Re: [Xen-devel] Packaging xen 4.5.0 RC4 on Arch Linux

2014-12-17 Thread Olaf Hering
On Tue, Dec 16, Julian Sivertsen wrote: The default Arch Linux kernel does not have SELinux, causing the var-lib-xenstored.mount unit to fail due to an invalid context. This can be worked around by removing the context option from the mount options in that unit file. Mine does not have

Re: [Xen-devel] [PATCH] xen/blkfront: increase the default value of xen_blkif_max_segments

2014-12-17 Thread Bob Liu
On 12/16/2014 06:32 PM, Roger Pau Monné wrote: El 16/12/14 a les 11.11, Bob Liu ha escrit: The default maximum value of segments in indirect requests was 32, IO operations with bigger block size(32*4k) would be split and performance start to drop. Nowadays backend device usually support

[Xen-devel] [Patch V2 0/4] xen: auto-generate symbols for xen hypercalls

2014-12-17 Thread Juergen Gross
The Xen hypercalls are defined in include/xen/interface/xen.h. There are some places where for each hypercall a table element is created. Instead of manually add each hypercall element to these tables use an auto generated header built during the make process of the kernel. Changes in V2: - add

[Xen-devel] [Patch V2 1/4] xen: build infrastructure for generating hypercall depending symbols

2014-12-17 Thread Juergen Gross
Today there are several places in the kernel which build tables containing one entry for each possible Xen hypercall. Create an infrastructure to be able to generate these tables at build time. Based-on-patch-by: Jan Beulich jbeul...@suse.com Signed-off-by: Juergen Gross jgr...@suse.com ---

[Xen-devel] [Patch V2 2/4] xen: synchronize include/xen/interface/xen.h with xen

2014-12-17 Thread Juergen Gross
The header include/xen/interface/xen.h doesn't contain all definitions from Xen's version of that header. Update it accordingly. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com --- arch/x86/xen/trace.c| 2 +- include/xen/interface/xen.h | 6

Re: [Xen-devel] [PATCH v4] xmalloc: add support for checking the pool integrity

2014-12-17 Thread Jan Beulich
On 16.12.14 at 21:28, andrew.coop...@citrix.com wrote: On 16/12/14 19:33, Mihai Donțu wrote: +static bool_t __xmem_pool_check_locked(const char *file, int line, + const struct xmem_pool *pool) +{ +unsigned int i; +static bool_t once = 1; What

Re: [Xen-devel] [PATCH for 4.6 03/13] xen: Introduce ACCESS_ONCE macro

2014-12-17 Thread Jan Beulich
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote: --- a/xen/include/xen/compiler.h +++ b/xen/include/xen/compiler.h @@ -90,4 +90,18 @@ __asm__ ( : =r(__ptr) : 0(ptr)); \ (typeof(ptr)) (__ptr + (off)); }) +/* + * Prevent the compiler from merging or refetching accesses.

Re: [Xen-devel] [PATCH v4] xmalloc: add support for checking the pool integrity

2014-12-17 Thread Andrew Cooper
On 17/12/14 09:59, Jan Beulich wrote: On 16.12.14 at 21:28, andrew.coop...@citrix.com wrote: On 16/12/14 19:33, Mihai Donțu wrote: +static bool_t __xmem_pool_check_locked(const char *file, int line, + const struct xmem_pool *pool) +{ +unsigned int i;

Re: [Xen-devel] [PATCH v4] xmalloc: add support for checking the pool integrity

2014-12-17 Thread Andrew Cooper
On 16/12/14 23:37, Julien Grall wrote: On 16/12/2014 23:26, Andrew Cooper wrote: On 16/12/2014 23:06, Julien Grall wrote: Hi, On 16/12/2014 20:28, Andrew Cooper wrote: I suspect you also would be better, and certainly more brief, with run_in_exception_handler(show_stack) instead, which

Re: [Xen-devel] [PATCH for 4.6 07/13] xen: Introduce a generic way to describe device

2014-12-17 Thread Jan Beulich
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote: --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -2,6 +2,7 @@ obj-y += bitmap.o obj-y += core_parking.o obj-y += cpu.o obj-y += cpupool.o +obj-y += device.o Shouldn't this instead be two lines, one using HAS_PCI and the second

Re: [Xen-devel] [PATCH for 4.6 08/13] xen/iommu: Consolidate device assignment ops into a single set

2014-12-17 Thread Jan Beulich
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote: @@ -123,22 +124,17 @@ struct page_info; struct iommu_ops { int (*init)(struct domain *d); void (*hwdom_init)(struct domain *d); -#ifdef HAS_PCI -int (*add_device)(u8 devfn, struct pci_dev *); -int

Re: [Xen-devel] [Patch V2 1/4] xen: build infrastructure for generating hypercall depending symbols

2014-12-17 Thread David Vrabel
On 17/12/14 09:50, Juergen Gross wrote: Today there are several places in the kernel which build tables containing one entry for each possible Xen hypercall. Create an infrastructure to be able to generate these tables at build time. Reviewed-by: David Vrabel david.vra...@citrix.com David

Re: [Xen-devel] [PATCH for 4.6 07/13] xen: Introduce a generic way to describe device

2014-12-17 Thread Julien Grall
Hi Jan, On 17/12/2014 10:16, Jan Beulich wrote: On 16.12.14 at 21:08, julien.gr...@linaro.org wrote: --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -2,6 +2,7 @@ obj-y += bitmap.o obj-y += core_parking.o obj-y += cpu.o obj-y += cpupool.o +obj-y += device.o Shouldn't this instead

Re: [Xen-devel] [PATCH v4] xmalloc: add support for checking the pool integrity

2014-12-17 Thread Andrew Cooper
On 17/12/14 10:24, Julien Grall wrote: On 17/12/2014 10:11, Andrew Cooper wrote: On 16/12/14 23:37, Julien Grall wrote: Introducing a new bugframe is precicely what I meant by this doesn't look hard. x86 currently has one more bugframe than arm, being BUGFRAME_run_fn. And how do you pass

Re: [Xen-devel] [PATCH for 4.6 07/13] xen: Introduce a generic way to describe device

2014-12-17 Thread Jan Beulich
On 17.12.14 at 11:30, julien.gr...@linaro.org wrote: On 17/12/2014 10:16, Jan Beulich wrote: On 16.12.14 at 21:08, julien.gr...@linaro.org wrote: --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -2,6 +2,7 @@ obj-y += bitmap.o obj-y += core_parking.o obj-y += cpu.o obj-y +=

Re: [Xen-devel] WARNING: at drivers/xen/gntdev.c:426 unmap_if_in_range+0x5d/0x60 [xen_gntdev]()

2014-12-17 Thread David Vrabel
On 16/12/14 23:04, Christopher S. Aker wrote: On Dec 15, 2014, at 6:11 AM, David Vrabel david.vra...@citrix.com wrote: On 11/12/14 15:12, Christopher S. Aker wrote: Xen: 4.4.2-pre (28573:f6f6236af933) + xsa111, xsa112, xsa114 Dom0: 3.17.4 Things go badly after a day or four. We've hit this

Re: [Xen-devel] Cache Allocation Technology(CAT) design for XEN

2014-12-17 Thread Chao Peng
On Tue, Dec 16, 2014 at 09:38:09AM +, Jan Beulich wrote: On 16.12.14 at 09:55, chao.p.p...@linux.intel.com wrote: Any comments from you? It would be greatly appreciated if you can look at this when you have time. Your comments are always important to me :) I don't think I have to say

Re: [Xen-devel] IO-APIC interrupts getting stuck

2014-12-17 Thread Roger Pau Monné
El 16/12/14 a les 18.59, Andrew Cooper ha escrit: On 16/12/14 17:34, Roger Pau Monné wrote: Hello, While working on the FreeBSD PVH Dom0 port I've realized that IO-APIC interrupts get stuck in a very strange state very easily with the current PIRQ implementation that I'm using on FreeBSD.

Re: [Xen-devel] [RFC V9 2/4] domain snapshot overview

2014-12-17 Thread Wei Liu
On Tue, Dec 16, 2014 at 02:32:55PM +0800, Chunyan Liu wrote: Changes to V8: * add an overview document, so that one can has a overall look about the whole domain snapshot work, limits, requirements, how to do, etc.

[Xen-devel] [linux-next test] 32422: regressions - FAIL

2014-12-17 Thread xen . org
flight 32422 linux-next real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32422/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt 5 xen-boot fail REGR. vs. 32386 test-amd64-i386-xl

Re: [Xen-devel] [RFC V9 3/4] domain snapshot design: xl

2014-12-17 Thread Wei Liu
On Tue, Dec 16, 2014 at 02:32:56PM +0800, Chunyan Liu wrote: Changes to V8: * xl won't manage snapshots, that means it won't maintain json files, won't maintain snapshot chain relationship, and then as a result won't take care of deleting snapshot and listing snapshots. * remove

Re: [Xen-devel] [PATCH for 4.6 07/13] xen: Introduce a generic way to describe device

2014-12-17 Thread Julien Grall
Hi Jan, On 17/12/14 10:46, Jan Beulich wrote: On 17.12.14 at 11:30, julien.gr...@linaro.org wrote: On 17/12/2014 10:16, Jan Beulich wrote: On 16.12.14 at 21:08, julien.gr...@linaro.org wrote: --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -2,6 +2,7 @@ obj-y += bitmap.o obj-y +=

Re: [Xen-devel] xen-netback: make feature-rx-notify mandatory -- Breaks stubdoms

2014-12-17 Thread David Vrabel
On 10/12/14 14:12, David Vrabel wrote: On 10/12/14 13:42, John wrote: David, This patch you put into 3.18.0 appears to break the latest version of stubdomains. I found this out today when I tried to update a machine to 3.18.0 and all of the domUs crashed on start with the dmesg output like

Re: [Xen-devel] [RFC V9 4/4] domain snapshot design: libxl/libxlu

2014-12-17 Thread Wei Liu
On Tue, Dec 16, 2014 at 02:32:57PM +0800, Chunyan Liu wrote: Changes to V8: * remove libxl_domain_snapshot_create/delete/revert API * export disk snapshot functionality for both xl and libvirt usage === Libxl/libxlu

Re: [Xen-devel] dom0 reboot hangs with VMs created with libxl

2014-12-17 Thread Wei Liu
On Tue, Dec 16, 2014 at 01:47:35PM +, Alex Bligh wrote: I am running Ubuntu's xen 4.4 (4.4.1-0ubuntu0.14.04.2), but creating VMs with libxl. When I do a 'shutdown -r' or similar with no VMs running, dom0 reboots fine. When I do this with one or more VMs running, I get: INFO: task

Re: [Xen-devel] [PATCH for-4.6 2/4] xen/arm: vgic: Keep track of vIRQ used by a domain

2014-12-17 Thread Julien Grall
On 15/12/14 16:07, Julien Grall wrote: On 15/12/14 15:32, Stefano Stabellini wrote: On Fri, 12 Dec 2014, Julien Grall wrote: +spin_lock_init(d-arch.vgic.lock); you should probably explain in the commit message the reason why you are making changes to the vgic lock Actually the domain

[Xen-devel] [PATCH for 4.5] xen/arm: Initialize the domain vgic lock

2014-12-17 Thread Julien Grall
The domain vgic lock is used uninitialized. Signed-off-by: Julien Grall julien.gr...@linaro.org --- This is a bug fix for Xen 4.5 and Xen 4.4. The vgic lock is used unitialized. Luckily we only use the field raw which is reset to 0 during the domain allocation. There is no harm

[Xen-devel] [xen-unstable test] 32424: regressions - FAIL

2014-12-17 Thread xen . org
flight 32424 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32424/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 32392 Regressions which

[Xen-devel] [PATCH v16 00/23] x86/PMU: Xen PMU PV(H) support

2014-12-17 Thread Boris Ostrovsky
Version 16 of PV(H) PMU patches. * Many changes in VPMU mode patch (#13): * Replaced arguments to some vpmu routines (vcpu - vpmu). New patch (#12) * Added vpmu_unload vpmu op to completely unload vpmu data (e.g clear MSR bitmaps). This routine may be called in context switch

[Xen-devel] [PATCH v16 07/23] vmx: Merge MSR management routines

2014-12-17 Thread Boris Ostrovsky
vmx_add_host_load_msr() and vmx_add_guest_msr() share fair amount of code. Merge them to simplify code maintenance. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Kevin Tian kevin.t...@intel.com Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com Reviewed-by: Dietmar

[Xen-devel] [PATCH v16 11/23] x86/VPMU: Make vpmu not HVM-specific

2014-12-17 Thread Boris Ostrovsky
vpmu structure will be used for both HVM and PV guests. Move it from hvm_vcpu to arch_vcpu. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Jan Beulich jbeul...@suse.com Reviewed-by: Kevin Tian kevin.t...@intel.com Reviewed-by: Dietmar Hahn dietmar.h...@ts.fujitsu.com

[Xen-devel] [PATCH v16 06/23] intel/VPMU: Clean up Intel VPMU code

2014-12-17 Thread Boris Ostrovsky
Remove struct pmumsr and core2_pmu_enable. Replace static MSR structures with fields in core2_vpmu_context. Call core2_get_pmc_count() once, during initialization. Properly clean up when core2_vpmu_alloc_resource() fails. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Kevin

[Xen-devel] [PATCH v16 08/23] x86/VPMU: Handle APIC_LVTPC accesses

2014-12-17 Thread Boris Ostrovsky
Don't have the hypervisor update APIC_LVTPC when _it_ thinks the vector should be updated. Instead, handle guest's APIC_LVTPC accesses and write what the guest explicitly wanted. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Kevin Tian kevin.t...@intel.com Reviewed-by:

[Xen-devel] [PATCH v16 16/23] x86/VPMU: Save VPMU state for PV guests during context switch

2014-12-17 Thread Boris Ostrovsky
Save VPMU state during context switch for both HVM and PV(H) guests. A subsequent patch (x86/VPMU: NMI-based VPMU support) will make it possible for vpmu_switch_to() to call vmx_vmcs_try_enter()-vcpu_pause() which needs is_running to be correctly set/cleared. To prepare for that, call

[Xen-devel] [PATCH v16 01/23] common/symbols: Export hypervisor symbols to privileged guest

2014-12-17 Thread Boris Ostrovsky
Export Xen's symbols as {addresstypename} triplet via new XENPF_get_symbol hypercall Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com Reviewed-by: Dietmar Hahn

[Xen-devel] [PATCH v16 09/23] intel/VPMU: MSR_CORE_PERF_GLOBAL_CTRL should be initialized to zero

2014-12-17 Thread Boris Ostrovsky
MSR_CORE_PERF_GLOBAL_CTRL register should be set zero initially. It is up to the guest to set it so that counters are enabled. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Kevin Tian kevin.t...@intel.com Reviewed-by: Dietmar Hahn dietmar.h...@ts.fujitsu.com Tested-by:

[Xen-devel] [PATCH v16 13/23] x86/VPMU: Interface for setting PMU mode and flags

2014-12-17 Thread Boris Ostrovsky
Add runtime interface for setting PMU mode and flags. Three main modes are provided: * XENPMU_MODE_OFF: PMU is not virtualized * XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts. * XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for non-proviledged guests, dom0 can profile

[Xen-devel] [PATCH v16 18/23] x86/VPMU: Add support for PMU register handling on PV guests

2014-12-17 Thread Boris Ostrovsky
Intercept accesses to PMU MSRs and process them in VPMU module. If vpmu ops for VCPU are not initialized (which is the case, for example, for PV guests that are not VPMU-enlightened) access to MSRs will return failure. Dump VPMU state for all domains (HVM and PV) when requested. Signed-off-by:

[Xen-devel] [PATCH v16 15/23] x86/VPMU: Initialize PMU for PV(H) guests

2014-12-17 Thread Boris Ostrovsky
Code for initializing/tearing down PMU for PV guests Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Kevin Tian kevin.t...@intel.com Acked-by: Jan Beulich jbeul...@suse.com Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com Reviewed-by: Dietmar Hahn

[Xen-devel] [PATCH v16 17/23] x86/VPMU: When handling MSR accesses, leave fault injection to callers

2014-12-17 Thread Boris Ostrovsky
With this patch return value of 1 of vpmu_do_msr() will now indicate whether an error was encountered during MSR processing (instead of stating that the access was to a VPMU register). As part of this patch we also check for validity of certain MSR accesses right when we determine which register

[Xen-devel] [PATCH v16 03/23] x86/VPMU: Manage VPMU_CONTEXT_SAVE flag in vpmu_save_force()

2014-12-17 Thread Boris Ostrovsky
There is a possibility that we set VPMU_CONTEXT_SAVE on VPMU context in vpmu_load() and never clear it (because vpmu_save_force() will see VPMU_CONTEXT_LOADED bit clear, which is possible on AMD processors) The problem is that amd_vpmu_save() assumes that if VPMU_CONTEXT_SAVE is set then (1) we

[Xen-devel] [PATCH v16 10/23] x86/VPMU: Add public xenpmu.h

2014-12-17 Thread Boris Ostrovsky
Add pmu.h header files, move various macros and structures that will be shared between hypervisor and PV guests to it. Move MSR banks out of architectural PMU structures to allow for larger sizes in the future. The banks are allocated immediately after the context and PMU structures store offsets

[Xen-devel] [PATCH v16 02/23] x86/VPMU: Don't globally disable VPMU if initialization fails.

2014-12-17 Thread Boris Ostrovsky
The failure to initialize VPMU may be temporary so we shouldn'd disable VMPU forever. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com --- xen/arch/x86/hvm/vpmu.c | 15 --- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/xen/arch/x86/hvm/vpmu.c

[Xen-devel] [PATCH v16 05/23] x86/VPMU: Make vpmu macros a bit more efficient

2014-12-17 Thread Boris Ostrovsky
Introduce vpmu_are_all_set that allows testing multiple bits at once. Convert macros into inlines for better compiler checking. Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com Acked-by: Kevin Tian kevin.t...@intel.com Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com

[Xen-devel] [PATCH v16 19/23] x86/VPMU: Handle PMU interrupts for PV guests

2014-12-17 Thread Boris Ostrovsky
Add support for handling PMU interrupts for PV guests. VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush hypercall. This allows the guest to access PMU MSR values that are stored in VPMU context which is shared between hypervisor and domain, thus avoiding traps to

[Xen-devel] [PATCH v16 23/23] x86/VPMU: Move VPMU files up from hvm/ directory

2014-12-17 Thread Boris Ostrovsky
Since PMU is now not HVM specific we can move VPMU-related files up from arch/x86/hvm/ directory. Specifically: arch/x86/hvm/vpmu.c - arch/x86/cpu/vpmu.c arch/x86/hvm/svm/vpmu.c - arch/x86/cpu/vpmu_amd.c arch/x86/hvm/vmx/vpmu_core2.c - arch/x86/cpu/vpmu_intel.c

[Xen-devel] [PATCH v16 22/23] x86/VPMU: NMI-based VPMU support

2014-12-17 Thread Boris Ostrovsky
Add support for using NMIs as PMU interrupts to allow profiling hypervisor when interrupts are disabled. Most of processing is still performed by vpmu_do_interrupt(). However, since certain operations are not NMI-safe we defer them to a softint that vpmu_do_interrupt() will schedule: * For PV

[Xen-devel] [PATCH v16 12/23] x86/VPMU: Replace vcpu with vpmu as argument to some routines

2014-12-17 Thread Boris Ostrovsky
A subsequent patch will add an inline routine to vpmu.h that will call vpmu_load(). This inline will try to access vcpu-vpmu which is not possible since struct vcpu may not be fully defined at that point. So we will have that inline pass vpmu pointer to vpmu_load() instead. This change slightly

[Xen-devel] [PATCH v2 00/14] Enable vTPM subsystem on TPM 2.0

2014-12-17 Thread Quan Xu
This series of patch enable the virtual Trusted Platform Module (vTPM) subsystem for Xen on TPM 2.0. Noted, functionality for a virtual guest operating system (a DomU) is still TPM 1.2. The main modifcation is on vtpmmgr-stubdom. The challenge is that TPM 2.0 is not backward compatible with TPM

[Xen-devel] [PATCH v2 08/14] vTPM/TPM2: Add main entrance vtpmmgr2_init()

2014-12-17 Thread Quan Xu
Accept commands from the vtpm-stubdom domains via the mini-os TPM backend driver. The vTPM manager communicates directly with hardware TPM 2.0 using the mini-os tpm2_tis driver. Signed-off-by: Quan Xu quan...@intel.com --- stubdom/vtpmmgr/init.c| 109

[Xen-devel] [PATCH v2 06/14] vTPM/TPM2: Create and load SK on TPM 2.0

2014-12-17 Thread Quan Xu
TPM2_Create is used to create an object that can be loaded into a TPM using TPM2_Load(). If the command completes successfully, the TPM will create the new object and return the object’s creation. data (creationData), its public area (outPublic), and its encrypted sensitive area (outPrivate).

[Xen-devel] [PATCH v2 09/14] vTPM/TPM2: Support 'tpm2' extra command line.

2014-12-17 Thread Quan Xu
Make vtpm-stubdom domain compatible to launch on TPM 1.x / TPM 2.0. Add: .. extra=tpm2 .. to launch vtpm-stubdom domain on TPM 2.0, ignore it on TPM 1.x. for example, vtpm-stubdom domain configuration on TPM 2.0: kernel=/usr/lib/xen/boot/vtpmmgr-stubdom.gz memory=16

[Xen-devel] [PATCH v2 02/14] vTPM/TPM2: TPM 2.0 data structures marshal

2014-12-17 Thread Quan Xu
Add TPM 2.0 data structure marshal for packing and unpacking TPM 2.0 data structures. Signed-off-by: Quan Xu quan...@intel.com --- stubdom/vtpmmgr/tpm2_marshal.h | 673 + 1 file changed, 673 insertions(+) create mode 100644 stubdom/vtpmmgr/tpm2_marshal.h

[Xen-devel] [PATCH v2 05/14] vTPM/TPM2: TPM 2.0 takes ownership and create SRK

2014-12-17 Thread Quan Xu
TPM2_CreatePrimary is used to create a Primary Object under one of the Primary Seeds or a Temporary Object under TPM_RH_NULL. The command uses a TPM2B_PUBLIC as a template for the object to be created. The command will create and load a Primary Object. The sensitive area is not returned. Any type

[Xen-devel] [PATCH v2 10/14] vTPM/TPM2: TPM 2.0 PCRs read

2014-12-17 Thread Quan Xu
Signed-off-by: Quan Xu quan...@intel.com --- stubdom/vtpmmgr/init.c | 34 ++ stubdom/vtpmmgr/tpm2_types.h | 2 ++ stubdom/vtpmmgr/vtpmmgr.h| 1 + 3 files changed, 37 insertions(+) diff --git a/stubdom/vtpmmgr/init.c b/stubdom/vtpmmgr/init.c index

[Xen-devel] [PATCH v2 11/14] vTPM/TPM2: Support TPM 2.0 bind and unbind data

2014-12-17 Thread Quan Xu
Bind data with TPM2_RSA_Encrypt, which performs RSA encryption using the indicated padding scheme according to PKCS#1v2.1(PKCS#1). If the scheme of keyHandle is TPM_ALG_NULL, then the caller may use inScheme to specify the padding scheme. Unbind data with TPM2_RSA_Decrypt, which performs RSA

[Xen-devel] [PATCH v2 12/14] vTPM/TPM2: Bind group keys and sectors data on disk

2014-12-17 Thread Quan Xu
Signed-off-by: Quan Xu quan...@intel.com --- stubdom/vtpmmgr/disk_write.c | 13 +++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/stubdom/vtpmmgr/disk_write.c b/stubdom/vtpmmgr/disk_write.c index 4c825c5..ab15a9a 100644 --- a/stubdom/vtpmmgr/disk_write.c +++

[Xen-devel] [PATCH v2 14/14] vTPM/TPM2: Record some infomation in docs/misc/vtpmmgr.txt about

2014-12-17 Thread Quan Xu
'vtpmmgr on TPM 2.0' Signed-off-by: Quan Xu quan...@intel.com --- docs/misc/vtpmmgr.txt | 150 +- 1 file changed, 149 insertions(+), 1 deletion(-) diff --git a/docs/misc/vtpmmgr.txt b/docs/misc/vtpmmgr.txt index 026c52b..1f1af4d 100644 ---

[Xen-devel] [PATCH v2 04/14] vTPM/TPM2: Add TPM 2.0 Exposed APIs

2014-12-17 Thread Quan Xu
These TPM 2.0 Exposed APIs for the Mini-os to access TPM 2.0 hardware. Signed-off-by: Quan Xu quan...@intel.com --- stubdom/vtpmmgr/Makefile | 2 +- stubdom/vtpmmgr/tpm2.c | 455 +++ stubdom/vtpmmgr/tpm2.h | 104 +++ 3 files changed, 560

[Xen-devel] [PATCH v2 07/14] vTPM/TPM2: TPM2.0 TIS initialization and self test.

2014-12-17 Thread Quan Xu
call the TPM 2.0 various registers that allow communication between the TPM 2.0 and platform hardware and software. TPM2_SelfTest causes the TPM 2.0 to perform a test of its capabilities. Signed-off-by: Quan Xu quan...@intel.com --- extras/mini-os/include/tpm_tis.h | 1 +

[Xen-devel] [PATCH v2 13/14] vTPM/TPM2: Unind group keys and sectors data on disk

2014-12-17 Thread Quan Xu
Signed-off-by: Quan Xu quan...@intel.com --- stubdom/vtpmmgr/disk_read.c | 16 ++-- 1 file changed, 14 insertions(+), 2 deletions(-) diff --git a/stubdom/vtpmmgr/disk_read.c b/stubdom/vtpmmgr/disk_read.c index 33aacdd..e147e90 100644 --- a/stubdom/vtpmmgr/disk_read.c +++

Re: [Xen-devel] [PATCH] xen/blkfront: increase the default value of xen_blkif_max_segments

2014-12-17 Thread Konrad Rzeszutek Wilk
On Wed, Dec 17, 2014 at 04:18:58PM +0800, Bob Liu wrote: On 12/16/2014 06:32 PM, Roger Pau Monné wrote: El 16/12/14 a les 11.11, Bob Liu ha escrit: The default maximum value of segments in indirect requests was 32, IO operations with bigger block size(32*4k) would be split and performance

Re: [Xen-devel] [PATCH v3] x86/VPMU: Clear last_vcpu when destroying VPMU

2014-12-17 Thread Konrad Rzeszutek Wilk
On Wed, Dec 17, 2014 at 10:35:47AM -0500, Boris Ostrovsky wrote: We need to make sure that last_vcpu is not pointing to VCPU whose VPMU is being destroyed. Otherwise we may try to dereference it in the future, when VCPU is gone. We have to do this atomically since otherwise there is a

Re: [Xen-devel] [PATCH] xen/blkfront: increase the default value of xen_blkif_max_segments

2014-12-17 Thread David Vrabel
On 17/12/14 16:13, Konrad Rzeszutek Wilk wrote: On Wed, Dec 17, 2014 at 04:18:58PM +0800, Bob Liu wrote: On 12/16/2014 06:32 PM, Roger Pau Monné wrote: El 16/12/14 a les 11.11, Bob Liu ha escrit: The default maximum value of segments in indirect requests was 32, IO operations with bigger

Re: [Xen-devel] [PATCH] xen/blkfront: increase the default value of xen_blkif_max_segments

2014-12-17 Thread Konrad Rzeszutek Wilk
On Wed, Dec 17, 2014 at 04:34:41PM +, David Vrabel wrote: On 17/12/14 16:13, Konrad Rzeszutek Wilk wrote: On Wed, Dec 17, 2014 at 04:18:58PM +0800, Bob Liu wrote: On 12/16/2014 06:32 PM, Roger Pau Monné wrote: El 16/12/14 a les 11.11, Bob Liu ha escrit: The default maximum value of

Re: [Xen-devel] [PATCH for 4.6 03/13] xen: Introduce ACCESS_ONCE macro

2014-12-17 Thread Jan Beulich
Julien Grall julien.gr...@linaro.org 12/17/14 1:55 PM On 17/12/14 10:05, Jan Beulich wrote: On 16.12.14 at 21:08, julien.gr...@linaro.org wrote: +#define ACCESS_ONCE(x) (*(volatile typeof(x) *)(x)) Any reason not to simply use {read,write}_atomic() instead, which we already have? To avoid

Re: [Xen-devel] [PATCH v3] x86/VPMU: Clear last_vcpu when destroying VPMU

2014-12-17 Thread Konrad Rzeszutek Wilk
On Wed, Dec 17, 2014 at 11:53:41AM -0500, Boris Ostrovsky wrote: On 12/17/2014 11:21 AM, Konrad Rzeszutek Wilk wrote: On Wed, Dec 17, 2014 at 10:35:47AM -0500, Boris Ostrovsky wrote: We need to make sure that last_vcpu is not pointing to VCPU whose VPMU is being destroyed. Otherwise we may try

Re: [Xen-devel] [PATCH for 4.6 07/13] xen: Introduce a generic way to describe device

2014-12-17 Thread Jan Beulich
Julien Grall julien.gr...@linaro.org 12/17/14 2:04 PM On 17/12/14 10:46, Jan Beulich wrote: On 17.12.14 at 11:30, julien.gr...@linaro.org wrote: Having a generic way to describe device will really help ARM code (see IOMMU). If we don't have a such thing, we may need to duplicate quite a

[Xen-devel] [linux-3.10 test] 32423: regressions - FAIL

2014-12-17 Thread xen . org
flight 32423 linux-3.10 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32423/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303 Tests which are

Re: [Xen-devel] [PATCH v3] x86/VPMU: Clear last_vcpu when destroying VPMU

2014-12-17 Thread Jan Beulich
Boris Ostrovsky boris.ostrov...@oracle.com 12/17/14 4:10 PM +/* Need to clear last_vcpu in case it points to v */ +(void)cmpxchg(last, v, NULL); In a (later) reply to v2 I had indicated that it doesn't seem safe to so here but rely on an IPI in the other path altering that value. Can

Re: [Xen-devel] Packaging xen 4.5.0 RC4 on Arch Linux

2014-12-17 Thread Julian Sivertsen
2014-12-17 9:02 GMT+01:00 Olaf Hering o...@aepfle.de: See the INSTALL file in the toplevel directory. I can't believe I didn't see that file, makes me feel rather dumb. Thank you so much for the pointer, it clears up a lot of things. Julian Sivertsen

Re: [Xen-devel] [PATCH v3] x86/VPMU: Clear last_vcpu when destroying VPMU

2014-12-17 Thread Boris Ostrovsky
On 12/17/2014 12:28 PM, Jan Beulich wrote: Boris Ostrovsky boris.ostrov...@oracle.com 12/17/14 4:10 PM +/* Need to clear last_vcpu in case it points to v */ +(void)cmpxchg(last, v, NULL); In a (later) reply to v2 I had indicated that it doesn't seem safe to so here but rely on an

[Xen-devel] [linux-3.14 test] 32425: regressions - FAIL

2014-12-17 Thread xen . org
flight 32425 linux-3.14 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32425/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64 5 xen-boot fail REGR. vs. 32149 Regressions which are

Re: [Xen-devel] Xen 4.5 Development Update (RC4)

2014-12-17 Thread Konrad Rzeszutek Wilk
On Wed, Dec 17, 2014 at 08:55:10AM +0100, Olaf Hering wrote: On Tue, Dec 16, Konrad Rzeszutek Wilk wrote: On Tue, Dec 16, 2014 at 05:34:51PM +0100, Olaf Hering wrote: On Tue, Dec 16, konrad.w...@oracle.com wrote: In terms of bugs, we have: ... systemd SELinux, but its not

Re: [Xen-devel] [PATCHv3] x86, fpu: remove the logic of non-eager fpu mem allocation at the first usage

2014-12-17 Thread Konrad Rzeszutek Wilk
On Tue, Sep 2, 2014 at 12:06 PM, David Vrabel david.vra...@citrix.com wrote: From: Suresh Siddha sbsid...@gmail.com For non-eager fpu mode, thread's fpu state is allocated during the first fpu usage (in the context of device not available exception). This can be a blocking call and hence we

Re: [Xen-devel] [TESTDAY] Test report Xen 4.5.0-RC3

2014-12-17 Thread Konrad Rzeszutek Wilk
On Sat, Dec 13, 2014 at 09:23:48AM +, Juergen Schinker wrote: Subject: [TESTDAY] Test report Xen 4.5.0-RC3 * Hardware: Intel(R) Xeon(R) CPU E3-1220L V2 @ 2.30GHz (4cores -1 socket) 32G Ram * Software: Debian Jessie * Guest operating systems: Debian Jessie * Functionality

Re: [Xen-devel] [PATCH for-4.5] reset PCI devices on force removal even when QEMU returns error

2014-12-17 Thread Konrad Rzeszutek Wilk
On Mon, Dec 15, 2014 at 11:13:06AM +, Stefano Stabellini wrote: On Fri, 12 Dec 2014, Konrad Rzeszutek Wilk wrote: On Fri, Dec 12, 2014 at 04:13:52PM +0100, Sander Eikelenboom wrote: Hi Konrad, This doesn't seem to be applied yet, nor does it seem to have a release-(N)ACK

Re: [Xen-devel] Xen 4.5 Development Update (RC4)

2014-12-17 Thread Konrad Rzeszutek Wilk
On Wed, Dec 17, 2014 at 02:41:50PM -0500, Konrad Rzeszutek Wilk wrote: On Wed, Dec 17, 2014 at 08:55:10AM +0100, Olaf Hering wrote: On Tue, Dec 16, Konrad Rzeszutek Wilk wrote: On Tue, Dec 16, 2014 at 05:34:51PM +0100, Olaf Hering wrote: On Tue, Dec 16, konrad.w...@oracle.com wrote:

[Xen-devel] [Testday] Arch Linux Test report

2014-12-17 Thread Julian Sivertsen
== Hardware == HP DL380 G5 (2x Intel Xeon 5130) == Dom0 == Arch Linux 64-bit == Functionality tested == Building xen 4.5 RC4 from the tarball, installing it and booting it up with Arch Linux as the Dom0. == Comments == Xen support on Arch Linux needs a bit of love. Nummerous problems getting

[Xen-devel] [rumpuserxen test] 32432: all pass - PUSHED

2014-12-17 Thread xen . org
flight 32432 rumpuserxen real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32432/ Perfect :-) All tests in this flight passed version targeted for testing: rumpuserxen 0a0e61c12101ca4fe48da63f09971bccd331819c baseline version: rumpuserxen

Re: [Xen-devel] [PATCH for 4.6 07/13] xen: Introduce a generic way to describe device

2014-12-17 Thread Zhang, Yang Z
Julien Grall wrote on 2014-12-17: diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h index 5f295f3..6ace79d 100644 --- a/xen/include/xen/pci.h +++ b/xen/include/xen/pci.h @@ -13,6 +13,7 @@ #include xen/irq.h #include xen/pci_regs.h #include xen/pfn.h +#include xen/device.h

[Xen-devel] [qemu-mainline test] 32429: tolerable FAIL - PUSHED

2014-12-17 Thread xen . org
flight 32429 qemu-mainline real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32429/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 32418 Tests which did not

Re: [Xen-devel] [PATCH v2] console: allocate ring buffer earlier

2014-12-17 Thread Don Slutz
On 12/11/14 07:08, Ian Campbell wrote: On Tue, 2014-12-09 at 17:34 +, Jan Beulich wrote: ... when conring_size= was specified on the command line. We can't really do this as early as we would want to when the option was not specified, as the default depends on knowing the system CPU count.

[Xen-devel] XL doesn't work on latest upstream Xen?

2014-12-17 Thread Kai Huang
Hi, I built and installed Xen from latest upstream Xen source code, but XL always failed to work. Do you know what's going on here? My environment is Lubuntu 14.04. Thanks in advance. I always got Permission denied error. root@kai-haswell:~# xl list libxl: error: libxl.c:561:libxl_list_domain:

Re: [Xen-devel] [RFC V9 3/4] domain snapshot design: xl

2014-12-17 Thread Chun Yan Liu
On 12/17/2014 at 08:28 PM, in message 20141217122817.gg1...@zion.uk.xensource.com, Wei Liu wei.l...@citrix.com wrote: On Tue, Dec 16, 2014 at 02:32:56PM +0800, Chunyan Liu wrote: Changes to V8: * xl won't manage snapshots, that means it won't maintain json files, won't maintain

Re: [Xen-devel] [RFC V9 2/4] domain snapshot overview

2014-12-17 Thread Chun Yan Liu
On 12/17/2014 at 08:17 PM, in message 20141217121750.gf1...@zion.uk.xensource.com, Wei Liu wei.l...@citrix.com wrote: On Tue, Dec 16, 2014 at 02:32:55PM +0800, Chunyan Liu wrote: Changes to V8: * add an overview document, so that one can has a overall look about the whole