[Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Jan Beulich
Rather than assuming only PV guests need special treatment (and dealing with that directly when an IRQ gets set up), keep all guest MSI IRQs masked until either the (HVM) guest unmasks them via vMSI or the (PV, PVHVM, or PVH) guest sets up an event channel for it. To not further clutter the

Re: [Xen-devel] [PATCH v2] net/bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6

2015-07-08 Thread Pablo Neira Ayuso
On Tue, Jul 07, 2015 at 11:34:34AM -0700, Stephen Hemminger wrote: On Tue, 7 Jul 2015 15:55:21 +0100 Julien Grall julien.gr...@citrix.com wrote: The commit efb6de9b4ba0092b2c55f6a52d16294a8a698edd netfilter: bridge: forward IPv6 fragmented packets introduced a new function

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Andrew Cooper
On 08/07/2015 09:56, Jan Beulich wrote: Rather than assuming only PV guests need special treatment (and dealing with that directly when an IRQ gets set up), keep all guest MSI IRQs masked until either the (HVM) guest unmasks them via vMSI or the (PV, PVHVM, or PVH) guest sets up an event

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Jan Beulich
On 08.07.15 at 12:36, feng...@intel.com wrote: From: Andrew Cooper [mailto:andrew.coop...@citrix.com] Sent: Tuesday, June 30, 2015 1:07 AM On 24/06/15 06:18, Feng Wu wrote: @@ -148,11 +161,19 @@ static int vmx_vcpu_initialise(struct vcpu *v) if ( v-vcpu_id == 0 )

Re: [Xen-devel] [RFC PATCH v3 11/18] xen/arm: ITS: Add GITS registers emulation

2015-07-08 Thread Ian Campbell
On Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com Emulate GITS* registers and handle LPI configuration table update trap. These need to only be exposed to a guest which has been configured with an ITS. For dom0 that means at

Re: [Xen-devel] [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM The basic idea here is: 1. When vCPU's state is RUNSTATE_running, - set 'NV' to 'Notification Vector'. - Clear 'SN' to accpet PI. - set 'NDST' to the right pCPU. 2. When vCPU's state is RUNSTATE_blocked,

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, July 08, 2015 6:11 PM From: Tian, Kevin Sent: Wednesday, July 08, 2015 5:06 PM From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM Currently, we don't support urgent interrupt, all interrupts are recognized as non-urgent interrupt, so we

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Wu, Feng
-Original Message- From: Tian, Kevin Sent: Wednesday, July 08, 2015 7:46 PM To: Wu, Feng; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z; george.dun...@eu.citrix.com Subject: RE: [v3 11/15] Update IRTE according to guest

Re: [Xen-devel] [libvirt] [PATCH] libxl: support dom0

2015-07-08 Thread Michal Privoznik
On 07.07.2015 01:27, Jim Fehlig wrote: On 07/06/2015 03:46 PM, Jim Fehlig wrote: In Xen, dom0 is really just another domain that supports ballooning, adding/removing devices, changing vcpu configuration, etc. This patch adds support to the libxl driver for managing dom0. Note that the legacy

[Xen-devel] [PATCH OSSTEST v8 06/14] Test pygrub and pvgrub on the regular flights

2015-07-08 Thread Ian Campbell
Since we now have the ability to test these drop one of each of pygrub, pvgrub-32 and pvgrub-64 into the standard flights. Omitting the {Guest}_diver runvar causes ts-debian-di-install to use the d-i images in the location configured via TftpDiVersion, so they are Version Controlled along with the

[Xen-devel] [PATCH OSSTEST v8 01/14] mfi-common: Allow make-*flight to filter the set of build jobs to include

2015-07-08 Thread Ian Campbell
By using the same job_create_build(_filter_callback) scheme used for the test jobs. Will be used in make-distros-flight. Signed-off-by: Ian Campbell ian.campb...@citrix.com Acked-by: Ian Jackson ian.jack...@eu.citrix.com --- v8: Moved to head of queue, make-distros-flight isn't introduced yet

[Xen-devel] [PATCH OSSTEST v8 02/14] TestSupport: Add helper to fetch a URL on a host

2015-07-08 Thread Ian Campbell
Signed-off-by: Ian Campbell ian.campb...@citrix.com --- v8: Use \Q...\E to safely quote $url and $path v7: Quote $url and $path, switch to a heredoc to avoid resulting over long line v5: Support http_proxy via $c{HttpProxy} v3: Make sure wget is installed --- Osstest/Debian.pm | 2 +-

[Xen-devel] [PATCH OSSTEST v8 00/14] add distro domU testing flight

2015-07-08 Thread Ian Campbell
Hi, Since v7 I've done the switch from lvm to none as discussed, fixed (I hope!) the quoting in the fetchurl helper and added the runvar docs to the ts-debian-di-install script. I also pushed the build job filtering to the head (which resulted in some other patches being folded in to the

[Xen-devel] [PATCH OSSTEST v8 08/14] crontab-cambridge: Use hard tabs for alignment.

2015-07-08 Thread Ian Campbell
Also quote the value of BRANCHES=. Signed-off-by: Ian Campbell ian.campb...@citrix.com --- v8: Slit out from distros: Run one suite per day on a weekly basis --- crontab-cambridge | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/crontab-cambridge b/crontab-cambridge

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread David Vrabel
On 08/07/15 11:58, Jan Beulich wrote: On 08.07.15 at 11:39, david.vra...@citrix.com wrote: On 08/07/15 09:56, Jan Beulich wrote: Rather than assuming only PV guests need special treatment (and dealing with that directly when an IRQ gets set up), keep all guest MSI IRQs masked until either the

Re: [Xen-devel] [v3 15/15] Add a command line parameter for VT-d posted-interrupts

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM Enable VT-d Posted-Interrupts and add a command line parameter for it. Signed-off-by: Feng Wu feng...@intel.com --- v3: Remove the redundant no intremp then no intpost logic docs/misc/xen-command-line.markdown | 9 -

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, July 08, 2015 6:32 PM -Original Message- From: Tian, Kevin Sent: Wednesday, July 08, 2015 6:23 PM To: Wu, Feng; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z;

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, July 08, 2015 7:52 PM + * - For lowest-priority interrupts, we find the destination vCPU from the + * guest vector using vector-hashing mechanism and return true. This follows + * the hardware behavior, since modern Intel CPUs

Re: [Xen-devel] [PATCH v25 06/15] x86/VPMU: Initialize PMU for PV(H) guests

2015-07-08 Thread Dietmar Hahn
Am Freitag 19 Juni 2015, 14:44:37 schrieb Boris Ostrovsky: Code for initializing/tearing down PMU for PV guests Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov Acked-by: Jan Beulich jbeul...@suse.com Acked-by: Kevin Tian

Re: [Xen-devel] [PATCH V4 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-07-08 Thread Lengyel, Tamas
On Wed, Jul 8, 2015 at 6:22 AM, Razvan Cojocaru rcojoc...@bitdefender.com wrote: Deny register writes if a vm_client subscribed to mov_to_msr or control register write events forbids them. Currently supported for MSR, CR0, CR3 and CR4 events. Signed-off-by: Razvan Cojocaru

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM This patch includes the following aspects: - Add a global vector to wake up the blocked vCPU when an interrupt is being posted to it (This part was sugguested by Yang Zhang yang.z.zh...@intel.com). - Adds a new per-vCPU tasklet to

Re: [Xen-devel] [PATCH v5 2/3] arm: Allow the user to specify the GIC version

2015-07-08 Thread Ian Campbell
On Wed, 2015-07-08 at 11:17 +0100, Ian Campbell wrote: On Tue, 2015-07-07 at 17:22 +0100, Julien Grall wrote: diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl index e1632fa..11f6461 100644 --- a/tools/libxl/libxl_types.idl +++ b/tools/libxl/libxl_types.idl @@

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, July 08, 2015 7:05 PM -Original Message- From: Wu, Feng Sent: Wednesday, July 08, 2015 6:32 PM To: Tian, Kevin; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z;

Re: [Xen-devel] [PATCH V4 1/3] xen/mem_access: Support for memory-content hiding

2015-07-08 Thread Lengyel, Tamas
On Wed, Jul 8, 2015 at 6:22 AM, Razvan Cojocaru rcojoc...@bitdefender.com wrote: This patch adds support for memory-content hiding, by modifying the value returned by emulated instructions that read certain memory addresses that contain sensitive data. The patch only applies to cases where

[Xen-devel] [PATCH OSSTEST v8 12/14] make-flight: refactor PV debian tests

2015-07-08 Thread Ian Campbell
No functional change, standalone-generate-dump-flight-runvars confirms no change to the runvars. Includes a hook which is not used yet, $recipe_sfx. Signed-off-by: Ian Campbell ian.campb...@citrix.com Acked-by: Ian Jackson ian.jack...@eu.citrix.com --- v4: new patch --- make-flight | 24

[Xen-devel] [PATCH OSSTEST v8 13/14] Add testing of file backed disk formats

2015-07-08 Thread Ian Campbell
xen-create-image makes this tricky to do since it is rather LVM centric. Now that we have the ability to install from d-i it's possible to arrange fairly easily that they use something other than a phy backend over a bare LVM device. Here we add support to the test script and infra and create a

[Xen-devel] [PATCH OSSTEST v8 14/14] make-distros-flight: Use ftp.debian.org directly

2015-07-08 Thread Ian Campbell
The local proxy seems to serve stale packages for Jessie etc, I blame the intercepting cache on the way out of our network, similar to b5f15136900d mg-debian-installer-update: workaround caching proxies, except it is between the apt-cache and the world not the osstest vm and the world. Since the

[Xen-devel] [PATCH OSSTEST v8 05/14] distros: Support pvgrub for Wheezy too.

2015-07-08 Thread Ian Campbell
This requires us to install pv-grub-menu from backports, which we do using a late_command. Signed-off-by: Ian Campbell ian.campb...@citrix.com --- v8: - Use a heredoc for sources.list additions, since this was suggested by Ian I would have retained the ack apart from the second change. -

[Xen-devel] [PATCH OSSTEST v8 09/14] distros: Run one suite per day on a weekly basis

2015-07-08 Thread Ian Campbell
Once a week should be sufficient for these tests. Perhaps in the future we will want to increase the frequency for the suites under active development (testing, unstable) For now run this on the Citrix Cambridge instance until the XenProject instance has sufficient capacity. Signed-off-by: Ian

[Xen-devel] [PATCH OSSTEST v8 04/14] distros: support booting Debian PV (d-i installed) guests with pvgrub.

2015-07-08 Thread Ian Campbell
This requires the use of the pv-grub-menu package which is in Jessie onwards. (it is in wheezy-backports which is the subject of a subsequent patch). The bootloader to use is specified via a runvar {Guest}_bootloader. Adjust make-distros-flight to use pvgrub for some subset of i386 and amd64

[Xen-devel] [PATCH OSSTEST v8 11/14] ts-debian-di-install: Refactor root_disk specification

2015-07-08 Thread Ian Campbell
Signed-off-by: Ian Campbell ian.campb...@citrix.com Acked-by: Ian Jackson ian.jack...@eu.citrix.com --- v4: new patch --- ts-debian-di-install | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/ts-debian-di-install b/ts-debian-di-install index 373fad1..6fafd6d 100755 ---

[Xen-devel] [PATCH OSSTEST v8 07/14] distros: add branch infrastructure

2015-07-08 Thread Ian Campbell
Since the distro nightlies are not version controlled we cannot use the usual mechanisms for detecting regressions. Special case things appropriately. We use an OLD_REVISION of flight-NNN to signify that the old revision is another flight and not a tree revision. A grep over $NEW_REVISION needed

[Xen-devel] [PATCH OSSTEST v8 03/14] distros: add support for installing Debian PV guests via d-i, flight and jobs

2015-07-08 Thread Ian Campbell
This patch introduces ts-debian-di-install which can install Debian from a netboot (PXE) debian installer image. By default it installs from the d-i image used by osstest (using the special Xen PV guest enabled flavour where necessary) but it can also fetch the kernel and ramdisk from URLs

[Xen-devel] [PATCH OSSTEST v8 10/14] Debian: Handle lack of bootloader support in d-i on ARM.

2015-07-08 Thread Ian Campbell
Debian doesn't currently know what bootloader to install in a Xen guest on ARM. We install pv-grub-menu above which actually does what we need, but the installer doesn't treat that as a bootloader. Most ARM platforms end up installing a u-boot boot.scr, based on a platform whitelist. This doesn't

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Jan Beulich
On 08.07.15 at 11:39, david.vra...@citrix.com wrote: On 08/07/15 09:56, Jan Beulich wrote: Rather than assuming only PV guests need special treatment (and dealing with that directly when an IRQ gets set up), keep all guest MSI IRQs masked until either the (HVM) guest unmasks them via vMSI or

Re: [Xen-devel] [v3 13/15] vmx: Properly handle notification event when vCPU is running

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM When a vCPU is running in Root mode and a notification event has been injected to it. we need to set VCPU_KICK_SOFTIRQ for the current cpu, so the pending interrupt in PIRR will be synced to vIRR before VM-Exit in time.

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Wu, Feng
-Original Message- From: Tian, Kevin Sent: Wednesday, July 08, 2015 7:00 PM To: Wu, Feng; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z; george.dun...@eu.citrix.com Subject: RE: [v3 12/15] vmx: posted-interrupt handling when

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Julien Grall
On 08/07/2015 11:55, Jan Beulich wrote: On 08.07.15 at 11:07, julien.gr...@citrix.com wrote: On 08/07/2015 09:56, Jan Beulich wrote: --- a/xen/include/asm-arm/irq.h +++ b/xen/include/asm-arm/irq.h @@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d, void arch_move_irqs(struct vcpu

Re: [Xen-devel] x86, arm: remove asm/spinlock.h from all architectures removed x86's _raw_read_unlock()

2015-07-08 Thread David Vrabel
On 08/07/15 11:45, Jan Beulich wrote: David, I'm afraid we'll need another fixup here, even if things build fine despite the removal. Ah, we get a generic implementation instead. Thanks for pointing this out. I'll fix it. David ___ Xen-devel

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Jan Beulich
On 08.07.15 at 11:07, julien.gr...@citrix.com wrote: On 08/07/2015 09:56, Jan Beulich wrote: --- a/xen/include/asm-arm/irq.h +++ b/xen/include/asm-arm/irq.h @@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d, void arch_move_irqs(struct vcpu *v); +#define arch_evtchn_bind_pirq(d,

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Wu, Feng
-Original Message- From: Wu, Feng Sent: Wednesday, July 08, 2015 6:32 PM To: Tian, Kevin; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z; george.dun...@eu.citrix.com; Wu, Feng Subject: RE: [v3 11/15] Update IRTE according to

Re: [Xen-devel] [PATCH] xen: Use module_pci_driver() in platform pci driver.

2015-07-08 Thread David Vrabel
On 08/07/15 06:54, Rajat Jain wrote: Eliminate the module_init function by using module_pci_driver() This is not equivalent since this adds a useless module_exit() function. David ___ Xen-devel mailing list Xen-devel@lists.xen.org

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Jan Beulich
On 08.07.15 at 13:14, david.vra...@citrix.com wrote: On 08/07/15 11:58, Jan Beulich wrote: On 08.07.15 at 11:39, david.vra...@citrix.com wrote: On 08/07/15 09:56, Jan Beulich wrote: + /* Set IRQ type for an SPI */ int irq_set_spi_type(unsigned int spi, unsigned int type); ---

Re: [Xen-devel] [PATCH V4 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-07-08 Thread Lengyel, Tamas
Are the license headers required? I just tried to make the change as small as possible, and looking at the other headers (for example in xen/include/asm-arm), at least half of them have no license header. I'm guessing this is something we'd now like to start correcting in new patches?

Re: [Xen-devel] [PATCH v25 05/15] x86/VPMU: Initialize VPMUs with __initcall

2015-07-08 Thread Dietmar Hahn
Am Freitag 19 Juni 2015, 14:44:36 schrieb Boris Ostrovsky: Move some VPMU initilization operations into __initcalls to avoid performing same tests and calculations for each vcpu. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Jan Beulich jbeul...@suse.com For the

Re: [Xen-devel] [v6][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-08 Thread Ian Jackson
Tiejun Chen writes ([v6][PATCH 10/16] tools: introduce some new parameters to set rdm policy): This patch introduces user configurable parameters to specify RDM resource and according policies, Thanks. I appreciate that I have come to this review late. While I have found the review

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-07-08 Thread Wu, Feng
-Original Message- From: Tian, Kevin Sent: Wednesday, July 08, 2015 7:31 PM To: Wu, Feng; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z; george.dun...@eu.citrix.com Subject: RE: [v3 08/15] Suppress posting interrupts when

Re: [Xen-devel] [PATCH] x86: correct socket_cpumask allocation for AP

2015-07-08 Thread Jan Beulich
On 08.07.15 at 11:36, chao.p.p...@linux.intel.com wrote: @@ -84,11 +85,21 @@ void *stack_base[NR_CPUS]; static void smp_store_cpu_info(int id) { struct cpuinfo_x86 *c = cpu_data + id; +unsigned int socket; *c = boot_cpu_data; if ( id != 0 ) +{

Re: [Xen-devel] [PATCH v10 01/13] x86: add socket_cpumask

2015-07-08 Thread Jan Beulich
On 08.07.15 at 04:43, chao.p.p...@linux.intel.com wrote: On Tue, Jul 07, 2015 at 06:32:55PM -0400, Boris Ostrovsky wrote: @@ -245,6 +248,8 @@ static void set_cpu_sibling_map(int cpu) cpumask_set_cpu(cpu, cpu_sibling_setup_map); +cpumask_set_cpu(cpu,

Re: [Xen-devel] traps.c:3227: GPF (0000): ffff82d080194a4d - ffff82d080239d85 and other dom0 induced log messages

2015-07-08 Thread Jan Beulich
On 08.07.15 at 10:45, li...@eikelenboom.it wrote: Here we go: (XEN) [2015-07-08 08:31:00.384] traps.c:3227: GPF (): 82d080195583 - 82d080239d85 (XEN) [2015-07-08 08:31:00.384] traps.c:3227: GPF (): 82d080195583 - 82d080239d85 which leads to: # addr2line -e

[Xen-devel] [PATCH] x86: correct socket_cpumask allocation for AP

2015-07-08 Thread Chao Peng
For AP, phys_proc_id is still not valid in CPU_PREPARE notifier (cpu_smpboot_alloc), so cpu_to_socket(cpu) is not valid as well. Introduce a pre-allocated secondary_cpu_mask so that later in smp_store_cpu_info() socket_cpumask[socket] can consume it. Signed-off-by: Chao Peng

[Xen-devel] [PATCH V4 0/3] Vm_event memory introspection helpers

2015-07-08 Thread Razvan Cojocaru
Version 4 of the series addresses V3 reviews, and consists of: [PATCH 1/3] xen/mem_access: Support for memory-content hiding [PATCH 2/3] xen/vm_event: Support for guest-requested events [PATCH 3/3] xen/vm_event: Deny register writes if refused by vm_event reply All the patches in this version

[Xen-devel] [PATCH V4 3/3] xen/vm_event: Deny register writes if refused by vm_event reply

2015-07-08 Thread Razvan Cojocaru
Deny register writes if a vm_client subscribed to mov_to_msr or control register write events forbids them. Currently supported for MSR, CR0, CR3 and CR4 events. Signed-off-by: Razvan Cojocaru rcojoc...@bitdefender.com Acked-by: George Dunlap george.dun...@eu.citrix.com Acked-by: Jan Beulich

[Xen-devel] [PATCH V4 1/3] xen/mem_access: Support for memory-content hiding

2015-07-08 Thread Razvan Cojocaru
This patch adds support for memory-content hiding, by modifying the value returned by emulated instructions that read certain memory addresses that contain sensitive data. The patch only applies to cases where MEM_ACCESS_EMULATE or MEM_ACCESS_EMULATE_NOWRITE have been set to a vm_event response.

[Xen-devel] [PATCH V4 2/3] xen/vm_event: Support for guest-requested events

2015-07-08 Thread Razvan Cojocaru
Added support for a new class of vm_events: VM_EVENT_REASON_REQUEST, sent via HVMOP_request_vm_event. The guest can request that a generic vm_event (containing only the vm_event-filled guest registers as information) be sent to userspace by setting up the correct registers and doing a VMCALL. For

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM When guest changes its interrupt configuration (such as, vector, etc.) for direct-assigned devices, we need to update the associated IRTE with the new guest vector, so external interrupts from the assigned devices can be injected to

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-07-08 Thread Wu, Feng
-Original Message- From: Tian, Kevin Sent: Wednesday, July 08, 2015 6:23 PM To: Wu, Feng; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z; george.dun...@eu.citrix.com Subject: RE: [v3 11/15] Update IRTE according to guest

[Xen-devel] [PATCH 4.0 01/55] config: Enable NEED_DMA_MAP_STATE by default when SWIOTLB is selected

2015-07-08 Thread Greg Kroah-Hartman
4.0-stable review patch. If anyone has any objections, please let me know. -- From: Konrad Rzeszutek Wilk konrad.w...@oracle.com commit a6dfa128ce5c414ab46b1d690f7a1b8decb8526d upstream. A huge amount of NIC drivers use the DMA API, however if compiled under 32-bit an very

Re: [Xen-devel] [v3 05/15] vt-d: VT-d Posted-Interrupts feature detection

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM VT-d Posted-Interrupts is an enhancement to CPU side Posted-Interrupt. With VT-d Posted-Interrupts enabled, external interrupts from direct-assigned devices can be delivered to guests without VMM intervention when guest is running in

Re: [Xen-devel] traps.c:3227: GPF (0000): ffff82d080194a4d - ffff82d080239d85 and other dom0 induced log messages

2015-07-08 Thread Sander Eikelenboom
Monday, July 6, 2015, 11:33:09 AM, you wrote: On 26.06.15 at 17:57, li...@eikelenboom.it wrote: On 2015-06-26 17:51, Jan Beulich wrote: On 26.06.15 at 17:41, li...@eikelenboom.it wrote: from 3.16 to 3.19 we gained a lot of these, if i remember correctly related to perf being enabled in the

Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Wu, Feng
-Original Message- From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, July 08, 2015 4:44 PM To: Wu, Feng Cc: Andrew Cooper; george.dun...@eu.citrix.com; Tian, Kevin; Zhang, Yang Z; xen-devel@lists.xen.org; k...@xen.org Subject: RE: [Xen-devel] [v3 03/15] Add cmpxchg16b

Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Andrew Cooper
On 08/07/2015 09:12, Jan Beulich wrote: +{ +uint128_t prev; + +ASSERT(cpu_has_cx16); Given that if this assertion were to fail, cmpxchg16b would fail with #UD, I would hand-code a asm_fixup section which in turn panics. This avoids a situation where non-debug builds could die

Re: [Xen-devel] [v3 10/15] vt-d: Add API to update IRTE when VT-d PI is used

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM This patch adds an API which is used to update the IRTE for posted-interrupt when guest changes MSI/MSI-X information. Signed-off-by: Feng Wu feng...@intel.com Acked-by: Kevin Tian kevin.t...@intel.com, with one small comment: +int

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-07-08 Thread Wu, Feng
-Original Message- From: Tian, Kevin Sent: Wednesday, July 08, 2015 5:06 PM To: Wu, Feng; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z; george.dun...@eu.citrix.com Subject: RE: [v3 08/15] Suppress posting interrupts when

Re: [Xen-devel] [v3 06/15] vmx: Extend struct pi_desc to support VT-d Posted-Interrupts

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM Extend struct pi_desc according to VT-d Posted-Interrupts Spec. Signed-off-by: Feng Wu feng...@intel.com Acked-by: Kevin Tian kevin.t...@intel.com ___ Xen-devel mailing list

Re: [Xen-devel] [PATCH v10 00/13] enable Cache Allocation Technology (CAT) for VMs

2015-07-08 Thread Chao Peng
On Tue, Jul 07, 2015 at 03:46:21PM +0100, Ian Campbell wrote: On Fri, 2015-06-26 at 16:43 +0800, Chao Peng wrote: Chao Peng (13): x86: add socket_cpumask x86: detect and initialize Intel CAT feature x86: maintain COS to CBM mapping for each socket x86: add COS information for

Re: [Xen-devel] [PATCH v2] Modified RTDS scheduler to use an event-driven model instead of polling.

2015-07-08 Thread Dario Faggioli
[Trimming the Cc-list a bit, to avoid bothering Wei and Jan] On Tue, 2015-07-07 at 22:56 -0700, Meng Xu wrote: Hi Dario, Hi, 2015-07-07 7:03 GMT-07:00 Dario Faggioli dario.faggi...@citrix.com: On Mon, 2015-07-06 at 22:51 -0700, Meng Xu wrote: So, it looks to me that, as far as (1) and

Re: [Xen-devel] [v3 05/15] vt-d: VT-d Posted-Interrupts feature detection

2015-07-08 Thread Wu, Feng
-Original Message- From: Tian, Kevin Sent: Wednesday, July 08, 2015 3:32 PM To: Wu, Feng; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z; george.dun...@eu.citrix.com Subject: RE: [v3 05/15] vt-d: VT-d Posted-Interrupts feature

Re: [Xen-devel] [v3 07/15] vmx: Initialize VT-d Posted-Interrupts Descriptor

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM This patch initializes the VT-d Posted-interrupt Descriptor. Signed-off-by: Feng Wu feng...@intel.com Acked-by: Kevin Tian kevin.t...@intel.com ___ Xen-devel mailing list

Re: [Xen-devel] [PATCH v3 for Xen 4.6 1/4] xen: enable per-VCPU parameter settings for RTDS scheduler

2015-07-08 Thread Dario Faggioli
On Tue, 2015-07-07 at 23:06 -0700, Meng Xu wrote: 2015-07-07 7:39 GMT-07:00 Dario Faggioli dario.faggi...@citrix.com: On Tue, 2015-07-07 at 09:59 +0100, Jan Beulich wrote: On 29.06.15 at 04:44, lichong...@gmail.com wrote: --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -31,7

[Xen-devel] [v6][PATCH 15/16] xen/vtd: prevent from assign the device with shared rmrr

2015-07-08 Thread Tiejun Chen
Currently we're intending to cover this kind of devices with shared RMRR simply since the case of shared RMRR is a rare case according to our previous experiences. But late we can group these devices which shared rmrr, and then allow all devices within a group to be assigned to same domain. CC:

[Xen-devel] [v6][PATCH 06/16] hvmloader/pci: skip reserved ranges

2015-07-08 Thread Tiejun Chen
When allocating mmio address for PCI bars, we need to make sure they don't overlap with reserved regions. CC: Keir Fraser k...@xen.org CC: Jan Beulich jbeul...@suse.com CC: Andrew Cooper andrew.coop...@citrix.com CC: Ian Jackson ian.jack...@eu.citrix.com CC: Stefano Stabellini

[Xen-devel] [v6][PATCH 14/16] xen/vtd: enable USB device assignment

2015-07-08 Thread Tiejun Chen
USB RMRR may conflict with guest BIOS region. In such case, identity mapping setup is simply skipped in previous implementation. Now we can handle this scenario cleanly with new policy mechanism so previous hack code can be removed now. CC: Yang Zhang yang.z.zh...@intel.com CC: Kevin Tian

[Xen-devel] [v6][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-08 Thread Tiejun Chen
This patch introduces user configurable parameters to specify RDM resource and according policies, Global RDM parameter: rdm = strategy=host,reserve=strict/relaxed Per-device RDM parameter: pci = [ 'sbdf, rdm_reserve=strict/relaxed' ] Global RDM parameter, strategy, allows user to

[Xen-devel] [v6][PATCH 13/16] libxl: construct e820 map with RDM information for HVM guest

2015-07-08 Thread Tiejun Chen
Here we'll construct a basic guest e820 table via XENMEM_set_memory_map. This table includes lowmem, highmem and RDMs if they exist, and hvmloader would need this info later. Note this guest e820 table would be same as before if the platform has no any RDM or we disable RDM (by default). CC: Ian

[Xen-devel] [v6][PATCH 02/16] xen/vtd: create RMRR mapping

2015-07-08 Thread Tiejun Chen
RMRR reserved regions must be setup in the pfn space with an identity mapping to reported mfn. However existing code has problem to setup correct mapping when VT-d shares EPT page table, so lead to problem when assigning devices (e.g GPU) with RMRR reported. So instead, this patch aims to setup

[Xen-devel] [v6][PATCH 04/16] xen: enable XENMEM_memory_map in hvm

2015-07-08 Thread Tiejun Chen
This patch enables XENMEM_memory_map in hvm. So hvmloader can use it to setup the e820 mappings. CC: Keir Fraser k...@xen.org CC: Jan Beulich jbeul...@suse.com CC: Andrew Cooper andrew.coop...@citrix.com Signed-off-by: Tiejun Chen tiejun.c...@intel.com Reviewed-by: Tim Deegan t...@xen.org

[Xen-devel] [v6][PATCH 09/16] tools: extend xc_assign_device() to support rdm reservation policy

2015-07-08 Thread Tiejun Chen
This patch passes rdm reservation policy to xc_assign_device() so the policy is checked when assigning devices to a VM. Note this also bring some fallout to python usage of xc_assign_device(). CC: Ian Jackson ian.jack...@eu.citrix.com CC: Stefano Stabellini stefano.stabell...@eu.citrix.com CC:

[Xen-devel] [v6][PATCH 05/16] hvmloader: get guest memory map into memory_map[]

2015-07-08 Thread Tiejun Chen
Now we get this map layout by call XENMEM_memory_map then save them into one global variable memory_map[]. It should include lowmem range, rdm range and highmem range. Note rdm range and highmem range may not exist in some cases. And here we need to check if any reserved memory conflicts with

[Xen-devel] [v6][PATCH 07/16] hvmloader/e820: construct guest e820 table

2015-07-08 Thread Tiejun Chen
Now we can use that memory map to build our final e820 table but it may need to reorder all e820 entries. CC: Keir Fraser k...@xen.org CC: Jan Beulich jbeul...@suse.com CC: Andrew Cooper andrew.coop...@citrix.com CC: Ian Jackson ian.jack...@eu.citrix.com CC: Stefano Stabellini

Re: [Xen-devel] Xen-unstable: pci-passthrough of device using MSI-X interrupts not working after commit x86/MSI: track host and guest masking separately

2015-07-08 Thread Sander Eikelenboom
Tuesday, July 7, 2015, 6:08:25 PM, you wrote: On 26.06.15 at 17:48, li...@eikelenboom.it wrote: On 2015-06-26 17:22, Jan Beulich wrote: I have an idea: In static unsigned int startup_msi_irq(struct irq_desc *desc) { bool_t guest_masked = (desc-status IRQ_GUEST)

Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Wu, Feng
-Original Message- From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, July 08, 2015 4:13 PM To: Wu, Feng Cc: Andrew Cooper; george.dun...@eu.citrix.com; Tian, Kevin; Zhang, Yang Z; xen-devel@lists.xen.org; k...@xen.org Subject: RE: [Xen-devel] [v3 03/15] Add cmpxchg16b

Re: [Xen-devel] [PATCH v10 00/13] enable Cache Allocation Technology (CAT) for VMs

2015-07-08 Thread Wei Liu
On Wed, Jul 08, 2015 at 05:40:47PM +0800, Chao Peng wrote: On Tue, Jul 07, 2015 at 03:46:21PM +0100, Ian Campbell wrote: On Fri, 2015-06-26 at 16:43 +0800, Chao Peng wrote: Chao Peng (13): x86: add socket_cpumask x86: detect and initialize Intel CAT feature x86: maintain COS

Re: [Xen-devel] [v3 10/15] vt-d: Add API to update IRTE when VT-d PI is used

2015-07-08 Thread Wu, Feng
-Original Message- From: Tian, Kevin Sent: Wednesday, July 08, 2015 6:00 PM To: Wu, Feng; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Zhang, Yang Z; george.dun...@eu.citrix.com Subject: RE: [v3 10/15] vt-d: Add API to update IRTE when

Re: [Xen-devel] [PATCH v2 07/12] x86/altp2m: add control of suppress_ve.

2015-07-08 Thread Tim Deegan
Hi, At 17:38 + on 07 Jul (1436290689), Sahita, Ravi wrote: In order to make forward progress, do the other maintainers (Jan, Andrew, Tim) agree with the patch direction that George has suggested for this particular patch? I'm no longer a maintainer for this code, but FWIW I think that

Re: [Xen-devel] traps.c:3227: GPF (0000): ffff82d080194a4d - ffff82d080239d85 and other dom0 induced log messages

2015-07-08 Thread Andrew Cooper
On 08/07/2015 11:04, Sander Eikelenboom wrote: Wednesday, July 8, 2015, 10:58:02 AM, you wrote: On 08/07/2015 09:45, Sander Eikelenboom wrote: Monday, July 6, 2015, 11:33:09 AM, you wrote: On 26.06.15 at 17:57, li...@eikelenboom.it wrote: On 2015-06-26 17:51, Jan Beulich wrote: On 26.06.15

Re: [Xen-devel] [PATCH v5 2/3] arm: Allow the user to specify the GIC version

2015-07-08 Thread Ian Campbell
On Tue, 2015-07-07 at 17:22 +0100, Julien Grall wrote: diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl index e1632fa..11f6461 100644 --- a/tools/libxl/libxl_types.idl +++ b/tools/libxl/libxl_types.idl @@ -369,6 +369,12 @@ libxl_vnode_info = Struct(vnode_info, [

[Xen-devel] [linux-3.4 test] 59139: regressions - FAIL

2015-07-08 Thread osstest service owner
flight 59139 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59139/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511 Tests which are

Re: [Xen-devel] [v5][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-08 Thread Ian Campbell
On Wed, 2015-07-08 at 08:54 +0800, Chen, Tiejun wrote: +none is the default value and it means we don't check any reserved regions +and then all rdm policies would be ignored. Guest just works as before and +the conflict of RDM and guest address space wouldn't be handled, and then +this

Re: [Xen-devel] traps.c:3227: GPF (0000): ffff82d080194a4d - ffff82d080239d85 and other dom0 induced log messages

2015-07-08 Thread Andrew Cooper
On 08/07/2015 09:45, Sander Eikelenboom wrote: Monday, July 6, 2015, 11:33:09 AM, you wrote: On 26.06.15 at 17:57, li...@eikelenboom.it wrote: On 2015-06-26 17:51, Jan Beulich wrote: On 26.06.15 at 17:41, li...@eikelenboom.it wrote: from 3.16 to 3.19 we gained a lot of these, if i remember

[Xen-devel] [linux-4.1 test] 59143: regressions - FAIL

2015-07-08 Thread osstest service owner
flight 59143 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59143/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 15 guest-localmigrate/x10 fail REGR. vs. 59031

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-07-08 Thread Tian, Kevin
From: Wu, Feng Sent: Wednesday, June 24, 2015 1:18 PM Currently, we don't support urgent interrupt, all interrupts are recognized as non-urgent interrupt, so we cannot send posted-interrupt when 'SN' is set. Signed-off-by: Feng Wu feng...@intel.com --- v3: use cmpxchg to test SN/ON

Re: [Xen-devel] [PATCH] x86/MSI: fix guest unmasking when handling IRQ via event channel

2015-07-08 Thread Julien Grall
Hi, On 08/07/2015 09:56, Jan Beulich wrote: --- a/xen/include/asm-arm/irq.h +++ b/xen/include/asm-arm/irq.h @@ -47,6 +47,8 @@ int release_guest_irq(struct domain *d, void arch_move_irqs(struct vcpu *v); +#define arch_evtchn_bind_pirq(d, pirq) ((void)((d) + (pirq))) + This addition is here

Re: [Xen-devel] [v5][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-08 Thread Ian Campbell
On Wed, 2015-07-08 at 17:06 +0800, Chen, Tiejun wrote: #2. Don't expose ignore to user and just keep host as the default He told me he would discuss this with you, but sounds he didn't do this, or I'm missing something here? My question was regarding how xl rdm=type=none differed from not

Re: [Xen-devel] [PATCH v4 1/7] libxl: get rid of the SEDF scheduler

2015-07-08 Thread Ian Campbell
On Tue, 2015-07-07 at 18:43 +0200, Dario Faggioli wrote: only the interface is left in place, for backward compile-time compatibility, but every attempt to use it would throw an error. Signed-off-by: Dario Faggioli dario.faggi...@citrix.com --- Cc: George Dunlap george.dun...@eu.citrix.com

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-08 Thread Wu, Feng
-Original Message- From: Andrew Cooper [mailto:andrew.coop...@citrix.com] Sent: Tuesday, June 30, 2015 1:07 AM To: Wu, Feng; xen-devel@lists.xen.org Cc: k...@xen.org; jbeul...@suse.com; Tian, Kevin; Zhang, Yang Z; george.dun...@eu.citrix.com Subject: Re: [v3 12/15] vmx:

[Xen-devel] x86, arm: remove asm/spinlock.h from all architectures removed x86's _raw_read_unlock()

2015-07-08 Thread Jan Beulich
David, I'm afraid we'll need another fixup here, even if things build fine despite the removal. Thanks, Jan ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] Performance problem about address translation

2015-07-08 Thread xinyue
On 2015年07月08日 14:26, xinyue wrote: Very sorry for sending wrong before. On 2015年07月08日 14:13, xinyue wrote: On 2015年07月07日 19:49, Ian Campbell wrote: On Tue, 2015-07-07 at 11:24 +0800, xinyue wrote: Please don't use HTML mail and do proper quoting And after analyzing the performance of

Re: [Xen-devel] [PATCH v25 00/15] x86/PMU: Xen PMU PV(H) support

2015-07-08 Thread Jan Beulich
On 19.06.15 at 20:44, boris.ostrov...@oracle.com wrote: While making another scan through this series now that some more reviews from Dietmar are trickling in, I notice: Boris Ostrovsky (15): common/symbols: Export hypervisor symbols to privileged guest x86/VPMU: Add public xenpmu.h

Re: [Xen-devel] [v3 03/15] Add cmpxchg16b support for x86-64

2015-07-08 Thread Jan Beulich
On 08.07.15 at 10:33, feng...@intel.com wrote: From: Jan Beulich [mailto:jbeul...@suse.com] Sent: Wednesday, July 08, 2015 4:13 PM On 08.07.15 at 09:06, feng...@intel.com wrote: From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Andrew Cooper

  1   2   3   >