Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Jan Beulich
>>> On 23.06.16 at 19:07, wrote: > --- a/xen/arch/x86/hvm/vmx/vmx.c > +++ b/xen/arch/x86/hvm/vmx/vmx.c > @@ -3373,10 +3373,39 @@ void vmx_vmexit_handler(struct cpu_user_regs *regs) > HVMTRACE_1D(TRAP_DEBUG, exit_qualification); > write_debugreg(6, exit_qualification | DR_

Re: [Xen-devel] [PATCH 0/3] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Dario Faggioli
On Fri, 2016-06-24 at 06:11 +, Wu, Feng wrote: > > -Original Message- > > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > > No, because we call cpu_disable_scheduler() from __cpu_disable(), > > only > > when system state is SYS_STATE_suspend already, and hence we take > > the

[Xen-devel] [xen-unstable test] 96178: tolerable FAIL - PUSHED

2016-06-24 Thread osstest service owner
flight 96178 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/96178/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-credit2 3 host-install(3) broken in 96151 pass in 96178 test-amd64-amd64-xl-qemut-stubdom-

Re: [Xen-devel] [PATCH v5 05/14] libxl: Load guest BIOS from file

2016-06-24 Thread Jan Beulich
>>> On 22.06.16 at 19:15, wrote: > --- a/tools/libxl/libxl_paths.c > +++ b/tools/libxl/libxl_paths.c > @@ -35,6 +35,16 @@ const char *libxl__run_dir_path(void) > return XEN_RUN_DIR; > } > > +const char *libxl__seabios_path(void) > +{ > +return SEABIOS_PATH; > +} > + > +const char *libx

Re: [Xen-devel] [PATCH v4 3/3] x86/ioreq server: Add HVMOP to map guest ram with p2m_ioreq_server to an ioreq server.

2016-06-24 Thread Yu Zhang
On 6/24/2016 2:12 PM, Jan Beulich wrote: On 24.06.16 at 06:16, wrote: I'm now willing to take your suggestions: a> still need the p2m resetting when ioreq server is unbounded; b> disable log dirty feature if one ioreq server is bounded. Does anyone else has different opinions? Thanks! Hmm,

[Xen-devel] [qemu-upstream-4.3-testing test] 96179: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96179 qemu-upstream-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/96179/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 5 libvirt-build fail REGR. vs. 80927 build-i

Re: [Xen-devel] [PATCH v5 08/14] hvmloader: Locate the BIOS blob

2016-06-24 Thread Jan Beulich
>>> On 22.06.16 at 19:15, wrote: > --- a/tools/firmware/hvmloader/hvmloader.c > +++ b/tools/firmware/hvmloader/hvmloader.c > @@ -253,10 +253,51 @@ static void acpi_enable_sci(void) > BUG_ON(!(pm1a_cnt_val & ACPI_PM1C_SCI_EN)); > } > > +const struct hvm_modlist_entry *get_module_entry( > +

Re: [Xen-devel] [PATCH v5 09/14] hvmloader: Check modules whereabouts in perform_tests

2016-06-24 Thread Jan Beulich
>>> On 22.06.16 at 19:15, wrote: > --- a/tools/firmware/hvmloader/tests.c > +++ b/tools/firmware/hvmloader/tests.c > @@ -20,6 +20,7 @@ > */ > > #include "util.h" > +#include "config.h" > > #define TEST_FAIL 0 > #define TEST_PASS 1 > @@ -189,6 +190,15 @@ static int shadow_gs_test(void) >

Re: [Xen-devel] [PATCH 1/2] xen: sched: rtds refactor code

2016-06-24 Thread Dario Faggioli
On Thu, 2016-06-23 at 11:42 +0100, George Dunlap wrote: > On 22/06/16 17:16, Meng Xu wrote: > >  > > I think he is trying to align those comments to make them start > > from > > the same column. I was confused at the reason at the very > > beginning. > > Then I pulled his repo and checked this chan

Re: [Xen-devel] [PATCH v5 10/14] hvmloader: Load SeaBIOS from hvm_start_info modules

2016-06-24 Thread Jan Beulich
>>> On 22.06.16 at 19:15, wrote: > ... and do not include the SeaBIOS ROM into hvmloader anymore. > > This also fix the dependency on roms.inc, hvmloader.o does not include it. > > Signed-off-by: Anthony PERARD Acked-by: Jan Beulich ___ Xen-devel

Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Razvan Cojocaru
On 06/23/2016 08:07 PM, Tamas K Lengyel wrote: > Since in-guest debug exceptions are now unconditionally trapped to Xen, adding > a hook for vm_event subscribers to tap into this new always-on guest event. We > rename along the way hvm_event_breakpoint_type to hvm_event_type to better > match the v

Re: [Xen-devel] [PATCH 0/3] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Friday, June 24, 2016 3:23 PM > To: Wu, Feng ; Jan Beulich > Cc: Tian, Kevin ; k...@xen.org; > george.dun...@eu.citrix.com; andrew.coop...@citrix.com; xen- > de...@lists.xen.org > Subject: Re: [Xen-dev

Re: [Xen-devel] [PATCH v4 3/3] x86/ioreq server: Add HVMOP to map guest ram with p2m_ioreq_server to an ioreq server.

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 09:12, wrote: > On 6/24/2016 2:12 PM, Jan Beulich wrote: >> In any event, I think log-dirty shouldn't be disabled when an >> ioreq server binds the type, but as long as there are outstanding >> entries of that type. That way, the "cannot be migrated" state >> of a VM has a chanc

Re: [Xen-devel] [PATCH v2 3/4] VMX: Assign the right value to 'NDST' field in a concern case

2016-06-24 Thread Wu, Feng
> -Original Message- > From: dunl...@gmail.com [mailto:dunl...@gmail.com] On Behalf Of George > Dunlap > Sent: Thursday, June 23, 2016 2:01 AM > To: Wu, Feng > Cc: xen-devel@lists.xen.org; Tian, Kevin ; Keir Fraser > ; Andrew Cooper ; Dario Faggioli > ; Jan Beulich > Subject: Re: [Xen-d

[Xen-devel] [PATCH v3 1/2] xen-pciback: return proper values during BAR sizing

2016-06-24 Thread Jan Beulich
Reads following writes with all address bits set to 1 should return all changeable address bits as one, not the BAR size (nor, as was the case for the upper half of 64-bit BARs, the high half of the region's end address). Presumably this didn't cause any problems so far because consumers use the va

[Xen-devel] [PATCH] init: fix build with older gcc

2016-06-24 Thread Jan Beulich
__setup_str is used on arrays of char, so there aren't any relocatable items. Hence __initconst has to be used here, not __initconstrel. Whatever led to the revert of commit 59b151d2c0 (the original version of a6066af5b1 "xen/init: Annotate all command line parameter infrastructure as const" must

Re: [Xen-devel] [PATCH 7/7] vm-event/arm: implement support for control-register write vm-events

2016-06-24 Thread Corneliu ZUZU
On 6/23/2016 2:11 PM, Julien Grall wrote: Hello, On 23/06/16 06:49, Corneliu ZUZU wrote: On 6/23/2016 8:31 AM, Corneliu ZUZU wrote: On 6/22/2016 10:41 PM, Julien Grall wrote: On 22/06/2016 20:37, Corneliu ZUZU wrote: I've also realized that it's a bit complicated to avoid writing HCR from

Re: [Xen-devel] [PATCH] init: fix build with older gcc

2016-06-24 Thread Andrew Cooper
On 24/06/16 10:29, Jan Beulich wrote: > __setup_str is used on arrays of char, so there aren't any relocatable > items. Hence __initconst has to be used here, not __initconstrel. > > Whatever led to the revert of commit 59b151d2c0 (the original version > of a6066af5b1 "xen/init: Annotate all comman

[Xen-devel] [linux-4.1 test] 96183: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96183 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/96183/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 11 guest-start fail REGR. vs. 95848 Tests which are failing

Re: [Xen-devel] [PATCH v4 3/3] x86/ioreq server: Add HVMOP to map guest ram with p2m_ioreq_server to an ioreq server.

2016-06-24 Thread Yu Zhang
On 6/24/2016 4:01 PM, Jan Beulich wrote: On 24.06.16 at 09:12, wrote: On 6/24/2016 2:12 PM, Jan Beulich wrote: In any event, I think log-dirty shouldn't be disabled when an ioreq server binds the type, but as long as there are outstanding entries of that type. That way, the "cannot be migrat

Re: [Xen-devel] Xen on QEMU

2016-06-24 Thread George Dunlap
On Mon, Jun 20, 2016 at 9:00 AM, Fadwa Messaoudi wrote: > Hi, > is it possible to install Xen on QEMU , and if so could you send me a > details tutorial on how to do it. Did you try it? Also, you might want to read this: http://wiki.xenproject.org/wiki/Asking_Developer_Questions Good luck, -G

[Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread Jan Beulich
A long while back separating out all control kind operations (intended for use by only the control domain or device model) from the currect hvmop hypercall has been discussed. This series aims at finally making this reality (at once allowing to streamline the associated XSM checking). 01: public /

Re: [Xen-devel] [PATCH v1 Altp2m cleanup 2/3] Move altp2m specific functions to altp2m files.

2016-06-24 Thread George Dunlap
On Tue, Jun 21, 2016 at 5:04 PM, Paul Lai wrote: > Move altp2m specific functions to altp2m files. This makes the code > a little easier to read. > > Signed-off-by: Paul Lai > --- > xen/arch/x86/mm/altp2m.c | 43 > +++ > xen/arch/x86/mm/hap/hap.c

Re: [Xen-devel] [PATCH v4 3/3] x86/ioreq server: Add HVMOP to map guest ram with p2m_ioreq_server to an ioreq server.

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 11:57, wrote: > On 6/24/2016 4:01 PM, Jan Beulich wrote: > On 24.06.16 at 09:12, wrote: >>> On 6/24/2016 2:12 PM, Jan Beulich wrote: And then, thinking about it again especially in the context of the hvmctl series - the unbinding of the type is happening in a

Re: [Xen-devel] [PATCH 0/3] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Dario Faggioli
On Fri, 2016-06-24 at 07:59 +, Wu, Feng wrote: > > -Original Message- > > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > > So, vCPU 3 was running, but then some called stop_machine_run(), > > which > > causes the descheduling of vCPU 3, and the execution of the > > stopmachin

[Xen-devel] [PATCH v2 01/11] public / x86: introduce hvmctl hypercall

2016-06-24 Thread Jan Beulich
... as a means to replace all HVMOP_* which a domain can't issue on itself (i.e. intended for use by only the control domain or device model). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu --- v2: Widen cmd field to 32 bits and opaque one to 64. Drop HVMCTL_iter_*. --- a/xen/arch/x86/hvm/

[Xen-devel] [PATCH v2 02/11] hvmctl: convert HVMOP_set_pci_intx_level

2016-06-24 Thread Jan Beulich
Note that this adds validation of the "domain" interface structure field, which previously got ignored. Note further that this retains the hvmop interface definitions as those had (wrongly) been exposed to non-tool stack consumers (albeit the operation wouldn't have succeeded when requested by a d

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread David Vrabel
On 24/06/16 11:21, Jan Beulich wrote: > A long while back separating out all control kind operations (intended > for use by only the control domain or device model) from the currect > hvmop hypercall has been discussed. This series aims at finally making > this reality (at once allowing to streamli

Re: [Xen-devel] [PATCH] xen/arm: map_dev_mmio_region: The iomem permission check should be done on MFN

2016-06-24 Thread Julien Grall
Hi, Ping? Cheers, On 14/06/16 12:50, Julien Grall wrote: The helper iomem_access_permitted expects MFNs in parameters and not GNFs. Thankfully only the hardware domain can call this function and it will always be with GFNS == MFNs for now. Also, fix the printf to use the MFN range and not the

[Xen-devel] [PATCH v2 03/11] hvmctl: convert HVMOP_set_isa_irq_level

2016-06-24 Thread Jan Beulich
Note that this retains the hvmop interface definitions as those had (wrongly) been exposed to non-tool stack consumers (albeit the operation wouldn't have succeeded when requested by a domain for itself). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/li

Re: [Xen-devel] [PATCH v2 0/4] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Dario Faggioli
On Fri, 2016-06-24 at 06:33 +, Wu, Feng wrote: > > -Original Message- > > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > > In your case, AFAICUI, it's: > >  - the vCPU should block, waiting for an event > >  - the event is _not_ arrived, so we indeed should block > >  - we do

[Xen-devel] [PATCH v2 04/11] hvmctl: convert HVMOP_set_pci_link_route

2016-06-24 Thread Jan Beulich
Note that this retains the hvmop interface definitions as those had (wrongly) been exposed to non-tool stack consumers (albeit the operation wouldn't have succeeded when requested by a domain for itself). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/li

[Xen-devel] [PATCH v2 06/11] hvmctl: convert HVMOP_modified_memory

2016-06-24 Thread Jan Beulich
Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of the previous 64-bit parameter got ignore so far). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/libxc/include/xenctrl.h +++ b/tools/libxc/include/xenctrl.h @@ -1620,7 +1620,7 @@ int x

[Xen-devel] [PATCH v2 05/11] hvmctl: convert HVMOP_track_dirty_vram

2016-06-24 Thread Jan Beulich
Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of the previous 64-bit parameter got ignore so far). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/libxc/include/xenctrl.h +++ b/tools/libxc/include/xenctrl.h @@ -1613,7 +1613,7 @@ int x

[Xen-devel] [PATCH v2 07/11] hvmctl: convert HVMOP_set_mem_type

2016-06-24 Thread Jan Beulich
This allows elimination of the (ab)use of the high operation number bits for encoding continuations. Also limiting "nr" at the libxc level to 32 bits (the high 32 bits of the previous 64-bit parameter got ignore so far). Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper

[Xen-devel] [PATCH v2 08/11] hvmctl: convert HVMOP_inject_trap

2016-06-24 Thread Jan Beulich
Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/libxc/xc_misc.c +++ b/tools/libxc/xc_misc.c @@ -584,31 +584,15 @@ int xc_hvm_inject_trap( uint32_t type, uint32_t error_code, uint32_t insn_len, uint64_t cr2) { -DECLARE_HYPERCALL_BUFFER(struct

[Xen-devel] [PATCH v2 09/11] hvmctl: convert HVMOP_inject_msi

2016-06-24 Thread Jan Beulich
Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Andrew Cooper --- a/tools/libxc/xc_misc.c +++ b/tools/libxc/xc_misc.c @@ -508,27 +508,11 @@ int xc_hvm_set_pci_link_route( int xc_hvm_inject_msi( xc_interface *xch, domid_t dom, uint64_t addr, uint32_t data) { -DECLARE_HYPE

[Xen-devel] [PATCH v2 10/11] hvmctl: convert HVMOP_*ioreq_server*

2016-06-24 Thread Jan Beulich
Note that we can't adjust HVM_IOREQSRV_BUFIOREQ_* to properly obey name space rules, as these constants as in use by callers of the libxc interface. Signed-off-by: Jan Beulich Reviewed-by: Wei Liu Reviewed-by: Paul Durrant Reviewed-by: Andrew Cooper --- a/tools/libxc/include/xenctrl.h +++ b/t

[Xen-devel] [PATCH v2 11/11] x86/HVM: serialize trap injecting producer and consumer

2016-06-24 Thread Jan Beulich
Since injection works on a remote vCPU, and since there's no enforcement of the subject vCPU being paused, there's a potential race between the producing and consuming sides. Fix this by leveraging the vector field as synchronization variable. Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 12:29, wrote: > On 24/06/16 11:21, Jan Beulich wrote: >> A long while back separating out all control kind operations (intended >> for use by only the control domain or device model) from the currect >> hvmop hypercall has been discussed. This series aims at finally making >> th

Re: [Xen-devel] [PATCH] xen: x86: remove duplicated MSR_IA32_FEATURE_CONTROL definition

2016-06-24 Thread Huang, Kai
On 6/22/2016 11:44 PM, Jan Beulich wrote: On 22.06.16 at 12:17, wrote: @@ -288,7 +289,6 @@ #define MSR_IA32_PLATFORM_ID 0x0017 #define MSR_IA32_EBL_CR_POWERON0x002a #define MSR_IA32_EBC_FREQUENCY_ID 0x002c -#define MSR_IA32_FEATURE_CONTROL 0

[Xen-devel] [xen-unstable-smoke test] 96210: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96210 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/96210/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl 6 xen-boot fail REGR. vs. 96189 Tests which di

[Xen-devel] [PATCH] xen: x86: remove duplicated IA32_FEATURE_CONTROL MSR macro

2016-06-24 Thread kaih . linux
From: Kai Huang Below commit introduced a new macro MSR_IA32_FEATURE_CONTROL for IA32_FEATURE_CONTROL MSR but it didn't remove old IA32_FEATURE_CONTROL_MSR macro. The new one has better naming convention, so remove the old as duplication and replace the relevant code with new one. mwait-idle

Re: [Xen-devel] [PATCH] xen: x86: remove duplicated IA32_FEATURE_CONTROL MSR macro

2016-06-24 Thread Tian, Kevin
> From: kaih.li...@gmail.com [mailto:kaih.li...@gmail.com] > Sent: Friday, June 24, 2016 6:45 PM > > From: Kai Huang > > Below commit introduced a new macro MSR_IA32_FEATURE_CONTROL for > IA32_FEATURE_CONTROL MSR but it didn't remove old IA32_FEATURE_CONTROL_MSR > macro. The new one has better n

[Xen-devel] [linux-3.18 test] 96188: tolerable FAIL - PUSHED

2016-06-24 Thread osstest service owner
flight 96188 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/96188/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail in 96161 pass in 96188 test-amd64-amd6

Re: [Xen-devel] [PATCH v5 1/9] vm_event: clear up return value of vm_event_monitor_traps

2016-06-24 Thread Tian, Kevin
> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] > Sent: Saturday, June 18, 2016 3:09 AM > > On Thu, Jun 2, 2016 at 4:52 PM, Tamas K Lengyel wrote: > > The return value has not been clearly defined, with the function > > never returning 0 which seemingly indicated a condition where the > > gu

Re: [Xen-devel] [PATCH v6 4/5] vm_event: clear up return value of vm_event_monitor_traps

2016-06-24 Thread Tian, Kevin
> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] > Sent: Friday, June 24, 2016 1:07 AM > > The return value has not been clearly defined, with the function > never returning 0 which seemingly indicated a condition where the > guest should crash. > > In this patch we define -rc as error condit

Re: [Xen-devel] monitor access to pages with a specific p2m_type_t

2016-06-24 Thread George Dunlap
On Wed, Jun 22, 2016 at 12:38 PM, sepanta s wrote: > Hi, > Is it possible to monitor the access on the pages withp2m_type_t > p2m_ram_shared? cc'ing Tamas and Razvan -George ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-

Re: [Xen-devel] [PATCH] get_maintainer.pl: Teach brace expansion

2016-06-24 Thread George Dunlap
On Wed, Jun 22, 2016 at 6:28 PM, Anthony PERARD wrote: > This only implement a simpler non-nested brace expansion. > > This will convert brace expansion style use in MAINTAINER into a regex > that get_maintainer.pl can use to match a path again a maintainer > section. > > It is done by using two d

Re: [Xen-devel] Change of max-ram-below-4g initial value breaks Xen

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 07:46:23AM +0200, Gerd Hoffmann wrote: > On Do, 2016-06-23 at 17:18 +0100, Anthony PERARD wrote: > > On Thu, Jun 23, 2016 at 04:57:54PM +0200, Gerd Hoffmann wrote: > > > Hi, > > > > > > > How could xen_ram_init() find out if the value of max-ram-below-4g is > > > > the de

Re: [Xen-devel] monitor access to pages with a specific p2m_type_t

2016-06-24 Thread Razvan Cojocaru
On 06/24/2016 02:05 PM, George Dunlap wrote: > On Wed, Jun 22, 2016 at 12:38 PM, sepanta s wrote: >> Hi, >> Is it possible to monitor the access on the pages withp2m_type_t >> p2m_ram_shared? > > cc'ing Tamas and Razvan Thanks for the CC. Judging by the "if ( npfec.write_access && (p2mt == p2m_r

Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Tian, Kevin
> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] > Sent: Friday, June 24, 2016 1:07 AM > > diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c > index 03fcba7..4b69ca6 100644 > --- a/xen/arch/x86/hvm/vmx/vmx.c > +++ b/xen/arch/x86/hvm/vmx/vmx.c > @@ -3373,10 +3373,39 @@ void v

Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 13:20, wrote: >> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] >> Sent: Friday, June 24, 2016 1:07 AM >> >> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c >> index 03fcba7..4b69ca6 100644 >> --- a/xen/arch/x86/hvm/vmx/vmx.c >> +++ b/xen/arch/x86/hvm/

Re: [Xen-devel] [PATCH v12 1/6] IOMMU: add a timeout parameter for device IOTLB invalidation

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > The parameter 'iommu_dev_iotlb_timeout' specifies the timeout > of device IOTLB invalidation in milliseconds. By default, the > timeout is 1000 milliseconds, which can be boot-time changed. > > We also confirmed with V

Re: [Xen-devel] [PATCH] xen: x86: remove duplicated IA32_FEATURE_CONTROL MSR macro

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 12:56, wrote: >> From: kaih.li...@gmail.com [mailto:kaih.li...@gmail.com] >> Sent: Friday, June 24, 2016 6:45 PM >> --- a/xen/include/asm-x86/msr-index.h >> +++ b/xen/include/asm-x86/msr-index.h >> @@ -133,12 +133,13 @@ >> #define MSR_IA32_VMX_TRUE_EXIT_CTLS 0x48f

Re: [Xen-devel] [PATCH v12 2/6] vt-d: synchronize for Device-TLB flush one by one

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > Today we do Device-TLB flush synchronization after issuing flush > requests for all ATS devices belonging to a VM. Doing so however > imposes a limitation, i.e. that we can not figure out which flush > request is blocke

Re: [Xen-devel] [PATCH] get_maintainer.pl: Teach brace expansion

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 12:09:53PM +0100, George Dunlap wrote: > On Wed, Jun 22, 2016 at 6:28 PM, Anthony PERARD > wrote: > > This only implement a simpler non-nested brace expansion. > > > > This will convert brace expansion style use in MAINTAINER into a regex > > that get_maintainer.pl can use

Re: [Xen-devel] [PATCH v12 3/6] vt-d: convert conditionals of qi_ctrl->qinval_maddr into ASSERT()s

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > QI ought to have got disabled if any of the IOMMU table setup > failed. A QI function (other than enable_qinval) is unreachable > when qi_ctrl->qinval_maddr is zero. > > Signed-off-by: Quan Xu Acked-by: Kevin Tian

[Xen-devel] [PATCH] xen: fix ram init regression

2016-06-24 Thread Gerd Hoffmann
Commit "8156d48 pc: allow raising low memory via max-ram-below-4g option" causes a regression on xen, because it uses a different memory split. This patch initializes max-ram-below-4g to zero and leaves the initialization to the memory initialization functions. That way they can pick different de

Re: [Xen-devel] [PATCH 1/2] xen: sched: rtds refactor code

2016-06-24 Thread Meng Xu
On Fri, Jun 24, 2016 at 3:45 AM, Dario Faggioli wrote: > On Thu, 2016-06-23 at 11:42 +0100, George Dunlap wrote: >> On 22/06/16 17:16, Meng Xu wrote: >> > >> > I think he is trying to align those comments to make them start >> > from >> > the same column. I was confused at the reason at the very >

Re: [Xen-devel] pcie error containment: kill domain and dm without xend

2016-06-24 Thread George Dunlap
On Wed, Jun 22, 2016 at 9:16 PM, Elena Ufimtseva wrote: > Hello > > I am working on PCIe errors containment and XSA-124 relevant problem. > This is only small part of the problem and I can provide more details later > if that is of someone's interest. > As the temporary solution, guest domain with

Re: [Xen-devel] [PATCH v12 4/6] IOMMU/x86: using a struct pci_dev* instead of SBDF

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > a struct pci_dev* instead of SBDF is stored inside struct > pci_ats_dev and parameter to enable_ats_device(). > > Signed-off-by: Quan Xu Can we unify the naming convention throughout the patch, e.g. always using ats

Re: [Xen-devel] [PATCH v12 5/6] IOMMU: move the domain crash logic up to the generic IOMMU layer

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > Signed-off-by: Quan Xu > > CC: Julien Grall > CC: Kevin Tian > CC: Feng Wu > CC: Jan Beulich > CC: Suravee Suthikulpanit > --- > xen/drivers/passthrough/iommu.c | 30 > -- > xen/d

Re: [Xen-devel] [PATCH v12 6/6] vt-d: fix vt-d Device-TLB flush timeout issue

2016-06-24 Thread Tian, Kevin
> From: Xu, Quan > Sent: Friday, June 24, 2016 1:52 PM > > From: Quan Xu > > If Device-TLB flush timed out, we hide the target ATS device > immediately and crash the domain owning this ATS device. If > impacted domain is hardware domain, just throw out a warning. > > By hiding the device, we ma

Re: [Xen-devel] [PATCH v12 6/6] vt-d: fix vt-d Device-TLB flush timeout issue

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 13:55, wrote: >> --- a/xen/drivers/passthrough/pci.c >> +++ b/xen/drivers/passthrough/pci.c >> @@ -419,7 +419,7 @@ static void free_pdev(struct pci_seg *pseg, struct >> pci_dev *pdev) >> xfree(pdev); >> } >> >> -static void _pci_hide_device(struct pci_dev *pdev) >> +void

Re: [Xen-devel] [PATCH 0/3] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Wu, Feng
> > Thanks for your replay. Yes, I think this is point. Here descheduling > > of vCPU3 > > happens, and the reason we will choose the tasklet as the next > > running > > unit for sure (not choosing another vCPU or vCPU3 itself as the next > > running unit) is because tasklet will overrides all othe

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread David Vrabel
On 24/06/16 11:35, Jan Beulich wrote: On 24.06.16 at 12:29, wrote: >> On 24/06/16 11:21, Jan Beulich wrote: >>> A long while back separating out all control kind operations (intended >>> for use by only the control domain or device model) from the currect >>> hvmop hypercall has been discusse

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 15:27, wrote: > On 24/06/16 11:35, Jan Beulich wrote: > On 24.06.16 at 12:29, wrote: >>> On 24/06/16 11:21, Jan Beulich wrote: A long while back separating out all control kind operations (intended for use by only the control domain or device model) from the curre

Re: [Xen-devel] [PATCH v2 0/4] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Friday, June 24, 2016 6:29 PM > To: Wu, Feng ; xen-devel@lists.xen.org > Cc: k...@xen.org; Tian, Kevin ; jbeul...@suse.com; > andrew.coop...@citrix.com; george.dun...@eu.citrix.com; > konrad.w...@oracle

[Xen-devel] [xen-unstable-smoke test] 96214: tolerable all pass - PUSHED

2016-06-24 Thread osstest service owner
flight 96214 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/96214/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH v2 0/4] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread George Dunlap
On 24/06/16 14:42, Wu, Feng wrote: > > >> -Original Message- >> From: Dario Faggioli [mailto:dario.faggi...@citrix.com] >> Sent: Friday, June 24, 2016 6:29 PM >> To: Wu, Feng ; xen-devel@lists.xen.org >> Cc: k...@xen.org; Tian, Kevin ; jbeul...@suse.com; >> andrew.coop...@citrix.com; geor

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread David Vrabel
On 24/06/16 14:37, Jan Beulich wrote: On 24.06.16 at 15:27, wrote: >> On 24/06/16 11:35, Jan Beulich wrote: >> On 24.06.16 at 12:29, wrote: On 24/06/16 11:21, Jan Beulich wrote: > A long while back separating out all control kind operations (intended > for use by only the co

Re: [Xen-devel] [PATCH v3 7/8] xen/arm: Rework the interface of p2m_lookup and use typesafe gfn and mfn

2016-06-24 Thread Julien Grall
Hi Stefano, On 23/06/16 15:14, Stefano Stabellini wrote: On Tue, 21 Jun 2016, Julien Grall wrote: The prototype and the declaration of p2m_lookup disagree on how the function should be used. One expect a frame number whilst the other an address. Thankfully, everyone is using with an address to

[Xen-devel] [GIT PULL] xen: bug fixes for 4.7-rc4

2016-06-24 Thread David Vrabel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.7b-rc4-tag xen: bug fixes for 4.7-rc4 - - Fix x86 PV dom0 crash during early boot on some hardware. - - Fix two pciback bugs affects

Re: [Xen-devel] [PATCH v3 7/8] xen/arm: Rework the interface of p2m_lookup and use typesafe gfn and mfn

2016-06-24 Thread Andrew Cooper
On 24/06/16 14:58, Julien Grall wrote: > Hi Stefano, > > On 23/06/16 15:14, Stefano Stabellini wrote: >> On Tue, 21 Jun 2016, Julien Grall wrote: >>> The prototype and the declaration of p2m_lookup disagree on how the >>> function should be used. One expect a frame number whilst the other >>> an ad

Re: [Xen-devel] [PATCH v3 1/2] xen-pciback: return proper values during BAR sizing

2016-06-24 Thread David Vrabel
On 24/06/16 10:13, Jan Beulich wrote: > Reads following writes with all address bits set to 1 should return all > changeable address bits as one, not the BAR size (nor, as was the case > for the upper half of 64-bit BARs, the high half of the region's end > address). Presumably this didn't cause an

[Xen-devel] [ovmf test] 96196: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96196 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/96196/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 94748 test-amd64-amd64-

Re: [Xen-devel] [PATCH v5 05/14] libxl: Load guest BIOS from file

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 01:23:19AM -0600, Jan Beulich wrote: > >>> On 22.06.16 at 19:15, wrote: > > --- a/tools/libxl/libxl_paths.c > > +++ b/tools/libxl/libxl_paths.c > > @@ -35,6 +35,16 @@ const char *libxl__run_dir_path(void) > > return XEN_RUN_DIR; > > } > > > > +const char *libxl__sea

[Xen-devel] Binary compatibility report for Xen base libraries

2016-06-24 Thread Ponomarenko Andrey
Hello, I maintain a new project for backward compatibility analysis of the Linux ABIs. The report for Xen base libraries has been recently added to the project: http://abi-laboratory.pro/tracker/timeline/xen/ The report is generated daily with the help of the abi-compliance-checker, abi-dumper

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread Jan Beulich
>>> On 24.06.16 at 15:51, wrote: > On 24/06/16 14:37, Jan Beulich wrote: > On 24.06.16 at 15:27, wrote: >>> On 24/06/16 11:35, Jan Beulich wrote: >>> On 24.06.16 at 12:29, wrote: > On 24/06/16 11:21, Jan Beulich wrote: >> A long while back separating out all control kind operatio

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread George Dunlap
On 24/06/16 15:25, Jan Beulich wrote: On 24.06.16 at 15:51, wrote: >> On 24/06/16 14:37, Jan Beulich wrote: >> On 24.06.16 at 15:27, wrote: On 24/06/16 11:35, Jan Beulich wrote: On 24.06.16 at 12:29, wrote: >> On 24/06/16 11:21, Jan Beulich wrote: >>> A long while

Re: [Xen-devel] [PATCH v2 0/4] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-06-24 Thread Dario Faggioli
On Fri, 2016-06-24 at 14:49 +0100, George Dunlap wrote: > On 24/06/16 14:42, Wu, Feng wrote: > > Here is my understanding, if the guest has nothing to do, it will > > call HLT, and Xen hypervisor will call vcpu_block(), if we don't > > block the vCPU and return to guest, guest will continue to run

Re: [Xen-devel] Binary compatibility report for Xen base libraries

2016-06-24 Thread Doug Goldstein
On 6/24/16 9:21 AM, Ponomarenko Andrey wrote: > Hello, > > I maintain a new project for backward compatibility analysis of the Linux > ABIs. The report for Xen base libraries has been recently added to the > project: http://abi-laboratory.pro/tracker/timeline/xen/ > > The report is generated da

Re: [Xen-devel] [PATCH 13/17 v3] xen: move FLASK entry under XSM in Kconfig

2016-06-24 Thread Doug Goldstein
On 6/21/16 12:09 PM, Daniel De Graaf wrote: > Since enabling XSM is required to enable FLASK, place the option for > FLASK below the one for XSM. In addition, since it does not make sense > to enable XSM without any XSM providers, and FLASK is the only XSM > provider, hide the option to disable FL

Re: [Xen-devel] [PATCH v2 2/2] xen-pciback: clean up {bar, rom}_init()

2016-06-24 Thread David Vrabel
On 07/06/16 07:31, Jan Beulich wrote: > - drop unused function parameter of read_dev_bar() > - drop rom_init() (now identical to bar_init()) > - fold read_dev_bar() into its now single caller > - simplify determination of 64-bit memory resource > - use const and unsigned Please split this in 5 sep

Re: [Xen-devel] [PATCH v2 00/11] hvmctl hypercall

2016-06-24 Thread David Vrabel
On 24/06/16 15:25, Jan Beulich wrote: > > And then - what's your expectation? Any parts of this new > interface can subsequently be marked stable if we so wish. I > don't see why this needs to happen right away. Ok. David ___ Xen-devel mailing list Xe

Re: [Xen-devel] pcie error containment: kill domain and dm without xend

2016-06-24 Thread Elena Ufimtseva
Thanks George! On Fri, Jun 24, 2016 at 4:37 AM, George Dunlap wrote: > On Wed, Jun 22, 2016 at 9:16 PM, Elena Ufimtseva wrote: >> Hello >> >> I am working on PCIe errors containment and XSA-124 relevant problem. >> This is only small part of the problem and I can provide more details later >> i

Re: [Xen-devel] [PATCH v1 Altp2m cleanup 1/3] altp2m cleanup work

2016-06-24 Thread Lai, Paul C
[Paul] inlined -Original Message- From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, June 23, 2016 11:19 PM To: Lai, Paul C Cc: Sahita, Ravi ; xen-devel Subject: RE: [PATCH v1 Altp2m cleanup 1/3] altp2m cleanup work >>> On 23.06.16 at 20:23, wrote: First of all - pleas

Re: [Xen-devel] monitor access to pages with a specific p2m_type_t

2016-06-24 Thread Tamas K Lengyel
On Jun 24, 2016 05:19, "Razvan Cojocaru" wrote: > > On 06/24/2016 02:05 PM, George Dunlap wrote: > > On Wed, Jun 22, 2016 at 12:38 PM, sepanta s wrote: > >> Hi, > >> Is it possible to monitor the access on the pages withp2m_type_t > >> p2m_ram_shared? > > > > cc'ing Tamas and Razvan > > Thanks fo

[Xen-devel] [libvirt test] 96204: regressions - FAIL

2016-06-24 Thread osstest service owner
flight 96204 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/96204/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 96157 Tests which

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Julien Grall
Hello Daniel, Please try to CC relevant maintainers on your patch. I would have missed it if Andrew did not ping me on IRC. On 20/06/16 15:04, Daniel De Graaf wrote: This adds a Kconfig option and support for including the XSM policy from tools/flask/policy in the hypervisor so that the bootl

Re: [Xen-devel] [PATCH v6 5/5] x86/vm_event: Add HVM debug exception vm_events

2016-06-24 Thread Tamas K Lengyel
On Fri, Jun 24, 2016 at 5:24 AM, Jan Beulich wrote: On 24.06.16 at 13:20, wrote: >>> From: Tamas K Lengyel [mailto:ta...@tklengyel.com] >>> Sent: Friday, June 24, 2016 1:07 AM >>> >>> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c >>> index 03fcba7..4b69ca6 100644 >>>

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Konrad Rzeszutek Wilk
On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: > Hello Daniel, > > Please try to CC relevant maintainers on your patch. I would have missed it > if Andrew did not ping me on IRC. > > On 20/06/16 15:04, Daniel De Graaf wrote: > >This adds a Kconfig option and support for including t

Re: [Xen-devel] [PATCH v5 08/14] hvmloader: Locate the BIOS blob

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 01:33:45AM -0600, Jan Beulich wrote: > >>> On 22.06.16 at 19:15, wrote: > > --- a/tools/firmware/hvmloader/hvmloader.c > > +++ b/tools/firmware/hvmloader/hvmloader.c > > @@ -253,10 +253,51 @@ static void acpi_enable_sci(void) > > BUG_ON(!(pm1a_cnt_val & ACPI_PM1C_SCI_E

Re: [Xen-devel] [PATCH v5 09/14] hvmloader: Check modules whereabouts in perform_tests

2016-06-24 Thread Anthony PERARD
On Fri, Jun 24, 2016 at 01:44:30AM -0600, Jan Beulich wrote: > >>> On 22.06.16 at 19:15, wrote: > > +uint64_t cmdline_paddr = modlist[i].cmdline_paddr; > > + > > +if ( check_test_overlap(modlist[i].paddr, modlist[i].size) ) > > +{ > > +printf("Skipping tests due

[Xen-devel] Announcing schedbench, a scheduling micro-benchmark

2016-06-24 Thread George Dunlap
Hey all, I think I'm ready to publicly announce a project I've been working on for a few months called schedbench, a "microbenchmark" for schedulers (and the Xen scheduler in particular). You can find the code, along with a quick README, here: https://github.com/gwd/schedbench This is definitel

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Daniel De Graaf
On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: Hello Daniel, Please try to CC relevant maintainers on your patch. I would have missed it if Andrew did not ping me on IRC. On 20/06/16 15:04, Daniel De Graaf wrote: This adds a

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Konrad Rzeszutek Wilk
On Fri, Jun 24, 2016 at 01:34:29PM -0400, Daniel De Graaf wrote: > On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: > >On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: > >>Hello Daniel, > >> > >>Please try to CC relevant maintainers on your patch. I would have missed it > >>if Andr

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Konrad Rzeszutek Wilk
On Fri, Jun 24, 2016 at 01:34:29PM -0400, Daniel De Graaf wrote: > On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: > >On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: > >>Hello Daniel, > >> > >>Please try to CC relevant maintainers on your patch. I would have missed it > >>if Andr

Re: [Xen-devel] [PATCH 17/17] xsm: add a default policy to .init.data

2016-06-24 Thread Daniel De Graaf
On 06/24/2016 01:40 PM, Konrad Rzeszutek Wilk wrote: On Fri, Jun 24, 2016 at 01:34:29PM -0400, Daniel De Graaf wrote: On 06/24/2016 12:50 PM, Konrad Rzeszutek Wilk wrote: On Fri, Jun 24, 2016 at 05:30:32PM +0100, Julien Grall wrote: Hello Daniel, Please try to CC relevant maintainers on your

  1   2   >