[libvirt test] 149455: regressions - FAIL

2020-04-06 Thread osstest service owner
flight 149455 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/149455/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 146182 build-i386-libvirt

RE: [PATCH 5/7] xen: include xen/guest_access.h rather than asm/guest_access.h

2020-04-06 Thread Paul Durrant
> -Original Message- > From: Julien Grall > Sent: 04 April 2020 14:10 > To: xen-devel@lists.xenproject.org > Cc: jul...@xen.org; Julien Grall ; Stefano Stabellini > ; > Volodymyr Babchuk ; Andrew Cooper > ; George > Dunlap ; Ian Jackson ; > Jan Beulich > ; Wei Liu ; Roger Pau Monné > ;

RE: Live migration and PV device handling

2020-04-06 Thread Paul Durrant
> -Original Message- > From: Xen-devel On Behalf Of Dongli > Zhang > Sent: 03 April 2020 23:33 > To: Andrew Cooper ; Anastassios Nanos > ; xen- > de...@lists.xen.org > Subject: Re: Live migration and PV device handling > > Hi Andrew, > > On 4/3/20 5:42 AM, Andrew Cooper wrote: > > On 0

[qemu-mainline test] 149447: regressions - FAIL

2020-04-06 Thread osstest service owner
flight 149447 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/149447/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 10 debian-hvm-install fail REGR. vs. 144861 test-amd6

[PATCH OSSTEST] linux: enable x2APIC kernel support

2020-04-06 Thread Roger Pau Monne
Without it Linux is not able to parse the x2APIC ACPI MADT entries crafted by Xen when booted in PVH mode, following log is from one of the dom0pvh jobs: ACPI: x2apic entry ignored ACPI: x2apic entry ignored ACPI: x2apic entry ignored ACPI: x2apic entry ignored IOAPIC[0]: apic_id 0, version 17, ad

[PATCH v2] tools/libxl: make default of max event channels dependant on vcpus

2020-04-06 Thread Juergen Gross
Since Xen 4.4 the maximum number of event channels for a guest is defaulting to 1023. For large guests with lots of vcpus this is not enough, as e.g. the Linux kernel uses 7 event channels per vcpu, limiting the guest to about 140 vcpus. Instead of requiring to specify the allowed number of event

RE: [PATCH 1/5] xen/common: introduce a new framework for save/restore of 'domain' context

2020-04-06 Thread Paul Durrant
> -Original Message- > From: Julien Grall > Sent: 03 April 2020 18:24 > To: p...@xen.org; xen-devel@lists.xenproject.org > Cc: 'Andrew Cooper' ; 'George Dunlap' > ; 'Ian > Jackson' ; 'Jan Beulich' ; > 'Stefano Stabellini' > ; 'Wei Liu' > Subject: Re: [PATCH 1/5] xen/common: introduce a

Re: [Xen-devel] [PATCH 0/5] use new API for Xen page tables

2020-04-06 Thread Hongyan Xia
Ping. On Mon, 2020-03-23 at 09:41 +, Hongyan Xia wrote: > From: Hongyan Xia > > This small series is basically just rewriting functions using the new > API to map and unmap PTEs. Each patch is independent. > > Apart from mapping and unmapping page tables, no other functional > change > inte

Re: [PATCH v2 2/2] xen: credit2: fix credit reset happening too few times

2020-04-06 Thread Dario Faggioli
On Thu, 2020-04-02 at 18:32 +, George Dunlap wrote: > > On Mar 19, 2020, at 12:12 AM, Dario Faggioli > > wrote: > > > > There is a bug in commit 5e4b4199667b9 ("xen: credit2: only reset > > credit on reset condition"). In fact, the aim of that commit was to > > make sure that we do not perfor

Re: [PATCH 5/7] xen: include xen/guest_access.h rather than asm/guest_access.h

2020-04-06 Thread Julien Grall
Hi Paul, On 06/04/2020 08:40, Paul Durrant wrote: diff --git a/xen/include/asm-x86/guest_access.h b/xen/include/asm-x86/guest_access.h index 9ee275d01f..5c3dfc47b6 100644 --- a/xen/include/asm-x86/guest_access.h +++ b/xen/include/asm-x86/guest_access.h @@ -54,22 +54,24 @@ /* Cast a XEN_GUEST

Re: [PATCH] xen/blkfront: fix memory allocation flags in blkfront_setup_indirect()

2020-04-06 Thread Roger Pau Monné
On Fri, Apr 03, 2020 at 11:00:34AM +0200, Juergen Gross wrote: > Commit 1d5c76e664333 ("xen-blkfront: switch kcalloc to kvcalloc for > large array allocation") didn't fix the issue it was meant to, as the > flags for allocating the memory are GFP_NOIO, which will lead the > memory allocation fallin

RE: [PATCH 2/5] xen/common/domctl: introduce XEN_DOMCTL_get/setdomaincontext

2020-04-06 Thread Paul Durrant
> -Original Message- > From: Julien Grall > Sent: 01 April 2020 14:42 > To: Paul Durrant ; xen-devel@lists.xenproject.org > Cc: Daniel De Graaf ; Ian Jackson > ; Wei Liu > ; Andrew Cooper ; George Dunlap > ; Jan > Beulich ; Stefano Stabellini > Subject: Re: [PATCH 2/5] xen/common/domctl

Re: [PATCH 1/5] xen/common: introduce a new framework for save/restore of 'domain' context

2020-04-06 Thread Julien Grall
Hi Paul, On 06/04/2020 09:27, Paul Durrant wrote: -Original Message- From: Julien Grall Sent: 03 April 2020 18:24 To: p...@xen.org; xen-devel@lists.xenproject.org Cc: 'Andrew Cooper' ; 'George Dunlap' ; 'Ian Jackson' ; 'Jan Beulich' ; 'Stefano Stabellini' ; 'Wei Liu' Subject: Re: [PA

RE: [PATCH 1/5] xen/common: introduce a new framework for save/restore of 'domain' context

2020-04-06 Thread Paul Durrant
> -Original Message- > From: Julien Grall > Sent: 06 April 2020 10:08 > To: p...@xen.org; xen-devel@lists.xenproject.org > Cc: 'Andrew Cooper' ; 'George Dunlap' > ; 'Ian > Jackson' ; 'Jan Beulich' ; > 'Stefano Stabellini' > ; 'Wei Liu' > Subject: Re: [PATCH 1/5] xen/common: introduce a

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus

2020-04-06 Thread Julien Grall
Hi Jurgen, On 06/04/2020 09:27, Juergen Gross wrote: Since Xen 4.4 the maximum number of event channels for a guest is defaulting to 1023. For large guests with lots of vcpus this is not enough, as e.g. the Linux kernel uses 7 event channels per vcpu, limiting the guest to about 140 vcpus. Lar

Re: [PATCH 1/5] xen/common: introduce a new framework for save/restore of 'domain' context

2020-04-06 Thread Julien Grall
Hi Paul, On 06/04/2020 10:18, Paul Durrant wrote: -Original Message- From: Julien Grall Sent: 06 April 2020 10:08 To: p...@xen.org; xen-devel@lists.xenproject.org Cc: 'Andrew Cooper' ; 'George Dunlap' ; 'Ian Jackson' ; 'Jan Beulich' ; 'Stefano Stabellini' ; 'Wei Liu' Subject: Re: [PA

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus

2020-04-06 Thread Jürgen Groß
On 06.04.20 11:24, Julien Grall wrote: Hi Jurgen, On 06/04/2020 09:27, Juergen Gross wrote: Since Xen 4.4 the maximum number of event channels for a guest is defaulting to 1023. For large guests with lots of vcpus this is not enough, as e.g. the Linux kernel uses 7 event channels per vcpu, limi

RE: [PATCH 1/5] xen/common: introduce a new framework for save/restore of 'domain' context

2020-04-06 Thread Paul Durrant
> -Original Message- [snip] > >> * The name of the hypercall does not say anything about "PV". So a > >> contributor could think it would be fine to save/restore new HVM state > >> in the new generic hypercall. Is it going to be an issue? If so, how do > >> we prevent it? > > > > The co

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus

2020-04-06 Thread Julien Grall
Hi Juergen, On 06/04/2020 11:17, Jürgen Groß wrote: On 06.04.20 11:24, Julien Grall wrote: Hi Jurgen, On 06/04/2020 09:27, Juergen Gross wrote: Since Xen 4.4 the maximum number of event channels for a guest is defaulting to 1023. For large guests with lots of vcpus this is not enough, as e.g.

Re: [PATCH OSSTEST] linux: enable x2APIC kernel support

2020-04-06 Thread Ian Jackson
Roger Pau Monne writes ("[PATCH OSSTEST] linux: enable x2APIC kernel support"): > Without it Linux is not able to parse the x2APIC ACPI MADT entries > crafted by Xen when booted in PVH mode, following log is from one of > the dom0pvh jobs: Acked-by: Ian Jackson And pushed to pretest. Thanks, Ia

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus

2020-04-06 Thread Ian Jackson
Jürgen Groß writes ("Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus"): > On 06.04.20 11:24, Julien Grall wrote: > > Large guests on which arch? Which type of guests? > > I'm pretty sure this applies to x86 only. I'm not aware of event > channels being used on AR

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus

2020-04-06 Thread Jürgen Groß
On 06.04.20 12:37, Julien Grall wrote: Hi Juergen, On 06/04/2020 11:17, Jürgen Groß wrote: On 06.04.20 11:24, Julien Grall wrote: Hi Jurgen, On 06/04/2020 09:27, Juergen Gross wrote: Since Xen 4.4 the maximum number of event channels for a guest is defaulting to 1023. For large guests with l

Re: [PATCH v13 1/3] xen/mem_sharing: VM forking

2020-04-06 Thread Roger Pau Monné
On Mon, Mar 30, 2020 at 08:02:08AM -0700, Tamas K Lengyel wrote: > VM forking is the process of creating a domain with an empty memory space and > a > parent domain specified from which to populate the memory when necessary. For > the new domain to be functional the VM state is copied over as part

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus

2020-04-06 Thread Ian Jackson
Jürgen Groß writes ("Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus"): > Okay, what about moving the default setting of b_info->event_channels > into libxl__arch_domain_build_info_setdefault() then? FTAOD, if this satisfies ARM maintainers then I am content with

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus

2020-04-06 Thread Julien Grall
Hi Ian, On 06/04/2020 11:47, Ian Jackson wrote: Jürgen Groß writes ("Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus"): On 06.04.20 11:24, Julien Grall wrote: Large guests on which arch? Which type of guests? I'm pretty sure this applies to x86 only. I'm no

[PATCH v9 0/3] x86/guest: use assisted TLB flush in guest mode

2020-04-06 Thread Roger Pau Monne
Hello, This is the remaining of the assisted TLB flush series. This last set of patches enable the usage of the Xen assisted flush when running nested on Xen. Thanks, Roger. Roger Pau Monne (3): x86/tlb: introduce a flush HVM ASIDs flag x86/tlb: allow disabling the TLB clock x86/tlb: use X

[PATCH v9 1/3] x86/tlb: introduce a flush HVM ASIDs flag

2020-04-06 Thread Roger Pau Monne
Introduce a specific flag to request a HVM guest linear TLB flush, which is an ASID/VPID tickle that forces a guest linear to guest physical TLB flush for all HVM guests. This was previously unconditionally done in each pre_flush call, but that's not required: HVM guests not using shadow don't req

[PATCH v9 2/3] x86/tlb: allow disabling the TLB clock

2020-04-06 Thread Roger Pau Monne
The TLB clock is helpful when running Xen on bare metal because when doing a TLB flush each CPU is IPI'ed and can keep a timestamp of the last flush. This is not the case however when Xen is running virtualized, and the underlying hypervisor provides mechanism to assist in performing TLB flushes:

[PATCH v9 3/3] x86/tlb: use Xen L0 assisted TLB flush when available

2020-04-06 Thread Roger Pau Monne
Use Xen's L0 HVMOP_flush_tlbs hypercall in order to perform flushes. This greatly increases the performance of TLB flushes when running with a high amount of vCPUs as a Xen guest, and is specially important when running in shim mode. The following figures are from a PV guest running `make -j32 xen

Re: [PATCH for-5.0] xen-block: Fix double qlist remove

2020-04-06 Thread Anthony PERARD
On Thu, Apr 02, 2020 at 03:27:22PM +0100, Paul Durrant wrote: > > -Original Message- > > From: Anthony PERARD > > Sent: 02 April 2020 14:08 > > To: qemu-de...@nongnu.org > > Cc: qemu-sta...@nongnu.org; Anthony PERARD ; > > Stefano Stabellini > > ; Paul Durrant ; Stefan Hajnoczi > > ; Kev

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus [and 1 more messages]

2020-04-06 Thread Ian Jackson
Julien Grall writes ("Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus"): > There are no correlation between event channels and vCPUs. The number of > event channels only depends on the number of frontend you have in your > guest. So... > > Hi Ian, > > On 06/04

Re: [PATCH v2] xen/guest_access: Harden *copy_to_guest_offset() to prevent const dest operand

2020-04-06 Thread Jan Beulich
On 04.04.2020 15:06, Julien Grall wrote: > From: Julien Grall > > At the moment, *copy_to_guest_offset() will allow the hypervisor to copy > data to guest handle marked const. > > Thankfully, no users of the helper will do that. Rather than hoping this > can be caught during review, harden copy_

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus [and 1 more messages]

2020-04-06 Thread Jürgen Groß
On 06.04.20 13:00, Ian Jackson wrote: Julien Grall writes ("Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus"): There are no correlation between event channels and vCPUs. The number of event channels only depends on the number of frontend you have in your guest.

Re: [PATCH 0/5] use new API for Xen page tables

2020-04-06 Thread Jan Beulich
On 06.04.2020 10:27, Hongyan Xia wrote: > Ping. Does this somehow imply you didn't get my replies sent on the 1st? Jan > On Mon, 2020-03-23 at 09:41 +, Hongyan Xia wrote: >> From: Hongyan Xia >> >> This small series is basically just rewriting functions using the new >> API to map and unmap

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus [and 1 more messages]

2020-04-06 Thread Jan Beulich
On 06.04.2020 13:00, Ian Jackson wrote: > Julien Grall writes ("Re: [PATCH v2] tools/libxl: make default of max event > channels dependant on vcpus"): >> There are no correlation between event channels and vCPUs. The number of >> event channels only depends on the number of frontend you have in y

[xen-unstable test] 149451: tolerable FAIL

2020-04-06 Thread osstest service owner
flight 149451 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/149451/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-rtds 16 guest-localmigrate fail like 149406 test-armhf-armhf-libvirt 14 save

Re: [Xen-devel] [PATCH v2 2/2] xen: credit2: fix credit reset happening too few times

2020-04-06 Thread Jan Beulich
On 19.03.2020 01:12, Dario Faggioli wrote: > @@ -3328,12 +3325,9 @@ runq_candidate(struct csched2_runqueue_data *rqd, > (unsigned char *)&d); > } > > -/* Only consider units that are allowed to run on this processor. */ > +/* Only consider vcpus t

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus [and 1 more messages]

2020-04-06 Thread Jürgen Groß
On 06.04.20 13:11, Jan Beulich wrote: On 06.04.2020 13:00, Ian Jackson wrote: Julien Grall writes ("Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus"): There are no correlation between event channels and vCPUs. The number of event channels only depends on the n

Re: Live migration and PV device handling

2020-04-06 Thread Andrew Cooper
On 06/04/2020 08:50, Paul Durrant wrote: >> -Original Message- >> From: Xen-devel On Behalf Of Dongli >> Zhang >> Sent: 03 April 2020 23:33 >> To: Andrew Cooper ; Anastassios Nanos >> ; xen- >> de...@lists.xen.org >> Subject: Re: Live migration and PV device handling >> >> Hi Andrew, >>

[PATCH v2 for-5.0] xen-block: Fix double qlist remove and request leak

2020-04-06 Thread Anthony PERARD
Commit a31ca6801c02 ("qemu/queue.h: clear linked list pointers on remove") revealed that a request was removed twice from a list, once in xen_block_finish_request() and a second time in xen_block_release_request() when both function are called from xen_block_complete_aio(). But also, the `requests_

Re: [PATCH v13 1/3] xen/mem_sharing: VM forking

2020-04-06 Thread Tamas K Lengyel
On Mon, Apr 6, 2020 at 4:52 AM Roger Pau Monné wrote: > > On Mon, Mar 30, 2020 at 08:02:08AM -0700, Tamas K Lengyel wrote: > > VM forking is the process of creating a domain with an empty memory space > > and a > > parent domain specified from which to populate the memory when necessary. > > For

RE: [PATCH v2 for-5.0] xen-block: Fix double qlist remove and request leak

2020-04-06 Thread Paul Durrant
> -Original Message- > From: Anthony PERARD > Sent: 06 April 2020 15:02 > To: qemu-de...@nongnu.org > Cc: qemu-sta...@nongnu.org; Anthony PERARD ; > Stefano Stabellini > ; Paul Durrant ; Stefan Hajnoczi > ; Kevin > Wolf ; Max Reitz ; > xen-devel@lists.xenproject.org; qemu- > bl...@nongn

[PATCH v14 0/3] VM forking

2020-04-06 Thread Tamas K Lengyel
The following series implements VM forking for Intel HVM guests to allow for the fast creation of identical VMs without the assosciated high startup costs of booting or restoring the VM from a savefile. JIRA issue: https://xenproject.atlassian.net/browse/XEN-89 The fork operation is implemented a

[PATCH v14 3/3] xen/tools: VM forking toolstack side

2020-04-06 Thread Tamas K Lengyel
Add necessary bits to implement "xl fork-vm" commands. The command allows the user to specify how to launch the device model allowing for a late-launch model in which the user can execute the fork without the device model and decide to only later launch it. Signed-off-by: Tamas K Lengyel --- doc

[PATCH v14 2/3] x86/mem_sharing: reset a fork

2020-04-06 Thread Tamas K Lengyel
Implement hypercall that allows a fork to shed all memory that got allocated for it during its execution and re-load its vCPU context from the parent VM. This allows the forked VM to reset into the same state the parent VM is in a faster way then creating a new fork would be. Measurements show abou

[PATCH v14 1/3] xen/mem_sharing: VM forking

2020-04-06 Thread Tamas K Lengyel
VM forking is the process of creating a domain with an empty memory space and a parent domain specified from which to populate the memory when necessary. For the new domain to be functional the VM state is copied over as part of the fork operation (HVM params, hap allocation, etc). Signed-off-by:

[PATCH for-5.0] xen-block: Fix uninitialized variable

2020-04-06 Thread Anthony PERARD
Since 7f5d9b206d1e ("object-add: don't create return value if failed"), qmp_object_add() don't write any value in 'ret_data', thus has random data. Then qobject_unref() fails and abort(). Fix by initialising 'ret_data' properly. Fixes: 5f07c4d60d09 ("qapi: Flatten object-add") Signed-off-by: Anth

Re: [PATCH for-5.0] xen-block: Fix uninitialized variable

2020-04-06 Thread Philippe Mathieu-Daudé
On 4/6/20 6:42 PM, Anthony PERARD wrote: Since 7f5d9b206d1e ("object-add: don't create return value if failed"), qmp_object_add() don't write any value in 'ret_data', thus has random data. Then qobject_unref() fails and abort(). Fix by initialising 'ret_data' properly. Or move qobject_unref()

Re: Live migration and PV device handling

2020-04-06 Thread Tamas K Lengyel
On Fri, Apr 3, 2020 at 6:44 AM Andrew Cooper wrote: > > On 03/04/2020 13:32, Anastassios Nanos wrote: > > Hi all, > > > > I am trying to understand how live-migration happens in xen. I am > > looking in the HVM guest case and I have dug into the relevant parts > > of the toolstack and the hypervis

Re: [PATCH for-5.0] xen-block: Fix uninitialized variable

2020-04-06 Thread Anthony PERARD
On Mon, Apr 06, 2020 at 06:50:41PM +0200, Philippe Mathieu-Daudé wrote: > On 4/6/20 6:42 PM, Anthony PERARD wrote: > > Since 7f5d9b206d1e ("object-add: don't create return value if > > failed"), qmp_object_add() don't write any value in 'ret_data', thus > > has random data. Then qobject_unref() fai

Re: Live migration and PV device handling

2020-04-06 Thread Andrew Cooper
On 06/04/2020 18:16, Tamas K Lengyel wrote: > On Fri, Apr 3, 2020 at 6:44 AM Andrew Cooper > wrote: >> On 03/04/2020 13:32, Anastassios Nanos wrote: >>> Hi all, >>> >>> I am trying to understand how live-migration happens in xen. I am >>> looking in the HVM guest case and I have dug into the rele

[linux-linus test] 149452: regressions - trouble: broken/fail/pass

2020-04-06 Thread osstest service owner
flight 149452 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/149452/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-amd64 broken test-amd64-i386-xl-qemuu-debianhvm-amd6

Re: [PATCH v2 3/3] xen/x86: ioapic: Simplify ioapic_init()

2020-04-06 Thread Jan Beulich
On 04.04.2020 12:26, Julien Grall wrote: > From: Julien Grall > > Since commit 9facd54a45 "x86/ioapic: Add register level checks to detect > bogus io-apic entries", Xen is able to cope with IO APICs not mapped in > the fixmap. > > Therefore the whole logic to allocate a fake page for some IO API

Re: [PATCH 2/5] xen/common/domctl: introduce XEN_DOMCTL_get/setdomaincontext

2020-04-06 Thread Jan Beulich
On 06.04.2020 11:07, Paul Durrant wrote: >> -Original Message- >> From: Julien Grall >> Sent: 01 April 2020 14:42 >> >> On 27/03/2020 18:50, Paul Durrant wrote: >> Also, in the case of XEN_DOMCTL_setdomaincontext, the buffer is not >> meant to be modified by the hypervisor. So I would rath

Re: Live migration and PV device handling

2020-04-06 Thread Tamas K Lengyel
On Mon, Apr 6, 2020 at 11:24 AM Andrew Cooper wrote: > > On 06/04/2020 18:16, Tamas K Lengyel wrote: > > On Fri, Apr 3, 2020 at 6:44 AM Andrew Cooper > > wrote: > >> On 03/04/2020 13:32, Anastassios Nanos wrote: > >>> Hi all, > >>> > >>> I am trying to understand how live-migration happens in xe

Re: [PATCH v7 08/12] xen: add /buildinfo/config entry to hypervisor filesystem

2020-04-06 Thread Jan Beulich
On 03.04.2020 17:45, Jürgen Groß wrote: > On 03.04.20 17:33, Jan Beulich wrote: >> On 03.04.2020 17:12, Jürgen Groß wrote: >>> On 03.04.20 16:31, Jan Beulich wrote: On 02.04.2020 17:46, Juergen Gross wrote: > --- a/xen/common/Kconfig > +++ b/xen/common/Kconfig > @@ -353,6 +353,16 @

Re: [PATCH v2] tools/libxl: make default of max event channels dependant on vcpus [and 1 more messages]

2020-04-06 Thread Jan Beulich
On 06.04.2020 13:54, Jürgen Groß wrote: > On 06.04.20 13:11, Jan Beulich wrote: >> On 06.04.2020 13:00, Ian Jackson wrote: >>> Julien Grall writes ("Re: [PATCH v2] tools/libxl: make default of max event >>> channels dependant on vcpus"): There are no correlation between event channels and vCP

Re: [RFC] hw/usb/xen-usb.c: Pass struct usbback_req* to usbback_packet_complete()

2020-04-06 Thread Anthony PERARD
On Mon, Mar 23, 2020 at 04:43:18PM +, Peter Maydell wrote: > The function usbback_packet_complete() currently takes a USBPacket*, > which must be a pointer to the packet field within a struct > usbback_req; the function uses container_of() to get the struct > usbback_req* given the USBPacket*.

Re: [PATCH v2] xen/arm: implement GICD_I[S/C]ACTIVER reads

2020-04-06 Thread George Dunlap
> On Apr 3, 2020, at 9:27 PM, Julien Grall wrote: > > On Fri, 3 Apr 2020 at 20:41, Stefano Stabellini > wrote: >> >> On Thu, 2 Apr 2020, Julien Grall wrote: >>> As we discussed on Tuesday, the cost for other vCPUs is only going to be a >>> trap to the hypervisor and then back again. The cost

Re: [PATCH 1/5] xen/common: introduce a new framework for save/restore of 'domain' context

2020-04-06 Thread Jan Beulich
On 06.04.2020 12:34, Paul Durrant wrote: >>> Do you think this should also appear in a comment? Do we really care? >>> Nothing fundamentally prevents >> the mechanism being used for HVM state, but that may introduce an ordering >> dependency. >> >> I don't particularly like the idea to let the co

Re: [XEN PATCH] hvmloader: Enable MMIO and I/O decode, after all resource allocation

2020-04-06 Thread Andrew Cooper
On 06/04/2020 18:46, Harsha Shamsundara Havanur wrote: > It was observed that PCI MMIO and/or IO BARs were programmed with > BUS master, memory and I/O decodes (bits 0,1 and 2 of PCI COMMAND > register) enabled, during PCI setup phase. This resulted in > spurious and premature bus transactions as s

Re: [PATCH v2] xen/arm: implement GICD_I[S/C]ACTIVER reads

2020-04-06 Thread Julien Grall
On 06/04/2020 18:58, George Dunlap wrote: On Apr 3, 2020, at 9:27 PM, Julien Grall wrote: On Fri, 3 Apr 2020 at 20:41, Stefano Stabellini wrote: On Thu, 2 Apr 2020, Julien Grall wrote: As we discussed on Tuesday, the cost for other vCPUs is only going to be a trap to the hypervisor an

[ovmf test] 149462: all pass - PUSHED

2020-04-06 Thread osstest service owner
flight 149462 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/149462/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf ee026ea78b0e32a9ffbaf0040afe91de8ae2179c baseline version: ovmf ef5dcba975ee3b4c29b19

[qemu-mainline test] 149458: regressions - FAIL

2020-04-06 Thread osstest service owner
flight 149458 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/149458/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 10 debian-hvm-install fail REGR. vs. 144861 test-amd6

[linux-linus test] 149469: regressions - trouble: broken/fail/pass

2020-04-06 Thread osstest service owner
flight 149469 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/149469/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-dom0pvh-xl-amd broken test-amd64-i386-libvirt-pair

Re: [PATCH for-5.0] xen-block: Fix uninitialized variable

2020-04-06 Thread Markus Armbruster
Anthony PERARD writes: > On Mon, Apr 06, 2020 at 06:50:41PM +0200, Philippe Mathieu-Daudé wrote: >> On 4/6/20 6:42 PM, Anthony PERARD wrote: >> > Since 7f5d9b206d1e ("object-add: don't create return value if >> > failed"), qmp_object_add() don't write any value in 'ret_data', thus >> > has random

[libvirt test] 149482: regressions - FAIL

2020-04-06 Thread osstest service owner
flight 149482 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/149482/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 146182 build-i386-libvirt