Re: [Xen-devel] Reminder: Urgent - Action Required - Xen Dev Summit Bof's Developer Meetings and WG Meetings on Aug 18 & 19t (print and food order deadline Friday 7th)

2015-08-07 Thread Meng Xu
Hi Lars, 2015-08-05 2:54 GMT-07:00 Lars Kurth : > Hi folks, > this email is for people planning to attend the Xen Dev Summit in Seattle > (Aug 17 & 18) and the Developer Meeting on the 19th. > ​Is the Developer Meeting on Aug 19th open to public? Is it possible to "listen to" the meeting if ther

Re: [Xen-devel] [PATCH V5 3/7] libxl: add pvusb API

2015-08-07 Thread Chun Yan Liu
>>> On 8/7/2015 at 01:21 AM, in message <55c39796.8000...@citrix.com>, George Dunlap wrote: > On 08/06/2015 04:11 AM, Chun Yan Liu wrote: > > As 4.6 goes to bug fixing stage, maybe we can pick up this thread? :-) > > > > Beside to call for your precious review comments and suggestions so th

Re: [Xen-devel] Reminder: Urgent - Action Required - Xen Dev Summit Bof's Developer Meetings and WG Meetings on Aug 18 & 19t (print and food order deadline Friday 7th)

2015-08-07 Thread Lars Kurth
Reducing the list > ​Is the Developer Meeting on Aug 19th open to public? > Is it possible to "listen to" the meeting if there is still space left? Yes, if there is space (which there appears to be). But then if you are asking because you want to attend, there wouldn't be an issue even if we were

Re: [Xen-devel] [PATCH V3 1/6] x86/xsaves: enable xsaves/xrstors for pv guest

2015-08-07 Thread Shuai Ruan
On Wed, Aug 05, 2015 at 06:51:29PM +0100, Andrew Cooper wrote: > On 05/08/15 02:57, Shuai Ruan wrote: > > This patch emualtes xsaves/xrstors instructions and > > XSS msr access. > > > > As xsaves/xrstors instructions and XSS msr access > > required be executed only in ring0. So emulation are > > ne

Re: [Xen-devel] [PATCH V3 3/6] x86/xsaves: enable xsaves/xrstors for hvm guest

2015-08-07 Thread Shuai Ruan
On Wed, Aug 05, 2015 at 07:17:44PM +0100, Andrew Cooper wrote: > On 05/08/15 02:57, Shuai Ruan wrote: > > This patch enables xsaves for hvm guest, includes: > > 1.handle xsaves vmcs init and vmexit. > > 2.add logic to write/read the XSS msr. > > > > Signed-off-by: Shuai Ruan > > --- > > xen/arch/

Re: [Xen-devel] [PATCH V3 4/6] libxc: expose xsaves/xgetbv1/xsavec to hvm guest

2015-08-07 Thread Shuai Ruan
On Wed, Aug 05, 2015 at 09:37:22AM +0100, Ian Campbell wrote: > On Wed, 2015-08-05 at 09:57 +0800, Shuai Ruan wrote: > > This patch exposes xsaves/xgetbv1/xsavec to hvm guest. > > The reserved bits of eax/ebx/ecx/edx must be cleaned up > > when call cpuid(0dh) with leaf 1 or 2..63. > > > > Accordi

Re: [Xen-devel] [PATCH V3 0/6] add xsaves/xrstors support

2015-08-07 Thread Shuai Ruan
On Wed, Aug 05, 2015 at 05:38:21PM +0100, Andrew Cooper wrote: > On 05/08/15 02:57, Shuai Ruan wrote: > > Detail hardware spec can be found in chapter 13 (section 13.11 13.12) of > > the > > Intel SDM [1]. > > > > patch1: add xsaves/xrstors support for pv guest > > patch2: add xsaves/xrstors supp

[Xen-devel] [distros-debian-sid test] 37816: regressions - FAIL

2015-08-07 Thread Platform Team regression test user
flight 37816 distros-debian-sid real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/37816/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-amd64-sid-netboot-pygrub 13 guest-saverestore fail REGR. vs. 37766 Tests

Re: [Xen-devel] Fw: drivers/xen/pci.c:31:25: fatal error: asm/pci_x86.h: No such file or directory

2015-08-07 Thread Stefano Stabellini
On Thu, 6 Aug 2015, Boris Ostrovsky wrote: > On 08/06/2015 01:04 PM, Robert Richter wrote: > > Boris, > > > > we are working on acpi pci support for arm64. For this we are enabling > > PCI_MMCONFIG on arm64 which breaks compiling drivers/xen/pci.c. > > > > Looking into it there is x86 code in gen

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-07 Thread Stefano Stabellini
On Fri, 7 Aug 2015, Shannon Zhao wrote: > This document is going to explain the design details of Xen booting with > ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are > welcome. > > To Xen itself booting with ACPI, this is similar to Linux kernel except > that Xen doesn't par

Re: [Xen-devel] [RFC 1/4] HVM x86 deprivileged mode: Page allocation helper

2015-08-07 Thread Ben Catterall
On 06/08/15 20:22, Andrew Cooper wrote: On 06/08/15 17:45, Ben Catterall wrote: This allocation function is used by the deprivileged mode initialisation code to allocate pages for the new page table mappings and page frames on the HAP page heap. Signed-off-by: Ben Catterall This is fine for y

Re: [Xen-devel] virtio on pv/pvh xen

2015-08-07 Thread Lai Jiangshan
On Wed, Aug 5, 2015 at 11:33 PM, Wei Liu wrote: > On Wed, Aug 05, 2015 at 11:09:41PM +0800, Lai Jiangshan wrote: >> Hi, Liu >> >> Does pv or pvh guest support virtio devices? > > No. > >> If yes, how can I configure the guest? >> If not, how can I make it support? >> > > A new transport which make

[Xen-devel] [PATCH v4 06/31] libxc: make arch_setup_meminit a xc_dom_arch hook

2015-08-07 Thread Roger Pau Monne
This allows having different arch_setup_meminit implementations based on the guest type. It should not introduce any functional changes. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Change

[Xen-devel] [PATCH v4 08/31] libxc: rework BSP initialization

2015-08-07 Thread Roger Pau Monne
Place the calls to xc_vcpu_setcontext and the allocation of the hypercall buffer into the arch-specific vcpu hooks. This is needed for the next patch, so x86 HVM guests can initialize the BSP using XEN_DOMCTL_sethvmcontext instead of XEN_DOMCTL_setvcpucontext. This patch should not introduce any f

[Xen-devel] [PATCH v4 00/31] Introduce HVM without dm and new boot ABI

2015-08-07 Thread Roger Pau Monne
This series is split in the following order: - Patch 1 is a fixup of the error paths in libxl__build_hvm and related functions (and can go in independently of the rest of the series). - Patches from 2 to 11 switch HVM domain contruction to use the xc_dom_* family of functions, like they ar

[Xen-devel] [PATCH v4 05/31] libxc: introduce a domain loader for HVM guest firmware

2015-08-07 Thread Roger Pau Monne
Introduce a very simple (and dummy) domain loader to be used to load the firmware (hvmloader) into HVM guests. Since hmvloader is just a 32bit elf executable the loader is fairly simple. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Sta

[Xen-devel] [PATCH v4 02/31] libxc: split x86 HVM setup_guest into smaller logical functions

2015-08-07 Thread Roger Pau Monne
This is just a preparatory change to clean up the code in setup_guest. Should not introduce any functional changes. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Changes since v3: - Add An

[Xen-devel] [PATCH v4 09/31] libxc: introduce a xc_dom_arch for hvm-3.0-x86_32 guests

2015-08-07 Thread Roger Pau Monne
This xc_dom_arch will be used in order to build HVM domains. The code is based on the existing xc_hvm_populate_memory and xc_hvm_populate_params functions. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Changes since v3: - Make sure c/s

[Xen-devel] [PATCH v4 07/31] libxc: make arch_setup_boot{init/late} xc_dom_arch hooks

2015-08-07 Thread Roger Pau Monne
This should not introduce any functional change. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Changes since v3: - Add Andrew Cooper Reviewed-by. - Add Wei Acked-by. --- tools/libxc/incl

[Xen-devel] [PATCH v4 03/31] libxc: unify xc_dom_p2m_{host/guest}

2015-08-07 Thread Roger Pau Monne
Unify both functions into xc_dom_p2m. Should not introduce any functional change. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Samuel Thibault --- Changes since v3: - Add Andrew Cooper R

[Xen-devel] [PATCH v4 04/31] libxc: introduce the notion of a container type

2015-08-07 Thread Roger Pau Monne
Introduce the notion of a container type into xc_dom_image. This will be needed by later changes that will also use xc_dom_image in order to build HVM guests. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell C

[Xen-devel] [PATCH v4 01/31] libxl: fix libxl__build_hvm error handling

2015-08-07 Thread Roger Pau Monne
With the current code in libxl__build_hvm it is possible for the function to fail and still return 0. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/libxl/libxl_dom.c | 39 ++- 1 file changed, 2

Re: [Xen-devel] virtio on pv/pvh xen

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 06:01:23PM +0800, Lai Jiangshan wrote: > On Wed, Aug 5, 2015 at 11:33 PM, Wei Liu wrote: > > On Wed, Aug 05, 2015 at 11:09:41PM +0800, Lai Jiangshan wrote: > >> Hi, Liu > >> > >> Does pv or pvh guest support virtio devices? > > > > No. > > > >> If yes, how can I configure t

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-07 Thread Julien Grall
Hi Shannon, Just some clarification questions. On 07/08/15 03:11, Shannon Zhao wrote: > 3. Dom0 gets grant table and event channel irq information > --- > As said above, we assign the hypervisor_id be "XenVMM" to tell Dom0 that > it runs on

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-07 Thread Christoffer Dall
On Fri, Aug 7, 2015 at 12:33 PM, Julien Grall wrote: > Hi Shannon, > > Just some clarification questions. > > On 07/08/15 03:11, Shannon Zhao wrote: >> 3. Dom0 gets grant table and event channel irq information >> --- >> As said above, we ass

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-07 Thread Stefano Stabellini
On Fri, 7 Aug 2015, Christoffer Dall wrote: > On Fri, Aug 7, 2015 at 12:33 PM, Julien Grall wrote: > > Hi Shannon, > > > > Just some clarification questions. > > > > On 07/08/15 03:11, Shannon Zhao wrote: > >> 3. Dom0 gets grant table and event channel irq information > >>

[Xen-devel] [PATCH v4 18/31] xen/x86: allow disabling the emulated PIC

2015-08-07 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/vpic.c | 11 ++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/hvm/vpic.c b/xen/arch/x86/hvm/vpic.c index 7c2edc8..5938f40 100644 --- a/xen/arch/x86/hvm/vpic.c +++ b/xen/ar

[Xen-devel] [PATCH v4 29/31] libxc/xen: introduce HVM_PARAM_MODLIST_PFN

2015-08-07 Thread Roger Pau Monne
This HVM parameter is used to pass a list of loaded modules to the guest. Right now the number of loaded modules is limited to 1 by the current implementation, but this interface allows passing more than one module. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian C

[Xen-devel] [PATCH v4 16/31] xen/x86: allow disabling the emulated RTC

2015-08-07 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/rtc.c | 16 1 file changed, 16 insertions(+) diff --git a/xen/arch/x86/hvm/rtc.c b/xen/arch/x86/hvm/rtc.c index a9efeaf..bc93f66 100644 --- a/xen/arch/x86/hvm/rtc.c +++ b/xen/arch/x86/hvm/rtc

[Xen-devel] [PATCH v4 28/31] libxc/xen: introduce HVM_PARAM_CMDLINE_PFN

2015-08-07 Thread Roger Pau Monne
This HVM parameter returns a PFN that contains the address of the memory page where the guest command line has been placed. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Jan Beulich Cc: Andrew Cooper --- tools/libxc/xc_dom_x86.c

[Xen-devel] [PATCH v4 24/31] libxc: allow creating domains without emulated devices.

2015-08-07 Thread Roger Pau Monne
Introduce a new flag in xc_dom_image that turns on and off the emulated devices. This prevents creating the VGA hole, the hvm_info page and the ioreq server pages. libxl unconditionally sets it to true for all HVM domains at the moment. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano

[Xen-devel] [PATCH v4 13/31] xen/x86: allow disabling the emulated local apic

2015-08-07 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Cc: Boris Ostrovsky Cc: Suravee Suthikulpanit Cc: Aravind Gopalakrishnan Cc: Jan Beulich Cc: Andrew Cooper Cc: Jun Nakajima Cc: Eddie Dong Cc: Kevin Tian --- xen/arch/x86/hvm/svm/svm.c | 16 +--- xen/arch/x86/hvm/vlapic.c | 30

[Xen-devel] [PATCH v4 19/31] xen/x86: allow disabling the emulated pmu

2015-08-07 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/cpu/vpmu.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c index 8af3df1..d5bb77d 100644 --- a/xen/arch/x86/cpu/vpmu.c +++ b/xen/arch/x86/cpu/vpmu.c @@ -439

[Xen-devel] [PATCH v4 11/31] libxc: remove dead HVM building code

2015-08-07 Thread Roger Pau Monne
Remove xc_hvm_build_x86.c and xc_hvm_build_arm.c since xc_hvm_build is not longer used in order to create HVM guests. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/libxc/Makefile | 2 - tools/libxc/include/xenguest

[Xen-devel] [PATCH v4 30/31] libxc: switch xc_dom_elfloader to be used with HVMlite domains

2015-08-07 Thread Roger Pau Monne
Allow xc_dom_elfloader to report a guest type as hvm-3.0-x86_32 if it's running inside of a HVM container and has the PHYS32_ENTRY elfnote set. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Only xc_dom_elfloader has been switched to sup

[Xen-devel] [PATCH v4 12/31] xen/x86: add bitmap of enabled emulated devices

2015-08-07 Thread Roger Pau Monne
Introduce a bitmap in x86 xen_arch_domainconfig that allows enabling or disabling specific devices emulated inside of Xen for HVM guests. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v3

[Xen-devel] [PATCH v4 17/31] xen/x86: allow disabling the emulated IO APIC

2015-08-07 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/vioapic.c | 14 ++ 1 file changed, 14 insertions(+) diff --git a/xen/arch/x86/hvm/vioapic.c b/xen/arch/x86/hvm/vioapic.c index d348235..30a4a0f 100644 --- a/xen/arch/x86/hvm/vioapic.c +++ b/xen/ar

[Xen-devel] [PATCH v4 27/31] xenconsole: try to attach to PV console if HVM fails

2015-08-07 Thread Roger Pau Monne
HVM guests have always used the emulated serial console by default, but if the emulated serial pty cannot be fetched from xenstore try to use the PV console instead. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Changes since v3: - Dro

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-07 Thread Julien Grall
On 07/08/15 11:37, Christoffer Dall wrote: > On Fri, Aug 7, 2015 at 12:33 PM, Julien Grall wrote: >> Hi Shannon, >> >> Just some clarification questions. >> >> On 07/08/15 03:11, Shannon Zhao wrote: >>> 3. Dom0 gets grant table and event channel irq information >>>

[Xen-devel] [PATCH v4 25/31] xen: allow HVM guests to use XENMEM_memory_map

2015-08-07 Thread Roger Pau Monne
Enable this hypercall for HVM guests in order to fetch the e820 memory map in the absence of an emulated BIOS. The memory map is populated and notified to Xen in arch_setup_meminit_hvm. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Jan

[Xen-devel] [PATCH v4 26/31] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs

2015-08-07 Thread Roger Pau Monne
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and VCPUOP_is_up hypercalls from HVM guests. This patch introduces a new structure (vcpu_hvm_context) that should be used in conjuction with the VCPUOP_initialise hypercall in order to initialize vCPUs for HVM guests. Signed-off-by:

[Xen-devel] [PATCH v4 10/31] libxl: switch HVM domain building to use xc_dom_* helpers

2015-08-07 Thread Roger Pau Monne
Now that we have all the code in place HVM domain building in libxl can be switched to use the xc_dom_* family of functions, just like they are used in order to build PV guests. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/libxl

[Xen-devel] [PATCH v4 20/31] xen/x86: allow disabling the emulated VGA

2015-08-07 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/stdvga.c | 6 ++ 1 file changed, 6 insertions(+) diff --git a/xen/arch/x86/hvm/stdvga.c b/xen/arch/x86/hvm/stdvga.c index f50bff7..a3296bd 100644 --- a/xen/arch/x86/hvm/stdvga.c +++ b/xen/arch/x86/hvm/std

Re: [Xen-devel] [PATCH v4 01/31] libxl: fix libxl__build_hvm error handling

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote: > With the current code in libxl__build_hvm it is possible for the function to > fail and still return 0. It's hard to see where the bug is when this patch also does a bunch of refactoring. It would be good if you can separate the b

[Xen-devel] [PATCH v4 22/31] xen/x86: allow disabling all emulated devices inside of Xen

2015-08-07 Thread Roger Pau Monne
Only allow enabling or disabling all the emulated devices inside of Xen, right now Xen doesn't support enabling specific emulated devices only. Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/domain.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) di

[Xen-devel] [PATCH v4 14/31] xen/x86: allow disabling the emulated HPET

2015-08-07 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/hpet.c | 13 + xen/arch/x86/hvm/hvm.c | 1 - 2 files changed, 13 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/hvm/hpet.c b/xen/arch/x86/hvm/hpet.c index edf9a17..266b587 100644 --- a/x

[Xen-devel] [PATCH v4 31/31] libxl: allow the creation of HVM domains without a device model.

2015-08-07 Thread Roger Pau Monne
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM builder now uses the PV xc_dom_* set of functions this kernel will be parsed and loaded inside the guest like on PV, but the container is a pure HVM guest. Also, if device_model_version is set to none or a device model fo

[Xen-devel] [PATCH v4 15/31] xen/x86: allow disabling the pmtimer

2015-08-07 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/pmtimer.c | 13 + 1 file changed, 13 insertions(+) diff --git a/xen/arch/x86/hvm/pmtimer.c b/xen/arch/x86/hvm/pmtimer.c index 07594e1..199a15e 100644 --- a/xen/arch/x86/hvm/pmtimer.c +++ b/xen/arc

[Xen-devel] [PATCH v4 21/31] xen/x86: allow disabling the emulated IOMMU

2015-08-07 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Cc: Suravee Suthikulpanit Cc: Aravind Gopalakrishnan --- xen/drivers/passthrough/amd/iommu_guest.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/xen/drivers/passthrough/amd/iommu_guest.c b/xen/drivers/passthrough/amd/iommu_guest.c index e7

[Xen-devel] [PATCH v4 23/31] elfnotes: intorduce a new PHYS_ENTRY elfnote

2015-08-07 Thread Roger Pau Monne
This new elfnote contains the 32bit entry point into the kernel. Xen will use this entry point in order to launch the guest kernel in 32bit protected mode with paging disabled. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- tools/xcutil

Re: [Xen-devel] [PATCH v4 01/31] libxl: fix libxl__build_hvm error handling

2015-08-07 Thread Roger Pau Monné
El 07/08/15 a les 12.49, Wei Liu ha escrit: > On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote: >> With the current code in libxl__build_hvm it is possible for the function to >> fail and still return 0. > > It's hard to see where the bug is when this patch also does a bunch of > re

Re: [Xen-devel] [xen 4.6 retrospective] [urgent] rename "freeze" window and make release branch as soon as possible after RC1

2015-08-07 Thread Roger Pau Monné
El 05/08/15 a les 11.22, Lars Kurth ha escrit: > This is one item of feedback, which I believe is a quick win for us. This is > one piece of feedback from a list of items that have during the last few > weeks been raised with me personally, either during face-2-face conversations > in a private

Re: [Xen-devel] virtio on pv/pvh xen

2015-08-07 Thread Wei Liu
Add back xen-devel On Fri, Aug 07, 2015 at 06:45:10PM +0800, Lai Jiangshan wrote: > On Fri, Aug 7, 2015 at 6:25 PM, Wei Liu wrote: > > On Fri, Aug 07, 2015 at 06:01:23PM +0800, Lai Jiangshan wrote: > >> On Wed, Aug 5, 2015 at 11:33 PM, Wei Liu wrote: > >> > On Wed, Aug 05, 2015 at 11:09:41PM +08

Re: [Xen-devel] [PATCH v4 01/31] libxl: fix libxl__build_hvm error handling

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:55:21PM +0200, Roger Pau Monné wrote: > El 07/08/15 a les 12.49, Wei Liu ha escrit: > > On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote: > >> With the current code in libxl__build_hvm it is possible for the function > >> to > >> fail and still return 0.

Re: [Xen-devel] [PATCH v4 01/31] libxl: fix libxl__build_hvm error handling

2015-08-07 Thread Roger Pau Monné
El 07/08/15 a les 13.03, Wei Liu ha escrit: > On Fri, Aug 07, 2015 at 12:55:21PM +0200, Roger Pau Monné wrote: >> El 07/08/15 a les 12.49, Wei Liu ha escrit: >>> On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote: With the current code in libxl__build_hvm it is possible for the fu

Re: [Xen-devel] [PATCH v4 08/31] libxc: rework BSP initialization

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:17:45PM +0200, Roger Pau Monne wrote: > Place the calls to xc_vcpu_setcontext and the allocation of the hypercall > buffer into the arch-specific vcpu hooks. This is needed for the next patch, > so x86 HVM guests can initialize the BSP using XEN_DOMCTL_sethvmcontext > ins

Re: [Xen-devel] [PATCH v4 01/31] libxl: fix libxl__build_hvm error handling

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 01:28:32PM +0200, Roger Pau Monné wrote: > El 07/08/15 a les 13.03, Wei Liu ha escrit: > > On Fri, Aug 07, 2015 at 12:55:21PM +0200, Roger Pau Monné wrote: > >> El 07/08/15 a les 12.49, Wei Liu ha escrit: > >>> On Fri, Aug 07, 2015 at 12:17:38PM +0200, Roger Pau Monne wrote:

Re: [Xen-devel] [PATCH v4 09/31] libxc: introduce a xc_dom_arch for hvm-3.0-x86_32 guests

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:17:46PM +0200, Roger Pau Monne wrote: > This xc_dom_arch will be used in order to build HVM domains. The code is > based on the existing xc_hvm_populate_memory and xc_hvm_populate_params > functions. > > Signed-off-by: Roger Pau Monné > Cc: Ian Jackson > Cc: Stefano St

Re: [Xen-devel] [PATCH v4 08/31] libxc: rework BSP initialization

2015-08-07 Thread Roger Pau Monné
El 07/08/15 a les 13.31, Wei Liu ha escrit: > On Fri, Aug 07, 2015 at 12:17:45PM +0200, Roger Pau Monne wrote: >> Place the calls to xc_vcpu_setcontext and the allocation of the hypercall >> buffer into the arch-specific vcpu hooks. This is needed for the next patch, >> so x86 HVM guests can initia

Re: [Xen-devel] [PATCH v4 08/31] libxc: rework BSP initialization

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 02:04:21PM +0200, Roger Pau Monné wrote: > El 07/08/15 a les 13.31, Wei Liu ha escrit: > > On Fri, Aug 07, 2015 at 12:17:45PM +0200, Roger Pau Monne wrote: > >> Place the calls to xc_vcpu_setcontext and the allocation of the hypercall > >> buffer into the arch-specific vcpu

Re: [Xen-devel] [PATCH v4 10/31] libxl: switch HVM domain building to use xc_dom_* helpers

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:17:47PM +0200, Roger Pau Monne wrote: > Now that we have all the code in place HVM domain building in libxl can be > switched to use the xc_dom_* family of functions, just like they are used in > order to build PV guests. > > Signed-off-by: Roger Pau Monné > Cc: Ian Jac

Re: [Xen-devel] [PATCH v4 11/31] libxc: remove dead HVM building code

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:17:48PM +0200, Roger Pau Monne wrote: > Remove xc_hvm_build_x86.c and xc_hvm_build_arm.c since xc_hvm_build is not > longer used in order to create HVM guests. > > Signed-off-by: Roger Pau Monné > Cc: Ian Jackson > Cc: Stefano Stabellini > Cc: Ian Campbell > Cc: Wei

Re: [Xen-devel] [PATCH v3 07/32] xen/x86: fix arch_set_info_guest for HVM guests

2015-08-07 Thread Tim Deegan
At 19:11 +0200 on 05 Aug (1438801877), Roger Pau Monné wrote: > El 05/08/15 a les 18.46, Andrew Cooper ha escrit: > > On 05/08/15 17:40, Roger Pau Monné wrote: > >> El 05/08/15 a les 17.39, Andrew Cooper ha escrit: > >>> On 05/08/15 10:53, Roger Pau Monné wrote: > El 04/08/15 a les 20.08, Andr

Re: [Xen-devel] [PATCH v4 24/31] libxc: allow creating domains without emulated devices.

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:18:01PM +0200, Roger Pau Monne wrote: > Introduce a new flag in xc_dom_image that turns on and off the emulated > devices. This prevents creating the VGA hole, the hvm_info page and the > ioreq server pages. libxl unconditionally sets it to true for all HVM > domains at t

Re: [Xen-devel] [PATCH v4 25/31] xen: allow HVM guests to use XENMEM_memory_map

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:18:02PM +0200, Roger Pau Monne wrote: > Enable this hypercall for HVM guests in order to fetch the e820 memory > map in the absence of an emulated BIOS. The memory map is populated and > notified to Xen in arch_setup_meminit_hvm. > > Signed-off-by: Roger Pau Monné > Cc:

Re: [Xen-devel] [PATCH v4 27/31] xenconsole: try to attach to PV console if HVM fails

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:18:04PM +0200, Roger Pau Monne wrote: > HVM guests have always used the emulated serial console by default, but if > the emulated serial pty cannot be fetched from xenstore try to use the PV > console instead. > > Signed-off-by: Roger Pau Monné > Cc: Ian Jackson > Cc:

[Xen-devel] [xen-unstable test] 60603: tolerable FAIL - PUSHED

2015-08-07 Thread osstest service owner
flight 60603 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/60603/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail like 60541 test-amd64-i386-r

Re: [Xen-devel] [PATCH v4 28/31] libxc/xen: introduce HVM_PARAM_CMDLINE_PFN

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:18:05PM +0200, Roger Pau Monne wrote: > This HVM parameter returns a PFN that contains the address of the memory > page where the guest command line has been placed. > > Signed-off-by: Roger Pau Monné > Cc: Ian Jackson > Cc: Stefano Stabellini > Cc: Ian Campbell > Cc

Re: [Xen-devel] [RFC 4/4] HVM x86 deprivileged mode: Trap handlers for deprivileged mode

2015-08-07 Thread Ben Catterall
On 06/08/15 22:24, Andrew Cooper wrote: On 06/08/2015 17:45, Ben Catterall wrote: Added trap handlers to catch exceptions such as a page fault, general protection fault, etc. These handlers will crash the domain as such exceptions would indicate that either there is a bug in deprivileged mode

Re: [Xen-devel] [PATCH v4 29/31] libxc/xen: introduce HVM_PARAM_MODLIST_PFN

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:18:06PM +0200, Roger Pau Monne wrote: > This HVM parameter is used to pass a list of loaded modules to the guest. > Right now the number of loaded modules is limited to 1 by the current > implementation, but this interface allows passing more than one module. > > Signed-

Re: [Xen-devel] [PATCH V3 1/6] x86/xsaves: enable xsaves/xrstors for pv guest

2015-08-07 Thread Andrew Cooper
On 07/08/15 09:00, Shuai Ruan wrote: > >>> +goto skip; >>> +} >>> + >>> +if ( !guest_kernel_mode(v, regs) || (regs->edi & 0x3f) ) >> What does edi have to do with xsaves? only edx:eax are special >> according to the manual. >> > regs->edi is the

Re: [Xen-devel] [RFC 3/4] HVM x86 deprivileged mode: Code for switching into/out of deprivileged mode

2015-08-07 Thread Ben Catterall
On 06/08/15 21:55, Andrew Cooper wrote: On 06/08/15 17:45, Ben Catterall wrote: The process to switch into and out of deprivileged mode can be likened to setjmp/longjmp. To enter deprivileged mode, we take a copy of the stack from the guest's registers up to the current stack pointer. This al

Re: [Xen-devel] [PATCH v4 31/31] libxl: allow the creation of HVM domains without a device model.

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 12:18:08PM +0200, Roger Pau Monne wrote: > Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM > builder now uses the PV xc_dom_* set of functions this kernel will be parsed > and loaded inside the guest like on PV, but the container is a pure HVM >

Re: [Xen-devel] [PATCH V3 3/6] x86/xsaves: enable xsaves/xrstors for hvm guest

2015-08-07 Thread Andrew Cooper
On 07/08/15 09:22, Shuai Ruan wrote: > >>> void hvm_cpuid(unsigned int input, unsigned int *eax, unsigned int *ebx, >>> unsigned int *ecx, unsigned int *edx) >>> { >>> @@ -4456,6 +4460,34 @@ void hvm_cpuid(unsigned int input, unsigned int >>> *eax, unsigned in

Re: [Xen-devel] how can I find hypercall page address?

2015-08-07 Thread Andrew Cooper
On 07/08/15 02:52, big strong wrote: > Or how can I get the address of hypercall page belonging to a running > domU? Please do not top post. A domain may create an arbitrary quantity of hypercall pages, at any address of their choosing. You have not explained why you want this information. ~And

Re: [Xen-devel] [RFC 3/4] HVM x86 deprivileged mode: Code for switching into/out of deprivileged mode

2015-08-07 Thread David Vrabel
On 07/08/15 13:51, Ben Catterall wrote: > > I don't know if we can make these synchronous as we need a way to > interrupt the vcpu if it's spinning for a long time. Otherwise an > attacker could just spin in depriv and cause a DoS. With that in mind, > the scheduler may decide to migrate the vcpu

Re: [Xen-devel] [RFC 1/4] HVM x86 deprivileged mode: Page allocation helper

2015-08-07 Thread Andrew Cooper
On 07/08/15 10:57, Ben Catterall wrote: > On 06/08/15 20:22, Andrew Cooper wrote: >> On 06/08/15 17:45, Ben Catterall wrote: >>> This allocation function is used by the deprivileged mode >>> initialisation code >>> to allocate pages for the new page table mappings and page frames on >>> the HAP >>>

Re: [Xen-devel] [RFC 2/4] HVM x86 deprivileged mode: Create deprivileged page tables

2015-08-07 Thread Ben Catterall
On 06/08/15 20:52, Andrew Cooper wrote: On 06/08/15 17:45, Ben Catterall wrote: The paging structure mappings for the deprivileged mode are added to the monitor page table for HVM guests. The entries are generated by walking the page tables and mapping in new pages. If a higher-level page tabl

Re: [Xen-devel] [RFC 4/4] HVM x86 deprivileged mode: Trap handlers for deprivileged mode

2015-08-07 Thread Andrew Cooper
On 07/08/15 13:32, Ben Catterall wrote: > > > On 06/08/15 22:24, Andrew Cooper wrote: >> On 06/08/2015 17:45, Ben Catterall wrote: >>> Added trap handlers to catch exceptions such as a page fault, general >>> protection fault, etc. These handlers will crash the domain as such >>> exceptions >>> wou

Re: [Xen-devel] [RFC 4/4] HVM x86 deprivileged mode: Trap handlers for deprivileged mode

2015-08-07 Thread Ben Catterall
On 07/08/15 14:19, Andrew Cooper wrote: On 07/08/15 13:32, Ben Catterall wrote: On 06/08/15 22:24, Andrew Cooper wrote: On 06/08/2015 17:45, Ben Catterall wrote: Added trap handlers to catch exceptions such as a page fault, general protection fault, etc. These handlers will crash the domai

[Xen-devel] [PATCH for-4.6] tools/xenstore: Correct use of va_end() after va_copy()

2015-08-07 Thread Andrew Cooper
C requires that every use of va_copy() is matched with a va_end() call. This is especially important for x86_64 as va_{start,copy}() may need to allocate memory to generate a va_list containing parameters which were previously in registers. Signed-off-by: Andrew Cooper --- CC: Ian Campbell CC:

[Xen-devel] [PATCH 1/2] tools/libxl: Assert success of memory allocation in testidl

2015-08-07 Thread Andrew Cooper
The chances of an allocation failing are slim but nonzero. Assert success of each allocation to quieten Coverity, which re-notices defects each time the IDL changes. Signed-off-by: Andrew Cooper --- CC: Ian Campbell CC: Ian Jackson CC: Wei Liu --- tools/libxl/gentest.py |6 ++ 1 file

[Xen-devel] [PATCH for-4.6 0/2] Reduce the quantity of Coverity defects in testidl

2015-08-07 Thread Andrew Cooper
No functional change, but removes 48 defects which get intermittently reflagged every time the libxl IDL is altered. Sent for 4.6 at Ian Campbells suggestion. Andrew Cooper (2): tools/libxl: Assert success of memory allocation in testidl tools/libxl: Alter the use of rand() in testidl tools

[Xen-devel] [PATCH 2/2] tools/libxl: Alter the use of rand() in testidl

2015-08-07 Thread Andrew Cooper
Coverity warns for every occurrence of rand(), which is made worse because each time the IDL changes, some of the calls get re-flagged. Collect all calls to rand() in a single function, test_rand(), which takes a modulo parameter for convenience. This turns 40 defects currently into 1, which won'

Re: [Xen-devel] [PATCH v4 13/31] xen/x86: allow disabling the emulated local apic

2015-08-07 Thread Boris Ostrovsky
On 08/07/2015 06:17 AM, Roger Pau Monne wrote: diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c index a0a97e7..5acb246 100644 --- a/xen/arch/x86/hvm/vmx/vmcs.c +++ b/xen/arch/x86/hvm/vmx/vmcs.c @@ -1027,6 +1027,20 @@ static int construct_vmcs(struct vcpu *v) ASSERT

Re: [Xen-devel] [RFC 3/4] HVM x86 deprivileged mode: Code for switching into/out of deprivileged mode

2015-08-07 Thread Andrew Cooper
On 07/08/15 13:51, Ben Catterall wrote: > On 06/08/15 21:55, Andrew Cooper wrote: >> On 06/08/15 17:45, Ben Catterall wrote: >>> The process to switch into and out of deprivileged mode can be >>> likened to >>> setjmp/longjmp. >>> >>> To enter deprivileged mode, we take a copy of the stack from the

Re: [Xen-devel] [PATCH for-4.6] tools/xenstore: Correct use of va_end() after va_copy()

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 02:51:59PM +0100, Andrew Cooper wrote: > C requires that every use of va_copy() is matched with a va_end() call. > > This is especially important for x86_64 as va_{start,copy}() may need to > allocate memory to generate a va_list containing parameters which were > previousl

Re: [Xen-devel] [PATCH 1/2] tools/libxl: Assert success of memory allocation in testidl

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 03:06:23PM +0100, Andrew Cooper wrote: > The chances of an allocation failing are slim but nonzero. Assert > success of each allocation to quieten Coverity, which re-notices defects > each time the IDL changes. > > Signed-off-by: Andrew Cooper Acked-by: Wei Liu ___

Re: [Xen-devel] [PATCH 2/2] tools/libxl: Alter the use of rand() in testidl

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 03:06:24PM +0100, Andrew Cooper wrote: > Coverity warns for every occurrence of rand(), which is made worse > because each time the IDL changes, some of the calls get re-flagged. > > Collect all calls to rand() in a single function, test_rand(), which > takes a modulo param

Re: [Xen-devel] [PATCH for-4.6 0/2] Reduce the quantity of Coverity defects in testidl

2015-08-07 Thread Wei Liu
On Fri, Aug 07, 2015 at 03:06:22PM +0100, Andrew Cooper wrote: > No functional change, but removes 48 defects which get intermittently > reflagged every time the libxl IDL is altered. > > Sent for 4.6 at Ian Campbells suggestion. > > Andrew Cooper (2): > tools/libxl: Assert success of memory al

Re: [Xen-devel] [PATCH] xen: arm: Support <32MB frametables

2015-08-07 Thread Julien Grall
Hi Chris, On 06/08/15 18:54, Chris (Christopher) Brand wrote: > setup_frametable_mappings() rounds frametable_size up to a multiple > of 32MB. This is wasteful on systems with less than 4GB of RAM, > although it does allow the "contig" bit to be set in the PTEs. > > Where the frametable is less t

Re: [Xen-devel] [PATCH v2] xen-apic: Enable on domU as well

2015-08-07 Thread Konrad Rzeszutek Wilk
On Thu, Aug 06, 2015 at 06:37:05PM +0200, Jason A. Donenfeld wrote: > It turns out that domU also requires the Xen APIC driver. Otherwise we > get stuck in busy loops that never exit, such as in this stack trace: > > (gdb) target remote localhost: > Remote debugging using localhost: > __xa

Re: [Xen-devel] [PATCH v2] xen-apic: Enable on domU as well

2015-08-07 Thread Jason A. Donenfeld
On Fri, Aug 7, 2015 at 4:23 PM, Konrad Rzeszutek Wilk wrote: > Anyhow, your patch seems to fix a regression my patch > feb44f1f7a4ac299d1ab1c3606860e70b9b89d69 > "x86/xen: Provide a "Xen PV" APIC driver to support >255 VCPUs" > introduced. Ahhh, good, okay. That explains why I didn't encounter th

Re: [Xen-devel] Second regression due to libxl: Remove linux udev rules (2ba368d13893402b2f1fb3c283ddcc714659dd9b)

2015-08-07 Thread Konrad Rzeszutek Wilk
On Tue, Aug 04, 2015 at 10:14:32AM +0200, Roger Pau Monné wrote: > El 30/07/15 a les 10.53, Roger Pau Monné ha escrit: > > El 28/07/15 a les 21.47, Konrad Rzeszutek Wilk ha escrit: > >> Hey, > >> > >> I launch a bunch of guests at the same time or in parallel and > >> the scripts end up timing out

Re: [Xen-devel] Second regression due to libxl: Remove linux udev rules (2ba368d13893402b2f1fb3c283ddcc714659dd9b)

2015-08-07 Thread Roger Pau Monné
El 07/08/15 a les 16.54, Konrad Rzeszutek Wilk ha escrit: > Ok. I hadn't run your patch yet. Do you want me to run the latest staging > instead once more with my test-case? Yes please, 40s in my test case seemed to be fine. Roger. ___ Xen-devel mailin

Re: [Xen-devel] help: about arch/x86/xen/multicalls.c

2015-08-07 Thread Konrad Rzeszutek Wilk
On Thu, Aug 06, 2015 at 02:21:04PM +0800, 黄先生 wrote: > hi all: > My linux kernel verison is 2.6.32-15, and I make kernel with xen > compileroptions. But when my virual machine start on AWS,it show these log: > does anyone know how to do? > that is soo ancient I am sorry to say we can't hel

Re: [Xen-devel] [PATCH v4 31/31] libxl: allow the creation of HVM domains without a device model.

2015-08-07 Thread Konrad Rzeszutek Wilk
On Fri, Aug 07, 2015 at 12:18:08PM +0200, Roger Pau Monne wrote: > Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM > builder now uses the PV xc_dom_* set of functions this kernel will be parsed > and loaded inside the guest like on PV, but the container is a pure HVM >

Re: [Xen-devel] [RFC 2/4] HVM x86 deprivileged mode: Create deprivileged page tables

2015-08-07 Thread Andrew Cooper
On 07/08/15 14:19, Ben Catterall wrote: > On 06/08/15 20:52, Andrew Cooper wrote: >> On 06/08/15 17:45, Ben Catterall wrote: >>> The paging structure mappings for the deprivileged mode are added >>> to the monitor page table for HVM guests. The entries are generated by >>> walking the page tables a

Re: [Xen-devel] [PATCH v4 08/31] libxc: rework BSP initialization

2015-08-07 Thread Andrew Cooper
On 07/08/15 11:17, Roger Pau Monne wrote: > Place the calls to xc_vcpu_setcontext and the allocation of the hypercall > buffer into the arch-specific vcpu hooks. This is needed for the next patch, > so x86 HVM guests can initialize the BSP using XEN_DOMCTL_sethvmcontext > instead of XEN_DOMCTL_setv

[Xen-devel] [qemu-upstream-unstable test] 60605: tolerable FAIL - PUSHED

2015-08-07 Thread osstest service owner
flight 60605 qemu-upstream-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/60605/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds 11 guest-start fail baseline untested Tests which did not

  1   2   >