flight 32218 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32218/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303
Regressions which are
On Wed, Dec 10, Konrad Rzeszutek Wilk wrote:
On Mon, Dec 08, 2014 at 11:18:05AM +0100, Olaf Hering wrote:
This is a resend of this series, with just the low hanging fruits:
http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg00669.html
This looks like it would fix some of the
flight 3 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/3/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-rumpuserxen-i386 8 guest-start fail REGR. vs. 31241
Il 26/09/2014 14:02, David Vrabel ha scritto:
On 26/09/14 12:46, Fabio Fantoni wrote:
Il 26/09/2014 12:22, David Vrabel ha scritto:
On 26/09/14 09:54, Fabio Fantoni wrote:
Yesterday I updated wheezy kernel (3.2) to 3.14 from wheezy-backports to
solves one critical network problem with new
On Wed, 10 Dec 2014, manish jaggi wrote:
Based on my experience with PCI passthrough code merging, below are
some comments:
Both require a change in code
a) The current code which is non-pci passthrough requires a devices'
device tree node to be associated with smmu node, if that device has
Please use clear subject line in the future. Currently it's not very
descriptive. Something like Introduction of netsted HVM test case is
better.
Wei.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
... for the time being: The mechanism used depends on the domain's use
of the IRET hypercall.
Also drop two bogus code lines spotted while going through the involved
code paths: Addresses of per-CPU variables can't possibly be NULL, and
the setting of st-vcpu in send_guest_trap()'s MCE case is
On Wed, Dec 10, 2014 at 04:07:37PM +0800, longtao.pang wrote:
From: longtao.pang longtaox.p...@intel.com
This patch is used for preparing and installing L1 guest VM inside L0 system
on testhost machine.
---
Osstest/Debian.pm | 27 ++-
On Thu, 2014-12-11 at 09:27 +0530, Balbir Singh wrote:
Please don't top post.
Good catch Ian!
You are absolutely right!
Oh good.
I built everything and it put the tools/etc
in /usr/local. I did not see a link to xencommons, I missed it
completely! Is there any thing else I should care
On Wed, Dec 10, 2014 at 04:07:38PM +0800, longtao.pang wrote:
From: longtao.pang longtaox.p...@intel.com
This patch is used for building XEN and HVM Dom0 kernel for L1 guest VM,
and then reboot L1 guest into xen kernel.
I think you can just use the L0 Xen and Dom0 kernel, that would save
flight 32214 xen-4.3-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32214/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 3 host-install(3) broken REGR. vs.
Co-REST-maintainers,
there are a couple of patches I'd like to ask for feedback on, and I'm
assuming (based on previous replies by him) Konrad is waiting for such
too before considering giving release-acks:
http://lists.xenproject.org/archives/html/xen-devel/2014-12/msg00667.html
On 11/12/14 10:47, Jan Beulich wrote:
... for the time being: The mechanism used depends on the domain's use
of the IRET hypercall.
Also drop two bogus code lines spotted while going through the involved
code paths: Addresses of per-CPU variables can't possibly be NULL, and
the setting of
On Wed, Dec 10, 2014 at 04:07:39PM +0800, longtao.pang wrote:
From: longtao.pang longtaox.p...@intel.com
This patch is used for installing L2 guest VM inside L1 guest VM.
---
sg-run-job|2 +
ts-debian-install | 166
+
2
On Wed, Dec 10, 2014 at 04:07:40PM +0800, longtao.pang wrote:
From: longtao.pang longtaox.p...@intel.com
This patch is used for inserting nested test job name and runvars into
standalone.db database after execute command './standalone-reset'.
---
make-flight | 19 +++
On Fri, 2014-12-05 at 11:31 +, Jan Beulich wrote:
Andrew validly points out that even if these masks aren't a formal part
of the hypercall interface, we aren't free to change them: A guest
suspended for migration in the middle of a continuation would fail to
work if resumed on a hypervisor
On Thu, Dec 11, M A Young wrote:
Yes, you do need to set explicit selinux permissions when mounting
/var/lib/xenstored as otherwise it gets a tmpfs selinux context which
xenstored can't use in enforcing mode.
Is that enforcing mode the default? And would it be too cumbersome to
have these
At 11:55 +0800 on 06 Dec (1417863337), Yu Zhang wrote:
From: Yu Zhang yu.c.zh...@intel.com
A new p2m type, p2m_mmio_write_dm, is added to trap and emulate
the write operations on GPU's page tables. Handling of this new
p2m type are similar with existing p2m_ram_ro in most condition
checks,
On Thu, Dec 11, Olaf Hering wrote:
This sounds like xenstored has to parse the possible environment
variables found in sysconfig.xencommons all by itself? Is there perhaps
a way out of the SELinux jail?
Does all that work with the sysv runlevel scripts?
Olaf
On Fri, 2014-12-05 at 14:51 +, Ian Campbell wrote:
On Fri, 2014-12-05 at 14:48 +, Jan Beulich wrote:
On 05.12.14 at 15:27, ian.campb...@eu.citrix.com wrote:
On Fri, 2014-12-05 at 13:51 +, Jan Beulich wrote:
#define nr_static_irqs NR_IRQS
+#define arch_hwdom_irqs(domid)
On Tue, 2014-12-09 at 17:34 +, Jan Beulich wrote:
... when conring_size= was specified on the command line. We can't
really do this as early as we would want to when the option was not
specified, as the default depends on knowing the system CPU count. Yet
the parsing of the ACPI tables is
Hi Samuel,
Comments and updated patch below.
samuel.thiba...@ens-lyon.org said:
-if (rx-flags NETRXF_extra_info)
-{
-printk(+ we have extras!\n);
-continue;
-}
-
-
-if (rx-status == NETIF_RSP_NULL)
On Wed, Dec 10, 2014 at 07:09:18PM +0100, Dario Faggioli wrote:
From: Dario Faggioli raist...@linux.it
the value of which can be retrieved via guest_var('memory');.
This works for both PV and HVM Debian guests.
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu
On 11/12/14 05:32, Juergen Gross wrote:
On 12/10/2014 07:07 PM, David Vrabel wrote:
On 10/12/14 15:56, Juergen Gross wrote:
With the virtual mapped linear p2m list the post-init mmu operations
must be used for setting up the p2m mappings, as in case of
CONFIG_FLATMEM the init routines may
On Wed, Dec 10, 2014 at 07:10:06PM +0100, Dario Faggioli wrote:
From: Dario Faggioli raist...@linux.it
Mangle the results of a run of unixbench a bit, so that
they can be plotted. This also produces a (gnu)plot script
and the plot itself. All is saved in $stash, for the
running flight and
At 10:09 +0530 on 09 Dec (1418116195), vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K vijaya.ku...@caviumnetworks.com
In pl011.c, when TX interrupt is received
serial_tx_interrupt() is called to push next
characters. If TX buffer is empty, serial_tx_interrupt()
does not disable TX
On Thu, 11 Dec 2014, Olaf Hering wrote:
On Thu, Dec 11, Olaf Hering wrote:
This sounds like xenstored has to parse the possible environment
variables found in sysconfig.xencommons all by itself? Is there perhaps
a way out of the SELinux jail?
Does all that work with the sysv runlevel
On Wed, Dec 10, 2014 at 07:11:52PM +0100, Dario Faggioli wrote:
[...]
+
+ logm(Will run the benchmark on host with: $bcpus vcpus and $bmem MB RAM);
+
+ my $kernver= get_runvar('kernel_ver',$r{'kernbuildjob'});
+ my $kopt= maxcpus=$bcpus mem=$bmem . M;
+
+ if
On Thu, 2014-12-11 at 12:05 +, Wei Liu wrote:
On Wed, Dec 10, 2014 at 07:09:18PM +0100, Dario Faggioli wrote:
diff --git a/Osstest/TestSupport.pm b/Osstest/TestSupport.pm
index a3b6936..cdff8d5 100644
--- a/Osstest/TestSupport.pm
+++ b/Osstest/TestSupport.pm
@@ -1460,11 +1460,12 @@
On Thu, 2014-12-11 at 12:09 +, Wei Liu wrote:
On Wed, Dec 10, 2014 at 07:09:57PM +0100, Dario Faggioli wrote:
---
ts-unixbench-reslts | 67
+++
Typo reslts (also in subject line).
Yes, it's like that everywhere. In fact, it was
At 10:47 + on 11 Dec (1418291241), Jan Beulich wrote:
... for the time being: The mechanism used depends on the domain's use
of the IRET hypercall.
Can you elaborate? Looking at the existing code it seems like what it
does is set v-nmi_pending and make sure the vcpu gets scheduled
On 11.12.14 at 14:00, t...@xen.org wrote:
At 10:47 + on 11 Dec (1418291241), Jan Beulich wrote:
... for the time being: The mechanism used depends on the domain's use
of the IRET hypercall.
Can you elaborate? Looking at the existing code it seems like what it
does is set v-nmi_pending
At 02:03 + on 11 Dec (1418259797), Tian, Kevin wrote:
From: Tim Deegan [mailto:t...@xen.org]
Now since the code's not going to be in 4.5 anyway, it should be
possible to _develop_ it in this manner, possibly in a private branch,
even if the early stages aren't getting applied
On Thu, 2014-12-11 at 12:15 +, Wei Liu wrote:
On Wed, Dec 10, 2014 at 07:10:06PM +0100, Dario Faggioli wrote:
This is done in a new Osstest/Benchmarking.pm module, as
the functions introduced may turn out useful somewhere else
too.
I would suggest using a dedicated commit for the
On Thu, Dec 11, 2014 at 02:11:44PM +0100, Dario Faggioli wrote:
[...]
+sub unixbench_plot_results ($$$) {
+ my ($dataf,$num_cols,$pfile)= @_;
+ my $h= new IO::File $pfile.gp or die $!;
+
+ printf $h EOF;
+set terminal png enhanced font
At 13:09 + on 11 Dec (1418299748), Jan Beulich wrote:
On 11.12.14 at 14:00, t...@xen.org wrote:
At 10:47 + on 11 Dec (1418291241), Jan Beulich wrote:
... for the time being: The mechanism used depends on the domain's use
of the IRET hypercall.
Can you elaborate? Looking at
On Wed, 2014-12-10 at 19:11 +0100, Dario Faggioli wrote:
From: Dario Faggioli raist...@linux.it
Mmm... It's quite weird that some of the patches came out with this
'From:' tag with my pvt address. I guess I've messed up something with
the git/stgit configuration on the box from where I sent
On 11.12.14 at 14:16, t...@xen.org wrote:
At 13:09 + on 11 Dec (1418299748), Jan Beulich wrote:
On 11.12.14 at 14:00, t...@xen.org wrote:
At 10:47 + on 11 Dec (1418291241), Jan Beulich wrote:
... for the time being: The mechanism used depends on the domain's use
of the IRET
On Wed, 2014-12-10 at 19:12 +0100, Dario Faggioli wrote:
From: Dario Faggioli raist...@linux.it
Somehow, this patch lacks a changelog! :-O
Sorry about this too, I'll write one for next version.
Regards,
Dario
Signed-off-by: Dario Faggioli dario.faggi...@citrix.com
Cc: Wei Liu
On Thu, 2014-12-11 at 12:32 +, Wei Liu wrote:
On Wed, Dec 10, 2014 at 07:11:52PM +0100, Dario Faggioli wrote:
+ logm(Will run the benchmark on host with: $bcpus vcpus and $bmem MB
RAM);
+
+ my $kernver= get_runvar('kernel_ver',$r{'kernbuildjob'});
+ my $kopt= maxcpus=$bcpus
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
xen/common/domctl.c | 6 ++
xen/include/xsm/dummy.h | 6 ++
xen/include/xsm/xsm.h | 6 ++
xen/xsm/dummy.c | 1 +
xen/xsm/flask/hooks.c | 17
New dying state is requred to indicate that a particular domain
is dying but cleanup procedure wasn't started. This state can be
set from outside of domain_kill().
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
xen/common/domain.c | 1 +
xen/include/xen/sched.h | 3 ++-
2 files
Add new xc_domain_soft_reset() function which performs so-called 'soft reset'
for an HVM domain. It is being performed in the following way:
- Save HVM context and all HVM params;
- Devour original domain with XEN_DOMCTL_devour;
- Wait till original domain dies or has no pages left;
- Restore HVM
New operation sets the 'recipient' domain which will receive all
memory pages from a particular domain and kills the original domain.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
xen/common/domain.c | 3 +++
xen/common/domctl.c | 33 +
Introduce new xc_domain_devour() function to support XEN_DOMCTL_devour.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
tools/libxc/include/xenctrl.h | 14 ++
tools/libxc/xc_domain.c | 13 +
2 files changed, 27 insertions(+)
diff --git
New libxl__domain_soft_reset_destroy() is an internal-only
version of libxl_domain_destroy() which follows the same domain
destroy path with the only difference: xc_domain_destroy() is
being avoided so the domain is not actually being destroyed.
Add soft_reset flag to libxl__domain_destroy_state
Use letter 't' to indicate a domain in such state.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
tools/libxl/libxl_types.idl | 1 +
tools/libxl/xl_cmdimpl.c | 2 +-
tools/python/xen/lowlevel/xl/xl.c | 1 +
3 files changed, 3 insertions(+), 1 deletion(-)
diff --git
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
xen/common/shutdown.c | 7 +++
xen/include/public/sched.h | 3 ++-
2 files changed, 9 insertions(+), 1 deletion(-)
diff --git a/xen/common/shutdown.c b/xen/common/shutdown.c
index 94d4c53..5c3a158 100644
--- a/xen/common/shutdown.c
Perform soft reset when a domain did SHUTDOWN_soft_reset. Migrate the
content with xc_domain_soft_reset(), reload dm and toolstack.
Signed-off-by: Vitaly Kuznetsov vkuzn...@redhat.com
---
docs/man/xl.cfg.pod.5| 12 +
tools/libxl/libxl.h | 6 +++
tools/libxl/libxl_create.c
Xen: 4.4.2-pre (28573:f6f6236af933) + xsa111, xsa112, xsa114
Dom0: 3.17.4
We recently moved our dom0 from 3.10.x to 3.17.4, in order to avoid a netback
host crash that has been plaguing us. After doing so, the new multi-queue
netback stuff constantly on/offs carrier on the vif, spamming the
Hi,
This has been fixed by f48da8: xen-netback: fix unlimited guest Rx
internal queue and carrier flapping, it's already in 3.18, I don't know
if it is going to be backported to 3.17
Zoli
On 11/12/14 14:42, Christopher S. Aker wrote:
Xen: 4.4.2-pre (28573:f6f6236af933) + xsa111, xsa112,
Xen: 4.4.2-pre (28573:f6f6236af933) + xsa111, xsa112, xsa114
Dom0: 3.17.4
Things go badly after a day or four. We've hit this on a number of previously
healthy hosts, since moving from 3.10.x dom0 to 3.17.4:
printk: 5441 messages suppressed.
grant_table.c:567:d0 Failed to obtain maptrack
Wei,
So instead of a bunch of vifx.y's I would see descriptivenamex.y ?
Check out
http://xenbits.xen.org/docs/4.4-testing/misc/xl-network-configuration.html
vifname
Sorry must have overlooked that, thank you!
-Bjoern
___
Xen-devel mailing list
On Thu, 2014-12-11 at 16:16 +, Anthony PERARD wrote:
On Tue, Dec 09, 2014 at 03:56:02PM +, Ian Campbell wrote:
On Tue, 2014-12-09 at 15:39 +, Anthony PERARD wrote:
The path to the pty of a Xen PV console is set only in
virDomainOpenConsole. But this is done too late. A call to
On Mon, Sep 22, 2014 at 6:59 AM, Wen Congyang we...@cn.fujitsu.com wrote:
If we use blktap2, the correct file should be blktap device
not the pdev_path.
Signed-off-by: Wen Congyang we...@cn.fujitsu.com
Cc: Shriram Rajagopalan rshri...@cs.ubc.ca
Acked-by: Ian Campbell ian.campb...@citrix.com
Hi,
At 01:41 + on 11 Dec (1418258504), Tian, Kevin wrote:
From: Tim Deegan [mailto:t...@xen.org]
It is Xen's job to isolate VMs from each other. As part of that, Xen
uses the MMU, nested paging, and IOMMUs to control access to RAM. Any
software component that can pass a raw MFN to
On Thu, Dec 11, 2014 at 04:23:15PM +, Ian Campbell wrote:
On Thu, 2014-12-11 at 16:16 +, Anthony PERARD wrote:
On Tue, Dec 09, 2014 at 03:56:02PM +, Ian Campbell wrote:
On Tue, 2014-12-09 at 15:39 +, Anthony PERARD wrote:
The path to the pty of a Xen PV console is set
On 12/11/2014 06:44 AM, Jan Beulich wrote:
On 10.12.14 at 10:53, ian.campb...@eu.citrix.com wrote:
On Wed, 2014-12-10 at 08:07 +, Jan Beulich wrote:
--- a/xen/common/domctl.c
+++ b/xen/common/domctl.c
@@ -981,18 +981,18 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xe
case
On 11 December 2014 at 02:30, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
On Wed, 10 Dec 2014, manish jaggi wrote:
Based on my experience with PCI passthrough code merging, below are
some comments:
Both require a change in code
a) The current code which is non-pci passthrough
The header include/xen/interface/xen.h doesn't contain all definitions
from Xen's version of that header. Update it accordingly.
Signed-off-by: Juergen Gross jgr...@suse.com
---
arch/x86/xen/trace.c| 2 +-
include/xen/interface/xen.h | 6 +-
2 files changed, 6 insertions(+), 2
Instead of manually list each hypercall in arch/x86/xen/xen-head.S
use the auto generated symbol list.
This also corrects the wrong address of xen_hypercall_mca which was
located 32 bytes higher than it should.
Symbol addresses have been verified to match the correct ones via
objdump output.
Instead of manually list all hypervisor calls in arch/x86/xen/trace.c
use the auto generated list.
Signed-off-by: Juergen Gross jgr...@suse.com
---
arch/x86/xen/trace.c | 50 --
1 file changed, 4 insertions(+), 46 deletions(-)
diff --git
On Wed, Dec 10, 2014 at 10:29:46AM +, Jan Beulich wrote:
On 10.12.14 at 07:00, m...@linux.com wrote:
On Thu, Nov 06, 2014 at 09:27:59PM +, Andrew Cooper wrote:
On 06/11/2014 19:32, Konrad Rzeszutek Wilk wrote:
On Thu, Nov 06, 2014 at 03:07:10PM +, Paul Durrant wrote:
To
On Wed, Dec 10, 2014 at 10:36:18AM +, Andrew Cooper wrote:
On 10/12/14 06:00, Matt Wilson wrote:
That's not strictly true. You can use the processor index in ACPI.
The LAPIC objects in the MADT/APIC table? That is still constructed
with the broken LAPIC_ID = 2 * processor_id logic.
Hello Manish,
On 11/12/14 18:02, manish jaggi wrote:
On 11 December 2014 at 02:30, Stefano Stabellini
stefano.stabell...@eu.citrix.com wrote:
On Wed, 10 Dec 2014, manish jaggi wrote:
Based on my experience with PCI passthrough code merging, below are
some comments:
Both require a change in
On Thu, Dec 11, 2014 at 01:04:24PM +0100, Olaf Hering wrote:
On Thu, Dec 11, M A Young wrote:
Yes, you do need to set explicit selinux permissions when mounting
/var/lib/xenstored as otherwise it gets a tmpfs selinux context which
xenstored can't use in enforcing mode.
Is that
flight 32232 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32232/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 5 kernel-build fail REGR. vs. 32194
Regressions which
Monday, December 15, will be our last Document Day of the year.
Given the 4.5 RC4 Testing scheduled for Wednesday of next week and the holidays
which occur later in the month, we have scheduled Document Day for Monday.
This is a great time to get our documentation ready for the new
release.
On Thu, Dec 11, 2014 at 10:47:44AM -0800, H. Peter Anvin wrote:
On 12/10/2014 05:03 PM, Luis R. Rodriguez wrote:
This is an issue onloy for for non*-preemptive kernels.
Some of Xen's hypercalls can take a long time and unfortunately for
*non*-preemptive kernels this can be quite a bit
On Thu, Dec 11, 2014 at 11:09:42AM +, David Vrabel wrote:
On 10/12/14 23:51, Andy Lutomirski wrote:
On Wed, Dec 10, 2014 at 3:34 PM, Luis R. Rodriguez
All that being said, this is IMO a bit gross. You've added a bunch of
asm that's kind of like a parallel error_exit, and the error
On Thu, Dec 11, 2014 at 06:31:54AM -0700, Jan Beulich wrote:
On 11.12.14 at 00:34, mcg...@do-not-panic.com wrote:
--- a/kernel/sched/core.c
+++ b/kernel/sched/core.c
@@ -4239,6 +4239,16 @@ int __sched _cond_resched(void)
}
EXPORT_SYMBOL(_cond_resched);
+int __sched
Hi, again. :)
As promised, I'm going to talk about more abstract design
considerations. Thi will be a lot less concrete than in the other
email, and about a larger range of things. Some of of them may not be
really desirable - or even possible.
[ TL;DR: read the other reply with the practical
Hi,
Apart from OpenSUSE, I am looking for booting Dom0 with other distros like
Redhat Ubuntu. If so what is the procedure for installing xen tools on these
distros?
Regards
Vijay
___
Xen-devel mailing list
Xen-devel@lists.xen.org
flight 32231 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32231/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 32164
Tests which did not
On Thu, Nov 06, 2014 at 03:26:24PM +, Paul Durrant wrote:
To perform certain hypercalls HVM guests need to use Xen's idea of
vcpu id, which may well not match the guest OS idea of CPU id.
This patch adds vcpu id to the HVM cpuid leaf allowing the guest
to build a mapping.
One more tangent
On Thu, 11 Dec 2014, Vijay Kilari wrote:
Apart from OpenSUSE, I am looking for booting Dom0 with other distros like
Redhat Ubuntu. If so what is the procedure for installing xen tools on these
distros?
Check out the wiki. A good place to start is
On 11 December 2014 at 02:23, Julien Grall julien.gr...@linaro.org wrote:
Hello,
On 11/12/2014 02:27, manish jaggi wrote:
I am facing this issue when booting Xen Dom0 (OpenSuse Rootfs)
...
[ OK ] Reached target Host and Network Name Lookups.
[ OK ] Started OpenSSH Daemon.
[ TIME ]
On 12.12.14 01:25, manish jaggi wrote:
On 11 December 2014 at 02:23, Julien Grall julien.gr...@linaro.org wrote:
Hello,
On 11/12/2014 02:27, manish jaggi wrote:
I am facing this issue when booting Xen Dom0 (OpenSuse Rootfs)
...
[ OK ] Reached target Host and Network Name Lookups.
[
On 11 December 2014 at 16:32, Alexander Graf ag...@suse.de wrote:
On 12.12.14 01:25, manish jaggi wrote:
On 11 December 2014 at 02:23, Julien Grall julien.gr...@linaro.org wrote:
Hello,
On 11/12/2014 02:27, manish jaggi wrote:
I am facing this issue when booting Xen Dom0 (OpenSuse
On 12.12.14 02:20, manish jaggi wrote:
On 11 December 2014 at 16:32, Alexander Graf ag...@suse.de wrote:
On 12.12.14 01:25, manish jaggi wrote:
On 11 December 2014 at 02:23, Julien Grall julien.gr...@linaro.org wrote:
Hello,
On 11/12/2014 02:27, manish jaggi wrote:
I am facing this
flight 32272 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32272/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-libvirt 9 guest-start fail never pass
test-amd64-amd64-libvirt 9
From: Tim Deegan
Sent: Friday, December 12, 2014 12:47 AM
Hi,
At 01:41 + on 11 Dec (1418258504), Tian, Kevin wrote:
From: Tim Deegan [mailto:t...@xen.org]
It is Xen's job to isolate VMs from each other. As part of that, Xen
uses the MMU, nested paging, and IOMMUs to control
From: Tian, Kevin
Sent: Friday, December 12, 2014 2:30 PM
Conclusion
--
That's enough rambling from me -- time to come back down to earth.
While I think it's useful to think about all these things, we don't
want to get carried away. :) And as I said, for some things we can
83 matches
Mail list logo