[Xen-devel] [xen-unstable test] 101254: regressions - trouble: blocked/broken/fail/pass

2016-10-04 Thread osstest service owner
flight 101254 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/101254/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 8 leak-check/basis(8) fail REGR. vs. 101250

[Xen-devel] [xen-4.7-testing test] 101255: regressions - FAIL

2016-10-04 Thread osstest service owner
flight 101255 xen-4.7-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/101255/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu 15 guest-start/debian.repeat fail REGR. vs. 101197

Re: [Xen-devel] [PATCH RFC] x86/Intel: virtualize support for cpuid faulting

2016-10-04 Thread Kyle Huey
On Tue, Oct 4, 2016 at 12:25 AM, Jan Beulich wrote: On 04.10.16 at 00:38, wrote: >> @@ -2701,9 +2706,13 @@ static int vmx_msr_read_intercept(unsigned int msr, >> uint64_t *msr_content) >> break; >> >> case MSR_INTEL_PLATFORM_INFO: >> -

Re: [Xen-devel] [PATCH RFC] x86/Intel: virtualize support for cpuid faulting

2016-10-04 Thread Kyle Huey
Thanks for the reviews! On Tue, Oct 4, 2016 at 3:31 AM, Andrew Cooper wrote: > On 03/10/16 23:38, Kyle Huey wrote: >> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse- >> execution debugger, would like to trap and emulate the CPUID instruction.

[Xen-devel] [qemu-mainline test] 101251: regressions - FAIL

2016-10-04 Thread osstest service owner
flight 101251 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/101251/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt-qcow2 9 debian-di-install fail REGR. vs. 101240 Regressions

[Xen-devel] [xen-4.4-testing test] 101256: regressions - FAIL

2016-10-04 Thread osstest service owner
flight 101256 xen-4.4-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/101256/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-cubietruck 16 guest-start.2 fail REGR. vs. 100815

Re: [Xen-devel] Xen Code Review Dashboard - Outreachy Program Project

2016-10-04 Thread Jesus M. Gonzalez-Barahona
Hi Tevin! If you want, I can define a small contribution for you. Let me know, and I can summarize over email, and if needed we can decide on some IRC time to discuss details (let me know about your timezone and availability to find some convenient slot). Saludos, Jesus. On Tue,

Re: [Xen-devel] [PATCH] [Exynos] Fix to be error handled when 10ms delayed for cpu_on

2016-10-04 Thread Julien Grall
Hello, On 04/10/2016 04:04, JEUNGWOO, YOO wrote: From: casionwoo The "from" should match the signed-off-by below. Comment of origin code said "wait max 10 ms until cpu is on" Origin code expects to print "CPU%d power enable failed", if cpu do not on until 10ms But

Re: [Xen-devel] [PATCH] [Exynos] Fix to be error handled when 10ms delayed for cpu_on

2016-10-04 Thread Stefano Stabellini
On Tue, 4 Oct 2016, JEUNGWOO, YOO wrote: > From: casionwoo > > Comment of origin code said "wait max 10 ms until cpu is on" > Origin code expects to print "CPU%d power enable failed", if cpu do not on > until 10ms > But actual code do not reach to print even it wait 10 ms

[Xen-devel] [xen-unstable-smoke test] 101262: tolerable all pass - PUSHED

2016-10-04 Thread osstest service owner
flight 101262 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101262/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl

[Xen-devel] [OSSTEST PATCH 2/4] host allocation: Pass a debug function in find_recent_duration

2016-10-04 Thread Ian Jackson
We provide only a commented-out debug print. This produces more copius output than is desirable even to a compressed debug log. No functional change. Signed-off-by: Ian Jackson --- ts-hosts-allocate-Executive |5 - 1 file changed, 4 insertions(+), 1

[Xen-devel] [OSSTEST PATCH 4/4] host allocation: Fix duration estimate to not include host allocation

2016-10-04 Thread Ian Jackson
In 720f08cb9052 "Executive: Previous duration estimator: use overall time, not sum of steps" we introduced a bug: the condition to exclude the host allocation time is now not effective if there are any steps before host allocation. Usually there are. This means that the host allocation duration

[Xen-devel] [OSSTEST PATCH 1/4] host allocation: Support -B option

2016-10-04 Thread Ian Jackson
The flight's intended affects the hostflags required, the duration searches, and other decisions. It is particularly useful for debugging, where it can be desirable to try replaying a production job's allocation with a "play" job. Signed-off-by: Ian Jackson ---

[Xen-devel] [OSSTEST PATCH 3/4] host allocation: Dedupe "other hosts" flights in duration estimation

2016-10-04 Thread Ian Jackson
The old query would return one row for each step in each relevant flight. But we are really only interested in the flight. Group by the flight and sort on max(finished). Signed-off-by: Ian Jackson --- Osstest/Executive.pm |6 -- 1 file changed, 4

[Xen-devel] [PATCH Altp2m cleanup v8] Move altp2m specific functions to altp2m files.

2016-10-04 Thread Paul Lai
This makes the code a little easier to read. Moving hvm_altp2m_supported() check into functions that use it for better readability. Moving ept code to ept specific files as requested in: https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04323.html Renamed p2m_init_altp2m_helper()

[Xen-devel] [PATCH Altp2m cleanup v8] Cleaning up altp2m code

2016-10-04 Thread Paul Lai
Altp2m cleanup work The altp2m clean work is motivated by the following URLs: https://lists.xenproject.org/archives/html/xen-devel/2015-07/msg04454.html Most of the work has been: Lots of white space, indentation, and other coding style preference corrections. Lots of moving altp2m functions

Re: [Xen-devel] Question about next_module() function

2016-10-04 Thread Julien Grall
On 23/09/2016 17:36, 조현권 wrote: Hi Hello, Sorry for the late reply. I am experimenting Xen with my embedded system environment and got a question in next_module() function. / / /static paddr_t __init next_module(paddr_t s, paddr_t *end)/ /{/ /struct bootmodules *mi = / /paddr_t

Re: [Xen-devel] [OSSTEST PATCH 1/2] libvirt: Check migration capabilities using proper XML parser

2016-10-04 Thread Ian Jackson
Ian Jackson writes ("[OSSTEST PATCH 1/2] libvirt: Check migration capabilities using proper XML parser"): > Do not grep the virsh capabilities output (!) Instead, parse the XML > using perl's XML modules and look for the specific feature flag using > an XPATH pattern. ...> > +sub

[Xen-devel] [OSSTEST PATCH 0/2] libvirt: Fix save/restore capability check on ARM

2016-10-04 Thread Ian Jackson
Currently, osstest, the Xen Project's automated test framework, erroneously thinks that save/restore is supported with libvirt on ARM. In fact, save/restore is not supported by Xen on ARM at all. The result is that osstest then actually attempts the save/restore, and abandons the test job as a

[Xen-devel] [OSSTEST PATCH 2/2] libvirt: Do not attempt save/restore when migration not advertised

2016-10-04 Thread Ian Jackson
Currently, osstest wrongly thinks that ARM can do save/restore, because `virsh help' does mention the save command (on all architectures). Additionally, check the virth capabilities xpath /capabilities/host/migration_features to try to see whether this host supports migration. I am not sure

[Xen-devel] [OSSTEST PATCH 1/2] libvirt: Check migration capabilities using proper XML parser

2016-10-04 Thread Ian Jackson
Do not grep the virsh capabilities output (!) Instead, parse the XML using perl's XML modules and look for the specific feature flag using an XPATH pattern. AFAICT from looking at the XML, that's But the original code does not test for . Xen could in principle

Re: [Xen-devel] [PATCH] arm: fix build with gcc6

2016-10-04 Thread Stefano Stabellini
On Tue, 4 Oct 2016, Jan Beulich wrote: > Commit e170622f95 ("xen/arm: p2m: Re-implement p2m_set_mem_access using > p2m_{set,get}_entry") eliminated the only user of level_sizes[], > causing gcc6 to warn about the unused variable (as it's a const one > older gcc versions apparently don't care to

[Xen-devel] [xen-unstable-smoke test] 101259: tolerable all pass - PUSHED

2016-10-04 Thread osstest service owner
flight 101259 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101259/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl

Re: [Xen-devel] [PATCH v2 1/3] x86emul: honor guest CR4.OSFXSR and CR4.OSXSAVE

2016-10-04 Thread Andrew Cooper
On 04/10/16 16:10, Jan Beulich wrote: > @@ -767,9 +770,23 @@ static int _get_fpu( > unsigned long cr0; > > fail_if(!ops->read_cr); > +if ( type >= X86EMUL_FPU_xmm ) > +{ > +unsigned long cr4; > + > +rc = ops->read_cr(4, , ctxt); > +

Re: [Xen-devel] Proposed plan and URL name for new VM to download xen tarballs (ftp.xenproject.org)

2016-10-04 Thread Ian Jackson
Lars Kurth writes ("Re: Proposed plan and URL name for new VM to download xen tarballs (ftp.xenproject.org)"): > Using downloads.xenproject.org seems to be the best way then. I have: * Used cvs-repomove to move the primary cvs repository for the Xen releases to mail.xenproject.org aka

[Xen-devel] [PATCH v2 1/3] x86emul: honor guest CR4.OSFXSR and CR4.OSXSAVE

2016-10-04 Thread Jan Beulich
These checks belong into the emulator instead of hvmemul_get_fpu(). The CR0.PE/EFLAGS.VM ones can actually just be ASSERT()ed, as decoding should make it impossible to get into get_fpu() with them in the wrong state. Signed-off-by: Jan Beulich --- v2: Convert CR0.PE /

Re: [Xen-devel] Question about VPID during MOV-TO-CR3

2016-10-04 Thread Tim Deegan
At 08:29 -0600 on 04 Oct (1475569774), Jan Beulich wrote: > >>> On 04.10.16 at 16:12, wrote: > > yes, I understand that is the case when you do need to flush a guest. > > And yes, there seem to be paths that require to bump the tag of a > > specific guest for certain

Re: [Xen-devel] [PATCH v2 net-next 5/7] xen-netback: process guest rx packets in batches

2016-10-04 Thread David Vrabel
On 04/10/16 13:47, Konrad Rzeszutek Wilk wrote: > On Tue, Oct 04, 2016 at 10:29:16AM +0100, Paul Durrant wrote: >> From: David Vrabel >> >> Instead of only placing one skb on the guest rx ring at a time, process >> a batch of up-to 64. This improves performance by ~10%

Re: [Xen-devel] Question about VPID during MOV-TO-CR3

2016-10-04 Thread Jan Beulich
>>> On 04.10.16 at 16:12, wrote: > yes, I understand that is the case when you do need to flush a guest. > And yes, there seem to be paths that require to bump the tag of a > specific guest for certain events (mov-to-cr4 with paging mode changes > for example). What

Re: [Xen-devel] New Outreachy Applicant

2016-10-04 Thread George Dunlap
On 03/10/16 06:14, Ronald Rojas wrote: > On Tue, Sep 20, 2016 at 04:24:47PM +0100, George Dunlap wrote: >> Thanks for your interest in the Xen Project! Sorry for the delay in >> responding -- somehow your mail either never made it to my personal >> inbox or I accidentally deleted it instead of

Re: [Xen-devel] [PATCH v2 net-next 2/7] xen-netback: retire guest rx side prefix GSO feature

2016-10-04 Thread Konrad Rzeszutek Wilk
On Tue, Oct 04, 2016 at 01:35:41PM +, Paul Durrant wrote: > > -Original Message- > > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > > Sent: 04 October 2016 13:52 > > To: Paul Durrant ; annie...@oracle.com; > > joao.m.mart...@oracle.com > > Cc:

Re: [Xen-devel] [PATCH 1/3] x86emul: honor guest CR4.OSFXSR, CR4.OSXSAVE, and CR0.PE/EFLAGS.VM

2016-10-04 Thread Jan Beulich
>>> On 04.10.16 at 15:58, wrote: > On 04/10/16 14:39, Jan Beulich wrote: >> @@ -770,9 +773,23 @@ static int _get_fpu( >> unsigned long cr0; >> >> fail_if(!ops->read_cr); >> +if ( type >= X86EMUL_FPU_xmm ) >> +{ >> +

Re: [Xen-devel] Question about VPID during MOV-TO-CR3

2016-10-04 Thread Tamas K Lengyel
On Tue, Oct 4, 2016 at 1:41 AM, Jan Beulich wrote: On 01.10.16 at 21:05, wrote: >> However, I've found two other sources that need more attention: >> >> In x86/flushtlb.c the function flush_area_local invalidates all guest >> TLBs as such: >>

Re: [Xen-devel] [PATCH v2 net-next 5/7] xen-netback: process guest rx packets in batches

2016-10-04 Thread Paul Durrant
> -Original Message- > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > Sent: 04 October 2016 13:48 > To: Paul Durrant > Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org; Wei Liu > ; David Vrabel

Re: [Xen-devel] [PATCH 2/3] x86emul: deliver correct math exceptions

2016-10-04 Thread Andrew Cooper
On 04/10/16 14:39, Jan Beulich wrote: > #MF only applies to x87 instructions. SSE and AVX ones need #XM to be > raised instead, unless CR4.OSXMMEXCPT is clear, in which case #UD needs > to result. (But note that this is only a latent issue - we don't > emulate any instructions so far which could

Re: [Xen-devel] [PATCH v2 net-next 4/7] xen-netback: immediately wake tx queue when guest rx queue has space

2016-10-04 Thread Paul Durrant
> -Original Message- > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > Sent: 04 October 2016 13:49 > To: Paul Durrant > Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org; Wei Liu > ; David Vrabel

Re: [Xen-devel] [PATCH 1/3] x86emul: honor guest CR4.OSFXSR, CR4.OSXSAVE, and CR0.PE/EFLAGS.VM

2016-10-04 Thread Andrew Cooper
On 04/10/16 14:39, Jan Beulich wrote: > @@ -770,9 +773,23 @@ static int _get_fpu( > unsigned long cr0; > > fail_if(!ops->read_cr); > +if ( type >= X86EMUL_FPU_xmm ) > +{ > +unsigned long cr4; > + > +rc = ops->read_cr(4, , ctxt); > +

Re: [Xen-devel] [PATCH v2 net-next 2/7] xen-netback: retire guest rx side prefix GSO feature

2016-10-04 Thread Paul Durrant
> -Original Message- > From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] > Sent: 04 October 2016 13:52 > To: Paul Durrant ; annie...@oracle.com; > joao.m.mart...@oracle.com > Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org; Wei Liu >

[Xen-devel] [PATCH 3/3] x86emul: check for FPU availability

2016-10-04 Thread Jan Beulich
We can't exclude someone wanting to hide the FPU from guests. Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/arch/x86/x86_emulate/x86_emulate.c @@ -1246,6 +1246,7 @@ static bool_t

[Xen-devel] [PATCH 1/3] x86emul: honor guest CR4.OSFXSR, CR4.OSXSAVE, and CR0.PE/EFLAGS.VM

2016-10-04 Thread Jan Beulich
These checks belong into the emulator instead of hvmemul_get_fpu(). Signed-off-by: Jan Beulich --- Eventually the XCR0 checks should also move into the insn emulator, but that'll require a new hook (or an extension to the read_cr() semantics). ---

[Xen-devel] [PATCH 2/3] x86emul: deliver correct math exceptions

2016-10-04 Thread Jan Beulich
#MF only applies to x87 instructions. SSE and AVX ones need #XM to be raised instead, unless CR4.OSXMMEXCPT is clear, in which case #UD needs to result. (But note that this is only a latent issue - we don't emulate any instructions so far which could result in #XM.) Signed-off-by: Jan Beulich

[Xen-devel] [PATCH 0/3] x86emul: XSA-190 follow-ups

2016-10-04 Thread Jan Beulich
1: honor guest CR4.OSFXSR, CR4.OSXSAVE, and CR0.PE/EFLAGS.VM 2: deliver correct math exceptions 3: check for FPU availability Signed-off-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org

[Xen-devel] Network card in newly created VM

2016-10-04 Thread #PATHANGI JANARDHANAN JATINSHRAVAN#
Hi, I had created a VM in my xen installation with the following command: sudo xen-create-image --hostname=test --memory=512mb --vcpus=2 --lvm=vg0 --dhcp --pygrub —dist=wheezy I have booted in to the VM with the following command: sudo xl create -c /etc/xen/test.cfg Now when I run ifconfig

Re: [Xen-devel] [PATCH v2 net-next 2/7] xen-netback: retire guest rx side prefix GSO feature

2016-10-04 Thread Konrad Rzeszutek Wilk
On Tue, Oct 04, 2016 at 10:29:13AM +0100, Paul Durrant wrote: > As far as I am aware only very old Windows network frontends make use of > this style of passing GSO packets from backend to frontend. These > frontends can easily be replaced by the freely available Xen Project > Windows PV network

[Xen-devel] Xen Security Advisory 190 (CVE-2016-7777) - CR0.TS and CR0.EM not always honored for x86 HVM guests

2016-10-04 Thread Xen . org security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Xen Security Advisory CVE-2016- / XSA-190 version 5 CR0.TS and CR0.EM not always honored for x86 HVM guests UPDATES IN VERSION 5 Public release. ISSUE DESCRIPTION

Re: [Xen-devel] [PATCH v2 net-next 4/7] xen-netback: immediately wake tx queue when guest rx queue has space

2016-10-04 Thread Konrad Rzeszutek Wilk
On Tue, Oct 04, 2016 at 02:29:15AM -0700, Paul Durrant wrote: > From: David Vrabel > > When an skb is removed from the guest rx queue, immediately wake the > tx queue, instead of after processing them. Please, could the description explain why? > > Signed-off-by:

Re: [Xen-devel] [PATCH v2 net-next 5/7] xen-netback: process guest rx packets in batches

2016-10-04 Thread Konrad Rzeszutek Wilk
On Tue, Oct 04, 2016 at 10:29:16AM +0100, Paul Durrant wrote: > From: David Vrabel > > Instead of only placing one skb on the guest rx ring at a time, process > a batch of up-to 64. This improves performance by ~10% in some tests. And does it regress latency workloads?

[Xen-devel] [xen-unstable-smoke test] 101252: tolerable all pass - PUSHED

2016-10-04 Thread osstest service owner
flight 101252 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/101252/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass test-armhf-armhf-xl

[Xen-devel] [OSSTEST PATCH 4/6] mg-allocate: Tiny refactoring

2016-10-04 Thread Ian Jackson
Break out $shareix assignment from $4. (We are going to want to put some code just after this point which will want to do regexp matching, which would trash $4.) Signed-off-by: Ian Jackson --- mg-allocate | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff

[Xen-devel] [OSSTEST PATCH 2/6] cr-ensure-disk-space: -F option

2016-10-04 Thread Ian Jackson
May be repeated (cuddled with itself) or given a number. Forces deletion, even if there is enough space. Normally clean up one less flight than specified, since cr-ensure-disk-space reruns its check after acquiring the lock. Signed-off-by: Ian Jackson ---

[Xen-devel] [OSSTEST PATCH 6/6] flight preservation: Provide a way to allocate flights

2016-10-04 Thread Ian Jackson
Teach mg-allocate to create and delete resources table entries for flights, as necessary. And, provide a conveniance alias F/. Signed-off-by: Ian Jackson --- README.planner | 10 -- mg-allocate| 39 +++ 2 files changed,

[Xen-devel] [OSSTEST PATCH 3/6] cr-ensure-disk-space: Dry run produces better `die' message.

2016-10-04 Thread Ian Jackson
Signed-off-by: Ian Jackson --- cr-ensure-disk-space | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cr-ensure-disk-space b/cr-ensure-disk-space index c65423a..83372ca 100755 --- a/cr-ensure-disk-space +++ b/cr-ensure-disk-space @@ -153,7 +153,7 @@

[Xen-devel] [OSSTEST PATCH 5/6] flight preservation: Honour flight allocation during expiry

2016-10-04 Thread Ian Jackson
Look in the resources and tasks table for a resources table entry corresponding to each flight, owned by a live task. Such flights are not deleted. Specifically: * At the start, we get a list of all the preserved flights, and also print the information to stdout. * Whenever we compare

[Xen-devel] [OSSTEST PATCH 1/6] cr-ensure-disk-space: Do not take out the lock in dry run mode

2016-10-04 Thread Ian Jackson
This makes testing a bit easier, and is of course fine. Signed-off-by: Ian Jackson --- cr-ensure-disk-space | 8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/cr-ensure-disk-space b/cr-ensure-disk-space index ff6b01b..bfdbcc5 100755 ---

[Xen-devel] [distros-debian-snapshot test] 67794: regressions - FAIL

2016-10-04 Thread Platform Team regression test user
flight 67794 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67794/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-amd64-weekly-netinst-pygrub 6 xen-boot fail REGR. vs. 67770

Re: [Xen-devel] [PATCH v2 15/30] xen/x86: populate PVHv2 Dom0 physical memory map

2016-10-04 Thread Jan Beulich
>>> On 04.10.16 at 11:12, wrote: > On Fri, Sep 30, 2016 at 09:52:56AM -0600, Jan Beulich wrote: >> >>> On 27.09.16 at 17:57, wrote: >> > @@ -43,6 +44,11 @@ static long __initdata dom0_nrpages; >> > static long __initdata dom0_min_nrpages; >> > static

Re: [Xen-devel] [PATCH v2 net-next 7/7] xen/netback: add fraglist support for to-guest rx

2016-10-04 Thread David Vrabel
On 04/10/16 10:29, Paul Durrant wrote: > From: Ross Lagerwall > > This allows full 64K skbuffs (with 1500 mtu ethernet, composed of 45 > fragments) to be handled by netback for to-guest rx. Reviewed-by: David Vrabel David

Re: [Xen-devel] [PATCH] init-xenstore-domain: remove an unused variable

2016-10-04 Thread Wei Liu
On Tue, Oct 04, 2016 at 04:27:07AM -0600, Jan Beulich wrote: > Introduced by commit 80dd5b401e ("tools: add --maxmem parameter to > init-xenstore-domain"). > > Signed-off-by: Jan Beulich Acked + applied. > > --- a/tools/helpers/init-xenstore-domain.c > +++

Re: [Xen-devel] [PATCH RFC] x86/Intel: virtualize support for cpuid faulting

2016-10-04 Thread Andrew Cooper
On 03/10/16 23:38, Kyle Huey wrote: > rr (http://rr-project.org/), a Linux userspace record-and-replay reverse- > execution debugger, would like to trap and emulate the CPUID instruction. > This would allow us to a) mask away certain hardware features that rr does > not support (e.g. RDRAND) and

[Xen-devel] [PATCH] init-xenstore-domain: remove an unused variable

2016-10-04 Thread Jan Beulich
Introduced by commit 80dd5b401e ("tools: add --maxmem parameter to init-xenstore-domain"). Signed-off-by: Jan Beulich --- a/tools/helpers/init-xenstore-domain.c +++ b/tools/helpers/init-xenstore-domain.c @@ -236,7 +236,6 @@ static int parse_maxmem(xc_interface *xc

[Xen-devel] [PATCH] arm: fix build with gcc6

2016-10-04 Thread Jan Beulich
Commit e170622f95 ("xen/arm: p2m: Re-implement p2m_set_mem_access using p2m_{set,get}_entry") eliminated the only user of level_sizes[], causing gcc6 to warn about the unused variable (as it's a const one older gcc versions apparently don't care to emit a warning). Signed-off-by: Jan Beulich

[Xen-devel] [xen-unstable baseline-only test] 67792: regressions - FAIL

2016-10-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67792 xen-unstable real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67792/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-winxpsp3-vcpus1 9

Re: [Xen-devel] [PATCH v2 net-next 2/7] xen-netback: retire guest rx side prefix GSO feature

2016-10-04 Thread David Vrabel
On 04/10/16 10:29, Paul Durrant wrote: > As far as I am aware only very old Windows network frontends make use of > this style of passing GSO packets from backend to frontend. These > frontends can easily be replaced by the freely available Xen Project > Windows PV network frontend, which uses the

[Xen-devel] [ovmf baseline-only test] 67793: all pass

2016-10-04 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 67793 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/67793/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf c0b7e2b2bfc2748112607bfe83fc99cf48c97b48 baseline

Re: [Xen-devel] [PATCH] trace: Fix incorrect number of pages used for trace metadata

2016-10-04 Thread Igor Druzhinin
Checked that. Tested-by: Igor Druzhinin On 30/09/16 17:12, George Dunlap wrote: On 30/09/16 17:04, Igor Druzhinin wrote: On 30/09/16 15:46, George Dunlap wrote: On 29/09/16 14:53, Igor Druzhinin wrote: As long as t_info_first_offset is calculated in uint32_t

Re: [Xen-devel] [PATCH v3 4/4] Addressed comments on quorum and security team members

2016-10-04 Thread Ian Jackson
Lars Kurth writes ("Re: [PATCH v3 4/4] Addressed comments on quorum and security team members"): > Originally I was planning on changing the quorum to match the one for > leadership teams for consistency. Actually, that's probably a better idea. I think when I wrote my previous mail I had

Re: [Xen-devel] [PATCH] libxl: fix issues in 38cd0664

2016-10-04 Thread Wei Liu
On Tue, Oct 04, 2016 at 10:48:57AM +0100, Ian Jackson wrote: > Wei Liu writes ("[PATCH] libxl: fix issues in 38cd0664"): > > A few issues were introduced in 38cd0664 ("libxl/arm: Add the size of > > ACPI tables to maxmem"): > > > > 1. d_config was not properly initialised and disposed of. > > 2.

[Xen-devel] [PATCH v2 net-next 3/7] xen-netback: refactor guest rx

2016-10-04 Thread Paul Durrant
From: David Vrabel Refactor the to-guest (rx) path to: 1. Push responses for completed skbs earlier, reducing latency. 2. Reduce the per-queue memory overhead by greatly reducing the maximum number of grant copy ops in each hypercall (from 4352 to 64). Each

[Xen-devel] [PATCH v2 net-next 7/7] xen/netback: add fraglist support for to-guest rx

2016-10-04 Thread Paul Durrant
From: Ross Lagerwall This allows full 64K skbuffs (with 1500 mtu ethernet, composed of 45 fragments) to be handled by netback for to-guest rx. Signed-off-by: Ross Lagerwall [re-based] Signed-off-by: Paul Durrant

[Xen-devel] [PATCH v2 net-next 5/7] xen-netback: process guest rx packets in batches

2016-10-04 Thread Paul Durrant
From: David Vrabel Instead of only placing one skb on the guest rx ring at a time, process a batch of up-to 64. This improves performance by ~10% in some tests. Signed-off-by: David Vrabel [re-based] Signed-off-by: Paul Durrant

[Xen-devel] [PATCH v2 net-next 2/7] xen-netback: retire guest rx side prefix GSO feature

2016-10-04 Thread Paul Durrant
As far as I am aware only very old Windows network frontends make use of this style of passing GSO packets from backend to frontend. These frontends can easily be replaced by the freely available Xen Project Windows PV network frontend, which uses the 'default' mechanism for passing GSO packets,

[Xen-devel] [PATCH v2 net-next 0/7] xen-netback: guest rx side refactor

2016-10-04 Thread Paul Durrant
This series refactors the guest rx side of xen-netback: - The code is moved into its own source module. - The prefix variant of GSO handling is retired (since it is no longer in common use, and alternatives exist). - The code is then simplified and modifications made to improve performance.

[Xen-devel] [PATCH v2 net-next 6/7] xen-netback: batch copies for multiple to-guest rx packets

2016-10-04 Thread Paul Durrant
From: David Vrabel Instead of flushing the copy ops when an packet is complete, complete packets when their copy ops are done. This improves performance by reducing the number of grant copy hypercalls. Latency is still limited by the relatively small size of the copy

Re: [Xen-devel] [PATCH v3 4/4] Addressed comments on quorum and security team members

2016-10-04 Thread Lars Kurth
On 03/10/2016 17:27, "Ian Jackson" wrote: >Lars Kurth writes ("[PATCH v3 4/4] Addressed comments on quorum and >security team members"): >> Main changes >> Leadership team decisions: express quorum in terms of +1 votes >> Security Team Members: election >> Project

Re: [Xen-devel] [PATCH] libxl: fix issues in 38cd0664

2016-10-04 Thread Ian Jackson
Wei Liu writes ("[PATCH] libxl: fix issues in 38cd0664"): > A few issues were introduced in 38cd0664 ("libxl/arm: Add the size of > ACPI tables to maxmem"): > > 1. d_config was not properly initialised and disposed of. > 2. using libxl_retrieve_domain_configuration caused thread to >deadlock

[Xen-devel] [PATCH v2 net-next 1/7] xen-netback: separate guest side rx code into separate module

2016-10-04 Thread Paul Durrant
The netback source module has become very large and somewhat confusing. This patch simply moves all code related to the backend to frontend (i.e guest side rx) data-path into a separate rx source module. This patch contains no functional change, it is code movement and minimal changes to avoid

[Xen-devel] [PATCH v2 net-next 4/7] xen-netback: immediately wake tx queue when guest rx queue has space

2016-10-04 Thread Paul Durrant
From: David Vrabel When an skb is removed from the guest rx queue, immediately wake the tx queue, instead of after processing them. Signed-off-by: David Vrabel [re-based] Signed-off-by: Paul Durrant --- Cc: Wei Liu

Re: [Xen-devel] per-domain logging

2016-10-04 Thread Cedric Bosdonnat
Hi Ian and Wei, On Mon, 2016-09-19 at 16:23 +0100, Ian Jackson wrote: > Cedric Bosdonnat writes ("Re: [Xen-devel] per-domain logging"): > > On Thu, 2016-09-15 at 16:11 +0100, Wei Liu wrote: > > > IIRC there is already logfile abstraction inside libvirt -- can you just > > > pass in a libvirt

Re: [Xen-devel] [PATCH v2 15/30] xen/x86: populate PVHv2 Dom0 physical memory map

2016-10-04 Thread Roger Pau Monne
On Fri, Sep 30, 2016 at 09:52:56AM -0600, Jan Beulich wrote: > >>> On 27.09.16 at 17:57, wrote: > > @@ -43,6 +44,11 @@ static long __initdata dom0_nrpages; > > static long __initdata dom0_min_nrpages; > > static long __initdata dom0_max_nrpages = LONG_MAX; > > > > +/*

Re: [Xen-devel] [ANNOUNCEMENT] Xen 4.8 RC1

2016-10-04 Thread Lars Kurth
Hi all, I updated the following pages regarding test days - https://wiki.xenproject.org/wiki/Xen_Project_Test_Days - https://wiki.xenproject.org/wiki/Xen_4.8_RC_test_instructions (needs to be fleshed out with instructions for new features/modified ones) Regards Lars > On 3 Oct 2016, at 13:54,

Re: [Xen-devel] [PATCH net-next 0/7] xen-netback: guest rx side refactor

2016-10-04 Thread Paul Durrant
> -Original Message- > From: David Miller [mailto:da...@davemloft.net] > Sent: 04 October 2016 05:52 > To: Paul Durrant > Cc: net...@vger.kernel.org; xen-de...@lists.xenproject.org > Subject: Re: [PATCH net-next 0/7] xen-netback: guest rx side refactor > > From:

Re: [Xen-devel] [PATCH 15/15] xen: Rename xen_be_frontend_changed

2016-10-04 Thread Paolo Bonzini
On 04/10/2016 10:06, Paolo Bonzini wrote: > > > On 04/10/2016 08:43, Emil Condrea wrote: >> xen_be_frontend_changed -> xen_fe_frontend_changed > > This is not correct. The front-end is implemented in the guest domain, > while the back-end is implemented in the dom0 or stubdom. > > This

Re: [Xen-devel] [PATCH 15/15] xen: Rename xen_be_frontend_changed

2016-10-04 Thread Paolo Bonzini
On 04/10/2016 08:43, Emil Condrea wrote: > xen_be_frontend_changed -> xen_fe_frontend_changed This is not correct. The front-end is implemented in the guest domain, while the back-end is implemented in the dom0 or stubdom. This function processes *in the backed* a notification that the

Re: [Xen-devel] [PATCH RFC] x86/Intel: virtualize support for cpuid faulting

2016-10-04 Thread Jan Beulich
>>> On 04.10.16 at 09:53, wrote: On 04.10.16 at 09:34, wrote: >> On 04/10/2016 08:25, Jan Beulich wrote: >> On 04.10.16 at 00:38, wrote: rr (http://rr-project.org/), a Linux userspace record-and-replay reverse-

Re: [Xen-devel] [PATCH RFC] x86/Intel: virtualize support for cpuid faulting

2016-10-04 Thread Jan Beulich
>>> On 04.10.16 at 09:34, wrote: > On 04/10/2016 08:25, Jan Beulich wrote: > On 04.10.16 at 00:38, wrote: >>> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse- >>> execution debugger, would like to trap and emulate the

Re: [Xen-devel] Question about VPID during MOV-TO-CR3

2016-10-04 Thread Jan Beulich
>>> On 01.10.16 at 21:05, wrote: > However, I've found two other sources that need more attention: > > In x86/flushtlb.c the function flush_area_local invalidates all guest > TLBs as such: > > if ( flags & (FLUSH_TLB|FLUSH_TLB_GLOBAL) ) > { > if ( order

[Xen-devel] [xen-unstable test] 101250: tolerable FAIL

2016-10-04 Thread osstest service owner
flight 101250 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/101250/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-credit2 16 guest-start.2fail in 101247 pass in 101250 test-armhf-armhf-xl-xsm 15

Re: [Xen-devel] [PATCH RFC] x86/Intel: virtualize support for cpuid faulting

2016-10-04 Thread Andrew Cooper
On 04/10/2016 08:25, Jan Beulich wrote: On 04.10.16 at 00:38, wrote: >> rr (http://rr-project.org/), a Linux userspace record-and-replay reverse- >> execution debugger, would like to trap and emulate the CPUID instruction. >> This would allow us to a) mask away certain

Re: [Xen-devel] [PATCH RFC] x86/Intel: virtualize support for cpuid faulting

2016-10-04 Thread Jan Beulich
>>> On 04.10.16 at 00:38, wrote: > rr (http://rr-project.org/), a Linux userspace record-and-replay reverse- > execution debugger, would like to trap and emulate the CPUID instruction. > This would allow us to a) mask away certain hardware features that rr does > not support

Re: [Xen-devel] [PATCH v2 11/30] xen/x86: split Dom0 build into PV and PVHv2

2016-10-04 Thread Andrew Cooper
On 04/10/2016 07:54, Jan Beulich wrote: On 03.10.16 at 12:09, wrote: >> I've added the following patch to my queue, in order to allow the user to >> select whether they want to use HAP or shadow, I've tested it locally and >> there seems to be no issues in building a

Re: [Xen-devel] [PATCH v2 11/30] xen/x86: split Dom0 build into PV and PVHv2

2016-10-04 Thread Jan Beulich
>>> On 03.10.16 at 12:09, wrote: > I've added the following patch to my queue, in order to allow the user to > select whether they want to use HAP or shadow, I've tested it locally and > there seems to be no issues in building a PVHv2 Dom0 using shadow. Hmm, two remarks:

Re: [Xen-devel] [Qemu-devel] [v9 00/19] QEMU:Xen stubdom vTPM for HVM virtual machine(QEMU Part)

2016-10-04 Thread Emil Condrea
Anthony, I've split the reorganization and code style issues in a separate patch series which I've posted today: http://markmail.org/message/feu6u3f7py5vt77v Thanks On Mon, Jul 25, 2016 at 5:09 PM, Anthony PERARD wrote: > On Sun, Jul 10, 2016 at 02:47:31PM +0300,

Re: [Xen-devel] [PATCH v2 12/30] xen/x86: make print_e820_memory_map global

2016-10-04 Thread Jan Beulich
>>> On 03.10.16 at 18:23, wrote: > On Fri, Sep 30, 2016 at 09:04:24AM -0600, Jan Beulich wrote: >> >>> On 27.09.16 at 17:57, wrote: >> > So that it can be called from the Dom0 builder. >> >> Why would the Dom0 builder need to call it, when it doesn't

[Xen-devel] [PATCH 05/15] xen: Move xenstore_update to xen_pvdev.c

2016-10-04 Thread Emil Condrea
* xenstore_update -> xen_pvdev.c * xenstore_update_fe -> xen_frontend.c Signed-off-by: Emil Condrea --- hw/xen/xen_backend.c | 43 +-- hw/xen/xen_frontend.c | 18 ++ hw/xen/xen_pvdev.c|

[Xen-devel] [PATCH 12/15] xen: Rename xen_be_evtchn_event

2016-10-04 Thread Emil Condrea
Prepare xen_be_evtchn_event to be shared with frontends: * xen_be_evtchn_event -> xen_pv_evtchn_event Signed-off-by: Emil Condrea --- hw/xen/xen_backend.c | 2 +- hw/xen/xen_pvdev.c | 2 +- include/hw/xen/xen_pvdev.h | 2 +- 3 files changed, 3

[Xen-devel] [PATCH 15/15] xen: Rename xen_be_frontend_changed

2016-10-04 Thread Emil Condrea
xen_be_frontend_changed -> xen_fe_frontend_changed Signed-off-by: Emil Condrea --- hw/xen/xen_backend.c | 2 +- hw/xen/xen_frontend.c | 4 ++-- include/hw/xen/xen_frontend.h | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git

[Xen-devel] [PATCH 14/15] xen: Rename xen_be_del_xendev

2016-10-04 Thread Emil Condrea
Prepare xen_be_del_xendev to be shared with frontends: * xen_be_del_xendev -> xen_pv_del_xendev Signed-off-by: Emil Condrea --- hw/xen/xen_backend.c | 2 +- hw/xen/xen_pvdev.c | 2 +- include/hw/xen/xen_pvdev.h | 2 +- 3 files changed, 3 insertions(+), 3

[Xen-devel] [PATCH 10/15] xen: Rename xen_be_unbind_evtchn

2016-10-04 Thread Emil Condrea
Prepare xen_be_unbind_evtchn to be shared with frontends: * xen_be_unbind_evtchn -> xen_pv_unbind_evtchn Signed-off-by: Emil Condrea --- hw/block/xen_disk.c| 2 +- hw/char/xen_console.c | 2 +- hw/display/xenfb.c | 2 +- hw/net/xen_nic.c |

[Xen-devel] [PATCH 08/15] xen: Move xenstore cleanup and mkdir functions

2016-10-04 Thread Emil Condrea
The name of the functions moved to xen_pvdev.c: * xenstore_cleanup_dir * xen_config_cleanup * xenstore_mkdir Signed-off-by: Emil Condrea --- hw/xen/xen_backend.c | 49 - hw/xen/xen_pvdev.c | 51

[Xen-devel] [PATCH 11/15] xen: Rename xen_be_send_notify

2016-10-04 Thread Emil Condrea
Prepare xen_be_send_notify to be shared with frontends: * xen_be_send_notify -> xen_pv_send_notify Signed-off-by: Emil Condrea --- hw/block/xen_disk.c| 4 ++-- hw/char/xen_console.c | 4 ++-- hw/display/xenfb.c | 8 hw/net/xen_nic.c

  1   2   >