[Xen-devel] [RESEND PATCH] xen/blkfront: increase the default value of xen_blkif_max_segments

2015-01-20 Thread Bob Liu
The default max-segments of indirect requests was 32, so IO operations with bigger block size(>32*4k) would be split and make performance drop. Nowadays backend device usually support 512k max_sectors_kb on desktop, and usually larger on server machines connected with high-end storage system. The

[Xen-devel] [RESEND Patch V2 4/4] xen: use generated hypercall symbols in arch/x86/xen/xen-head.S

2015-01-20 Thread Juergen Gross
Instead of manually list each hypercall in arch/x86/xen/xen-head.S use the auto generated symbol list. This also corrects the wrong address of xen_hypercall_mca which was located 32 bytes higher than it should. Symbol addresses have been verified to match the correct ones via objdump output. Bas

[Xen-devel] [RESEND Patch V2 1/4] xen: build infrastructure for generating hypercall depending symbols

2015-01-20 Thread Juergen Gross
Today there are several places in the kernel which build tables containing one entry for each possible Xen hypercall. Create an infrastructure to be able to generate these tables at build time. Based-on-patch-by: Jan Beulich Signed-off-by: Juergen Gross Reviewed-by: David Vrabel --- arch/x86/s

[Xen-devel] [RESEND Patch V2 3/4] xen: use generated hypervisor symbols in arch/x86/xen/trace.c

2015-01-20 Thread Juergen Gross
Instead of manually list all hypervisor calls in arch/x86/xen/trace.c use the auto generated list. Signed-off-by: Juergen Gross Reviewed-by: David Vrabel --- arch/x86/xen/trace.c | 50 -- 1 file changed, 4 insertions(+), 46 deletions(-) diff --gi

[Xen-devel] [RESEND Patch V2 0/4] xen: auto-generate symbols for xen hypercalls

2015-01-20 Thread Juergen Gross
The Xen hypercalls are defined in include/xen/interface/xen.h. There are some places where for each hypercall a table element is created. Instead of manually add each hypercall element to these tables use an auto generated header built during the make process of the kernel. Changes in V2: - add "a

[Xen-devel] [RESEND Patch V2 2/4] xen: synchronize include/xen/interface/xen.h with xen

2015-01-20 Thread Juergen Gross
The header include/xen/interface/xen.h doesn't contain all definitions from Xen's version of that header. Update it accordingly. Signed-off-by: Juergen Gross Reviewed-by: David Vrabel --- arch/x86/xen/trace.c| 2 +- include/xen/interface/xen.h | 6 +- 2 files changed, 6 insertions(+

Re: [Xen-devel] [Qemu-devel] [RFC][PATCH 1/1] libxl: add one machine property to support IGD GFX passthrough

2015-01-20 Thread Chen, Tiejun
CCed Stefano. Thanks Tiejun On 2015/1/21 15:19, Tiejun Chen wrote: When we're working to support IGD GFX passthrough with qemu upstream, instead of "-gfx_passthru" we'd like to make that a machine option, "-machine xxx,gfx_passthru=on". This need to bring several changes on tool side. Signed-o

[Xen-devel] [RFC][PATCH 1/1] libxl: add one machine property to support IGD GFX passthrough

2015-01-20 Thread Tiejun Chen
When we're working to support IGD GFX passthrough with qemu upstream, instead of "-gfx_passthru" we'd like to make that a machine option, "-machine xxx,gfx_passthru=on". This need to bring several changes on tool side. Signed-off-by: Tiejun Chen --- tools/libxl/libxl_dm.c | 19 +-

[Xen-devel] [linux-3.14 bisection] complete test-amd64-amd64-xl-pvh-intel

2015-01-20 Thread xen . org
branch xen-unstable xen branch xen-unstable job test-amd64-amd64-xl-pvh-intel test xen-boot Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unst

Re: [Xen-devel] [libvirt] [PATCH] tests: fix xlconfigtest build failure

2015-01-20 Thread Jim Fehlig
Eric Blake wrote: > On 01/20/2015 09:09 PM, Jim Fehlig wrote: > >> When libvirt is configured --without-xen, building the xlconfigtest >> fails with >> >> CCLD xlconfigtest >> /usr/lib/gcc/x86_64-linux-gnu/4.7/../../../x86_64-linux-gnu/crt1.o >> In function `_start': (.text+0x20): undefi

Re: [Xen-devel] [PATCH OSSTEST v2 18/18] WIP: libvirt: migration + save/restore support.

2015-01-20 Thread Jim Fehlig
Ian Jackson wrote: > Ian Campbell writes ("[PATCH OSSTEST v2 18/18] WIP: libvirt: migration + > save/restore support."): > >> Note that this remains stubbed out, since making it actually work >> requires more work (i.e. I need to figure out what is involved, seem >> to need TLS and a CA etc...)

Re: [Xen-devel] [libvirt bisection] complete build-armhf-libvirt

2015-01-20 Thread Jim Fehlig
Ian Campbell wrote: > On Mon, 2015-01-19 at 09:37 +, Ian Campbell wrote: > >> On Mon, 2015-01-19 at 04:48 +, xen.org wrote: >> >>> branch xen-unstable >>> xen branch xen-unstable >>> job build-armhf-libvirt >>> test libvirt-build >>> >>> Tree: libvirt git://libvirt.org/libvirt.git >

[Xen-devel] [xen-4.4-testing test] 33575: regressions - FAIL

2015-01-20 Thread xen . org
flight 33575 xen-4.4-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33575/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win7-amd64 13 guest-localmigrate/x10 fail REGR. vs. 33563 Regressions

Re: [Xen-devel] [libvirt] [PATCH] tests: fix xlconfigtest build failure

2015-01-20 Thread Eric Blake
On 01/20/2015 09:09 PM, Jim Fehlig wrote: > When libvirt is configured --without-xen, building the xlconfigtest > fails with > > CCLD xlconfigtest > /usr/lib/gcc/x86_64-linux-gnu/4.7/../../../x86_64-linux-gnu/crt1.o > In function `_start': (.text+0x20): undefined reference to `main' > co

[Xen-devel] [PATCH] tests: fix xlconfigtest build failure

2015-01-20 Thread Jim Fehlig
When libvirt is configured --without-xen, building the xlconfigtest fails with CCLD xlconfigtest /usr/lib/gcc/x86_64-linux-gnu/4.7/../../../x86_64-linux-gnu/crt1.o In function `_start': (.text+0x20): undefined reference to `main' collect2: error: ld returned 1 exit status Introduced in

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-20 Thread Tian, Kevin
> From: George Dunlap > Sent: Tuesday, January 20, 2015 8:57 PM > > On Tue, Jan 20, 2015 at 12:52 AM, Tian, Kevin wrote: > >> For RMRRs in the BIOS area, libxl will already need to know where that > >> area is (to know that it doesn't need to fit it into the MMIO hole); if > >> we just make it sm

[Xen-devel] [PATCH v2 07/30] PCI: Pass PCI domain number combined with root bus number

2015-01-20 Thread Yijing Wang
Now we could pass PCI domain combined with bus number in u32 argu. Because in arm/arm64, PCI domain number is assigned by pci_bus_assign_domain_nr(). So we leave pci_scan_root_bus() and pci_create_root_bus() in arm/arm64 unchanged. A new function pci_host_assign_domain_nr() will be introduced for a

[Xen-devel] [xen-4.3-testing test] 33574: regressions - FAIL

2015-01-20 Thread xen . org
flight 33574 xen-4.3-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33574/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 7 redhat-installfail REGR. vs. 33427 test-amd64-amd64-

[Xen-devel] [PATCH v2 03/30] xen/PCI: Don't use deprecated function pci_scan_bus_parented()

2015-01-20 Thread Yijing Wang
From: Arnd Bergmann Use pci_scan_root_bus() instead of deprecated function pci_scan_bus_parented(). Signed-off-by: Arnd Bergmann Signed-off-by: Yijing Wang CC: Konrad Rzeszutek Wilk CC: xen-de...@lists.xenproject.org --- drivers/pci/xen-pcifront.c | 10 +++--- 1 files changed, 7 insert

Re: [Xen-devel] (v2) Design proposal for RMRR fix

2015-01-20 Thread Tian, Kevin
> From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Tuesday, January 20, 2015 6:49 PM > > >>> On 20.01.15 at 11:38, wrote: > > On Tue, 2015-01-20 at 09:10 +, Jan Beulich wrote: > >> >>> On 20.01.15 at 09:59, wrote: > >> >> From: Jan Beulich [mailto:jbeul...@suse.com] > >> >> Sent: Tuesda

Re: [Xen-devel] [PATCH v4 00/14] Enable vTPM subsystem on TPM 2.0

2015-01-20 Thread Xu, Quan
> -Original Message- > From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov] > Sent: Wednesday, January 21, 2015 6:28 AM > To: Xu, Quan; xen-devel@lists.xen.org > Cc: ian.campb...@citrix.com; ian.jack...@eu.citrix.com; jbeul...@suse.com; > k...@xen.org; t...@xen.org; stefano.stabell...@eu.

[Xen-devel] [xen-4.5-testing test] 33576: regressions - FAIL

2015-01-20 Thread xen . org
flight 33576 xen-4.5-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33576/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl 5 xen-boot fail REGR. vs. 33414 Tests which did n

Re: [Xen-devel] [PATCH v4 00/14] Enable vTPM subsystem on TPM 2.0

2015-01-20 Thread Daniel De Graaf
On 01/15/2015 04:21 AM, Quan Xu wrote: This series of patch enable the virtual Trusted Platform Module (vTPM) subsystem for Xen on TPM 2.0. Noted, functionality for a virtual guest operating system (a DomU) is still TPM 1.2. The main modifcation is on vtpmmgr-stubdom. The challenge is that TPM 2

[Xen-devel] [qemu-mainline test] 33578: regressions - FAIL

2015-01-20 Thread xen . org
flight 33578 qemu-mainline real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/33578/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 5 xen-build fail REGR. vs. 33480 Tests which did not

[Xen-devel] [PATCH v14 10/11] pvqspinlock, x86: Enable PV qspinlock for KVM

2015-01-20 Thread Waiman Long
This patch adds the necessary KVM specific code to allow KVM to support the CPU halting and kicking operations needed by the queue spinlock PV code. Two KVM guests of 20 CPU cores (2 nodes) were created for performance testing in one of the following three configurations: 1) Only 1 VM is active

[Xen-devel] [PATCH v14 11/11] pvqspinlock, x86: Enable PV qspinlock for XEN

2015-01-20 Thread Waiman Long
This patch adds the necessary XEN specific code to allow XEN to support the CPU halting and kicking operations needed by the queue spinlock PV code. Signed-off-by: Waiman Long --- arch/x86/xen/spinlock.c | 149 +-- kernel/Kconfig.locks|2 +- 2

[Xen-devel] [PATCH v14 09/11] pvqspinlock, x86: Add para-virtualization support

2015-01-20 Thread Waiman Long
This patch adds para-virtualization support to the queue spinlock code base with minimal impact to the native case. There are some minor code changes in the generic qspinlock.c file which should be usable in other architectures. The other code changes are specific to x86 processors and so are all p

[Xen-devel] [PATCH v14 05/11] qspinlock: Optimize for smaller NR_CPUS

2015-01-20 Thread Waiman Long
From: Peter Zijlstra When we allow for a max NR_CPUS < 2^14 we can optimize the pending wait-acquire and the xchg_tail() operations. By growing the pending bit to a byte, we reduce the tail to 16bit. This means we can use xchg16 for the tail part and do away with all the repeated compxchg() oper

[Xen-devel] [PATCH v14 02/11] qspinlock, x86: Enable x86-64 to use queue spinlock

2015-01-20 Thread Waiman Long
This patch makes the necessary changes at the x86 architecture specific layer to enable the use of queue spinlock for x86-64. As x86-32 machines are typically not multi-socket. The benefit of queue spinlock may not be apparent. So queue spinlock is not enabled. Currently, there is some incompatibi

[Xen-devel] [PATCH v14 04/11] qspinlock: Extract out code snippets for the next patch

2015-01-20 Thread Waiman Long
This is a preparatory patch that extracts out the following 2 code snippets to prepare for the next performance optimization patch. 1) the logic for the exchange of new and previous tail code words into a new xchg_tail() function. 2) the logic for clearing the pending bit and setting the loc

[Xen-devel] [PATCH v14 08/11] qspinlock, x86: Rename paravirt_ticketlocks_enabled

2015-01-20 Thread Waiman Long
This patch renames the paravirt_ticketlocks_enabled static key to a more generic paravirt_spinlocks_enabled name. Signed-off-by: Waiman Long Signed-off-by: Peter Zijlstra --- arch/x86/include/asm/spinlock.h |4 ++-- arch/x86/kernel/kvm.c|2 +- arch/x86/kernel/paravi

[Xen-devel] [PATCH v14 06/11] qspinlock: Use a simple write to grab the lock

2015-01-20 Thread Waiman Long
Currently, atomic_cmpxchg() is used to get the lock. However, this is not really necessary if there is more than one task in the queue and the queue head don't need to reset the tail code. For that case, a simple write to set the lock bit is enough as the queue head will be the only one eligible to

[Xen-devel] [PATCH v14 00/11] qspinlock: a 4-byte queue spinlock with PV support

2015-01-20 Thread Waiman Long
v13->v14: - Patches 1 & 2: Add queue_spin_unlock_wait() to accommodate commit 78bff1c86 from Oleg Nesterov. - Fix the system hang problem when using PV qspinlock in an over-committed guest due to a racing condition in the pv_set_head_in_tail() function. - Increase the MAYHALT_THRESHOLD

[Xen-devel] [PATCH v14 03/11] qspinlock: Add pending bit

2015-01-20 Thread Waiman Long
From: Peter Zijlstra Because the qspinlock needs to touch a second cacheline (the per-cpu mcs_nodes[]); add a pending bit and allow a single in-word spinner before we punt to the second cacheline. It is possible so observe the pending bit without the locked bit when the last owner has just relea

[Xen-devel] [PATCH v14 07/11] qspinlock: Revert to test-and-set on hypervisors

2015-01-20 Thread Waiman Long
From: Peter Zijlstra When we detect a hypervisor (!paravirt, see qspinlock paravirt support patches), revert to a simple test-and-set lock to avoid the horrors of queue preemption. Signed-off-by: Peter Zijlstra Signed-off-by: Waiman Long --- arch/x86/include/asm/qspinlock.h | 14 +++

[Xen-devel] [PATCH v14 01/11] qspinlock: A simple generic 4-byte queue spinlock

2015-01-20 Thread Waiman Long
This patch introduces a new generic queue spinlock implementation that can serve as an alternative to the default ticket spinlock. Compared with the ticket spinlock, this queue spinlock should be almost as fair as the ticket spinlock. It has about the same speed in single-thread and it can be much

Re: [Xen-devel] [PATCH] xen-time: decreasing the rating of the xen clocksource below that of the tsc clocksource for dom0's

2015-01-20 Thread David Vrabel
On 13/01/15 08:14, Imre Palik wrote: > From: "Palik, Imre" > > In Dom0's the use of the TSC clocksource (whenever it is stable enough to > be used) instead of the Xen clocksource should not cause any issues, as > Dom0 VMs never live-migrated. The TSC clocksource is somewhat more > efficient than

Re: [Xen-devel] [Xen-users] ANN: FreeRTOS 7.6.0 for Xen on ARM released

2015-01-20 Thread Jonathan Daugherty
> BTW, I notice that you have hardcoded the GIC addresses and various > interrupt sources. We do not make any guarantees about the guest > virtual platform memory or interrupt layout beyond committing to > correctly describing them in the Device Tree Blob which is passed to > the guest kernel at st

Re: [Xen-devel] [PATCH OSSTEST v2 18/18] WIP: libvirt: migration + save/restore support.

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 18/18] WIP: libvirt: migration + save/restore support."): > Note that this remains stubbed out, since making it actually work > requires more work (i.e. I need to figure out what is involved, seem > to need TLS and a CA etc...) How annoying. > NB haven't m

Re: [Xen-devel] [PATCH OSSTEST v2 17/18] ts-guest-start: Use guest_create

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 17/18] ts-guest-start: Use guest_create"): > This allows us to abolish CfgPathVar which was inconsistently used, > appears redundant with $gho->{CfgPath} and in any case never set to > anything other than 'cfgpath'. > > I suppose it was intended to deal wit

Re: [Xen-devel] [PATCH OSSTEST v2 11/18] Toolstack: Refactor migration support check.

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 11/18] Toolstack: Refactor migration support check."): > Not implemented for libvirt (the check itself that is, the hook is present). Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org http

Re: [Xen-devel] [Bugfix v4 1/2] xen/pci: Fix xen IRQ allocation failure caused by commit b81975eade8c

2015-01-20 Thread Konrad Rzeszutek Wilk
On Mon, Jan 19, 2015 at 12:41:24PM +0800, Jiang Liu wrote: > > On 2015/1/17 2:13, Konrad Rzeszutek Wilk wrote: > > On Thu, Jan 15, 2015 at 09:04:35PM +0800, Jiang Liu wrote: > > >> > >> Note: we need to test this patch on those special AMD systems which > >> override normal SCI GSI (9) with stran

Re: [Xen-devel] [PATCH OSSTEST v2 13/18] Toolstack: Refactor save/restore support

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 13/18] Toolstack: Refactor save/restore support"): > Still stubbed out for libvirt. ... > +sub restore ($) { > +my ($self,$gho,$f,$cfg,$to) = @_; > +my $ho = $self->{Host}; > +my $gn = $gho->{Name}; > +target_cmd_root($ho, > +

Re: [Xen-devel] [PATCH OSSTEST v2 15/18] libvirt: Implement shutdown_wait

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 15/18] libvirt: Implement shutdown_wait"): > virsh does not include a --wait option to shutdown as xl and xm do, so > we implement it by hand. > > Needs new guest_await_destroy helper. Note the guest_await_shutdown > requires on_shutdown='preserve' I see t

Re: [Xen-devel] [PATCH OSSTEST v2 12/18] Toolstack: Refactor migration support.

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 12/18] Toolstack: Refactor migration support."): > Note that since the previous patch arranges for > ts-migration-support-check to continue to fail for libvirt the libvirt > code is not actually called yet (and will die if it is). This patch is > mainly incl

Re: [Xen-devel] [PATCH OSSTEST v2 14/18] libvirt: Implement initscript restart which has some hope of working.

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 14/18] libvirt: Implement initscript restart which has some hope of working."): ... >restart) > - stop > - start > + [ "$VERBOSE" != no ] && log_daemon_msg "Restarting $DESC" "$DAEMON" > + start-stop-daemon --oknodo --stop --pidfile $PIDF

Re: [Xen-devel] Xen 4.5 Development Update (GA slip by a week)

2015-01-20 Thread Konrad Rzeszutek Wilk
On Tue, Jan 20, 2015 at 09:00:36AM +, Jan Beulich wrote: > >>> On 05.01.15 at 21:08, wrote: > > = Timeline = > > > > Xen 4.5 is a 10 month release. The dates are: > > > > * Feature Freeze: 24th September 2014 > > * First RC: 24th October [Friday!] > > * RC2: Nov 11th > > * RC2 Test-day: Nov

Re: [Xen-devel] [PATCH OSSTEST v2 10/18] Toolstack: Refactor shutdown support

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 10/18] Toolstack: Refactor shutdown support"): > +sub shutdown_wait ($$) { > +my ($self,$gho) = @_; > +my $ho = $self->{Host}; > +my $gn = $gho->{Name}; > +target_cmd_root($ho,"$self->{Command} shutdown -w $gn", 200); I think the timeout sho

Re: [Xen-devel] [PATCH OSSTEST v2 16/18] Toolstack: Remove Command field for all toolstacks.

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 16/18] Toolstack: Remove Command field for all toolstacks."): > Nothing in generic code uses this now, so remove. > > xl+xend retain as _Command for internal use only. Acked-by: Ian Jackson Although personally I wouldn't bother with the rename. Ian. __

Re: [Xen-devel] [PATCH OSSTEST v2 07/18] TestSupport: guest_create takes a $ho.

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 07/18] TestSupport: guest_create takes a $ho."): > And looks up the toolstack from it. ... > sub guest_create ($$) { > -my ($gho,$toolstack) = @_; > -target_cmd_root($gho->{Host}, "$toolstack create $gho->{CfgPath}", 100); > +my ($ho,$gho) = @_;

Re: [Xen-devel] [PATCH OSSTEST v2 09/18] Toolstack: Refactor consolecmd handling

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 09/18] Toolstack: Refactor consolecmd handling"): ... > diff --git a/Osstest/Toolstack/xend.pm b/Osstest/Toolstack/xend.pm > index c921c20..896d949 100644 > --- a/Osstest/Toolstack/xend.pm > +++ b/Osstest/Toolstack/xend.pm > @@ -36,5 +36,6 @@ sub new { > #

Re: [Xen-devel] [PATCH v2 3/3] xen: prevent access to HPET from Dom0

2015-01-20 Thread Andrew Cooper
On 20/01/15 17:05, Roger Pau Monne wrote: > Prevent Dom0 from accessing HPET MMIO region by adding the HPET mfn to the > list of read-only memory regions. > > Signed-off-by: Roger Pau Monné > Cc: Jan Beulich > Cc: Andrew Cooper Please introduce a command line parameter to control this, but defa

Re: [Xen-devel] [PATCH OSSTEST v2 08/18] Toolstack: Refactor guest lifecycle.

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 08/18] Toolstack: Refactor guest lifecycle."): > Implement destory/create as per toolstack methods, including implementing the > libvirt version which previously didn't work. To do this we use the virsh > capability to convert an xl/xm style config file into

Re: [Xen-devel] [PATCH OSSTEST v2 06/18] TestSupport: always use xl for generic operations.

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 06/18] TestSupport: always use xl for generic operations."): > For several operations in TestSupport.pm the actual toolstack isn't really > relevant, since we want info straight from Xen. For simplicity just use xl (or > xm) in these cases, to avoid needing

Re: [Xen-devel] [PATCH OSSTEST v2 04/18] ts-rumpuserxen-demo-xenstorels: Use standard functions for things

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 04/18] ts-rumpuserxen-demo-xenstorels: Use standard functions for things"): > Specifically guest_create and guest_find_domid. Acked-by: Ian Jackson (Not sure why I did it like that.) Ian. ___ Xen-devel mailing

Re: [Xen-devel] [PATCH OSSTEST v2 03/18] Pass host to toolstack()

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 03/18] Pass host to toolstack()"): > This will be needed in a future patch. Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

[Xen-devel] [PATCH 1/3] grant-table: use uint16_t consistently for grant copy offset and length

2015-01-20 Thread David Vrabel
Signed-off-by: David Vrabel --- xen/common/grant_table.c | 10 +- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c index fe52b63..fb9d8f7 100644 --- a/xen/common/grant_table.c +++ b/xen/common/grant_table.c @@ -1882,7 +188

[Xen-devel] [PATCHv2 0/3] grant-table: optimize grant copies when crossing page boundaries

2015-01-20 Thread David Vrabel
Netback tries (where possible) to minimize the number of copy ops in the to-guest direction (since acquiring a page is expensive) this reduces the number acquire operations at the expensive of more Rx slots and more frags in the guests. By deferring the release of the pages we can optimize the cas

Re: [Xen-devel] [PATCH v2 2/3] xen/pvh: check permissions when adding MMIO regions

2015-01-20 Thread Andrew Cooper
On 20/01/15 17:05, Roger Pau Monne wrote: > Check that MMIO regions added to PVH Dom0 are allowed. Previously a PVH Dom0 > would have access to the full MMIO range. > > Signed-off-by: Roger Pau Monné > Cc: Jan Beulich > Cc: Andrew Cooper > --- > Changes since v1: > - Use the newly introduced p2

[Xen-devel] [PATCH 3/3] grant-table: defer releasing pages acquired in a grant copy

2015-01-20 Thread David Vrabel
Acquiring a page for the source or destination of a grant copy is an expensive operation. A common use case is for two adjacent grant copy ops to operate on either the same source or the same destination page. Instead of always acquiring and releasing destination and source pages for each operati

Re: [Xen-devel] [PATCH OSSTEST v2 05/18] Toolstack: use get_host_method_object() to manage toolstack selection

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 05/18] Toolstack: use get_host_method_object() to manage toolstack selection"): > This will allow us to more easily have per-toolstack methods etc. > > The previous hash of toolstack parameters is now a blessed object. For > now the callers don't need to ch

Re: [Xen-devel] [PATCH 04/10] xen/arm: vgic-v3: Don't check the size when we ignore the write/read as zero

2015-01-20 Thread Julien Grall
On 20/01/15 17:57, Ian Campbell wrote: > On Tue, 2015-01-20 at 17:41 +, Julien Grall wrote: >> Hi Ian, >> >> On 20/01/15 15:57, Ian Campbell wrote: >>> On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: In general, it's not necessary/important to check the size. >>> >>> Only if the doc

Re: [Xen-devel] Outstanding OSSTEST patch series

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("Outstanding OSSTEST patch series"): > support for ARM32 arndale and cubietruck platforms > v3 at <1416505070.26869.2.ca...@citrix.com> ... > I'm not sure if you were waiting for v4 with just the commit > logs rewrapped or not. I have that locally if you

[Xen-devel] [PATCH 2/3] grant-table: refactor grant copy to reduce duplicate code

2015-01-20 Thread David Vrabel
Much of the grant copy operation is identical for the source and destination buffers. Refactor the code into per-buffer functions. Signed-off-by: David Vrabel --- xen/common/grant_table.c | 286 +- xen/include/public/grant_table.h |2 +- 2 files

[Xen-devel] [PATCH OSSTEST v2 02/18] ts-logs-capture: Collect some libvirt logs and capabilities

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 02/18] ts-logs-capture: Collect some libvirt logs and capabilities"): > Signed-off-by: Ian Campbell Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH OSSTEST v2 01/18] apt: lock osstest's usages of apt-get against each other

2015-01-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH OSSTEST v2 01/18] apt: lock osstest's usages of apt-get against each other"): > Currently we rely on all apt-get invocations being in a single > ts-xen-build-prep job which can't run on a shared host. > > That is a bit inflexible so instead use our own lock. We wait >

Re: [Xen-devel] [PATCH 00/11] Alternate p2m: support multiple copies of host p2m

2015-01-20 Thread Ed White
On 01/20/2015 12:47 AM, Jan Beulich wrote: On 19.01.15 at 22:54, wrote: >> There's also the issue that access permissions >> are soft state and can be reverted to default in certain cases. > > Some instances of which have got removed during the 4.5 cycle, > and at least some of the remaining

Re: [Xen-devel] [PATCH 04/10] xen/arm: vgic-v3: Don't check the size when we ignore the write/read as zero

2015-01-20 Thread Ian Campbell
On Tue, 2015-01-20 at 17:41 +, Julien Grall wrote: > Hi Ian, > > On 20/01/15 15:57, Ian Campbell wrote: > > On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: > >> In general, it's not necessary/important to check the size. > > > > Only if the docs say this register can be accessed by a p

Re: [Xen-devel] [PATCH 5/5] VMX: use cached "current" where available

2015-01-20 Thread Andrew Cooper
On 20/01/15 11:08, Jan Beulich wrote: > ..., yielding better code. > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 4/5] VMX: drop VMCS *_HIGH enumerators

2015-01-20 Thread Andrew Cooper
On 20/01/15 11:07, Jan Beulich wrote: > Most of them have been unused since the dropping of 32-bit support, and > the few remaining cases are more efficiently dealt with using a generic > macro (and probably things should have been done that way from the > beginning). > > Signed-off-by: Jan Beulich

[Xen-devel] Xen Security Advisory 109 (CVE-2014-8594) - Insufficient restrictions on certain MMU update hypercalls

2015-01-20 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2014-8594 / XSA-109 version 4 Insufficient restrictions on certain MMU update hypercalls UPDATES IN VERSION 4 Impact on applicable affected systems is

Re: [Xen-devel] [PATCH 3/5] VMX: dump further control state

2015-01-20 Thread Andrew Cooper
On 20/01/15 11:06, Jan Beulich wrote: > A few relevant control state fields did not get dumped so far; in > particular, VM_ENTRY_INSTRUCTION_LEN got printed twice (instead of also > printing VM_EXIT_INSTRUCTION_LEN). Where suitable (to reduce the amount > of output) make some of the dumping conditi

Re: [Xen-devel] [PATCH 04/10] xen/arm: vgic-v3: Don't check the size when we ignore the write/read as zero

2015-01-20 Thread Julien Grall
On 20/01/15 17:41, Julien Grall wrote: > Hi Ian, > > On 20/01/15 15:57, Ian Campbell wrote: >> On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: >>> In general, it's not necessary/important to check the size. >> >> Only if the docs say this register can be accessed by a partial >> read/write,

[Xen-devel] [libvirt bisection] complete build-amd64-libvirt

2015-01-20 Thread xen . org
branch xen-unstable xen branch xen-unstable job build-amd64-libvirt test libvirt-build Tree: libvirt git://libvirt.org/libvirt.git Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git Tree: xen git://xenbits.xen.org/xen

Re: [Xen-devel] [PATCH 06/10] xen/arm: vgic-v3: Print the domain/vcpu in each message

2015-01-20 Thread Julien Grall
Hi Ian, On 20/01/15 16:05, Ian Campbell wrote: > On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: >> Also remove vGICv3 in the message log as gdprintk already print the name >> of the file. > > Please mention that the switch to gdprintk is how/where the domain/vcpu > is added, e.g. by addin

Re: [Xen-devel] [PATCH 2/5] VMX: dump full host state

2015-01-20 Thread Andrew Cooper
On 20/01/15 11:06, Jan Beulich wrote: > A few host state fields did not get dumped so far. Where suitable (to > reduce the amount of output) make some of the dumping conditional upon > guest settings (this isn't required for correctness as vmr() already > uses __vmread_safe(), i.e. it is fine to ac

Re: [Xen-devel] [PATCH 05/10] xen/arm: vgic-v3: Document the current restrictions

2015-01-20 Thread Julien Grall
Hi Ian, On 20/01/15 16:00, Ian Campbell wrote: > On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: >> The current vGIC v3 driver doesn't fully implement GICv3 spec: >> - GICv3 backward compatibility is not supported (GICD_CTLR.ARE = 0) > > I think you meant GICv2 here as you did in the c

[Xen-devel] [PATCH v2 2/3] xen/pvh: check permissions when adding MMIO regions

2015-01-20 Thread Roger Pau Monne
Check that MMIO regions added to PVH Dom0 are allowed. Previously a PVH Dom0 would have access to the full MMIO range. Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v1: - Use the newly introduced p2m_access_t to set the access type. - Don't add a next labe

[Xen-devel] [PATCH v2 0/3] xen/pvh: prevent Dom0 from accessing reserved MMIO regions

2015-01-20 Thread Roger Pau Monne
This series aims to prevent PVH Dom0 from accessing MMIO regions of devices that are used by Xen. Thanks for the review, Roger. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 04/10] xen/arm: vgic-v3: Don't check the size when we ignore the write/read as zero

2015-01-20 Thread Julien Grall
Hi Ian, On 20/01/15 15:57, Ian Campbell wrote: > On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: >> In general, it's not necessary/important to check the size. > > Only if the docs say this register can be accessed by a partial > read/write, or if it is implementation defined what the resu

Re: [Xen-devel] [PATCH 1/5] VMX: dump full guest state

2015-01-20 Thread Andrew Cooper
On 20/01/15 11:05, Jan Beulich wrote: > Several guest state fields did not get dumped so far. Where suitable > (to reduce the amount of output) make some of the dumping conditional > upon guest settings (this isn't required for correctness as vmr() > already uses __vmread_safe(), i.e. it is fine to

[Xen-devel] [PATCH v2 1/3] xen: allow set_mmio_p2m_entry to specify access type

2015-01-20 Thread Roger Pau Monne
Preparatory change that allows setting the access type to set_mmio_p2m_entry. Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper Cc: Jun Nakajima Cc: Eddie Dong Cc: Kevin Tian Cc: Tim Deegan --- xen/arch/x86/domain_build.c | 3 ++- xen/arch/x86/hvm/vmx/vmx.c | 2 +- xen/ar

[Xen-devel] [PATCH v2 3/3] xen: prevent access to HPET from Dom0

2015-01-20 Thread Roger Pau Monne
Prevent Dom0 from accessing HPET MMIO region by adding the HPET mfn to the list of read-only memory regions. Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v1: - Instead of completely blocking access to the HPET mfn, set it as read-only. --- xen/arch/x86

Re: [Xen-devel] [PATCH 03/10] xen/arm: vgic-v3: Correctly handle GICD_CTLR

2015-01-20 Thread Julien Grall
Hi Ian, On 20/01/15 15:51, Ian Campbell wrote: > On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: >> As backward GICv2 compatibility is not supported in the VGICv3 driver, >> the bit ARE_NS should be set at any time. > > Looking at the docs, I think you mean it is RAO/WI if GICv2 compat is

Re: [Xen-devel] [PATCH 01/10] xen/arm: vgic-v3: Correctly set GICD_TYPER.IDbits

2015-01-20 Thread Julien Grall
Hi Ian, On 20/01/15 15:34, Ian Campbell wrote: > On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: >> +unsigned int order; >> + >> if ( dabt.size != DABT_WORD ) goto bad_width; >> /* No secure world support for guests. */ >> *r = (((v->domain->max_vcpus << 5

Re: [Xen-devel] [PATCH v3 16/24] xen/passthrough: Introduce iommu_construct

2015-01-20 Thread Julien Grall
On 20/01/15 16:40, Jan Beulich wrote: On 20.01.15 at 15:28, wrote: >> On 19/01/15 17:02, Jan Beulich wrote: >> On 13.01.15 at 15:25, wrote: --- a/xen/drivers/passthrough/device_tree.c +++ b/xen/drivers/passthrough/device_tree.c @@ -41,6 +41,10 @@ int iommu_assign_dt_device

Re: [Xen-devel] Xen 4.5 Development Update (GA slip by a week)

2015-01-20 Thread Lars Kurth
Jan, I have announced it on xen-users, xen-announce, the blog and we have had the press release I had assumed that Konrad announced on xen-devel Lars On 20 Jan 2015, at 09:00, Jan Beulich wrote: On 05.01.15 at 21:08, wrote: >> = Timeline = >> >> Xen 4.5 is a 10 month release. The dates

Re: [Xen-devel] Guidelines for new PV protocol submission

2015-01-20 Thread Ian Campbell
On Tue, 2015-01-20 at 14:21 +, Ian Jackson wrote: > I am 100% in agreement with Roger's proposal. I think we should > extend this principle to as much of the guest ABI as possible, not > just PV protocols - it would be good to do it for guest-visible > hypervisor and tools ABIs too. Agreed, b

Re: [Xen-devel] Cancelling asynchronous operations in libxl

2015-01-20 Thread Ian Jackson
Dave Scott writes ("Cancelling asynchronous operations in libxl"): > I’ve re-read the thread from Nov 2013: (2013!) > http://lists.xen.org/archives/html/xen-devel/2013-11/msg01176.html > and found it quite thought-provoking. Thanks. However, I think the message you really want is From: Ian Jac

Re: [Xen-devel] [PATCH v2 4/4] libxl: Add interface for querying hypervisor about PCI topology

2015-01-20 Thread Ian Campbell
On Tue, 2015-01-20 at 11:04 -0500, Boris Ostrovsky wrote: > On 01/20/2015 10:21 AM, Ian Campbell wrote: > > On Tue, 2015-01-20 at 10:15 -0500, Boris Ostrovsky wrote: > diff --git a/tools/libxl/libxl_linux.c b/tools/libxl/libxl_linux.c > index ea5d8c1..07428c0 100644 > --- a/tools/lib

Re: [Xen-devel] [PATCH v3 20/24] xen/passthrough: Extend XEN_DOMCTL_assign_device to support DT device

2015-01-20 Thread Jan Beulich
>>> On 20.01.15 at 15:37, wrote: > On 20/01/15 09:34, Jan Beulich wrote: > On 13.01.15 at 15:25, wrote: >>> --- a/xen/drivers/passthrough/iommu.c >>> +++ b/xen/drivers/passthrough/iommu.c >>> @@ -337,6 +337,13 @@ int iommu_do_domctl( >>> ret = iommu_do_pci_domctl(domctl, d, u_domctl); >>

Re: [Xen-devel] [PATCH v3 17/24] xen/passthrough: arm: release earlier the DT devices assigned to a guest

2015-01-20 Thread Jan Beulich
>>> On 20.01.15 at 15:30, wrote: > Hi Jan, > > On 20/01/15 09:19, Jan Beulich wrote: > On 13.01.15 at 15:25, wrote: >>> --- a/xen/include/xen/iommu.h >>> +++ b/xen/include/xen/iommu.h >>> @@ -117,7 +117,7 @@ void iommu_read_msi_from_ire(struct msi_desc *msi_desc, > struct msi_msg *msg); >>>

Re: [Xen-devel] [PATCH v3 16/24] xen/passthrough: Introduce iommu_construct

2015-01-20 Thread Jan Beulich
>>> On 20.01.15 at 15:28, wrote: > On 19/01/15 17:02, Jan Beulich wrote: > On 13.01.15 at 15:25, wrote: >>> --- a/xen/drivers/passthrough/device_tree.c >>> +++ b/xen/drivers/passthrough/device_tree.c >>> @@ -41,6 +41,10 @@ int iommu_assign_dt_device(struct domain *d, struct >>> dt_device_nod

Re: [Xen-devel] [PATCH v17 00/23] x86/PMU: Xen PMU PV(H) support

2015-01-20 Thread Boris Ostrovsky
On 01/20/2015 05:37 AM, Jan Beulich wrote: On 05.01.15 at 22:43, wrote: Changes in v17: * Disable VPMU when unknown CPU vendor is detected (patch #2) * Remove unnecessary vendor tests in vendor-specific init routines (patch #14) * Remember first CPU that starts mode change and use it to stop th

Re: [Xen-devel] [PATCH 09/10] xen/arm: vgic-v2: Take the lock when writing into GICD_CTLR

2015-01-20 Thread Ian Campbell
On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: > This register is shared between every vCPUs and the lock was already > taken for read. > > Signed-off-by: Julien Grall Acked-by: Ian Campbell ___ Xen-devel mailing list Xen-devel@lists.xen.or

Re: [Xen-devel] [OSSTEST PATCH] make-flight: reorganize scheduling related test jobs

2015-01-20 Thread Ian Jackson
Dario Faggioli writes ("Re: [OSSTEST PATCH] make-flight: reorganize scheduling related test jobs"): > Yes, here it comes. Sorry for the delay (wasn't working for most of last > week). Any better? Brilliant, thanks. LGTM. Acked-by: Ian Jackson Ian.

Re: [Xen-devel] [PATCH 08/10] xen/arm: vgic-v2: Don't check the size when we ignore the write/read a zero

2015-01-20 Thread Ian Campbell
On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: > Some registers, such as GICD_ITARGET0 can be read/write with different > size. > > When the write is ignored only word-access is checked. This will lead to > a domain crash if the guest is trying to access via byte-word. > > In general, it'

Re: [Xen-devel] [PATCH 06/10] xen/arm: vgic-v3: Print the domain/vcpu in each message

2015-01-20 Thread Ian Campbell
On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: > Also remove vGICv3 in the message log as gdprintk already print the name > of the file. Please mention that the switch to gdprintk is how/where the domain/vcpu is added, e.g. by adding "... by switching to gdprintk" as the first line of the

Re: [Xen-devel] Guidelines for new PV protocol submission

2015-01-20 Thread Jan Beulich
>>> On 20.01.15 at 15:00, wrote: > On 20/01/15 13:48, Jan Beulich wrote: > On 20.01.15 at 14:39, wrote: >>> It is far nicer to work from a document than to worry how another >>> compiler might change the structure. >> Compilers have (almost, i.e. leaving aside bitfields) no freedom in laying

Re: [Xen-devel] [PATCH 10/10] xen/arm: vgic-v2: Print the domain/vcpu in each message

2015-01-20 Thread Ian Campbell
On Mon, 2015-01-19 at 16:29 +, Julien Grall wrote: Please reference the switch to gdprintk being the mechanism for achieving this, otherwise: Acked-by: Ian Campbell ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/x

  1   2   3   >