Monday, February 9, 2015, 9:35:33 AM, you wrote:
Hello Steven,
upgrades from Xen 4.4 to 4.5 are supposed to work out of the box.
Please post more details and we'll try to help you figure out what's
wrong.
Cheers,
Stefano
On Sun, 8 Feb 2015, Steven Haigh wrote:
Hi all,
I was under
On Fri, 2015-02-06 at 17:23 +, Stefano Stabellini wrote:
One of the main issues outstanding from when Anthony originally posted
his patches is how we want to go about building this? I honestly do
not know how well the current dracut-based approach to building the
root image will
On Tue, 2015-02-03 at 23:06 -0500, Eric Shelton wrote:
This enum gives the ability to select between a MiniOS-based QEMU
traditional stub domain and a Linux-based QEMU upstream stub domain. To
use the Linux-based stubdomain, the following two lines should be
included in the appropriate xl.cfg
On Mon, 9 Feb 2015, Ian Campbell wrote:
On Fri, 2015-02-06 at 17:23 +, Stefano Stabellini wrote:
One of the main issues outstanding from when Anthony originally posted
his patches is how we want to go about building this? I honestly do
not know how well the current dracut-based
On Fri, 2015-02-06 at 17:45 +, Stefano Stabellini wrote:
That's a good point. I think git clone would be more inline with any
other external project that we use. However I'll let the other
maintainers decide on this.
If anything it should be a clone of a push-gated Linux git tree on
On 9/02/2015 7:59 PM, Sander Eikelenboom wrote:
Monday, February 9, 2015, 9:35:33 AM, you wrote:
Hello Steven,
upgrades from Xen 4.4 to 4.5 are supposed to work out of the box.
Please post more details and we'll try to help you figure out what's
wrong.
Cheers,
Stefano
On Sun, 8
On 09/02/2015 09:09, Steven Haigh wrote:
On 9/02/2015 7:59 PM, Sander Eikelenboom wrote:
Monday, February 9, 2015, 9:35:33 AM, you wrote:
Hello Steven,
upgrades from Xen 4.4 to 4.5 are supposed to work out of the box.
Please post more details and we'll try to help you figure out what's
On 05.02.2015 15:47, Sander Eikelenboom wrote:
Thursday, February 5, 2015, 3:22:49 PM, you wrote:
Hey David,
after just being in that pain, I thought I might as well give a summary to
you/the list. Maybe helpful to not forget which piece should go to which
stable...
So:
Monday, February 9, 2015, 10:31:15 AM, you wrote:
On 05.02.2015 15:47, Sander Eikelenboom wrote:
Thursday, February 5, 2015, 3:22:49 PM, you wrote:
Hey David,
after just being in that pain, I thought I might as well give a summary to
you/the list. Maybe helpful to not forget which
On 9/02/2015 8:16 PM, Ian Campbell wrote:
On Mon, 2015-02-09 at 20:09 +1100, Steven Haigh wrote:
On 9/02/2015 7:59 PM, Sander Eikelenboom wrote:
Monday, February 9, 2015, 9:35:33 AM, you wrote:
Hello Steven,
upgrades from Xen 4.4 to 4.5 are supposed to work out of the box.
Please post more
flight 34299 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34299/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 12 guest-start.2 fail REGR. vs. 34227
On 09/02/15 15:03, Sander Eikelenboom wrote:
Hi Jan / David / Konrad,
I was just testing a 3.19 kernel on my intel machine and again
ran into the sporadically appearing irq nobody cared on the dom0 kernel.
This occurs now for quite some kernel versions (running xen-unstable now,
but it also
Anthony PERARD wrote:
On Mon, Feb 02, 2015 at 05:00:34PM -0700, Jim Fehlig wrote:
This small series fixes some assertions we occasionally see in the
libxl driver when running libvirt-TCK. The assertions were due to
races between destroying per-domain libxl_ctx and receiving fd and
timer
flight 34319 qemu-upstream-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34319/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 11 guest-localmigrate fail REGR. vs. 33488
On Mon, Feb 09, 2015 at 03:51:11PM +, Ian Jackson wrote:
libxl__ao_inprogress needs to check (like
libxl__ao_complete_check_progress_reports) that there are no
oustanding progress callbacks.
Otherwise it might happen that we would destroy the ao while another
thread has an outstanding
Ccing Davidlohr, (sorry that I got confused with similar address in cc
list).
On 02/09/2015 08:44 PM, Oleg Nesterov wrote:
On 02/09, Raghavendra K T wrote:
+static inline void __ticket_check_and_clear_slowpath(arch_spinlock_t *lock)
+{
+ arch_spinlock_t old, new;
+ __ticket_t
-4.5).
[ 1905.880200] irq 18: nobody cared (try booting with the irqpoll option)
[ 1905.914838] CPU: 0 PID: 0 Comm: swapper/0 Not tainted
3.19.0-creanuc-20150209-doflr+ #1
[ 1905.935473] Hardware name: /D53427RKE, BIOS
RKPPT10H.86A.0017.2013.0425.1251 04/25/2013
[ 1905.956149
On Mon, Feb 09, 2015 at 03:51:12PM +, Ian Jackson wrote:
In libxl_ctx_free:
1. Move the GC_INIT earlier, so that we can:
2. Take the lock around most of the work. This is technically
unnecessary since calling any other libxl entrypoint on a ctx being
passed to libxl_ctx_free
On 02/09, Raghavendra K T wrote:
+static inline void __ticket_check_and_clear_slowpath(arch_spinlock_t *lock)
+{
+ arch_spinlock_t old, new;
+ __ticket_t diff;
+
+ old.tickets = READ_ONCE(lock-tickets);
+ diff = (old.tickets.tail ~TICKET_SLOWPATH_FLAG) - old.tickets.head;
Monday, February 9, 2015, 4:18:15 PM, you wrote:
On 09/02/15 15:03, Sander Eikelenboom wrote:
Hi Jan / David / Konrad,
I was just testing a 3.19 kernel on my intel machine and again
ran into the sporadically appearing irq nobody cared on the dom0 kernel.
This occurs now for quite some
On Mon, Feb 09, 2015 at 03:51:09PM +, Ian Jackson wrote:
Check that the ao is still live when we are about to running some of
its callbacks.
This reveals an existing bug in libxl which is exercised by libvirt,
converting
libvirtd: libxl_event.c:1792:
On 09.02.15 at 16:18, david.vra...@citrix.com wrote:
On 09/02/15 15:03, Sander Eikelenboom wrote:
Hi Jan / David / Konrad,
I was just testing a 3.19 kernel on my intel machine and again
ran into the sporadically appearing irq nobody cared on the dom0 kernel.
This occurs now for quite some
In libxl_ctx_free:
1. Move the GC_INIT earlier, so that we can:
2. Take the lock around most of the work. This is technically
unnecessary since calling any other libxl entrypoint on a ctx being
passed to libxl_ctx_free risks undefined behaviour. But, taking
the lock allows us to much
Check that the ao is still live when we are about to running some of
its callbacks.
This reveals an existing bug in libxl which is exercised by libvirt,
converting
libvirtd: libxl_event.c:1792: libxl__ao_complete_check_progress_reports:
Assertion `ao-in_initiator' failed.
into
libvirtd:
Break out the test in libxl__ao_complete_check_progress_reports, into
ao_work_outstanding, which reports false if either (i) the ao is still
ongoing or (ii) there is a progress report (perhaps on a different
thread's callback queue) which has yet to be reported to the
application.
No functional
libxl__ao_inprogress needs to check (like
libxl__ao_complete_check_progress_reports) that there are no
oustanding progress callbacks.
Otherwise it might happen that we would destroy the ao while another
thread has an outstanding callback its egc report queue. The other
thread would then, in its
Ian Campbell wrote:
Jim,
Thought you might like to know that we are now testing actually starting
a guest with libvirt in osstest and this is the first pass.
Nice! I'll keep an eye out for any regressions.
Currently we don't test migration (which is why that appears to have
failed),
On 10/02/2015 09:36, Julien Grall wrote:
Hi Stefano,
On 06/02/2015 22:06, Stefano Stabellini wrote:
On Fri, 30 Jan 2015, Julien Grall wrote:
When SMMU doesn't support coherent table walk, Xen may need to clean
updated PT (see commit 4c5f4cb xen/arm: p2m: Clean cache PT when the
IOMMU
Hi Ian,
On 10/02/2015 12:45, Ian Campbell wrote:
Signed-off-by: Ian Campbell ian.campb...@citrix.com
Reviewed-by: Julien Grall julien.gr...@linaro.org
---
xen/arch/arm/traps.c |8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/xen/arch/arm/traps.c
On Tue, 2015-02-10 at 13:44 +0800, Julien Grall wrote:
/* The cond for this instruction works out as the top 4 bits. */
-cond = ( it 4 );
+cond = ( it 4 );
I haven't spot it in the previous review. This seems to be only a coding
change. Could you specify it
Hi Ian,
On 10/02/2015 12:45, Ian Campbell wrote:
Previously 32-bit userspace on 32-bit kernel and 64-bit userspace on 64-bit
kernel could access these registers irrespective of whether the kernel had
configured them to be allowed to. To fix this:
- Userspace access to CNTP_CTL_EL0 and
On 09/02/2015 20:02, Oleksandr Tyshchenko wrote:
On Mon, Feb 9, 2015 at 10:31 AM, Julien Grall julien.gr...@linaro.org wrote:
On 07/02/2015 01:15, Oleksandr Tyshchenko wrote:
Hi Julien
Hi Oleksandr,
On Thu, Feb 5, 2015 at 6:36 PM, Oleksandr Tyshchenko
The next problem is ballooning.
On 10/02/2015 11:40, Ian Campbell wrote:
On Wed, 2014-09-10 at 10:48 +0100, Ian Campbell wrote:
On Tue, 2014-09-09 at 16:45 -0700, Julien Grall wrote:
Hi Ian,
On 09/09/14 09:23, Ian Campbell wrote:
Accesses to these from 32-bit userspace would cause a hypervisor exception
(host crash) when
Hi,
While testing commit 2563bca1, I found that libxl_get_free_memory returns 0
until there is more free memory than required for freemem-slack. This means
that during the domain creation process, freed memory is first set aside for
freemem-slack, then marked as truly free for consumption.
On
Stefano,
do you have any comments on the viability of the general approach here
before I go off and start addressing the review comments?
Cheers,
Ian.
On Mon, 2015-01-26 at 15:55 +, Ian Campbell wrote:
... instead of artificially masking the timer interrupt in the timer
state and relying
On 01/19/2015 09:28 AM, Chunyan Liu wrote:
Add pvusb commands.
To attach a usb device to guest through pvusb, one could follow
following example:
#xl usb-ctrl-attach test_vm version=1 num_ports=8
#xl usb-list test_vm
will show the usb controllers and port usage under the domain.
#xl
Hi Stefano,
On 06/02/2015 22:06, Stefano Stabellini wrote:
On Fri, 30 Jan 2015, Julien Grall wrote:
When SMMU doesn't support coherent table walk, Xen may need to clean
updated PT (see commit 4c5f4cb xen/arm: p2m: Clean cache PT when the
IOMMU doesn't support coherent walk).
If one SMMU of
On Wed, 2014-09-10 at 10:48 +0100, Ian Campbell wrote:
On Tue, 2014-09-09 at 16:45 -0700, Julien Grall wrote:
Hi Ian,
On 09/09/14 09:23, Ian Campbell wrote:
Accesses to these from 32-bit userspace would cause a hypervisor exception
(host crash) when running a 64-bit kernel, which is
Hi Stefano,
On 06/02/2015 21:20, Stefano Stabellini wrote:
On Fri, 30 Jan 2015, Julien Grall wrote:
-static int force_stage;
-module_param_named(force_stage, force_stage, int, S_IRUGO | S_IWUSR);
-MODULE_PARM_DESC(force_stage,
- Force SMMU mappings to be installed at a particular stage
flight 34346 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/34346/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-rumpuserxen6 xen-build fail REGR. vs. 33866
Hi all,
On Fri, Jan 30, 2015 at 06:59:23PM +0100, Daniel Kiper wrote:
Hi,
This patch series enable EFI boot services usage
in loaded images by multiboot2 protocol.
Guys, do you have any comments on this patch series?
Should I fix something? Could you apply them to GRUB2 tree?
Daniel
PS
--- a/xen/include/public/hvm/params.h
+++ b/xen/include/public/hvm/params.h
@@ -162,21 +162,6 @@
*/
#define HVM_PARAM_ACPI_IOPORTS_LOCATION 19
-/* Enable blocking memory events, async or sync (pause vcpu until response)
- * onchangeonly indicates messages only on a change of value */
The XSM label vm_event_op has been used to control the three memops
controlling mem_access, mem_paging and mem_sharing. While these systems
rely on vm_event, these are not vm_event operations themselves. Thus,
in this patch we introduce three separate labels for each of these memops.
Thus far mem_access and mem_sharing memops had been able to signal
to Xen to start pulling responses off the corresponding rings. In this patch
we retire these memops and add them to the option to the vm_event_op domctl.
The vm_event_op domctl suboptions are the same for each ring thus we
In this patch we mechanically rename mem_event to vm_event. This patch
introduces no logic changes to the code. Using the name vm_event better
describes the intended use of this subsystem, which is not limited to memory
events. It can be used for off-loading the decision making logic into helper
On Mon, Feb 09, 2015 at 07:17:23AM +0100, Juergen Gross wrote:
On 02/07/2015 12:44 AM, Luis R. Rodriguez wrote:
After some feedback for the first draft I'd suggest the following:
Option Selects Depends
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
tools/libxc/include/xenctrl.h |4 ++-
tools/libxc/xc_misc.c | 29 --
tools/libxl/libxl.c | 36 -
tools/python/xen/lowlevel/xc/xc.c | 39
.. and use this new interface to display it along with CPU topology
and NUMA information when 'xl info -n' command is issued
The output will look like
...
cpu_topology :
cpu:coresocket node
0: 000
...
device topology:
device node
Changes in v3:
* Added patch #1 to more consistently define nodes as a u8 and properly
use NUMA_NO_NODE.
* Make changes to xen_sysctl_numainfo, similar to those made to
xen_sysctl_topologyinfo. (Q: I kept both sets of changes in the same
patch #3 to avoid bumping interface version twice.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
xen/common/sysctl.c | 73 +++
xen/include/public/sysctl.h | 29 +
2 files changed, 102 insertions(+), 0 deletions(-)
diff --git a/xen/common/sysctl.c
On 02/09/2015 01:53 PM, Tamas K Lengyel wrote:
In preparation for allowing for introspecting ARM and PV domains the old
control interface via the hvm_op hypercall is retired. A new control mechanism
is introduced via the domctl hypercall: monitor_op.
This patch aims to establish a base API on
On 02/09/2015 01:53 PM, Tamas K Lengyel wrote:
In this patch we mechanically rename mem_event to vm_event. This patch
introduces no logic changes to the code. Using the name vm_event better
describes the intended use of this subsystem, which is not limited to memory
events. It can be used for
On 02/09/2015 01:53 PM, Tamas K Lengyel wrote:
The XSM label vm_event_op has been used to control the three memops
controlling mem_access, mem_paging and mem_sharing. While these systems
rely on vm_event, these are not vm_event operations themselves. Thus,
in this patch we introduce three
On 02/09/2015 01:53 PM, Tamas K Lengyel wrote:
The vm_event subsystem has been artifically tied to the presence of mem_access.
While mem_access does depend on vm_event, vm_event is an entirely independent
subsystem that can be used for arbitrary function-offloading to helper apps in
domains.
On 07/02/2015 01:15, Oleksandr Tyshchenko wrote:
Hi Julien
Hi Oleksandr,
On Thu, Feb 5, 2015 at 6:36 PM, Oleksandr Tyshchenko
Let me describe in detail about solution #3 before answer to your
question. Maybe I missed something in
the first mail. Also the Ian's answer clarified to me some
Hello Steven,
upgrades from Xen 4.4 to 4.5 are supposed to work out of the box.
Please post more details and we'll try to help you figure out what's
wrong.
Cheers,
Stefano
On Sun, 8 Feb 2015, Steven Haigh wrote:
Hi all,
I was under the impression that you should be able to do in-place
Thanks Stefano,
I wanted to make sure I was correct with this belief before I posted all
the info.
I'll gather as much info as I can in the next day or so and see what we
can do.
On 9/02/2015 7:35 PM, Stefano Stabellini wrote:
Hello Steven,
upgrades from Xen 4.4 to 4.5 are supposed to work
On 10 February 2015 at 15:26, Ian Campbell ian.campb...@citrix.com wrote:
On Tue, 2015-02-10 at 07:00 +, Stefano Stabellini wrote:
On Fri, 30 Jan 2015, Ard Biesheuvel wrote:
This patch registers hvc0 as the preferred console if no console
has been specified explicitly on the kernel
On Tue, 2015-02-10 at 07:00 +, Stefano Stabellini wrote:
On Fri, 30 Jan 2015, Ard Biesheuvel wrote:
This patch registers hvc0 as the preferred console if no console
has been specified explicitly on the kernel command line.
The purpose is to allow platform agnostic kernels and boot
Hi Stefano,
On 10/02/2015 15:00, Stefano Stabellini wrote:
On Fri, 30 Jan 2015, Ard Biesheuvel wrote:
This patch registers hvc0 as the preferred console if no console
has been specified explicitly on the kernel command line.
The purpose is to allow platform agnostic kernels and boot images
On Mon, Feb 09, 2015 at 02:13:30AM +, Wang, Xiaoming wrote:
Dear Wilk:
-Original Message-
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
Sent: Saturday, February 7, 2015 2:12 AM
To: Wang, Xiaoming
Cc: r...@linux-mips.org; boris.ostrov...@oracle.com;
In preparation for allowing for introspecting ARM and PV domains the old
control interface via the hvm_op hypercall is retired. A new control mechanism
is introduced via the domctl hypercall: monitor_op.
This patch aims to establish a base API on which future applications can build
on.
The vm_event subsystem has been artifically tied to the presence of mem_access.
While mem_access does depend on vm_event, vm_event is an entirely independent
subsystem that can be used for arbitrary function-offloading to helper apps in
domains. This patch removes the dependency that mem_access
The name of one of the mem_event rings still implies it is used only
for memory accesses, which is no longer the case. It is also used to
deliver various HVM events, thus the name monitor is more appropriate
in this setting.
The mem_event subop definitions are also shortened to be more
From: Razvan Cojocaru rcojoc...@bitdefender.com
The public mem_event structures used to communicate with helper applications via
shared rings have been used in different settings. However, the variable names
within this structure have not reflected this fact, resulting in the reuse of
variables
The flag is only used for debugging purposes, thus it should be only checked
for in debug builds of Xen.
Signed-off-by: Tamas K Lengyel tamas.leng...@zentific.com
---
xen/arch/x86/mm/mem_sharing.c | 2 ++
xen/arch/x86/mm/p2m.c | 2 ++
xen/common/mem_access.c | 2 ++
3 files
This patch series aims to clean up the mem_event subsystem within Xen. The
original use-case for this system was to allow external helper applications
running in privileged domains to control various memory operations performed
by Xen. Amongs these were paging, sharing and access control. The
The memop handler function for paging/sharing responsible for calling XSM
doesn't really have anything to do with vm_event, thus in this patch we
relocate it into mem_paging_memop and mem_sharing_memop. This has already
been the approach in mem_access_memop, so in this patch we just make it
The spin-lock implementation in the xen-access test program is implemented
in a fashion that is actually incomplete. The x86 assembly that guarantees that
the lock is held by only one thread lacks the lock; instruction.
However, the spin-lock is not actually necessary in xen-access as it is not
Wei Liu writes (Re: [PATCH 4/4] libxl: More probably detect reentry of
destroyed ctx):
On Mon, Feb 09, 2015 at 03:51:12PM +, Ian Jackson wrote:
In libxl_ctx_free:
1. Move the GC_INIT earlier, so that we can:
Acked-by: Wei Liu wei.l...@citrix.com
Thanks.
+
We are going to want to reuse this, so separate out the computation of
$cond and @params.
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
sg-report-job-history | 15 ++-
1 file changed, 6 insertions(+), 9 deletions(-)
diff --git a/sg-report-job-history
The current sanity check when enabling mem_event is only applicable
to mem_access.
Signed-off-by: Tamas K Lengyel tamas.leng...@zentific.com
---
xen/common/mem_event.c | 4
xen/include/asm-x86/p2m.h | 8 +---
xen/include/public/domctl.h | 1 -
3 files changed, 1 insertion(+), 12
Monday, February 9, 2015, 5:36:28 PM, you wrote:
On 09.02.15 at 16:18, david.vra...@citrix.com wrote:
On 09/02/15 15:03, Sander Eikelenboom wrote:
Hi Jan / David / Konrad,
I was just testing a 3.19 kernel on my intel machine and again
ran into the sporadically appearing irq nobody cared
On Mon, Feb 9, 2015 at 4:02 AM, Peter Zijlstra pet...@infradead.org wrote:
On Mon, Feb 09, 2015 at 03:04:22PM +0530, Raghavendra K T wrote:
So we have 3 choices,
1. xadd
2. continue with current approach.
3. a read before unlock and also after that.
For the truly paranoid we have
Dear Wilk:
-Original Message-
From: Konrad Rzeszutek Wilk [mailto:konrad.w...@oracle.com]
Sent: Monday, February 9, 2015 11:36 PM
To: Wang, Xiaoming
Cc: r...@linux-mips.org; boris.ostrov...@oracle.com;
david.vra...@citrix.com; linux-m...@linux-mips.org; linux-
Hi Ard,
I did an implementation of BaseSynchronizationLib for ARM(32) a couple years
ago. I am not sure why I have never pushed this patch upstream.
Anyway, feel free to use it and push it upstream after reviewing it and adding
support for AArch64.
Contributed-under: TianoCore Contribution
The main comment I will make on this patch is to rename redistributor
interface into redistributor region.
The Device Tree binding actually defines the entry as 'GIC Redistributor
region' or 'GIC Redistributors':
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
stable/for-linus-3.20-rc0-tag
xen: features and fixes for 3.20-rc0
- - Reworked handling for foreign (grant mapped) pages to simplify the
code,
On Mon, 2015-02-09 at 14:28 +0800, Chen, Tiejun wrote:
What about this?
I've not read the code in detail,since I'm travelling but from a quick
glance it looks to be implementing the sort of thing I meant, thanks.
A couple of higher level comments:
I'd suggest to put the code for reading the
Hi,
At 11:25 + on 09 Feb (1423477508), Andrew Cooper wrote:
In the case of a crash, nmi_shootdown_cpus() patches nmi_crash() into the IDT
of each processor, such that the next NMI it receives will force it into the
crash path.
c/s 7dd3b06ff vmx: fix handling of NMI VMEXIT fixed one
On Mon, Feb 9, 2015 at 10:31 AM, Julien Grall julien.gr...@linaro.org wrote:
On 07/02/2015 01:15, Oleksandr Tyshchenko wrote:
Hi Julien
Hi Oleksandr,
Hi Julien
On Thu, Feb 5, 2015 at 6:36 PM, Oleksandr Tyshchenko
Let me describe in detail about solution #3 before answer to your
El 05/02/15 a les 11.42, Ian Campbell ha escrit:
On Tue, 2015-01-20 at 13:47 +0100, Roger Pau Monné wrote:
Hello,
I should probably have done this earlier because I've been aware of this
issue for a long time (since I've started dealing with the PV blk protocol).
The current way to describe
On 09/02/2015 18:53, Ian Campbell wrote:
On Mon, 2015-02-09 at 16:31 +0800, Julien Grall wrote:
It seems logical to me that destroy/create domd in a row working fine.
But this use-case is too simple :).
Let's imagine we decide to start classical domains (i.e no 1:1 mapping)
before creating
On 09/02/15 11:43, Tim Deegan wrote:
Hi,
At 11:25 + on 09 Feb (1423477508), Andrew Cooper wrote:
In the case of a crash, nmi_shootdown_cpus() patches nmi_crash() into the IDT
of each processor, such that the next NMI it receives will force it into the
crash path.
c/s 7dd3b06ff vmx: fix
On Mon, Feb 09, 2015 at 09:07:13AM +, Ian Campbell wrote:
On Fri, 2015-02-06 at 17:23 +, Stefano Stabellini wrote:
One of the main issues outstanding from when Anthony originally posted
his patches is how we want to go about building this? I honestly do
not know how well the
On Mon, 2015-02-09 at 12:01 +0100, Roger Pau Monné wrote:
El 05/02/15 a les 11.42, Ian Campbell ha escrit:
On Tue, 2015-01-20 at 13:47 +0100, Roger Pau Monné wrote:
Hello,
I should probably have done this earlier because I've been aware of this
issue for a long time (since I've started
Hi All!
On Tue, Jan 20, 2015 at 2:47 PM, Roger Pau Monné roger@citrix.com
wrote:
Hello,
I should probably have done this earlier because I've been aware of this
issue for a long time (since I've started dealing with the PV blk
protocol).
The current way to describe PV protocols in Xen
This series implements libvirt save, restore and migration test in OSSTest.
The first 5 patches are used to
1. separate save / restore support from migration support;
2. introduce notion of local / remote migration support.
With the above changes we lay the ground to test libvirt's save /
Libvirt's test suite needs it.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
ts-xen-build-prep | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-xen-build-prep b/ts-xen-build-prep
index
Libvirt supports migrating a guest to remote host but not local host.
Distinguish the concept of local migration support and remote migration
support.
Toolstack's migrate_check now takes an extra argument to indicate which
mode we're interested in.
In sg-run-job we still check for local
Libvirt's configuration converter doesn't know how to deal with BIOS
selection. The end result is it always use the default one (seabios).
Stub out ovmf and rombios to avoid false positive results.
This restriction will be removed once libvirt's converter knows how to
deal with BIOS selection.
We're interested in xlconfigtest. Since we're running test anyway run
the whole suite.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
ts-libvirt-build | 23 +--
1 file changed, 13
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
Osstest/Toolstack/libvirt.pm | 11 ---
1 file changed, 8 insertions(+), 3 deletions(-)
diff --git a/Osstest/Toolstack/libvirt.pm
Since we've introduced different checks for save / restore and local
migration, it's possible to run save / restore tests without running
local migration tests.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
From: Ian Jackson ian.jack...@eu.citrix.com
Signed-off-by: Ian Jackson ian.jack...@eu.citrix.com
---
sg-run-job | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/sg-run-job b/sg-run-job
index 2cf810a..cc2ab3b 100755
--- a/sg-run-job
+++ b/sg-run-job
@@ -289,7 +289,9 @@ proc
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
ts-saverestore-support-check | 27 +++
1 file changed, 27 insertions(+)
create mode 100755 ts-saverestore-support-check
diff --git
The name onetoolstack in confusing. Currently it's in fact referring
to the toolstack used to test pair migration, so rename it to
pairtoolstack.
No functional changes introduced.
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
make-flight | 21 ++---
1 file changed, 14 insertions(+), 7 deletions(-)
diff --git a/make-flight b/make-flight
index 8ac3a87..dabcacd 100755
---
In the case of a crash, nmi_shootdown_cpus() patches nmi_crash() into the IDT
of each processor, such that the next NMI it receives will force it into the
crash path.
c/s 7dd3b06ff vmx: fix handling of NMI VMEXIT fixed one issue but
inadvertently introduced another. The original use of
Signed-off-by: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
make-flight | 13 +++--
mfi-common | 6 +-
2 files changed, 16 insertions(+), 3 deletions(-)
diff --git a/make-flight b/make-flight
index
1 - 100 of 144 matches
Mail list logo