GB space arm: skip verifying memory continuity xen/Rules.mk | 1 + xen/arch

[Xen-devel] [PATCH v1 2/2] arm: skip verifying memory continuity

2015-04-08 Thread Iurii Konovalenko
From: Iurii Konovalenko Odd check. Signed-off-by: Iurii Konovalenko Signed-off-by: Andrii Anisov --- xen/arch/arm/setup.c | 4 1 file changed, 4 deletions(-) diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c index 66e2834..a7fcbb6 100644 --- a/xen/arch/arm/setup.c +++ b/xen/arch/

[Xen-devel] [PATCH v1 1/2] arm: Add ability to relocate Xen in over 4GB space

2015-04-08 Thread Iurii Konovalenko
From: Iurii Konovalenko Primary CPU relocate Xen in over 4GB space and wake up seondary CPUs. Secondary CPUs run on unrelocated copy of Xen until turning on MMU. After turning on MMU secondary CPUs run on relocated copy of Xen. To add ability to relocate Xen in over 4GB space add following to co

[Xen-devel] [xen-unstable test] 50363: regressions - trouble: blocked/broken/fail/pass

2015-04-08 Thread osstest service user
flight 50363 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/50363/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 capture-logs !broken [st=!broken!] build-i386-xsm

[Xen-devel] [PATCH RFC] xen/pvh: use a custom IO bitmap for PVH hardware domains

2015-04-08 Thread Roger Pau Monne
Since a PVH hardware domain has access to the physical hardware create a custom more permissive IO bitmap. The permissions set on the bitmap are populated based on the contents of the ioports rangeset. Also add the IO ports of the serial console used by Xen to the list of not accessible IO ports.

Re: [Xen-devel] [RFC PATCH 0/7] Intel Cache Monitoring: Current Status and Future Opportunities

2015-04-08 Thread Dario Faggioli
On Wed, 2015-04-08 at 12:30 +0100, George Dunlap wrote: > On 04/04/2015 03:14 AM, Dario Faggioli wrote: > > ### Per-vCPU cache monitoring > > > > This means being able to tell how much of the L3 is being used by each vCPU. > > Monitoring the cache occupancy of a specific domain, would still be >

Re: [Xen-devel] [PATCH V14 2/7] xen/arm: Implement domain_get_maximum_gpfn

2015-04-08 Thread Julien Grall
Hi Tamas, On 26/03/15 22:05, Tamas K Lengyel wrote: > From: Julien Grall > > The function domain_get_maximum_gpfn is returning the maximum gpfn ever > mapped in the guest. We can use d->arch.p2m.max_mapped_gfn for this purpose. > > We use this in xenaccess as to avoid the user attempting to set

Re: [Xen-devel] [PATCH v6 1/3] xenbus_client: Extend interface to support multi-page ring

2015-04-08 Thread David Vrabel
On 03/04/15 07:44, Bob Liu wrote: > From: Wei Liu > > Originally Xen PV drivers only use single-page ring to pass along > information. This might limit the throughput between frontend and > backend. > > The patch extends Xenbus driver to support multi-page ring, which in > general should improve

Re: [Xen-devel] [RFC PATCH 3/7] xen: psr: reserve an RMID for each core

2015-04-08 Thread George Dunlap
On 04/04/2015 03:14 AM, Dario Faggioli wrote: > This allows for a new item to be passed as part of the psr= > boot option: "percpu_cmt". If that is specified, Xen tries, > at boot time, to associate an RMID to each core. > > XXX This all looks rather straightforward, if it weren't > for the fa

Re: [Xen-devel] [RFC PATCH 0/7] Intel Cache Monitoring: Current Status and Future Opportunities

2015-04-08 Thread Dario Faggioli
On Wed, 2015-04-08 at 12:27 +0100, George Dunlap wrote: > On 04/07/2015 11:27 AM, Andrew Cooper wrote: > > There seem to be several areas of confusion indicated in your document. > > I am unsure whether this is a side effect of the way you have written > > it, but here are (hopefully) some words

Re: [Xen-devel] [PATCH V14 2/7] xen/arm: Implement domain_get_maximum_gpfn

2015-04-08 Thread Tamas K Lengyel
The patch that will use xc_domain_maximum_gpfn is not included right now in this series as my other series significantly cleans up the existing xen-access test code. Before that's merged, there is no point in carrying that patch here as it will be in conflict anyway. I'm intending to send that once

[Xen-devel] [PATCH] xen/pci: Try harder to get PXM information for Xen

2015-04-08 Thread Ross Lagerwall
If the device being added to Xen is not contained in the ACPI table, walk the PCI device tree to find a parent that is contained in the ACPI table before finding the PXM information from this device. Signed-off-by: Ross Lagerwall --- drivers/xen/pci.c | 15 +-- 1 file changed, 13 ins

Re: [Xen-devel] [PATCH V14 2/7] xen/arm: Implement domain_get_maximum_gpfn

2015-04-08 Thread Julien Grall
On 08/04/15 14:38, Tamas K Lengyel wrote: > The patch that will use xc_domain_maximum_gpfn is not included right now > in this series as my other series significantly cleans up the existing > xen-access test code. Before that's merged, there is no point in > carrying that patch here as it will be i

Re: [Xen-devel] [PATCH V14 2/7] xen/arm: Implement domain_get_maximum_gpfn

2015-04-08 Thread Tamas K Lengyel
On Wed, Apr 8, 2015 at 3:42 PM, Julien Grall wrote: > On 08/04/15 14:38, Tamas K Lengyel wrote: > > The patch that will use xc_domain_maximum_gpfn is not included right now > > in this series as my other series significantly cleans up the existing > > xen-access test code. Before that's merged, t

Re: [Xen-devel] [PATCH V14 2/7] xen/arm: Implement domain_get_maximum_gpfn

2015-04-08 Thread Julien Grall
On 08/04/15 14:47, Tamas K Lengyel wrote: > I think updating libxc to not truncate the value would be the preferred > way to go forward (changing return type to uint64_t). I already added > those changes to this patch and it's only a handful of instances. It won't work if the toolstack is running

Re: [Xen-devel] tg3 NIC driver bug in 3.14.x under Xen [and 3 more messages]

2015-04-08 Thread Ian Jackson
Thanks to Konrad, Michael and Prashant for your attention. Prashant Sreedharan writes ("Re: tg3 NIC driver bug in 3.14.x under Xen"): > Ian, in your previous mail you indicated there are no drops or errors > reported on eth0 (assuming this is the tg3 port), which is added to the > bridge xenbr0 i

Re: [Xen-devel] [RFC PATCH 3/7] xen: psr: reserve an RMID for each core

2015-04-08 Thread Dario Faggioli
On Wed, 2015-04-08 at 14:28 +0100, George Dunlap wrote: > On 04/04/2015 03:14 AM, Dario Faggioli wrote: > > This allows for a new item to be passed as part of the psr= > > boot option: "percpu_cmt". If that is specified, Xen tries, > > at boot time, to associate an RMID to each core. > > > > XXX T

Re: [Xen-devel] [PATCH] xen/pci: Try harder to get PXM information for Xen

2015-04-08 Thread Boris Ostrovsky
On 04/08/2015 09:39 AM, Ross Lagerwall wrote: If the device being added to Xen is not contained in the ACPI table, walk the PCI device tree to find a parent that is contained in the ACPI table before finding the PXM information from this device. Signed-off-by: Ross Lagerwall --- drivers/xen/p

Re: [Xen-devel] sudden hang on boot on AMD Notebook

2015-04-08 Thread Konrad Rzeszutek Wilk
On Wed, Apr 08, 2015 at 09:09:23AM +0200, Olaf Hering wrote: > On Tue, Apr 07, Konrad Rzeszutek Wilk wrote: > > > You might also want to use 'sync_console'. > > This does not give any extra info in the case of the reported hang. No, but are you able to at least dump the status of the registers?

[Xen-devel] [PATCH v3] arm: irq: increase size of irq from uint8_t to uint32_t

2015-04-08 Thread Iurii Konovalenko
From: Iurii Konovalenko Changes are dedicated to XEN_DOMCTL_irq_permission and IRQ pssthrough API functions. PHYSDEV_* operations already using 32 bits type but signed one. Although, PHYSDEV_* operations are not yet used on ARM and LPIs support (which are using very high number) are not support

[Xen-devel] [PATCH v3] increase size of irq from uint8_t to uint32_t

2015-04-08 Thread Iurii Konovalenko
From: Iurii Konovalenko Changes in v3: - Julien Grall's comment added to commit message Changes in v2: - Commit message edited - Signed-off is set Iurii Konovalenko (1): arm: irq: increase size of irq from uint8_t to uint32_t tools/libxc/include/xenctrl.h | 10 +- tools/

Re: [Xen-devel] [PATCH 2/3] blkif: enable multi-page ring supporting

2015-04-08 Thread Konrad Rzeszutek Wilk
On Wed, Apr 08, 2015 at 11:46:44AM +0100, David Vrabel wrote: > On 03/04/15 07:45, Bob Liu wrote: > > Remove the 'DEPRECATED' and next patch will follow the protocol defined > > here to > > support multi-page ring. > > Why are you un-deprecating this instead of using max-ring-page-order? > Are yo

Re: [Xen-devel] [PATCH 2/3] blkif: enable multi-page ring supporting

2015-04-08 Thread David Vrabel
On 08/04/15 15:21, Konrad Rzeszutek Wilk wrote: > On Wed, Apr 08, 2015 at 11:46:44AM +0100, David Vrabel wrote: >> On 03/04/15 07:45, Bob Liu wrote: >>> Remove the 'DEPRECATED' and next patch will follow the protocol defined >>> here to >>> support multi-page ring. >> >> Why are you un-deprecating

Re: [Xen-devel] [PATCH V14 3/7] xen/arm: Allow hypervisor access to mem_access protected pages

2015-04-08 Thread Julien Grall
Hi Tamas, One minor question. On 26/03/15 22:05, Tamas K Lengyel wrote: > +/* > + * We had a mem_access permission limiting the access, but the page type > + * could also be limiting, so we need to check that as well. > + */ > +maddr = p2m_lookup(current->domain, ipa, &t); > +

Re: [Xen-devel] [PATCH V3 0/3] libxl: domain destroy fixes

2015-04-08 Thread Konrad Rzeszutek Wilk
On Fri, Apr 03, 2015 at 04:49:01PM -0600, Jim Fehlig wrote: > V3 of a small series to fix issues wrt domain destroy > > V1: > https://www.redhat.com/archives/libvir-list/2015-March/msg01337.html > > V2: > https://www.redhat.com/archives/libvir-list/2015-April/msg00072.html > > In this version, p

[Xen-devel] libvirtd live-locking on CTX_LOCK when doing 'virsh save /tmp/blah' with guest corrupting memory (on purpose).

2015-04-08 Thread Konrad Rzeszutek Wilk
Hey Jim, Andrew, and Ian, This is libvirt v1.2.14 + three patches: c82a59b libxl: drop virDomainObj lock when destroying a domain a1c9d30 libxl: acquire a job when destroying a domain 5bd5406 libxl: Move job acquisition in libxlDomainStart to callers For fun I've set up an guest with PCI passthro

[Xen-devel] [PATCH] libxl: Disallow save or migrate when host devices are assigned to a guest.

2015-04-08 Thread Konrad Rzeszutek Wilk
It is unhealthy. If the device is not doing any DMA operations it would work - but if you are saving and there are DMA operations happening the chance of corruption (outstanding DMAs) increase. As such re-use the check migration used. Signed-off-by: Konrad Rzeszutek Wilk --- src/libxl/libxl_dom

[Xen-devel] [PATCH] libxl: check return value of libxl_vcpu_setaffinity

2015-04-08 Thread Wei Liu
That function can fail. Signed-off-by: Wei Liu Cc: Ian Campbell Cc: Ian Jackson Cc: Dario Faggioli --- tools/libxl/libxl_dom.c | 8 ++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c index a88db69..bc2e596 100644 --- a/tool

[Xen-devel] [PATCH 1/4] libxenstat: check xc_interface_open return value

2015-04-08 Thread Wei Liu
Signed-off-by: Wei Liu Cc: Ian Campbell Cc: Ian Jackson Cc: Charles Arnold --- tools/xenstat/libxenstat/src/xenstat_qmp.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/tools/xenstat/libxenstat/src/xenstat_qmp.c b/tools/xenstat/libxenstat/src/xenstat_qmp.c index 2cb99e9..f3aeec4 100644

[Xen-devel] [PATCH 4/4] libxenstat: qmp_read fix and cleanup

2015-04-08 Thread Wei Liu
The second argument of poll(2) is the number of file descriptors. POLLIN is defined as 1 so it happens to work. Also do two cleanups while I was there: 1. There is only one fd, so a one-element array is enough. 2. Initialise pfd to make code linter happy. Signed-off-by: Wei Liu Cc: Ian Campbell

[Xen-devel] [PATCH 2/4] libxenstat: YAJL_GET_STRING may return NULL

2015-04-08 Thread Wei Liu
Passing NULL to strcmp can cause segmentation fault. Continue in that case. Signed-off-by: Wei Liu Cc: Ian Campbell Cc: Ian Jackson Cc: Charles Arnold --- tools/xenstat/libxenstat/src/xenstat_qmp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/xenstat/libxenstat/sr

[Xen-devel] [PATCH 3/4] libxenstat: always free qmp_stats

2015-04-08 Thread Wei Liu
Originally qmp_stats is only freed in failure path and leaked in success path. Instead of wiring up the success path, rearrange the code a bit to always free qmp_stats before checking if info is NULL. Signed-off-by: Wei Liu Cc: Ian Campbell Cc: Ian Jackson Cc: Charles Arnold --- tools/xensta

[Xen-devel] [PATCH 0/4] libxenstat bug fixes and cleanups

2015-04-08 Thread Wei Liu
Wei Liu (4): libxenstat: check xc_interface_open return value libxenstat: YAJL_GET_STRING may return NULL libxenstat: always free qmp_stats libxenstat: qmp_read fix and cleanup tools/xenstat/libxenstat/src/xenstat_qmp.c | 18 -- 1 file changed, 12 insertions(+), 6 deletion

Re: [Xen-devel] [PATCH 29/28] libxl: ao internal API docs: Mention synchronous ao completion

2015-04-08 Thread Wei Liu
On Wed, Apr 08, 2015 at 12:37:58PM +0100, Ian Jackson wrote: > This doc comment about ao lifecycle failed to mention the option of > completing the ao during the initiator function. (Indeed, the most > obvious reading would forbid it.) > > Restructure the comment, describe this situation, and gen

Re: [Xen-devel] [PATCH 2/4] libxenstat: YAJL_GET_STRING may return NULL

2015-04-08 Thread Andrew Cooper
On 08/04/15 16:01, Wei Liu wrote: > Passing NULL to strcmp can cause segmentation fault. Continue in that > case. > > Signed-off-by: Wei Liu > Cc: Ian Campbell > Cc: Ian Jackson > Cc: Charles Arnold Reviewed-by: Andrew Cooper > --- > tools/xenstat/libxenstat/src/xenstat_qmp.c | 2 +- > 1 fi

Re: [Xen-devel] [PATCH 1/4] libxenstat: check xc_interface_open return value

2015-04-08 Thread Andrew Cooper
On 08/04/15 16:01, Wei Liu wrote: > Signed-off-by: Wei Liu > Cc: Ian Campbell > Cc: Ian Jackson > Cc: Charles Arnold The xenstat handle passed around already has an open xc_handle. That should be reused rather than opening a new one every time we want to get a list of domain ids. ~Andrew >

Re: [Xen-devel] Nested Virt - Xen 4.4 through 4.6 - Hyper-V; Can't boot after enabling Hyper-V

2015-04-08 Thread Li, Liang Z
> On Tue, Apr 7, 2015 at 2:42 AM, mailing lists wrote: > > Hi -- > > > > I've been trying to get nested virtualization working with Xen so that > > I could boot Windows and use Hyper-V related features, however I have > > not had much success. Using Windows 8.1 or Windows 2012r2, I'm able > > to

Re: [Xen-devel] [PATCH 4/4] libxenstat: qmp_read fix and cleanup

2015-04-08 Thread Andrew Cooper
On 08/04/15 16:01, Wei Liu wrote: > The second argument of poll(2) is the number of file descriptors. POLLIN > is defined as 1 so it happens to work. > > Also do two cleanups while I was there: > 1. There is only one fd, so a one-element array is enough. > 2. Initialise pfd to make code linter happ

Re: [Xen-devel] [PATCH V14 4/7] xen/arm: Data abort exception (R/W) mem_access events

2015-04-08 Thread Julien Grall
Hi Tamas, The code looks good. See few typoes and coding style issue below. On 26/03/15 22:05, Tamas K Lengyel wrote: > +static int p2m_mem_access_radix_set(struct p2m_domain *p2m, unsigned long > pfn, > +p2m_access_t a) > +{ > +int rc; > + > +if ( !p2

Re: [Xen-devel] libvirtd live-locking on CTX_LOCK when doing 'virsh save /tmp/blah' with guest corrupting memory (on purpose).

2015-04-08 Thread Andrew Cooper
On 08/04/15 15:47, Konrad Rzeszutek Wilk wrote: > Hey Jim, Andrew, and Ian, > > This is libvirt v1.2.14 + three patches: > c82a59b libxl: drop virDomainObj lock when destroying a domain > a1c9d30 libxl: acquire a job when destroying a domain > 5bd5406 libxl: Move job acquisition in libxlDomainStart

Re: [Xen-devel] [PATCH v8 00/15] Migration v2 (libxc)

2015-04-08 Thread Roger Pau Monné
El 02/04/15 a les 20.32, Andrew Cooper ha escrit: > Presented here is v8 of the Migration v2 series (libxc subset), which is able > to function when transparently inserted under an unmodified xl/libxl. > > There are numerous tweaks in v8 (fix build with MiniOS, tweak some code to > appease Coverit

Re: [Xen-devel] [PATCH V14 4/7] xen/arm: Data abort exception (R/W) mem_access events

2015-04-08 Thread Tamas K Lengyel
On Wed, Apr 8, 2015 at 5:26 PM, Julien Grall wrote: > Hi Tamas, > > The code looks good. See few typoes and coding style issue below. > > On 26/03/15 22:05, Tamas K Lengyel wrote: > > +static int p2m_mem_access_radix_set(struct p2m_domain *p2m, unsigned > long pfn, > > +

Re: [Xen-devel] [PATCH 4/4] libxenstat: qmp_read fix and cleanup

2015-04-08 Thread Wei Liu
On Wed, Apr 08, 2015 at 04:25:06PM +0100, Andrew Cooper wrote: > On 08/04/15 16:01, Wei Liu wrote: > > The second argument of poll(2) is the number of file descriptors. POLLIN > > is defined as 1 so it happens to work. > > > > Also do two cleanups while I was there: > > 1. There is only one fd, so

Re: [Xen-devel] [PATCH 1/4] libxenstat: check xc_interface_open return value

2015-04-08 Thread Wei Liu
On Wed, Apr 08, 2015 at 04:21:56PM +0100, Andrew Cooper wrote: > On 08/04/15 16:01, Wei Liu wrote: > > Signed-off-by: Wei Liu > > Cc: Ian Campbell > > Cc: Ian Jackson > > Cc: Charles Arnold > > The xenstat handle passed around already has an open xc_handle. That > should be reused rather than

Re: [Xen-devel] [PATCH 3/4] libxenstat: always free qmp_stats

2015-04-08 Thread Ian Jackson
Wei Liu writes ("[PATCH 3/4] libxenstat: always free qmp_stats"): > Originally qmp_stats is only freed in failure path and leaked in success > path. > > Instead of wiring up the success path, rearrange the code a bit to > always free qmp_stats before checking if info is NULL. Acked-by: Ian Jackso

Re: [Xen-devel] [PATCH 4/4] libxenstat: qmp_read fix and cleanup

2015-04-08 Thread Ian Jackson
Andrew Cooper writes ("Re: [PATCH 4/4] libxenstat: qmp_read fix and cleanup"): > On 08/04/15 16:01, Wei Liu wrote: > > The second argument of poll(2) is the number of file descriptors. POLLIN > > is defined as 1 so it happens to work. ... > > @@ -311,6 +312,9 @@ static int qmp_read(int qfd, unsigne

[Xen-devel] Zir Blazer's guide to install Arch Linux and Xen - need feedback

2015-04-08 Thread Zir Blazer
A year or so ago I had done a near identical guide in spanish, to make installing Xen more accessible to hispanic people. However, I figured out that pretty much everyone which was interesed in it, didn't had the proper Hardware to try Passthrough, and anyone who does, should have no issues unde

Re: [Xen-devel] [PATCH 2/4] libxenstat: YAJL_GET_STRING may return NULL

2015-04-08 Thread Ian Jackson
Wei Liu writes ("[PATCH 2/4] libxenstat: YAJL_GET_STRING may return NULL"): > Passing NULL to strcmp can cause segmentation fault. Continue in that > case. > > Signed-off-by: Wei Liu > Cc: Ian Campbell > Cc: Ian Jackson > Cc: Charles Arnold Acked-by: Ian Jackson

Re: [Xen-devel] [PATCH] libxl: check return value of libxl_vcpu_setaffinity

2015-04-08 Thread Ian Jackson
Wei Liu writes ("[PATCH] libxl: check return value of libxl_vcpu_setaffinity"): > That function can fail. ... > } > > -libxl_for_each_set_bit(j, v->vcpus) > -libxl_set_vcpuaffinity(CTX, domid, j, NULL, &cpumap); > +libxl_for_each_set_bit(j, v->vcpus) { > +

Re: [Xen-devel] [PATCH 3/4] libxenstat: always free qmp_stats

2015-04-08 Thread Wei Liu
On Wed, Apr 08, 2015 at 04:49:58PM +0100, Ian Jackson wrote: > Wei Liu writes ("[PATCH 3/4] libxenstat: always free qmp_stats"): > > Originally qmp_stats is only freed in failure path and leaked in success > > path. > > > > Instead of wiring up the success path, rearrange the code a bit to > > alw

Re: [Xen-devel] [PATCH V14 3/7] xen/arm: Allow hypervisor access to mem_access protected pages

2015-04-08 Thread Tamas K Lengyel
On Wed, Apr 8, 2015 at 4:33 PM, Julien Grall wrote: > Hi Tamas, > > One minor question. > > On 26/03/15 22:05, Tamas K Lengyel wrote: > > +/* > > + * We had a mem_access permission limiting the access, but the page > type > > + * could also be limiting, so we need to check that as wel

Re: [Xen-devel] [PATCH] libxl: check return value of libxl_vcpu_setaffinity

2015-04-08 Thread Wei Liu
On Wed, Apr 08, 2015 at 04:55:26PM +0100, Ian Jackson wrote: > Wei Liu writes ("[PATCH] libxl: check return value of > libxl_vcpu_setaffinity"): > > That function can fail. > ... > > } > > > > -libxl_for_each_set_bit(j, v->vcpus) > > -libxl_set_vcpuaffinity(CTX, domi

Re: [Xen-devel] [PATCH v1 1/2] arm: Add ability to relocate Xen in over 4GB space

2015-04-08 Thread Julien Grall
Hi Iurii, OOI, can you give more context why you need to relocate Xen over 4GB? On 08/04/15 13:36, Iurii Konovalenko wrote: > From: Iurii Konovalenko > > Primary CPU relocate Xen in over 4GB space and wake up seondary CPUs. Typoes: s/relocate/relocates s/seondary/secondary > Secondary CPUs r

[Xen-devel] [PATCH v2] libxl: check return value of libxl_vcpu_setaffinity

2015-04-08 Thread Wei Liu
That function can fail. Signed-off-by: Wei Liu Cc: Ian Campbell Cc: Ian Jackson Cc: Dario Faggioli --- v2: add missing `}'. --- tools/libxl/libxl_dom.c | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c index a88db69.

  1   2   >