>>> On 15.11.16 at 08:36, wrote:
> On 15/11/16 08:15, Jan Beulich wrote:
> On 15.11.16 at 07:33, wrote:
>>> On 15/11/16 01:11, Alex Thorlton wrote:
Hey everyone,
We're having problems with large systems hitting a BUG in
xen_memory_setup, due to extra e820 entries created i
>>> On 15.11.16 at 05:52, wrote:
> We now have permission from Lenovo to relicense commit 801d469ad8b2
> ("[HVM] ACPI support patch 3 of 4: ACPI _PRT table") to LGPLv2.1
>
> This essentially means reverting commits c3397311a658 ("acpi: Prevent
> GPL-only code from seeping into non-GPL binaries")
> @@ -119,7 +119,7 @@ endif
> clean: subdirs-clean
> rm -f roms.inc roms.inc.new acpi.h
> rm -f hvmloader hvmloader.tmp *.o $(DEPS)
> - $(MAKE) -C $(ACPI_PATH) ACPI_BUILD_DIR=$(CURDIR) clean
> + $(MAKE) -C $(ACPI_PATH) ACPI_BUILD_DIR=$(CURDIR)
> DSDT_FILES="$(DSDT_FILES)"
flight 102251 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102251/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 102144
test-armhf-armhf-libvirt-qcow2 1
>>> On 09.11.16 at 15:39, wrote:
> This domctl is called when a VCPU is hot-(un)plugged to a guest (via
> 'xl vcpu-set'). While this currently is only intended to be needed by
> PVH guests we will call this domctl for all (x86) guests for consistency.
The discussion on the actual change seems to
On 15/11/16 09:01, Jan Beulich wrote:
On 15.11.16 at 08:36, wrote:
>> On 15/11/16 08:15, Jan Beulich wrote:
>> On 15.11.16 at 07:33, wrote:
On 15/11/16 01:11, Alex Thorlton wrote:
> Hey everyone,
>
> We're having problems with large systems hitting a BUG in
> xen_mem
>>> On 09.11.16 at 15:39, wrote:
> @@ -244,7 +245,8 @@ int main(int argc, char **argv)
> #endif
>
> /* Operation Region 'PRST': bitmask of online CPUs. */
> -stmt("OperationRegion", "PRST, SystemIO, 0xaf00, 32");
> +stmt("OperationRegion", "PRST, SystemIO, 0x%x, %d",
%#x
> --- a/
>>> On 09.11.16 at 15:39, wrote:
> PM timer is not supported by PVH guests.
>
> Signed-off-by: Boris Ostrovsky
> Reviewed-by: Konrad Rzeszutek Wilk
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-
>>> On 09.11.16 at 15:39, wrote:
> Signed-off-by: Boris Ostrovsky
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
>>> On 09.11.16 at 15:39, wrote:
> This is the method that will get invoked on an SCI.
>
> Signed-off-by: Boris Ostrovsky
> Reviewed-by: Andrew Cooper
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/x
>>> On 09.11.16 at 15:39, wrote:
> --- a/xen/arch/x86/hvm/ioreq.c
> +++ b/xen/arch/x86/hvm/ioreq.c
> @@ -1380,6 +1380,12 @@ static int hvm_access_cf8(
> return X86EMUL_UNHANDLEABLE;
> }
>
> +static int acpi_ioaccess(
> +int dir, unsigned int port, unsigned int bytes, uint32_t *val)
> +
>>> On 09.11.16 at 15:39, wrote:
> --- a/xen/arch/x86/hvm/ioreq.c
> +++ b/xen/arch/x86/hvm/ioreq.c
> @@ -1383,6 +1383,78 @@ static int hvm_access_cf8(static int acpi_ioaccess(
> int dir, unsigned int port, unsigned int bytes, uint32_t *val)
> {
> +unsigned int i;
> +unsigned int bits
>>> On 09.11.16 at 15:39, wrote:
> --- a/xen/include/asm-x86/event.h
> +++ b/xen/include/asm-x86/event.h
> @@ -38,9 +38,10 @@ static inline void local_event_delivery_enable(void)
> vcpu_info(current, evtchn_upcall_mask) = 0;
> }
>
> -/* No arch specific virq definition now. Default to glob
On Mon, Nov 14, 2016 at 05:12:52PM -0500, Konrad Rzeszutek Wilk wrote:
> The tools that use kexec are asynchronous in nature and do
> not keep state changes. As such provide an hypercall to find
> out whether an image has been loaded for either type.
>
> Note: No need to modify XSM as it has one si
>>> On 09.11.16 at 15:39, wrote:
> --- a/xen/arch/x86/domctl.c
> +++ b/xen/arch/x86/domctl.c
> @@ -1443,6 +1443,18 @@ long arch_do_domctl(
> break;
>
> d->arch.avail_vcpus = num;
> +
> +/*
> + * For PVH guests we need to send an SCI and set enable/status
> +
This run is configured for baseline tests only.
flight 68040 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68040/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c37dcee6d8c24cff4c50fa5dd139e5a26678eb62
baseline v
>>> On 09.11.16 at 15:39, wrote:
> --- a/xen/arch/x86/domctl.c
> +++ b/xen/arch/x86/domctl.c
> @@ -1443,6 +1443,18 @@ long arch_do_domctl(
> break;
>
> d->arch.avail_vcpus = num;
> +
> +/*
> + * For PVH guests we need to send an SCI and set enable/status
> +
>>> On 15.11.16 at 09:42, wrote:
> On 15/11/16 09:01, Jan Beulich wrote:
> On 15.11.16 at 08:36, wrote:
>>> On 15/11/16 08:15, Jan Beulich wrote:
>>> On 15.11.16 at 07:33, wrote:
> In case I'm right the Xen hypervisor should be prepared for a larger
> e820 map, but this won't hel
flight 102243 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102243/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt 15 guest-start/debian.repeat fail in 102223 pass in
102243
test-armhf-armhf-xl-vhd
flight 102256 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102256/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 0ab475c9a1d551a919430f3b6df6f652e4d2a3ed
baseline version:
ovmf 7c7453b5d6302227264b0
On 15/11/16 10:45, Jan Beulich wrote:
On 15.11.16 at 09:42, wrote:
>> On 15/11/16 09:01, Jan Beulich wrote:
>> On 15.11.16 at 08:36, wrote:
On 15/11/16 08:15, Jan Beulich wrote:
On 15.11.16 at 07:33, wrote:
>> In case I'm right the Xen hypervisor should be prepared for
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Jason Long
> Sent: 15 November 2016 06:01
> To: Dario Faggioli ; Xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] Xen like VirtualBox
>
> I see you are a Citrix Employee and you and your cowork
On Mon, Nov 14, 2016 at 11:01:25AM +, Andrew Cooper wrote:
> %cs.L may be set in a legacy mode segment, or clear in a compatibility mode
> segment; it is not the correct way to check for long mode being active.
>
> Both of these situations result in incorrect visibility of the SYSCALL feature
On 10/25/2016 11:03 AM, Christian Borntraeger wrote:
> Peter,
>
> here is v2 with some improved patch descriptions and some fixes. The
> previous version has survived one day of linux-next and I only changed
> small parts.
> So unless there is some other issue, feel free to pull (or to apply
> the
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_no_colo.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_no_colo.c b/tools/libxl/libxl_no_colo.c
index 15
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_colo_proxy.c | 24
1 file changed, 12 insertions(+), 12 deletions(-)
diff --git a/tools/libxl/libxl_colo_proxy.c b/tools/l
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_colo_save.c | 49 ++-
1 file changed, 25 insertions(+), 24 deletions(-)
diff --git a/tools/libxl/libxl_colo
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_vtpm.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/libxl_vtpm.c b/tools/libxl/libxl_vtpm.c
index 8588569
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_usb.c | 57 ++---
1 file changed, 30 insertions(+), 27 deletions(-)
diff --git a/tools/libxl/libxl_usb.
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_internal.c | 29 ++---
1 file changed, 14 insertions(+), 15 deletions(-)
diff --git a/tools/libxl/libxl_internal.c b/tools/
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_create.c | 119 +++--
1 file changed, 60 insertions(+), 59 deletions(-)
diff --git a/tools/libxl/libxl_crea
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_colo_nic.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/libxl_colo_nic.c b/tools/libxl/libxl_colo_nic.c
index 5e0
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_x86.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/tools/libxl/libxl_x86.c b/tools/libxl/libxl_x86.c
index e1844c8..5da
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_dm.c | 111 ++---
1 file changed, 59 insertions(+), 52 deletions(-)
diff --git a/tools/libxl/libxl_dm.c
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_checkpoint_device.c | 14 +++---
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/tools/libxl/libxl_checkpoint_device.c
b/tool
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_dom_suspend.c | 45 -
1 file changed, 22 insertions(+), 23 deletions(-)
diff --git a/tools/libxl/libxl_dom_
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_colo.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/libxl_colo.h b/tools/libxl/libxl_colo.h
index f0e438e..682275
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_psr.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/tools/libxl/libxl_psr.c b/tools/libxl/libxl_psr.c
index 78618
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_remus.c | 27 ++-
1 file changed, 14 insertions(+), 13 deletions(-)
diff --git a/tools/libxl/libxl_remus.c b/tools/libxl/li
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_netbuffer.c | 43 ---
1 file changed, 24 insertions(+), 19 deletions(-)
diff --git a/tools/libxl/libxl_netb
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_colo_restore.c | 57
1 file changed, 28 insertions(+), 29 deletions(-)
diff --git a/tools/libxl/libxl_colo
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_stream_write.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/tools/libxl/libxl_stream_write.c b/tools/libxl/libxl_s
Use LOG*D functions to output the domain ID in logs as much as
possible. This will help consumer code sorting the logs by
domain.
This commit includes all LOG* to LOG*D changes where the domain
ID is not just a domid variable. We want the domain ID provided
to the LOG*D functions to be the one of
Use LOG*D functions to output the domain ID in logs as much as
possible. This will help consumer code sorting the logs by
domain.
This commit changes LOG*() into LOG*D(), adds a domid
parameter and messages has been altered to remove the domain
id from it since it is already contained in the outpu
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_xshelp.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/libxl_xshelp.c b/tools/libxl/libxl_xshelp.c
index b3bac
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_dom_save.c | 29 +++--
1 file changed, 15 insertions(+), 14 deletions(-)
diff --git a/tools/libxl/libxl_dom_save.c b/tools/
From: Cédric Bosdonnat
Use LOG*D functions to output the domain ID in logs as much as
possible. This will help consumer code sorting the logs by
domain.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_bootloader.c | 84 --
1 file changed, 49 insert
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_pci.c | 153 +---
1 file changed, 79 insertions(+), 74 deletions(-)
diff --git a/tools/libxl/libxl_pci.
From: Cédric Bosdonnat
These functions should be used to log messages when the domain
id is known. libxl__log will now prepend the log message by
"Domain %PRIu32:" if the domain id is a valid one.
This aims at helping consumers filter logs on domain IDs.
Signed-off-by: Cédric Bosdonnat
---
to
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_save_callout.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/libxl_save_callout.c b/tools/libxl/libxl_save
Use LOG*D functions to output the domain ID in logs as much as
possible. This will help consumer code sorting the logs by
domain.
This commit, only changes LOG*() into LOG*D() and adds a domid
parameter.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl.c | 302 ++---
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_device.c | 70 --
1 file changed, 37 insertions(+), 33 deletions(-)
diff --git a/tools/libxl/libxl_devi
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_nic.c | 9 +
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/tools/libxl/libxl_nic.c b/tools/libxl/libxl_nic.c
index 220a028..
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_freebsd.c | 8 +---
1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/tools/libxl/libxl_freebsd.c b/tools/libxl/libxl_freebsd.c
inde
Hi all,
This patch series adds a LOG*D family matching the existing
LOG* one, but with one more parameter for the domain ID.
Using this new family will allow the libxl-based applications
to sort log entries by domain ID. For example a typical use
case of this is the libvirt libxl driver: it shoul
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_linux.c | 23 ++-
1 file changed, 14 insertions(+), 9 deletions(-)
diff --git a/tools/libxl/libxl_linux.c b/tools/libxl/libxl_l
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_colo_qdisk.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/libxl_colo_qdisk.c b/tools/libxl/libxl_colo_qdisk.c
ind
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_netbsd.c | 9 ++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/tools/libxl/libxl_netbsd.c b/tools/libxl/libxl_netbsd.c
index
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_qmp.c | 56 -
1 file changed, 28 insertions(+), 28 deletions(-)
diff --git a/tools/libxl/libxl_qmp.
From: Cédric Bosdonnat
Use LOG*D logging functions where possible instead of the LOG* ones.
Signed-off-by: Cédric Bosdonnat
---
tools/libxl/libxl_vnuma.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/libxl/libxl_vnuma.c b/tools/libxl/libxl_vnuma.c
index db22799..8ec
On 14/11/16 16:54, Jan Beulich wrote:
On 14.11.16 at 17:38, wrote:
>> On 14/11/16 15:02, Jan Beulich wrote:
>> On 14.11.16 at 15:38, wrote:
On 14/11/16 14:24, Jan Beulich wrote:
On 14.11.16 at 14:45, wrote:
>> On 14/11/16 13:25, Jan Beulich wrote:
>>> --- a/xen/arc
On 14/11/16 14:05, Jason Long wrote:
> Thank you but the problem is that "virt-manager" is for Redhat and Redhat
> don't like Xen anymore because of KVM. Another problem is that a program like
> VirtualBox has a nice GUI but virt-manager not.
virt-manager is also available for Fedora and Fedora
>>> On 15.11.16 at 10:55, wrote:
> On 15/11/16 10:45, Jan Beulich wrote:
> On 15.11.16 at 09:42, wrote:
>>> For a fully dynamical solution we'd need a way to get a partial
>>> E820 map from the hypervisor (e.g. first 128 entries) in order to
>>> be able to setup at least some memory and later
>>> On 15.11.16 at 11:26, wrote:
> On 14/11/16 16:54, Jan Beulich wrote:
> On 14.11.16 at 17:38, wrote:
>>> On 14/11/16 15:02, Jan Beulich wrote:
>>> On 14.11.16 at 15:38, wrote:
> On 14/11/16 14:24, Jan Beulich wrote:
> On 14.11.16 at 14:45, wrote:
>>> On 14/11/16 13:25
On 14/11/16 22:12, Konrad Rzeszutek Wilk wrote:
> The tools that use kexec are asynchronous in nature and do
> not keep state changes. As such provide an hypercall to find
> out whether an image has been loaded for either type.
>
> Note: No need to modify XSM as it has one size fits all
> check an
On 15/11/16 11:44, Jan Beulich wrote:
On 15.11.16 at 10:55, wrote:
>> On 15/11/16 10:45, Jan Beulich wrote:
>> On 15.11.16 at 09:42, wrote:
For a fully dynamical solution we'd need a way to get a partial
E820 map from the hypervisor (e.g. first 128 entries) in order to
be
>>> On 15.11.16 at 12:07, wrote:
> On 15/11/16 11:44, Jan Beulich wrote:
> On 15.11.16 at 10:55, wrote:
>>> On 15/11/16 10:45, Jan Beulich wrote:
>>> On 15.11.16 at 09:42, wrote:
> For a fully dynamical solution we'd need a way to get a partial
> E820 map from the hypervisor (e.g
Boris Ostrovsky writes:
> On 11/14/2016 01:21 PM, David Vrabel wrote:
>> On 14/11/16 17:17, Vitaly Kuznetsov wrote:
>>> Hi,
>>>
>>> I have a long-standing idea to separate PV and PVHVM code in kernel and
>>> introduce Kconfig options to make it possible to enable the required
>>> parts only brea
I'm working with XenServer too and XenServer is not a complete Linux and you
can't work it well like Linux. You can Install Xen on your Linux and doing
Virtualization and your daily work with Linux.
On Tuesday, November 15, 2016 1:30 PM, Paul Durrant
wrote:
> -Original Message-
> Fro
You said a Red Hat employee and this company like KVM not Xen.
On Tuesday, November 15, 2016 2:16 PM, John Haxby wrote:
On 14/11/16 14:05, Jason Long wrote:
> Thank you but the problem is that "virt-manager" is for Redhat and Redhat
> don't like Xen anymore because of KVM. Another problem is t
On 14/11/16 17:17, Vitaly Kuznetsov wrote:
> Introduce CONFIG_XEN_PV config option and split enlighten.c into
> 3 files. Temporary add #ifdef CONFIG_XEN_PV to smp.c and mmu.c to
> not break the build and not make the patch even bigger.
>
> xen_cpu_up_prepare*/xen_cpu_die hooks require separation t
Hi Julien,
On 01/11/16 17:22, Julien Grall wrote:
> Hi Andre,
>
> On 28/09/2016 19:24, Andre Przywara wrote:
>> The ARM GICv3 ITS provides a new kind of interrupt called LPIs.
>> The pending bits and the configuration data (priority, enable bits) for
>> those LPIs are stored in tables in normal m
flight 102248 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102248/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qcow2 9 debian-di-installfail REGR. vs. 101909
test-amd64-amd64-
On 15/11/16 11:17, Jason Long wrote:
> You said a Red Hat employee and this company like KVM not Xen.
That makes no sense. You're denying what it says on the
virt-manager.org web site as well as denying what it says in the
description of the RPM. Even the Red Hat RPM for virt-manager says
that
David Vrabel writes:
> On 14/11/16 17:17, Vitaly Kuznetsov wrote:
>> Introduce CONFIG_XEN_PV config option and split enlighten.c into
>> 3 files. Temporary add #ifdef CONFIG_XEN_PV to smp.c and mmu.c to
>> not break the build and not make the patch even bigger.
>>
>> xen_cpu_up_prepare*/xen_cpu_
On Tue, Oct 25, 2016 at 11:03:11AM +0200, Christian Borntraeger wrote:
> For spinning loops people do often use barrier() or cpu_relax().
> For most architectures cpu_relax and barrier are the same, but on
> some architectures cpu_relax can add some latency.
> For example on power,sparc64 and arc,
On 11/15/2016 01:30 PM, Russell King - ARM Linux wrote:
> On Tue, Oct 25, 2016 at 11:03:11AM +0200, Christian Borntraeger wrote:
>> For spinning loops people do often use barrier() or cpu_relax().
>> For most architectures cpu_relax and barrier are the same, but on
>> some architectures cpu_relax c
On 11/15/2016 01:17 AM, Wei Liu wrote:
> On Mon, Nov 14, 2016 at 11:52:27PM -0500, Boris Ostrovsky wrote:
>> There is no reason to build, for example, dsdt_pvh.asl for hvmloader. We
>> pass which DSDTs to build via DSDT_FILES parameter.
>>
>> If DSDT_FILES is empty all DSDTs for a particular archit
On Tue, Nov 15, 2016 at 02:19:53PM +0100, Christian Borntraeger wrote:
> On 11/15/2016 01:30 PM, Russell King - ARM Linux wrote:
> > On Tue, Oct 25, 2016 at 11:03:11AM +0200, Christian Borntraeger wrote:
> >> For spinning loops people do often use barrier() or cpu_relax().
> >> For most architectur
On 15/11/16 13:35, Boris Ostrovsky wrote:
> On 11/15/2016 01:17 AM, Wei Liu wrote:
>> On Mon, Nov 14, 2016 at 11:52:27PM -0500, Boris Ostrovsky wrote:
>>> There is no reason to build, for example, dsdt_pvh.asl for hvmloader. We
>>> pass which DSDTs to build via DSDT_FILES parameter.
>>>
>>> If DSDT
On 11/15/2016 02:37 PM, Russell King - ARM Linux wrote:
> On Tue, Nov 15, 2016 at 02:19:53PM +0100, Christian Borntraeger wrote:
>> On 11/15/2016 01:30 PM, Russell King - ARM Linux wrote:
>>> On Tue, Oct 25, 2016 at 11:03:11AM +0200, Christian Borntraeger wrote:
For spinning loops people do of
flight 68041 distros-debian-snapshot real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68041/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-armhf-daily-netboot-pygrub 9 debian-di-install fail like 68013
test-amd64-am
Thank you but I guess it is serious for Xen.
Are you Sure Red Hat company help Xen? I guess you wrong. Red Hat employee not
mean Red Hat company and they can help other Open Source projects as hobbyist.
I guess some Citrix guys help KVM as hobbyist too. When you read Virtualization
books then al
On Tue, Nov 15, 2016 at 11:54 AM, John Haxby wrote:
> On 15/11/16 11:17, Jason Long wrote:
>> You said a Red Hat employee and this company like KVM not Xen.
>
> That makes no sense. You're denying what it says on the
> virt-manager.org web site as well as denying what it says in the
> description
>>> On 11.11.16 at 00:45, wrote:
> @@ -66,6 +67,60 @@ altp2m_vcpu_destroy(struct vcpu *v)
> }
>
> /*
> + * allocate and initialize memory for altp2m portion of domain
> + *
> + * returns < 0 on error
> + * returns 0 on no operation & success
> + */
> +int
> +altp2m_domain_init(struct domain
On 15/11/2016 13:45, "Andrew Cooper" wrote:
>On 15/11/16 13:35, Boris Ostrovsky wrote:
>> On 11/15/2016 01:17 AM, Wei Liu wrote:
>>> On Mon, Nov 14, 2016 at 11:52:27PM -0500, Boris Ostrovsky wrote:
There is no reason to build, for example, dsdt_pvh.asl for hvmloader.
We
pass which
On 11/15/2016 03:34 AM, Jan Beulich wrote:
On 09.11.16 at 15:39, wrote:
>> This domctl is called when a VCPU is hot-(un)plugged to a guest (via
>> 'xl vcpu-set'). While this currently is only intended to be needed by
>> PVH guests we will call this domctl for all (x86) guests for consistency.
flight 102260 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/102260/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c0cb1e1a72bccb5c83d7a36a8e52a38002b18671
baseline version:
ovmf 0ab475c9a1d551a919430
>>> On 15.11.16 at 15:28, wrote:
> On 11/15/2016 03:34 AM, Jan Beulich wrote:
> On 09.11.16 at 15:39, wrote:
>>> This domctl is called when a VCPU is hot-(un)plugged to a guest (via
>>> 'xl vcpu-set'). While this currently is only intended to be needed by
>>> PVH guests we will call this domc
>>> On 11.11.16 at 00:45, wrote:
> @@ -488,43 +489,44 @@ int hap_enable(struct domain *d, u32 mode)
> /* allocate P2m table */
> if ( mode & PG_translate )
> {
> +/* p2m_alloc_table() #1 */
> rv = p2m_alloc_table(p2m_get_hostp2m(d));
> if ( rv != 0 )
>
On 11/15/2016 03:47 AM, Jan Beulich wrote:
>
>> --- a/tools/libacpi/static_tables.c
>> +++ b/tools/libacpi/static_tables.c
>> @@ -20,6 +20,8 @@
>> * Firmware ACPI Control Structure (FACS).
>> */
>>
>> +#define ACPI_REG_BIT_OFFSET0
> Can you completely exclude us ever wanting to support so
On 11/15/2016 04:24 AM, Jan Beulich wrote:
On 09.11.16 at 15:39, wrote:
>> --- a/xen/arch/x86/hvm/ioreq.c
>> +++ b/xen/arch/x86/hvm/ioreq.c
>> @@ -1383,6 +1383,78 @@ static int hvm_access_cf8(static int acpi_ioaccess(
>> int dir, unsigned int port, unsigned int bytes, uint32_t *val)
>>
On 11/15/2016 04:36 AM, Jan Beulich wrote:
On 09.11.16 at 15:39, wrote:
>> --- a/xen/arch/x86/domctl.c
>> +++ b/xen/arch/x86/domctl.c
>> @@ -1443,6 +1443,18 @@ long arch_do_domctl(
>> break;
>>
>> d->arch.avail_vcpus = num;
>> +
>> +/*
>> + * For PVH gu
On 11/15/2016 09:33 AM, Jan Beulich wrote:
On 15.11.16 at 15:28, wrote:
>> On 11/15/2016 03:34 AM, Jan Beulich wrote:
>> On 09.11.16 at 15:39, wrote:
This domctl is called when a VCPU is hot-(un)plugged to a guest (via
'xl vcpu-set'). While this currently is only intended to be
This seems to be looking for a function MD5. But nothing uses it.
The build works fine if this is disabled and libcrypto is not
installed.
This check was first introduced in 68a3e1e87325 "[TOOLS] Add more
checks for devel packages." in 2006. At that time -lcrypto was used
by tools/blktap/ and to
>>> On 15.11.16 at 15:55, wrote:
> On 11/15/2016 04:24 AM, Jan Beulich wrote:
> On 09.11.16 at 15:39, wrote:
>>> --- a/xen/arch/x86/hvm/ioreq.c
>>> +++ b/xen/arch/x86/hvm/ioreq.c
>>> @@ -1383,6 +1383,78 @@ static int hvm_access_cf8(static int acpi_ioaccess(
>>> int dir, unsigned int port
>>> On 15.11.16 at 15:57, wrote:
> On 11/15/2016 04:36 AM, Jan Beulich wrote:
> On 09.11.16 at 15:39, wrote:
>>> --- a/xen/arch/x86/domctl.c
>>> +++ b/xen/arch/x86/domctl.c
>>> @@ -1443,6 +1443,18 @@ long arch_do_domctl(
>>> break;
>>>
>>> d->arch.avail_vcpus = num;
>>
On Mon, Nov 14, 2016 at 11:52:26PM -0500, Boris Ostrovsky wrote:
> We now have permission from Lenovo to relicense commit 801d469ad8b2
> ("[HVM] ACPI support patch 3 of 4: ACPI _PRT table") to LGPLv2.1
>
> This essentially means reverting commits c3397311a658 ("acpi: Prevent
> GPL-only code from s
>>> On 15.11.16 at 15:47, wrote:
> On 11/15/2016 03:47 AM, Jan Beulich wrote:
>>
>>> --- a/tools/libacpi/static_tables.c
>>> +++ b/tools/libacpi/static_tables.c
>>> @@ -20,6 +20,8 @@
>>> * Firmware ACPI Control Structure (FACS).
>>> */
>>>
>>> +#define ACPI_REG_BIT_OFFSET0
>> Can you com
On Tue, Nov 15, 2016 at 10:55:49AM +0100, Juergen Gross wrote:
> I'd go with the new error code. What about E2BIG or ENOSPC?
>
> I think the hypervisor should fill in the number of entries required
> in this case.
>
> In case nobody objects I can post patches for this purpose (both Xen
> and Linu
1 - 100 of 159 matches
Mail list logo