Re: [Xen-devel] [PATCH v4 0/9] add xenalyze to staging

2015-06-08 Thread Olaf Hering
On Wed, Jun 03, Ian Campbell wrote: > On Sat, 2015-05-23 at 08:24 +, Olaf Hering wrote: > > Having xenalyze in the source tree makes it much easier to keep private > > debug code in hypervisor and xenalyze in sync. It helped alot while > > debugging the root cause for commit > > 607e8494c4239

Re: [Xen-devel] ARM64: XEN Domu not booting with the qemu qcow AARCH64 Ubuntu 15.04 disk

2015-06-08 Thread Sanjeev Pandita
Hi, On Wed, Jun 3, 2015 at 5:20 PM, Stefano Stabellini < stefano.stabell...@eu.citrix.com> wrote: > On Wed, 3 Jun 2015, Sanjeev Pandita wrote: > > Hi Stefano, > > > > On Wed, Jun 3, 2015 at 3:45 PM, Stefano Stabellini < > stefano.stabell...@eu.citrix.com> wrote: > > On Wed, 3 Jun 2015, Sanj

[Xen-devel] [rumpuserxen test] 58229: regressions - FAIL

2015-06-08 Thread osstest service user
flight 58229 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/58229/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866 build-i386-rumpuserxe

Re: [Xen-devel] [PATCH v6 1/3] ivtv: use arch_phys_wc_add() and require PAT disabled

2015-06-08 Thread Mauro Carvalho Chehab
Em Mon, 08 Jun 2015 17:20:20 -0700 "Luis R. Rodriguez" escreveu: > From: "Luis R. Rodriguez" > > We are burrying direct access to MTRR code support on > x86 in order to take advantage of PAT. In the future we > also want to make the default behaviour of ioremap_nocache() > to use strong UC, use

Re: [Xen-devel] [RFC][v2][PATCH 08/14] tools: extend xc_assign_device() to support rdm reservation policy

2015-06-08 Thread Chen, Tiejun
On 2015/6/7 19:27, Wei Liu wrote: On Wed, Jun 03, 2015 at 10:58:31AM +0800, Chen, Tiejun wrote: On 2015/6/3 0:36, Wei Liu wrote: On Fri, May 22, 2015 at 05:35:08PM +0800, Tiejun Chen wrote: This patch passes rdm reservation policy to xc_assign_device() so the policy is checked when assigning d

Re: [Xen-devel] [OSSTEST Nested PATCH v11 4/7] Changes on test step of Debian hvm guest install

2015-06-08 Thread Pang, LongtaoX
> -Original Message- > From: Ian Campbell [mailto:ian.campb...@citrix.com] > Sent: Monday, June 08, 2015 6:31 PM > To: Pang, LongtaoX > Cc: xen-devel@lists.xen.org; ian.jack...@eu.citrix.com; wei.l...@citrix.com; > Hu, > Robert > Subject: Re: [OSSTEST Nested PATCH v11 4/7] Changes on tes

[Xen-devel] [linux-3.4 test] 58178: regressions - trouble: broken/fail/pass

2015-06-08 Thread osstest service user
flight 58178 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/58178/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl 9 debian-install fail REGR. vs. 52209-bisect test-amd64-amd64-pair

Re: [Xen-devel] [PATCH v6 COLO 06/15] libxc/save: support COLO save

2015-06-08 Thread Yang Hongyang
On 06/08/2015 09:04 PM, Andrew Cooper wrote: On 08/06/15 04:45, Yang Hongyang wrote: call callbacks->get_dirty_pfn() after suspend primary vm to get dirty pages on secondary vm, and send pages both dirty on primary/secondary to secondary. Signed-off-by: Yang Hongyang Signed-off-by: Wen Congy

Re: [Xen-devel] [PATCH v6 COLO 06/15] libxc/save: support COLO save

2015-06-08 Thread Yang Hongyang
On 06/08/2015 09:04 PM, Andrew Cooper wrote: On 08/06/15 04:45, Yang Hongyang wrote: call callbacks->get_dirty_pfn() after suspend primary vm to get dirty pages on secondary vm, and send pages both dirty on primary/secondary to secondary. Signed-off-by: Yang Hongyang Signed-off-by: Wen Congy

[Xen-devel] [linux-next test] 58175: regressions - trouble: broken/fail/pass

2015-06-08 Thread osstest service user
flight 58175 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/58175/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-rumpuserxen-amd64 3 host-install(3) broken REGR. vs. 57931 test-amd64-amd64-xl-cr

[Xen-devel] [linux-3.18 test] 58185: regressions - FAIL

2015-06-08 Thread osstest service user
flight 58185 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/58185/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail in 58064 REGR. vs. 57312 Tests which are faili

Re: [Xen-devel] [PATCH v2 COLOPre 03/13] libxc/restore: zero ioreq page only one time

2015-06-08 Thread Yang Hongyang
On 06/08/2015 06:15 PM, Andrew Cooper wrote: On 08/06/15 10:58, Yang Hongyang wrote: On 06/08/2015 05:46 PM, Andrew Cooper wrote: On 08/06/15 04:43, Yang Hongyang wrote: ioreq page contains evtchn which will be set when we resume the secondary vm the first time. The hypervisor will check i

[Xen-devel] [PATCH v6 3/3] IB/ipath: use arch_phys_wc_add() and require PAT disabled

2015-06-08 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" We are burrying direct access to MTRR code support on x86 in order to take advantage of PAT. In the future we also want to make the default behaviour of ioremap_nocache() to use strong UC, use of mtrr_add() on those systems would make write-combining void. In order to h

[Xen-devel] [linux-linus test] 58167: trouble: broken/fail/pass

2015-06-08 Thread osstest service user
flight 58167 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/58167/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-rumpuserxen-amd64 3 host-install(3) broken REGR. vs. 58128

[Xen-devel] [PATCH v6 1/3] ivtv: use arch_phys_wc_add() and require PAT disabled

2015-06-08 Thread Luis R. Rodriguez
From: "Luis R. Rodriguez" We are burrying direct access to MTRR code support on x86 in order to take advantage of PAT. In the future we also want to make the default behaviour of ioremap_nocache() to use strong UC, use of mtrr_add() on those systems would make write-combining void. In order to h

Re: [Xen-devel] [PATCH v6 0/2] kconfig: add xenconfig

2015-06-08 Thread Luis R. Rodriguez
On Thu, May 28, 2015 at 2:50 PM, Luis R. Rodriguez wrote: > On Thu, May 21, 2015 at 11:32 AM, Luis R. Rodriguez wrote: >> On Thu, May 21, 2015 at 04:20:27PM +0800, Michal Marek wrote: >>> Dne 21.5.2015 v 02:53 Luis R. Rodriguez napsal(a): >>> > From: "Luis R. Rodriguez" >>> > >>> > Michal Marek,

Re: [Xen-devel] [PATCH v2 37/41] arm : acpi add acpi parameter to enable/disable acpi

2015-06-08 Thread Julien Grall
Hi Parth, On 17/05/2015 21:04, Parth Dixit wrote: ACPI will be disabled by default. Define new command line parameter "acpi" for enabling it. I don't think this is right. We have to be able to boot platform where there is only ACPI provided without adding a command line option. Overall, it

Re: [Xen-devel] [PATCH v2 41/41] arm : acpi route irq's at time of boot

2015-06-08 Thread Julien Grall
Hi, On 17/05/2015 21:04, Parth Dixit wrote: NOTE: This is a wrokaround to be fixed later. How do you plan to fix it? Route all the irq's to Dom0 at the time of booting. Trigger and polarity will be set dyanmaically when s/dyanmaically/dynamically/ Dom0 request's for it. Signed-off-by: P

Re: [Xen-devel] [PATCH v2 33/41] arm : acpi prepare acpi tables for dom0

2015-06-08 Thread Julien Grall
On 17/05/2015 21:04, Parth Dixit wrote: Map acpi tables described in uefi table to DOM0 address space Signed-off-by: Parth Dixit --- xen/arch/arm/domain_build.c | 59 - 1 file changed, 58 insertions(+), 1 deletion(-) diff --git a/xen/arch/arm/do

Re: [Xen-devel] [PATCH v2 27/41] arm : add helper functions to map memory regions

2015-06-08 Thread Julien Grall
Hi Parth, On 17/05/2015 21:03, Parth Dixit wrote: creates a helper function for mapping with cached attributes Signed-off-by: Parth Dixit --- xen/arch/arm/p2m.c| 26 ++ xen/include/asm-arm/p2m.h | 10 ++ 2 files changed, 36 insertions(+) diff --git

Re: [Xen-devel] [PATCH v2 30/41] arm : acpi add placeholder for acpi load address

2015-06-08 Thread Julien Grall
Hi Parth, On 17/05/2015 21:03, Parth Dixit wrote: EFI table, memory description table and some of acpi tables will reside in DOM0 memory. Add placeholder for starting address for loading in DOM0 and get/set acpi size helpers. Signed-off-by: Parth Dixit --- xen/arch/arm/acpi/lib.c| 12 +++

Re: [Xen-devel] [PATCH v2 32/41] arm : acpi dynamically map mmio regions

2015-06-08 Thread Julien Grall
Hi Parth, On 17/05/2015 21:03, Parth Dixit wrote: In ACPI mmio regions are described in DSDT which requires AML interpreter. Defer the mapping of mmio until DSDT is parsed in DOM0 and map mmio's dynamically at the time of request. I'm against a such solution. Even though it's DOM0 we should av

Re: [Xen-devel] [PATCH v2 31/41] arm : acpi estimate memory required for acpi/efi tables

2015-06-08 Thread Julien Grall
Hi Parth, I think it misses a ":" between acpi and estimate. On 17/05/2015 21:03, Parth Dixit wrote: Estimate the memory required for loading acpi/efi tablee in DOM0. Initialize the size of acpi/efi tables. It needs more description... Signed-off-by: Parth Dixit --- xen/arch/arm/domain_

Re: [Xen-devel] [PATCH v2 35/41] arm : acpi add helper function to calculate crc32

2015-06-08 Thread Julien Grall
Hi, On 17/05/2015 21:04, Parth Dixit wrote: Add helper functions for calculating crc32. This is required for computing crc of efi table. These functions are copied from here http://mirrors.neusoft.edu.cn/rpi-kernel/lib/xz/xz_crc32.c Original author's are Lasse Collin and Igor Pavlov. I'm near

Re: [Xen-devel] [PATCH v2 29/41] arm : acpi read acpi memory info from uefi

2015-06-08 Thread Julien Grall
Hi Parth, On 17/05/2015 21:03, Parth Dixit wrote: ACPI memory is seperate from conventional memory and should s/seperate/separate/ be marked as reserved while passing to DOM0. Create a new meminfo structure to store all the acpi tables listed in uefi. Signed-off-by: Parth Dixit --- xen/a

Re: [Xen-devel] [PATCH v2 39/41] arm : acpi configure interrupts dynamically

2015-06-08 Thread Julien Grall
Hi Parth, On 17/05/2015 21:04, Parth Dixit wrote: Interrupt information is described in DSDT and is not available at the time of booting. Configure the interrupts dynamically when requested by Dom0 Missing "." Also, I'm sure we talked about it multiple time. I'd like to keep the ACPI changes

[Xen-devel] [libvirt test] 58161: regressions - FAIL

2015-06-08 Thread osstest service user
flight 58161 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/58161/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt 11 guest-start fail REGR. vs. 53854 test-amd64-amd64-libvirt

[Xen-devel] [PATCH v2 0/4] Fix device listener interface for PCI to PCI bridges

2015-06-08 Thread Don Slutz
changes v1 to v2: Split v1 patch into 3. Added a BUG FIX patch (#1: "exec: Do not use MemoryRegion after free"). Technically this bug fix should be a separate patch, however this issue only seems to reproduce when this patch set is applied. Michael S. Tsirkin: "You need some

[Xen-devel] [BUGFIX][PATCH v2 1/4] exec: Do not use MemoryRegion after free

2015-06-08 Thread Don Slutz
Here is gdb output that shows this happening: Breakpoint 3, object_finalize (data=0x7fdf32a14010) at qom/object.c:417 417 obj->free(obj); (gdb) bt #0 object_finalize (data=0x7fdf32a14010) at qom/object.c:417 #1 0x007329d4 in object_unref (obj=0x7fdf32a14010) at qom

[Xen-devel] [PATCH v2 4/4] xen: Fix map/unmap of pcidev to ioreq server

2015-06-08 Thread Don Slutz
The commit 707ff80021ccd7a68f4b3d2c44eebf87efbb41c4 added usage of xc_hvm_map_pcidev_from_ioreq_server() and xc_hvm_unmap_pcidev_from_ioreq_server(). These routines only correctly work if the PCI BDF of a PCI device is unique. The 3 parts (bus, device, and function) of a PCI BDF are not required

[Xen-devel] [PATCH v2 3/4] xen: Add usage of device listener interface for PCI to PCI bridges

2015-06-08 Thread Don Slutz
Signed-off-by: Don Slutz CC: Don Slutz --- include/hw/xen/xen_common.h | 10 ++ xen-hvm.c | 13 - 2 files changed, 18 insertions(+), 5 deletions(-) diff --git a/include/hw/xen/xen_common.h b/include/hw/xen/xen_common.h index 38f29fb..6579b78 100644 --- a/in

[Xen-devel] [PATCH v2 2/4] Extend device listener interface for PCI to PCI bridges

2015-06-08 Thread Don Slutz
The commit 707ff80021ccd7a68f4b3d2c44eebf87efbb41c4 assumed that a PCI device has a static address. This is not true for PCI devices that are on the secondary bus of a PCI to PCI bridge. BIOS and/or guest OS can change the secondary bus number to a new value at any time. Extend the device listen

Re: [Xen-devel] [PATCH v2 for Xen 4.6 4/4] xl: enabling XL to set per-VCPU parameters of a domain for RTDS scheduler

2015-06-08 Thread Chong Li
On Mon, Jun 8, 2015 at 11:21 AM, Dario Faggioli wrote: > On Mon, 2015-05-25 at 19:11 -0500, Chong Li wrote: >> Change main_sched_rtds and related output functions to support per-VCPU >> settings >> for xl sched-rtds tool. >> >> Signed-off-by: Chong Li >> Signed-off-by: Meng Xu >> Signed-off-by:

Re: [Xen-devel] Clarifying the state of ARINC653 scheduler (and other components) in Xen 4.5 and beyond

2015-06-08 Thread Dario Faggioli
On Mon, 2015-06-08 at 14:01 +0100, Lars Kurth wrote: > > On 8 Jun 2015, at 13:19, Ian Campbell wrote: > > > > In MAINTAINERS S: Supported means: > > > > "Someone is actually paid to look after this.", which I think is > > distinct from "This works well enough that the project is happy to > > rec

Re: [Xen-devel] [edk2] The size of memory is wrong inside of virtual machine(VM) when using OVMF

2015-06-08 Thread Laszlo Ersek
On 06/07/15 14:29, Wei Liu wrote: > On Mon, Jun 01, 2015 at 09:13:08AM +, Maoming wrote: >> Hi all: >>I encountered a troublesome problem about OVMF. >>I used OVMF.fd as a BIOS of virtual machine(VM). >> >>1、my environment: >>xen_version: 4.6-unstable

Re: [Xen-devel] [PATCH v2 for Xen 4.6 3/4] libxl: enabling XL to set per-VCPU parameters of a domain for RTDS scheduler

2015-06-08 Thread Chong Li
On Mon, Jun 8, 2015 at 10:56 AM, Dario Faggioli wrote: > On Fri, 2015-06-05 at 12:37 +0100, Ian Campbell wrote: >> On Mon, 2015-05-25 at 19:09 -0500, Chong Li wrote: > >> > diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl >> > index 117b61d..d28d274 100644 >> > --- a/tools/li

Re: [Xen-devel] [PATCH] xen/arm: Propagate clock-frequency to DOMU if present in the DT timer node

2015-06-08 Thread Chris (Christopher) Brand
Hi Julien, >My test was limited as I don't have a platform where CNTFRQ/CNTFRQ_EL0 is not >valid. I may have done a mistake in the code. Understood. That's why I thought it would be worthwhile posting my results :-) >> What I see is that in preinit_xen_time(), the call to dt_property_read_u32()

[Xen-devel] [PATCH OSSTEST v2] Stubdom test case

2015-06-08 Thread Wei Liu
Currently only QEMU traditional supports stubdom, so we only create test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm Note that stubdom only

[Xen-devel] Status of "Improve RTDS scheduler"

2015-06-08 Thread Dagaen Golomb
... > == Hypervisor == [...] > > * Improve RTDS scheduler (none) >Change RTDS from quantum driven to event driven > - Dagaen Golomb, Meng Xu, Chong Li > ... Ok. The patch for this is out: http://osdir.com/ml/general/2015-06/msg10265.html Looking forward to comments. Regards, Dagaen Go

Re: [Xen-devel] [PATCH v2 5/5] libxl: spawns two QEMUs for HVM guests

2015-06-08 Thread Stefano Stabellini
On Mon, 8 Jun 2015, Ian Jackson wrote: > Stefano Stabellini writes ("Re: [PATCH v2 5/5] libxl: spawns two QEMUs for > HVM guests"): > > Do you have any suggestions on how I could fix this function for the > > purpose of this series? I would be quite happy to leave fixing > > qdisk_spawn_outcome in

Re: [Xen-devel] [PATCH RFC 0/4] 'reset everything' approach to PVHVM guest kexec

2015-06-08 Thread Wei Liu
On Mon, Jun 08, 2015 at 04:53:46PM +0100, Wei Liu wrote: > On Wed, Jun 03, 2015 at 03:35:18PM +0200, Vitaly Kuznetsov wrote: > > Jan and Tim, > > > > last week you expressed some concerns about if the toolstack-based > > approach to PVHVM guest kexec is the best. Here you can see the 'reset > > ev

[Xen-devel] [ovmf test] 58156: regressions - FAIL

2015-06-08 Thread osstest service user
flight 58156 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/58156/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail REGR. vs. 56492 test-amd64-i386-xl-qemuu-win

[Xen-devel] [xen-unstable test] 58151: tolerable FAIL

2015-06-08 Thread osstest service user
flight 58151 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/58151/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-libvirt 6 xen-bootfail pass in 58095 test-armhf-armhf-xl 9 de

[Xen-devel] [PATCH] libxl: Add timestamp to the libxl driver log.

2015-06-08 Thread Anthony PERARD
Signed-off-by: Anthony PERARD --- src/libxl/libxl_conf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/libxl/libxl_conf.c b/src/libxl/libxl_conf.c index 9b258ac..e845759 100644 --- a/src/libxl/libxl_conf.c +++ b/src/libxl/libxl_conf.c @@ -1541,7 +1541,7 @@ libxlDriverCon

Re: [Xen-devel] [PATCH] arinc653: don't leak hypervisor stack contents through XEN_SYSCTL_SCHEDOP_getinfo

2015-06-08 Thread Robert VanVossen
Hello, On 6/8/2015 9:24 AM, Jan Beulich wrote: > arinc653: don't leak hypervisor stack contents through > XEN_SYSCTL_SCHEDOP_getinfo > > Note that due to XSA-77 this is not a security issue. > > Reported-by: "栾尚聪(好风)" > Signed-off-by: Jan Beulich > > --- a/xen/common/sched_arinc653.c > ++

Re: [Xen-devel] [PATCH v2 5/5] libxl: spawns two QEMUs for HVM guests

2015-06-08 Thread Ian Jackson
Stefano Stabellini writes ("Re: [PATCH v2 5/5] libxl: spawns two QEMUs for HVM guests"): > Do you have any suggestions on how I could fix this function for the > purpose of this series? I would be quite happy to leave fixing > qdisk_spawn_outcome in libxl.c to you :-) Sure. > TBH as I wrote earl

Re: [Xen-devel] [PATCH v2 3/5] libxl: xsrestrict QEMU

2015-06-08 Thread Stefano Stabellini
On Mon, 8 Jun 2015, Ian Jackson wrote: > Stefano Stabellini writes ("[PATCH v2 3/5] libxl: xsrestrict QEMU"): > > Check whether QEMU supports the xsrestrict option, by parsing its --help > > output. Store the result on xenstore for future reference on a per QEMU > > binary basis, so that device_mod

Re: [Xen-devel] [PATCH v2 for Xen 4.6 4/4] xl: enabling XL to set per-VCPU parameters of a domain for RTDS scheduler

2015-06-08 Thread Dario Faggioli
On Mon, 2015-05-25 at 19:11 -0500, Chong Li wrote: > Change main_sched_rtds and related output functions to support per-VCPU > settings > for xl sched-rtds tool. > > Signed-off-by: Chong Li > Signed-off-by: Meng Xu > Signed-off-by: Sisu Xi > --- > tools/libxl/xl_cmdimpl.c | 261 > +++

Re: [Xen-devel] [PATCH v2 5/5] libxl: spawns two QEMUs for HVM guests

2015-06-08 Thread Stefano Stabellini
On Mon, 8 Jun 2015, Ian Jackson wrote: > Stefano Stabellini writes ("Re: [PATCH v2 5/5] libxl: spawns two QEMUs for > HVM guests"): > > On Sun, 7 Jun 2015, Wei Liu wrote: > > > Also it looks very similar to the function with the same name in > > > libxl.c. I'm not sure why that doesn't propagate r

Re: [Xen-devel] QEMU bumping memory bug analysis

2015-06-08 Thread Don Slutz
On 06/08/15 11:37, George Dunlap wrote: > On 06/08/2015 04:01 PM, Don Slutz wrote: >> On 06/08/15 10:20, George Dunlap wrote: >>> And at the moment, pages in the p2m are allocated by a number of entities: >>> * In the libxc domain builder. >>> * In the guest balloon driver >>> * And now, in qemu, t

Re: [Xen-devel] [PATCH RFC 4/4] xen: arch-specific hooks for domain_soft_reset()

2015-06-08 Thread Vitaly Kuznetsov
"Jan Beulich" writes: On 03.06.15 at 15:35, wrote: >> +int arch_domain_soft_reset(struct domain *d) >> +{ >> +struct page_info *page = virt_to_page(d->shared_info), *new_page; >> +int ret = 0; >> +struct domain *owner; >> +unsigned long mfn, mfn_new, gfn; >> +p2m_type_t

Re: [Xen-devel] [PATCH v2 for Xen 4.6 3/4] libxl: enabling XL to set per-VCPU parameters of a domain for RTDS scheduler

2015-06-08 Thread Dario Faggioli
On Fri, 2015-06-05 at 12:37 +0100, Ian Campbell wrote: > On Mon, 2015-05-25 at 19:09 -0500, Chong Li wrote: > > diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl > > index 117b61d..d28d274 100644 > > --- a/tools/libxl/libxl_types.idl > > +++ b/tools/libxl/libxl_types.idl > > @

Re: [Xen-devel] [PATCH RFC 0/4] 'reset everything' approach to PVHVM guest kexec

2015-06-08 Thread Wei Liu
On Wed, Jun 03, 2015 at 03:35:18PM +0200, Vitaly Kuznetsov wrote: > Jan and Tim, > > last week you expressed some concerns about if the toolstack-based > approach to PVHVM guest kexec is the best. Here you can see the 'reset > everything' approach to the same problem. It is the bare minimum of wha

Re: [Xen-devel] [PATCH v2 3/5] libxl: xsrestrict QEMU

2015-06-08 Thread Ian Jackson
Stefano Stabellini writes ("[PATCH v2 3/5] libxl: xsrestrict QEMU"): > Check whether QEMU supports the xsrestrict option, by parsing its --help > output. Store the result on xenstore for future reference on a per QEMU > binary basis, so that device_model_override still works fine with it. ... > +

Re: [Xen-devel] [PATCH v2 1/5] libxl: allow /local/domain/0/device-model/$DOMID to be written by $DOMID

2015-06-08 Thread Ian Jackson
Stefano Stabellini writes ("[PATCH v2 1/5] libxl: allow /local/domain/0/device-model/$DOMID to be written by $DOMID"): > The device model is going to restrict its xenstore connection to $DOMID > level. Let it access /local/domain/0/device-model/$DOMID, as it is > required by QEMU to read/write the

Re: [Xen-devel] [PATCH v2 5/5] libxl: spawns two QEMUs for HVM guests

2015-06-08 Thread Ian Jackson
Stefano Stabellini writes ("Re: [PATCH v2 5/5] libxl: spawns two QEMUs for HVM guests"): > On Sun, 7 Jun 2015, Wei Liu wrote: > > Also it looks very similar to the function with the same name in > > libxl.c. I'm not sure why that doesn't propagate rc either... I think that's a bug. > Right, I ba

Re: [Xen-devel] QEMU bumping memory bug analysis

2015-06-08 Thread Konrad Rzeszutek Wilk
On Mon, Jun 08, 2015 at 04:20:48PM +0100, George Dunlap wrote: > On 06/08/2015 03:53 PM, Konrad Rzeszutek Wilk wrote: > > On Mon, Jun 08, 2015 at 01:11:38PM +0100, Ian Campbell wrote: > >> On Mon, 2015-06-08 at 12:40 +0100, Stefano Stabellini wrote: > >> > > I disagree that libxl should be the

[Xen-devel] [qemu-mainline test] 58150: regressions - FAIL

2015-06-08 Thread osstest service user
flight 58150 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/58150/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 11 guest-saverestore fail REGR. vs. 57815 test-amd6

Re: [Xen-devel] [PATCH RFC 0/4] 'reset everything' approach to PVHVM guest kexec

2015-06-08 Thread Ian Jackson
Vitaly Kuznetsov writes ("[PATCH RFC 0/4] 'reset everything' approach to PVHVM guest kexec"): > 1) As XS_RESET_WATCHES is not supported by oxenstored we need to try removing > the watch in case add operation failed, e.g.: It would surely be better to fix oxenstored. IIRC the approach of trying t

Re: [Xen-devel] QEMU bumping memory bug analysis

2015-06-08 Thread George Dunlap
On 06/08/2015 04:01 PM, Don Slutz wrote: > On 06/08/15 10:20, George Dunlap wrote: >> And at the moment, pages in the p2m are allocated by a number of entities: >> * In the libxc domain builder. >> * In the guest balloon driver >> * And now, in qemu, to allocate extra memory for virtual ROMs. > >

Re: [Xen-devel] [PATCH RFC 2/4] xen: grant_table: implement grant_table_soft_reset()

2015-06-08 Thread Jan Beulich
>>> On 08.06.15 at 16:58, wrote: > "Jan Beulich" writes: > > On 03.06.15 at 15:35, wrote: >>> When soft reset is being performed we need to replace all actively >>> granted pages with empty pages to prevent possible future memory >>> corruption as the newly started kernel won't be aware of

Re: [Xen-devel] [PATCH RFC 4/4] xen: arch-specific hooks for domain_soft_reset()

2015-06-08 Thread Jan Beulich
>>> On 03.06.15 at 15:35, wrote: > +int arch_domain_soft_reset(struct domain *d) > +{ > +struct page_info *page = virt_to_page(d->shared_info), *new_page; > +int ret = 0; > +struct domain *owner; > +unsigned long mfn, mfn_new, gfn; > +p2m_type_t __p2mt; No need for leading und

Re: [Xen-devel] [xen-unstable test] 57852: regressions - FAIL

2015-06-08 Thread Ian Campbell
On Mon, 2015-06-08 at 11:21 -0400, Konrad Rzeszutek Wilk wrote: > On Mon, Jun 08, 2015 at 03:47:22PM +0100, Ian Jackson wrote: > > Konrad Rzeszutek Wilk writes ("Re: [Xen-devel] [xen-unstable test] 57852: > > regressions - FAIL"): > > > Could it be an missing microcode update? I don't know if the

Re: [Xen-devel] [PATCH v2 4/5] libxl: change xs path for pv qemu

2015-06-08 Thread Stefano Stabellini
On Mon, 8 Jun 2015, Wei Liu wrote: > On Thu, Jun 04, 2015 at 12:28:18PM +0100, Stefano Stabellini wrote: > > If QEMU is ran just to provide PV backends, change the xenstore path to > > /local/domain/0/device-model/$DOMID/pv. > > > > Add a parameter to libxl__device_model_xs_path to distinguish the

Re: [Xen-devel] [xen-unstable test] 57852: regressions - FAIL

2015-06-08 Thread Konrad Rzeszutek Wilk
On Mon, Jun 08, 2015 at 03:47:22PM +0100, Ian Jackson wrote: > Konrad Rzeszutek Wilk writes ("Re: [Xen-devel] [xen-unstable test] 57852: > regressions - FAIL"): > > Could it be an missing microcode update? I don't know if the OSSTest does > > the ucode=scan or updates the microcode later? > > I t

Re: [Xen-devel] QEMU bumping memory bug analysis

2015-06-08 Thread George Dunlap
On 06/08/2015 03:53 PM, Konrad Rzeszutek Wilk wrote: > On Mon, Jun 08, 2015 at 01:11:38PM +0100, Ian Campbell wrote: >> On Mon, 2015-06-08 at 12:40 +0100, Stefano Stabellini wrote: >> > I disagree that libxl should be the arbitrator of a property that is > stored, maintained and enforced by

Re: [Xen-devel] [RFC v2] xSplice design

2015-06-08 Thread Konrad Rzeszutek Wilk
. snip .. > >> * You may need support for adapting or augmenting exception tables if > >> patching such code is desired (it probably is). Hotpatches may need > >> to bring their own small exception tables (similar to how Linux > >> modules support this). If you don't plan on supporting hotp

Re: [Xen-devel] [PATCH v2 5/5] libxl: spawns two QEMUs for HVM guests

2015-06-08 Thread Stefano Stabellini
On Sun, 7 Jun 2015, Wei Liu wrote: > On Thu, Jun 04, 2015 at 12:28:19PM +0100, Stefano Stabellini wrote: > > Starts a second QEMU to provide PV backends in userspace to HVM guests. > > > > Signed-off-by: Stefano Stabellini > > --- > > tools/libxl/libxl_create.c | 18 ++ > > too

Re: [Xen-devel] xen-unstable build fails with XEN_DUMP_DIR undeclader in xl_cmdimpl.c

2015-06-08 Thread Wei Liu
On Mon, Jun 08, 2015 at 04:44:05PM +0200, Fabio Fantoni wrote: [...] > >>config/Paths.mk instead contain it correctly. > >>I checked the commit > >>http://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=bf36d0792032a0245e4a17a64c8b9eb9e056f282 > >>but not add something about libxl/_paths.h and in

Re: [Xen-devel] [PATCH RFC 1/4] xen: evtchn: make evtchn_reset() ready for soft reset

2015-06-08 Thread Vitaly Kuznetsov
"Jan Beulich" writes: On 03.06.15 at 15:35, wrote: >> --- a/xen/common/event_channel.c >> +++ b/xen/common/event_channel.c >> @@ -274,11 +274,13 @@ static long >> evtchn_bind_interdomain(evtchn_bind_interdomain_t *bind) >> >> lchn->u.interdomain.remote_dom = rd; >> lchn->u.int

Re: [Xen-devel] [PATCH RFC 2/4] xen: grant_table: implement grant_table_soft_reset()

2015-06-08 Thread Vitaly Kuznetsov
"Jan Beulich" writes: On 03.06.15 at 15:35, wrote: >> When soft reset is being performed we need to replace all actively >> granted pages with empty pages to prevent possible future memory >> corruption as the newly started kernel won't be aware of these >> granted pages. >> >> We make the

Re: [Xen-devel] QEMU bumping memory bug analysis

2015-06-08 Thread Don Slutz
On 06/08/15 10:20, George Dunlap wrote: > On 06/08/2015 02:22 PM, Stefano Stabellini wrote: >>> 3. A group of entities which operate in isolation by only ever >>> increasing or descreasing the max pages according to their own >>> requirements, without reference to anyone else.

[Xen-devel] [PATCH 13/17] x86/hvm: only acquire RAM pages for emulation when we need to

2015-06-08 Thread Paul Durrant
If hvmemul_do_io_addr() is called to complete a previously issued emulation then there is no need to acquire the RAM pages again. There is also no need to re-calculate the value of *reps, providing hvmemul_do_io() updates it when returning X86EMUL_OKAY. Signed-off-by: Paul Durrant Cc: Keir Fraser

[Xen-devel] [PATCH 17/17] x86/hvm: track large memory mapped accesses by linear address

2015-06-08 Thread Paul Durrant
The code in hvmemul_do_io() that tracks large reads or writes, to avoid re-issue of component I/O, is defeated by accesses across a page boundary because it uses physical rather than linear address. The code is also only relevant to memory mapped I/O to or from a buffer. This patch re-factors the

Re: [Xen-devel] [xen-unstable test] 57852: regressions - FAIL

2015-06-08 Thread Ian Jackson
Konrad Rzeszutek Wilk writes ("Re: [Xen-devel] [xen-unstable test] 57852: regressions - FAIL"): > Could it be an missing microcode update? I don't know if the OSSTest does > the ucode=scan or updates the microcode later? I think osstest's machines don't get microcode updates. I'm no expert on x8

Re: [Xen-devel] [xen-unstable test] 57852: regressions - FAIL

2015-06-08 Thread Ian Jackson
Jan Beulich writes ("Re: [Xen-devel] [xen-unstable test] 57852: regressions - FAIL"): > On 08.06.15 at 11:27, wrote: > > I don't know much about the hardware in the pool other than what can be > > gathered from the serial and dmesg logs. > > Right - this is useful for learning details of an indi

[Xen-devel] [PATCH 16/17] x86/hvm: remove multiple open coded 'chunking' loops

2015-06-08 Thread Paul Durrant
...in hvmemul_read/write() Add hvmemul_phys_mmio_access() and hvmemul_linear_mmio_access() functions to reduce code duplication. Signed-off-by: Paul Durrant Cc: Keir Fraser Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/emulate.c | 237 +--- 1

[Xen-devel] [PATCH 11/17] x86/hvm: remove hvm_io_state enumeration

2015-06-08 Thread Paul Durrant
Emulation request status is already covered by STATE_IOREQ_XXX values so just use those. The mapping is: HVMIO_none-> STATE_IOREQ_NONE HVMIO_awaiting_completion -> STATE_IOREQ_READY HVMIO_completed -> STATE_IORESP_READY Signed-off-by: Paul Durrant Cc: Keir Fraser Cc: J

[Xen-devel] [PATCH 15/17] x86/hvm: make sure translated MMIO reads or writes fall within a page

2015-06-08 Thread Paul Durrant
...otherwise they will simply carry on to the next page using a normal linear-to-phys translation. Signed-off-by: Paul Durrant Cc: Keir Fraser Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/emulate.c |6 -- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/xen/arch

[Xen-devel] [PATCH 14/17] x86/hvm: remove extraneous parameter from hvmtrace_io_assist()

2015-06-08 Thread Paul Durrant
The is_mmio parameter can be inferred from the ioreq type. Signed-off-by: Paul Durrant Cc: Keir Fraser Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/emulate.c |7 --- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/hvm/emulate.c b/xen/arch/x86/hvm/e

[Xen-devel] [PATCH 12/17] x86/hvm: use ioreq_t to track in-flight state

2015-06-08 Thread Paul Durrant
Use an ioreq_t rather than open coded state, size, dir and data fields in struct hvm_vcpu_io. This also allows PIO completion to be handled similarly to MMIO completion by re-issuing the handle_pio() call. Signed-off-by: Paul Durrant Cc: Keir Fraser Cc: Jan Beulich Cc: Andrew Cooper --- xen/a

[Xen-devel] [PATCH 10/17] x86/hvm: remove HVMIO_dispatched I/O state

2015-06-08 Thread Paul Durrant
By removing the HVMIO_dispatched state and making all pending emulations (i.e. all those not handled by the hypervisor) use HVMIO_awating_completion, various code-paths can be simplified. Signed-off-by: Paul Durrant Cc: Keir Fraser Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/emulat

Re: [Xen-devel] QEMU bumping memory bug analysis

2015-06-08 Thread Konrad Rzeszutek Wilk
On Mon, Jun 08, 2015 at 01:11:38PM +0100, Ian Campbell wrote: > On Mon, 2015-06-08 at 12:40 +0100, Stefano Stabellini wrote: > > > > > I disagree that libxl should be the arbitrator of a property that is > > > > stored, maintained and enforced by Xen. Xen should be the arbitrator. > > > > > > Tha

Re: [Xen-devel] [PATCH v2 1/5] libxl: allow /local/domain/0/device-model/$DOMID to be written by $DOMID

2015-06-08 Thread Stefano Stabellini
On Sun, 7 Jun 2015, Wei Liu wrote: > On Thu, Jun 04, 2015 at 12:28:15PM +0100, Stefano Stabellini wrote: > > The device model is going to restrict its xenstore connection to $DOMID > > level. Let it access /local/domain/0/device-model/$DOMID, as it is > > required by QEMU to read/write the physmap.

Re: [Xen-devel] xen-unstable build fails with XEN_DUMP_DIR undeclader in xl_cmdimpl.c

2015-06-08 Thread Fabio Fantoni
Il 08/06/2015 15:56, Wei Liu ha scritto: On Mon, Jun 08, 2015 at 03:49:24PM +0200, Fabio Fantoni wrote: Il 08/06/2015 15:30, Wei Liu ha scritto: On Mon, Jun 08, 2015 at 02:36:09PM +0200, Fabio Fantoni wrote: Il 08/06/2015 13:28, Wei Liu ha scritto: On Mon, Jun 08, 2015 at 01:25:05PM +0200, Fa

Re: [Xen-devel] [RFC v2] xSplice design

2015-06-08 Thread Martin Pohlack
Hi, some inline comments. On 05.06.2015 17:00, Konrad Rzeszutek Wilk wrote: > On Wed, May 20, 2015 at 05:11:20PM +0200, Martin Pohlack wrote: >> Hi, >> >> this looks very interesting. > > Thank you! >> >> I have talked about an experimental Xen hotpatching design at Linux >> Plumbers Conference

[Xen-devel] [PATCH 03/17] x86/hvm: unify internal portio and mmio intercepts

2015-06-08 Thread Paul Durrant
The implementation of mmio and portio intercepts is unnecessarily different. This leads to much code duplication. This patch unifies much of the intercept handling, leaving only distinct handlers for stdvga mmio and dpci portio. Subsequent patches will unify those handlers. Signed-off-by: Paul Dur

Re: [Xen-devel] [PATCH] make do_sched_op_compat() x86-specific

2015-06-08 Thread Jan Beulich
>>> On 08.06.15 at 16:29, wrote: > On Mon, 2015-06-08 at 14:28 +0100, Jan Beulich wrote: >> Being a pre-3.1 compatibility hypercall handler only, it's not needed >> on ARM or any future architectures Xen may get ported to. >> >> Also the function shouldn't really be used internally - its use shou

[Xen-devel] [PATCH 09/17] x86/hvm: remove hvm_io_pending() check in hvmemul_do_io()

2015-06-08 Thread Paul Durrant
The check is done at the wrong point (since it is irrelevant if the I/O is to be handled by the hypervisor) and its functionality can be covered by returning X86EMUL_UNHANDLEABLE from hvm_send_assist_req() instead. This patch also removes the domain_crash() call from hvm_send_assist_req(). Returni

[Xen-devel] [PATCH 04/17] x86/hvm: unify dpci portio intercept with standard portio intercept

2015-06-08 Thread Paul Durrant
This patch re-works the dpci portio intercepts so that they can be unified with standard portio handling thereby removing a substantial amount of code duplication. Signed-off-by: Paul Durrant Cc: Keir Fraser Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/hvm.c |2 + xen/

[Xen-devel] [PATCH 07/17] x86/hvm: only call hvm_io_assist() from hvm_wait_for_io()

2015-06-08 Thread Paul Durrant
By removing the calls in hvmemul_do_io() (which is replaced by a single assignment) and hvm_complete_assist_request() (which is replaced by a call to process_portio_intercept() with a suitable set of ops) then hvm_io_assist() can be moved into hvm.c and made static (and hence be a candidate for inl

[Xen-devel] [PATCH 00/17] x86/hvm: I/O emulation cleanup and fix

2015-06-08 Thread Paul Durrant
This patch series re-works much of the code involved in emulation of port and memory mapped I/O for HVM guests. The code has become very convoluted and, at least by inspection, certain emulations will apparently malfunction. The series is broken down into 17 patches (which are also available in m

[Xen-devel] [PATCH 01/17] x86/hvm: simplify hvmemul_do_io()

2015-06-08 Thread Paul Durrant
Currently hvmemul_do_io() handles paging for I/O to/from a guest address inline. This causes every exit point to have to execute: if ( ram_page ) put_page(ram_page); This patch introduces wrapper hvmemul_do_io_addr() and hvmemul_do_io_buffer() functions. The latter is used for I/O to/from a X

[Xen-devel] [PATCH 06/17] x86/hvm: revert 82ed8716b "fix direct PCI port I/O emulation retry...

2015-06-08 Thread Paul Durrant
...and error handling" NOTE: A straight reversion was not possible because of subsequent changes in the code so this at least partially a manual reversion. By limiting hvmemul_do_io_addr() to reps falling within the pages on which a reference has already been taken, we can guarantee that ca

[Xen-devel] [PATCH 02/17] x86/hvm: re-name struct hvm_mmio_handler to hvm_mmio_ops

2015-06-08 Thread Paul Durrant
The struct just contains three methods and no data, so the name hvm_mmio_ops more accurately reflects its content. A subsequent patch introduces a new structure which more accurately warrants the name hvm_mmio_handler so doing the rename in this purely cosmetic patch avoids conflating functional an

[Xen-devel] [PATCH 05/17] x86/hvm: unify stdvga mmio intercept with standard mmio intercept

2015-06-08 Thread Paul Durrant
It's clear from the following check in hvmemul_rep_movs: if ( sp2mt == p2m_mmio_direct || dp2mt == p2m_mmio_direct || (sp2mt == p2m_mmio_dm && dp2mt == p2m_mmio_dm) ) return X86EMUL_UNHANDLEABLE; that mmio <-> mmio copy is not handled. This means the code in the stdvga mmio i

[Xen-devel] [PATCH 08/17] x86/hvm: split I/O completion handling from state model

2015-06-08 Thread Paul Durrant
The state of in-flight I/O and how its completion will be handled are logically separate and conflating the two makes the code unnecessarily confusing. Signed-off-by: Paul Durrant Cc: Keir Fraser Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/hvm/hvm.c | 42 +

Re: [Xen-devel] [PATCH RFC 3/4] xen: implement SCHEDOP_soft_reset

2015-06-08 Thread Jan Beulich
>>> On 03.06.15 at 15:35, wrote: > --- a/xen/common/domain.c > +++ b/xen/common/domain.c > @@ -1116,12 +1116,12 @@ int map_vcpu_info(struct vcpu *v, unsigned long gfn, > unsigned offset) > > /* > * Unmap the vcpu info page if the guest decided to place it somewhere > - * else. This is only

Re: [Xen-devel] [PATCH] make do_sched_op_compat() x86-specific

2015-06-08 Thread Ian Campbell
On Mon, 2015-06-08 at 14:28 +0100, Jan Beulich wrote: > Being a pre-3.1 compatibility hypercall handler only, it's not needed > on ARM or any future architectures Xen may get ported to. > > Also the function shouldn't really be used internally - its use should > be limited to its purpose (and henc

Re: [Xen-devel] RFC: making the PVH 64bit ABI as stableo

2015-06-08 Thread Konrad Rzeszutek Wilk
On Sat, Jun 06, 2015 at 11:57:31AM +0200, Roger Pau Monné wrote: > El 05/06/15 a les 23.52, Tim Deegan ha escrit: > > At 18:21 +0100 on 05 Jun (1433528517), Andrew Cooper wrote: > >> On 05/06/15 18:16, Stefano Stabellini wrote: > >>> On Fri, 5 Jun 2015, Andrew Cooper wrote: > On 05/06/15 17:43

  1   2   3   >