Re: [Xen-devel] MEM_SHARING_DEBUG

2016-06-13 Thread sepanta s
On Mon, Jun 13, 2016 at 12:59 PM, Wei Liu wrote: > On Sun, Jun 12, 2016 at 02:37:29PM +0430, sepanta s wrote: > > Hi, > > > > how to does MEM_SHARING_DEBUG works in xen ? > > This function is located at and its internal structure is > > xen/arch/x86/mm/mem_sharing.c > > < > https://github.com/mir

[Xen-devel] [PATCH] libxl: correct xl cpupool-numa-split with vcpu limited dom0

2016-06-13 Thread Juergen Gross
When trying to use xl cpupool-numa-split and dom0 is limited to less vcpus than one numa node the operation will fail. Correct this by allowing this configuration. Reported-by: Glenn Enright Signed-off-by: Juergen Gross --- tools/libxl/xl_cmdimpl.c | 8 ++-- 1 file changed, 6 insertions(+)

[Xen-devel] [xen-4.5-testing test] 95631: tolerable trouble: broken/fail/pass - PUSHED

2016-06-13 Thread osstest service owner
flight 95631 xen-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/95631/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-freebsd10-amd64 3 host-install(3)broken pass in 95557 test-amd64-i386-xl-qemuu-winxps

[Xen-devel] [libvirt test] 95638: regressions - FAIL

2016-06-13 Thread osstest service owner
flight 95638 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/95638/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-libvirt5 libvirt-build fail REGR. vs. 95460 build-amd64-libvirt

Re: [Xen-devel] Question about sharing spinlock_t among VMs in Xen

2016-06-13 Thread Meng Xu
On Mon, Jun 13, 2016 at 6:54 PM, Andrew Cooper wrote: > On 13/06/2016 18:43, Meng Xu wrote: >> Hi, >> >> I have a quick question about using the Linux spin_lock() in Xen >> environment to protect some host-wide shared (memory) resource among >> VMs. >> >> *** The question is as follows *** >> Supp

Re: [Xen-devel] Question about sharing spinlock_t among VMs in Xen

2016-06-13 Thread Meng Xu
On Mon, Jun 13, 2016 at 5:17 PM, Boris Ostrovsky wrote: > On 06/13/2016 04:46 PM, Meng Xu wrote: >> On Mon, Jun 13, 2016 at 2:28 PM, Boris Ostrovsky >> wrote: >>> On 06/13/2016 01:43 PM, Meng Xu wrote: Hi, I have a quick question about using the Linux spin_lock() in Xen enviro

[Xen-devel] [ovmf test] 95622: regressions - FAIL

2016-06-13 Thread osstest service owner
flight 95622 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/95622/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 17 guest-start/debianhvm.repeat fail REGR. vs. 94748 test-amd64-amd64-

[Xen-devel] Question of xl dump-core

2016-06-13 Thread wj zhou
Hello all, Sorry to disturb you, but I really want to figure it out. The xen core of redhat 6 with pod is unable to be used with crash. I installed a hvm of redhat 6 by xen 4.7.0-rc2. And the memory is set as below: memory=1024 maxmem=4096 "xl dump-core" is executed, and the core is produced suc

Re: [Xen-devel] [libvirt test] 95577: regressions - FAIL

2016-06-13 Thread Jim Fehlig
On 06/12/2016 11:01 PM, osstest service owner wrote: > flight 95577 libvirt real [real] > http://logs.test-lab.xenproject.org/osstest/logs/95577/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > build-i386-libvirt5 libvir

Re: [Xen-devel] Question about sharing spinlock_t among VMs in Xen

2016-06-13 Thread Andrew Cooper
On 13/06/2016 18:43, Meng Xu wrote: > Hi, > > I have a quick question about using the Linux spin_lock() in Xen > environment to protect some host-wide shared (memory) resource among > VMs. > > *** The question is as follows *** > Suppose I have two Linux VMs sharing the same spinlock_t lock (throug

[Xen-devel] [xen-4.4-testing test] 95615: tolerable trouble: blocked/broken/fail/pass - PUSHED

2016-06-13 Thread osstest service owner
flight 95615 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/95615/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-libvirt 3 host-install(3) broken pass in 95550 test-armhf-armhf-xl-arndale 15

Re: [Xen-devel] Question about sharing spinlock_t among VMs in Xen

2016-06-13 Thread Boris Ostrovsky
On 06/13/2016 04:46 PM, Meng Xu wrote: > On Mon, Jun 13, 2016 at 2:28 PM, Boris Ostrovsky > wrote: >> On 06/13/2016 01:43 PM, Meng Xu wrote: >>> Hi, >>> >>> I have a quick question about using the Linux spin_lock() in Xen >>> environment to protect some host-wide shared (memory) resource among >>>

Re: [Xen-devel] Question about sharing spinlock_t among VMs in Xen

2016-06-13 Thread Meng Xu
On Mon, Jun 13, 2016 at 2:28 PM, Boris Ostrovsky wrote: > On 06/13/2016 01:43 PM, Meng Xu wrote: >> Hi, >> >> I have a quick question about using the Linux spin_lock() in Xen >> environment to protect some host-wide shared (memory) resource among >> VMs. >> >> *** The question is as follows *** >>

Re: [Xen-devel] [PATCH 14/17] ocaml/libxs: generate a paths.ml

2016-06-13 Thread David Scott
> On 13 Jun 2016, at 16:22, Wei Liu wrote: > > On Mon, Jun 13, 2016 at 04:19:59PM +0100, Ian Jackson wrote: >> Wei Liu writes ("[PATCH 14/17] ocaml/libxs: generate a paths.ml"): >>> Signed-off-by: Wei Liu >> >> FAOD I don't consider myself qualified to review this. >> > > David gave his ack

Re: [Xen-devel] HEADS UP: Imported Xen 4.7: no blkback

2016-06-13 Thread Marcin Cieslak
On Mon, 13 Jun 2016, Roger Pau Monné wrote: > On Fri, Jun 10, 2016 at 09:38:59PM +, Marcin Cieslak wrote: > > "?" does not work - it mostly causes a panic, the console is slow, but I > > managed > > to switch it to /dev/ada0p2, dmesg below: > > This has now been reverted, so when I import th

[Xen-devel] [qemu-upstream-4.5-testing test] 95602: tolerable FAIL - PUSHED

2016-06-13 Thread osstest service owner
flight 95602 qemu-upstream-4.5-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/95602/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl 15 guest-start/debian.repeat fail in 95527 pass in 95602 test-armhf-armhf-xl-r

Re: [Xen-devel] [PATCH v5 6/6] hwmon: use smp_call_on_cpu() for dell-smm i8k

2016-06-13 Thread Pali Rohár
On Wednesday 06 April 2016 16:17:46 Juergen Gross wrote: > Use the smp_call_on_cpu() function to call system management > mode on cpu 0. > Make call secure by adding get_online_cpus() to avoid e.g. suspend > resume cycles in between. > > Signed-off-by: Juergen Gross > --- > V4: add call to get_on

[Xen-devel] [PATCH 3.16 041/114] x86/mm/xen: Suppress hugetlbfs in PV guests

2016-06-13 Thread Ben Hutchings
3.16.36-rc1 review patch. If anyone has any objections, please let me know. -- From: Jan Beulich commit 103f6112f253017d7062cd74d17f4a514ed4485c upstream. Huge pages are not normally available to PV guests. Not suppressing hugetlbfs use results in an endless loop of page fault

Re: [Xen-devel] Question about sharing spinlock_t among VMs in Xen

2016-06-13 Thread Boris Ostrovsky
On 06/13/2016 01:43 PM, Meng Xu wrote: > Hi, > > I have a quick question about using the Linux spin_lock() in Xen > environment to protect some host-wide shared (memory) resource among > VMs. > > *** The question is as follows *** > Suppose I have two Linux VMs sharing the same spinlock_t lock (thr

Re: [Xen-devel] [PATCH v2 2/3] libxl: update vcpus bitmap in retrieved guest config

2016-06-13 Thread Wei Liu
On Mon, Jun 13, 2016 at 06:39:36PM +0100, Anthony PERARD wrote: > On Wed, Jun 08, 2016 at 03:28:45PM +0100, Wei Liu wrote: > > ... because the available vcpu bitmap can change during domain life time > > due to cpu hotplug and unplug. > > > > For QEMU upstream, we interrogate QEMU for the number o

Re: [Xen-devel] [PATCH v2 1/3] libxl: introduce libxl__qmp_query_cpus

2016-06-13 Thread Wei Liu
On Mon, Jun 13, 2016 at 05:52:14PM +0100, Anthony PERARD wrote: > On Wed, Jun 08, 2016 at 03:28:44PM +0100, Wei Liu wrote: > > diff --git a/tools/libxl/libxl_qmp.c b/tools/libxl/libxl_qmp.c > > index 3eb279a..23eac92 100644 > > --- a/tools/libxl/libxl_qmp.c > > +++ b/tools/libxl/libxl_qmp.c > > @@

Re: [Xen-devel] [PATCH 08/17] tools: remove hard-coded /var/lib/xen in Makefile

2016-06-13 Thread Wei Liu
On Mon, Jun 13, 2016 at 05:57:26PM +0100, Ian Jackson wrote: > Wei Liu writes ("Re: [PATCH 08/17] tools: remove hard-coded /var/lib/xen in > Makefile"): > > On Mon, Jun 13, 2016 at 05:07:11PM +0100, Ian Jackson wrote: > > > Mmmm. So maybe we should just drop this now. > > > > Drop what? Drop the

[Xen-devel] [linux-3.18 test] 95597: regressions - FAIL

2016-06-13 Thread osstest service owner
flight 95597 linux-3.18 real [real] http://logs.test-lab.xenproject.org/osstest/logs/95597/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-intel 13 xen-boot/l1fail REGR. vs. 94728 Tests which are failin

Re: [Xen-devel] [PATCH v2 3/3] libxl: only issue cpu-add call to QEMU for not present CPU

2016-06-13 Thread Anthony PERARD
On Wed, Jun 08, 2016 at 03:28:46PM +0100, Wei Liu wrote: > Calculate the final bitmap for CPUs to add to avoid having annoying > error messages complaining those CPUs are already present. > > We can also properly handle error from QMP now. > > Signed-off-by: Wei Liu Reviewed-by: Anthony PERARD

Re: [Xen-devel] [PATCH v2 2/3] libxl: update vcpus bitmap in retrieved guest config

2016-06-13 Thread Anthony PERARD
On Wed, Jun 08, 2016 at 03:28:45PM +0100, Wei Liu wrote: > ... because the available vcpu bitmap can change during domain life time > due to cpu hotplug and unplug. > > For QEMU upstream, we interrogate QEMU for the number of vcpus. For > others, we look directly into xenstore for information. I

[Xen-devel] Question about sharing spinlock_t among VMs in Xen

2016-06-13 Thread Meng Xu
Hi, I have a quick question about using the Linux spin_lock() in Xen environment to protect some host-wide shared (memory) resource among VMs. *** The question is as follows *** Suppose I have two Linux VMs sharing the same spinlock_t lock (through the sharing memory) on the same host. Suppose we

Re: [Xen-devel] [PATCH V9 2/3] drivers/pl011: Use combination of UARTRIS and UARTMSC instead of UARTMIS

2016-06-13 Thread Shanker Donthineni
On 06/13/2016 05:30 AM, Stefano Stabellini wrote: On Thu, 9 Jun 2016, Shanker Donthineni wrote: The Masked interrupt status register (UARTMIS) is not described in ARM SBSA 2.x document. Anding of two registers UARTMSC and UARTRIS values gives the same information as register UARTMIS. UARTRIS,

Re: [Xen-devel] [RFC 0/8] xen/arm: acpi: Support SPIs routing

2016-06-13 Thread Julien Grall
On 13/06/16 18:19, Shanker Donthineni wrote: Julien, Hello, Please avoid top-posting. The problem that was reported earlier related to our platform drivers in domn0 kernel. I have verified your patches and works fine without any dead-lock. Good, thank you! Regards, -- Julien Grall _

Re: [Xen-devel] [PATCH v4] altp2m: Allow the hostp2m entries to be of type p2m_ram_shared

2016-06-13 Thread Tamas K Lengyel
On Mon, Jun 13, 2016 at 3:28 AM, George Dunlap wrote: > On 11/06/16 18:55, Tamas K Lengyel wrote: >> On Thu, May 26, 2016 at 10:17 AM, Tamas K Lengyel >> wrote: >>> >>> On May 26, 2016 04:40, "George Dunlap" wrote: On 26/05/16 04:55, Tamas K Lengyel wrote: > Move sharing locks abo

Re: [Xen-devel] [RFC 0/8] xen/arm: acpi: Support SPIs routing

2016-06-13 Thread Shanker Donthineni
Julien, The problem that was reported earlier related to our platform drivers in domn0 kernel. I have verified your patches and works fine without any dead-lock. On 06/13/2016 06:42 AM, Julien Grall wrote: On 08/06/16 13:34, Julien Grall wrote: On 08/06/16 13:11, Shanker Donthineni wrote

[Xen-devel] xen/x86: efi: warning value truncated

2016-06-13 Thread Julien Grall
Hi Konrad, I noticed the warnings below when building Xen x86 with Livepatch enabled. /local/home/julieng/works/xen/xen/.xen.efi.0s.S: Assembler messages: /local/home/julieng/works/xen/xen/.xen.efi.0s.S:21: Warning: value 0x7d2f8591 truncated to 0x8591 /local/home/julieng/works/xen/xen/.

Re: [Xen-devel] [PATCH 08/17] tools: remove hard-coded /var/lib/xen in Makefile

2016-06-13 Thread Ian Jackson
Wei Liu writes ("Re: [PATCH 08/17] tools: remove hard-coded /var/lib/xen in Makefile"): > On Mon, Jun 13, 2016 at 05:07:11PM +0100, Ian Jackson wrote: > > Mmmm. So maybe we should just drop this now. > > Drop what? Drop the uninstall target all together? Or just the rune in > this patch? I mean

Re: [Xen-devel] [PATCH v2 1/3] libxl: introduce libxl__qmp_query_cpus

2016-06-13 Thread Anthony PERARD
On Wed, Jun 08, 2016 at 03:28:44PM +0100, Wei Liu wrote: > diff --git a/tools/libxl/libxl_qmp.c b/tools/libxl/libxl_qmp.c > index 3eb279a..23eac92 100644 > --- a/tools/libxl/libxl_qmp.c > +++ b/tools/libxl/libxl_qmp.c > @@ -979,6 +979,43 @@ int libxl__qmp_cpu_add(libxl__gc *gc, int domid, int idx)

[Xen-devel] vTPM detaching issue

2016-06-13 Thread Andrea Genuise
I'm not sure if this is a bug or my fault, but when I create a domain with a vTPM attached, detaching it sometimes causes the following error to be thrown (I post the command sequence): [root@localhost ~]# xl create /etc/xen/vtpmmgr-stubdom Parsing config from /etc/xen/vtpmmgr-stubdom [root@localh

Re: [Xen-devel] [PATCH v8 06/11] propagate IOMMU Device-TLB flush error up to EPT update (top level ones)

2016-06-13 Thread George Dunlap
On Mon, Jun 13, 2016 at 4:17 PM, Xu, Quan wrote: > From: Quan Xu > > Propagate the IOMMU Device-TLB flush error up to the ept_set_entry(), > when VT-d shares EPT page table. > > Signed-off-by: Quan Xu > Acked-by: Kevin Tian > Reviewed-by: Jan Beulich Acked-by: George Dunlap > > CC: Jun Naka

Re: [Xen-devel] [PATCH v8 02/11] IOMMU/MMU: enhance the call trees of IOMMU unmapping and mapping

2016-06-13 Thread George Dunlap
On Mon, Jun 13, 2016 at 4:17 PM, Xu, Quan wrote: > From: Quan Xu > > When IOMMU mapping is failed, we issue a best effort rollback, stopping > IOMMU mapping, unmapping the previous IOMMU maps and then reporting the > error up to the call trees. When rollback is not feasible (in early > initializa

Re: [Xen-devel] [PATCH 08/17] tools: remove hard-coded /var/lib/xen in Makefile

2016-06-13 Thread Wei Liu
On Mon, Jun 13, 2016 at 05:07:11PM +0100, Ian Jackson wrote: > Wei Liu writes ("Re: [PATCH 08/17] tools: remove hard-coded /var/lib/xen in > Makefile"): > > TBH I think the uninstall target has been broken for a long time. I > > merely added the rm rune for completeness. Last time I tried it didn

Re: [Xen-devel] [PATCH 08/17] tools: remove hard-coded /var/lib/xen in Makefile

2016-06-13 Thread Ian Jackson
Wei Liu writes ("Re: [PATCH 08/17] tools: remove hard-coded /var/lib/xen in Makefile"): > TBH I think the uninstall target has been broken for a long time. I > merely added the rm rune for completeness. Last time I tried it didn't > remove things cleanly. For one there is no rune to remove system

Re: [Xen-devel] [PATCH v8 09/11] vt-d: fix the IOMMU flush issue

2016-06-13 Thread Jan Beulich
>>> "Xu, Quan" 06/13/16 5:22 PM >>> >From: Quan Xu > >The propagation value from IOMMU flush interfaces may be positive, which >indicates callers need to flush cache, not one of faliures. > >when the propagation value is positive, this patch fixes this flush issue >as follows: >- call iommu_flush

[Xen-devel] [xen-unstable-smoke test] 95662: tolerable all pass - PUSHED

2016-06-13 Thread osstest service owner
flight 95662 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/95662/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH v8 02/11] IOMMU/MMU: enhance the call trees of IOMMU unmapping and mapping

2016-06-13 Thread Jan Beulich
>>> "Xu, Quan" 06/13/16 5:22 PM >>> >From: Quan Xu > >When IOMMU mapping is failed, we issue a best effort rollback, stopping >IOMMU mapping, unmapping the previous IOMMU maps and then reporting the >error up to the call trees. When rollback is not feasible (in early >initialization phase or trad

Re: [Xen-devel] [PATCH 08/17] tools: remove hard-coded /var/lib/xen in Makefile

2016-06-13 Thread Wei Liu
On Mon, Jun 13, 2016 at 04:13:26PM +0100, Ian Jackson wrote: > Wei Liu writes ("[PATCH 08/17] tools: remove hard-coded /var/lib/xen in > Makefile"): > > Now all conversations are done, remove the hard-coded paths. > > Should we not keep these for (most of) a release cycle ? > > Otherwise someone

Re: [Xen-devel] [PATCH 14/17] ocaml/libxs: generate a paths.ml

2016-06-13 Thread Wei Liu
On Mon, Jun 13, 2016 at 04:19:59PM +0100, Ian Jackson wrote: > Wei Liu writes ("[PATCH 14/17] ocaml/libxs: generate a paths.ml"): > > Signed-off-by: Wei Liu > > FAOD I don't consider myself qualified to review this. > David gave his ack to a similar path so I presume he will be fine with this,

[Xen-devel] [PATCH v8 08/11] IOMMU: propagate IOMMU Device-TLB flush error (leaf ones).

2016-06-13 Thread Xu, Quan
From: Quan Xu Signed-off-by: Quan Xu Acked-by: Kevin Tian Reviewed-by: Jan Beulich CC: Stefano Stabellini CC: Julien Grall CC: Jan Beulich CC: Kevin Tian CC: Feng Wu --- xen/drivers/passthrough/arm/smmu.c | 13 - xen/drivers/passthrough/iommu.c | 8 ++-- xen/driver

[Xen-devel] [PATCH v8 06/11] propagate IOMMU Device-TLB flush error up to EPT update (top level ones)

2016-06-13 Thread Xu, Quan
From: Quan Xu Propagate the IOMMU Device-TLB flush error up to the ept_set_entry(), when VT-d shares EPT page table. Signed-off-by: Quan Xu Acked-by: Kevin Tian Reviewed-by: Jan Beulich CC: Jun Nakajima CC: Kevin Tian CC: George Dunlap CC: Jan Beulich CC: Andrew Cooper CC: Feng Wu ---

[Xen-devel] [PATCH v8 07/11] IOMMU: propagate IOMMU Device-TLB flush error up to IOMMU suspending (top level ones)

2016-06-13 Thread Xu, Quan
From: Quan Xu Signed-off-by: Quan Xu Acked-by: Kevin Tian Acked-by: Suravee Suthikulpanit CC: Jan Beulich CC: Liu Jinsong CC: Keir Fraser CC: Andrew Cooper CC: Suravee Suthikulpanit CC: Stefano Stabellini CC: Julien Grall CC: Kevin Tian CC: Feng Wu v8: enhance the error check of dev

[Xen-devel] [PATCH v8 10/11] vt-d: propagate the IOMMU Device-TLB flush error up to ME phantom functions

2016-06-13 Thread Xu, Quan
From: Quan Xu Signed-off-by: Quan Xu Acked-by: Kevin Tian Reviewed-by: Jan Beulich CC: Jan Beulich CC: Kevin Tian CC: Feng Wu --- xen/drivers/passthrough/vtd/extern.h | 3 ++- xen/drivers/passthrough/vtd/iommu.c | 8 xen/drivers/passthrough/vtd/quirks.c | 27 +-

[Xen-devel] [PATCH v8 00/11] Check VT-d Device-TLB flush error

2016-06-13 Thread Xu, Quan
From: Quan Xu This patch set is a prereq patch set for Patch:'VT-d Device-TLB flush issue'. While IOMMU Device-TLB flush timed out, xen calls panic() at present. However the existing panic() is going to be eliminated, so we must propagate the IOMMU Device-TLB flush error up to the call trees.

[Xen-devel] [PATCH v8 03/11] IOMMU: propagate IOMMU Device-TLB flush error up to IOMMU unmapping (top level ones)

2016-06-13 Thread Xu, Quan
From: Quan Xu Signed-off-by: Quan Xu Acked-by: Kevin Tian Acked-by: Suravee Suthikulpanit Acked-by: Julien Grall Reviewed-by: Jan Beulich CC: Stefano Stabellini CC: Julien Grall CC: Kevin Tian CC: Feng Wu CC: Jan Beulich CC: Andrew Cooper CC: Suravee Suthikulpanit --- xen/drivers/pa

[Xen-devel] [PATCH v8 09/11] vt-d: fix the IOMMU flush issue

2016-06-13 Thread Xu, Quan
From: Quan Xu The propagation value from IOMMU flush interfaces may be positive, which indicates callers need to flush cache, not one of faliures. when the propagation value is positive, this patch fixes this flush issue as follows: - call iommu_flush_write_buffer() to flush cache. - return

[Xen-devel] [PATCH v8 02/11] IOMMU/MMU: enhance the call trees of IOMMU unmapping and mapping

2016-06-13 Thread Xu, Quan
From: Quan Xu When IOMMU mapping is failed, we issue a best effort rollback, stopping IOMMU mapping, unmapping the previous IOMMU maps and then reporting the error up to the call trees. When rollback is not feasible (in early initialization phase or trade-off of complexity) for the hardware domai

[Xen-devel] [PATCH v8 11/11] vt-d: add __must_check annotation to IOMMU flush pointers and handlers

2016-06-13 Thread Xu, Quan
From: Quan Xu Signed-off-by: Quan Xu Acked-by: Kevin Tian Reviewed-by: Jan Beulich CC: Jan Beulich CC: Kevin Tian CC: Feng Wu --- xen/drivers/passthrough/vtd/iommu.c | 50 ++-- xen/drivers/passthrough/vtd/iommu.h | 11 +--- xen/drivers/passthrough/vtd

[Xen-devel] [PATCH v8 04/11] IOMMU: propagate IOMMU Device-TLB flush error up to IOMMU mapping (top level ones)

2016-06-13 Thread Xu, Quan
From: Quan Xu Signed-off-by: Quan Xu Acked-by: Kevin Tian Acked-by: Suravee Suthikulpanit Reviewed-by: Jan Beulich CC: Suravee Suthikulpanit CC: Stefano Stabellini CC: Julien Grall CC: Kevin Tian CC: Feng Wu CC: Jan Beulich CC: Andrew Cooper v8: use the Linux coding style for arm cod

[Xen-devel] [PATCH v8 05/11] IOMMU/MMU: propagate IOMMU Device-TLB flush error up to iommu_iotlb_flush{, _all} (top level ones)

2016-06-13 Thread Xu, Quan
From: Quan Xu Signed-off-by: Quan Xu Acked-by: Julien Grall Reviewed-by: Kevin Tian Reviewed-by: Jan Beulich CC: Stefano Stabellini CC: Julien Grall CC: Jan Beulich CC: Kevin Tian --- xen/arch/arm/p2m.c | 4 +++- xen/common/memory.c | 12 ++-- x

[Xen-devel] [PATCH v8 01/11] IOMMU: handle IOMMU mapping and unmapping failures

2016-06-13 Thread Xu, Quan
From: Quan Xu Treat IOMMU mapping and unmapping failures as a fatal to the DomU If IOMMU mapping and unmapping failed, crash the DomU and propagate the error up to the call trees. No spamming of the log can occur. For DomU, we avoid logging any message for already dying domains. For Dom0, that'l

Re: [Xen-devel] [PATCH 13/17] hotplug/FreeBSD: honour XEN_RUN_STORED

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 13/17] hotplug/FreeBSD: honour XEN_RUN_STORED"): > Signed-off-by: Wei Liu > --- > Cc: Ian Jackson > Cc: Roger Pau Monné Acked-by: Ian Jackson We should probably get an ack from Roger too. Ian. ___ Xen-devel mailing list Xen

Re: [Xen-devel] [PATCH 14/17] ocaml/libxs: generate a paths.ml

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 14/17] ocaml/libxs: generate a paths.ml"): > Signed-off-by: Wei Liu FAOD I don't consider myself qualified to review this. Ian. ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 11/17] hotplug/Linux: honour XEN_RUN_STORED

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 11/17] hotplug/Linux: honour XEN_RUN_STORED"): > Signed-off-by: Wei Liu Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

[Xen-devel] [PATCH 12/17] libxenstore: honour XEN_RUN_STORED

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 12/17] libxenstore: honour XEN_RUN_STORED"): > Signed-off-by: Wei Liu Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 09/17] docs: honour XEN_DUMP_DIR

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 09/17] docs: honour XEN_DUMP_DIR"): > Use configure to generate xl.cfg and xl manpage. Add the generated files > to gitignore. ... > Not entirely sure if this is a good idea. I don't deem this patch > important so I'm fine with dropping it. It seems like a lot of effort to

[Xen-devel] [linux-4.1 test] 95591: regressions - FAIL

2016-06-13 Thread osstest service owner
flight 95591 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/95591/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-amd64 10 guest-startfail REGR. vs. 94729 Tests which are failing

Re: [Xen-devel] [PATCH 08/17] tools: remove hard-coded /var/lib/xen in Makefile

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 08/17] tools: remove hard-coded /var/lib/xen in Makefile"): > Now all conversations are done, remove the hard-coded paths. Should we not keep these for (most of) a release cycle ? Otherwise someone who tries to use the new feature in 4.8 will find it doesn't uninstall the

Re: [Xen-devel] [PATCH 07/17] libxl: honour XEN_LIB_DIR

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 07/17] libxl: honour XEN_LIB_DIR"): > Signed-off-by: Wei Liu Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 06/17] hotplug/Linux: honour XEN_LIB_DIR

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 06/17] hotplug/Linux: honour XEN_LIB_DIR"): > Use configure to generate sysconfig.xendomains file. > > Signed-off-by: Wei Liu Acked-by: Ian Jackson ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-de

Re: [Xen-devel] [PATCH 05/17] tools: install and remove XEN_LIB_DIR in Makefile

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 05/17] tools: install and remove XEN_LIB_DIR in Makefile"): > The intention of using wild card in uninstall target is to remove both > xen and xenstored directories. Change that to two runes that explicitly > remove each of those directories. > > Note that the runes that u

Re: [Xen-devel] [PATCH 04/17] build: introduce and export XEN_LIB_DIR

2016-06-13 Thread Ian Jackson
Wei Liu writes ("[PATCH 04/17] build: introduce and export XEN_LIB_DIR"): > This variable defaults to /var/lib/xen. It will be used to substitute > various hard-coded paths in tools. > > The new variable points to $localstatedir/lib/xen, which defaults to > /var/lib/xen, so there is no change in d

[Xen-devel] [PATCH raisin 3/4] Update config-4.6 and config-4.5 to point to stable branches

2016-06-13 Thread George Dunlap
Point xen, qemu, and qemu-trad to stable-4.5 and -4.6 branches. And point the default libvirt to point to the libvirt 1.3.3 maintenance branch, rather than xen-tested-master. Also update OVMF revision for 4.6 to a version that builds with modern gccs. Singed-off-by: George Dunlap --- CC: Stefan

[Xen-devel] [PATCH raisin 4/4] Update to 4.7, update qemu and qemu_traditional recipes

2016-06-13 Thread George Dunlap
Add a 4.7 config file, make it the default. Also update the qemu and qemu_traditional recipies after Ian Cambell's work to split off separate libraries. Signed-off-by: George Dunlap --- CC: Stefano Stabellini --- components/qemu | 21 + components/qemu_tradition

[Xen-devel] [PATCH raisin 2/4] config: Separate config urls into a separate file

2016-06-13 Thread George Dunlap
So that we're not duplicating information. Signed-off-by: George Dunlap --- CC: Stefano Stabellini --- configs/config-4.5 | 39 --- configs/config-4.6 | 39 --- configs/config-master | 38 ---

[Xen-devel] [PATCH raisin 1/4] components/xen: Actually disable rombios

2016-06-13 Thread George Dunlap
Commit 5fe3855 meant to disable rombios, but didn't. This causes the following build failure: gcc -O2 -fomit-frame-pointer -m32 -march=i686 -fno-strict-aliasing -std=gnu99 -Wall -Wstrict-prototypes -Wdeclaration-after-statement -Wno-unused-but-set-variable -Wno-unused-local-typedefs -D__XEN_TOO

[Xen-devel] [PATCH raisin 0/4] Fixes for 4.6, update to 4.7

2016-06-13 Thread George Dunlap
George Dunlap (4): components/xen: Actually disable rombios config: Separate config urls into a separate file Update config-4.6 and config-4.5 to point to stable branches Update to 4.7, update qemu and qemu_traditional recipes components/qemu | 21 compone

[Xen-devel] [qemu-upstream-4.3-testing test] 95604: trouble: blocked/broken

2016-06-13 Thread osstest service owner
flight 95604 qemu-upstream-4.3-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/95604/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3863 host-install(3) broken REG

Re: [Xen-devel] xenbits "official" repo for XTF (was Re: [PATCH 0/2] xtf: add launcher (+1 bugfix)

2016-06-13 Thread Ian Jackson
George Dunlap writes ("Re: [Xen-devel] xenbits "official" repo for XTF (was Re: [PATCH 0/2] xtf: add launcher (+1 bugfix)"): > On Mon, Jun 13, 2016 at 11:10 AM, Andrew Cooper > > I am not completely averse to changing it, but I don't see an > > alternative which is any better or clearer. > > Do y

Re: [Xen-devel] xenbits "official" repo for XTF (was Re: [PATCH 0/2] xtf: add launcher (+1 bugfix)

2016-06-13 Thread George Dunlap
On Mon, Jun 13, 2016 at 11:10 AM, Andrew Cooper wrote: > On 09/06/16 16:04, Ian Jackson wrote: >> Roger Pau Monne writes ("[Xen-devel] [PATCH 0/2] xtf: add launcher (+1 >> bugfix)"): >>> This series contains a bugfix for the build infrastructure and a basic >>> launcher for XTF. Patches can also

Re: [Xen-devel] [PULL 0/2] xen-20160613-tag

2016-06-13 Thread Stefano Stabellini
On Mon, 13 Jun 2016, Jan Beulich wrote: > May I ask what the disposition of "xen/blkif: avoid double access to > any shared ring request fields" is? I don't think I've seen a pull req, > and it doesn't appear to be in master. I miscategorized it, sorry. It is going to be in the next pull request.

Re: [Xen-devel] compilation fail, xen staging-4.6, vnc.c, qemu-tradintional issues under ubuntu 16.04

2016-06-13 Thread Ian Jackson
George Dunlap writes ("Re: [Xen-devel] compilation fail, xen staging-4.6, vnc.c, qemu-tradintional issues under ubuntu 16.04"): > The original report actually had 3 different issues -- the one I'm > re-raising was the one I'm personally still tripping over. (Don't > know about the other two.) Th

Re: [Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread Paul Durrant
> -Original Message- [snip] > > > > No, I meant the guest receive-side copy didn't scale, not grant table v2 > itself. Ok the table is bigger with v2, but to do guest receive-side copy > required a huge table in dom0 if it was going to scale to 100s of VMs and the > perf. benefits were neve

[Xen-devel] [xen-unstable-smoke test] 95652: tolerable all pass - PUSHED

2016-06-13 Thread osstest service owner
flight 95652 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/95652/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread Julien Grall
On 13/06/16 13:45, Paul Durrant wrote: -Original Message- From: Julien Grall [mailto:julien.gr...@arm.com] Sent: 13 June 2016 13:42 To: Paul Durrant; boris.ostrov...@oracle.com; David Vrabel; jgr...@suse.com; sstabell...@kernel.org; konrad.w...@oracle.com Cc: Andrew Cooper; xen-devel@li

Re: [Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread Paul Durrant
> -Original Message- > From: Julien Grall [mailto:julien.gr...@arm.com] > Sent: 13 June 2016 13:42 > To: Paul Durrant; boris.ostrov...@oracle.com; David Vrabel; > jgr...@suse.com; sstabell...@kernel.org; konrad.w...@oracle.com > Cc: Andrew Cooper; xen-devel@lists.xen.org; linux-ker...@vger.

Re: [Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread Julien Grall
On 13/06/16 13:41, Julien Grall wrote: Hello Paul, On 13/06/16 13:12, Paul Durrant wrote: -Original Message- From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Julien Grall Sent: 13 June 2016 11:51 To: boris.ostrov...@oracle.com; David Vrabel; jgr...@suse.com; sstab

Re: [Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread Julien Grall
Hello Paul, On 13/06/16 13:12, Paul Durrant wrote: -Original Message- From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Julien Grall Sent: 13 June 2016 11:51 To: boris.ostrov...@oracle.com; David Vrabel; jgr...@suse.com; sstabell...@kernel.org; konrad.w...@oracle.com

Re: [Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread Paul Durrant
> -Original Message- > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of > Julien Grall > Sent: 13 June 2016 12:10 > To: David Vrabel; boris.ostrov...@oracle.com; jgr...@suse.com; > sstabell...@kernel.org; konrad.w...@oracle.com > Cc: Andrew Cooper; steve.cap...@arm.com;

Re: [Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread Paul Durrant
> -Original Message- > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of > Julien Grall > Sent: 13 June 2016 11:51 > To: boris.ostrov...@oracle.com; David Vrabel; jgr...@suse.com; > sstabell...@kernel.org; konrad.w...@oracle.com > Cc: steve.cap...@arm.com; Andrew Cooper;

[Xen-devel] [linux-3.14 test] 95585: regressions - trouble: blocked/broken/fail/pass

2016-06-13 Thread osstest service owner
flight 95585 linux-3.14 real [real] http://logs.test-lab.xenproject.org/osstest/logs/95585/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-amd 13 xen-boot/l1 fail REGR. vs. 95164 test-amd64-amd64-qemuu

Re: [Xen-devel] [PATCH 0/2] Validate host VMX MSRs before accessing them

2016-06-13 Thread Andrew Cooper
On 09/06/16 11:14, Euan Harris wrote: > nvmx_msr_read_intercept() does not check the prerequisites before > accessing MSR_IA32_VMX_PROCBASED_CTLS2, MSR_IA32_VMX_EPT_VPID_CAP, > MSR_IA32_VMX_VMFUNC on the host. Accessing these MSRs from a nested > VMX guest running on a host which does not support

Re: [Xen-devel] [PULL 0/2] xen-20160613-tag

2016-06-13 Thread Peter Maydell
ble in the git repository at: > > > git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xen-20160613-tag > > for you to fetch changes up to 88c16567d2cd23da328787187910b013ee43ebca: > > Introduce &q

Re: [Xen-devel] [PULL 0/2] xen-20160613-tag

2016-06-13 Thread Jan Beulich
the git repository at: > > > git://xenbits.xen.org/people/sstabellini/qemu-dm.git tags/xen-20160613-tag > > for you to fetch changes up to 88c16567d2cd23da328787187910b013ee43ebca: > > Introduce "xen-load-devices-state" (2016-06-13 11:50:53 +0100) > > ---

Re: [Xen-devel] [RFC 0/8] xen/arm: acpi: Support SPIs routing

2016-06-13 Thread Julien Grall
On 08/06/16 13:34, Julien Grall wrote: On 08/06/16 13:11, Shanker Donthineni wrote: I don't know exactly which of the patch causing the issue. I have noticed a couple of drivers are not receiving SPI interrupts in DOM0. I need to digest your patches before tracing/investigate the problem to ge

[Xen-devel] [xen-unstable test] 95612: trouble: preparing/queued

2016-06-13 Thread osstest service owner
flight 95612 xen-unstable running [real] http://logs.test-lab.xenproject.org/osstest/logs/95612/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-rumpuserxen-amd64 queued test-amd64-i386-

[Xen-devel] [xen-4.7-testing test] 95625: trouble: preparing/queued

2016-06-13 Thread osstest service owner
flight 95625 xen-4.7-testing running [real] http://logs.test-lab.xenproject.org/osstest/logs/95625/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rumpuserxen-i386 queued test-amd64-amd6

Re: [Xen-devel] [xen-4.1.6.1] SIGSEGV libxc/xc_save_domain.c: p2m_size >> configured_ram_size

2016-06-13 Thread Philipp Hahn
Hello Georg, first of all thank you for answering. Am 13.06.2016 um 12:15 schrieb George Dunlap: > On Fri, Jun 10, 2016 at 4:22 PM, Philipp Hahn wrote: >> while trying to live migrate some VMs from an xen-4.1.6.1 host "xc_save" >> crashes with a segmentation fault in tools/libxc/xc_domain_save.c

Re: [Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread Julien Grall
Hi David, On 13/06/16 11:57, David Vrabel wrote: On 13/06/16 11:50, Julien Grall wrote: The version 1 of the grant-table protocol only supports frame encoded on 32-bit. When the platform is supporting 48-bit physical address, the frame will be encoded on 36-bit which will lead a truncation and

Re: [Xen-devel] [PATCH v2 2/2] qdisk - hw/block/xen_disk: grant copy implementation

2016-06-13 Thread David Vrabel
On 13/06/16 11:44, Paulina Szubarczyk wrote: > On Mon, 2016-06-13 at 11:15 +0100, David Vrabel wrote: >> On 13/06/16 10:43, Paulina Szubarczyk wrote: >>> Copy data operated on during request from/to local buffers to/from >>> the grant references. >>> >>> Before grant copy operation local buffers

Re: [Xen-devel] [PATCH 1/3] Don't accept fuzz when patching

2016-06-13 Thread George Dunlap
On Mon, Jun 13, 2016 at 11:16 AM, Andrew Cooper wrote: > On 13/06/16 11:08, George Dunlap wrote: >> On Fri, Jun 10, 2016 at 12:02 PM, Ross Lagerwall >> wrote: >>> When testing and applying patches, set fuzz=0 so that patches must apply >>> exactly. Also set "-f" to avoid interactive questions, a

[Xen-devel] [PULL 1/2] exec: Fix qemu_ram_block_from_host for Xen

2016-06-13 Thread Stefano Stabellini
From: Anthony PERARD Since f615f39 (exec: remove ram_addr argument from qemu_ram_block_from_host), migration under Xen is likely to fail, with a SEGV of QEMU. But the commit only reveal a bug with the calculation of the offset value in qemu_ram_block_from_host(). This patch calculates the offset

[Xen-devel] [PULL 2/2] Introduce "xen-load-devices-state"

2016-06-13 Thread Stefano Stabellini
From: Wen Congyang Introduce a "xen-load-devices-state" QAPI command that can be used to load the state of all devices, but not the RAM or the block devices of the VM. We only have hmp commands savevm/loadvm, and qmp commands xen-save-devices-state. We use this new command for COLO: 1. suspend

Re: [Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread David Vrabel
On 13/06/16 11:50, Julien Grall wrote: > The version 1 of the grant-table protocol only supports frame encoded on > 32-bit. > > When the platform is supporting 48-bit physical address, the frame will > be encoded on 36-bit which will lead a truncation and give access to > the wrong frame. > > On

[Xen-devel] [PULL 0/2] xen-20160613-tag

2016-06-13 Thread Stefano Stabellini
t tags/xen-20160613-tag for you to fetch changes up to 88c16567d2cd23da328787187910b013ee43ebca: Introduce "xen-load-devices-state" (2016-06-13 11:50:53 +0100) ---

[Xen-devel] [PATCH] xen: grant-table: Check truncation when giving access to a frame

2016-06-13 Thread Julien Grall
The version 1 of the grant-table protocol only supports frame encoded on 32-bit. When the platform is supporting 48-bit physical address, the frame will be encoded on 36-bit which will lead a truncation and give access to the wrong frame. On ARM Xen will always allow the guest to use all the phys

  1   2   >