Re: [Xen-devel] Page Table

2015-10-20 Thread George Dunlap
On Sun, Oct 18, 2015 at 8:26 PM, Gohar Irfan wrote: > Where does Xen maintain the page table for each VM? The mapping of page > number to frame numbers, basically. Every domain has a structure called a "p2m table" (physical-to-machine). For HVM guests, this is kept only in the hypervisor; for PV

[Xen-devel] Question

2015-10-20 Thread TAE HO MOON
Hi there, it's my first question on Xen-devel email list. I am glad to join here. Could anybody guide me to some pointers on interrupt delivery procedure for PV? I tried to understand the way Xen delivers the interrupt by using xentrace. I followed *do_IRQ* function but I am lost. I want to know

Re: [Xen-devel] PRI_stime

2015-10-20 Thread George Dunlap
On Tue, Oct 20, 2015 at 7:26 AM, Jan Beulich wrote: > George, Dario, > > it being mostly used in scheduler code, and me considering it quite a > bit easier to compare such big numbers when shown in hex I wonder: > Do you prefer this to stay PRId64, or would you accept it to be > changed to PRIx64

[Xen-devel] [V7 0/4] add xsaves/xrstors support

2015-10-20 Thread Shuai Ruan
From: Shuai Ruan Changes in v7: * Address comments form Jan,Andrew: * Move macro XSTATE_FIXUP into patch3. * Change lazy write to xss_msr in patch1. * Drop inner set of brackets and stray cast in patch2. * Move the condition and memcpy() wouldn't into the new called functions in patch2. * Rebase

[Xen-devel] [V7 3/4] x86/xsaves: enable xsaves/xrstors for hvm guest

2015-10-20 Thread Shuai Ruan
This patch enables xsaves for hvm guest, includes: 1.handle xsaves vmcs init and vmexit. 2.add logic to write/read the XSS msr. Signed-off-by: Shuai Ruan Reviewed-by: Andrew Cooper --- xen/arch/x86/hvm/hvm.c | 27 +++ xen/arch/x86/hvm/vmx/vmcs.c| 5 +

[Xen-devel] [V7 2/4] x86/xsaves: enable xsaves/xrstors/xsavec in xen

2015-10-20 Thread Shuai Ruan
This patch uses xsaves/xrstors/xsavec instead of xsaveopt/xrstor to perform the xsave_area switching so that xen itself can benefit from them when available. For xsaves/xrstors/xsavec only use compact format. Add format conversion support when perform guest os migration. Also, pv guest will not s

[Xen-devel] [V7 4/4] libxc: expose xsaves/xgetbv1/xsavec to hvm guest

2015-10-20 Thread Shuai Ruan
From: Shuai Ruan This patch exposes xsaves/xgetbv1/xsavec to hvm guest. The reserved bits of eax/ebx/ecx/edx must be cleaned up when call cpuid(0dh) with leaf 1 or 2..63. According to the spec the following bits must be reserved: For leaf 1, bits 03-04/08-31 of ecx is reserved. Edx is reserved.

Re: [Xen-devel] PRI_stime

2015-10-20 Thread Juergen Gross
On 10/20/2015 10:10 AM, George Dunlap wrote: On Tue, Oct 20, 2015 at 7:26 AM, Jan Beulich wrote: George, Dario, it being mostly used in scheduler code, and me considering it quite a bit easier to compare such big numbers when shown in hex I wonder: Do you prefer this to stay PRId64, or would y

[Xen-devel] [V7 1/4] x86/xsaves: add basic definitions/helpers to support xsaves

2015-10-20 Thread Shuai Ruan
This patch add basic definitions/helpers which will be used in later patches. Signed-off-by: Shuai Ruan Reviewed-by: Andrew Cooper --- xen/arch/x86/xstate.c | 19 +++ xen/include/asm-x86/hvm/vcpu.h | 1 + xen/include/asm-x86/msr-index.h | 2 ++ xen/include/asm-x86/x

Re: [Xen-devel] PRI_stime

2015-10-20 Thread Jan Beulich
>>> On 20.10.15 at 10:10, wrote: > On Tue, Oct 20, 2015 at 7:26 AM, Jan Beulich wrote: >> George, Dario, >> >> it being mostly used in scheduler code, and me considering it quite a >> bit easier to compare such big numbers when shown in hex I wonder: >> Do you prefer this to stay PRId64, or would

Re: [Xen-devel] Dom0 kernel for Xen4.6 on R-Car H2 (LAGER)

2015-10-20 Thread Ferger, Max
Many thanks for the attention, and the help so far! * There are still warnings about the console not being properly configured. This issue seems not urgent to me, also I would appreciate a fix. * Something goes wrong while booting Dom0. Please help me in understanding why? * I still don't know

Re: [Xen-devel] [OSSTEST PATCH] ts-host-ping-check: Properly append the ping output

2015-10-20 Thread Ian Campbell
On Mon, 2015-10-19 at 17:14 +0100, Ian Jackson wrote: > On Linux opening /dev/stderr produces a non-O_APPEND open-file, with > its own file position pointer, even if stderr was opened O_APPEND. > > As a result the logfile from this step would be mangled. So use > `tee -a'. > > Signed-off-by: Ian

Re: [Xen-devel] [OSSTEST PATCH 1/4] Rename README.bisection to NOTES.bisection

2015-10-20 Thread Ian Campbell
On Mon, 2015-10-19 at 17:15 +0100, Ian Jackson wrote: > This contains osstest-developer-oriented information about the > bisector, and is not really pitched at osstest consumers. (It's also > rather more of a sketch than a complete algorithm doc, and somewhat > out of date.) > > Signed-off-by: Ia

Re: [Xen-devel] [OSSTEST PATCH 4/4] README.bisection: New consumer-oriented document

2015-10-20 Thread Wei Liu
On Mon, Oct 19, 2015 at 05:51:25PM +0100, Ian Jackson wrote: > Wei Liu writes ("Re: [OSSTEST PATCH 4/4] README.bisection: New > consumer-oriented document"): > > On Mon, Oct 19, 2015 at 05:15:35PM +0100, Ian Jackson wrote: > > > + | url used for fetching the bits > > > + | > > > +

Re: [Xen-devel] help for python log in xen-4.4.1

2015-10-20 Thread Wei Liu
Please don't top-post. On Tue, Oct 20, 2015 at 10:58:56AM +0800, 高强 wrote: > Hi, > > If you know, could you tell me the call relationship of command "xl save". > Example, when I execute "xl save",which function will be called first,and > then call which function? I mainly want to know which pytho

[Xen-devel] [linux-next test] 63065: regressions - FAIL

2015-10-20 Thread osstest service owner
flight 63065 linux-next real [real] http://logs.test-lab.xenproject.org/osstest/logs/63065/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-pygrub 6 xen-boot fail REGR. vs. 63042 test-amd64-i386-xl-qem

Re: [Xen-devel] [PATCH v4 1/5] public/io/netif.h: document the reality of netif_rx_request/reponse id

2015-10-20 Thread Paul Durrant
> -Original Message- > From: Jan Beulich [mailto:jbeul...@suse.com] > Sent: 19 October 2015 17:01 > To: Paul Durrant > Cc: Ian Campbell; Ian Jackson; xen-de...@lists.xenproject.org; Keir > (Xen.org); Tim (Xen.org) > Subject: Re: [PATCH v4 1/5] public/io/netif.h: document the reality of > ne

Re: [Xen-devel] PRI_stime

2015-10-20 Thread Andrew Cooper
On 20/10/15 09:34, Jan Beulich wrote: On 20.10.15 at 10:10, wrote: >> On Tue, Oct 20, 2015 at 7:26 AM, Jan Beulich wrote: >>> George, Dario, >>> >>> it being mostly used in scheduler code, and me considering it quite a >>> bit easier to compare such big numbers when shown in hex I wonder: >>

Re: [Xen-devel] [PATCH 1/2] x86/ept: defer enabling of EPT A/D bit until PML get enabled.

2015-10-20 Thread Jan Beulich
>>> On 20.10.15 at 04:34, wrote: > Existing PML implementation turns on EPT A/D bit unconditionally if PML is > supported by hardware. This works but enabling of EPT A/D bit can be > deferred > until PML get enabled. There's no point in enabling the extra feature for > every > domain when we're

Re: [Xen-devel] [PATCH] Adds options for tabs-separators, and including the domain ID in the output.

2015-10-20 Thread Jan Beulich
>>> On 19.10.15 at 21:24, wrote: > This change adds two options to xentop: > -T adds a tabulator (\t) character after each field, to allow > easier and more robust parsing. This affects batch mode only. > -I includes a column with the domain ID in the outp

Re: [Xen-devel] PROBLEM: kernel panic xsave_init

2015-10-20 Thread Jan Beulich
>>> On 19.10.15 at 18:25, wrote: > On 10/19/2015 06:16 AM, John Doe wrote: [0.00] general protection fault: [#1] SMP [0.00] Modules linked in: [0.00] CPU: 0 PID: 0 Comm: swapper Not tainted > 4.1.9-6.pvops.qubes.x86_64 #1 [0.00] Hardware na

Re: [Xen-devel] [PATCH] use clear_domain_page() instead of open coding it

2015-10-20 Thread Andrew Cooper
On 19/10/15 15:51, Jan Beulich wrote: > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH] use clear_domain_page() instead of open coding it

2015-10-20 Thread George Dunlap
On 19/10/15 15:51, Jan Beulich wrote: > Signed-off-by: Jan Beulich mm bits: Acked-by: George Dunlap > > --- a/xen/arch/x86/hvm/stdvga.c > +++ b/xen/arch/x86/hvm/stdvga.c > @@ -552,8 +552,7 @@ void stdvga_init(struct domain *d) > { > struct hvm_hw_stdvga *s = &d->arch.hvm_domain.stdvga;

Re: [Xen-devel] Openstack on ARM64

2015-10-20 Thread Stefano Stabellini
CC'ing xen-devel and Anthony On Tue, 20 Oct 2015, suresh knv wrote: > Hi Stefano, > > I am starting xencommons after the boot explicitly and also xl list > works fine it is showing as below. > > ubuntu@arm64:~$ sudo xl list > NameID Mem VCPUs State Time(

Re: [Xen-devel] PRI_stime

2015-10-20 Thread Jan Beulich
>>> On 20.10.15 at 11:46, wrote: > On 20/10/15 09:34, Jan Beulich wrote: > On 20.10.15 at 10:10, wrote: >>> On Tue, Oct 20, 2015 at 7:26 AM, Jan Beulich wrote: George, Dario, it being mostly used in scheduler code, and me considering it quite a bit easier to compare such

Re: [Xen-devel] [PATCH 1/2] x86/ept: defer enabling of EPT A/D bit until PML get enabled.

2015-10-20 Thread Andrew Cooper
On 20/10/15 03:34, Kai Huang wrote: > Existing PML implementation turns on EPT A/D bit unconditionally if PML is > supported by hardware. This works but enabling of EPT A/D bit can be deferred > until PML get enabled. There's no point in enabling the extra feature for > every > domain when we're n

Re: [Xen-devel] [PATCH 2/2] x86/vmx: fix coding style of PML functions

2015-10-20 Thread Andrew Cooper
On 20/10/15 03:34, Kai Huang wrote: > According to Jan's comments, also fix the coding style of for_each_vcpu in > existing PML functions. > > Signed-off-by: Kai Huang Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org http:

Re: [Xen-devel] Dom0 kernel for Xen4.6 on R-Car H2 (LAGER)

2015-10-20 Thread Julien Grall
Hi, On 20/10/2015 09:48, Ferger, Max wrote: Many thanks for the attention, and the help so far! * There are still warnings about the console not being properly configured. This issue seems not urgent to me, also I would appreciate a fix. * Something goes wrong while booting Dom0. Please help

Re: [Xen-devel] [PATCH 2/3] VMX: allocate VMCS pages from domain heap

2015-10-20 Thread Andrew Cooper
On 19/10/15 16:22, Jan Beulich wrote: > -static struct vmcs_struct *vmx_alloc_vmcs(void) > +static paddr_t vmx_alloc_vmcs(void) > { > +struct page_info *pg; > struct vmcs_struct *vmcs; > > -if ( (vmcs = alloc_xenheap_page()) == NULL ) > +if ( (pg = alloc_domheap_page(NULL, 0)) =

Re: [Xen-devel] PRI_stime

2015-10-20 Thread Dario Faggioli
On Tue, 2015-10-20 at 02:34 -0600, Jan Beulich wrote: > > > > On 20.10.15 at 10:10, wrote: > > Personally I've never taken the time to familiarize myself with the > > magnitude of hex numbers vs decimal numbers; so in the case of > > time, I > > could easily see that 1000 nanoseconds is about

[Xen-devel] OSSTest: Xen 4.6.0 tag

2015-10-20 Thread Hu, Robert
Hi Ians, I found xen.git has RELEASE-4.6.0 tag, while corresponding 4.6.0 tags of qemu-xen and qemu-upstream are not in their trees, but in their *-4.6-testing trees. Any reason for such arrangement? Best Regards, Robert Ho ___ Xen-devel mailing lis

Re: [Xen-devel] Openstack on ARM64

2015-10-20 Thread Anthony PERARD
On Tue, Oct 20, 2015 at 10:54:35AM +0100, Stefano Stabellini wrote: > On Tue, 20 Oct 2015, suresh knv wrote: > > I am starting xencommons after the boot explicitly and also xl list > > works fine it is showing as below. > > > > ubuntu@arm64:~$ sudo xl list > > Name

Re: [Xen-devel] [PATCH v3 2/3] xen, cpu_hotplug: call device_offline instead of cpu_down

2015-10-20 Thread Stefano Stabellini
On Mon, 19 Oct 2015, Boris Ostrovsky wrote: > On 10/19/2015 12:55 PM, Stefano Stabellini wrote: > > When offlining a cpu, instead of cpu_down, call device_offline, which > > also takes care of updating the cpu.dev.offline field. This keeps the > > sysfs file /sys/devices/system/cpu/cpuN/online, up

Re: [Xen-devel] OSSTest: Xen 4.6.0 tag

2015-10-20 Thread Wei Liu
On Tue, Oct 20, 2015 at 10:24:29AM +, Hu, Robert wrote: > Hi Ians, > > I found xen.git has RELEASE-4.6.0 tag, while corresponding 4.6.0 tags of > qemu-xen > and qemu-upstream are not in their trees, but in their *-4.6-testing trees. > Any reason for such arrangement? > I don't know the rea

[Xen-devel] [PATCH 00/10] disambiguate symbol names

2015-10-20 Thread Jan Beulich
Triggered by Konrad's needs for xSplice, but having been on my todo list for a very long time to help interpretation of stack traces, here's a first set of changes allowing to tell apart identically named static symbols. The main and general thing is to prefix them by file name. Some remaining coll

Re: [Xen-devel] [PATCH OSSTEST] Switch to merged qemu-xen{, -traditional}.git trees

2015-10-20 Thread Ian Campbell
On Mon, 2015-10-19 at 12:44 +0100, Ian Jackson wrote: > Ian Campbell writes ("Re: [PATCH OSSTEST] Switch to merged qemu-xen{, > -traditional}.git trees"): > > We discussed on IRC with you and Stefano and are going to aim to push > > this > > in the w/c 19 October. > > We have decided under the cir

Re: [Xen-devel] [PATCH 2/3] VMX: allocate VMCS pages from domain heap

2015-10-20 Thread Jan Beulich
>>> On 20.10.15 at 12:12, wrote: > On 19/10/15 16:22, Jan Beulich wrote: >> -static struct vmcs_struct *vmx_alloc_vmcs(void) >> +static paddr_t vmx_alloc_vmcs(void) >> { >> +struct page_info *pg; >> struct vmcs_struct *vmcs; >> >> -if ( (vmcs = alloc_xenheap_page()) == NULL ) >> +

[Xen-devel] [PATCH 01/10] symbols: prefix static symbols with their source file name

2015-10-20 Thread Jan Beulich
This requires adjustments to the tool generating the symbol table and its as well as nm's invocation. Note: Not warning about duplicate symbols in the EFI case for now, as a binutils bug causes misnamed file name entries to appear in EFI binaries' symbol tables when the file name is longer than 18

[Xen-devel] [PATCH 02/10] x86/mm: override stored file names for multiply built sources

2015-10-20 Thread Jan Beulich
To make it possible to tell apart the static symbols therein, use their object file names instead of their source ones. Signed-off-by: Jan Beulich --- a/xen/arch/x86/mm/guest_walk.c +++ b/xen/arch/x86/mm/guest_walk.c @@ -29,6 +29,8 @@ #include #include +/* Allow uniquely identifying static

[Xen-devel] [PATCH 03/10] x86: don't build platform hypercall helpers multiple times

2015-10-20 Thread Jan Beulich
... to eliminate the resulting duplicate symbols. This includes dropping an odd per-CPU variable left from 32-bit days: Now that we only care about 64-bit builds, converting the uint64_t needing passing to a void pointer is no problem anymore. Since the COMPAT handling section needs to be re-organ

[Xen-devel] [PATCH 04/10] x86/HVM: prefix both instances of enable_intr_window()

2015-10-20 Thread Jan Beulich
... to tell them apart by their names even without further context. Signed-off-by: Jan Beulich --- a/xen/arch/x86/hvm/svm/intr.c +++ b/xen/arch/x86/hvm/svm/intr.c @@ -75,7 +75,7 @@ static void svm_inject_extint(struct vcp vmcb->eventinj = event; } -static void enable_intr_window(struct v

[Xen-devel] [PATCH 05/10] x86/mm: build map_domain_gfn() just once

2015-10-20 Thread Jan Beulich
It doesn't depend on GUEST_PAGING_LEVELS. Signed-off-by: Jan Beulich --- TBD: To ensure no dependency on GUEST_PAGING_LEVELS, would it perhaps be better to move the function to a file compiled just once? --- a/xen/arch/x86/mm/guest_walk.c +++ b/xen/arch/x86/mm/guest_walk.c @@ -87,8 +87,11 @

[Xen-devel] [PATCH 06/10] x86/mm: only a single instance of gw_page_flags[] is needed

2015-10-20 Thread Jan Beulich
None of its elements depends on GUEST_PAGING_LEVELS. Signed-off-by: Jan Beulich --- a/xen/arch/x86/mm/guest_walk.c +++ b/xen/arch/x86/mm/guest_walk.c @@ -32,29 +32,32 @@ /* Allow uniquely identifying static symbols in the 3 generated objects. */ asm(".file \"guest_walk_" __stringify(GUEST_PAGI

Re: [Xen-devel] [PATCH 02/10] x86/mm: override stored file names for multiply built sources

2015-10-20 Thread George Dunlap
On 20/10/15 11:39, Jan Beulich wrote: > To make it possible to tell apart the static symbols therein, use their > object file names instead of their source ones. > > Signed-off-by: Jan Beulich I have no idea if the runes are correct, but the idea sounds great: Acked-by: George Dunlap > > ---

Re: [Xen-devel] [PATCH v3] x86/HVM: correct page dirty marking in hvm_map_guest_frame_rw()

2015-10-20 Thread Andrew Cooper
On 19/10/15 15:53, Jan Beulich wrote: > Rather than dirtying a page when establishing a (permanent) mapping, > dirty it when the page gets unmapped, or - if still mapped - on the > final iteration of a save operation (or in other cases where the guest > is paused or already shut down). (Transient m

[Xen-devel] [PATCH 07/10] x86/shadow: only a single instance of fetch_type_names[] is needed

2015-10-20 Thread Jan Beulich
Signed-off-by: Jan Beulich --- a/xen/arch/x86/mm/shadow/multi.c +++ b/xen/arch/x86/mm/shadow/multi.c @@ -76,8 +76,10 @@ typedef enum { ft_demand_write = FETCH_TYPE_DEMAND | FETCH_TYPE_WRITE, } fetch_type_t; -#ifdef DEBUG_TRACE_DUMP -static char *fetch_type_names[] = { +extern const char *

[Xen-devel] [PATCH 08/10] x86/shadow: adjust sh_{make, destroy}_monitor_table() name tags

2015-10-20 Thread Jan Beulich
Instead of the misleading _guest_ ones use _sh_, expressing their sole dependency on the number of shadow levels. Signed-off-by: Jan Beulich --- a/xen/arch/x86/mm/shadow/multi.h +++ b/xen/arch/x86/mm/shadow/multi.h @@ -105,13 +105,6 @@ extern void SHADOW_INTERNAL_NAME(sh_guest_get_eff_l1e, GUES

[Xen-devel] [PATCH RFC 10/10] memory/compat: rename get_reserved_device_memory()

2015-10-20 Thread Jan Beulich
... to distinguish it from its non-compat counterpart. Signed-off-by: Jan Beulich --- TBD: Perhaps replace by a more generic patch adding .file to all compat/*.c files? --- a/xen/common/compat/memory.c +++ b/xen/common/compat/memory.c @@ -23,8 +23,7 @@ struct get_reserved_device_memory { u

[Xen-devel] [PATCH 09/10] x86/shadow: drop stray name tags from sh_{guest_get, map}_eff_l1e()

2015-10-20 Thread Jan Beulich
They (as a now being removed comment validly says) depend only on Xen's number of page table levels, and hence their tags didn't serve any useful purpose (there could only ever be one instance in a single binary, even back in the x86-32 days). Further conditionalize the inclusion of PV-specific ho

Re: [Xen-devel] Dom0 kernel for Xen4.6 on R-Car H2 (LAGER)

2015-10-20 Thread Julien Grall
On 20/10/2015 11:05, Julien Grall wrote: Thank you for the log. The offending node is /pci@ee09/usb@0,1 which is (r8a7790.dtsi): 1407 usb@0,1 { 1408 reg = <0x800 0 0 0 0>; 1409 device_type = "pci"; 1410 p

Re: [Xen-devel] [PATCH 0/2] Deter enabling of EPT A/D bit plus coding style fix

2015-10-20 Thread Kai Huang
Hi Kevin, Would you comment on the two patches? Thanks, -Kai On 10/20/2015 10:34 AM, Kai Huang wrote: Patch 1 is the v2 of defering enabling of EPT A/D bit until PML get enabled, with comments from Jan in v1 addressed. Patch 2 is coding style fix of for_each_vcpu to existing PML functions acco

[Xen-devel] [qemu-mainline baseline-only test] 38181: tolerable trouble: blocked/broken/fail/pass

2015-10-20 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 38181 qemu-mainline real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38181/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-armhf-xsm 3 host-install(3)

Re: [Xen-devel] Dom0 kernel for Xen4.6 on R-Car H2 (LAGER)

2015-10-20 Thread Ferger, Max
One step closer, thanks again! Removing the incompatible PCI/USB devices lets Xen boot somewhat further. Here is the (significant) difference in log output, the full new one is appended. I've back traced the trap message from traps.c +2447: None of the explicit 'goto bad_data_abort;' calls is r

[Xen-devel] [linux-4.1 test] 63067: regressions - FAIL

2015-10-20 Thread osstest service owner
flight 63067 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/63067/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 15 guest-localmigrate.2 fail in 63030 REGR. vs. 6

Re: [Xen-devel] Dom0 kernel for Xen4.6 on R-Car H2 (LAGER)

2015-10-20 Thread Ferger, Max
Adding "ranges;" is a good idea and helps, but gives the same error from traps.c +2447. On a side-note, adding "ranges;" implicates propagating "#address-cells", and "#size-cells" values down the DT into the leafs. -Ursprüngliche Nachricht- Von: xen-devel-boun...@lists.xen.org [mailto:

[Xen-devel] [distros-debian-snapshot test] 38182: tolerable trouble: blocked/broken/fail/pass

2015-10-20 Thread Platform Team regression test user
flight 38182 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/38182/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): build-armhf 3 host-install(3) broken like 38164 build-armhf-pv

Re: [Xen-devel] [Qemu-devel] Question about xen disk unplug support for ahci missed in qemu

2015-10-20 Thread Stefano Stabellini
On Mon, 19 Oct 2015, Laszlo Ersek wrote: > On 10/16/15 21:09, Laszlo Ersek wrote: > > On 10/16/15 13:34, Fabio Fantoni wrote: > >> Il 16/10/2015 12:47, Stefano Stabellini ha scritto: > >>> On Fri, 16 Oct 2015, Fabio Fantoni wrote: > Il 16/10/2015 12:13, Anthony PERARD ha scritto: > > On Fr

Re: [Xen-devel] PROBLEM: kernel panic xsave_init

2015-10-20 Thread John Doe
On 20/10/2015 11:51, Jan Beulich wrote: On 19.10.15 at 18:25, wrote: >> On 10/19/2015 06:16 AM, John Doe wrote: > [0.00] general protection fault: [#1] SMP > [0.00] Modules linked in: > [0.00] CPU: 0 PID: 0 Comm: swapper Not tainted >> 4.1.9-6.pvops.q

Re: [Xen-devel] Openstack on ARM64

2015-10-20 Thread suresh knv
Hi Anthony, /var/log/libvirt/libvirtd.log is empty, there is no log. these are the processes that are running related to xen ubuntu@arm64:~$ ps -aux | grep xen root16 0.0 0.0 0 0 ?S 1969 0:00 [xenwatch] root17 0.0 0.0 0 0 ?S 1969

[Xen-devel] Problem with nested HVM and hyper V in WIN8

2015-10-20 Thread Frédéric POUGNAULT
Hello,   I tried to boot a Windows 8.1 with Hyper-v role as domU.   I had this three options in my config file : -  hap=1 -  nestedhvm=1 -  cpuid = ['0x1:ecx=0xxx']   I add the patch http://www.gossamer-threads.com/lists/xen/devel/316993 <

[Xen-devel] help for snapshot

2015-10-20 Thread 高强
Hi,alls I know the snapshot of xen-4.4.1 is through the function xc_domain_save() to achieve.But I want to know from executing the command "xl save" to executing the function xc_domain_save(),how it is call. Has anybody can tell me the call relationship from python to C about snapshot? Thanks __

[Xen-devel] [PATCH v5 4/5] public/io/netif.h: add extra info slots for passing hash values

2015-10-20 Thread Paul Durrant
To properly support NDIS RSS, the Windows frontend PV driver needs the Toeplitz hash value calculated by the backend (otherwise it would have to duplicate the calculation). This patch adds documentation for "feature-hash" and a definition of a new XEN_NETIF_EXTRA_TYPE_HASH extra info segment. Sig

[Xen-devel] [PATCH v5 3/5] public/io/netif.h: add documentation for hash negotiation and mapping

2015-10-20 Thread Paul Durrant
This patch specifies the xenstore keys that should be used by frontends and backends to negotiate a particular hash algorithm and queue mapping to be used for mult-queue packet steering on the guest receive side. Signed-off-by: Paul Durrant Cc: Ian Campbell Cc: Ian Jackson Cc: Jan Beulich Cc:

[Xen-devel] [PATCH v4 0/4] Updates to public/io/netif.h

2015-10-20 Thread Paul Durrant
This series makes several modifications to netif.h in anticipation of implementing NDIS RSS support in the Windows frontend driver. Patch #1 documents the (sad) reality of the netif_rx_request/response protocol, which has been long overdue. Patch #2 adds a definition of the NETRXF_gso_prefix flag

[Xen-devel] [PATCH v5 5/5] public/io/netif.h: tidy up and remove duplicate comments

2015-10-20 Thread Paul Durrant
Now that requests and response types and extra info segments are documented in block comments, we can get rid of the inline comments in the structures. This has the happy side-effect of making the Linux checkpatch.pl script make fewer complaints after import. This patch also fixes a small whitespa

[Xen-devel] [PATCH v5 2/5] public/io/netif.h: add definition of gso_prefix flag

2015-10-20 Thread Paul Durrant
This flag is defined here only for compatibility with the Linux variant of this header. The feature has never been documented and should be considered deprecated. Signed-off-by: Paul Durrant Cc: Ian Campbell Cc: Ian Jackson Cc: Jan Beulich Cc: Keir Fraser Cc: Tim Deegan --- xen/include/publ

[Xen-devel] [PATCH v5 1/5] public/io/netif.h: document the reality of netif_rx_request/reponse

2015-10-20 Thread Paul Durrant
Because GSO metadata is passed from backend to frontend using netif_extra_info segments, which do not carry information stating which netif_rx_request_t was consumed to free up their slot, frontends must assume some form of identity relation between ring slot and request. Hence, so that it is able

[Xen-devel] [qemu-upstream-unstable test] 63070: regressions - FAIL

2015-10-20 Thread osstest service owner
flight 63070 qemu-upstream-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/63070/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail REGR. vs. 62101 R

Re: [Xen-devel] [PATCH 02/10] x86/mm: override stored file names for multiply built sources

2015-10-20 Thread Tim Deegan
At 04:39 -0600 on 20 Oct (1445315964), Jan Beulich wrote: > To make it possible to tell apart the static symbols therein, use their > object file names instead of their source ones. > > Signed-off-by: Jan Beulich Acked-by: Tim Deegan ___ Xen-devel ma

Re: [Xen-devel] [PATCH 07/10] x86/shadow: only a single instance of fetch_type_names[] is needed

2015-10-20 Thread Tim Deegan
At 04:43 -0600 on 20 Oct (1445316214), Jan Beulich wrote: > Signed-off-by: Jan Beulich Acked-by: Tim Deegan ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 02/10] x86/mm: override stored file names for multiply built sources

2015-10-20 Thread Andrew Cooper
On 20/10/15 11:39, Jan Beulich wrote: > To make it possible to tell apart the static symbols therein, use their > object file names instead of their source ones. > > Signed-off-by: Jan Beulich In principle, a very good idea. Is it perhaps worth having the build runes pass in a -D value instead,

Re: [Xen-devel] [PATCH 08/10] x86/shadow: adjust sh_{make, destroy}_monitor_table() name tags

2015-10-20 Thread Tim Deegan
At 04:44 -0600 on 20 Oct (1445316259), Jan Beulich wrote: > Instead of the misleading _guest_ ones use _sh_, > expressing their sole dependency on the number of shadow levels. > > Signed-off-by: Jan Beulich Acked-by: Tim Deegan ___ Xen-devel mailing

Re: [Xen-devel] [Qemu-devel] Question about xen disk unplug support for ahci missed in qemu

2015-10-20 Thread Laszlo Ersek
On 10/20/15 13:59, Stefano Stabellini wrote: > On Mon, 19 Oct 2015, Laszlo Ersek wrote: >> On 10/16/15 21:09, Laszlo Ersek wrote: >>> On 10/16/15 13:34, Fabio Fantoni wrote: Il 16/10/2015 12:47, Stefano Stabellini ha scritto: > On Fri, 16 Oct 2015, Fabio Fantoni wrote: >> Il 16/10/2015

Re: [Xen-devel] [PATCH 03/10] x86: don't build platform hypercall helpers multiple times

2015-10-20 Thread Andrew Cooper
On 20/10/15 11:40, Jan Beulich wrote: > ... to eliminate the resulting duplicate symbols. This includes > dropping an odd per-CPU variable left from 32-bit days: Now that we > only care about 64-bit builds, converting the uint64_t needing > passing to a void pointer is no problem anymore. > > Since

Re: [Xen-devel] [PATCH 09/10] x86/shadow: drop stray name tags from sh_{guest_get, map}_eff_l1e()

2015-10-20 Thread Tim Deegan
At 04:45 -0600 on 20 Oct (1445316306), Jan Beulich wrote: > They (as a now being removed comment validly says) depend only on Xen's > number of page table levels, and hence their tags didn't serve any > useful purpose (there could only ever be one instance in a single > binary, even back in the x86

Re: [Xen-devel] [PATCH 04/10] x86/HVM: prefix both instances of enable_intr_window()

2015-10-20 Thread Andrew Cooper
On 20/10/15 11:41, Jan Beulich wrote: > ... to tell them apart by their names even without further context. > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH 05/10] x86/mm: build map_domain_gfn() just once

2015-10-20 Thread Andrew Cooper
On 20/10/15 11:41, Jan Beulich wrote: > It doesn't depend on GUEST_PAGING_LEVELS. > > Signed-off-by: Jan Beulich > --- > TBD: To ensure no dependency on GUEST_PAGING_LEVELS, would it perhaps > be better to move the function to a file compiled just once? +1 it probably fits best in p2m.c, al

Re: [Xen-devel] [PATCH v3 2/3] xen, cpu_hotplug: call device_offline instead of cpu_down

2015-10-20 Thread Boris Ostrovsky
On 10/20/2015 06:28 AM, Stefano Stabellini wrote: On Mon, 19 Oct 2015, Boris Ostrovsky wrote: On 10/19/2015 12:55 PM, Stefano Stabellini wrote: When offlining a cpu, instead of cpu_down, call device_offline, which also takes care of updating the cpu.dev.offline field. This keeps the sysfs file

Re: [Xen-devel] [PATCH 06/10] x86/mm: only a single instance of gw_page_flags[] is needed

2015-10-20 Thread Andrew Cooper
On 20/10/15 11:42, Jan Beulich wrote: > None of its elements depends on GUEST_PAGING_LEVELS. > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper If you do end up making a common.c (as suggested in patch 5), then this is also a candidate to move, to avoid further issues with multiple compi

Re: [Xen-devel] [PATCH 02/10] x86/mm: override stored file names for multiply built sources

2015-10-20 Thread Jan Beulich
>>> On 20.10.15 at 14:44, wrote: > On 20/10/15 11:39, Jan Beulich wrote: >> To make it possible to tell apart the static symbols therein, use their >> object file names instead of their source ones. >> >> Signed-off-by: Jan Beulich > > In principle, a very good idea. > > Is it perhaps worth hav

Re: [Xen-devel] [PATCH 05/10] x86/mm: build map_domain_gfn() just once

2015-10-20 Thread Jan Beulich
>>> On 20.10.15 at 14:54, wrote: > On 20/10/15 11:41, Jan Beulich wrote: >> It doesn't depend on GUEST_PAGING_LEVELS. >> >> Signed-off-by: Jan Beulich >> --- >> TBD: To ensure no dependency on GUEST_PAGING_LEVELS, would it perhaps >> be better to move the function to a file compiled just onc

Re: [Xen-devel] [PATCH 02/10] x86/mm: override stored file names for multiply built sources

2015-10-20 Thread Andrew Cooper
On 20/10/15 14:12, Jan Beulich wrote: On 20.10.15 at 14:44, wrote: >> On 20/10/15 11:39, Jan Beulich wrote: >>> To make it possible to tell apart the static symbols therein, use their >>> object file names instead of their source ones. >>> >>> Signed-off-by: Jan Beulich >> In principle, a ve

Re: [Xen-devel] PROBLEM: kernel panic xsave_init

2015-10-20 Thread Boris Ostrovsky
On 10/20/2015 08:11 AM, John Doe wrote: On 20/10/2015 11:51, Jan Beulich wrote: On 19.10.15 at 18:25, wrote: On 10/19/2015 06:16 AM, John Doe wrote: [0.00] general protection fault: [#1] SMP [0.00] Modules linked in: [0.00] CPU: 0 PID: 0 Comm: swapper Not tainted

Re: [Xen-devel] [V7 1/4] x86/xsaves: add basic definitions/helpers to support xsaves

2015-10-20 Thread Andrew Cooper
On 20/10/15 09:21, Shuai Ruan wrote: > This patch add basic definitions/helpers which will be used in > later patches. > > Signed-off-by: Shuai Ruan > Reviewed-by: Andrew Cooper > --- > xen/arch/x86/xstate.c | 19 +++ > xen/include/asm-x86/hvm/vcpu.h | 1 + > xen/incl

Re: [Xen-devel] PROBLEM: kernel panic xsave_init

2015-10-20 Thread Jan Beulich
>>> On 20.10.15 at 15:22, wrote: > The reason I think its this commit is that RAX, RDX and RCX look very > much like arguments to xsetbv (which xstate_enable_boot_cpu() executes) > and RAX value is 0x1f, which has two new bits that this commit defined. That would be the two MPX related bits, ye

Re: [Xen-devel] Openstack on ARM64

2015-10-20 Thread Anthony PERARD
On Tue, Oct 20, 2015 at 05:52:30PM +0530, suresh knv wrote: > /var/log/libvirt/libvirtd.log is empty, there is no log. You can always increase the log_level in libvirtd.conf (in /etc/libvirt/). Could you also check your syslog? > and libvirtd is also running fine > > ubuntu@arm64:~$ ps -aux | gr

Re: [Xen-devel] PROBLEM: kernel panic xsave_init

2015-10-20 Thread Boris Ostrovsky
On 10/20/2015 09:43 AM, Jan Beulich wrote: On 20.10.15 at 15:22, wrote: The reason I think its this commit is that RAX, RDX and RCX look very much like arguments to xsetbv (which xstate_enable_boot_cpu() executes) and RAX value is 0x1f, which has two new bits that this commit defined. That wou

Re: [Xen-devel] [linux-4.1 test] 63030: regressions - FAIL

2015-10-20 Thread Ian Jackson
Wei Liu writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions - FAIL"): > On Sun, Oct 18, 2015 at 05:52:32PM +, osstest service owner wrote: ... > > Tests which did not succeed and are blocking, > > including tests which could not be run: > > test-amd64-i386-xl-qemut-stubdom-debianhvm-a

Re: [Xen-devel] PROBLEM: kernel panic xsave_init

2015-10-20 Thread Jan Beulich
>>> On 20.10.15 at 16:27, wrote: > On 10/20/2015 09:43 AM, Jan Beulich wrote: > On 20.10.15 at 15:22, wrote: >>> The reason I think its this commit is that RAX, RDX and RCX look very >>> much like arguments to xsetbv (which xstate_enable_boot_cpu() executes) >>> and RAX value is 0x1f, which h

Re: [Xen-devel] [PATCH 04/10] x86/HVM: prefix both instances of enable_intr_window()

2015-10-20 Thread Aravind Gopalakrishnan
On 10/20/2015 5:41 AM, Jan Beulich wrote: ... to tell them apart by their names even without further context. Signed-off-by: Jan Beulich Reviewed-by: Aravind Gopalakrishnan Thanks, -Aravind. ___ Xen-devel mailing list Xen-devel@lists.xen.org htt

Re: [Xen-devel] [Qemu-devel] Question about xen disk unplug support for ahci missed in qemu

2015-10-20 Thread Stefano Stabellini
On Tue, 20 Oct 2015, Laszlo Ersek wrote: > On 10/20/15 13:59, Stefano Stabellini wrote: > > On Mon, 19 Oct 2015, Laszlo Ersek wrote: > >> Could that be related to the issue you are experiencing with OVMF? > >> Because, OVMF implies HVM (or PV-on-HVM), and your report ("empty > >> paravirt CD-ROM" o

[Xen-devel] [PATCH] XenPvBlk: handle empty cdrom drives

2015-10-20 Thread Stefano Stabellini
Empty cdroms are not going to connect, avoid waiting for the backend to switch to state 4, which is never going to happen, and return EFI_NO_MEDIA instead. Detect an empty cdrom by looking at the "params" node on xenstore, which is set to "" or "aio:" for empty drives by libxl. Contributed-under:

Re: [Xen-devel] [linux-4.1 test] 63030: regressions - FAIL

2015-10-20 Thread Wei Liu
On Tue, Oct 20, 2015 at 03:39:26PM +0100, Ian Jackson wrote: > Wei Liu writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions - FAIL"): > > On Sun, Oct 18, 2015 at 05:52:32PM +, osstest service owner wrote: > ... > > > Tests which did not succeed and are blocking, > > > including tests wh

Re: [Xen-devel] [linux-4.1 test] 63030: regressions - FAIL

2015-10-20 Thread Ian Jackson
Wei Liu writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions - FAIL"): > From mere code inspection and document of lwip 1.3.0 I think mini-os > does send gratuitous ARP. The guest is using the PVHVM drivers at this point, with the backend directly in dom0, so it is the guest's gratuitous a

Re: [Xen-devel] [PATCH] XenPvBlk: handle empty cdrom drives

2015-10-20 Thread Laszlo Ersek
(1) Please make the subject line say: OvmfPkg: XenPvBlkDxe: handle empty cdrom drives On 10/20/15 17:03, Stefano Stabellini wrote: > Empty cdroms are not going to connect, avoid waiting for the backend to > switch to state 4, which is never going to happen, and return > EFI_NO_MEDIA instead. (

[Xen-devel] [qemu-upstream-4.6-testing test] 63071: tolerable FAIL - PUSHED

2015-10-20 Thread osstest service owner
flight 63071 qemu-upstream-4.6-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/63071/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-libvirt-pair 21 guest-migrate/src_host/dst_host fail like 62041 Tests which d

[Xen-devel] [linux-mingo-tip-master test] 63085: regressions - FAIL

2015-10-20 Thread osstest service owner
flight 63085 linux-mingo-tip-master real [real] http://logs.test-lab.xenproject.org/osstest/logs/63085/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-pvops 5 kernel-build fail REGR. vs. 60684 build-i386

[Xen-devel] [xen-unstable-smoke test] 63091: tolerable all pass - PUSHED

2015-10-20 Thread osstest service owner
flight 63091 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/63091/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl 12

Re: [Xen-devel] [PATCH] tools: libxl: allow permissive qemu-upstream pci passthrough. [and 1 more messages]

2015-10-20 Thread Ian Jackson
Ian Campbell writes ("[PATCH] tools: libxl: allow permissive qemu-upstream pci passthrough."): > On Tue, 2015-06-02 at 16:47 +0100, Ian Campbell wrote: > > Anyone fancy (n)acking this followup to XSA-131? I think we probably > want this for 4.6. I have backported this, and the corresponding doc

Re: [Xen-devel] Backport "tools/console: xenconsole tolerate tty errors"

2015-10-20 Thread Ian Jackson
Ian Campbell writes ("Backport "tools/console: xenconsole tolerate tty errors""): > While looking at Debian bug #794071 I came across this which may or may not > resolve that bug, but looks like it ought to be backported anywhere that > XSA-57 was applied. > > It is in staging-4.5, but not stagin

  1   2   >