Re: [Xen-devel] [PATCHv9 1/4] gnttab: per-active entry locking

2015-05-21 Thread Jan Beulich
On 20.05.15 at 17:54, david.vra...@citrix.com wrote: @@ -505,7 +526,7 @@ static int grant_map_exists(const struct domain *ld, unsigned long mfn, unsigned int *ref_count) { -const struct active_grant_entry *act; +struct

Re: [Xen-devel] xen scheduler

2015-05-21 Thread Rajendra Bele
Hi Dario, Thanks for your comments, Here Priority will be prime Method of Sorting of VCPUs in local run queue in addition to it I am Proposing Shortest Credit First which is similar to SJF not exactly SJF of O.S. because this is credit based. My suggestion is Replace FCFS by SCF(Shortest

Re: [Xen-devel] [PATCH] public: restrict xen_arch_domainconfig visibility

2015-05-21 Thread Andrew Cooper
On 21/05/2015 08:13, Jan Beulich wrote: On 20.05.15 at 15:10, andrew.coop...@citrix.com wrote: As an extension to 931f5777c7 (public: clarify xen_arch_domainconfig ABI statement) limit the respective definitions' visibility to hypervisor and tools. Signed-off-by: Jan Beulich

[Xen-devel] [xen-4.5-testing test] 56821: regressions - FAIL

2015-05-21 Thread osstest service user
flight 56821 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/56821/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop fail REGR. vs. 56728

Re: [Xen-devel] [xen-unstable test] 56811: regressions - FAIL

2015-05-21 Thread Ian Campbell
On Thu, 2015-05-21 at 07:43 +0100, Jan Beulich wrote: On 21.05.15 at 05:34, osst...@xenbits.xen.org wrote: flight 56811 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/56811/ Regressions :-( Tests which did not succeed and are blocking, including tests

Re: [Xen-devel] [PATCH] public: restrict xen_arch_domainconfig visibility

2015-05-21 Thread Ian Campbell
On Thu, 2015-05-21 at 08:13 +0100, Jan Beulich wrote: On 20.05.15 at 15:10, andrew.coop...@citrix.com wrote: As an extension to 931f5777c7 (public: clarify xen_arch_domainconfig ABI statement) limit the respective definitions' visibility to hypervisor and tools. Signed-off-by: Jan Beulich

[Xen-devel] [rumpuserxen test] 56875: regressions - FAIL

2015-05-21 Thread osstest service user
flight 56875 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/56875/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866

Re: [Xen-devel] [PATCH v6 0/2] kconfig: add xenconfig

2015-05-21 Thread Michal Marek
Dne 21.5.2015 v 02:53 Luis R. Rodriguez napsal(a): From: Luis R. Rodriguez mcg...@suse.com Michal Marek, Xen folks (David Vrabel, Konrad, Ian), which tree should these go through? Not kbuild, if I may ask :). Otherwise people will find me in get_maintainer.pl output and keep CCing me on

Re: [Xen-devel] [OSSTEST Nested PATCH v10 0/9] Introduction of netsted HVM test job

2015-05-21 Thread Ian Campbell
On Thu, 2015-05-21 at 14:56 +0800, Robert Hu wrote: On Wed, 2015-05-20 at 16:39 +0100, Ian Campbell wrote: On Wed, 2015-05-13 at 11:36 +0800, longtao.pang wrote: parsing grub which has 'submenu' primitive Changes to support '/boot' leading paths of kernel, xen, in grub

[Xen-devel] [PATCH v8 09/13] tools/libxl: minor name changes for CMT commands

2015-05-21 Thread Chao Peng
Use - instead of _ for monitor types. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com Reviewed-by: Dario Faggioli dario.faggi...@citrix.com Acked-by: Ian Campbell ian.campb...@citrix.com --- tools/libxl/xl_cmdimpl.c | 6 +++--- tools/libxl/xl_cmdtable.c | 6 +++--- 2 files changed, 6

[Xen-devel] [PATCH v8 12/13] tools: add tools support for Intel CAT

2015-05-21 Thread Chao Peng
This is the xc/xl changes to support Intel Cache Allocation Technology(CAT). 'xl psr-hwinfo' is updated to show CAT info and two new commands for CAT are introduced: - xl psr-cat-cbm-set [-s socket] domain cbm Set cache capacity bitmasks(CBM) for a domain. - xl psr-cat-show domain Show CAT

[Xen-devel] [PATCH v8 10/13] tools/libxl: add command to show PSR hardware info

2015-05-21 Thread Chao Peng
Add dedicated one to show hardware information. [root@vmm-psr]xl psr-hwinfo Cache Monitoring Technology (CMT): Enabled : 1 Total RMID : 63 Supported monitor types: cache-occupancy total-mem-bandwidth local-mem-bandwidth Signed-off-by: Chao Peng chao.p.p...@linux.intel.com

[Xen-devel] [PATCH v8 00/13] enable Cache Allocation Technology (CAT) for VMs

2015-05-21 Thread Chao Peng
Changes in v8: Address comments from Jan, mainly: * Remove total_cpus and retrofit the algorithm for calculating nr_sockets. * Change per-socket cpumask allocation as on demand. * Remove cat_socket_init_bitmap and rename cat_socket_enable_bitmap. * Ensure opt_cos_max is not too small. * Use the

[Xen-devel] [PATCH v8 13/13] docs: add xl-psr.markdown

2015-05-21 Thread Chao Peng
Add document to introduce basic concepts and terms in PSR family technologies and the xl interfaces. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com Acked-by: Ian Campbell ian.campb...@citrix.com --- Changes in v7: * Correct 'xl psr-hwinfo'. Changes in v6: * Address comments from Ian.

[Xen-devel] [PATCH v8 07/13] x86: add scheduling support for Intel CAT

2015-05-21 Thread Chao Peng
On context switch, write the the domain's Class of Service(COS) to MSR IA32_PQR_ASSOC, to notify hardware to use the new COS. For performance reason, the COS mask for current cpu is also cached in the local per-CPU variable. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com Acked-by: Jan

[Xen-devel] [PATCH v8 01/13] x86: add socket_cpumask

2015-05-21 Thread Chao Peng
Maintain socket_cpumask which contains all the HT and core siblings in the same socket. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com --- Changes in v8: * Remove total_cpus and retrofit the algorithm for calculating nr_sockets. * Change per-socket cpumask allocation as on demand. *

[Xen-devel] [PATCH v8 05/13] x86: expose CBM length and COS number information

2015-05-21 Thread Chao Peng
General CAT information such as maximum COS and CBM length are exposed to user space by a SYSCTL hypercall, to help user space to construct the CBM. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com Reviewed-by: Andrew Cooper andrew.coop...@citrix.com --- Changes in v7: * Copyback psr_cat_op

[Xen-devel] [PATCH v8 03/13] x86: maintain COS to CBM mapping for each socket

2015-05-21 Thread Chao Peng
For each socket, a COS to CBM mapping structure is maintained for each COS. The mapping is indexed by COS and the value is the corresponding CBM. Different VMs may use the same CBM, a reference count is used to indicate if the CBM is available. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com

[Xen-devel] [PATCH v8 11/13] tools/libxl: introduce some socket helpers

2015-05-21 Thread Chao Peng
Add libxl_socket_bitmap_alloc() to allow allocating a socket specific libxl_bitmap (as it is for cpu/node bitmap). Internal function libxl__count_physical_sockets() is introduced together to get the socket count when the size of bitmap is not specified. Signed-off-by: Chao Peng

[Xen-devel] [PATCH v8 04/13] x86: add COS information for each domain

2015-05-21 Thread Chao Peng
In Xen's implementation, the CAT enforcement granularity is per domain. Due to the length of CBM and the number of COS may be socket-different, each domain has COS ID for each socket. The domain get COS=0 by default and at runtime its COS is then allocated dynamically when user specifies a CBM for

[Xen-devel] [PATCH v8 06/13] x86: dynamically get/set CBM for a domain

2015-05-21 Thread Chao Peng
For CAT, COS is maintained in hypervisor only while CBM is exposed to user space directly to allow getting/setting domain's cache capacity. For each specified CBM, hypervisor will either use a existed COS which has the same CBM or allocate a new one if the same CBM is not found. If the allocation

[Xen-devel] [PATCH v8 08/13] xsm: add CAT related xsm policies

2015-05-21 Thread Chao Peng
Add xsm policies for Cache Allocation Technology(CAT) related hypercalls to restrict the functions visibility to control domain only. Signed-off-by: Chao Peng chao.p.p...@linux.intel.com Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov --- tools/flask/policy/policy/modules/xen/xen.if | 2 +-

[Xen-devel] [PATCH v8 02/13] x86: detect and initialize Intel CAT feature

2015-05-21 Thread Chao Peng
Detect Intel Cache Allocation Technology(CAT) feature and store the cpuid information for later use. Currently only L3 cache allocation is supported. The L3 CAT features may vary among sockets so per-socket feature information is stored. The initialization can happen either at boot time or when

Re: [Xen-devel] [V6] x86/cpuidle: get accurate C0 value with xenpm tool

2015-05-21 Thread Han, Huaitong
On Thu, 2015-05-21 at 07:50 +0100, Jan Beulich wrote: On 21.05.15 at 08:40, huaitong@intel.com wrote: @@ -329,7 +340,7 @@ static uint64_t acpi_pm_ticks_elapsed(uint64_t t1, uint64_t t2) } uint64_t (*__read_mostly cpuidle_get_tick)(void) = get_acpi_pm_tick; -static uint64_t

[Xen-devel] [V7] x86/cpuidle: get accurate C0 value with xenpm tool

2015-05-21 Thread Huaitong Han
When checking the ACPI funciton of C-status, after 100 seconds sleep, the sampling value of C0 status from the xenpm tool decreases. Because C0=NOW()-C1-C2-C3-C4, when NOW() value is during idle time, NOW() value is bigger than last C-status update time, and C0 value is also bigger than ture

Re: [Xen-devel] [V6] x86/cpuidle: get accurate C0 value with xenpm tool

2015-05-21 Thread Jan Beulich
On 21.05.15 at 08:40, huaitong@intel.com wrote: @@ -329,7 +340,7 @@ static uint64_t acpi_pm_ticks_elapsed(uint64_t t1, uint64_t t2) } uint64_t (*__read_mostly cpuidle_get_tick)(void) = get_acpi_pm_tick; -static uint64_t (*__read_mostly ticks_elapsed)(uint64_t, uint64_t) +uint64_t

[Xen-devel] [ovmf bisection] complete build-amd64

2015-05-21 Thread osstest service user
branch xen-unstable xen branch xen-unstable job build-amd64 test xen-build Tree: ovmf https://github.com/tianocore/edk2.git Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git Tree: xen git://xenbits.xen.org/xen.git *** Found and reproduced problem changeset *** Bug is in

[Xen-devel] [linux-3.4 test] 56818: regressions - FAIL

2015-05-21 Thread osstest service user
flight 56818 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/56818/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect test-amd64-amd64-pair

Re: [Xen-devel] [PATCH v2 26/41] arm : acpi add xen environment table

2015-05-21 Thread Jan Beulich
On 20.05.15 at 19:00, julien.gr...@citrix.com wrote: On 20/05/15 17:22, Jan Beulich wrote: On 17.05.15 at 22:03, parth.di...@linaro.org wrote: Xen environment table is ACPI table that is used to pass grant table and event channel interrupt information to dom0. The documents linked to by

Re: [Xen-devel] [xen-unstable test] 56811: regressions - FAIL

2015-05-21 Thread Jan Beulich
On 21.05.15 at 05:34, osst...@xenbits.xen.org wrote: flight 56811 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/56811/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu 17

[Xen-devel] [ovmf test] 56874: regressions - FAIL

2015-05-21 Thread osstest service user
flight 56874 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/56874/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-xsm5 xen-build fail REGR. vs. 56492 build-amd64

[Xen-devel] [PATCH] public: restrict xen_arch_domainconfig visibility

2015-05-21 Thread Jan Beulich
On 20.05.15 at 15:10, andrew.coop...@citrix.com wrote: As an extension to 931f5777c7 (public: clarify xen_arch_domainconfig ABI statement) limit the respective definitions' visibility to hypervisor and tools. Signed-off-by: Jan Beulich jbeul...@suse.com --- a/xen/include/public/arch-arm.h +++

[Xen-devel] [V6] x86/cpuidle: get accurate C0 value with xenpm tool

2015-05-21 Thread Huaitong Han
When checking the ACPI funciton of C-status, after 100 seconds sleep, the sampling value of C0 status from the xenpm tool decreases. Because C0=NOW()-C1-C2-C3-C4, when NOW() value is during idle time, NOW() value is bigger than last C-status update time, and C0 value is also bigger than ture

Re: [Xen-devel] [OSSTEST Nested PATCH v10 0/9] Introduction of netsted HVM test job

2015-05-21 Thread Robert Hu
On Wed, 2015-05-20 at 16:39 +0100, Ian Campbell wrote: On Wed, 2015-05-13 at 11:36 +0800, longtao.pang wrote: parsing grub which has 'submenu' primitive Changes to support '/boot' leading paths of kernel, xen, in grub Refactor installation of overlays for guest used

Re: [Xen-devel] [ovmf bisection] complete build-amd64

2015-05-21 Thread Ian Campbell
On Thu, 2015-05-21 at 06:59 +, osstest service user wrote: branch xen-unstable xen branch xen-unstable job build-amd64 test xen-build Tree: ovmf https://github.com/tianocore/edk2.git Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git Tree: xen

Re: [Xen-devel] RFC/Proposal: Partial `libxenctrl` API/ABI stabilisation

2015-05-21 Thread Ian Campbell
On Wed, 2015-05-20 at 18:37 +0100, Stefano Stabellini wrote: [...] As a reference, this is a split of the xc_ calls made by QEMU, based on functionality areas: Very useful, thanks. I've added this to the doc. ___ Xen-devel mailing list

Re: [Xen-devel] [PATCH v2 16/41] acpi : Introduce acpi_parse_entries

2015-05-21 Thread Parth Dixit
On 20 May 2015 at 21:43, Jan Beulich jbeul...@suse.com wrote: On 17.05.15 at 22:03, parth.di...@linaro.org wrote: add new function acpi_parse_entries which takes acpi table as argument. This will avoid fetching table everytime in acpi_table_parse_entries. This explanation doesn't make a

Re: [Xen-devel] [adhoc osstest bisection] complete test-amd64-amd64-xl

2015-05-21 Thread Ian Campbell
The osstest instance in Cambridge appears to have found a machine specific failure which a bisect has blamed on the x86/domctl: cleanup patch below. (NB: this is not the arm releated leak check thing which is currently hitting the xen-unstable flights in the main osstest instance) Since the logs

Re: [Xen-devel] [OSSTEST Nested PATCH v10 0/9] Introduction of netsted HVM test job

2015-05-21 Thread Pang, LongtaoX
-Original Message- From: Ian Campbell [mailto:ian.campb...@citrix.com] Sent: Wednesday, May 20, 2015 11:39 PM To: Pang, LongtaoX Cc: xen-devel@lists.xen.org; ian.jack...@eu.citrix.com; wei.l...@citrix.com; Hu, Robert Subject: Re: [OSSTEST Nested PATCH v10 0/9] Introduction of

Re: [Xen-devel] [adhoc osstest bisection] complete test-amd64-amd64-xl

2015-05-21 Thread Jan Beulich
On 21.05.15 at 11:16, ian.campb...@citrix.com wrote: The osstest instance in Cambridge appears to have found a machine specific failure which a bisect has blamed on the x86/domctl: cleanup patch below. (NB: this is not the arm releated leak check thing which is currently hitting the

Re: [Xen-devel] [V6] x86/cpuidle: get accurate C0 value with xenpm tool

2015-05-21 Thread Jan Beulich
On 21.05.15 at 10:48, huaitong@intel.com wrote: On Thu, 2015-05-21 at 07:50 +0100, Jan Beulich wrote: On 21.05.15 at 08:40, huaitong@intel.com wrote: @@ -329,7 +340,7 @@ static uint64_t acpi_pm_ticks_elapsed(uint64_t t1, uint64_t t2) } uint64_t (*__read_mostly

Re: [Xen-devel] [PATCH v2 16/41] acpi : Introduce acpi_parse_entries

2015-05-21 Thread Jan Beulich
On 21.05.15 at 11:14, parth.di...@linaro.org wrote: On 20 May 2015 at 21:43, Jan Beulich jbeul...@suse.com wrote: On 17.05.15 at 22:03, parth.di...@linaro.org wrote: add new function acpi_parse_entries which takes acpi table as argument. This will avoid fetching table everytime in

[Xen-devel] [linux-3.4 test] 56886: regressions - FAIL

2015-05-21 Thread osstest service user
flight 56886 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/56886/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect test-amd64-amd64-pair

[Xen-devel] [PATCH v22 06/14] x86/VPMU: Initialize PMU for PV(H) guests

2015-05-21 Thread Boris Ostrovsky
Code for initializing/tearing down PMU for PV guests Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov Acked-by: Jan Beulich jbeul...@suse.com --- tools/flask/policy/policy/modules/xen/xen.te | 4 + xen/arch/x86/domain.c

[Xen-devel] [PATCH v22 10/14] x86/VPMU: Use pre-computed masks when checking validity of MSRs

2015-05-21 Thread Boris Ostrovsky
No need to compute those masks on every MSR access. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com --- Changes in v22: * Added ARCH_CNTR_ENABLED macro xen/arch/x86/hvm/vmx/vpmu_core2.c | 28 ++-- 1 file changed, 18 insertions(+), 10 deletions(-) diff --git

[Xen-devel] [PATCH v22 04/14] x86/VPMU: Interface for setting PMU mode and flags

2015-05-21 Thread Boris Ostrovsky
Add runtime interface for setting PMU mode and flags. Three main modes are provided: * XENPMU_MODE_OFF: PMU is not virtualized * XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts. * XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for non-proviledged guests, dom0 can profile

[Xen-devel] [PATCH v22 08/14] x86/VPMU: When handling MSR accesses, leave fault injection to callers

2015-05-21 Thread Boris Ostrovsky
With this patch return value of 1 of vpmu_do_msr() will now indicate whether an error was encountered during MSR processing (instead of stating that the access was to a VPMU register). As part of this patch we also check for validity of certain MSR accesses right when we determine which register

[Xen-devel] [PATCH v22 02/14] x86/VPMU: Add public xenpmu.h

2015-05-21 Thread Boris Ostrovsky
Add pmu.h header files, move various macros and structures that will be shared between hypervisor and PV guests to it. Move MSR banks out of architectural PMU structures to allow for larger sizes in the future. The banks are allocated immediately after the context and PMU structures store offsets

[Xen-devel] [PATCH v22 01/14] common/symbols: Export hypervisor symbols to privileged guest

2015-05-21 Thread Boris Ostrovsky
Export Xen's symbols as {addresstypename} triplet via new XENPF_get_symbol hypercall Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com Reviewed-by: Dietmar Hahn

[Xen-devel] [PATCH v22 12/14] x86/VPMU: Merge vpmu_rdmsr and vpmu_wrmsr

2015-05-21 Thread Boris Ostrovsky
The two routines share most of their logic. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Reviewed-by: Dietmar Hahn dietmar.h...@ts.fujitsu.com --- xen/arch/x86/hvm/vpmu.c| 75 -- xen/include/asm-x86/hvm/vpmu.h | 14 ++-- 2 files

[Xen-devel] [PATCH RFC v1] libxl: Introduce a template for devices with a controller

2015-05-21 Thread George Dunlap
We have several outstanding patch series which add devices that have two levels: a controller and individual devices attached to that controller. In the interest of consistency, this patch introduces a section that sketches out a template for interfaces for such devices. Signed-off-by: George

Re: [Xen-devel] [PATCH v6 0/2] kconfig: add xenconfig

2015-05-21 Thread Luis R. Rodriguez
On Thu, May 21, 2015 at 04:20:27PM +0800, Michal Marek wrote: Dne 21.5.2015 v 02:53 Luis R. Rodriguez napsal(a): From: Luis R. Rodriguez mcg...@suse.com Michal Marek, Xen folks (David Vrabel, Konrad, Ian), which tree should these go through? Not kbuild, if I may ask :). Otherwise

[Xen-devel] [PATCH v22 00/14] x86/PMU: Xen PMU PV(H) support

2015-05-21 Thread Boris Ostrovsky
Changes in v22: * Clarified access permissions on shared fileds (patch 2) * Added ARCH_CNTR_ENABLED macro (patch 10) * Use hypervisor-private VPMU_CACHED instead of shared PMU_CACHED (patch 11) * A few cleanups (patch 11) Changes in v21: * Keep running VPMU's context private to hypervisor and

[Xen-devel] [PATCH v22 09/14] x86/VPMU: Add support for PMU register handling on PV guests

2015-05-21 Thread Boris Ostrovsky
Intercept accesses to PMU MSRs and process them in VPMU module. If vpmu ops for VCPU are not initialized (which is the case, for example, for PV guests that are not VPMU-enlightened) access to MSRs will return failure. Dump VPMU state for all domains (HVM and PV) when requested. Signed-off-by:

[Xen-devel] [PATCH v22 14/14] x86/VPMU: Move VPMU files up from hvm/ directory

2015-05-21 Thread Boris Ostrovsky
Since PMU is now not HVM specific we can move VPMU-related files up from arch/x86/hvm/ directory. Specifically: arch/x86/hvm/vpmu.c - arch/x86/cpu/vpmu.c arch/x86/hvm/svm/vpmu.c - arch/x86/cpu/vpmu_amd.c arch/x86/hvm/vmx/vpmu_core2.c - arch/x86/cpu/vpmu_intel.c

[Xen-devel] [PATCH v22 11/14] x86/VPMU: Handle PMU interrupts for PV(H) guests

2015-05-21 Thread Boris Ostrovsky
Add support for handling PMU interrupts for PV(H) guests. VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush hypercall. This allows the guest to access PMU MSR values that are stored in VPMU context which is shared between hypervisor and domain, thus avoiding traps to

[Xen-devel] [PATCH v22 05/14] x86/VPMU: Initialize VPMUs with __initcall

2015-05-21 Thread Boris Ostrovsky
Move some VPMU initilization operations into __initcalls to avoid performing same tests and calculations for each vcpu. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Jan Beulich jbeul...@suse.com --- xen/arch/x86/hvm/svm/vpmu.c | 106 --

[Xen-devel] [PATCH v22 03/14] x86/VPMU: Make vpmu not HVM-specific

2015-05-21 Thread Boris Ostrovsky
vpmu structure will be used for both HVM and PV guests. Move it from hvm_vcpu to arch_vcpu. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Jan Beulich jbeul...@suse.com Reviewed-by: Kevin Tian kevin.t...@intel.com Reviewed-by: Dietmar Hahn dietmar.h...@ts.fujitsu.com

[Xen-devel] [PATCH v22 07/14] x86/VPMU: Save VPMU state for PV guests during context switch

2015-05-21 Thread Boris Ostrovsky
Save VPMU state during context switch for both HVM and PV(H) guests. A subsequent patch (x86/VPMU: NMI-based VPMU support) will make it possible for vpmu_switch_to() to call vmx_vmcs_try_enter()-vcpu_pause() which needs is_running to be correctly set/cleared. To prepare for that, call

[Xen-devel] [PATCH v22 13/14] x86/VPMU: Add privileged PMU mode

2015-05-21 Thread Boris Ostrovsky
Add support for privileged PMU mode (XENPMU_MODE_ALL) which allows privileged domain (dom0) profile both itself (and the hypervisor) and the guests. While this mode is on profiling in guests is disabled. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Jan Beulich

Re: [Xen-devel] [PATCH RFC v1] libxl: Introduce a template for devices with a controller

2015-05-21 Thread George Dunlap
On 05/21/2015 06:07 PM, George Dunlap wrote: We have several outstanding patch series which add devices that have two levels: a controller and individual devices attached to that controller. In the interest of consistency, this patch introduces a section that sketches out a template for

Re: [Xen-devel] [PATCH RFC v1] libxl: Introduce a template for devices with a controller

2015-05-21 Thread George Dunlap
On 05/21/2015 06:07 PM, George Dunlap wrote: We have several outstanding patch series which add devices that have two levels: a controller and individual devices attached to that controller. In the interest of consistency, this patch introduces a section that sketches out a template for

Re: [Xen-devel] [PATCH v6 2/2] kconfig: add xenconfig defconfig helper

2015-05-21 Thread Luis R. Rodriguez
On Thu, May 21, 2015 at 11:49:17PM +0900, Masahiro Yamada wrote: Hi, I am not familiar with xen at all, just some comments from the build system side. 2015-05-21 3:53 GMT+09:00 Luis R. Rodriguez mcg...@do-not-panic.com: From: Luis R. Rodriguez mcg...@suse.com This lets you build

Re: [Xen-devel] [PATCH] xl: Support (by ignoring) xl migrate --live

2015-05-21 Thread Andrew Cooper
On 21/05/15 19:02, Ian Campbell wrote: On Thu, 2015-05-21 at 19:44 +0200, Olaf Hering wrote: On Thu, May 21, Ian Campbell wrote: My pod2text doesn't seem to complain, but does this help? Yes, this fixes it. Pushed, thanks. OOI what version of pod2text are you both using which exposes this?

Re: [Xen-devel] [PATCH] xl: Support (by ignoring) xl migrate --live

2015-05-21 Thread Andrew Cooper
On 21/05/15 17:34, Ian Campbell wrote: On Thu, 2015-05-21 at 18:23 +0200, Olaf Hering wrote: On Thu, May 21, Ian Campbell wrote: On Thu, 2015-05-14 at 15:05 +0100, Ian Campbell wrote: On Thu, 2015-05-14 at 13:41 +0100, Ian Jackson wrote: xm migrate would do non-live migration (effectively,

Re: [Xen-devel] swiotlb buffer is full problem with tg3 and kernel 3.16.0-4-686-pae on Xen 4.4.1

2015-05-21 Thread Ian Campbell
On Thu, 2015-05-21 at 17:17 +0200, Marco Steinacher wrote: Shall I try to build a 3.16.0-4-686-pae kernel with CONFIG_NEED_DMA_MAP_STATE=y? Yes, this is what I would recommend. Although it's not as simple as turning it on, you actually need to patch the Kconfig as in this mail:

Re: [Xen-devel] [PATCH] xl: Support (by ignoring) xl migrate --live

2015-05-21 Thread Olaf Hering
On Thu, May 21, Ian Campbell wrote: My pod2text doesn't seem to complain, but does this help? Yes, this fixes it. Thanks! Subject: [PATCH] docs: correct pod syntax ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 1/4] x86: move syscall trampolines off the stack

2015-05-21 Thread Jan Beulich
On 21.05.15 at 13:08, andrew.coop...@citrix.com wrote: On 21/05/15 11:15, Jan Beulich wrote: This is needed as stacks are going to become non-executable. Use separate stub pages (shared among suitable CPUs on the same node) instead. Stub areas (currently 128 bytes each) are being split into

[Xen-devel] Plans for the SEDF scheduler

2015-05-21 Thread Dario Faggioli
Hi everyone, I've copied the committers, Lars as community manager, Wei as the release manager, George as the scheduler maintainer, RT-Xen and DornerWorks people, which have some interest in the field, I believe. Please, widen the crowd if you think it's necessary/best. Straight to the point:

Re: [Xen-devel] [PATCH V4] xen/vm_event: Clean up control-register-write vm_events

2015-05-21 Thread Razvan Cojocaru
diff --git a/xen/arch/x86/hvm/event.c b/xen/arch/x86/hvm/event.c index 9d5f9f3..310f0e8 100644 --- a/xen/arch/x86/hvm/event.c +++ b/xen/arch/x86/hvm/event.c @@ -88,55 +88,29 @@ static int hvm_event_traps(uint8_t sync, vm_event_request_t *req) return 1; } -static inline -void

Re: [Xen-devel] [PATCH v2 26/41] arm : acpi add xen environment table

2015-05-21 Thread Jan Beulich
On 21.05.15 at 12:52, julien.gr...@citrix.com wrote: On 21/05/15 11:46, Jan Beulich wrote: On 21.05.15 at 12:34, julien.gr...@citrix.com wrote: On 21/05/15 07:22, Jan Beulich wrote: The linked to document (on our wiki) is versioned 0.something, which doesn't look like a final stable version.

Re: [Xen-devel] [PATCH v2 1/4] x86: move syscall trampolines off the stack

2015-05-21 Thread Andrew Cooper
On 21/05/15 12:48, Jan Beulich wrote: On 21.05.15 at 13:08, andrew.coop...@citrix.com wrote: On 21/05/15 11:15, Jan Beulich wrote: This is needed as stacks are going to become non-executable. Use separate stub pages (shared among suitable CPUs on the same node) instead. Stub areas

Re: [Xen-devel] [PATCH v2 26/41] arm : acpi add xen environment table

2015-05-21 Thread Julien Grall
On 21/05/15 12:38, Jan Beulich wrote: On 21.05.15 at 12:52, julien.gr...@citrix.com wrote: On 21/05/15 11:46, Jan Beulich wrote: On 21.05.15 at 12:34, julien.gr...@citrix.com wrote: On 21/05/15 07:22, Jan Beulich wrote: The linked to document (on our wiki) is versioned 0.something, which

Re: [Xen-devel] [PATCH V3 4/6] xl: add pvusb commands

2015-05-21 Thread Juergen Gross
On 05/21/2015 01:11 PM, George Dunlap wrote: On 05/21/2015 11:52 AM, Juergen Gross wrote: From your description, xm usb-assignable-list would list *all* USB devices on the system which were available to be assigned to a guest. xl pci-assignable-list does *not* list all PCI devices on a

Re: [Xen-devel] [PATCH V3 4/6] xl: add pvusb commands

2015-05-21 Thread George Dunlap
On 05/21/2015 12:58 PM, Juergen Gross wrote: Yes, from a pedantic perspective, both will tell you on which devices you can run X-attach without any extra arguments. But from a practical perspective, xm usb-assignable-list tells you something practical about the state of devices on the whole

Re: [Xen-devel] [PATCH v2 17/41] arm : refactor gic into generic and dt specific parts

2015-05-21 Thread Julien Grall
On 17/05/15 21:03, Parth Dixit wrote: refactor gic related functions into dt and generic parts this will be helpful when adding acpi support for gic Signed-off-by: Parth Dixit parth.di...@linaro.org --- xen/arch/arm/gic-v2.c | 13 ++--- xen/arch/arm/gic.c| 7 ++- 2 files

Re: [Xen-devel] [PATCH v2 19/41] arm : acpi Add GIC specific ACPI boot support

2015-05-21 Thread Julien Grall
Hi Parth, On 17/05/15 21:03, Parth Dixit wrote: ACPI on Xen hypervisor uses MADT table for proper GIC initialization. It needs to parse GIC related subtables, collect CPU interface and distributor addresses and call driver initialization function (which is hardware abstraction agnostic). In a

Re: [Xen-devel] Xen/arm: Virtual ITS command queue handling

2015-05-21 Thread Manish Jaggi
On Tuesday 19 May 2015 07:18 AM, Ian Campbell wrote: On Tue, 2015-05-19 at 19:34 +0530, Vijay Kilari wrote: On Tue, May 19, 2015 at 7:24 PM, Ian Campbell ian.campb...@citrix.com wrote: On Tue, 2015-05-19 at 14:36 +0100, Ian Campbell wrote: On Tue, 2015-05-19 at 14:27 +0100, Julien Grall

Re: [Xen-devel] [PATCH V3 4/6] xl: add pvusb commands

2015-05-21 Thread Juergen Gross
On 05/21/2015 03:01 PM, George Dunlap wrote: On 05/21/2015 12:58 PM, Juergen Gross wrote: There might be existing users who know about xm usb-assignable-list. Yes -- unfortunately something has to give: either we confuse new users with two names that sound similar but do something different,

[Xen-devel] [PATCH] x86/pvh: disable posted interrupts

2015-05-21 Thread Roger Pau Monne
Enabling posted interrupts requires the virtual interrupt delivery feature, which is disabled for PVH guests, so make sure posted interrupts are also disabled or else vmlaunch will fail. Signed-off-by: Roger Pau Monné roger@citrix.com Reported-and-Tested-by: Lars Eggert l...@netapp.com Cc:

[Xen-devel] [SECURITY] XSA-133 Retrospective.

2015-05-21 Thread security
A member of the security predisclosure list has asked that the security team publish a time line relating to the short predisclosure period in this case. The final disclosure is at http://xenbits.xen.org/xsa/advisory-133.html While the Xen Security policy[0] sets out various defaults it

Re: [Xen-devel] Plans for the SEDF scheduler

2015-05-21 Thread Dario Faggioli
On Thu, 2015-05-21 at 13:53 +0100, Wei Liu wrote: On Thu, May 21, 2015 at 02:39:37PM +0200, Dario Faggioli wrote: Oh and, whatever route we decide to go for, is it perhaps necessary that we do something like deprecate it for one release (4.6), e.g., by printing a warning saying that SEDF

[Xen-devel] [PATCH V4] xen/vm_event: Clean up control-register-write vm_events

2015-05-21 Thread Razvan Cojocaru
As suggested by Andrew Cooper, this patch attempts to remove some redundancy and allow for an easier time when adding vm_events for new control registers in the future, by having a single VM_EVENT_REASON_WRITE_CTRLREG vm_event type, meant to serve CR0, CR3, CR4 and (newly introduced) XCR0. The

Re: [Xen-devel] Kernel panic, reboot in 5 seconds

2015-05-21 Thread Mr Idris
On 5/18/15, George Dunlap george.dun...@eu.citrix.com wrote: On Thu, May 14, 2015 at 2:00 PM, Mr Idris m...@idris.web.id wrote: I'm trying to create cpu scheduler on xen 4.4.1 using debian 7 which inspired by arinc653 scheduler. When i use it, it gives me something like kernel panic and reboot

Re: [Xen-devel] [PATCH v2 20/41] arm : create generic uart initialization function

2015-05-21 Thread Julien Grall
Hi Parth, On 17/05/15 21:03, Parth Dixit wrote: Rename dt-uart.c to arm-uart.c and create new generic uart init function. move dt_uart_init to uart_init.Refactor pl011 driver to dt and common initialization parts. This will be useful later when acpi specific uart initialization function is

Re: [Xen-devel] Plans for the SEDF scheduler

2015-05-21 Thread George Dunlap
On 05/21/2015 01:39 PM, Dario Faggioli wrote: Hi everyone, I've copied the committers, Lars as community manager, Wei as the release manager, George as the scheduler maintainer, RT-Xen and DornerWorks people, which have some interest in the field, I believe. Please, widen the crowd if you

Re: [Xen-devel] Plans for the SEDF scheduler

2015-05-21 Thread Wei Liu
On Thu, May 21, 2015 at 02:39:37PM +0200, Dario Faggioli wrote: Hi everyone, I've copied the committers, Lars as community manager, Wei as the release manager, George as the scheduler maintainer, RT-Xen and DornerWorks people, which have some interest in the field, I believe. Please, widen

Re: [Xen-devel] [PATCH v4 2/2] xen/block: add multi-page ring support

2015-05-21 Thread Bob Liu
On 05/21/2015 07:22 PM, Roger Pau Monné wrote: El 20/05/15 a les 15.10, Bob Liu ha escrit: ... +} else { +unsigned int i; + +if (ring_page_order xen_blkif_max_ring_order) { +err = -EINVAL; +xenbus_dev_fatal(dev, err,

[Xen-devel] [PATCH v2 1/4] x86: move syscall trampolines off the stack

2015-05-21 Thread Jan Beulich
This is needed as stacks are going to become non-executable. Use separate stub pages (shared among suitable CPUs on the same node) instead. Stub areas (currently 128 bytes each) are being split into two parts - a fixed usage one (the syscall ones) and dynamically usable space, which will be used

[Xen-devel] [PATCH v2 2/4] x86emul: move stubs off the stack

2015-05-21 Thread Jan Beulich
This is needed as stacks are going to become non-executable. Signed-off-by: Jan Beulich jbeul...@suse.com --- v2: Limit the testing tool's stub buffer size to MAX_INST_LEN + 1. Fix formatting. --- a/tools/tests/x86_emulator/x86_emulate.c +++ b/tools/tests/x86_emulator/x86_emulate.c @@ -17,4

[Xen-devel] [PATCH v2 3/4] x86: move I/O emulation stubs off the stack

2015-05-21 Thread Jan Beulich
This is needed as stacks are going to become non-executable. Signed-off-by: Jan Beulich jbeul...@suse.com --- v2: Use ~PAGE_MASK instead of PAGE_SIZE - 1 for page offset masking. Comment adjustments. --- a/xen/arch/x86/traps.c +++ b/xen/arch/x86/traps.c @@ -2006,7 +2006,7 @@ static int

Re: [Xen-devel] [PATCH V3 4/6] xl: add pvusb commands

2015-05-21 Thread George Dunlap
On 05/21/2015 04:35 AM, Juergen Gross wrote: On 05/20/2015 05:25 PM, George Dunlap wrote: On 05/20/2015 03:55 PM, Juergen Gross wrote: On 05/20/2015 04:41 PM, George Dunlap wrote: On Wed, May 20, 2015 at 3:33 PM, Juergen Gross jgr...@suse.com wrote: On 05/20/2015 04:20 PM, George Dunlap

Re: [Xen-devel] [PATCH v3 0/6] Assign a default SSID to guests

2015-05-21 Thread Ian Campbell
On Wed, 2015-05-20 at 15:30 +0100, Ian Campbell wrote: Compared with v3 this uses Daniel's more comprehensive policy patch and adds a default ssidref for stubdoms too. Tested with and without XSM enabled for normal guests and HVM guests with qemu in dom0. Stubdoms appeared to be broken in

Re: [Xen-devel] [PATCH v2 26/41] arm : acpi add xen environment table

2015-05-21 Thread Jan Beulich
On 21.05.15 at 12:34, julien.gr...@citrix.com wrote: On 21/05/15 07:22, Jan Beulich wrote: The linked to document (on our wiki) is versioned 0.something, which doesn't look like a final stable version. The same applies to the other (STAO?) one. That's a mistake in the version number. Those

Re: [Xen-devel] [PATCH v2 17/41] arm : refactor gic into generic and dt specific parts

2015-05-21 Thread Julien Grall
Hi Parth, On 17/05/15 21:03, Parth Dixit wrote: refactor gic related functions into dt and generic parts this will be helpful when adding acpi support for gic Please explain why you don't refactor neither gic-hip04 and gic-v3. Signed-off-by: Parth Dixit parth.di...@linaro.org ---

Re: [Xen-devel] [PATCH v2 1/4] x86: move syscall trampolines off the stack

2015-05-21 Thread Andrew Cooper
On 21/05/15 11:15, Jan Beulich wrote: This is needed as stacks are going to become non-executable. Use separate stub pages (shared among suitable CPUs on the same node) instead. Stub areas (currently 128 bytes each) are being split into two parts - a fixed usage one (the syscall ones) and

Re: [Xen-devel] xen scheduler

2015-05-21 Thread Dario Faggioli
On Thu, 2015-05-21 at 13:25 +0530, Rajendra Bele wrote: Hi Dario, Hi, Here Priority will be prime Method of Sorting of VCPUs in local run queue in addition to it I am Proposing Shortest Credit First which is similar to SJF not exactly SJF of O.S. because this is credit based. Understood.

Re: [Xen-devel] [PATCH v3 0/6] Assign a default SSID to guests

2015-05-21 Thread Wei Liu
On Thu, May 21, 2015 at 10:54:44AM +0100, Ian Campbell wrote: On Wed, 2015-05-20 at 15:30 +0100, Ian Campbell wrote: Compared with v3 this uses Daniel's more comprehensive policy patch and adds a default ssidref for stubdoms too. Tested with and without XSM enabled for normal guests and

Re: [Xen-devel] [PATCH v2 26/41] arm : acpi add xen environment table

2015-05-21 Thread Julien Grall
Hi Jan, On 21/05/15 07:22, Jan Beulich wrote: On 20.05.15 at 19:00, julien.gr...@citrix.com wrote: On 20/05/15 17:22, Jan Beulich wrote: On 17.05.15 at 22:03, parth.di...@linaro.org wrote: Xen environment table is ACPI table that is used to pass grant table and event channel interrupt

[Xen-devel] [PATCH] x86/irq: Limit the maximum number of domain PIRQs

2015-05-21 Thread Andrew Cooper
c/s 7e73a6e have architectures specify the number of PIRQs a hardware domain gets increased the default number of pirqs for dom0, as 256 was found to be too low in some cases. However, it didn't account for the upper bound presented by the domains EOI bitmap, registered with the

  1   2   >