flight 38197 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38197/
Perfect :-)
All tests in this flight passed
baseline version:
flight 38170
jobs:
build-amd64 pass
build-armhf
flight 63218 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63218/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 12
This run is configured for baseline tests only.
flight 38193 qemu-upstream-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38193/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pygrub 10
>>> On 20.10.15 at 14:35, wrote:
> @@ -390,6 +396,18 @@
> * type: Must be XEN_NETIF_EXTRA_TYPE_MCAST_{ADD,DEL}
> * flags: XEN_NETIF_EXTRA_FLAG_*
> * addr: address to add/remove
> + *
> + * XEN_NETIF_EXTRA_TYPE_HASH:
> + *
> + *0 1 2 3 4 5
flight 63147 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63147/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-cubietruck 16 guest-start/debian.repeat fail REGR. vs.
63080
Regressions
On Wed, 2015-10-21 at 17:20 +, Ferger, Max wrote:
> Hi!
>
> I'm sorry, but that didn't do the trick.
Please can you stop top posting, use the customary ">" style of quoting
when replying and trim your quotes to only what is required for context.
Please see
>>> On 20.10.15 at 14:35, wrote:
> +/*
> + * Hash negotiation (only applicable if using multiple queues):
> + *
> + * A backend can advertise a set of hash algorithms that it can perform by
> + * naming it in a space separated list in the "multi-queue-hash-list"
> + *
Hi Ian,
On 22/10/15 17:17, Ian Campbell wrote:
> On Mon, 2015-10-12 at 15:22 +0100, Julien Grall wrote:
>> [...]
>> /* Only migrate the vIRQ if the target vCPU has changed */
>> if ( new_target != old_target )
>> {
>> +unsigned int virq = rank->index *
Hi,
On 22/10/15 16:42, Ian Campbell wrote:
> On Mon, 2015-10-12 at 16:39 +0100, Julien Grall wrote:
>
> Subject: support PSCI v1.0 for the host.
>
>> From Xen point of view, PSCI v0.2 and PSCI v1.0 are very similar. All
>Xen's
>
>> the PSCI calls used within Xen (PSCI_VERSION, CPU_ON,
This run is configured for baseline tests only.
flight 38196 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38196/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf 0f34a051104e2b1b9123d56d48673de4b21bc533
baseline version:
flight 63202 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63202/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 16 guest-start/debian.repeat fail REGR. vs. 63117
Regressions which
On 10/22/2015 12:44 PM, Haozhong Zhang wrote:
On Thu, Oct 22, 2015 at 11:50:18AM -0400, Boris Ostrovsky wrote:
On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
This patch makes the pvclock return the scaled host TSC and
corresponding scaling parameters to HVM domains if guest TSC is not
emulated
In fact, right now, failing at destroying a cpupool is just
not reported to the user in any explicit way. Log an error,
as it is customary for xl in these cases.
While there, take the chance to turn a couple of xl exit
codes into EXIT_[SUCCESS|FAILURE], as discussed and agreed
here:
On 10/22/2015 01:12 PM, Haozhong Zhang wrote:
On Thu, Oct 22, 2015 at 11:55:00AM -0400, Boris Ostrovsky wrote:
On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
If VMX TSC scaling is enabled and no TSC emulation is used,
vmx_set_tsc_offset() will calculate the TSC offset by substracting the
scaled
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 22 October 2015 09:48
> To: Paul Durrant
> Cc: Ian Campbell; Ian Jackson; xen-de...@lists.xenproject.org; Keir
> (Xen.org); Tim (Xen.org)
> Subject: Re: [PATCH v5 3/5] public/io/netif.h: add documentation for hash
>>> On 22.10.15 at 12:45, wrote:
>> -Original Message-
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 22 October 2015 09:51
>> To: Paul Durrant
>> Cc: Ian Campbell; Ian Jackson; xen-de...@lists.xenproject.org; Keir
>> (Xen.org); Tim (Xen.org)
>>
This run is configured for baseline tests only.
flight 38194 linux-4.1 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38194/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-rumpuserxen-amd64 15
> -Original Message-
> From: Ian Campbell [mailto:ian.campb...@citrix.com]
> Sent: 22 October 2015 12:32
> To: Jan Beulich; Paul Durrant
> Cc: Ian Jackson; xen-de...@lists.xenproject.org; Keir (Xen.org); Tim
> (Xen.org)
> Subject: Re: [PATCH v5 3/5] public/io/netif.h: add documentation for
On 2015-10-22 13:31, Prarit Bhargava wrote:
>
>
> On 10/21/2015 03:52 PM, Michal Marek wrote:
>> Dne 21.10.2015 v 21:27 Prarit Bhargava napsal(a):
>>> On 10/15/2015 04:16 PM, Michal Marek wrote:
Otherwise make tags can't parse them:
ctags: Warning: arch/ia64/kernel/smp.c:60: null
On 10/21/2015 03:52 PM, Michal Marek wrote:
> Dne 21.10.2015 v 21:27 Prarit Bhargava napsal(a):
>> On 10/15/2015 04:16 PM, Michal Marek wrote:
>>> Otherwise make tags can't parse them:
>>>
>>> ctags: Warning: arch/ia64/kernel/smp.c:60: null expansion of name pattern
>>> "\1"
>>> ctags: Warning:
On Thu, 2015-10-22 at 05:00 -0600, Jan Beulich wrote:
> > > > On 22.10.15 at 12:44, wrote:
> > > From: Jan Beulich [mailto:jbeul...@suse.com]
> > > Sent: 22 October 2015 09:48
> > > > > > On 20.10.15 at 14:35, wrote:
> > > > + * max-key-length:
On 22/10/15 12:29, Lasya Venneti wrote:
> Hello :-)
>
> Could you please give me a small task I can complete for Outreachy/OPW,
> before the deadline?
In xen/common/sched_credit.c there's a function named __runq_insert()
which takes two arguments: cpu and svc.
However, the cpu argument is
>>> On 20.10.15 at 10:21, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -2088,6 +2088,8 @@ static int hvm_load_cpu_ctxt(struct domain *d,
> hvm_domain_context_t *h)
>
> memcpy(v->arch.xsave_area, ctxt.fpu_regs,
On 10/22/2015 08:06 AM, Michal Marek wrote:
> On 2015-10-22 13:31, Prarit Bhargava wrote:
>>
>>
>> On 10/21/2015 03:52 PM, Michal Marek wrote:
>>> Dne 21.10.2015 v 21:27 Prarit Bhargava napsal(a):
On 10/15/2015 04:16 PM, Michal Marek wrote:
> Otherwise make tags can't parse them:
>
>>> On 22.10.15 at 12:44, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: 22 October 2015 09:48
>> >>> On 20.10.15 at 14:35, wrote:
>> > + * max-key-length: an integer value indicating the maximum key length (in
>> > + *
On Thu, 2015-10-22 at 12:03 +0100, Wei Liu wrote:
> On Thu, Oct 22, 2015 at 11:39:39AM +0100, Ian Campbell wrote:
> > On Thu, 2015-10-22 at 11:28 +0100, Wei Liu wrote:
> > > On Thu, Oct 22, 2015 at 10:50:54AM +0100, Ian Campbell wrote:
> > > > On Wed, 2015-10-21 at 18:34 +0100, Wei Liu wrote:
> >
On Wed, 2015-10-21 at 23:33 +0530, Lasya Venneti wrote:
> Hi,
>
> Can somebody please point me to a resource that talks about scheduler
> design for VMs , in contrast with a standard scheduler ( I have
> consulted Remzi, Operating Systems for this which is pretty easy to
> understand
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 22 October 2015 09:51
> To: Paul Durrant
> Cc: Ian Campbell; Ian Jackson; xen-de...@lists.xenproject.org; Keir
> (Xen.org); Tim (Xen.org)
> Subject: Re: [PATCH v5 4/5] public/io/netif.h: add extra info slots for
>
On Thu, Oct 22, 2015 at 11:39:39AM +0100, Ian Campbell wrote:
> On Thu, 2015-10-22 at 11:28 +0100, Wei Liu wrote:
> > On Thu, Oct 22, 2015 at 10:50:54AM +0100, Ian Campbell wrote:
> > > On Wed, 2015-10-21 at 18:34 +0100, Wei Liu wrote:
> > > > On Wed, Oct 21, 2015 at 05:47:06PM +0100, Ian Campbell
On Wed, 2015-10-21 at 16:23 +0100, Ian Campbell wrote:
> [...]
> v4: Fixed all checkpatch errors.
> Disabled by default.
I botched this and it is no longer possible to turn it on. (I wonder if
anyone would have noticed in practice...)
> @@ -2113,6 +2117,15 @@ if test "$xen_pci_passthrough" !=
Hello :-)
Could you please give me a small task I can complete for Outreachy/OPW,
before the deadline?
Thanks
Lasya V
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
> -Original Message-
> From: xen-devel-boun...@lists.xen.org [mailto:xen-devel-
> boun...@lists.xen.org] On Behalf Of Paul Durrant
> Sent: 22 October 2015 12:43
> To: Ian Campbell; Jan Beulich
> Cc: Ian Jackson; Tim (Xen.org); Keir (Xen.org); xen-
> de...@lists.xenproject.org
> Subject:
Ian Campbell, le Wed 21 Oct 2015 16:24:14 +0100, a écrit :
> We intend to stabilise some parts of the libxenctrl interface by
> splitting out some functionality into separate stable libraries.
>
> This is the mini-os part of the first phase of that change.
>
> This mail is (or is intended to be)
flight 63203 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63203/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm 6 xen-boot fail REGR. vs. 62277
flight 63205 xen-4.2-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63205/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-winxpsp3 16 guest-localmigrate/x10 fail in 63142
REGR. vs. 62380
Should not allocate queues number more than online cpus.
Signed-off-by: Joe Jin
Cc: Boris Ostrovsky
Cc: Konrad Rzeszutek Wilk
Cc: David S. Miller
---
drivers/net/xen-netfront.c |2 +-
1 files
This run is configured for baseline tests only.
flight 38198 xen-4.4-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38198/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 9
On Thu, Oct 22, 2015 at 03:19:19PM -0400, Boris Ostrovsky wrote:
> On 10/22/2015 01:12 PM, Haozhong Zhang wrote:
> >On Thu, Oct 22, 2015 at 11:55:00AM -0400, Boris Ostrovsky wrote:
> >>On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
> >>>If VMX TSC scaling is enabled and no TSC emulation is used,
>
On Thu, 2015-10-22 at 11:28 +0100, Wei Liu wrote:
> On Thu, Oct 22, 2015 at 10:50:54AM +0100, Ian Campbell wrote:
> > On Wed, 2015-10-21 at 18:34 +0100, Wei Liu wrote:
> > > On Wed, Oct 21, 2015 at 05:47:06PM +0100, Ian Campbell wrote:
> > > > On Tue, 2015-10-20 at 16:34 +0100, Ian Jackson wrote:
On Wed, 2015-10-21 at 18:34 +0100, Wei Liu wrote:
> On Wed, Oct 21, 2015 at 05:47:06PM +0100, Ian Campbell wrote:
> > On Tue, 2015-10-20 at 16:34 +0100, Ian Jackson wrote:
> > > Wei Liu writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions
> > > - FAIL"):
> > > > From mere code inspection
flight 63151 xen-4.3-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63151/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-winxpsp3 15 guest-localmigrate.2 fail REGR. vs. 62742
Regressions
On Thu, Oct 22, 2015 at 10:50:54AM +0100, Ian Campbell wrote:
> On Wed, 2015-10-21 at 18:34 +0100, Wei Liu wrote:
> > On Wed, Oct 21, 2015 at 05:47:06PM +0100, Ian Campbell wrote:
> > > On Tue, 2015-10-20 at 16:34 +0100, Ian Jackson wrote:
> > > > Wei Liu writes ("Re: [Xen-devel] [linux-4.1 test]
On Thu, Oct 22, 2015 at 06:53:27AM -0600, Jan Beulich wrote:
> >>> On 28.09.15 at 09:13, wrote:
> > Both VMX TSC scaling and SVM TSC ratio use the 64-bit TSC scaling ratio,
> > but the number of fractional bits of the ratio is different between VMX
> > and SVM. This
Ian Campbell writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions -
FAIL"):
> On Thu, 2015-10-22 at 12:03 +0100, Wei Liu wrote:
> > No, vif-bridge script has two runes for off-lining a vif
> > brctl delif $bridge $vif
> > ifconfig $vif down
> >
> > Neither of these causes cache entry
>>> On 20.10.15 at 10:21, wrote:
> @@ -4784,6 +4804,13 @@ int hvm_msr_write_intercept(unsigned int msr, uint64_t
> msr_content,
> return X86EMUL_EXCEPTION;
> break;
>
> +case MSR_IA32_XSS:
> +/* No XSS features currently supported
>>> On 22.10.15 at 16:26, wrote:
> On 22/10/15 15:20, Jan Beulich wrote:
> On 20.10.15 at 10:21, wrote:
>>> @@ -4784,6 +4804,13 @@ int hvm_msr_write_intercept(unsigned int msr,
>>> uint64_t
> msr_content,
>>> return
>>> On 28.09.15 at 09:13, wrote:
> Both VMX TSC scaling and SVM TSC ratio use the 64-bit TSC scaling ratio,
> but the number of fractional bits of the ratio is different between VMX
> and SVM. This patch makes the architecture code to collect the number of
> fractional
>>> On 28.09.15 at 09:13, wrote:
> This patch adds a field tsc_scaling_ratio in struct arch_vcpu to
Why not in struct hvm_vcpu? Are you intending any use for PV guests?
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -297,6 +297,34 @@ int
flight 63155 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63155/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-migrupgrade 7 xen-install/src_host fail REGR. vs. 63099
From: Paul Durrant
Date: Wed, 21 Oct 2015 11:36:17 +0100
> This series adds xen-netback support for hash negotiation with a frontend
> driver, and an implementation of toeplitz hashing as the initial negotiable
> algorithm.
I'd definitely like to see some XEN networking
On 22/10/15 15:20, Jan Beulich wrote:
On 20.10.15 at 10:21, wrote:
>> @@ -4784,6 +4804,13 @@ int hvm_msr_write_intercept(unsigned int msr,
>> uint64_t msr_content,
>> return X86EMUL_EXCEPTION;
>> break;
>>
>> +case MSR_IA32_XSS:
>> +
>>> On 28.09.15 at 09:13, wrote:
> The existing hvm_set_guest_tsc_fixed() and hvm_get_guest_tsc_fixed()
> calculate the guest TSC by adding the TSC offset to the host TSC. When
> the TSC scaling is enabled, the host TSC should be scaled first. This
> patch adds the
>>> On 28.09.15 at 09:13, wrote:
> Both VMX and SVM saves/loads vcpu's TSC when saving/loading vcpu's
> context, so this patch moves saving/loading vcpu's TSC to the common
> function hvm_save_cpu_ctxt()/hvm_load_cpu_ctxt().
>
> Signed-off-by: Haozhong Zhang
Kindly ping ...
Thanks,
Feng
> -Original Message-
> From: Wu, Feng
> Sent: Monday, October 12, 2015 4:55 PM
> To: xen-devel@lists.xen.org
> Cc: Wu, Feng
> Subject: [PATCH v8 00/17] Add VT-d Posted-Interrupts support
>
> VT-d Posted-Interrupts is an enhancement to CPU
flight 63206 linux-mingo-tip-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63206/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 6 xen-boot fail REGR. vs. 60684
2015-10-14 11:54 GMT-04:00 Dario Faggioli :
> As, curently, there is no reason for bothering having
> it and keeping it updated.
>
> In fact, it is only used for dumping and changing
> vCPUs parameters, but that can be achieved easily with
> for_each_vcpu.
>
> While
This run is configured for baseline tests only.
flight 38199 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/38199/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10
flight 63207 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63207/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-raw 9 debian-di-installfail never pass
test-armhf-armhf-libvirt-qcow2 9
On 10/22/2015 07:14 PM, Dario Faggioli wrote:
In fact, right now, failing at destroying a cpupool is just
not reported to the user in any explicit way. Log an error,
as it is customary for xl in these cases.
While there, take the chance to turn a couple of xl exit
codes into
On 2015-10-22 14:14, Prarit Bhargava wrote:
> On 10/22/2015 08:06 AM, Michal Marek wrote:
>> It used to require a closing parenthesis, so it would not match the
>> multiline macro invocations at all. Now it matches them, but ctags
>> correctly warns that the empty string is probably not what we
>>> On 22.10.15 at 14:10, wrote:
> Actually, one more slightly radical thought... Maybe add a new ring type...
> A command ring, as well as RX and TX rings? This could be used to issue key
> and table update commands to the backend and would be there for other uses in
flight 63159 xen-4.4-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63159/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemuu-winxpsp3 15 guest-localmigrate.2 fail in 63097 pass
in 63159
>>> On 28.09.15 at 09:13, wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -297,6 +297,59 @@ int hvm_set_guest_pat(struct vcpu *v, u64 guest_pat)
> return 1;
> }
>
> +/*
> + * Multiply tsc by a fixed point number represented by ratio.
> +
Hi all,
I am interested in the project Refactor Linux hotplug scripts for
Outreachy(Round 11). I am more of an intermediate-beginner in c. Please can
anyone provide some pointers and helper about the things I need to do to join
this project.
Thanks,
Nadya Ampilogova
flight 63209 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63209/
Perfect :-)
All tests in this flight passed
version targeted for testing:
ovmf a7e173b07a1ef336fc8d753cf85ae8473e92365a
baseline version:
ovmf
Hi,
I was looking to the pod code (arch/x86/mm/p2m-pod.c) and noticed that
the calls to alloc_domheap_page{s,} seems to take wrong parameter:
page = alloc_domheap_pages(d, order, PAGE_ORDER_4K);
p = alloc_domheap_page(d, PAGE_ORDER_4K);
AFAICT the last parameter is the memory flags and not the
Ian Campbell writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions -
FAIL"):
> FWIW I believe the source dom0's ARP entry will be dropped when the VIF
> device is destroyed.
...
> For Linux bridging I believe it happens at the latest when the vif device
> is deleted, or possibly when it is
On Tue, Oct 06, 2015 at 02:17:41PM +0100, Ian Campbell wrote:
> On Tue, 2015-10-06 at 14:06 +0100, Andrew Cooper wrote:
> > On 06/10/15 13:58, Wei Liu wrote:
> > > On Tue, Oct 06, 2015 at 01:52:16PM +0100, Andrew Cooper wrote:
> > > > On 06/10/15 12:35, Juergen Gross wrote:
> > > > > In
On 22/10/15 16:04, Julien Grall wrote:
> Hi,
>
> I was looking to the pod code (arch/x86/mm/p2m-pod.c) and noticed that
> the calls to alloc_domheap_page{s,} seems to take wrong parameter:
>
> page = alloc_domheap_pages(d, order, PAGE_ORDER_4K);
>
> p = alloc_domheap_page(d, PAGE_ORDER_4K);
>
>
On Mon, 2015-10-19 at 08:48 -0600, Jan Beulich wrote:
> It's wired up on x86 only.
>
> Signed-off-by: Jan Beulich
Acked-by: Ian Campbell
(ARM + REST hats)
I tried to apply but it didn't for some reason. I didn't investigate, I
guess you will push
Juergen Gross writes ("Re: [Xen-devel] [PATCH] libxc: remove most of
tools/libxc/xc_dom_compat_linux.c"):
> On 10/06/2015 03:17 PM, Ian Campbell wrote:
> > xc_dom_linux_build is implemented in terms of the non-compat xc_dom_*
> > functions, so it should be possible to do what you want with out
On Thu, 2015-10-22 at 16:22 +0100, Ian Jackson wrote:
> Juergen Gross writes ("Re: [Xen-devel] [PATCH] libxc: remove most of
> tools/libxc/xc_dom_compat_linux.c"):
> > On 10/06/2015 03:17 PM, Ian Campbell wrote:
> > > xc_dom_linux_build is implemented in terms of the non-compat xc_dom_*
> > >
>>> On 22.10.15 at 17:43, wrote:
> @@ -477,7 +477,7 @@ p2m_pod_offline_or_broken_replace(struct page_info *p)
>
> free_domheap_page(p);
>
> -p = alloc_domheap_page(d, PAGE_ORDER_4K);
> +p = alloc_domheap_page(d, 0);
I realize that this is the easiest
On 19/10/15 11:36, Juergen Gross wrote:
> On 10/06/2015 03:17 PM, Ian Campbell wrote:
>> On Tue, 2015-10-06 at 14:06 +0100, Andrew Cooper wrote:
>>> On 06/10/15 13:58, Wei Liu wrote:
On Tue, Oct 06, 2015 at 01:52:16PM +0100, Andrew Cooper wrote:
> On 06/10/15 12:35, Juergen Gross wrote:
>>> On 22.10.15 at 16:40, wrote:
> On Thu, Oct 22, 2015 at 06:53:27AM -0600, Jan Beulich wrote:
>> >>> On 28.09.15 at 09:13, wrote:
>> > --- a/xen/include/asm-x86/hvm/svm/svm.h
>> > +++ b/xen/include/asm-x86/hvm/svm/svm.h
>> > @@ -96,6 +96,7 @@
On Thu, 2015-10-22 at 15:41 +0100, Ian Jackson wrote:
> Ian Campbell writes ("Re: [Xen-devel] [linux-4.1 test] 63030: regressions
> - FAIL"):
> > On Thu, 2015-10-22 at 12:03 +0100, Wei Liu wrote:
> > > No, vif-bridge script has two runes for off-lining a vif
> > > brctl delif $bridge $vif
> > >
>>> On 28.09.15 at 09:13, wrote:
> This patch uses hvm_funcs.tsc_scaling_supported instead of the
> architecture code to detect the TSC scaling support.
>
> Signed-off-by: Haozhong Zhang
Acked-by: Jan Beulich
On Mon, 2015-10-12 at 16:39 +0100, Julien Grall wrote:
Subject: support PSCI v1.0 for the host.
> From Xen point of view, PSCI v0.2 and PSCI v1.0 are very similar. All
Xen's
> the PSCI calls used within Xen (PSCI_VERSION, CPU_ON, SYSTEM_OFF and
> SYSTEM_RESET) behaves exactly the same.
The last parameter of alloc_domheap_page{s,} contain the memory flags and
not the order of the allocation.
Use 0 as it was before 1069d63c5ef2510d08b83b2171af660e5bb18c63
"x86/mm/p2m: use defines for page sizes".
Note that PAGE_ORDER_4K is also equal to 0 so the behavior stays the
same.
On 10/22/2015 10:17 AM, Jan Beulich wrote:
On 28.09.15 at 09:13, wrote:
The existing hvm_set_guest_tsc_fixed() and hvm_get_guest_tsc_fixed()
calculate the guest TSC by adding the TSC offset to the host TSC. When
the TSC scaling is enabled, the host TSC should be
Hello,
No further questions in this message, just a quick wrap-up:
1) Console is now configured.
2) Dom0 kernel is coming up and showing messages.
Very many thanks for all your help!
= Details =
This message should conclude the issue.
Therefore, it summarizes my findings and mistakes, and
flight 63162 xen-4.6-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/63162/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 13 guest-localmigrate
fail REGR. vs. 62677
On Wed, Oct 21, 2015 at 4:02 PM, Stefano Stabellini
wrote:
>> ! = Summary =
>> !
>> ! There seems to be a clear consensus against the current veto model. From
>> ! the comments there was no clear case for a simple majority, but for a
>> higher
>> ! bar of
On 22/10/15 16:07, Ferger, Max wrote:
> Hello,
Hi,
> 2) Dom0 kernel is coming up and showing messages:
>
>> From: Julien Grall [mailto:julien.gr...@citrix.com]
>> Sent: Wednesday, October 21, 2015 8:02 PM
>>
>> To be sure, even the patch I attached on the previous mail doesn't help
>> you to
assert is not async-signal-safe.
In practice the effect of calling assert there is that if the
assertion fails we might get a secondary crash, or other undesirable
behaviour from stdio (which is how assert usually reports failures).
Mention in a comment in libxl__self_pipe_wakeup that it has to
On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
This patch makes the pvclock return the scaled host TSC and
corresponding scaling parameters to HVM domains if guest TSC is not
emulated and TSC scaling is enabled.
Signed-off-by: Haozhong Zhang
---
xen/arch/x86/time.c |
On Thu, Oct 22, 2015 at 11:50:18AM -0400, Boris Ostrovsky wrote:
> On 09/28/2015 03:13 AM, Haozhong Zhang wrote:
> >This patch makes the pvclock return the scaled host TSC and
> >corresponding scaling parameters to HVM domains if guest TSC is not
> >emulated and TSC scaling is enabled.
> >
>
On Wed, 2015-10-21 at 14:07 +0100, Wei Liu wrote:
> The xenstore path to look at when stubdom is in used is different. Libxl
> should look at stubdom path instead.
It took me a while to work this out, so please mention that the VNC in
question is the backend corresponding to the stubdom's PVFB
On Wed, 2015-10-21 at 15:15 +0100, Wei Liu wrote:
> That directory is used to store guest memory dump which contains
> sensitive information.
>
> Signed-off-by: Wei Liu
Acked-by: Ian Campbell
Have you audited all the paths we create and determined
Hi Ian,
On 22/10/15 16:53, Ian Campbell wrote:
> On Mon, 2015-10-12 at 15:22 +0100, Julien Grall wrote:
>
> Subject: "correctly handle" and "writes"
>
>> During a store, the byte is always in the low part of the register (i.e
>> [0:7]).
>>
>> Although, we are masking the register by using a
On Thu, Oct 22, 2015 at 10:05:39AM -0600, Jan Beulich wrote:
> >>> On 22.10.15 at 17:55, wrote:
> > On Thu, Oct 22, 2015 at 07:13:07AM -0600, Jan Beulich wrote:
> >> >>> On 28.09.15 at 09:13, wrote:
> >> > +{
> >> > +
On Mon, 2015-10-19 at 12:39 +0200, Juergen Gross wrote:
> On 10/09/2015 09:08 PM, Konrad Rzeszutek Wilk wrote:
> > On Fri, Oct 09, 2015 at 04:12:12PM +0100, Ian Campbell wrote:
> > > On Thu, 2015-10-08 at 17:23 +0200, Juergen Gross wrote:
> > > > The pv domain builder currently supports the
On Mon, 2015-10-12 at 15:22 +0100, Julien Grall wrote:
Subject: "correctly handle" and "writes"
> During a store, the byte is always in the low part of the register (i.e
> [0:7]).
>
> Although, we are masking the register by using a shift of the
> byte offset in the ITARGETSR. This will result
On Thu, 2015-07-30 at 12:03 +0100, Wei Liu wrote:
> On Wed, Jul 15, 2015 at 11:21:17AM +0100, Ian Campbell wrote:
> > This is the result of
> > $ find -name \*.l -exec touch {} \;
> > $ find -name \*.y -exec touch {} \;
> >
> > and then rebuilding.
> >
> > This avoids churn on the machine I
On Wed, 2015-10-14 at 12:41 +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
Acked + applied.
Ian, I beleive Stefano would like to see this in 4.6 at some point.
> ---
> Please pull from
>
> git://xenbits.xen.org/osstest/ovmf.git xen-tested-master
>
> and push the
On Mon, 2015-10-19 at 13:58 +0100, Julien Grall wrote:
> With the current log is not possible for the user to understand
> properly the error:
>
> (XEN) Grant table range: 0x007fc0-0x007fc72000
> (XEN) DT: no ranges; cannot enumerate
> (XEN) Device tree generation failed (-22).
>
On Thu, Oct 22, 2015 at 08:51:13AM -0600, Jan Beulich wrote:
> >>> On 22.10.15 at 16:40, wrote:
> > On Thu, Oct 22, 2015 at 06:53:27AM -0600, Jan Beulich wrote:
> >> >>> On 28.09.15 at 09:13, wrote:
> >> > ---
On Thu, Oct 22, 2015 at 08:17:29AM -0600, Jan Beulich wrote:
> >>> On 28.09.15 at 09:13, wrote:
> > The existing hvm_set_guest_tsc_fixed() and hvm_get_guest_tsc_fixed()
> > calculate the guest TSC by adding the TSC offset to the host TSC. When
> > the TSC scaling is
On Thu, Oct 22, 2015 at 04:58:52PM +0100, Ian Jackson wrote:
> Ian Campbell writes ("Re: [PATCH] Config.mk: update OVMF changeset"):
> > On Wed, 2015-10-14 at 12:41 +0100, Wei Liu wrote:
> > > Signed-off-by: Wei Liu
> >
> > Acked + applied.
> >
> > Ian, I beleive Stefano
On 22/10/15 16:48, Jan Beulich wrote:
On 22.10.15 at 17:43, wrote:
>> @@ -477,7 +477,7 @@ p2m_pod_offline_or_broken_replace(struct page_info *p)
>>
>> free_domheap_page(p);
>>
>> -p = alloc_domheap_page(d, PAGE_ORDER_4K);
>> +p =
1 - 100 of 126 matches
Mail list logo