[Xen-devel] [qemu-mainline test] 36080: trouble: blocked/broken/fail/pass

2015-03-10 Thread xen . org
flight 36080 qemu-mainline real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/36080/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-pvops 3 host-install(3) broken REGR. vs. 35893

[Xen-devel] VM Migration on ARM

2015-03-10 Thread Vijay Kilari
Hi Andrew, From Ian & Stefano, I came to know that you have introduced Migration framework v2 under below patch series http://marc.info/?l=xen-devel&m=141036915311145 I have few queries: 1) Is there any plans/timeline to support for ARM32/ARM64?. 2) Also does the Domain Image format specifi

Re: [Xen-devel] [PATCH v3] xen/arm: Do not allocate pte entries for MAP_SMALL_PAGES

2015-03-10 Thread Vijay Kilari
On Tue, Mar 10, 2015 at 5:22 PM, Ian Campbell wrote: > On Tue, 2015-03-10 at 11:45 +, Julien Grall wrote: >> On 09/03/15 16:08, Vijay Kilari wrote: >> > On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall >> > wrote: >> >> Hi Vijay, >> >> >> >> Given the introduction of the new helper, the title lo

[Xen-devel] [qemu-upstream-unstable test] 36074: regressions - trouble: broken/fail/pass

2015-03-10 Thread xen . org
flight 36074 qemu-upstream-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/36074/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rhel6hvm-amd 6 leak-check/basis(6) running in 34247 [st=running!] test-a

[Xen-devel] [PATCH v4 2/3] xen/arm: Add Cadence UART driver

2015-03-10 Thread Edgar E. Iglesias
Reviewed-by: Julien Grall Signed-off-by: Edgar E. Iglesias --- config/arm64.mk| 1 + xen/drivers/char/Makefile | 1 + xen/drivers/char/cadence-uart.c| 224 + xen/include/asm-arm/cadence-uart.h | 55 + 4 files chang

[Xen-devel] [PATCH v4 3/3] xen/arm: Add Xilinx ZynqMP early printk support

2015-03-10 Thread Edgar E. Iglesias
From: "Edgar E. Iglesias" Reviewed-by: Julien Grall Signed-off-by: Edgar E. Iglesias --- docs/misc/arm/early-printk.txt | 1 + xen/arch/arm/Rules.mk| 6 + xen/arch/arm/arm64/debug-cadence.inc | 45 3 files changed, 52 insertions(

[Xen-devel] [PATCH v4 1/3] xen/arm: Add Xilinx ZynqMP platform support

2015-03-10 Thread Edgar E. Iglesias
From: "Edgar E. Iglesias" Signed-off-by: Edgar E. Iglesias --- xen/arch/arm/platforms/Makefile| 1 + xen/arch/arm/platforms/xilinx-zynqmp.c | 41 ++ 2 files changed, 42 insertions(+) create mode 100644 xen/arch/arm/platforms/xilinx-zynqmp.c diff --git

[Xen-devel] [PATCH v4 0/3] Add support for Xilinx ZynqMP SoC

2015-03-10 Thread Edgar E. Iglesias
From: "Edgar E. Iglesias" Changelog: v3 -> v4: * Move the grant table range to a reserved area. (Julien review) v2 -> v3: * Fix coding style issues. (Julien review) v1 -> v2: * Rebase with upstream/staging to fix the device-tree device matching. (Ian review) Edgar E. Iglesias (3): xen/arm

[Xen-devel] CfP 10th Workshop on Virtualization in High-Performance Cloud Computing (VHPC '15)

2015-03-10 Thread VHPC 15
= CALL FOR PAPERS 10th Workshop on Virtualization in High-Performance Cloud Computing (VHPC '15) held in conjunction with Euro-Par 2015, August 24-28, Vienna, Austria (Springer LNCS) ===

Re: [Xen-devel] Failed to launch xen on J6 evm

2015-03-10 Thread Korupol, Naveen (EXT)
Hi Got some progress in loading xen hyp and then sits blank. Here is the log: U-Boot SPL 2015.04-rc1 (Mar 10 2015 - 13:35:08) DRA752 ES1.1 reading args spl_load_image_fat_os: error reading image args, err - -1 reading u-boot.img reading u-boot.img U-Boot 2015.04-rc1 (Mar 10 2015 - 13:35:08)

Re: [Xen-devel] Failed to launch xen on J6 evm

2015-03-10 Thread Korupol, Naveen (EXT)
Hi Some more progress and then PANIC.. says (XEN) GICv2: Cannot find the maintenance IRQ Here is the log: U-Boot SPL 2015.04-rc1 (Mar 10 2015 - 13:35:08) DRA752 ES1.1 reading args spl_load_image_fat_os: error reading image args, err - -1 reading u-boot.img reading u-boot.img U-Boot 2015.04-rc

Re: [Xen-devel] [PATCH 25/45] gntalloc.h: include stdint.h in userspace

2015-03-10 Thread Mikko Rapeli
On Wed, Feb 18, 2015 at 11:53:22AM +, David Vrabel wrote: > On 16/02/15 23:05, Mikko Rapeli wrote: > > Fixes compilation error: > > > > xen/gntalloc.h:22:2: error: unknown type name ‘uint16_t’ > > > > Signed-off-by: Mikko Rapeli > > --- > > include/uapi/xen/gntalloc.h | 6 ++ > > 1 file

Re: [Xen-devel] [PATCH v3 0/2] Add support for Xilinx ZynqMP SoC

2015-03-10 Thread Edgar E. Iglesias
On Tue, Mar 10, 2015 at 11:30:10AM +, Julien Grall wrote: > Hello Edgar, > > Thank you for adding support of the ZynqMP. > > On 10/03/15 02:49, Edgar E. Iglesias wrote: > > From: "Edgar E. Iglesias" > > > > Adds support for the Cadence UART in Xilinx ZynqMP. The > > rest of the ZynqMP platf

Re: [Xen-devel] [PATCH v3 20/24] xen/passthrough: Extend XEN_DOMCTL_assign_device to support DT device

2015-03-10 Thread Daniel De Graaf
On 03/10/2015 07:07 PM, Julien Grall wrote: Hi Daniel, On 10/03/2015 22:45, Daniel De Graaf wrote: BTW, do you have any pointer on how to write a policy for device/IRQ passthrough? There is a bit of documentation in xsm-flask.txt about device labeling, which is the hard part of making passthr

Re: [Xen-devel] [PATCH v3 20/24] xen/passthrough: Extend XEN_DOMCTL_assign_device to support DT device

2015-03-10 Thread Julien Grall
Hi Daniel, On 10/03/2015 22:45, Daniel De Graaf wrote: BTW, do you have any pointer on how to write a policy for device/IRQ passthrough? There is a bit of documentation in xsm-flask.txt about device labeling, which is the hard part of making passthrough work. Labels can be set either statical

Re: [Xen-devel] [PATCH v3 20/24] xen/passthrough: Extend XEN_DOMCTL_assign_device to support DT device

2015-03-10 Thread Daniel De Graaf
On 03/10/2015 12:52 PM, Julien Grall wrote: Hi Daniel, On 23/02/15 16:25, Daniel De Graaf wrote: On 02/20/2015 12:17 PM, Ian Campbell wrote: On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote: TODO: Update the commit message A device node is described by a path. It will be used to retriev

Re: [Xen-devel] [PATCH 1/4] x86/MSI-X: be more careful during teardown

2015-03-10 Thread Andrew Cooper
On 10/03/15 16:27, Jan Beulich wrote: > When a device gets detached from a guest, pciback will clear its > command register, thus disabling both memory and I/O decoding. The > disabled memory decoding, however, has an effect on the MSI-X table > accesses the hypervisor does: These won't have the in

[Xen-devel] [xen-unstable test] 36062: trouble: broken/fail/pass

2015-03-10 Thread xen . org
flight 36062 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/36062/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 35887

Re: [Xen-devel] [PATCH 2/2] x86emul: simplify asm() constraints

2015-03-10 Thread Andrew Cooper
On 10/03/15 16:36, Jan Beulich wrote: > Use + on outputs instead of = and a matching input. Allow not just > memory for the _eflags operand (it turns out that recent gcc produces > worse code when also doing this for _dst.val, so the latter is being > avoided). > > Signed-off-by: Jan Beulich > > -

Re: [Xen-devel] [PATCH 1/2] x86emul: drop unused "bigval" fields from struct operand

2015-03-10 Thread Andrew Cooper
On 10/03/15 16:35, Jan Beulich wrote: > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 2/2] iommu: add rmrr Xen command line option for misc rmrrs

2015-03-10 Thread Elena Ufimtseva
On Tue, Mar 10, 2015 at 04:27:15PM +, Jan Beulich wrote: > >>> On 10.03.15 at 17:16, wrote: > > On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote: > >> > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com] > >> > --- a/xen/drivers/passthrough/vtd/iommu.c > >> > +++ b

[Xen-devel] [rumpuserxen test] 36177: regressions - FAIL

2015-03-10 Thread xen . org
flight 36177 rumpuserxen real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/36177/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866 build-i386-rumpuserxe

[Xen-devel] [PATCH v4 2/5] Qemu-Xen-vTPM: Xen frontend driver infrastructure

2015-03-10 Thread Quan Xu
This patch adds infrastructure for xen front drivers living in qemu, so drivers don't need to implement common stuff on their own. It's mostly xenbus management stuff: some functions to access XenStore, setting up XenStore watches, callbacks on device discovery and state changes, and handle event

[Xen-devel] [PATCH] SeaBios/vTPM: Enable Xen stubdom vTPM for HVM virtual machine

2015-03-10 Thread Quan Xu
Signed-off-by: Quan Xu Signed-off-by: Stefan Berger --- Makefile | 2 +- src/post.c | 3 + src/tpm.c | 309 + src/tpm.h | 141 4 files changed, 454 insertions(+), 1 deletion(-) create mode 100644 sr

[Xen-devel] [PATCH] SeaBios/vTPM: Enable Xen stubdom vTPM for HVM virtual machine

2015-03-10 Thread Quan Xu
This patch series are only the SeaBios part to enable stubdom vTPM for HVM virtual machine. It will work with Qemu patch series and Xen patch series. *INTRODUCTION* The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM functio

[Xen-devel] [PATCH v3 3/7] vTPM: add TPM TCPA and SSDT for HVM virtual machine when vTPM is added

2015-03-10 Thread Quan Xu
Signed-off-by: Quan Xu --- tools/firmware/hvmloader/acpi/build.c | 7 --- tools/libxl/libxl_create.c| 5 - 2 files changed, 8 insertions(+), 4 deletions(-) diff --git a/tools/firmware/hvmloader/acpi/build.c b/tools/firmware/hvmloader/acpi/build.c index 1431296..49f6772 10064

[Xen-devel] [PATCH v3 2/7] vTPM: limit libxl__add_vtpms() function to para virtual machine

2015-03-10 Thread Quan Xu
Signed-off-by: Quan Xu --- tools/libxl/libxl_create.c | 11 +-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c index b1ff5ae..66877b3 100644 --- a/tools/libxl/libxl_create.c +++ b/tools/libxl/libxl_create.c @@ -1358,8

[Xen-devel] [PATCH v4 1/5] Qemu-Xen-vTPM: Support for Xen stubdom vTPM command line options

2015-03-10 Thread Quan Xu
--Changes in v4: -qapi schema enhancement. -remove no need code. Signed-off-by: Quan Xu --- configure| 14 ++ hmp.c| 2 ++ qapi-schema.json | 18 -- qemu-options.hx | 13 +++-- tpm.c| 7 ++- 5 files changed, 49 insertio

[Xen-devel] [PATCH v4 5/5] Qemu-Xen-vTPM: QEMU machine class is initialized before tpm_init()

2015-03-10 Thread Quan Xu
make sure QEMU machine class is initialized and QEMU has registered Xen stubdom vTPM driver when call tpm_init() Signed-off-by: Quan Xu --- vl.c | 17 +++-- 1 file changed, 11 insertions(+), 6 deletions(-) diff --git a/vl.c b/vl.c index f6b3546..0bbdaa1 100644 --- a/vl.c +++ b/vl.c

[Xen-devel] [PATCH v3 0/7] vTPM: Xen stubdom vTPM for HVM virtual machine

2015-03-10 Thread Quan Xu
This patch series are only the Xen part to enable stubdom vTPM for HVM virtual machine. it will work w/ Qemu patch series and seaBios patch series. Change QEMU_STUBDOM_VTPM compile option from 'n' to 'y', when the Qemu/SeaBios patch series are merged. *INTRODUCTION*

[Xen-devel] [PATCH v4 0/5] QEMU:Xen stubdom vTPM for HVM virtual machine

2015-03-10 Thread Quan Xu
*INTRODUCTION* The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM functionality to virtual machines (Fedora, Ubuntu, Redhat, Windows .etc). This allows programs to interact with a TPM in a virtual machine the same way they interact with a TPM on the physical system. Each virt

[Xen-devel] [PATCH v4 3/5] Qemu-Xen-vTPM: Register Xen stubdom vTPM frontend driver

2015-03-10 Thread Quan Xu
This drvier transfers any request/repond between TPM xenstubdoms driver and Xen vTPM stubdom, and facilitates communications between Xen vTPM stubdom domain and vTPM xenstubdoms driver. It is a glue for the TPM xenstubdoms driver and Xen stubdom vTPM domain that provides the actual TPM functionalit

[Xen-devel] [PATCH v3 7/7] vTPM: add QEMU_STUBDOM_VTPM compile option

2015-03-10 Thread Quan Xu
Signed-off-by: Quan Xu --- Config.mk | 4 tools/Makefile | 7 +++ 2 files changed, 11 insertions(+) diff --git a/Config.mk b/Config.mk index a5b6c41..5a5f413 100644 --- a/Config.mk +++ b/Config.mk @@ -254,6 +254,10 @@ endif OVMF_UPSTREAM_REVISION ?= 447d264115c476142f884af0be28762

[Xen-devel] [PATCH v3 4/7] vTPM: add vTPM device for HVM virtual machine

2015-03-10 Thread Quan Xu
refactor libxl__device_vtpm_add to call the right helpers libxl__device_vtpm_add_{pv,hvm}. For HVM virtual machine, it does not support hot-plug and hot-unplug, as it requires SeaBios to initalize ACPI and virtual MMIO space for TPM TIS when virtual machine starts. Signed-off-by: Quan Xu --- too

[Xen-devel] [PATCH v3 6/7] vTPM: Parse envent string from QEMU frontend

2015-03-10 Thread Quan Xu
Signed-off-by: Quan Xu --- extras/mini-os/tpmback.c | 21 - 1 file changed, 16 insertions(+), 5 deletions(-) diff --git a/extras/mini-os/tpmback.c b/extras/mini-os/tpmback.c index 8a0a983..b8f4c8f 100644 --- a/extras/mini-os/tpmback.c +++ b/extras/mini-os/tpmback.c @@ -732,11

[Xen-devel] [PATCH v3 5/7] vTPM: Delete the xenstore directory of frontend device

2015-03-10 Thread Quan Xu
when virtual machine is destroyed. Signed-off-by: Quan Xu --- tools/libxl/libxl_device.c | 61 +++--- 1 file changed, 57 insertions(+), 4 deletions(-) diff --git a/tools/libxl/libxl_device.c b/tools/libxl/libxl_device.c index b1a71fe..668bf71 100644 --- a

Re: [Xen-devel] [PATCH v3 20/24] xen/passthrough: Extend XEN_DOMCTL_assign_device to support DT device

2015-03-10 Thread Julien Grall
Hi Daniel, On 23/02/15 16:25, Daniel De Graaf wrote: > On 02/20/2015 12:17 PM, Ian Campbell wrote: >> On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote: >>> TODO: Update the commit message >>> >>> A device node is described by a path. It will be used to retrieved the >>> node in the device tre

[Xen-devel] [PATCH 1/2] x86emul: drop unused "bigval" fields from struct operand

2015-03-10 Thread Jan Beulich
Signed-off-by: Jan Beulich --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/arch/x86/x86_emulate/x86_emulate.c @@ -313,17 +313,11 @@ struct operand { enum { OP_REG, OP_MEM, OP_IMM, OP_NONE } type; unsigned int bytes; -/* Up to 128-byte operand value, addressable as ulong or

Re: [Xen-devel] [Xen-users] Grant reference batch transmission

2015-03-10 Thread Ian Campbell
Hi Gareth, I think this counts as a -devel question, so I've added -devel and moved -users to bcc (-users is more for end users). I've done less quote trimming than usual for the other folks on -devel. On Tue, 2015-03-10 at 14:15 +, Gareth Stockwell wrote: > What is the recommended way to tra

[Xen-devel] [PATCH 0/2] x86emul: XSA-123 follow-up

2015-03-10 Thread Jan Beulich
1: drop unused "bigval" fields from struct operand 2: simplify asm() constraints Signed-off-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 2/2] iommu: add rmrr Xen command line option for misc rmrrs

2015-03-10 Thread Jan Beulich
>>> On 10.03.15 at 17:16, wrote: > On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote: >> > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com] >> > --- a/xen/drivers/passthrough/vtd/iommu.c >> > +++ b/xen/drivers/passthrough/vtd/iommu.c >> > @@ -1232,6 +1232,38 @@ static

[Xen-devel] [PATCH 3/4] x86/MSI-X: reduce fiddling with control register during restore

2015-03-10 Thread Jan Beulich
Rather than disabling and enabling MSI-X once per vector, do it just once per device. Signed-off-by: Jan Beulich --- a/xen/arch/x86/msi.c +++ b/xen/arch/x86/msi.c @@ -1218,6 +1218,9 @@ int pci_restore_msi_state(struct pci_dev struct msi_desc *entry, *tmp; struct irq_desc *desc; st

[Xen-devel] [PATCH 2/4] x86/MSI-X: access MSI‑X table only after having enabled MSI‑X

2015-03-10 Thread Jan Beulich
As done in Linux by f598282f51 ("PCI: Fix the NIU MSI-X problem in a better way") and its broken predecessor, make sure we don't access the MSI-X table without having enabled MSI-X first, using the mask-all flag instead to prevent interrupts from occurring. Signed-off-by: Jan Beulich --- a/xen/a

[Xen-devel] [PATCH 1/4] x86/MSI-X: be more careful during teardown

2015-03-10 Thread Jan Beulich
When a device gets detached from a guest, pciback will clear its command register, thus disabling both memory and I/O decoding. The disabled memory decoding, however, has an effect on the MSI-X table accesses the hypervisor does: These won't have the intended effect anymore. Even worse, for PCIe de

[Xen-devel] [PATCH 0/4] x86/MSI-X: XSA-120 follow-up

2015-03-10 Thread Jan Beulich
The problem requiring the first patch here is actually what lead to XSA-120. 1: be more careful during teardown 2: access MSI-X table only after having enabled MSI-X 3: reduce fiddling with control register during restore 4: cleanup Signed-off-by: Jan Beulich __

Re: [Xen-devel] [PATCH 2/2] iommu: add rmrr Xen command line option for misc rmrrs

2015-03-10 Thread Elena Ufimtseva
On Tue, Mar 10, 2015 at 02:47:24AM +, Tian, Kevin wrote: > > From: elena.ufimts...@oracle.com [mailto:elena.ufimts...@oracle.com] > > Sent: Monday, March 09, 2015 10:43 PM > > > > From: Elena Ufimtseva > > > > On some platforms RMRR regions may be not specified > > in ACPI and thus will not

Re: [Xen-devel] [PATCH] x86: synchronize PCI config space access decoding

2015-03-10 Thread Jan Beulich
>>> On 10.03.15 at 12:24, wrote: > On 10/03/15 07:30, Jan Beulich wrote: > On 09.03.15 at 19:49, wrote: >>> On 09/03/15 16:08, Jan Beulich wrote: Both PV and HVM logic have similar but not similar enough code here. Synchronize the two so that - in the HVM case we don't uncondit

[Xen-devel] [xen-4.5-testing test] 36006: tolerable trouble: broken/fail/pass - PUSHED

2015-03-10 Thread xen . org
flight 36006 xen-4.5-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/36006/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-pvh-intel 3 host-install(3) broken pass in 35937 test-amd64-amd64-xl-multivcpu

Re: [Xen-devel] [PATCH v3 18/24] xen/passthrough: iommu_deassign_device_dt: By default reassign device to nobody

2015-03-10 Thread Julien Grall
Hi, On 23/02/15 15:34, Ian Campbell wrote: > On Mon, 2015-02-23 at 10:10 +, Julien Grall wrote: >> >> On 20/02/2015 17:04, Ian Campbell wrote: >>> On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote: Currently, when the device is deassigned from a domain, we directly reassign

Re: [Xen-devel] [PATCH v4 5/9] sysctl: Add sysctl interface for querying PCI topology

2015-03-10 Thread Andrew Cooper
On 10/03/15 02:27, Boris Ostrovsky wrote: > Signed-off-by: Boris Ostrovsky > --- > > Changes in v4: > * No buffer allocation in sysctl, copy data device-by-device > * Replace INVALID_TOPOLOGY_ID with XEN_INVALID_NODE_ID > > xen/common/sysctl.c | 59 > +++

Re: [Xen-devel] [PATCH v4 3/9] sysctl: Make XEN_SYSCTL_topologyinfo sysctl a little more efficient

2015-03-10 Thread Boris Ostrovsky
On 03/10/2015 10:29 AM, Andrew Cooper wrote: On 10/03/15 02:27, Boris Ostrovsky wrote: Instead of copying data for each field in xen_sysctl_topologyinfo separately put cpu/socket/node into a single structure and do a single copy for each processor. Do not use max_cpu_index, which is almost alwa

Re: [Xen-devel] [PATCH v4 4/9] sysctl: Make XEN_SYSCTL_numainfo a little more efficient

2015-03-10 Thread Andrew Cooper
On 10/03/15 02:27, Boris Ostrovsky wrote: > Make sysctl NUMA topology query use fewer copies by combining some > fields into a single structure and copying distances for each node > in a single copy. > > Instead of using max_node_index for passing number of nodes keep this > value in num_nodes: alm

Re: [Xen-devel] [PATCH v4 3/9] sysctl: Make XEN_SYSCTL_topologyinfo sysctl a little more efficient

2015-03-10 Thread Andrew Cooper
On 10/03/15 02:27, Boris Ostrovsky wrote: > Instead of copying data for each field in xen_sysctl_topologyinfo separately > put cpu/socket/node into a single structure and do a single copy for each > processor. > > Do not use max_cpu_index, which is almost always used for calculating number > CPUs (

Re: [Xen-devel] [PATCH v3 15/24] xen/dts: Provide an helper to get a DT node from a path provided by a guest

2015-03-10 Thread Julien Grall
On 23/02/15 16:27, Ian Campbell wrote: > On Mon, 2015-02-23 at 16:01 +, Julien Grall wrote: >> Hi Ian, >> >> On 23/02/15 15:30, Ian Campbell wrote: >>> On Tue, 2015-01-13 at 14:25 +, Julien Grall wrote: >>> +/* This limit is used by the hypercalls to restrict the size of the path

Re: [Xen-devel] [PATCH 5/5] AMD IOMMU: widen NUMA nodes to be allocated from

2015-03-10 Thread Boris Ostrovsky
On 03/10/2015 03:35 AM, Jan Beulich wrote: On 09.03.15 at 20:02, wrote: I agree that having the IO page tables on the NUMA node that is closest to the IOMMU would be beneficial. And I already withdrew this patch and the corresponding VT-d one. However, I am not sure at the moment that this i

Re: [Xen-devel] [PATCH v4 1/9] numa: __node_distance() should return u8

2015-03-10 Thread Boris Ostrovsky
On 03/10/2015 07:53 AM, Andrew Cooper wrote: On 10/03/15 02:27, Boris Ostrovsky wrote: SLIT values are byte-sized and some of them (0-9 and 255) have special meaning. Adjust __node_distance() to reflect this and modify scrub_heap_pages() to deal with __node_distance() returning an invalid SLIT e

Re: [Xen-devel] [PATCH v4 9/9] libxl: Add interface for querying hypervisor about PCI topology

2015-03-10 Thread Dario Faggioli
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote: > .. and use this new interface to display it along with CPU topology > and NUMA information when 'xl info -n' command is issued > > The output will look like > ... > cpu_topology : > cpu:coresocket node > 0: 0

Re: [Xen-devel] [PATCH v4 0/9] Display IO topology when PXM data is available (plus some cleanup)

2015-03-10 Thread Jan Beulich
>>> On 10.03.15 at 14:39, wrote: > On 03/10/2015 04:20 AM, Jan Beulich wrote: > On 10.03.15 at 03:27, wrote: >>> Changes in v4: >>> * Split cputopology and NUMA info changes into separate patches >>> * Added patch#1 (partly because patch#4 needs to know when when distance is >>> invalid, >>>

Re: [Xen-devel] [PATCH v4 8/9] libxl/libxc: Move libxl_get_numainfo()'s hypercall buffer management to libxc

2015-03-10 Thread Dario Faggioli
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote: > xc_numainfo() is not expected to be used on a hot path and therefore > hypercall buffer management can be pushed into libxc. This will simplify > life for callers. > > Also update error logging macros. > > Signed-off-by: Boris Ostrovsky

Re: [Xen-devel] [PATCH v4 7/9] libxl/libxc: Move libxl_get_cpu_topology()'s hypercall buffer management to libxc

2015-03-10 Thread Dario Faggioli
On Mon, 2015-03-09 at 22:27 -0400, Boris Ostrovsky wrote: > xc_cputopoinfo() is not expected to be used on a hot path and therefore > hypercall buffer management can be pushed into libxc. This will simplify > life for callers. > > Also update error reporting macros. > > Signed-off-by: Boris Ostro

Re: [Xen-devel] [PATCH v4 0/9] Display IO topology when PXM data is available (plus some cleanup)

2015-03-10 Thread Boris Ostrovsky
On 03/10/2015 04:20 AM, Jan Beulich wrote: On 10.03.15 at 03:27, wrote: Changes in v4: * Split cputopology and NUMA info changes into separate patches * Added patch#1 (partly because patch#4 needs to know when when distance is invalid, i.e. NUMA_NO_DISTANCE) * Split sysctl version update in

Re: [Xen-devel] [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests

2015-03-10 Thread Jan Beulich
>>> On 10.03.15 at 14:18, wrote: > On 10/03/15 13:06, Jan Beulich wrote: > On 10.03.15 at 13:51, wrote: >>> Hi, >>> >>> On 27/02/15 11:33, Roger Pau Monne wrote: diff --git a/xen/drivers/passthrough/iommu.c >>> b/xen/drivers/passthrough/iommu.c index cc12735..7fcbbb1 100644 --

Re: [Xen-devel] [PATCHv1] xen/balloon: disable memory hotplug in PV guests

2015-03-10 Thread Boris Ostrovsky
On 03/10/2015 07:40 AM, David Vrabel wrote: On 09/03/15 14:10, David Vrabel wrote: Memory hotplug doesn't work with PV guests because: a) The p2m cannot be expanded to cover the new sections. Broken by 054954eb051f35e74b75a566a96fe756015352c8 (xen: switch to linear virtual mapped sparse p2m

Re: [Xen-devel] [PATCH v2] sched: credit2: respect per-vcpu hard affinity

2015-03-10 Thread Dario Faggioli
On Sun, 2015-03-08 at 21:11 -1000, Justin Weaver wrote: > Thanks to all for the comments! I've implemented most of the changes > recommended here in the v2 review. I should have a new patch set ready > this week (with an updated soft affinity patch as well). > Great! :-) > > Oh, and this is what

Re: [Xen-devel] vTPM Deep Quote validation

2015-03-10 Thread Emil Condrea
I think it is fair to read the PCRs before performing Deep Quote and after and to retry if something changed. It is an interesting suggestion to extend the tpm character device driver in order to obtain atomicity. I will think about it. Thanks for clarifying. On Mon, Mar 9, 2015 at 7:26 PM, Daniel

Re: [Xen-devel] [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests

2015-03-10 Thread Julien Grall
On 10/03/15 13:06, Jan Beulich wrote: On 10.03.15 at 13:51, wrote: >> Hi, >> >> On 27/02/15 11:33, Roger Pau Monne wrote: >>> diff --git a/xen/drivers/passthrough/iommu.c >> b/xen/drivers/passthrough/iommu.c >>> index cc12735..7fcbbb1 100644 >>> --- a/xen/drivers/passthrough/iommu.c >>> +++

Re: [Xen-devel] [PATCH] stubdom: export XEN_ROOT in makefile

2015-03-10 Thread Samuel Thibault
Wei Liu, le Tue 10 Mar 2015 13:14:39 +, a écrit : > ... because XEN_ROOT is used in mini-os's Config.mk. > > Signed-off-by: Wei Liu Acked-by: Samuel Thibault > --- > stubdom/Makefile | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/stubdom/Makefile b/stubdom/Makefile > index f339

Re: [Xen-devel] [PATCH] mini-os: replace XEN_TARGET_ARCH with MINIOS_TARGET_ARCH

2015-03-10 Thread Samuel Thibault
Wei Liu, le Tue 10 Mar 2015 13:14:38 +, a écrit : > One place was missed when I did the replacement in 55f7cd7427 ("Mini-OS: > standalone build"). > > Signed-off-by: Wei Liu Acked-by: Samuel Thibault > --- > Makefile | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git

[Xen-devel] [PATCH] mini-os: replace XEN_TARGET_ARCH with MINIOS_TARGET_ARCH

2015-03-10 Thread Wei Liu
One place was missed when I did the replacement in 55f7cd7427 ("Mini-OS: standalone build"). Signed-off-by: Wei Liu --- Makefile | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Makefile b/Makefile index f16520e..862f766 100644 --- a/Makefile +++ b/Makefile @@ -165,7 +165,7 @@

[Xen-devel] [PATCH] stubdom: export XEN_ROOT in makefile

2015-03-10 Thread Wei Liu
... because XEN_ROOT is used in mini-os's Config.mk. Signed-off-by: Wei Liu --- stubdom/Makefile | 1 + 1 file changed, 1 insertion(+) diff --git a/stubdom/Makefile b/stubdom/Makefile index f339b20..d9e7e40 100644 --- a/stubdom/Makefile +++ b/stubdom/Makefile @@ -1,6 +1,7 @@ XEN_ROOT = $(CURDI

[Xen-devel] Stubdom build fix

2015-03-10 Thread Wei Liu
Hi all Songtao Liu reported some issues with stubdom. This patch series tights up those loose ends that caused the problem he saw [0]. I've tested this series myself, but it would be good if Songtao can also give it a try and confirm it fixes those issues. Note that the patch marked with mini-o

Re: [Xen-devel] [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests

2015-03-10 Thread Jan Beulich
>>> On 10.03.15 at 13:51, wrote: > Hi, > > On 27/02/15 11:33, Roger Pau Monne wrote: >> diff --git a/xen/drivers/passthrough/iommu.c > b/xen/drivers/passthrough/iommu.c >> index cc12735..7fcbbb1 100644 >> --- a/xen/drivers/passthrough/iommu.c >> +++ b/xen/drivers/passthrough/iommu.c >> @@ -332,7

Re: [Xen-devel] [PATCH v2] xen/iommu: fix usage of shared EPT/IOMMU page tables on PVH guests

2015-03-10 Thread Julien Grall
Hi, On 27/02/15 11:33, Roger Pau Monne wrote: > diff --git a/xen/drivers/passthrough/iommu.c b/xen/drivers/passthrough/iommu.c > index cc12735..7fcbbb1 100644 > --- a/xen/drivers/passthrough/iommu.c > +++ b/xen/drivers/passthrough/iommu.c > @@ -332,7 +332,8 @@ void iommu_share_p2m_table(struct dom

[Xen-devel] [PATCH v4] xen-scsiback: define a pr_fmt macro with xen-pvscsi

2015-03-10 Thread Tao Chen
Add the {xen-pvscsi: } prefix in pr_fmt and remove DPRINTK, then replace all DPRINTK with pr_debug. Also fixed up some comments just as eliminate redundant whitespace and format the code. These will make the code easier to read. Signed-off-by: Tao Chen --- drivers/xen/xen-scsiback.c | 75 +

Re: [Xen-devel] [PATCH v2] stubdom: fix make clean and distclean on a freshly cloned tree

2015-03-10 Thread Wei Liu
On Tue, Mar 10, 2015 at 06:42:30AM +, Liu, SongtaoX wrote: > > -Original Message- > > From: xen-devel-boun...@lists.xen.org > > [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Ian Campbell > > Sent: Tuesday, March 03, 2015 1:00 AM > > To: Wei Liu > > Cc: Samuel Thibault; Stefano S

[Xen-devel] [xen-4.4-testing test] 35991: regressions - trouble: blocked/broken/fail/pass

2015-03-10 Thread xen . org
flight 35991 xen-4.4-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/35991/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-qemuu-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 35919 build-amd64-rumpu

[Xen-devel] OpenStack - Libvirt+Xen CI overview

2015-03-10 Thread Bob Ball
For the last few weeks Anthony and I have been working on creating a CI environment to run against all OpenStack jobs. We're now in a position where we can share the current status, overview of how it works and next steps. We actively want to support involvement in this effort from others with

[Xen-devel] Xen Security Advisory 123 (CVE-2015-2151) - Hypervisor memory corruption due to x86 emulator flaw

2015-03-10 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2015-2151 / XSA-123 version 4 Hypervisor memory corruption due to x86 emulator flaw UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION ===

[Xen-devel] Xen Security Advisory 120 (CVE-2015-2150) - Non-maskable interrupts triggerable by guests

2015-03-10 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2015-2150 / XSA-120 version 4 Non-maskable interrupts triggerable by guests UPDATES IN VERSION 4 Public release. ISSUE DESCRIPTION ==

[Xen-devel] Xen Security Advisory 124 - Non-standard PCI device functionality may render pass-through insecure

2015-03-10 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory XSA-124 version 2 Non-standard PCI device functionality may render pass-through insecure UPDATES IN VERSION 2 Clarify scope. PCI config space backdoors a

Re: [Xen-devel] [PATCH v4 1/9] numa: __node_distance() should return u8

2015-03-10 Thread Andrew Cooper
On 10/03/15 02:27, Boris Ostrovsky wrote: > SLIT values are byte-sized and some of them (0-9 and 255) have > special meaning. Adjust __node_distance() to reflect this and > modify scrub_heap_pages() to deal with __node_distance() returning > an invalid SLIT entry. > > Signed-off-by: Boris Ostrovsky

Re: [Xen-devel] [PATCH v3] xen/arm: Do not allocate pte entries for MAP_SMALL_PAGES

2015-03-10 Thread Ian Campbell
On Tue, 2015-03-10 at 11:45 +, Julien Grall wrote: > On 09/03/15 16:08, Vijay Kilari wrote: > > On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall > > wrote: > >> Hi Vijay, > >> > >> Given the introduction of the new helper, the title looks wrong to me. > >> > >> > >> On 09/03/2015 08:59, vijay.kil

Re: [Xen-devel] [PATCH] xen/arm: gic: GICv2 & GICv3 only supports 1020 physical interrupts

2015-03-10 Thread Julien Grall
Hi Ian, On 09/03/15 16:06, Ian Campbell wrote: > On Mon, 2015-03-09 at 14:00 +0200, Julien Grall wrote: >> Hi Ian, >> >> On 05/03/2015 19:00, Ian Campbell wrote: >>> On Tue, 2015-03-03 at 16:35 +, Julien Grall wrote: +gicv3_info.nr_lines = min((unsigned)1020, nr_lines); >>> >>> "1020U

Re: [Xen-devel] [PATCH v3] xen/arm: Do not allocate pte entries for MAP_SMALL_PAGES

2015-03-10 Thread Julien Grall
On 09/03/15 16:08, Vijay Kilari wrote: > On Mon, Mar 9, 2015 at 5:46 PM, Julien Grall wrote: >> Hi Vijay, >> >> Given the introduction of the new helper, the title looks wrong to me. >> >> >> On 09/03/2015 08:59, vijay.kil...@gmail.com wrote: >>> >>> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/m

Re: [Xen-devel] [PATCHv1] xen/balloon: disable memory hotplug in PV guests

2015-03-10 Thread David Vrabel
On 09/03/15 14:10, David Vrabel wrote: > Memory hotplug doesn't work with PV guests because: > > a) The p2m cannot be expanded to cover the new sections. Broken by 054954eb051f35e74b75a566a96fe756015352c8 (xen: switch to linear virtual mapped sparse p2m list). This one would be non-trivial to

Re: [Xen-devel] [PATCH v3 1/2] xen/arm: Add Cadence UART driver

2015-03-10 Thread Julien Grall
Hello Edgar, On 10/03/15 02:49, Edgar E. Iglesias wrote: > Signed-off-by: Edgar E. Iglesias Reviewed-by: Julien Grall Regards, -- Julien Grall ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v3 0/2] Add support for Xilinx ZynqMP SoC

2015-03-10 Thread Julien Grall
Hello Edgar, Thank you for adding support of the ZynqMP. On 10/03/15 02:49, Edgar E. Iglesias wrote: > From: "Edgar E. Iglesias" > > Adds support for the Cadence UART in Xilinx ZynqMP. The > rest of the ZynqMP platform is discovered via device-tree. Did you make sure that the default grant tab

Re: [Xen-devel] [PATCH] x86: synchronize PCI config space access decoding

2015-03-10 Thread Andrew Cooper
On 10/03/15 07:30, Jan Beulich wrote: On 09.03.15 at 19:49, wrote: >> On 09/03/15 16:08, Jan Beulich wrote: >>> Both PV and HVM logic have similar but not similar enough code here. >>> Synchronize the two so that >>> - in the HVM case we don't unconditionally try to access extended >>> conf

[Xen-devel] [PATCH v2] EFI: Fix getting EFI variable list on some systems

2015-03-10 Thread Ross Lagerwall
Copy the entire output buffer to the guest because some firmwares update size on successful calls (contrary to the spec) and the buffer may contain data beyond the output size that the firmware requires on a subsequent GetNextVariableName() call (e.g. a NULL character). Note that this shouldn't ch

Re: [Xen-devel] CPU emulation on Xen

2015-03-10 Thread Stefano Stabellini
On Tue, 10 Mar 2015, Bunny Mintoo wrote: > Thanks for your mail.  > My architecture is x86 compatible. I have just added new instructions over > existing x86 ISA.These new instructions are now to be > taught to the CPU. In QEMU, I was able to mimic the new CPU working with > software changes (cha

Re: [Xen-devel] [PATCH WIP 0/10] *hacky* basic support for Nvidia Tegra K1/Jetson board (probably ignore)

2015-03-10 Thread Ian Campbell
On Tue, 2015-03-10 at 09:01 +, Ian Campbell wrote: Forgot to say -- this needs some u-boot patches to enable booting in hypmode. Jan Kiska has picked up the dev work of those, I tested using v4 from http://lists.denx.de/pipermail/u-boot/2015-February/206557.html applied on top of u-boot-tegra.

[Xen-devel] [v2][PATCH 1/2] libxl: introduce libxl__is_igd_vga_passthru

2015-03-10 Thread Tiejun Chen
While working with qemu, IGD is a specific device in the case of pass through so we need to identify that to handle more later. Here we define a table to record all IGD types currently we can support. Also we need to introduce two helper functions to get vendor and device ids to lookup that table.

[Xen-devel] [v2][PATCH 2/2] libxl: introduce gfx_passthru_kind

2015-03-10 Thread Tiejun Chen
Although we already have 'gfx_passthru' in b_info, this doesn' suffice after we want to handle IGD specifically. Now we define a new field of type, gfx_passthru_kind, to indicate we're trying to pass IGD. Actually this means we can benefit this to support other specific devices just by extending gf

[Xen-devel] [v2][PATCH 0/2] libxl: try to support IGD passthrough for qemu upstream

2015-03-10 Thread Tiejun Chen
v2: * Refine patch #2's head description * Improve codes quality inside patch #1 based on Wei's comments * Refill the summary inside patch #0 based on Konrad and Wei's suggestion When we're working to support IGD GFX passthrough with qemu upstream, instead of "-gfx_passthru" we'd like to make th

Re: [Xen-devel] [PATCH OSSTEST] Arrange for core dumps to be placed in /var/core and collect them

2015-03-10 Thread Ian Campbell
On Mon, 2015-03-09 at 17:54 -0400, Don Slutz wrote: > > On 03/09/15 11:40, Ian Campbell wrote: > > Refactor the $kvp_replace helper in ts-xen-install into a generic > > helper (which requires using ::EO and ::EI for namespacing) for use > > with target_editfile and use it to edit /etc/sysctl.conf

Re: [Xen-devel] [PATCH] tools/libxl: cleanup one libxl__calloc() usage

2015-03-10 Thread Wei Liu
On Tue, Mar 10, 2015 at 02:28:16PM +0800, Tiejun Chen wrote: > Its pointless because internally, libxl__calloc() would always > terminate program execution if failed, > > libxl__calloc() > | > + void *ptr = calloc(nmemb, size); > + if (!ptr) libxl__alloc_failed(CTX, __func__, nmemb, si

[Xen-devel] [PATCH WIP 0/10] *hacky* basic support for Nvidia Tegra K1/Jetson board (probably ignore)

2015-03-10 Thread Ian Campbell
There is a lot of hacky and WIP stuff here, including a serial driver issue (FIFO depth? Interrupts?) which I haven't gotten to the bottom of yet. But with these hacks and sync_console I can boot on the platform and run guests etc. Actually only up to and including patch #7 "HACK: xen: arm: tryin

[Xen-devel] [PATCH WIP v1 07/10] HACK: xen: arm: trying to figure out ns16550 vs. Tegra issue

2015-03-10 Thread Ian Campbell
Messing with the FIFO depths and trigger levels seems to help, as does messing with the interrupt enable state at various points. The latter might be better handled via the start/stop_tx hooks which were added a while ago. Signed-off-by: Ian Campbell --- xen/drivers/char/ns16550.c | 16 +

[Xen-devel] [PATCH WIP v1 05/10] WIP: xen: arm: intial platform support for Nvidia TK1

2015-03-10 Thread Ian Campbell
As used on the Jetson board. This platform has a bunch of specific mappings and, more importantly, an additional interrupt controller (which is used alongside the main GIC and covers the same interrupts etc, so it is not a secondary or chained interrupt controller) which dom0 really wants to poke

[Xen-devel] [PATCH WIP v1 04/10] WIP: xen: ns16550: Add nvidia, tegra20-uart to DT compatible list

2015-03-10 Thread Ian Campbell
DO NOT APPLY. Doesn't work without sync_console *and* the changes from "HACK: xen: arm: trying to figure out ns16550 vs. Tegra issue". I suspect and IRQ or FIFO depth issue. Linux has a separate serial-tegra driver so perhaps the device is just not as compatible as I think. Signed-off-by: Ian Cam

  1   2   >