[Xen-devel] [linux-3.18 test] 58976: regressions - FAIL

2015-06-29 Thread osstest service user
flight 58976 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/58976/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-rumpuserxen-amd64 15 rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs. 58

[Xen-devel] [rumpuserxen test] 58983: regressions - FAIL

2015-06-29 Thread osstest service user
flight 58983 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/58983/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 5 rumpuserxen-build fail REGR. vs. 33866 build-i386-rumpuserxe

[Xen-devel] fix building error

2015-06-29 Thread Wen Congyang
Signed-off-by: Wen Congyang --- tools/libxl/libxl_netbuffer.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/libxl/libxl_netbuffer.c b/tools/libxl/libxl_netbuffer.c index ff2d6c7..107e867 100644 --- a/tools/libxl/libxl_netbuffer.c +++ b/tools/libxl/libxl_netbuffer.c

Re: [Xen-devel] [PATCH 12/35] libxl: events: Make timeout and async exec setup take an ao, not a gc

2015-06-29 Thread Wen Congyang
On 06/26/2015 01:44 AM, Ian Jackson wrote: > Change the timeout setup functions to take a libxl__ao, not a > libxl__gc. This is going to be needed for ao abort, because timeouts > are going to be a main hook for ao abort requests - so the timeouts > need to be associated with an ao. > > This mean

[Xen-devel] [xen-4.4-testing test] 58975: tolerable trouble: blocked/broken/fail/pass - PUSHED

2015-06-29 Thread osstest service user
flight 58975 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/58975/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-sedf-pin 3 host-install(3) broken pass in 58969 test-armhf-armhf-xl-multivcpu 1

[Xen-devel] [xen-unstable test] 58974: regressions - FAIL

2015-06-29 Thread osstest service user
flight 58974 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/58974/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 58965 Reg

[Xen-devel] Status of Improved RTDS (Was: Xen 4.6 Development Update (2 WEEKS TO FREEZE reminder)

2015-06-29 Thread Meng Xu
> > == Hypervisor == > > * Improve RTDS scheduler (ok) >Change RTDS from quantum driven to event driven > - Dagaen Golomb, Meng Xu, Chong Li As to changing the RTDS scheduler from quantum driven to event driven (in Hypervisor): Dagaen sent the second version of patch that reflects Dario's

Re: [Xen-devel] [PATCH v2] OSSTest: stop testing SEDF, start testing RTDS

2015-06-29 Thread Meng Xu
Hi Ian and Dario, Thank you very much for your explanation! 2015-06-29 2:33 GMT-07:00 Dario Faggioli : > > On Mon, 2015-06-29 at 09:53 +0100, Ian Campbell wrote: > > On Sat, 2015-06-27 at 12:05 -0700, Meng Xu wrote: > > > > I want/hope to know when/how the RTDS scheduler fails the test so that >

Re: [Xen-devel] [v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy

2015-06-29 Thread Chen, Tiejun
Having read all these docs I now know what all the options are, but I still don't really know what I should write. I think an example or two of real world usage would be helpful. Here I picked some code fragments to help you understand this, I meant an example or two in the documentation. T

Re: [Xen-devel] [PATCH] libxl: Increase device model startup timeout to 1min.

2015-06-29 Thread Dario Faggioli
On Mon, 2015-06-29 at 17:09 +0100, Anthony PERARD wrote: > On Mon, Jun 29, 2015 at 03:51:57PM +0100, Ian Campbell wrote: > > On Mon, 2015-06-29 at 15:23 +0100, Anthony PERARD wrote: > > > OK. What about: > > > > I'm afraid none of that really explains why QEMU taking >10s is > > reasonable/expect

Re: [Xen-devel] [v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy

2015-06-29 Thread Chen, Tiejun
On 2015/6/25 20:31, Ian Jackson wrote: Tiejun Chen writes ("[v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy"): This patch introduces user configurable parameters to specify RDM resource and according policies, ... Global RDM parameter, "type", allows user to specify r

[Xen-devel] Status of COLO (Was: Xen 4.6 Development Update)

2015-06-29 Thread Yang Hongyang
On 06/26/2015 07:16 PM, wei.l...@citrix.com wrote: (Note, please trim your quotes when replying, and also trim the CC list if necessary. You might also consider changing the subject line of your reply to "Status of FOO (Was: Xen 4.6 Development Update (X months reminder)") [...] == Xen toolst

Re: [Xen-devel] Fwd: [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-06-29 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Tuesday, June 30, 2015 10:52 AM > To: Wu, Feng > Cc: k...@xen.org; jbeul...@suse.com; andrew.coop...@citrix.com; Tian, > Kevin; Zhang, Yang Z; george.dun...@eu.citrix.com; Wu, Feng; xen-devel > Subject:

Re: [Xen-devel] Fwd: [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-06-29 Thread Dario Faggioli
On Mon, 2015-06-29 at 18:36 +0100, Andrew Cooper wrote: > > The basic idea here is: > 1. When vCPU's state is RUNSTATE_running, > - set 'NV' to 'Notification Vector'. > - Clear 'SN' to accpet PI. > - set 'NDST' to the right pCPU. > 2. When vCPU's state is RUNSTATE_blocked,

Re: [Xen-devel] Fwd: [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-06-29 Thread Dario Faggioli
So, first of all, thanks Andrew for drawing my attention on this... On Mon, 2015-06-29 at 18:35 +0100, Andrew Cooper wrote: -- Dario Faggioli Citrix Inc. > This patch includes the following aspects: > - Add a global vector to wake up the blocked vCPU > when an interrupt is being posted to it (

Re: [Xen-devel] [v3 07/15] vmx: Initialize VT-d Posted-Interrupts Descriptor

2015-06-29 Thread Dario Faggioli
On Mon, 2015-06-29 at 16:32 +0100, Andrew Cooper wrote: > On 24/06/15 06:18, Feng Wu wrote: > > diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c > > index 3aff365..11dc1b5 100644 > > --- a/xen/arch/x86/hvm/vmx/vmcs.c > > +++ b/xen/arch/x86/hvm/vmx/vmcs.c > > @@ -40,6 +40,7 @@

Re: [Xen-devel] [v4][PATCH 12/19] tools/libxl: passes rdm reservation policy

2015-06-29 Thread Chen, Tiejun
+B is about how to handle conflict between reserving reserved device +memory and guest address space. "strict" means an unsolved conflict leads to +immediate VM crash, while "relaxed" allows VM moving forward with a warning +message thrown out. Here "strict" is default. Surely it would be better

Re: [Xen-devel] [v3 09/15] vt-d: Extend struct iremap_entry to support VT-d Posted-Interrupts

2015-06-29 Thread Wu, Feng
> -Original Message- > From: xen-devel-boun...@lists.xen.org > [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Andrew Cooper > Sent: Tuesday, June 30, 2015 12:05 AM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: Zhang, Yang Z; george.dun...@eu.citrix.com; Tian, Kevin; k...@xen.org; >

Re: [Xen-devel] [v3 08/15] Suppress posting interrupts when 'SN' is set

2015-06-29 Thread Wu, Feng
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Monday, June 29, 2015 11:41 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: Tian, Kevin; k...@xen.org; george.dun...@eu.citrix.com; > jbeul...@suse.com; Zhang, Yang Z > Subject: Re: [Xen-devel] [v3 08/1

Re: [Xen-devel] [v3 07/15] vmx: Initialize VT-d Posted-Interrupts Descriptor

2015-06-29 Thread Wu, Feng
> -Original Message- > From: Andrew Cooper [mailto:andrew.coop...@citrix.com] > Sent: Monday, June 29, 2015 11:33 PM > To: Wu, Feng; xen-devel@lists.xen.org > Cc: k...@xen.org; jbeul...@suse.com; Tian, Kevin; Zhang, Yang Z; > george.dun...@eu.citrix.com; Dario Faggioli > Subject: Re: [v3

Re: [Xen-devel] [PATCH V5 2/7] libxl_read_file_contents: add new entry to read sysfs file

2015-06-29 Thread Chun Yan Liu
>>> On 6/29/2015 at 06:52 PM, in message <21905.9050.452111.208...@mariner.uk.xensource.com>, Ian Jackson wrote: > Chun Yan Liu writes ("Re: [PATCH V5 2/7] libxl_read_file_contents: add new > entry to read sysfs file"): > > On 6/26/2015 at 09:05 PM, in message > > <21901.20009.85407.581...@

[Xen-devel] [qemu-mainline test] 58973: tolerable FAIL - PUSHED

2015-06-29 Thread osstest service user
flight 58973 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/58973/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-xl-rtds 11 guest-start fail REGR. vs. 58964 test-amd64-i386-libvirt-xsm

[Xen-devel] [ovmf test] 58972: tolerable FAIL - PUSHED

2015-06-29 Thread osstest service user
flight 58972 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/58972/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop fail like 58963 test-amd64-i386-xl-qemuu-win7-amd64 1

[Xen-devel] [linux-next test] 58971: regressions - FAIL

2015-06-29 Thread osstest service user
flight 58971 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/58971/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 58966 Regre

[Xen-devel] [PATCH RFC 1 1/8] xen/pt: Use xen_host_pci_get_[byte|word] instead of dev.config

2015-06-29 Thread Konrad Rzeszutek Wilk
During init time we treat the dev.config area as a cache of the host view. However during execution time we treat it as guest view (by the generic PCI API). We need to sync Xen's code to the generic PCI API view. This is the first step by replacing all of the code that uses dev.config or pci_get_[b

[Xen-devel] [PATCH RFC 1 7/8] xen/pt: Move bulk of xen_pt_unregister_device in its own routine.

2015-06-29 Thread Konrad Rzeszutek Wilk
This way we can call it if we fail during init. This code movement introduces no changes. Signed-off-by: Konrad Rzeszutek Wilk --- hw/xen/xen_pt.c | 119 +--- 1 file changed, 62 insertions(+), 57 deletions(-) diff --git a/hw/xen/xen_pt.c b/hw

[Xen-devel] [PATCH RFC 1 3/8] xen/pt: Check if reg->init is past the reg->size

2015-06-29 Thread Konrad Rzeszutek Wilk
It should never happen, but in case it does we want to report. The code will only write up to reg->size so there is no runtime danger. Signed-off-by: Konrad Rzeszutek Wilk --- hw/xen/xen_pt_config_init.c | 8 ++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/hw/xen/xen_pt_co

[Xen-devel] [PATCH RFC 1 5/8] xen/pt: Log xen_host_pci_get/set errors in MSI code.

2015-06-29 Thread Konrad Rzeszutek Wilk
We seem to only use these functions when de-activating the MSI - so just log errors. Signed-off-by: Konrad Rzeszutek Wilk --- hw/xen/xen_pt_msi.c | 18 ++ 1 file changed, 14 insertions(+), 4 deletions(-) diff --git a/hw/xen/xen_pt_msi.c b/hw/xen/xen_pt_msi.c index 5822df5..e3d71

[Xen-devel] [PATCH RFC 1 8/8] xen/pt: Check for return values for xen_host_pci_[get|set] in init

2015-06-29 Thread Konrad Rzeszutek Wilk
and if we have failures we call xen_pt_destroy introduced in 'xen/pt: Move bulk of xen_pt_unregister_device in its own routine.' and free all of the allocated structures. Signed-off-by: Konrad Rzeszutek Wilk --- hw/xen/xen_pt.c | 32 +--- 1 file changed, 21 insertions

[Xen-devel] [PATCH RFC 1 6/8] xen/pt: Make xen_pt_unregister_device idempotent

2015-06-29 Thread Konrad Rzeszutek Wilk
To deal with xen_host_pci_[set|get]_ functions returning error values and clearing ourselves in the init function we should make the .exit (xen_pt_unregister_device) function be idempotent in case the generic code starts calling .exit (or for fun does it before calling .init!). Signed-off-by: Konr

[Xen-devel] [PATCH RFC v1] Sync dev.config with XenPTReg->data field.

2015-06-29 Thread Konrad Rzeszutek Wilk
Hey, This patchset is dependent on http://lists.xen.org/archives/html/xen-devel/2015-06/msg04812.html (Cleanups + various fixes due to libxl ABI + more logging on errors.). During the discussion of http://lists.xen.org/archives/html/xen-devel/2015-06/msg01504.html "[PATCH QEMU-XEN] xen/pt: Sta

[Xen-devel] [PATCH RFC 1 2/8] xen/pt: Sync up the dev.config and data values.

2015-06-29 Thread Konrad Rzeszutek Wilk
For a passthrough device we maintain a state of emulated registers value contained within d->config. We also consult the host registers (and apply ro and write masks) whenever the guest access the registers. This is done in xen_pt_pci_write_config and xen_pt_pci_read_config. Also in this picture w

[Xen-devel] [PATCH RFC 1 4/8] xen/pt: Log xen_host_pci_get in two init functions

2015-06-29 Thread Konrad Rzeszutek Wilk
To help with troubleshooting in the field. Signed-off-by: Konrad Rzeszutek Wilk --- hw/xen/xen_pt_config_init.c | 9 + 1 file changed, 9 insertions(+) diff --git a/hw/xen/xen_pt_config_init.c b/hw/xen/xen_pt_config_init.c index bc871c9..62b6a7b 100644 --- a/hw/xen/xen_pt_config_init.c +

[Xen-devel] [linux-3.4 test] 58970: regressions - FAIL

2015-06-29 Thread osstest service user
flight 58970 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/58970/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511 Tests which are failing

[Xen-devel] [PATCH v2 3/4] x86/pvh: Handle hypercalls for 32b PVH guests

2015-06-29 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- Changes in v2: * Replace is_pvh_vcpu() with is_pvh_domain() * Only check that 32b versions of hypercalls are available in hvm_do_hypercall() xen/arch/x86/hvm/hvm.c | 31 ++- 1 file changed, 26 insertions(+), 5 deletions(-) diff --gi

[Xen-devel] [PATCH v2 0/4] 32-bit domU PVH support

2015-06-29 Thread Boris Ostrovsky
Changes in v2: * Only set domain's has_32bit_shinfo, not is_32bit_pv. This adds patch 1 that replaces some of is_pv_32bit_domain()/is_pv_32bit_vcpu()/is_pv_32on64_vcpu() tests with has_32bit_shinfo(). Note that I only replaced what I thought was necessary to boot the guest. MCA and tracing

[Xen-devel] [PATCH v2 2/4] x86/pvh: Set 32b PVH guest mode in XEN_DOMCTL_set_address_size

2015-06-29 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky --- Changes in v2: * Keep 64-bit initialization, change the mode to 32b if requested xen/arch/x86/domain.c | 20 ++-- xen/arch/x86/hvm/hvm.c| 15 ++- xen/arch/x86/hvm/vmx/vmcs.c | 2 +- xen/arch/x86/hvm/vmx/vmx.c|

[Xen-devel] [PATCH v2 1/4] x86/compat: Test whether guest has 32b shinfo instead of being a PV 32b domain

2015-06-29 Thread Boris Ostrovsky
In preparation for enabling 32-bit PVH guests replace a number of guest mode's tests that assume a PV guest with has_32bit_shinfo() that can be applicable to both PV and PVH guests. Signed-off-by: Boris Ostrovsky --- Changes in v2: * New patch xen/arch/x86/domain.c | 10 -- xen/arch/x86

[Xen-devel] [PATCH v2 4/4] libxc/x86/pvh: Allow creation of 32b PVH guests

2015-06-29 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky Acked-by: Ian Campbell --- tools/libxc/xc_dom_x86.c | 32 +++- 1 file changed, 15 insertions(+), 17 deletions(-) diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c index 920fe42..43e79f4 100644 --- a/tools/libxc/xc_dom_x86

[Xen-devel] [PATCH RFC v1] Cleanups + various fixes due to libxl ABI + more logging on errors.

2015-06-29 Thread Konrad Rzeszutek Wilk
As I am in the process of syncing the 'dev.config' and Xen's internal cache of the PCI config space I noticed that some oddities in the code and figured that having them in would be easier for me (so I don't have to handle 20 odd patches). These: [PATCH RFC 1/6] xen/pt: Update comments with prope

[Xen-devel] [PATCH RFC 1/6] xen/pt: Update comments with proper function name.

2015-06-29 Thread Konrad Rzeszutek Wilk
It has changed but the comments still refer to the old names. Signed-off-by: Konrad Rzeszutek Wilk --- hw/xen/xen_pt.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hw/xen/xen_pt.c b/hw/xen/xen_pt.c index ed5fcae..706e3d9 100644 --- a/hw/xen/xen_pt.c +++ b/hw/xen/xen_pt

[Xen-devel] [PATCH RFC 2/6] xen/pt: Make xen_pt_msi_set_enable static

2015-06-29 Thread Konrad Rzeszutek Wilk
As we do not use it outside our code. Signed-off-by: Konrad Rzeszutek Wilk --- hw/xen/xen_pt.h | 1 - hw/xen/xen_pt_msi.c | 2 +- 2 files changed, 1 insertion(+), 2 deletions(-) diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h index 393f36c..09358b1 100644 --- a/hw/xen/xen_pt.h +++ b/hw/xen/x

[Xen-devel] [PATCH RFC 5/6] xen/pt/msi: Add the register value when printing logging and error messages

2015-06-29 Thread Konrad Rzeszutek Wilk
We would like to know what the MSI register value is to help in troubleshooting in the field. As such modify the logging logic to include such details in xen_pt_msgctrl_reg_write. Signed-off-by: Konrad Rzeszutek Wilk --- hw/xen/xen_pt_config_init.c | 6 +++--- 1 file changed, 3 insertions(+), 3

[Xen-devel] [PATCH RFC 6/6] xen: Add backtrace for serious issues.

2015-06-29 Thread Konrad Rzeszutek Wilk
When debugging issues that caused the emulator to kill itself or skipping certain operations (unable to write to host registers) an stack trace will most definitly aid in debugging the problem. As such this patch uses the most basic backtrace to print out details. Signed-off-by: Konrad Rzeszutek

[Xen-devel] [PATCH RFC 3/6] xen/pt: xen_host_pci_config_read returns -errno, not -1 on failure

2015-06-29 Thread Konrad Rzeszutek Wilk
However the init routines assume that on errors the return code is -1 (as the libxc API is) - while those xen_host_* routines follow another paradigm - negative errno on return, 0 on success. Signed-off-by: Konrad Rzeszutek Wilk --- hw/xen/xen_pt.c | 2 +- 1 file changed, 1 insertion(+), 1 delet

[Xen-devel] [PATCH RFC 4/6] xen: Print and use errno where applicable.

2015-06-29 Thread Konrad Rzeszutek Wilk
In Xen 4.6 commit cd2f100f0f61b3f333d52d1737dd73f02daee592 "libxc: Fix do_memory_op to return negative value on errors" made the libxc API less odd-ball: On errors, return value is -1 and error code is in errno. On success the return value is either 0 or an positive value. Since we could be runnin

[Xen-devel] [xen-4.4-testing test] 58969: regressions - FAIL

2015-06-29 Thread osstest service user
flight 58969 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/58969/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 58451 Tests which are

Re: [Xen-devel] Unable to unregister netdevice after "netfilter: bridge: forward IPv6 fragmented packets"

2015-06-29 Thread Florian Westphal
Julien Grall wrote: > Hi, > > I tried to run the latest Linux tree > (4a10a91756ef381bced7b88cfb9232f660b92d93) as DOM0 Xen. > After destroying a guest using network, I got the following > lines in the DOM0 kernel log: > > unregister_netdevice: waiting for vif1.0 to become free. Usage count = 1

Re: [Xen-devel] [PATCH v3 4/6] libxl: change xs path for QEMU

2015-06-29 Thread Stefano Stabellini
On Thu, 25 Jun 2015, Ian Campbell wrote: > On Wed, 2015-06-10 at 11:09 +0100, Stefano Stabellini wrote: > > Change the QEMU xenstore watch path to > > /local/domain/$LIBXL_TOOLSTACK_DOMID/device-model/$DOMID/$EMULATOR_ID. > > This and the next patch should both be changing the xenstore-paths doc >

Re: [Xen-devel] [PATCH v3 3/6] [WIP] libxl: xsrestrict QEMU

2015-06-29 Thread Stefano Stabellini
On Thu, 25 Jun 2015, Ian Campbell wrote: > On Wed, 2015-06-10 at 11:09 +0100, Stefano Stabellini wrote: > > Check whether QEMU supports the xsrestrict option, by parsing its --help > > output. Store the result on xenstore for future reference on a per QEMU > > binary basis, so that device_model_ove

Re: [Xen-devel] [PATCH v3 2/6] libxl: do not add a vkb backend to hvm guests

2015-06-29 Thread Stefano Stabellini
On Thu, 25 Jun 2015, Ian Campbell wrote: > On Tue, 2015-06-16 at 16:39 +0100, Stefano Stabellini wrote: > > On Tue, 16 Jun 2015, Wei Liu wrote: > > > On Wed, Jun 10, 2015 at 11:09:50AM +0100, Stefano Stabellini wrote: > > > > When QEMU restricts its xenstore connection, it cannot provide PV > > > >

Re: [Xen-devel] [PATCH v2 12/12] x86/altp2m: XSM hooks for altp2m HVM ops

2015-06-29 Thread Sahita, Ravi
On 06/26/2015 03:35 PM, Ed White wrote: > On 06/26/2015 12:24 PM, Daniel De Graaf wrote: >> On 06/22/2015 02:56 PM, Ed White wrote: >>> From: Ravi Sahita >>> >>> Signed-off-by: Ravi Sahita >> >> One comment, below. >> >> [...] >>> diff --git a/tools/flask/policy/policy/modules/xen/xen.if >>> b/t

Re: [Xen-devel] [PATCH v3 1/6] libxl: allow /local/domain/$LIBXL_TOOLSTACK_DOMID/device-model/$DOMID to be written by $DOMID

2015-06-29 Thread Stefano Stabellini
On Thu, 25 Jun 2015, Ian Campbell wrote: > On Wed, 2015-06-10 at 11:09 +0100, Stefano Stabellini wrote: > > The device model is going to restrict its xenstore connection to $DOMID > > level. > > Am I correct in concluding that only oxenstored supports XS_RESTRICT? I > don't see it in C xenstored a

Re: [Xen-devel] [PATCH v2 12/12] x86/altp2m: XSM hooks for altp2m HVM ops

2015-06-29 Thread Daniel De Graaf
On 06/26/2015 03:35 PM, Ed White wrote: On 06/26/2015 12:24 PM, Daniel De Graaf wrote: On 06/22/2015 02:56 PM, Ed White wrote: From: Ravi Sahita Signed-off-by: Ravi Sahita One comment, below. [...] diff --git a/tools/flask/policy/policy/modules/xen/xen.if b/tools/flask/policy/policy/mod

Re: [Xen-devel] [PATCH v3 1/6] libxl: allow /local/domain/$LIBXL_TOOLSTACK_DOMID/device-model/$DOMID to be written by $DOMID

2015-06-29 Thread Stefano Stabellini
On Tue, 16 Jun 2015, Wei Liu wrote: > On Wed, Jun 10, 2015 at 11:09:49AM +0100, Stefano Stabellini wrote: > > The device model is going to restrict its xenstore connection to $DOMID > > level. Let qemu-xen access > > /local/domain/$LIBXL_TOOLSTACK_DOMID/device-model/$DOMID, as it is > > required by

[Xen-devel] [OSSTEST PATCH 00/13] Linux 4.1, and reporting improvements

2015-06-29 Thread Ian Jackson
Most of this series is improvements to html and email output. It includes the push gate age query library function I offered to Ian Campbell. Also thrown in is a patch ot test the Linux 4.1 stable branch. Ian. ___ Xen-devel mailing list Xen-devel@list

[Xen-devel] [OSSTEST PATCH 03/13] Reporting: sg-report-flight: Fix undefined value in $worstrow[]

2015-06-29 Thread Ian Jackson
The fallback entry in the worstrow search, used when a job has not been run at all, was wrong. Also, fix the doc comment which induced the mistake. Signed-off-by: Ian Jackson --- sg-report-flight |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/sg-report-flight b/sg-re

[Xen-devel] [OSSTEST PATCH 01/13] ts-leak-check: Report leaked loop block devices

2015-06-29 Thread Ian Jackson
These show up as leaked processes `[loop1]' etc. too, but that is an implementation detail, and it is clearer to show them separately. Signed-off-by: Ian Jackson --- ts-leak-check |9 + 1 file changed, 9 insertions(+) diff --git a/ts-leak-check b/ts-leak-check index fdade36..8a97971

[Xen-devel] [OSSTEST PATCH 02/13] Test Linux 4.1

2015-06-29 Thread Ian Jackson
The kernel.org stable git branch layout is the same for 4.1 as for 3.x, so simply extend the pattern, and add the branch to BRANCHES. DEPLOYMENT NOTE: After this patch is acked, but just before it is pushed to pretest, run (this version of) ./mg-branch-setup linux-4.1 bisect b953c0d234bc72e8489d

[Xen-devel] [OSSTEST PATCH 06/13] Reporting: sg-report-job-history: Honour --limit

2015-06-29 Thread Ian Jackson
The global $limit was erroneously shadowed by a local in processjobbranch. Fix this, and move the erroneously hardcoded value to the global default. No functional change if --limit was not specified, which it is not for any of our runs with the in-tree configs. Signed-off-by: Ian Jackson --- s

[Xen-devel] [OSSTEST PATCH 04/13] Reporting: In report_run_getinfo, abstract code for returning

2015-06-29 Thread Ian Jackson
This will allow us to change the function's API in one place (plus all the call sites). No functional change in this patch. Signed-off-by: Ian Jackson --- Osstest/Executive.pm | 21 + 1 file changed, 13 insertions(+), 8 deletions(-) diff --git a/Osstest/Executive.pm b/Oss

[Xen-devel] [OSSTEST PATCH 07/13] Reporting: report_run_getinfo produces Content

2015-06-29 Thread Ian Jackson
Previously we produced Summary, and the call sites were confused about whether it had already been html-escaped. Now we produce something which is explicitly already html. No functional change except that some sg-report-host-history output is escaped as it ought to have been (but this is only rel

[Xen-devel] [OSSTEST PATCH 05/13] Reporting: report_run_getinfo produces ColourAttr

2015-06-29 Thread Ian Jackson
This includes the bgcolour attribute name and the quotes. This will make it possible for this function to sometimes not set a background for the whole table cell in the future (which will be part of putting multiple step results in each cell). No functional change. Signed-off-by: Ian Jackson --

[Xen-devel] [OSSTEST PATCH 09/13] Reporting sg-report-job-history: support --max-flight

2015-06-29 Thread Ian Jackson
Using report_blessingscond instead of the open-coded map. Signed-off-by: Ian Jackson --- sg-report-job-history |7 +-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/sg-report-job-history b/sg-report-job-history index a932c78..31b8d37 100755 --- a/sg-report-job-history +++

[Xen-devel] [OSSTEST PATCH 08/13] Reporting: Break out report_blessingscond

2015-06-29 Thread Ian Jackson
The returned SQL is a self-contained expression, and does not require additional bind parameters. To spot SQL quoting problems, we die if a blessing is not reasonable. The use sites of the $blessingcond in sg-report-flight are adjusted to no longer pass @blessings to execute. No overall function

[Xen-devel] [OSSTEST PATCH 10/13] Reporting: sg-report-host-history: Support --max-flight

2015-06-29 Thread Ian Jackson
We can't use report_blessingscond because we handle blessings differently in sg-report-host-history (since we want the history of even adhoc etc. flights). Signed-off-by: Ian Jackson --- sg-report-host-history |6 ++ 1 file changed, 6 insertions(+) diff --git a/sg-report-host-history b/

[Xen-devel] [OSSTEST PATCH 13/13] Reporting: sg-report-flight: Put overall pushgate stats in email

2015-06-29 Thread Ian Jackson
This adds something like this (would have appeared in 37638): Last test of basis37629 2015-06-24 21:36:10 Z4 days Testing same since37635 2015-06-28 03:05:56 Z1 days4 attempts Failing since 37630 2015-06-26 10:35:44 Z3 days9 attempts or this (would hav

[Xen-devel] [OSSTEST PATCH 12/13] Reporting: Provide report_find_push_age_info

2015-06-29 Thread Ian Jackson
This utility function provides information about how far behind the push gate is right now. I have tested it with this rune in the Cambridge instance: perl -we 'use Osstest::Executive; use Osstest; use Data::Dumper; open DEBUG, ">&STDERR" or die $!; csreadconfig(); print Dumper report_find_pu

[Xen-devel] [OSSTEST PATCH 11/13] Reporting: In history tables, show multiple failure steps

2015-06-29 Thread Ian Jackson
In report_run_getinfo, used by sg-report-job-history and sg-report-host-history, make provision for reporting multiple failed steps. The failed steps are put side by side (in a single table cell). The cell background is set by the job status, but the individual steps may vary their colour, as see

Re: [Xen-devel] [PATCH v4] run QEMU as non-root

2015-06-29 Thread Stefano Stabellini
On Thu, 25 Jun 2015, Ian Campbell wrote: > On Mon, 2015-06-01 at 17:46 +0100, Stefano Stabellini wrote: > > Try to use "xen-qemudepriv-$domname" first, then > > "xen-qemudepriv-domid$domid", finally "xen-qemudepriv-shared" and root > > if everything else fails. > > > > The uids need to be manually

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-06-29 Thread Andrew Cooper
On 24/06/15 06:18, Feng Wu wrote: > This patch includes the following aspects: > - Add a global vector to wake up the blocked vCPU > when an interrupt is being posted to it (This > part was sugguested by Yang Zhang ). > - Adds a new per-vCPU tasklet to wakeup the blocked > vCPU. It can be use

Re: [Xen-devel] [RFC PATCH v3 05/18] xen/arm: ITS: Port ITS driver to xen

2015-06-29 Thread Ian Campbell
On Mon, 2015-06-29 at 21:17 +0530, Vijay Kilari wrote: > On Mon, Jun 29, 2015 at 9:13 PM, Vijay Kilari wrote: > > On Mon, Jun 29, 2015 at 5:09 PM, Ian Campbell > > wrote: > >> On Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote: > >> [...] > >>> +/* > >>> + * ITS command descriptors

Re: [Xen-devel] [v3 11/15] Update IRTE according to guest interrupt config changes

2015-06-29 Thread Andrew Cooper
On 24/06/15 06:18, Feng Wu wrote: > When guest changes its interrupt configuration (such as, vector, etc.) > for direct-assigned devices, we need to update the associated IRTE > with the new guest vector, so external interrupts from the assigned > devices can be injected to guests without VM-Exit.

Re: [Xen-devel] [PATCH v4] x86/arm/mm: use gfn instead of pfn in p2m_get_mem_access/p2m_set_mem_access

2015-06-29 Thread Ian Campbell
On Mon, 2015-06-29 at 17:45 +0200, Vitaly Kuznetsov wrote: > 'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as > input. > > On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the > declaration in p2m-common.h as 'pfn' is being used instead of 'start_pfn'. >

Re: [Xen-devel] [PATCH v3 COLOPre 11/26] tools/libxl: introduce a new API libxl__domain_restore() to load qemu state

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: > Secondary vm is running in colo mode. So we will do > the following things again and again: > 1. suspend both primay vm and secondary vm > 2. sync the state > 3. resume both primary vm and secondary vm > We will send qemu's state each time i

Re: [Xen-devel] [PATCH v3 COLOPre 10/26] migration/save: pass checkpointed_stream from libxl to libxc

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: > Pass checkpointed_stream from libxl to libxc. Hrm, so now we seem to have a purely libxl internal usage of this new enum, but still nothing crossing the libxl.h boundary. I suspect I've missed something! > It won't affact legacy migration

Re: [Xen-devel] [PATCH v3 COLOPre 09/26] tools/libxl: introduce enum type libxl_checkpointed_stream

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: > introduce enum type libxl_checkpointed_stream in IDL. > rename the last argument of migrate_receive from "remus" to > "checkpointed" since the semantics of this parameter has > changed. I don't see anything here which is hitting the libxl A

Re: [Xen-devel] [PATCH v3 COLOPre 08/26] tools/libxc: support to resume uncooperative HVM guests

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: > From: Wen Congyang > > 1. suspend > a. PVHVM and PV: we use the same way to suspend the guest(send the suspend space between "guest" and the open parenthesis please. >request to the guest). If the guest doesn't support evtchn, the xe

Re: [Xen-devel] [PATCH v2 09/12] x86/altp2m: add remaining support routines.

2015-06-29 Thread Ed White
On 06/29/2015 06:03 AM, Andrew Cooper wrote: > On 26/06/15 17:30, Ed White wrote: >> On 06/24/2015 11:19 AM, Andrew Cooper wrote: >>> On 24/06/15 18:47, Ed White wrote: >> This looks like some hoop jumping around the assertions in >> domain_pause() and vcpu_pause(). >> >> We should

Re: [Xen-devel] [PATCH v2 04/12] x86/altp2m: basic data structures and support routines.

2015-06-29 Thread Ed White
On 06/29/2015 06:00 AM, Andrew Cooper wrote: > On 26/06/15 22:17, Ed White wrote: >> On 06/24/2015 03:29 AM, Andrew Cooper wrote: >>> On 22/06/15 19:56, Ed White wrote: diff --git a/xen/include/asm-x86/hvm/vcpu.h b/xen/include/asm-x86/hvm/vcpu.h index 3d8f4dc..a1529c0 100644 --

Re: [Xen-devel] [v3 10/15] vt-d: Add API to update IRTE when VT-d PI is used

2015-06-29 Thread Andrew Cooper
On 24/06/15 06:18, Feng Wu wrote: > This patch adds an API which is used to update the IRTE > for posted-interrupt when guest changes MSI/MSI-X information. > > Signed-off-by: Feng Wu > --- > v3: > - Remove "adding PDA_MASK()" when updating 'pda_l' and 'pda_h' for IRTE. > - Change the return type

[Xen-devel] [linux-linus test] 58966: regressions - FAIL

2015-06-29 Thread osstest service user
flight 58966 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/58966/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-rumpuserxen-amd64 15 rumpuserxen-demo-xenstorels/xenstorels.repeat fail REGR. vs. 5

Re: [Xen-devel] [PATCH v2 02/12] VMX: implement suppress #VE.

2015-06-29 Thread Ed White
On 06/29/2015 08:03 AM, George Dunlap wrote: > On Mon, Jun 29, 2015 at 3:31 PM, Andrew Cooper > wrote: >> On 29/06/15 15:20, George Dunlap wrote: >>> On Mon, Jun 22, 2015 at 7:56 PM, Ed White wrote: In preparation for selectively enabling #VE in a later patch, set suppress #VE on all EP

Re: [Xen-devel] [PATCH v2 02/12] VMX: implement suppress #VE.

2015-06-29 Thread Sahita, Ravi
On Mon, Jun 29, 2015 at 3:31 PM, Andrew Cooper wrote: > On 29/06/15 15:20, George Dunlap wrote: >> On Mon, Jun 22, 2015 at 7:56 PM, Ed White wrote: >>> In preparation for selectively enabling #VE in a later patch, set >>> suppress #VE on all EPTE's. >>> >>> Suppress #VE should always be the de

Re: [Xen-devel] [PATCH v4] x86/arm/mm: use gfn instead of pfn in p2m_get_mem_access/p2m_set_mem_access

2015-06-29 Thread Razvan Cojocaru
On 06/29/2015 06:45 PM, Vitaly Kuznetsov wrote: > 'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as > input. > > On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the > declaration in p2m-common.h as 'pfn' is being used instead of 'start_pfn'. > > On ARM

Re: [Xen-devel] [PATCH] libxl: Increase device model startup timeout to 1min.

2015-06-29 Thread Anthony PERARD
On Mon, Jun 29, 2015 at 03:51:57PM +0100, Ian Campbell wrote: > On Mon, 2015-06-29 at 15:23 +0100, Anthony PERARD wrote: > > On Fri, Jun 26, 2015 at 05:41:07PM +0100, Ian Campbell wrote: > > > On Fri, 2015-06-26 at 12:57 +0100, Anthony PERARD wrote: > > > > On a busy host, QEMU may take more than 1

Re: [Xen-devel] [PATCH v12 8/8] Add xentrace to vmware_port

2015-06-29 Thread Don Slutz
On 06/29/15 10:54, Andrew Cooper wrote: On 28/06/15 00:27, Don Slutz wrote: From: Don Slutz Also added missing TRAP_DEBUG & VLAPIC. Signed-off-by: Don Slutz Acked-by: Ian Campbell CC: Don Slutz --- v12: Switch VMPORT_IGNORED to port, regs->_eax. v11: No change v10: Added Acked-b

Re: [Xen-devel] [PATCH v3 COLOPre 07/26] libxc/restore: fix error handle of process_record

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: ITYM "handling" in the subject. And perhaps "change" rather than "fix"? > If the err is RECORD_NOT_PROCESSED, and it is an optional record, > restore will still fail. There're two options to fix this, > a, setting rc to 0 when it is an opt

Re: [Xen-devel] [v3 09/15] vt-d: Extend struct iremap_entry to support VT-d Posted-Interrupts

2015-06-29 Thread Andrew Cooper
On 24/06/15 06:18, Feng Wu wrote: > diff --git a/xen/drivers/passthrough/vtd/iommu.h > b/xen/drivers/passthrough/vtd/iommu.h > index e807253..49daa70 100644 > --- a/xen/drivers/passthrough/vtd/iommu.h > +++ b/xen/drivers/passthrough/vtd/iommu.h > @@ -289,29 +289,43 @@ struct dma_pte { > /* interr

Re: [Xen-devel] [PATCH v3 COLOPre 06/26] libxl/save: Refactor libxl__domain_suspend_state

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: [...] > switch (type) { > case LIBXL_DOMAIN_TYPE_HVM: { > dss->hvm = 1; > +dsps->hvm = 1; > break; > } > case LIBXL_DOMAIN_TYPE_PV: > dss->hvm = 0; > +dsps->hvm = 0; > bre

[Xen-devel] Unable to unregister netdevice after "netfilter: bridge: forward IPv6 fragmented packets"

2015-06-29 Thread Julien Grall
Hi, I tried to run the latest Linux tree (4a10a91756ef381bced7b88cfb9232f660b92d93) as DOM0 Xen. After destroying a guest using network, I got the following lines in the DOM0 kernel log: unregister_netdevice: waiting for vif1.0 to become free. Usage count = 1 The bisector pointed the problem aft

Re: [Xen-devel] [PATCH v4] x86/arm/mm: use gfn instead of pfn in p2m_get_mem_access/p2m_set_mem_access

2015-06-29 Thread Andrew Cooper
On 29/06/15 16:45, Vitaly Kuznetsov wrote: > 'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as > input. > > On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the > declaration in p2m-common.h as 'pfn' is being used instead of 'start_pfn'. > > On ARM both p2

Re: [Xen-devel] [PATCH v3 COLOPre 05/26] tools/libxl: move save/restore code into libxl_dom_save.c

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: > This is purely code motion. On that basis: > > Signed-off-by: Yang Hongyang Acked-by: Ian Campbell ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v3 COLOPre 04/26] tools/libxl: move remus code into libxl_remus.c

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: > Do the following things: > - There are 2 checkpoint callbacks, rename them to: > libxl__remus_domain_{save/restore}_checkpoint_callback > - Moving remus callbacks into libxl_remus.c, export following > callbacks for internal use: > * l

Re: [Xen-devel] [RFC PATCH v3 05/18] xen/arm: ITS: Port ITS driver to xen

2015-06-29 Thread Vijay Kilari
On Mon, Jun 29, 2015 at 9:13 PM, Vijay Kilari wrote: > On Mon, Jun 29, 2015 at 5:09 PM, Ian Campbell wrote: >> On Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote: >> [...] >>> +/* >>> + * ITS command descriptors - parameters to be encoded in a command >>> + * block. >>> + */ >>> +str

[Xen-devel] [libvirt test] 58967: regressions - FAIL

2015-06-29 Thread osstest service user
flight 58967 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/58967/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-xsm 11 guest-start fail REGR. vs. 58842 Regressions which are reg

[Xen-devel] [PATCH v4] x86/arm/mm: use gfn instead of pfn in p2m_get_mem_access/p2m_set_mem_access

2015-06-29 Thread Vitaly Kuznetsov
'pfn' and 'start_pfn' are ambiguous, both these functions expect GFNs as input. On x86 the interface of p2m_set_mem_access() in p2m.c doesn't match the declaration in p2m-common.h as 'pfn' is being used instead of 'start_pfn'. On ARM both p2m_set_mem_access and p2m_get_mem_access interfaces don't

Re: [Xen-devel] [PATCH v3 COLOPre 03/26] tools/libxl: move domain resume code into libxl_dom_suspend.c

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: > move domain resume code into libxl_dom_suspend.c. > pure code motion except for making > libxl__domain_resume_device_model() static. > > Signed-off-by: Yang Hongyang Acked-by: Ian Campbell

Re: [Xen-devel] [PATCH v3 COLOPre 01/26] tools/libxl: rename libxl__domain_suspend to libxl__domain_save

2015-06-29 Thread Ian Campbell
On Thu, 2015-06-25 at 14:25 +0800, Yang Hongyang wrote: > Rename libxl__domain_suspend() to libxl__domain_save() since it > actually do the save domain work. In response to Ian J's query on the last version Andrew said: The terminology used by libxc is more consistent in this area

Re: [Xen-devel] [RFC PATCH v3 05/18] xen/arm: ITS: Port ITS driver to xen

2015-06-29 Thread Vijay Kilari
On Mon, Jun 29, 2015 at 5:09 PM, Ian Campbell wrote: > On Mon, 2015-06-22 at 17:31 +0530, vijay.kil...@gmail.com wrote: > [...] >> +/* >> + * ITS command descriptors - parameters to be encoded in a command >> + * block. >> + */ >> +struct its_cmd_desc { >> +union { >> +struct { >> +

  1   2   >