[Xen-devel] Windows install problems on Xeon E5-2403 v2

2015-06-10 Thread Jan Beulich
All, we're seeing recurring but intermittent failures in osstest on just the two hosts using these particular CPU types. The closest similar ones, using Xeon E5-2407 v2, do not exhibit this same behavior. We do note that the latter run at microcode level 0x427, while the problem ones are only at 0

[Xen-devel] [linux-3.18 test] 58355: regressions - FAIL

2015-06-10 Thread osstest service user
flight 58355 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/58355/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail in 58306 REGR. vs. 57312 Tests which are faili

Re: [Xen-devel] [PATCH 2/4] EFI/early: add /mapbs to map EfiBootServices{Code, Data}

2015-06-10 Thread Jan Beulich
>>> On 10.06.15 at 19:22, wrote: > On Wed, Jun 10, 2015 at 2:37 AM, Jan Beulich wrote: > On 10.06.15 at 11:26, wrote: >>> On Wed, 2015-06-10 at 10:15 +0100, Jan Beulich wrote: >>> On 10.06.15 at 10:56, wrote: > On Tue, 2015-06-09 at 14:53 +0100, Jan Beulich wrote: >> From: Ko

Re: [Xen-devel] [OSSTEST Nested PATCH v11 7/7] Add test job for nest test case

2015-06-10 Thread Pang, LongtaoX
> -Original Message- > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] > Sent: Wednesday, June 10, 2015 11:46 PM > To: Pang, LongtaoX > Cc: xen-devel@lists.xen.org; ian.campb...@citrix.com; wei.l...@citrix.com; Hu, > Robert > Subject: Re: [OSSTEST Nested PATCH v11 7/7] Add test job f

Re: [Xen-devel] [OSSTEST Nested PATCH v11 5/7] Add new script to customize nested test configuration

2015-06-10 Thread Pang, LongtaoX
> -Original Message- > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] > Sent: Wednesday, June 10, 2015 9:59 PM > To: Pang, LongtaoX > Cc: xen-devel@lists.xen.org; ian.campb...@citrix.com; wei.l...@citrix.com; Hu, > Robert > Subject: Re: [OSSTEST Nested PATCH v11 5/7] Add new script

Re: [Xen-devel] [OSSTEST Nested PATCH v11 4/7] Changes on test step of Debian hvm guest install

2015-06-10 Thread Pang, LongtaoX
> -Original Message- > From: Ian Jackson [mailto:ian.jack...@eu.citrix.com] > Sent: Wednesday, June 10, 2015 9:41 PM > To: Pang, LongtaoX > Cc: xen-devel@lists.xen.org; ian.campb...@citrix.com; wei.l...@citrix.com; Hu, > Robert > Subject: Re: [OSSTEST Nested PATCH v11 4/7] Changes on test

Re: [Xen-devel] Alternate p2m design specification

2015-06-10 Thread Andrew Cooper
On 10/06/15 20:41, Ed White wrote: > On 06/10/2015 11:23 AM, Andrew Cooper wrote: >> On 10/06/15 01:09, Ed White wrote: >>> This document describes a new capability for VM Introspection, Security and >>> Privacy in Xen. The new capability is called “altp2m” (short for Alternate >>> p2m) that is u

Re: [Xen-devel] [PATCH v5 2/8] xenalyze: increase NR_CPUS to 256

2015-06-10 Thread Olaf Hering
On Wed, Jun 10, Julien Grall wrote: > There is also a variable MAX_CPUS defined to 256. which is used every. You are right, while forwarding an old patch (from memory) I changed the wrong place. MAX_CPUS is already at 256 so no change is strictly neccessary. I suggest to drop that patch from thi

[Xen-devel] grant tables and driver handshaking

2015-06-10 Thread Linda
Hello all, I will be writing a xen front and back-end pair for a 9p transport. I have two areas where I'm still a little more muddled than I'd like to be. Can anyone please recommend a good article on either grant tables or the handshaking between the front and back-end drivers, or bot

Re: [Xen-devel] [PATCH] Modified RTDS scheduler to use an event-driven model instead of polling.

2015-06-10 Thread Meng Xu
Hi Dario, First I think I got most of the points you raised/explained! They are very very clear and thanks for the detailed explanation of your idea! I have some minor questions about your comments/advices. > >> 2015-06-09 5:53 GMT-07:00 Dario Faggioli : > >> > Thanks for doing this. The first q

[Xen-devel] [PATCH] mm: fix early_memremap_ro() for all architectures

2015-06-10 Thread Juergen Gross
Commit 709294226f7f ("mm: provide early_memremap_ro to establish read-only mapping") broke building on some architectures like arm32 by requiring PAGE_KERNEL_RO. On architectures with that macro not defined fall back to R/W mappings. Signed-off-by: Juergen Gross --- include/asm-generic/fixmap.h

Re: [Xen-devel] [OSSTEST Nested PATCH v11 2/7] Parsing grub which has 'submenu' primitive

2015-06-10 Thread Robert Hu
On Wed, 2015-06-10 at 14:30 +0100, Ian Jackson wrote: > longtao.pang writes ("[OSSTEST Nested PATCH v11 2/7] Parsing grub which has > 'submenu' primitive"): > > Now auto-gen kernel grub2 config file's boot menu entries can have > > 2-level hierarchy, containing 'submenu' primitive, which is compri

Re: [Xen-devel] [PATCH v2 COLOPre 02/13] tools/libxc: support to resume uncooperative HVM guests

2015-06-10 Thread Wen Congyang
On 06/10/2015 11:18 PM, Ian Campbell wrote: > On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote: >> From: Wen Congyang >> >> For PVHVM, the hypercall return code is 0, and it can be resumed >> in a new domain context. >> we suspend PVHVM and resume it is like this: >> 1. suspend it via evtchn

[Xen-devel] [linux-next test] 58354: regressions - FAIL

2015-06-10 Thread osstest service user
flight 58354 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/58354/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 9 debian-hvm-install fail REGR. vs. 58167 test-armhf-armhf

Re: [Xen-devel] [PATCH v2 COLOPre 06/13] tools/libxl: Introduce a new internal API libxl__domain_unpause()

2015-06-10 Thread Yang Hongyang
On 06/10/2015 11:37 PM, Ian Campbell wrote: On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote: From: Wen Congyang The guest is paused after libxl_domain_create_restore(). Secondary vm is running in colo mode. So we need to unpause the guest. The current API libxl_domain_unpause() is not

Re: [Xen-devel] [PATCH v2 COLOPre 01/13] libxc/restore: fix error handle of process_record

2015-06-10 Thread Yang Hongyang
On 06/10/2015 10:55 PM, Ian Campbell wrote: On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote: If the err is RECORD_NOT_PROCESSED, and it is an optional record, restore will still fail. The patch fix this. Whichever approach you take to fixing this, please say _how_ the change fixes it,

Re: [Xen-devel] [PATCH v2 COLOPre 05/13] tools/libxl: introduce a new API libxl__domain_restore() to load qemu state

2015-06-10 Thread Yang Hongyang
On 06/10/2015 11:35 PM, Ian Campbell wrote: On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote: Secondary vm is running in colo mode. So we will do the following things again and again: 1. suspend both primay vm and secondary vm 2. sync the state 3. resume both primary vm and secondary vm

Re: [Xen-devel] [PATCH v2 COLOPre 04/13] tools/libxc: export xc_bitops.h

2015-06-10 Thread Yang Hongyang
On 06/10/2015 11:20 PM, Ian Campbell wrote: On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote: When we are under COLO, we will send dirty page bitmap info from secondary to primary at every checkpoint. ... and this is a _libxl_ operation? Is that the right layer here? For the first qu

[Xen-devel] [v3][PATCH 15/16] xen/vtd: enable USB device assignment

2015-06-10 Thread Tiejun Chen
Before we refine RMRR mechanism, USB RMRR may conflict with guest bios region so we always ignore USB RMRR. Now this can be gone when we enable pci_force to check/reserve RMRR. Signed-off-by: Tiejun Chen --- xen/drivers/passthrough/vtd/dmar.h | 1 - xen/drivers/passthrough/vtd/iommu.c | 11 ++-

[Xen-devel] [v3][PATCH 12/16] tools/libxl: passes rdm reservation policy

2015-06-10 Thread Tiejun Chen
This patch passes our rdm reservation policy inside libxl when we assign a device or attach a device. Signed-off-by: Tiejun Chen --- docs/man/xl.pod.1 | 7 ++- tools/libxl/libxl_pci.c | 10 +- tools/libxl/xl_cmdimpl.c | 23 +++ tools/libxl/xl_cmdtable.

[Xen-devel] [v3][PATCH 14/16] tools/libxl: extend XENMEM_set_memory_map

2015-06-10 Thread Tiejun Chen
Here we'll construct a basic guest e820 table via XENMEM_set_memory_map. This table includes lowmem, highmem and RDMs if they exist. And hvmloader would need this info later. Signed-off-by: Tiejun Chen --- tools/libxl/libxl_dom.c | 5 +++ tools/libxl/libxl_internal.h | 24 ++ t

[Xen-devel] [v3][PATCH 08/16] hvmloader/e820: construct guest e820 table

2015-06-10 Thread Tiejun Chen
Now we can use that memory map to build our final e820 table but it may need to reorder all e820 entries. Signed-off-by: Tiejun Chen --- tools/firmware/hvmloader/e820.c | 62 +++-- 1 file changed, 48 insertions(+), 14 deletions(-) diff --git a/tools/firmware/

[Xen-devel] [v3][PATCH 13/16] tools/libxl: detect and avoid conflicts with RDM

2015-06-10 Thread Tiejun Chen
While building a VM, HVM domain builder provides struct hvm_info_table{} to help hvmloader. Currently it includes two fields to construct guest e820 table by hvmloader, low_mem_pgend and high_mem_pgend. So we should check them to fix any conflict with RAM. RMRR can reside in address space beyond 4

[Xen-devel] [v3][PATCH 10/16] tools: extend xc_assign_device() to support rdm reservation policy

2015-06-10 Thread Tiejun Chen
This patch passes rdm reservation policy to xc_assign_device() so the policy is checked when assigning devices to a VM. Signed-off-by: Tiejun Chen --- tools/libxc/include/xenctrl.h | 3 ++- tools/libxc/xc_domain.c | 6 +- tools/libxl/libxl_pci.c | 3 ++- tool

[Xen-devel] [v3][PATCH 07/16] hvmloader/pci: skip reserved ranges

2015-06-10 Thread Tiejun Chen
When allocating mmio address for PCI bars, we need to make sure they don't overlap with reserved regions. Signed-off-by: Tiejun Chen --- tools/firmware/hvmloader/pci.c | 36 ++-- 1 file changed, 34 insertions(+), 2 deletions(-) diff --git a/tools/firmware/hvmload

[Xen-devel] [v3][PATCH 16/16] xen/vtd: prevent from assign the device with shared rmrr

2015-06-10 Thread Tiejun Chen
Currently we're intending to cover this kind of devices with shared RMRR simply since the case of shared RMRR is a rare case according to our previous experiences. But late we can group these devices which shared rmrr, and then allow all devices within a group to be assigned to same domain. Signed

[Xen-devel] [v3][PATCH 09/16] tools/libxc: Expose new hypercall xc_reserved_device_memory_map

2015-06-10 Thread Tiejun Chen
We will introduce the hypercall xc_reserved_device_memory_map approach to libxc. This helps us get rdm entry info according to different parameters. If flag == PCI_DEV_RDM_ALL, all entries should be exposed. Or we just expose that rdm entry specific to a SBDF. Signed-off-by: Tiejun Chen --- tool

[Xen-devel] [v3][PATCH 11/16] tools: introduce some new parameters to set rdm policy

2015-06-10 Thread Tiejun Chen
This patch introduces user configurable parameters to specify RDM resource and according policies, Global RDM parameter: rdm = "type=none/host,reserve=strict/relaxed" Per-device RDM parameter: pci = [ 'sbdf, rdm_reserve=strict/relaxed' ] Global RDM parameter, "type", allows user to specif

[Xen-devel] [v3][PATCH 02/16] xen/x86/p2m: introduce set_identity_p2m_entry

2015-06-10 Thread Tiejun Chen
We will create this sort of identity mapping as follows: If the gfn space is unoccupied, we just set the mapping. If the space is already occupied by 1:1 mappings, do nothing. Failed for any other cases. Signed-off-by: Tiejun Chen --- xen/arch/x86/mm/p2m.c | 35 +

[Xen-devel] [v3][PATCH 06/16] hvmloader: get guest memory map into memory_map[]

2015-06-10 Thread Tiejun Chen
Now we get this map layout by call XENMEM_memory_map then save them into one global variable memory_map[]. It should include lowmem range, rdm range and highmem range. Note rdm range and highmem range may not exist in some cases. And here we need to check if any reserved memory conflicts with [RES

[Xen-devel] [v3][PATCH 00/16] Fix RMRR

2015-06-10 Thread Tiejun Chen
v3: * Rearrange all patches orderly as Wei suggested * Rebase on the latest tree * Address some Wei's comments on tools side * Two changes for runtime cycle patch #2,xen/x86/p2m: introduce set_identity_p2m_entry, on hypervisor side a>. Introduce paging_mode_translate() Otherwise, we'll see

[Xen-devel] [v3][PATCH 05/16] xen: enable XENMEM_memory_map in hvm

2015-06-10 Thread Tiejun Chen
This patch enables XENMEM_memory_map in hvm. So we can use it to setup the e820 mappings. Signed-off-by: Tiejun Chen Reviewed-by: Tim Deegan --- xen/arch/x86/hvm/hvm.c | 2 -- xen/arch/x86/mm.c | 6 -- 2 files changed, 8 deletions(-) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/

[Xen-devel] [v3][PATCH 01/16] xen: introduce XENMEM_reserved_device_memory_map

2015-06-10 Thread Tiejun Chen
From: Jan Beulich This is a prerequisite for punching holes into HVM and PVH guests' P2M to allow passing through devices that are associated with (on VT-d) RMRRs. Signed-off-by: Jan Beulich Signed-off-by: Tiejun Chen --- xen/common/compat/memory.c | 66 +

[Xen-devel] [v3][PATCH 03/16] xen/vtd: create RMRR mapping

2015-06-10 Thread Tiejun Chen
RMRR reserved regions must be setup in the pfn space with an identity mapping to reported mfn. However existing code has problem to setup correct mapping when VT-d shares EPT page table, so lead to problem when assigning devices (e.g GPU) with RMRR reported. So instead, this patch aims to setup ide

[Xen-devel] [v3][PATCH 04/16] xen/passthrough: extend hypercall to support rdm reservation policy

2015-06-10 Thread Tiejun Chen
This patch extends the existing hypercall to support rdm reservation policy. We return error or just throw out a warning message depending on whether the policy is "strict" or "relaxed" when reserving RDM regions in pfn space. Note in some special cases, e.g. add a device to hwdomain, and remove a

Re: [Xen-devel] [PATCH v2 COLOPre 03/13] libxc/restore: zero ioreq page only one time

2015-06-10 Thread Wen Congyang
On 06/10/2015 07:47 PM, Paul Durrant wrote: >> -Original Message- >> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel- >> boun...@lists.xen.org] On Behalf Of Wen Congyang >> Sent: 10 June 2015 12:38 >> To: Paul Durrant; Andrew Cooper; Yang Hongyang; xen-devel@lists.xen.org >> Cc: Wei

Re: [Xen-devel] [xen-unstable test] 58330: regressions - FAIL

2015-06-10 Thread Dario Faggioli
On Wed, 2015-06-10 at 19:15 +, osstest service user wrote: > flight 58330 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/58330/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-armhf-armhf-xl-c

[Xen-devel] [ovmf test] 58344: regressions - FAIL

2015-06-10 Thread osstest service user
flight 58344 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/58344/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail REGR. vs. 56492 test-amd64-i386-xl-qemuu-ovm

[Xen-devel] [linux-3.4 test] 58342: regressions - FAIL

2015-06-10 Thread osstest service user
flight 58342 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/58342/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect test-amd64-amd64-pair

Re: [Xen-devel] Alternate p2m design specification

2015-06-10 Thread Ed White
On 06/10/2015 04:09 PM, Andrew Cooper wrote: > On 10/06/15 20:41, Ed White wrote: >> On 06/10/2015 11:23 AM, Andrew Cooper wrote: >>> On 10/06/15 01:09, Ed White wrote: This document describes a new capability for VM Introspection, Security and Privacy in Xen. The new capability is calle

Re: [Xen-devel] [PATCH v4 0/9] add xenalyze to staging

2015-06-10 Thread Julien Grall
Hi Olaf, On 09/06/2015 07:07, Olaf Hering wrote: And now that I enabled build also for sles12-aarch64 an old error is still present in that base system: In file included from /home/abuild/rpmbuild/BUILD/xen-4.6.30993/non-dbg/tools/xenstore/../../tools/include/xen/xen.h:35:0,

Re: [Xen-devel] [PATCH] Modified RTDS scheduler to use an event-driven model instead of polling.

2015-06-10 Thread Dario Faggioli
No HTML, please. On Wed, 2015-06-10 at 00:18 -0400, Dagaen Golomb wrote: > And note that, when I say "timer", I mean an actual Xen timer, > i.e., > those things that are started, stopped, and with a timer > handling > routine being called when they expire.

[Xen-devel] [linux-linus test] 58333: regressions - FAIL

2015-06-10 Thread osstest service user
flight 58333 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/58333/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rumpuserxen-i386 15 rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs. 581

Re: [Xen-devel] [PATCH] xen/arm: Propagate clock-frequency to DOMU if present in the DT timer node

2015-06-10 Thread Chris (Christopher) Brand
Hi Julien, >> A simple "export CONFIG_DTB_FILE=...". > >Are you using an absolute path? Absolute path, yes. >> So your patch isn't designed to help in this case (CNTFRQ set on core 0 >> only, no clock-frequency property in timer node of DT). > >Well, my patch is designed to propagate the "clock

Re: [Xen-devel] [Draft A] Boot ABI for HVM guests without a device-model

2015-06-10 Thread Andrew Cooper
On 10/06/2015 19:55, Konrad Rzeszutek Wilk wrote: >> All other processor registers and flag bits are undefined. The OS is in >> charge of setting up it's own stack, GDT and IDT. >> >> Note that the boot protocol resembles the multiboot1 specification, >> this is done so OSes with multiboot1 entry

[Xen-devel] [PATCH OSSTEST v4 2/2] Stubdom test case

2015-06-10 Thread Wei Liu
Currently only QEMU traditional supports stubdom and we want to eventually do away with non-XSM test cases, so we only create test-amd64-{i386,amd64}-xl-qemut-stubdom-debianhvm-amd64-xsm Note that stubdom only supports serial='pty'. Piping serial to stderr causes stubdom to exit abnormally. Si

[Xen-devel] [PATCH OSSTEST v4 1/2] TestSupport: introduce guest_var_boolean

2015-06-10 Thread Wei Liu
Signed-off-by: Wei Liu --- Osstest/TestSupport.pm | 7 ++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm index 1f3bab2..853631c 100644 --- a/Osstest/TestSupport.pm +++ b/Osstest/TestSupport.pm @@ -90,7 +90,7 @@ BEGIN {

Re: [Xen-devel] PCI Passthrough ARM Design : Draft1

2015-06-10 Thread Julien Grall
Hi, On 10/06/2015 08:45, Ian Campbell wrote: 4. DomU access / assignment PCI device -- When a device is attached to a domU, provision has to be made such that it can access the MMIO space of the device and xen is able to identify the mapping between guest bdf

Re: [Xen-devel] [PATCH v5 2/8] xenalyze: increase NR_CPUS to 256

2015-06-10 Thread Julien Grall
Hi Olaf, On 09/06/2015 07:23, Olaf Hering wrote: To match the hypervisor default which was introduced in 9da0c5b63933b9912e3903190601661813954d0d, bump the limit. Signed-off-by: Olaf Hering Acked-by: George Dunlap Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell C

Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-10 Thread Konrad Rzeszutek Wilk
On Tue, Jun 02, 2015 at 04:48:25PM +0100, Malcolm Crossley wrote: > On 02/06/15 15:34, Konrad Rzeszutek Wilk wrote: > > On Tue, Jun 02, 2015 at 11:06:26AM +0100, Malcolm Crossley wrote: > >> On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote: > >>> On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Cros

Re: [Xen-devel] RFC: making the PVH 64bit ABI as stableo

2015-06-10 Thread Elena Ufimtseva
On Fri, Jun 05, 2015 at 05:29:21PM +0100, Ian Campbell wrote: > On Wed, 2015-06-03 at 09:35 -0400, Boris Ostrovsky wrote: > > > What I'm hearing from the x86 maintainers is that this is actually a > > > high priority and not a "nice to have cleanup". > > > > > >> I picked 32-bit support, Elena is l

Re: [Xen-devel] [PATCH 2/4] EFI/early: add /mapbs to map EfiBootServices{Code, Data}

2015-06-10 Thread Roy Franz
On Wed, Jun 10, 2015 at 11:12 AM, Andrew Cooper wrote: > On 10/06/15 18:22, Roy Franz wrote: >> I read it backwards and thought this was currently excluding them like x86 does. Am I correct that the stricter x86 behaviour is per the spec, and this new option is a workaroun

Re: [Xen-devel] [PATCH 2/4] EFI/early: add /mapbs to map EfiBootServices{Code, Data}

2015-06-10 Thread Andrew Cooper
On 10/06/15 20:48, Konrad Rzeszutek Wilk wrote: > On Wed, Jun 10, 2015 at 07:12:07PM +0100, Andrew Cooper wrote: >> On 10/06/15 18:22, Roy Franz wrote: > I read it backwards and thought this was currently excluding them like > x86 does. > > Am I correct that the stricter x86 behavio

[Xen-devel] [libvirt test] 58334: tolerable FAIL - PUSHED

2015-06-10 Thread osstest service user
flight 58334 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/58334/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-libvirt 11 guest-start fail blocked in 56585-bisect test-amd64-amd64-libvirt 11 gu

Re: [Xen-devel] [PATCH 2/4] EFI/early: add /mapbs to map EfiBootServices{Code, Data}

2015-06-10 Thread Konrad Rzeszutek Wilk
On Wed, Jun 10, 2015 at 07:12:07PM +0100, Andrew Cooper wrote: > On 10/06/15 18:22, Roy Franz wrote: > > > >>> I read it backwards and thought this was currently excluding them like > >>> x86 does. > >>> > >>> Am I correct that the stricter x86 behaviour is per the spec, and this > >>> new option i

[Xen-devel] [PATCH QEMU-XEN] xen/pt: Start with emulated PCI_COMMAND set to zero.

2015-06-10 Thread konrad
From: Konrad Rzeszutek Wilk For a passthrough device we maintain a state of emulated registers value contained within d->config. We also consult the host registers (and apply ro and write masks) whenever the guest access the registers. This is done in xen_pt_pci_write_config and xen_pt_pci_read_c

Re: [Xen-devel] Alternate p2m design specification

2015-06-10 Thread Ed White
On 06/10/2015 11:23 AM, Andrew Cooper wrote: > On 10/06/15 01:09, Ed White wrote: >> This document describes a new capability for VM Introspection, Security and >> Privacy in Xen. The new capability is called “altp2m” (short for Alternate >> p2m) that is used to provide the ability for Xen to hos

[Xen-devel] [PATCH OSSTEST v4 0/2] Stubdom test case

2015-06-10 Thread Wei Liu
Wei Liu (2): TestSupport: introduce guest_var_boolean Stubdom test case Osstest/TestSupport.pm | 16 ++-- make-flight| 16 ++-- ts-debian-hvm-install | 3 +++ 3 files changed, 31 insertions(+), 4 deletions(-) -- 1.9.1 _

Re: [Xen-devel] Alternate p2m design specification

2015-06-10 Thread Andrew Cooper
On 10/06/15 01:09, Ed White wrote: > This document describes a new capability for VM Introspection, Security and > Privacy in Xen. The new capability is called “altp2m” (short for Alternate > p2m) that is used to provide the ability for Xen to host alternate guest > physical memory domains for a

[Xen-devel] [xen-unstable test] 58330: regressions - FAIL

2015-06-10 Thread osstest service user
flight 58330 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/58330/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-credit2 15 guest-start/debian.repeat fail REGR. vs. 58264 Regressions which ar

Re: [Xen-devel] [PATCH 2/4] EFI/early: add /mapbs to map EfiBootServices{Code, Data}

2015-06-10 Thread Andrew Cooper
On 10/06/15 18:22, Roy Franz wrote: > >>> I read it backwards and thought this was currently excluding them like >>> x86 does. >>> >>> Am I correct that the stricter x86 behaviour is per the spec, and this >>> new option is a workaround for non-compliant systems? >> Yes. >> >>> If so unless Roy kno

Re: [Xen-devel] [Draft A] Boot ABI for HVM guests without a device-model

2015-06-10 Thread Konrad Rzeszutek Wilk
On Wed, Jun 10, 2015 at 02:34:00PM +0200, Roger Pau Monné wrote: > Hello, > > The discussion in [1] lead to an agreement of the missing pieces in PVH > (or HVM without a device-model) in order to progress with it's > implementation. > > One of the missing pieces is a new boot ABI, that replaces

Re: [Xen-devel] [xen-unstable test] 57852: regressions - FAIL

2015-06-10 Thread Ian Campbell
On Wed, 2015-06-10 at 16:59 +0100, Jan Beulich wrote: > >>> On 10.06.15 at 16:34, wrote: > > For Intel I'm less sure, I've got microcode-20150121.tgz containing > > microcode.dat. Is that just to be placed at > > kernel/x86/microcode/GenuineIntel.bin and done, or is there some > > processing neede

Re: [Xen-devel] [PATCH] Modified RTDS scheduler to use an event-driven model instead of polling.

2015-06-10 Thread Dario Faggioli
On Tue, 2015-06-09 at 22:54 -0700, Meng Xu wrote: > Hi Dario and Dagaen, > Hi, > 2015-06-09 5:53 GMT-07:00 Dario Faggioli : > > Thanks for doing this. The first question I have is whether you run any > > test/benchmark that you can show the result of here. > > Thank you very much Dario for your

Re: [Xen-devel] [PATCH] xen/arm: gic-hip04: Resync the driver with the GICv2

2015-06-10 Thread Julien Grall
On 09/06/2015 09:03, Shameerali Kolothum Thodi wrote: Hi Julien/Zoli, Hi Shameer, http://xenbits.xen.org/gitweb/?p=people/julieng/xen-unstable.git;a=shortlog;h=refs/heads/for-huawei/gicv2-on-gicv3 I had a run of this staging on our D01 board. Thank you for testing. Xen fails to boot with

[Xen-devel] [qemu-mainline test] 58318: tolerable FAIL - PUSHED

2015-06-10 Thread osstest service user
flight 58318 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/58318/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-libvirt-xsm 11 guest-start fail REGR. vs. 57815 test-amd64-i386-libvirt

Re: [Xen-devel] [PATCH] xen/arm: Propagate clock-frequency to DOMU if present in the DT timer node

2015-06-10 Thread Julien Grall
Hi, On 09/06/2015 19:48, Julien Grall wrote: I don't usually use CONFIG_DTB_FILE because my bootloader (u-boot via a script) is creating the different node for Xen (multiboot, chosen,...). Although, the CONFIG_DTB_FILE implementation in Xen is very obvious (only 2 lines which override the regist

Re: [Xen-devel] [PATCH RFC tools 5/6] tools: Refactor /dev/xen/evtchn wrappers into libxenevtchn.

2015-06-10 Thread Andrew Cooper
On 10/06/15 12:36, Ian Campbell wrote: > libxenevtchn will provide a stable API and ABI for accessing the > evtchn device. > > The functions are moved into the xenevtchn namespace to make a clean > break from libxc and avoid ambiguity regarding which interfaces are > stable. > > All in-tree users a

Re: [Xen-devel] [PATCH 2/4] EFI/early: add /mapbs to map EfiBootServices{Code, Data}

2015-06-10 Thread Roy Franz
On Wed, Jun 10, 2015 at 2:37 AM, Jan Beulich wrote: On 10.06.15 at 11:26, wrote: >> On Wed, 2015-06-10 at 10:15 +0100, Jan Beulich wrote: >>> >>> On 10.06.15 at 10:56, wrote: >>> > On Tue, 2015-06-09 at 14:53 +0100, Jan Beulich wrote: >>> >> From: Konrad Rzeszutek Wilk >>> >> >>> >> To hel

Re: [Xen-devel] Alternate p2m design specification

2015-06-10 Thread Ed White
On 06/10/2015 12:43 AM, Jan Beulich wrote: On 10.06.15 at 02:09, wrote: >> Design >> == > > Reads all quite reasonable; just one minor remark: > >> - Core altp2m functionality >> >> A new altp2m type is added to the p2m types (in addition to the previous >> hostp2m and nestedp2m types)

Re: [Xen-devel] [PATCH RFC tools 5/6] tools: Refactor /dev/xen/evtchn wrappers into libxenevtchn.

2015-06-10 Thread David Vrabel
On 10/06/15 12:36, Ian Campbell wrote: > libxenevtchn will provide a stable API and ABI for accessing the > evtchn device. > > The functions are moved into the xenevtchn namespace to make a clean > break from libxc and avoid ambiguity regarding which interfaces are > stable. > > All in-tree users

Re: [Xen-devel] [xen-unstable test] 57852: regressions - FAIL

2015-06-10 Thread Don Slutz
On 06/10/15 11:59, Jan Beulich wrote: On 10.06.15 at 16:34, wrote: >> For Intel I'm less sure, I've got microcode-20150121.tgz containing >> microcode.dat. Is that just to be placed at >> kernel/x86/microcode/GenuineIntel.bin and done, or is there some >> processing needed? > > The full bl

Re: [Xen-devel] [PATCH XSA-59] VT-d: extend quirks to newer desktop chipsets

2015-06-10 Thread Dugger, Donald D
Ack-by: Don Dugger -- Don Dugger "Censeo Toto nos in Kansa esse decisse." - D. Gale Ph: 303/443-3786 -Original Message- From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Jan Beulich Sent: Tuesday, June 9, 2015 3:06 AM To: xen-devel Cc: Zhang, Ya

Re: [Xen-devel] [PATCH RFC 0/6+2+2] Begin to disentangle libxenctrl and provide some stable libraries

2015-06-10 Thread Wei Liu
On Wed, Jun 10, 2015 at 05:01:27PM +0100, Ian Jackson wrote: > Ian Campbell writes ("[PATCH RFC 0/6+2+2] Begin to disentangle libxenctrl and > provide some stable libraries"): > > [stuff] > > Most of this looks good to me. > > > As part of this change I've begun to get rid of the osdep interface

Re: [Xen-devel] SG off on domU middle node drops packets

2015-06-10 Thread David Vrabel
On 26/05/15 08:55, Lennart Schulte wrote: > Hi, > I use a Xen domU with vanilla Linux 3.19 kernel as a middle node. SG is > switched off via ethtool. I get random packet drops for about 7% of > small packets (pings, TCP ACKs/SYNs/little payload). > From the code in Linux 4.0 it seems that the behav

Re: [Xen-devel] [PATCH RFC 0/6+2+2] Begin to disentangle libxenctrl and provide some stable libraries

2015-06-10 Thread Ian Jackson
Ian Campbell writes ("[PATCH RFC 0/6+2+2] Begin to disentangle libxenctrl and provide some stable libraries"): > [stuff] Most of this looks good to me. > As part of this change I've begun to get rid of the osdep interface > layer, since it is obsolete and just gets in the way. IIRC there were >

Re: [Xen-devel] [Draft A] Boot ABI for HVM guests without a device-model

2015-06-10 Thread Andrew Cooper
On 10/06/15 16:38, Roger Pau Monné wrote: > El 10/06/15 a les 15.18, Andrew Cooper ha escrit: >>> * cr0: bit 31 (PG) must be cleared. Bit 0 (PE) must be set. Other bits >>>are all undefined. >> "unspecified" is perhaps better phrasing. Most will be 0, but ET will >> be set as it is a read-on

Re: [Xen-devel] [PATCH RFC qemu-trad 1/2] qemu-xen-traditional: Use xentoollog as a separate library

2015-06-10 Thread Ian Jackson
Ian Campbell writes ("[PATCH RFC qemu-trad 1/2] qemu-xen-traditional: Use xentoollog as a separate library"): > This has been split out of libxenctrl, so the build needs to be able > to find the header and the library. QEMU does not use xtl_* itself so > -rpath-link is sufficient to allow linking

Re: [Xen-devel] [PATCH] tools/libxc: Batch memory allocations for PV guests

2015-06-10 Thread Wei Liu
On Wed, Jun 10, 2015 at 02:38:15PM +0100, Ross Lagerwall wrote: > The current code for allocating memory for PV guests batches the > hypercalls to allocate memory by allocating 1024*1024 extents of order 0 > at a time. To make this faster, first try allocating single extents of > order 9 (2 MiB) be

Re: [Xen-devel] [Draft E] Xen on ARM vITS Handling

2015-06-10 Thread Ian Campbell
On Wed, 2015-06-10 at 10:52 -0400, Julien Grall wrote: > > On 10/06/2015 10:45, Ian Campbell wrote: > > On Wed, 2015-06-10 at 10:40 -0400, Julien Grall wrote: > >>> ## Virtual LPI injection > >>> > >>> As discussed above the `vgic_vcpu_inject_irq` functionality will need > >>> to be extended to co

Re: [Xen-devel] [OSSTEST Nested PATCH v11 7/7] Add test job for nest test case

2015-06-10 Thread Ian Jackson
longtao.pang writes ("[OSSTEST Nested PATCH v11 7/7] Add test job for nest test case"): > 1. This patch adds creation of the nested test job, when job creation > procedure is invoked. > 2. Set nested L1's vif model, nestedhvm feature, set specific disk > size and memory size for nested test by mak

Re: [Xen-devel] [xen-unstable test] 57852: regressions - FAIL

2015-06-10 Thread Jan Beulich
>>> On 10.06.15 at 16:34, wrote: > For Intel I'm less sure, I've got microcode-20150121.tgz containing > microcode.dat. Is that just to be placed at > kernel/x86/microcode/GenuineIntel.bin and done, or is there some > processing needed? The full blob (albeit usually named microcode.bin; microcode

Re: [Xen-devel] [Draft A] Boot ABI for HVM guests without a device-model

2015-06-10 Thread Jan Beulich
>>> On 10.06.15 at 16:53, wrote: > El 10/06/15 a les 15.15, Jan Beulich ha escrit: > On 10.06.15 at 14:34, wrote: >> For my taste, it's getting too >> close to something that could be a legitimate 32-bit kernel pointer >> (agreed, all values could be valid pointers in 32-bit OSes, but with >>

Re: [Xen-devel] [PATCH 00/17] x86/hvm: I/O emulation cleanup and fix

2015-06-10 Thread Paul Durrant
> -Original Message- > From: Fabio Fantoni [mailto:fabio.fant...@m2r.biz] > Sent: 10 June 2015 15:50 > To: Paul Durrant; xen-de...@lists.xenproject.org > Cc: Andrew Cooper; Keir (Xen.org); Jan Beulich > Subject: Re: [Xen-devel] [PATCH 00/17] x86/hvm: I/O emulation cleanup and > fix > > Il

Re: [Xen-devel] [Draft A] Boot ABI for HVM guests without a device-model

2015-06-10 Thread Roger Pau Monné
Sorry, forgot to reply to one of your chunks. El 10/06/15 a les 15.15, Jan Beulich ha escrit: >> * cr0: bit 31 (PG) must be cleared. Bit 0 (PE) must be set. Other bits >>are all undefined. > > I see that grub1 documentation says so, but I doubt this is realistic > (even less so for cr4 bit

Re: [Xen-devel] [OSSTEST Nested PATCH v11 6/7] Compose the main recipe of nested test job

2015-06-10 Thread Ian Jackson
longtao.pang writes ("[OSSTEST Nested PATCH v11 6/7] Compose the main recipe of nested test job"): > The ident and guestname are same of 'nestedl1' for L1 guest VM. This is going in the right direction. I think arrangements need to be made to capture the logs for nestedl1. > +proc need-hosts/te

Re: [Xen-devel] [PATCH v2 COLOPre 05/13] tools/libxl: introduce a new API libxl__domain_restore() to load qemu state

2015-06-10 Thread Ian Campbell
On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote: > Secondary vm is running in colo mode. So we will do > the following things again and again: > 1. suspend both primay vm and secondary vm > 2. sync the state > 3. resume both primary vm and secondary vm > We will send qemu's state each time i

Re: [Xen-devel] [Draft A] Boot ABI for HVM guests without a device-model

2015-06-10 Thread Roger Pau Monné
El 10/06/15 a les 15.18, Andrew Cooper ha escrit: >> * cr0: bit 31 (PG) must be cleared. Bit 0 (PE) must be set. Other bits >>are all undefined. > > "unspecified" is perhaps better phrasing. Most will be 0, but ET will > be set as it is a read-only bit in all processors Xen will function on

Re: [Xen-devel] [PATCH v2 COLOPre 06/13] tools/libxl: Introduce a new internal API libxl__domain_unpause()

2015-06-10 Thread Ian Campbell
On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote: > From: Wen Congyang > > The guest is paused after libxl_domain_create_restore(). > Secondary vm is running in colo mode. So we need to unpause > the guest. The current API libxl_domain_unpause() is > not an internal API. Introduce a new API

Re: [Xen-devel] [Patch V4 00/16] xen: support pv-domains larger than 512GB

2015-06-10 Thread Juergen Gross
On 06/10/2015 05:25 PM, David Vrabel wrote: On 08/06/15 13:06, Juergen Gross wrote: Support 64 bit pv-domains with more than 512GB of memory. Tested with 64 bit dom0 on machines with 8GB and 1TB and 32 bit dom0 on a 8GB machine. Conflicts between E820 map and different hypervisor populated memo

[Xen-devel] [xen-4.5-testing test] 58326: tolerable FAIL - PUSHED

2015-06-10 Thread osstest service user
flight 58326 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/58326/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 57854 test-amd64-i386-xl-qemut-w

[Xen-devel] [PATCH 3.12 005/111] config: Enable NEED_DMA_MAP_STATE by default when SWIOTLB is selected

2015-06-10 Thread Jiri Slaby
From: Konrad Rzeszutek Wilk 3.12-stable review patch. If anyone has any objections, please let me know. === commit a6dfa128ce5c414ab46b1d690f7a1b8decb8526d upstream. A huge amount of NIC drivers use the DMA API, however if compiled under 32-bit an very important part of the DMA AP

Re: [Xen-devel] [Patch V4 00/16] xen: support pv-domains larger than 512GB

2015-06-10 Thread David Vrabel
On 08/06/15 13:06, Juergen Gross wrote: > Support 64 bit pv-domains with more than 512GB of memory. > > Tested with 64 bit dom0 on machines with 8GB and 1TB and 32 bit dom0 on a > 8GB machine. Conflicts between E820 map and different hypervisor populated > memory areas have been tested via a fake

Re: [Xen-devel] [PATCH v2 COLOPre 04/13] tools/libxc: export xc_bitops.h

2015-06-10 Thread Ian Campbell
On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote: > When we are under COLO, we will send dirty page bitmap info from > secondary to primary at every checkpoint. ... and this is a _libxl_ operation? Is that the right layer here? > So we need to get/test > the dirty page bitmap. We just expo

Re: [Xen-devel] [PATCH v2 COLOPre 02/13] tools/libxc: support to resume uncooperative HVM guests

2015-06-10 Thread Ian Campbell
On Mon, 2015-06-08 at 11:43 +0800, Yang Hongyang wrote: > From: Wen Congyang > > For PVHVM, the hypercall return code is 0, and it can be resumed > in a new domain context. > we suspend PVHVM and resume it is like this: > 1. suspend it via evtchn > 2. modifty the return code to 1 > 3. the guest k

[Xen-devel] [PATCH v24 13/15] x86/VPMU: Merge vpmu_rdmsr and vpmu_wrmsr

2015-06-10 Thread Boris Ostrovsky
The two routines share most of their logic. Signed-off-by: Boris Ostrovsky Reviewed-by: Dietmar Hahn --- xen/arch/x86/hvm/vpmu.c| 75 -- xen/include/asm-x86/hvm/vpmu.h | 14 ++-- 2 files changed, 41 insertions(+), 48 deletions(-) diff --git a

[Xen-devel] [PATCH v24 12/15] x86/VPMU: Handle PMU interrupts for PV(H) guests

2015-06-10 Thread Boris Ostrovsky
Add support for handling PMU interrupts for PV(H) guests. VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush hypercall. This allows the guest to access PMU MSR values that are stored in VPMU context which is shared between hypervisor and domain, thus avoiding traps to hy

[Xen-devel] [PATCH v24 07/15] x86/VPMU: Save VPMU state for PV guests during context switch

2015-06-10 Thread Boris Ostrovsky
Save VPMU state during context switch for both HVM and PV(H) guests. A subsequent patch ("x86/VPMU: NMI-based VPMU support") will make it possible for vpmu_switch_to() to call vmx_vmcs_try_enter()->vcpu_pause() which needs is_running to be correctly set/cleared. To prepare for that, call context_

[Xen-devel] [PATCH v24 06/15] x86/VPMU: Initialize PMU for PV(H) guests

2015-06-10 Thread Boris Ostrovsky
Code for initializing/tearing down PMU for PV guests Signed-off-by: Boris Ostrovsky Acked-by: Daniel De Graaf Acked-by: Jan Beulich --- tools/flask/policy/policy/modules/xen/xen.te | 4 + xen/arch/x86/domain.c| 2 + xen/arch/x86/hvm/hvm.c | 1

[Xen-devel] [PATCH v24 15/15] x86/VPMU: Move VPMU files up from hvm/ directory

2015-06-10 Thread Boris Ostrovsky
Since PMU is now not HVM specific we can move VPMU-related files up from arch/x86/hvm/ directory. Specifically: arch/x86/hvm/vpmu.c -> arch/x86/cpu/vpmu.c arch/x86/hvm/svm/vpmu.c -> arch/x86/cpu/vpmu_amd.c arch/x86/hvm/vmx/vpmu_core2.c -> arch/x86/cpu/vpmu_intel.c include/asm-x86/h

  1   2   3   >