[Xen-devel] 答复: Re: [PATCH] missing chunk of HVM direct kernel boot patch

2014-12-01 Thread Chun Yan Liu
Ian Campbell ian.campb...@citrix.com 2014-11-28 下午 20:01 On Fri, 2014-11-28 at 13:55 +0800, Chunyan Liu wrote: Found by Stefano, this chunk of the patch was never applied to xen-unstable (commit 11dffa2359e8a2629490c14c029c7c7c777b3e47), see

Re: [Xen-devel] [PATCH v4] x86: add p2m_mmio_write_dm

2014-12-01 Thread Yu, Zhang
On 11/28/2014 5:57 PM, Jan Beulich wrote: On 28.11.14 at 08:59, yu.c.zh...@linux.intel.com wrote: --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -2838,7 +2838,8 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned long gla, * to the mmio handler. */ if (

Re: [Xen-devel] [PATCH] xen-netfront: Fix handling packets on compound pages with skb_linearize

2014-12-01 Thread Stefan Bader
On 11.08.2014 19:32, Zoltan Kiss wrote: There is a long known problem with the netfront/netback interface: if the guest tries to send a packet which constitues more than MAX_SKB_FRAGS + 1 ring slots, it gets dropped. The reason is that netback maps these slots to a frag in the frags array,

Re: [Xen-devel] 答复: Re: [PATCH] missing chunk of HVM direct kernel boot patch

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 01:21 -0700, Chun Yan Liu wrote: Ian Campbell ian.campb...@citrix.com 2014-11-28 下午 20:01 On Fri, 2014-11-28 at 13:55 +0800, Chunyan Liu wrote: Found by Stefano, this chunk of the patch was never applied to xen-unstable (commit

[Xen-devel] [v8][PATCH 03/17] introduce XENMEM_reserved_device_memory_map

2014-12-01 Thread Tiejun Chen
From: Jan Beulich jbeul...@suse.com This is a prerequisite for punching holes into HVM and PVH guests' P2M to allow passing through devices that are associated with (on VT-d) RMRRs. Signed-off-by: Jan Beulich jbeul...@suse.com Acked-by: Kevin Tian kevin.t...@intel.com ---

[Xen-devel] [v8][PATCH 00/17] xen: RMRR fix

2014-12-01 Thread Tiejun Chen
v8: A brief summary: * Rebased on the latest * We skip creating p2m table associated to RMRR range as Jan and Tim commented And especially, this is identified to setting these tables as INVALID since as you know all p2m tables already are initialized as INVALID. Actually I also tried to

[Xen-devel] [v8][PATCH 05/17] tools/libxc: introduce hypercall for xc_reserved_device_memory_map

2014-12-01 Thread Tiejun Chen
We will introduce that hypercall xc_reserved_device_memory_map approach to libxc. Signed-off-by: Tiejun Chen tiejun.c...@intel.com --- tools/libxc/include/xenctrl.h | 5 + tools/libxc/xc_domain.c | 30 ++ 2 files changed, 35 insertions(+) diff --git

[Xen-devel] [v8][PATCH 01/17] tools/hvmloader: link errno.h from xen internal

2014-12-01 Thread Tiejun Chen
We need to act on some specific hypercall error numbers, so require the hypervisor view on the errno.h value rather than just the build environment's number. So here link this headfile from xen. Acked-by: Jan Beulich jbeul...@suse.com Signed-off-by: Tiejun Chen tiejun.c...@intel.com ---

[Xen-devel] [v8][PATCH 07/17] hvmloader/util: get reserved device memory maps

2014-12-01 Thread Tiejun Chen
We need to use reserved device memory maps with multiple times, so provide just one common function should be friend. Signed-off-by: Tiejun Chen tiejun.c...@intel.com --- tools/firmware/hvmloader/util.c | 59 + tools/firmware/hvmloader/util.h | 2 ++ 2

[Xen-devel] [v8][PATCH 06/17] tools/libxc: check if modules space is overlapping with reserved device memory

2014-12-01 Thread Tiejun Chen
In case of reserved device memory overlapping with ram, it also probably overlap with modules space so we need to check these reserved device memory as well. Signed-off-by: Tiejun Chen tiejun.c...@intel.com --- tools/libxc/xc_hvm_build_x86.c | 94 +++--- 1

[Xen-devel] [v8][PATCH 12/17] xen/x86/ept: handle reserved device memory in ept_handle_violation

2014-12-01 Thread Tiejun Chen
We always reserve these ranges since we never allow any stuff to poke them. But in theory some untrusted VM can maliciously access them. So we need to intercept this approach. But we just don't want to leak anything or introduce any side affect since other OSs may touch them by careless behavior,

[Xen-devel] [v8][PATCH 10/17] hvmloader/mem_hole_alloc: skip any overlap with reserved device memory

2014-12-01 Thread Tiejun Chen
In some cases like igd_opregion_pgbase, guest will use mem_hole_alloc to allocate some memory to use in runtime cycle, so we alsoe need to make sure all reserved device memory don't overlap such a region. Signed-off-by: Tiejun Chen tiejun.c...@intel.com --- tools/firmware/hvmloader/util.c | 22

[Xen-devel] [v8][PATCH 17/17] xen/vtd: re-enable USB device assignment if enable pci_force

2014-12-01 Thread Tiejun Chen
Before we refine RMRR mechanism, USB RMRR may conflict with guest bios region so we always ignore USB RMRR. Now this can be gone when we enable pci_force to check/reserve RMRR. Signed-off-by: Tiejun Chen tiejun.c...@intel.com --- xen/drivers/passthrough/vtd/dmar.h | 1 +

[Xen-devel] [v8][PATCH 04/17] update the existing hypercall to support XEN_DOMCTL_set_rdm

2014-12-01 Thread Tiejun Chen
After we intend to expost that hypercall explicitly based on XEN_DOMCTL_set_rdm, we need this rebase. I hope we can squash this into that previous patch once Jan Ack this. Signed-off-by: Tiejun Chen tiejun.c...@intel.com --- xen/common/compat/memory.c | 75

[Xen-devel] [v8][PATCH 13/17] xen/mem_access: don't allow accessing reserved device memory

2014-12-01 Thread Tiejun Chen
We can't expost those reserved device memory in case of mem_access since any access may corrupt device usage. Signed-off-by: Tiejun Chen tiejun.c...@intel.com --- xen/common/mem_access.c | 41 + 1 file changed, 41 insertions(+) diff --git

[Xen-devel] [v8][PATCH 09/17] hvmloader/ram: check if guest memory is out of reserved device memory maps

2014-12-01 Thread Tiejun Chen
We need to check to reserve all reserved device memory maps in e820 to avoid any potential guest memory conflict. Currently, if we can't insert RDM entries directly, we may need to handle several ranges as follows: a. Fixed Ranges -- BUG() lowmem_reserved_base-0xA: reserved by BIOS

[Xen-devel] [v8][PATCH 14/17] xen/x86/p2m: introduce set_identity_p2m_entry

2014-12-01 Thread Tiejun Chen
We will create RMRR mapping as follows: If gfn space unoccupied, we just set that. If space already occupy by 1:1 RMRR mapping do thing. Others should be failed. Signed-off-by: Tiejun Chen tiejun.c...@intel.com --- xen/arch/x86/mm/p2m.c | 28

[Xen-devel] [v8][PATCH 15/17] xen:vtd: create RMRR mapping

2014-12-01 Thread Tiejun Chen
intel_iommu_map_page() does nothing if VT-d shares EPT page table. So rmrr_identity_mapping() never create RMRR mapping but in some cases like some GFX drivers it still need to access RMRR. Here we will create those RMRR mappings even in shared EPT case. Signed-off-by: Tiejun Chen

Re: [Xen-devel] [PATCH v4] x86: add p2m_mmio_write_dm

2014-12-01 Thread Jan Beulich
On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote: On 11/28/2014 5:57 PM, Jan Beulich wrote: On 28.11.14 at 08:59, yu.c.zh...@linux.intel.com wrote: --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -2838,7 +2838,8 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned long

Re: [Xen-devel] [OSSTEST PATCH 0/4] Introduction of the patches.

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 05:27 +, Hu, Robert wrote: But I'm not convinced that these patches take the right approach to achieving that. There seems to be a great deal of duplication of code. I think we should have a conversation about what moving parts are necessary for nested HVM

Re: [Xen-devel] [PATCH for-4.5] xl: fix two memory leaks

2014-12-01 Thread Ian Campbell
On Sun, 2014-11-30 at 21:54 +, Wei Liu wrote: There are two invocations of libxl_basename, which returns a malloc'ed string. Those strings should be freed after used. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson

Re: [Xen-devel] [BUG] XEN 4.3.3 - segfault in xl create for HVM with PCI passthrough

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 11:34 +0800, Dennis Lan (dlan) wrote: On Mon, Nov 10, 2014 at 8:09 PM, Ian Campbell ian.campb...@citrix.com wrote: On Mon, 2014-11-10 at 12:44 +0100, Atom2 wrote: I'm afraid it's looking more and more like a toolchain issue. I'm not expert on this side on things

Re: [Xen-devel] [PATCH] libxl: Fix building libxlu_cfg_y.y with bison 3.0

2014-12-01 Thread Ian Campbell
On Sat, 2014-11-29 at 21:23 -0800, Ed Swierk wrote: - Use %lex-param instead of obsolete YYLEX_PARAM to override lex scanner parameter - Change deprecated %name-prefix= to %name-prefix Tested against bison 2.4.1 and 3.0.2. Signed-off-by: Ed Swierk eswi...@skyportsystems.com Copying Ian

[Xen-devel] null domains | xen4.4

2014-12-01 Thread Alexey
Hi, all! We are once again faced with the null-domains problem. At this moment we have xen node with 49 null-domains and if I create new domain and shutdown it I w'll get a new one null-domain. All blkback and netback kernel process are exists. There is no qemu process running. I can't

Re: [Xen-devel] null domains | xen4.4

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 12:48 +0300, Alexey wrote: Hi, all! We are once again faced with the null-domains problem. At this moment we have xen node with 49 null-domains and if I create new domain and shutdown it I w'll get a new one null-domain. All blkback and netback kernel process are

Re: [Xen-devel] [PATCH for-4.5] xl: fix two memory leaks

2014-12-01 Thread Wei Liu
On Mon, Dec 01, 2014 at 09:34:47AM +, Ian Campbell wrote: On Sun, 2014-11-30 at 21:54 +, Wei Liu wrote: There are two invocations of libxl_basename, which returns a malloc'ed string. Those strings should be freed after used. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian

Re: [Xen-devel] [Patch V2] expand x86 arch_shared_info to support linear p2m list

2014-12-01 Thread Jan Beulich
On 01.12.14 at 10:29, jgr...@suse.com wrote: The x86 struct arch_shared_info field pfn_to_mfn_frame_list_list currently contains the mfn of the top level page frame of the 3 level p2m tree, which is used by the Xen tools during saving and restoring (and live migration) of pv domains and for

Re: [Xen-devel] [PATCH for-4.5] xl: fix two memory leaks

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 10:10 +, Wei Liu wrote: On Mon, Dec 01, 2014 at 09:34:47AM +, Ian Campbell wrote: On Sun, 2014-11-30 at 21:54 +, Wei Liu wrote: There are two invocations of libxl_basename, which returns a malloc'ed string. Those strings should be freed after used.

Re: [Xen-devel] [PATCH v4] x86: add p2m_mmio_write_dm

2014-12-01 Thread Tim Deegan
At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote: On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote: On 11/28/2014 5:57 PM, Jan Beulich wrote: On 28.11.14 at 08:59, yu.c.zh...@linux.intel.com wrote: --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -2838,7

[Xen-devel] [Intel-gfx] 2014-Q3 release of XenGT - a Mediated Graphics Passthrough Solution from Intel

2014-12-01 Thread Zhu, Libo
Hi all, We're pleased to announce a public release to Intel Graphics Virtualization Technology (Intel GVT-g, formerly known as XenGT). Intel GVT-g is a complete vGPU solution with mediated pass-through, supported today on 4th generation Intel Core(TM) processors with Intel Graphics

[Xen-devel] [PATCH] libxl/Makefile: Don't optimize debug builds; add macro debugging information

2014-12-01 Thread Euan Harris
libxl debug builds are built with optimization level -O1, inherited from the CFLAGS definition in StdGNU.mk. Optimizations confuse the debugger, and the comment justifying -O1 in StdGNU.mk should not apply for a userspace library. Disable optimization by appending -O0 to CFLAGS, which

[Xen-devel] [PATCH] libxl: libxl_domain_info: fix typo in error message

2014-12-01 Thread Euan Harris
Signed-off-by: Euan Harris euan.har...@citrix.com --- tools/libxl/libxl.c |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c index f84f7c2..c50c323 100644 --- a/tools/libxl/libxl.c +++ b/tools/libxl/libxl.c @@ -674,7 +674,7 @@ int

Re: [Xen-devel] null domains | xen4.4

2014-12-01 Thread Alexey
xl list two domains for example: (null) 67 0 8 --pssd 135229.6 (null) 69 0 4 --ps-d 4172.2 vif67.0 still exist in my dom0 and i can't ip link delete it. Attached block device marked as busy

Re: [Xen-devel] null domains | xen4.4

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 13:54 +0300, Alexey wrote: xl list two domains for example: (null) 67 0 8 --pssd 135229.6 (null) 69 0 4 --ps-d 4172.2 vif67.0 still exist in my dom0 and i can't ip

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-12-01 Thread David Vrabel
On 27/11/14 18:36, Luis R. Rodriguez wrote: On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote: On 11/26/2014 11:26 PM, Luis R. Rodriguez wrote: From: Luis R. Rodriguez mcg...@suse.com Some folks had reported that some xen hypercalls take a long time to complete when issued from

Re: [Xen-devel] [PATCH v4] x86: add p2m_mmio_write_dm

2014-12-01 Thread Jan Beulich
On 01.12.14 at 11:30, t...@xen.org wrote: At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote: On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote: To my understanding, pages with p2m_ram_ro are not supposed to be modified by guest. So in __hvm_copy(), when p2m type of a page is

Re: [Xen-devel] [Patch V2] expand x86 arch_shared_info to support linear p2m list

2014-12-01 Thread David Vrabel
On 01/12/14 10:15, Jan Beulich wrote: On 01.12.14 at 10:29, jgr...@suse.com wrote: The x86 struct arch_shared_info field pfn_to_mfn_frame_list_list currently contains the mfn of the top level page frame of the 3 level p2m tree, which is used by the Xen tools during saving and restoring (and

Re: [Xen-devel] About lost record of xentrace, how to avoid lost record?

2014-12-01 Thread George Dunlap
On Wed, Nov 26, 2014 at 7:21 AM, hanyandong hanyand...@iie.ac.cn wrote: hi all, I found xentrace will lost record if there are too many event to trace. But every event is important to me, so I want to trace all of them, not lost one. what could I do to achieve this goal ? If it need to

Re: [Xen-devel] null domains | xen4.4

2014-12-01 Thread Alexey
What does xenstore-ls -fp say? # xenstore-ls -fp /tool =(n0) /tool/xenstored =(n0) /local =(n0) /local/domain =(n0) /local/domain/0 =(n0) /local/domain/0/name = Domain-0 (n0) /local/domain/0/domid = 0 (n0) /local/domain/0/libxl =(n0) /local/domain/0/libxl/disable_udev

Re: [Xen-devel] [Patch V2] expand x86 arch_shared_info to support linear p2m list

2014-12-01 Thread Jan Beulich
On 01.12.14 at 12:19, david.vra...@citrix.com wrote: On 01/12/14 10:15, Jan Beulich wrote: On 01.12.14 at 10:29, jgr...@suse.com wrote: The x86 struct arch_shared_info field pfn_to_mfn_frame_list_list currently contains the mfn of the top level page frame of the 3 level p2m tree, which is

[Xen-devel] [PATCH v2 for-4.5 2/2] xl: fix two memory leaks

2014-12-01 Thread Wei Liu
Free strings returned by libxl_basename after used. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com --- tools/libxl/xl_cmdimpl.c |8 ++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git

[Xen-devel] [PATCH v2 for-4.5 1/2] libxl: un-constify return value of libxl_basename

2014-12-01 Thread Wei Liu
The string returned is malloc'ed but marked as const. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com --- tools/libxl/libxl.h | 10 ++ tools/libxl/libxl_utils.c |5 - tools/libxl/libxl_utils.h |

Re: [Xen-devel] [PATCH V4 00/10] xen: Switch to virtual mapped linear p2m list

2014-12-01 Thread David Vrabel
On 28/11/14 10:53, Juergen Gross wrote: Paravirtualized kernels running on Xen use a three level tree for translation of guest specific physical addresses to machine global addresses. This p2m tree is used for construction of page table entries, so the p2m tree walk is performance critical.

Re: [Xen-devel] [PATCH v2 for-4.5 0/2] xl/libxl: fix API and two memory leaks

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 11:31 +, Wei Liu wrote: Return value of libxl_basename was erroneously marked as const. This series removes that const and fixes two memory leaks in xl. I think these fixes should be included in 4.5, given that they fix real issues and are very straight foward to

Re: [Xen-devel] [PATCH] libxl/Makefile: Don't optimize debug builds; add macro debugging information

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 10:39 +, Euan Harris wrote: libxl debug builds are built with optimization level -O1, inherited from the CFLAGS definition in StdGNU.mk. Optimizations confuse the debugger, and the comment justifying -O1 in StdGNU.mk should not apply for a userspace library.

Re: [Xen-devel] [PATCH v2 for-4.5 0/2] xl/libxl: fix API and two memory leaks

2014-12-01 Thread Wei Liu
On Mon, Dec 01, 2014 at 11:40:09AM +, Ian Campbell wrote: On Mon, 2014-12-01 at 11:31 +, Wei Liu wrote: Return value of libxl_basename was erroneously marked as const. This series removes that const and fixes two memory leaks in xl. I think these fixes should be included in 4.5,

[Xen-devel] [linux-linus test] 31960: regressions - FAIL

2014-12-01 Thread xen . org
flight 31960 linux-linus real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31960/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-rumpuserxen-i386 8 guest-start fail REGR. vs. 31241

Re: [Xen-devel] [PATCH] libxl/Makefile: Don't optimize debug builds; add macro debugging information

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 11:55 +, Euan Harris wrote: On Mon, Dec 01, 2014 at 11:43:13AM +, Ian Campbell wrote: On Mon, 2014-12-01 at 10:39 +, Euan Harris wrote: libxl debug builds are built with optimization level -O1, inherited from the CFLAGS definition in StdGNU.mk.

Re: [Xen-devel] [PATCH v4] x86: add p2m_mmio_write_dm

2014-12-01 Thread Tim Deegan
At 11:17 + on 01 Dec (1417429027), Jan Beulich wrote: On 01.12.14 at 11:30, t...@xen.org wrote: At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote: On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote: To my understanding, pages with p2m_ram_ro are not supposed to be

Re: [Xen-devel] [PATCH] libxl: Fix building libxlu_cfg_y.y with bison 3.0

2014-12-01 Thread Wei Liu
On Mon, Dec 01, 2014 at 09:42:13AM +, Ian Campbell wrote: On Sat, 2014-11-29 at 21:23 -0800, Ed Swierk wrote: - Use %lex-param instead of obsolete YYLEX_PARAM to override lex scanner parameter - Change deprecated %name-prefix= to %name-prefix Tested against bison 2.4.1 and 3.0.2.

Re: [Xen-devel] [PATCH v4] x86: add p2m_mmio_write_dm

2014-12-01 Thread Jan Beulich
On 01.12.14 at 13:13, t...@xen.org wrote: At 11:17 + on 01 Dec (1417429027), Jan Beulich wrote: On 01.12.14 at 11:30, t...@xen.org wrote: At 09:32 + on 01 Dec (1417422746), Jan Beulich wrote: On 01.12.14 at 09:49, yu.c.zh...@linux.intel.com wrote: To my understanding, pages

[Xen-devel] [PATCH OSSTEST v3 00/19] add distro domU testing flight

2014-12-01 Thread Ian Campbell
Hi, The following series adds a new flight type intended to test distro domU support, i.e. running distro installers and kernels on top of current Xen to ensure things work. I intend for the flight to be run on a weekly basis, and I've scheduled it here to run at the weekend when in theory things

[Xen-devel] xl pci-attach silently fails the first time

2014-12-01 Thread Olaf Hering
I tried to attach a PCI device (IGB Virtual Function) to a HVM guest. To actually get it assigned its required to run pci-attach/pci-detach/pci-attach because it does not show up right away. Did anyone noticed this bug already, is there a fix? There is no error reported in dom0 dmesg, xl dmesg

[Xen-devel] [PATCH OSSTEST v3 01/19] TestSupport: Add helper to fetch a URL on a host

2014-12-01 Thread Ian Campbell
Signed-off-by: Ian Campbell ian.campb...@citrix.com --- v3: Make sure wget is installed --- Osstest/Debian.pm | 2 +- Osstest/TestSupport.pm | 8 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm index c8db601..89cd205 100644 ---

[Xen-devel] [PATCH OSSTEST v3 17/19] distros: add branch infrastructure

2014-12-01 Thread Ian Campbell
Since the distro nightlies are not version controlled we cannot use the usual mechanisms for detecting regressions. Special case things appropriately. We use an OLD_REVISION of flight-NNN to signify that the old revision is another flight and not a tree revision. A grep over $NEW_REVISION needed

[Xen-devel] [PATCH OSSTEST v3 09/19] Debian: Refactor installation of overlays, so it can be used for guests too

2014-12-01 Thread Ian Campbell
Signed-off-by: Ian Campbell ian.campb...@citrix.com --- v3: New patch --- Osstest/Debian.pm | 57 --- 1 file changed, 29 insertions(+), 28 deletions(-) diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm index c985913..8ec4a3b 100644 ---

[Xen-devel] [PATCH OSSTEST v3 14/19] distros: Support pvgrub for Wheezy too.

2014-12-01 Thread Ian Campbell
This requires us to install pv-grub-menu from backports, which we do using a late_command. Signed-off-by: Ian Campbell ian.campb...@citrix.com --- v3: - Remove spurious () from (END) (and the prexisting too) - Remove $xopts{EnableBackports} and automatically handle the need to add

[Xen-devel] [PATCH OSSTEST v3 11/19] make-flight: Handle $BUILD_LVEXTEND_MAX in mfi-common:create_build_jobs()

2014-12-01 Thread Ian Campbell
Signed-off-by: Ian Campbell ian.campb...@citrix.com --- v3: New patch --- make-flight | 4 mfi-common | 4 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/make-flight b/make-flight index 9963a46..b641683 100755 --- a/make-flight +++ b/make-flight @@ -35,10 +35,6 @@

[Xen-devel] [PATCH OSSTEST v3 15/19] distros: support PV guest install from Debian netinst media.

2014-12-01 Thread Ian Campbell
The netinst media are iso images containing a base Debian install and some (image size dependent) additional tasks. On x86 the multiarch iso flavour contains a Xen capable kernel for both i386 and amd64 so use that. This adds support for two classes of ISO, the CD sized ones which are built

[Xen-devel] [PATCH OSSTEST v3 18/19] distros: Run a flight over the weekend.

2014-12-01 Thread Ian Campbell
Once a week should be sufficient for this test. It involves quite a large number of jobs so schedule it to start early on Saturday so it can run over the weekend when, in theory, things should be quieter. Signed-off-by: Ian Campbell ian.campb...@citrix.com Acked-by: Ian Jackson

[Xen-devel] [PATCH OSSTEST v3 13/19] distros: support booting Debian PV (d-i installed) guests with pvgrub.

2014-12-01 Thread Ian Campbell
This requires the use of the pv-grub-menu package which is in Jessie onwards. (it is in wheezy-backports which is the subject of a subsequent flight). The bootloader to use is specified via a runvar {Guest}_bootloader. Adjust make-distros-flight to use pvgrub for some subset of i386 and amd64

[Xen-devel] [PATCH OSSTEST v3 06/19] Debian: refactor code to add preseed commands to the preseed file

2014-12-01 Thread Ian Campbell
Call it from ts-debian-hvm-install. Signed-off-by: Ian Campbell ian.campb...@citrix.com --- v3: New patch --- Osstest/Debian.pm | 16 +++- ts-debian-hvm-install | 3 +++ 2 files changed, 14 insertions(+), 5 deletions(-) diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm index

[Xen-devel] [PATCH RESEND] xen/blkfront: improve protection against issuing unsupported REQ_FUA

2014-12-01 Thread Vitaly Kuznetsov
Guard against issuing unsupported REQ_FUA and REQ_FLUSH was introduced in d11e61583 and was factored out into blkif_request_flush_valid() in 0f1ca65ee. However: 1) This check in incomplete. In case we negotiated to feature_flush = REQ_FLUSH and flush_op = BLKIF_OP_FLUSH_DISKCACHE (so FUA is

Re: [Xen-devel] Building 32-bit xen.efi for 32-bit EFI platforms

2014-12-01 Thread David Vrabel
On 24/11/14 14:59, Zhuan Chen wrote: Hi, I am wondering whether it's possible to build 32-bit xen.efi for the 32-bit EFI platform? One way of building xen.efi I learnt is to make the binutils configured with the x86_64-pep emulation (according to the document

Re: [Xen-devel] [PATCH OSSTEST v3 00/19] add distro domU testing flight

2014-12-01 Thread Ian Campbell
On Mon, 2014-12-01 at 12:56 +, Ian Campbell wrote: The exception to that good news is that sg-report-flight --that-flight=NNN MMM doesn't seem to be considering failures in MMM regressions vs NNN. e.g. test-amd64-i386-i386-daily-netboot-pvgrub should appear as a regression from 31961 to

Re: [Xen-devel] [PATCH] xen-netfront: Remove BUGs on paged skb data which crosses a page boundary

2014-12-01 Thread David Vrabel
On 26/11/14 17:28, David Miller wrote: From: Seth Forshee seth.fors...@canonical.com Date: Tue, 25 Nov 2014 20:28:24 -0600 These BUGs can be erroneously triggered by frags which refer to tail pages within a compound page. The data in these pages may overrun the hardware page while still

Re: [Xen-devel] [Qemu-devel] [PATCH] increase maxmem before calling xc_domain_populate_physmap

2014-12-01 Thread Don Slutz
On 11/27/14 05:48, Stefano Stabellini wrote: On Wed, 26 Nov 2014, Don Slutz wrote: On 11/26/14 13:17, Stefano Stabellini wrote: On Tue, 25 Nov 2014, Andrew Cooper wrote: On 25/11/14 17:45, Stefano Stabellini wrote: Increase maxmem before calling xc_domain_populate_physmap_exact to avoid the

Re: [Xen-devel] xl pci-attach silently fails the first time

2014-12-01 Thread Olaf Hering
On Mon, Dec 01, Olaf Hering wrote: # xl pci-assignable-add 01:10.0 # xl pci-assignable-list :01:10.0 # xl create -f domU.cfg # xl console domU ## lspci gives just emulated PCI devices ttyS0:Rescue:~ # lspci 00:00.0 Host bridge: Intel Corporation 440FX - 82441FX PMC [Natoma] (rev 02)

Re: [Xen-devel] [PATCH] xen-netfront: Fix handling packets on compound pages with skb_linearize

2014-12-01 Thread David Vrabel
On 01/12/14 08:55, Stefan Bader wrote: On 11.08.2014 19:32, Zoltan Kiss wrote: There is a long known problem with the netfront/netback interface: if the guest tries to send a packet which constitues more than MAX_SKB_FRAGS + 1 ring slots, it gets dropped. The reason is that netback maps

[Xen-devel] xorg crash on Fedora 21 xen hvm domUs with qxl (log with backtrace included)

2014-12-01 Thread Fabio Fantoni
On my latest test with xen 4.5 and qemu 2.2 (from git) linux hvm domU (Fedora 21) has no more crashed without any useful information in log but was crashed only xorg on start: [20.653] (EE) [20.653] (EE) Backtrace: [20.668] (EE) 0: /usr/libexec/Xorg.bin (OsLookupColor+0x119)

Re: [Xen-devel] [PATCH] xen-netfront: Fix handling packets on compound pages with skb_linearize

2014-12-01 Thread Zoltan Kiss
On 01/12/14 13:36, David Vrabel wrote: On 01/12/14 08:55, Stefan Bader wrote: On 11.08.2014 19:32, Zoltan Kiss wrote: There is a long known problem with the netfront/netback interface: if the guest tries to send a packet which constitues more than MAX_SKB_FRAGS + 1 ring slots, it gets

Re: [Xen-devel] [PATCH v4 7/7] xen/pciback: Restore configuration space when detaching from a guest.

2014-12-01 Thread David Vrabel
On 21/11/14 22:17, Konrad Rzeszutek Wilk wrote: The commit xen/pciback: Don't deadlock when unbinding. was using the version of pci_reset_function which would lock the device lock. That is no good as we can dead-lock. As such we swapped to using the lock-less version and requiring that the

Re: [Xen-devel] PV DomU running linux 3.17.3 causing xen-netback fatal error in Dom0

2014-12-01 Thread David Vrabel
On 28/11/14 15:19, Anthony Wright wrote: We have a 64 bit PV DomU that we recently upgraded from linux 3.3.2 to 3.17.3 running on a 64 bit 3.17.3 Dom0 with Xen 4.4.0. Shortly after the upgrade we started to lose network connectivity to the DomU a few times a day that required a reboot to

[Xen-devel] [PATCH 1/2] xen-detect: fix strict-aliasing compilation warning.

2014-12-01 Thread John Haxby
With gcc 4.8.3, compiling xen-detect gives a compilation warning if you're optimising: $ cc -Wall -Os xen-detect.c xen-detect.c: In function ‘check_for_xen’: xen-detect.c:65:9: warning: dereferencing type-punned pointer will break strict-aliasing rules [-Wstrict-aliasing] *(uint32_t

Re: [Xen-devel] Buggy interaction of live migration and p2m updates

2014-12-01 Thread David Vrabel
On 20/11/14 18:28, Andrew Cooper wrote: 1) Freeze the guests p2m during live migrate 2) Deep p2m dirty tracking 3) Eagerly check for p2m structure changes. 4) Request p2m structure change updates from the guest Proposed solution: A combination of 2, 3 and 4. Option 5: don't change

Re: [Xen-devel] xl pci-attach silently fails the first time

2014-12-01 Thread Olaf Hering
On Mon, Dec 01, Ian Campbell wrote: On Mon, 2014-12-01 at 15:34 +0100, Olaf Hering wrote: On Mon, Dec 01, Sander Eikelenboom wrote: Hmm the wiki also still mentions it: http://wiki.xen.org/wiki/Xen_PCI_Passthrough It was the ability with xend + qemu-trad to be able to specify the

[Xen-devel] [PATCH v2 08/19] libxl: x86: factor out e820_host_sanitize

2014-12-01 Thread Wei Liu
This function gets the machine E820 map and sanitize it according to PV guest configuration. This will be used in later patch. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com Cc: Dario Faggioli

[Xen-devel] [PATCH v2 04/19] libxl: add emacs local variables in libxl_{x86, arm}.c

2014-12-01 Thread Wei Liu
Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com Cc: Dario Faggioli dario.faggi...@citrix.com Cc: Elena Ufimtseva ufimts...@gmail.com --- tools/libxl/libxl_arm.c |8 tools/libxl/libxl_x86.c |8

[Xen-devel] [PATCH v2 02/19] xen: make two memory hypercalls vNUMA-aware

2014-12-01 Thread Wei Liu
Make XENMEM_increase_reservation and XENMEM_populate_physmap vNUMA-aware. That is, if guest requests Xen to allocate memory for specific vnode, Xen can translate vnode to pnode using vNUMA information of that guest. XENMEMF_vnode is introduced for the guest to mark the node number is in fact

[Xen-devel] [PATCH v2 09/19] libxl: functions to build vmemranges for PV guest

2014-12-01 Thread Wei Liu
One vmemrange is generated for each vnode. And for those guests who care about machine E820 map, vmemranges are further split to accommodate memory holes. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com Cc: Dario

[Xen-devel] [PATCH v2 06/19] libxl: add vmemrange to libxl__domain_build_state

2014-12-01 Thread Wei Liu
Currently we haven't exported vmemrange interface to libxl user. Vmemranges are generated during domain build. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com Cc: Dario Faggioli dario.faggi...@citrix.com Cc: Elena

[Xen-devel] [PATCH v2 00/19] Virtual NUMA for PV and HVM

2014-12-01 Thread Wei Liu
Hi all This is version 2 of this series. This patch series implements virtual NUMA support for both PV and HVM guest. That is, admin can configure via libxl what virtual NUMA topology the guest sees. This is the stage 1 (basic vNUMA support) and part of stage 2 (vNUMA-ware ballooning,

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-12-01 Thread Luis R. Rodriguez
On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel david.vra...@citrix.com wrote: On 01/12/14 15:05, Luis R. Rodriguez wrote: On Mon, Dec 01, 2014 at 11:11:43AM +, David Vrabel wrote: On 27/11/14 18:36, Luis R. Rodriguez wrote: On Thu, Nov 27, 2014 at 07:36:31AM +0100, Juergen Gross wrote: On

Re: [Xen-devel] [Qemu-devel] [PATCH] increase maxmem before calling xc_domain_populate_physmap

2014-12-01 Thread Stefano Stabellini
On Mon, 1 Dec 2014, Don Slutz wrote: On 11/27/14 05:48, Stefano Stabellini wrote: On Wed, 26 Nov 2014, Don Slutz wrote: On 11/26/14 13:17, Stefano Stabellini wrote: On Tue, 25 Nov 2014, Andrew Cooper wrote: On 25/11/14 17:45, Stefano Stabellini wrote: Increase maxmem before

Re: [Xen-devel] PV DomU running linux 3.17.3 causing xen-netback fatal error in Dom0

2014-12-01 Thread Anthony Wright
On 28/11/14 15:19, Anthony Wright wrote: We have a 64 bit PV DomU that we recently upgraded from linux 3.3.2 to 3.17.3 running on a 64 bit 3.17.3 Dom0 with Xen 4.4.0. Shortly after the upgrade we started to lose network connectivity to the DomU a few times a day that required a

[Xen-devel] [PATCH v2 19/19] xl: vNUMA support

2014-12-01 Thread Wei Liu
This patch includes configuration options parser and documentation. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com Cc: Dario Faggioli dario.faggi...@citrix.com Cc: Elena Ufimtseva ufimts...@gmail.com --- Changes in v2:

[Xen-devel] [PATCH v2 13/19] hvmloader: construct SRAT

2014-12-01 Thread Wei Liu
Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Jan Beulich jbeul...@suse.com --- Changes in v2: 1. Remove explicit zero initializers. 2. Adapt to new vNUMA retrieval routine. 3. Move SRAT very late in secondary table build. --- tools/firmware/hvmloader/acpi/acpi2_0.h | 53

[Xen-devel] [PATCH v2 16/19] libxl: build, check and pass vNUMA info to Xen for HVM guest

2014-12-01 Thread Wei Liu
Libxc has more involvement in building vmemranges in HVM case. The building of vmemranges is placed after xc_hvm_build returns, because it relies on memory hole information provided by xc_hvm_build. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian

[Xen-devel] [PATCH v2 17/19] libxl: disallow memory relocation when vNUMA is enabled

2014-12-01 Thread Wei Liu
Disallow memory relocation when vNUMA is enabled, because relocated memory ends up off node. Further more, even if we dynamically expand node coverage in hvmloader, low memory and high memory may reside in different physical nodes, blindly relocating low memory to high memory gives us a

[Xen-devel] [PATCH v2 11/19] xen: handle XENMEMF_get_vnumainfo in compat_memory_op

2014-12-01 Thread Wei Liu
Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Jan Beulich jbeul...@suse.com --- xen/common/compat/memory.c | 38 ++ xen/include/xlat.lst |2 ++ 2 files changed, 40 insertions(+) diff --git a/xen/common/compat/memory.c b/xen/common/compat/memory.c

[Xen-devel] [PATCH v2 15/19] libxc: allocate memory with vNUMA information for HVM guest

2014-12-01 Thread Wei Liu
And then returns low memory end, high memory end and mmio start to caller. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com Cc: Dario Faggioli dario.faggi...@citrix.com Cc: Elena Ufimtseva ufimts...@gmail.com ---

[Xen-devel] [PATCH v2 14/19] hvmloader: construct SLIT

2014-12-01 Thread Wei Liu
Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Jan Beulich jbeul...@suse.com --- Changes in v2: 1. Adapt to new vNUMA retrieval routine. 2. Move SLIT very late in secondary table build. --- tools/firmware/hvmloader/acpi/acpi2_0.h |8 +++ tools/firmware/hvmloader/acpi/build.c | 40

[Xen-devel] [PATCH v2 12/19] hvmloader: retrieve vNUMA information from hypervisor

2014-12-01 Thread Wei Liu
Hvmloader issues XENMEM_get_vnumainfo hypercall and stores the information retrieved in scratch space for later use. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Jan Beulich jbeul...@suse.com --- tools/firmware/hvmloader/Makefile|2 +- tools/firmware/hvmloader/hvmloader.c |3 ++

[Xen-devel] [PATCH v2 18/19] libxlutil: nested list support

2014-12-01 Thread Wei Liu
This is done with three major changes: 1. Rework internal representation of setting. 2. Extend grammar of parser. 3. Introduce new APIs. New APIs introduced: 1. xlu_cfg_value_type 2. xlu_cfg_value_get_string 3. xlu_cfg_value_get_list 4. xlu_cfg_get_listitem2 Previous APIs work as before.

Re: [Xen-devel] [Patch V2] expand x86 arch_shared_info to support linear p2m list

2014-12-01 Thread Jürgen Groß
On 12/01/2014 05:28 PM, Jan Beulich wrote: On 01.12.14 at 15:33, jgr...@suse.com wrote: On 12/01/2014 02:37 PM, Jan Beulich wrote: On 01.12.14 at 14:11, jgr...@suse.com wrote: On 12/01/2014 12:29 PM, Jan Beulich wrote: On 01.12.14 at 12:19, david.vra...@citrix.com wrote: On 01/12/14 10:15,

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-12-01 Thread Juergen Gross
On 12/01/2014 05:19 PM, Luis R. Rodriguez wrote: On Mon, Dec 01, 2014 at 03:54:24PM +, David Vrabel wrote: On 01/12/14 15:44, Luis R. Rodriguez wrote: On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel david.vra...@citrix.com wrote: On 01/12/14 15:05, Luis R. Rodriguez wrote: On Mon, Dec 01,

Re: [Xen-devel] [PATCH 1/2] xen-detect: fix strict-aliasing compilation warning.

2014-12-01 Thread Andrew Cooper
On 01/12/14 14:37, John Haxby wrote: With gcc 4.8.3, compiling xen-detect gives a compilation warning if you're optimising: $ cc -Wall -Os xen-detect.c xen-detect.c: In function ‘check_for_xen’: xen-detect.c:65:9: warning: dereferencing type-punned pointer will break strict-aliasing rules

Re: [Xen-devel] [PATCH] xen: privcmd: schedule() after private hypercall when non CONFIG_PREEMPT

2014-12-01 Thread Luis R. Rodriguez
On Mon, Dec 01, 2014 at 06:07:48PM +0100, Juergen Gross wrote: On 12/01/2014 05:19 PM, Luis R. Rodriguez wrote: On Mon, Dec 01, 2014 at 03:54:24PM +, David Vrabel wrote: On 01/12/14 15:44, Luis R. Rodriguez wrote: On Mon, Dec 1, 2014 at 10:18 AM, David Vrabel david.vra...@citrix.com

Re: [Xen-devel] PV DomU running linux 3.17.3 causing xen-netback fatal error in Dom0

2014-12-01 Thread David Vrabel
On 01/12/14 14:22, David Vrabel wrote: On 28/11/14 15:19, Anthony Wright wrote: We have a 64 bit PV DomU that we recently upgraded from linux 3.3.2 to 3.17.3 running on a 64 bit 3.17.3 Dom0 with Xen 4.4.0. Shortly after the upgrade we started to lose network connectivity to the DomU a few

[Xen-devel] [xen-unstable test] 31963: tolerable FAIL

2014-12-01 Thread xen . org
flight 31963 xen-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/31963/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 31932 Tests which did not succeed,

  1   2   >