[Xen-devel] [linux-next test] 60602: trouble: blocked/broken/fail/pass

2015-08-06 Thread osstest service owner
flight 60602 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/60602/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf 3 host-install(3) broken REGR. vs. 60389 R

Re: [Xen-devel] [PATCH v2] xen/netback: Wake dealloc thread after completing zerocopy work

2015-08-06 Thread David Miller
From: Ross Lagerwall Date: Tue, 4 Aug 2015 15:40:59 +0100 > Waking the dealloc thread before decrementing inflight_packets is racy > because it means the thread may go to sleep before inflight_packets is > decremented. If kthread_stop() has already been called, the dealloc > thread may wait forev

[Xen-devel] [xen-4.5-testing test] 60597: regressions - FAIL

2015-08-06 Thread osstest service owner
flight 60597 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/60597/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-libvirt5 libvirt-buildfail in 60395 REGR. vs. 59963 Tests which are f

Re: [Xen-devel] [PATCH V5 3/7] libxl: add pvusb API

2015-08-06 Thread Chun Yan Liu
>>> On 8/7/2015 at 01:21 AM, in message <55c39796.8000...@citrix.com>, George Dunlap wrote: > On 08/06/2015 04:11 AM, Chun Yan Liu wrote: > > As 4.6 goes to bug fixing stage, maybe we can pick up this thread? :-) > > > > Beside to call for your precious review comments and suggestions so th

[Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 2

2015-08-06 Thread Shannon Zhao
This document is going to explain the design details of Xen booting with ACPI on ARM. Maybe parts of it may not be appropriate. Any comments are welcome. To Xen itself booting with ACPI, this is similar to Linux kernel except that Xen doesn't parse DSDT table. So I'll skip this part and focus on h

Re: [Xen-devel] how can I find hypercall page address?

2015-08-06 Thread big strong
Or how can I get the address of hypercall page belonging to a running domU? 2015-08-07 9:45 GMT+08:00 big strong : > I want to locate the hypercall page address when creating a new domU, so > as to locate hypercalls. Is it possible? > > 2015-08-06 17:49 GMT+08:00 Andrew Cooper : > >> On 06/08/15

Re: [Xen-devel] how can I find hypercall page address?

2015-08-06 Thread big strong
I want to locate the hypercall page address when creating a new domU, so as to locate hypercalls. Is it possible? 2015-08-06 17:49 GMT+08:00 Andrew Cooper : > On 06/08/15 10:46, big strong wrote: > > The old version of Xen contains information about hypercall page like: > > xl dmesg > .. > (X

[Xen-devel] [linux-linus test] 60594: regressions - FAIL

2015-08-06 Thread osstest service owner
flight 60594 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/60594/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl 13 guest-saverestore fail REGR. vs. 59254 test-amd64-i386-xl-xs

Re: [Xen-devel] xen/mmu: Copy and revector the P2M tree.

2015-08-06 Thread Dan Carpenter
On Mon, Jul 20, 2015 at 01:03:52PM +0300, Dan Carpenter wrote: > Hello Konrad Rzeszutek Wilk, > > The patch 7f9140626c75: "xen/mmu: Copy and revector the P2M tree." > from Jul 26, 2012, leads to the following static checker warning: > > arch/x86/xen/mmu.c:1105 xen_cleanhighmap() > war

Re: [Xen-devel] RIP MTRR - status update for upcoming v4.2

2015-08-06 Thread Toshi Kani
On Thu, 2015-08-06 at 12:53 -0700, Luis R. Rodriguez wrote: > On Fri, Jun 12, 2015 at 9:58 AM, Toshi Kani wrote: > > On Fri, 2015-06-12 at 08:59 +0100, Jan Beulich wrote: > > > > > > On 12.06.15 at 01:23, wrote: > > > > There are two usages on MTRRs: > > > > 1) MTRR entries set by firmware > > >

Re: [Xen-devel] [PATCH v9 0/8] pci: add pci_iomap_wc() and pci_ioremap_wc_bar()

2015-08-06 Thread Luis R. Rodriguez
On Wed, Jul 22, 2015 at 08:43:48AM -0500, Bjorn Helgaas wrote: > Hi Ingo, > > On Wed, Jul 22, 2015 at 10:38:45AM +0200, Ingo Molnar wrote: > > > > * Bjorn Helgaas wrote: > > > > > > > > Let me know if these are OK or if there are any questions. > > > > > > > > > > > > [0] http://lkml.kernel.or

Re: [Xen-devel] [RFC 4/4] HVM x86 deprivileged mode: Trap handlers for deprivileged mode

2015-08-06 Thread Andrew Cooper
On 06/08/2015 17:45, Ben Catterall wrote: > Added trap handlers to catch exceptions such as a page fault, general > protection fault, etc. These handlers will crash the domain as such exceptions > would indicate that either there is a bug in deprivileged mode or it has been > compromised by an atta

Re: [Xen-devel] [RFC 3/4] HVM x86 deprivileged mode: Code for switching into/out of deprivileged mode

2015-08-06 Thread Andrew Cooper
On 06/08/15 17:45, Ben Catterall wrote: > The process to switch into and out of deprivileged mode can be likened to > setjmp/longjmp. > > To enter deprivileged mode, we take a copy of the stack from the guest's > registers up to the current stack pointer. This allows us to restore the stack > when

Re: [Xen-devel] RIP MTRR - status update for upcoming v4.2

2015-08-06 Thread Luis R. Rodriguez
On Thu, Aug 6, 2015 at 12:53 PM, Luis R. Rodriguez wrote: > For those type of OSes... > could it be possible to negotiate or hint to the platform through an > attribute somehow that the OS has such capability to not use MTRR? And if that's not possible how about a new platform setting that would

[Xen-devel] Linux 4.2-rc5:

2015-08-06 Thread linux
Hi Ross, On my dom0 with a linux 4.2-rc5 kernel i encoutered the splat below. It's probably related to your patch that went in just for 4.2-rc5: "xen/events/fifo: Handle linked events when closing a port" -- Sander [ 49.020173] [ cut here ] [ 49.020187] WARNING: CPU:

Re: [Xen-devel] RIP MTRR - status update for upcoming v4.2

2015-08-06 Thread Luis R. Rodriguez
On Fri, Jun 12, 2015 at 9:58 AM, Toshi Kani wrote: > On Fri, 2015-06-12 at 08:59 +0100, Jan Beulich wrote: >> >>> On 12.06.15 at 01:23, wrote: >> > There are two usages on MTRRs: >> > 1) MTRR entries set by firmware >> > 2) MTRR entries set by OS drivers >> > >> > We can obsolete 2), but we hav

Re: [Xen-devel] [RFC 2/4] HVM x86 deprivileged mode: Create deprivileged page tables

2015-08-06 Thread Andrew Cooper
On 06/08/15 17:45, Ben Catterall wrote: > The paging structure mappings for the deprivileged mode are added > to the monitor page table for HVM guests. The entries are generated by > walking the page tables and mapping in new pages. If a higher-level page table > mapping exists, we attempt to trave

Re: [Xen-devel] [RFC 1/4] HVM x86 deprivileged mode: Page allocation helper

2015-08-06 Thread Andrew Cooper
On 06/08/15 17:45, Ben Catterall wrote: > This allocation function is used by the deprivileged mode initialisation code > to allocate pages for the new page table mappings and page frames on the HAP > page heap. > > Signed-off-by: Ben Catterall This is fine for your test box, but isn't fine for s

[Xen-devel] [linux-3.4 test] 60584: regressions - FAIL

2015-08-06 Thread osstest service owner
flight 60584 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/60584/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-win7-amd64 6 xen-boot fail REGR. vs. 30511 Tests which are failing

[Xen-devel] [PATCH] xen: arm: Support <32MB frametables

2015-08-06 Thread Chris (Christopher) Brand
setup_frametable_mappings() rounds frametable_size up to a multiple of 32MB. This is wasteful on systems with less than 4GB of RAM, although it does allow the "contig" bit to be set in the PTEs. Where the frametable is less than 32MB in size, instead round up to a multiple of 2MB, not setting the

Re: [Xen-devel] Fw: drivers/xen/pci.c:31:25: fatal error: asm/pci_x86.h: No such file or directory

2015-08-06 Thread Boris Ostrovsky
On 08/06/2015 01:04 PM, Robert Richter wrote: Boris, we are working on acpi pci support for arm64. For this we are enabling PCI_MMCONFIG on arm64 which breaks compiling drivers/xen/pci.c. Looking into it there is x86 code in generic driver code introduced with: 8deb3eb1461e xen/mcfg: Call PH

Re: [Xen-devel] [PATCH V5 3/7] libxl: add pvusb API

2015-08-06 Thread George Dunlap
On 08/06/2015 04:11 AM, Chun Yan Liu wrote: > As 4.6 goes to bug fixing stage, maybe we can pick up this thread? :-) > > Beside to call for your precious review comments and suggestions so that we > can > make progress, I also want to confirm about the previous discussed two TODO > things: > 1) u

[Xen-devel] [PATCH OSSTEST v2 2/6] ts-kernel-build: Compile CONFIG_CRYPTO_XTS in

2015-08-06 Thread Anthony PERARD
OpenStack Tempest is using aes-xts-plain64 cipher with cryptsetup to test encrypted volumes and this is not configurable. Signed-off-by: Anthony PERARD --- ts-kernel-build | 3 +++ 1 file changed, 3 insertions(+) diff --git a/ts-kernel-build b/ts-kernel-build index d5defaa..a16527b 100755 --- a

[Xen-devel] [PATCH OSSTEST v2 4/6] ts-openstack-devstack: Deploy OpenStack on a host

2015-08-06 Thread Anthony PERARD
This script also install packages needed and clone every OpenStack trees to be use by devstack to deploy OpenStack. Signed-off-by: Anthony PERARD --- sg-run-job| 5 + ts-openstack-devstack | 304 ++ 2 files changed, 309 insertions(+)

[Xen-devel] [PATCH OSSTEST v2 0/6] Have OpenStack tested on top of xen's master and libvirt's master.

2015-08-06 Thread Anthony PERARD
Hi, I have looked into getting OpenStack been tested on the latest Xen via osstest. There is an adjustement in common code to accomodate OpenStack, this is a few extra Linux config option. The ts-openstack-devstack script does prepare a bit more the host, clone devstack and other OpenStack trees,

[Xen-devel] [PATCH OSSTEST v2 1/6] ts-kernel-build: Enable CONFIG_NETFILTER_XT_TARGET_CHECKSUM

2015-08-06 Thread Anthony PERARD
This iptables target CHECKSUM is used by OpenStack. Signed-off-by: Anthony PERARD Acked-by: Ian Campbell --- ts-kernel-build | 5 + 1 file changed, 5 insertions(+) diff --git a/ts-kernel-build b/ts-kernel-build index 28bead4..d5defaa 100755 --- a/ts-kernel-build +++ b/ts-kernel-build @@ -2

[Xen-devel] [PATCH OSSTEST v2 5/6] ts-openstack-tempest: Run Tempest to check OpenStack

2015-08-06 Thread Anthony PERARD
Signed-off-by: Anthony PERARD --- sg-run-job | 1 + ts-openstack-tempest | 35 +++ 2 files changed, 36 insertions(+) create mode 100755 ts-openstack-tempest diff --git a/sg-run-job b/sg-run-job index 5320d62..0b2184b 100755 --- a/sg-run-job +++ b/sg-ru

[Xen-devel] [PATCH OSSTEST v2 3/6] ts-xen-install: Add dom0_mem runvar to control dom0 memory

2015-08-06 Thread Anthony PERARD
Signed-off-by: Anthony PERARD --- ts-xen-install | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/ts-xen-install b/ts-xen-install index 0f53382..17edfb7 100755 --- a/ts-xen-install +++ b/ts-xen-install @@ -153,7 +153,8 @@ sub setupboot () { logm("No Xen console device

[Xen-devel] [PATCH OSSTEST v2 6/6] Create a flight to test OpenStack with xen-unstable and libvirt

2015-08-06 Thread Anthony PERARD
Signed-off-by: Anthony PERARD --- ap-common| 9 + ap-fetch-version | 4 ap-fetch-version-old | 5 + ap-print-url | 3 +++ cri-common | 1 + make-flight | 42 +- mfi-common | 5 +

[Xen-devel] [RFC 4/4] HVM x86 deprivileged mode: Trap handlers for deprivileged mode

2015-08-06 Thread Ben Catterall
Added trap handlers to catch exceptions such as a page fault, general protection fault, etc. These handlers will crash the domain as such exceptions would indicate that either there is a bug in deprivileged mode or it has been compromised by an attacker. Signed-off-by: Ben Catterall --- xen/arch

[Xen-devel] [RFC 0/4] HVM x86 enhancements to run Xen deprivileged mode operations

2015-08-06 Thread Ben Catterall
Hi all, I have a working base for this and would appreciate feedback at this point to evaluate if it is moving in the right direction. Many thanks in advance, Ben The aim of this work is to create a proof-of-concept to establish if it is feasible to move certain Xen operations into a deprivilege

[Xen-devel] [RFC 3/4] HVM x86 deprivileged mode: Code for switching into/out of deprivileged mode

2015-08-06 Thread Ben Catterall
The process to switch into and out of deprivileged mode can be likened to setjmp/longjmp. To enter deprivileged mode, we take a copy of the stack from the guest's registers up to the current stack pointer. This allows us to restore the stack when we have finished the deprivileged mode operation, m

[Xen-devel] [RFC 1/4] HVM x86 deprivileged mode: Page allocation helper

2015-08-06 Thread Ben Catterall
This allocation function is used by the deprivileged mode initialisation code to allocate pages for the new page table mappings and page frames on the HAP page heap. Signed-off-by: Ben Catterall --- xen/arch/x86/mm/hap/hap.c| 23 +++ xen/include/asm-x86/domain.h | 1 + x

[Xen-devel] [RFC 2/4] HVM x86 deprivileged mode: Create deprivileged page tables

2015-08-06 Thread Ben Catterall
The paging structure mappings for the deprivileged mode are added to the monitor page table for HVM guests. The entries are generated by walking the page tables and mapping in new pages. If a higher-level page table mapping exists, we attempt to traverse all the way down to a leaf page and add the

[Xen-devel] [PATCH v2] xen-apic: Enable on domU as well

2015-08-06 Thread Jason A. Donenfeld
It turns out that domU also requires the Xen APIC driver. Otherwise we get stuck in busy loops that never exit, such as in this stack trace: (gdb) target remote localhost: Remote debugging using localhost: __xapic_wait_icr_idle () at ./arch/x86/include/asm/ipi.h:56 56 while (n

[Xen-devel] [PATCH] xen-apic: Enable on domU as well

2015-08-06 Thread Jason A. Donenfeld
It turns out that domU also requires the Xen APIC driver. Otherwise we get stuck in busy loops that never exit, such as in this stack trace: (gdb) target remote localhost: Remote debugging using localhost: __xapic_wait_icr_idle () at ./arch/x86/include/asm/ipi.h:56 56 while (n

Re: [Xen-devel] [RFC 2/2] xen/arm: vgic-v3: Support 32-bit access for 64-bit registers

2015-08-06 Thread Vijay Kilari
On Tue, Aug 4, 2015 at 5:29 PM, Julien Grall wrote: > Based on 8.1.3 (IHI 0069A), unless stated otherwise, the 64-bit registers > supports both 32-bit and 64-bits access. > > All the registers we properly emulate (i.e not RAZ/WI) supports 32-bit access. > > For RAZ/WI, it's also seems to be the ca

[Xen-devel] [qemu-mainline test] 60583: regressions - FAIL

2015-08-06 Thread osstest service owner
flight 60583 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/60583/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 59059 Regressions which

Re: [Xen-devel] printk from softirq on xen: hard lockup

2015-08-06 Thread Jason A. Donenfeld
In that case, it doesn't compile. arch/x86/xen/apic.c:204:13: error: redefinition of ‘xen_init_apic’ void __init xen_init_apic(void) ^ In file included from arch/x86/xen/apic.c:9:0: arch/x86/xen/xen-ops.h:110:27: note: previous definition of ‘xen_init_apic’ was here static inline vo

Re: [Xen-devel] [PATCH for-4.6 4/5] oxenstored: fix systemd socket activation

2015-08-06 Thread Ian Campbell
On Thu, 2015-08-06 at 14:50 +0100, Ian Campbell wrote: > On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote: > > Use the correct API sd_listen_fds to determine whether the process is > > started by systemd. > > > > Change sd_booted to booted_by_systemd to avoid confusion with systemd's > > API. > >

Re: [Xen-devel] printk from softirq on xen: hard lockup

2015-08-06 Thread David Vrabel
On 06/08/15 16:58, Jason A. Donenfeld wrote: > On Thu, Aug 6, 2015 at 12:02 PM, David Vrabel wrote: >> Linux PV guests must use the "Xen PV" APIC driver. You need to >> investigate why your PV guest is not using this (although I'm surprised >> it works at all with the wrong one). > > Actually it

Re: [Xen-devel] [PATCH for-4.6 5/5] oxenstored: move sd_notify_ready out of main loop

2015-08-06 Thread Dave Scott
Although I’m not familiar with systemd, this also looks fine: Acked-by: David Scott > On 6 Aug 2015, at 14:38, Wei Liu wrote: > > Oxenstored only needs to notify systemd its readiness state once. Move > sd_notify_ready out of main loop. > > Signed-off-by: Wei Liu > --- > Cc: Dave Scott >

Re: [Xen-devel] printk from softirq on xen: hard lockup

2015-08-06 Thread Jason A. Donenfeld
On Thu, Aug 6, 2015 at 12:02 PM, David Vrabel wrote: > Linux PV guests must use the "Xen PV" APIC driver. You need to > investigate why your PV guest is not using this (although I'm surprised > it works at all with the wrong one). Actually it appears this PV Guest is using the "flat" APIC driver

Re: [Xen-devel] [PATCH for-4.6 4/5] oxenstored: fix systemd socket activation

2015-08-06 Thread Dave Scott
I’m not familiar with the systemd side of things, but the OCaml stub changes look ok: Acked-by: David Scott > On 6 Aug 2015, at 14:38, Wei Liu wrote: > > Use the correct API sd_listen_fds to determine whether the process is > started by systemd. > > Change sd_booted to booted_by_systemd to

Re: [Xen-devel] [PATCH for-4.6 2/5] cxenstored: document a bunch of short options in help string

2015-08-06 Thread Ian Campbell
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote: > Signed-off-by: Wei Liu Acked-by: Ian Campbell ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 13/20] xen/events: fifo: Make it running on 64KB granularity

2015-08-06 Thread Julien Grall
Hi David, On 24/07/15 11:36, David Vrabel wrote: > On 09/07/15 21:42, Julien Grall wrote: >> Only use the first 4KB of the page to store the events channel info. It >> means that we will wast 60KB every time we allocate page for: >> * control block: a page is allocating per CPU >> * even

[Xen-devel] [ovmf test] 60587: all pass - PUSHED

2015-08-06 Thread osstest service owner
flight 60587 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/60587/ Perfect :-) All tests in this flight passed version targeted for testing: ovmf 8ca1489ba63753f3dfd6552fd7a2c1f4f64e296a baseline version: ovmf 7669f7349829f0e472ba0d6e600492f

Re: [Xen-devel] [Patch V6 00/16] xen: support pv-domains larger than 512GB

2015-08-06 Thread Boris Ostrovsky
Queued for nightly. Note though that I don't have anything even close to 512GB in the test farm. -Original Message- From: David Vrabel [david.vra...@citrix.com] Received: Thursday, 06 Aug 2015, 9:59AM To: Juergen Gross [jgr...@suse.com]; linux-ker...@vger.kernel.org [linux-ker...@vger.

Re: [Xen-devel] [PATCH v2 4/8] xen: Use the correctly the Xen memory terminologies

2015-08-06 Thread Stefano Stabellini
On Thu, 6 Aug 2015, Julien Grall wrote: > On 06/08/15 12:06, Stefano Stabellini wrote: > > On Thu, 6 Aug 2015, Julien Grall wrote: > >> Hi, > >> > >> > >> On 04/08/15 19:12, Julien Grall wrote: > >>> diff --git a/include/xen/page.h b/include/xen/page.h > >>> index c5ed20b..e7e1425 100644 > >>> ---

[Xen-devel] [distros-debian-jessie test] 37793: tolerable FAIL

2015-08-06 Thread Platform Team regression test user
flight 37793 distros-debian-jessie real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/37793/ Failures :-/ but no regressions. Tests which did not succeed, including tests which could not be run: test-armhf-armhf-armhf-jessie-netboot-pygrub 9 debian-di-install fail never pass job

Re: [Xen-devel] [Patch V6 00/16] xen: support pv-domains larger than 512GB

2015-08-06 Thread David Vrabel
On 17/07/15 05:51, Juergen Gross wrote: > Support 64 bit pv-domains with more than 512GB of memory. Applied to for-linus-4.3, thanks. Boris, can we get a test run with this branch, please? David ___ Xen-devel mailing list Xen-devel@lists.xen.org http:

Re: [Xen-devel] [PATCH v7 2/8] cxenstored: add support for systemd active sockets

2015-08-06 Thread George Dunlap
On 08/05/2015 07:19 PM, Wei Liu wrote: > On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote: > [...] >>> >> >> Right. I misinterpreted sd_boot. >> >> You patch, however, has the undesirable effect that it fails to report >> error if xenstored is started by systemd but couldn't claim the >> soc

Re: [Xen-devel] [PATCH for-4.6 3/5] cxenstored: remove dead option

2015-08-06 Thread Wei Liu
On Thu, Aug 06, 2015 at 02:49:28PM +0100, Ian Campbell wrote: > On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote: > > Signed-off-by: Wei Liu > > --- > > For 4.6: remove dead code, risk free. > > I'm pretty sure this isn't actually dead: > > The 'm' option is handled by option parsing, setting th

Re: [Xen-devel] [PATCH for-4.6 4/5] oxenstored: fix systemd socket activation

2015-08-06 Thread Ian Campbell
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote: > Use the correct API sd_listen_fds to determine whether the process is > started by systemd. > > Change sd_booted to booted_by_systemd to avoid confusion with systemd's > API. launched_by_systemd seems like a more conventional name for this.One d

Re: [Xen-devel] [PATCH for-4.6 3/5] cxenstored: remove dead option

2015-08-06 Thread Ian Campbell
On Thu, 2015-08-06 at 14:38 +0100, Wei Liu wrote: > Signed-off-by: Wei Liu > --- > For 4.6: remove dead code, risk free. I'm pretty sure this isn't actually dead: The 'm' option is handled by option parsing, setting the dom0_domid global. xenbus_master_domid() returns dom0_domid and that is cal

[Xen-devel] [PATCH for-4.6 3/5] cxenstored: remove dead option

2015-08-06 Thread Wei Liu
Signed-off-by: Wei Liu --- For 4.6: remove dead code, risk free. --- tools/xenstore/xenstored_core.c | 1 - 1 file changed, 1 deletion(-) diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c index 72f531b..100f59e 100644 --- a/tools/xenstore/xenstored_core.c +++ b/tools

[Xen-devel] [PATCH for-4.6 5/5] oxenstored: move sd_notify_ready out of main loop

2015-08-06 Thread Wei Liu
Oxenstored only needs to notify systemd its readiness state once. Move sd_notify_ready out of main loop. Signed-off-by: Wei Liu --- Cc: Dave Scott For 4.6: avoid wasting CPU cycles, easy to reason its correctness. There is a small risk that either I wrote the wrong code or I misunderstand the

[Xen-devel] [PATCH for-4.6 4/5] oxenstored: fix systemd socket activation

2015-08-06 Thread Wei Liu
Use the correct API sd_listen_fds to determine whether the process is started by systemd. Change sd_booted to booted_by_systemd to avoid confusion with systemd's API. Signed-off-by: Wei Liu --- Cc: Dave Scott For 4.6: without this oxenstored is broken when running on a system with systemd but

[Xen-devel] [PATCH for-4.6 0/5] Patches for c/oxenstored

2015-08-06 Thread Wei Liu
Wei Liu (5): cxenstored: fix systemd socket activation cxenstored: document a bunch of short options in help string cxenstored: remove dead option oxenstored: fix systemd socket activation oxenstored: move sd_notify_ready out of main loop tools/ocaml/xenstored/systemd.ml | 2 +- t

[Xen-devel] [PATCH for-4.6 1/5] cxenstored: fix systemd socket activation

2015-08-06 Thread Wei Liu
There were two problems with original code: 1. sd_booted() was used to determined if the process was started by systemd, which was wrong. 2. Exit with error if pidfile was specified, which was too harsh. These two combined made cxenstored unable to start by hand if it ran on a system which had

[Xen-devel] [PATCH for-4.6 2/5] cxenstored: document a bunch of short options in help string

2015-08-06 Thread Wei Liu
Signed-off-by: Wei Liu --- For 4.6: pure doc changes, risk free. --- tools/xenstore/xenstored_core.c | 30 +++--- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/tools/xenstore/xenstored_core.c b/tools/xenstore/xenstored_core.c index 57581e0..72f531b 100644

Re: [Xen-devel] [PATCH v1] xenpt: Properly handle 64-bit bar with more than 4G size

2015-08-06 Thread Wu, Feng
> -Original Message- > From: Stefano Stabellini [mailto:stefano.stabell...@eu.citrix.com] > Sent: Thursday, August 06, 2015 6:43 PM > To: Wu, Feng > Cc: stefano.stabell...@eu.citrix.com; xen-de...@lists.xensource.com; > qemu-de...@nongnu.org > Subject: Re: [PATCH v1] xenpt: Properly handl

Re: [Xen-devel] [Patch V6 12/16] mm: provide early_memremap_ro to establish read-only mapping

2015-08-06 Thread Vlastimil Babka
On 08/06/2015 03:02 PM, Juergen Gross wrote: On 08/06/2015 02:46 PM, Vlastimil Babka wrote: On 07/17/2015 06:51 AM, Juergen Gross wrote: ... and here for !CONFIG_MMU. So, what about CONFIG_MMU && !FIXMAP_PAGE_RO combinations? Which translates to CONFIG_MMU && !PAGE_KERNEL_RO. Maybe they don't

Re: [Xen-devel] [Patch V6 12/16] mm: provide early_memremap_ro to establish read-only mapping

2015-08-06 Thread Juergen Gross
On 08/06/2015 02:46 PM, Vlastimil Babka wrote: On 07/17/2015 06:51 AM, Juergen Gross wrote: During early boot as Xen pv domain the kernel needs to map some page tables supplied by the hypervisor read only. This is needed to be able to relocate some data structures conflicting with the physical m

Re: [Xen-devel] [PATCH for-4.6] libxl: use correct command line for arm guests.

2015-08-06 Thread Ian Campbell
On Thu, 2015-08-06 at 12:10 +0100, Wei Liu wrote: > On Thu, Aug 06, 2015 at 11:55:57AM +0100, Ian Campbell wrote: > > We need to use libxl__domain_build_state.pv_cmdline in order to pickup > > the correct args when using pygrub. libxl_domain_build_info.cmdline is > > any args statically configured

Re: [Xen-devel] [Patch V6 12/16] mm: provide early_memremap_ro to establish read-only mapping

2015-08-06 Thread Vlastimil Babka
On 07/17/2015 06:51 AM, Juergen Gross wrote: During early boot as Xen pv domain the kernel needs to map some page tables supplied by the hypervisor read only. This is needed to be able to relocate some data structures conflicting with the physical memory map especially on systems with huge RAM (a

[Xen-devel] [PATCH OSSTEST 1/7] ts-logs-capture: Collect /var/log/xen/bootloader.*.log

2015-08-06 Thread Ian Campbell
This is the pygrub debug log. Signed-off-by: Ian Campbell --- ts-logs-capture | 1 + 1 file changed, 1 insertion(+) diff --git a/ts-logs-capture b/ts-logs-capture index 0081372..b99b1db 100755 --- a/ts-logs-capture +++ b/ts-logs-capture @@ -143,6 +143,7 @@ sub fetch_logs_host () {

[Xen-devel] [PATCH OSSTEST 0/7] Fixes for distros-debian-* flights on armhf

2015-08-06 Thread Ian Campbell
The armhf tests in distros-debian-* have always failed since they did not shutdown at the end of installation. I've now investigated that and the fix is patch #2 in this series. The remainder of the series consists of various fixes, extensions to existing quirks and workarounds, mainly to the use

[Xen-devel] [PATCH OSSTEST 2/7] ts-debian-di-install: Use exit/poweroff in preference to exit/always_halt

2015-08-06 Thread Ian Campbell
always_halt results in d-i calling "halt", which does not necessarily poweroff the host (it seems to for x86/PV Xen guests, but does not for ARM). Using exit/poweroff calls "poweroff" which is equivalent to "halt -p", doing so results in ARM guests powering off as desired. Signed-off-by: Ian Campb

[Xen-devel] [PATCH OSSTEST 3/7] ts-debian-di-install: Install pv-menu-list in ARM guests, always.

2015-08-06 Thread Ian Campbell
Signed-off-by: Ian Campbell --- ts-debian-di-install | 11 ++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/ts-debian-di-install b/ts-debian-di-install index 612e0fa..0e778e3 100755 --- a/ts-debian-di-install +++ b/ts-debian-di-install @@ -190,9 +190,18 @@ END $

[Xen-devel] [PATCH OSSTEST 6/7] Debian: ARM has no bootloader (for Xen) even in Stretch.

2015-08-06 Thread Ian Campbell
Realistically this isn't going to change until we have either u-boot or UEFI in an arm32 guest. Signed-off-by: Ian Campbell --- Osstest/Debian.pm | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm index ff7975e..7a0ead4 100644 --- a/Osstest/

[Xen-devel] [PATCH OSSTEST 7/7] Debian: Create /boot/boot -> . symlink on ARM when PvMenuLst enabled

2015-08-06 Thread Ian Campbell
Signed-off-by: Ian Campbell --- Osstest/Debian.pm | 8 1 file changed, 8 insertions(+) diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm index 7a0ead4..07a71e2 100644 --- a/Osstest/Debian.pm +++ b/Osstest/Debian.pm @@ -923,7 +923,15 @@ END # that as a "bootloader". $pre

[Xen-devel] [PATCH OSSTEST 4/7] ts-debian-di-install: Use the suite in the default hostname

2015-08-06 Thread Ian Campbell
This is more useful in standalone mode than having everything be "debian". Signed-off-by: Ian Campbell --- ts-debian-di-install | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ts-debian-di-install b/ts-debian-di-install index 0e778e3..95a9215 100755 --- a/ts-debian-di-install

[Xen-devel] [PATCH OSSTEST 5/7] Debian: ARM: only apply no bootloader workaround if xopts{PvMenuLst}

2015-08-06 Thread Ian Campbell
This workaround is only necessary because of how pv-menu-list works, so we should only apply both or neither of them. This results in a long line and I'm about to add a second workaround to this block, so switch to a regular if block instead of postfixing on the one command. Move the comment insid

Re: [Xen-devel] [xen 4.6 retrospective] [urgent] rename "freeze" window and make release branch as soon as possible after RC1

2015-08-06 Thread Wei Liu
On Wed, Aug 05, 2015 at 10:22:13AM +0100, Lars Kurth wrote: > This is one item of feedback, which I believe is a quick win for us. > This is one piece of feedback from a list of items that have during > the last few weeks been raised with me personally, either during > face-2-face conversations in

Re: [Xen-devel] [PATCH v2 4/8] xen: Use the correctly the Xen memory terminologies

2015-08-06 Thread Julien Grall
On 06/08/15 12:06, Stefano Stabellini wrote: > On Thu, 6 Aug 2015, Julien Grall wrote: >> Hi, >> >> >> On 04/08/15 19:12, Julien Grall wrote: >>> diff --git a/include/xen/page.h b/include/xen/page.h >>> index c5ed20b..e7e1425 100644 >>> --- a/include/xen/page.h >>> +++ b/include/xen/page.h >>> @@ -

Re: [Xen-devel] [PATCH for-4.6] libxl: use correct command line for arm guests.

2015-08-06 Thread Wei Liu
On Thu, Aug 06, 2015 at 11:55:57AM +0100, Ian Campbell wrote: > We need to use libxl__domain_build_state.pv_cmdline in order to pickup > the correct args when using pygrub. libxl_domain_build_info.cmdline is > any args statically configured by the user. > > This is consistent with the call to xc_d

[Xen-devel] [qemu-upstream-4.5-testing test] 60577: tolerable FAIL - PUSHED

2015-08-06 Thread osstest service owner
flight 60577 qemu-upstream-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/60577/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt 15 guest-start/debian.repeat fail REGR. vs. 60214 test-armhf-armhf

Re: [Xen-devel] [PATCH v2 4/8] xen: Use the correctly the Xen memory terminologies

2015-08-06 Thread Stefano Stabellini
On Thu, 6 Aug 2015, Julien Grall wrote: > Hi, > > > On 04/08/15 19:12, Julien Grall wrote: > > diff --git a/include/xen/page.h b/include/xen/page.h > > index c5ed20b..e7e1425 100644 > > --- a/include/xen/page.h > > +++ b/include/xen/page.h > > @@ -3,9 +3,9 @@ > > > > #include > > > > -stati

Re: [Xen-devel] [PATCH v7 2/8] cxenstored: add support for systemd active sockets

2015-08-06 Thread Ian Campbell
On Thu, 2015-08-06 at 11:56 +0100, Wei Liu wrote: > On Thu, Aug 06, 2015 at 11:48:15AM +0100, Ian Campbell wrote: > > On Thu, 2015-08-06 at 11:17 +0100, Wei Liu wrote: > > > > > > I don't think so. Though the doc is not clear on how we should use > > > those > > > APIs, I got my idea from > > >

Re: [Xen-devel] [PATCH v2 4/8] xen: Use the correctly the Xen memory terminologies

2015-08-06 Thread Julien Grall
Hi, On 04/08/15 19:12, Julien Grall wrote: > diff --git a/include/xen/page.h b/include/xen/page.h > index c5ed20b..e7e1425 100644 > --- a/include/xen/page.h > +++ b/include/xen/page.h > @@ -3,9 +3,9 @@ > > #include > > -static inline unsigned long page_to_mfn(struct page *page) > +static in

Re: [Xen-devel] [PATCH v7 2/8] cxenstored: add support for systemd active sockets

2015-08-06 Thread Wei Liu
On Thu, Aug 06, 2015 at 11:48:15AM +0100, Ian Campbell wrote: > On Thu, 2015-08-06 at 11:17 +0100, Wei Liu wrote: > > > > I don't think so. Though the doc is not clear on how we should use those > > APIs, I got my idea from > > > > http://0pointer.de/public/cups-patch-core.txt > > > > which doe

[Xen-devel] [PATCH for-4.6] libxl: use correct command line for arm guests.

2015-08-06 Thread Ian Campbell
We need to use libxl__domain_build_state.pv_cmdline in order to pickup the correct args when using pygrub. libxl_domain_build_info.cmdline is any args statically configured by the user. This is consistent with the call to xc_domain_allocate, which takes the cmdline too (in that case for x86/PV usa

Re: [Xen-devel] [xen 4.6 retrospective] [urgent] rename "freeze" window and make release branch as soon as possible after RC1

2015-08-06 Thread Stefano Stabellini
On Wed, 5 Aug 2015, Lars Kurth wrote: > This is one item of feedback, which I believe is a quick win for us. This is > one piece of feedback from a list of > items that have during the last few weeks been raised with me personally, > either during face-2-face conversations > in a private e-mail t

Re: [Xen-devel] [PATCH v7 2/8] cxenstored: add support for systemd active sockets

2015-08-06 Thread Ian Campbell
On Thu, 2015-08-06 at 11:17 +0100, Wei Liu wrote: > > I don't think so. Though the doc is not clear on how we should use those > APIs, I got my idea from > > http://0pointer.de/public/cups-patch-core.txt > > which doesn't call sd_booted. OK, FM then: Acked-by: Ian Campbell As a future cleanu

Re: [Xen-devel] [PATCH v1] xenpt: Properly handle 64-bit bar with more than 4G size

2015-08-06 Thread Stefano Stabellini
On Wed, 5 Aug 2015, Feng Wu wrote: > This patch corrects a logic error when handling 64-bt bar with > more than 4G size. > > With 64-bit Bar, it has two items in PCIDevice: io_regions[x] > and io_regions[x+1], io_regions[x] has all the informations for > this BAR, while io_regions[x+1] contains no

Re: [Xen-devel] OSSTEST -- nested test case development, RFC: ts-guest-destroy doesn't call guest_await_dhcp_tcp() if guest has fixed IP

2015-08-06 Thread Hu, Robert
> -Original Message- > From: Ian Campbell [mailto:ian.campb...@citrix.com] > Sent: Thursday, August 6, 2015 5:01 PM > To: Hu, Robert; ian.jack...@eu.citrix.com; wei.l...@citrix.com > Cc: xen-devel@lists.xen.org > Subject: Re: OSSTEST -- nested test case development, RFC: ts-guest-destroy >

Re: [Xen-devel] [PATCH v7 2/8] cxenstored: add support for systemd active sockets

2015-08-06 Thread Wei Liu
Sorry I missed some inline comments. On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote: > > ---8<--- > > From a03eba6e258d8097b974366abb50b39af9e9abbf Mon Sep 17 00:00:00 2001 > > From: Wei Liu > > Date: Wed, 5 Aug 2015 19:02:34 +0100 > > Subject: [PATCH] cxenstored: fix systemd socket

Re: [Xen-devel] [PATCH v5 15/22] xen/arm: ITS: implement hw_irq_controller for LPIs

2015-08-06 Thread Julien Grall
On 06/08/15 11:05, Julien Grall wrote: >> But Ian suggested to export gicv3_host_irq_end instead of calling >> gicv3_eoi_irq() > > And Ian said "Exposing those two gicv3 functions is a bit unfortunate, > but I think it will do for now.". > > Which means he was opposed to the previous solution. *

Re: [Xen-devel] [PATCH v5 15/22] xen/arm: ITS: implement hw_irq_controller for LPIs

2015-08-06 Thread Julien Grall
On 06/08/15 09:15, Vijay Kilari wrote: > On Tue, Aug 4, 2015 at 7:15 PM, Julien Grall wrote: >> Hi Vijay, >> >> On 27/07/15 12:11, vijay.kil...@gmail.com wrote: >>> + >>> +static const hw_irq_controller its_host_lpi_type = { >>> +.typename = "gic-its", >>> +.startup = its_irq_star

Re: [Xen-devel] printk from softirq on xen: hard lockup

2015-08-06 Thread David Vrabel
On 05/08/15 00:01, Jason A. Donenfeld wrote: > Hey David, > > Sorry for the premature response on my phone earlier. Real reply follows. >>> rcu_read_lock, when using Xen PV. Relevant excerpts of the >> ^^ PV guest? > > Yes. The lockup occurs on a PV guest. Nothing

[Xen-devel] [linux-3.18 test] 60575: regressions - FAIL

2015-08-06 Thread osstest service owner
flight 60575 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/60575/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581 Tests which are failin

Re: [Xen-devel] how can I find hypercall page address?

2015-08-06 Thread Andrew Cooper
On 06/08/15 10:46, big strong wrote: > The old version of Xen contains information about hypercall page like: > > xl dmesg > .. > (XEN) HVM10: Allocated Xen hypercall page at 169ff000 > ... > > But the new edition seems to miss this information. Correct. The information is not interesting

[Xen-devel] how can I find hypercall page address?

2015-08-06 Thread big strong
The old version of Xen contains information about hypercall page like: xl dmesg .. (XEN) HVM10: Allocated Xen hypercall page at 169ff000 ... But the new edition seems to miss this information. How can I get the similar information then? ___ Xen-

Re: [Xen-devel] [PATCH v7 2/8] cxenstored: add support for systemd active sockets

2015-08-06 Thread Wei Liu
On Thu, Aug 06, 2015 at 10:29:59AM +0100, Ian Campbell wrote: > On Thu, 2015-08-06 at 10:20 +0100, Wei Liu wrote: > > On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote: > > > On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote: > > > > On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote

Re: [Xen-devel] [PATCH v7 2/8] cxenstored: add support for systemd active sockets

2015-08-06 Thread Ian Campbell
On Thu, 2015-08-06 at 10:20 +0100, Wei Liu wrote: > On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote: > > On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote: > > > On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote: > > > [...] > > > > > > > > > > > > > Right. I misinterpreted sd_b

Re: [Xen-devel] [PATCH for-4.6 v2] x86/mm: Make {hap, shadow}_teardown() preemptible

2015-08-06 Thread Ian Campbell
On Wed, 2015-08-05 at 18:00 +0100, George Dunlap wrote: > On Wed, Aug 5, 2015 at 4:47 PM, Andrew Cooper > wrote: > > From: Anshul Makkar > > > > A domain with sufficient shadow allocation can cause a watchdog timeout > > during domain destruction. Expand the existing -ERESTART logic in > > pag

Re: [Xen-devel] [PATCH v4] VT-d: add iommu=igfx option to workaround graphics issues

2015-08-06 Thread Ian Campbell
On Thu, 2015-08-06 at 09:25 +0100, Wei Liu wrote: > On Thu, Aug 06, 2015 at 12:49:51AM +, Tian, Kevin wrote: > > > From: Ting-Wei Lan [mailto:lant...@gmail.com] > > > Sent: Thursday, August 06, 2015 1:10 AM > > > > > > When using Linux >= 3.19 (commit 47591df) as dom0 on some Intel > > > Iron

Re: [Xen-devel] [PATCH v7 2/8] cxenstored: add support for systemd active sockets

2015-08-06 Thread Wei Liu
On Thu, Aug 06, 2015 at 10:13:16AM +0100, Ian Campbell wrote: > On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote: > > On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote: > > [...] > > > > > > > > > > Right. I misinterpreted sd_boot. > > > > > > You patch, however, has the undesirable effect

Re: [Xen-devel] [PATCH v7 2/8] cxenstored: add support for systemd active sockets

2015-08-06 Thread Ian Campbell
On Wed, 2015-08-05 at 19:19 +0100, Wei Liu wrote: > On Wed, Aug 05, 2015 at 06:24:37PM +0100, Wei Liu wrote: > [...] > > > > > > > Right. I misinterpreted sd_boot. > > > > You patch, however, has the undesirable effect that it fails to report > > error if xenstored is started by systemd but coul

  1   2   >