We updated these patchs(version_3) again about adding Nested test job into
OSSTest.
Nested virtualization is the function of running a hypervisor inside a virtual
machine.
The hypervisor that runs on the real hardware is called a level 0 or L0;
The hypervisor that runs as a guest inside L0 is
From: longtao.pang longtaox.p...@intel.com
This patch is used for building XEN and HVM Dom0 kernel for L1 guest VM,
and then reboot L1 guest into xen kernel.
---
sg-run-job |1 +
ts-xen-install | 149 +---
2 files changed, 111
From: longtao.pang longtaox.p...@intel.com
This patch is used for inserting nested test job name and runvars into
standalone.db database after execute command './standalone-reset'.
---
make-flight | 19 +++
mfi-common |8
2 files changed, 27 insertions(+)
diff
On 09.12.14 at 19:05, li...@eikelenboom.it wrote:
Tuesday, December 9, 2014, 6:29:08 PM, you wrote:
I see these too when Dom0 shuts down,
at least for certain drivers. For HVM arguably qemu might know
better and tear things down properly, but in no event are these
messages - when occurring
On 09.12.14 at 18:52, wei.l...@citrix.com wrote:
On Tue, Dec 09, 2014 at 04:46:22PM +, Jan Beulich wrote:
On 01.12.14 at 16:33, wei.l...@citrix.com wrote:
+ */
+
+#ifndef __HVMLOADER_VNUMA_H__
+#define __HVMLOADER_VNUMA_H__
+
+#include xen/memory.h
+
+#define MAX_VNODES
On 10.12.14 at 02:07, kevin.t...@intel.com wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Tuesday, December 09, 2014 6:50 PM
On 09.12.14 at 11:37, yu.c.zh...@linux.intel.com wrote:
On 12/9/2014 6:19 PM, Paul Durrant wrote:
I think use of an raw mfn value currently works only
flight 32162 xen-4.2-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32162/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 31897
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, December 10, 2014 4:39 PM
On 10.12.14 at 02:07, kevin.t...@intel.com wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Tuesday, December 09, 2014 6:50 PM
On 09.12.14 at 11:37, yu.c.zh...@linux.intel.com wrote:
From: Tian, Kevin
Sent: Wednesday, December 10, 2014 4:48 PM
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, December 10, 2014 4:39 PM
On 10.12.14 at 02:07, kevin.t...@intel.com wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Tuesday, December 09, 2014
On 10.12.14 at 04:39, kevin.t...@intel.com wrote:
1. It's more efficient for new people to start from a small, well-defined
task
in one area, and then spanning to adjacent areas gradually. Patience must
be given by the community to help them grow;
Yes. But if a large item like the RMRR one
On 09.12.14 at 18:49, roger@citrix.com wrote:
El 09/12/14 a les 18.19, Jan Beulich ha escrit:
On 09.12.14 at 18:01, roger@citrix.com wrote:
For 4.6 I think we need to start using a different hvm_io_bitmap for PVH
Dom0 that allows direct access to the IO ports, bypassing the vmexit and
On Tue, Dec 09, Ian Jackson wrote:
Bottom line: as relevant maintainer, I'm afraid I'm going to insist
that this script be in /etc.
I dont agree with the reasoning, but to get this done:
Which place would that be, XEN_SCRIPT_DIR?
I don't think this script wants to contain an option parser!
On 10.12.14 at 09:47, kevin.t...@intel.com wrote:
two translation paths in assigned case:
1. [direct CPU access from VM], with partitioned PCI aperture
resource, every VM can access a portion of PCI aperture directly.
- CPU page table/EPT: CPU virtual address-PCI aperture
- PCI aperture
On Tue, 2014-12-09 at 22:11 +, xen.org wrote:
flight 32180 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32180/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt5 libvirt-build
Please don't top post.
On Wed, 2014-12-10 at 07:09 +, Mao Mingya wrote:
From the the arch arm, since the stubdom is not supported now. Does the
device to be shared between doms have to be pv front/backend structure.
Yes.
There is no equivalent to the x86 hvm type guest, i.e. one which
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, December 10, 2014 5:17 PM
On 10.12.14 at 09:47, kevin.t...@intel.com wrote:
two translation paths in assigned case:
1. [direct CPU access from VM], with partitioned PCI aperture
resource, every VM can access a portion of
On Wed, 2014-12-10 at 08:07 +, Jan Beulich wrote:
Commit 545607eb3c (x86: fix various issues with handling guest IRQs)
wasn't really consistent in one respect: The granting of access to an
IRQ shouldn't assume the pIRQ-IRQ translation to be the same in both
domains. In fact it is wrong to
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, December 10, 2014 5:01 PM
On 10.12.14 at 04:39, kevin.t...@intel.com wrote:
1. It's more efficient for new people to start from a small, well-defined
task
in one area, and then spanning to adjacent areas gradually. Patience
On 10.12.14 at 10:53, ian.campb...@eu.citrix.com wrote:
On Wed, 2014-12-10 at 08:07 +, Jan Beulich wrote:
Commit 545607eb3c (x86: fix various issues with handling guest IRQs)
wasn't really consistent in one respect: The granting of access to an
IRQ shouldn't assume the pIRQ-IRQ
On Wed, 2014-12-10 at 10:15 +0100, Olaf Hering wrote:
I was imagining a named parameter as SuS calls them. One or both
the sites which run this wrapper script would pass an environment
variable. Something like this in the script:
$xenstored_do_exec $XENSTORED $@
On 10.12.14 at 07:00, m...@linux.com wrote:
On Thu, Nov 06, 2014 at 09:27:59PM +, Andrew Cooper wrote:
On 06/11/2014 19:32, Konrad Rzeszutek Wilk wrote:
On Thu, Nov 06, 2014 at 03:07:10PM +, Paul Durrant wrote:
To perform certain hypercalls HVM guests need to use Xen's idea of
On 10.12.14 at 02:14, kevin.t...@intel.com wrote:
From: Tim Deegan [mailto:t...@xen.org]
It's been suggested before that we should revive this hypercall, and I
don't think it's a good idea. Whenever a domain needs to know the
actual MFN of another domain's memory it's usually because the
On 10/12/14 06:00, Matt Wilson wrote:
On Thu, Nov 06, 2014 at 09:27:59PM +, Andrew Cooper wrote:
On 06/11/2014 19:32, Konrad Rzeszutek Wilk wrote:
On Thu, Nov 06, 2014 at 03:07:10PM +, Paul Durrant wrote:
To perform certain hypercalls HVM guests need to use Xen's idea of
What are
On 10.12.14 at 11:19, julien.gr...@linaro.org wrote:
Hi Jan,
On 10/12/2014 08:07, Jan Beulich wrote:
Commit 545607eb3c (x86: fix various issues with handling guest IRQs)
wasn't really consistent in one respect: The granting of access to an
IRQ shouldn't assume the pIRQ-IRQ translation to
On Tue, 2014-12-09 at 15:54 +, Ian Jackson wrote:
Version 1 had:
Tested-by: Ian Campbell ian.campb...@citrix.com
but that does not apply any more from patch 5 onwards since patch 5
has changed.
Ian C, do you still have the setup you used to test v1 ?
Yes, and I've just rerun with this
At 01:14 + on 10 Dec (1418170461), Tian, Kevin wrote:
From: Tim Deegan [mailto:t...@xen.org]
Sent: Tuesday, December 09, 2014 6:47 PM
At 18:10 +0800 on 09 Dec (1418145055), Yu, Zhang wrote:
Hi all,
As you can see, we are pushing our XenGT patches to the upstream. One
On 10/12/14 09:51, Tian, Kevin wrote:
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, December 10, 2014 5:17 PM
On 10.12.14 at 09:47, kevin.t...@intel.com wrote:
two translation paths in assigned case:
1. [direct CPU access from VM], with partitioned PCI aperture
resource,
On 10.12.14 at 11:54, wei.l...@citrix.com wrote:
On Wed, Dec 10, 2014 at 08:20:38AM +, Jan Beulich wrote:
On 09.12.14 at 19:06, wei.l...@citrix.com wrote:
On Tue, Dec 09, 2014 at 04:53:40PM +, Jan Beulich wrote:
On 01.12.14 at 16:33, wei.l...@citrix.com wrote:
+
On Wed, Dec 10, 2014 at 11:06:20AM +, Jan Beulich wrote:
On 10.12.14 at 11:54, wei.l...@citrix.com wrote:
On Wed, Dec 10, 2014 at 08:20:38AM +, Jan Beulich wrote:
On 09.12.14 at 19:06, wei.l...@citrix.com wrote:
On Tue, Dec 09, 2014 at 04:53:40PM +, Jan Beulich wrote:
On
flight 32164 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32164/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-sedf 7 debian-installfail REGR. vs. 32095
test-amd64-i386-pair
Hi Kevin,
Thanks for taking the time to work through this.
At 03:39 + on 10 Dec (1418179184), Tian, Kevin wrote:
1. It's more efficient for new people to start from a small, well-defined task
in one area, and then spanning to adjacent areas gradually. Patience must
be given by the
Implemented xmem_pool_check(), xmem_pool_check_locked() and
xmem_pool_check_unlocked() to verity the integrity of the TLSF matrix.
Signed-off-by: Mihai Donțu mdo...@bitdefender.com
---
Changes since v2:
- print the name of the corrupted pool
- adjusted the messages to better fit within 80
flight 32194 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32194/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 32117
Tests which did not
On Wed, 10 Dec 2014 14:13:58 +0200 Mihai Donțu wrote:
Implemented xmem_pool_check(), xmem_pool_check_locked() and
xmem_pool_check_unlocked() to verity the integrity of the TLSF matrix.
Signed-off-by: Mihai Donțu mdo...@bitdefender.com
---
Changes since v2:
- print the name of the
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
This file was created to work around Debian bug #633127.
According to Debian bug tracker [0], this bug is fixed in Wheezy. As
we're now using Wheezy in OSSTest we can safely remove this overlay
file.
Also add a note to reference #633127
On 10.12.14 at 13:13, mdo...@bitdefender.com wrote:
+#define xmem_pool_check_locked(pool) __xmem_pool_check_locked(__FILE__,
__LINE__, pool)
+static bool_t __xmem_pool_check_locked(const char *file, int line, const
struct xmem_pool *pool)
Long lines.
+{
+int i;
unsigned int
+
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
Signed-off-by: Wei Liu wei.l...@citrix.com
---
mfi-common | 23 ++-
1 file changed, 22 insertions(+), 1 deletion(-)
diff --git a/mfi-common b/mfi-common
index 5c4f5d5..e772086 100644
--- a/mfi-common
+++
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
+test_matrix_do_one () {
+
+ test_xsm=$(xenbranch_wants_xsm_tests)
+
+ # Basic PV Linux test with xl
+ for xsm in $test_xsm ; do
+do_pv_linux_xl_test_one $xsm
+ done
Perhaps push this down into do_pv_debian_tests which contains
On Wed, Dec 10, 2014 at 01:12:23PM +, Ian Campbell wrote:
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
Signed-off-by: Wei Liu wei.l...@citrix.com
---
mfi-common | 23 ++-
1 file changed, 22 insertions(+), 1 deletion(-)
diff --git a/mfi-common
On Wed, 2014-12-10 at 13:41 +, Wei Liu wrote:
On Wed, Dec 10, 2014 at 12:54:05PM +, Ian Campbell wrote:
#690538 relates to providing an option to remove the submenus. Please
can the changelog explain why that is relevant to us.
Because somebody else thought not making submenu
On Wed, Dec 10, 2014 at 01:05:22PM +, Ian Campbell wrote:
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
Signed-off-by: Wei Liu wei.l...@citrix.com
Looks like Ian J acked v2 in
21559.64364.468553.506...@mariner.uk.xensource.com.
---
ts-xen-build | 12
1 file
On Wed, 2014-12-10 at 13:50 +, Wei Liu wrote:
On Wed, Dec 10, 2014 at 01:47:06PM +, Ian Campbell wrote:
On Wed, 2014-12-10 at 13:41 +, Wei Liu wrote:
On Wed, Dec 10, 2014 at 12:54:05PM +, Ian Campbell wrote:
#690538 relates to providing an option to remove the submenus.
On Wed, 2014-12-10 at 19:24 +0530, Balbir Singh wrote:
I've been facing an issue on my Ubuntu box (acting as dom0) with
xen-4.5 (HEAD). I am running dom0 3.13.0.19-generic (ubuntu). When I
try and xl command I see the command hangs, after a while I see the
guest kernel complain. I've tried a
Ian Campbell writes ([PATCH OSSTEST] Add basic PVH flights.):
These are the usual PV debian flights with pvh=1 added to the
configuration file.
A job is created for each of Intel and AMD, although obviously AMD is
expected to fail at the moment.
...
Beyond that I've not tested this at all I
On Wed, 2014-12-10 at 13:56 +, Ian Jackson wrote:
Ian Campbell writes ([PATCH OSSTEST] Add basic PVH flights.):
These are the usual PV debian flights with pvh=1 added to the
configuration file.
A job is created for each of Intel and AMD, although obviously AMD is
expected to fail
On Wed, 2014-12-10 at 14:03 +, Ian Jackson wrote:
Ian Campbell writes (Re: [PATCH OSSTEST] Add basic PVH flights.):
On Wed, 2014-12-10 at 13:56 +, Ian Jackson wrote:
This should probably be
+ $cfg =~ s/^pvh\b.*//mg;
unless you deliberately intend to strip out
On Wed, 2014-12-10 at 14:12 +, David Vrabel wrote:
On 10/12/14 13:42, John wrote:
David,
This patch you put into 3.18.0 appears to break the latest version of
stubdomains. I found this out today when I tried to update a machine to
3.18.0 and all of the domUs crashed on start with
flight 32192 linux-next real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32192/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl5 xen-boot fail REGR. vs. 32141
On Wed, Dec 10, 2014 at 04:56:03PM +0100, Juergen Gross wrote:
With the virtual mapped linear p2m list the post-init mmu operations
must be used for setting up the p2m mappings, as in case of
CONFIG_FLATMEM the init routines may trigger BUGs.
Um, could you explain a bit more of why the
On Wed, 2014-12-10 at 15:29 +, David Vrabel wrote:
On 10/12/14 15:07, Ian Campbell wrote:
On Wed, 2014-12-10 at 14:12 +, David Vrabel wrote:
On 10/12/14 13:42, John wrote:
David,
This patch you put into 3.18.0 appears to break the latest version of
stubdomains. I found this
On Tue, Dec 09, 2014 at 03:25:29PM +, Ian Jackson wrote:
Ian Campbell writes (Re: [Xen-devel] [PATCH] libxl: Fix building
libxlu_cfg_y.y with bison 3.0):
There was a point in time where the prevailing version of bison (or
maybe flex) in stable distro releases had a bug which meant these
On Tue, Dec 09, 2014 at 04:43:22PM +, Andrew Cooper wrote:
The error handling from a failed memory allocation should return
PyErr_SetFromErrno(xc_error_obj); rather than simply calling it and continuing
to the memcpy() below, with the dest pointer being NULL.
Coverity also complains
On Tue, Dec 09, 2014 at 03:56:46PM -0500, Boris Ostrovsky wrote:
On 12/09/2014 09:25 AM, Vitaly Kuznetsov wrote:
flush_op is unambiguously defined by feature_flush:
REQ_FUA | REQ_FLUSH - BLKIF_OP_WRITE_BARRIER
REQ_FLUSH - BLKIF_OP_FLUSH_DISKCACHE
0 - 0
and thus can be removed.
On Wed, Dec 10, Ian Campbell wrote:
Separately from the above I wonder if it might be worth moving the
xenstore readiness check into the xen-init-dom0 helper and having most
things which currently depend on xenstore actually depend on the
dom0-is-ready unit, which itself depends on xenstored,
On 10/12/14 15:56, Juergen Gross wrote:
With the virtual mapped linear p2m list the post-init mmu operations
must be used for setting up the p2m mappings, as in case of
CONFIG_FLATMEM the init routines may trigger BUGs.
Reported-by: Boris Ostrovsky boris.ostrov...@oracle.com
Signed-off-by:
by installing some dependencies, shipping the archive, untaring
and building the sources.
This accepts two parametrs, in the form 'host=somehost someguest',
as most of the ts-guest-xxx scripts. If only the first one is
provided, it must be 'host=somehost', and the script will prep
the host.
As
From: Dario Faggioli raist...@linux.it
As an analogue to target_putfilecontents_[root_]stash().
(While at it, fix one whitespace damaged line.)
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson
in sources.list, so installing packages in the guest with
apt-get does not stall waiting for the install CD to be
inserted.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
From: Dario Faggioli raist...@linux.it
In fact, in setupboot_grub2(), if we are interested
in a Linux baremetal entry, there is no point in
asking for the entry to contain an hypervisor line
(Hv).
Also, in such entry, Linux kernel and initrd are to be
found in linux and initrd lines, rather than
and store them in $c{Stash}, in a file named according
to the following convention:
$hostname--$benchname-$benchparams
i.e., something like this:
debian--unixbench-i3-c2
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell
There is a runvar called 'unixbench_params', for specifying
the benchmark's runtime arguments.
The commit also adds a couple of generic functions in
TestSupport.pm, for `cat'-ing the content of a file on
the target into a corresponding file in the stash area.
Signed-off-by: Dario Faggioli
It downloads the benchmark (it's just a script) and a linux
kernel archive, necessary for running the benchmark itself,
and store them in c{Images}/benchs.
Default values for the repo URL and actual filename are embedded
in the script itself, and can be overridden as usual (e.g., via
From: Dario Faggioli raist...@linux.it
Mangle the results of a run of unixbench a bit, so that
they can be plotted. This also produces a (gnu)plot script
and the plot itself. All is saved in $stash, for the
running flight and job.
This is done in a new Osstest/Benchmarking.pm module, as
the
Recipes are defined for prepping and running
the unixbench benchmark on the host and on
Debian PV and HVM guests.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
There is a runvar called 'kernbench_params', for specifying
the benchmark's runtime arguments.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
ts-kernbench-run | 63
From: Dario Faggioli raist...@linux.it
Extract the data from the output of kernbench and produce
the tables, the gnuplot script and the plots.
All is saved in $stash, for the running flight and job.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian
Recipes are defined for prepping and running kernbench
on the host and on Debian PV and HVM guests.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
sg-run-job | 29
for making it possible to call the new make-bench-flight
script, and generating the benchmarking jobs. It can be
combined with the existing '-f' option, to create a
benchmarking flight containing all the benchmarking jobs.
This is generic, so, when passing '-t sometype', a script
called
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
make-bench-flight | 55 -
1 file changed, 42 insertions(+), 13
From: Dario Faggioli raist...@linux.it
the goal is to run a benchmark both in a guest and
on baremetal, to investigate the performances loss
due to the virtualization overhead.
In order to help accomplishing this, the new script
introduced by this commit modifies the host's boot
configuration as
From: Dario Faggioli raist...@linux.it
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson ian.jack...@eu.citrix.com
---
Osstest/Debian.pm | 32 +---
From: Dario Faggioli raist...@linux.it
in order to have an additional graph, comparing host and
guests performance when running kernbench.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu wei.l...@citrix.com
Cc: Ian Campbell ian.campb...@citrix.com
Cc: Ian Jackson
From: Dario Faggioli raist...@linux.it
Recipes are defined for running kernbench on baremetal,
and on PV and HVM guests. Jobs making use of those recipes
are instantiated too.
Aim is making investigating performances loss due to
virtualization overhead easy and automatable.
Signed-off-by:
flight 32198 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32198/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 32153
Tests which did not succeed,
On Mon, Dec 08, 2014 at 11:18:05AM +0100, Olaf Hering wrote:
This is a resend of this series, with just the low hanging fruits:
http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg00669.html
This looks like it would fix some of the issues I saw. I will test it
over today.
Please
Dear Xen Developers,
I found handling of vifx.y interfaces slightly unintutive and was
wondering if it is possible to name the interface via the Xen guest
config file?
e.g. a vif_name parameter or otherwise maybe vif interface is automatically
named
after set name entry in config instead of
Hey Jens,
These are two fixes for Xen blkfront. They harden how it deals with
broken backends.
Please git pull the following branch:
git pull git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git
for-jens-3.19
in your for-3.19-drivers branch. This branch is based on:
9af8785 NVMe: Fix
flight 32219 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32219/
Perfect :-)
All tests in this flight passed
version targeted for testing:
rumpuserxen d40acc2019bd352e1de13842459b5fecf5bc565e
baseline version:
rumpuserxen
Signed-off-by: Wei Liu wei.l...@citrix.com
---
Changes in v4:
1. Use true instead of y
---
ts-xen-install |4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/ts-xen-install b/ts-xen-install
index 910181e..08b5fe1 100755
--- a/ts-xen-install
+++ b/ts-xen-install
@@ -46,6
Signed-off-by: Wei Liu wei.l...@citrix.com
---
Changes in v4:
1. Use true and false instead of y and n.
2. Rename xenbranch_wants_xsm_tests to xenbranch_xsm_variants.
---
mfi-common | 23 ++-
1 file changed, 22 insertions(+), 1 deletion(-)
diff --git a/mfi-common
As far as I can tell, there's no value indirecting
the cpu passed to this function via a void *.
Update all the callers and called functions from within
clockevents_notify.
Miscellanea:
Add pr_fmt and convert one printk(KERN_ERR to pr_err
Signed-off-by: Joe Perches j...@perches.com
---
From: Luis R. Rodriguez mcg...@suse.com
Under special circumstances we may want to force
voluntary preemption even for CONFIG_PREEMPT=n
with interrupts disabled. This adds helpers to
let us do that.
Cc: Borislav Petkov b...@suse.de
Cc: David Vrabel david.vra...@citrix.com
Cc: Thomas Gleixner
From: Luis R. Rodriguez mcg...@suse.com
Xen has support for splitting heavy work work into a series
of hypercalls, called multicalls, and preempting them through
what Xen calls continuation [0]. Despite this though without
CONFIG_PREEMPT preemption won't happen and while enabling
On Wed, Dec 10, 2014 at 3:34 PM, Luis R. Rodriguez
mcg...@do-not-panic.com wrote:
From: Luis R. Rodriguez mcg...@suse.com
Xen has support for splitting heavy work work into a series
of hypercalls, called multicalls, and preempting them through
what Xen calls continuation [0]. Despite this
On 12/10/2014 03:34 PM, Luis R. Rodriguez wrote:
diff --git a/arch/x86/kernel/entry_32.S b/arch/x86/kernel/entry_32.S
index 344b63f..40b5c0c 100644
--- a/arch/x86/kernel/entry_32.S
+++ b/arch/x86/kernel/entry_32.S
@@ -982,7 +982,28 @@ ENTRY(xen_hypervisor_callback)
ENTRY(xen_do_upcall)
1:
On Wed, Dec 10, 2014 at 03:51:48PM -0800, Andy Lutomirski wrote:
On Wed, Dec 10, 2014 at 3:34 PM, Luis R. Rodriguez
mcg...@do-not-panic.com wrote:
From: Luis R. Rodriguez mcg...@suse.com
Xen has support for splitting heavy work work into a series
of hypercalls, called multicalls, and
On Wed, Dec 10, 2014 at 04:29:06PM -0800, H. Peter Anvin wrote:
On 12/10/2014 03:34 PM, Luis R. Rodriguez wrote:
diff --git a/arch/x86/kernel/entry_32.S b/arch/x86/kernel/entry_32.S
index 344b63f..40b5c0c 100644
--- a/arch/x86/kernel/entry_32.S
+++ b/arch/x86/kernel/entry_32.S
@@ -982,7
From: Jan Beulich [mailto:jbeul...@suse.com]
Sent: Wednesday, December 10, 2014 6:36 PM
On 10.12.14 at 02:14, kevin.t...@intel.com wrote:
From: Tim Deegan [mailto:t...@xen.org]
It's been suggested before that we should revive this hypercall, and I
don't think it's a good idea.
From: Ian Campbell [mailto:ian.campb...@citrix.com]
Sent: Wednesday, December 10, 2014 6:11 PM
On Wed, 2014-12-10 at 01:48 +, Tian, Kevin wrote:
I'm not familiar with Arm architecture, but based on a brief reading it's
for the assigned case where the MMU is exclusive owned by a VM, so
-- Original Message --
From: Ian Campbell ian.campb...@citrix.com
To: Mao Mingya maomingya...@gmail.com
Cc: xen-devel@lists.xen.org
Sent: 10/12/2014 5:47:19 PM
Subject: Re: Re[2]: [Xen-devel] arch arm qemu compile erro
Please don't top post.
On Wed, 2014-12-10 at 07:09 +, Mao
From: Tim Deegan [mailto:t...@xen.org]
Sent: Wednesday, December 10, 2014 7:12 PM
Hi Kevin,
Thanks for taking the time to work through this.
At 03:39 + on 10 Dec (1418179184), Tian, Kevin wrote:
1. It's more efficient for new people to start from a small, well-defined
task
in
branch xen-unstable
xen branch xen-unstable
job build-i386-libvirt
test libvirt-build
Tree: gnulib_libvirt
git://drall.uk.xensource.com:9419/git://git.sv.gnu.org/gnulib.git%20[fetch=try]
Tree: libvirt git://libvirt.org/libvirt.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
I am facing this issue when booting Xen Dom0 (OpenSuse Rootfs)
...
[ OK ] Reached target Host and Network Name Lookups.
[ OK ] Started OpenSSH Daemon.
[ TIME ] Timed out waiting for device dev-hvc0.device.
[DEPEND] Dependency failed for Serial Getty on hvc0.
[ OK ] Reached target Login
Based on my experience with PCI passthrough code merging, below are
some comments:
Both require a change in code
a) The current code which is non-pci passthrough requires a devices'
device tree node to be associated with smmu node, if that device has
to be assigned to domU.
In our system there
Good catch Ian!
You are absolutely right! I built everything and it put the tools/etc
in /usr/local. I did not see a link to xencommons, I missed it
completely! Is there any thing else I should care about - any other
daemons/bridge to be setup?
Balbir Singh.
On Wed, Dec 10, 2014 at 7:25 PM, Ian
On 12/10/2014 05:13 PM, Konrad Rzeszutek Wilk wrote:
On Wed, Dec 10, 2014 at 04:56:03PM +0100, Juergen Gross wrote:
With the virtual mapped linear p2m list the post-init mmu operations
must be used for setting up the p2m mappings, as in case of
CONFIG_FLATMEM the init routines may trigger BUGs.
On 12/10/2014 07:07 PM, David Vrabel wrote:
On 10/12/14 15:56, Juergen Gross wrote:
With the virtual mapped linear p2m list the post-init mmu operations
must be used for setting up the p2m mappings, as in case of
CONFIG_FLATMEM the init routines may trigger BUGs.
Reported-by: Boris Ostrovsky
97 matches
Mail list logo