Re: [Xen-devel] [PATCH V2 2/3] xen/vm_event: Support for guest-requested events

2015-06-26 Thread Jan Beulich
>>> On 15.06.15 at 11:03, wrote: > Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST, > sent via HVMOP_request_vm_event. The guest can request that a > generic vm_event (containing only the vm_event-filled guest registers > as information) be sent to userspace by setting up the c

Re: [Xen-devel] [PATCH OSSTEST v3 21/22] Debian: Arrange to be able to chainload a xen.efi from grub2

2015-06-26 Thread Ian Campbell
On Thu, 2015-06-25 at 13:31 -0400, Konrad Rzeszutek Wilk wrote: > On Thu, Jun 25, 2015 at 01:36:29PM +0100, Ian Jackson wrote: > > Ian Campbell writes ("Re: [PATCH OSSTEST v3 21/22] Debian: Arrange to be > > able to chainload a xen.efi from grub2"): > > > On Thu, 2015-06-25 at 11:33 +0100, Ian Jac

Re: [Xen-devel] vif-bridge: ip link set failed, "name" too long

2015-06-26 Thread Ian Campbell
On Fri, 2015-06-26 at 00:28 -0600, Jim Fehlig wrote: > On 06/25/2015 05:53 AM, Ian Campbell wrote: > > On Thu, 2015-06-25 at 12:36 +0100, Anthony PERARD wrote: > >> Error: argument "tap695cf459-b0-emu" is wrong: "name" too long > > Under Linux IFNAMSIZ is 16, whereas this is 18 characters. > > > >

Re: [Xen-devel] [v4][PATCH 16/19] tools/libxl: extend XENMEM_set_memory_map

2015-06-26 Thread Chen, Tiejun
On 2015/6/25 19:33, Wei Liu wrote: The subject line should be changed. You're not extending that hypercall. libxl: construct e820 map with RDM information for HVM guest Agreed. On Tue, Jun 23, 2015 at 05:57:27PM +0800, Tiejun Chen wrote: Here we'll construct a basic guest e820 table via XE

[Xen-devel] [rumpuserxen test] 58905: regressions - FAIL

2015-06-26 Thread osstest service user
flight 58905 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/58905/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866 build-i386-rumpuserxe

Re: [Xen-devel] [PATCH V2 2/3] xen/vm_event: Support for guest-requested events

2015-06-26 Thread Razvan Cojocaru
On 06/26/2015 10:02 AM, Jan Beulich wrote: On 15.06.15 at 11:03, wrote: >> Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST, >> sent via HVMOP_request_vm_event. The guest can request that a >> generic vm_event (containing only the vm_event-filled guest registers >> as infor

Re: [Xen-devel] PCI Passthrough ARM Design : Draft1

2015-06-26 Thread Ian Campbell
On Fri, 2015-06-26 at 07:37 +0530, Manish Jaggi wrote: > > On Thursday 25 June 2015 10:56 PM, Konrad Rzeszutek Wilk wrote: > > On Thu, Jun 25, 2015 at 01:21:28PM +0100, Ian Campbell wrote: > >> On Thu, 2015-06-25 at 17:29 +0530, Manish Jaggi wrote: > >>> On Thursday 25 June 2015 02:41 PM, Ian Camp

Re: [Xen-devel] [PATCH v2] libxl: Add AHCI support for upstream qemu

2015-06-26 Thread Fabio Fantoni
Il 25/06/2015 14:18, Ian Campbell ha scritto: On Thu, 2015-06-25 at 12:58 +0100, Stefano Stabellini wrote: On Thu, 25 Jun 2015, Fabio Fantoni wrote: Il 25/06/2015 12:21, Ian Campbell ha scritto: On Tue, 2015-06-23 at 11:15 +0200, Fabio Fantoni wrote: Usage: ahci=0|1 (default=0) I think a glo

Re: [Xen-devel] [PATCH 7/8] xen/x86: Rework CR4 handling for PV guests

2015-06-26 Thread Andrew Cooper
On 26/06/2015 07:22, Jan Beulich wrote: On 25.06.15 at 18:22, wrote: >> On 25/06/15 15:41, Jan Beulich wrote: >> On 24.06.15 at 18:31, wrote: The major change here is that v->arch.pv_vcpu.ctrlreg[4] now contains only CR4 bits which Xen wishes to shadow, rather than contai

Re: [Xen-devel] [PATCH V2 1/3] xen/vm_access: Support for memory-content hiding

2015-06-26 Thread Razvan Cojocaru
On 06/25/2015 06:57 PM, Jan Beulich wrote: On 15.06.15 at 11:03, wrote: >> --- a/xen/arch/x86/hvm/emulate.c >> +++ b/xen/arch/x86/hvm/emulate.c >> @@ -578,6 +578,28 @@ static int hvmemul_read( >> container_of(ctxt, struct hvm_emulate_ctxt, ctxt)); >> } >> >> +static int hvmemul_re

Re: [Xen-devel] [PATCH V2 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-06-26 Thread Jan Beulich
>>> On 15.06.15 at 11:03, wrote: > Deny register writes if a vm_client subscribed to mov_to_msr events > forbids them. Currently supported for MSR, CR0, CR3 and CR4 events. Is the first sentence referring the mov_to_msr stale? > --- a/xen/arch/x86/hvm/event.c > +++ b/xen/arch/x86/hvm/event.c > @

Re: [Xen-devel] [PATCH] xen: new maintainer for the RTDS scheduler

2015-06-26 Thread Dario Faggioli
On Thu, 2015-06-25 at 22:11 -0700, Meng Xu wrote: > 2015-06-25 5:44 GMT-07:00 Dario Faggioli : > > Signed-off-by: Dario Faggioli > > --- > > Cc: George Dunlap > > Cc: Meng Xu > > --- > > MAINTAINERS |5 + > > 1 file changed, 5 insertions(+) > > > > diff --git a/MAINTAINERS b/MAINTAINERS

Re: [Xen-devel] [v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy

2015-06-26 Thread Chen, Tiejun
Thanks for your all corrections. +=item B + +Currently we just have two types: "Currently there are only two types". Although I would probably just say "Valid types are" So let say "Currently there are only two valid types". +"host" means all reserved device memory on this platform shou

Re: [Xen-devel] [PATCH V2 1/3] xen/vm_access: Support for memory-content hiding

2015-06-26 Thread Jan Beulich
>>> On 26.06.15 at 10:22, wrote: > On 06/25/2015 06:57 PM, Jan Beulich wrote: > On 15.06.15 at 11:03, wrote: >>> --- a/xen/arch/x86/hvm/emulate.c >>> +++ b/xen/arch/x86/hvm/emulate.c >>> @@ -578,6 +578,28 @@ static int hvmemul_read( >>> container_of(ctxt, struct hvm_emulate_ctxt, ctx

[Xen-devel] [PATCH v10 00/13] enable Cache Allocation Technology (CAT) for VMs

2015-06-26 Thread Chao Peng
Changes in v10: Address comments from Jan, mainly: * Check socket < nr_sockets in cat_cpu_prepare(). * Use for_each_set_bit(). * Change psr_get_cat_l3_info to return either errno or psr_cat_socket_info. Changes in v9: Address comments from Jan, mainly: * Move set_nr_sockets() invocation from __star

[Xen-devel] [PATCH v10 09/13] tools/libxl: minor name changes for CMT commands

2015-06-26 Thread Chao Peng
Use "-" instead of "_" for monitor types. Signed-off-by: Chao Peng Reviewed-by: Dario Faggioli Acked-by: Ian Campbell --- tools/libxl/xl_cmdimpl.c | 6 +++--- tools/libxl/xl_cmdtable.c | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/tools/libxl/xl_cmdimpl.c b/tools

[Xen-devel] [PATCH v10 12/13] tools: add tools support for Intel CAT

2015-06-26 Thread Chao Peng
This is the xc/xl changes to support Intel Cache Allocation Technology(CAT). 'xl psr-hwinfo' is updated to show CAT info and two new commands for CAT are introduced: - xl psr-cat-cbm-set [-s socket] Set cache capacity bitmasks(CBM) for a domain. - xl psr-cat-show Show CAT domain information

[Xen-devel] [PATCH v10 06/13] x86: dynamically get/set CBM for a domain

2015-06-26 Thread Chao Peng
For CAT, COS is maintained in hypervisor only while CBM is exposed to user space directly to allow getting/setting domain's cache capacity. For each specified CBM, hypervisor will either use a existed COS which has the same CBM or allocate a new one if the same CBM is not found. If the allocation f

Re: [Xen-devel] [PATCH V2 2/3] xen/vm_event: Support for guest-requested events

2015-06-26 Thread Jan Beulich
>>> On 26.06.15 at 09:17, wrote: > On 06/26/2015 10:02 AM, Jan Beulich wrote: > On 15.06.15 at 11:03, wrote: >>> --- a/xen/include/public/hvm/hvm_op.h >>> +++ b/xen/include/public/hvm/hvm_op.h >>> @@ -389,6 +389,10 @@ >>> DEFINE_XEN_GUEST_HANDLE(xen_hvm_evtchn_upcall_vector_t); >>> >>> #e

[Xen-devel] [PATCH v10 01/13] x86: add socket_cpumask

2015-06-26 Thread Chao Peng
Maintain socket_cpumask which contains all the HT and core siblings in the same socket. Signed-off-by: Chao Peng Acked-by: Jan Beulich --- Changes in v9: * Add comments for set_nr_sockets. * Move set_nr_sockets() invocation from __start_xen() to smp_prepare_cpus(). Changes in v8: * Remove total_

[Xen-devel] [PATCH v10 05/13] x86: expose CBM length and COS number information

2015-06-26 Thread Chao Peng
General CAT information such as maximum COS and CBM length are exposed to user space by a SYSCTL hypercall, to help user space to construct the CBM. Signed-off-by: Chao Peng Reviewed-by: Andrew Cooper --- Changes in v10: * Change psr_get_cat_l3_info to return either errno or psr_cat_socket_info.

[Xen-devel] [PATCH v10 11/13] tools/libxl: introduce some socket helpers

2015-06-26 Thread Chao Peng
Add libxl_socket_bitmap_alloc() to allow allocating a socket specific libxl_bitmap (as it is for cpu/node bitmap). Internal function libxl__count_physical_sockets() is introduced together to get the socket count when the size of bitmap is not specified. Signed-off-by: Chao Peng Acked-by: Ian Cam

[Xen-devel] [PATCH v10 08/13] xsm: add CAT related xsm policies

2015-06-26 Thread Chao Peng
Add xsm policies for Cache Allocation Technology(CAT) related hypercalls to restrict the functions visibility to control domain only. Signed-off-by: Chao Peng Acked-by: Daniel De Graaf --- tools/flask/policy/policy/modules/xen/xen.if | 2 +- tools/flask/policy/policy/modules/xen/xen.te | 4 +++

[Xen-devel] [PATCH v10 02/13] x86: detect and initialize Intel CAT feature

2015-06-26 Thread Chao Peng
Detect Intel Cache Allocation Technology(CAT) feature and store the cpuid information for later use. Currently only L3 cache allocation is supported. The L3 CAT features may vary among sockets so per-socket feature information is stored. The initialization can happen either at boot time or when CPU

[Xen-devel] [PATCH v10 03/13] x86: maintain COS to CBM mapping for each socket

2015-06-26 Thread Chao Peng
For each socket, a COS to CBM mapping structure is maintained for each COS. The mapping is indexed by COS and the value is the corresponding CBM. Different VMs may use the same CBM, a reference count is used to indicate if the CBM is available. Signed-off-by: Chao Peng --- Changes in v10: * Check

[Xen-devel] [PATCH v10 10/13] tools/libxl: add command to show PSR hardware info

2015-06-26 Thread Chao Peng
Add dedicated one to show hardware information. [root@vmm-psr]xl psr-hwinfo Cache Monitoring Technology (CMT): Enabled : 1 Total RMID : 63 Supported monitor types: cache-occupancy total-mem-bandwidth local-mem-bandwidth Signed-off-by: Chao Peng Reviewed-by: Dario Faggioli Acked-by:

[Xen-devel] [PATCH v10 07/13] x86: add scheduling support for Intel CAT

2015-06-26 Thread Chao Peng
On context switch, write the the domain's Class of Service(COS) to MSR IA32_PQR_ASSOC, to notify hardware to use the new COS. For performance reason, the COS mask for current cpu is also cached in the local per-CPU variable. Signed-off-by: Chao Peng Acked-by: Jan Beulich --- Changes in v5: * Re

[Xen-devel] [PATCH v10 04/13] x86: add COS information for each domain

2015-06-26 Thread Chao Peng
In Xen's implementation, the CAT enforcement granularity is per domain. Due to the length of CBM and the number of COS may be socket-different, each domain has COS ID for each socket. The domain get COS=0 by default and at runtime its COS is then allocated dynamically when user specifies a CBM for

[Xen-devel] [PATCH v10 13/13] docs: add xl-psr.markdown

2015-06-26 Thread Chao Peng
Add document to introduce basic concepts and terms in PSR family technologies and the xl interfaces. Signed-off-by: Chao Peng Acked-by: Ian Campbell --- Changes in v7: * Correct 'xl psr-hwinfo'. Changes in v6: * Address comments from Ian. Changes in v5: * Address comments from Andrew/Ian. --- d

Re: [Xen-devel] [PATCH 7/8] xen/x86: Rework CR4 handling for PV guests

2015-06-26 Thread Jan Beulich
>>> On 26.06.15 at 10:10, wrote: > On 26/06/2015 07:22, Jan Beulich wrote: > On 25.06.15 at 18:22, wrote: >>> After recent consideration, I am still not sure if we want to support >>> SMAP in 32bit PV guests or not. The trapping of stac/clac would be a >>> high overhead, although the guest c

Re: [Xen-devel] PCI Passthrough ARM Design : Draft1

2015-06-26 Thread Manish Jaggi
On Friday 26 June 2015 01:02 PM, Ian Campbell wrote: On Fri, 2015-06-26 at 07:37 +0530, Manish Jaggi wrote: On Thursday 25 June 2015 10:56 PM, Konrad Rzeszutek Wilk wrote: On Thu, Jun 25, 2015 at 01:21:28PM +0100, Ian Campbell wrote: On Thu, 2015-06-25 at 17:29 +0530, Manish Jaggi wrote: On

Re: [Xen-devel] [v4][PATCH 12/19] tools/libxl: passes rdm reservation policy

2015-06-26 Thread Chen, Tiejun
B is the PCI Bus/Device/Function of the physical device to pass-through. +B is about how to handle conflict between reserving reserved device s/is about/specifies/ Okay. and I think s/between/while/ +memory and guest address space. "strict" means an unsolved conflict leads to I think y

Re: [Xen-devel] [PATCH OSSTEST v3 22/22] Enable CONFIG_SPARSEMEM_VMEMMAP, arm64 seems to needs it (crashes).

2015-06-26 Thread Ian Campbell
On Wed, 2015-06-24 at 16:32 +0100, Ian Campbell wrote: > TODO: Find out why! > > This is just a placeholder/reminder, do not apply. This turned out to be a known upstream issue (thanks to Mark Rutland for the tip) which has just been fixed for 4.2 and tagged for stable backport. Ian. > --- > t

Re: [Xen-devel] [v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy

2015-06-26 Thread Ian Campbell
On Fri, 2015-06-26 at 16:38 +0800, Chen, Tiejun wrote: > Thanks for your all corrections. > > > >> +=item B > >> + > >> +Currently we just have two types: > > > > "Currently there are only two types". Although I would probably just say > > "Valid types are" > > So let say "Currently there are on

Re: [Xen-devel] [PATCHv1 6/8] xen/balloon: only hotplug additional memory if required

2015-06-26 Thread David Vrabel
On 25/06/15 22:18, Daniel Kiper wrote: > On Thu, Jun 25, 2015 at 06:11:01PM +0100, David Vrabel wrote: >> Now that we track the total number of pages (included hotplugged >> regions), it is easy to determine if more memory needs to be >> hotplugged. >> >> Signed-off-by: David Vrabel >> --- >> dri

Re: [Xen-devel] [PATCHv1 5/8] xen/balloon: rationalize memory hotplug stats

2015-06-26 Thread David Vrabel
On 25/06/15 22:31, Daniel Kiper wrote: > On Thu, Jun 25, 2015 at 08:54:45PM +0200, Daniel Kiper wrote: > > It looks that balloon_stats.total_pages is used only in memory hotplug case. > Please do references (and definition) to it inside #ifdef > CONFIG_XEN_BALLOON_MEMORY_HOTPLUG > like it is done

Re: [Xen-devel] [v4][PATCH 12/19] tools/libxl: passes rdm reservation policy

2015-06-26 Thread Ian Campbell
On Fri, 2015-06-26 at 16:53 +0800, Chen, Tiejun wrote: > >> B is the PCI Bus/Device/Function of the physical device to > >> pass-through. > >> +B is about how to handle conflict between reserving reserved > >> device > > > > s/is about/specifies/ > > Okay. > > and I think s/between/while/ > >

[Xen-devel] [xen-4.1-testing test] 58882: tolerable FAIL - PUSHED

2015-06-26 Thread osstest service user
flight 58882 xen-4.1-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/58882/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-i386-i386-pair 21 guest-migrate/src_host/dst_host fail like 27420 test-amd64-amd64-pair

[Xen-devel] [PATCH] x86/nHVM: generic hook adjustments

2015-06-26 Thread Jan Beulich
Some of the generic hooks were unused altogether - drop them. Some of the hooks were used only to handle calls from the specific vendor's code (SVM) - drop them too. Several more hooks were pointlessly implementaed as out-of-line functions, when most (all?) other HVM hooks use inline ones - make

Re: [Xen-devel] [PATCH] x86/nHVM: generic hook adjustments

2015-06-26 Thread Andrew Cooper
On 26/06/15 10:02, Jan Beulich wrote: > Some of the generic hooks were unused altogether - drop them. > > Some of the hooks were used only to handle calls from the specific > vendor's code (SVM) - drop them too. > > Several more hooks were pointlessly implementaed as out-of-line > functions, when m

Re: [Xen-devel] PCI Passthrough ARM Design : Draft1

2015-06-26 Thread Ian Campbell
On Fri, 2015-06-26 at 14:20 +0530, Manish Jaggi wrote: > > On Friday 26 June 2015 01:02 PM, Ian Campbell wrote: > > On Fri, 2015-06-26 at 07:37 +0530, Manish Jaggi wrote: > >> On Thursday 25 June 2015 10:56 PM, Konrad Rzeszutek Wilk wrote: > >>> On Thu, Jun 25, 2015 at 01:21:28PM +0100, Ian Campbe

Re: [Xen-devel] [PATCH V2 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-06-26 Thread Razvan Cojocaru
On 06/26/2015 11:28 AM, Jan Beulich wrote: On 15.06.15 at 11:03, wrote: >> Deny register writes if a vm_client subscribed to mov_to_msr events >> forbids them. Currently supported for MSR, CR0, CR3 and CR4 events. > > Is the first sentence referring the mov_to_msr stale? Yes, the patch now

[Xen-devel] What is Mirage OS? Is it a Platform for developing Xen Apps or..

2015-06-26 Thread Jason Long
Hello Experts. What is Mirage OS ? Is it a Platform for Develop applications or... Thank you. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [RFC PATCH v3 05/18] xen/arm: ITS: Port ITS driver to xen

2015-06-26 Thread Vijay Kilari
Hi Julien, On Mon, Jun 22, 2015 at 10:46 PM, Julien Grall wrote: > Hi, >> +cmd->mapd.cmd = GITS_CMD_MAPD; >> +cmd->mapd.devid = desc->its_mapd_cmd.dev->device_id; >> +cmd->mapd.size = size - 1; >> +cmd->mapd.itt = itt_addr >> 8; > > I think the code is more difficult to read with

Re: [Xen-devel] What is Mirage OS? Is it a Platform for developing Xen Apps or..

2015-06-26 Thread Ian Campbell
On Fri, 2015-06-26 at 09:19 +, Jason Long wrote: > Hello Experts. > > What is Mirage OS ? Is it a Platform for Develop applications or... While Mirage is indeed part of the Xen Project this particular list is for questions relating to the development of the hypervisor subproject. The OpenMir

Re: [Xen-devel] [v4][PATCH 12/19] tools/libxl: passes rdm reservation policy

2015-06-26 Thread Chen, Tiejun
I will delete this last sentence and add this, Please refer "reserve" option to the rdm option in xl.cfg.5.txt. Say "xl.cfg(5)" which is a neutral reference to the manpage in any form. I'm trying to follow an existing example here, so This is same as "reserve" option to the rdm option, plea

[Xen-devel] [PATCH v2 00/15] xen/arm: Add support for GICv2 on GICv3

2015-06-26 Thread Julien Grall
Hi all, This patch series adds support for GICv2 on GICv3. This feature is available only when the GICv3 hardware is compatible with GICv2. When it's the case, the same interface is provided in order to use a virtualize GICv2 (i.e GICC and GICV). That will allow us to re-use same vGIC drivers. C

[Xen-devel] [PATCH v2 03/15] xen/arm: vGIC: Export vgic_vN ops rather than add an indirection

2015-06-26 Thread Julien Grall
The function vgic_vN_init only calls register_vgic_ops. As it will never contain anything else, domain initialization code should be in the callback domain_init, remove them and directly use the VGIC ops in the commmon vGIC code. Signed-off-by: Julien Grall --- Changes in v2: - Gate

[Xen-devel] [PATCH v2 09/15] xen/arm: gic-{v2, hip04}: Use SZ_64K rather than our custom value

2015-06-26 Thread Julien Grall
It's not easy to understand PAGE_SIZE * 0x10 and PAGE_SIZE * 16 at the first glance. Signed-off-by: Julien Grall Acked-by: Ian Campbell Cc: Zoltan Kiss --- Changes in v2: - Add Ian's ack - Merge "xen/arm: gic-v2: Use SZ_64K rather than our custom value" and "xen/arm

[Xen-devel] [PATCH v2 05/15] xen/arm: gic-v3: Fix the distributor region to 64kB

2015-06-26 Thread Julien Grall
On GICv3, the default size of the distributor region is 64kB (see 5.3 in PRD03-GENC-010745 24.0). This region can be extended to provide an implementation defined set of pages containing additional aliases for MSI. Although, the GICv3 driver only access to register within the default distributor re

[Xen-devel] [PATCH v2 04/15] xen/arm: vGIC: Check return of the domain_init callback

2015-06-26 Thread Julien Grall
The domain_init callback can return error. Check it and progate the error if necessary. Signed-off-by: Julien Grall Acked-by: Ian Campbell --- Changes in v2: - Add Ian's ack --- xen/arch/arm/vgic.c | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm

[Xen-devel] [PATCH v2 01/15] xen/arm: Gate GICv3 change with HAS_GICV3 rather than CONFIG_ARM_64...

2015-06-26 Thread Julien Grall
for clarity and it will be easier to understand some follow-up patches. Also gate gic_v3 structure is HAS_GICV3. Signed-off-by: Julien Grall --- Changes in v2: - Patch added --- config/arm64.mk | 1 + xen/arch/arm/Makefile| 2 +- xen/arch/arm/Rules.mk|

[Xen-devel] [PATCH v2 07/15] xen/arm: gic-v3: Rework the print message at initialization

2015-06-26 Thread Julien Grall
- Print all the redistributor regions rather than only the first one... - Add # in the format to print 0x for hexadecimal. It's easier to differentiation from decimal - Re-order informations printed - Drop print of the virtual addresses. It makes the log more difficult t

[Xen-devel] [PATCH v2 02/15] xen/arm: gic: Rename the callback make_dt_node in make_hwdom_dt_node

2015-06-26 Thread Julien Grall
Make clear that the callback is only used to make the device tree node for the hardware domain. Signed-off-by: Julien Grall --- Changes in v2: - Patch added --- xen/arch/arm/domain_build.c | 2 +- xen/arch/arm/gic-hip04.c| 7 --- xen/arch/arm/gic-v2.c | 7 --- xen/

[Xen-devel] [PATCH v2 06/15] xen/arm: gic-v3: Use the domain redistributor information to make the DT node

2015-06-26 Thread Julien Grall
It's not necessary to get again from the hardware DT the redistributor informations. We already have it stored in the gic_info and the domain. Use the latter to be consistent with the rest of the function. Signed-off-by: Julien Grall --- Changes in v2: - Typo in the commit message -

[Xen-devel] [PATCH v2 08/15] xen/arm: gic-{v2, hip04}: Remove redundant check in {gicv2, hip04gic}_init

2015-06-26 Thread Julien Grall
There is a global check for page alignment later within the same function. Signed-off-by: Julien Grall Cc: Zoltan Kiss Acked-by: Ian Campbell --- Changes in v2: - Add Ian's ack - Merge "gic-v2: Remove redundant check in gicv2_init" and "gic-hip04: Remove redundant c

Re: [Xen-devel] [v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy

2015-06-26 Thread Chen, Tiejun
TODO: in the future this parameter may be further extended to allow specifying arbitrary regions, e.g. even those belonging to another platform as a preparation for live migration with passthrough devices. I don't think this needs to be explained in this document at all. Whenever someone does th

Re: [Xen-devel] [PATCH V2 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-06-26 Thread Jan Beulich
>>> On 26.06.15 at 11:17, wrote: > On 06/26/2015 11:28 AM, Jan Beulich wrote: > On 15.06.15 at 11:03, wrote: >>> @@ -109,7 +109,10 @@ void hvm_event_cr(unsigned int index, unsigned long >>> value, unsigned long old) >>> >>> hvm_event_traps(currad->monitor.write_ctrlreg_sync & >>>

[Xen-devel] [PATCH] xen: Install unstripped version -syms version into /usr/lib/debug

2015-06-26 Thread Ian Campbell
xen-*-syms cannot actually be booted, so putting it in /boot is a bit misleading. It also happens to cause a warning from update-grub (so at least it doesn't end up in grub.cfg) /usr/lib/debug seems to be a pretty common path for installing such debug info. Signed-off-by: Ian Campbell --- INSTA

[Xen-devel] [PATCH v2 13/15] xen/arm: Merge gicv_setup with vgic_domain_init

2015-06-26 Thread Julien Grall
Currently, it's hard to decide whether a part of the domain initialization should live in gicv_setup (part of the GIC driver) and domain_init (part of the vGIC driver). The code to initialize the domain for a specific vGIC version is always the same no matter the version of the GIC. Move all the

[Xen-devel] [PATCH v2 15/15] xen/arm: gic-v3: Add support of vGICv2 when available

2015-06-26 Thread Julien Grall
* Modify the GICv3 driver to recognize a such device. I wasn't able to find a register which tell if GICv2 is supported on GICv3. The only way to find it seems to check if the DT node provides GICC and GICV. * Disable access to ICC_SRE_EL1 to guest using vGICv2 * The LR is slightly different

[Xen-devel] [PATCH v2 10/15] xen/arm: gic: Allow the base address to be 0

2015-06-26 Thread Julien Grall
0 is a valid physical address and dt_device_get_address would return an error if a problem during the retrieving happen. Signed-off-by: Julien Grall Acked-by: Ian Campbell Cc: Zoltan Kiss --- Changes in v2: - Add Ian's acked - Merge "xen/arm: gic-v2: Allow the base address

[Xen-devel] [PATCH v2 11/15] xen/arm: gic-{v2, hip04}: Remove hbase from the global state

2015-06-26 Thread Julien Grall
The driver only needs to know the base address of the hypervisor register during the GIC initialization (see {gicv2,hip04}_init). Signed-off-by: Julien Grall Acked-by: Ian Campbell Cc: Zoltan Kiss --- Changes in v2: - Add Ian's acked - Merge "xen/arm: gic-v2: Remove hbase f

[Xen-devel] [PATCH v2 12/15] xen/arm: gic: Store the necessary HW information per vGIC ...

2015-06-26 Thread Julien Grall
... in order to decouple the vGIC driver from the GIC driver. Each vGIC HW structure contains a boolean to indicate if the current GIC is able to support this specific version of virtual GIC. Helpers have been introduced in order to help the GIC to setup correctly the vGIC. The GIC will have to c

[Xen-devel] [PATCH v2 14/15] arm: Allow the user to specify the GIC version

2015-06-26 Thread Julien Grall
A platform may have a GIC compatible with previous version of the device. This is allow to virtualize an unmodified OS on new hardware if the GIC is compatible with older version. When a guest is created, the vGIC will emulate same version as the hardware. Although, the user can specify in the co

Re: [Xen-devel] [PATCH] xen: Install unstripped version -syms version into /usr/lib/debug

2015-06-26 Thread Andrew Cooper
On 26/06/15 10:41, Ian Campbell wrote: > xen-*-syms cannot actually be booted, so putting it in /boot is a bit > misleading. It also happens to cause a warning from update-grub (so at > least it doesn't end up in grub.cfg) > > /usr/lib/debug seems to be a pretty common path for installing such > de

Re: [Xen-devel] [PATCH V2 1/3] xen/vm_access: Support for memory-content hiding

2015-06-26 Thread Razvan Cojocaru
On 06/26/2015 11:44 AM, Jan Beulich wrote: @@ -891,14 +934,37 @@ static int hvmemul_rep_outs( >>>!!(ctxt->regs->eflags & X86_EFLAGS_DF), >>> NULL); >>> } >>> >>> -static int hvmemul_rep_movs( >>> +static int hvmemul_rep_outs_set_con

Re: [Xen-devel] [RFC PATCH v3 05/18] xen/arm: ITS: Port ITS driver to xen

2015-06-26 Thread Julien Grall
On 26/06/2015 11:19, Vijay Kilari wrote: Hi Julien, Hi Vijay, On Mon, Jun 22, 2015 at 10:46 PM, Julien Grall wrote: Hi, +cmd->mapd.cmd = GITS_CMD_MAPD; +cmd->mapd.devid = desc->its_mapd_cmd.dev->device_id; +cmd->mapd.size = size - 1; +cmd->mapd.itt = itt_addr >> 8; I

Re: [Xen-devel] [PATCH] xen: Install unstripped version -syms version into /usr/lib/debug

2015-06-26 Thread Ian Campbell
On Fri, 2015-06-26 at 10:48 +0100, Andrew Cooper wrote: > > +BOOT_DIR defaults to /boot, DERBUG_DIR defaults to /usr/lib/debugt and > > DERBUG and /debugt Gah! > > +EFI_DIR to /usr/lib64/efi. > > BOOT_DIR= > > +DEBUG_DIR= > > EFI_DIR= > > > > The make target 'rpmball' will build a xen.rpm.

Re: [Xen-devel] Xen-unstable: pci-passthrough of device using MSI-X interrupts not working after commit x86/MSI: track host and guest masking separately

2015-06-26 Thread Jan Beulich
>>> On 25.06.15 at 14:02, wrote: > Thursday, June 25, 2015, 1:29:39 PM, you wrote: > On 25.06.15 at 12:51, wrote: >>> Attached is the xl-dmesg output of: >>> >>> - debug-keys M and i before guest boot >>> - guest boot >>> - debug-keys M and i after lsusb in the guest that hangs. > >> Intere

Re: [Xen-devel] [PATCH V2 1/3] xen/vm_access: Support for memory-content hiding

2015-06-26 Thread Jan Beulich
>>> On 26.06.15 at 11:49, wrote: > Sorry, I don't follow - I did truncate the data if bytes_per_rep > > curr->arch.vm_event.emul_read_data->size. But I'm passing reps on > untouched to hvmemul_do_pio(). Did I misunderstand the hvmemul_do_pio() > code? Should I pass a (*reps * bytes_per_rep) sized

Re: [Xen-devel] [PATCH] xen: Install unstripped version -syms version into /usr/lib/debug

2015-06-26 Thread Jan Beulich
>>> On 26.06.15 at 11:55, wrote: > On Fri, 2015-06-26 at 10:48 +0100, Andrew Cooper wrote: >> > +BOOT_DIR defaults to /boot, DERBUG_DIR defaults to /usr/lib/debugt and >> >> DERBUG and /debugt > > Gah! > >> > +EFI_DIR to /usr/lib64/efi. >> > BOOT_DIR= >> > +DEBUG_DIR= >> > EFI_DIR= >> > >>

[Xen-devel] [v2] nested EPT: fix the handling of nested EPT

2015-06-26 Thread Liang Li
If the host EPT entry is changed, the nested EPT should be updated. the current code does not do this, and it's wrong. I have tested this patch, the L2 guest can boot and run as normal. Signed-off-by: Liang Li Signed-off-by: Yang Zhang Reported-by: Tim Deegan --- xen/arch/x86/mm/p2m-ept.c | 4

[Xen-devel] [v2 RESEND] nested EPT: fix the handling of nested EPT

2015-06-26 Thread Liang Li
If the host EPT entry is changed, the nested EPT should be updated. the current code does not do this, and it's wrong. I have tested this patch, the L2 guest can boot and run as normal. Signed-off-by: Liang Li Signed-off-by: Yang Zhang Reported-by: Tim Deegan --- xen/arch/x86/mm/p2m-ept.c | 4

Re: [Xen-devel] [v2] nested EPT: fix the handling of nested EPT

2015-06-26 Thread Li, Liang Z
Sorry for the wrong email of Yang's, please ignore. I will resend. Liang > -Original Message- > From: Li, Liang Z > Sent: Saturday, June 27, 2015 5:57 AM > To: xen-devel@lists.xen.org > Cc: t...@xen.org; k...@xen.org; jbeul...@suse.com; > andrew.coop...@citrix.com; Tian, Kevin; Li, Lian

Re: [Xen-devel] [PATCH v3] increase size of irq from uint8_t to uint32_t

2015-06-26 Thread Julien Grall
Hi Iurii, On 08/04/2015 16:14, Iurii Konovalenko wrote: From: Iurii Konovalenko Changes in v3: - Julien Grall's comment added to commit message Changes in v2: - Commit message edited - Signed-off is set Iurii Konovalenko (1): arm: irq: increase size of irq from uint8_t to u

Re: [Xen-devel] [v2] nested EPT: fix the handling of nested EPT

2015-06-26 Thread Jan Beulich
>>> On 26.06.15 at 23:57, wrote: > If the host EPT entry is changed, the nested EPT should be updated. > the current code does not do this, and it's wrong. > I have tested this patch, the L2 guest can boot and run as normal. > > Signed-off-by: Liang Li > Signed-off-by: Yang Zhang > Reported-by:

Re: [Xen-devel] [PATCH RFC] xen: arm: Log a warning message when a deprecated hypercall is used

2015-06-26 Thread Julien Grall
Hi Ian, Do you plan to resend this patch? Regards, On 20/01/2015 11:52, Ian Campbell wrote: A few folks have been caught out by OSes which call e.g. HYPERVISOR_event_channel_op_compat which has been deprecated since 3.2.2 (i.e. long before Xen on ARM). Existing x86 code can still safely and qu

Re: [Xen-devel] [PATCH v4 00/35] libxl ao abort request (cancellation)

2015-06-26 Thread Ian Jackson
Ian Jackson writes ("[PATCH v4 00/35] libxl ao abort request (cancellation)"): > This is v4 of my series to provide support for abandoning a > long-running libxl operation. I've pushed it here http://xenbits.xen.org/gitweb/?p=people/iwj/xen.git;a=summary git://xenbits.xen.org/people/iwj/xen.g

[Xen-devel] Xen PV IOMMU interface draft C

2015-06-26 Thread Malcolm Crossley
Hi All, Here is a design for allowing guests to control the IOMMU. This allows for the guest GFN mapping to be programmed into the IOMMU and avoid using the SWIOTLB bounce buffer technique in the Linux kernel (except for legacy 32 bit DMA IO devices). Draft C has been reordered to explain expecte

Re: [Xen-devel] [v2] nested EPT: fix the handling of nested EPT

2015-06-26 Thread Li, Liang Z
> Please don't forget to Cc the maintainer (recently changed, now added). > > > @@ -1076,6 +1077,9 @@ void ept_sync_domain(struct p2m_domain *p2m) > > > > ASSERT(local_irq_is_enabled()); > > > > +if ( nestedhvm_enabled(d) && !p2m_is_nestedp2m(p2m) ) { > > +p2m_flush_nestedp2m(d);

[Xen-devel] [PATCH OSSTEST v2 2/2] mg-debian-installer-update: Update "current" symlink, if appropriate

2015-06-26 Thread Ian Campbell
Where "appropriate" means if TftpDiVersion is set to current, which is the default in standalone mode. The assumption is that someone wuth that configration runs mg-debian-installer-update then they would expected the update to be immediately effective. There was some existing, but commented, code

[Xen-devel] [PATCH OSSTEST v2 1/2] mg-debian-installer-update: Print the correct value for TftpDiVersion

2015-06-26 Thread Ian Campbell
That is, the date without the suite suffix. Signed-off-by: Ian Campbell --- v2: Output suitable for direct cut-n-paste --- mg-debian-installer-update | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/mg-debian-installer-update b/mg-debian-installer-update index ba2fdc4.

Re: [Xen-devel] [PATCH V2 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-06-26 Thread Razvan Cojocaru
On 06/26/2015 12:39 PM, Jan Beulich wrote: @@ -1249,15 +1250,16 @@ static void load_vvmcs_host_state(struct vcpu *v) >>> __vmwrite(vmcs_h2g_field[i].guest_field, r); >>> } >>> >>> -hvm_set_cr0(__get_vvmcs(vvmcs, HOST_CR0)); >>> -hvm_set_cr4(__ge

Re: [Xen-devel] Problems with merlot* AMD Opteron 6376 systems (Was Re: stable trees (was: [xen-4.2-testing test] 58584: regressions))

2015-06-26 Thread Ian Campbell
On Wed, 2015-06-24 at 10:38 +0100, Ian Campbell wrote: > TL;DR osstest is exposing issues running on "AMD Opteron(tm) Processor > 6376" in at least a couple of test cases. It would be good if someone > from AMD could have a look. At Andy Cooper's request I ran a quick job with mtrr.show=true http:

Re: [Xen-devel] Problems with merlot* AMD Opteron 6376 systems (Was Re: stable trees (was: [xen-4.2-testing test] 58584: regressions))

2015-06-26 Thread Jan Beulich
>>> On 26.06.15 at 12:37, wrote: > At Andy Cooper's request I ran a quick job with mtrr.show=true > http://logs.test-lab.xenproject.org/osstest/logs/58909/ > > I think the relevant serial output is: > Jun 26 09:57:42.325077 (XEN) MTRR default type: uncachable > Jun 26 09:57:42.325111 (XEN) MTRR

[Xen-devel] [PATCH mini-os] Correct printf formatting for tpm_tis message.

2015-06-26 Thread Ian Campbell
This is under #ifdef HAVE_LIBC so went unnoticed before. Signed-off-by: Ian Campbell --- tpm_tis.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tpm_tis.c b/tpm_tis.c index 98fe837..475ac5d 100644 --- a/tpm_tis.c +++ b/tpm_tis.c @@ -1429,7 +1429,7 @@ struct tpm_chip* ini

[Xen-devel] [PATCH v2] OSSTest: stop testing SEDF, start testing RTDS

2015-06-26 Thread Dario Faggioli
the SEDF scheduler is about to be deprecated and go away (see [1]). OTOH, the RTDS scheduler is here to stay. It therefore makes sense to stop smoke testing the former in favour of the latter. Note that the -sedf-pin jobs where only added in order to try to debug a long standing issue with SEDF; i

Re: [Xen-devel] Xen-unstable: pci-passthrough of device using MSI-X interrupts not working after commit x86/MSI: track host and guest masking separately

2015-06-26 Thread linux
On 2015-06-26 11:56, Jan Beulich wrote: On 25.06.15 at 14:02, wrote: Thursday, June 25, 2015, 1:29:39 PM, you wrote: On 25.06.15 at 12:51, wrote: Attached is the xl-dmesg output of: - debug-keys M and i before guest boot - guest boot - debug-keys M and i after lsusb in the guest that hangs.

Re: [Xen-devel] Xen PV IOMMU interface draft C

2015-06-26 Thread Ian Campbell
+ARM devs. On Fri, 2015-06-26 at 11:23 +0100, Malcolm Crossley wrote: > Hi All, I had a chat with Malcolm about this with respect to ARM. The upshot is that this does not help us to remove the dom0 1:1 workaround or associated swiotlb uses on systems without an SMMU, nor does it allow us to sens

Re: [Xen-devel] [PATCH OSSTEST v3 11/22] ts-kernel-build: Additional kernel options for Mustang

2015-06-26 Thread Ian Campbell
On Wed, 2015-06-24 at 16:32 +0100, Ian Campbell wrote: > Note: ARM testing currently uses a 3.16 based linux-arm-xen kernel > (compared to 3.14 currently used as the default). In order to support > Mustang something newer is needed, I've been testing 4.1 (next LTS > kernel), 3.18 (the intervening L

[Xen-devel] [PATCH xen] stubdom: vtpmmgr: Correctly format size_t with %z when printing.

2015-06-26 Thread Ian Campbell
Also contains a fix from Thomas Leonard (to use %u for "4 + 32", not %lu) previously posted as part of "mini-os: enable compiler check for printk format types" but with mini-os now having been split a separate repo most of that change has been applied there. This fixes the 32-bit build with update

Re: [Xen-devel] [PATCH v2] OSSTest: stop testing SEDF, start testing RTDS

2015-06-26 Thread Ian Campbell
On Fri, 2015-06-26 at 12:58 +0200, Dario Faggioli wrote: > the SEDF scheduler is about to be deprecated and go > away (see [1]). OTOH, the RTDS scheduler is here to > stay. > > It therefore makes sense to stop smoke testing the > former in favour of the latter. Note that the > -sedf-pin jobs where

[Xen-devel] [PATCH] Refactor ioreq server for better performance

2015-06-26 Thread Yu Zhang
XenGT leverages ioreq server to track and forward the accesses to GPU IO resources, e.g. the PPGTT(per-process graphic translation tables). Currently, ioreq server uses rangeset to track the BDF/ PIO/MMIO ranges to be emulated. To select an ioreq server, the rangeset is searched to see if the IO

Re: [Xen-devel] [PATCH v2] OSSTest: stop testing SEDF, start testing RTDS

2015-06-26 Thread Dario Faggioli
On Fri, 2015-06-26 at 12:08 +0100, Ian Campbell wrote: > On Fri, 2015-06-26 at 12:58 +0200, Dario Faggioli wrote: > > the SEDF scheduler is about to be deprecated and go > > away (see [1]). OTOH, the RTDS scheduler is here to > > stay. > > > > It therefore makes sense to stop smoke testing the > >

[Xen-devel] [xen-4.3-testing test] 58884: tolerable FAIL - PUSHED

2015-06-26 Thread osstest service user
flight 58884 xen-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/58884/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boot fail in 58848 pass in 58884 test-amd64-amd64-xl-sedf-pin 17

Re: [Xen-devel] Problems with merlot* AMD Opteron 6376 systems (Was Re: stable trees (was: [xen-4.2-testing test] 58584: regressions))

2015-06-26 Thread Ian Campbell
On Fri, 2015-06-26 at 11:49 +0100, Jan Beulich wrote: > >>> On 26.06.15 at 12:37, wrote: > > At Andy Cooper's request I ran a quick job with mtrr.show=true > > http://logs.test-lab.xenproject.org/osstest/logs/58909/ > > > > I think the relevant serial output is: > > Jun 26 09:57:42.325077 (XEN)

[Xen-devel] Xen 4.6 Development Update (2 WEEKS TO FREEZE, important information in preamble)

2015-06-26 Thread wei.liu2
(Note, please trim your quotes when replying, and also trim the CC list if necessary. You might also consider changing the subject line of your reply to "Status of FOO (Was: Xen 4.6 Development Update (X months reminder)") Hi all We are now more than 5 months into 4.6 development window. This is

[Xen-devel] [PATCH OSSTEST v4 04/21] Debian: Preseed a EFI system partition during host install

2015-06-26 Thread Ian Campbell
AIUI the runes used will only result in an ESP if the system was booted via UEFI. IOW I don't think there should be any change for existing systems. Signed-off-by: Ian Campbell Acked-by: Ian Jackson --- Osstest.pm| 1 + Osstest/Debian.pm | 6 ++ 2 files changed, 7 insertions(+) dif

[Xen-devel] [PATCH OSSTEST v4 05/21] ts-host-install: Split initrd out of @installcmdline

2015-06-26 Thread Ian Campbell
Other bootloaders handle this with an explicit separate option rather than parsing it out of the command line as pxelinux does. Prepare for supporting these. Signed-off-by: Ian Campbell Acked-by: Ian Jackson --- ts-host-install | 6 ++ 1 file changed, 2 insertions(+), 4 deletions(-) diff -

  1   2   3   >