Re: [Xen-devel] [PATCH 7/7] tools/hotplug: add wrapper to start xenstored

2015-09-10 Thread Olaf Hering
On Thu, Sep 10, Ian Jackson wrote: > Wei Liu writes ("Re: [Xen-devel] [PATCH 7/7] tools/hotplug: add wrapper to > start xenstored"): > > On Thu, Sep 10, 2015 at 03:19:35PM +0100, George Dunlap wrote: > > > ExecStart=/usr/bin/env $XENSTORED --no-fork $XENSTORED_ARGS > > > > And the difference bet

Re: [Xen-devel] [PATCH 1/7] tools/hotplug: remove SELinux options from var-lib-xenstored.mount

2015-09-10 Thread Olaf Hering
On Thu, Sep 10, George Dunlap wrote: > On Fri, Dec 19, 2014 at 11:25 AM, Olaf Hering wrote: > > Using SELinux mount options per default breaks several systems. > > Either the context= mount option is not known at all to the kernel, > > as reported for ArchLinux. Or the default value "none" is unk

Re: [Xen-devel] [PATCH] efi/libstub/fdt: Standardize the names of EFI stub parameters

2015-09-10 Thread Andrew Turner
On Thu, 10 Sep 2015 16:41:56 +0800 Shannon Zhao wrote: > From: Shannon Zhao > > These EFI stub parameters are used to internal communication between > EFI stub and Linux kernel and EFI stub creates these parameters. But > for Xen on ARM when booting with UEFI, Xen will create a minimal DT > pro

Re: [Xen-devel] [Qemu-devel] [edk2] EDK II & GPL - Re: OVMF BoF @ KVM Forum 2015

2015-09-10 Thread Kevin Davis
> > On 09/10/2015 08:14 PM, Kevin Davis wrote: > >> > > Ah. I wasn't in the room when they figured it out. And I've never seen > their written opinion. Is it documented somewhere? > > which in turn leads to this FAQ: > https://web.archive.org/web/20121116185559/http://lkml.org/lkml/2009/6/ > 2

Re: [Xen-devel] [edk2] EDK II & GPL - Re: OVMF BoF @ KVM Forum 2015

2015-09-10 Thread Kevin Davis
> > > On 10/09/2015 16:24, Kevin Davis wrote: > > Further leading me to guess that any actual use of those > > implementations could lead to you actually needing to hire a real > > attorney and not one that you find on YouTube. > > The good thing is that attorneys have already figured it out. I

Re: [Xen-devel] [edk2] EDK II & GPL - Re: OVMF BoF @ KVM Forum 2015

2015-09-10 Thread Kevin Davis
> > > On Sep 10, 2015, at 4:40 AM, Alexander Graf wrote: > > > > > > > > On 10.09.15 12:04, Laszlo Ersek wrote: > >> On 09/10/15 08:19, Alexander Graf wrote: > >>> > >>> > Am 10.09.2015 um 07:32 schrieb Jordan Justen > : > >> > Laszlo's email raised the GPL question, but I was not sure

[Xen-devel] [linux-linus test] 61692: regressions - trouble: broken/fail/pass

2015-09-10 Thread osstest service owner
flight 61692 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/61692/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-arndale 8 leak-check/basis(8) fail REGR. vs. 59254 test-amd64-amd64-xl-q

Re: [Xen-devel] [PATCH V6 3/7] libxl: add pvusb API

2015-09-10 Thread Chun Yan Liu
>>> On 9/8/2015 at 10:17 PM, in message <1441721852.24450.120.ca...@citrix.com>, Ian Campbell wrote: > On Mon, 2015-08-10 at 18:35 +0800, Chunyan Liu wrote: > > Sorry for the delay, between 4.6 freeze crunch, conference and vacation > I've been a bit swamped. > > I'm just going to commen

Re: [Xen-devel] [Qemu-devel] [edk2] EDK II & GPL - Re: OVMF BoF @ KVM Forum 2015

2015-09-10 Thread Andrew Fish
> On Sep 10, 2015, at 8:44 PM, Kevin Davis wrote: > >> >> On 09/10/2015 08:14 PM, Kevin Davis wrote: >>> Ah. I wasn't in the room when they figured it out. And I've never seen >> their written opinion. Is it documented somewhere? >> >> which in turn leads to this FAQ: >> https://urlde

Re: [Xen-devel] [Qemu-devel] [edk2] EDK II & GPL - Re: OVMF BoF @ KVM Forum 2015

2015-09-10 Thread Eric Blake
On 09/10/2015 08:14 PM, Kevin Davis wrote: >> >> >> On 10/09/2015 16:24, Kevin Davis wrote: >>> Further leading me to guess that any actual use of those >>> implementations could lead to you actually needing to hire a real >>> attorney and not one that you find on YouTube. >> >> The good thing is t

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-10 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Friday, September 11, 2015 10:21 AM > > >> >> > > However I don't think this patch is a right fix. So far > >> >> > > relax/strict policy > >> >> > > is per-domain. what about one VM specifies relax while another VM > >> >> > > specifies strict when each is assigned w

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-10 Thread Chen, Tiejun
>> > > However I don't think this patch is a right fix. So far relax/strict policy >> > > is per-domain. what about one VM specifies relax while another VM >> > > specifies strict when each is assigned with a device sharing rmrr >> > > with the other? In that case it becomes a system-wide securit

Re: [Xen-devel] [OSSTEST Nested PATCH v11 6/7] Compose the main recipe of nested test job

2015-09-10 Thread Hu, Robert
Thanks Ian. So strange, seems this mail was sent ' Tuesday, September 1, 2015 10:42 PM ', but I have just received it. I'm fully occupied by some release test, so have to carefully read your comments 1 ~2 weeks later. Sorry about this. Best Regards, Robert Ho > -Original Message- > Fro

Re: [Xen-devel] [OSSTEST Nested PATCH v11 6/7] Compose the main recipe of nested test job

2015-09-10 Thread Hu, Robert
Thanks Ian. So strange, seems this mail was sent ' Tuesday, September 1, 2015 10:42 PM ', but I have just received it. I'm fully occupied by some release test, so have to carefully read your comments 1 ~2 weeks later. Sorry about this. Best Regards, Robert Ho > -Original Message- > Fro

[Xen-devel] [linux-next test] 61690: regressions - trouble: broken/fail/pass

2015-09-10 Thread osstest service owner
flight 61690 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/61690/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 61295 test-armhf-armhf-xl-ar

Re: [Xen-devel] [PATCH v3] x86/hvm: fix saved pmtimer value

2015-09-10 Thread Kouya Shimura
Jan Beulich writes: > From: Kouya Shimura > > The ACPI PM timer is sometimes broken on live migration. > Since vcpu->arch.hvm_vcpu.guest_time is always zero in other than > "delay for missed ticks mode". Even in "delay for missed ticks mode", > vcpu's guest_time field is not valid (i.e. zero) w

Re: [Xen-devel] [PATCH] xen/domctl: lower loglevel of XEN_DOMCTL_memory_mapping

2015-09-10 Thread Konrad Rzeszutek Wilk
On Fri, Sep 11, 2015 at 08:44:50AM +0800, Chen, Tiejun wrote: > >>Right, that's one of the things that would need taking care of. > >>(Whether enforcing an upper limit is actually needed I'm not > >>sure - we generally allow the admin to shoot himself in the foot > >>if he wants to. And whether the

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-10 Thread Tian, Kevin
> From: Chen, Tiejun > Sent: Friday, September 11, 2015 8:56 AM > > >> > > Need to have separate warning/error level for relax/strict. > >> > > > >> > > However I don't think this patch is a right fix. So far relax/strict > >> > > policy > >> > > is per-domain. what about one VM specifies relax w

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-10 Thread Chen, Tiejun
> > Need to have separate warning/error level for relax/strict. > > > > However I don't think this patch is a right fix. So far relax/strict policy > > is per-domain. what about one VM specifies relax while another VM > > specifies strict when each is assigned with a device sharing rmrr > > with t

Re: [Xen-devel] [PATCH] xen/domctl: lower loglevel of XEN_DOMCTL_memory_mapping

2015-09-10 Thread Chen, Tiejun
Right, that's one of the things that would need taking care of. (Whether enforcing an upper limit is actually needed I'm not sure - we generally allow the admin to shoot himself in the foot if he wants to. And whether the lower limit should be 64 instead of just ensuring the limit is not zero is a

Re: [Xen-devel] [PULL 0/19] xen-2015-09-08-tag

2015-09-10 Thread Chen, Tiejun
Thanks! I'll fold it the offending patch (http://marc.info/?l=qemu-devel&m=144174596628052&w=2) and resend. Reviewed-by: Michael S. Tsirkin Michale and Stefano, Thanks a lot :) Tiejun ___ Xen-devel mailing list Xen-devel@lists.xen.org http://li

Re: [Xen-devel] [v2][PATCH] xen/vtd/iommu: permit group devices to passthrough in relaxed mode

2015-09-10 Thread Tian, Kevin
> From: Wei Liu [mailto:wei.l...@citrix.com] > Sent: Thursday, September 10, 2015 6:37 PM > > On Thu, Sep 10, 2015 at 02:09:39AM -0600, Jan Beulich wrote: > > >>> On 10.09.15 at 07:23, wrote: > > >> From: Jan Beulich [mailto:jbeul...@suse.com] > > >> Sent: Wednesday, September 09, 2015 2:55 PM >

[Xen-devel] [linux-mingo-tip-master test] 61677: regressions - FAIL

2015-09-10 Thread osstest service owner
flight 61677 linux-mingo-tip-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/61677/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate fail REGR. vs

Re: [Xen-devel] [PATCH 95/98] HACK: fix include/uapi/xen/privcmd.h compilation in userspace

2015-09-10 Thread Mikko Rapeli
On Sat, May 30, 2015 at 06:56:25PM +0100, Andrew Cooper wrote: > On 30/05/15 16:39, Mikko Rapeli wrote: > > privcmd.h depends on xen/interface/xen.h which is now exported to userspace. > > xen/interface/xen.h then depends on asm/xen/interface.h which is now > > exported to userspace together with i

[Xen-devel] [linux-3.4 test] 61663: regressions - FAIL

2015-09-10 Thread osstest service owner
flight 61663 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/61663/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 6 xen-boot fail REGR. vs. 30511 test-amd64-amd64-xl-qem

Re: [Xen-devel] [PULL 00/29] xen-2015-09-10-tag

2015-09-10 Thread Peter Maydell
On 10 September 2015 at 18:15, Stefano Stabellini wrote: > The following changes since commit 8611280505119e296757a60711a881341603fa5a: > > target-microblaze: Use setcond for pcmp* (2015-09-08 08:49:33 +0200) > > are available in the git repository at: > > git://xenbits.xen.org/people/sstabell

[Xen-devel] [PATCH v3 1/2] xen: arm re-order assignments in mfn_to_xen_entry()

2015-09-10 Thread Chris Brand
Shuffle lines around so that the assignments in mfn_to_xen_entry() occur in the same order as the bits are declared in lpae_pt_t. This makes it easier to see which ones are never given a value. No change in behaviour. Also fix a minor comment typo. Signed-off-by: Chris Brand Reviewed-by: Julien

[Xen-devel] [PATCH v3 2/2] xen: arm: Be explicit about bit values in mfn_to_xen_entry()

2015-09-10 Thread Chris Brand
Ensure that every relevant bit is given an explicit value. This has no effect on the generated code, but makes it a little easier to follow. Reported-by: Julien Grall Signed-off-by: Chris Brand --- v3 trims down the list of bits given explicit values v2 adds comments on pxn and avail xen/inclu

[Xen-devel] [PATCH v3 0/2] xen: arm: Give PTE bits explict values

2015-09-10 Thread Chris Brand
This is more-or-less what Julien requested. He noted that pt.config was never set to zero. When I looked further, I found other bits that were also never given a value. Looking at the callsites, they almost all seem to assume a value of zero, so that's what I went with. Patch 1 re-orders the assig

[Xen-devel] [libvirt test] 61675: regressions - FAIL

2015-09-10 Thread osstest service owner
flight 61675 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/61675/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt 11 guest-start fail REGR. vs. 61593 Tests which did not succe

Re: [Xen-devel] [PATCH] xen/domctl: lower loglevel of XEN_DOMCTL_memory_mapping

2015-09-10 Thread Konrad Rzeszutek Wilk
On Thu, Sep 10, 2015 at 02:59:17AM -0600, Jan Beulich wrote: > >>> On 10.09.15 at 10:55, wrote: > >> Sort of (the patch has the intended effect, but for its size very > >> many rough edges). > >> > > > > I guess we need to amend the original parameter, once_mapping_mfns, like > > this, > > > >

[Xen-devel] [qemu-mainline test] 61666: tolerable trouble: broken/fail/pass - PUSHED

2015-09-10 Thread osstest service owner
flight 61666 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/61666/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt-qcow2 3 host-install(3) broken REGR. vs. 61573 test-armhf-armhf-libvirt-vhd

[Xen-devel] [PULL 17/29] xen: use errno instead of rc for xc_domain_add_to_physmap

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk In Xen 4.6 commit cd2f100f0f61b3f333d52d1737dd73f02daee592 "libxc: Fix do_memory_op to return negative value on errors" made the libxc API less odd-ball: On errors, return value is -1 and error code is in errno. On success the return value is either 0 or an positive va

[Xen-devel] [PULL 29/29] xen/pt: Don't slurp wholesale the PCI configuration registers

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk Instead we have the emulation registers ->init functions which consult the host values to see what the initial value should be and they are responsible for populating the dev.config. Reviewed-by: Stefano Stabellini Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by:

[Xen-devel] [PULL 19/29] xen/pt: Use XEN_PT_LOG properly to guard against compiler warnings.

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk If XEN_PT_LOGGING_ENABLED is enabled the XEN_PT_LOG macros start using the first argument. Which means if within the function there is only one user of the argument ('d') and XEN_PT_LOGGING_ENABLED is not set, we get compiler warnings. This is not the case now but with

[Xen-devel] [PULL 27/29] xen/pt: Move bulk of xen_pt_unregister_device in its own routine.

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk This way we can call it if we fail during init. This code movement introduces no changes. Acked-by: Stefano Stabellini Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Stefano Stabellini --- hw/xen/xen_pt.c | 121 +-

[Xen-devel] [PULL 20/29] xen/pt: Use xen_host_pci_get_[byte|word] instead of dev.config

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk During init time we treat the dev.config area as a cache of the host view. However during execution time we treat it as guest view (by the generic PCI API). We need to sync Xen's code to the generic PCI API view. This is the first step by replacing all of the code that

[Xen-devel] [PULL 16/29] xen/pt: xen_host_pci_config_read returns -errno, not -1 on failure

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk However the init routines assume that on errors the return code is -1 (as the libxc API is) - while those xen_host_* routines follow another paradigm - negative errno on return, 0 on success. Reviewed-by: Stefano Stabellini Signed-off-by: Konrad Rzeszutek Wilk Signe

[Xen-devel] [PULL 15/29] xen/pt: Make xen_pt_msi_set_enable static

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk As we do not use it outside our code. Reviewed-by: Stefano Stabellini Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Stefano Stabellini --- hw/xen/xen_pt.h |1 - hw/xen/xen_pt_msi.c |2 +- 2 files changed, 1 insertion(+), 2 deletions(-) diff --gi

[Xen-devel] [PULL 18/29] xen/pt/msi: Add the register value when printing logging and error messages

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk We would like to know what the MSI register value is to help in troubleshooting in the field. As such modify the logging logic to include such details in xen_pt_msgctrl_reg_write. Reviewed-by: Stefano Stabellini Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: St

[Xen-devel] [PULL 11/29] xen, gfx passthrough: add opregion mapping

2015-09-10 Thread Stefano Stabellini
From: Tiejun Chen The OpRegion shouldn't be mapped 1:1 because the address in the host can't be used in the guest directly. This patch traps read and write access to the opregion of the Intel GPU config space (offset 0xfc). The original patch is from Jean Guyader Signed-off-by: Tiejun Chen S

[Xen-devel] [PULL 23/29] xen/pt: Remove XenPTReg->data field.

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk We do not want to have two entries to cache the guest configuration registers: XenPTReg->data and dev.config. Instead we want to use only the dev.config. To do without much complications we rip out the ->data field and replace it with an pointer to the dev.config. Thi

[Xen-devel] [PULL 24/29] xen/pt: Log xen_host_pci_get in two init functions

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk To help with troubleshooting in the field. Acked-by: Stefano Stabellini Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Stefano Stabellini --- hw/xen/xen_pt_config_init.c |9 + 1 file changed, 9 insertions(+) diff --git a/hw/xen/xen_pt_config_init

[Xen-devel] [PULL 21/29] xen/pt: Sync up the dev.config and data values.

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk For a passthrough device we maintain a state of emulated registers value contained within d->config. We also consult the host registers (and apply ro and write masks) whenever the guest access the registers. This is done in xen_pt_pci_write_config and xen_pt_pci_read_c

[Xen-devel] [PULL 14/29] xen/pt: Update comments with proper function name.

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk It has changed but the comments still refer to the old names. Reviewed-by: Stefano Stabellini Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Stefano Stabellini --- hw/xen/xen_pt.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/hw/x

[Xen-devel] [PULL 25/29] xen/pt: Log xen_host_pci_get/set errors in MSI code.

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk We seem to only use these functions when de-activating the MSI - so just log errors. Reviewed-by: Stefano Stabellini Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Stefano Stabellini --- hw/xen/xen_pt_msi.c | 18 ++ 1 file changed, 14 insert

[Xen-devel] [PULL 28/29] xen/pt: Check for return values for xen_host_pci_[get|set] in init

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk and if we have failures we call xen_pt_destroy introduced in 'xen/pt: Move bulk of xen_pt_unregister_device in its own routine.' and free all of the allocated structures. Acked-by: Stefano Stabellini Signed-off-by: Konrad Rzeszutek Wilk Signed-off-by: Stefano Stabel

[Xen-devel] [PULL 26/29] xen/pt: Make xen_pt_unregister_device idempotent

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk To deal with xen_host_pci_[set|get]_ functions returning error values and clearing ourselves in the init function we should make the .exit (xen_pt_unregister_device) function be idempotent in case the generic code starts calling .exit (or for fun does it before calling

[Xen-devel] [PULL 22/29] xen/pt: Check if reg->init function sets the 'data' past the reg->size

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk It should never happen, but in case it does (an developer adds a new register and the 'init_val' expands past the register size) we want to report. The code will only write up to reg->size so there is no runtime danger of the register spilling across other ones - howev

[Xen-devel] [PULL 12/29] xen-hvm: When using xc_domain_add_to_physmap also include errno when reporting

2015-09-10 Thread Stefano Stabellini
From: Konrad Rzeszutek Wilk .errors - as it will most likely have the proper error value. Signed-off-by: Konrad Rzeszutek Wilk Acked-by: Stefano Stabellini Signed-off-by: Stefano Stabellini --- xen-hvm.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/xen-hvm.c b/x

[Xen-devel] [PULL 13/29] xen/HVM: atomically access pointers in bufioreq handling

2015-09-10 Thread Stefano Stabellini
From: Jan Beulich The number of slots per page being 511 (i.e. not a power of two) means that the (32-bit) read and write indexes going beyond 2^32 will likely disturb operation. The hypervisor side gets I/O req server creation extended so we can indicate that we're using suitable atomic accesses

Re: [Xen-devel] [OSSTest Nested v12 15/21] Integrate Ian J. code and small corrections.

2015-09-10 Thread Ian Jackson
Robert Ho writes ("[OSSTest Nested v12 15/21] Integrate Ian J. code and small corrections."): > Signed-off-by: Robert Ho Thanks for fixing up my code. But can you please squash these fixes into their corresponding patches ? You should add your own S-o-b to each of them, next to mine. Thanks,

Re: [Xen-devel] [OSSTest Nested v12 09/21] Wrapper and use core_dump_setup() for nested host and normal host to setup coredump sysctl

2015-09-10 Thread Ian Jackson
Robert Ho writes ("[OSSTest Nested v12 09/21] Wrapper and use core_dump_setup() for nested host and normal host to setup coredump sysctl"): > This patch does these 4 things: > 1. wrapper coredump setup code from original ts-host-install into > TestSupport.pm > 2. replace ts-host-install original

[Xen-devel] [PULL 09/29] xen, gfx passthrough: register a isa bridge

2015-09-10 Thread Stefano Stabellini
From: Tiejun Chen Currently we just register this isa bridge when we use IGD passthrough in Xen side. Signed-off-by: Tiejun Chen Acked-by: Stefano Stabellini Signed-off-by: Stefano Stabellini --- hw/xen/xen_pt.c | 22 ++ 1 file changed, 22 insertions(+) diff --git a/hw

[Xen-devel] [PULL 01/29] xen-hvm: Add trace to ioreq

2015-09-10 Thread Stefano Stabellini
From: Don Slutz Signed-off-by: Stefano Stabellini Signed-off-by: Don Slutz --- trace-events |7 +++ xen-hvm.c| 21 + 2 files changed, 28 insertions(+) diff --git a/trace-events b/trace-events index 0a82f0c..985b041 100644 --- a/trace-events +++ b/trace-events

[Xen-devel] [OSSTEST PATCH 4/4] ts-xen-install: networking: Rename `nodhcp' to `ensurebridge'

2015-09-10 Thread Ian Jackson
The code that used to be in nodhcp replaced any existing dhcp configuration with a static one. What it does now is ensure that there is a bridge, without messing with how the network is configured. So rename the function. Signed-off-by: Ian Jackson --- ts-xen-install |4 ++-- 1 file change

[Xen-devel] [PULL 03/29] pc_init1: pass parameters just with types

2015-09-10 Thread Stefano Stabellini
From: Tiejun Chen Pass types to configure pc_init1(). Signed-off-by: Tiejun Chen Signed-off-by: Stefano Stabellini Acked-by: Michael S. Tsirkin --- hw/i386/pc_piix.c | 14 -- 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/hw/i386/pc_piix.c b/hw/i386/pc_piix.c ind

[Xen-devel] [OSSTEST PATCH 3/4] ts-xen-install: networking: Never rewrite the interface config

2015-09-10 Thread Ian Jackson
Instead, if we need to, simply change the physical interface in the `iface' line to refer to xenbr0, and add the physical interface as a `bridge_ports' along with the other bridge settings. Signed-off-by: Ian Jackson --- ts-xen-install | 33 + 1 file changed, 5

[Xen-devel] [PULL 05/29] hw/pci-assign: split pci-assign.c

2015-09-10 Thread Stefano Stabellini
From: Tiejun Chen We will try to reuse assign_dev_load_option_rom in xen side, and especially its a good beginning to unify pci assign codes both on kvm and xen in the future. [Fix build for Windows] Signed-off-by: Tiejun Chen Signed-off-by: Stefano Stabellini Acked-by: Michael S. Tsirkin --

[Xen-devel] [PULL 07/29] xen, gfx passthrough: retrieve VGA BIOS to work

2015-09-10 Thread Stefano Stabellini
From: Tiejun Chen Now we retrieve VGA bios like kvm stuff in qemu but we need to fix Device Identification in case if its not matched with the real IGD device since Seabios is always trying to compare this ID to work out VGA BIOS. Signed-off-by: Tiejun Chen Acked-by: Stefano Stabellini Signed-

[Xen-devel] [OSSTEST PATCH 2/4] ts-xen-install: networking: Bail if we expected a bridge but there wasn't one

2015-09-10 Thread Ian Jackson
If we have been told that there should already be a bridge, but there isn't one, we would previously rewrite the networking config just in case (mainly to make it static). Instead, quit the /e/n/i editing in this case. Signed-off-by: Ian Jackson --- ts-xen-install | 12 +--- 1 file ch

[Xen-devel] [PULL 06/29] xen, gfx passthrough: basic graphics passthrough support

2015-09-10 Thread Stefano Stabellini
From: Tiejun Chen basic gfx passthrough support: - add a vga type for gfx passthrough - register/unregister legacy VGA I/O ports and MMIOs for passthrough GFX Signed-off-by: Tiejun Chen Signed-off-by: Yang Zhang Acked-by: Stefano Stabellini Signed-off-by: Stefano Stabellini --- hw/core/mach

[Xen-devel] [PULL 08/29] igd gfx passthrough: create a isa bridge

2015-09-10 Thread Stefano Stabellini
From: Tiejun Chen Currently IGD drivers always need to access PCH by 1f.0. But we don't want to poke that directly to get ID, and although in real world different GPU should have different PCH. But actually the different PCH DIDs likely map to different PCH SKUs. We do the same thing for the GPU.

[Xen-devel] [PULL 00/29] xen-2015-09-10-tag

2015-09-10 Thread Stefano Stabellini
The following changes since commit 8611280505119e296757a60711a881341603fa5a: target-microblaze: Use setcond for pcmp* (2015-09-08 08:49:33 +0200) are available in the git repository at: git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xen-2015-09-10-tag for you to fetch changes up

[Xen-devel] [OSSTEST PATCH 1/4] ts-xen-install: networking: Do nothing if there's already a bridge

2015-09-10 Thread Ian Jackson
The main effect is that old Xend tests will no longer replace the bridge network interface. If it was using dhcp then it will keep using dhcp, rather than being switched to have the dhcp-obtained address hardwired in a static configuration. A side effect is that after this, `nodhcp' will do nothi

[Xen-devel] [PULL 04/29] piix: create host bridge to passthrough

2015-09-10 Thread Stefano Stabellini
From: Tiejun Chen Implement a pci host bridge specific to passthrough. Actually this just inherits the standard one. And we also just expose a minimal real host bridge pci configuration subset. [Replace pread with lseek and read to fix Windows build] Signed-off-by: Tiejun Chen Signed-off-by: S

[Xen-devel] [PULL 10/29] xen, gfx passthrough: register host bridge specific to passthrough

2015-09-10 Thread Stefano Stabellini
From: Tiejun Chen Just register that pci host bridge specific to passthrough. Signed-off-by: Tiejun Chen Acked-by: Stefano Stabellini Signed-off-by: Stefano Stabellini --- hw/i386/pc_piix.c | 15 +-- 1 file changed, 13 insertions(+), 2 deletions(-) diff --git a/hw/i386/pc_piix

[Xen-devel] [PULL 02/29] i440fx: make types configurable at run-time

2015-09-10 Thread Stefano Stabellini
From: "Michael S. Tsirkin" IGD passthrough wants to supply a different pci and host devices, inheriting i440fx devices. Make types configurable. Signed-off-by: Michael S. Tsirkin Signed-off-by: Tiejun Chen Signed-off-by: Stefano Stabellini --- hw/i386/pc_piix.c|4 +++- hw/pci-host/pi

Re: [Xen-devel] [OSSTest Nested v12 18/21] After Xen install, configure its xenbr0 interface as dhcp

2015-09-10 Thread Ian Jackson
Ian Jackson: > Robert Ho: > > Ian Campbell: > > > We should continue to use fixed IP addresses where we have them. > > > > Then I'm not confident to change selecthost(). Would you help give me > > the patch addressing this? > > I will try to come up with something. This is the kind of thing I wou

Re: [Xen-devel] [PATCH net v3 0/2] xen-net{front, back}: respect user provided max_queues

2015-09-10 Thread David Miller
From: Wei Liu Date: Thu, 10 Sep 2015 11:18:56 +0100 > Wei Liu (2): > xen-netback: respect user provided max_queues > xen-netfront: respect user provided max_queues This looks better, series applied, thanks. ___ Xen-devel mailing list Xen-devel@lis

[Xen-devel] xl: libxl_domain_info: getting domain info list: Bad address

2015-09-10 Thread Julien Grall
Hi, Riku reported me an error on their CI loop while run Xen on the Arndale: Starting /usr/sbin/xenstored... Setting domain 0 name, domid and JSON config... libxl: error: libxl.c:675:libxl_domain_info: getting domain info list: Bad address libxl: error: libxl_dom.c:1869:libxl__userdata_path: una

Re: [Xen-devel] Missing copyright in the Xen header files

2015-09-10 Thread Lars Kurth
On 10/09/2015 17:26, "Roger Pau Monné" wrote: >CCing Lars (the community manager). > >El 09/09/15 a les 14.11, Mike Belopuhov ha escrit: >> Hi, >> >> We're in the process of porting Xen PVHVM drivers to OpenBSD >> and have come across missing copyright lines on some of Xen >> interface header

Re: [Xen-devel] [PATCH for 4.6 v3 2/3] xl/libxl: disallow saving a guest with vNUMA configured

2015-09-10 Thread Wei Liu
On Thu, Sep 10, 2015 at 05:53:35PM +0100, Ian Campbell wrote: > On Thu, 2015-09-10 at 17:15 +0100, Wei Liu wrote: > > On Thu, Sep 10, 2015 at 05:10:57PM +0100, Ian Campbell wrote: > > > On Thu, 2015-09-10 at 15:50 +0100, Wei Liu wrote: > > > > This is because the migration stream does not preserve

Re: [Xen-devel] [PATCH for 4.6 v3 2/3] xl/libxl: disallow saving a guest with vNUMA configured

2015-09-10 Thread Ian Campbell
On Thu, 2015-09-10 at 17:15 +0100, Wei Liu wrote: > On Thu, Sep 10, 2015 at 05:10:57PM +0100, Ian Campbell wrote: > > On Thu, 2015-09-10 at 15:50 +0100, Wei Liu wrote: > > > This is because the migration stream does not preserve node > > > information. > > > > > > Note this is not a regression for

Re: [Xen-devel] [osstest test] 60719: tolerable FAIL - PUSHED

2015-09-10 Thread Ian Campbell
On Thu, 2015-09-03 at 10:35 -0600, Jim Fehlig wrote: > I wonder if this has anything to do with migration V2? I noticed a migration > regression a few days back, but later realized that the sender was 4.5 and > receiver was 4.6. I planned to see if migration worked through libvirt > between >

Re: [Xen-devel] OSSTEST -- nested test case development, RFC: ts-guest-destroy doesn't call guest_await_dhcp_tcp() if guest has fixed IP

2015-09-10 Thread Ian Jackson
Hu, Robert writes ("RE: OSSTEST -- nested test case development, RFC: ts-guest-destroy doesn't call guest_await_dhcp_tcp() if guest has fixed IP"): > So you won't object turn xenbr0 config to 'dhcp' as following, right? No, I'm afraid that's not right. The logic in this function needs to be chan

Re: [Xen-devel] [OSSTest Nested v12 07/21] Replace 'start osstest-confirm-booted' code by function

2015-09-10 Thread Ian Jackson
Robert Ho writes ("[OSSTest Nested v12 07/21] Replace 'start osstest-confirm-booted' code by function"): > Schedul start osstest-confirm-booted script via call > `host_install_postboot_complete' fucntion; in order > to avoid open code. See my comments on the previous patch. The code

Re: [Xen-devel] [PATCH 2/2] xen/swiotlb: Add support for 64KB page granularity

2015-09-10 Thread Stefano Stabellini
On Thu, 10 Sep 2015, Julien Grall wrote: > Swiotlb is used on ARM64 to support DMA on platform where devices are > not protected by an SMMU. Furthermore it's only enabled for DOM0. > > While Xen is always using 4KB page granularity in the stage-2 page table, > Linux ARM64 may either use 4KB or 64K

Re: [Xen-devel] [PATCH 1/2] xen/swiotlb: Pass addresses rather than frame numbers to xen_arch_need_swiotlb

2015-09-10 Thread Stefano Stabellini
On Thu, 10 Sep 2015, Julien Grall wrote: > With 64KB page granularity support, the frame number will be different. > > It will be easier to modify the behavior in a single place rather than > in each caller. > > Signed-off-by: Julien Grall > Reviewed-by: Stefano Stabellini > Cc: Stefano Stab

Re: [Xen-devel] [PATCH v6 29/29] libxl: add support for migrating HVM guests without a device model

2015-09-10 Thread Andrew Cooper
On 04/09/15 13:09, Roger Pau Monne wrote: Only some minor libxl changes are needed in order to be able to migrate HVM guests without a device model, no hypervisor changes are needed. This change adds support for LIBXL_DEVICE_MODEL_VERSION_NONE into the migration code. Signed-off-by: Roger Pau M

Re: [Xen-devel] [OSSTest Nested v12 06/21] Add new function of 'host_install_postboot_complete'

2015-09-10 Thread Ian Jackson
Robert Ho writes ("[OSSTest Nested v12 06/21] Add new function of 'host_install_postboot_complete'"): > This function is called to add 'osstest-confirm-booted' service > in target's start up services. > Previously, this was dircetly done by > target_cmd_root($ho, "update-rc.d osstest-confirm-boote

Re: [Xen-devel] [OSSTest Nested v12 05/21] Honour $xopts{ExtraConfig} and use it to enable nestedhvm

2015-09-10 Thread Ian Jackson
Robert Ho writes ("[OSSTest Nested v12 05/21] Honour $xopts{ExtraConfig} and use it to enable nestedhvm"): Your summary line says `Honour $xopts{ExtraConfig}' but I think this was actually done in 2011 in dc801db7 "Osstest: prepareguest: honour xopt ExtraConfig". I think this patch honours the e

Re: [Xen-devel] [OSSTest Nested v12 04/21] Comment out CDROM entry in HVM guest VM

2015-09-10 Thread Ian Jackson
Robert Ho writes ("[OSSTest Nested v12 04/21] Comment out CDROM entry in HVM guest VM"): > Comment out CDROM entry in sources.list to make HTTP URL entry > available for L1 HVM guest VM. This commit message should probably mention that the installation iso is of course not generally inser

Re: [Xen-devel] [PATCH] efi/libstub/fdt: Standardize the names of EFI stub parameters

2015-09-10 Thread Mark Rutland
> > C) When you could go: > > > >DT -> Discover Xen -> Xen-specific stuff -> Xen-specific EFI/ACPI > > discovery > > I take you mean discovering Xen with the usual Xen hypervisor node on > device tree. I think that C) is a good option actually. I like it. Not > sure why we didn't think about

Re: [Xen-devel] [OSSTest Nested v12 03/21] Allow runvars to specify guest disk and ram size (turning previous values into defaults)

2015-09-10 Thread Ian Jackson
Robert Ho writes ("[OSSTest Nested v12 03/21] Allow runvars to specify guest disk and ram size (turning previous values into defaults)"): > 1. The default disk size for guest is '1M' which is not sufficient > for nested HVM guest, using larger disk size for nested guest >

Re: [Xen-devel] [OSSTest Nested v12 02/21] Correct a mistake in setboot_grup2() of Xen entry parsing pattern

2015-09-10 Thread Ian Jackson
Robert Ho writes ("[OSSTest Nested v12 02/21] Correct a mistake in setboot_grup2() of Xen entry parsing pattern"): > In previous adding of 'submenu' parsing code, a mistake was made. It would be conventional to mention the exact final commit message as found in the mainline tree, which seems

Re: [Xen-devel] [OSSTest Nested v12 01/21] Optimize and re-format previous code of 'submenu' parsing

2015-09-10 Thread Ian Jackson
Robert Ho writes ("[OSSTest Nested v12 01/21] Optimize and re-format previous code of 'submenu' parsing"): > * space between ')' and '{'; and after '=' > * omit unnecessary 'define' and '!defined' usage > * break long '{}' into several lines These changes are all good. But} >

Re: [Xen-devel] [PATCH for 4.6 v3 2/3] xl/libxl: disallow saving a guest with vNUMA configured

2015-09-10 Thread Wei Liu
On Thu, Sep 10, 2015 at 05:10:57PM +0100, Ian Campbell wrote: > On Thu, 2015-09-10 at 15:50 +0100, Wei Liu wrote: > > This is because the migration stream does not preserve node information. > > > > Note this is not a regression for migration v2 vs legacy migration > > because neither of them pres

Re: [Xen-devel] [PATCH] efi/libstub/fdt: Standardize the names of EFI stub parameters

2015-09-10 Thread Stefano Stabellini
On Thu, 10 Sep 2015, Mark Rutland wrote: > On Thu, Sep 10, 2015 at 02:52:25PM +0100, Stefano Stabellini wrote: > > On Thu, 10 Sep 2015, Mark Rutland wrote: > > > On Thu, Sep 10, 2015 at 12:37:57PM +0100, Stefano Stabellini wrote: > > > > On Thu, 10 Sep 2015, Mark Rutland wrote: > > > > > > > Does X

Re: [Xen-devel] [PATCH for 4.6 v3 2/3] xl/libxl: disallow saving a guest with vNUMA configured

2015-09-10 Thread Ian Campbell
On Thu, 2015-09-10 at 15:50 +0100, Wei Liu wrote: > This is because the migration stream does not preserve node information. > > Note this is not a regression for migration v2 vs legacy migration > because neither of them preserve node information. > > Signed-off-by: Wei Liu > --- > Cc: andrew.c

Re: [Xen-devel] [PATCH 7/7] tools/hotplug: add wrapper to start xenstored

2015-09-10 Thread Ian Jackson
Wei Liu writes ("Re: [Xen-devel] [PATCH 7/7] tools/hotplug: add wrapper to start xenstored"): > On Thu, Sep 10, 2015 at 03:19:35PM +0100, George Dunlap wrote: > > ExecStart=/usr/bin/env $XENSTORED --no-fork $XENSTORED_ARGS > > And the difference between these two approaches is /usr/bin/env > pres

Re: [Xen-devel] [PATCH v6 26/29] libxc/xen: introduce a start info structure for HVMlite guests

2015-09-10 Thread Wei Liu
On Fri, Sep 04, 2015 at 02:09:05PM +0200, Roger Pau Monne wrote: > This structure contains the physical address of the command line, as well as > the physical address of the list of loaded modules. The physical address of > this structure is passed to the guest at boot time in the %ebx register. >

Re: [Xen-devel] [PATCH v6 29/29] libxl: add support for migrating HVM guests without a device model

2015-09-10 Thread Wei Liu
On Fri, Sep 04, 2015 at 02:09:08PM +0200, Roger Pau Monne wrote: > Only some minor libxl changes are needed in order to be able to migrate HVM > guests without a device model, no hypervisor changes are needed. > > This change adds support for LIBXL_DEVICE_MODEL_VERSION_NONE into the > migration co

[Xen-devel] [PATCH LIBVIRT] libxl: don't end job for ephemeal domain on start failure

2015-09-10 Thread Ian Campbell
commit 4b53d0d4ac9c "libxl: don't remove persistent domain on start failure" cleans up the vm object and sets it to NULL if the vm is not persistent, however at end job vm (now NULL) is dereferenced via the call to libxlDomainObjEndJob. Avoid this by skipping "endjob" and going straight to "cleanup

Re: [Xen-devel] Missing copyright in the Xen header files

2015-09-10 Thread Roger Pau Monné
CCing Lars (the community manager). El 09/09/15 a les 14.11, Mike Belopuhov ha escrit: > Hi, > > We're in the process of porting Xen PVHVM drivers to OpenBSD > and have come across missing copyright lines on some of Xen > interface header files, for instance: > > https://svnweb.freebsd.org/base/

Re: [Xen-devel] [PATCH for 4.6 v3 3/3] xl: handle empty vnuma configuration

2015-09-10 Thread Ian Campbell
On Thu, 2015-09-10 at 15:50 +0100, Wei Liu wrote: > When user specifies vnuma = [], we need to skip the whole parser > function, otherwise the parser sets b_info->max_memkb to garbage value. Arguably the bug here is in the code which does so without reference to num_vnuma (the majority of this fun

Re: [Xen-devel] [edk2] EDK II & GPL - Re: OVMF BoF @ KVM Forum 2015

2015-09-10 Thread Paolo Bonzini
On 10/09/2015 16:24, Kevin Davis wrote: > Further leading me to guess that any actual use of those > implementations could lead to you actually needing to hire a real > attorney and not one that you find on YouTube. The good thing is that attorneys have already figured it out. IBM figured out a

Re: [Xen-devel] [PATCH for 4.6 v2 1/3] libxl: set ret to non-zero value in failure path

2015-09-10 Thread Ian Campbell
On Thu, 2015-09-10 at 11:55 +0100, Ian Campbell wrote: > On Wed, 2015-09-09 at 18:03 +0100, Wei Liu wrote: > > ... otherwise we have something like: > > > > xl: libxl_create.c:968: initiate_domain_create: Assertion `ret' failed. > > > > Signed-off-by: Wei Liu > > Acked-by: Ian Campbell APplie

Re: [Xen-devel] [PATCH for 4.6 v2] configure: don't silently disable systemd support

2015-09-10 Thread Ian Campbell
On Thu, 2015-09-10 at 12:18 +0100, Wei Liu wrote: > Originally when user runs ./configure --enable-systemd and systemd > development library is not available the build system silently disables > systemd support. This is not in line with normal expectation. > > Instead, configure should error out w

Re: [Xen-devel] [PATCH 7/7] tools/hotplug: add wrapper to start xenstored

2015-09-10 Thread George Dunlap
On Thu, Sep 10, 2015 at 4:01 PM, M A Young wrote: > On Thu, 10 Sep 2015, Wei Liu wrote: > >> On Thu, Sep 10, 2015 at 03:19:35PM +0100, George Dunlap wrote: >> > On Wed, Jan 7, 2015 at 9:40 AM, Olaf Hering wrote: >> > > On Tue, Jan 06, Ian Campbell wrote: >> > > >> > >> On Fri, 2014-12-19 at 12:25

  1   2   3   >