Re: [Xen-devel] [PATCH v4] x86: add p2m_mmio_write_dm

2014-12-02 Thread Yu, Zhang
On 12/2/2014 7:40 PM, Tim Deegan wrote: At 15:38 +0800 on 02 Dec (1417531126), Yu, Zhang wrote: On 12/1/2014 8:13 PM, Tim Deegan wrote: At 11:17 + on 01 Dec (1417429027), Jan Beulich wrote: On 01.12.14 at 11:30, wrote: During this bit of archaeology I realised that either this new type

Re: [Xen-devel] [RFC V8 2/3] libxl domain snapshot API design

2014-12-02 Thread Chun Yan Liu
>>> On 11/28/2014 at 11:43 PM, in message >>> <1417189409.23604.62.ca...@citrix.com>, Ian Campbell wrote: > On Tue, 2014-11-25 at 02:08 -0700, Chun Yan Liu wrote: > > Hi, Ian, > > > > According to previous discussion, snapshot delete and revert are > > inclined to be done by high level ap

Re: [Xen-devel] [RFC V8 2/3] libxl domain snapshot API design

2014-12-02 Thread Chun Yan Liu
>>> On 11/28/2014 at 11:43 PM, in message >>> <1417189409.23604.62.ca...@citrix.com>, Ian Campbell wrote: > On Tue, 2014-11-25 at 02:08 -0700, Chun Yan Liu wrote: > > Hi, Ian, > > > > According to previous discussion, snapshot delete and revert are > > inclined to be done by high level ap

[Xen-devel] Xen Hardware Setup (DRBD) and Algorithmic Discussion

2014-12-02 Thread Minalkumar Patel
Hope all would be fine. I request you to guide my two issues for live migraiton: 1) Set up: I would like to migrate my existing system from xen4.1 to xen4.2+. I have been working with xen4.1.4+ DRBD for live migration. I have modified kernel by comping linux and installed xen4.1.4 but now i

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-12-02 Thread Juergen Gross
On 12/03/2014 03:28 AM, Luis R. Rodriguez wrote: On Tue, Dec 02, 2014 at 11:11:18AM +, David Vrabel wrote: On 01/12/14 22:36, Luis R. Rodriguez wrote: Then I do agree its a fair analogy (and find this obviously odd that how widespread cond_resched() is), we just don't have an equivalent fo

Re: [Xen-devel] [PATCH] xen-netfront: Remove BUGs on paged skb data which crosses a page boundary

2014-12-02 Thread David Miller
From: Seth Forshee Date: Tue, 25 Nov 2014 20:28:24 -0600 > These BUGs can be erroneously triggered by frags which refer to > tail pages within a compound page. The data in these pages may > overrun the hardware page while still being contained within the > compound page, but since compound_order(

[Xen-devel] [libvirt test] 32005: tolerable FAIL - PUSHED

2014-12-02 Thread xen . org
flight 32005 libvirt real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32005/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 9 guest-start fail never pass test-amd64-i386-libvirt 9 guest-start

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-12-02 Thread Luis R. Rodriguez
On Tue, Dec 02, 2014 at 11:11:18AM +, David Vrabel wrote: > On 01/12/14 22:36, Luis R. Rodriguez wrote: > > > > Then I do agree its a fair analogy (and find this obviously odd that how > > widespread cond_resched() is), we just don't have an equivalent for IRQ > > context, why not avoid the sp

[Xen-devel] [rumpuserxen test] 32006: all pass - PUSHED

2014-12-02 Thread xen . org
flight 32006 rumpuserxen real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32006/ Perfect :-) All tests in this flight passed version targeted for testing: rumpuserxen f302fca6c18c1ccdefe3d0d5f583e2d0970c2e2d baseline version: rumpuserxen 6dac8499151377c6e5eb57b5bf1f

Re: [Xen-devel] [PATCH v13 10/11] pvqspinlock, x86: Enable PV qspinlock for KVM

2014-12-02 Thread Thomas Gleixner
On Wed, 29 Oct 2014, Waiman Long wrote: > AIM7 XFS Disk Test (no overcommit) > kernel JPMReal Time Sys TimeUsr Time > - ---- > PV ticketlock 25423737.08 98.95 5.44 > PV

Re: [Xen-devel] [PATCH v4 0/2] xen/pci: Use APIC for MSIs when APIC virtualization is supported

2014-12-02 Thread Andrew Cooper
On 02/12/2014 20:48, Konrad Rzeszutek Wilk wrote: > On Tue, Dec 02, 2014 at 03:19:11PM -0500, Boris Ostrovsky wrote: >> Changes in v4: >> * Added comment describing what we check for in pci_xen_init() >> > Reviewed-by: Konrad Rzeszutek Wilk Reviewed-by: Andrew Cooper > >> Changes in v3: >> * Ex

[Xen-devel] [linux-3.10 test] 31993: regressions - FAIL

2014-12-02 Thread xen . org
flight 31993 linux-3.10 real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31993/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-pvops 5 kernel-build fail REGR. vs. 26303 build-armhf

Re: [Xen-devel] [PATCH v4 7/7] xen/pciback: Restore configuration space when detaching from a guest.

2014-12-02 Thread Boris Ostrovsky
On 11/21/2014 05:17 PM, Konrad Rzeszutek Wilk wrote: The commit "xen/pciback: Don't deadlock when unbinding." was using the version of pci_reset_function which would lock the device lock. That is no good as we can dead-lock. As such we swapped to using the lock-less version and requiring that the

[Xen-devel] [xen-4.4-testing test] 31991: regressions - FAIL

2014-12-02 Thread xen . org
flight 31991 xen-4.4-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31991/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 31781 Tests which are f

[Xen-devel] [PATCH 2/4] sysctl/libxl: Add interface for returning IO topology data

2014-12-02 Thread Boris Ostrovsky
Make XEN_SYSCTL_topologyinfo more generic so that it can return both CPU and IO topology (support for returning the latter is added in the subsequent patch) To do so move (and rename) previously used cpu_to_core/cpu_to_socket/ cpu_to_node into struct xen_sysctl_cputopo and move it, together with n

[Xen-devel] [PATCH 3/4] sysctl/libxl: Provide information about IO topology

2014-12-02 Thread Boris Ostrovsky
Add support to XEN_SYSCTL_topologyinfo to return IO topology data. Modify libxl_get_topology() to request this data, provide OS-dependent helper functions that determine which devices we are inquiring about (Linux only). Signed-off-by: Boris Ostrovsky --- tools/libxl/libxl.c | 28 +

[Xen-devel] [PATCH 4/4] libxl: Switch to using new topology interface

2014-12-02 Thread Boris Ostrovsky
Make current users of libxl_get_cpu_topology() call libxl_get_topology() instead. Signed-off-by: Boris Ostrovsky --- tools/libxl/libxl.c | 25 - tools/libxl/libxl_numa.c | 14 +++--- tools/libxl/libxl_utils.c | 24 tools/libxl/xl_cm

[Xen-devel] [PATCH 1/4] pci: Do not ignore device's PXM information

2014-12-02 Thread Boris Ostrovsky
If ACPI provides PXM data for IO devices then dom0 will pass it to hypervisor during PHYSDEVOP_pci_device_add call. This information, however, is currently ignored. We should remember it (in the form of nodeID). We will also print it when user requests device information dump. Signed-off-by: Bori

[Xen-devel] [PATCH 0/4] Display IO topology when PXM data is available

2014-12-02 Thread Boris Ostrovsky
4 patches that add interface for querying hypervisor about device topology and allow 'xl info -n' display this information if PXM object is provided by ACPI. The patches are: * Store PXM data (nodeID) in pci_dev during PHYSDEVOP_pci_device_add hypercall * Modify XEN_SYSCTL_topologyinfo so that

Re: [Xen-devel] [v4] libxc: Expose the 1GB pages cpuid flag to guest

2014-12-02 Thread Konrad Rzeszutek Wilk
On Fri, Nov 28, 2014 at 11:50:43AM +, Ian Campbell wrote: > On Fri, 2014-11-28 at 18:52 +0800, Liang Li wrote: > > If hardware support the 1GB pages, expose the feature to guest by > > default. Users don't have to use a 'cpuid= ' option in config fil > > e to turn it on. > > > > If guest use s

Re: [Xen-devel] [PATCH v4 0/2] xen/pci: Use APIC for MSIs when APIC virtualization is supported

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 03:19:11PM -0500, Boris Ostrovsky wrote: > Changes in v4: > * Added comment describing what we check for in pci_xen_init() > Reviewed-by: Konrad Rzeszutek Wilk > Changes in v3: > * Explicitly include asm/apic.h in arch/x86/pci/xen.c for !CONFIG_SMP. > > Changes in v2: >

Re: [Xen-devel] [PATCH] tools/hotplug: update systemd dependency to use service instead of socket

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 06:51:50PM +, M A Young wrote: > On Tue, 2 Dec 2014, Konrad Rzeszutek Wilk wrote: > > >On Tue, Dec 02, 2014 at 03:44:55PM +, Ian Campbell wrote: > >>On Tue, 2014-12-02 at 16:39 +0100, Olaf Hering wrote: > >>>Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("to

Re: [Xen-devel] [v8][PATCH 16/17] xen/vtd: group assigned device with RMRR

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:34PM +0800, Tiejun Chen wrote: > Sometimes different devices may share RMRR range so in this s/Sometimes// s/range/ranges/ > case we shouldn't assign these devices into different VMs > since they may have potential leakage even damage between VMs. s/potential leak..

Re: [Xen-devel] [v8][PATCH 15/17] xen:vtd: create RMRR mapping

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:33PM +0800, Tiejun Chen wrote: > intel_iommu_map_page() does nothing if VT-d shares EPT page table. > So rmrr_identity_mapping() never create RMRR mapping but in some s/So// s/create/creates/ > cases like some GFX drivers it still need to access RMRR. s/drivers .../

Re: [Xen-devel] [v8][PATCH 14/17] xen/x86/p2m: introduce set_identity_p2m_entry

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:32PM +0800, Tiejun Chen wrote: > We will create RMRR mapping as follows: > > If gfn space unoccupied, we just set that. If > space already occupy by 1:1 RMRR mapping do thing. Others What is 'do thing'? It looks as if we do nothing. Is that what you meant? > should

Re: [Xen-devel] [v8][PATCH 13/17] xen/mem_access: don't allow accessing reserved device memory

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:31PM +0800, Tiejun Chen wrote: > We can't expost those reserved device memory in case of mem_access s/expost/expose/ > since any access may corrupt device usage. Could you explain this in more details please? > > Signed-off-by: Tiejun Chen > --- > xen/common/mem

Re: [Xen-devel] [v8][PATCH 12/17] xen/x86/ept: handle reserved device memory in ept_handle_violation

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:30PM +0800, Tiejun Chen wrote: > We always reserve these ranges since we never allow any stuff to > poke them. s/any stuff to poke them/guest to access them./ > > But in theory some untrusted VM can maliciously access them. So we > need to intercept this approach. Bu

Re: [Xen-devel] [Qemu-devel] [PATCH] increase maxmem before calling xc_domain_populate_physmap

2014-12-02 Thread Don Slutz
On 12/02/14 07:26, Stefano Stabellini wrote: On Mon, 1 Dec 2014, Don Slutz wrote: On 12/01/14 10:37, Stefano Stabellini wrote: On Mon, 1 Dec 2014, Don Slutz wrote: On 11/27/14 05:48, Stefano Stabellini wrote: [...] Works fine in both claim modes and with PoD used (maxmem > memory). Do not

Re: [Xen-devel] [v8][PATCH 10/17] hvmloader/mem_hole_alloc: skip any overlap with reserved device memory

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:28PM +0800, Tiejun Chen wrote: > In some cases like igd_opregion_pgbase, guest will use mem_hole_alloc > to allocate some memory to use in runtime cycle, so we alsoe need to s/cycle// s/alsoe/also > make sure all reserved device memory don't overlap such a region.

[Xen-devel] [xen-unstable test] 31986: tolerable FAIL

2014-12-02 Thread xen . org
flight 31986 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31986/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-qemuu-rhel6hvm-intel 5 xen-bootfail pass in 31963 test-amd64-i386-xl-win7-amd64 5 x

[Xen-devel] [PATCH v4 0/2] xen/pci: Use APIC for MSIs when APIC virtualization is supported

2014-12-02 Thread Boris Ostrovsky
Changes in v4: * Added comment describing what we check for in pci_xen_init() Changes in v3: * Explicitly include asm/apic.h in arch/x86/pci/xen.c for !CONFIG_SMP. Changes in v2: * New version of cpuid.h file from Xen tree (with a couple of style adjustments) * Whitespace cleanup Currently HVM g

[Xen-devel] [PATCH v4 2/2] xen/pci: Use APIC directly when APIC virtualization is supported by hardware

2014-12-02 Thread Boris Ostrovsky
When hardware supports APIC/x2APIC virtualization we don't need to use pirqs for MSI handling and instead use APIC since most APIC accesses (MMIO or MSR) will now be processed without VMEXITs. As an example, netperf on the original code produces this profile (collected wih 'xentrace -e 0x0008

[Xen-devel] [PATCH v4 1/2] xen/pci: Defer initialization of MSI ops on HVM guests until after x2APIC has been set up

2014-12-02 Thread Boris Ostrovsky
If the hardware supports APIC virtualization we may decide not to use pirqs and instead use APIC/x2APIC directly, meaning that we don't want to set x86_msi.setup_msi_irqs and x86_msi.teardown_msi_irq to Xen-specific routines. However, x2APIC is not set up by the time pci_xen_hvm_init() is called so

Re: [Xen-devel] [v8][PATCH 09/17] hvmloader/ram: check if guest memory is out of reserved device memory maps

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:27PM +0800, Tiejun Chen wrote: > We need to check to reserve all reserved device memory maps in e820 > to avoid any potential guest memory conflict. > > Currently, if we can't insert RDM entries directly, we may need to handle > several ranges as follows: s/several/t

Re: [Xen-devel] [v8][PATCH 07/17] hvmloader/util: get reserved device memory maps

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:25PM +0800, Tiejun Chen wrote: > We need to use reserved device memory maps with multiple times, so > provide just one common function should be friend. We need to call reserved device memory maps hypercall (XENMEM_reserved_device_memory_map) many times, hence provide

Re: [Xen-devel] [v8][PATCH 06/17] tools/libxc: check if modules space is overlapping with reserved device memory

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:24PM +0800, Tiejun Chen wrote: > In case of reserved device memory overlapping with ram, it also probably s/also// > overlap with modules space so we need to check these reserved device s/overlap/overlaps/ What is 'modules space'? > memory as well. s/reserved devic

Re: [Xen-devel] [v8][PATCH 05/17] tools/libxc: introduce hypercall for xc_reserved_device_memory_map

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:23PM +0800, Tiejun Chen wrote: > We will introduce that hypercall xc_reserved_device_memory_map > approach to libxc. > > Signed-off-by: Tiejun Chen > --- > tools/libxc/include/xenctrl.h | 5 + > tools/libxc/xc_domain.c | 30 ++

Re: [Xen-devel] [v8][PATCH 03/17] introduce XENMEM_reserved_device_memory_map

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:21PM +0800, Tiejun Chen wrote: > From: Jan Beulich > > This is a prerequisite for punching holes into HVM and PVH guests' P2M > to allow passing through devices that are associated with (on VT-d) > RMRRs. > > Signed-off-by: Jan Beulich > Acked-by: Kevin Tian > ---

Re: [Xen-devel] [v8][PATCH 02/17] introduce XEN_DOMCTL_set_rdm

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 05:24:20PM +0800, Tiejun Chen wrote: > This should be based on a new parameter globally, 'pci_rdmforce'. > > pci_rdmforce = 1 => Of course this should be 0 by default. > > '1' means we should force check to reserve all ranges. If failed > VM wouldn't be created successfull

Re: [Xen-devel] [v8][PATCH 00/17] xen: RMRR fix

2014-12-02 Thread Konrad Rzeszutek Wilk
> How to reproduce this issu: > > * In shared-ept case with Xen. > * Target owns RMRR. How do you verify/check for that? > * Do IGD passthrough with Windows guest OS: gfx_passthru=1 pci=["00:02.0"] > * Please use qemu-xen-traditional. > > My test machine is BDW with Windows 7. ___

Re: [Xen-devel] [PATCH v13 10/11] pvqspinlock, x86: Enable PV qspinlock for KVM

2014-12-02 Thread Konrad Rzeszutek Wilk
On Wed, Oct 29, 2014 at 04:19:10PM -0400, Waiman Long wrote: > This patch adds the necessary KVM specific code to allow KVM to > support the CPU halting and kicking operations needed by the queue > spinlock PV code. > > Two KVM guests of 20 CPU cores (2 nodes) were created for performance > testin

Re: [Xen-devel] [PATCH V4 00/10] xen: Switch to virtual mapped linear p2m list

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 01:54:11PM +0100, Juergen Gross wrote: > On 12/01/2014 12:31 PM, David Vrabel wrote: > >On 28/11/14 10:53, Juergen Gross wrote: > >>Paravirtualized kernels running on Xen use a three level tree for > >>translation of guest specific physical addresses to machine global > >>ad

Re: [Xen-devel] [PATCH] tools/hotplug: update systemd dependency to use service instead of socket

2014-12-02 Thread M A Young
On Tue, 2 Dec 2014, Konrad Rzeszutek Wilk wrote: On Tue, Dec 02, 2014 at 03:44:55PM +, Ian Campbell wrote: On Tue, 2014-12-02 at 16:39 +0100, Olaf Hering wrote: Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("tools/hotplug: systemd xenstored dependencies") all service files use the

Re: [Xen-devel] [PATCH for-4.5 2/3] python/xc: Fix multiple issues in pyxc_readconsolering()

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 01:50:37PM +, Ian Campbell wrote: > On Mon, 2014-12-01 at 16:14 -0500, Konrad Rzeszutek Wilk wrote: > > On Fri, Nov 28, 2014 at 11:38:52AM +, Ian Campbell wrote: > > > On Thu, 2014-11-27 at 12:34 +, Andrew Cooper wrote: > > > > Don't leak a 16k allocation if PyAr

Re: [Xen-devel] [PATCH v2 for-4.5 1/2] libxl: un-constify return value of libxl_basename

2014-12-02 Thread Andrew Cooper
On 01/12/14 11:31, Wei Liu wrote: > The string returned is malloc'ed but marked as "const". > > Signed-off-by: Wei Liu > Cc: Ian Campbell > Cc: Ian Jackson > --- > tools/libxl/libxl.h | 10 ++ > tools/libxl/libxl_utils.c |5 - > tools/libxl/libxl_utils.h |6 +- >

Re: [Xen-devel] [PATCH] tools/hotplug: update systemd dependency to use service instead of socket

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 03:44:55PM +, Ian Campbell wrote: > On Tue, 2014-12-02 at 16:39 +0100, Olaf Hering wrote: > > Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("tools/hotplug: > > systemd xenstored dependencies") all service files use the .socket unit > > as startup dependency. Whi

Re: [Xen-devel] [PATCH] libxc: check in xc_get_tot_pages() that the proper domain is reported

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 04:04:44PM +, Wei Liu wrote: > On Tue, Dec 02, 2014 at 04:18:08PM +0100, Vitaly Kuznetsov wrote: > > XEN_DOMCTL_getdomaininfo, which is being used by xc_domain_getinfo(), has > > strange interface: it reports first domain which has domid >= requested > > domid > > so al

Re: [Xen-devel] [PATCH] libxl: libxl_domain_info: fix typo in error message

2014-12-02 Thread Konrad Rzeszutek Wilk
On Mon, Dec 01, 2014 at 11:15:41AM +, Ian Campbell wrote: > On Mon, 2014-12-01 at 10:47 +, Euan Harris wrote: > > Signed-off-by: Euan Harris > > Acked-by: Ian Campbell > > This is so trivial as to not need a release ack IMHO, I'll apply next > time I'm doing such things unless someone

Re: [Xen-devel] xl pci-attach silently fails the first time

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 04:46:52PM +0100, Olaf Hering wrote: > On Mon, Dec 01, Konrad Rzeszutek Wilk wrote: > > > That is odd - I see any device 'hot-plugged' being added at 00:05 and > > further. > > Does this by any chance depend on the guest?! I mean, how is the guest I doubt it. > notified

Re: [Xen-devel] [PATCH for-4.5] systemd: use pkg-config to determine systemd library availability

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 03:11:30PM +, Wei Liu wrote: > AC_CHECK_LIB fails on Debian Jessie since the ld flag it generates is > incorrect, even in the event systemd library is available. Use > PKG_CHECK_MODULES instead. > > Tested on Debian Jessie and Arch Linux. And Fedora and SuSE? CC-ing t

Re: [Xen-devel] [PATCH for-xen-4.5 1/3] tools/hotplug: distclean target should remove files generated by configure

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 04:16:28PM +0100, Daniel Kiper wrote: > Signed-off-by: Daniel Kiper This usage scenario which I can see this being useful (and I've tripped over this) is when you rebuild a new version from the same repo. As in, this affects developers, but not end-users and not distros. B

Re: [Xen-devel] [RFC v2] Add support for Xen ARM guest on FreeBSD

2014-12-02 Thread Warner Losh
Hey Julien, Have you rebased your patch train after Andrew’s commits? Warner > On Dec 2, 2014, at 8:31 AM, Julien Grall wrote: > > Hello Andrew, > > On 28/11/2014 13:57, Andrew Turner wrote: >> On Sun, 23 Nov 2014 22:35:36 + >> Julien Grall wrote: >>> Major changes in this new version: >

Re: [Xen-devel] [PATCH] libxl: Fix building libxlu_cfg_y.y with bison 3.0

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 01:47:16PM +, Ian Campbell wrote: > On Mon, 2014-12-01 at 12:19 +, Wei Liu wrote: > > On Mon, Dec 01, 2014 at 09:42:13AM +, Ian Campbell wrote: > > > On Sat, 2014-11-29 at 21:23 -0800, Ed Swierk wrote: > > > > - Use %lex-param instead of obsolete YYLEX_PARAM to o

[Xen-devel] [xen-4.3-testing test] 31985: regressions - FAIL

2014-12-02 Thread xen . org
flight 31985 xen-4.3-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31985/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 31811 Tests which are f

Re: [Xen-devel] [PATCH] libxl: Fix building libxlu_cfg_y.y with bison 3.0

2014-12-02 Thread Ed Swierk
On Tue, Dec 2, 2014 at 6:00 AM, Andrew Cooper wrote: > The automatically generating doesn't actually work. Depending on the > relative timestamps caused by a SCM checkout, or a tarball extraction, > the files will be attempted to be regenerated. > > These files are regenerated in the XenServer bu

Re: [Xen-devel] Poor network performance between DomU with multiqueue support

2014-12-02 Thread Zoltan Kiss
On 02/12/14 11:53, Zhangleiqiang (Trump) wrote: -Original Message- From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of David Vrabel Sent: Tuesday, December 02, 2014 6:57 PM To: zhangleiqiang; xen-devel@lists.xen.org Subject: Re: [Xen-devel] Poor n

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 03:12:40PM +, Ian Campbell wrote: > On Tue, 2014-12-02 at 15:10 +, George Dunlap wrote: > > On Thu, Nov 27, 2014 at 3:11 PM, Konrad Rzeszutek Wilk > > wrote: > > > > > > On Nov 27, 2014 6:59 AM, Tim Deegan wrote: > > >> > > >> At 11:39 + on 27 Nov (1417084797),

Re: [Xen-devel] PVHVM drivers in upstream linux kernel

2014-12-02 Thread Konrad Rzeszutek Wilk
On Tue, Dec 02, 2014 at 03:13:28PM +, Ian Campbell wrote: > On Tue, 2014-12-02 at 10:11 -0500, Konrad Rzeszutek Wilk wrote: > > > [0] The default i386 Debian installer falls into this camp, but you can > > > use the special PV Xen variant to install as PVHVM too so it's not so > > > critical. >

[Xen-devel] [PATCH OSSTEST v2 15/18] libvirt: Implement shutdown_wait

2014-12-02 Thread Ian Campbell
virsh does not include a --wait option to shutdown as xl and xm do, so we implement it by hand. Needs new guest_await_destroy helper. Note the guest_await_shutdown requires on_shutdown='preserve' Signed-off-by: Ian Campbell --- Osstest/TestSupport.pm | 7 ++- Osstest/Toolstack/libvirt

[Xen-devel] [PATCH OSSTEST v2 18/18] WIP: libvirt: migration + save/restore support.

2014-12-02 Thread Ian Campbell
Note that this remains stubbed out, since making it actually work requires more work (i.e. I need to figure out what is involved, seem to need TLS and a CA etc...) Appears to need gnutls enabling for migration, even to localhost. NB haven't managed to get this actually working. With GNUtls enable

[Xen-devel] [PATCH OSSTEST v2 13/18] Toolstack: Refactor save/restore support

2014-12-02 Thread Ian Campbell
Still stubbed out for libvirt. Signed-off-by: Ian Campbell --- Osstest/Toolstack/libvirt.pm | 8 Osstest/Toolstack/xend.pm| 2 ++ Osstest/Toolstack/xl.pm | 18 ++ ts-guest-saverestore | 12 ++-- 4 files changed, 30 insertions(+), 10 deletions(-

[Xen-devel] [PATCH OSSTEST v2 01/18] apt: lock osstest's usages of apt-get against each other

2014-12-02 Thread Ian Campbell
Currently we rely on all apt-get invocations being in a single ts-xen-build-prep job which can't run on a shared host. That is a bit inflexible so instead use our own lock. We wait indefinitely and rely on osstest's existing command timeout infrastructure to catch problems. target_install_package

[Xen-devel] [PATCH OSSTEST v2 16/18] Toolstack: Remove Command field for all toolstacks.

2014-12-02 Thread Ian Campbell
Nothing in generic code uses this now, so remove. xl+xend retain as _Command for internal use only. Signed-off-by: Ian Campbell --- Osstest/Toolstack/libvirt.pm | 1 - Osstest/Toolstack/xend.pm| 2 +- Osstest/Toolstack/xl.pm | 18 +- 3 files changed, 10 insertions(+),

[Xen-devel] [PATCH v2] introduce grant copy for user land

2014-12-02 Thread Thanos Makatos
This patch introduces the interface to allow user-space applications execute grant-copy operations. This is done by sending an ioctl to the grant device. Signed-off-by: Thanos Makatos --- drivers/xen/gntdev.c | 171 + include/uapi/xen/gntdev.h |

[Xen-devel] [PATCH OSSTEST v2 12/18] Toolstack: Refactor migration support.

2014-12-02 Thread Ian Campbell
Note that since the previous patch arranges for ts-migration-support-check to continue to fail for libvirt the libvirt code is not actually called yet (and will die if it is). This patch is mainly included to reduce the number of users of toolstack()->{Command} closer to zero. Signed-off-by: Ian C

[Xen-devel] [PATCH OSSTEST v2 07/18] TestSupport: guest_create takes a $ho.

2014-12-02 Thread Ian Campbell
And looks up the toolstack from it. This is now consistent with guest_destroy. Signed-off-by: Ian Campbell --- Osstest/TestSupport.pm | 5 +++-- ts-debian-hvm-install | 7 ++- ts-redhat-install | 7 ++- ts-rumpuserxen-demo-xenstorels | 2 +- 4 files changed

[Xen-devel] [PATCH OSSTEST v2 14/18] libvirt: Implement initscript restart which has some hope of working.

2014-12-02 Thread Ian Campbell
Signed-off-by: Ian Campbell --- ts-libvirt-build | 6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/ts-libvirt-build b/ts-libvirt-build index 940c034..878d4e2 100755 --- a/ts-libvirt-build +++ b/ts-libvirt-build @@ -140,8 +140,10 @@ case "$1" in [ "$VERBOSE" != no ]

[Xen-devel] [PATCH OSSTEST v2 17/18] ts-guest-start: Use guest_create

2014-12-02 Thread Ian Campbell
This allows us to abolish CfgPathVar which was inconsistently used, appears redundant with $gho->{CfgPath} and in any case never set to anything other than 'cfgpath'. I suppose it was intended to deal with toolstacks with a cfg format completely dissimilar to xm/xl's. I think if this arises in a f

Re: [Xen-devel] Poor network performance between DomU with multiqueue support

2014-12-02 Thread Wei Liu
On Tue, Dec 02, 2014 at 02:46:36PM +, Zhangleiqiang (Trump) wrote: > Thanks for your reply, Wei. > > I do the following testing just now and found the results as follows: > > There are three DomUs (4U4G) are running on Host A (6U6G) and one DomU (4U4G) > is running on Host B (6U6G), I send p

[Xen-devel] [PATCH OSSTEST v2 08/18] Toolstack: Refactor guest lifecycle.

2014-12-02 Thread Ian Campbell
Implement destory/create as per toolstack methods, including implementing the libvirt version which previously didn't work. To do this we use the virsh capability to convert an xl/xm style config file into the correct XML. xend basically calls into the xl helper since they are compatible. xl/x, u

[Xen-devel] [PATCH OSSTEST v2 06/18] TestSupport: always use xl for generic operations.

2014-12-02 Thread Ian Campbell
Unless the toolstack is xend (for compatibility with pre-xl Xen versions), when we use xm. For several operations in TestSupport.pm the actual toolstack isn't really relevant, since we want info straight from Xen. For simplicity just use xl (or xm) in these cases, to avoid needing to implement the

[Xen-devel] [PATCH OSSTEST v2 09/18] Toolstack: Refactor consolecmd handling

2014-12-02 Thread Ian Campbell
Signed-off-by: Ian Campbell --- Osstest/Toolstack/libvirt.pm | 6 ++ Osstest/Toolstack/xend.pm| 1 + Osstest/Toolstack/xl.pm | 6 ++ ts-logs-capture | 2 +- 4 files changed, 14 insertions(+), 1 deletion(-) diff --git a/Osstest/Toolstack/libvirt.pm b/Osstest/Toolstac

Re: [Xen-devel] [Xen-users] 4.5 git: regression in xen systemd shutdown hangs the OS

2014-12-02 Thread Olaf Hering
On Tue, Dec 02, Ian Campbell wrote: > On Tue, 2014-12-02 at 16:17 +0100, Olaf Hering wrote: > > On Tue, Dec 02, Ian Campbell wrote: > > > > > On Mon, 2014-12-01 at 23:41 +, Mark Pryor wrote: > > > > list, > > > > > > Thanks. If you've identified a buggy changeset then it is fine to post > >

Re: [Xen-devel] [PATCH] libxc: check in xc_get_tot_pages() that the proper domain is reported

2014-12-02 Thread Andrew Cooper
On 02/12/14 15:18, Vitaly Kuznetsov wrote: > XEN_DOMCTL_getdomaininfo, which is being used by xc_domain_getinfo(), has > strange interface: it reports first domain which has domid >= requested domid > so all callers are supposed to check that the proper domain(s) was queried > by checking domid. xc

[Xen-devel] [PATCH v2 OSSTEST 0/18] Implement for driving libvirt via virsh

2014-12-02 Thread Ian Campbell
The following series switches osstest to implement the toolstack via get_host_method_object()->method rather than toolstack()->{Command}." method" etc. This is needed because virsh differs from xm/xl in a few commands. It also implements partial virsh support (simple lifecycle stuff, but not e.g.

[Xen-devel] [PATCH OSSTEST v2 11/18] Toolstack: Refactor migration support check.

2014-12-02 Thread Ian Campbell
Not implemented for libvirt (the check itself that is, the hook is present). Signed-off-by: Ian Campbell --- Osstest/Toolstack/libvirt.pm | 5 + Osstest/Toolstack/xend.pm| 3 +++ Osstest/Toolstack/xl.pm | 9 + ts-migrate-support-check | 10 +- 4 files changed,

[Xen-devel] [PATCH OSSTEST v2 04/18] ts-rumpuserxen-demo-xenstorels: Use standard functions for things

2014-12-02 Thread Ian Campbell
Specifically guest_create and guest_find_domid. Signed-off-by: Ian Campbell --- ts-rumpuserxen-demo-xenstorels | 6 ++ 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/ts-rumpuserxen-demo-xenstorels b/ts-rumpuserxen-demo-xenstorels index a2a6a77..6698848 100755 --- a/ts-rumpuser

Re: [Xen-devel] [PATCH] libxc: check in xc_get_tot_pages() that the proper domain is reported

2014-12-02 Thread Wei Liu
On Tue, Dec 02, 2014 at 04:18:08PM +0100, Vitaly Kuznetsov wrote: > XEN_DOMCTL_getdomaininfo, which is being used by xc_domain_getinfo(), has > strange interface: it reports first domain which has domid >= requested domid > so all callers are supposed to check that the proper domain(s) was queried

[Xen-devel] [PATCH OSSTEST v2 02/18] ts-logs-capture: Collect some libvirt logs and capabilities

2014-12-02 Thread Ian Campbell
Signed-off-by: Ian Campbell --- ts-logs-capture | 4 1 file changed, 4 insertions(+) diff --git a/ts-logs-capture b/ts-logs-capture index 21974a9..6cf51c1 100755 --- a/ts-logs-capture +++ b/ts-logs-capture @@ -117,6 +117,9 @@ sub fetch_logs_host_guests () { /var/log/xen/o

[Xen-devel] [PATCH OSSTEST v2 10/18] Toolstack: Refactor shutdown support

2014-12-02 Thread Ian Campbell
Signed-off-by: Ian Campbell --- Osstest/Toolstack/libvirt.pm | 6 ++ Osstest/Toolstack/xend.pm| 1 + Osstest/Toolstack/xl.pm | 7 +++ ts-guest-stop| 5 + 4 files changed, 15 insertions(+), 4 deletions(-) diff --git a/Osstest/Toolstack/libvirt.pm b/Osstest/Too

[Xen-devel] [PATCH OSSTEST v2 03/18] Pass host to toolstack()

2014-12-02 Thread Ian Campbell
This will be needed in a future patch. Everywhere already has a $ho in hand. Also cache the answer as $ho->{Toolstack}. I scanned the source with: find -name \*.pm -exec perl -c {} \; for i in ts-* ; do perl -c $i; done which reported "Not enough arguments for Osstest::TestSupport::toolst

[Xen-devel] [PATCH OSSTEST v2 05/18] Toolstack: use get_host_method_object() to manage toolstack selection

2014-12-02 Thread Ian Campbell
This will allow us to more easily have per-toolstack methods etc. The previous hash of toolstack parameters is now a blessed object. For now the callers don't need to change but over the following patches we will refactor things to use method calls. In particular we will be aiming to remove Comman

Re: [Xen-devel] [PATCH] tools/hotplug: update systemd dependency to use service instead of socket

2014-12-02 Thread Ian Campbell
On Tue, 2014-12-02 at 16:39 +0100, Olaf Hering wrote: > Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("tools/hotplug: > systemd xenstored dependencies") all service files use the .socket unit > as startup dependency. While this happens to work for boot it fails for > shutdown because a .so

Re: [Xen-devel] [PATCH] libxl: libxl_domain_info: fix typo in error message

2014-12-02 Thread Ian Campbell
On Mon, 2014-12-01 at 11:15 +, Ian Campbell wrote: > On Mon, 2014-12-01 at 10:47 +, Euan Harris wrote: > > Signed-off-by: Euan Harris > > Acked-by: Ian Campbell > > This is so trivial as to not need a release ack IMHO, I'll apply next > time I'm doing such things unless someone beats me

Re: [Xen-devel] [PATCH] libxl: Don't derefence null new_name pointer in libxl_domain_rename()

2014-12-02 Thread Ian Campbell
On Mon, 2014-12-01 at 17:02 -0500, Konrad Rzeszutek Wilk wrote: > On Mon, Dec 01, 2014 at 02:50:56PM +, Ian Campbell wrote: > > On Mon, 2014-12-01 at 14:27 +, Euan Harris wrote: > > > libxl__domain_rename() unconditionally dereferences its new_name > > > parameter, to check whether it is an

Re: [Xen-devel] [Xen-users] 4.5 git: regression in xen systemd shutdown hangs the OS

2014-12-02 Thread Ian Campbell
On Tue, 2014-12-02 at 16:17 +0100, Olaf Hering wrote: > On Tue, Dec 02, Ian Campbell wrote: > > > On Mon, 2014-12-01 at 23:41 +, Mark Pryor wrote: > > > list, > > > > Thanks. If you've identified a buggy changeset then it is fine to post > > to the devel lists. I've added a CC. I've also CCd

Re: [Xen-devel] [PATCH for-xen-4.5] console: increase initial conring size

2014-12-02 Thread Jan Beulich
>>> Daniel Kiper 12/02/14 3:58 PM >>> >In general initial conring size is sufficient. However, if log >level is increased on platforms which have e.g. huge number >of memory regions (I have an IBM System x3550 M2 with 8 GiB RAM >which has more than 200 entries in EFI memory map) then some >of earl

Re: [Xen-devel] [PATCH v2] fix migration failure with xl migrate --debug

2014-12-02 Thread Ian Campbell
On Mon, 2014-12-01 at 15:25 -0500, Konrad Rzeszutek Wilk wrote: > On Fri, Nov 28, 2014 at 11:52:26AM +, Ian Jackson wrote: > > Ian Campbell writes ("Re: [PATCH v2] fix migration failure with xl migrate > > --debug"): > > > Acked-by: Ian Campbell > > > > Thanks for reviewing it :-). > > > >

Re: [Xen-devel] 答复: Re: [PATCH] missing chunk of HVM direct kernel boot patch

2014-12-02 Thread Ian Campbell
On Mon, 2014-12-01 at 16:51 -0500, Konrad Rzeszutek Wilk wrote: > On Mon, Dec 01, 2014 at 09:21:24AM +, Ian Campbell wrote: > > On Mon, 2014-12-01 at 01:21 -0700, Chun Yan Liu wrote: > > > > > > >>> Ian Campbell 2014-11-28 下午 20:01 >>> > > > On Fri, 2014-11-28 at 13:55 +0800, Chunyan Liu wro

Re: [Xen-devel] [PATCH] xenstore: Clarify xs_open() semantics

2014-12-02 Thread Ian Campbell
On Mon, 2014-12-01 at 16:16 -0500, Konrad Rzeszutek Wilk wrote: > On Fri, Nov 28, 2014 at 12:31:34PM +, Ian Jackson wrote: > > Razvan Cojocaru writes ("[PATCH] xenstore: Clarify xs_open() semantics"): > > > Added to the xs_open() comments in xenstore.h. The text has been > > > taken almost verb

Re: [Xen-devel] [PATCH v2 for-4.5 0/2] xl/libxl: fix API and two memory leaks

2014-12-02 Thread Ian Campbell
On Mon, 2014-12-01 at 16:54 -0500, Konrad Rzeszutek Wilk wrote: > On Mon, Dec 01, 2014 at 11:31:11AM +, Wei Liu wrote: > > Return value of libxl_basename was erroneously marked as "const". This > > series removes that "const" and fixes two memory leaks in xl. > > > > I think these fixes should

Re: [Xen-devel] get a handle for the tap device to shut it down

2014-12-02 Thread Olaf Hering
On Fri, Nov 28, Olaf Hering wrote: > I wonder if the missing disable of the tap device is intentional, or > just an oversight, or if its just to complicated to get from a > "PCIDevice *" to the other end and call the ->cleanup function. qemu-traditional did just close all tap devices. With qemu-u

Re: [Xen-devel] xl pci-attach silently fails the first time

2014-12-02 Thread Olaf Hering
On Mon, Dec 01, Konrad Rzeszutek Wilk wrote: > That is odd - I see any device 'hot-plugged' being added at 00:05 and further. Does this by any chance depend on the guest?! I mean, how is the guest notified that a PCI device is gone (by unplug)? Maybe the pvops case just happens to work because th

Re: [Xen-devel] xl pci-attach silently fails the first time

2014-12-02 Thread Olaf Hering
On Mon, Dec 01, Sander Eikelenboom wrote: > Monday, December 1, 2014, 3:34:09 PM, you wrote: > > actually be a workaround for the double pci-attach bug. > Don't know about that bug. You just replied to it. ;-) Olaf ___ Xen-devel mailing list Xen-devel

Re: [Xen-devel] PV DomU running linux 3.17.3 causing xen-netback fatal error in Dom0

2014-12-02 Thread Anthony Wright
- Original Message - > On 01/12/14 14:22, David Vrabel wrote: > > On 28/11/14 15:19, Anthony Wright wrote: > > The guest's frontend driver isn't putting valid requests onto the > > ring > > (it crosses a page boundary) so this is a frontend bug. > > This VIF protocol is weird. The first

[Xen-devel] [PATCH] tools/hotplug: update systemd dependency to use service instead of socket

2014-12-02 Thread Olaf Hering
Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("tools/hotplug: systemd xenstored dependencies") all service files use the .socket unit as startup dependency. While this happens to work for boot it fails for shutdown because a .socket does not seem to enforce ordering. When xendomains.servic

Re: [Xen-devel] [PATCH for-4.5] systemd: use pkg-config to determine systemd library availability

2014-12-02 Thread Ian Campbell
On Tue, 2014-12-02 at 15:11 +, Wei Liu wrote: > AC_CHECK_LIB fails on Debian Jessie since the ld flag it generates is > incorrect, even in the event systemd library is available. Use > PKG_CHECK_MODULES instead. > > Tested on Debian Jessie and Arch Linux. > > Please rerun autogen.sh after ap

Re: [Xen-devel] PVHVM drivers in upstream linux kernel

2014-12-02 Thread Ian Campbell
On Tue, 2014-12-02 at 10:11 -0500, Konrad Rzeszutek Wilk wrote: > > [0] The default i386 Debian installer falls into this camp, but you can > > use the special PV Xen variant to install as PVHVM too so it's not so > > critical. > > And the Fedora 21 LiveISO (32-bit) does too. Interesting, I thoug

Re: [Xen-devel] [COVERITY ACCESS] Request for access to Coverity

2014-12-02 Thread Ian Campbell
On Tue, 2014-12-02 at 15:10 +, George Dunlap wrote: > On Thu, Nov 27, 2014 at 3:11 PM, Konrad Rzeszutek Wilk > wrote: > > > > On Nov 27, 2014 6:59 AM, Tim Deegan wrote: > >> > >> At 11:39 + on 27 Nov (1417084797), George Dunlap wrote: > >> > -BEGIN PGP SIGNED MESSAGE- > >> > Hash:

Re: [Xen-devel] [PATCH] libxc: check in xc_get_tot_pages() that the proper domain is reported

2014-12-02 Thread Don Slutz
On 12/02/14 10:18, Vitaly Kuznetsov wrote: XEN_DOMCTL_getdomaininfo, which is being used by xc_domain_getinfo(), has strange interface: it reports first domain which has domid >= requested domid so all callers are supposed to check that the proper domain(s) was queried by checking domid. xc_get_t

  1   2   >