Re: [Xen-devel] [RFC PATCH] xen/x86: Increase xen_e820_map to E820_X_MAX possible entries

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 08:36, wrote: > On 15/11/16 08:15, Jan Beulich wrote: > On 15.11.16 at 07:33, wrote: >>> On 15/11/16 01:11, Alex Thorlton wrote: Hey everyone, We're having problems with large systems hitting a BUG in xen_memory_setup, due to extra e820 entries created i

Re: [Xen-devel] [PATCH 1/2] tools/libacpi: Re-licence remaining GPL code to LGPLv2.1

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 05:52, wrote: > We now have permission from Lenovo to relicense commit 801d469ad8b2 > ("[HVM] ACPI support patch 3 of 4: ACPI _PRT table") to LGPLv2.1 > > This essentially means reverting commits c3397311a658 ("acpi: Prevent > GPL-only code from seeping into non-GPL binaries")

Re: [Xen-devel] [PATCH 2/2] libacpi: Be specific about which DSDT files to build

2016-11-15 Thread Jan Beulich
> @@ -119,7 +119,7 @@ endif > clean: subdirs-clean > rm -f roms.inc roms.inc.new acpi.h > rm -f hvmloader hvmloader.tmp *.o $(DEPS) > - $(MAKE) -C $(ACPI_PATH) ACPI_BUILD_DIR=$(CURDIR) clean > + $(MAKE) -C $(ACPI_PATH) ACPI_BUILD_DIR=$(CURDIR) > DSDT_FILES="$(DSDT_FILES)"

[Xen-devel] [libvirt test] 102251: tolerable all pass - PUSHED

2016-11-15 Thread osstest service owner
flight 102251 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/102251/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 102144 test-armhf-armhf-libvirt-qcow2 1

Re: [Xen-devel] [PATCH v2 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > This domctl is called when a VCPU is hot-(un)plugged to a guest (via > 'xl vcpu-set'). While this currently is only intended to be needed by > PVH guests we will call this domctl for all (x86) guests for consistency. The discussion on the actual change seems to

Re: [Xen-devel] [RFC PATCH] xen/x86: Increase xen_e820_map to E820_X_MAX possible entries

2016-11-15 Thread Juergen Gross
On 15/11/16 09:01, Jan Beulich wrote: On 15.11.16 at 08:36, wrote: >> On 15/11/16 08:15, Jan Beulich wrote: >> On 15.11.16 at 07:33, wrote: On 15/11/16 01:11, Alex Thorlton wrote: > Hey everyone, > > We're having problems with large systems hitting a BUG in > xen_mem

Re: [Xen-devel] [PATCH v2 02/11] acpi: Define ACPI IO registers for PVH guests

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > @@ -244,7 +245,8 @@ int main(int argc, char **argv) > #endif > > /* Operation Region 'PRST': bitmask of online CPUs. */ > -stmt("OperationRegion", "PRST, SystemIO, 0xaf00, 32"); > +stmt("OperationRegion", "PRST, SystemIO, 0x%x, %d", %#x > --- a/

Re: [Xen-devel] [PATCH v2 04/11] acpi: Make pmtimer optional in FADT

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > PM timer is not supported by PVH guests. > > Signed-off-by: Boris Ostrovsky > Reviewed-by: Konrad Rzeszutek Wilk Acked-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-

Re: [Xen-devel] [PATCH v2 05/11] acpi: Power and Sleep ACPI buttons are not emulated for PVH guests

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > Signed-off-by: Boris Ostrovsky Acked-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel

Re: [Xen-devel] [PATCH v2 06/11] acpi: PVH guests need _E02 method

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > This is the method that will get invoked on an SCI. > > Signed-off-by: Boris Ostrovsky > Reviewed-by: Andrew Cooper Acked-by: Jan Beulich ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/x

Re: [Xen-devel] [PATCH v2 07/11] pvh/ioreq: Install handlers for ACPI-related PVH IO accesses

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > --- a/xen/arch/x86/hvm/ioreq.c > +++ b/xen/arch/x86/hvm/ioreq.c > @@ -1380,6 +1380,12 @@ static int hvm_access_cf8( > return X86EMUL_UNHANDLEABLE; > } > > +static int acpi_ioaccess( > +int dir, unsigned int port, unsigned int bytes, uint32_t *val) > +

Re: [Xen-devel] [PATCH v2 08/11] pvh/acpi: Handle ACPI accesses for PVH guests

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > --- a/xen/arch/x86/hvm/ioreq.c > +++ b/xen/arch/x86/hvm/ioreq.c > @@ -1383,6 +1383,78 @@ static int hvm_access_cf8(static int acpi_ioaccess( > int dir, unsigned int port, unsigned int bytes, uint32_t *val) > { > +unsigned int i; > +unsigned int bits

Re: [Xen-devel] [PATCH v2 09/11] events/x86: Define SCI virtual interrupt

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > --- a/xen/include/asm-x86/event.h > +++ b/xen/include/asm-x86/event.h > @@ -38,9 +38,10 @@ static inline void local_event_delivery_enable(void) > vcpu_info(current, evtchn_upcall_mask) = 0; > } > > -/* No arch specific virq definition now. Default to glob

Re: [Xen-devel] [PATCH v1 1/2] xen/kexec: Find out whether an kexec type is loaded.

2016-11-15 Thread Daniel Kiper
On Mon, Nov 14, 2016 at 05:12:52PM -0500, Konrad Rzeszutek Wilk wrote: > The tools that use kexec are asynchronous in nature and do > not keep state changes. As such provide an hypercall to find > out whether an image has been loaded for either type. > > Note: No need to modify XSM as it has one si

Re: [Xen-devel] [PATCH v2 10/11] pvh: Send an SCI on VCPU hotplug event

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > --- a/xen/arch/x86/domctl.c > +++ b/xen/arch/x86/domctl.c > @@ -1443,6 +1443,18 @@ long arch_do_domctl( > break; > > d->arch.avail_vcpus = num; > + > +/* > + * For PVH guests we need to send an SCI and set enable/status > +

[Xen-devel] [ovmf baseline-only test] 68040: all pass

2016-11-15 Thread Platform Team regression test user
This run is configured for baseline tests only. flight 68040 ovmf real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68040/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf c37dcee6d8c24cff4c50fa5dd139e5a26678eb62 baseline v

Re: [Xen-devel] [PATCH v2 10/11] pvh: Send an SCI on VCPU hotplug event

2016-11-15 Thread Jan Beulich
>>> On 09.11.16 at 15:39, wrote: > --- a/xen/arch/x86/domctl.c > +++ b/xen/arch/x86/domctl.c > @@ -1443,6 +1443,18 @@ long arch_do_domctl( > break; > > d->arch.avail_vcpus = num; > + > +/* > + * For PVH guests we need to send an SCI and set enable/status > +

Re: [Xen-devel] [RFC PATCH] xen/x86: Increase xen_e820_map to E820_X_MAX possible entries

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 09:42, wrote: > On 15/11/16 09:01, Jan Beulich wrote: > On 15.11.16 at 08:36, wrote: >>> On 15/11/16 08:15, Jan Beulich wrote: >>> On 15.11.16 at 07:33, wrote: > In case I'm right the Xen hypervisor should be prepared for a larger > e820 map, but this won't hel

[Xen-devel] [xen-unstable test] 102243: tolerable FAIL - PUSHED

2016-11-15 Thread osstest service owner
flight 102243 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/102243/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-libvirt 15 guest-start/debian.repeat fail in 102223 pass in 102243 test-armhf-armhf-xl-vhd

[Xen-devel] [ovmf test] 102256: all pass - PUSHED

2016-11-15 Thread osstest service owner
flight 102256 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/102256/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 0ab475c9a1d551a919430f3b6df6f652e4d2a3ed baseline version: ovmf 7c7453b5d6302227264b0

Re: [Xen-devel] [RFC PATCH] xen/x86: Increase xen_e820_map to E820_X_MAX possible entries

2016-11-15 Thread Juergen Gross
On 15/11/16 10:45, Jan Beulich wrote: On 15.11.16 at 09:42, wrote: >> On 15/11/16 09:01, Jan Beulich wrote: >> On 15.11.16 at 08:36, wrote: On 15/11/16 08:15, Jan Beulich wrote: On 15.11.16 at 07:33, wrote: >> In case I'm right the Xen hypervisor should be prepared for

Re: [Xen-devel] Xen like VirtualBox

2016-11-15 Thread Paul Durrant
> -Original Message- > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of > Jason Long > Sent: 15 November 2016 06:01 > To: Dario Faggioli ; Xen-devel@lists.xen.org > Subject: Re: [Xen-devel] Xen like VirtualBox > > I see you are a Citrix Employee and you and your cowork

Re: [Xen-devel] [PATCH for-4.8 1/2] x86/vmx: Correct the long mode check in vmx_cpuid_intercept()

2016-11-15 Thread Wei Liu
On Mon, Nov 14, 2016 at 11:01:25AM +, Andrew Cooper wrote: > %cs.L may be set in a legacy mode segment, or clear in a compatibility mode > segment; it is not the correct way to check for long mode being active. > > Both of these situations result in incorrect visibility of the SYSCALL feature

Re: [Xen-devel] [GIT PULL v2 0/5] cpu_relax: drop lowlatency, introduce yield

2016-11-15 Thread Christian Borntraeger
On 10/25/2016 11:03 AM, Christian Borntraeger wrote: > Peter, > > here is v2 with some improved patch descriptions and some fixes. The > previous version has survived one day of linux-next and I only changed > small parts. > So unless there is some other issue, feel free to pull (or to apply > the

[Xen-devel] [PATCH 24/35] libxl/libxl_no_colo.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_no_colo.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/libxl/libxl_no_colo.c b/tools/libxl/libxl_no_colo.c index 15

[Xen-devel] [PATCH 09/35] libxl/libxl_colo_proxy.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_colo_proxy.c | 24 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/tools/libxl/libxl_colo_proxy.c b/tools/l

[Xen-devel] [PATCH 12/35] libxl/libxl_colo_save.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_colo_save.c | 49 ++- 1 file changed, 25 insertions(+), 24 deletions(-) diff --git a/tools/libxl/libxl_colo

[Xen-devel] [PATCH 33/35] libxl/libxl_vtpm.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_vtpm.c | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tools/libxl/libxl_vtpm.c b/tools/libxl/libxl_vtpm.c index 8588569

[Xen-devel] [PATCH 27/35] libxl/libxl_pvusb.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_usb.c | 57 ++--- 1 file changed, 30 insertions(+), 27 deletions(-) diff --git a/tools/libxl/libxl_usb.

[Xen-devel] [PATCH 19/35] libxl/libxl_internal.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_internal.c | 29 ++--- 1 file changed, 14 insertions(+), 15 deletions(-) diff --git a/tools/libxl/libxl_internal.c b/tools/

[Xen-devel] [PATCH 13/35] libxl/libxl_create.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_create.c | 119 +++-- 1 file changed, 60 insertions(+), 59 deletions(-) diff --git a/tools/libxl/libxl_crea

[Xen-devel] [PATCH 08/35] libxl/libxl_colo_nic.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_colo_nic.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/libxl/libxl_colo_nic.c b/tools/libxl/libxl_colo_nic.c index 5e0

[Xen-devel] [PATCH 34/35] libxl/libxl_x86.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_x86.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/tools/libxl/libxl_x86.c b/tools/libxl/libxl_x86.c index e1844c8..5da

[Xen-devel] [PATCH 15/35] libxl/libxl_dm.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_dm.c | 111 ++--- 1 file changed, 59 insertions(+), 52 deletions(-) diff --git a/tools/libxl/libxl_dm.c

[Xen-devel] [PATCH 06/35] libxl/libxl_checkpoint_device.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_checkpoint_device.c | 14 +++--- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/tools/libxl/libxl_checkpoint_device.c b/tool

[Xen-devel] [PATCH 17/35] libxl/libxl_dom_suspend.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_dom_suspend.c | 45 - 1 file changed, 22 insertions(+), 23 deletions(-) diff --git a/tools/libxl/libxl_dom_

[Xen-devel] [PATCH 07/35] libxl/libxl_colo.h: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_colo.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/libxl/libxl_colo.h b/tools/libxl/libxl_colo.h index f0e438e..682275

[Xen-devel] [PATCH 26/35] libxl/libxl_psr.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_psr.c | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/tools/libxl/libxl_psr.c b/tools/libxl/libxl_psr.c index 78618

[Xen-devel] [PATCH 29/35] libxl/libxl_remus.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_remus.c | 27 ++- 1 file changed, 14 insertions(+), 13 deletions(-) diff --git a/tools/libxl/libxl_remus.c b/tools/libxl/li

[Xen-devel] [PATCH 22/35] libxl/libxl_netbuffer.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_netbuffer.c | 43 --- 1 file changed, 24 insertions(+), 19 deletions(-) diff --git a/tools/libxl/libxl_netb

[Xen-devel] [PATCH 11/35] libxl/libxl_colo_restore.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_colo_restore.c | 57 1 file changed, 28 insertions(+), 29 deletions(-) diff --git a/tools/libxl/libxl_colo

[Xen-devel] [PATCH 31/35] libxl/libxl_stream_write.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_stream_write.c | 10 +- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/tools/libxl/libxl_stream_write.c b/tools/libxl/libxl_s

[Xen-devel] [PATCH 04/35] libxl.c: switch to LOG*D use

2016-11-15 Thread Cédric Bosdonnat
Use LOG*D functions to output the domain ID in logs as much as possible. This will help consumer code sorting the logs by domain. This commit includes all LOG* to LOG*D changes where the domain ID is not just a domid variable. We want the domain ID provided to the LOG*D functions to be the one of

[Xen-devel] [PATCH 03/35] libxl.c: switch to LOG*D use (refactored messages)

2016-11-15 Thread Cédric Bosdonnat
Use LOG*D functions to output the domain ID in logs as much as possible. This will help consumer code sorting the logs by domain. This commit changes LOG*() into LOG*D(), adds a domid parameter and messages has been altered to remove the domain id from it since it is already contained in the outpu

[Xen-devel] [PATCH 35/35] libxl/libxl_xshelp.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_xshelp.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/libxl/libxl_xshelp.c b/tools/libxl/libxl_xshelp.c index b3bac

[Xen-devel] [PATCH 16/35] libxl/libxl_dom_save.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_dom_save.c | 29 +++-- 1 file changed, 15 insertions(+), 14 deletions(-) diff --git a/tools/libxl/libxl_dom_save.c b/tools/

[Xen-devel] [PATCH 05/35] libxl/libxl_bootloader.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D functions to output the domain ID in logs as much as possible. This will help consumer code sorting the logs by domain. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_bootloader.c | 84 -- 1 file changed, 49 insert

[Xen-devel] [PATCH 25/35] libxl/libxl_pci.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_pci.c | 153 +--- 1 file changed, 79 insertions(+), 74 deletions(-) diff --git a/tools/libxl/libxl_pci.

[Xen-devel] [PATCH 01/35] libxl: add LIBXL_LOGD_* and LOG*D function families.

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat These functions should be used to log messages when the domain id is known. libxl__log will now prepend the log message by "Domain %PRIu32:" if the domain id is a valid one. This aims at helping consumers filter logs on domain IDs. Signed-off-by: Cédric Bosdonnat --- to

[Xen-devel] [PATCH 30/35] libxl/libxl_save_callout.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_save_callout.c | 8 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/tools/libxl/libxl_save_callout.c b/tools/libxl/libxl_save

[Xen-devel] [PATCH 02/35] libxl.c: switch to LOG*D use

2016-11-15 Thread Cédric Bosdonnat
Use LOG*D functions to output the domain ID in logs as much as possible. This will help consumer code sorting the logs by domain. This commit, only changes LOG*() into LOG*D() and adds a domid parameter. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl.c | 302 ++---

[Xen-devel] [PATCH 14/35] libxl/libxl_device.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_device.c | 70 -- 1 file changed, 37 insertions(+), 33 deletions(-) diff --git a/tools/libxl/libxl_devi

[Xen-devel] [PATCH 23/35] libxl/libxl_nic.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_nic.c | 9 + 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/tools/libxl/libxl_nic.c b/tools/libxl/libxl_nic.c index 220a028..

[Xen-devel] [PATCH 18/35] libxl/libxl_freebsd.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_freebsd.c | 8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/tools/libxl/libxl_freebsd.c b/tools/libxl/libxl_freebsd.c inde

[Xen-devel] [PATCH 00/35] libxl LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
Hi all, This patch series adds a LOG*D family matching the existing LOG* one, but with one more parameter for the domain ID. Using this new family will allow the libxl-based applications to sort log entries by domain ID. For example a typical use case of this is the libvirt libxl driver: it shoul

[Xen-devel] [PATCH 20/35] libxl/libxl_linux.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_linux.c | 23 ++- 1 file changed, 14 insertions(+), 9 deletions(-) diff --git a/tools/libxl/libxl_linux.c b/tools/libxl/libxl_l

[Xen-devel] [PATCH 10/35] libxl/libxl_colo_qdisk.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_colo_qdisk.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/libxl/libxl_colo_qdisk.c b/tools/libxl/libxl_colo_qdisk.c ind

[Xen-devel] [PATCH 21/35] libxl/libxl_netbsd.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_netbsd.c | 9 ++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/tools/libxl/libxl_netbsd.c b/tools/libxl/libxl_netbsd.c index

[Xen-devel] [PATCH 28/35] libxl/libxl_qmp.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_qmp.c | 56 - 1 file changed, 28 insertions(+), 28 deletions(-) diff --git a/tools/libxl/libxl_qmp.

[Xen-devel] [PATCH 32/35] libxl/libxl_vnuma.c: used LOG*D functions

2016-11-15 Thread Cédric Bosdonnat
From: Cédric Bosdonnat Use LOG*D logging functions where possible instead of the LOG* ones. Signed-off-by: Cédric Bosdonnat --- tools/libxl/libxl_vnuma.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/libxl/libxl_vnuma.c b/tools/libxl/libxl_vnuma.c index db22799..8ec

Re: [Xen-devel] [PATCH] x86: re-add stack alignment check

2016-11-15 Thread Andrew Cooper
On 14/11/16 16:54, Jan Beulich wrote: On 14.11.16 at 17:38, wrote: >> On 14/11/16 15:02, Jan Beulich wrote: >> On 14.11.16 at 15:38, wrote: On 14/11/16 14:24, Jan Beulich wrote: On 14.11.16 at 14:45, wrote: >> On 14/11/16 13:25, Jan Beulich wrote: >>> --- a/xen/arc

Re: [Xen-devel] Xen like VirtualBox

2016-11-15 Thread John Haxby
On 14/11/16 14:05, Jason Long wrote: > Thank you but the problem is that "virt-manager" is for Redhat and Redhat > don't like Xen anymore because of KVM. Another problem is that a program like > VirtualBox has a nice GUI but virt-manager not. virt-manager is also available for Fedora and Fedora

Re: [Xen-devel] [RFC PATCH] xen/x86: Increase xen_e820_map to E820_X_MAX possible entries

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 10:55, wrote: > On 15/11/16 10:45, Jan Beulich wrote: > On 15.11.16 at 09:42, wrote: >>> For a fully dynamical solution we'd need a way to get a partial >>> E820 map from the hypervisor (e.g. first 128 entries) in order to >>> be able to setup at least some memory and later

Re: [Xen-devel] [PATCH] x86: re-add stack alignment check

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 11:26, wrote: > On 14/11/16 16:54, Jan Beulich wrote: > On 14.11.16 at 17:38, wrote: >>> On 14/11/16 15:02, Jan Beulich wrote: >>> On 14.11.16 at 15:38, wrote: > On 14/11/16 14:24, Jan Beulich wrote: > On 14.11.16 at 14:45, wrote: >>> On 14/11/16 13:25

Re: [Xen-devel] [PATCH v1 1/2] xen/kexec: Find out whether an kexec type is loaded.

2016-11-15 Thread David Vrabel
On 14/11/16 22:12, Konrad Rzeszutek Wilk wrote: > The tools that use kexec are asynchronous in nature and do > not keep state changes. As such provide an hypercall to find > out whether an image has been loaded for either type. > > Note: No need to modify XSM as it has one size fits all > check an

Re: [Xen-devel] [RFC PATCH] xen/x86: Increase xen_e820_map to E820_X_MAX possible entries

2016-11-15 Thread Juergen Gross
On 15/11/16 11:44, Jan Beulich wrote: On 15.11.16 at 10:55, wrote: >> On 15/11/16 10:45, Jan Beulich wrote: >> On 15.11.16 at 09:42, wrote: For a fully dynamical solution we'd need a way to get a partial E820 map from the hypervisor (e.g. first 128 entries) in order to be

Re: [Xen-devel] [RFC PATCH] xen/x86: Increase xen_e820_map to E820_X_MAX possible entries

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 12:07, wrote: > On 15/11/16 11:44, Jan Beulich wrote: > On 15.11.16 at 10:55, wrote: >>> On 15/11/16 10:45, Jan Beulich wrote: >>> On 15.11.16 at 09:42, wrote: > For a fully dynamical solution we'd need a way to get a partial > E820 map from the hypervisor (e.g

Re: [Xen-devel] [RFC PATCH KERNEL 0/4] x86/xen: untangle PV and PVHVM guest support code

2016-11-15 Thread Vitaly Kuznetsov
Boris Ostrovsky writes: > On 11/14/2016 01:21 PM, David Vrabel wrote: >> On 14/11/16 17:17, Vitaly Kuznetsov wrote: >>> Hi, >>> >>> I have a long-standing idea to separate PV and PVHVM code in kernel and >>> introduce Kconfig options to make it possible to enable the required >>> parts only brea

Re: [Xen-devel] Xen like VirtualBox

2016-11-15 Thread Jason Long
I'm working with XenServer too and XenServer is not a complete Linux and you can't work it well like Linux. You can Install Xen on your Linux and doing Virtualization and your daily work with Linux. On Tuesday, November 15, 2016 1:30 PM, Paul Durrant wrote: > -Original Message- > Fro

Re: [Xen-devel] Xen like VirtualBox

2016-11-15 Thread Jason Long
You said a Red Hat employee and this company like KVM not Xen. On Tuesday, November 15, 2016 2:16 PM, John Haxby wrote: On 14/11/16 14:05, Jason Long wrote: > Thank you but the problem is that "virt-manager" is for Redhat and Redhat > don't like Xen anymore because of KVM. Another problem is t

Re: [Xen-devel] [RFC PATCH KERNEL 1/4] x86/xen: start untangling PV and PVHVM guest support code

2016-11-15 Thread David Vrabel
On 14/11/16 17:17, Vitaly Kuznetsov wrote: > Introduce CONFIG_XEN_PV config option and split enlighten.c into > 3 files. Temporary add #ifdef CONFIG_XEN_PV to smp.c and mmu.c to > not break the build and not make the patch even bigger. > > xen_cpu_up_prepare*/xen_cpu_die hooks require separation t

Re: [Xen-devel] [RFC PATCH 02/24] ARM: GICv3: allocate LPI pending and property table

2016-11-15 Thread Andre Przywara
Hi Julien, On 01/11/16 17:22, Julien Grall wrote: > Hi Andre, > > On 28/09/2016 19:24, Andre Przywara wrote: >> The ARM GICv3 ITS provides a new kind of interrupt called LPIs. >> The pending bits and the configuration data (priority, enable bits) for >> those LPIs are stored in tables in normal m

[Xen-devel] [qemu-mainline test] 102248: regressions - FAIL

2016-11-15 Thread osstest service owner
flight 102248 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/102248/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow2 9 debian-di-installfail REGR. vs. 101909 test-amd64-amd64-

Re: [Xen-devel] Xen like VirtualBox

2016-11-15 Thread John Haxby
On 15/11/16 11:17, Jason Long wrote: > You said a Red Hat employee and this company like KVM not Xen. That makes no sense. You're denying what it says on the virt-manager.org web site as well as denying what it says in the description of the RPM. Even the Red Hat RPM for virt-manager says that

Re: [Xen-devel] [RFC PATCH KERNEL 1/4] x86/xen: start untangling PV and PVHVM guest support code

2016-11-15 Thread Vitaly Kuznetsov
David Vrabel writes: > On 14/11/16 17:17, Vitaly Kuznetsov wrote: >> Introduce CONFIG_XEN_PV config option and split enlighten.c into >> 3 files. Temporary add #ifdef CONFIG_XEN_PV to smp.c and mmu.c to >> not break the build and not make the patch even bigger. >> >> xen_cpu_up_prepare*/xen_cpu_

Re: [Xen-devel] [GIT PULL v2 1/5] processor.h: introduce cpu_relax_yield

2016-11-15 Thread Russell King - ARM Linux
On Tue, Oct 25, 2016 at 11:03:11AM +0200, Christian Borntraeger wrote: > For spinning loops people do often use barrier() or cpu_relax(). > For most architectures cpu_relax and barrier are the same, but on > some architectures cpu_relax can add some latency. > For example on power,sparc64 and arc,

Re: [Xen-devel] [GIT PULL v2 1/5] processor.h: introduce cpu_relax_yield

2016-11-15 Thread Christian Borntraeger
On 11/15/2016 01:30 PM, Russell King - ARM Linux wrote: > On Tue, Oct 25, 2016 at 11:03:11AM +0200, Christian Borntraeger wrote: >> For spinning loops people do often use barrier() or cpu_relax(). >> For most architectures cpu_relax and barrier are the same, but on >> some architectures cpu_relax c

Re: [Xen-devel] [PATCH 2/2] libacpi: Be specific about which DSDT files to build

2016-11-15 Thread Boris Ostrovsky
On 11/15/2016 01:17 AM, Wei Liu wrote: > On Mon, Nov 14, 2016 at 11:52:27PM -0500, Boris Ostrovsky wrote: >> There is no reason to build, for example, dsdt_pvh.asl for hvmloader. We >> pass which DSDTs to build via DSDT_FILES parameter. >> >> If DSDT_FILES is empty all DSDTs for a particular archit

Re: [Xen-devel] [GIT PULL v2 1/5] processor.h: introduce cpu_relax_yield

2016-11-15 Thread Russell King - ARM Linux
On Tue, Nov 15, 2016 at 02:19:53PM +0100, Christian Borntraeger wrote: > On 11/15/2016 01:30 PM, Russell King - ARM Linux wrote: > > On Tue, Oct 25, 2016 at 11:03:11AM +0200, Christian Borntraeger wrote: > >> For spinning loops people do often use barrier() or cpu_relax(). > >> For most architectur

Re: [Xen-devel] [PATCH 2/2] libacpi: Be specific about which DSDT files to build

2016-11-15 Thread Andrew Cooper
On 15/11/16 13:35, Boris Ostrovsky wrote: > On 11/15/2016 01:17 AM, Wei Liu wrote: >> On Mon, Nov 14, 2016 at 11:52:27PM -0500, Boris Ostrovsky wrote: >>> There is no reason to build, for example, dsdt_pvh.asl for hvmloader. We >>> pass which DSDTs to build via DSDT_FILES parameter. >>> >>> If DSDT

Re: [Xen-devel] [GIT PULL v2 1/5] processor.h: introduce cpu_relax_yield

2016-11-15 Thread Christian Borntraeger
On 11/15/2016 02:37 PM, Russell King - ARM Linux wrote: > On Tue, Nov 15, 2016 at 02:19:53PM +0100, Christian Borntraeger wrote: >> On 11/15/2016 01:30 PM, Russell King - ARM Linux wrote: >>> On Tue, Oct 25, 2016 at 11:03:11AM +0200, Christian Borntraeger wrote: For spinning loops people do of

[Xen-devel] [distros-debian-snapshot test] 68041: tolerable FAIL

2016-11-15 Thread Platform Team regression test user
flight 68041 distros-debian-snapshot real [real] http://osstest.xs.citrite.net/~osstest/testlogs/logs/68041/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-armhf-armhf-armhf-daily-netboot-pygrub 9 debian-di-install fail like 68013 test-amd64-am

Re: [Xen-devel] Xen like VirtualBox

2016-11-15 Thread Jason Long
Thank you but I guess it is serious for Xen. Are you Sure Red Hat company help Xen? I guess you wrong. Red Hat employee not mean Red Hat company and they can help other Open Source projects as hobbyist. I guess some Citrix guys help KVM as hobbyist too. When you read Virtualization books then al

Re: [Xen-devel] Xen like VirtualBox

2016-11-15 Thread George Dunlap
On Tue, Nov 15, 2016 at 11:54 AM, John Haxby wrote: > On 15/11/16 11:17, Jason Long wrote: >> You said a Red Hat employee and this company like KVM not Xen. > > That makes no sense. You're denying what it says on the > virt-manager.org web site as well as denying what it says in the > description

Re: [Xen-devel] [PATCH Altp2m cleanup 2/3 v12 1/3] Move altp2m specific functions to altp2m files.

2016-11-15 Thread Jan Beulich
>>> On 11.11.16 at 00:45, wrote: > @@ -66,6 +67,60 @@ altp2m_vcpu_destroy(struct vcpu *v) > } > > /* > + * allocate and initialize memory for altp2m portion of domain > + * > + * returns < 0 on error > + * returns 0 on no operation & success > + */ > +int > +altp2m_domain_init(struct domain

Re: [Xen-devel] [PATCH 2/2] libacpi: Be specific about which DSDT files to build

2016-11-15 Thread Lars Kurth
On 15/11/2016 13:45, "Andrew Cooper" wrote: >On 15/11/16 13:35, Boris Ostrovsky wrote: >> On 11/15/2016 01:17 AM, Wei Liu wrote: >>> On Mon, Nov 14, 2016 at 11:52:27PM -0500, Boris Ostrovsky wrote: There is no reason to build, for example, dsdt_pvh.asl for hvmloader. We pass which

Re: [Xen-devel] [PATCH v2 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-15 Thread Boris Ostrovsky
On 11/15/2016 03:34 AM, Jan Beulich wrote: On 09.11.16 at 15:39, wrote: >> This domctl is called when a VCPU is hot-(un)plugged to a guest (via >> 'xl vcpu-set'). While this currently is only intended to be needed by >> PVH guests we will call this domctl for all (x86) guests for consistency.

[Xen-devel] [ovmf test] 102260: all pass - PUSHED

2016-11-15 Thread osstest service owner
flight 102260 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/102260/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf c0cb1e1a72bccb5c83d7a36a8e52a38002b18671 baseline version: ovmf 0ab475c9a1d551a919430

Re: [Xen-devel] [PATCH v2 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 15:28, wrote: > On 11/15/2016 03:34 AM, Jan Beulich wrote: > On 09.11.16 at 15:39, wrote: >>> This domctl is called when a VCPU is hot-(un)plugged to a guest (via >>> 'xl vcpu-set'). While this currently is only intended to be needed by >>> PVH guests we will call this domc

Re: [Xen-devel] [PATCH Altp2m cleanup 2/3 v12 2/3] Altp2m cleanup: cleaning up partial memory allocations in hap_enable().

2016-11-15 Thread Jan Beulich
>>> On 11.11.16 at 00:45, wrote: > @@ -488,43 +489,44 @@ int hap_enable(struct domain *d, u32 mode) > /* allocate P2m table */ > if ( mode & PG_translate ) > { > +/* p2m_alloc_table() #1 */ > rv = p2m_alloc_table(p2m_get_hostp2m(d)); > if ( rv != 0 ) >

Re: [Xen-devel] [PATCH v2 02/11] acpi: Define ACPI IO registers for PVH guests

2016-11-15 Thread Boris Ostrovsky
On 11/15/2016 03:47 AM, Jan Beulich wrote: > >> --- a/tools/libacpi/static_tables.c >> +++ b/tools/libacpi/static_tables.c >> @@ -20,6 +20,8 @@ >> * Firmware ACPI Control Structure (FACS). >> */ >> >> +#define ACPI_REG_BIT_OFFSET0 > Can you completely exclude us ever wanting to support so

Re: [Xen-devel] [PATCH v2 08/11] pvh/acpi: Handle ACPI accesses for PVH guests

2016-11-15 Thread Boris Ostrovsky
On 11/15/2016 04:24 AM, Jan Beulich wrote: On 09.11.16 at 15:39, wrote: >> --- a/xen/arch/x86/hvm/ioreq.c >> +++ b/xen/arch/x86/hvm/ioreq.c >> @@ -1383,6 +1383,78 @@ static int hvm_access_cf8(static int acpi_ioaccess( >> int dir, unsigned int port, unsigned int bytes, uint32_t *val) >>

Re: [Xen-devel] [PATCH v2 10/11] pvh: Send an SCI on VCPU hotplug event

2016-11-15 Thread Boris Ostrovsky
On 11/15/2016 04:36 AM, Jan Beulich wrote: On 09.11.16 at 15:39, wrote: >> --- a/xen/arch/x86/domctl.c >> +++ b/xen/arch/x86/domctl.c >> @@ -1443,6 +1443,18 @@ long arch_do_domctl( >> break; >> >> d->arch.avail_vcpus = num; >> + >> +/* >> + * For PVH gu

Re: [Xen-devel] [PATCH v2 01/11] x86/domctl: Add XEN_DOMCTL_set_avail_vcpus

2016-11-15 Thread Boris Ostrovsky
On 11/15/2016 09:33 AM, Jan Beulich wrote: On 15.11.16 at 15:28, wrote: >> On 11/15/2016 03:34 AM, Jan Beulich wrote: >> On 09.11.16 at 15:39, wrote: This domctl is called when a VCPU is hot-(un)plugged to a guest (via 'xl vcpu-set'). While this currently is only intended to be

[Xen-devel] [PATCH for-4.8] tools/configure: Drop -lcrypto search

2016-11-15 Thread Ian Jackson
This seems to be looking for a function MD5. But nothing uses it. The build works fine if this is disabled and libcrypto is not installed. This check was first introduced in 68a3e1e87325 "[TOOLS] Add more checks for devel packages." in 2006. At that time -lcrypto was used by tools/blktap/ and to

Re: [Xen-devel] [PATCH v2 08/11] pvh/acpi: Handle ACPI accesses for PVH guests

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 15:55, wrote: > On 11/15/2016 04:24 AM, Jan Beulich wrote: > On 09.11.16 at 15:39, wrote: >>> --- a/xen/arch/x86/hvm/ioreq.c >>> +++ b/xen/arch/x86/hvm/ioreq.c >>> @@ -1383,6 +1383,78 @@ static int hvm_access_cf8(static int acpi_ioaccess( >>> int dir, unsigned int port

Re: [Xen-devel] [PATCH v2 10/11] pvh: Send an SCI on VCPU hotplug event

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 15:57, wrote: > On 11/15/2016 04:36 AM, Jan Beulich wrote: > On 09.11.16 at 15:39, wrote: >>> --- a/xen/arch/x86/domctl.c >>> +++ b/xen/arch/x86/domctl.c >>> @@ -1443,6 +1443,18 @@ long arch_do_domctl( >>> break; >>> >>> d->arch.avail_vcpus = num; >>

Re: [Xen-devel] [PATCH 1/2] tools/libacpi: Re-licence remaining GPL code to LGPLv2.1

2016-11-15 Thread Wei Liu
On Mon, Nov 14, 2016 at 11:52:26PM -0500, Boris Ostrovsky wrote: > We now have permission from Lenovo to relicense commit 801d469ad8b2 > ("[HVM] ACPI support patch 3 of 4: ACPI _PRT table") to LGPLv2.1 > > This essentially means reverting commits c3397311a658 ("acpi: Prevent > GPL-only code from s

Re: [Xen-devel] [PATCH v2 02/11] acpi: Define ACPI IO registers for PVH guests

2016-11-15 Thread Jan Beulich
>>> On 15.11.16 at 15:47, wrote: > On 11/15/2016 03:47 AM, Jan Beulich wrote: >> >>> --- a/tools/libacpi/static_tables.c >>> +++ b/tools/libacpi/static_tables.c >>> @@ -20,6 +20,8 @@ >>> * Firmware ACPI Control Structure (FACS). >>> */ >>> >>> +#define ACPI_REG_BIT_OFFSET0 >> Can you com

Re: [Xen-devel] [RFC PATCH] xen/x86: Increase xen_e820_map to E820_X_MAX possible entries

2016-11-15 Thread Alex Thorlton
On Tue, Nov 15, 2016 at 10:55:49AM +0100, Juergen Gross wrote: > I'd go with the new error code. What about E2BIG or ENOSPC? > > I think the hypervisor should fill in the number of entries required > in this case. > > In case nobody objects I can post patches for this purpose (both Xen > and Linu

  1   2   >