On Sat, Nov 05, 2016 at 02:09:22PM +0100, Dario Faggioli wrote:
> On Fri, 2016-11-04 at 14:36 -0400, Kevin O'Connor wrote:
> > On Fri, Nov 04, 2016 at 07:06:07PM +0100, Dario Faggioli wrote:
> > > And even more to this:
> > > https://lists.debian.org/debian-gcc/2016/10/msg00147.html
> > >
> > > A
On Fri, Nov 04, 2016 at 11:35:20AM -0400, Daniel De Graaf wrote:
> Add two missing allow rules:
>
> 1. Device model domain construction uses getvcpucontext, discovered by
> Andrew Cooper in an (apparently) unrelated bisection.
>
> 2. When a domain is destroyed with a device passthrough active,
flight 101965 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101965/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 11 guest-start fail REGR. vs. 101909
flight 101964 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101964/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 92983
ACPI builder marks VCPUS set in vcpu_online map as enabled in MADT.
With ACPI-based CPU hotplug we only want VCPUs that are started by
the guest to be marked as such. Remaining VCPUs will be set to
"enable" by ACPI code during hotplug.
Signed-off-by: Boris Ostrovsky
No IOREQ server installed for an HVM guest (as indicated
by HVM_PARAM_NR_IOREQ_SERVER_PAGES being set to zero) implies
a PVH guest. These guests need to handle ACPI-related IO
accesses.
Logic for the handler will be provided by a later patch.
Signed-off-by: Boris Ostrovsky
ACPI hotplug-related IO accesses (to GPE0 block) are handled
by qemu for HVM guests. Since PVH guests don't have qemu these
accesses will need to be procesed by the hypervisor.
Because ACPI event model expects pm1a block to be present we
need to have the hypervisor emulate it as well.
.. and update GPE0 registers.
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/domctl.c | 12
1 file changed, 12 insertions(+)
diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c
index 78b7d4b..8151fd7 100644
--- a/xen/arch/x86/domctl.c
+++
This series adds support for ACPI-based VCPU hotplug for unprivileged
PVH guests.
New XEN_DOMCTL_set_avail_vcpus is introduced and is called during
guest creation and in response to 'xl vcpu-set' command. This domctl
updates GPE0's status and enable registers and sends an SCI to the
guest using
.. for PVH guests. However, since emulating them for HVM guests
also doesn't seem useful we can have FADT disable those buttons
for both types of guests.
Signed-off-by: Boris Ostrovsky
---
tools/libacpi/static_tables.c | 3 ++-
1 file changed, 2 insertions(+), 1
This domctl is called when a VCPU is hot-(un)plugged to a guest (via
'xl vcpu-set'). While this currently is only intended to be needed by
PVH guests we will call this domctl for all (x86) guests for consistency.
Signed-off-by: Boris Ostrovsky
---
CC: Daniel De Graaf
PVH guests do not have IOAPIC which typically generates an SCI. For
those guests SCI will be provided as a virtual interrupt.
We also move VIRQ_MCA definition out of xen-mca.h to
keep all x86-specific VIRQ_ARCH_* in one place.
Signed-off-by: Boris Ostrovsky
---
Signed-off-by: Boris Ostrovsky
---
CC: Paul Durrant
---
xen/arch/x86/hvm/ioreq.c | 66
1 file changed, 66 insertions(+)
diff --git a/xen/arch/x86/hvm/ioreq.c b/xen/arch/x86/hvm/ioreq.c
index
PM timer is not supported by PVH guests.
Signed-off-by: Boris Ostrovsky
---
tools/firmware/hvmloader/util.c | 3 ++-
tools/libacpi/build.c | 5 +
tools/libacpi/libacpi.h | 1 +
3 files changed, 8 insertions(+), 1 deletion(-)
diff --git
This is the method that will get invoked on an SCI.
Signed-off-by: Boris Ostrovsky
---
tools/libacpi/mk_dsdt.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/tools/libacpi/mk_dsdt.c b/tools/libacpi/mk_dsdt.c
index 4ae68bc..407386a
flight 101958 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101958/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 6 xen-bootfail REGR. vs. 100648
test-amd64-amd64-xl
flight 101961 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101961/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 5 xen-installfail pass in 101952
test-armhf-armhf-libvirt-raw 14
Hi all,
We are pleased to announce another update of Intel GVT-g for Xen.
Intel GVT-g is a full GPU virtualization solution with mediated pass-through,
starting from 4th generation Intel Core(TM) processors with Intel Graphics
processors. A virtual GPU instance is maintained for each VM, with
flight 101966 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101966/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 3ebe9a1a826e8d569bef6045777cc01a5699933d
baseline version:
xen
flight 101954 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101954/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 11 guest-start fail REGR. vs. 101909
flight 101951 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101951/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 92983
21 matches
Mail list logo