Re: [Xen-devel] sleep function in Xen

2015-08-21 Thread xinyue
So sorry for that. On 2015年08月21日 18:09, Jan Beulich wrote: On 21.08.15 at 09:07, wrote: First of all - please don't cross post; removing xen-users. I want to read memory in Xen interval will the guest OS run normally. I didn't find sleep function in xen source and the delay function wi

Re: [Xen-devel] [PATCH v5 21/22] xen/arm: ITS: Generate ITS node for Dom0

2015-08-21 Thread Julien Grall
On 21/08/2015 16:02, Vijay Kilari wrote: On Mon, Aug 17, 2015 at 12:41 PM, Julien Grall wrote: On 27/07/2015 04:12, vijay.kil...@gmail.com wrote: From: Vijaya Kumar K Parse host dt and generate ITS node for Dom0. ITS node resides inside GIC node so when GIC node is encountered look for

Re: [Xen-devel] [PATCH 2/2 v2] xen: arm: Set all bits in mfn_to_xen_entry()

2015-08-21 Thread Julien Grall
On 21/08/2015 12:47, Chris (Christopher) Brand wrote: Hi Andrew, On 21/08/15 00:33, Chris Brand wrote: Ensure that every bit has a specific value. Reported-by: Julien Grall Signed-off-by: Chris Brand --- v2 adds comments on pxn and avail. This is no functional change, if the compiler is

Re: [Xen-devel] [PATCH v5 21/22] xen/arm: ITS: Generate ITS node for Dom0

2015-08-21 Thread Vijay Kilari
On Mon, Aug 17, 2015 at 12:41 PM, Julien Grall wrote: > > > On 27/07/2015 04:12, vijay.kil...@gmail.com wrote: >> >> From: Vijaya Kumar K >> >> Parse host dt and generate ITS node for Dom0. >> ITS node resides inside GIC node so when GIC node >> is encountered look for ITS node. >> >> Signed-off-

Re: [Xen-devel] qemu-xen-4.6.0-rc1 fails to compile under Fedora Core 22

2015-08-21 Thread Stefano Stabellini
On Fri, 21 Aug 2015, Konrad Rzeszutek Wilk wrote: > Hey Stefano, > > I get this when I try to compile the tree: > >CC > hw/usb/host-stub.o > CChw/virtio/v

[Xen-devel] [PATCH v3] xen: arm: Support <32MB frametables

2015-08-21 Thread Chris Brand
setup_frametable_mappings() rounds frametable_size up to a multiple of 32MB. This is wasteful on systems with less than 4GB of RAM, although it does allow the "contig" bit to be set in the PTEs. Where the frametable is less than 32MB in size, instead round up to a multiple of 2MB, not setting the

Re: [Xen-devel] [PATCH v5 26/28] libxc/xen: introduce a start info structure for HVMlite guests

2015-08-21 Thread Andrew Cooper
On 21/08/15 17:53, Roger Pau Monne wrote: > This structure contains the physical address of the command line, as well as > the physical address of the list of loaded modules. The physical address of > this structure is passed to the guest at boot time in the %ebx register. > > Signed-off-by: Roger

Re: [Xen-devel] [PATCH v5 24/28] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs

2015-08-21 Thread Andrew Cooper
On 21/08/15 17:53, Roger Pau Monne wrote: > Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and > VCPUOP_is_up hypercalls from HVM guests. > > This patch introduces a new structure (vcpu_hvm_context) that should be used > in conjuction with the VCPUOP_initialise hypercall in order

Re: [Xen-devel] [PATCH 2/2 v2] xen: arm: Set all bits in mfn_to_xen_entry()

2015-08-21 Thread Chris (Christopher) Brand
Hi Andrew, > On 21/08/15 00:33, Chris Brand wrote: > > Ensure that every bit has a specific value. > > > > Reported-by: Julien Grall > > Signed-off-by: Chris Brand > > --- > > v2 adds comments on pxn and avail. > > This is no functional change, if the compiler is conforming to the C spec. > >

[Xen-devel] qemu-xen-4.6.0-rc1 fails to compile under Fedora Core 22

2015-08-21 Thread Konrad Rzeszutek Wilk
Hey Stefano, I get this when I try to compile the tree: CChw/usb/host-stub.o CChw/virtio/virtio-rng.o hw/virtio/virtio-rng.c: In function ‘virtio_rng_devi

Re: [Xen-devel] [PATCH for 4.7] xen: Replace alloc_vcpu_guest_context() with vmalloc()

2015-08-21 Thread Andrew Cooper
On 21/08/15 18:55, Konrad Rzeszutek Wilk wrote: > On Fri, Aug 21, 2015 at 06:51:46PM +0100, Andrew Cooper wrote: >> This essentially reverts c/s 2037f2adb "x86: introduce >> alloc_vcpu_guest_context()", including the newer arm bits, but achieves >> the same end goal by using the newer vmalloc() inf

Re: [Xen-devel] [PATCH for 4.7] xen: Replace alloc_vcpu_guest_context() with vmalloc()

2015-08-21 Thread Konrad Rzeszutek Wilk
On Fri, Aug 21, 2015 at 06:51:46PM +0100, Andrew Cooper wrote: > This essentially reverts c/s 2037f2adb "x86: introduce > alloc_vcpu_guest_context()", including the newer arm bits, but achieves > the same end goal by using the newer vmalloc() infrastructure. Could you explain what this fixes? Or p

[Xen-devel] [PATCH for 4.7] xen: Replace alloc_vcpu_guest_context() with vmalloc()

2015-08-21 Thread Andrew Cooper
This essentially reverts c/s 2037f2adb "x86: introduce alloc_vcpu_guest_context()", including the newer arm bits, but achieves the same end goal by using the newer vmalloc() infrastructure. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Tim Deegan CC: Ian Campbell CC: Stefano Stabellini

[Xen-devel] Build failres with Xen 4.6.0-rc1 (firmware/etherboot/ipxe)

2015-08-21 Thread Konrad Rzeszutek Wilk
Hey, I am running Fedora Core 22 which has a recent GCC: gcc (GCC) 5.1.1 20150618 (Red Hat 5.1.1-4) and I end up with bunch of compilation errors in ipxe: LD] bin/ath9k_ar9003_phy.o drivers/net/ath/ath9k/ath9k_ar9003_phy.c: In function ‘ar9003_hw_ani_control’: drivers/net/ath/ath9k/ath9k_ar9003_

Re: [Xen-devel] [PATCH v5 23/28] libxc: allow creating domains without emulated devices.

2015-08-21 Thread Andrew Cooper
On 21/08/15 17:53, Roger Pau Monne wrote: > Introduce a new flag in xc_dom_image that turns on and off the emulated > devices. This prevents creating the VGA hole, the hvm_info page and the > ioreq server pages. libxl unconditionally sets it to true for all HVM > domains at the moment. > > Signed-o

[Xen-devel] [linux-4.1 test] 60785: tolerable FAIL - PUSHED

2015-08-21 Thread osstest service owner
flight 60785 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/60785/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 19 guest-start/debianhvm.repeat fail in 60746 pass in 60785 test-amd64

Re: [Xen-devel] [PATCH v5 21/28] xen/x86: allow disabling all emulated devices inside of Xen

2015-08-21 Thread Andrew Cooper
On 21/08/15 17:53, Roger Pau Monne wrote: > Only allow enabling or disabling all the emulated devices inside of Xen, > right now Xen doesn't support enabling specific emulated devices only. > > Signed-off-by: Roger Pau Monné > Cc: Jan Beulich > Cc: Andrew Cooper Reviewed-by: Andrew Cooper ___

[Xen-devel] [PATCH v5 10/28] libxc: remove dead HVM building code

2015-08-21 Thread Roger Pau Monne
Remove xc_hvm_build_x86.c and xc_hvm_build_arm.c since xc_hvm_build is not longer used in order to create HVM guests. Signed-off-by: Roger Pau Monné Acked-by: Wei Liu Reviewed-by: Andrew Cooper Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Changes since v4: - Add

[Xen-devel] [PATCH v5 26/28] libxc/xen: introduce a start info structure for HVMlite guests

2015-08-21 Thread Roger Pau Monne
This structure contains the physical address of the command line, as well as the physical address of the list of loaded modules. The physical address of this structure is passed to the guest at boot time in the %ebx register. Signed-off-by: Roger Pau Monné Cc: Ian Jackson Cc: Stefano Stabellini

[Xen-devel] [PATCH v5 22/28] elfnotes: intorduce a new PHYS_ENTRY elfnote

2015-08-21 Thread Roger Pau Monne
This new elfnote contains the 32bit entry point into the kernel. Xen will use this entry point in order to launch the guest kernel in 32bit protected mode with paging disabled. Signed-off-by: Roger Pau Monné Acked-by: Wei Liu Reviewed-by: Andrew Cooper Cc: Ian Jackson Cc: Stefano Stabellini C

[Xen-devel] [PATCH v5 24/28] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs

2015-08-21 Thread Roger Pau Monne
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and VCPUOP_is_up hypercalls from HVM guests. This patch introduces a new structure (vcpu_hvm_context) that should be used in conjuction with the VCPUOP_initialise hypercall in order to initialize vCPUs for HVM guests. Signed-off-by:

[Xen-devel] [PATCH v5 19/28] xen/x86: allow disabling the emulated VGA

2015-08-21 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v4: - Add Andrew Cooper Acked-by. --- xen/arch/x86/hvm/stdvga.c | 6 ++ 1 file changed, 6 insertions(+) diff --git a/xen/arch/x86/hvm/stdvga.c b/xen/arch/x86/hvm/stdvga.c index f50b

[Xen-devel] [PATCH v5 20/28] xen/x86: allow disabling the emulated IOMMU

2015-08-21 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Suravee Suthikulpanit Cc: Aravind Gopalakrishnan --- Changes since v4: - Add Andrew Cooper Acked-by. --- xen/drivers/passthrough/amd/iommu_guest.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/xen/drivers/passt

[Xen-devel] [PATCH v5 14/28] xen/x86: allow disabling the pmtimer

2015-08-21 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v4: - Add Andrew Cooper Acked-by. --- xen/arch/x86/hvm/pmtimer.c | 13 + 1 file changed, 13 insertions(+) diff --git a/xen/arch/x86/hvm/pmtimer.c b/xen/arch/x86/hvm/pmtimer.

[Xen-devel] [PATCH v5 16/28] xen/x86: allow disabling the emulated IO APIC

2015-08-21 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v4: - Add Andrew Cooper Acked-by. --- xen/arch/x86/hvm/vioapic.c | 14 ++ 1 file changed, 14 insertions(+) diff --git a/xen/arch/x86/hvm/vioapic.c b/xen/arch/x86/hvm/vioapic

[Xen-devel] [PATCH v5 11/28] xen/x86: add bitmap of enabled emulated devices

2015-08-21 Thread Roger Pau Monne
Introduce a bitmap in x86 xen_arch_domainconfig that allows enabling or disabling specific devices emulated inside of Xen for HVM guests. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Jan Beulich Cc: Andrew

[Xen-devel] [PATCH v5 12/28] xen/x86: allow disabling the emulated local apic

2015-08-21 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Boris Ostrovsky Cc: Suravee Suthikulpanit Cc: Aravind Gopalakrishnan Cc: Jan Beulich Cc: Andrew Cooper Cc: Jun Nakajima Cc: Eddie Dong Cc: Kevin Tian --- Changes since v4: - Split the is_pvh_domain check into two, so part of the

[Xen-devel] [PATCH v5 13/28] xen/x86: allow disabling the emulated HPET

2015-08-21 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes in v4: - Add Andrew Cooper Acked-by. --- xen/arch/x86/hvm/hpet.c | 13 + xen/arch/x86/hvm/hvm.c | 1 - 2 files changed, 13 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86

[Xen-devel] [PATCH v5 27/28] libxc: switch xc_dom_elfloader to be used with HVMlite domains

2015-08-21 Thread Roger Pau Monne
Allow xc_dom_elfloader to report a guest type as hvm-3.0-x86_32 if it's running inside of a HVM container and has the PHYS32_ENTRY elfnote set. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Only xc_dom_elfloa

[Xen-devel] [PATCH v5 28/28] libxl: allow the creation of HVM domains without a device model.

2015-08-21 Thread Roger Pau Monne
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM builder now uses the PV xc_dom_* set of functions this kernel will be parsed and loaded inside the guest like on PV, but the container is a pure HVM guest. Also, if device_model_version is set to none or a device model fo

[Xen-devel] [PATCH v5 25/28] xenconsole: try to attach to PV console if HVM fails

2015-08-21 Thread Roger Pau Monne
HVM guests have always used the emulated serial console by default, but if the emulated serial pty cannot be fetched from xenstore try to use the PV console instead. Signed-off-by: Roger Pau Monné Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Chang

[Xen-devel] [PATCH v5 15/28] xen/x86: allow disabling the emulated RTC

2015-08-21 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v4: - Add Andrew Cooper Acked-by. --- xen/arch/x86/hvm/rtc.c | 16 1 file changed, 16 insertions(+) diff --git a/xen/arch/x86/hvm/rtc.c b/xen/arch/x86/hvm/rtc.c index a

[Xen-devel] [PATCH v5 18/28] xen/x86: allow disabling the emulated pmu

2015-08-21 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v4: - Add Andrew Cooper Acked-by. --- xen/arch/x86/cpu/vpmu.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c index 8af3df1..d5bb

[Xen-devel] [PATCH v5 21/28] xen/x86: allow disabling all emulated devices inside of Xen

2015-08-21 Thread Roger Pau Monne
Only allow enabling or disabling all the emulated devices inside of Xen, right now Xen doesn't support enabling specific emulated devices only. Signed-off-by: Roger Pau Monné Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/domain.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) di

[Xen-devel] [PATCH v5 23/28] libxc: allow creating domains without emulated devices.

2015-08-21 Thread Roger Pau Monne
Introduce a new flag in xc_dom_image that turns on and off the emulated devices. This prevents creating the VGA hole, the hvm_info page and the ioreq server pages. libxl unconditionally sets it to true for all HVM domains at the moment. Signed-off-by: Roger Pau Monné Acked-by: Wei Liu Cc: Ian Ja

[Xen-devel] [PATCH v5 17/28] xen/x86: allow disabling the emulated PIC

2015-08-21 Thread Roger Pau Monne
Signed-off-by: Roger Pau Monné Acked-by: Andrew Cooper Cc: Jan Beulich Cc: Andrew Cooper --- Changes since v4: - Add Andrew Cooper Acked-by. --- xen/arch/x86/hvm/vpic.c | 11 ++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/hvm/vpic.c b/xen/arch/x86/hvm/v

[Xen-devel] PAGE_SIZE (64KB), while block driver 'struct request' deals with < PAGE_SIZE (up to 44Kb). Was:Re: [RFC] Support of non-indirect grant backend on 64KB guest

2015-08-21 Thread Konrad Rzeszutek Wilk
On Fri, Aug 21, 2015 at 05:08:35PM +0100, David Vrabel wrote: > On 21/08/15 17:05, Konrad Rzeszutek Wilk wrote: > > > > I have to concur with that. We can't mandate that ARM 64k page MUST use > > indirect descriptors. > > Then it has to be fixed in the block layer to allow < PAGE_SIZE segments >

[Xen-devel] [PATCH v5 05/28] libxc: make arch_setup_meminit a xc_dom_arch hook

2015-08-21 Thread Roger Pau Monne
This allows having different arch_setup_meminit implementations based on the guest type. It should not introduce any functional changes. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Change

[Xen-devel] [PATCH v5 08/28] libxc: introduce a xc_dom_arch for hvm-3.0-x86_32 guests

2015-08-21 Thread Roger Pau Monne
This xc_dom_arch will be used in order to build HVM domains. The code is based on the existing xc_hvm_populate_memory and xc_hvm_populate_params functions. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Change

[Xen-devel] [PATCH v5 04/28] libxc: introduce a domain loader for HVM guest firmware

2015-08-21 Thread Roger Pau Monne
Introduce a very simple (and dummy) domain loader to be used to load the firmware (hvmloader) into HVM guests. Since hmvloader is just a 32bit elf executable the loader is fairly simple. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Sta

[Xen-devel] [PATCH v5 00/28] Introduce HVM without dm and new boot ABI

2015-08-21 Thread Roger Pau Monne
This series is split in the following order: - Patches from 1 to 10 switch HVM domain contruction to use the xc_dom_* family of functions, like they are used to build PV domains. This batch of patches can go in regardless of the status of the rest of the series IMHO, and in fact would he

[Xen-devel] [PATCH v5 09/28] libxl: switch HVM domain building to use xc_dom_* helpers

2015-08-21 Thread Roger Pau Monne
Now that we have all the code in place HVM domain building in libxl can be switched to use the xc_dom_* family of functions, just like they are used in order to build PV guests. Signed-off-by: Roger Pau Monné Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Li

[Xen-devel] [PATCH v5 03/28] libxc: introduce the notion of a container type

2015-08-21 Thread Roger Pau Monne
Introduce the notion of a container type into xc_dom_image. This will be needed by later changes that will also use xc_dom_image in order to build HVM guests. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell C

[Xen-devel] [PATCH v5 07/28] libxc: rework BSP initialization

2015-08-21 Thread Roger Pau Monne
Place the calls to xc_vcpu_setcontext and the allocation of the hypercall buffer into the arch-specific vcpu hooks. This is needed for the next patch, so x86 HVM guests can initialize the BSP using XEN_DOMCTL_sethvmcontext instead of XEN_DOMCTL_setvcpucontext. This patch should not introduce any f

[Xen-devel] [PATCH v5 06/28] libxc: make arch_setup_boot{init/late} xc_dom_arch hooks

2015-08-21 Thread Roger Pau Monne
This should not introduce any functional change. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Changes since v3: - Add Andrew Cooper Reviewed-by. - Add Wei Acked-by. --- tools/libxc/incl

[Xen-devel] [PATCH v5 01/28] libxc: split x86 HVM setup_guest into smaller logical functions

2015-08-21 Thread Roger Pau Monne
This is just a preparatory change to clean up the code in setup_guest. Should not introduce any functional changes. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu --- Changes since v3: - Add An

[Xen-devel] [PATCH v5 02/28] libxc: unify xc_dom_p2m_{host/guest}

2015-08-21 Thread Roger Pau Monne
Unify both functions into xc_dom_p2m. Should not introduce any functional change. Signed-off-by: Roger Pau Monné Reviewed-by: Andrew Cooper Acked-by: Wei Liu Cc: Ian Jackson Cc: Stefano Stabellini Cc: Ian Campbell Cc: Wei Liu Cc: Samuel Thibault --- Changes since v3: - Add Andrew Cooper R

Re: [Xen-devel] [RFC] Support of non-indirect grant backend on 64KB guest

2015-08-21 Thread Stefano Stabellini
On Fri, 21 Aug 2015, David Vrabel wrote: > On 21/08/15 17:05, Konrad Rzeszutek Wilk wrote: > > > > I have to concur with that. We can't mandate that ARM 64k page MUST use > > indirect descriptors. > > Then it has to be fixed in the block layer to allow < PAGE_SIZE segments > and to get the block

Re: [Xen-devel] [PATCH] x86/IO-APIC: don't create pIRQ mapping from masked RTE

2015-08-21 Thread Andrew Cooper
On 21/08/15 16:35, Jan Beulich wrote: On 21.08.15 at 16:58, wrote: >> On 21/08/15 09:41, Jan Beulich wrote: >>> In the course of this I also found that the respective message isn't >>> really useful without also printing the pre-existing mapping. And I >>> noticed that map_domain_pirq() allow

Re: [Xen-devel] [RFC] Support of non-indirect grant backend on 64KB guest

2015-08-21 Thread Konrad Rzeszutek Wilk
On Thu, Aug 20, 2015 at 06:30:17PM -0700, Julien Grall wrote: > > > On 20/08/2015 10:42, David Vrabel wrote: > >>When using 64KB page, a Linux block request (struct *request) may > >>contain up to 64KB of data. This is because the block segment size > >>must at least be the size of a Linux page.

Re: [Xen-devel] [RFC] Support of non-indirect grant backend on 64KB guest

2015-08-21 Thread David Vrabel
On 21/08/15 17:05, Konrad Rzeszutek Wilk wrote: > > I have to concur with that. We can't mandate that ARM 64k page MUST use > indirect descriptors. Then it has to be fixed in the block layer to allow < PAGE_SIZE segments and to get the block layer to split requests for blkfront. David _

Re: [Xen-devel] [RFC] Support of non-indirect grant backend on 64KB guest

2015-08-21 Thread Konrad Rzeszutek Wilk
On Thu, Aug 20, 2015 at 06:23:16PM +0100, Stefano Stabellini wrote: > On Thu, 20 Aug 2015, David Vrabel wrote: > > On 20/08/15 09:31, Roger Pau Monné wrote: > > > El 20/08/15 a les 1.44, Stefano Stabellini ha escrit: > > >> On Wed, 19 Aug 2015, Roger Pau Monné wrote: > > >>> My opinion is that we h

Re: [Xen-devel] [PATCH] x86/IO-APIC: don't create pIRQ mapping from masked RTE

2015-08-21 Thread Jan Beulich
>>> On 21.08.15 at 16:58, wrote: > On 21/08/15 09:41, Jan Beulich wrote: >> In the course of this I also found that the respective message isn't >> really useful without also printing the pre-existing mapping. And I >> noticed that map_domain_pirq() allowed IRQ0 to get through, despite us >> never

Re: [Xen-devel] [PATCH] x86/IO-APIC: don't create pIRQ mapping from masked RTE

2015-08-21 Thread Andrew Cooper
On 21/08/15 09:41, Jan Beulich wrote: > While moving our XenoLinux patches to 4.2-rc I noticed bogus "already > mapped" messages resulting from Linux (legitimately) writing RTEs with > only the mask bit set. Clearly we shouldn't even attempt to create a > pIRQ <-> IRQ mapping from such RTEs. Oops.

Re: [Xen-devel] [osstest test] 60719: tolerable FAIL - PUSHED

2015-08-21 Thread Wei Liu
On Fri, Aug 21, 2015 at 09:05:30AM +0100, Ian Campbell wrote: > On Wed, 2015-08-19 at 00:18 +, osstest service owner wrote: > > flight 60719 osstest real [real] > > http://logs.test-lab.xenproject.org/osstest/logs/60719/ > > > > Failures :-/ but no regressions. > > > > Tests which did not suc

Re: [Xen-devel] [PATCH 2/2 v2] xen: arm: Set all bits in mfn_to_xen_entry()

2015-08-21 Thread Andrew Cooper
On 21/08/15 00:33, Chris Brand wrote: > Ensure that every bit has a specific value. > > Reported-by: Julien Grall > Signed-off-by: Chris Brand > --- > v2 adds comments on pxn and avail. This is no functional change, if the compiler is conforming to the C spec. The spec guarantees that structure

[Xen-devel] [linux-3.18 test] 60781: regressions - FAIL

2015-08-21 Thread osstest service owner
flight 60781 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/60781/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581 Tests which are failin

[Xen-devel] Document Day this Wednesday, Aug 26

2015-08-21 Thread Russ Pavlicek
Our next Xen Project Document Day is this Wednesday, August 26! Our THEME OF THE MONTH: "User Requests" This month, we will focus on requests which have appeared in our IRC channel and UserVoice for additional documentation. Recent requests include the following: - Development Documentation: An

[Xen-devel] [PATCH] xen/tmem: Pass page instead of pfn to xen_tmem_get_page()

2015-08-21 Thread Murilo Opsfelder Araujo
The commit 091208a676dfdabb2b8fe86ee155c6fc80081b69 "xen/tmem: Use xen_page_to_gfn rather than pfn_to_gfn" left behind a call to xen_tmem_get_page() receiving pfn instead of page. This change also fixes the following build warning: drivers/xen/tmem.c: In function ‘tmem_cleancache_get_page’: drive

[Xen-devel] Resizing the Xen dom0 window in VMware Player.

2015-08-21 Thread Koester, Kenneth
Zen Project Q&A suggest I try the Mailing List venue. Brief background: Conducting a research project for employer, to replace ESX Hypervisor (with RHEL 5.5, & Windows 7 VM's), on 32-bit blades, in an ATCA cabinet. End product (for the Army) is widely deployed. Goal is a less expensive solution,

[Xen-devel] xen-netfront: bug with napi_synchronize()

2015-08-21 Thread Charles (Chas) Williams
I have seen some hangs in recent versions of the xen-netfront driver. If I unload or unbind the driver immediately befor bringing up the interface, I get a hang as show in the traceback here. ... [ 194.037351] [] ? msleep+0x27/0x30 [ 194.037358] [] ? xennet_disconnect_backend+0xfa/0x390 [xen

Re: [Xen-devel] [PATCH v7 2/3] Differentiate IO/mem resources tracked by ioreq server

2015-08-21 Thread Yu, Zhang
On 8/21/2015 2:35 PM, Tian, Kevin wrote: From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com] Sent: Friday, August 21, 2015 11:31 AM Currently in ioreq server, guest write-protected ram pages are tracked in the same rangeset with device mmio resources. Yet unlike device mmio, which can be in big

Re: [Xen-devel] sleep function in Xen

2015-08-21 Thread Jan Beulich
>>> On 21.08.15 at 09:07, wrote: First of all - please don't cross post; removing xen-users. > I want to read memory in Xen interval will the guest OS run > normally. I didn't find sleep function in xen source and the delay > function will crack the system. And I think the delay function

Re: [Xen-devel] Design doc of adding ACPI support for arm64 on Xen - version 4

2015-08-21 Thread Jan Beulich
>>> On 21.08.15 at 04:25, wrote: > I'm ok with placing them in the memory not owned by Dom0. Is there some > ways to find that kind of memory space in Xen? Who do you need to be able to find such memory? Or maybe I'm not getting what or why you're asking... Jan

[Xen-devel] [distros-debian-sid test] 37840: regressions - FAIL

2015-08-21 Thread Platform Team regression test user
flight 37840 distros-debian-sid real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/37840/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 5 xen-build fail REGR. vs. 37834 Tests whic

Re: [Xen-devel] [PATCH OSSTEST v2] Disable proxy for all preseeded wget

2015-08-21 Thread Ian Campbell
On Thu, 2015-08-13 at 19:06 +0100, Ian Jackson wrote: > Ian Campbell writes ("[PATCH OSSTEST v2] Disable proxy for all > preseeded wget"): > > At least in some contexts scripts can be run with http_proxy > > pointing > > to the apt proxy (I noticed it in /usr/lib/base-installer.d/ hook > > used

Re: [Xen-devel] [PATCH OSSTEST v2 7/7] Debian: Create /boot/boot -> . symlink on ARM when PvMenuLst enabled

2015-08-21 Thread Ian Campbell
On Thu, 2015-08-13 at 17:52 +0100, Ian Campbell wrote: > This is under the same conditional as the nobootloader confirmation > one, since they effectively both stem from the lack of a boot loader > and the consequential use of the pv-grub-menu package. > > Signed-off-by: Ian Campbell I resent th

Re: [Xen-devel] [PATCH v3] xen/blkfront: convert to blk-mq APIs

2015-08-21 Thread Rafal Mielniczuk
On 19/08/15 12:12, Bob Liu wrote: > Hi Jens & Christoph, > > Rafal reported an issue about this patch, that's after this patch no more > merges happen and the performance dropped if "modprobe null_blk irqmode=2 > completion_nsec=100", > but works fine if "modprobe null_blk". > > I'm not sure

[Xen-devel] [PATCH] x86/IO-APIC: don't create pIRQ mapping from masked RTE

2015-08-21 Thread Jan Beulich
While moving our XenoLinux patches to 4.2-rc I noticed bogus "already mapped" messages resulting from Linux (legitimately) writing RTEs with only the mask bit set. Clearly we shouldn't even attempt to create a pIRQ <-> IRQ mapping from such RTEs. In the course of this I also found that the respect

[Xen-devel] [PATCH v3 0/3] Port three ACPI fixes from Linux

2015-08-21 Thread Shannon Zhao
From: Shannon Zhao Hanjun Guo (1): ACPI / table: Replace '1' with specific error return values Len Brown (1): ACPI: disable ACPI cleanly when bad RSDP found Tomasz Nowicki (1): ACPI/table: Always count matched and successfully parsed entries xen/drivers/acpi/tables.c | 14 +++---

[Xen-devel] [PATCH v3 2/3] ACPI: disable ACPI cleanly when bad RSDP found

2015-08-21 Thread Shannon Zhao
From: Len Brown When ACPI is disabled in the BIOS of this VIA C3 box, it invalidates the RSDP, which Linux notices: ACPI Error (tbxfroot-0218): A valid RSDP was not found [20080926] Bug Linux neglected to disable ACPI at that stage, and later scribbled on smp_found_config: ACPI: No APIC-table,

[Xen-devel] [PATCH v3 1/3] ACPI/table: Always count matched and successfully parsed entries

2015-08-21 Thread Shannon Zhao
From: Tomasz Nowicki acpi_parse_entries() allows to traverse all available table entries (aka subtables) by passing max_entries parameter equal to 0, but since its count variable is only incremented if max_entries is not 0, the function always returns 0 for max_entries equal to 0. It would be mo

[Xen-devel] [PATCH v3 3/3] ACPI / table: Replace '1' with specific error return values

2015-08-21 Thread Shannon Zhao
From: Hanjun Guo After commit 7f8f97c3cc (ACPI: acpi_table_parse() now returns success/fail, not count), acpi_table_parse() returns '1' when it is unable to find the table, but it should return a negative error code in that case. Make it return -ENODEV instead. Fix the same problem in acpi_tabl

Re: [Xen-devel] [PATCH for-4.6 v3 0/3] More vNUMA fixes

2015-08-21 Thread Ian Campbell
On Mon, 2015-08-17 at 19:56 +0100, Wei Liu wrote: > Wei Liu (3): > xl: fix vNUMA vdistance parsing > xl: error out if vNUMA specifies more vcpus than pcpus > libxc: fix vNUMA memory allocation > All applied, thanks. ___ Xen-devel mailing list Xe

Re: [Xen-devel] [osstest test] 60719: tolerable FAIL - PUSHED

2015-08-21 Thread Ian Campbell
On Wed, 2015-08-19 at 00:18 +, osstest service owner wrote: > flight 60719 osstest real [real] > http://logs.test-lab.xenproject.org/osstest/logs/60719/ > > Failures :-/ but no regressions. > > Tests which did not succeed, but are not blocking: > [...] > test-amd64-i386-libvirt-pair 21 guest

[Xen-devel] [libvirt test] 60779: regressions - FAIL

2015-08-21 Thread osstest service owner
flight 60779 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/60779/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 16 guest-start/debianhvm.repeat fail REGR. vs. 60681

[Xen-devel] sleep function in Xen

2015-08-21 Thread xinyue
Hi all, I want to read memory in Xen interval will the guest OS run normally. I didn't find sleep function in xen source and the delay function will crack the system. And I think the delay function will also stop the guest OS. Does anyone have any idea of which function I should use ? T