Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-11 Thread Tian, Kevin
> From: Tian, Kevin > Sent: Friday, December 12, 2014 2:30 PM > > > > Conclusion > > -- > > > > That's enough rambling from me -- time to come back down to earth. > > While I think it's useful to think about all these things, we don't > > want to get carried away. :) And as I said, for som

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-11 Thread Tian, Kevin
> From: Tim Deegan > Sent: Friday, December 12, 2014 12:47 AM > > Hi, > > At 01:41 + on 11 Dec (1418258504), Tian, Kevin wrote: > > > From: Tim Deegan [mailto:t...@xen.org] > > > It is Xen's job to isolate VMs from each other. As part of that, Xen > > > uses the MMU, nested paging, and IOMMU

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-11 Thread Tian, Kevin
> From: Tim Deegan [mailto:t...@xen.org] > Sent: Friday, December 12, 2014 5:29 AM > > Hi, again. :) > > As promised, I'm going to talk about more abstract design > considerations. Thi will be a lot less concrete than in the other > email, and about a larger range of things. Some of of them may

[Xen-devel] [libvirt test] 32272: tolerable FAIL - PUSHED

2014-12-11 Thread xen . org
flight 32272 libvirt real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32272/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-libvirt 9 guest-start fail never pass test-amd64-amd64-libvirt 9 guest-start

Re: [Xen-devel] Timed out waiting for device dev-hvc0.device.

2014-12-11 Thread Alexander Graf
On 12.12.14 02:20, manish jaggi wrote: > On 11 December 2014 at 16:32, Alexander Graf wrote: >> >> >> On 12.12.14 01:25, manish jaggi wrote: >>> On 11 December 2014 at 02:23, Julien Grall wrote: Hello, On 11/12/2014 02:27, manish jaggi wrote: > > I am facing this iss

Re: [Xen-devel] Timed out waiting for device dev-hvc0.device.

2014-12-11 Thread manish jaggi
On 11 December 2014 at 16:32, Alexander Graf wrote: > > > On 12.12.14 01:25, manish jaggi wrote: >> On 11 December 2014 at 02:23, Julien Grall wrote: >>> Hello, >>> >>> >>> On 11/12/2014 02:27, manish jaggi wrote: I am facing this issue when booting Xen Dom0 (OpenSuse Rootfs)

Re: [Xen-devel] Timed out waiting for device dev-hvc0.device.

2014-12-11 Thread Alexander Graf
On 12.12.14 01:25, manish jaggi wrote: > On 11 December 2014 at 02:23, Julien Grall wrote: >> Hello, >> >> >> On 11/12/2014 02:27, manish jaggi wrote: >>> >>> I am facing this issue when booting Xen Dom0 (OpenSuse Rootfs) >>> >>> ... >>> >>> [ OK ] Reached target Host and Network Name Lookups.

Re: [Xen-devel] Timed out waiting for device dev-hvc0.device.

2014-12-11 Thread manish jaggi
On 11 December 2014 at 02:23, Julien Grall wrote: > Hello, > > > On 11/12/2014 02:27, manish jaggi wrote: >> >> I am facing this issue when booting Xen Dom0 (OpenSuse Rootfs) >> >> ... >> >> [ OK ] Reached target Host and Network Name Lookups. >> [ OK ] Started OpenSSH Daemon. >> [ TIME ] Time

Re: [Xen-devel] [PATCH 0/4 v2] tools/hotplug: systemd changes for 4.5

2014-12-11 Thread Konrad Rzeszutek Wilk
On December 11, 2014 2:20:59 PM EST, Olaf Hering wrote: >On Thu, Dec 11, Konrad Rzeszutek Wilk wrote: > >> I wonder if we can detect the context during build-time (an autoconf >function >> that checks whether the build is done for Fedora?) >> But what if the version of Fedora is different and the

Re: [Xen-devel] Installing xen tools on Distros

2014-12-11 Thread M A Young
On Thu, 11 Dec 2014, Vijay Kilari wrote: Apart from OpenSUSE, I am looking for booting Dom0 with other distros like Redhat & Ubuntu. If so what is the procedure for installing xen tools on these distros? Check out the wiki. A good place to start is http://wiki.xenproject.org/wiki/Getting_S

Re: [Xen-devel] [PATCH v2] x86/hvm: Extend HVM cpuid leaf with vcpu id

2014-12-11 Thread Matt Wilson
On Thu, Nov 06, 2014 at 03:26:24PM +, Paul Durrant wrote: > To perform certain hypercalls HVM guests need to use Xen's idea of > vcpu id, which may well not match the guest OS idea of CPU id. > This patch adds vcpu id to the HVM cpuid leaf allowing the guest > to build a mapping. One more tang

[Xen-devel] [xen-4.4-testing test] 32231: tolerable FAIL - PUSHED

2014-12-11 Thread xen . org
flight 32231 xen-4.4-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32231/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 32164 Tests which did not succee

[Xen-devel] Installing xen tools on Distros

2014-12-11 Thread Vijay Kilari
Hi, Apart from OpenSUSE, I am looking for booting Dom0 with other distros like Redhat & Ubuntu. If so what is the procedure for installing xen tools on these distros? Regards Vijay ___ Xen-devel mailing list Xen-devel@lists.xen.org http://lists.xen

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-11 Thread Tim Deegan
Hi, again. :) As promised, I'm going to talk about more abstract design considerations. Thi will be a lot less concrete than in the other email, and about a larger range of things. Some of of them may not be really desirable - or even possible. [ TL;DR: read the other reply with the practical s

Re: [Xen-devel] [PATCH v2 1/2] sched: add cond_resched_irq()

2014-12-11 Thread Luis R. Rodriguez
On Thu, Dec 11, 2014 at 06:31:54AM -0700, Jan Beulich wrote: > >>> On 11.12.14 at 00:34, wrote: > > --- a/kernel/sched/core.c > > +++ b/kernel/sched/core.c > > @@ -4239,6 +4239,16 @@ int __sched _cond_resched(void) > > } > > EXPORT_SYMBOL(_cond_resched); > > > > +int __sched cond_resched_irq(v

Re: [Xen-devel] [PATCH v2 2/2] x86/xen: allow privcmd hypercalls to be preempted

2014-12-11 Thread Luis R. Rodriguez
On Thu, Dec 11, 2014 at 11:09:42AM +, David Vrabel wrote: > On 10/12/14 23:51, Andy Lutomirski wrote: > > On Wed, Dec 10, 2014 at 3:34 PM, Luis R. Rodriguez > > All that being said, this is IMO a bit gross. You've added a bunch of > > asm that's kind of like a parallel error_exit, and the erro

Re: [Xen-devel] [PATCH v2 2/2] x86/xen: allow privcmd hypercalls to be preempted

2014-12-11 Thread Luis R. Rodriguez
On Thu, Dec 11, 2014 at 10:47:44AM -0800, H. Peter Anvin wrote: > On 12/10/2014 05:03 PM, Luis R. Rodriguez wrote: > > > > This is an issue onloy for for non*-preemptive kernels. > > > > Some of Xen's hypercalls can take a long time and unfortunately for > > *non*-preemptive kernels this can be q

Re: [Xen-devel] [PATCH] x86/hvm: Extend HVM cpuid leaf with vcpu id

2014-12-11 Thread Matt Wilson
On Thu, Dec 11, 2014 at 07:00:55PM +, Andrew Cooper wrote: > On 11/12/14 18:19, Matt Wilson wrote: > > On Wed, Dec 10, 2014 at 10:36:18AM +, Andrew Cooper wrote: > >> On 10/12/14 06:00, Matt Wilson wrote: > >>> That's not strictly true. You can use the processor index in ACPI. > >> The LAPI

[Xen-devel] Monday is the Last Xen Project Document Day of 2014

2014-12-11 Thread Russ Pavlicek
Monday, December 15, will be our last Document Day of the year. Given the 4.5 RC4 Testing scheduled for Wednesday of next week and the holidays which occur later in the month, we have scheduled Document Day for Monday. This is a great time to get our documentation ready for the new release. Have

Re: [Xen-devel] patches pending acks (or naks)

2014-12-11 Thread Konrad Rzeszutek Wilk
On Thu, Dec 11, 2014 at 03:38:39PM +, Jan Beulich wrote: > >>> On 11.12.14 at 16:18, wrote: > > On December 11, 2014 6:39:07 AM EST, Jan Beulich wrote: > >>Either > >>http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg00260.html > >>or (my preference) > >>http://lists.xenproject.

Re: [Xen-devel] [PATCH 0/4 v2] tools/hotplug: systemd changes for 4.5

2014-12-11 Thread Olaf Hering
On Thu, Dec 11, Konrad Rzeszutek Wilk wrote: > I wonder if we can detect the context during build-time (an autoconf function > that checks whether the build is done for Fedora?) > But what if the version of Fedora is different and the object is called > something else? Exactly. The build host is

[Xen-devel] [qemu-mainline test] 32232: regressions - FAIL

2014-12-11 Thread xen . org
flight 32232 qemu-mainline real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32232/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-pvops 5 kernel-build fail REGR. vs. 32194 Regressions which a

Re: [Xen-devel] [PATCH 0/4 v2] tools/hotplug: systemd changes for 4.5

2014-12-11 Thread Konrad Rzeszutek Wilk
On Thu, Dec 11, 2014 at 01:04:24PM +0100, Olaf Hering wrote: > On Thu, Dec 11, M A Young wrote: > > > Yes, you do need to set explicit selinux permissions when mounting > > /var/lib/xenstored as otherwise it gets a tmpfs selinux context which > > xenstored can't use in enforcing mode. > > Is that

Re: [Xen-devel] Few Comments on the Xen SMMU ARM code

2014-12-11 Thread Julien Grall
Hello Manish, On 11/12/14 18:02, manish jaggi wrote: > On 11 December 2014 at 02:30, Stefano Stabellini > wrote: >> On Wed, 10 Dec 2014, manish jaggi wrote: >>> Based on my experience with PCI passthrough code merging, below are >>> some comments: >>> Both require a change in code >>> >>> a) The

Re: [Xen-devel] [PATCH] x86/hvm: Extend HVM cpuid leaf with vcpu id

2014-12-11 Thread Andrew Cooper
On 11/12/14 18:19, Matt Wilson wrote: > On Wed, Dec 10, 2014 at 10:36:18AM +, Andrew Cooper wrote: >> On 10/12/14 06:00, Matt Wilson wrote: >>> That's not strictly true. You can use the processor index in ACPI. >> The LAPIC objects in the MADT/APIC table? That is still constructed >> with the

Re: [Xen-devel] [PATCH v2 2/2] x86/xen: allow privcmd hypercalls to be preempted

2014-12-11 Thread H. Peter Anvin
On 12/10/2014 05:03 PM, Luis R. Rodriguez wrote: > > This is an issue onloy for for non*-preemptive kernels. > > Some of Xen's hypercalls can take a long time and unfortunately for > *non*-preemptive kernels this can be quite a bit of an issue. > We've handled situations like this with cond_resch

Re: [Xen-devel] [PATCH] x86/hvm: Extend HVM cpuid leaf with vcpu id

2014-12-11 Thread Matt Wilson
On Wed, Dec 10, 2014 at 10:36:18AM +, Andrew Cooper wrote: > On 10/12/14 06:00, Matt Wilson wrote: > > > > That's not strictly true. You can use the processor index in ACPI. > > The LAPIC objects in the MADT/APIC table? That is still constructed > with the broken LAPIC_ID = 2 * processor_id l

Re: [Xen-devel] [PATCH] x86/hvm: Extend HVM cpuid leaf with vcpu id

2014-12-11 Thread Matt Wilson
On Wed, Dec 10, 2014 at 10:29:46AM +, Jan Beulich wrote: > >>> On 10.12.14 at 07:00, wrote: > > On Thu, Nov 06, 2014 at 09:27:59PM +, Andrew Cooper wrote: > >> On 06/11/2014 19:32, Konrad Rzeszutek Wilk wrote: > >> > On Thu, Nov 06, 2014 at 03:07:10PM +, Paul Durrant wrote: > >> >> To

[Xen-devel] [PATCH 0/4] xen: auto-generate symbols for xen hypercalls

2014-12-11 Thread Juergen Gross
The Xen hypercalls are defined in include/xen/interface/xen.h. There are some places where for each hypercall a table element is created. Instead of manually add each hypercall element to these tables use an auto generated header built during the make process of the kernel. Juergen Gross (4): xe

[Xen-devel] [PATCH 4/4] xen: use generated hypercall symbols in arch/x86/xen/xen-head.S

2014-12-11 Thread Juergen Gross
Instead of manually list each hypercall in arch/x86/xen/xen-head.S use the auto generated symbol list. This also corrects the wrong address of xen_hypercall_mca which was located 32 bytes higher than it should. Symbol addresses have been verified to match the correct ones via objdump output. Bas

[Xen-devel] [PATCH 1/4] xen: build infrastructure for generating hypercall depending symbols

2014-12-11 Thread Juergen Gross
Today there are several places in the kernel which build tables containing one entry for each possible Xen hypercall. Create an infrastructure to be able to generate these tables at build time. Based-on-patch-by: Jan Beulich Signed-off-by: Juergen Gross --- arch/x86/syscalls/Makefile | 9 +

[Xen-devel] [PATCH 3/4] xen: use generated hypervisor symbols in arch/x86/xen/trace.c

2014-12-11 Thread Juergen Gross
Instead of manually list all hypervisor calls in arch/x86/xen/trace.c use the auto generated list. Signed-off-by: Juergen Gross --- arch/x86/xen/trace.c | 50 -- 1 file changed, 4 insertions(+), 46 deletions(-) diff --git a/arch/x86/xen/trace.c b/

[Xen-devel] [PATCH 2/4] xen: synchronize include/xen/interface/xen.h with xen

2014-12-11 Thread Juergen Gross
The header include/xen/interface/xen.h doesn't contain all definitions from Xen's version of that header. Update it accordingly. Signed-off-by: Juergen Gross --- arch/x86/xen/trace.c| 2 +- include/xen/interface/xen.h | 6 +- 2 files changed, 6 insertions(+), 2 deletions(-) diff --g

Re: [Xen-devel] Few Comments on the Xen SMMU ARM code

2014-12-11 Thread manish jaggi
On 11 December 2014 at 02:30, Stefano Stabellini wrote: > On Wed, 10 Dec 2014, manish jaggi wrote: >> Based on my experience with PCI passthrough code merging, below are >> some comments: >> Both require a change in code >> >> a) The current code which is non-pci passthrough requires a devices' >>

[Xen-devel] [xen-4.2-testing test] 32227: FAIL

2014-12-11 Thread xen . org
flight 32227 xen-4.2-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32227/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-rumpuserxen 3 host-install(3) broken in 32162 REGR. vs. 318

Re: [Xen-devel] [PATCH] domctl: fix IRQ permission granting/revocation

2014-12-11 Thread Daniel De Graaf
On 12/11/2014 06:44 AM, Jan Beulich wrote: On 10.12.14 at 10:53, wrote: On Wed, 2014-12-10 at 08:07 +, Jan Beulich wrote: --- a/xen/common/domctl.c +++ b/xen/common/domctl.c @@ -981,18 +981,18 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe case XEN_DOMCTL_irq_permission: { -

Re: [Xen-devel] [PATCH V2] libxl: Set path to console on domain startup.

2014-12-11 Thread Anthony PERARD
On Thu, Dec 11, 2014 at 04:23:15PM +, Ian Campbell wrote: > On Thu, 2014-12-11 at 16:16 +, Anthony PERARD wrote: > > On Tue, Dec 09, 2014 at 03:56:02PM +, Ian Campbell wrote: > > > On Tue, 2014-12-09 at 15:39 +, Anthony PERARD wrote: > > > > The path to the pty of a Xen PV console i

Re: [Xen-devel] One question about the hypercall to translate gfn to mfn.

2014-12-11 Thread Tim Deegan
Hi, At 01:41 + on 11 Dec (1418258504), Tian, Kevin wrote: > > From: Tim Deegan [mailto:t...@xen.org] > > It is Xen's job to isolate VMs from each other. As part of that, Xen > > uses the MMU, nested paging, and IOMMUs to control access to RAM. Any > > software component that can pass a raw

Re: [Xen-devel] [RFC Patch v4 3/9] pass correct file to qemu if we use blktap2

2014-12-11 Thread George Dunlap
On Mon, Sep 22, 2014 at 6:59 AM, Wen Congyang wrote: > If we use blktap2, the correct file should be blktap device > not the pdev_path. > > Signed-off-by: Wen Congyang > Cc: Shriram Rajagopalan > Acked-by: Ian Campbell If I'm reading this correctly, this is actually a fairly serious bug in lib

Re: [Xen-devel] [PATCH V2] libxl: Set path to console on domain startup.

2014-12-11 Thread Ian Campbell
On Thu, 2014-12-11 at 16:16 +, Anthony PERARD wrote: > On Tue, Dec 09, 2014 at 03:56:02PM +, Ian Campbell wrote: > > On Tue, 2014-12-09 at 15:39 +, Anthony PERARD wrote: > > > The path to the pty of a Xen PV console is set only in > > > virDomainOpenConsole. But this is done too late. A

Re: [Xen-devel] [PATCH V2] libxl: Set path to console on domain startup.

2014-12-11 Thread Anthony PERARD
On Tue, Dec 09, 2014 at 03:56:02PM +, Ian Campbell wrote: > On Tue, 2014-12-09 at 15:39 +, Anthony PERARD wrote: > > The path to the pty of a Xen PV console is set only in > > virDomainOpenConsole. But this is done too late. A call to > > virDomainGetXMLDesc done before OpenConsole will not

Re: [Xen-devel] patches pending acks (or naks)

2014-12-11 Thread Jan Beulich
>>> On 11.12.14 at 16:18, wrote: > On December 11, 2014 6:39:07 AM EST, Jan Beulich wrote: >>Either >>http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg00260.html >>or (my preference) >>http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg01054.html >> > > Daniel's patch

Re: [Xen-devel] [PATCH v4 0/9] toolstack-based approach to pvhvm guest kexec

2014-12-11 Thread Olaf Hering
On Thu, Dec 11, David Vrabel wrote: > Nothing special needs to be done with ballooned pages. If frames are > not populated in the original domain, they will be unpopulated in the > new domain. > > It's the responsibility of the guest to ensure it either doesn't kexec > when it is ballooned or th

Re: [Xen-devel] [PATCH v4 0/9] toolstack-based approach to pvhvm guest kexec

2014-12-11 Thread David Vrabel
On 11/12/14 14:24, Olaf Hering wrote: > On Wed, Dec 03, Vitaly Kuznetsov wrote: > >> When a PVHVM linux guest performs kexec there are lots of things which >> require taking care of: >> - shared info, vcpu_info >> - grants >> - event channels >> - ... >> Instead of taking care of all these things

Re: [Xen-devel] patches pending acks (or naks)

2014-12-11 Thread Konrad Rzeszutek Wilk
On December 11, 2014 6:39:07 AM EST, Jan Beulich wrote: >Co-REST-maintainers, > >there are a couple of patches I'd like to ask for feedback on, and I'm >assuming (based on previous replies by him) Konrad is waiting for such >too before considering giving release-acks: > I believe these two alread

Re: [Xen-devel] Question reg. named vif interface support in guest cfg;

2014-12-11 Thread Bjoern Rennhak
Wei, > > So instead of a bunch of vifx.y's I would see x.y ? > Check out > http://xenbits.xen.org/docs/4.4-testing/misc/xl-network-configuration.html > vifname Sorry must have overlooked that, thank you! -Bjoern ___ Xen-devel mailing list Xen-devel@li

[Xen-devel] WARNING: at drivers/xen/gntdev.c:426 unmap_if_in_range+0x5d/0x60 [xen_gntdev]()

2014-12-11 Thread Christopher S. Aker
Xen: 4.4.2-pre (28573:f6f6236af933) + xsa111, xsa112, xsa114 Dom0: 3.17.4 Things go badly after a day or four. We've hit this on a number of previously healthy hosts, since moving from 3.10.x dom0 to 3.17.4: printk: 5441 messages suppressed. grant_table.c:567:d0 Failed to obtain maptrack handle

Re: [Xen-devel] netback: Carrier off / Carrier on again, rinse, repeat

2014-12-11 Thread Zoltan Kiss
Hi, This has been fixed by "f48da8: xen-netback: fix unlimited guest Rx internal queue and carrier flapping", it's already in 3.18, I don't know if it is going to be backported to 3.17 Zoli On 11/12/14 14:42, Christopher S. Aker wrote: Xen: 4.4.2-pre (28573:f6f6236af933) + xsa111, xsa112, x

[Xen-devel] netback: Carrier off / Carrier on again, rinse, repeat

2014-12-11 Thread Christopher S. Aker
Xen: 4.4.2-pre (28573:f6f6236af933) + xsa111, xsa112, xsa114 Dom0: 3.17.4 We recently moved our dom0 from 3.10.x to 3.17.4, in order to avoid a netback host crash that has been plaguing us. After doing so, the new multi-queue netback stuff constantly on/offs carrier on the vif, spamming the con

[Xen-devel] [PATCH v5 8/9] libxl: soft reset support

2014-12-11 Thread Vitaly Kuznetsov
Perform soft reset when a domain did SHUTDOWN_soft_reset. Migrate the content with xc_domain_soft_reset(), reload dm and toolstack. Signed-off-by: Vitaly Kuznetsov --- docs/man/xl.cfg.pod.5| 12 + tools/libxl/libxl.h | 6 +++ tools/libxl/libxl_create.c | 103 +++

[Xen-devel] [PATCH v5 0/9] toolstack-based approach to pvhvm guest kexec

2014-12-11 Thread Vitaly Kuznetsov
This patch series provides x86 PVHVM domains with an ability to perform kexec/kdump. Changes from v4: - "on_soft_reset" option was introduced, now it's possible to specify the behavior [Wei Liu] - renamed libxl__domain_soft_reset_destroy_old to libxl__domain_soft_reset_destroy - libxl__domain_

Re: [Xen-devel] [PATCH v4 0/9] toolstack-based approach to pvhvm guest kexec

2014-12-11 Thread Olaf Hering
On Wed, Dec 03, Vitaly Kuznetsov wrote: > When a PVHVM linux guest performs kexec there are lots of things which > require taking care of: > - shared info, vcpu_info > - grants > - event channels > - ... > Instead of taking care of all these things we can rebuild the domain > performing kexec from

Re: [Xen-devel] [PATCH] Mini-OS: netfront: Fix rx ring starvation in network_rx

2014-12-11 Thread Martin Lucina
mar...@lucina.net said: > Rather, shouldn't the final if() in the loop (where data is sent up) be: > > if(rx->status > NETIF_RSP_NULL) { ... } > > *we can't use NETIF_RSP_OKAY as NETIF_RSP_NULL is defined to be 1 (yuck). > > I don't see any value in keeping the printk(), the netfront driver al

[Xen-devel] [PATCH v5 5/9] libxc: support XEN_DOMCTL_devour

2014-12-11 Thread Vitaly Kuznetsov
Introduce new xc_domain_devour() function to support XEN_DOMCTL_devour. Signed-off-by: Vitaly Kuznetsov --- tools/libxc/include/xenctrl.h | 14 ++ tools/libxc/xc_domain.c | 13 + 2 files changed, 27 insertions(+) diff --git a/tools/libxc/include/xenctrl.h b/tools/l

[Xen-devel] [PATCH v5 6/9] libxl: add libxl__domain_soft_reset_destroy()

2014-12-11 Thread Vitaly Kuznetsov
New libxl__domain_soft_reset_destroy() is an internal-only version of libxl_domain_destroy() which follows the same domain destroy path with the only difference: xc_domain_destroy() is being avoided so the domain is not actually being destroyed. Add soft_reset flag to libxl__domain_destroy_state s

[Xen-devel] [PATCH v5 1/9] xen: introduce DOMDYING_locked state

2014-12-11 Thread Vitaly Kuznetsov
New dying state is requred to indicate that a particular domain is dying but cleanup procedure wasn't started. This state can be set from outside of domain_kill(). Signed-off-by: Vitaly Kuznetsov --- xen/common/domain.c | 1 + xen/include/xen/sched.h | 3 ++- 2 files changed, 3 insertions(+)

[Xen-devel] [PATCH v5 7/9] libxc: introduce soft reset for HVM domains

2014-12-11 Thread Vitaly Kuznetsov
Add new xc_domain_soft_reset() function which performs so-called 'soft reset' for an HVM domain. It is being performed in the following way: - Save HVM context and all HVM params; - Devour original domain with XEN_DOMCTL_devour; - Wait till original domain dies or has no pages left; - Restore HVM c

[Xen-devel] [PATCH v5 4/9] xen: introduce XEN_DOMCTL_devour

2014-12-11 Thread Vitaly Kuznetsov
New operation sets the 'recipient' domain which will receive all memory pages from a particular domain and kills the original domain. Signed-off-by: Vitaly Kuznetsov --- xen/common/domain.c | 3 +++ xen/common/domctl.c | 33 + xen/common/page_allo

[Xen-devel] [PATCH v5 3/9] libxl: support SHUTDOWN_soft_reset shutdown reason

2014-12-11 Thread Vitaly Kuznetsov
Use letter 't' to indicate a domain in such state. Signed-off-by: Vitaly Kuznetsov --- tools/libxl/libxl_types.idl | 1 + tools/libxl/xl_cmdimpl.c | 2 +- tools/python/xen/lowlevel/xl/xl.c | 1 + 3 files changed, 3 insertions(+), 1 deletion(-) diff --git a/tools/libxl/libxl_types

[Xen-devel] [PATCH v5 2/9] xen: introduce SHUTDOWN_soft_reset shutdown reason

2014-12-11 Thread Vitaly Kuznetsov
Signed-off-by: Vitaly Kuznetsov --- xen/common/shutdown.c | 7 +++ xen/include/public/sched.h | 3 ++- 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/xen/common/shutdown.c b/xen/common/shutdown.c index 94d4c53..5c3a158 100644 --- a/xen/common/shutdown.c +++ b/xen/common/sh

[Xen-devel] [PATCH v5 9/9] xsm: add XEN_DOMCTL_devour support

2014-12-11 Thread Vitaly Kuznetsov
Signed-off-by: Vitaly Kuznetsov --- xen/common/domctl.c | 6 ++ xen/include/xsm/dummy.h | 6 ++ xen/include/xsm/xsm.h | 6 ++ xen/xsm/dummy.c | 1 + xen/xsm/flask/hooks.c | 17 + xen/xsm/fl

Re: [Xen-devel] [PATCH v2 1/2] sched: add cond_resched_irq()

2014-12-11 Thread Jan Beulich
>>> On 11.12.14 at 00:34, wrote: > --- a/kernel/sched/core.c > +++ b/kernel/sched/core.c > @@ -4239,6 +4239,16 @@ int __sched _cond_resched(void) > } > EXPORT_SYMBOL(_cond_resched); > > +int __sched cond_resched_irq(void) > +{ > + if (should_resched()) { > + preempt_schedule_ir

Re: [Xen-devel] [PATCH v6 2/2] add a new p2m type - p2m_mmio_write_dm

2014-12-11 Thread Jan Beulich
>>> On 11.12.14 at 13:04, wrote: > At 11:55 +0800 on 06 Dec (1417863337), Yu Zhang wrote: >> From: Yu Zhang >> >> A new p2m type, p2m_mmio_write_dm, is added to trap and emulate >> the write operations on GPU's page tables. Handling of this new >> p2m type are similar with existing p2m_ram_ro in

[Xen-devel] [seabios test] 32215: trouble: broken/fail/pass

2014-12-11 Thread xen . org
flight 32215 seabios real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/32215/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemut-winxpsp3 3 host-install(3) broken REGR. vs. 32126 test

Re: [Xen-devel] [PATCH 22/27] ts-bench-hostcmp-host-prep: new script

2014-12-11 Thread Dario Faggioli
On Thu, 2014-12-11 at 12:32 +, Wei Liu wrote: > On Wed, Dec 10, 2014 at 07:11:52PM +0100, Dario Faggioli wrote: > > + logm("Will run the benchmark on host with: $bcpus vcpus and $bmem MB > > RAM"); > > + > > + my $kernver= get_runvar('kernel_ver',$r{'kernbuildjob'}); > > + my $kopt= "maxcp

Re: [Xen-devel] [PATCH 23/27] ts-bench-hostcmp-host-reset: new script

2014-12-11 Thread Dario Faggioli
On Wed, 2014-12-10 at 19:12 +0100, Dario Faggioli wrote: > From: Dario Faggioli > Somehow, this patch lacks a changelog! :-O Sorry about this too, I'll write one for next version. Regards, Dario > Signed-off-by: Dario Faggioli > Cc: Wei Liu > Cc: Ian Campbell > Cc: Ian Jackson > --- > Oss

Re: [Xen-devel] [PATCH] x86: don't deliver NMI to PVH Dom0

2014-12-11 Thread Jan Beulich
>>> On 11.12.14 at 14:16, wrote: > At 13:09 + on 11 Dec (1418299748), Jan Beulich wrote: >> >>> On 11.12.14 at 14:00, wrote: >> > At 10:47 + on 11 Dec (1418291241), Jan Beulich wrote: >> >> ... for the time being: The mechanism used depends on the domain's use >> >> of the IRET hypercall.

Re: [Xen-devel] [PATCH 17/27] ts-kernbench-reslts: process and plot bench results

2014-12-11 Thread Dario Faggioli
On Wed, 2014-12-10 at 19:11 +0100, Dario Faggioli wrote: > From: Dario Faggioli > Mmm... It's quite weird that some of the patches came out with this 'From:' tag with my pvt address. I guess I've messed up something with the git/stgit configuration on the box from where I sent this. Will fix, pl

Re: [Xen-devel] [PATCH] have architectures specify the number of PIRQs a hardware domain gets

2014-12-11 Thread Jan Beulich
>>> On 11.12.14 at 13:07, wrote: > On Fri, 2014-12-05 at 14:51 +, Ian Campbell wrote: >> On Fri, 2014-12-05 at 14:48 +, Jan Beulich wrote: >> > >>> On 05.12.14 at 15:27, wrote: >> > > On Fri, 2014-12-05 at 13:51 +, Jan Beulich wrote: >> > >> #define nr_static_irqs NR_IRQS >> > >> +#d

Re: [Xen-devel] [PATCH 09/27] ts-unixbench-reslts: process and plot bench results

2014-12-11 Thread Wei Liu
On Thu, Dec 11, 2014 at 02:11:44PM +0100, Dario Faggioli wrote: [...] > > > +sub unixbench_plot_results ($$$) { > > > + my ($dataf,$num_cols,$pfile)= @_; > > > + my $h= new IO::File "> $pfile.gp" or die "$!"; > > > + > > > + printf $h < > > +set terminal png enhanced font > > > "/usr/share/font

Re: [Xen-devel] [PATCH] x86: don't deliver NMI to PVH Dom0

2014-12-11 Thread Tim Deegan
At 13:09 + on 11 Dec (1418299748), Jan Beulich wrote: > >>> On 11.12.14 at 14:00, wrote: > > At 10:47 + on 11 Dec (1418291241), Jan Beulich wrote: > >> ... for the time being: The mechanism used depends on the domain's use > >> of the IRET hypercall. > > > > Can you elaborate? Looking at

Re: [Xen-devel] [PATCH 09/27] ts-unixbench-reslts: process and plot bench results

2014-12-11 Thread Dario Faggioli
On Thu, 2014-12-11 at 12:15 +, Wei Liu wrote: > On Wed, Dec 10, 2014 at 07:10:06PM +0100, Dario Faggioli wrote: > > This is done in a new Osstest/Benchmarking.pm module, as > > the functions introduced may turn out useful somewhere else > > too. > > > > I would suggest using a dedicated comm

Re: [Xen-devel] [v8][PATCH 04/17] update the existing hypercall to support XEN_DOMCTL_set_rdm

2014-12-11 Thread Tim Deegan
At 02:03 + on 11 Dec (1418259797), Tian, Kevin wrote: > > From: Tim Deegan [mailto:t...@xen.org] > > Now since the code's not going to be in 4.5 anyway, it should be > > possible to _develop_ it in this manner, possibly in a private branch, > > even if the early stages aren't getting applied im

Re: [Xen-devel] [PATCH] x86: don't deliver NMI to PVH Dom0

2014-12-11 Thread Jan Beulich
>>> On 11.12.14 at 14:00, wrote: > At 10:47 + on 11 Dec (1418291241), Jan Beulich wrote: >> ... for the time being: The mechanism used depends on the domain's use >> of the IRET hypercall. > > Can you elaborate? Looking at the existing code it seems like what it > does is set v->nmi_pending

Re: [Xen-devel] [PATCH 03/27] Guest setup: allow the amount of RAM to be a runvar

2014-12-11 Thread Wei Liu
On Thu, Dec 11, 2014 at 01:57:59PM +0100, Dario Faggioli wrote: > On Thu, 2014-12-11 at 12:05 +, Wei Liu wrote: > > On Wed, Dec 10, 2014 at 07:09:18PM +0100, Dario Faggioli wrote: > > > diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm > > > index a3b6936..cdff8d5 100644 > > > --- a/

Re: [Xen-devel] [PATCH] x86: don't deliver NMI to PVH Dom0

2014-12-11 Thread Tim Deegan
At 10:47 + on 11 Dec (1418291241), Jan Beulich wrote: > ... for the time being: The mechanism used depends on the domain's use > of the IRET hypercall. Can you elaborate? Looking at the existing code it seems like what it does is set v->nmi_pending and make sure the vcpu gets scheduled approp

Re: [Xen-devel] [PATCH 08/27] ts-unixbench-reslts: for retrieving the results

2014-12-11 Thread Dario Faggioli
On Thu, 2014-12-11 at 12:09 +, Wei Liu wrote: > On Wed, Dec 10, 2014 at 07:09:57PM +0100, Dario Faggioli wrote: > > --- > > ts-unixbench-reslts | 67 > > +++ > > Typo "reslts" (also in subject line). > Yes, it's like that everywhere. In fact,

Re: [Xen-devel] [PATCH 03/27] Guest setup: allow the amount of RAM to be a runvar

2014-12-11 Thread Dario Faggioli
On Thu, 2014-12-11 at 12:05 +, Wei Liu wrote: > On Wed, Dec 10, 2014 at 07:09:18PM +0100, Dario Faggioli wrote: > > diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm > > index a3b6936..cdff8d5 100644 > > --- a/Osstest/TestSupport.pm > > +++ b/Osstest/TestSupport.pm > > @@ -1460,11 +1

Re: [Xen-devel] [PATCH] lock down hypercall continuation encoding masks

2014-12-11 Thread Tim Deegan
At 11:31 + on 05 Dec (1417775465), Jan Beulich wrote: > Andrew validly points out that even if these masks aren't a formal part > of the hypercall interface, we aren't free to change them: A guest > suspended for migration in the middle of a continuation would fail to > work if resumed on a hyp

Re: [Xen-devel] [PATCH 22/27] ts-bench-hostcmp-host-prep: new script

2014-12-11 Thread Wei Liu
On Wed, Dec 10, 2014 at 07:11:52PM +0100, Dario Faggioli wrote: [...] > + > + logm("Will run the benchmark on host with: $bcpus vcpus and $bmem MB RAM"); > + > + my $kernver= get_runvar('kernel_ver',$r{'kernbuildjob'}); > + my $kopt= "maxcpus=$bcpus mem=$bmem" . "M"; > + > + if ($ho->{Flags}{'n

Re: [Xen-devel] [PATCH 0/4 v2] tools/hotplug: systemd changes for 4.5

2014-12-11 Thread M A Young
On Thu, 11 Dec 2014, Olaf Hering wrote: On Thu, Dec 11, Olaf Hering wrote: This sounds like xenstored has to parse the possible environment variables found in sysconfig.xencommons all by itself? Is there perhaps a way out of the SELinux jail? Does all that work with the sysv runlevel scrip

Re: [Xen-devel] [PATCH v1] xen/arm: Manage pl011 uart TX interrupt correctly

2014-12-11 Thread Ian Campbell
On Tue, 2014-12-09 at 10:09 +0530, vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > In pl011.c, when TX interrupt is received > serial_tx_interrupt() is called to push next > characters. If TX buffer is empty, serial_tx_interrupt() > does not disable TX interrupt and hence pl011 UART > ir

Re: [Xen-devel] [PATCH v1] xen/arm: Manage pl011 uart TX interrupt correctly

2014-12-11 Thread Tim Deegan
At 10:09 +0530 on 09 Dec (1418116195), vijay.kil...@gmail.com wrote: > From: Vijaya Kumar K > > In pl011.c, when TX interrupt is received > serial_tx_interrupt() is called to push next > characters. If TX buffer is empty, serial_tx_interrupt() > does not disable TX interrupt and hence pl011 UART

Re: [Xen-devel] [PATCH 09/27] ts-unixbench-reslts: process and plot bench results

2014-12-11 Thread Wei Liu
On Wed, Dec 10, 2014 at 07:10:06PM +0100, Dario Faggioli wrote: > From: Dario Faggioli > > Mangle the results of a run of unixbench a bit, so that > they can be plotted. This also produces a (gnu)plot script > and the plot itself. All is saved in $stash, for the > running flight and job. > > >

Re: [Xen-devel] [PATCH] xen: switch to post-init routines in xen mmu.c earlier

2014-12-11 Thread David Vrabel
On 11/12/14 05:32, Juergen Gross wrote: > On 12/10/2014 07:07 PM, David Vrabel wrote: >> On 10/12/14 15:56, Juergen Gross wrote: >>> With the virtual mapped linear p2m list the post-init mmu operations >>> must be used for setting up the p2m mappings, as in case of >>> CONFIG_FLATMEM the init routi

Re: [Xen-devel] [PATCH] xen: switch to post-init routines in xen mmu.c earlier

2014-12-11 Thread David Vrabel
On 11/12/14 05:32, Juergen Gross wrote: > On 12/10/2014 07:07 PM, David Vrabel wrote: >> On 10/12/14 15:56, Juergen Gross wrote: >>> With the virtual mapped linear p2m list the post-init mmu operations >>> must be used for setting up the p2m mappings, as in case of >>> CONFIG_FLATMEM the init routi

Re: [Xen-devel] [PATCH 03/27] Guest setup: allow the amount of RAM to be a runvar

2014-12-11 Thread Wei Liu
On Wed, Dec 10, 2014 at 07:09:18PM +0100, Dario Faggioli wrote: > From: Dario Faggioli > > the value of which can be retrieved via guest_var('memory');. > > This works for both PV and HVM Debian guests. > > Signed-off-by: Dario Faggioli > Cc: Wei Liu > Cc: Ian Campbell > Cc: Ian Jackson > -

Re: [Xen-devel] [PATCH 08/27] ts-unixbench-reslts: for retrieving the results

2014-12-11 Thread Wei Liu
On Wed, Dec 10, 2014 at 07:09:57PM +0100, Dario Faggioli wrote: > and store them in $c{Stash}, in a file named according > to the following convention: > > $hostname--$benchname-$benchparams > > i.e., something like this: > > debian--unixbench-i3-c2 > > Signed-off-by: Dario Faggioli > Cc: We

Re: [Xen-devel] [PATCH] Mini-OS: netfront: Fix rx ring starvation in network_rx

2014-12-11 Thread Martin Lucina
Hi Samuel, Comments and updated patch below. samuel.thiba...@ens-lyon.org said: > > -if (rx->flags & NETRXF_extra_info) > > -{ > > -printk("+ we have extras!\n"); > > -continue; > > -} > > - > > - > > -if (rx->status == N

Re: [Xen-devel] [PATCH v2] console: allocate ring buffer earlier

2014-12-11 Thread Ian Campbell
On Tue, 2014-12-09 at 17:34 +, Jan Beulich wrote: > ... when "conring_size=" was specified on the command line. We can't > really do this as early as we would want to when the option was not > specified, as the default depends on knowing the system CPU count. Yet > the parsing of the ACPI table

Re: [Xen-devel] [PATCH] have architectures specify the number of PIRQs a hardware domain gets

2014-12-11 Thread Ian Campbell
On Fri, 2014-12-05 at 14:51 +, Ian Campbell wrote: > On Fri, 2014-12-05 at 14:48 +, Jan Beulich wrote: > > >>> On 05.12.14 at 15:27, wrote: > > > On Fri, 2014-12-05 at 13:51 +, Jan Beulich wrote: > > >> #define nr_static_irqs NR_IRQS > > >> +#define arch_hwdom_irqs(domid) NR_IRQS > >

Re: [Xen-devel] [PATCH 0/4 v2] tools/hotplug: systemd changes for 4.5

2014-12-11 Thread Olaf Hering
On Thu, Dec 11, Olaf Hering wrote: > This sounds like xenstored has to parse the possible environment > variables found in sysconfig.xencommons all by itself? Is there perhaps > a way out of the SELinux jail? Does all that work with the sysv runlevel scripts? Olaf __

Re: [Xen-devel] [PATCH v6 2/2] add a new p2m type - p2m_mmio_write_dm

2014-12-11 Thread Tim Deegan
At 11:55 +0800 on 06 Dec (1417863337), Yu Zhang wrote: > From: Yu Zhang > > A new p2m type, p2m_mmio_write_dm, is added to trap and emulate > the write operations on GPU's page tables. Handling of this new > p2m type are similar with existing p2m_ram_ro in most condition > checks, with only diffe

[Xen-devel] [GIT PULL] xen: features and fixes for 3.19-rc0

2014-12-11 Thread David Vrabel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git stable/for-linus-3.19-rc0-tag xen: features and fixes for 3.19-rc0 - - Fully support non-coherent devices on ARM by introducing the mechanisms t

Re: [Xen-devel] [PATCH 0/4 v2] tools/hotplug: systemd changes for 4.5

2014-12-11 Thread Olaf Hering
On Thu, Dec 11, M A Young wrote: > Yes, you do need to set explicit selinux permissions when mounting > /var/lib/xenstored as otherwise it gets a tmpfs selinux context which > xenstored can't use in enforcing mode. Is that "enforcing mode" the default? And would it be too cumbersome to have these

Re: [Xen-devel] [PATCH 0/4 v2] tools/hotplug: systemd changes for 4.5

2014-12-11 Thread M A Young
On Thu, 11 Dec 2014, Olaf Hering wrote: On Wed, Dec 10, Konrad Rzeszutek Wilk wrote: On Mon, Dec 08, 2014 at 11:18:05AM +0100, Olaf Hering wrote: This is a resend of this series, with just the low hanging fruits: http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg00669.html This

Re: [Xen-devel] [PATCH] lock down hypercall continuation encoding masks

2014-12-11 Thread Ian Campbell
On Fri, 2014-12-05 at 11:31 +, Jan Beulich wrote: > Andrew validly points out that even if these masks aren't a formal part > of the hypercall interface, we aren't free to change them: A guest > suspended for migration in the middle of a continuation would fail to > work if resumed on a hypervi

Re: [Xen-devel] [OSSTEST PATCH 4/4] Insert nested test job name and runvars into

2014-12-11 Thread Wei Liu
On Wed, Dec 10, 2014 at 04:07:40PM +0800, longtao.pang wrote: > From: "longtao.pang" > > This patch is used for inserting nested test job name and runvars into > standalone.db database after execute command './standalone-reset'. > > --- > make-flight | 19 +++ > mfi-common |

Re: [Xen-devel] [PATCH] domctl: fix IRQ permission granting/revocation

2014-12-11 Thread Jan Beulich
>>> On 10.12.14 at 10:53, wrote: > On Wed, 2014-12-10 at 08:07 +, Jan Beulich wrote: >> --- a/xen/common/domctl.c >> +++ b/xen/common/domctl.c >> @@ -981,18 +981,18 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe >> >> case XEN_DOMCTL_irq_permission: >> { >> -unsigned int pirq

Re: [Xen-devel] [OSSTEST PATCH 3/4] Add nested testcase of installing L2 guest VM

2014-12-11 Thread Wei Liu
On Wed, Dec 10, 2014 at 04:07:39PM +0800, longtao.pang wrote: > From: "longtao.pang" > > This patch is used for installing L2 guest VM inside L1 guest VM. > > --- > sg-run-job|2 + > ts-debian-install | 166 > + > 2 files changed

  1   2   >