Re: [Xen-devel] [PATCH 8/9] xenstore: write xenstore domain data to xenstore

2015-12-17 Thread Juergen Gross
On 15/12/15 14:30, Juergen Gross wrote: > On 15/12/15 14:19, Ian Campbell wrote: >> On Tue, 2015-12-15 at 13:53 +0100, Juergen Gross wrote: >>> mem-set too perhaps? >>> >>> Without mini-os supporting ballooning or memory hotplug up to now: >>> I don't think so. :-) >> >> Sure, but you'd get

Re: [Xen-devel] [PATCH XEN v7 07/29] tools: Refactor /dev/xen/gnt{dev, shr} wrappers into libxengnttab.

2015-12-17 Thread Ian Campbell
On Wed, 2015-12-16 at 18:40 +, Andrew Cooper wrote: > On 16/12/15 12:31, Ian Campbell wrote: > > libxengnttab will provide a stable API and ABI for accessing the > > grant table devices. > > > > The functions are moved into the xengnt{tab,shr} namespace to make a > > clean break from libxc and

Re: [Xen-devel] Garbled serial console output

2015-12-17 Thread Dario Faggioli
On Thu, 2015-12-17 at 11:58 +0530, Harmandeep Kaur wrote: > Hi, > Hello Harmandeep, > I tried to setup xen serial console with this guide, > http://wiki.xen.org/wiki/Xen_Serial_Console > > I am using RS232 -USB cable for this purpose. > I am on Ubuntu 15.10 (4.2.0-19-generic). > > xl info http:

Re: [Xen-devel] [V3 PATCH 7/9] x86/hvm: pkeys, add pkeys support for guest_walk_tables

2015-12-17 Thread Han, Huaitong
On Wed, 2015-12-16 at 02:12 -0700, Jan Beulich wrote: > > > > On 16.12.15 at 10:03, wrote: > > On Wed, 2015-12-16 at 01:32 -0700, Jan Beulich wrote: > > > > > > On 16.12.15 at 09:16, wrote: > > > > On Tue, 2015-12-15 at 02:02 -0700, Jan Beulich wrote: > > > > > Well, I wouldn't want you to introd

Re: [Xen-devel] Garbled serial console output

2015-12-17 Thread Roger Pau Monné
El 17/12/15 a les 10.06, Dario Faggioli ha escrit: > On Thu, 2015-12-17 at 11:58 +0530, Harmandeep Kaur wrote: >> Hi, >> > Hello Harmandeep, > >> I tried to setup xen serial console with this guide, >> http://wiki.xen.org/wiki/Xen_Serial_Console >> >> I am using RS232 -USB cable for this purpose.

Re: [Xen-devel] Garbled serial console output

2015-12-17 Thread Andrew Cooper
On 17/12/2015 06:28, Harmandeep Kaur wrote: > Hi, > > I tried to setup xen serial console with this guide, > http://wiki.xen.org/wiki/Xen_Serial_Console > > I am using RS232 -USB cable for this purpose. > I am on Ubuntu 15.10 (4.2.0-19-generic). > > xl info http://paste2.org/F2UgY5yz > > My output

Re: [Xen-devel] [PATCH RFC XEN v1 08/14] xen: arm: Save and restore arch timer state.

2015-12-17 Thread Ian Campbell
On Wed, 2015-12-16 at 18:05 +, Stefano Stabellini wrote: > On Wed, 16 Dec 2015, Ian Campbell wrote: > > On Wed, 2015-12-16 at 15:53 +, Stefano Stabellini wrote: > > > On Wed, 9 Dec 2015, Ian Campbell wrote: > > > > Signed-off-by: Ian Campbell > > > > --- > > > >  xen/arch/arm/vtimer.c 

[Xen-devel] [xen-4.4-testing test] 66418: regressions - FAIL

2015-12-17 Thread osstest service owner
flight 66418 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/66418/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs. 65669 Tests which

Re: [Xen-devel] [PATCH] x86/PCI: Intercept Dom0 MMCFG from dom0s in HVM containers

2015-12-17 Thread Jan Beulich
>>> On 16.12.15 at 20:34, wrote: > On 12/16/2015 04:04 AM, Jan Beulich wrote: >> >>> --- a/xen/arch/x86/hvm/hvm.c >>> +++ b/xen/arch/x86/hvm/hvm.c >>> @@ -3116,6 +3116,21 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned >>> long gla, >>> goto out_put_gfn; >>> } >>> >>> +

Re: [Xen-devel] [PATCH RFC XEN v1 09/14] xen: arm: Save and restore GIC state.

2015-12-17 Thread Ian Campbell
On Wed, 2015-12-16 at 18:30 +, Stefano Stabellini wrote: > On Wed, 9 Dec 2015, Ian Campbell wrote: > > Currently only GICv2 support is implemented. > > > > Given the differing architectural state between the GICv2 and v3 I > > ended up with separate save records. I'm not sure if this is the be

Re: [Xen-devel] [PATCH 8/9] xenstore: write xenstore domain data to xenstore

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 09:26 +0100, Juergen Gross wrote: > On 15/12/15 14:30, Juergen Gross wrote: > > On 15/12/15 14:19, Ian Campbell wrote: > > > On Tue, 2015-12-15 at 13:53 +0100, Juergen Gross wrote: > > > >   > > > > > mem-set too perhaps? > > > > > > > > Without mini-os supporting ballooning

Re: [Xen-devel] [V3 PATCH 7/9] x86/hvm: pkeys, add pkeys support for guest_walk_tables

2015-12-17 Thread Jan Beulich
>>> On 17.12.15 at 10:18, wrote: > On Wed, 2015-12-16 at 02:12 -0700, Jan Beulich wrote: >> > > > On 16.12.15 at 10:03, wrote: >> > On Wed, 2015-12-16 at 01:32 -0700, Jan Beulich wrote: >> > > Depending on how frequently this might get called, the allocation >> > > overhead may not be tolerable.

Re: [Xen-devel] [PATCH 8/9] xenstore: write xenstore domain data to xenstore

2015-12-17 Thread Juergen Gross
On 17/12/15 11:01, Ian Campbell wrote: > On Thu, 2015-12-17 at 09:26 +0100, Juergen Gross wrote: >> On 15/12/15 14:30, Juergen Gross wrote: >>> On 15/12/15 14:19, Ian Campbell wrote: On Tue, 2015-12-15 at 13:53 +0100, Juergen Gross wrote: > >> mem-set too perhaps? > > Without

Re: [Xen-devel] How to change/set preferred SSL cipher suite for relocation (migration)?

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 01:52 +0330, Alireza Vaezi wrote: > On 12/16/15, Ian Campbell wrote: > > On Wed, 2015-12-16 at 01:01 +0330, Alireza Vaezi wrote: > > > I'm using Xen 4.4.2 and I need to be able to change or set my > > > preferred > > > (available) ssl cipher suit like RC4-SHA, or DES-CBC-SHA

Re: [Xen-devel] [PATCH v2] x86/HVM: Merge HVM and PVH hypercall tables

2015-12-17 Thread Jan Beulich
>>> On 16.12.15 at 17:34, wrote: > --- a/xen/arch/x86/hvm/hvm.c > +++ b/xen/arch/x86/hvm/hvm.c > @@ -5188,12 +5188,21 @@ static hvm_hypercall_t *const > hvm_hypercall64_table[NR_hypercalls] = { > HYPERCALL(sysctl), > HYPERCALL(domctl), > HYPERCALL(tmem_op), > +HYPERCALL(platfor

Re: [Xen-devel] [PATCH 8/9] xenstore: write xenstore domain data to xenstore

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 11:08 +0100, Juergen Gross wrote: > On 17/12/15 11:01, Ian Campbell wrote: > > On Thu, 2015-12-17 at 09:26 +0100, Juergen Gross wrote: > > > On 15/12/15 14:30, Juergen Gross wrote: > > > > On 15/12/15 14:19, Ian Campbell wrote: > > > > > On Tue, 2015-12-15 at 13:53 +0100, Juer

[Xen-devel] [linux-4.1 baseline-only test] 38526: regressions - FAIL

2015-12-17 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38526 linux-4.1 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38526/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-winxpsp3 9 windows-inst

[Xen-devel] [ovmf test] 66428: regressions - FAIL

2015-12-17 Thread osstest service owner
flight 66428 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/66428/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 5 xen-build fail REGR. vs. 65543 build-i386

Re: [Xen-devel] [PATCH v3 2/2] VT-d: Fix vt-d flush timeout issue.

2015-12-17 Thread Xu, Quan
> On 16.12.2015 at 4:08pm, wrote: > >>> On 16.12.15 at 04:51, wrote: > > --- a/xen/drivers/passthrough/pci.c > > +++ b/xen/drivers/passthrough/pci.c > > @@ -1318,6 +1318,25 @@ int iommu_remove_device(struct pci_dev *pdev) > > return hd->platform_ops->remove_device(pdev->devfn, > > pci_to_dev

Re: [Xen-devel] [PATCH v3 2/2] VT-d: Fix vt-d flush timeout issue.

2015-12-17 Thread Jan Beulich
>>> On 17.12.15 at 12:43, wrote: >> On 16.12.2015 at 4:08pm, wrote: >> >>> On 16.12.15 at 04:51, wrote: >> > --- a/xen/drivers/passthrough/pci.c >> > +++ b/xen/drivers/passthrough/pci.c >> > @@ -1318,6 +1318,25 @@ int iommu_remove_device(struct pci_dev *pdev) >> > return hd->platform_ops->

[Xen-devel] [PATCH v2 13/13] xen-hvm: Mark inappropriate error handling FIXME

2015-12-17 Thread Markus Armbruster
Cc: Stefano Stabellini Cc: xen-de...@lists.xensource.com Signed-off-by: Markus Armbruster --- xen-hvm.c | 7 +++ 1 file changed, 7 insertions(+) diff --git a/xen-hvm.c b/xen-hvm.c index 3d78a0c..2a93390 100644 --- a/xen-hvm.c +++ b/xen-hvm.c @@ -240,6 +240,7 @@ static void xen_ram_init(PCMa

[Xen-devel] Xen Security Advisory 164 (CVE-2015-8554) - qemu-dm buffer overrun in MSI-X handling

2015-12-17 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2015-8554 / XSA-164 version 3 qemu-dm buffer overrun in MSI-X handling UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION =

[Xen-devel] Xen Security Advisory 165 (CVE-2015-8555) - information leak in legacy x86 FPU/XMM initialization

2015-12-17 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2015-8555 / XSA-165 version 3 information leak in legacy x86 FPU/XMM initialization UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION ===

[Xen-devel] Xen Security Advisory 166 - ioreq handling possibly susceptible to multiple read issue

2015-12-17 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory XSA-166 version 2 ioreq handling possibly susceptible to multiple read issue UPDATES IN VERSION 2 Public release. ISSUE DESCRIPTION =

[Xen-devel] Xen Security Advisory 157 (CVE-2015-8551, CVE-2015-8552) - Linux pciback missing sanity checks leading to crash

2015-12-17 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2015-8551,CVE-2015-8552 / XSA-157 version 3 Linux pciback missing sanity checks leading to crash UPDATES IN VERSION 3 Removed CVE-2015-8553 from the tit

[Xen-devel] Xen Security Advisory 155 (CVE-2015-8550) - paravirtualized drivers incautious about shared memory contents

2015-12-17 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2015-8550 / XSA-155 version 5 paravirtualized drivers incautious about shared memory contents UPDATES IN VERSION 5 Public release. ISSUE DESCRIPTION ==

[Xen-devel] [linux-next test] 66423: regressions - FAIL

2015-12-17 Thread osstest service owner
flight 66423 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/66423/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-pvops 5 kernel-build fail REGR. vs. 65797 build-amd64-pvops

[Xen-devel] [PATCHv3 0/3] Implement per-cpu reader-writer locks

2015-12-17 Thread Malcolm Crossley
This patch series adds per-cpu reader-writer locks as a generic lock implementation and then converts the grant table and p2m rwlocks to use the percpu rwlocks, in order to improve multi-socket host performance. CPU profiling has revealed the rwlocks themselves suffer from severe cache line bounci

[Xen-devel] [PATCHv3 2/3] grant_table: convert grant table rwlock to percpu rwlock

2015-12-17 Thread Malcolm Crossley
The per domain grant table read lock suffers from significant contention when performance multi-queue block or network IO due to the parallel grant map/unmaps/copies occurring on the DomU's grant table. On multi-socket systems, the contention results in the locked compare swap operation failing fr

[Xen-devel] [PATCHv3 3/3] p2m: convert p2m rwlock to percpu rwlock

2015-12-17 Thread Malcolm Crossley
The per domain p2m read lock suffers from significant contention when performance multi-queue block or network IO due to the parallel grant map/unmaps/copies occuring on the DomU's p2m. On multi-socket systems, the contention results in the locked compare swap operation failing frequently which re

[Xen-devel] [PATCHv3 1/3] rwlock: Add per-cpu reader-writer lock infrastructure

2015-12-17 Thread Malcolm Crossley
Per-cpu read-write locks allow for the fast path read case to have low overhead by only setting/clearing a per-cpu variable for using the read lock. The per-cpu read fast path also avoids locked compare swap operations which can be particularly slow on coherent multi-socket systems, particularly if

Re: [Xen-devel] [PATCH v3 2/2] VT-d: Fix vt-d flush timeout issue.

2015-12-17 Thread Xu, Quan
> On 17.12.2015 at 8:10pm, wrote: > >>> On 17.12.15 at 12:43, wrote: > > You are correct. > > As the _pci_hide_device()'s early check, I didn't use it. > > Could I remove the device from that list before adding it to > > dom_xen's, and reuse pci_hide_device() as below? > > That's what I was tr

[Xen-devel] Xen Security Advisory 155 (CVE-2015-8550) - paravirtualized drivers incautious about shared memory contents

2015-12-17 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2015-8550 / XSA-155 version 6 paravirtualized drivers incautious about shared memory contents UPDATES IN VERSION 6 Correct CREDITS section. ISSUE DESCRIPTI

Re: [Xen-devel] [PATCH] x86/PCI: Intercept Dom0 MMCFG from dom0s in HVM containers

2015-12-17 Thread Boris Ostrovsky
On 12/17/2015 04:46 AM, Jan Beulich wrote: On 16.12.15 at 20:34, wrote: On 12/16/2015 04:04 AM, Jan Beulich wrote: --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -3116,6 +3116,21 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned long gla, goto out_put_gfn;

Re: [Xen-devel] [PATCH] x86/PCI: Intercept Dom0 MMCFG from dom0s in HVM containers

2015-12-17 Thread Jan Beulich
>>> On 17.12.15 at 14:55, wrote: > On 12/17/2015 04:46 AM, Jan Beulich wrote: > On 16.12.15 at 20:34, wrote: >>> On 12/16/2015 04:04 AM, Jan Beulich wrote: > --- a/xen/arch/x86/hvm/hvm.c > +++ b/xen/arch/x86/hvm/hvm.c > @@ -3116,6 +3116,21 @@ int hvm_hap_nested_page_fault(paddr_t

[Xen-devel] [PATCH] x86/vPMU: constrain MSR_IA32_DS_AREA loads

2015-12-17 Thread Jan Beulich
For one, loading the MSR with a possibly non-canonical address was possible since the verification is conditional, while the MSR load wasn't. And then for PV guests we need to further limit the range of valid addresses to exclude the hypervisor range. Signed-off-by: Jan Beulich --- a/xen/arch/x8

Re: [Xen-devel] [PATCH] x86/vPMU: constrain MSR_IA32_DS_AREA loads

2015-12-17 Thread Andrew Cooper
On 17/12/15 14:01, Jan Beulich wrote: > For one, loading the MSR with a possibly non-canonical address was > possible since the verification is conditional, while the MSR load > wasn't. And then for PV guests we need to further limit the range of > valid addresses to exclude the hypervisor range. >

Re: [Xen-devel] [PATCH] x86/vPMU: constrain MSR_IA32_DS_AREA loads

2015-12-17 Thread Boris Ostrovsky
On 12/17/2015 09:01 AM, Jan Beulich wrote: For one, loading the MSR with a possibly non-canonical address was possible since the verification is conditional, while the MSR load wasn't. And then for PV guests we need to further limit the range of valid addresses to exclude the hypervisor range. S

Re: [Xen-devel] [PATCH] x86/vPMU: constrain MSR_IA32_DS_AREA loads

2015-12-17 Thread Jan Beulich
>>> On 17.12.15 at 15:12, wrote: > On 12/17/2015 09:01 AM, Jan Beulich wrote: >> @@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu >> enabled_cntrs |= (1ULL << i); >> } >> >> -if ( vpmu_is_set(vcpu_vpmu(v), VPMU_CPU_HAS_DS) && >> - !is_canonical_addre

Re: [Xen-devel] [PATCH] x86/vPMU: constrain MSR_IA32_DS_AREA loads

2015-12-17 Thread Boris Ostrovsky
On 12/17/2015 09:18 AM, Jan Beulich wrote: On 17.12.15 at 15:12, wrote: On 12/17/2015 09:01 AM, Jan Beulich wrote: @@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu enabled_cntrs |= (1ULL << i); } -if ( vpmu_is_set(vcpu_vpmu(v), VPMU_CPU_HAS_DS) && -

Re: [Xen-devel] [PATCH] x86/vPMU: constrain MSR_IA32_DS_AREA loads

2015-12-17 Thread Jan Beulich
>>> On 17.12.15 at 15:26, wrote: > On 12/17/2015 09:18 AM, Jan Beulich wrote: > On 17.12.15 at 15:12, wrote: >>> On 12/17/2015 09:01 AM, Jan Beulich wrote: @@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu enabled_cntrs |= (1ULL << i); }

Re: [Xen-devel] [PATCH] x86/vPMU: constrain MSR_IA32_DS_AREA loads

2015-12-17 Thread Boris Ostrovsky
On 12/17/2015 09:29 AM, Jan Beulich wrote: On 17.12.15 at 15:26, wrote: On 12/17/2015 09:18 AM, Jan Beulich wrote: On 17.12.15 at 15:12, wrote: On 12/17/2015 09:01 AM, Jan Beulich wrote: @@ -415,8 +416,10 @@ static int core2_vpmu_verify(struct vcpu enabled_cntrs |= (1ULL <<

[Xen-devel] [xen-4.6-testing test] 66421: regressions - trouble: broken/fail/pass

2015-12-17 Thread osstest service owner
flight 66421 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/66421/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate fail REGR. vs. 65639

[Xen-devel] [PATCHv5 0/2] x86/ept: reduce translation invalidation impact

2015-12-17 Thread David Vrabel
This series improves the performance of EPT by further reducing the impact of the translation invalidations (ept_sync_domain()). By: a) Deferring invalidations until the p2m write lock is released. Prior to this change a 16 VCPU guest could not be successfully migrated on an (admittedly slow) 160

[Xen-devel] [PATCHv5 2/2] x86/ept: defer the invalidation until the p2m lock is released

2015-12-17 Thread David Vrabel
Holding the p2m lock while calling ept_sync_domain() is very expensive since it does a on_selected_cpus() call. IPIs on many socket machines can be very slows and on_selected_cpus() is serialized. It is safe to defer the invalidate until the p2m lock is released except for two cases: 1. When fre

[Xen-devel] [PATCHv5 1/2] x86/ept: invalidate guest physical mappings on VMENTER

2015-12-17 Thread David Vrabel
If a guest allocates a page and the tlbflush_timestamp on the page indicates that a TLB flush of the previous owner is required, only the linear and combined mappings are invalidated. The guest-physical mappings are not invalidated. This is currently safe because the EPT code ensures that the gue

Re: [Xen-devel] [PATCHv5 1/2] x86/ept: invalidate guest physical mappings on VMENTER

2015-12-17 Thread Andrew Cooper
On 17/12/15 15:17, David Vrabel wrote: > diff --git a/xen/include/asm-x86/hvm/vmx/vmcs.h > b/xen/include/asm-x86/hvm/vmx/vmcs.h > index a8d4d5b..e778d86 100644 > --- a/xen/include/asm-x86/hvm/vmx/vmcs.h > +++ b/xen/include/asm-x86/hvm/vmx/vmcs.h > @@ -67,7 +67,7 @@ struct ept_data { > };

[Xen-devel] [PATCH] build: convert CONFIG_COMPAT to Kconfig

2015-12-17 Thread Doug Goldstein
Use the Kconfig generated CONFIG_COMPAT defines in the code base. CC: Keir Fraser CC: Jan Beulich CC: Andrew Cooper Signed-off-by: Doug Goldstein Acked-by: Jan Beulich --- config/x86_64.mk | 1 - xen/arch/x86/Kconfig | 1 + xen/common/Kconfig | 7 +++ 3 files changed, 8 insertions(

[Xen-devel] [RFC 2/3] xen/common: memory: Add support for direct mapped domain in XEMEM_exchange

2015-12-17 Thread Julien Grall
Direct mapped domain needs to retrieve the exact same underlying physical page when the region is re-populated. Therefore when memory is exchanged for direct mapped domain, we don't want to free memory of the previous region neither allocate new memory. Note that because of that, the hypercall XE

[Xen-devel] [RFC 3/3] xen/common: memory: Move steal_page in common code

2015-12-17 Thread Julien Grall
The implementation of steal_page for ARM and x86 would be the same. Rather than duplicating the x86 function, move it in common code. Also introduce missing define PRtype_info for ARM in order to compile the code. Signed-off-by: Julien Grall --- Cc: Ian Campbell Cc: Stefano Stabellini Cc: Kei

[Xen-devel] [RFC 0/3] xen/arm: Support XENMEM_exchange

2015-12-17 Thread Julien Grall
Hi all, Currently XENMEM_exchange is not supported on ARM because the steal_page is left unimplemented. However, even if steal_page is implemented, the hypercall can't work for ARM because: - Direct mapped domain is not supported - ARM doesn't have a M2P and therefore usage of mfn_to_gmfn

[Xen-devel] [RFC 1/3] xen/common: memory: Introduce check_range_domain_direct_mapped

2015-12-17 Thread Julien Grall
This function will be used in various place to check a given set of contiguous MFN belongs to a direct domain guest. Signed-off-by: Julien Grall --- Cc: Ian Campbell Cc: Ian Jackson Cc: Jan Beulich Cc: Keir Fraser Cc: Tim Deegan --- xen/common/memory.c | 62

[Xen-devel] [PATCH v3 13/13] xen-hvm: Mark inappropriate error handling FIXME

2015-12-17 Thread Markus Armbruster
Cc: Stefano Stabellini Cc: xen-de...@lists.xensource.com Signed-off-by: Markus Armbruster --- xen-hvm.c | 7 +++ 1 file changed, 7 insertions(+) diff --git a/xen-hvm.c b/xen-hvm.c index 3d78a0c..2a93390 100644 --- a/xen-hvm.c +++ b/xen-hvm.c @@ -240,6 +240,7 @@ static void xen_ram_init(PCMa

Re: [Xen-devel] [PATCH 9/9] xenstore: when running in mini-os use printk for diagnostic messages

2015-12-17 Thread Juergen Gross
On 15/12/15 16:44, Juergen Gross wrote: > On 15/12/15 16:01, Andrew Cooper wrote: >> On 15/12/15 14:57, Juergen Gross wrote: >>> On 15/12/15 15:06, Andrew Cooper wrote: On 15/12/15 12:55, Juergen Gross wrote: > On 15/12/15 13:52, Ian Campbell wrote: >> On Tue, 2015-12-15 at 13:47 +0100

[Xen-devel] [PATCH] x86/xsave: simplify xcomp_bv initialization

2015-12-17 Thread Jan Beulich
This eliminates a number of pointless conditionals: Bits 0 and 1 of xcomp_bv don't matter anyway, and as long as none of bits 2..62 are set, setting bit 63 is pointless too. Signed-off-by: Jan Beulich --- Noticed while working on XSA-165. --- a/xen/arch/x86/domain.c +++ b/xen/arch/x86/domain.c @

[Xen-devel] [OSSTEST PATCH 8/9] mg-allocate: Better error handling when no candidates

2015-12-17 Thread Ian Jackson
Spot when our db search revealed no candidates for the resources to allocate, and: - when doing an immediate allocation, call it an error - when doing a planned allocation, cause it to prevent allocation on this iteration, and print a suitably unreassuring message Previously it would simply s

[Xen-devel] [OSSTEST PATCH 9/9] mg-allocate: In planner mode, pre-check the arguments

2015-12-17 Thread Ian Jackson
Now, attempting to allocate a nonexistent host fails immediately with a sensible message, rather than queueing up and then reporting the message only later: mariner:testing.git> OSSTEST_CONFIG=/u/iwj/.xen-osstest/config:local-config.test-database_iwj ./mg-allocate -U 1h spong 2015-12-17 17:05:14

[Xen-devel] [OSSTEST PATCH 7/9] Executive DB retry: Avoid an undefined warning

2015-12-17 Thread Ian Jackson
If something other than the DB statements inside need_retry throws an exception, ->err will normally be undef (because $dbh_tests->begin_work will clear it, if nothing else). Signed-off-by: Ian Jackson --- Osstest/JobDB/Executive.pm |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff

[Xen-devel] [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe previous local plan data

2015-12-17 Thread Ian Jackson
Whatever is in the user's cwd is unlikely to correspond to anything real. In principle it might be possible to obtain an official copy from the real daemons, and massage it, or something, but that's a lot of work. Instead, just remove it when we start the test db daemons. In principle it would b

[Xen-devel] [OSSTEST PATCH 5/9] ms-planner: Improve an error message

2015-12-17 Thread Ian Jackson
I experienced this `die' due to mg-schema-test-database failing to borrow shared hosts properly, and added this Dumper for debugging. I have not bothered to improve any of the other quite terse `die's in ms-planner. Signed-off-by: Ian Jackson --- ms-planner |4 +++- 1 file changed, 3 insert

[Xen-devel] [OSSTEST PATCH 4/9] mg-schema-test-database: Borrow shares properly

2015-12-17 Thread Ian Jackson
Signed-off-by: Ian Jackson --- mg-schema-test-database | 14 -- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/mg-schema-test-database b/mg-schema-test-database index a4cb732..4e0ee68 100755 --- a/mg-schema-test-database +++ b/mg-schema-test-database @@ -448,12 +448,

[Xen-devel] [OSSTEST PATCH 1/9] README.dev: Document the blessings

2015-12-17 Thread Ian Jackson
Signed-off-by: Ian Jackson --- README.dev | 101 1 file changed, 101 insertions(+) diff --git a/README.dev b/README.dev index 65ec111..879af60 100644 --- a/README.dev +++ b/README.dev @@ -232,3 +232,104 @@ probably are after a reboot)

[Xen-devel] [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting via last" warning

2015-12-17 Thread Ian Jackson
This warning appears when db_retry_abort is used, since 2b069b6c "Database locking: Perl: Retry all deadlocks in PostgreSQL". Signed-off-by: Ian Jackson --- Osstest.pm |1 + 1 file changed, 1 insertion(+) diff --git a/Osstest.pm b/Osstest.pm index c77d960..a398b1e 100644 --- a/Osstest.pm ++

[Xen-devel] [OSSTEST PATCH 2/9] mg-schema-test-database: Provide some timeouts which are better for testing

2015-12-17 Thread Ian Jackson
The default timeouts mean that after starting a test db queue daemon and a test db allocation attempt, we have to wait two minutes. Lower timeouts increase the risk that we might lose noncritical races and allocate resources to the `wrong' tasks. And they reduce the duration of an outage which wi

Re: [Xen-devel] [PATCH 0/4] xen/arm64: Emulate correctly the register {w, x}zr

2015-12-17 Thread Julien Grall
Hi Ian, On 11/12/15 15:28, Julien Grall wrote: > Hi all, > > This patch series aims to fix the emulation of register {w,x}zr for ARM64. > > A branch is available with all the patches applied: > > git://xenbits.xen.org/people/julieng/xen-unstable.git branch handle-xzr-v1 > > Regards, > > Julie

Re: [Xen-devel] [OSSTEST PATCH 1/9] README.dev: Document the blessings

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > Signed-off-by: Ian Jackson > --- >  README.dev |  101 > >  1 file changed, 101 insertions(+) > > diff --git a/README.dev b/README.dev > index 65ec111..879af60 100644 > --- a/README

Re: [Xen-devel] [OSSTEST PATCH 2/9] mg-schema-test-database: Provide some timeouts which are better for testing

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > The default timeouts mean that after starting a test db queue daemon > and a test db allocation attempt, we have to wait two minutes. > > Lower timeouts increase the risk that we might lose noncritical races > and allocate resources to the `w

Re: [Xen-devel] [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe previous local plan data

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > Whatever is in the user's cwd is unlikely to correspond to anything > real.  In principle it might be possible to obtain an official copy > from the real daemons, and massage it, or something, but that's a lot > of work. > > Instead, just rem

Re: [Xen-devel] [OSSTEST PATCH 4/9] mg-schema-test-database: Borrow shares properly

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > Signed-off-by: Ian Jackson > --- >  mg-schema-test-database |   14 -- >  1 file changed, 12 insertions(+), 2 deletions(-) > > diff --git a/mg-schema-test-database b/mg-schema-test-database > index a4cb732..4e0ee68 100755 > --- a/

Re: [Xen-devel] [OSSTEST PATCH 5/9] ms-planner: Improve an error message

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > I experienced this `die' due to mg-schema-test-database failing to > borrow shared hosts properly, and added this Dumper for debugging. > > I have not bothered to improve any of the other quite terse `die's in > ms-planner. > > Signed-off-by

[Xen-devel] [PATCH] xen/arm: vgic: Clarify some comments after 5d495f4

2015-12-17 Thread Julien Grall
Ian pointed out that the definition of "offset" and "appropriate boundary" in the comments added by "xen/arm: vgic: Optimize the way to store the target vCPU in the rank" were not cleared. Clarify them by explicitly mentionning the offset is in byte and the appropriate boundary is ITARGET/IROUTER

Re: [Xen-devel] [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting via last" warning

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > This warning appears when db_retry_abort is used, since 2b069b6c > "Database locking: Perl: Retry all deadlocks in PostgreSQL". Is the reason for not turning this into a return related to the fact this is within an eval, not a proper sub? But

Re: [Xen-devel] [OSSTEST PATCH 7/9] Executive DB retry: Avoid an undefined warning

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > If something other than the DB statements inside need_retry throws an > exception, ->err will normally be undef (because > $dbh_tests->begin_work will clear it, if nothing else). > > Signed-off-by: Ian Jackson Acked-by: Ian Campbell > ---

Re: [Xen-devel] [OSSTEST PATCH 9/9] mg-allocate: In planner mode, pre-check the arguments

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > Now, attempting to allocate a nonexistent host fails immediately with > a sensible message, rather than queueing up and then reporting the > message only later: > > mariner:testing.git> OSSTEST_CONFIG=/u/iwj/.xen-osstest/config:local- > confi

Re: [Xen-devel] [OSSTEST PATCH 8/9] mg-allocate: Better error handling when no candidates

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > Spot when our db search revealed no candidates for the resources to > allocate, and: >  - when doing an immediate allocation, call it an error >  - when doing a planned allocation, cause it to prevent allocation >    on this iteration, and pri

Re: [Xen-devel] [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe previous local plan data

2015-12-17 Thread Ian Jackson
Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe previous local plan data"): > Acked-by: Ian Campbell Thanks. > Would it make sense to remove data-projection.pl too? I suppose it isn't > consumed anywhere so is more or less harmless. Precisely. > OOI do these test m

Re: [Xen-devel] [PATCH 0/4] xen/arm64: Emulate correctly the register {w, x}zr

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:17 +, Julien Grall wrote: > Hi Ian, > > On 11/12/15 15:28, Julien Grall wrote: > > Hi all, > > > > This patch series aims to fix the emulation of register {w,x}zr for > > ARM64. > > > > A branch is available with all the patches applied: > > > > git://xenbits.xen.or

[Xen-devel] [xen-unstable-smoke test] 66464: tolerable all pass - PUSHED

2015-12-17 Thread osstest service owner
flight 66464 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/66464/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-xl 12 migrate-support-checkfail never pass test-armhf-armhf-xl 13

Re: [Xen-devel] [OSSTEST PATCH 4/9] mg-schema-test-database: Borrow shares properly

2015-12-17 Thread Ian Jackson
Ian Campbell writes ("Re: [OSSTEST PATCH 4/9] mg-schema-test-database: Borrow shares properly"): > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > >   # As we copy, we note everything we're not borrowing as > > - # belonging to the parent db. > > + # belonging to the parent db.  We b

Re: [Xen-devel] [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe previous local plan data

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:37 +, Ian Jackson wrote: > Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test-database: > Wipe previous local plan data"): > > Acked-by: Ian Campbell > > Thanks. > > > Would it make sense to remove data-projection.pl too? I suppose it > > isn't > > consumed

Re: [Xen-devel] [PATCH v2 02/10] pc: remove has_igd_gfx_passthru global

2015-12-17 Thread Eduardo Habkost
On Mon, Dec 14, 2015 at 12:39:34PM +0100, Gerd Hoffmann wrote: > Signed-off-by: Gerd Hoffmann > --- > hw/xen/xen_pt.h | 3 +-- > vl.c| 10 -- > 2 files changed, 1 insertion(+), 12 deletions(-) > > diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h > index c545280..6d8702b 100644

Re: [Xen-devel] [PATCH] x86/xsave: simplify xcomp_bv initialization

2015-12-17 Thread Andrew Cooper
On 17/12/15 16:58, Jan Beulich wrote: > This eliminates a number of pointless conditionals: Bits 0 and 1 of > xcomp_bv don't matter anyway, and as long as none of bits 2..62 are > set, setting bit 63 is pointless too. xcomp_bv[63] is the indication of whether the area is compressed or not. It wil

Re: [Xen-devel] [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting via last" warning

2015-12-17 Thread Ian Jackson
Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting via last" warning"): > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > > This warning appears when db_retry_abort is used, since 2b069b6c > > "Database locking: Perl: Retry all deadlocks in PostgreSQL". > > Is th

Re: [Xen-devel] [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe previous local plan data

2015-12-17 Thread Ian Jackson
Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe previous local plan data"): > On Thu, 2015-12-17 at 17:37 +, Ian Jackson wrote: > > If you don't run it as the same user, this is not a problem, because > > the default WebspaceFile has $HOME in it. > > Right, I shoul

Re: [Xen-devel] [OSSTEST PATCH 1/9] README.dev: Document the blessings

2015-12-17 Thread Ian Jackson
Ian Campbell writes ("Re: [OSSTEST PATCH 1/9] README.dev: Document the blessings"): > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > > +Each flight has a `blessing' and an `intended blessing'.  The > > +`intended blessing' is what the flight is going to be blessed as when > > +its executi

Re: [Xen-devel] [OSSTEST PATCH 4/9] mg-schema-test-database: Borrow shares properly

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:43 +, Ian Jackson wrote: > Ian Campbell writes ("Re: [OSSTEST PATCH 4/9] mg-schema-test > -database: Borrow shares properly"): > > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > > > # As we copy, we note everything we're not borrowing as > > > - # belonging t

Re: [Xen-devel] [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting via last" warning

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:48 +, Ian Jackson wrote: > Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an > "exiting via last" warning"): > > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > > > This warning appears when db_retry_abort is used, since 2b069b6c > > > "Databas

Re: [Xen-devel] [OSSTEST PATCH 3/9] mg-schema-test-database: Wipe previous local plan data

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:50 +, Ian Jackson wrote: > Ian Campbell writes ("Re: [OSSTEST PATCH 3/9] mg-schema-test > -database: Wipe previous local plan data"): > > On Thu, 2015-12-17 at 17:37 +, Ian Jackson wrote: > > > If you don't run it as the same user, this is not a problem, > because >

Re: [Xen-devel] [OSSTEST PATCH 1/9] README.dev: Document the blessings

2015-12-17 Thread Ian Campbell
On Thu, 2015-12-17 at 17:59 +, Ian Jackson wrote: > Ian Campbell writes ("Re: [OSSTEST PATCH 1/9] README.dev: Document > the blessings"): > > On Thu, 2015-12-17 at 17:06 +, Ian Jackson wrote: > > > +Each flight has a `blessing' and an `intended blessing'. The > > > +`intended blessing' is

Re: [Xen-devel] [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting via last" warning

2015-12-17 Thread Ian Jackson
Ian Campbell writes ("Re: [OSSTEST PATCH 6/9] db_retry: Suppress an "exiting via last" warning"): > On Thu, 2015-12-17 at 17:48 +, Ian Jackson wrote: > > Why would `return' be better ? It would still generate the same > > warning. Leaving the loop via `last' seems less heavyweight than > > u

[Xen-devel] [xen-4.5-testing test] 66426: tolerable FAIL - PUSHED

2015-12-17 Thread osstest service owner
flight 66426 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/66426/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 15 guest-localmigrate/x10 fail in 66395 pass in 66426 test-amd64-amd64-qe

[Xen-devel] [qemu-mainline test] 66433: tolerable FAIL - PUSHED

2015-12-17 Thread osstest service owner
flight 66433 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/66433/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds 11 guest-start fail like 65766 Tests which did not succeed,

[Xen-devel] [PATCH v2 2/2] x86/PCI: Intercept Dom0 MMCFG from dom0s in HVM containers

2015-12-17 Thread Boris Ostrovsky
Commit 9256f66c1606 ("x86/PCI: intercept all PV Dom0 MMCFG writes") added intercepts for writes to RO MMCFG space from PV dom0. Similar functionality is needed by dom0s in HVM containers (such as PVH and, in the future, HVMlite). Signed-off-by: Boris Ostrovsky --- xen/arch/x86/hvm/emulate.c

[Xen-devel] [PATCH v2 1/2] x86/mm: Add information about faulted page's presence to npfec structure

2015-12-17 Thread Boris Ostrovsky
This is provided explicitly in SVM and implicitly in VMX (when neither of the three EPT_EFFECTIVE_* bits is set). Signed-off-by: Boris Ostrovsky --- xen/arch/x86/hvm/svm/svm.c |3 ++- xen/arch/x86/hvm/vmx/vmx.c |5 - xen/include/xen/mm.h |1 + 3 files changed, 7 insertions(

[Xen-devel] [PATCH v2 0/2] Support of RO MMCFG access for PVH/HVMlite dom0s

2015-12-17 Thread Boris Ostrovsky
v2: * Expanded npfec structure to include page's precense indicator (I took the easy way out and didn't implement VMX's fine-grained status since I couldn't figure out how to properly do it in SVM) * s/mmio/mmcfg for some operations. I left mmio_ro_emulate_ctxt as is because it is used for no

Re: [Xen-devel] [RFC v1 0/8] x86/init: Linux linker tables

2015-12-17 Thread H. Peter Anvin
I think we can make this even more generic. In particular, I would love to see a solution for link tables that: a) can be used for any kind of data structures, not just function pointers (the latter is a specialization of the former); b) doesn't need any changes to the linker scripts once the ini

Re: [Xen-devel] [RFC v1 5/8] x86/init: move ebda reservations into linker table

2015-12-17 Thread Andy Lutomirski
On Tue, Dec 15, 2015 at 2:16 PM, Luis R. Rodriguez wrote: > From: "Luis R. Rodriguez" > > This lets us annotate its requirements specifically for > PC and lguest subarchitectures. While at it since head.c > just has ebda data rename it. Since we're using linker tables > and both x86 32-bit and 64

Re: [Xen-devel] [RFC v1 5/8] x86/init: move ebda reservations into linker table

2015-12-17 Thread Andy Lutomirski
On Thu, Dec 17, 2015 at 12:55 PM, H. Peter Anvin wrote: > On 12/17/15 12:48, Andy Lutomirski wrote: >> >> I'm entirely ignorant of anything going on in gPXE/iPXE. >> >> Can you explain what a linker table *does*? It looks like all you've >> done in this patch is to move code around. What actuall

Re: [Xen-devel] [RFC v1 5/8] x86/init: move ebda reservations into linker table

2015-12-17 Thread H. Peter Anvin
On 12/17/15 12:48, Andy Lutomirski wrote: > > I'm entirely ignorant of anything going on in gPXE/iPXE. > > Can you explain what a linker table *does*? It looks like all you've > done in this patch is to move code around. What actually happens? > A linker table is a data structure that is stit

[Xen-devel] [PATCH 2/4] build: Alloc space for sched list in the link file

2015-12-17 Thread Jonathan Creekmore
Creates a section to contain scheduler entry pointers that are gathered together into an array. This will allow, in a follow-on patch, scheduler entries to be automatically gathered together into the array for automatic parsing. CC: Ian Campbell CC: Stefano Stabellini CC: Keir Fraser CC: Jan Be

  1   2   >