[Xen-devel] [qemu-mainline test] 114667: regressions - FAIL

2017-10-18 Thread osstest service owner
flight 114667 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/114667/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3866 xen-buildfail REGR. vs. 114507 build-amd64-xsm

Re: [Xen-devel] [PATCH] MAINTAINERS: Make Christian Lindig maintainer for ocaml tools

2017-10-18 Thread David Scott
Hi, This is great! I don’t know if the protocol requires it, but if so then Acked-by: David Scott mailto:d...@recoil.org>> Cheers, Dave > On 17 Oct 2017, at 18:44, Ian Jackson wrote: > > oxenstored is our default implementation of xenstore, for platforms > that have ocaml support. We need i

Re: [Xen-devel] [PATCH RFC] ARM: vPL011: use receive timeout interrupt

2017-10-18 Thread Bhupinder Thakur
Hi Andre, I verified this patch on qualcomm platform. It is working fine. On 18 October 2017 at 19:11, Andre Przywara wrote: > Instead of asserting the receive interrupt (RXI) on the first character > in the FIFO, lets (ab)use the receive timeout interrupt (RTI) for that > purpose. That seems to

[Xen-devel] [xen-4.9-testing baseline-only test] 72328: tolerable trouble: blocked/broken/fail/pass

2017-10-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72328 xen-4.9-testing real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72328/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop

[Xen-devel] [PATCH RFC v2 4/8] Remove stop NBD server command from xl

2017-10-18 Thread Bruno Alvisio
--- tools/xl/xl_migrate.c | 11 --- 1 file changed, 11 deletions(-) diff --git a/tools/xl/xl_migrate.c b/tools/xl/xl_migrate.c index fee726f..9f43d96 100644 --- a/tools/xl/xl_migrate.c +++ b/tools/xl/xl_migrate.c @@ -427,17 +427,6 @@ static void migrate_receive(int debug, int daemonize, i

[Xen-devel] [PATCH RFC v2 7/8] Fixed bugs in the migration flow

2017-10-18 Thread Bruno Alvisio
--- tools/libxc/xc_sr_save.c | 1 - tools/libxl/libxl_create.c | 15 --- tools/libxl/libxl_dom_save.c | 2 +- tools/libxl/libxl_domain.c | 2 +- tools/libxl/libxl_internal.h | 2 +- tools/libxl/libxl_save_callout.c | 5 +++-- tools/libxl/libxl_stream_wr

[Xen-devel] [PATCH RFC v2 1/8] Added QMP commands for adding NBD server and disk migration

2017-10-18 Thread Bruno Alvisio
--- tools/libxl/libxl_internal.h | 18 +++ tools/libxl/libxl_qmp.c | 125 ++- 2 files changed, 142 insertions(+), 1 deletion(-) diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h index 7247509..1349a8f 100644 --- a/tools/libx

[Xen-devel] [PATCH RFC v2 8/8] Added support to handle QMP events

2017-10-18 Thread Bruno Alvisio
--- tools/libxl/libxl_dom_save.c | 71 tools/libxl/libxl_qmp.c | 150 +-- 2 files changed, 170 insertions(+), 51 deletions(-) diff --git a/tools/libxl/libxl_dom_save.c b/tools/libxl/libxl_dom_save.c index ddfe2f8..d188dd2 100644 -

[Xen-devel] [PATCH RFC v2 0/8] Live migration for VMs with QEMU backed local storage

2017-10-18 Thread Bruno Alvisio
I am reviving this thread about the migration of VMs with local storage. I have worked on a solution to be able to migrate VMs that use QEMU as the backend disk driver. I have adapted the migration flow and piggybacked on the “drive-mirroring” capability already provided by QEMU. Overview 1. Th

[Xen-devel] [PATCH RFC v2 5/8] Improved migration flow syntax in libxl

2017-10-18 Thread Bruno Alvisio
--- tools/libxl/libxl_create.c | 5 +++-- tools/libxl/libxl_dm.c | 10 +- tools/libxl/libxl_internal.h | 4 ++-- tools/libxl/libxl_save_callout.c | 41 +--- tools/libxl/libxl_save_helper.c | 15 ++- tools/libxl/libxl_ty

[Xen-devel] [PATCH RFC v2 6/8] Adapted libxc for migration of local disk

2017-10-18 Thread Bruno Alvisio
--- tools/libxc/include/xenguest.h| 6 +- tools/libxc/xc_nomigrate.c| 6 +- tools/libxc/xc_sr_common.h| 3 + tools/libxc/xc_sr_restore.c | 14 +++-- tools/libxc/xc_sr_save.c | 118 +- tools/libxc/xc_sr_save_x86_hvm.c |

[Xen-devel] [PATCH RFC v2 3/8] Adapted libxl to handle migration of instance with qemu based disks

2017-10-18 Thread Bruno Alvisio
--- tools/libxl/libxl.h | 11 ++- tools/libxl/libxl_create.c | 191 --- tools/libxl/libxl_dm.c | 26 -- tools/libxl/libxl_dom_save.c | 85 - tools/libxl/libxl_domain.c | 4 +- tools/libxl/libxl_inte

[Xen-devel] [PATCH RFC v2 2/8] Modified xl stack to receieve mirror QEMU disk option

2017-10-18 Thread Bruno Alvisio
--- tools/ocaml/libs/xl/xenlight_stubs.c | 4 +-- tools/xl/xl.h| 1 + tools/xl/xl_migrate.c| 47 +--- tools/xl/xl_saverestore.c| 2 +- tools/xl/xl_vmcontrol.c | 5 ++-- 5 files changed, 45 insertio

[Xen-devel] [libvirt test] 114669: tolerable all pass - PUSHED

2017-10-18 Thread osstest service owner
flight 114669 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/114669/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 114531 test-armhf-armhf-libvirt 14 saveresto

Re: [Xen-devel] [PATCH v2 1/2] x86/boot: fix early error display

2017-10-18 Thread Doug Goldstein
On 10/18/17 4:50 AM, Jan Beulich wrote: On 17.10.17 at 23:41, wrote: >> From: David Esler >> >> In 9180f5365524 a change was made to the send_chr function to take in >> C-strings and print out a character at a time until a NULL was >> encountered. However there is no code to increment the cu

[Xen-devel] [PATCH v2] arm: configure interrupts to be in non-secure group1

2017-10-18 Thread Stefano Stabellini
Xen uses non-secure group1 interrupts, however it doesn't configure the GICv3 accordingly. Xen needs to set GICD_IGROUPR for SPIs and GICR_IGROUPR0 for local interrupt to "1" to specify that interrupts belong to group1. This is particularly important if the system has GICD_CTLR.DS set, also see com

[Xen-devel] [xen-unstable baseline-only test] 72329: regressions - trouble: blocked/broken/fail/pass

2017-10-18 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 72329 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/72329/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-examine 10 examine-serial/

Re: [Xen-devel] [PATCH v1 15/27] compiler: Option to default to hidden symbols

2017-10-18 Thread Thomas Garnier
On Thu, Oct 12, 2017 at 1:02 PM, Luis R. Rodriguez wrote: > On Wed, Oct 11, 2017 at 01:30:15PM -0700, Thomas Garnier wrote: >> Provide an option to default visibility to hidden except for key >> symbols. This option is disabled by default and will be used by x86_64 >> PIE support to remove errors

Re: [Xen-devel] [PATCH v1 00/27] x86: PIE support and option to extend KASLR randomization

2017-10-18 Thread Thomas Garnier
On Thu, Oct 12, 2017 at 9:28 AM, Tom Lendacky wrote: > On 10/12/2017 10:34 AM, Thomas Garnier wrote: >> >> On Wed, Oct 11, 2017 at 2:34 PM, Tom Lendacky >> wrote: >>> >>> On 10/11/2017 3:30 PM, Thomas Garnier wrote: Changes: - patch v1: - Simplify ftrace implementation

[Xen-devel] [PATCH v9 02/16] Rename PSR sysctl/domctl interfaces and xsm policy to make them be general

2017-10-18 Thread Yi Sun
This patch renames PSR sysctl/domctl interfaces and related xsm policy to make them be general for all resource allocation features but not only for CAT. Then, we can resuse the interfaces for all allocation features. Basically, it changes 'psr_cat_op' to 'psr_alloc', and remove 'CAT_' from some m

Re: [Xen-devel] [PATCH V3 1/29] Xen/doc: Add Xen virtual IOMMU doc

2017-10-18 Thread Lan Tianyu
Hi Roger: Thanks for review. On 2017年10月18日 21:26, Roger Pau Monné wrote: > On Thu, Sep 21, 2017 at 11:01:42PM -0400, Lan Tianyu wrote: >> This patch is to add Xen virtual IOMMU doc to introduce motivation, >> framework, vIOMMU hypercall and xl configuration. >> >> Signed-off-by: Lan Tianyu

[Xen-devel] [PATCH v3 2/7] xsm: flask: change the dummy xsm policy and flask hook for map_gmfn_foregin

2017-10-18 Thread Zhongze Liu
The original dummy xsm_map_gmfn_foregin checks if source domain has the proper privileges over the target domain. Under this policy, it's not allowed if a Dom0 wants to map pages from one DomU to another, which restricts some useful yet not dangerous use cases of the API, such as sharing pages amon

[Xen-devel] [PATCH v3 3/7] libxl: introduce a new structure to represent static shared memory regions

2017-10-18 Thread Zhongze Liu
Add a new structure to the IDL familiy to represent static shared memory regions as proposed in the proposal "Allow setting up shared memory areas between VMs from xl config file" (see [1]). [1] https://lists.xen.org/archives/html/xen-devel/2017-08/msg03242.html Signed-off-by: Zhongze Liu Review

[Xen-devel] [PATCH v3 1/7] libxc: add xc_domain_remove_from_physmap to wrap XENMEM_remove_from_physmap

2017-10-18 Thread Zhongze Liu
This is for the proposal "Allow setting up shared memory areas between VMs from xl config file". See: https://lists.xen.org/archives/html/xen-devel/2017-08/msg03242.html Then plan is to use XENMEM_add_to_physmap_batch to map the shared pages from one domU to another and use XENMEM_remove_from_p

[Xen-devel] [PATCH v3 4/7] libxl: support mapping static shared memory areas during domain creation

2017-10-18 Thread Zhongze Liu
Add libxl__sshm_add to map shared pages from one DomU to another, The mapping process involves the follwing steps: * Set defaults and check for further errors in the static_shm configs: overlapping areas, invalid ranges, duplicated master domain, no master domain etc. * Write infomatio

[Xen-devel] [PATCH v3 7/7] docs: documentation about static shared memory regions

2017-10-18 Thread Zhongze Liu
Add docs to document the motivation, usage, use cases and other relavant infomation about the static shared memory feature. This is for the proposal "Allow setting up shared memory areas between VMs from xl config file". See: https://lists.xen.org/archives/html/xen-devel/2017-08/msg03242.html

[Xen-devel] [PATCH v3 0/7] Allow setting up shared memory areas between VMs from xl config files

2017-10-18 Thread Zhongze Liu
This series implements the new xl config entry proposed in [1]. Users can use the new config entry to statically setup shared memory areas among VMs that don't have grant table support so that they could communicate with each other through the static shared memory areas. [1] Proposla to allow sett

[Xen-devel] [PATCH v3 5/7] libxl: support unmapping static shared memory areas during domain destruction

2017-10-18 Thread Zhongze Liu
Add libxl__sshm_del to unmap static shared memory areas mapped by libxl__sshm_add during domain creation. The unmapping process is: * For a master: decrease the refcount of the sshm region, if the refcount reaches 0, cleanup the whole sshm path. * For a slave: unmap the shared pages, and cleanup

[Xen-devel] [PATCH v3 6/7] libxl:xl: add parsing code to parse "libxl_static_sshm" from xl config files

2017-10-18 Thread Zhongze Liu
Add the parsing utils for the newly introduced libxl_static_sshm struct to the libxl/libxlu_* family. And add realated parsing code in xl to parse the struct from xl config files. This is for the proposal "Allow setting up shared memory areas between VMs from xl config file" (see [1]). [1] https:/

Re: [Xen-devel] [PATCH V3 2/29] VIOMMU: Add vIOMMU helper functions to create, destroy vIOMMU instance

2017-10-18 Thread Lan Tianyu
On 2017年10月18日 22:05, Roger Pau Monné wrote: > On Thu, Sep 21, 2017 at 11:01:43PM -0400, Lan Tianyu wrote: >> +int viommu_destroy_domain(struct domain *d) >> +{ >> +int ret; >> + >> +if ( !d->viommu ) >> +return -EINVAL; > > ENODEV would be better. OK. Will update. > >> + >> +

Re: [Xen-devel] [PATCH V3 3/29] DOMCTL: Introduce new DOMCTL commands for vIOMMU support

2017-10-18 Thread Lan Tianyu
On 2017年10月18日 22:18, Roger Pau Monné wrote: > On Thu, Sep 21, 2017 at 11:01:44PM -0400, Lan Tianyu wrote: >> This patch is to introduce create, destroy and query capabilities >> command for vIOMMU. vIOMMU layer will deal with requests and call >> arch vIOMMU ops. >> >> Signed-off-by: Lan Tianyu >

Re: [Xen-devel] [PATCH V3 4/29] tools/libacpi: Add DMA remapping reporting (DMAR) ACPI table structures

2017-10-18 Thread Lan Tianyu
On 2017年10月18日 22:36, Roger Pau Monné wrote: > On Thu, Sep 21, 2017 at 11:01:45PM -0400, Lan Tianyu wrote: >> From: Chao Gao >> >> Add dmar table structure according Chapter 8 "BIOS Considerations" of >> VTd spec Rev. 2.4. >> >> VTd >> spec:http://www.intel.com/content/dam/www/public/us/en/docume

[Xen-devel] [linux-4.1 test] 114665: tolerable FAIL - PUSHED

2017-10-18 Thread osstest service owner
flight 114665 linux-4.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/114665/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-rtds 7 xen-boot fail in 114646 pass in 114665 test-armhf-armhf-xl-vhd 6 xen

<    1   2