Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread Julien Grall
Hi Dario, On 20/02/2017 22:53, Dario Faggioli wrote: On Mon, 2017-02-20 at 19:38 +, Julien Grall wrote: On 20/02/17 19:20, Dario Faggioli wrote: E.g., if vCPU x of domain A wants to go idle with a WFI/WFE, but the host is overbooked and currently really busy, Xen wants to run some other vC

Re: [Xen-devel] [PATCH v3 4/4] KVM: VMX: Simplify segment_base

2017-02-21 Thread Ingo Molnar
* Thomas Garnier wrote: > > Okay, I guess I will have to wait for it to be integrated to > > linux-next then. Or would you rather to it after this patch set is > > added? > > Read your summary for the patchset of KVM cleanup, I will wait for it to > reach > linux-next to rebase and send the n

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread Julien Grall
Hi Stefano, On 21/02/2017 00:38, Stefano Stabellini wrote: On Mon, 20 Feb 2017, Dario Faggioli wrote: On Mon, 2017-02-20 at 19:38 +, Julien Grall wrote: On 20/02/17 19:20, Dario Faggioli wrote: E.g., if vCPU x of domain A wants to go idle with a WFI/WFE, but the host is overbooked and cur

Re: [Xen-devel] [PATCH v2 1/3] x86/vpmu: Add get/put_vpmu() and VPMU_AVAILABLE

2017-02-21 Thread Tian, Kevin
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: Saturday, February 18, 2017 1:40 AM > > vpmu_enabled() (used by hvm/pv_cpuid() to properly report 0xa leaf > for Intel processors) is based on the value of VPMU_CONTEXT_ALLOCATED > bit. This is problematic: > * For HVM guests VPMU

Re: [Xen-devel] [PATCH v2 2/3] x86/vpmu: Disable VPMU if guest's CPUID indicates no PMU support

2017-02-21 Thread Tian, Kevin
> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] > Sent: Saturday, February 18, 2017 1:40 AM > > When toolstack overrides CPUID leaf 0xa values (on Intel processors) > VPMU should not be available to the guest. only when override with an invalid version? otherwise ok to me. Reviewed-b

Re: [Xen-devel] [PATCH] ring.h: introduce macros to handle monodirectional rings with multiple req sizes

2017-02-21 Thread Jan Beulich
>>> On 21.02.17 at 00:26, wrote: > On Mon, 20 Feb 2017, Jan Beulich wrote: >> >>> On 17.02.17 at 23:38, wrote: >> But the use of inline functions here is questionable >> in the first place - so far there are none, as they're not standard >> C89. Granted they are being used in a macro only, so won

Re: [Xen-devel] [PATCH v3 02/18] x86emul: support most memory accessing MMX/SSE{, 2, 3} insns

2017-02-21 Thread Jan Beulich
>>> On 20.02.17 at 19:40, wrote: > On 20/02/17 14:52, Jan Beulich wrote: > On 20.02.17 at 14:45, wrote: >>> On 15/02/17 11:07, Jan Beulich wrote: --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/arch/x86/x86_emulate/x86_emulate.c @@ -45,6 +45,8 @@ #define ModRM

Re: [Xen-devel] [PATCH v3 12/18] x86emul: add tables for 0f38 and 0f3a extension space

2017-02-21 Thread Jan Beulich
>>> On 20.02.17 at 17:05, wrote: > On 15/02/17 11:14, Jan Beulich wrote: >> @@ -2207,12 +2231,12 @@ x86_decode_twobyte( >> switch ( modrm_reg & 7 ) >> { >> case 2: /* {,v}ldmxcsr */ >> -state->desc = DstImplicit | SrcMem | ModRM | Mov; >> +state->

Re: [Xen-devel] [PATCH] x86/apicv: enhance posted-interrupt processing

2017-02-21 Thread Jan Beulich
>>> On 21.02.17 at 07:19, wrote: > On February 21, 2017 5:55 AM, Chao Gao wrote: >>On Tue, Feb 21, 2017 at 04:11:53AM +, Xuquan (Quan Xu) wrote: >>>The posted_intr_vector handler is not always pi_notification_interrupt. >>>If the vt-d PI is not enabled, the handler is event_check_interrupt.. >

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread Dario Faggioli
On Tue, 2017-02-21 at 07:59 +, Julien Grall wrote: > On 20/02/2017 22:53, Dario Faggioli wrote: > > For instance, as you say, executing a WFI from a guest directly on > > hardware, only makes sense if we have 1:1 static pinning. Which > > means > > it can't just be done by default, or with a bo

Re: [Xen-devel] [PATCH v2 3/3] x86/vmx: fix vmentry failure with TSX bits in LBR

2017-02-21 Thread Tian, Kevin
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com] > Sent: Friday, February 17, 2017 11:43 PM > > During VM entry, H/W will automatically load guest's MSRs from MSR-load > area in the same way as they would be written by WRMSR. > > However, under the following conditions: > > 1. LBR (La

Re: [Xen-devel] [PATCH] xen/x86: ensure copying to L1 guest in update_runstate_area()

2017-02-21 Thread Jan Beulich
>>> On 21.02.17 at 03:11, wrote: > For a HVM domain, if a vcpu is in the nested guest mode, > __raw_copy_to_guest() and __copy_to_guest() used by > update_runstate_area() will copy data to L2 guest other than L1 guest. > > Besides copying to the wrong address, this bug also causes crash in > the

Re: [Xen-devel] [PATCH 19/19] tools/xen-mceinj: support injecting LMCE

2017-02-21 Thread Wei Liu
On Tue, Feb 21, 2017 at 07:50:38AM +0800, Haozhong Zhang wrote: > On 02/20/17 12:53 +, Wei Liu wrote: > > > } > > > > > > +static int inject_lmce(xc_interface *xc_handle, uint32_t cpu_nr) > > > +{ > > > +struct xen_mc mc; > > > +uint8_t *cpumap = NULL; > > > +size_t cpumap_size,

Re: [Xen-devel] [PATCH v2] ring.h: introduce macros to handle monodirectional rings with multiple req sizes

2017-02-21 Thread Jan Beulich
>>> On 21.02.17 at 02:32, wrote: > +static inline void name##_read_packet(char *buf, > \ > +RING_IDX *masked_prod, RING_IDX *masked_cons, > \ The const/indirection problems is still there. > +static inline void name##_write_packet(ch

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread Dario Faggioli
On Tue, 2017-02-21 at 08:10 +, Julien Grall wrote: > On 21/02/2017 00:38, Stefano Stabellini wrote: > > On Mon, 20 Feb 2017, Dario Faggioli wrote: > > > Mmm... ok, yes, in that case, it may make sense and work, from a, > > > let's > > > say, purely functional perspective. But still I struggle t

Re: [Xen-devel] [PATCH v2 2/3] x86/vmx: optimize vmx_read/write_guest_msr()

2017-02-21 Thread Tian, Kevin
> From: Sergey Dyasli [mailto:sergey.dya...@citrix.com] > Sent: Friday, February 17, 2017 11:43 PM > > Replace linear scan with vmx_find_msr(). This way the time complexity > of searching for required MSR reduces from linear to logarithmic. > > Signed-off-by: Sergey Dyasli Acked-by: Kevin Tian

Re: [Xen-devel] [PATCH] x86/apicv: enhance posted-interrupt processing

2017-02-21 Thread Tian, Kevin
> From: Xuquan (Quan Xu) [mailto:xuqu...@huawei.com] > Sent: Tuesday, February 21, 2017 12:12 PM > > On February 21, 2017 11:07 AM, Tian, Kevin wrote: > >> From: Xuquan (Quan Xu) [mailto:xuqu...@huawei.com] > >> Sent: Tuesday, February 21, 2017 10:49 AM > >> > >> On February 20, 2017 4:24 PM, Chao

Re: [Xen-devel] [PATCH V3 5/7] COLO-Proxy: Add primary userspace colo proxy start args

2017-02-21 Thread Wei Liu
On Tue, Feb 21, 2017 at 11:07:00AM +0800, Zhang Chen wrote: > > > On 02/20/2017 11:59 PM, Wei Liu wrote: > > On Fri, Feb 17, 2017 at 10:18:27AM +0800, Zhang Chen wrote: > > > Qemu need this args to start userspace colo-proxy. > > > > > > Signed-off-by: Zhang Chen > > [...] > > > + > > > +#undef

Re: [Xen-devel] [PATCH V3 2/7] COLO-Proxy: Setup userspace colo-proxy on primary side

2017-02-21 Thread Wei Liu
On Tue, Feb 21, 2017 at 10:57:46AM +0800, Zhang Chen wrote: > > > On 02/20/2017 11:55 PM, Wei Liu wrote: > > On Fri, Feb 17, 2017 at 10:18:24AM +0800, Zhang Chen wrote: > > > In this patch we close kernel COLO-Proxy on primary side. > > > > > > Signed-off-by: Zhang Chen > > > --- > > > tools/

Re: [Xen-devel] [PATCH] xen/arm: warn if dom0_mem is not specified

2017-02-21 Thread Wei Liu
On Mon, Feb 20, 2017 at 10:22:06AM -0800, Stefano Stabellini wrote: > The default dom0_mem is 128M which is not sufficient to boot a Ubuntu > based Dom0. It is not clear what a better default value could be. > > Instead, loudly warn the user when dom0_mem is unspecified and wait 3 > secs. Then use

Re: [Xen-devel] Unable to boot Xen 4.8 with iommu=0

2017-02-21 Thread Roger Pau Monné
On Fri, Feb 17, 2017 at 02:01:15PM -0600, Venu Busireddy wrote: > On Fri, Feb 17, 2017 at 02:29:32PM -0500, Konrad Rzeszutek Wilk wrote: > > On Fri, Feb 17, 2017 at 12:27:25PM -0700, Tamas K Lengyel wrote: > > > On Fri, Feb 17, 2017 at 11:56 AM, Konrad Rzeszutek Wilk > > > wrote: > > > > . snip..

[Xen-devel] [xen-unstable test] 105933: tolerable FAIL - PUSHED

2017-02-21 Thread osstest service owner
flight 105933 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/105933/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 105919 test-amd64-i386-xl-qemuu-wi

Re: [Xen-devel] [PATCH v3 4/4] KVM: VMX: Simplify segment_base

2017-02-21 Thread Paolo Bonzini
> Paolo, how stable, non-rebasing are the KVM tree commits? Whatever ends in linux-next is stable. I have a separate rebasing branch, but it's not part of linux-next by design. > Or should we keep Andy's KVM patches together with the GDT patches? Either > workflow works for me - it's your call

[Xen-devel] [xen-4.7-testing test] 105935: regressions - FAIL

2017-02-21 Thread osstest service owner
flight 105935 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/105935/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-credit2 17 guest-localmigrate/x10 fail REGR. vs. 105855 Tests which are

Re: [Xen-devel] Unshared IOMMU issues

2017-02-21 Thread Oleksandr Tyshchenko
Hi, Julien. On Mon, Feb 20, 2017 at 10:31 AM, Julien Grall wrote: > Hello Oleksandr, > > On 02/17/2017 08:20 PM, Oleksandr Tyshchenko wrote: >> >> Hi, all. >> >> So, as I understand we have two possible solutions for the IOMMU page >> table to be populated: >> 1. When the first device is being a

Re: [Xen-devel] [PATCH v2 1/3] x86/vpmu: Add get/put_vpmu() and VPMU_AVAILABLE

2017-02-21 Thread Andrew Cooper
On 17/02/17 17:40, Boris Ostrovsky wrote: > @@ -509,15 +498,63 @@ void vpmu_initialise(struct vcpu *v) > if ( ret ) > printk(XENLOG_G_WARNING "VPMU: Initialization failed for %pv\n", v); > > -/* Intel needs to initialize VPMU ops even if VPMU is not in use */ > -if ( !is_pri

Re: [Xen-devel] [PATCH V3 2/7] COLO-Proxy: Setup userspace colo-proxy on primary side

2017-02-21 Thread Zhang Chen
On 02/21/2017 05:53 PM, Wei Liu wrote: On Tue, Feb 21, 2017 at 10:57:46AM +0800, Zhang Chen wrote: On 02/20/2017 11:55 PM, Wei Liu wrote: On Fri, Feb 17, 2017 at 10:18:24AM +0800, Zhang Chen wrote: In this patch we close kernel COLO-Proxy on primary side. Signed-off-by: Zhang Chen ---

[Xen-devel] [distros-debian-snapshot test] 68586: tolerable trouble: blocked/broken/fail/pass

2017-02-21 Thread Platform Team regression test user
flight 68586 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68586/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-amd64-daily-netboot-pvgrub 10 guest-start fail blocked in 68556 test-amd64-

Re: [Xen-devel] [PATCH V3 2/7] COLO-Proxy: Setup userspace colo-proxy on primary side

2017-02-21 Thread Wei Liu
On Tue, Feb 21, 2017 at 07:03:29PM +0800, Zhang Chen wrote: > > > On 02/21/2017 05:53 PM, Wei Liu wrote: > > On Tue, Feb 21, 2017 at 10:57:46AM +0800, Zhang Chen wrote: > > > > > > On 02/20/2017 11:55 PM, Wei Liu wrote: > > > > On Fri, Feb 17, 2017 at 10:18:24AM +0800, Zhang Chen wrote: > > > >

Re: [Xen-devel] [PATCH v2 3/3] x86/vmx: fix vmentry failure with TSX bits in LBR

2017-02-21 Thread Andrew Cooper
On 21/02/17 09:13, Tian, Kevin wrote: >> @@ -2618,6 +2630,56 @@ static const struct lbr_info >> *last_branch_msr_get(void) >> return NULL; >> } >> >> +enum >> +{ >> +LBR_FORMAT_32 = 0x0, /* 32-bit record format */ >> +LBR_FORMAT_LIP= 0x1, /* 64-bit LIP

[Xen-devel] [PATCH 05/11] xen/arm: vpl011: Initialize nr_spis in vgic_init in Xen to atleast 1

2017-02-21 Thread Bhupinder Thakur
Ensure that nr_spis intialized in in vgic_init is atleast 1 to allow allocation of pl011 spi virq. Signed-off-by: Bhupinder Thakur --- xen/arch/arm/vgic.c | 5 + 1 file changed, 5 insertions(+) diff --git a/xen/arch/arm/vgic.c b/xen/arch/arm/vgic.c index 364d5f0..614b3ec 100644 --- a/xen/a

[Xen-devel] [PATCH 02/11] xen/arm: vpl011: Add new hvm params in Xen for ring buffer/event setup

2017-02-21 Thread Bhupinder Thakur
Three new HVM param handlers added for: - allocating a new VIRQ and return to the toolstack - allocating a new event channel for sending/receiving events from Xen and return to the toolstack - mapping the PFN allocted by the toolstack to be used as IN/OUT ring buffers Signed-of

[Xen-devel] [PATCH 01/11] xen/arm: vpl011: Add pl011 uart emulation in Xen

2017-02-21 Thread Bhupinder Thakur
Add emulation code to emulate read/write access to pl011 registers and pl011 interrupts: - It emulates DR read/write by reading and writing from/to the IN and OUT ring buffers and raising an event to dom0 when there is data in the OUT ring buffer and injecting an interrupt to the

[Xen-devel] [PATCH 00/11] pl011 emulation support in Xen

2017-02-21 Thread Bhupinder Thakur
PL011 emulation for guests in Xen = This feature allows the Xen guests to map their console to a SBSA compliant pl011 UART as specified in ARM Service Base System architecture, Appendix B. Currently, Xen supports paravirtualized (aka PV) and an emulated serial

[Xen-devel] [PATCH 07/11] xen/arm: vpl011: Add two new vpl011 parameters to xenstore

2017-02-21 Thread Bhupinder Thakur
Add two new parameters to the xen store: - newly allocated PFN to be used as IN/OUT ring buffer by xenconsoled - a new event channel read from Xen using a hvm call to be used by xenconsoled for eventing Signed-off-by: Bhupinder Thakur --- tools/libxl/libxl.c | 6 ++

[Xen-devel] [PATCH 09/11] xen/arm: vpl011: Modify domain_create_ring in xenconsole to map the ring buffer and event channel

2017-02-21 Thread Bhupinder Thakur
Modfication in domain_create_ring(): - Bind to the vpl011 event channel obtained from the xen store as a new parameter - Map the PFN to its address space to be used as IN/OUT ring buffers. It obtains the PFN from the xen store as a new parameter Signed-off-by: Bhupinder Thakur ---

[Xen-devel] [PATCH 04/11] xen/arm: vpl011: Enable vpl011 emulation for a domain in Xen

2017-02-21 Thread Bhupinder Thakur
Based on one of the domain creation flags, the vpl011 emulation will be enabled for the domain. This flag is currently set always but finally it needs to be controlled by the user through some configuration option. Signed-off-by: Bhupinder Thakur --- xen/arch/arm/domain.c | 8 xen/

[Xen-devel] [PATCH 03/11] xen/arm: vpl011: Refactor evtchn_send in Xen to allow sending events from a xen bound channel

2017-02-21 Thread Bhupinder Thakur
Breakup evtchn_send() to allow sending events for a Xen bound channel. Currently, there is a check in evtchn_send() i.e. is_consumer_xen() that if the event channel is bound to a xen consumer then event generation is not allowed for that channel. This check is to disallow a guest from raising an

[Xen-devel] [PATCH 08/11] xen/arm: vpl011: Allocate a new PFN in the toolstack and pass to Xen using a hvm call

2017-02-21 Thread Bhupinder Thakur
Allocates a new pfn, initializes it and passes on to Xen using a hvm call. Another changes is in xc_hvm_param_deprecated_check () to allow new vpl011 HVM params, which have been defined to some deprecated HVM params. Signed-off-by: Bhupinder Thakur --- tools/libxc/include/xc_dom.h | 5 + t

[Xen-devel] [PATCH 10/11] xen/arm: vpl011: Modify handle_ring_read and buffer_append to read/append vpl011 data

2017-02-21 Thread Bhupinder Thakur
MOdifications in the following functions: - handle_ring_read() - to allow reading data from both PV or vpl011 OUT ring buffers based on which port received the event - buffer_append() - append data received for either PV or vp011 OUT ring buffer Signed-off-by: Bhupinder Thakur --

[Xen-devel] [PATCH 06/11] xen/arm: vpl011: Add a new pl011 uart node in the guest DT in the toolstack

2017-02-21 Thread Bhupinder Thakur
Add a new pl011 uart node - Get the pl011 spi virq from Xen using a hvm call - Add a new device tree node in the guest DT for SBSA pl011 uart containing the IRQ (read above) and the MMIO address range to be used by the guest The format for the node is specified in Documentation/dev

[Xen-devel] [PATCH 11/11] xen/arm: vpl011: Modify handle_tty_read in xenconsole to redirect user data to vpl011 IN ring buffer

2017-02-21 Thread Bhupinder Thakur
Modification in handle_tty_read to write the user data to the vpl011 IN ring buffer. Finally this needs to be modified to allow user input for both PV and vpl011 consoles. Signed-off-by: Bhupinder Thakur --- tools/console/daemon/io.c | 19 +-- 1 file changed, 17 insertions(+),

Re: [Xen-devel] [PATCH v5 0/2] x86/kvm: Reduce vcpu_is_preempted() overhead

2017-02-21 Thread Paolo Bonzini
On 20/02/2017 20:54, Peter Zijlstra wrote: > On Mon, Feb 20, 2017 at 01:36:02PM -0500, Waiman Long wrote: >> Waiman Long (2): >> x86/paravirt: Change vcp_is_preempted() arg type to long >> x86/kvm: Provide optimized version of vcpu_is_preempted() for x86-64 >> >> arch/x86/include/asm/paravir

[Xen-devel] [PATCH] tracing: xenalyze: kill spurious ", " in Credit1 traces.

2017-02-21 Thread Dario Faggioli
Signed-off-by: Dario Faggioli --- Cc: George Dunlap Cc: Ian Jackson Cc: Wei Liu --- tools/xentrace/xenalyze.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/xentrace/xenalyze.c b/tools/xentrace/xenalyze.c index a90da20..b2d1b6a 100644 --- a/tools/xentrace/xenalyze

[Xen-devel] [ovmf test] 105937: all pass - PUSHED

2017-02-21 Thread osstest service owner
flight 105937 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/105937/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 5af4388433e13ffeda980116d92f4230c79e483d baseline version: ovmf c035e37335ae43229d7e6

[Xen-devel] Xen Security Advisory 209 (CVE-2017-2620) - cirrus_bitblt_cputovideo does not check if memory region is safe

2017-02-21 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2017-2620 / XSA-209 version 3 cirrus_bitblt_cputovideo does not check if memory region is safe UPDATES IN VERSION 3 Public release. ISSUE DESCRIPTION ==

[Xen-devel] [PATCH 1/4] xenstore: enhance debug command support

2017-02-21 Thread Juergen Gross
The Xenstore protocol supports the XS_DEBUG command for triggering various actions in the Xenstore daemon. Enhance that support by using a command table and adding a help function. Move all the XS_DEBUG related code to a new source file xenstored_debug.c. Support multiple debug commands in the ass

[Xen-devel] [PATCH 0/4] xenstore: enhance runtime debug capabilities

2017-02-21 Thread Juergen Gross
Today xenstored supports logging only via a command line parameter. This means that logging is either all the time off (default) or on. To switch logging on the Xen host has to be rebooted as xenstored isn't restartable. This patch series changes this by using the XS_DEBUG wire command of Xenstore

[Xen-devel] [PATCH 4/4] xenstore: remove memory report command line support

2017-02-21 Thread Juergen Gross
As a memory report can now be triggered via XS_DEBUG support via command line and signal handler is no longer needed. Remove it. Signed-off-by: Juergen Gross --- tools/xenstore/xenstored_core.c | 35 ++- 1 file changed, 2 insertions(+), 33 deletions(-) diff --git

[Xen-devel] [PATCH 3/4] xenstore: make memory report available via XS_DEBUG

2017-02-21 Thread Juergen Gross
Add a XS_DEBUG command to xenstored for doing a talloc report to a file. Right now this is supported by specifying a command line option when starting xenstored and sending a signal to the daemon to trigger the report. To dump the report to the standard log file call: xenstore-control memreport

[Xen-devel] [PATCH 2/4] xenstore: add support for changing log functionality dynamically

2017-02-21 Thread Juergen Gross
Today Xenstore supports logging only if specified at start of the Xenstore daemon. As it can't be disabled during runtime it is not recommended to start xenstored with logging enabled. Add support for switching logging on and off at runtime and to specify a (new) logfile. This is done via the XS_D

[Xen-devel] Error in Xen while booting for salvator-X (M3 Board)

2017-02-21 Thread George John
Hi, I was trying out xen in salvator-X(M3 Board as described in https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/Salvator-X I ran in to following error: U-Boot 2015.04 (Feb 21 2017 - 14:24:48) CPU: Renesas Electronics R8A7796 rev 1.0 Board: Salvator-X I2C: ready DRAM:

Re: [Xen-devel] [PATCH 3/4] xenstore: make memory report available via XS_DEBUG

2017-02-21 Thread Wei Liu
On Tue, Feb 21, 2017 at 01:00:58PM +0100, Juergen Gross wrote: > Add a XS_DEBUG command to xenstored for doing a talloc report to a > file. Right now this is supported by specifying a command line option > when starting xenstored and sending a signal to the daemon to trigger > the report. > > To d

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread Julien Grall
Hi Dario, On 21/02/2017 09:09, Dario Faggioli wrote: On Tue, 2017-02-21 at 07:59 +, Julien Grall wrote: On 20/02/2017 22:53, Dario Faggioli wrote: For instance, as you say, executing a WFI from a guest directly on hardware, only makes sense if we have 1:1 static pinning. Which means it can

[Xen-devel] [PULL 03/11] hw: Default -drive to if=none instead of ide when ide cannot work

2017-02-21 Thread Markus Armbruster
Block backends defined with -drive if=ide are meant to be picked up by machine initialization code: a suitable frontend gets created and wired up automatically. if=ide drives not picked up that way can still be used with -device as if they had if=none, but that's unclean and best avoided. Unused

Re: [Xen-devel] [PATCH 3/4] xenstore: make memory report available via XS_DEBUG

2017-02-21 Thread Juergen Gross
On 21/02/17 13:16, Wei Liu wrote: > On Tue, Feb 21, 2017 at 01:00:58PM +0100, Juergen Gross wrote: >> Add a XS_DEBUG command to xenstored for doing a talloc report to a >> file. Right now this is supported by specifying a command line option >> when starting xenstored and sending a signal to the da

Re: [Xen-devel] [PATCH 3/4] xenstore: make memory report available via XS_DEBUG

2017-02-21 Thread Wei Liu
On Tue, Feb 21, 2017 at 01:36:58PM +0100, Juergen Gross wrote: > On 21/02/17 13:16, Wei Liu wrote: > > On Tue, Feb 21, 2017 at 01:00:58PM +0100, Juergen Gross wrote: > >> Add a XS_DEBUG command to xenstored for doing a talloc report to a > >> file. Right now this is supported by specifying a comman

[Xen-devel] [xen-4.6-testing test] 105936: tolerable FAIL - PUSHED

2017-02-21 Thread osstest service owner
flight 105936 xen-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/105936/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl 3 host-install(3) broken in 105926 pass in 105936 test-armhf-armhf-xl-credit2 1

[Xen-devel] [libvirt test] 105938: tolerable FAIL - PUSHED

2017-02-21 Thread osstest service owner
flight 105938 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/105938/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-xsm 13 saverestore-support-checkfail like 105921 test-armhf-armhf-libvirt 13

Re: [Xen-devel] Python 3 bindings

2017-02-21 Thread Marek Marczykowski-Górecki
On Mon, Feb 20, 2017 at 05:18:44PM +, Wei Liu wrote: > On Fri, Feb 17, 2017 at 01:36:01PM +0100, Marek Marczykowski-Górecki wrote: > > Hi, > > > > I'm adjusting python bindings to work on python3 too. This will require > > few #if in the code (to compile for both python2 and python3), but it >

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread Julien Grall
Hi Dario, On 21/02/17 09:24, Dario Faggioli wrote: On Tue, 2017-02-21 at 08:10 +, Julien Grall wrote: On 21/02/2017 00:38, Stefano Stabellini wrote: On Mon, 20 Feb 2017, Dario Faggioli wrote: Mmm... ok, yes, in that case, it may make sense and work, from a, let's say, purely functional pe

Re: [Xen-devel] [PATCH V3 2/7] COLO-Proxy: Setup userspace colo-proxy on primary side

2017-02-21 Thread Zhang Chen
On 02/21/2017 07:18 PM, Wei Liu wrote: On Tue, Feb 21, 2017 at 07:03:29PM +0800, Zhang Chen wrote: On 02/21/2017 05:53 PM, Wei Liu wrote: On Tue, Feb 21, 2017 at 10:57:46AM +0800, Zhang Chen wrote: On 02/20/2017 11:55 PM, Wei Liu wrote: On Fri, Feb 17, 2017 at 10:18:24AM +0800, Zhang Chen

Re: [Xen-devel] [PATCH v2 1/3] x86/hvm: Don't raise #GP behind the emulators back for MSR accesses

2017-02-21 Thread Boris Ostrovsky
On 02/20/2017 05:28 AM, Andrew Cooper wrote: > The current hvm_msr_{read,write}_intercept() infrastructure calls > hvm_inject_hw_exception() directly to latch a fault, and returns > X86EMUL_EXCEPTION to its caller. > > This behaviour is problematic for the hvmemul_{read,write}_msr() paths, as the >

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread George Dunlap
On 21/02/17 12:30, Julien Grall wrote: > Hi Dario, > > On 21/02/2017 09:09, Dario Faggioli wrote: >> On Tue, 2017-02-21 at 07:59 +, Julien Grall wrote: >>> On 20/02/2017 22:53, Dario Faggioli wrote: For instance, as you say, executing a WFI from a guest directly on hardware, only mak

[Xen-devel] [xen-unstable-smoke test] 105950: tolerable trouble: broken/fail/pass - PUSHED

2017-02-21 Thread osstest service owner
flight 105950 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/105950/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen

Re: [Xen-devel] Removing PVHv1 code

2017-02-21 Thread Boris Ostrovsky
On 02/20/2017 05:42 AM, Roger Pau Monne wrote: > On Mon, Feb 20, 2017 at 12:20:10AM +, Andrew Cooper wrote: >> From >> http://logs.test-lab.xenproject.org/osstest/logs/105917/test-amd64-amd64-xl-pvh-intel/serial-fiano0.log >> around Feb 19 23:12:06.269706 >> >> (XEN) [ Xen-4.9-unstable x86

Re: [Xen-devel] [PATCH v2 1/3] x86/hvm: Don't raise #GP behind the emulators back for MSR accesses

2017-02-21 Thread Andrew Cooper
On 21/02/17 13:46, Boris Ostrovsky wrote: >> diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c >> index 894c457..b864535 100644 >> --- a/xen/arch/x86/hvm/svm/svm.c >> +++ b/xen/arch/x86/hvm/svm/svm.c >> @@ -1744,7 +1744,6 @@ static int svm_msr_read_intercept(unsigned int msr, >>

Re: [Xen-devel] [PATCH v2 1/3] x86/vpmu: Add get/put_vpmu() and VPMU_AVAILABLE

2017-02-21 Thread Boris Ostrovsky
On 02/21/2017 03:09 AM, Tian, Kevin wrote: >> From: Boris Ostrovsky [mailto:boris.ostrov...@oracle.com] >> Sent: Saturday, February 18, 2017 1:40 AM >> >> vpmu_enabled() (used by hvm/pv_cpuid() to properly report 0xa leaf >> for Intel processors) is based on the value of VPMU_CONTEXT_ALLOCATED >> b

[Xen-devel] [GIT PULL] xen: features and fixes for 4.11-rc0

2017-02-21 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.11-rc0-tag It contains: - a series from Boris Ostrovsky adding support for booting Linux as Xen PVH guest - a series from Juergen Gross streamlining the xenbus driver - a series fr

Re: [Xen-devel] [PATCH v2 1/3] x86/vpmu: Add get/put_vpmu() and VPMU_AVAILABLE

2017-02-21 Thread Boris Ostrovsky
On 02/21/2017 06:00 AM, Andrew Cooper wrote: > On 17/02/17 17:40, Boris Ostrovsky wrote: >> @@ -509,15 +498,63 @@ void vpmu_initialise(struct vcpu *v) >> if ( ret ) >> printk(XENLOG_G_WARNING "VPMU: Initialization failed for %pv\n", v); >> >> -/* Intel needs to initialize VPMU o

[Xen-devel] [PATCH v2 5/5] xenstore: remove memory report command line support

2017-02-21 Thread Juergen Gross
As a memory report can now be triggered via XS_CONTROL support via command line and signal handler is no longer needed. Remove it. Signed-off-by: Juergen Gross --- tools/xenstore/xenstored_core.c | 35 ++- 1 file changed, 2 insertions(+), 33 deletions(-) diff --g

[Xen-devel] [PATCH v2 1/5] xenstore: rename XS_DEBUG wire command

2017-02-21 Thread Juergen Gross
In preparation to support other than pure debug functionality via the Xenstore XS_DEBUG wire command rename it to XS_CONTROL and make XS_DEBUG an alias of it. Add an alias xs_control_command for the associated xs_debug_command, too. Signed-off-by: Juergen Gross --- tools/xenstore/include/xensto

[Xen-devel] [PATCH v2 0/5] xenstore: enhance runtime debug capabilities

2017-02-21 Thread Juergen Gross
Today xenstored supports logging only via a command line parameter. This means that logging is either all the time off (default) or on. To switch logging on the Xen host has to be rebooted as xenstored isn't restartable. This patch series changes this by using the XS_DEBUG wire command of Xenstore

[Xen-devel] [PATCH v2 4/5] xenstore: make memory report available via XS_CONTROL

2017-02-21 Thread Juergen Gross
Add a XS_CONTROL command to xenstored for doing a talloc report to a file. Right now this is supported by specifying a command line option when starting xenstored and sending a signal to the daemon to trigger the report. To dump the report to the standard log file call: xenstore-control memreport

[Xen-devel] [PATCH v2 3/5] xenstore: add support for changing log functionality dynamically

2017-02-21 Thread Juergen Gross
Today Xenstore supports logging only if specified at start of the Xenstore daemon. As it can't be disabled during runtime it is not recommended to start xenstored with logging enabled. Add support for switching logging on and off at runtime and to specify a (new) logfile. This is done via the XS_C

[Xen-devel] [PATCH v2 2/5] xenstore: enhance control command support

2017-02-21 Thread Juergen Gross
The Xenstore protocol supports the XS_CONTROL command for triggering various actions in the Xenstore daemon. Enhance that support by using a command table and adding a help function. Move all the XS_CONTROL related code to a new source file xenstored_control.c. Support multiple control commands in

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread Dario Faggioli
On Tue, 2017-02-21 at 13:46 +, George Dunlap wrote: > > A.  Don't trap guest WFI at all -- allow it to 'halt' in > moderate-power-but-ready-for-interrupt mode. > > [..] > > A is safe because the scheduler should already have set a timer to > break > out of it if necessary.  The only potential

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread Julien Grall
Hi George, On 21/02/17 13:46, George Dunlap wrote: I think our options look like: Thank you for the summary of the options! A. Don't trap guest WFI at all -- allow it to 'halt' in moderate-power-but-ready-for-interrupt mode. B. Trap guest WFI and block normally. C. Trap guest WFI and pol

Re: [Xen-devel] [PATCH] xen: do not re-use pirq number cached in pci device msi msg data

2017-02-21 Thread Dan Streetman
On Fri, Jan 13, 2017 at 5:30 PM, Konrad Rzeszutek Wilk wrote: > On Fri, Jan 13, 2017 at 03:07:51PM -0500, Dan Streetman wrote: >> Revert the main part of commit: >> af42b8d12f8a ("xen: fix MSI setup and teardown for PV on HVM guests") >> >> That commit introduced reading the pci device's msi messa

Re: [Xen-devel] [PATCH] xen: do not re-use pirq number cached in pci device msi msg data

2017-02-21 Thread Juergen Gross
On 21/02/17 16:31, Dan Streetman wrote: > On Fri, Jan 13, 2017 at 5:30 PM, Konrad Rzeszutek Wilk > wrote: >> On Fri, Jan 13, 2017 at 03:07:51PM -0500, Dan Streetman wrote: >>> Revert the main part of commit: >>> af42b8d12f8a ("xen: fix MSI setup and teardown for PV on HVM guests") >>> >>> That com

[Xen-devel] [PATCH 0/2] tools: split xl into a separate directory

2017-02-21 Thread Wei Liu
Xl has grown sufficiently large to warrnant its own directory. We also need clear separation between the client (xl) and library (libxl). This patch series moves xl into tools/xl directory. Use find to generate a list of files to be installed from staging and wip branch, then `diff -q staging w

[Xen-devel] [PATCH 1/2] tools: provide libxlutil compiling and linking options

2017-02-21 Thread Wei Liu
We are about to split out xl (which depends on libxlutil) to a different directory. Provide the proper options for compiling and linking in Rules.mk, and replace the hardcoded string in libxl/Makefile. No functional change. Signed-off-by: Wei Liu --- tools/Rules.mk | 7 +++ tools/libx

[Xen-devel] [PATCH 2/2] tools: move xl to a dedicated directory

2017-02-21 Thread Wei Liu
It makes clear distinction between the client (xl) and library (libxl), which should help design better APIs. This will also help reduce the code size in libxl directory. Signed-off-by: Wei Liu --- .gitignore | 2 +- tools/libxl/Makefile| 22 ---

Re: [Xen-devel] [PATCH] xen: do not re-use pirq number cached in pci device msi msg data

2017-02-21 Thread Boris Ostrovsky
On 02/21/2017 10:45 AM, Juergen Gross wrote: > On 21/02/17 16:31, Dan Streetman wrote: >> On Fri, Jan 13, 2017 at 5:30 PM, Konrad Rzeszutek Wilk >> wrote: >>> On Fri, Jan 13, 2017 at 03:07:51PM -0500, Dan Streetman wrote: Revert the main part of commit: af42b8d12f8a ("xen: fix MSI setup

Re: [Xen-devel] [PATCH 01/10] x86/cpuid: Disallow policy updates once the domain is running

2017-02-21 Thread Jan Beulich
>>> On 20.02.17 at 12:00, wrote: > On real hardware, the bulk of CPUID data is system-specific and constant. > Hold the toolstack to the same behaviour when constructing domains. > > Values which are expected to change dynamically (e.g. OSXSAVE) are > unaffected > and continue to function as bef

Re: [Xen-devel] [PATCH 02/10] x86/gen-cpuid: Clarify the intended meaning of AVX wrt feature dependencies

2017-02-21 Thread Jan Beulich
>>> On 20.02.17 at 12:00, wrote: > --- a/xen/tools/gen-cpuid.py > +++ b/xen/tools/gen-cpuid.py > @@ -225,9 +225,13 @@ def crunch_numbers(state): > XSAVE: [XSAVEOPT, XSAVEC, XGETBV1, XSAVES, > AVX, MPX, PKU, LWP], > > -# AVX is taken to mean hardware support for

Re: [Xen-devel] [PATCH 02/10] x86/gen-cpuid: Clarify the intended meaning of AVX wrt feature dependencies

2017-02-21 Thread Andrew Cooper
On 21/02/17 16:40, Jan Beulich wrote: On 20.02.17 at 12:00, wrote: >> --- a/xen/tools/gen-cpuid.py >> +++ b/xen/tools/gen-cpuid.py >> @@ -225,9 +225,13 @@ def crunch_numbers(state): >> XSAVE: [XSAVEOPT, XSAVEC, XGETBV1, XSAVES, >> AVX, MPX, PKU, LWP], >> >> -

Re: [Xen-devel] [PATCH 02/10] x86/gen-cpuid: Clarify the intended meaning of AVX wrt feature dependencies

2017-02-21 Thread Jan Beulich
>>> On 21.02.17 at 17:40, wrote: On 20.02.17 at 12:00, wrote: >> --- a/xen/tools/gen-cpuid.py >> +++ b/xen/tools/gen-cpuid.py >> @@ -225,9 +225,13 @@ def crunch_numbers(state): >> XSAVE: [XSAVEOPT, XSAVEC, XGETBV1, XSAVES, >> AVX, MPX, PKU, LWP], >> >> -#

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread Dario Faggioli
On Tue, 2017-02-21 at 12:30 +, Julien Grall wrote: > On 21/02/2017 09:09, Dario Faggioli wrote: > > Well, TBH, we still are not entirely sure who the culprit is for > > high > > latency. There are spikes in Credit2, and I'm investigating that. > > But > > apart from them? I think we need other

[Xen-devel] [ovmf baseline-only test] 68588: regressions - FAIL

2017-02-21 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68588 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68588/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boot

Re: [Xen-devel] [PATCH 02/10] x86/gen-cpuid: Clarify the intended meaning of AVX wrt feature dependencies

2017-02-21 Thread Andrew Cooper
On 21/02/17 16:47, Jan Beulich wrote: On 21.02.17 at 17:40, wrote: > On 20.02.17 at 12:00, wrote: >>> --- a/xen/tools/gen-cpuid.py >>> +++ b/xen/tools/gen-cpuid.py >>> @@ -225,9 +225,13 @@ def crunch_numbers(state): >>> XSAVE: [XSAVEOPT, XSAVEC, XGETBV1, XSAVES, >>>

[Xen-devel] [xen-unstable-smoke test] 105953: tolerable trouble: broken/fail/pass - PUSHED

2017-02-21 Thread osstest service owner
flight 105953 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/105953/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a build-arm64 5 xen

Re: [Xen-devel] [PATCH] xen/arm: introduce vwfi parameter

2017-02-21 Thread George Dunlap
On 21/02/17 15:14, Julien Grall wrote: > Hi George, > > On 21/02/17 13:46, George Dunlap wrote: >> I think our options look like: > > Thank you for the summary of the options! > >> >> A. Don't trap guest WFI at all -- allow it to 'halt' in >> moderate-power-but-ready-for-interrupt mode. >> >> B

Re: [Xen-devel] [PATCH 03/10] x86/cpuid: Handle leaf 0x1 in guest_cpuid()

2017-02-21 Thread Jan Beulich
>>> On 20.02.17 at 12:00, wrote: > The ebx word is more problematic. The low 8 bits are the brand ID and safe to > pass straight through. The next 8 bits are the CLFLUSH line size. This value > is forwarded straight from hardware, as nothing good can possibly come of > providing an alternative

Re: [Xen-devel] [PATCH 02/10] x86/gen-cpuid: Clarify the intended meaning of AVX wrt feature dependencies

2017-02-21 Thread Jan Beulich
>>> On 21.02.17 at 17:53, wrote: > On 21/02/17 16:47, Jan Beulich wrote: > On 21.02.17 at 17:40, wrote: >> On 20.02.17 at 12:00, wrote: --- a/xen/tools/gen-cpuid.py +++ b/xen/tools/gen-cpuid.py @@ -225,9 +225,13 @@ def crunch_numbers(state): XSAVE: [XSAVEOPT,

Re: [Xen-devel] [PATCH 02/10] x86/gen-cpuid: Clarify the intended meaning of AVX wrt feature dependencies

2017-02-21 Thread Andrew Cooper
On 21/02/17 17:07, Jan Beulich wrote: On 21.02.17 at 17:53, wrote: >> On 21/02/17 16:47, Jan Beulich wrote: >> On 21.02.17 at 17:40, wrote: >>> On 20.02.17 at 12:00, wrote: > --- a/xen/tools/gen-cpuid.py > +++ b/xen/tools/gen-cpuid.py > @@ -225,9 +225,13 @@ def crunch_nu

Re: [Xen-devel] [PATCH 03/10] x86/cpuid: Handle leaf 0x1 in guest_cpuid()

2017-02-21 Thread Andrew Cooper
On 21/02/17 16:59, Jan Beulich wrote: On 20.02.17 at 12:00, wrote: >> The ebx word is more problematic. The low 8 bits are the brand ID and safe >> to >> pass straight through. The next 8 bits are the CLFLUSH line size. This >> value >> is forwarded straight from hardware, as nothing goo

Re: [Xen-devel] [PATCH 04/10] x86/cpuid: Handle leaf 0x4 in guest_cpuid()

2017-02-21 Thread Jan Beulich
>>> On 20.02.17 at 12:00, wrote: > --- a/xen/arch/x86/cpuid.c > +++ b/xen/arch/x86/cpuid.c > @@ -163,6 +163,9 @@ static void recalculate_xstate(struct cpuid_policy *p) > */ > static void recalculate_misc(struct cpuid_policy *p) > { > +/* Leaves with subleaf unions. */ > +p->basic.raw[0

Re: [Xen-devel] [PATCH 02/10] x86/gen-cpuid: Clarify the intended meaning of AVX wrt feature dependencies

2017-02-21 Thread Jan Beulich
>>> On 21.02.17 at 18:12, wrote: > Which particular feature groups? I could extend that text to say > > "VEX/XOP-encoded GPR instructions, such as those from the BMI{1,2} and > $X sets..." TBM and LWP. Jan ___ Xen-devel mailing list Xen-devel@lists

Re: [Xen-devel] [PATCH 03/10] x86/cpuid: Handle leaf 0x1 in guest_cpuid()

2017-02-21 Thread Jan Beulich
>>> On 21.02.17 at 18:13, wrote: > On 21/02/17 16:59, Jan Beulich wrote: > On 20.02.17 at 12:00, wrote: >>> The ebx word is more problematic. The low 8 bits are the brand ID and safe >>> to >>> pass straight through. The next 8 bits are the CLFLUSH line size. This >>> value >>> is forwar

  1   2   >