Re: [Xen-devel] Inplace upgrading 4.4.x - 4.5.0

2015-02-09 Thread Sander Eikelenboom
Monday, February 9, 2015, 9:35:33 AM, you wrote: Hello Steven, upgrades from Xen 4.4 to 4.5 are supposed to work out of the box. Please post more details and we'll try to help you figure out what's wrong. Cheers, Stefano On Sun, 8 Feb 2015, Steven Haigh wrote: Hi all, I was under

Re: [Xen-devel] [RFC 7/7] libxl: Wait for QEMU startup in stubdomain

2015-02-09 Thread Ian Campbell
On Fri, 2015-02-06 at 17:23 +, Stefano Stabellini wrote: One of the main issues outstanding from when Anthony originally posted his patches is how we want to go about building this? I honestly do not know how well the current dracut-based approach to building the root image will

Re: [Xen-devel] [RFC 4/7] libxl: Add stubdomain_version to domain_build_info.

2015-02-09 Thread Ian Campbell
On Tue, 2015-02-03 at 23:06 -0500, Eric Shelton wrote: This enum gives the ability to select between a MiniOS-based QEMU traditional stub domain and a Linux-based QEMU upstream stub domain. To use the Linux-based stubdomain, the following two lines should be included in the appropriate xl.cfg

Re: [Xen-devel] [RFC 7/7] libxl: Wait for QEMU startup in stubdomain

2015-02-09 Thread Stefano Stabellini
On Mon, 9 Feb 2015, Ian Campbell wrote: On Fri, 2015-02-06 at 17:23 +, Stefano Stabellini wrote: One of the main issues outstanding from when Anthony originally posted his patches is how we want to go about building this? I honestly do not know how well the current dracut-based

Re: [Xen-devel] [RFC 2/7] linux-stubdomain: Compile Linux

2015-02-09 Thread Ian Campbell
On Fri, 2015-02-06 at 17:45 +, Stefano Stabellini wrote: That's a good point. I think git clone would be more inline with any other external project that we use. However I'll let the other maintainers decide on this. If anything it should be a clone of a push-gated Linux git tree on

Re: [Xen-devel] Inplace upgrading 4.4.x - 4.5.0

2015-02-09 Thread Steven Haigh
On 9/02/2015 7:59 PM, Sander Eikelenboom wrote: Monday, February 9, 2015, 9:35:33 AM, you wrote: Hello Steven, upgrades from Xen 4.4 to 4.5 are supposed to work out of the box. Please post more details and we'll try to help you figure out what's wrong. Cheers, Stefano On Sun, 8

Re: [Xen-devel] Inplace upgrading 4.4.x - 4.5.0

2015-02-09 Thread Andrew Cooper
On 09/02/2015 09:09, Steven Haigh wrote: On 9/02/2015 7:59 PM, Sander Eikelenboom wrote: Monday, February 9, 2015, 9:35:33 AM, you wrote: Hello Steven, upgrades from Xen 4.4 to 4.5 are supposed to work out of the box. Please post more details and we'll try to help you figure out what's

Re: [Xen-devel] Booting dom0, various issues since v3.16 kernels

2015-02-09 Thread Stefan Bader
On 05.02.2015 15:47, Sander Eikelenboom wrote: Thursday, February 5, 2015, 3:22:49 PM, you wrote: Hey David, after just being in that pain, I thought I might as well give a summary to you/the list. Maybe helpful to not forget which piece should go to which stable... So:

Re: [Xen-devel] Booting dom0, various issues since v3.16 kernels

2015-02-09 Thread Sander Eikelenboom
Monday, February 9, 2015, 10:31:15 AM, you wrote: On 05.02.2015 15:47, Sander Eikelenboom wrote: Thursday, February 5, 2015, 3:22:49 PM, you wrote: Hey David, after just being in that pain, I thought I might as well give a summary to you/the list. Maybe helpful to not forget which

Re: [Xen-devel] Inplace upgrading 4.4.x - 4.5.0

2015-02-09 Thread Steven Haigh
On 9/02/2015 8:16 PM, Ian Campbell wrote: On Mon, 2015-02-09 at 20:09 +1100, Steven Haigh wrote: On 9/02/2015 7:59 PM, Sander Eikelenboom wrote: Monday, February 9, 2015, 9:35:33 AM, you wrote: Hello Steven, upgrades from Xen 4.4 to 4.5 are supposed to work out of the box. Please post more

[Xen-devel] [linux-linus test] 34299: regressions - FAIL

2015-02-09 Thread xen . org
flight 34299 linux-linus real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34299/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-libvirt 12 guest-start.2 fail REGR. vs. 34227

Re: [Xen-devel] dom0 kernel - irq nobody cared ... the continuing saga ..

2015-02-09 Thread David Vrabel
On 09/02/15 15:03, Sander Eikelenboom wrote: Hi Jan / David / Konrad, I was just testing a 3.19 kernel on my intel machine and again ran into the sporadically appearing irq nobody cared on the dom0 kernel. This occurs now for quite some kernel versions (running xen-unstable now, but it also

Re: [Xen-devel] [PATCH 0/2] libxl: fix handling of fd and timer registrations

2015-02-09 Thread Jim Fehlig
Anthony PERARD wrote: On Mon, Feb 02, 2015 at 05:00:34PM -0700, Jim Fehlig wrote: This small series fixes some assertions we occasionally see in the libxl driver when running libvirt-TCK. The assertions were due to races between destroying per-domain libxl_ctx and receiving fd and timer

[Xen-devel] [qemu-upstream-unstable test] 34319: regressions - FAIL

2015-02-09 Thread xen . org
flight 34319 qemu-upstream-unstable real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34319/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-freebsd10-i386 11 guest-localmigrate fail REGR. vs. 33488

Re: [Xen-devel] [PATCH 3/4] libxl: event handling: ao_inprogress does waits while reports outstanding

2015-02-09 Thread Wei Liu
On Mon, Feb 09, 2015 at 03:51:11PM +, Ian Jackson wrote: libxl__ao_inprogress needs to check (like libxl__ao_complete_check_progress_reports) that there are no oustanding progress callbacks. Otherwise it might happen that we would destroy the ao while another thread has an outstanding

Re: [Xen-devel] [PATCH V2] x86 spinlock: Fix memory corruption on completing completions

2015-02-09 Thread Raghavendra K T
Ccing Davidlohr, (sorry that I got confused with similar address in cc list). On 02/09/2015 08:44 PM, Oleg Nesterov wrote: On 02/09, Raghavendra K T wrote: +static inline void __ticket_check_and_clear_slowpath(arch_spinlock_t *lock) +{ + arch_spinlock_t old, new; + __ticket_t

[Xen-devel] dom0 kernel - irq nobody cared ... the continuing saga ..

2015-02-09 Thread Sander Eikelenboom
-4.5). [ 1905.880200] irq 18: nobody cared (try booting with the irqpoll option) [ 1905.914838] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.19.0-creanuc-20150209-doflr+ #1 [ 1905.935473] Hardware name: /D53427RKE, BIOS RKPPT10H.86A.0017.2013.0425.1251 04/25/2013 [ 1905.956149

Re: [Xen-devel] [PATCH 4/4] libxl: More probably detect reentry of destroyed ctx

2015-02-09 Thread Wei Liu
On Mon, Feb 09, 2015 at 03:51:12PM +, Ian Jackson wrote: In libxl_ctx_free: 1. Move the GC_INIT earlier, so that we can: 2. Take the lock around most of the work. This is technically unnecessary since calling any other libxl entrypoint on a ctx being passed to libxl_ctx_free

Re: [Xen-devel] [PATCH V2] x86 spinlock: Fix memory corruption on completing completions

2015-02-09 Thread Oleg Nesterov
On 02/09, Raghavendra K T wrote: +static inline void __ticket_check_and_clear_slowpath(arch_spinlock_t *lock) +{ + arch_spinlock_t old, new; + __ticket_t diff; + + old.tickets = READ_ONCE(lock-tickets); + diff = (old.tickets.tail ~TICKET_SLOWPATH_FLAG) - old.tickets.head;

Re: [Xen-devel] dom0 kernel - irq nobody cared ... the continuing saga ..

2015-02-09 Thread Sander Eikelenboom
Monday, February 9, 2015, 4:18:15 PM, you wrote: On 09/02/15 15:03, Sander Eikelenboom wrote: Hi Jan / David / Konrad, I was just testing a 3.19 kernel on my intel machine and again ran into the sporadically appearing irq nobody cared on the dom0 kernel. This occurs now for quite some

Re: [Xen-devel] [PATCH 1/4] libxl: event handling: Add an assert to egc_run_callbacks

2015-02-09 Thread Wei Liu
On Mon, Feb 09, 2015 at 03:51:09PM +, Ian Jackson wrote: Check that the ao is still live when we are about to running some of its callbacks. This reveals an existing bug in libxl which is exercised by libvirt, converting libvirtd: libxl_event.c:1792:

Re: [Xen-devel] dom0 kernel - irq nobody cared ... the continuing saga ..

2015-02-09 Thread Jan Beulich
On 09.02.15 at 16:18, david.vra...@citrix.com wrote: On 09/02/15 15:03, Sander Eikelenboom wrote: Hi Jan / David / Konrad, I was just testing a 3.19 kernel on my intel machine and again ran into the sporadically appearing irq nobody cared on the dom0 kernel. This occurs now for quite some

[Xen-devel] [PATCH 4/4] libxl: More probably detect reentry of destroyed ctx

2015-02-09 Thread Ian Jackson
In libxl_ctx_free: 1. Move the GC_INIT earlier, so that we can: 2. Take the lock around most of the work. This is technically unnecessary since calling any other libxl entrypoint on a ctx being passed to libxl_ctx_free risks undefined behaviour. But, taking the lock allows us to much

[Xen-devel] [PATCH 1/4] libxl: event handling: Add an assert to egc_run_callbacks

2015-02-09 Thread Ian Jackson
Check that the ao is still live when we are about to running some of its callbacks. This reveals an existing bug in libxl which is exercised by libvirt, converting libvirtd: libxl_event.c:1792: libxl__ao_complete_check_progress_reports: Assertion `ao-in_initiator' failed. into libvirtd:

[Xen-devel] [PATCH 2/4] libxl: event handling: Break out ao_work_outstanding

2015-02-09 Thread Ian Jackson
Break out the test in libxl__ao_complete_check_progress_reports, into ao_work_outstanding, which reports false if either (i) the ao is still ongoing or (ii) there is a progress report (perhaps on a different thread's callback queue) which has yet to be reported to the application. No functional

[Xen-devel] [PATCH 3/4] libxl: event handling: ao_inprogress does waits while reports outstanding

2015-02-09 Thread Ian Jackson
libxl__ao_inprogress needs to check (like libxl__ao_complete_check_progress_reports) that there are no oustanding progress callbacks. Otherwise it might happen that we would destroy the ao while another thread has an outstanding callback its egc report queue. The other thread would then, in its

Re: [Xen-devel] [libvirt test] 34168: tolerable all pass - PUSHED

2015-02-09 Thread Jim Fehlig
Ian Campbell wrote: Jim, Thought you might like to know that we are now testing actually starting a guest with libvirt in osstest and this is the first pass. Nice! I'll keep an eye out for any regressions. Currently we don't test migration (which is why that appears to have failed),

Re: [Xen-devel] [PATCH v3 13/13] xen/iommu: smmu: Advertise when the SMMU support coherent table walk

2015-02-09 Thread Julien Grall
On 10/02/2015 09:36, Julien Grall wrote: Hi Stefano, On 06/02/2015 22:06, Stefano Stabellini wrote: On Fri, 30 Jan 2015, Julien Grall wrote: When SMMU doesn't support coherent table walk, Xen may need to clean updated PT (see commit 4c5f4cb xen/arm: p2m: Clean cache PT when the IOMMU

Re: [Xen-devel] [PATCH v2 3/9] xen: arm: Handle 32-bit EL0 on 64-bit EL1 when advancing PC after trap

2015-02-09 Thread Julien Grall
Hi Ian, On 10/02/2015 12:45, Ian Campbell wrote: Signed-off-by: Ian Campbell ian.campb...@citrix.com Reviewed-by: Julien Grall julien.gr...@linaro.org --- xen/arch/arm/traps.c |8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/xen/arch/arm/traps.c

Re: [Xen-devel] [PATCH v2 3/9] xen: arm: Handle 32-bit EL0 on 64-bit EL1 when advancing PC after trap

2015-02-09 Thread Ian Campbell
On Tue, 2015-02-10 at 13:44 +0800, Julien Grall wrote: /* The cond for this instruction works out as the top 4 bits. */ -cond = ( it 4 ); +cond = ( it 4 ); I haven't spot it in the previous review. This seems to be only a coding change. Could you specify it

Re: [Xen-devel] [PATCH v2 4/9] xen: arm: correctly handle vtimer traps from userspace

2015-02-09 Thread Julien Grall
Hi Ian, On 10/02/2015 12:45, Ian Campbell wrote: Previously 32-bit userspace on 32-bit kernel and 64-bit userspace on 64-bit kernel could access these registers irrespective of whether the kernel had configured them to be allowed to. To fix this: - Userspace access to CNTP_CTL_EL0 and

Re: [Xen-devel] question about memory allocation for driver domain

2015-02-09 Thread Julien Grall
On 09/02/2015 20:02, Oleksandr Tyshchenko wrote: On Mon, Feb 9, 2015 at 10:31 AM, Julien Grall julien.gr...@linaro.org wrote: On 07/02/2015 01:15, Oleksandr Tyshchenko wrote: Hi Julien Hi Oleksandr, On Thu, Feb 5, 2015 at 6:36 PM, Oleksandr Tyshchenko The next problem is ballooning.

Re: [Xen-devel] [PATCH 6/9] xen: arm: Handle CP14 32-bit register accesses from userspace

2015-02-09 Thread Julien Grall
On 10/02/2015 11:40, Ian Campbell wrote: On Wed, 2014-09-10 at 10:48 +0100, Ian Campbell wrote: On Tue, 2014-09-09 at 16:45 -0700, Julien Grall wrote: Hi Ian, On 09/09/14 09:23, Ian Campbell wrote: Accesses to these from 32-bit userspace would cause a hypervisor exception (host crash) when

[Xen-devel] freemem-slack and large memory environments

2015-02-09 Thread Mike Latimer
Hi, While testing commit 2563bca1, I found that libxl_get_free_memory returns 0 until there is more free memory than required for freemem-slack. This means that during the domain creation process, freed memory is first set aside for freemem-slack, then marked as truly free for consumption. On

Re: [Xen-devel] [PATCH RFC] xen: arm: context switch vtimer PPI state.

2015-02-09 Thread Ian Campbell
Stefano, do you have any comments on the viability of the general approach here before I go off and start addressing the review comments? Cheers, Ian. On Mon, 2015-01-26 at 15:55 +, Ian Campbell wrote: ... instead of artificially masking the timer interrupt in the timer state and relying

Re: [Xen-devel] [PATCH RFC V2 4/5] xl: add pvusb commands

2015-02-09 Thread Jürgen Groß
On 01/19/2015 09:28 AM, Chunyan Liu wrote: Add pvusb commands. To attach a usb device to guest through pvusb, one could follow following example: #xl usb-ctrl-attach test_vm version=1 num_ports=8 #xl usb-list test_vm will show the usb controllers and port usage under the domain. #xl

Re: [Xen-devel] [PATCH v3 13/13] xen/iommu: smmu: Advertise when the SMMU support coherent table walk

2015-02-09 Thread Julien Grall
Hi Stefano, On 06/02/2015 22:06, Stefano Stabellini wrote: On Fri, 30 Jan 2015, Julien Grall wrote: When SMMU doesn't support coherent table walk, Xen may need to clean updated PT (see commit 4c5f4cb xen/arm: p2m: Clean cache PT when the IOMMU doesn't support coherent walk). If one SMMU of

Re: [Xen-devel] [PATCH 6/9] xen: arm: Handle CP14 32-bit register accesses from userspace

2015-02-09 Thread Ian Campbell
On Wed, 2014-09-10 at 10:48 +0100, Ian Campbell wrote: On Tue, 2014-09-09 at 16:45 -0700, Julien Grall wrote: Hi Ian, On 09/09/14 09:23, Ian Campbell wrote: Accesses to these from 32-bit userspace would cause a hypervisor exception (host crash) when running a 64-bit kernel, which is

Re: [Xen-devel] [PATCH v3 12/13] xen/iommu: smmu: Add Xen specific code to be able to use the driver

2015-02-09 Thread Julien Grall
Hi Stefano, On 06/02/2015 21:20, Stefano Stabellini wrote: On Fri, 30 Jan 2015, Julien Grall wrote: -static int force_stage; -module_param_named(force_stage, force_stage, int, S_IRUGO | S_IWUSR); -MODULE_PARM_DESC(force_stage, - Force SMMU mappings to be installed at a particular stage

[Xen-devel] [rumpuserxen test] 34346: regressions - FAIL

2015-02-09 Thread xen . org
flight 34346 rumpuserxen real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/34346/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-rumpuserxen6 xen-build fail REGR. vs. 33866

Re: [Xen-devel] [PATCH 0/5] multiboot2: Enable EFI boot services usage in loaded images

2015-02-09 Thread Daniel Kiper
Hi all, On Fri, Jan 30, 2015 at 06:59:23PM +0100, Daniel Kiper wrote: Hi, This patch series enable EFI boot services usage in loaded images by multiboot2 protocol. Guys, do you have any comments on this patch series? Should I fix something? Could you apply them to GRUB2 tree? Daniel PS

Re: [Xen-devel] [RFC PATCH V3 10/12] xen: Introduce monitor_op domctl

2015-02-09 Thread Tamas K Lengyel
--- a/xen/include/public/hvm/params.h +++ b/xen/include/public/hvm/params.h @@ -162,21 +162,6 @@ */ #define HVM_PARAM_ACPI_IOPORTS_LOCATION 19 -/* Enable blocking memory events, async or sync (pause vcpu until response) - * onchangeonly indicates messages only on a change of value */

[Xen-devel] [PATCH V4 12/13] xen/xsm: Split vm_event_op into three separate labels

2015-02-09 Thread Tamas K Lengyel
The XSM label vm_event_op has been used to control the three memops controlling mem_access, mem_paging and mem_sharing. While these systems rely on vm_event, these are not vm_event operations themselves. Thus, in this patch we introduce three separate labels for each of these memops.

[Xen-devel] [PATCH V4 13/13] xen/vm_event: Add RESUME option to vm_event_op domctl

2015-02-09 Thread Tamas K Lengyel
Thus far mem_access and mem_sharing memops had been able to signal to Xen to start pulling responses off the corresponding rings. In this patch we retire these memops and add them to the option to the vm_event_op domctl. The vm_event_op domctl suboptions are the same for each ring thus we

[Xen-devel] [PATCH V4 05/13] xen: Rename mem_event to vm_event

2015-02-09 Thread Tamas K Lengyel
In this patch we mechanically rename mem_event to vm_event. This patch introduces no logic changes to the code. Using the name vm_event better describes the intended use of this subsystem, which is not limited to memory events. It can be used for off-loading the decision making logic into helper

Re: [Xen-devel] Xen's Linux kernel config options v3

2015-02-09 Thread Luis R. Rodriguez
On Mon, Feb 09, 2015 at 07:17:23AM +0100, Juergen Gross wrote: On 02/07/2015 12:44 AM, Luis R. Rodriguez wrote: After some feedback for the first draft I'd suggest the following: Option Selects Depends

[Xen-devel] [PATCH v3 6/7] libxl/libxc: Move libxl_get_numainfo()'s hypercall buffer management to libxc

2015-02-09 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com --- tools/libxc/include/xenctrl.h |4 ++- tools/libxc/xc_misc.c | 29 -- tools/libxl/libxl.c | 36 - tools/python/xen/lowlevel/xc/xc.c | 39

[Xen-devel] [PATCH v3 7/7] libxl: Add interface for querying hypervisor about PCI topology

2015-02-09 Thread Boris Ostrovsky
.. and use this new interface to display it along with CPU topology and NUMA information when 'xl info -n' command is issued The output will look like ... cpu_topology : cpu:coresocket node 0: 000 ... device topology: device node

[Xen-devel] [PATCH v3 0/7] Display IO topology when PXM data is available (plus some cleanup)

2015-02-09 Thread Boris Ostrovsky
Changes in v3: * Added patch #1 to more consistently define nodes as a u8 and properly use NUMA_NO_NODE. * Make changes to xen_sysctl_numainfo, similar to those made to xen_sysctl_topologyinfo. (Q: I kept both sets of changes in the same patch #3 to avoid bumping interface version twice.

[Xen-devel] [PATCH v3 4/7] sysctl: Add sysctl interface for querying PCI topology

2015-02-09 Thread Boris Ostrovsky
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com --- xen/common/sysctl.c | 73 +++ xen/include/public/sysctl.h | 29 + 2 files changed, 102 insertions(+), 0 deletions(-) diff --git a/xen/common/sysctl.c

Re: [Xen-devel] [PATCH V4 08/13] xen: Introduce monitor_op domctl

2015-02-09 Thread Daniel De Graaf
On 02/09/2015 01:53 PM, Tamas K Lengyel wrote: In preparation for allowing for introspecting ARM and PV domains the old control interface via the hvm_op hypercall is retired. A new control mechanism is introduced via the domctl hypercall: monitor_op. This patch aims to establish a base API on

Re: [Xen-devel] [PATCH V4 05/13] xen: Rename mem_event to vm_event

2015-02-09 Thread Daniel De Graaf
On 02/09/2015 01:53 PM, Tamas K Lengyel wrote: In this patch we mechanically rename mem_event to vm_event. This patch introduces no logic changes to the code. Using the name vm_event better describes the intended use of this subsystem, which is not limited to memory events. It can be used for

Re: [Xen-devel] [PATCH V4 12/13] xen/xsm: Split vm_event_op into three separate labels

2015-02-09 Thread Daniel De Graaf
On 02/09/2015 01:53 PM, Tamas K Lengyel wrote: The XSM label vm_event_op has been used to control the three memops controlling mem_access, mem_paging and mem_sharing. While these systems rely on vm_event, these are not vm_event operations themselves. Thus, in this patch we introduce three

Re: [Xen-devel] [PATCH V4 10/13] xen/vm_event: Decouple vm_event and mem_access.

2015-02-09 Thread Daniel De Graaf
On 02/09/2015 01:53 PM, Tamas K Lengyel wrote: The vm_event subsystem has been artifically tied to the presence of mem_access. While mem_access does depend on vm_event, vm_event is an entirely independent subsystem that can be used for arbitrary function-offloading to helper apps in domains.

Re: [Xen-devel] question about memory allocation for driver domain

2015-02-09 Thread Julien Grall
On 07/02/2015 01:15, Oleksandr Tyshchenko wrote: Hi Julien Hi Oleksandr, On Thu, Feb 5, 2015 at 6:36 PM, Oleksandr Tyshchenko Let me describe in detail about solution #3 before answer to your question. Maybe I missed something in the first mail. Also the Ian's answer clarified to me some

Re: [Xen-devel] Inplace upgrading 4.4.x - 4.5.0

2015-02-09 Thread Stefano Stabellini
Hello Steven, upgrades from Xen 4.4 to 4.5 are supposed to work out of the box. Please post more details and we'll try to help you figure out what's wrong. Cheers, Stefano On Sun, 8 Feb 2015, Steven Haigh wrote: Hi all, I was under the impression that you should be able to do in-place

Re: [Xen-devel] Inplace upgrading 4.4.x - 4.5.0

2015-02-09 Thread Steven Haigh
Thanks Stefano, I wanted to make sure I was correct with this belief before I posted all the info. I'll gather as much info as I can in the next day or so and see what we can do. On 9/02/2015 7:35 PM, Stefano Stabellini wrote: Hello Steven, upgrades from Xen 4.4 to 4.5 are supposed to work

Re: [Xen-devel] [PATCH] xen/arm: allow console=hvc0 to be omitted for guests

2015-02-09 Thread Ard Biesheuvel
On 10 February 2015 at 15:26, Ian Campbell ian.campb...@citrix.com wrote: On Tue, 2015-02-10 at 07:00 +, Stefano Stabellini wrote: On Fri, 30 Jan 2015, Ard Biesheuvel wrote: This patch registers hvc0 as the preferred console if no console has been specified explicitly on the kernel

Re: [Xen-devel] [PATCH] xen/arm: allow console=hvc0 to be omitted for guests

2015-02-09 Thread Ian Campbell
On Tue, 2015-02-10 at 07:00 +, Stefano Stabellini wrote: On Fri, 30 Jan 2015, Ard Biesheuvel wrote: This patch registers hvc0 as the preferred console if no console has been specified explicitly on the kernel command line. The purpose is to allow platform agnostic kernels and boot

Re: [Xen-devel] [PATCH] xen/arm: allow console=hvc0 to be omitted for guests

2015-02-09 Thread Julien Grall
Hi Stefano, On 10/02/2015 15:00, Stefano Stabellini wrote: On Fri, 30 Jan 2015, Ard Biesheuvel wrote: This patch registers hvc0 as the preferred console if no console has been specified explicitly on the kernel command line. The purpose is to allow platform agnostic kernels and boot images

Re: [Xen-devel] [PATCH] modify the IO_TLB_SEGSIZE to io_tlb_segsize configurable as flexible requirement about SW-IOMMU.

2015-02-09 Thread Konrad Rzeszutek Wilk
On Mon, Feb 09, 2015 at 02:13:30AM +, Wang, Xiaoming wrote: Dear Wilk: -Original Message- From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] Sent: Saturday, February 7, 2015 2:12 AM To: Wang, Xiaoming Cc: r...@linux-mips.org; boris.ostrov...@oracle.com;

[Xen-devel] [PATCH V4 08/13] xen: Introduce monitor_op domctl

2015-02-09 Thread Tamas K Lengyel
In preparation for allowing for introspecting ARM and PV domains the old control interface via the hvm_op hypercall is retired. A new control mechanism is introduced via the domctl hypercall: monitor_op. This patch aims to establish a base API on which future applications can build on.

[Xen-devel] [PATCH V4 10/13] xen/vm_event: Decouple vm_event and mem_access.

2015-02-09 Thread Tamas K Lengyel
The vm_event subsystem has been artifically tied to the presence of mem_access. While mem_access does depend on vm_event, vm_event is an entirely independent subsystem that can be used for arbitrary function-offloading to helper apps in domains. This patch removes the dependency that mem_access

[Xen-devel] [PATCH V4 02/13] xen/mem_event: Cleanup mem_event ring names and domctls

2015-02-09 Thread Tamas K Lengyel
The name of one of the mem_event rings still implies it is used only for memory accesses, which is no longer the case. It is also used to deliver various HVM events, thus the name monitor is more appropriate in this setting. The mem_event subop definitions are also shortened to be more

[Xen-devel] [PATCH V4 01/13] xen/mem_event: Cleanup of mem_event structures

2015-02-09 Thread Tamas K Lengyel
From: Razvan Cojocaru rcojoc...@bitdefender.com The public mem_event structures used to communicate with helper applications via shared rings have been used in different settings. However, the variable names within this structure have not reflected this fact, resulting in the reuse of variables

[Xen-devel] [PATCH V4 09/13] xen/vm_event: Check for VM_EVENT_FLAG_DUMMY only in Debug builds

2015-02-09 Thread Tamas K Lengyel
The flag is only used for debugging purposes, thus it should be only checked for in debug builds of Xen. Signed-off-by: Tamas K Lengyel tamas.leng...@zentific.com --- xen/arch/x86/mm/mem_sharing.c | 2 ++ xen/arch/x86/mm/p2m.c | 2 ++ xen/common/mem_access.c | 2 ++ 3 files

[Xen-devel] [PATCH V4 00/13] xen: Clean-up of mem_event subsystem

2015-02-09 Thread Tamas K Lengyel
This patch series aims to clean up the mem_event subsystem within Xen. The original use-case for this system was to allow external helper applications running in privileged domains to control various memory operations performed by Xen. Amongs these were paging, sharing and access control. The

[Xen-devel] [PATCH V4 11/13] xen/vm_event: Relocate memop checks

2015-02-09 Thread Tamas K Lengyel
The memop handler function for paging/sharing responsible for calling XSM doesn't really have anything to do with vm_event, thus in this patch we relocate it into mem_paging_memop and mem_sharing_memop. This has already been the approach in mem_access_memop, so in this patch we just make it

[Xen-devel] [PATCH V4 06/13] tools/tests: Clean-up tools/tests/xen-access

2015-02-09 Thread Tamas K Lengyel
The spin-lock implementation in the xen-access test program is implemented in a fashion that is actually incomplete. The x86 assembly that guarantees that the lock is held by only one thread lacks the lock; instruction. However, the spin-lock is not actually necessary in xen-access as it is not

Re: [Xen-devel] [PATCH 4/4] libxl: More probably detect reentry of destroyed ctx

2015-02-09 Thread Ian Jackson
Wei Liu writes (Re: [PATCH 4/4] libxl: More probably detect reentry of destroyed ctx): On Mon, Feb 09, 2015 at 03:51:12PM +, Ian Jackson wrote: In libxl_ctx_free: 1. Move the GC_INIT earlier, so that we can: Acked-by: Wei Liu wei.l...@citrix.com Thanks. +

[Xen-devel] [OSSTEST PATCH 1/2] sg-report-job-history: Separate out $cond in queries

2015-02-09 Thread Ian Jackson
We are going to want to reuse this, so separate out the computation of $cond and @params. Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com --- sg-report-job-history | 15 ++- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/sg-report-job-history

[Xen-devel] [PATCH V4 04/13] xen/mem_access: Merge mem_event sanity check into mem_access check

2015-02-09 Thread Tamas K Lengyel
The current sanity check when enabling mem_event is only applicable to mem_access. Signed-off-by: Tamas K Lengyel tamas.leng...@zentific.com --- xen/common/mem_event.c | 4 xen/include/asm-x86/p2m.h | 8 +--- xen/include/public/domctl.h | 1 - 3 files changed, 1 insertion(+), 12

Re: [Xen-devel] dom0 kernel - irq nobody cared ... the continuing saga ..

2015-02-09 Thread Sander Eikelenboom
Monday, February 9, 2015, 5:36:28 PM, you wrote: On 09.02.15 at 16:18, david.vra...@citrix.com wrote: On 09/02/15 15:03, Sander Eikelenboom wrote: Hi Jan / David / Konrad, I was just testing a 3.19 kernel on my intel machine and again ran into the sporadically appearing irq nobody cared

Re: [Xen-devel] [PATCH] x86 spinlock: Fix memory corruption on completing completions

2015-02-09 Thread Linus Torvalds
On Mon, Feb 9, 2015 at 4:02 AM, Peter Zijlstra pet...@infradead.org wrote: On Mon, Feb 09, 2015 at 03:04:22PM +0530, Raghavendra K T wrote: So we have 3 choices, 1. xadd 2. continue with current approach. 3. a read before unlock and also after that. For the truly paranoid we have

Re: [Xen-devel] [PATCH] modify the IO_TLB_SEGSIZE to io_tlb_segsize configurable as flexible requirement about SW-IOMMU.

2015-02-09 Thread Wang, Xiaoming
Dear Wilk: -Original Message- From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com] Sent: Monday, February 9, 2015 11:36 PM To: Wang, Xiaoming Cc: r...@linux-mips.org; boris.ostrov...@oracle.com; david.vra...@citrix.com; linux-m...@linux-mips.org; linux-

Re: [Xen-devel] [edk2] [PATCH v3 21/27] Ovmf/Xen: add ARM and AArch64 support to XenBusDxe

2015-02-09 Thread Olivier Martin
Hi Ard, I did an implementation of BaseSynchronizationLib for ARM(32) a couple years ago. I am not sure why I have never pushed this patch upstream. Anyway, feel free to use it and push it upstream after reviewing it and adding support for AArch64. Contributed-under: TianoCore Contribution

Re: [Xen-devel] [PATCH v3 04/27] ArmVirtualizationPkg: add GICv3 detection to VirtFdtDxe

2015-02-09 Thread olimar01
The main comment I will make on this patch is to rename redistributor interface into redistributor region. The Device Tree binding actually defines the entry as 'GIC Redistributor region' or 'GIC Redistributors':

[Xen-devel] [GIT PULL] xen: features and fixes for 3.20-rc0

2015-02-09 Thread David Vrabel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git stable/for-linus-3.20-rc0-tag xen: features and fixes for 3.20-rc0 - - Reworked handling for foreign (grant mapped) pages to simplify the code,

Re: [Xen-devel] [Qemu-devel] [v2][PATCH] libxl: add one machine property to support IGD GFX passthrough

2015-02-09 Thread Ian Campbell
On Mon, 2015-02-09 at 14:28 +0800, Chen, Tiejun wrote: What about this? I've not read the code in detail,since I'm travelling but from a quick glance it looks to be implementing the sort of thing I meant, thanks. A couple of higher level comments: I'd suggest to put the code for reading the

Re: [Xen-devel] [PATCH] x86/nmi: Fix shootdown of pcpus running in VMX non-root mode

2015-02-09 Thread Tim Deegan
Hi, At 11:25 + on 09 Feb (1423477508), Andrew Cooper wrote: In the case of a crash, nmi_shootdown_cpus() patches nmi_crash() into the IDT of each processor, such that the next NMI it receives will force it into the crash path. c/s 7dd3b06ff vmx: fix handling of NMI VMEXIT fixed one

Re: [Xen-devel] question about memory allocation for driver domain

2015-02-09 Thread Oleksandr Tyshchenko
On Mon, Feb 9, 2015 at 10:31 AM, Julien Grall julien.gr...@linaro.org wrote: On 07/02/2015 01:15, Oleksandr Tyshchenko wrote: Hi Julien Hi Oleksandr, Hi Julien On Thu, Feb 5, 2015 at 6:36 PM, Oleksandr Tyshchenko Let me describe in detail about solution #3 before answer to your

Re: [Xen-devel] Guidelines for new PV protocol submission

2015-02-09 Thread Roger Pau Monné
El 05/02/15 a les 11.42, Ian Campbell ha escrit: On Tue, 2015-01-20 at 13:47 +0100, Roger Pau Monné wrote: Hello, I should probably have done this earlier because I've been aware of this issue for a long time (since I've started dealing with the PV blk protocol). The current way to describe

Re: [Xen-devel] question about memory allocation for driver domain

2015-02-09 Thread Julien Grall
On 09/02/2015 18:53, Ian Campbell wrote: On Mon, 2015-02-09 at 16:31 +0800, Julien Grall wrote: It seems logical to me that destroy/create domd in a row working fine. But this use-case is too simple :). Let's imagine we decide to start classical domains (i.e no 1:1 mapping) before creating

Re: [Xen-devel] [PATCH] x86/nmi: Fix shootdown of pcpus running in VMX non-root mode

2015-02-09 Thread Andrew Cooper
On 09/02/15 11:43, Tim Deegan wrote: Hi, At 11:25 + on 09 Feb (1423477508), Andrew Cooper wrote: In the case of a crash, nmi_shootdown_cpus() patches nmi_crash() into the IDT of each processor, such that the next NMI it receives will force it into the crash path. c/s 7dd3b06ff vmx: fix

Re: [Xen-devel] [RFC 7/7] libxl: Wait for QEMU startup in stubdomain

2015-02-09 Thread Anthony PERARD
On Mon, Feb 09, 2015 at 09:07:13AM +, Ian Campbell wrote: On Fri, 2015-02-06 at 17:23 +, Stefano Stabellini wrote: One of the main issues outstanding from when Anthony originally posted his patches is how we want to go about building this? I honestly do not know how well the

Re: [Xen-devel] Guidelines for new PV protocol submission

2015-02-09 Thread Ian Campbell
On Mon, 2015-02-09 at 12:01 +0100, Roger Pau Monné wrote: El 05/02/15 a les 11.42, Ian Campbell ha escrit: On Tue, 2015-01-20 at 13:47 +0100, Roger Pau Monné wrote: Hello, I should probably have done this earlier because I've been aware of this issue for a long time (since I've started

Re: [Xen-devel] Guidelines for new PV protocol submission

2015-02-09 Thread Vitaly Chernooky
Hi All! On Tue, Jan 20, 2015 at 2:47 PM, Roger Pau Monné roger@citrix.com wrote: Hello, I should probably have done this earlier because I've been aware of this issue for a long time (since I've started dealing with the PV blk protocol). The current way to describe PV protocols in Xen

[Xen-devel] [PATCH OSSTEST 00/12] Libvirt save, restore and migration support

2015-02-09 Thread Wei Liu
This series implements libvirt save, restore and migration test in OSSTest. The first 5 patches are used to 1. separate save / restore support from migration support; 2. introduce notion of local / remote migration support. With the above changes we lay the ground to test libvirt's save /

[Xen-devel] [PATCH OSSTEST 07/12] ts-xen-build-prep: install ebtables

2015-02-09 Thread Wei Liu
Libvirt's test suite needs it. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com --- ts-xen-build-prep | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ts-xen-build-prep b/ts-xen-build-prep index

[Xen-devel] [PATCH OSSTEST 04/12] toolstack: distinguish local and remote migration support

2015-02-09 Thread Wei Liu
Libvirt supports migrating a guest to remote host but not local host. Distinguish the concept of local migration support and remote migration support. Toolstack's migrate_check now takes an extra argument to indicate which mode we're interested in. In sg-run-job we still check for local

[Xen-devel] [PATCH OSSTEST 09/12] ts-debian-hvm-install: stub out libvirt + ovmf / rombios

2015-02-09 Thread Wei Liu
Libvirt's configuration converter doesn't know how to deal with BIOS selection. The end result is it always use the default one (seabios). Stub out ovmf and rombios to avoid false positive results. This restriction will be removed once libvirt's converter knows how to deal with BIOS selection.

[Xen-devel] [PATCH OSSTEST 08/12] ts-libvirt-build: run libvirt test suite

2015-02-09 Thread Wei Liu
We're interested in xlconfigtest. Since we're running test anyway run the whole suite. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com --- ts-libvirt-build | 23 +-- 1 file changed, 13

[Xen-devel] [PATCH OSSTEST 06/12] toolstack/libvirt: guest migrate, save and restore support

2015-02-09 Thread Wei Liu
Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com --- Osstest/Toolstack/libvirt.pm | 11 --- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/Osstest/Toolstack/libvirt.pm

[Xen-devel] [PATCH OSSTEST 05/12] sg-run-job: remove save/restore dependency on local migration support

2015-02-09 Thread Wei Liu
Since we've introduced different checks for save / restore and local migration, it's possible to run save / restore tests without running local migration tests. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com ---

[Xen-devel] [PATCH OSSTEST 03/12] osstest migrate support check catch - variables

2015-02-09 Thread Wei Liu
From: Ian Jackson ian.jack...@eu.citrix.com Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com --- sg-run-job | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/sg-run-job b/sg-run-job index 2cf810a..cc2ab3b 100755 --- a/sg-run-job +++ b/sg-run-job @@ -289,7 +289,9 @@ proc

[Xen-devel] [PATCH OSSTEST 02/12] Introduce ts-saverestore-support-check

2015-02-09 Thread Wei Liu
Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com --- ts-saverestore-support-check | 27 +++ 1 file changed, 27 insertions(+) create mode 100755 ts-saverestore-support-check diff --git

[Xen-devel] [PATCH OSSTEST 11/12] make-flight, mfi-common: rename onetoolstack to pairtoolstack

2015-02-09 Thread Wei Liu
The name onetoolstack in confusing. Currently it's in fact referring to the toolstack used to test pair migration, so rename it to pairtoolstack. No functional changes introduced. Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson

[Xen-devel] [PATCH OSSTEST 10/12] make-flight: debian hvm tests with libvirt

2015-02-09 Thread Wei Liu
Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com --- make-flight | 21 ++--- 1 file changed, 14 insertions(+), 7 deletions(-) diff --git a/make-flight b/make-flight index 8ac3a87..dabcacd 100755 ---

[Xen-devel] [PATCH] x86/nmi: Fix shootdown of pcpus running in VMX non-root mode

2015-02-09 Thread Andrew Cooper
In the case of a crash, nmi_shootdown_cpus() patches nmi_crash() into the IDT of each processor, such that the next NMI it receives will force it into the crash path. c/s 7dd3b06ff vmx: fix handling of NMI VMEXIT fixed one issue but inadvertently introduced another. The original use of

[Xen-devel] [PATCH OSSTEST 12/12] make-flight, mfi-common: create live migration test for libvirt

2015-02-09 Thread Wei Liu
Signed-off-by: Wei Liu wei.l...@citrix.com Cc: Ian Campbell ian.campb...@citrix.com Cc: Ian Jackson ian.jack...@eu.citrix.com --- make-flight | 13 +++-- mfi-common | 6 +- 2 files changed, 16 insertions(+), 3 deletions(-) diff --git a/make-flight b/make-flight index

  1   2   >