Re: [Xen-devel] Ping: [PATCH v2 01/11] public / x86: introduce hvmctl hypercall

2016-07-04 Thread Jan Beulich
>>> On 01.07.16 at 18:42, wrote: > On 01/07/16 17:18, Jan Beulich wrote: > On 24.06.16 at 12:28, wrote: >>> ... as a means to replace all HVMOP_* which a domain can't issue on >>> itself (i.e. intended for use by only the control domain or device >>> model). >>> >>> Signed-off-by: Jan Beulich

Re: [Xen-devel] [PATCH] x86: use gcc6'es flags asm() output support

2016-07-04 Thread Jan Beulich
>>> On 01.07.16 at 18:51, wrote: > On 01/07/16 17:10, Jan Beulich wrote: > On 01.07.16 at 17:38, wrote: >>> As for interleaving inside the asm statement itself, we already have >>> precedent for that with the HAVE_GAS_* predicates. It would make the >>> patch rather larger, but might end up

[Xen-devel] [distros-debian-stretch test] 66512: trouble: blocked/broken

2016-07-04 Thread Platform Team regression test user
flight 66512 distros-debian-stretch real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66512/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-pvops 4 capture-logs !broken

Re: [Xen-devel] Xen 4.6 script calling conventions

2016-07-04 Thread John Nemeth
On Jul 2, 12:40pm, Wei Liu wrote: } On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote: } > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for } > use with NetBSD. I have it mostly done; however, when I try to } > create a domU, libxl goes into an infinite loop calling the sc

Re: [Xen-devel] [PATCH] x86/VT-x: Dump VMCS on VMLAUNCH/VMRESUME failure

2016-07-04 Thread Jan Beulich
>>> On 01.07.16 at 19:52, wrote: > If a VMLAUNCH/VMRESUME fails due to invalid control or host state, dump the > VMCS before crashing the domain. > > Signed-off-by: Andrew Cooper Good idea: Reviewed-by: Jan Beulich ___ Xen-devel mailing list Xen-de

[Xen-devel] [PATCH v14 0/3] VT-d Device-TLB flush issue

2016-07-04 Thread Xu, Quan
From: Quan Xu these patches fix current timeout concern and also allow limited ATS support. these patches are the rest ones: 1. move the domain crash logic up to the generic IOMMU layer 2. If Device-TLB flush timed out, we hide the target ATS device immediately. By hiding the device, we make

[Xen-devel] [PATCH v14 3/3] IOMMU: fix vt-d Device-TLB flush timeout issue

2016-07-04 Thread Xu, Quan
From: Quan Xu If Device-TLB flush timed out, we hide the target ATS device immediately. By hiding the device, we make sure it can't be assigned to any domain any longer (see device_assigned). Signed-off-by: Quan Xu CC: Jan Beulich CC: Kevin Tian CC: Feng Wu --- v14: release the lock before

[Xen-devel] [PATCH v2] mini-os: replace lib/printf.c with a version not under GPL

2016-07-04 Thread Juergen Gross
Instead of a Linux kernel based implementation use one from freeBSD. As a result some of the printings will change due to more posix like behavior of %p format (omitting leading zeroes, prepending "0x"). Signed-off-by: Juergen Gross --- V2: remove include/lib-gpl.h as requested by Samuel Thibaul

[Xen-devel] [PATCH v14 2/3] IOMMU: add domain crash logic

2016-07-04 Thread Xu, Quan
From: Quan Xu Add domain crash logic to the generic IOMMU layer to benefit all platforms. No spamming of the log can occur. For DomU, we avoid logging any message for already dying domains. For Dom0, that'll still be more verbose than we'd really like, but it at least wouldn't outright flood the

[Xen-devel] [PATCH v14 1/3] IOMMU/x86: use a struct pci_dev* instead of SBDF

2016-07-04 Thread Xu, Quan
From: Quan Xu A struct pci_dev* instead of SBDF is stored inside struct pci_ats_dev and parameter to *_ats_device(). Also use ats_dev for "struct pci_ats_dev" variable, while pdev (_pdev, if there is already a pdev) for "struct pci_dev" in the scope of IOMMU. Signed-off-by: Quan Xu Acked-by: K

Re: [Xen-devel] [PATCH 2/3] arm/xen: add support for vm_assist hypercall

2016-07-04 Thread Juergen Gross
On 22/06/16 09:03, Juergen Gross wrote: > Add support for the Xen HYPERVISOR_vm_assist hypercall. > > Signed-off-by: Juergen Gross Stefano, could you please comment? Juergen > --- > arch/arm/include/asm/xen/hypercall.h | 1 + > arch/arm/xen/enlighten.c | 1 + > arch/arm/xen/hyper

[Xen-devel] [PATCH] README: Update version to 4.7 (from 4.7.0)

2016-07-04 Thread Ian Jackson
For ongoing stable releases. Signed-off-by: Ian Jackson CC: Jan Beulich [already applied, following discussion in irc -iwj] --- README | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/README b/README index 6380a79..9b69d91 100644 --- a/README +++ b/README @@ -1,

[Xen-devel] [linux-3.10 baseline-only test] 66494: regressions - trouble: blocked/broken/fail/pass

2016-07-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 66494 linux-3.10 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/66494/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-libvirt4 capture-logs

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Jan Beulich
>>> On 30.06.16 at 20:43, wrote: > --- a/xen/arch/x86/hvm/hvm.c > +++ b/xen/arch/x86/hvm/hvm.c > @@ -475,8 +475,6 @@ void hvm_do_resume(struct vcpu *v) > > if ( unlikely(v->arch.vm_event) ) > { > -struct monitor_write_data *w = &v->arch.vm_event->write_data; > - > if (

Re: [Xen-devel] [PATCH 0/3] libxl: add framework for device types

2016-07-04 Thread Juergen Gross
On 21/06/16 16:24, Juergen Gross wrote: > Instead of duplicate coding for each device type (vtpms, usbctrls, ...) > especially on domain creation introduce a framework for that purpose. > > I especially found it annoying that e.g. the vtpm callback issued the > error message for a failed attach of

Re: [Xen-devel] [PATCH v7 00/11] grub-xen: support booting huge pv-domains

2016-07-04 Thread Juergen Gross
On 12/05/16 07:35, Juergen Gross wrote: > Gentle ping... Okay, now 4 months since posting the last version. Could it please be included in a more timely manner? Juergen > > On 03/03/16 10:38, Juergen Gross wrote: >> The Xen hypervisor supports starting a dom0 with large memory (up to >> the TB

[Xen-devel] Fwd: [Xen-users] Adaptec (PMC Sierra) RAID controller is not working under XEN

2016-07-04 Thread George Dunlap
Forwarding to xen-devel to see if anyone has any ideas... -George -- Forwarded message -- From: Alex Wakizashi Date: Tue, Jun 28, 2016 at 11:38 PM Subject: [Xen-users] Adaptec (PMC Sierra) RAID controller is not working under XEN To: xen-us...@lists.xen.org Hello, all, Have o

Re: [Xen-devel] [PATCH v7 00/11] grub-xen: support booting huge pv-domains

2016-07-04 Thread Daniel Kiper
On Mon, Jul 04, 2016 at 12:33:17PM +0200, Juergen Gross wrote: > On 12/05/16 07:35, Juergen Gross wrote: > > Gentle ping... > > Okay, now 4 months since posting the last version. Could it please be > included in a more timely manner? Juergen and others, please be patient a bit longer. GNU, current

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Corneliu ZUZU
Hi Jan, On 7/4/2016 1:22 PM, Jan Beulich wrote: On 30.06.16 at 20:43, wrote: --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -475,8 +475,6 @@ void hvm_do_resume(struct vcpu *v) if ( unlikely(v->arch.vm_event) ) { -struct monitor_write_data *w = &v->arch.vm_

Re: [Xen-devel] [PATCH] libxl/netbsd: check num_exec in hotplug function

2016-07-04 Thread Wei Liu
Add back xen-devel. Please reply to all recipients in the future. On Mon, Jul 04, 2016 at 01:11:04AM -0700, John Nemeth wrote: > On Jul 2, 12:35pm, Wei Liu wrote: > } > } This basically replicates the same logic in libxl_linux.c. Without this > } libxl will loop indefinitely trying to execute hotp

Re: [Xen-devel] [PATCH] xen: arm64: Add support for Renesas RCar Gen3 H3 Salvator-X platform

2016-07-04 Thread Julien Grall
(CC Wei for the release part) Hi Dirk, On 04/07/16 07:51, Dirk Behme wrote: Signed-off-by: Dirk Behme Thank you for adding support of a new board in Xen. During the last hackathon, we discussed about improving pre-release testing on ARM hardware [1] and helping users to boot Xen on support

Re: [Xen-devel] Xen 4.6 script calling conventions

2016-07-04 Thread Wei Liu
On Mon, Jul 04, 2016 at 01:07:51AM -0700, John Nemeth wrote: > On Jul 2, 12:40pm, Wei Liu wrote: > } On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote: > } > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for > } > use with NetBSD. I have it mostly done; however, when I try

Re: [Xen-devel] [PATCH 2/3] arm/xen: add support for vm_assist hypercall

2016-07-04 Thread Julien Grall
Hi Juergen, On 22/06/16 08:03, Juergen Gross wrote: Add support for the Xen HYPERVISOR_vm_assist hypercall. Signed-off-by: Juergen Gross Reviewed-by: Julien Grall Regards, --- arch/arm/include/asm/xen/hypercall.h | 1 + arch/arm/xen/enlighten.c | 1 + arch/arm/xen/hyperca

Re: [Xen-devel] [PATCH] libxl/netbsd: check num_exec in hotplug function

2016-07-04 Thread Wei Liu
Also CC Roger since he authored the original code. Feel free to correct me misunderstanding on this issue. On Mon, Jul 04, 2016 at 12:09:30PM +0100, Wei Liu wrote: > Add back xen-devel. Please reply to all recipients in the future. > > On Mon, Jul 04, 2016 at 01:11:04AM -0700, John Nemeth wrote:

Re: [Xen-devel] repeating 'd1v0 Over-allocation for domain 1' messages in xen 4.7 Host logs on PVHVM Guest launch

2016-07-04 Thread George Dunlap
On Wed, Jun 29, 2016 at 5:27 PM, PGNet Dev wrote: > In summary, there's a problem > > An indication of the guest trying to allocate more memory that the > host admin has allowed. > > that's filling logs with 10s of thousands of redundant log entries, with a > suspicion that it's 'balloonin

Re: [Xen-devel] Xen 4.6 script calling conventions

2016-07-04 Thread Roger Pau Monné
On Mon, Jul 04, 2016 at 01:07:51AM -0700, John Nemeth wrote: > On Jul 2, 12:40pm, Wei Liu wrote: > } On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote: > } > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for > } > use with NetBSD. I have it mostly done; however, when I try

[Xen-devel] [PATCH 12/18] arm/altp2m: Cosmetic fixes - function prototypes.

2016-07-04 Thread Sergej Proskurin
This commit changes the prototype of the following functions: - apply_p2m_changes - apply_one_level - p2m_shatter_page - p2m_create_table - __p2m_lookup - __p2m_get_mem_access These changes are required as our implementation reuses most of the existing ARM p2m implementation to set page table attr

[Xen-devel] [PATCH 10/18] arm/altp2m: Renamed and extended p2m_alloc_table.

2016-07-04 Thread Sergej Proskurin
The initially named function "p2m_alloc_table" allocated pages solely required for p2m. The new implementation leaves p2m allocation related parts inside of this function (which is made static) and provides an overlay function "p2m_table_init" that can be called from extern to generally initialize

[Xen-devel] [PATCH 18/18] arm/altp2m: Extend xen-access for altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Razvan Cojocaru Cc: Tamas K Lengyel Cc: Ian Jackson Cc: Wei Liu --- tools/tests/xen-access/xen-access.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/tools/tests/xen-access/xen-access.c b/tools/tests/xen-access/xen-acc

[Xen-devel] [PATCH 05/18] arm/altp2m: Add HVMOP_altp2m_set_domain_state.

2016-07-04 Thread Sergej Proskurin
The HVMOP_altp2m_set_domain_state allows to activate altp2m on a specific domain. This commit adopts the x86 HVMOP_altp2m_set_domain_state implementation. The function p2m_flush_altp2m is currently implemented in form of a stub. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Jul

[Xen-devel] [PATCH 10/18] arm/altp2m: Renamed and extended p2m_alloc_table.

2016-07-04 Thread Sergej Proskurin
The initially named function "p2m_alloc_table" allocated pages solely required for p2m. The new implementation leaves p2m allocation related parts inside of this function (which is made static) and provides an overlay function "p2m_table_init" that can be called from extern to generally initialize

[Xen-devel] [PATCH 13/18] arm/altp2m: Make get_page_from_gva ready for altp2m.

2016-07-04 Thread Sergej Proskurin
This commit adapts get_page_from_gva to consider the currently mapped altp2m view during address translation. We also adapt the function's prototype (provide "struct vcpu *" instead of "struct domain *"). This change is required, as the function indirectly calls the function gva_to_ma_par, which re

[Xen-devel] [PATCH 14/18] arm/altp2m: Add HVMOP_altp2m_set_mem_access.

2016-07-04 Thread Sergej Proskurin
The HVMOP HVMOP_altp2m_set_mem_access allows to set gfn permissions of (currently one page at a time) of a specific altp2m view. In case the view does not hold the requested gfn entry, it will be first copied from the hostp2m table and then modified as requested. Signed-off-by: Sergej Proskurin -

[Xen-devel] [PATCH 12/18] arm/altp2m: Cosmetic fixes - function prototypes.

2016-07-04 Thread Sergej Proskurin
This commit changes the prototype of the following functions: - apply_p2m_changes - apply_one_level - p2m_shatter_page - p2m_create_table - __p2m_lookup - __p2m_get_mem_access These changes are required as our implementation reuses most of the existing ARM p2m implementation to set page table attr

[Xen-devel] [PATCH 17/18] arm/altp2m: Adjust debug information to altp2m.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/p2m.c | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c index 96892a5..de97a12 100644 --- a/xen/arch/arm/p2m.c +++ b/xen/arch/arm/p2m.c @@

[Xen-devel] [PATCH 06/18] arm/altp2m: Add a(p2m) table flushing routines.

2016-07-04 Thread Sergej Proskurin
The current implementation differentiates between flushing and destroying altp2m views. This commit adds the functions p2m_flush_altp2m, and p2m_flush_table, which allow to flush all or individual altp2m views without destroying the entire table. In this way, altp2m views can be reused at a later p

[Xen-devel] [PATCH 14/18] arm/altp2m: Add HVMOP_altp2m_set_mem_access.

2016-07-04 Thread Sergej Proskurin
The HVMOP HVMOP_altp2m_set_mem_access allows to set gfn permissions of (currently one page at a time) of a specific altp2m view. In case the view does not hold the requested gfn entry, it will be first copied from the hostp2m table and then modified as requested. Signed-off-by: Sergej Proskurin -

[Xen-devel] [PATCH 09/18] arm/altp2m: Add HVMOP_altp2m_switch_p2m.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c| 2 +- xen/arch/arm/p2m.c| 32 xen/include/asm-arm/p2m.h | 3 +++ 3 files changed, 36 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm/hvm

[Xen-devel] [PATCH 08/18] arm/altp2m: Add HVMOP_altp2m_destroy_p2m.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c| 2 +- xen/arch/arm/p2m.c| 32 xen/include/asm-arm/p2m.h | 3 +++ 3 files changed, 36 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm/hvm

[Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
The Xen altp2m subsystem is currently supported only on x86-64 based architectures. By utilizing ARM's virtualization extensions, we intend to implement altp2m support for ARM architectures and thus further extend current Virtual Machine Introspection (VMI) capabilities on ARM. With this commit, X

[Xen-devel] [PATCH 08/18] arm/altp2m: Add HVMOP_altp2m_destroy_p2m.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c| 2 +- xen/arch/arm/p2m.c| 32 xen/include/asm-arm/p2m.h | 3 +++ 3 files changed, 36 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm/hvm

[Xen-devel] [PATCH 13/18] arm/altp2m: Make get_page_from_gva ready for altp2m.

2016-07-04 Thread Sergej Proskurin
This commit adapts get_page_from_gva to consider the currently mapped altp2m view during address translation. We also adapt the function's prototype (provide "struct vcpu *" instead of "struct domain *"). This change is required, as the function indirectly calls the function gva_to_ma_par, which re

[Xen-devel] [PATCH 17/18] arm/altp2m: Adjust debug information to altp2m.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/p2m.c | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c index 96892a5..de97a12 100644 --- a/xen/arch/arm/p2m.c +++ b/xen/arch/arm/p2m.c @@

[Xen-devel] [PATCH 03/18] arm/altp2m: Add HVMOP_altp2m_get_domain_state.

2016-07-04 Thread Sergej Proskurin
This commit adopts the x86 HVMOP_altp2m_get_domain_state implementation. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c | 9 - 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c index

[Xen-devel] [PATCH 02/18] arm/altp2m: Add first altp2m HVMOP stubs.

2016-07-04 Thread Sergej Proskurin
This commit moves the altp2m-related code from x86 to ARM. Functions that are no yet supported notify the caller or print a BUG message stating their absence. Also, the struct arch_domain is extended with the altp2m_active attribute, represeting the current altp2m activity configuration of the dom

[Xen-devel] [PATCH 11/18] arm/altp2m: Make flush_tlb_domain ready for altp2m.

2016-07-04 Thread Sergej Proskurin
This commit makes sure that the TLB of a domain considers flushing all of the associated altp2m views. Therefore, in case a different domain (not the currently active domain) shall flush its TLBs, the current implementation loops over all VTTBRs of the different altp2m mappings per vCPU and flushes

[Xen-devel] [PATCH 15/18] arm/altp2m: Add altp2m paging mechanism.

2016-07-04 Thread Sergej Proskurin
This commit adds the function p2m_altp2m_lazy_copy implementing the altp2m paging mechanism. The function p2m_altp2m_lazy_copy lazily copies the hostp2m's mapping into the currently active altp2m view on 2nd stage instruction or data access violations. Every altp2m violation generates a vm_event.

[Xen-devel] [PATCH 18/18] arm/altp2m: Extend xen-access for altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Razvan Cojocaru Cc: Tamas K Lengyel Cc: Ian Jackson Cc: Wei Liu --- tools/tests/xen-access/xen-access.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/tools/tests/xen-access/xen-access.c b/tools/tests/xen-access/xen-acc

[Xen-devel] [PATCH 09/18] arm/altp2m: Add HVMOP_altp2m_switch_p2m.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c| 2 +- xen/arch/arm/p2m.c| 32 xen/include/asm-arm/p2m.h | 3 +++ 3 files changed, 36 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm/hvm

[Xen-devel] [PATCH 16/18] arm/altp2m: Extended libxl to activate altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
The current implementation allows to set the parameter HVM_PARAM_ALTP2M. This parameter allows further usage of altp2m on ARM. For this, we define an additional altp2m field for PV domains as part of the libxl_domain_type struct. This field can be set only on ARM systems through the "altp2m" switch

[Xen-devel] [PATCH 07/18] arm/altp2m: Add HVMOP_altp2m_create_p2m.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c| 3 ++- xen/arch/arm/p2m.c| 23 +++ xen/include/asm-arm/p2m.h | 3 +++ 3 files changed, 28 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm/hvm.c b/xen

[Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
The Xen altp2m subsystem is currently supported only on x86-64 based architectures. By utilizing ARM's virtualization extensions, we intend to implement altp2m support for ARM architectures and thus further extend current Virtual Machine Introspection (VMI) capabilities on ARM. With this commit, X

[Xen-devel] [PATCH 00/18] arm/altp2m: Introducing altp2m to ARM.

2016-07-04 Thread Sergej Proskurin
Hello together, Since this is my first contribution to the Xen development mailing list, I would like to shortly introduce myself. My name is Sergej Proskurin. I am a PhD Student at the Technical University of Munich. My research areas focus on Virtual Machine Introspection, Hypervisor/OS Security

[Xen-devel] [PATCH 03/18] arm/altp2m: Add HVMOP_altp2m_get_domain_state.

2016-07-04 Thread Sergej Proskurin
This commit adopts the x86 HVMOP_altp2m_get_domain_state implementation. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c | 9 - 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm/hvm.c b/xen/arch/arm/hvm.c index

[Xen-devel] [PATCH 02/18] arm/altp2m: Add first altp2m HVMOP stubs.

2016-07-04 Thread Sergej Proskurin
This commit moves the altp2m-related code from x86 to ARM. Functions that are no yet supported notify the caller or print a BUG message stating their absence. Also, the struct arch_domain is extended with the altp2m_active attribute, represeting the current altp2m activity configuration of the dom

[Xen-devel] [PATCH 05/18] arm/altp2m: Add HVMOP_altp2m_set_domain_state.

2016-07-04 Thread Sergej Proskurin
The HVMOP_altp2m_set_domain_state allows to activate altp2m on a specific domain. This commit adopts the x86 HVMOP_altp2m_set_domain_state implementation. The function p2m_flush_altp2m is currently implemented in form of a stub. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Jul

[Xen-devel] [PATCH 15/18] arm/altp2m: Add altp2m paging mechanism.

2016-07-04 Thread Sergej Proskurin
This commit adds the function p2m_altp2m_lazy_copy implementing the altp2m paging mechanism. The function p2m_altp2m_lazy_copy lazily copies the hostp2m's mapping into the currently active altp2m view on 2nd stage instruction or data access violations. Every altp2m violation generates a vm_event.

[Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Sergej Proskurin
The p2m intialization now invokes intialization routines responsible for the allocation and intitialization of altp2m structures. The same applies to teardown routines. The functionality has been adopted from the x86 altp2m implementation. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellin

[Xen-devel] [PATCH 06/18] arm/altp2m: Add a(p2m) table flushing routines.

2016-07-04 Thread Sergej Proskurin
The current implementation differentiates between flushing and destroying altp2m views. This commit adds the functions p2m_flush_altp2m, and p2m_flush_table, which allow to flush all or individual altp2m views without destroying the entire table. In this way, altp2m views can be reused at a later p

[Xen-devel] [PATCH 11/18] arm/altp2m: Make flush_tlb_domain ready for altp2m.

2016-07-04 Thread Sergej Proskurin
This commit makes sure that the TLB of a domain considers flushing all of the associated altp2m views. Therefore, in case a different domain (not the currently active domain) shall flush its TLBs, the current implementation loops over all VTTBRs of the different altp2m mappings per vCPU and flushes

[Xen-devel] [PATCH 04/18] arm/altp2m: Add altp2m init/teardown routines.

2016-07-04 Thread Sergej Proskurin
The p2m intialization now invokes intialization routines responsible for the allocation and intitialization of altp2m structures. The same applies to teardown routines. The functionality has been adopted from the x86 altp2m implementation. Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellin

[Xen-devel] [PATCH 07/18] arm/altp2m: Add HVMOP_altp2m_create_p2m.

2016-07-04 Thread Sergej Proskurin
Signed-off-by: Sergej Proskurin --- Cc: Stefano Stabellini Cc: Julien Grall --- xen/arch/arm/hvm.c| 3 ++- xen/arch/arm/p2m.c| 23 +++ xen/include/asm-arm/p2m.h | 3 +++ 3 files changed, 28 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm/hvm.c b/xen

[Xen-devel] [PATCH 16/18] arm/altp2m: Extended libxl to activate altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
The current implementation allows to set the parameter HVM_PARAM_ALTP2M. This parameter allows further usage of altp2m on ARM. For this, we define an additional altp2m field for PV domains as part of the libxl_domain_type struct. This field can be set only on ARM systems through the "altp2m" switch

[Xen-devel] [PATCH v2 0/3] x86: instruction emulator adjustments

2016-07-04 Thread Jan Beulich
1: use consistent exit mechanism 2: drop pointless and add useful default cases 3: fold local variables Signed-off-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

[Xen-devel] [PATCH v2 1/3] use consistent exit mechanism

2016-07-04 Thread Jan Beulich
Similar code should use similar exit mechanisms (return vs goto). Signed-off-by: Jan Beulich --- v2: Use "goto" instead of "return", making things consistent right away instead of only after a (series of) future patch(es) converting more code to "return". --- a/xen/arch/x86/x86_emulate/x

[Xen-devel] [PATCH v2 3/3] x86emul: fold local variables

2016-07-04 Thread Jan Beulich
Declare some variables to they can be used by multiple pieces of code, allowing some figure braces to be dropped (which don't align nicely when used inside of case labeled statements). Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/a

Re: [Xen-devel] [PATCH] libxl/netbsd: check num_exec in hotplug function

2016-07-04 Thread John Nemeth
On Jul 4, 12:23pm, Wei Liu wrote: } } Also CC Roger since he authored the original code. } } Feel free to correct me misunderstanding on this issue. } } On Mon, Jul 04, 2016 at 12:09:30PM +0100, Wei Liu wrote: } > Add back xen-devel. Please reply to all recipients in the future. Oops, I usu

[Xen-devel] [PATCH v2 2/3] drop pointless and add useful default cases

2016-07-04 Thread Jan Beulich
There's no point in having default cases when all possible values have respective case statements, or when there's just a "break" statement. Otoh the two main switch() statements better get default cases added, just to cover the case of someone altering one of the two lookup arrays without suitabl

Re: [Xen-devel] Xen 4.6 script calling conventions

2016-07-04 Thread Roger Pau Monné
On Sat, Jul 02, 2016 at 12:40:43PM +0100, Wei Liu wrote: > On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote: > > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for > > use with NetBSD. I have it mostly done; however, when I try to > > create a domU, libxl goes into an infin

Re: [Xen-devel] [PATCH] libxl/netbsd: check num_exec in hotplug function

2016-07-04 Thread Roger Pau Monné
On Mon, Jul 04, 2016 at 04:56:33AM -0700, John Nemeth wrote: > On Jul 4, 12:23pm, Wei Liu wrote: > } On Mon, Jul 04, 2016 at 12:09:30PM +0100, Wei Liu wrote: > } > On Mon, Jul 04, 2016 at 01:11:04AM -0700, John Nemeth wrote: > } > > On Jul 2, 12:35pm, Wei Liu wrote: > } > > } +/* > } > > }

Re: [Xen-devel] Xen 4.6 script calling conventions

2016-07-04 Thread Wei Liu
On Mon, Jul 04, 2016 at 01:57:20PM +0200, Roger Pau Monné wrote: > On Sat, Jul 02, 2016 at 12:40:43PM +0100, Wei Liu wrote: > > On Tue, Jun 28, 2016 at 06:00:49PM -0700, John Nemeth wrote: > > > I'm trying to package Xen 4.6 (specifically Xen 4.6.3) for > > > use with NetBSD. I have it mostly

Re: [Xen-devel] [PATCH 06/18] arm/altp2m: Add a(p2m) table flushing routines.

2016-07-04 Thread Sergej Proskurin
ARM allows the use of concatenated root (first-level) page tables (there are P2M_ROOT_PAGES consecutive pages that are used for the root level page table. We need to prevent freeing one of these concatenated pages during the process of flushing in p2m_flush_table (simply because new pages might be

[Xen-devel] [PATCH] libxl/netbsd: check num_exec in hotplug function

2016-07-04 Thread Wei Liu
This basically replicates the same logic in libxl_linux.c but with one change -- only test num_exec == 0 in nic hotplug case because NetBSD let QEMU call a script itself. Without this patch libxl will loop indefinitely trying to execute hotplug script. Reported-by: John Nemeth Signed-off-by: Wei

Re: [Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Andrew Cooper
On 04/07/16 12:45, Sergej Proskurin wrote: > The Xen altp2m subsystem is currently supported only on x86-64 based > architectures. By utilizing ARM's virtualization extensions, we intend > to implement altp2m support for ARM architectures and thus further > extend current Virtual Machine Introspect

[Xen-devel] [xen-unstable test] 96611: tolerable FAIL

2016-07-04 Thread osstest service owner
flight 96611 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/96611/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-arndale 16 guest-start.2 fail in 96558 pass in 96611 test-armhf-armhf-xl-credit2 15 gue

Re: [Xen-devel] [PATCH 11/18] arm/altp2m: Make flush_tlb_domain ready for altp2m.

2016-07-04 Thread Sergej Proskurin
On 07/04/2016 01:45 PM, Sergej Proskurin wrote: > This commit makes sure that the TLB of a domain considers flushing all > of the associated altp2m views. Therefore, in case a different domain > (not the currently active domain) shall flush its TLBs, the current > implementation loops over all VT

[Xen-devel] [xen-unstable-smoke test] 96626: tolerable all pass - PUSHED

2016-07-04 Thread osstest service owner
flight 96626 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/96626/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH 4/8] x86/vm-event/monitor: turn monitor_write_data.do_write into enum

2016-07-04 Thread Jan Beulich
>>> On 30.06.16 at 20:44, wrote: > After trapping a control-register write vm-event and -until- deciding if that > write is to be permitted or not (VM_EVENT_FLAG_DENY) and doing the actual > write, > there cannot and should not be another trapped control-register write event. Is that true even f

Re: [Xen-devel] [PATCH 4/8] x86/vm-event/monitor: turn monitor_write_data.do_write into enum

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 3:37 PM, Jan Beulich wrote: On 30.06.16 at 20:44, wrote: After trapping a control-register write vm-event and -until- deciding if that write is to be permitted or not (VM_EVENT_FLAG_DENY) and doing the actual write, there cannot and should not be another trapped control-register wri

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Jan Beulich
>>> On 30.06.16 at 20:45, wrote: > The arch_vm_event structure is dynamically allocated and freed @ > vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack > user > disables domain monitoring (xc_monitor_disable), which in turn effectively > discards any information that was

Re: [Xen-devel] [PATCH 00/18] arm/altp2m: Introducing altp2m to ARM.

2016-07-04 Thread Andrew Cooper
On 04/07/16 12:45, Sergej Proskurin wrote: > Hello together, > > Since this is my first contribution to the Xen development mailing list, I > would like to shortly introduce myself. My name is Sergej Proskurin. I am a > PhD > Student at the Technical University of Munich. My research areas focus o

Re: [Xen-devel] [PATCH v2 1/3] use consistent exit mechanism

2016-07-04 Thread Andrew Cooper
On 04/07/16 12:55, Jan Beulich wrote: > Similar code should use similar exit mechanisms (return vs goto). > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 2/3] drop pointless and add useful default cases

2016-07-04 Thread Andrew Cooper
On 04/07/16 12:55, Jan Beulich wrote: > There's no point in having default cases when all possible values have > respective case statements, or when there's just a "break" statement. > > Otoh the two main switch() statements better get default cases added, > just to cover the case of someone alteri

Re: [Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
On 07/04/2016 02:15 PM, Andrew Cooper wrote: > On 04/07/16 12:45, Sergej Proskurin wrote: >> The Xen altp2m subsystem is currently supported only on x86-64 based >> architectures. By utilizing ARM's virtualization extensions, we intend >> to implement altp2m support for ARM architectures and thus

Re: [Xen-devel] [PATCH 00/18] arm/altp2m: Introducing altp2m to ARM.

2016-07-04 Thread Sergej Proskurin
On 07/04/2016 02:52 PM, Andrew Cooper wrote: > On 04/07/16 12:45, Sergej Proskurin wrote: >> Hello together, >> >> Since this is my first contribution to the Xen development mailing list, I >> would like to shortly introduce myself. My name is Sergej Proskurin. I am a >> PhD >> Student at the Te

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 3:47 PM, Jan Beulich wrote: On 30.06.16 at 20:45, wrote: The arch_vm_event structure is dynamically allocated and freed @ vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack user disables domain monitoring (xc_monitor_disable), which in turn effectively discar

Re: [Xen-devel] [PATCH 4/8] x86/vm-event/monitor: turn monitor_write_data.do_write into enum

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 14:47, wrote: > On 7/4/2016 3:37 PM, Jan Beulich wrote: > On 30.06.16 at 20:44, wrote: >>> After trapping a control-register write vm-event and -until- deciding if >>> that >>> write is to be permitted or not (VM_EVENT_FLAG_DENY) and doing the actual >>> write, >>> there c

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 15:03, wrote: > On 7/4/2016 3:47 PM, Jan Beulich wrote: > On 30.06.16 at 20:45, wrote: >>> The arch_vm_event structure is dynamically allocated and freed @ >>> vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack >>> user >>> disables domain monitorin

Re: [Xen-devel] [PATCH 4/8] x86/vm-event/monitor: turn monitor_write_data.do_write into enum

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 4:07 PM, Jan Beulich wrote: On 04.07.16 at 14:47, wrote: On 7/4/2016 3:37 PM, Jan Beulich wrote: On 30.06.16 at 20:44, wrote: After trapping a control-register write vm-event and -until- deciding if that write is to be permitted or not (VM_EVENT_FLAG_DENY) and doing the actual wr

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Razvan Cojocaru
On 07/04/16 13:22, Jan Beulich wrote: On 30.06.16 at 20:43, wrote: >> --- a/xen/arch/x86/hvm/hvm.c >> +++ b/xen/arch/x86/hvm/hvm.c >> @@ -475,8 +475,6 @@ void hvm_do_resume(struct vcpu *v) >> >> if ( unlikely(v->arch.vm_event) ) >> { >> -struct monitor_write_data *w = &v->

Re: [Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/16 12:45, Sergej Proskurin wrote: The Xen altp2m subsystem is currently supported only on x86-64 based architectures. By utilizing ARM's virtualization extensions, we intend to implement altp2m support for ARM architectures and thus further extend current Virtual Machine I

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 4:11 PM, Jan Beulich wrote: On 04.07.16 at 15:03, wrote: On 7/4/2016 3:47 PM, Jan Beulich wrote: On 30.06.16 at 20:45, wrote: The arch_vm_event structure is dynamically allocated and freed @ vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolstack user disables

Re: [Xen-devel] [PATCH 02/18] arm/altp2m: Add first altp2m HVMOP stubs.

2016-07-04 Thread Julien Grall
Hello Sergej, On 04/07/16 12:45, Sergej Proskurin wrote: This commit moves the altp2m-related code from x86 to ARM. Looking at the code in the follow-up patches, I have the impression that the code is very similar (if not exactly) to the x86 code. If so, we should move the HVMOP for altp2m i

Re: [Xen-devel] [PATCH 18/18] arm/altp2m: Extend xen-access for altp2m on ARM.

2016-07-04 Thread Razvan Cojocaru
On 07/04/16 14:45, Sergej Proskurin wrote: > Signed-off-by: Sergej Proskurin > --- > Cc: Razvan Cojocaru > Cc: Tamas K Lengyel > Cc: Ian Jackson > Cc: Wei Liu > --- > tools/tests/xen-access/xen-access.c | 11 +-- > 1 file changed, 9 insertions(+), 2 deletions(-) Fair enough, looks li

Re: [Xen-devel] [PATCH 01/18] arm/altp2m: Add cmd-line support for altp2m on ARM.

2016-07-04 Thread Sergej Proskurin
Hello Julien, On 07/04/2016 03:25 PM, Julien Grall wrote: > Hello Sergej, > > On 04/07/16 12:45, Sergej Proskurin wrote: >> The Xen altp2m subsystem is currently supported only on x86-64 based >> architectures. By utilizing ARM's virtualization extensions, we intend >> to implement altp2m support

Re: [Xen-devel] [PATCH 02/18] arm/altp2m: Add first altp2m HVMOP stubs.

2016-07-04 Thread Sergej Proskurin
Hello Julien, On 07/04/2016 03:36 PM, Julien Grall wrote: > Hello Sergej, > > On 04/07/16 12:45, Sergej Proskurin wrote: >> This commit moves the altp2m-related code from x86 to ARM. > > Looking at the code in the follow-up patches, I have the impression that > the code is very similar (if not e

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Razvan Cojocaru
On 07/04/16 16:11, Jan Beulich wrote: On 04.07.16 at 15:03, wrote: >> On 7/4/2016 3:47 PM, Jan Beulich wrote: >> On 30.06.16 at 20:45, wrote: The arch_vm_event structure is dynamically allocated and freed @ vm_event_cleanup_domain. This cleanup is triggered e.g. when the toolst

Re: [Xen-devel] [PATCH 5/8] x86/vm-event/monitor: don't compromise monitor_write_data on domain cleanup

2016-07-04 Thread Corneliu ZUZU
On 7/4/2016 4:50 PM, Razvan Cojocaru wrote: On 07/04/16 16:11, Jan Beulich wrote: On 04.07.16 at 15:03, wrote: On 7/4/2016 3:47 PM, Jan Beulich wrote: On 30.06.16 at 20:45, wrote: The arch_vm_event structure is dynamically allocated and freed @ vm_event_cleanup_domain. This cleanup is trigg

Re: [Xen-devel] [PATCH 3/8] x86/vm-event/monitor: relocate code-motion more appropriately

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 15:22, wrote: > On 07/04/16 13:22, Jan Beulich wrote: > On 30.06.16 at 20:43, wrote: >>> @@ -119,6 +156,55 @@ bool_t monitored_msr(const struct domain *d, u32 msr) >>> return test_bit(msr, bitmap); >>> } >>> >>> +static void write_ctrlreg_adjust_traps(struct domain

Re: [Xen-devel] [PATCH 4/8] x86/vm-event/monitor: turn monitor_write_data.do_write into enum

2016-07-04 Thread Jan Beulich
>>> On 04.07.16 at 15:21, wrote: > On 7/4/2016 4:07 PM, Jan Beulich wrote: > On 04.07.16 at 14:47, wrote: >>> On 7/4/2016 3:37 PM, Jan Beulich wrote: >>> On 30.06.16 at 20:44, wrote: > After trapping a control-register write vm-event and -until- deciding if > that > write is

  1   2   3   >