[Xen-devel] [qemu-mainline test] 50623: trouble: blocked/broken

2015-04-19 Thread osstest service user
flight 50623 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/50623/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm 3 host-install(3) broken REGR. vs.

[Xen-devel] [PATCH V3 1/6] libxl: export some functions for pvusb use

2015-04-19 Thread Chunyan Liu
Signed-off-by: Chunyan Liu cy...@suse.com Signed-off-by: Simon Cao caobosi...@gmail.com --- tools/libxl/libxl.c | 6 +++--- tools/libxl/libxl_internal.h | 5 + 2 files changed, 8 insertions(+), 3 deletions(-) diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c index

[Xen-devel] [PATCH V3 5/6] domcreate: support pvusb in configuration file

2015-04-19 Thread Chunyan Liu
Add code to support pvusb in domain config file. One could specify usbctrl and usb in domain's configuration file and create domain, then usb controllers will be created and usb device would be attached to guest automatically. One could specify usb controllers and usb devices in config file like

[Xen-devel] [PATCH V3 3/6] libxl: add pvusb API

2015-04-19 Thread Chunyan Liu
Add pvusb APIs, including: - attach/detach (create/destroy) virtual usb controller. - attach/detach usb device - list usb controller and usb devices - some other helper functions Signed-off-by: Chunyan Liu cy...@suse.com Signed-off-by: Simon Cao caobosi...@gmail.com --- Changes to v2: *

[Xen-devel] [PATCH V3 0/6] libxl pvusb toolstack work

2015-04-19 Thread Chunyan Liu
This patch series is to add pvusb toolstack work, supporting hot add|remove USB device to|from guest and specify USB device in domain configuration file. 1/6~5/6 implement clean pvusb work. 6/6 is an independent patch to refactor codes for merging QEMU emulated USB code later. 1/6 is to export

[Xen-devel] [PATCH V3 2/6] libxl_read_file_contents: fix reading sysfs file

2015-04-19 Thread Chunyan Liu
Sysfs file has size=4096 but actual file content is less than that. Current libxl_read_file_contents will treat it as error when file size and actual file content differs, so reading sysfs file content with this function always fails. Fix it so that we can reuse this function to get sysfs file

[Xen-devel] [rumpuserxen test] 50441: regressions - trouble: blocked/broken/fail/pass

2015-04-19 Thread osstest service user
flight 50441 rumpuserxen real [real] http://logs.test-lab.xenproject.org/osstest/logs/50441/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i386-rumpuserxen3 host-install(3) broken REGR. vs. 33866

[Xen-devel] [seabios test] 50478: trouble: blocked/broken

2015-04-19 Thread osstest service user
flight 50478 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/50478/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-i3863 host-install(3) broken REGR. vs. 36656

[Xen-devel] [linux-3.10 test] 50433: tolerable trouble: broken/fail/pass - PUSHED

2015-04-19 Thread osstest service user
flight 50433 linux-3.10 real [real] http://logs.test-lab.xenproject.org/osstest/logs/50433/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-xl-xsm3 host-install(3) broken pass in 50411 test-amd64-i386-xl-qemut-winxpsp3

[Xen-devel] [qemu-mainline test] 50651: trouble: blocked/broken

2015-04-19 Thread osstest service user
flight 50651 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/50651/ Failures and problems with tests :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-xsm 3 host-install(3) broken REGR. vs.

[Xen-devel] [Patch V3 01/15] xen: sync with xen headers

2015-04-19 Thread Juergen Gross
Use the newest headers from the xen tree to get some new structure layouts. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com --- arch/x86/include/asm/xen/interface.h | 96 include/xen/interface/xen.h | 10

[Xen-devel] [Patch V3 04/15] xen: eliminate scalability issues from initial mapping setup

2015-04-19 Thread Juergen Gross
Direct Xen to place the initial P-M table outside of the initial mapping, as otherwise the 1G (implementation) / 2G (theoretical) restriction on the size of the initial mapping limits the amount of memory a domain can be handed initially. As the initial P-M table is copied rather early during

[Xen-devel] [Patch V3 10/15] xen: check pre-allocated page tables for conflict with memory map

2015-04-19 Thread Juergen Gross
Check whether the page tables built by the domain builder are at memory addresses which are in conflict with the target memory map. If this is the case just panic instead of running into problems later. Signed-off-by: Juergen Gross jgr...@suse.com --- arch/x86/xen/mmu.c | 19

[Xen-devel] [Patch V3 02/15] xen: save linear p2m list address in shared info structure

2015-04-19 Thread Juergen Gross
The virtual address of the linear p2m list should be stored in the shared info structure read by the Xen tools to be able to support 64 bit pv-domains larger than 512 GB. Additionally the linear p2m list interface includes a generation count which is changed prior to and after each mapping change

[Xen-devel] [Patch V3 07/15] xen: check memory area against e820 map

2015-04-19 Thread Juergen Gross
Provide a service routine to check a physical memory area against the E820 map. The routine will return false if the complete area is RAM according to the E820 map and true otherwise. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com ---

[Xen-devel] [Patch V3 15/15] xen: remove no longer needed p2m.h

2015-04-19 Thread Juergen Gross
Cleanup by removing arch/x86/xen/p2m.h as it isn't needed any more. Most definitions in this file are used in p2m.c only. Move those into p2m.c. set_phys_range_identity() is already declared in arch/x86/include/asm/xen/page.h, add __init annotation there. MAX_REMAP_RANGES isn't used at all,

[Xen-devel] [Patch V3 12/15] mm: provide early_memremap_ro to establish read-only mapping

2015-04-19 Thread Juergen Gross
During early boot as Xen pv domain the kernel needs to map some page tables supplied by the hypervisor read only. This is needed to be able to relocate some data structures conflicting with the physical memory map especially on systems with huge RAM (above 512GB). Provide the function

[Xen-devel] [Patch V3 14/15] xen: allow more than 512 GB of RAM for 64 bit pv-domains

2015-04-19 Thread Juergen Gross
64 bit pv-domains under Xen are limited to 512 GB of RAM today. The main reason has been the 3 level p2m tree, which was replaced by the virtual mapped linear p2m list. Parallel to the p2m list which is being used by the kernel itself there is a 3 level mfn tree for usage by the Xen tools and

[Xen-devel] [Patch V3 05/15] xen: move static e820 map to global scope

2015-04-19 Thread Juergen Gross
Instead of using a function local static e820 map in xen_memory_setup() and calling various functions in the same source with the map as a parameter use a map directly accessible by all functions in the source. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel

Re: [Xen-devel] [PATCH V3 3/6] libxl: add pvusb API

2015-04-19 Thread Juergen Gross
On 04/19/2015 05:50 AM, Chunyan Liu wrote: Add pvusb APIs, including: - attach/detach (create/destroy) virtual usb controller. - attach/detach usb device - list usb controller and usb devices - some other helper functions Signed-off-by: Chunyan Liu cy...@suse.com Signed-off-by: Simon

[Xen-devel] [Patch V3 08/15] xen: find unused contiguous memory area

2015-04-19 Thread Juergen Gross
For being able to relocate pre-allocated data areas like initrd or p2m list it is mandatory to find a contiguous memory area which is not yet in use and doesn't conflict with the memory map we want to be in effect. In case such an area is found reserve it at once as this will be required to be

[Xen-devel] [Patch V3 03/15] xen: don't build mfn tree if tools don't need it

2015-04-19 Thread Juergen Gross
In case the Xen tools indicate they don't need the p2m 3 level tree as they support the virtual mapped linear p2m list, just omit building the tree. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com --- arch/x86/xen/p2m.c | 10 +++--- 1 file

[Xen-devel] [Patch V3 11/15] xen: check for initrd conflicting with e820 map

2015-04-19 Thread Juergen Gross
Check whether the initrd is placed at a location which is conflicting with the target E820 map. If this is the case relocate it to a new area unused up to now and compliant to the E820 map. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David Vrabel david.vra...@citrix.com ---

[Xen-devel] [Patch V3 06/15] xen: split counting of extra memory pages from remapping

2015-04-19 Thread Juergen Gross
Memory pages in the initial memory setup done by the Xen hypervisor conflicting with the target E820 map are remapped. In order to do this those pages are counted and remapped in xen_set_identity_and_remap(). Split the counting from the remapping operation to be able to setup the needed memory

[Xen-devel] [Patch V3 00/15] xen: support pv-domains larger than 512GB

2015-04-19 Thread Juergen Gross
Support 64 bit pv-domains with more than 512GB of memory. Tested with 64 bit dom0 on machines with 8GB and 1TB and 32 bit dom0 on a 8GB machine. Conflicts between E820 map and different hypervisor populated memory areas have been tested via a fake E820 map reserved area on the 8GB machine.

[Xen-devel] [Patch V3 09/15] xen: check for kernel memory conflicting with memory layout

2015-04-19 Thread Juergen Gross
Checks whether the pre-allocated memory of the loaded kernel is in conflict with the target memory map. If this is the case, just panic instead of run into problems later, as there is nothing we can do to repair this situation. Signed-off-by: Juergen Gross jgr...@suse.com Reviewed-by: David

[Xen-devel] [Patch V3 13/15] xen: move p2m list if conflicting with e820 map

2015-04-19 Thread Juergen Gross
Check whether the hypervisor supplied p2m list is placed at a location which is conflicting with the target E820 map. If this is the case relocate it to a new area unused up to now and compliant to the E820 map. As the p2m list might by huge (up to several GB) and is required to be mapped