Re: [Xen-devel] [RFC PATCH V3 05/12] xen: Introduce vm_event

2015-01-31 Thread Tamas K Lengyel
On Fri, Jan 30, 2015 at 6:25 PM, Daniel De Graaf dgde...@tycho.nsa.gov wrote:
 On 01/29/2015 04:46 PM, Tamas K Lengyel wrote:

 To make it easier to review the renaming process of mem_event - vm_event,
 the process is broken into three pieces, of which this patch is the first.
 In this patch the vm_event subsystem is introduced and hooked into the
 build
 process, but it is not yet used anywhere.

 Signed-off-by: Tamas K Lengyel tamas.leng...@zentific.com


 [...]

 diff --git a/xen/include/xsm/dummy.h b/xen/include/xsm/dummy.h
 index f20e89c..d6d403a 100644
 --- a/xen/include/xsm/dummy.h
 +++ b/xen/include/xsm/dummy.h
 @@ -525,6 +525,18 @@ static XSM_INLINE int
 xsm_mem_event_op(XSM_DEFAULT_ARG struct domain *d, int op)
   XSM_ASSERT_ACTION(XSM_DM_PRIV);
   return xsm_default_action(action, current-domain, d);
   }
 +
 +static XSM_INLINE int xsm_vm_event_control(XSM_DEFAULT_ARG struct domain
 *d, int mode, int op)
 +{
 +XSM_ASSERT_ACTION(XSM_PRIV);
 +return xsm_default_action(action, current-domain, d);
 +}
 +
 +static XSM_INLINE int xsm_vm_event_op(XSM_DEFAULT_ARG struct domain *d,
 int op)
 +{
 +XSM_ASSERT_ACTION(XSM_DM_PRIV);
 +return xsm_default_action(action, current-domain, d);
 +}
   #endif

 [...]

 diff --git a/xen/xsm/flask/policy/access_vectors
 b/xen/xsm/flask/policy/access_vectors
 index 1da9f63..a4241b5 100644
 --- a/xen/xsm/flask/policy/access_vectors
 +++ b/xen/xsm/flask/policy/access_vectors
 @@ -250,6 +250,7 @@ class hvm
   hvmctl
   # XEN_DOMCTL_set_access_required
   mem_event
 +vm_event
   # XEN_DOMCTL_mem_sharing_op and XENMEM_sharing_op_{share,add_physmap}
 with:
   #  source = the domain making the hypercall
   #  target = domain whose memory is being shared


 This implies that device model domains should be allowed to use the
 operations
 covered by xsm_vm_event_op but not those covered by xsm_vm_event_control.
 If this is how the eventual operations are intended to be used, the FLASK
 permissions also need to be split so that a similar distinction can be made
 in
 the policy.

 After looking at the later patches in this series, this appears to be a flaw
 in
 the existing FLASK hooks that got copied over.  While it is still useful to
 fix,
 it  may be better to make the split in a separate patch from the renames.
 Now
 that VM events apply to more than just HVM domains, it may be useful to move
 the new permission(s) from class hvm to either domain2 or mmu.

 --
 Daniel De Graaf
 National Security Agency

Moving it to domain2 would make sense to me. The namings seem to be
pretty poor so I have a hard time understanding why xsm_vm_event_op
and xsm_vm_event_control differ when it comes to device model domains.
The event_op corresponds to memops for access, paging and sharing
while event_control for the domctl that enables/disables the rings. So
yes, I think splitting the name for these separating things would make
sense to clarify what they represent but whether that restriction on
device model domains was intentional I'm not sure about.

Tamas

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH 1/5] multiboot2: Fix information request tag size calculation

2015-01-31 Thread Ben Hildred
Why do you want the size of a pointer instead of the size of the structure?

On Fri, Jan 30, 2015 at 10:59 AM, Daniel Kiper daniel.ki...@oracle.com
wrote:

 Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
 ---
  grub-core/loader/multiboot_mbi2.c |2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)

 diff --git a/grub-core/loader/multiboot_mbi2.c
 b/grub-core/loader/multiboot_mbi2.c
 index 6f74aee..d7c19bc 100644
 --- a/grub-core/loader/multiboot_mbi2.c
 +++ b/grub-core/loader/multiboot_mbi2.c
 @@ -150,7 +150,7 @@ grub_multiboot_load (grub_file_t file, const char
 *filename)
 = (struct multiboot_header_tag_information_request *) tag;
   if (request_tag-flags  MULTIBOOT_HEADER_TAG_OPTIONAL)
 break;
 - for (i = 0; i  (request_tag-size - sizeof (request_tag))
 + for (i = 0; i  (request_tag-size - sizeof (*request_tag))
  / sizeof (request_tag-requests[0]); i++)
 switch (request_tag-requests[i])
   {
 --
 1.7.10.4


 ___
 Grub-devel mailing list
 grub-de...@gnu.org
 https://lists.gnu.org/mailman/listinfo/grub-devel




-- 
--
Ben Hildred
Automation Support Services
303 815 6721
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH 1/5] multiboot2: Fix information request tag size calculation

2015-01-31 Thread Lennart Sorensen
On Fri, Jan 30, 2015 at 01:52:09PM -0700, Ben Hildred wrote:
 Why do you want the size of a pointer instead of the size of the structure?

Isn't *request_tag the dereferenced pointer, and hence is the size of
the structure, where as before it was the size of a pointer?

-- 
Len Sorensen

 On Fri, Jan 30, 2015 at 10:59 AM, Daniel Kiper daniel.ki...@oracle.com
 wrote:
 
  Signed-off-by: Daniel Kiper daniel.ki...@oracle.com
  ---
   grub-core/loader/multiboot_mbi2.c |2 +-
   1 file changed, 1 insertion(+), 1 deletion(-)
 
  diff --git a/grub-core/loader/multiboot_mbi2.c
  b/grub-core/loader/multiboot_mbi2.c
  index 6f74aee..d7c19bc 100644
  --- a/grub-core/loader/multiboot_mbi2.c
  +++ b/grub-core/loader/multiboot_mbi2.c
  @@ -150,7 +150,7 @@ grub_multiboot_load (grub_file_t file, const char
  *filename)
  = (struct multiboot_header_tag_information_request *) tag;
if (request_tag-flags  MULTIBOOT_HEADER_TAG_OPTIONAL)
  break;
  - for (i = 0; i  (request_tag-size - sizeof (request_tag))
  + for (i = 0; i  (request_tag-size - sizeof (*request_tag))
   / sizeof (request_tag-requests[0]); i++)
  switch (request_tag-requests[i])
{
  --
  1.7.10.4
 
 
  ___
  Grub-devel mailing list
  grub-de...@gnu.org
  https://lists.gnu.org/mailman/listinfo/grub-devel
 
 
 
 
 -- 
 --
 Ben Hildred
 Automation Support Services
 303 815 6721

 ___
 Grub-devel mailing list
 grub-de...@gnu.org
 https://lists.gnu.org/mailman/listinfo/grub-devel


___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [Qemu-devel] [RFC][PATCH 1/1] libxl: add one machine property to support IGD GFX passthrough

2015-01-31 Thread Xu, Quan


 -Original Message-
 From: Wei Liu [mailto:wei.l...@citrix.com]
 Sent: Saturday, January 31, 2015 10:33 PM
 To: Xu, Quan
 Cc: Wei Liu; Chen, Tiejun; ian.campb...@citrix.com; m...@redhat.com; Ian 
 Jackson;
 qemu-de...@nongnu.org; xen-devel@lists.xen.org; Gerd Hoffmann
 Subject: Re: [Xen-devel] [Qemu-devel] [RFC][PATCH 1/1] libxl: add one machine
 property to support IGD GFX passthrough
 
 On Sat, Jan 31, 2015 at 07:07:16AM +, Xu, Quan wrote:
 
 
   -Original Message-
   From: xen-devel-boun...@lists.xen.org
   [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Wei Liu
   Sent: Friday, January 30, 2015 8:26 PM
   To: Chen, Tiejun
   Cc: Wei Liu; ian.campb...@citrix.com; m...@redhat.com; Ian Jackson;
   qemu-de...@nongnu.org; xen-devel@lists.xen.org; Gerd Hoffmann
   Subject: Re: [Xen-devel] [Qemu-devel] [RFC][PATCH 1/1] libxl: add
   one machine property to support IGD GFX passthrough
  
   On Fri, Jan 30, 2015 at 08:56:48AM +0800, Chen, Tiejun wrote:
   [...]

Just remember to handle old option in libxl if your old option
is already released by some older version of QEMUs.

I just drop that old option, -gfx_passthru, if we're under qemu
upstream circumstance, like this,


The question is, is there any version of qemu upstream that has
been released that has the old option (-gfx-passthru)?
   
No. Just now we're starting to support IGD passthrough in qemu upstream.
   
  
   Right, as of QEMU 2.2.0 there's no support of IGD passthrough in
   QMEU upstream.
  
 
  Just a question:
 Now what features do vt-d support? Thanks.
 
 
 I don't know whether vt-d is supported in qemu upstream.
 
 But if there is support in upstream and you want to change some options, the
 same principle in my previous email still applies.
 
 Wei.

Thanks.  -Quan

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


[Xen-devel] PCI-Passthrough Error: transmit queue timed out

2015-01-31 Thread openlui
Hi, all:
I have tried PCI-Passthrough to DomU in Xen. However, If we send packets to 
DomU for a while, there is chance that the networking of Domu will be 
disconnected. The corresponding syslog messages are as shown at the end of mail.
   And I found the following analysis at [1], I am wondering if it is the 
reason for it.  Does someone also meet this problem, and can give me some 
advice about it?  The environment is as follows:
  Dom0: SUSE 12 (3.12.28)
  DomU: 3.17.4 mainline


[1] 
http://martinbj2008.github.io/blog/2014/09/17/netdevice-watchdog-cause-tx-queue-schedule/


2015-01-31T04:53:45.005161-05:00 linux-gbze kernel: [63331.820079] 
[ cut here ]
2015-01-31T04:53:45.005187-05:00 linux-gbze kernel: [63331.820163] WARNING: 
CPU: 0 PID: 0 at net/sched/sch_generic.c:264 dev_watchdog+0x266/0x270()
2015-01-31T04:53:45.005190-05:00 linux-gbze kernel: [63331.820196] NETDEV 
WATCHDOG: eth0 (ixgbe): transmit queue 1 timed out
2015-01-31T04:53:45.005192-05:00 linux-gbze kernel: [63331.820227] Modules 
linked in: iptable_filter(E) ip_tables(E) x_tables(E) openvswitch(E) gre(E) 
vxlan(E) udp_tunnel(E) libcrc32c(E) xen_netback(OE) ixgbe(OE) nls_utf8(E) 
isofs(E) fuse(E) iscsi_ibft(E) iscsi_boot_sysfs(E) af_packet(E) intel_rapl(E) 
joydev(E) ppdev(E) crct10dif_pclmul(E) parport_pc(E) crc32_pclmul(E) parport(E) 
crc32c_intel(E) ghash_clmulni_intel(E) ptp(E) aesni_intel(E) pps_core(E) 
aes_x86_64(E) mdio(E) processor(E) lrw(E) dca(E) gf128mul(E) glue_helper(E) 
serio_raw(E) i2c_piix4(E) pcspkr(E) ablk_helper(E) button(E) cryptd(E) 
dm_mod(E) ext4(E) crc16(E) mbcache(E) jbd2(E) sr_mod(E) cdrom(E) ata_generic(E) 
ata_piix(E) ahci(E) libahci(E) xen_blkfront(E) floppy(E) cirrus(E) 
drm_kms_helper(E) ttm(E) drm(E) libata(E) sg(E) scsi_mod(E) autofs4(E) [last 
unloaded: ixgbe]


2015-01-31T04:53:45.005195-05:00 linux-gbze kernel: [63331.820337] CPU: 0 PID: 
0 Comm: swapper/0 Tainted: G   OE  3.17.4-4-default #10
2015-01-31T04:53:45.005197-05:00 linux-gbze kernel: [63331.820368] Hardware 
name: Xen HVM domU, BIOS 4.4.1_06-2.2 10/08/2014
2015-01-31T04:53:45.005199-05:00 linux-gbze kernel: [63331.820398]  
0009 88010f803db0 8158c8e7 88010f803df8
2015-01-31T04:53:45.005200-05:00 linux-gbze kernel: [63331.820432]  
88010f803de8 8106d9ed 0001 8800ead6
2015-01-31T04:53:45.005202-05:00 linux-gbze kernel: [63331.820464]  
0040  8800ead6 88010f803e48


2015-01-31T04:53:45.005203-05:00 linux-gbze kernel: [63331.820497] Call Trace:


2015-01-31T04:53:45.005205-05:00 linux-gbze kernel: [63331.820528]  IRQ  
[8158c8e7] dump_stack+0x45/0x56
2015-01-31T04:53:45.005206-05:00 linux-gbze kernel: [63331.820571]  
[8106d9ed] warn_slowpath_common+0x7d/0xa0
2015-01-31T04:53:45.005208-05:00 linux-gbze kernel: [63331.820603]  
[8106da5c] warn_slowpath_fmt+0x4c/0x50
2015-01-31T04:53:45.005210-05:00 linux-gbze kernel: [63331.820641]  
[8100a4ef] ? xen_timer_interrupt+0x10f/0x150
2015-01-31T04:53:45.005212-05:00 linux-gbze kernel: [63331.820675]  
[814be3d6] dev_watchdog+0x266/0x270
2015-01-31T04:53:45.005213-05:00 linux-gbze kernel: [63331.820708]  
[814be170] ? dev_graft_qdisc+0x80/0x80
2015-01-31T04:53:45.005215-05:00 linux-gbze kernel: [63331.820744]  
[810cd656] call_timer_fn+0x36/0x100
2015-01-31T04:53:45.005216-05:00 linux-gbze kernel: [63331.820777]  
[814be170] ? dev_graft_qdisc+0x80/0x80
2015-01-31T04:53:45.005218-05:00 linux-gbze kernel: [63331.820811]  
[810ced7a] run_timer_softirq+0x1fa/0x2e0
2015-01-31T04:53:45.005220-05:00 linux-gbze kernel: [63331.820845]  
[81071885] __do_softirq+0xe5/0x280
2015-01-31T04:53:45.005221-05:00 linux-gbze kernel: [63331.820878]  
[81071c6d] irq_exit+0xad/0xc0
2015-01-31T04:53:45.005223-05:00 linux-gbze kernel: [63331.820912]  
[813a6dc8] xen_evtchn_do_upcall+0x38/0x50
2015-01-31T04:53:45.005224-05:00 linux-gbze kernel: [63331.820948]  
[81594a6d] xen_hvm_callback_vector+0x6d/0x80
2015-01-31T04:53:45.005225-05:00 linux-gbze kernel: [63331.820978]  EOI  
[81054d06] ? native_safe_halt+0x6/0x10
2015-01-31T04:53:45.005227-05:00 linux-gbze kernel: [63331.821020]  
[8101c7ef] default_idle+0x1f/0xc0
2015-01-31T04:53:45.005229-05:00 linux-gbze kernel: [63331.821054]  
[8101d15f] arch_cpu_idle+0xf/0x20
2015-01-31T04:53:45.005231-05:00 linux-gbze kernel: [63331.821087]  
[810ab714] cpu_startup_entry+0x2f4/0x330
2015-01-31T04:53:45.005232-05:00 linux-gbze kernel: [63331.821121]  
[8157cf77] rest_init+0x77/0x80
2015-01-31T04:53:45.005234-05:00 linux-gbze kernel: [63331.821156]  
[81b6a0c4] start_kernel+0x46f/0x47a
2015-01-31T04:53:45.005235-05:00 linux-gbze kernel: [63331.821188]  
[81b69a4e] ? set_init_arg+0x53/0x53
2015-01-31T04:53:45.005236-05:00 linux-gbze kernel: [63331.821222]  
[81b69120] ? 

[Xen-devel] [ovmf test] 34039: regressions - FAIL

2015-01-31 Thread xen . org
flight 34039 ovmf real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34039/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 build-amd64   5 xen-build fail REGR. vs. 33686
 build-i3865 xen-build fail REGR. vs. 33686

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-xl-credit2   1 build-check(1)   blocked  n/a
 test-amd64-amd64-xl-multivcpu  1 build-check(1)   blocked  n/a
 build-amd64-libvirt   1 build-check(1)   blocked  n/a
 build-i386-libvirt1 build-check(1)   blocked  n/a
 test-amd64-amd64-libvirt  1 build-check(1)   blocked  n/a
 test-amd64-amd64-xl-pvh-intel  1 build-check(1)   blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-intel  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-pvh-amd   1 build-check(1)   blocked  n/a
 test-amd64-i386-qemut-rhel6hvm-amd  1 build-check(1)   blocked n/a
 test-amd64-i386-freebsd10-i386  1 build-check(1)   blocked  n/a
 test-amd64-amd64-xl-sedf-pin  1 build-check(1)   blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-intel  1 build-check(1) blocked n/a
 test-amd64-i386-rhel6hvm-amd  1 build-check(1)   blocked  n/a
 test-amd64-i386-libvirt   1 build-check(1)   blocked  n/a
 test-amd64-i386-rhel6hvm-intel  1 build-check(1)   blocked  n/a
 test-amd64-i386-qemuu-rhel6hvm-amd  1 build-check(1)   blocked n/a
 test-amd64-i386-xl-qemuu-ovmf-amd64  1 build-check(1)  blocked n/a
 test-amd64-amd64-xl-qemuu-ovmf-amd64  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-qemuu-debianhvm-amd64  1 build-check(1)blocked n/a
 test-amd64-amd64-xl-sedf  1 build-check(1)   blocked  n/a
 test-amd64-i386-freebsd10-amd64  1 build-check(1)   blocked  n/a
 test-amd64-amd64-xl   1 build-check(1)   blocked  n/a
 test-amd64-i386-pair  1 build-check(1)   blocked  n/a
 test-amd64-i386-xl-qemuu-debianhvm-amd64  1 build-check(1) blocked n/a
 test-amd64-i386-xl1 build-check(1)   blocked  n/a
 test-amd64-i386-xl-qemut-win7-amd64  1 build-check(1)  blocked n/a
 test-amd64-amd64-xl-qemut-debianhvm-amd64  1 build-check(1)blocked n/a
 test-amd64-amd64-xl-qemut-win7-amd64  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-pcipt-intel  1 build-check(1)   blocked  n/a
 test-amd64-i386-xl-winxpsp3   1 build-check(1)   blocked  n/a
 test-amd64-amd64-xl-qemuu-win7-amd64  1 build-check(1) blocked n/a
 test-amd64-i386-xl-qemut-debianhvm-amd64  1 build-check(1) blocked n/a
 test-amd64-i386-xl-win7-amd64  1 build-check(1)   blocked  n/a
 test-amd64-amd64-pair 1 build-check(1)   blocked  n/a
 test-amd64-i386-xl-qemuu-win7-amd64  1 build-check(1)  blocked n/a
 test-amd64-amd64-xl-win7-amd64  1 build-check(1)   blocked  n/a
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1  1 build-check(1) blocked n/a
 test-amd64-amd64-xl-winxpsp3  1 build-check(1)   blocked  n/a
 test-amd64-i386-xl-qemuu-winxpsp3  1 build-check(1)   blocked  n/a
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1  1 build-check(1) blocked n/a
 test-amd64-i386-xl-winxpsp3-vcpus1  1 build-check(1)   blocked n/a
 test-amd64-i386-xl-qemut-winxpsp3  1 build-check(1)   blocked  n/a
 test-amd64-amd64-xl-qemut-winxpsp3  1 build-check(1)   blocked n/a
 test-amd64-amd64-xl-qemuu-winxpsp3  1 build-check(1)   blocked n/a

version targeted for testing:
 ovmf 7cc7022dfccadcae9e815d071916f96577e5df89
baseline version:
 ovmf 447d264115c476142f884af0be287622cd244423


People who touched revisions under test:
  Gao, Liming liming@intel.com
  Long, Qin qin.l...@intel.com
  Yao, Jiewen jiewen@intel.com
  Aaron Pop aar...@ami.com
  Abner Chang abner.ch...@hp.com
  Alex Williamson alex.william...@redhat.com
  Anderw Fish af...@apple.com
  Andrew Fish af...@apple.com
  Anthony PERARD anthony.per...@citrix.com
  Ard Biesheuvel ard.biesheu...@linaro.org
  Ari Zigler a...@mellanox.com
  Brendan Jackman brendan.jack...@arm.com
  Bruce Cran bruce.c...@gmail.com
  Cecil Sheng cecil.sh...@hp.com
  Chao Zhang chao.b.zh...@intel.com
  Chao, Zhang chao.b.zh...@intel.com
  Chen Fan chen.fan.f...@cn.fujitsu.com
  Chris Phillips chr...@hp.com
  Chris Ruffin chris.ruf...@intel.com
  Cinnamon Shia cinnamon.s...@hp.com
  Daryl McDaniel  daryl.mcdan...@intel.com
  Daryl McDaniel daryl.mcdan...@intel.com
  daryl.mcdaniel daryl.mcdan...@intel.com
  daryl.mcdan...@intel.com
  darylm503 darylm503@Edk2
  

[Xen-devel] [qemu-upstream-unstable test] 34011: regressions - FAIL

2015-01-31 Thread xen . org
flight 34011 qemu-upstream-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34011/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-amd64-i386-freebsd10-i386 11 guest-localmigrate  fail REGR. vs. 33488
 test-amd64-i386-freebsd10-amd64 11 guest-localmigrate fail REGR. vs. 33488
 test-amd64-i386-xl-win7-amd64 10 guest-localmigrate   fail REGR. vs. 33488
 test-amd64-amd64-xl-winxpsp3 10 guest-localmigratefail REGR. vs. 33488
 test-amd64-amd64-xl-win7-amd64 10 guest-localmigrate  fail REGR. vs. 33488
 test-amd64-i386-xl-winxpsp3-vcpus1 10 guest-localmigrate  fail REGR. vs. 33488
 test-amd64-i386-xl-winxpsp3  10 guest-localmigratefail REGR. vs. 33488

Regressions which are regarded as allowable (not blocking):
 test-amd64-i386-xl-qemuu-debianhvm-amd64 10 guest-localmigrate fail REGR. vs. 
33488
 test-amd64-amd64-xl-qemuu-debianhvm-amd64 10 guest-localmigrate fail REGR. vs. 
33488
 test-amd64-amd64-xl-qemuu-ovmf-amd64 10 guest-localmigrate fail REGR. vs. 33488
 test-amd64-i386-xl-qemuu-win7-amd64 10 guest-localmigrate fail REGR. vs. 33488
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1 10 guest-localmigrate fail REGR. vs. 
33488
 test-amd64-i386-xl-qemuu-winxpsp3 10 guest-localmigrate   fail REGR. vs. 33488
 test-amd64-i386-xl-qemuu-ovmf-amd64 10 guest-localmigrate fail REGR. vs. 33488
 test-amd64-amd64-xl-qemuu-win7-amd64 10 guest-localmigrate fail REGR. vs. 33488
 test-amd64-amd64-xl-qemuu-winxpsp3 10 guest-localmigrate  fail REGR. vs. 33488

Tests which did not succeed, but are not blocking:
 test-amd64-i386-libvirt   9 guest-start  fail   never pass
 test-amd64-amd64-xl-pvh-intel  9 guest-start  fail  never pass
 test-armhf-armhf-xl-sedf 10 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-sedf-pin 10 migrate-support-checkfail   never pass
 test-armhf-armhf-xl-multivcpu 10 migrate-support-checkfail  never pass
 test-armhf-armhf-xl-midway   10 migrate-support-checkfail   never pass
 test-armhf-armhf-xl  10 migrate-support-checkfail   never pass
 test-amd64-amd64-libvirt  9 guest-start  fail   never pass
 test-amd64-amd64-xl-pvh-amd   9 guest-start  fail   never pass
 test-armhf-armhf-libvirt  9 guest-start  fail   never pass
 test-amd64-amd64-xl-pcipt-intel  9 guest-start fail never pass
 test-armhf-armhf-xl-credit2   5 xen-boot fail   never pass
 test-amd64-i386-xl-qemut-winxpsp3 14 guest-stopfail never pass
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1 14 guest-stop fail never pass
 test-amd64-amd64-xl-qemut-winxpsp3 14 guest-stop   fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 14 guest-stop  fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 14 guest-stop fail never pass

version targeted for testing:
 qemuube11dc1e9172f91e798a8f831b30c14b479e08e8
baseline version:
 qemuu0d37748342e29854db7c9f6c47d7f58c6cfba6b2


People who touched revisions under test:
  Don Slutz dsl...@verizon.com
  Paul Durrant paul.durr...@citrix.com
  Stefano Stabellini stefano.stabell...@eu.citrix.com


jobs:
 build-amd64  pass
 build-armhf  pass
 build-i386   pass
 build-amd64-libvirt  pass
 build-armhf-libvirt  pass
 build-i386-libvirt   pass
 build-amd64-pvopspass
 build-armhf-pvopspass
 build-i386-pvops pass
 test-amd64-amd64-xl  pass
 test-armhf-armhf-xl  pass
 test-amd64-i386-xl   pass
 test-amd64-amd64-xl-pvh-amd  fail
 test-amd64-i386-rhel6hvm-amd pass
 test-amd64-i386-qemut-rhel6hvm-amd   pass
 test-amd64-i386-qemuu-rhel6hvm-amd   pass
 test-amd64-amd64-xl-qemut-debianhvm-amd64pass
 test-amd64-i386-xl-qemut-debianhvm-amd64 pass
 test-amd64-amd64-xl-qemuu-debianhvm-amd64fail
 test-amd64-i386-xl-qemuu-debianhvm-amd64 fail
 test-amd64-i386-freebsd10-amd64  fail
 test-amd64-amd64-xl-qemuu-ovmf-amd64   

[Xen-devel] [qemu-mainline bisection] complete test-amd64-i386-rhel6hvm-intel

2015-01-31 Thread xen . org
branch xen-unstable
xen branch xen-unstable
job test-amd64-i386-rhel6hvm-intel
test redhat-install

Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://git.qemu.org/qemu.git
Tree: xen git://xenbits.xen.org/xen.git

*** Found and reproduced problem changeset ***

  Bug is in tree:  qemuu git://git.qemu.org/qemu.git
  Bug introduced:  b3a4755a67a52aa7297eb8927b482d09dabdefec
  Bug not present: a805ca54015bd123e2bc2454ec59619d0ed106c2


  commit b3a4755a67a52aa7297eb8927b482d09dabdefec
  Merge: a805ca5 4478aa7
  Author: Peter Maydell peter.mayd...@linaro.org
  Date:   Thu Jan 22 12:14:19 2015 +
  
  Merge remote-tracking branch 'remotes/kraxel/tags/pull-vnc-20150122-1' 
into staging
  
  vnc: add support for multiple vnc displays
  
  # gpg: Signature made Thu 22 Jan 2015 11:00:54 GMT using RSA key ID 
D3E87138
  # gpg: Good signature from Gerd Hoffmann (work) kra...@redhat.com
  # gpg: aka Gerd Hoffmann g...@kraxel.org
  # gpg: aka Gerd Hoffmann (private) kra...@gmail.com
  
  * remotes/kraxel/tags/pull-vnc-20150122-1:
monitor: add vnc websockets
monitor: add query-vnc-servers command
vnc: factor out qmp_query_client_list
vnc: track  limit connections
vnc: update docs/multiseat.txt
vnc: allow binding servers to qemu consoles
vnc: switch to QemuOpts, allow multiple servers
vnc: add display id to acl names
vnc: remove unused DisplayState parameter, add id instead.
vnc: remove vnc_display global
  
  Signed-off-by: Peter Maydell peter.mayd...@linaro.org
  
  commit 4478aa768ccefcc5b234c23d035435fd71b932f6
  Author: Gerd Hoffmann kra...@redhat.com
  Date:   Wed Dec 10 09:49:39 2014 +0100
  
  monitor: add vnc websockets
  
  Add websockets bool to VncBasicInfo, report websocket server sockets,
  flag websocket client connections.
  
  Signed-off-by: Gerd Hoffmann kra...@redhat.com
  
  commit df887684603a4b3b0c623090a6b419dc70f22c32
  Author: Gerd Hoffmann kra...@redhat.com
  Date:   Wed Dec 17 15:49:44 2014 +0100
  
  monitor: add query-vnc-servers command
  
  Add new query vnc qmp command, for the lack of better ideas just name it
  query-vnc-servers.  Changes over query-vnc:
  
   * It returns a list of vnc servers, so multiple vnc server instances
 are covered.
   * Each vnc server returns a list of server sockets.  Followup patch
 will use that to also report websockets.  In case we add support for
 multiple server sockets server sockets (to better support ipv4+ipv6
 dualstack) we can add them to the list too.
  
  Signed-off-by: Gerd Hoffmann kra...@redhat.com
  
  commit 2d29a4368c3c00a5cf200f29b3dfd32bc4fb2c31
  Author: Gerd Hoffmann kra...@redhat.com
  Date:   Tue Dec 9 15:27:39 2014 +0100
  
  vnc: factor out qmp_query_client_list
  
  so we can reuse it for the new vnc query command.
  
  Signed-off-by: Gerd Hoffmann kra...@redhat.com
  
  commit e5f34cdd2da54f28d90889a3afd15fad2d6105ff
  Author: Gerd Hoffmann kra...@redhat.com
  Date:   Thu Oct 2 12:09:34 2014 +0200
  
  vnc: track  limit connections
  
  Also track the number of connections in connecting and shared state
  (in addition to the exclusive state).  Apply a configurable limit to
  these connections.
  
  The logic to apply the limit to connections in shared state is pretty
  simple:  When the limit is reached no new connections are allowed.
  
  The logic to apply the limit to connections in connecting state (this
  is the state you are in *before* successful authentication) is
  slightly different:  A new connect kicks out the oldest client which is
  still in connecting state.  This avoids a easy DoS by unauthenticated
  users by simply opening connections until the limit is reached.
  
  Cc: Dr. David Alan Gilbert dgilb...@redhat.com
  Signed-off-by: Gerd Hoffmann kra...@redhat.com
  
  commit 86fdcf23f4a9d8473844734907555b3a93ed686c
  Author: Gerd Hoffmann kra...@redhat.com
  Date:   Thu Oct 2 15:53:37 2014 +0200
  
  vnc: update docs/multiseat.txt
  
  vnc joins the party ;)
  Also some s/head/seat/ to clarify.
  
  Signed-off-by: Gerd Hoffmann kra...@redhat.com
  
  commit 1d0d59fe291967533f974e82213656d479475a1e
  Author: Gerd Hoffmann kra...@redhat.com
  Date:   Thu Sep 18 12:54:49 2014 +0200
  
  vnc: allow binding servers to qemu consoles
  
  This patch adds a display= parameter to the vnc options.  This allows to
  bind a vnc server instance to a specific display, allowing to create a
  multiseat setup with a vnc server for each seat.
  
  Signed-off-by: Gerd Hoffmann kra...@redhat.com
  
  

[Xen-devel] apic-v reduce network performance in my test case

2015-01-31 Thread Liuqiming (John)

Hi all,

Recently I met an odd performance problem: when I turn on APIC 
Virtualization feature (apicv=1), the network performance of a windows 
guest become worse.


My test case like this: host only have one windows 2008 R2 HVM 
guest running,and this guest has a SR-IOV VF network passthrough to it.
Guest using this network access a NAS device. No fontend or backend of 
network and storage, all data transfered through network.


The xentrace data shows: the mainly difference between apicv and 
non-apicv, is the way guest write apic registers, and 
EXIT_REASON_MSR_WRITE vmexit cost much more time than 
EXIT_REASON_APIC_WRITE, but when using WRMSR, the PAUSE vmexit is much 
less than using APIC-v.

This is the odd part,any ideas?

APIC-v OFF:
 4099582 VMEXIT   3467051359128 TSC HLT
10135140 VMEXIT 42484175528 TSC WRMSR
 1651714 VMEXIT  9785961276 TSC I/O instruction
  532702 VMEXIT  3887971388 TSC External interrupt
  290546 VMEXIT  2262312440 TSC PAUSE
  588077 VMEXIT   914905312 TSC Control-register accesses
  383617 VMEXIT   453329940 TSC Exception or non-maskable 
interrupt (NMI)

  132717 VMEXIT   232289792 TSC Interrupt window
   25534 VMEXIT   198718764 TSC EPT violation
   53969 VMEXIT62886752 TSC TPR below threshold
7996 VMEXIT34735376 TSC RDMSR
1615 VMEXIT16042768 TSC VMCALL
 147 VMEXIT  272320 TSC CPUID
   7 VMEXIT6484 TSC WBINVD
   2 VMEXIT6308 TSC MOV DR  

APIC-v ON:
 3717629 VMEXIT   3459905385332 TSC HLT
 2282403 VMEXIT 23099880196 TSC APIC write
 3900448 VMEXIT 13073253548 TSC PAUSE
 1643729 VMEXIT 11719626776 TSC I/O instruction
 2194667 VMEXIT  5321640708 TSC WRMSR
  214425 VMEXIT  2198994944 TSC External interrupt
  566795 VMEXIT  1940710108 TSC Control-register accesses
  342688 VMEXIT   659665532 TSC Exception or non-maskable 
interrupt (NMI)

  190623 VMEXIT   644411612 TSC VMCALL
  188657 VMEXIT   295956932 TSC Virtualized EOI
   24350 VMEXIT   194817152 TSC EPT violation
4393 VMEXIT23282044 TSC RDMSR
 179 VMEXIT 1688676 TSC CPUID
   7 VMEXIT6884 TSC WBINVD
   1 VMEXIT4200 TSC MOV DR

In commit 7f2e992b824ec62a2818e64390ac2ccfbd74e6b7
VMX/Viridian: suppress MSR-based APIC suggestion when having APIC-V, 
msr based apic is disabled when apic-v is on, I wonder can they co-exist 
in some way? seems for windows guest msr-based apic has better performance.



___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] xen/arm: Fix rtds scheduler for arm

2015-01-31 Thread Ian Campbell
On Fri, 2015-01-30 at 18:19 +0200, Denys Drozdov wrote:

 since context_save executed right from IRQ level. The arm interrupt
 handling differs from x86. ARM is handling  context_saved with IRQ
 disabled in CPSR, though x86 has IRQs on. Thus it is failing on ASSERT
 inside spin_lock_irq when running on ARM. I guess it should work on
 x86, so this issue is ARM platform specific.

FWIW I was waiting for it to happen to a xen-unstable run but the latest
osstest gate run at
http://www.chiark.greenend.org.uk/~xensrcts/logs/33915/ which included
Dario's patches to rationalize the schedulr tests vs. archs also
resulted in a similar sounding failure on credit2:
http://www.chiark.greenend.org.uk/~xensrcts/logs/33915/test-armhf-armhf-xl-credit2/info.html
http://www.chiark.greenend.org.uk/~xensrcts/logs/33915/test-armhf-armhf-xl-credit2/serial-marilith-n5.txt

[Thu Jan 29 13:29:28 2015](XEN) Assertion 'local_irq_is_enabled()' 
failed at spinlock.c:137
[Thu Jan 29 13:29:28 2015](XEN) [ Xen-4.6-unstable  arm32  debug=y  
Not tainted ]
[Thu Jan 29 13:29:28 2015](XEN) CPU:0
[Thu Jan 29 13:29:28 2015](XEN) PC: 00229734 
_spin_lock_irq+0x18/0x94
[Thu Jan 29 13:29:28 2015](XEN) CPSR:   20da MODE:Hypervisor
[Thu Jan 29 13:29:28 2015](XEN)  R0: 4000823c R1:  R2: 
02faf080 R3: 60da
[Thu Jan 29 13:29:28 2015](XEN)  R4: 4000823c R5: 4000d000 R6: 
4000823c R7: 002ee020
[Thu Jan 29 13:29:28 2015](XEN)  R8: 4000f218 R9:  
R10:0026fe08 R11:7ffcfefc R12:0002
[Thu Jan 29 13:29:28 2015](XEN) HYP: SP: 7ffcfeec LR: 0021f34c
[Thu Jan 29 13:29:28 2015](XEN) 
[Thu Jan 29 13:29:28 2015](XEN)   VTCR_EL2: 80003558
[Thu Jan 29 13:29:28 2015](XEN)  VTTBR_EL2: 00010002b9ffc000
[Thu Jan 29 13:29:28 2015](XEN) 
[Thu Jan 29 13:29:28 2015](XEN)  SCTLR_EL2: 30cd187f
[Thu Jan 29 13:29:28 2015](XEN)HCR_EL2: 0038643f
[Thu Jan 29 13:29:28 2015](XEN)  TTBR0_EL2: ff6e8000
[Thu Jan 29 13:29:28 2015](XEN) 
[Thu Jan 29 13:29:28 2015](XEN)ESR_EL2: 
[Thu Jan 29 13:29:28 2015](XEN)  HPFAR_EL2: 
[Thu Jan 29 13:29:28 2015](XEN)  HDFAR: 
[Thu Jan 29 13:29:28 2015](XEN)  HIFAR: 
[Thu Jan 29 13:29:28 2015](XEN) 
[Thu Jan 29 13:29:28 2015](XEN) Xen stack trace from sp=7ffcfeec:
[Thu Jan 29 13:29:28 2015](XEN)0024d068  002f0328 7ffcff2c 
0021f34c   6591e5c1
[Thu Jan 29 13:29:28 2015](XEN) 4000d000 4000d000  
   7ffcff3c
[Thu Jan 29 13:29:28 2015](XEN)002285dc 7fff  7ffcff4c 
00242614   7ffcff54
[Thu Jan 29 13:29:28 2015](XEN)002427c8  00242b6c  
 2800  
[Thu Jan 29 13:29:28 2015](XEN)    
   
[Thu Jan 29 13:29:28 2015](XEN)  27a0 01d3 
   
[Thu Jan 29 13:29:28 2015](XEN)    
   
[Thu Jan 29 13:29:28 2015](XEN)    
   
[Thu Jan 29 13:29:28 2015](XEN)    

[Thu Jan 29 13:29:28 2015](XEN) Xen call trace:
[Thu Jan 29 13:29:28 2015](XEN)[00229734] 
_spin_lock_irq+0x18/0x94 (PC)
[Thu Jan 29 13:29:28 2015](XEN)[0021f34c] 
csched2_context_saved+0x44/0x18c (LR)
[Thu Jan 29 13:29:28 2015](XEN)[0021f34c] 
csched2_context_saved+0x44/0x18c
[Thu Jan 29 13:29:28 2015](XEN)[002285dc] context_saved+0x58/0x80
[Thu Jan 29 13:29:28 2015](XEN)[00242614] 
schedule_tail+0x148/0x2f0
[Thu Jan 29 13:29:28 2015](XEN)[002427c8] 
continue_new_vcpu+0xc/0x70
[Thu Jan 29 13:29:28 2015](XEN)[00242b6c] context_switch+0x74/0x7c
[Thu Jan 29 13:29:28 2015](XEN) 
[Thu Jan 29 13:29:28 2015](XEN) 
[Thu Jan 29 13:29:28 2015](XEN) 
[Thu Jan 29 13:29:28 2015](XEN) Panic on CPU 0:
[Thu Jan 29 13:29:28 2015](XEN) Assertion 'local_irq_is_enabled()' 
failed at spinlock.c:137
[Thu Jan 29 13:29:28 2015](XEN) 

I didn't have a chance yet to think about whether the ARM ctxt switch or
the scheduler(s) are in the wrong here...

Ian.



___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel