[Xen-devel] Why cast to "signed short" before checking the return value of gnttab_claim_grant_reference() in xen-netfront.c?

2016-10-27 Thread Dongli Zhang
Hi, Would anyone please help with a question on xen-netfront.c code? In xen-netfront.c, the return value of gnttab_claim_grant_reference() is checked with "BUG_ON((signed short)ref < 0);". Why we use signed short here while the return value is of uint32_t? Am I missing anything or can I send a

[Xen-devel] [seabios test] 101716: tolerable FAIL - PUSHED

2016-10-27 Thread osstest service owner
flight 101716 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/101716/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 101690 test-amd64-amd64-xl-qemuu-win7-a

[Xen-devel] [linux-3.18 baseline-only test] 67943: tolerable FAIL

2016-10-27 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67943 linux-3.18 real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67943/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/

[Xen-devel] [PATCH v6 04/11] powerpc/spinlock: support vcpu preempted check

2016-10-27 Thread Pan Xinhui
This is to fix some lock holder preemption issues. Some other locks implementation do a spin loop before acquiring the lock itself. Currently kernel has an interface of bool vcpu_is_preempted(int cpu). It takes the cpu as parameter and return true if the cpu is preempted. Then kernel can break the

[Xen-devel] [PATCH v6 08/11] x86, kvm/x86.c: support vcpu preempted check

2016-10-27 Thread Pan Xinhui
Support the vcpu_is_preempted() functionality under KVM. This will enhance lock performance on overcommitted hosts (more runnable vcpus than physical cpus in the system) as doing busy waits for preempted vcpus will hurt system performance far worse than early yielding. Use one field of struct kvm_

[Xen-devel] [PATCH v6 06/11] x86, paravirt: Add interface to support kvm/xen vcpu preempted check

2016-10-27 Thread Pan Xinhui
This is to fix some lock holder preemption issues. Some other locks implementation do a spin loop before acquiring the lock itself. Currently kernel has an interface of bool vcpu_is_preempted(int cpu). It takes the cpu as parameter and return true if the cpu is preempted. Then kernel can break the

[Xen-devel] [PATCH v6 00/11] implement vcpu preempted check

2016-10-27 Thread Pan Xinhui
change from v5: spilt x86/kvm patch into guest/host part. introduce kvm_write_guest_offset_cached. fix some typos. rebase patch onto 4.9.2 change from v4: spilt x86 kvm vcpu preempted check into two patches. add documentation patch. add x86 vc

[Xen-devel] [PATCH v6 01/11] kernel/sched: introduce vcpu preempted check interface

2016-10-27 Thread Pan Xinhui
This patch support to fix lock holder preemption issue. For kernel users, we could use bool vcpu_is_preempted(int cpu) to detech if one vcpu is preempted or not. The default implementation is a macro defined by false. So compiler can wrap it out if arch dose not support such vcpu pteempted check.

[Xen-devel] [PATCH v6 11/11] Documentation: virtual: kvm: Support vcpu preempted check

2016-10-27 Thread Pan Xinhui
Commit ("x86, kvm: support vcpu preempted check") add one field "__u8 preempted" into struct kvm_steal_time. This field tells if one vcpu is running or not. It is zero if 1) some old KVM deos not support this filed. 2) the vcpu is not preempted. Other values means the vcpu has been preempted. Sig

[Xen-devel] [PATCH v6 10/11] x86, xen: support vcpu preempted check

2016-10-27 Thread Pan Xinhui
From: Juergen Gross Support the vcpu_is_preempted() functionality under Xen. This will enhance lock performance on overcommitted hosts (more runnable vcpus than physical cpus in the system) as doing busy waits for preempted vcpus will hurt system performance far worse than early yielding. A quic

[Xen-devel] [PATCH v6 09/11] x86, kernel/kvm.c: support vcpu preempted check

2016-10-27 Thread Pan Xinhui
Support the vcpu_is_preempted() functionality under KVM. This will enhance lock performance on overcommitted hosts (more runnable vcpus than physical cpus in the system) as doing busy waits for preempted vcpus will hurt system performance far worse than early yielding. struct kvm_steal_time::preem

[Xen-devel] [PATCH v6 07/11] KVM: Introduce kvm_write_guest_offset_cached

2016-10-27 Thread Pan Xinhui
It allows us to update some status or field of one struct partially. We can also save one kvm_read_guest_cached if we just update one filed of the struct regardless of its current value. Signed-off-by: Pan Xinhui --- include/linux/kvm_host.h | 2 ++ virt/kvm/kvm_main.c | 20 ++

[Xen-devel] [PATCH v6 05/11] s390/spinlock: Provide vcpu_is_preempted

2016-10-27 Thread Pan Xinhui
From: Christian Borntraeger this implements the s390 backend for commit "kernel/sched: introduce vcpu preempted check interface" by reworking the existing smp_vcpu_scheduled into arch_vcpu_is_preempted. We can then also get rid of the local cpu_is_preempted function by moving the CIF_ENABLED_WAIT

[Xen-devel] [PATCH v6 03/11] kernel/locking: Drop the overload of {mutex, rwsem}_spin_on_owner

2016-10-27 Thread Pan Xinhui
An over-committed guest with more vCPUs than pCPUs has a heavy overload in the two spin_on_owner. This blames on the lock holder preemption issue. Kernel has an interface bool vcpu_is_preempted(int cpu) to see if a vCPU is currently running or not. So break the spin loops on true condition. test-

[Xen-devel] [PATCH v6 02/11] locking/osq: Drop the overload of osq_lock()

2016-10-27 Thread Pan Xinhui
An over-committed guest with more vCPUs than pCPUs has a heavy overload in osq_lock(). This is because vCPU A hold the osq lock and yield out, vCPU B wait per_cpu node->locked to be set. IOW, vCPU B wait vCPU A to run and unlock the osq lock. Kernel has an interface bool vcpu_is_preempted(int cpu

[Xen-devel] [linux-4.1 test] 101715: regressions - FAIL

2016-10-27 Thread osstest service owner
flight 101715 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/101715/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-xsm 13 saverestore-support-check fail REGR. vs. 101401 test-armhf-armhf-lib

[Xen-devel] Error migrating VM to secondary host using COLO replication

2016-10-27 Thread Sadi
Hello, I've been trying to set COLO replication to work but i'm stuck on a problem when migrating de primary VM to secondary host. I have been following the instructions from this wiki - http://wiki.xenproject.org/wiki/COLO_-_Coarse_Grain_Lock_Stepping and this mail thread - http://xen.markma

[Xen-devel] [seabios baseline-only test] 67944: regressions - FAIL

2016-10-27 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67944 seabios real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67944/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 9 windows-i

[Xen-devel] [PATCH v6 6/7] VT-d: Some cleanups

2016-10-27 Thread Feng Wu
Use type-safe structure assignment instead of memcpy() Use sizeof(*iremap_entry). Besides that, this patch also handle another cleanup, in msi_msg_to_remap_entry() we don't need to copy all the content of old IRTE to the new IRE, we only need to save the 'IM' field to 'new_ire' if the entry is pres

[Xen-devel] [PATCH v6 4/7] VMX: Make sure PI is in proper state before install the hooks

2016-10-27 Thread Feng Wu
We may hit the last ASSERT() in vmx_vcpu_block in the current code, since vmx_vcpu_block() may get called before vmx_pi_switch_to() has been installed or executed. Here We use cmpxchg to update the NDST field, this can make sure we only update the NDST when vmx_pi_switch_to() has not been called. S

[Xen-devel] [PATCH v6 5/7] VT-d: No need to set irq affinity for posted format IRTE

2016-10-27 Thread Feng Wu
We don't set the affinity for posted format IRTE, since the destination of these interrupts is vCPU and the vCPU affinity is set during vCPU scheduling. Signed-off-by: Feng Wu --- v6: - Make pi_can_suppress_irte_update() a check-only function - Introduce another function pi_get_new_irte() to upda

[Xen-devel] [PATCH v6 1/7] VMX: Permanently assign PI hook vmx_pi_switch_to()

2016-10-27 Thread Feng Wu
PI hook vmx_pi_switch_to() is needed even when any previously assigned device is detached from the domain. Since 'SN' bit is also used to control the CPU side PI and we change the state of SN bit in these two functions, then evaluate this bit in vmx_deliver_posted_intr() when trying to deliver the

[Xen-devel] [PATCH v6 2/7] VMX: Properly handle pi when all the assigned devices are removed

2016-10-27 Thread Feng Wu
This patch handles some corner cases when the last assigned device is removed from the domain. In this case we should carefully handle pi descriptor and the per-cpu blocking list, to make sure: - all the PI descriptor are in the right state when next time a devices is assigned to the domain again.

[Xen-devel] [PATCH v6 3/7] VMX: Cleanup PI per-cpu blocking list when vcpu is destroyed

2016-10-27 Thread Feng Wu
We should remove the vCPU from the per-cpu blocking list if it is going to be destroyed. Signed-off-by: Feng Wu --- v6: - Use vmx_pi_unblock_vcpu() instead of vmx_pi_list_remove() v5: - Use vmx_pi_list_remove() instead of vmx_pi_list_cleanup() v4: - Call vmx_pi_list_cleanup() before vmx_destroy

[Xen-devel] [PATCH v6 0/7] VMX: Properly handle pi descriptor and per-cpu blocking list

2016-10-27 Thread Feng Wu
The current VT-d PI related code may operate incorrectly in the following scenarios: 1. When the last assigned device is dettached from the domain, all the PI related hooks are removed then, however, the vCPU can be blocked, switched to another pCPU, etc, all without the aware of PI. After the next

[Xen-devel] [PATCH v6 7/7] VMX: Fixup PI descriptor when cpu is offline

2016-10-27 Thread Feng Wu
When cpu is offline, we need to move all the vcpus in its blocking list to another online cpu, this patch handles it. Signed-off-by: Feng Wu --- v6: - Carefully suppress 'SN' to avoid missing notification event during moving the vcpu to the new list v5: - Add some comments to explain why it does

Re: [Xen-devel] [RFC PATCH 09/24] ARM: GICv3: forward pending LPIs to guests

2016-10-27 Thread Stefano Stabellini
On Wed, 28 Sep 2016, Andre Przywara wrote: > Upon receiving an LPI, we need to find the right VCPU and virtual IRQ > number to get this IRQ injected. > Iterate our two-level LPI table to find this information quickly when > the host takes an LPI. Call the existing injection function to let the > GI

Re: [Xen-devel] [RFC PATCH 08/24] ARM: GICv3: introduce separate pending_irq structs for LPIs

2016-10-27 Thread Stefano Stabellini
On Wed, 28 Sep 2016, Andre Przywara wrote: > For the same reason that allocating a struct irq_desc for each > possible LPI is not an option, having a struct pending_irq for each LPI > is also not feasible. However we actually only need those when an > interrupt is on a vCPU (or is about to be injec

[Xen-devel] [xtf test] 101718: all pass - PUSHED

2016-10-27 Thread osstest service owner
flight 101718 xtf real [real] http://logs.test-lab.xenproject.org/osstest/logs/101718/ Perfect :-) All tests in this flight passed as required version targeted for testing: xtf 322819a7a9bdee04a7d0a0168550293ab139d8fd baseline version: xtf a78dbe70cd6ea14a02a524

Re: [Xen-devel] [RFC PATCH 07/24] ARM: GICv3 ITS: introduce device mapping

2016-10-27 Thread Stefano Stabellini
On Wed, 28 Sep 2016, Andre Przywara wrote: > The ITS uses device IDs to map LPIs to a device. Dom0 will later use > those IDs, which we directly pass on to the host. > For this we have to map each device that Dom0 may request to a host > ITS device with the same identifier. > Allocate the respectiv

Re: [Xen-devel] [RFC PATCH 06/24] ARM: GICv3 ITS: introduce host LPI array

2016-10-27 Thread Stefano Stabellini
On Wed, 28 Sep 2016, Andre Przywara wrote: > The number of LPIs on a host can be potentially huge (millions), > although in practise will be mostly reasonable. So prematurely allocating > an array of struct irq_desc's for each LPI is not an option. > However Xen itself does not care about LPIs, as

[Xen-devel] [linux-3.10 test] 101707: regressions - FAIL

2016-10-27 Thread osstest service owner
flight 101707 linux-3.10 real [real] http://logs.test-lab.xenproject.org/osstest/logs/101707/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-xsm6 xen-boot fail REGR. vs. 100648 test-amd64-amd64-amd

[Xen-devel] [xen-4.6-testing baseline-only test] 67942: regressions - trouble: blocked/broken/fail/pass

2016-10-27 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67942 xen-4.6-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67942/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-xtf 3 host-install

Re: [Xen-devel] Test Xen 4.8 RC4 not stable 27.10.16

2016-10-27 Thread Juergen Schinker
- On 27 Oct, 2016, at 09:53, Wei Liu wei.l...@citrix.com wrote: > For the second part, xenstored.pid normally would be stored under > /var/run, which should be cleared whenever the system is booted [0]. I know but the /var/run/xenstored.pid stays but anyway RC4 is not so stable - I have r

Re: [Xen-devel] [RFC PATCH 05/24] ARM: GICv3 ITS: introduce ITS command handling

2016-10-27 Thread Stefano Stabellini
On Wed, 26 Oct 2016, Stefano Stabellini wrote: > > +/* ITS command definitions */ > > +#define ITS_CMD_SIZE32 > > + > > +#define GITS_CMD_MOVI 0x01 > > +#define GITS_CMD_INT0x03 > > +#define GITS_CMD_CLEAR 0x04 > > +#define

[Xen-devel] [libvirt test] 101711: regressions - FAIL

2016-10-27 Thread osstest service owner
flight 101711 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/101711/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-raw 14 guest-start/debian.repeat fail REGR. vs. 101677 Regressions which are

[Xen-devel] [ovmf test] 101710: all pass - PUSHED

2016-10-27 Thread osstest service owner
flight 101710 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/101710/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 0a18956d54cfe70b736b029c62ce53f29b903745 baseline version: ovmf 4e908975c645bedd40ac7

[Xen-devel] [qemu-mainline test] 101703: tolerable FAIL - PUSHED

2016-10-27 Thread osstest service owner
flight 101703 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/101703/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-libvirt-xsm 15 guest-start/debian.repeat fail in 101676 pass in 101703 test-armhf-armhf-xl-r

Re: [Xen-devel] [PATCH v2] xenfv: set has_acpi_build to false

2016-10-27 Thread Stefano Stabellini
On Thu, 27 Oct 2016, Sander Eikelenboom wrote: > Thursday, October 27, 2016, 3:51:09 PM, you wrote: > > > Xen's toolstack is in charge of building ACPI tables. Skip ACPI table > > building and loading in QEMU by setting has_acpi_build to false for > > xenfv machine. > > > This issue is discovered

[Xen-devel] [xen-unstable test] 101698: regressions - FAIL

2016-10-27 Thread osstest service owner
flight 101698 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/101698/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-xtf-amd64-amd64-5 44 xtf/test-hvm64-xsa-186 fail REGR. vs. 101673 test-amd64-i386-xl

[Xen-devel] [xen-unstable-smoke test] 101722: tolerable all pass - PUSHED

2016-10-27 Thread osstest service owner
flight 101722 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101722/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [Xen-devel] [PATCH 8/8] xen/pvh: Enable CPU hotplug

2016-10-27 Thread Boris Ostrovsky
On 10/27/2016 11:00 AM, Andrew Cooper wrote: On 27/10/16 15:25, Boris Ostrovsky wrote: On 10/14/2016 03:01 PM, Boris Ostrovsky wrote: On 10/14/2016 02:41 PM, Andrew Cooper wrote: On 14/10/16 19:05, Boris Ostrovsky wrote: PVH guests don't receive ACPI hotplug interrupts and therefore need

Re: [Xen-devel] [PATCH v2 1/5] tasklet: Introduce per-cpu tasklet for softirq.

2016-10-27 Thread Jan Beulich
>>> On 25.08.16 at 21:23, wrote: > This implements a lockless per-cpu tasklet mechanism. How does this correlate with the title? IOW, how is this new form of tasklets "for" softirq? Perhaps part of the sentence above would be a better fit for the title? > The existing tasklet mechanism has a sin

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Roger Pau Monne
On Thu, Oct 27, 2016 at 09:20:00AM -0600, Jan Beulich wrote: > >>> On 27.10.16 at 17:04, wrote: > > I prefer this solution because it seems simpler and less likely to cause > > future issues, but if this seems like too much fuss I can always try to > > place the RSDP on top of the original one a

Re: [Xen-devel] [PATCH v2 6/7] xenstore: add support for reading directory with many children

2016-10-27 Thread Juergen Gross
On 27/10/16 17:00, Juergen Gross wrote: > On 27/10/16 15:56, Jan Beulich wrote: > On 27.10.16 at 11:55, wrote: >>> + /* Offset behind list: just return a list with an empty string. */ >>> + if (off >= node->childlen) { >> >> Is it perhaps worth separating the == and > cases? The former is

Re: [Xen-devel] [PATCH] features: declare the Credit2 scheduler as Supported.

2016-10-27 Thread Dario Faggioli
On Thu, 2016-10-27 at 16:01 +0100, George Dunlap wrote: > On 25/10/16 09:18, Dario Faggioli wrote: > > All this being said, what's the next step? Is there anything more I > > should do, here in this thread? Should we wait for other people to > > weigh in? Should I resend this patch, with a non empt

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Jan Beulich
>>> On 27.10.16 at 17:04, wrote: > I prefer this solution because it seems simpler and less likely to cause > future issues, but if this seems like too much fuss I can always try to > place the RSDP on top of the original one and shadow that page. From the > information I've been able to find o

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Roger Pau Monne
On Thu, Oct 27, 2016 at 10:40:52AM -0400, Boris Ostrovsky wrote: > > > On 10/27/2016 10:30 AM, Jan Beulich wrote: > > > > > On 27.10.16 at 16:15, wrote: > > > On 10/27/2016 10:02 AM, Jan Beulich wrote: > > > > > > > On 27.10.16 at 15:51, wrote: > > > > > I re-read this thread and I am not sure

[Xen-devel] [PATCH v2 for-4.8] x86/hvm: Don't truncate the hvm hypercall index before range checking it

2016-10-27 Thread Andrew Cooper
c/s 5eeca68f introduced the 64bit ABI for HVM guests, and chose to explicitly truncate the index, despite the fact that the `mov $imm32, %eax` in the hypercall page already provides the expected truncation. The truncation isn't very obvious, and is counterintuitive, seeing as all other 64bit param

Re: [Xen-devel] [PATCH] features: declare the Credit2 scheduler as Supported.

2016-10-27 Thread George Dunlap
On 25/10/16 09:18, Dario Faggioli wrote: > On Fri, 2016-10-14 at 11:42 +0100, George Dunlap wrote: >> On 14/10/16 11:17, Dario Faggioli wrote: >>> >>> Signed-off-by: Dario Faggioli >> >> We don't have a general framework for declaring things "supported" >> yet, >> and at the moment we only have a

Re: [Xen-devel] [PATCH 8/8] xen/pvh: Enable CPU hotplug

2016-10-27 Thread Andrew Cooper
On 27/10/16 15:25, Boris Ostrovsky wrote: > > > On 10/14/2016 03:01 PM, Boris Ostrovsky wrote: >> On 10/14/2016 02:41 PM, Andrew Cooper wrote: >>> On 14/10/16 19:05, Boris Ostrovsky wrote: PVH guests don't receive ACPI hotplug interrupts and therefore need to monitor xenstore for CPU hotp

Re: [Xen-devel] [PATCH v2 6/7] xenstore: add support for reading directory with many children

2016-10-27 Thread Juergen Gross
On 27/10/16 15:56, Jan Beulich wrote: On 27.10.16 at 11:55, wrote: >> +static void send_directory_part(struct connection *conn, >> +struct buffered_data *in) >> +{ >> +unsigned int off, len, maxlen, genlen; >> +char *name, *child, *data; >> +struct node

Re: [Xen-devel] [PATCH v2] xenfv: set has_acpi_build to false

2016-10-27 Thread Sander Eikelenboom
Thursday, October 27, 2016, 3:51:09 PM, you wrote: > Xen's toolstack is in charge of building ACPI tables. Skip ACPI table > building and loading in QEMU by setting has_acpi_build to false for > xenfv machine. > This issue is discovered due to direct kernel boot on Xen doesn't boot > anymore, be

Re: [Xen-devel] [GRUB2 PATCH v6 0/4] multiboot2: Add two extensions

2016-10-27 Thread Daniel Kiper
On Wed, Mar 30, 2016 at 05:06:15PM +0200, Daniel Kiper wrote: > Hi, > > This patch series: > - enables EFI boot services usage in loaded images > by multiboot2 protocol, > - add support for multiboot2 protocol compatible > relocatable images. FYI, applied... Daniel __

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Boris Ostrovsky
On 10/27/2016 10:30 AM, Jan Beulich wrote: On 27.10.16 at 16:15, wrote: On 10/27/2016 10:02 AM, Jan Beulich wrote: On 27.10.16 at 15:51, wrote: I re-read this thread and I am not sure I understand why we can't keep host's RSDP descriptor. We are not mapping dom0 memory 1:1 (right?) so we c

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Jan Beulich
>>> On 27.10.16 at 16:15, wrote: > On 10/27/2016 10:02 AM, Jan Beulich wrote: > On 27.10.16 at 15:51, wrote: >>> I re-read this thread and I am not sure I understand why we can't keep >>> host's RSDP descriptor. We are not mapping dom0 memory 1:1 (right?) so >>> we can place our versions of R

Re: [Xen-devel] [PATCH v7 00/11] grub-xen: support booting huge pv-domains

2016-10-27 Thread Daniel Kiper
Hi Juergen, On Mon, Oct 17, 2016 at 08:52:58AM +0200, Daniel Kiper wrote: > On Tue, Oct 11, 2016 at 04:00:58PM +0200, Juergen Gross wrote: > > On 04/07/16 12:53, Daniel Kiper wrote: > > > On Mon, Jul 04, 2016 at 12:33:17PM +0200, Juergen Gross wrote: > > >> On 12/05/16 07:35, Juergen Gross wrote:

[Xen-devel] Xen on Qualcomm platform

2016-10-27 Thread Suresh Kanzariya
Hi, I have used xen on Ubuntu platform and have run different linux distro as guest OS. Now I am trying to port xen on Qualcomm 410 platform, so before I begin, just wanted to know that is it possible to port xen on Qualcomm platform? I have seen this post https://lists.xenproject.org/archives/h

Re: [Xen-devel] [PATCH 8/8] xen/pvh: Enable CPU hotplug

2016-10-27 Thread Boris Ostrovsky
On 10/14/2016 03:01 PM, Boris Ostrovsky wrote: On 10/14/2016 02:41 PM, Andrew Cooper wrote: On 14/10/16 19:05, Boris Ostrovsky wrote: PVH guests don't receive ACPI hotplug interrupts and therefore need to monitor xenstore for CPU hotplug event. Why not? If they don't, they should. As we ar

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Boris Ostrovsky
On 10/27/2016 10:02 AM, Jan Beulich wrote: On 27.10.16 at 15:51, wrote: I re-read this thread and I am not sure I understand why we can't keep host's RSDP descriptor. We are not mapping dom0 memory 1:1 (right?) so we can place our versions of RSDT/XSDT at the address that the descriptor point

[Xen-devel] [linux-3.4 test] 101695: regressions - FAIL

2016-10-27 Thread osstest service owner
flight 101695 linux-3.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/101695/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-intel 6 xen-boot fail REGR. vs. 92983 test-amd64-i386-xl-qe

Re: [Xen-devel] [Qemu-devel] [PATCH v2] xenfv: set has_acpi_build to false

2016-10-27 Thread Igor Mammedov
On Thu, 27 Oct 2016 14:51:09 +0100 Wei Liu wrote: > Xen's toolstack is in charge of building ACPI tables. Skip ACPI table > building and loading in QEMU by setting has_acpi_build to false for > xenfv machine. > > This issue is discovered due to direct kernel boot on Xen doesn't boot > anymore, b

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Jan Beulich
>>> On 27.10.16 at 15:51, wrote: > I re-read this thread and I am not sure I understand why we can't keep > host's RSDP descriptor. We are not mapping dom0 memory 1:1 (right?) so > we can place our versions of RSDT/XSDT at the address that the > descriptor points to. > > Unless that address is

Re: [Xen-devel] Test Xen 4.8 RC4 SUCCESS 26.10.16

2016-10-27 Thread Dario Faggioli
On Wed, 2016-10-26 at 19:47 +0100, Juergen Schinker wrote: > * Hardware: >  Intel(R) Xeon(R) CPU E3-1220L V2 @ 2.30GHz >  Sandisk SSD >  32G Ram > * Software: > > Debian Stretch/testing is dom0 >   > * Guest operating systems: > > Guests Ubuntu 14.04 LTS Debian Stretch/Sid  > > Ubuntu 16.10 yaki

[Xen-devel] [PATCH v2 6/7] xenstore: add support for reading directory with many children

2016-10-27 Thread Jan Beulich
>>> On 27.10.16 at 11:55, wrote: > +static void send_directory_part(struct connection *conn, > + struct buffered_data *in) > +{ > + unsigned int off, len, maxlen, genlen; > + char *name, *child, *data; > + struct node *node; > + char gen[24]; > + > +

[Xen-devel] [PATCH v2] xenfv: set has_acpi_build to false

2016-10-27 Thread Wei Liu
Xen's toolstack is in charge of building ACPI tables. Skip ACPI table building and loading in QEMU by setting has_acpi_build to false for xenfv machine. This issue is discovered due to direct kernel boot on Xen doesn't boot anymore, because the new ACPI tables cause the guest to exceed its memory

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Boris Ostrovsky
On 10/27/2016 07:13 AM, Roger Pau Monne wrote: On Wed, Oct 26, 2016 at 01:14:16PM -0400, Boris Ostrovsky wrote: I've initially used a back-listing approach. We can always change this later on. So I've ended up crafting a new MADT, XSDT and RSDP. Note that I'm not crafting a new custom RSDT

Re: [Xen-devel] [PATCH] xen:rtds: Update last_start whenever cur_budget is updated

2016-10-27 Thread Meng Xu
Sorry, I accidentally sent out the previous email... On Thu, Oct 27, 2016 at 6:03 AM, Wei Liu wrote: > On Thu, Oct 27, 2016 at 11:14:36AM +0200, Dario Faggioli wrote: >> On Wed, 2016-10-26 at 15:06 -0400, Meng Xu wrote: >> > We keep last_start updated whenever cur_budget is updated. >> > This avo

Re: [Xen-devel] [PATCH] xen:rtds: Update last_start whenever cur_budget is updated

2016-10-27 Thread Wei Liu
On Thu, Oct 27, 2016 at 09:42:56AM -0400, Meng Xu wrote: > Sorry, I accidentally sent out the previous email... > > On Thu, Oct 27, 2016 at 6:03 AM, Wei Liu wrote: > > On Thu, Oct 27, 2016 at 11:14:36AM +0200, Dario Faggioli wrote: > >> On Wed, 2016-10-26 at 15:06 -0400, Meng Xu wrote: > >> > We

Re: [Xen-devel] [PATCH] xen:rtds: Update last_start whenever cur_budget is updated

2016-10-27 Thread Meng Xu
Hi Wei and Dario, On Thu, Oct 27, 2016 at 6:03 AM, Wei Liu wrote: > On Thu, Oct 27, 2016 at 11:14:36AM +0200, Dario Faggioli wrote: >> On Wed, 2016-10-26 at 15:06 -0400, Meng Xu wrote: >> > We keep last_start updated whenever cur_budget is updated. >> > This avoids subtle bugs in case burn_budge

Re: [Xen-devel] [PATCH] RFC x86/hvm: Don't truncate the hvm hypercall index before range checking it

2016-10-27 Thread Jan Beulich
>>> On 27.10.16 at 14:55, wrote: > On 27/10/16 08:12, Jan Beulich wrote: > On 26.10.16 at 20:19, wrote: >>> On 24/10/16 12:13, Jan Beulich wrote: >>> On 24.10.16 at 12:25, wrote: > Yes we very much are at liberty to change things. Viridian would not > function without using that

[Xen-devel] [xen-unstable-smoke test] 101717: tolerable all pass - PUSHED

2016-10-27 Thread osstest service owner
flight 101717 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101717/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [Xen-devel] [Qemu-devel] [PATCH RFC] acpi: don't build acpi tables for xen hvm guests

2016-10-27 Thread Igor Mammedov
On Thu, 27 Oct 2016 12:29:58 +0100 Wei Liu wrote: > On Thu, Oct 27, 2016 at 01:26:49PM +0200, Igor Mammedov wrote: > > On Thu, 27 Oct 2016 12:10:58 +0100 > > Wei Liu wrote: > > > > > On Thu, Oct 27, 2016 at 12:03:42PM +0100, Wei Liu wrote: > > > > Cc Sander > > > > > > > > On Thu, Oct 27,

[Xen-devel] [distros-debian-wheezy test] 67941: all pass

2016-10-27 Thread Platform Team regression test user
flight 67941 distros-debian-wheezy real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67941/ Perfect :-) All tests in this flight passed as required baseline version: flight 67913 jobs: build-amd64 pass build-armh

Re: [Xen-devel] [PATCH] RFC x86/hvm: Don't truncate the hvm hypercall index before range checking it

2016-10-27 Thread Andrew Cooper
On 27/10/16 08:12, Jan Beulich wrote: On 26.10.16 at 20:19, wrote: >> On 24/10/16 12:13, Jan Beulich wrote: >> On 24.10.16 at 12:25, wrote: Yes we very much are at liberty to change things. Viridian would not function without using that page (as the hypercalls would be confuse

Re: [Xen-devel] purpose of struct buf_ioreq's dir field

2016-10-27 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 27 October 2016 12:38 > To: xen-devel > Cc: Paul Durrant > Subject: purpose of struct buf_ioreq's dir field > > Hello, > > can anyone shed some light on the purpose of that field? Since > buffered ioreq-s by the

[Xen-devel] purpose of struct buf_ioreq's dir field

2016-10-27 Thread Jan Beulich
Hello, can anyone shed some light on the purpose of that field? Since buffered ioreq-s by their nature don't have any response, I don't see what good they can be for when not doing writes. Thanks, Jan ___ Xen-devel mailing list Xen-devel@lists.xen.org

Re: [Xen-devel] [Qemu-devel] [PATCH RFC] acpi: don't build acpi tables for xen hvm guests

2016-10-27 Thread Wei Liu
On Thu, Oct 27, 2016 at 01:26:49PM +0200, Igor Mammedov wrote: > On Thu, 27 Oct 2016 12:10:58 +0100 > Wei Liu wrote: > > > On Thu, Oct 27, 2016 at 12:03:42PM +0100, Wei Liu wrote: > > > Cc Sander > > > > > > On Thu, Oct 27, 2016 at 12:54:02PM +0200, Igor Mammedov wrote: > > > > On Wed, 26 Oct

Re: [Xen-devel] [Qemu-devel] [PATCH RFC] acpi: don't build acpi tables for xen hvm guests

2016-10-27 Thread Igor Mammedov
On Thu, 27 Oct 2016 12:10:58 +0100 Wei Liu wrote: > On Thu, Oct 27, 2016 at 12:03:42PM +0100, Wei Liu wrote: > > Cc Sander > > > > On Thu, Oct 27, 2016 at 12:54:02PM +0200, Igor Mammedov wrote: > > > On Wed, 26 Oct 2016 16:22:34 +0100 > > > Wei Liu wrote: > > > > > > > On Wed, Oct 26, 2016

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Jan Beulich
>>> On 27.10.16 at 13:13, wrote: > On Wed, Oct 26, 2016 at 01:14:16PM -0400, Boris Ostrovsky wrote: >> I've initially used a back-listing approach. We can always change this >> later >> on. >> >> So I've ended up crafting a new MADT, XSDT and RSDP. Note that I'm not >>

Re: [Xen-devel] [Qemu-devel] [PATCH RFC] acpi: don't build acpi tables for xen hvm guests

2016-10-27 Thread Igor Mammedov
On Wed, 26 Oct 2016 16:22:34 +0100 Wei Liu wrote: > On Wed, Oct 26, 2016 at 05:09:52PM +0200, Igor Mammedov wrote: > > On Tue, 25 Oct 2016 18:28:04 +0100 > > Wei Liu wrote: > > > > > Xen's toolstack is in charge of building ACPI tables. Skip acpi table > > > building if running on Xen. > > >

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Roger Pau Monne
On Wed, Oct 26, 2016 at 01:14:16PM -0400, Boris Ostrovsky wrote: > > I've initially used a back-listing approach. We can always change this > later > on. > > So I've ended up crafting a new MADT, XSDT and RSDP. Note that I'm not > crafting a new custom RSDT (and in

Re: [Xen-devel] [Qemu-devel] [PATCH RFC] acpi: don't build acpi tables for xen hvm guests

2016-10-27 Thread Wei Liu
On Thu, Oct 27, 2016 at 12:03:42PM +0100, Wei Liu wrote: > Cc Sander > > On Thu, Oct 27, 2016 at 12:54:02PM +0200, Igor Mammedov wrote: > > On Wed, 26 Oct 2016 16:22:34 +0100 > > Wei Liu wrote: > > > > > On Wed, Oct 26, 2016 at 05:09:52PM +0200, Igor Mammedov wrote: > > > > On Tue, 25 Oct 2016 1

Re: [Xen-devel] [PATCH v2 18/30] xen/x86: setup PVHv2 Dom0 ACPI tables

2016-10-27 Thread Roger Pau Monne
On Thu, Oct 27, 2016 at 01:25:40AM -0600, Jan Beulich wrote: > >>> On 26.10.16 at 18:03, wrote: > > On Wed, Oct 26, 2016 at 09:16:55AM -0600, Jan Beulich wrote: > >> >>> On 26.10.16 at 17:08, wrote: > >> > On Wed, Oct 26, 2016 at 08:10:50AM -0600, Jan Beulich wrote: > >> >> >>> On 26.10.16 at 13:

Re: [Xen-devel] [Qemu-devel] [PATCH RFC] acpi: don't build acpi tables for xen hvm guests

2016-10-27 Thread Wei Liu
Cc Sander On Thu, Oct 27, 2016 at 12:54:02PM +0200, Igor Mammedov wrote: > On Wed, 26 Oct 2016 16:22:34 +0100 > Wei Liu wrote: > > > On Wed, Oct 26, 2016 at 05:09:52PM +0200, Igor Mammedov wrote: > > > On Tue, 25 Oct 2016 18:28:04 +0100 > > > Wei Liu wrote: > > > > > > > Xen's toolstack is i

Re: [Xen-devel] [Qemu-devel] [PATCH RFC] acpi: don't build acpi tables for xen hvm guests

2016-10-27 Thread Igor Mammedov
On Wed, 26 Oct 2016 16:22:34 +0100 Wei Liu wrote: > On Wed, Oct 26, 2016 at 05:09:52PM +0200, Igor Mammedov wrote: > > On Tue, 25 Oct 2016 18:28:04 +0100 > > Wei Liu wrote: > > > > > Xen's toolstack is in charge of building ACPI tables. Skip acpi table > > > building if running on Xen. > > >

[Xen-devel] [seabios test] 101690: tolerable FAIL - PUSHED

2016-10-27 Thread osstest service owner
flight 101690 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/101690/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 101666 test-amd64-amd64-xl-qemuu-win7-a

[Xen-devel] [xen-4.7-testing test] 101713: trouble: preparing/queued

2016-10-27 Thread osstest service owner
flight 101713 xen-4.7-testing running [real] http://logs.test-lab.xenproject.org/osstest/logs/101713/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-rtds queued test-amd64-amd64-

[Xen-devel] [linux-3.18 test] 101700: trouble: blocked/fail/pass/preparing

2016-10-27 Thread osstest service owner
flight 101700 linux-3.18 running [real] http://logs.test-lab.xenproject.org/osstest/logs/101700/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-xsm 2 hosts-allocate running test-a

[Xen-devel] [xen-4.6-testing test] 101705: trouble: preparing/queued

2016-10-27 Thread osstest service owner
flight 101705 xen-4.6-testing running [real] http://logs.test-lab.xenproject.org/osstest/logs/101705/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-rtds queued test-amd64-amd64-

Re: [Xen-devel] [linux-3.18 test] 101675: regressions - FAIL

2016-10-27 Thread Ian Jackson
osstest service owner writes ("[linux-3.18 test] 101675: regressions - FAIL"): > flight 101675 linux-3.18 real [real] > http://logs.test-lab.xenproject.org/osstest/logs/101675/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-

Re: [Xen-devel] [PATCH v2 1/7] xenstore: fix add_change_node()

2016-10-27 Thread Juergen Gross
On 27/10/16 12:15, Wei Liu wrote: > On Thu, Oct 27, 2016 at 11:55:52AM +0200, Juergen Gross wrote: >> add_change_node() in xenstored is used to add a modified node to the >> list of changed nodes of one transaction. It is being called with the >> recurse parameter set to true when removing a node i

Re: [Xen-devel] [xen-4.6-testing test] 101679: regressions - FAIL

2016-10-27 Thread Ian Jackson
Jan Beulich writes ("Re: [Xen-devel] [xen-4.6-testing test] 101679: regressions - FAIL"): > Aren't these the failures you alluded to in an earlier mail would need > force pushing? If so, same for 4.7 flight 101683? Indeed they are. Ian. ___ Xen-devel

Re: [Xen-devel] [xen-4.7-testing test] 101683: regressions - FAIL

2016-10-27 Thread Ian Jackson
osstest service owner writes ("[xen-4.7-testing test] 101683: regressions - FAIL"): > flight 101683 xen-4.7-testing real [real] > http://logs.test-lab.xenproject.org/osstest/logs/101683/ > > Regressions :-( ... > > Tests which did not succeed and are blocking, > including tests which could not b

Re: [Xen-devel] [xen-4.6-testing test] 101679: regressions - FAIL

2016-10-27 Thread Ian Jackson
osstest service owner writes ("[xen-4.6-testing test] 101679: regressions - FAIL"): > flight 101679 xen-4.6-testing real [real] > http://logs.test-lab.xenproject.org/osstest/logs/101679/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be ru

Re: [Xen-devel] [PATCH v2 1/7] xenstore: fix add_change_node()

2016-10-27 Thread Wei Liu
On Thu, Oct 27, 2016 at 11:55:52AM +0200, Juergen Gross wrote: > add_change_node() in xenstored is used to add a modified node to the > list of changed nodes of one transaction. It is being called with the > recurse parameter set to true when removing a node in order to get > watches for children o

Re: [Xen-devel] [PATCH] xen:rtds: Update last_start whenever cur_budget is updated

2016-10-27 Thread Wei Liu
On Thu, Oct 27, 2016 at 11:14:36AM +0200, Dario Faggioli wrote: > On Wed, 2016-10-26 at 15:06 -0400, Meng Xu wrote: > > We keep last_start updated whenever cur_budget is updated. > > This avoids subtle bugs in case burn_budget() will be called > > in other places in the future. > > > I'd change th

Re: [Xen-devel] [PATCH v3] xen:rtds: Fix bug in budget accounting

2016-10-27 Thread Wei Liu
On Thu, Oct 27, 2016 at 10:54:23AM +0200, Dario Faggioli wrote: > On Wed, 2016-10-26 at 15:06 -0400, Meng Xu wrote: > > Fix: > > We keeps last_start always within the current period for a VCPU, so > > that > > we only deduct the time spent in the current period from the VCPU > > budget. > > We alwa

[Xen-devel] [linux-4.1 test] 101687: regressions - FAIL

2016-10-27 Thread osstest service owner
flight 101687 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/101687/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-xsm 13 saverestore-support-check fail REGR. vs. 101401 test-armhf-armhf-lib

[Xen-devel] [PATCH v2 7/7] xenstore: support XS_DIRECTORY_PART in libxenstore

2016-10-27 Thread Juergen Gross
This will enable all users of libxenstore to handle xenstore nodes with a huge amount of children. In order to not depend completely on the XS_DIRECTORY_PART functionality use it only in case of E2BIG returned by XS_DIRECTORY. Signed-off-by: Juergen Gross --- tools/xenstore/xs.c | 80 ++

  1   2   >