Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-09 Thread Jan Beulich
>>> On 10.07.15 at 08:21, wrote: > >> -Original Message- >> From: Jan Beulich [mailto:jbeul...@suse.com] >> Sent: Thursday, July 09, 2015 3:26 PM >> To: Wu, Feng; Tian, Kevin >> Cc: Andrew Cooper; george.dun...@eu.citrix.com; Zhang, Yang Z; >> xen-devel@lists.xen.org; k...@xen.org >> Su

Re: [Xen-devel] Fwd: [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-07-09 Thread Jan Beulich
>>> On 10.07.15 at 07:59, wrote: > If you agree with doing all this in a central place, maybe we can create > an arch hook for 'struct scheduler' to do this and call it in all the places > vcpu_runstate_change() gets called. What is your opinion about this? Doing this in a central place is certai

Re: [Xen-devel] [v3 12/15] vmx: posted-interrupt handling when vCPU is blocked

2015-07-09 Thread Wu, Feng
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: Thursday, July 09, 2015 3:26 PM > To: Wu, Feng; Tian, Kevin > Cc: Andrew Cooper; george.dun...@eu.citrix.com; Zhang, Yang Z; > xen-devel@lists.xen.org; k...@xen.org > Subject: RE: [Xen-devel] [v3 12/15] vmx: poste

Re: [Xen-devel] PCI Pass-through in Xen ARM - Draft 2.

2015-07-09 Thread Pranavkumar Sawargaonkar
On Thu, Jul 9, 2015 at 7:27 PM, Julien Grall wrote: > > > On 09/07/2015 12:30, Manish Jaggi wrote: >> >> On Thursday 09 July 2015 01:38 PM, Julien Grall wrote: >>> >>> On 09/07/2015 08:13, Manish Jaggi wrote: > > > If this was a domctl there might be scope for accepting an > implem

Re: [Xen-devel] [v7][PATCH 16/16] tools: parse to enable new rdm policy parameters

2015-07-09 Thread Chen, Tiejun
The first issue (which would really be relevant to the documentation patch) is that the documentation is in a separate commit. There are sometimes valid reasons for doing this. I'm not sure if they apply, Wei suggested we should organize/spit all patches according to libxl, libxc, xc and xl.

Re: [Xen-devel] Fwd: [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-07-09 Thread Wu, Feng
> -Original Message- > From: George Dunlap [mailto:george.dun...@eu.citrix.com] > Sent: Thursday, July 09, 2015 10:28 PM > To: Dario Faggioli; Jan Beulich > Cc: Tian, Kevin; Wu, Feng; andrew.coop...@citrix.com; xen-devel; Zhang, Yang > Z; k...@xen.org > Subject: Re: [Xen-devel] Fwd: [v3 1

Re: [Xen-devel] [v7][PATCH 13/16] libxl: construct e820 map with RDM information for HVM guest

2015-07-09 Thread Chen, Tiejun
tools/libxl/libxl_dom.c | 5 +++ tools/libxl/libxl_internal.h | 24 + tools/libxl/libxl_x86.c | 83 ... diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c index 62ef120..41da479 100644 --- a/tools/libxl/libxl_dom.

[Xen-devel] [linux-3.4 test] 59267: regressions - FAIL

2015-07-09 Thread osstest service owner
flight 59267 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59267/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511 Tests which are failing

Re: [Xen-devel] [v7][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-09 Thread Chen, Tiejun
I have found a few things in this patch which I would like to see improved. See below. Given how late I am with this review, I do not feel that I should be nacking it at this time. You have a tools ack from Wei, so my comments are not a blocker for this series. But if you need to respin, pleas

Re: [Xen-devel] [PATCH v2 00/27] Libxl migration v2

2015-07-09 Thread Yang Hongyang
On 07/10/2015 02:26 AM, Andrew Cooper wrote: This series adds support for the libxl migration v2 stream, and untangles the existing layering violations of the toolstack and qemu records. It can be found on the branch "libxl-migv2-v2" git://xenbits.xen.org/people/andrewcoop/xen.git http://x

[Xen-devel] Question about seperating request and response ring in PV network

2015-07-09 Thread openlui
Hi, all: I am trying to improve the performance of netfront/netback, and I found that there were some discussion about PV network performance improvement in devel mailing list ([1]). The proposals mentioned in [1] are helpful, such as multipage ring, multiqueue, etc, and some of them have

[Xen-devel] [linux-4.1 test] 59275: tolerable FAIL - PUSHED

2015-07-09 Thread osstest service owner
flight 59275 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59275/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop fail pass in 59143 Regressions which are regarded as all

Re: [Xen-devel] [PATCH v4 15/15] tools/xen-access: altp2m testcases

2015-07-09 Thread Lengyel, Tamas
> @@ -546,6 +652,23 @@ int main(int argc, char *argv[]) > } > > break; > +case VM_EVENT_REASON_SINGLESTEP: > +printf("Singlestep: rip=%016"PRIx64", vcpu %d\n", > + req.regs.x86.rip, > + req.vcp

Re: [Xen-devel] [PATCH v2 04/27] tools/libxl: Introduce libxl__kill()

2015-07-09 Thread Yang Hongyang
On 07/10/2015 02:26 AM, Andrew Cooper wrote: as a wrapper to kill(2), and use it in preference to sendig in s/sendig/sendsig/ libxl_save_callout.c. Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Jackson CC: Wei Liu --- Logically new in v2 - split out from a v1 change which was it

Re: [Xen-devel] [PATCH v4 09/15] x86/altp2m: alternate p2m memory events.

2015-07-09 Thread Lengyel, Tamas
> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h > index 577e971..6dfa9db 100644 > --- a/xen/include/public/vm_event.h > +++ b/xen/include/public/vm_event.h > @@ -47,6 +47,16 @@ > #define VM_EVENT_FLAG_VCPU_PAUSED (1 << 0) > /* Flags to aid debugging mem_event */ >

[Xen-devel] [PATCH v4 15/15] tools/xen-access: altp2m testcases

2015-07-09 Thread Ed White
From: Tamas K Lengyel Working altp2m test-case. Extended the test tool to support singlestepping to better highlight the core feature of altp2m view switching. Signed-off-by: Tamas K Lengyel Signed-off-by: Ed White --- tools/tests/xen-access/xen-access.c | 173 ++--

[Xen-devel] [PATCH v4 14/15] tools/libxc: add support to altp2m hvmops

2015-07-09 Thread Ed White
From: Tamas K Lengyel Wrappers to issue altp2m hvmops. Signed-off-by: Tamas K Lengyel Signed-off-by: Ravi Sahita --- tools/libxc/Makefile | 1 + tools/libxc/include/xenctrl.h | 21 tools/libxc/xc_altp2m.c | 237 ++ 3 files changed

[Xen-devel] [PATCH v4 13/15] x86/altp2m: XSM hooks for altp2m HVM ops

2015-07-09 Thread Ed White
From: Ravi Sahita Signed-off-by: Ravi Sahita Acked-by: Daniel De Graaf --- tools/flask/policy/policy/modules/xen/xen.if | 4 ++-- xen/arch/x86/hvm/hvm.c | 6 ++ xen/include/xsm/dummy.h | 12 xen/include/xsm/xsm.h

[Xen-devel] [PATCH v4 12/15] x86/altp2m: Add altp2mhvm HVM domain parameter.

2015-07-09 Thread Ed White
The altp2mhvm and nestedhvm parameters are mutually exclusive and cannot be set together. Signed-off-by: Ed White Reviewed-by: Andrew Cooper for the hypervisor bits. --- docs/man/xl.cfg.pod.5 | 12 tools/libxl/libxl.h | 6 ++ tools/libxl/libxl_create.c

[Xen-devel] [PATCH v4 11/15] x86/altp2m: define and implement alternate p2m HVMOP types.

2015-07-09 Thread Ed White
Signed-off-by: Ed White --- xen/arch/x86/hvm/hvm.c | 138 xen/include/public/hvm/hvm_op.h | 82 2 files changed, 220 insertions(+) diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index bda6c1e..23cd507 10064

[Xen-devel] [PATCH v4 10/15] x86/altp2m: add remaining support routines.

2015-07-09 Thread Ed White
Add the remaining routines required to support enabling the alternate p2m functionality. Signed-off-by: Ed White Reviewed-by: Andrew Cooper --- xen/arch/x86/hvm/hvm.c | 58 +- xen/arch/x86/mm/hap/Makefile | 1 + xen/arch/x86/mm/hap/altp2m_hap.c | 98 ++ xen/arch/x

[Xen-devel] [PATCH v4 09/15] x86/altp2m: alternate p2m memory events.

2015-07-09 Thread Ed White
Add a flag to indicate that a memory event occurred in an alternate p2m and a field containing the p2m index. Allow any event response to switch to a different alternate p2m using the same flag and field. Modify p2m_mem_access_check() to handle alternate p2m's. Signed-off-by: Ed White Acked-by:

[Xen-devel] [PATCH v4 08/15] x86/altp2m: add control of suppress_ve.

2015-07-09 Thread Ed White
From: George Dunlap The existing ept_set_entry() and ept_get_entry() routines are extended to optionally set/get suppress_ve. Passing -1 will set suppress_ve on new p2m entries, or retain suppress_ve flag on existing entries. Signed-off-by: George Dunlap --- xen/arch/x86/mm/mem_sharing.c | 5

[Xen-devel] [PATCH v4 07/15] VMX: add VMFUNC leaf 0 (EPTP switching) to emulator.

2015-07-09 Thread Ed White
From: Ravi Sahita Signed-off-by: Ravi Sahita --- xen/arch/x86/hvm/emulate.c | 19 +-- xen/arch/x86/hvm/vmx/vmx.c | 29 + xen/arch/x86/x86_emulate/x86_emulate.c | 20 +++- xen/arch/x86/x86_emulate/x86_emulate.h |

[Xen-devel] [PATCH v4 05/15] x86/altp2m: basic data structures and support routines.

2015-07-09 Thread Ed White
Add the basic data structures needed to support alternate p2m's and the functions to initialise them and tear them down. Although Intel hardware can handle 512 EPTP's per hardware thread concurrently, only 10 per domain are supported in this patch for performance reasons. The iterator in hap_enab

[Xen-devel] [PATCH v4 06/15] VMX/altp2m: add code to support EPTP switching and #VE.

2015-07-09 Thread Ed White
Implement and hook up the code to enable VMX support of VMFUNC and #VE. VMFUNC leaf 0 (EPTP switching) emulation is added in a later patch. Signed-off-by: Ed White Reviewed-by: Andrew Cooper Acked-by: Jun Nakajima --- xen/arch/x86/hvm/vmx/vmx.c | 138 +

[Xen-devel] [PATCH v4 04/15] x86/HVM: Hardware alternate p2m support detection.

2015-07-09 Thread Ed White
As implemented here, only supported on platforms with VMX HAP. By default this functionality is force-disabled, it can be enabled by specifying altp2m=1 on the Xen command line. Signed-off-by: Ed White Reviewed-by: Andrew Cooper --- docs/misc/xen-command-line.markdown | 7 +++ xen/arch/x8

[Xen-devel] [PATCH v4 02/15] VMX: VMFUNC and #VE definitions and detection.

2015-07-09 Thread Ed White
Currently, neither is enabled globally but may be enabled on a per-VCPU basis by the altp2m code. Remove the check for EPTE bit 63 == zero in ept_split_super_page(), as that bit is now hardware-defined. Signed-off-by: Ed White Reviewed-by: Andrew Cooper Acked-by: George Dunlap Acked-by: Jun N

[Xen-devel] [PATCH v4 00/15] Alternate p2m: support multiple copies of host p2m

2015-07-09 Thread Ed White
This set of patches adds support to hvm domains for EPTP switching by creating multiple copies of the host p2m (currently limited to 10 copies). The primary use of this capability is expected to be in scenarios where access to memory needs to be monitored and/or restricted below the level at which

[Xen-devel] [PATCH v4 03/15] VMX: implement suppress #VE.

2015-07-09 Thread Ed White
In preparation for selectively enabling #VE in a later patch, set suppress #VE on all EPTE's. Suppress #VE should always be the default condition for two reasons: it is generally not safe to deliver #VE into a guest unless that guest has been modified to receive it; and even then for most EPT viol

[Xen-devel] [PATCH v4 01/15] common/domain: Helpers to pause a domain while in context

2015-07-09 Thread Ed White
From: Andrew Cooper For use on codepaths which would need to use domain_pause() but might be in the target domain's context. In the case that the target domain is in context, all other vcpus are paused. Signed-off-by: Andrew Cooper --- xen/common/domain.c | 28

Re: [Xen-devel] [v7][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-09 Thread Chen, Tiejun
int libxl__device_pci_setdefault(libxl__gc *gc, libxl_device_pci *pci) { +/* We'd like to force reserve rdm specific to a device by default.*/ +if ( pci->rdm_policy == LIBXL_RDM_RESERVE_POLICY_INVALID) ^ I have just spotted that spurious whitespace. However I won't block

Re: [Xen-devel] Fwd: [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-07-09 Thread Wu, Feng
> -Original Message- > From: George Dunlap [mailto:george.dun...@eu.citrix.com] > Sent: Thursday, July 09, 2015 8:53 PM > To: Wu, Feng > Cc: Dario Faggioli; Tian, Kevin; k...@xen.org; andrew.coop...@citrix.com; > xen-devel; jbeul...@suse.com; Zhang, Yang Z > Subject: Re: [Xen-devel] Fwd:

Re: [Xen-devel] Fwd: [v3 14/15] Update Posted-Interrupts Descriptor during vCPU scheduling

2015-07-09 Thread Wu, Feng
> -Original Message- > From: Dario Faggioli [mailto:dario.faggi...@citrix.com] > Sent: Thursday, July 09, 2015 8:42 PM > To: Wu, Feng > Cc: George Dunlap; Tian, Kevin; k...@xen.org; andrew.coop...@citrix.com; > xen-devel; jbeul...@suse.com; Zhang, Yang Z > Subject: Re: [Xen-devel] Fwd: [v

Re: [Xen-devel] [PATCH v6] run QEMU as non-root

2015-07-09 Thread Jim Fehlig
On 07/09/2015 04:34 AM, Ian Campbell wrote: On Wed, 2015-07-01 at 15:03 -0600, Jim Fehlig wrote: Perhaps. But thanks for providing a way (b_info->device_model_user) for apps to override the libxl policy. You mentioned in v5 that libvirt supports setting both the user and the group and that the

[Xen-devel] [linux-linus test] 59254: tolerable FAIL - PUSHED

2015-07-09 Thread osstest service owner
flight 59254 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/59254/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-libvirt 11 guest-start fail like 59086 test-amd64-amd64-libvirt 1

[Xen-devel] [PATCH v2 05/20] block/xen-blkfront: Split blkif_queue_request in 2

2015-07-09 Thread Julien Grall
Currently, blkif_queue_request has 2 distinct execution path: - Send a discard request - Send a read/write request The function is also allocating grants to use for generating the request. Although, this is only used for read/write request. Rather than having a function with 2 distinct ex

[Xen-devel] [PATCH v2 14/20] xen/grant-table: Make it running on 64KB granularity

2015-07-09 Thread Julien Grall
The Xen interface is using 4KB page granularity. This means that each grant is 4KB. The current implementation allocates a Linux page per grant. On Linux using 64KB page granularity, only the first 4KB of the page will be used. We could decrease the memory wasted by sharing the page with multiple

[Xen-devel] [PATCH v2 10/20] xen/xenbus: Use Xen page definition

2015-07-09 Thread Julien Grall
All the ring (xenstore, and PV rings) are always based on the page granularity of Xen. Signed-off-by: Julien Grall Cc: Konrad Rzeszutek Wilk Cc: Boris Ostrovsky Cc: David Vrabel --- Changes in v2: - Also update the ring mapping function --- drivers/xen/xenbus/xenbus_client.c | 6 +

[Xen-devel] [PATCH v2 15/20] block/xen-blkfront: Make it running on 64KB page granularity

2015-07-09 Thread Julien Grall
From: Julien Grall The PV block protocol is using 4KB page granularity. The goal of this patch is to allow a Linux using 64KB page granularity using block device on a non-modified Xen. The block API is using segment which should at least be the size of a Linux page. Therefore, the driver will ha

[Xen-devel] [PATCH v2 13/20] xen/events: fifo: Make it running on 64KB granularity

2015-07-09 Thread Julien Grall
Only use the first 4KB of the page to store the events channel info. It means that we will wast 60KB every time we allocate page for: * control block: a page is allocating per CPU * event array: a page is allocating everytime we need to expand it I think we can reduce the memory waste fo

[Xen-devel] [PATCH v2 18/20] net/xen-netback: Make it running on 64KB page granularity

2015-07-09 Thread Julien Grall
The PV network protocol is using 4KB page granularity. The goal of this patch is to allow a Linux using 64KB page granularity working as a network backend on a non-modified Xen. It's only necessary to adapt the ring size and break skb data in small chunk of 4KB. The rest of the code is relying on

[Xen-devel] [PATCH v2 12/20] xen/balloon: Don't rely on the page granularity is the same for Xen and Linux

2015-07-09 Thread Julien Grall
For ARM64 guests, Linux is able to support either 64K or 4K page granularity. Although, the hypercall interface is always based on 4K page granularity. With 64K page granuliarty, a single page will be spread over multiple Xen frame. When a driver request/free a balloon page, the balloon driver wi

[Xen-devel] [PATCH v2 16/20] block/xen-blkback: Make it running on 64KB page granularity

2015-07-09 Thread Julien Grall
The PV block protocol is using 4KB page granularity. The goal of this patch is to allow a Linux using 64KB page granularity behaving as a block backend on a non-modified Xen. It's only necessary to adapt the ring size and the number of request per indirect frames. The rest of the code is relying o

[Xen-devel] [PATCH v2 19/20] xen/privcmd: Add support for Linux 64KB page granularity

2015-07-09 Thread Julien Grall
The hypercall interface (as well as the toolstack) is always using 4KB page granularity. When the toolstack is asking for mapping a series of guest PFN in a batch, it expects to have the page map contiguously in its virtual memory. When Linux is using 64KB page granularity, the privcmd driver will

[Xen-devel] [PATCH v2 11/20] tty/hvc: xen: Use xen page definition

2015-07-09 Thread Julien Grall
The console ring is always based on the page granularity of Xen. Signed-off-by: Julien Grall Cc: Greg Kroah-Hartman Cc: Jiri Slaby Cc: David Vrabel Cc: Stefano Stabellini Cc: Boris Ostrovsky Cc: linuxppc-...@lists.ozlabs.org --- drivers/tty/hvc/hvc_xen.c | 6 +++--- 1 file changed, 3 insert

[Xen-devel] [PATCH v2 20/20] arm/xen: Add support for 64KB page granularity

2015-07-09 Thread Julien Grall
The hypercall interface is always using 4KB page granularity. This is requiring to use xen page definition macro when we deal with hypercall. Note that pfn_to_mfn is working with a Xen pfn (i.e 4KB). We may want to rename pfn_mfn to make this explicit. We also allocate a 64KB page for the shared

[Xen-devel] [PATCH v2 17/20] net/xen-netfront: Make it running on 64KB page granularity

2015-07-09 Thread Julien Grall
The PV network protocol is using 4KB page granularity. The goal of this patch is to allow a Linux using 64KB page granularity using network device on a non-modified Xen. It's only necessary to adapt the ring size and break skb data in small chunk of 4KB. The rest of the code is relying on the gran

[Xen-devel] [PATCH v2 00/20] xen/arm64: Add support for 64KB page

2015-07-09 Thread Julien Grall
Hi all, ARM64 Linux is supporting both 4KB and 64KB page granularity. Although, Xen hypercall interface and PV protocol are always based on 4KB page granularity. Any attempt to boot a Linux guest with 64KB pages enabled will result to a guest crash. This series is a first attempt to allow those

[Xen-devel] [PATCH v2 02/20] xen: Introduce a function to split a Linux page into Xen page

2015-07-09 Thread Julien Grall
The Xen interface is always using 4KB page. This means that a Linux page may be split across multiple Xen page when the page granularity is not the same. This helper will break down a Linux page into 4KB chunk and call the helper on each of them. Signed-off-by: Julien Grall Cc: Konrad Rzeszutek

[Xen-devel] [PATCH v2 04/20] xen/grant: Add helper gnttab_page_grant_foreign_access_ref

2015-07-09 Thread Julien Grall
Many PV drivers contain the idiom: pfn = page_to_mfn(...) /* Or similar */ gnttab_grant_foreign_access_ref Replace it by a new helper. Note that when Linux is using a different page granularity than Xen, the helper only gives access to the first 4KB grant. This is useful where drivers are alloca

[Xen-devel] [PATCH v2 07/20] block/xen-blkfront: split get_grant in 2

2015-07-09 Thread Julien Grall
Prepare the code to support 64KB page granularity. The first implementation will use a full Linux page per indirect and persistent grant. When non-persistent grant is used, each page of a bio request may be split in multiple grant. Furthermore, the field page of the grant structure is only used to

[Xen-devel] [PATCH v2 09/20] xen/biomerge: Don't allow biovec to be merge when Linux is not using 4KB page

2015-07-09 Thread Julien Grall
When Linux is using 64K page granularity, every page will be slipt in multiple non-contiguous 4K MFN (page granularity of Xen). I'm not sure how to handle efficiently the check to know whether we can merge 2 biovec with a such case. So for now, always says that biovec are not mergeable. Signed-of

[Xen-devel] [PATCH v2 06/20] block/xen-blkfront: Store a page rather a pfn in the grant structure

2015-07-09 Thread Julien Grall
All the usage of the field pfn are done using the same idiom: pfn_to_page(grant->pfn) This will return always the same page. Store directly the page in the grant to clean up the code. Signed-off-by: Julien Grall Cc: Konrad Rzeszutek Wilk Cc: Roger Pau Monné Cc: Boris Ostrovsky Cc: David Vra

[Xen-devel] [PATCH v2 01/20] xen: Add Xen specific page definition

2015-07-09 Thread Julien Grall
The Xen hypercall interface is always using 4K page granularity on ARM and x86 architecture. With the incoming support of 64K page granularity for ARM64 guest, it won't be possible to re-use the Linux page definition in Xen drivers. Introduce Xen page definition helpers based on the Linux page de

[Xen-devel] [PATCH v2 03/20] xen/grant: Introduce helpers to split a page into grant

2015-07-09 Thread Julien Grall
Currently, a grant is always based on the Xen page granularity (i.e 4KB). When Linux is using a different page granularity, a single page will be split between multiple grants. The new helpers will be in charge to split the Linux page into grant and call a function given by the caller on each gran

[Xen-devel] [PATCH v2 08/20] net/xen-netback: xenvif_gop_frag_copy: move GSO check out of the loop

2015-07-09 Thread Julien Grall
The skb doesn't change within the function. Therefore it's only necessary to check if we need GSO once at the beginning. Signed-off-by: Julien Grall Cc: Ian Campbell Cc: Wei Liu Cc: net...@vger.kernel.org --- Changes in v2: - Patch added --- drivers/net/xen-netback/netback.c | 14 +

[Xen-devel] [libvirt test] 59256: regressions - FAIL

2015-07-09 Thread osstest service owner
flight 59256 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/59256/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-xsm 11 guest-start fail REGR. vs. 58842 Regressions which are reg

[Xen-devel] [linux-3.18 test] 59222: regressions - FAIL

2015-07-09 Thread osstest service owner
flight 59222 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/59222/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581 Tests which are failin

Re: [Xen-devel] [RFC Patch V1 06/12] PCI: Use for_pci_msi_entry() to access MSI device list

2015-07-09 Thread Konrad Rzeszutek Wilk
On Thu, Jul 09, 2015 at 04:00:41PM +0800, Jiang Liu wrote: > Use accessor for_pci_msi_entry() to access MSI device list, so we could easily > move msi_list from struct pci_dev into struct device later. > > Signed-off-by: Jiang Liu > --- > drivers/pci/msi.c | 39 ---

Re: [Xen-devel] [RFC Patch V1 05/12] x86, PCI: Use for_pci_msi_entry() to access MSI device list

2015-07-09 Thread Konrad Rzeszutek Wilk
On Thu, Jul 09, 2015 at 04:00:40PM +0800, Jiang Liu wrote: > Use accessor for_pci_msi_entry() to access MSI device list, so we could > easily move msi_list from struct pci_dev into struct device later. > > Signed-off-by: Jiang Liu Looks pretty simple. Acked- by: Konrad Rzeszutek Wilk > --- > a

Re: [Xen-devel] [PATCH v9 4/4] iommu: add rmrr Xen command line option for extra rmrrs

2015-07-09 Thread Konrad Rzeszutek Wilk
On Wed, Jul 08, 2015 at 09:50:26PM -0400, elena.ufimts...@oracle.com wrote: > From: Elena Ufimtseva > > On some platforms RMRR regions may be not specified > in ACPI and thus will not be mapped 1:1 in dom0. This > causes IO Page Faults and prevents dom0 from booting > in PVH mode. > New Xen comma

Re: [Xen-devel] [PATCH v9 2/4] iommu VT-d: separate rmrr addition function

2015-07-09 Thread Konrad Rzeszutek Wilk
On Wed, Jul 08, 2015 at 09:50:24PM -0400, elena.ufimts...@oracle.com wrote: > From: Elena Ufimtseva > > In preparation for auxiliary RMRR data provided on Xen > command line, make RMRR adding a separate function. > Also free memery for rmrr device scope in error path. s/memery/memory/ > > Sign

[Xen-devel] [PATCH v2 17/27] tools/libxl: Support converting a legacy stream to a v2 stream

2015-07-09 Thread Andrew Cooper
When a legacy stream is found, it needs to be converted to a v2 stream for the reading logic. This is done by exec()ing the python conversion utility. One complication is that the caller of this interface needs to assume ownership of the output fd, to prevent it being closed while still in use in

[Xen-devel] [PATCH v2 12/27] tools/python: Other migration infrastructure

2015-07-09 Thread Andrew Cooper
Contains: * Reverse-engineered notes of the legacy format from xg_save_restore.h * Python implementation of the legacy format * Public HVM Params used in the legacy stream * XL header format Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Jackson CC: Wei Liu --- New in v2 - removes

[Xen-devel] [PATCH v2 27/27] tools/libxl: Drop all knowledge of toolstack callbacks

2015-07-09 Thread Andrew Cooper
Libxl has now been fully adjusted not to need them. Signed-off-by: Andrew Cooper Acked-by: Ian Campbell CC: Ian Jackson CC: Wei Liu --- tools/libxl/libxl_dom.c|1 - tools/libxl/libxl_internal.h |2 -- tools/libxl/libxl_save_callout.c | 39 +---

[Xen-devel] [PATCH v2 21/27] tools/libxc+libxl+xl: Save v2 streams

2015-07-09 Thread Andrew Cooper
This is a complicated set of changes which must be done together for bisectability. * libxl-save-helper is updated to unconditionally use libxc migration v2. * libxl compatibility workarounds in libxc are disabled for save operations. * libxl__stream_write_start() is logically spliced into the

[Xen-devel] [PATCH v2 24/27] tools/libx{c, l}: Introduce restore_callbacks.checkpoint()

2015-07-09 Thread Andrew Cooper
And call it when a checkpoint record is found in the libxc stream. Some parts of this patch have been based on patches from the COLO series. Signed-off-by: Wen Congyang Signed-off-by: Yang Hongyang Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Jackson CC: Wei Liu --- v2: Borrow suf

[Xen-devel] [PATCH v2 26/27] tools/libxc: Drop all XG_LIBXL_HVM_COMPAT code from libxc

2015-07-09 Thread Andrew Cooper
Libxl has now been fully adjusted not to need it. Signed-off-by: Andrew Cooper Acked-by: Ian Campbell CC: Ian Jackson CC: Wei Liu --- tools/libxc/xc_sr_common.h |5 -- tools/libxc/xc_sr_restore.c | 18 - tools/libxc/xc_sr_restore_x86_hvm.c | 124 ---

[Xen-devel] [PATCH v2 23/27] tools/libxl: Write checkpoint records into the stream

2015-07-09 Thread Andrew Cooper
when signalled to do so by libxl__remus_domain_checkpoint_callback() Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Jackson CC: Wei Liu --- This patch has changed substantially in v2 as a result of changes earlier in the series. No behavioural difference from v1. --- tools/libxl/libx

[Xen-devel] [PATCH v2 14/27] tools/python: Conversion utility for legacy migration streams

2015-07-09 Thread Andrew Cooper
This utility will take a legacy stream as in input, and produce a v2 stream as an output. It is exec()'d by libxl to provide backwards compatibility. Signed-off-by: Andrew Cooper Acked-by: Ian Campbell CC: Ian Jackson CC: Wei Liu --- tools/python/Makefile |4 + tools

[Xen-devel] [PATCH v2 20/27] tools/libxl: Infrastructure for writing a v2 stream

2015-07-09 Thread Andrew Cooper
From: Ross Lagerwall This contains the event machinary and state machines to write non-checkpointed migration v2 stream (with the exception of the xc_domain_save() handling which is spliced later in a bisectable way). Signed-off-by: Ross Lagerwall Signed-off-by: Andrew Cooper CC: Ian Campbell

[Xen-devel] [PATCH v2 10/27] tools/python: Libxc migration v2 infrastructure

2015-07-09 Thread Andrew Cooper
Contains: * Python implementation of the libxc migration v2 records * Verification code for spec compliance * Unit tests Signed-off-by: Andrew Cooper Acked-by: Ian Campbell CC: Ian Jackson CC: Wei Liu --- tools/python/setup.py|1 + tools/python/xen/migration/libxc.py |

[Xen-devel] [PATCH v2 18/27] tools/libxl: Convert a legacy stream if needed

2015-07-09 Thread Andrew Cooper
For backwards compatibility, a legacy stream needs converting before it can be read by the v2 stream logic. This causes the v2 stream logic to need to juggle two parallel tasks. check_stream_finished() is introduced for the purpose of joining the tasks in both success and error cases. Signed-off-

[Xen-devel] [PATCH v2 15/27] tools/libxl: Migration v2 stream format

2015-07-09 Thread Andrew Cooper
From: Ross Lagerwall C structures describing the Libxl migration v2 stream format Signed-off-by: Ross Lagerwall Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Jackson CC: Wei Liu --- v2: Move into libxl__ namespace --- tools/libxl/libxl_sr_stream_format.h | 57 +++

[Xen-devel] [PATCH v2 13/27] tools/python: Verification utility for v2 stream spec compliance

2015-07-09 Thread Andrew Cooper
Signed-off-by: Andrew Cooper Acked-by: Ian Campbell CC: Ian Jackson CC: Wei Liu --- This is exceedingly useful for development, but not of practical use being installed into a production dom0. --- tools/python/scripts/verify-stream-v2 | 174 + 1 file changed,

[Xen-devel] [PATCH v2 25/27] tools/libxl: Handle checkpoint records in a libxl migration v2 stream

2015-07-09 Thread Andrew Cooper
This is the final bit of untangling for Remus. Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Jackson CC: Wei Liu --- As before, Remus functionality is untested, but the new logic here should handle failovers correctly. The patch has changed greatly from v1, both in a functional sence

[Xen-devel] [PATCH v2 16/27] tools/libxl: Infrastructure for reading a libxl migration v2 stream

2015-07-09 Thread Andrew Cooper
From: Ross Lagerwall This contains the event machinary and state machines to read an act on a non-checkpointed migration v2 stream (with the exception of the xc_domain_restore() handling which is spliced later in a bisectable way). It also contains some boilerplate to help support checkpointed s

[Xen-devel] [PATCH v2 22/27] docs/libxl: Introduce CHECKPOINT_END to support migration v2 remus streams

2015-07-09 Thread Andrew Cooper
In a remus senario, libxc will write a CHECKPOINT record, then hand ownership of the fd to libxl. Libxl then writes any records required and finishes with a CHECKPOINT_END record, then hands ownership of the fd back to libxc. Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Jackson CC: We

[Xen-devel] [PATCH v2 19/27] tools/libxc+libxl+xl: Restore v2 streams

2015-07-09 Thread Andrew Cooper
This is a complicated set of changes which must be done together for bisectability. * libxl-save-helper is updated to unconditionally use libxc migration v2. * libxl compatibility workarounds in libxc are disabled for restore operations. * libxl__stream_read_start() is logically spliced into th

[Xen-devel] [PATCH v2 11/27] tools/python: Libxl migration v2 infrastructure

2015-07-09 Thread Andrew Cooper
Contains: * Python implementation of the libxl migration v2 records * Verification code for spec compliance * Unit tests Signed-off-by: Andrew Cooper Acked-by: Ian Campbell CC: Ian Jackson CC: Wei Liu --- tools/python/xen/migration/libxl.py | 188 +++ tools

[Xen-devel] [PATCH v2 02/27] tools/libxc: Always compile the compat qemu variables into xc_sr_context

2015-07-09 Thread Andrew Cooper
This is safe (as the variables will simply be unused), and is required for correct compilation when midway through untangling the libxc/libxl interaction. The #define is left in place to highlight that the variables can be removed once the untangling is complete. Signed-off-by: Andrew Cooper Ack

[Xen-devel] [PATCH v2 00/27] Libxl migration v2

2015-07-09 Thread Andrew Cooper
This series adds support for the libxl migration v2 stream, and untangles the existing layering violations of the toolstack and qemu records. It can be found on the branch "libxl-migv2-v2" git://xenbits.xen.org/people/andrewcoop/xen.git http://xenbits.xen.org/git-http/people/andrewcoop/xen.git

[Xen-devel] [PATCH v2 01/27] bsd-sys-queue-h-seddery: Massage `offsetof'

2015-07-09 Thread Andrew Cooper
From: Ian Jackson For some reason BSD's queue.h uses `__offsetof'. It expects it to work just like offsetof. So use offsetof. Reported-by: Andrew Cooper Signed-off-by: Ian Jackson --- tools/include/xen-external/bsd-sys-queue-h-seddery |2 ++ 1 file changed, 2 insertions(+) diff --git a

[Xen-devel] [PATCH v2 04/27] tools/libxl: Introduce libxl__kill()

2015-07-09 Thread Andrew Cooper
as a wrapper to kill(2), and use it in preference to sendig in libxl_save_callout.c. Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Jackson CC: Wei Liu --- Logically new in v2 - split out from a v1 change which was itself a cherrypick-and-modify from the AO Abort series --- tools/libx

[Xen-devel] [PATCH v2 05/27] tools/libxl: Stash all restore parameters in domain_create_state

2015-07-09 Thread Andrew Cooper
Shortly more parameters will appear, and this saves unboxing each one. libxl_domain_restore_params is mandatory for restore streams, and ignored for plain creation. The old 'checkpointed_stream' was incorrectly identified as a private parameter when it was infact public. No functional change. Si

[Xen-devel] [PATCH v2 03/27] tools/libxl: Introduce ROUNDUP()

2015-07-09 Thread Andrew Cooper
This is the same as is used by libxc. Signed-off-by: Andrew Cooper Acked-by: Ian Campbell CC: Ian Jackson CC: Wei Liu --- tools/libxl/libxl_internal.h |3 +++ 1 file changed, 3 insertions(+) diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h index 5235d25..19fc425 1

[Xen-devel] [PATCH v2 08/27] tools/xl: Mandatory flag indicating the format of the migration stream

2015-07-09 Thread Andrew Cooper
Introduced at this point so the python stream conversion code has a concrete ABI to use. Later when libxl itself starts supporting a v2 stream, it will be added to XL_MANDATORY_FLAG_ALL. Signed-off-by: Andrew Cooper Acked-by: Ian Campbell CC: Ian Jackson CC: Wei Liu --- v2: Expand commit mes

[Xen-devel] [PATCH v2 06/27] tools/libxl: Split libxl__domain_create_state.restore_fd in two

2015-07-09 Thread Andrew Cooper
In a future patch, we shall support automatically converting a legacy stream to a v2 stream, in which case libxc needs to read from a different fd. Simply overwriting restore_fd does not work; the two fd's have different circumstances. The restore_fd needs to be returned to its origial state befo

[Xen-devel] [PATCH v2 07/27] tools/libxl: Extra management APIs for the save helper

2015-07-09 Thread Andrew Cooper
With migration v2, there are several moving parts needing to be juggled at once. This requires the error handling logic to be able to query the state of each moving part, possibly before they have been started, and be able to cancel them. Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Ja

[Xen-devel] [PATCH v2 09/27] docs: Libxl migration v2 stream specification

2015-07-09 Thread Andrew Cooper
Signed-off-by: Andrew Cooper CC: Ian Campbell CC: Ian Jackson CC: Wei Liu --- docs/specs/libxl-migration-stream.pandoc | 205 ++ 1 file changed, 205 insertions(+) create mode 100644 docs/specs/libxl-migration-stream.pandoc diff --git a/docs/specs/libxl-migration-

Re: [Xen-devel] [v7][PATCH 16/16] tools: parse to enable new rdm policy parameters

2015-07-09 Thread Ian Jackson
Tiejun Chen writes ("[v7][PATCH 16/16] tools: parse to enable new rdm policy parameters"): > This patch parses to enable user configurable parameters to specify > RDM resource and according policies, > > Global RDM parameter: > rdm = "strategy=host,policy=strict/relaxed" > Per-device RDM para

Re: [Xen-devel] [v7][PATCH 13/16] libxl: construct e820 map with RDM information for HVM guest

2015-07-09 Thread Ian Jackson
Tiejun Chen writes ("[v7][PATCH 13/16] libxl: construct e820 map with RDM information for HVM guest"): > Here we'll construct a basic guest e820 table via > XENMEM_set_memory_map. This table includes lowmem, highmem > and RDMs if they exist, and hvmloader would need this info > later. > > Note th

Re: [Xen-devel] [v7][PATCH 12/16] tools: introduce a new parameter to set a predefined rdm boundary

2015-07-09 Thread Ian Jackson
Tiejun Chen writes ("[v7][PATCH 12/16] tools: introduce a new parameter to set a predefined rdm boundary"): > Previously we always fix that predefined boundary as 2G to handle > conflict between memory and rdm, but now this predefined boundar > can be changes with the parameter "rdm_mem_boundary"

Re: [Xen-devel] [v7][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM

2015-07-09 Thread Ian Jackson
Tiejun Chen writes ("[v7][PATCH 11/16] tools/libxl: detect and avoid conflicts with RDM"): > While building a VM, HVM domain builder provides struct hvm_info_table{} > to help hvmloader. Currently it includes two fields to construct guest > e820 table by hvmloader, low_mem_pgend and high_mem_pgend

Re: [Xen-devel] [PATCH v8 1/4] pci: add PCI_SBDF and PCI_SEG macros

2015-07-09 Thread Elena Ufimtseva
- wei.l...@citrix.com wrote: > On Thu, Jul 09, 2015 at 05:00:45PM +0100, Jan Beulich wrote: > > >>> On 09.07.15 at 17:53, wrote: > > > - jbeul...@suse.com wrote: > > >> >>> On 09.07.15 at 14:07, wrote: > > >> > You are right, it needs to be rebased. I can post later rebased > on > > >>

Re: [Xen-devel] [v7][PATCH 10/16] tools: introduce some new parameters to set rdm policy

2015-07-09 Thread Ian Jackson
Tiejun Chen writes ("[v7][PATCH 10/16] tools: introduce some new parameters to set rdm policy"): > This patch introduces user configurable parameters to specify RDM > resource and according policies, ... > int libxl__device_pci_setdefault(libxl__gc *gc, libxl_device_pci *pci) > { > +/* We'd

[Xen-devel] [PATCH 4/9] libxl: event tests: Improve Makefile doc comment

2015-07-09 Thread Ian Jackson
Including the explanation of how to run these tests. Signed-off-by: Ian Jackson --- tools/libxl/Makefile |8 +++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/tools/libxl/Makefile b/tools/libxl/Makefile index cc9c152..44a4da7 100644 --- a/tools/libxl/Makefile +++ b/tools/

[Xen-devel] [PATCH 6/9] libxl: event tests: Provide libxl_test_fdevent

2015-07-09 Thread Ian Jackson
We are going to use this shortly. But, it is nicely self-contained. Signed-off-by: Ian Jackson --- tools/libxl/Makefile |2 +- tools/libxl/libxl_test_fdevent.c | 79 ++ tools/libxl/libxl_test_fdevent.h | 12 ++ 3 files changed, 92 inse

[Xen-devel] [PATCH 9/9] libxl: event tests: test_timedereg: Fix rc handling

2015-07-09 Thread Ian Jackson
In 31c836f4 "libxl: events: Permit timeouts to signal ao abort", timeout callbacks take an extra rc argument. In that patch the wrong assertion is made about the rc in test_timedereg's `occurs' callback. Fix this to make the test pass again. Signed-off-by: Ian Jackson --- tools/libxl/libxl_tes

  1   2   3   4   >