Re: [Xen-devel] Xen 4.6 Development Update (three months reminder)

2015-05-04 Thread Yu, Zhang
Hi Wei, This is Zhang Yu from Intel graphic virtualization team. Previously in Xen hackathon, Paul and I mentioned that there're several patch series for XenGT that need to be tracked on Xen 4.6. Here, I'd like to confirm with you about these patchsets: 1 16-byte MMIO emulation fix –

[Xen-devel] [RESEND Patch V3 04/15] xen: eliminate scalability issues from initial mapping setup

2015-05-04 Thread Juergen Gross
Direct Xen to place the initial P-M table outside of the initial mapping, as otherwise the 1G (implementation) / 2G (theoretical) restriction on the size of the initial mapping limits the amount of memory a domain can be handed initially. As the initial P-M table is copied rather early during

[Xen-devel] [RESEND Patch V3 14/15] xen: allow more than 512 GB of RAM for 64 bit pv-domains

2015-05-04 Thread Juergen Gross
64 bit pv-domains under Xen are limited to 512 GB of RAM today. The main reason has been the 3 level p2m tree, which was replaced by the virtual mapped linear p2m list. Parallel to the p2m list which is being used by the kernel itself there is a 3 level mfn tree for usage by the Xen tools and

[Xen-devel] [RESEND Patch V3 06/15] xen: split counting of extra memory pages from remapping

2015-05-04 Thread Juergen Gross
Memory pages in the initial memory setup done by the Xen hypervisor conflicting with the target E820 map are remapped. In order to do this those pages are counted and remapped in xen_set_identity_and_remap(). Split the counting from the remapping operation to be able to setup the needed memory

[Xen-devel] [RESEND Patch V3 08/15] xen: find unused contiguous memory area

2015-05-04 Thread Juergen Gross
For being able to relocate pre-allocated data areas like initrd or p2m list it is mandatory to find a contiguous memory area which is not yet in use and doesn't conflict with the memory map we want to be in effect. In case such an area is found reserve it at once as this will be required to be

[Xen-devel] [RESEND Patch V3 10/15] xen: check pre-allocated page tables for conflict with memory map

2015-05-04 Thread Juergen Gross
Check whether the page tables built by the domain builder are at memory addresses which are in conflict with the target memory map. If this is the case just panic instead of running into problems later. Signed-off-by: Juergen Gross jgr...@suse.com --- arch/x86/xen/mmu.c | 19

[Xen-devel] [RESEND Patch V3 09/15] xen: check for kernel memory conflicting with memory layout

2015-05-04 Thread Juergen Gross
Checks whether the pre-allocated memory of the loaded kernel is in conflict with the target memory map. If this is the case, just panic instead of run into problems later, as there is nothing we can do to repair this situation. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David

[Xen-devel] [RESEND Patch V3 11/15] xen: check for initrd conflicting with e820 map

2015-05-04 Thread Juergen Gross
Check whether the initrd is placed at a location which is conflicting with the target E820 map. If this is the case relocate it to a new area unused up to now and compliant to the E820 map. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com ---

[Xen-devel] [RESEND Patch V3 07/15] xen: check memory area against e820 map

2015-05-04 Thread Juergen Gross
Provide a service routine to check a physical memory area against the E820 map. The routine will return false if the complete area is RAM according to the E820 map and true otherwise. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com ---

[Xen-devel] [RESEND Patch V3 13/15] xen: move p2m list if conflicting with e820 map

2015-05-04 Thread Juergen Gross
Check whether the hypervisor supplied p2m list is placed at a location which is conflicting with the target E820 map. If this is the case relocate it to a new area unused up to now and compliant to the E820 map. As the p2m list might by huge (up to several GB) and is required to be mapped

[Xen-devel] [RESEND Patch V3 01/15] xen: sync with xen headers

2015-05-04 Thread Juergen Gross
Use the newest headers from the xen tree to get some new structure layouts. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com --- arch/x86/include/asm/xen/interface.h | 96 include/xen/interface/xen.h | 10

[Xen-devel] [RESEND Patch V3 15/15] xen: remove no longer needed p2m.h

2015-05-04 Thread Juergen Gross
Cleanup by removing arch/x86/xen/p2m.h as it isn't needed any more. Most definitions in this file are used in p2m.c only. Move those into p2m.c. set_phys_range_identity() is already declared in arch/x86/include/asm/xen/page.h, add __init annotation there. MAX_REMAP_RANGES isn't used at all,

[Xen-devel] [RESEND Patch V3 05/15] xen: move static e820 map to global scope

2015-05-04 Thread Juergen Gross
Instead of using a function local static e820 map in xen_memory_setup() and calling various functions in the same source with the map as a parameter use a map directly accessible by all functions in the source. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel

[Xen-devel] [RESEND Patch V3 03/15] xen: don't build mfn tree if tools don't need it

2015-05-04 Thread Juergen Gross
In case the Xen tools indicate they don't need the p2m 3 level tree as they support the virtual mapped linear p2m list, just omit building the tree. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com --- arch/x86/xen/p2m.c | 10 +++--- 1 file

[Xen-devel] [RESEND Patch V3 00/15] xen: support pv-domains larger than 512GB

2015-05-04 Thread Juergen Gross
Support 64 bit pv-domains with more than 512GB of memory. Tested with 64 bit dom0 on machines with 8GB and 1TB and 32 bit dom0 on a 8GB machine. Conflicts between E820 map and different hypervisor populated memory areas have been tested via a fake E820 map reserved area on the 8GB machine.

[Xen-devel] [RESEND Patch V3 02/15] xen: save linear p2m list address in shared info structure

2015-05-04 Thread Juergen Gross
The virtual address of the linear p2m list should be stored in the shared info structure read by the Xen tools to be able to support 64 bit pv-domains larger than 512 GB. Additionally the linear p2m list interface includes a generation count which is changed prior to and after each mapping change

[Xen-devel] [V2] x86/cpuidle: get accurate C0 value with xenpm tool

2015-05-04 Thread Huaitong Han
When checking the ACPI funciton of C-status, after 100 seconds sleep, the sampling value of C0 status from the xenpm tool decreases. Because C0=NOW()-C1-C2-C3-C4, when NOW() value is during idle time, NOW() value is bigger than last C-status update time, and C0 value is also bigger than ture

Re: [Xen-devel] [PATCH 2/3] xen/vt-d: mask interrupt message generation

2015-05-04 Thread Zhang, Yang Z
Chen, Tiejun wrote on 2015-05-04: Yang, Thanks for your review. On 2015/5/4 12:07, Zhang, Yang Z wrote: Chen, Tiejun wrote on 2015-05-04: While initializing VT-D we should mask interrupt message generation to avoid receiving any interrupt as pending before enable DMA translation, and

Re: [Xen-devel] [PATCHv3 0/4] Use ticket locks for spinlocks

2015-05-04 Thread Jan Beulich
On 30.04.15 at 17:44, david.vra...@citrix.com wrote: On 23/04/15 13:42, David Vrabel wrote: On 21/04/15 11:22, Jan Beulich wrote: On 21.04.15 at 12:11, david.vra...@citrix.com wrote: We have analysed the affect of this series on interrupt latency (by measuring the duration of irq

Re: [Xen-devel] [v3 00/10] PML (Page Modification Logging) support

2015-05-04 Thread Tian, Kevin
From: Tim Deegan [mailto:t...@xen.org] Sent: Thursday, April 30, 2015 7:04 PM At 16:19 +0800 on 24 Apr (1429892368), Kai Huang wrote: v2-v3: - Merged v2 patch 02 (document change) to patch 01 as a single patch, and changed new parameter description as suggested by Andrew. -

Re: [Xen-devel] [v3 01/10] vmx: add new boot parameter to control PML enabling

2015-05-04 Thread Kai Huang
On 04/27/2015 02:56 PM, Jan Beulich wrote: Kai Huang kaih.li...@gmail.com 04/25/15 5:00 PM On Fri, Apr 24, 2015 at 10:33 PM, Jan Beulich jbeul...@suse.com wrote: On 24.04.15 at 10:19, kai.hu...@linux.intel.com wrote: +} + +custom_param(ept, parse_ept_param); And a superfluous blank line

Re: [Xen-devel] [v3 00/10] PML (Page Modification Logging) support

2015-05-04 Thread Kai Huang
On 05/04/2015 03:40 PM, Tian, Kevin wrote: From: Tim Deegan [mailto:t...@xen.org] Sent: Thursday, April 30, 2015 7:04 PM At 16:19 +0800 on 24 Apr (1429892368), Kai Huang wrote: v2-v3: - Merged v2 patch 02 (document change) to patch 01 as a single patch, and changed new parameter

[Xen-devel] Ping: [PATCH] domctl: don't truncate XEN_DOMCTL_max_mem requests

2015-05-04 Thread Jan Beulich
While I got a review from Andrew, I'm still waiting for an ack (or nak). Thanks, Jan On 22.04.15 at 13:56, jbeul...@suse.com wrote: Instead saturate the value if the input can't be represented in the respective struct domain field. Signed-off-by: Jan Beulich jbeul...@suse.com ---

Re: [Xen-devel] [v3 01/10] vmx: add new boot parameter to control PML enabling

2015-05-04 Thread Jan Beulich
On 04.05.15 at 09:46, kai.hu...@linux.intel.com wrote: On 04/27/2015 02:56 PM, Jan Beulich wrote: Kai Huang kaih.li...@gmail.com 04/25/15 5:00 PM On Fri, Apr 24, 2015 at 10:33 PM, Jan Beulich jbeul...@suse.com wrote: On 24.04.15 at 10:19, kai.hu...@linux.intel.com wrote: +} +

Re: [Xen-devel] [v3 01/10] vmx: add new boot parameter to control PML enabling

2015-05-04 Thread Kai Huang
On 05/04/2015 03:52 PM, Jan Beulich wrote: On 04.05.15 at 09:46, kai.hu...@linux.intel.com wrote: On 04/27/2015 02:56 PM, Jan Beulich wrote: Kai Huang kaih.li...@gmail.com 04/25/15 5:00 PM On Fri, Apr 24, 2015 at 10:33 PM, Jan Beulich jbeul...@suse.com wrote: On 24.04.15 at 10:19,

Re: [Xen-devel] [RFC][PATCH] xen/apic: refactor error_interrupt

2015-05-04 Thread Jan Beulich
On 04.05.15 at 04:03, tiejun.c...@intel.com wrote: --- a/xen/arch/x86/apic.c +++ b/xen/arch/x86/apic.c @@ -1319,28 +1319,37 @@ out: ; * This interrupt should never happen with our APIC/SMP architecture */ +static const char *apic_fault_reasons[] = If at all, then this should be

Re: [Xen-devel] [RFC v1 05/15] vmx: Initialize VT-d Posted-Interrupts Descriptor

2015-05-04 Thread Jan Beulich
On 04.05.15 at 07:32, feng...@intel.com wrote: From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] Sent: Friday, March 27, 2015 3:29 AM On Wed, Mar 25, 2015 at 08:31:47PM +0800, Feng Wu wrote: +v-arch.hvm_vmx.pi_desc.ndm = 0; +dest = cpu_physical_id(v-processor); + +

Re: [Xen-devel] [RFC][PATCH 07/13] xen/passthrough: extend hypercall to support rdm reservation policy

2015-05-04 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Thursday, April 23, 2015 10:00 PM On 23.04.15 at 14:32, tiejun.c...@intel.com wrote: On 2015/4/16 23:40, Tim Deegan wrote: At 17:21 +0800 on 10 Apr (1428686518), Tiejun Chen wrote: @@ -1851,7 +1857,14 @@ static int

Re: [Xen-devel] [RESEND Patch V3 00/15] xen: support pv-domains larger than 512GB

2015-05-04 Thread Juergen Gross
Oops, just detected that I missed to send this to lkml, too. Will resend. Juergen On 05/04/2015 08:18 AM, Juergen Gross wrote: Support 64 bit pv-domains with more than 512GB of memory. Tested with 64 bit dom0 on machines with 8GB and 1TB and 32 bit dom0 on a 8GB machine. Conflicts between

[Xen-devel] [RESEND Patch V3 07/15] xen: check memory area against e820 map

2015-05-04 Thread Juergen Gross
Provide a service routine to check a physical memory area against the E820 map. The routine will return false if the complete area is RAM according to the E820 map and true otherwise. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com ---

[Xen-devel] [RESEND Patch V3 03/15] xen: don't build mfn tree if tools don't need it

2015-05-04 Thread Juergen Gross
In case the Xen tools indicate they don't need the p2m 3 level tree as they support the virtual mapped linear p2m list, just omit building the tree. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com --- arch/x86/xen/p2m.c | 10 +++--- 1 file

[Xen-devel] [RESEND Patch V3 04/15] xen: eliminate scalability issues from initial mapping setup

2015-05-04 Thread Juergen Gross
Direct Xen to place the initial P-M table outside of the initial mapping, as otherwise the 1G (implementation) / 2G (theoretical) restriction on the size of the initial mapping limits the amount of memory a domain can be handed initially. As the initial P-M table is copied rather early during

[Xen-devel] [RESEND Patch V3 00/15] xen: support pv-domains larger than 512GB

2015-05-04 Thread Juergen Gross
Support 64 bit pv-domains with more than 512GB of memory. Tested with 64 bit dom0 on machines with 8GB and 1TB and 32 bit dom0 on a 8GB machine. Conflicts between E820 map and different hypervisor populated memory areas have been tested via a fake E820 map reserved area on the 8GB machine.

[Xen-devel] [RESEND Patch V3 13/15] xen: move p2m list if conflicting with e820 map

2015-05-04 Thread Juergen Gross
Check whether the hypervisor supplied p2m list is placed at a location which is conflicting with the target E820 map. If this is the case relocate it to a new area unused up to now and compliant to the E820 map. As the p2m list might by huge (up to several GB) and is required to be mapped

[Xen-devel] [RESEND Patch V3 06/15] xen: split counting of extra memory pages from remapping

2015-05-04 Thread Juergen Gross
Memory pages in the initial memory setup done by the Xen hypervisor conflicting with the target E820 map are remapped. In order to do this those pages are counted and remapped in xen_set_identity_and_remap(). Split the counting from the remapping operation to be able to setup the needed memory

[Xen-devel] [RESEND Patch V3 15/15] xen: remove no longer needed p2m.h

2015-05-04 Thread Juergen Gross
Cleanup by removing arch/x86/xen/p2m.h as it isn't needed any more. Most definitions in this file are used in p2m.c only. Move those into p2m.c. set_phys_range_identity() is already declared in arch/x86/include/asm/xen/page.h, add __init annotation there. MAX_REMAP_RANGES isn't used at all,

[Xen-devel] [RESEND Patch V3 09/15] xen: check for kernel memory conflicting with memory layout

2015-05-04 Thread Juergen Gross
Checks whether the pre-allocated memory of the loaded kernel is in conflict with the target memory map. If this is the case, just panic instead of run into problems later, as there is nothing we can do to repair this situation. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David

[Xen-devel] [RESEND Patch V3 08/15] xen: find unused contiguous memory area

2015-05-04 Thread Juergen Gross
For being able to relocate pre-allocated data areas like initrd or p2m list it is mandatory to find a contiguous memory area which is not yet in use and doesn't conflict with the memory map we want to be in effect. In case such an area is found reserve it at once as this will be required to be

[Xen-devel] [RESEND Patch V3 14/15] xen: allow more than 512 GB of RAM for 64 bit pv-domains

2015-05-04 Thread Juergen Gross
64 bit pv-domains under Xen are limited to 512 GB of RAM today. The main reason has been the 3 level p2m tree, which was replaced by the virtual mapped linear p2m list. Parallel to the p2m list which is being used by the kernel itself there is a 3 level mfn tree for usage by the Xen tools and

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Zhang, Yang Z
Jan Beulich wrote on 2015-05-04: On 04.05.15 at 11:14, andrew.coop...@citrix.com wrote: On 04/05/2015 09:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++ b/xen/drivers/passthrough/vtd/x86/vtd.c @@ -56,7 +56,9 @@

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Tian, Kevin
From: Chen, Tiejun Sent: Monday, May 04, 2015 7:26 PM On 2015/5/4 18:52, Tian, Kevin wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, May 04, 2015 6:44 PM On 04.05.15 at 12:39, tiejun.c...@intel.com wrote: On 2015/5/4 16:52, Jan Beulich wrote: On 04.05.15 at

Re: [Xen-devel] [V2] x86/cpuidle: get accurate C0 value with xenpm tool

2015-05-04 Thread Han, Huaitong
All accepted. -Original Message- From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, May 4, 2015 10:01 PM To: Han, Huaitong Cc: xen-devel@lists.xen.org Subject: Re: [V2] x86/cpuidle: get accurate C0 value with xenpm tool On 04.05.15 at 15:23, huaitong@intel.com wrote: On

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Chen, Tiejun
On 2015/5/4 18:43, Jan Beulich wrote: On 04.05.15 at 12:39, tiejun.c...@intel.com wrote: On 2015/5/4 16:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++ b/xen/drivers/passthrough/vtd/x86/vtd.c @@ -56,7 +56,9 @@ unsigned

Re: [Xen-devel] [PATCH v6 3/6] Qemu-Xen-vTPM: Xen frontend driver infrastructure

2015-05-04 Thread Xu, Quan
-Original Message- From: Stefan Berger [mailto:stef...@linux.vnet.ibm.com] Sent: Monday, May 04, 2015 11:36 PM To: Xu, Quan; stefano.stabell...@eu.citrix.com; ebl...@redhat.com Cc: qemu-de...@nongnu.org; wei.l...@citrix.com; dgde...@tycho.nsa.gov; xen-devel@lists.xen.org Subject:

Re: [Xen-devel] [RFC][PATCH] xen/apic: refactor error_interrupt

2015-05-04 Thread Chen, Tiejun
On 2015/5/4 16:25, Andrew Cooper wrote: On 04/05/2015 03:03, Tiejun Chen wrote: Just make this readable while debug. debugging Fixed. Signed-off-by: Tiejun Chen tiejun.c...@intel.com In principle, I fully agree with the change. (I had an item on my todo list to make a change like

[Xen-devel] [RESEND Patch V3 10/15] xen: check pre-allocated page tables for conflict with memory map

2015-05-04 Thread Juergen Gross
Check whether the page tables built by the domain builder are at memory addresses which are in conflict with the target memory map. If this is the case just panic instead of running into problems later. Signed-off-by: Juergen Gross jgr...@suse.com --- arch/x86/xen/mmu.c | 19

[Xen-devel] [RESEND Patch V3 05/15] xen: move static e820 map to global scope

2015-05-04 Thread Juergen Gross
Instead of using a function local static e820 map in xen_memory_setup() and calling various functions in the same source with the map as a parameter use a map directly accessible by all functions in the source. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel

[Xen-devel] [RESEND Patch V3 02/15] xen: save linear p2m list address in shared info structure

2015-05-04 Thread Juergen Gross
The virtual address of the linear p2m list should be stored in the shared info structure read by the Xen tools to be able to support 64 bit pv-domains larger than 512 GB. Additionally the linear p2m list interface includes a generation count which is changed prior to and after each mapping change

[Xen-devel] [RESEND Patch V3 01/15] xen: sync with xen headers

2015-05-04 Thread Juergen Gross
Use the newest headers from the xen tree to get some new structure layouts. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com --- arch/x86/include/asm/xen/interface.h | 96 include/xen/interface/xen.h | 10

[Xen-devel] [RESEND Patch V3 11/15] xen: check for initrd conflicting with e820 map

2015-05-04 Thread Juergen Gross
Check whether the initrd is placed at a location which is conflicting with the target E820 map. If this is the case relocate it to a new area unused up to now and compliant to the E820 map. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com ---

Re: [Xen-devel] [RFC v1 05/15] vmx: Initialize VT-d Posted-Interrupts Descriptor

2015-05-04 Thread Andrew Cooper
On 04/05/2015 06:32, Wu, Feng wrote: +v-arch.hvm_vmx.pi_desc.ndm = 0; +dest = cpu_physical_id(v-processor); + +if ( x2apic_enabled ) +v-arch.hvm_vmx.pi_desc.ndst = dest; +else +v-arch.hvm_vmx.pi_desc.ndst = (dest 8) 0xFF00; Surely there are some macros

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Jan Beulich
On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++ b/xen/drivers/passthrough/vtd/x86/vtd.c @@ -56,7 +56,9 @@ unsigned int get_cache_line_size(void) void cacheline_flush(char * addr) { +mb(); clflush(addr); +mb(); } I

Re: [Xen-devel] [PATCH 2/3] xen/vt-d: mask interrupt message generation

2015-05-04 Thread Jan Beulich
On 04.05.15 at 07:08, tiejun.c...@intel.com wrote: At first I doubted this is issued by some improper cache behaviors. Because as you see, root_entry[0] = 80f5001 indicates we already set that present bit. But Caching Mode bit is zero in BDW so this means remapping hardware doesn't own

Re: [Xen-devel] [PATCH 3/3] xen/iommu: disable IOMMU engine completely before enter S5

2015-05-04 Thread Jan Beulich
On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: S5 menas we also shut down IOMMU engine as well, so we should disable IOMMU engine completely before enter S5, otherwise we still probably receive some interrupts in this period. But currently VT-D path depends on force_iommu and

Re: [Xen-devel] [rumpuserxen test] 52955: regressions - FAIL

2015-05-04 Thread Antti Kantee
On 02/05/15 03:00, osstest service user wrote: flight 52955 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/52955/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 5 rumpuserxen-build

Re: [Xen-devel] [RFC v1 05/15] vmx: Initialize VT-d Posted-Interrupts Descriptor

2015-05-04 Thread Wu, Feng
-Original Message- From: Andrew Cooper [mailto:am...@hermes.cam.ac.uk] On Behalf Of Andrew Cooper Sent: Monday, May 04, 2015 4:36 PM To: Wu, Feng; Konrad Rzeszutek Wilk Cc: Tian, Kevin; xen-devel@lists.xen.org; jbeul...@suse.com; Zhang, Yang Z; k...@xen.org Subject: Re:

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Andrew Cooper
On 04/05/2015 09:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++ b/xen/drivers/passthrough/vtd/x86/vtd.c @@ -56,7 +56,9 @@ unsigned int get_cache_line_size(void) void cacheline_flush(char * addr) { +mb();

Re: [Xen-devel] Xen 4.6 Development Update (three months reminder)

2015-05-04 Thread Wei Liu
(Thanks for trimming the CC list before hand) On Mon, May 04, 2015 at 02:05:49PM +0800, Yu, Zhang wrote: Hi Wei, Hello. This is Zhang Yu from Intel graphic virtualization team. Previously in Xen hackathon, Paul and I mentioned that there're several patch series for XenGT that need to be

Re: [Xen-devel] Xen 4.6 Development Update (three months reminder)

2015-05-04 Thread Wei Liu
Hi Fabio Discussion on a particular bug should be in a separate thread. This thread is mainly for Xen 4.6 release. Wei. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v3] x86: allow 64-bit PV guest kernels to suppress user mode exposure of M2P

2015-05-04 Thread Jan Beulich
On 30.04.15 at 13:18, t...@xen.org wrote: At 15:31 +0100 on 24 Apr (1429889471), Jan Beulich wrote: --- a/xen/arch/x86/mm/shadow/multi.c +++ b/xen/arch/x86/mm/shadow/multi.c @@ -1435,6 +1435,14 @@ void sh_install_xen_entries_in_l4(struct

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Chen, Tiejun
On 2015/5/4 16:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++ b/xen/drivers/passthrough/vtd/x86/vtd.c @@ -56,7 +56,9 @@ unsigned int get_cache_line_size(void) void cacheline_flush(char * addr) { +mb();

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Jan Beulich
On 04.05.15 at 12:39, tiejun.c...@intel.com wrote: On 2015/5/4 16:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++ b/xen/drivers/passthrough/vtd/x86/vtd.c @@ -56,7 +56,9 @@ unsigned int get_cache_line_size(void)

[Xen-devel] [PATCH v4] x86: allow 64-bit PV guest kernels to suppress user mode exposure of M2P

2015-05-04 Thread Jan Beulich
Xen L4 entries being uniformly installed into any L4 table and 64-bit PV kernels running in ring 3 means that user mode was able to see the read-only M2P presented by Xen to the guests. While apparently not really representing an exploitable information leak, this still very certainly was never

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Tian, Kevin
From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, May 04, 2015 6:44 PM On 04.05.15 at 12:39, tiejun.c...@intel.com wrote: On 2015/5/4 16:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++

Re: [Xen-devel] [PATCH v4] x86: allow 64-bit PV guest kernels to suppress user mode exposure of M2P

2015-05-04 Thread Andrew Cooper
On 04/05/2015 11:54, Jan Beulich wrote: Xen L4 entries being uniformly installed into any L4 table and 64-bit PV kernels running in ring 3 means that user mode was able to see the read-only M2P presented by Xen to the guests. While apparently not really representing an exploitable information

Re: [Xen-devel] [RFC][PATCH] xen/apic: refactor error_interrupt

2015-05-04 Thread Chen, Tiejun
On 2015/5/4 16:07, Jan Beulich wrote: On 04.05.15 at 04:03, tiejun.c...@intel.com wrote: --- a/xen/arch/x86/apic.c +++ b/xen/arch/x86/apic.c @@ -1319,28 +1319,37 @@ out: ; * This interrupt should never happen with our APIC/SMP architecture */ +static const char *apic_fault_reasons[] =

Re: [Xen-devel] [PATCH v2 1/2] Introduce configure option --with-system-qemu-traditional

2015-05-04 Thread Wei Liu
On Thu, Apr 16, 2015 at 12:24:58PM +0100, Stefano Stabellini wrote: Introduce a configure option to disable the in-tree qemu-traditional build and use an externally provided qemu-dm binary. The option is very similar to the existing --with-system-qemu-xen. ^

Re: [Xen-devel] [PATCH v2 2/2] Update configure scripts by calling autogen

2015-05-04 Thread Wei Liu
On Thu, Apr 16, 2015 at 12:24:59PM +0100, Stefano Stabellini wrote: I run ./autogen.sh and committed the result. This patch needs to be squashed into previous to keep the tree bisectable. Wei. ___ Xen-devel mailing list Xen-devel@lists.xen.org

Re: [Xen-devel] [PATCH 2/3] xen/vt-d: mask interrupt message generation

2015-05-04 Thread Chen, Tiejun
On 2015/5/4 16:57, Jan Beulich wrote: On 04.05.15 at 07:08, tiejun.c...@intel.com wrote: At first I doubted this is issued by some improper cache behaviors. Because as you see, root_entry[0] = 80f5001 indicates we already set that present bit. But Caching Mode bit is zero in BDW so this means

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Chen, Tiejun
On 2015/5/4 18:52, Tian, Kevin wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Monday, May 04, 2015 6:44 PM On 04.05.15 at 12:39, tiejun.c...@intel.com wrote: On 2015/5/4 16:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: ---

Re: [Xen-devel] [PATCH] xen/arm: Make local_events_need_delivery working with idle VPCU

2015-05-04 Thread Julien Grall
Hi, On 04/05/2015 12:44, Riku Voipio wrote: On 27 April 2015 at 19:32, Julien Grall julien.gr...@citrix.com wrote: Hi Stefano, On 27/04/15 16:36, Stefano Stabellini wrote: On Mon, 27 Apr 2015, Julien Grall wrote: The commit 569fb6c xen/arm: Data abort exception (R/W) mem_access events makes

[Xen-devel] [PATCH v6 6/6] Qemu-Xen-vTPM: QEMU machine class is initialized before tpm_init()

2015-05-04 Thread Quan Xu
make sure QEMU machine class is initialized and QEMU has registered Xen stubdom vTPM driver when call tpm_init() Signed-off-by: Quan Xu quan...@intel.com Reviewed-by: Stefan Berger stef...@linux.vnet.ibm.com --- vl.c | 17 +++-- 1 file changed, 11 insertions(+), 6 deletions(-) diff

[Xen-devel] [PATCH v6 3/6] Qemu-Xen-vTPM: Xen frontend driver infrastructure

2015-05-04 Thread Quan Xu
This patch adds infrastructure for xen front drivers living in qemu, so drivers don't need to implement common stuff on their own. It's mostly xenbus management stuff: some functions to access XenStore, setting up XenStore watches, callbacks on device discovery and state changes, and handle event

[Xen-devel] [PATCH v6 0/6] QEMU:Xen stubdom vTPM for HVM virtual machine(QEMU Part)

2015-05-04 Thread Quan Xu
*INTRODUCTION* The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM functionality to virtual machines (Fedora, Ubuntu, Redhat, Windows .etc). This allows programs to interact with a TPM in a virtual machine the same way they interact with a TPM on the physical system. Each

[Xen-devel] [PATCH v6 4/6] Qemu-Xen-vTPM: Move tpm_passthrough_is_selftest() into tpm_util.c

2015-05-04 Thread Quan Xu
and rename it to tpm_util_is_selftest(). Signed-off-by: Quan Xu quan...@intel.com --Changes in v6: -Remove the redundant copy right. -Reduce the includes to its minimum. --- hw/tpm/Makefile.objs | 2 +- hw/tpm/tpm_passthrough.c | 13 + hw/tpm/tpm_util.c

[Xen-devel] [PATCH v6 5/6] Qemu-Xen-vTPM: Qemu vTPM xenstubdoms backen.

2015-05-04 Thread Quan Xu
This Patch provides the glue for the TPM_TIS(Qemu frontend) to Xen stubdom vTPM domain that provides the actual TPM functionality. It sends data and TPM commends with xen_vtpm_frontend. It is similar as another two vTPM backens: *vTPM passthrough backen Since QEMU 1.5. *vTPM libtpms-based

[Xen-devel] [PATCH v6 2/6] Qemu-Xen-vTPM: Xen frontend driver infrastructure

2015-05-04 Thread Quan Xu
This patch adds infrastructure for xen front drivers living in qemu, so drivers don't need to implement common stuff on their own. It's mostly xenbus management stuff: some functions to access XenStore, setting up XenStore watches, callbacks on device discovery and state changes, and handle event

Re: [Xen-devel] Xen 4.6 Development Update (three months reminder)

2015-05-04 Thread Yu, Zhang
Hi Wei, Thanks for your reply. On 5/4/2015 5:44 PM, Wei Liu wrote: (Thanks for trimming the CC list before hand) On Mon, May 04, 2015 at 02:05:49PM +0800, Yu, Zhang wrote: Hi Wei, Hello. This is Zhang Yu from Intel graphic virtualization team. Previously in Xen hackathon, Paul and I

Re: [Xen-devel] [RFC PATCH v2 13/22] xen/arm: its: Add virtual ITS command support

2015-05-04 Thread Vijay Kilari
On Thu, Apr 30, 2015 at 7:59 PM, Julien Grall julien.gr...@citrix.com wrote: Hi, On 30/04/15 14:47, Stefano Stabellini wrote: If the devid is not within this range, the ITS won't recognize the value and won't be able to send the interrupt. So this is clearly not the right value. Sure,

Re: [Xen-devel] [RFC PATCH v2 13/22] xen/arm: its: Add virtual ITS command support

2015-05-04 Thread Julien Grall
On 04/05/2015 13:58, Vijay Kilari wrote: On Thu, Apr 30, 2015 at 7:59 PM, Julien Grall julien.gr...@citrix.com wrote: Hi, On 30/04/15 14:47, Stefano Stabellini wrote: If the devid is not within this range, the ITS won't recognize the value and won't be able to send the interrupt. So this

Re: [Xen-devel] [PATCH] config: generate Paths-$SUBSYSTEM.mk

2015-05-04 Thread Wei Liu
I have forgotten to update gitingore. I will update that in my next version. Wei. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [RFC PATCH v2 13/22] xen/arm: its: Add virtual ITS command support

2015-05-04 Thread Vijay Kilari
On Mon, May 4, 2015 at 6:34 PM, Julien Grall julien.gr...@citrix.com wrote: On 04/05/2015 13:58, Vijay Kilari wrote: On Thu, Apr 30, 2015 at 7:59 PM, Julien Grall julien.gr...@citrix.com wrote: Hi, On 30/04/15 14:47, Stefano Stabellini wrote: If the devid is not within this range, the

Re: [Xen-devel] [RFC PATCH v2 13/22] xen/arm: its: Add virtual ITS command support

2015-05-04 Thread Julien Grall
Hi Vijay, On 04/05/2015 14:27, Vijay Kilari wrote: On Mon, May 4, 2015 at 6:34 PM, Julien Grall julien.gr...@citrix.com wrote: On 04/05/2015 13:58, Vijay Kilari wrote: On Thu, Apr 30, 2015 at 7:59 PM, Julien Grall julien.gr...@citrix.com wrote: Hi, On 30/04/15 14:47, Stefano Stabellini

Re: [Xen-devel] [RFC PATCH v2 13/22] xen/arm: its: Add virtual ITS command support

2015-05-04 Thread Julien Grall
On 04/05/2015 14:44, Julien Grall wrote: Hi Vijay, On 04/05/2015 14:27, Vijay Kilari wrote: On Mon, May 4, 2015 at 6:34 PM, Julien Grall julien.gr...@citrix.com wrote: On 04/05/2015 13:58, Vijay Kilari wrote: On Thu, Apr 30, 2015 at 7:59 PM, Julien Grall julien.gr...@citrix.com wrote:

Re: [Xen-devel] [V2] x86/cpuidle: get accurate C0 value with xenpm tool

2015-05-04 Thread Jan Beulich
On 04.05.15 at 15:23, huaitong@intel.com wrote: On Mon, 2015-05-04 at 09:33 +0100, Jan Beulich wrote: On 04.05.15 at 08:27, huaitong@intel.com wrote: --- a/xen/arch/x86/acpi/cpu_idle.c +++ b/xen/arch/x86/acpi/cpu_idle.c @@ -254,9 +254,10 @@ static char* acpi_cstate_method_name[]

Re: [Xen-devel] [PATCH v16 13/14] pvqspinlock: Improve slowpath performance by avoiding cmpxchg

2015-05-04 Thread Peter Zijlstra
On Thu, Apr 30, 2015 at 02:49:26PM -0400, Waiman Long wrote: On 04/29/2015 02:11 PM, Peter Zijlstra wrote: On Fri, Apr 24, 2015 at 02:56:42PM -0400, Waiman Long wrote: In the pv_scan_next() function, the slow cmpxchg atomic operation is performed even if the other CPU is not even close to

Re: [Xen-devel] [PATCH v4] x86: allow 64-bit PV guest kernels to suppress user mode exposure of M2P

2015-05-04 Thread Tim Deegan
At 11:54 +0100 on 04 May (1430740452), Jan Beulich wrote: Xen L4 entries being uniformly installed into any L4 table and 64-bit PV kernels running in ring 3 means that user mode was able to see the read-only M2P presented by Xen to the guests. While apparently not really representing an

Re: [Xen-devel] Ping: [PATCH] domctl: don't truncate XEN_DOMCTL_max_mem requests

2015-05-04 Thread Tim Deegan
At 08:49 +0100 on 04 May (1430729386), Jan Beulich wrote: While I got a review from Andrew, I'm still waiting for an ack (or nak). Acked-by: Tim Deegan t...@xen.org I expect Coverity will complain on architectures where this isn't necessary, but acked nonetheless. Tim.

Re: [Xen-devel] [PATCH v16 08/14] pvqspinlock: Implement simple paravirt support for the qspinlock

2015-05-04 Thread Peter Zijlstra
I changed it to the below; I've not gotten around to compiling or even running it yet :-( The biggest change is the pv_hash/pv_unhash functions, which I've rewritten to hopefully be clearer (and also hopefully not wrecked them). I took out the cacheline sized structure which takes out that

[Xen-devel] [PATCH v2] hypervisor/x86/xen: Unset X86_BUG_SYSRET_SS_ATTRS on Xen PV guests

2015-05-04 Thread Boris Ostrovsky
Commit 61f01dd941ba (x86_64, asm: Work around AMD SYSRET SS descriptor attribute issue) makes AMD processors set SS to __KERNEL_DS in __switch_to() to deal with cases when SS is NULL. This breaks Xen PV guests who do not want to load SS with__KERNEL_DS. Since the problem that the commit is

Re: [Xen-devel] [RFC PATCH v2 13/22] xen/arm: its: Add virtual ITS command support

2015-05-04 Thread Vijay Kilari
On Mon, May 4, 2015 at 7:24 PM, Julien Grall julien.gr...@citrix.com wrote: On 04/05/2015 14:44, Julien Grall wrote: Hi Vijay, On 04/05/2015 14:27, Vijay Kilari wrote: On Mon, May 4, 2015 at 6:34 PM, Julien Grall julien.gr...@citrix.com wrote: On 04/05/2015 13:58, Vijay Kilari wrote:

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Konrad Rzeszutek Wilk
On Mon, May 04, 2015 at 06:39:56PM +0800, Chen, Tiejun wrote: On 2015/5/4 16:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++ b/xen/drivers/passthrough/vtd/x86/vtd.c @@ -56,7 +56,9 @@ unsigned int

Re: [Xen-devel] [PATCH v6 5/6] Qemu-Xen-vTPM: Qemu vTPM xenstubdoms backen.

2015-05-04 Thread Stefan Berger
On 05/04/2015 03:23 AM, Quan Xu wrote: This Patch provides the glue for the TPM_TIS(Qemu frontend) to Xen stubdom vTPM domain that provides the actual TPM functionality. It sends data and TPM commends with xen_vtpm_frontend. It is similar as another two vTPM backens: *vTPM passthrough backen

Re: [Xen-devel] [PATCH 1/3] xen/vt-d: need barriers to workaround CLFLUSH

2015-05-04 Thread Andrew Cooper
On 04/05/2015 16:22, Konrad Rzeszutek Wilk wrote: On Mon, May 04, 2015 at 06:39:56PM +0800, Chen, Tiejun wrote: On 2015/5/4 16:52, Jan Beulich wrote: On 04.05.15 at 04:16, tiejun.c...@intel.com wrote: --- a/xen/drivers/passthrough/vtd/x86/vtd.c +++ b/xen/drivers/passthrough/vtd/x86/vtd.c @@

Re: [Xen-devel] [PATCH v6 4/6] Qemu-Xen-vTPM: Move tpm_passthrough_is_selftest() into tpm_util.c

2015-05-04 Thread Stefan Berger
On 05/04/2015 03:22 AM, Quan Xu wrote: and rename it to tpm_util_is_selftest(). Signed-off-by: Quan Xu quan...@intel.com Reviewed-by: Stefan Berger stef...@linux.vnet.ibm.com Thanks, Stefan --Changes in v6: -Remove the redundant copy right. -Reduce the includes to its minimum. ---

Re: [Xen-devel] [PATCH v6 3/6] Qemu-Xen-vTPM: Xen frontend driver infrastructure

2015-05-04 Thread Stefan Berger
On 05/04/2015 03:22 AM, Quan Xu wrote: This patch adds infrastructure for xen front drivers living in qemu, so drivers don't need to implement common stuff on their own. It's mostly xenbus management stuff: some functions to access XenStore, setting up XenStore watches, callbacks on device

Re: [Xen-devel] [RFC PATCH v2 13/22] xen/arm: its: Add virtual ITS command support

2015-05-04 Thread Julien Grall
Hi Vijay, On 04/05/2015 16:19, Vijay Kilari wrote: How did you implement the interrupt mode? Could it be improve? 1) In physical ITS driver its_device is created with devID 00:00.1 with 256 MSI-x are reserved and is named as completion_dev, which is global. That's a lot of MSI-x

Re: [Xen-devel] [PATCH v16 08/14] pvqspinlock: Implement simple paravirt support for the qspinlock

2015-05-04 Thread Waiman Long
On 05/04/2015 10:20 AM, Peter Zijlstra wrote: I changed it to the below; I've not gotten around to compiling or even running it yet :-( The biggest change is the pv_hash/pv_unhash functions, which I've rewritten to hopefully be clearer (and also hopefully not wrecked them). I took out the

Re: [Xen-devel] [PATCH v16 13/14] pvqspinlock: Improve slowpath performance by avoiding cmpxchg

2015-05-04 Thread Waiman Long
On 05/04/2015 10:05 AM, Peter Zijlstra wrote: On Thu, Apr 30, 2015 at 02:49:26PM -0400, Waiman Long wrote: On 04/29/2015 02:11 PM, Peter Zijlstra wrote: On Fri, Apr 24, 2015 at 02:56:42PM -0400, Waiman Long wrote: In the pv_scan_next() function, the slow cmpxchg atomic operation is performed

Re: [Xen-devel] Xen-unstable + linux 4.1-mergewindow: problems with PV guest pci passthrough: pcifront pci-0: pciback not responding!!!

2015-05-04 Thread Sander Eikelenboom
Hello Sander, Monday, April 27, 2015, 5:48:00 PM, you wrote: Hi David / Konrad, Here the other problem i found, which is introduced somewhere in the 4.1 mergewindow: on 4.1.0-rc1 (with the one revert to get things booting) i get this in the PV Guest console: [0.517392]

  1   2   >