On Tue, Dec 16, Julian Sivertsen wrote:
The default Arch Linux kernel does not have SELinux, causing the
var-lib-xenstored.mount unit to fail due to an invalid context. This
can be worked around by removing the context option from the mount
options in that unit file.
Mine does not have
On 12/16/2014 06:32 PM, Roger Pau Monné wrote:
El 16/12/14 a les 11.11, Bob Liu ha escrit:
The default maximum value of segments in indirect requests was 32, IO
operations with bigger block size(32*4k) would be split and performance
start
to drop.
Nowadays backend device usually support
The Xen hypercalls are defined in include/xen/interface/xen.h. There
are some places where for each hypercall a table element is created.
Instead of manually add each hypercall element to these tables use
an auto generated header built during the make process of the kernel.
Changes in V2:
- add
Today there are several places in the kernel which build tables
containing one entry for each possible Xen hypercall. Create an
infrastructure to be able to generate these tables at build time.
Based-on-patch-by: Jan Beulich jbeul...@suse.com
Signed-off-by: Juergen Gross jgr...@suse.com
---
The header include/xen/interface/xen.h doesn't contain all definitions
from Xen's version of that header. Update it accordingly.
Signed-off-by: Juergen Gross jgr...@suse.com
Reviewed-by: David Vrabel david.vra...@citrix.com
---
arch/x86/xen/trace.c| 2 +-
include/xen/interface/xen.h | 6
On 16.12.14 at 21:28, andrew.coop...@citrix.com wrote:
On 16/12/14 19:33, Mihai Donțu wrote:
+static bool_t __xmem_pool_check_locked(const char *file, int line,
+ const struct xmem_pool *pool)
+{
+unsigned int i;
+static bool_t once = 1;
What
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote:
--- a/xen/include/xen/compiler.h
+++ b/xen/include/xen/compiler.h
@@ -90,4 +90,18 @@
__asm__ ( : =r(__ptr) : 0(ptr)); \
(typeof(ptr)) (__ptr + (off)); })
+/*
+ * Prevent the compiler from merging or refetching accesses.
On 17/12/14 09:59, Jan Beulich wrote:
On 16.12.14 at 21:28, andrew.coop...@citrix.com wrote:
On 16/12/14 19:33, Mihai Donțu wrote:
+static bool_t __xmem_pool_check_locked(const char *file, int line,
+ const struct xmem_pool *pool)
+{
+unsigned int i;
On 16/12/14 23:37, Julien Grall wrote:
On 16/12/2014 23:26, Andrew Cooper wrote:
On 16/12/2014 23:06, Julien Grall wrote:
Hi,
On 16/12/2014 20:28, Andrew Cooper wrote:
I suspect you also would be better, and certainly more brief, with
run_in_exception_handler(show_stack) instead, which
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote:
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -2,6 +2,7 @@ obj-y += bitmap.o
obj-y += core_parking.o
obj-y += cpu.o
obj-y += cpupool.o
+obj-y += device.o
Shouldn't this instead be two lines, one using HAS_PCI and the second
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote:
@@ -123,22 +124,17 @@ struct page_info;
struct iommu_ops {
int (*init)(struct domain *d);
void (*hwdom_init)(struct domain *d);
-#ifdef HAS_PCI
-int (*add_device)(u8 devfn, struct pci_dev *);
-int
On 17/12/14 09:50, Juergen Gross wrote:
Today there are several places in the kernel which build tables
containing one entry for each possible Xen hypercall. Create an
infrastructure to be able to generate these tables at build time.
Reviewed-by: David Vrabel david.vra...@citrix.com
David
Hi Jan,
On 17/12/2014 10:16, Jan Beulich wrote:
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote:
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -2,6 +2,7 @@ obj-y += bitmap.o
obj-y += core_parking.o
obj-y += cpu.o
obj-y += cpupool.o
+obj-y += device.o
Shouldn't this instead
On 17/12/14 10:24, Julien Grall wrote:
On 17/12/2014 10:11, Andrew Cooper wrote:
On 16/12/14 23:37, Julien Grall wrote:
Introducing a new bugframe is precicely what I meant by this doesn't
look hard. x86 currently has one more bugframe than arm, being
BUGFRAME_run_fn.
And how do you pass
On 17.12.14 at 11:30, julien.gr...@linaro.org wrote:
On 17/12/2014 10:16, Jan Beulich wrote:
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote:
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -2,6 +2,7 @@ obj-y += bitmap.o
obj-y += core_parking.o
obj-y += cpu.o
obj-y +=
On 16/12/14 23:04, Christopher S. Aker wrote:
On Dec 15, 2014, at 6:11 AM, David Vrabel david.vra...@citrix.com wrote:
On 11/12/14 15:12, Christopher S. Aker wrote:
Xen: 4.4.2-pre (28573:f6f6236af933) + xsa111, xsa112, xsa114
Dom0: 3.17.4
Things go badly after a day or four. We've hit this
On Tue, Dec 16, 2014 at 09:38:09AM +, Jan Beulich wrote:
On 16.12.14 at 09:55, chao.p.p...@linux.intel.com wrote:
Any comments from you? It would be greatly appreciated if you can look
at this when you have time. Your comments are always important to me :)
I don't think I have to say
El 16/12/14 a les 18.59, Andrew Cooper ha escrit:
On 16/12/14 17:34, Roger Pau Monné wrote:
Hello,
While working on the FreeBSD PVH Dom0 port I've realized that IO-APIC
interrupts get stuck in a very strange state very easily with the
current PIRQ implementation that I'm using on FreeBSD.
On Tue, Dec 16, 2014 at 02:32:55PM +0800, Chunyan Liu wrote:
Changes to V8:
* add an overview document, so that one can has a overall look
about the whole domain snapshot work, limits, requirements,
how to do, etc.
flight 32422 linux-next real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32422/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt 5 xen-boot fail REGR. vs. 32386
test-amd64-i386-xl
On Tue, Dec 16, 2014 at 02:32:56PM +0800, Chunyan Liu wrote:
Changes to V8:
* xl won't manage snapshots, that means it won't maintain json files,
won't maintain snapshot chain relationship, and then as a result
won't take care of deleting snapshot and listing snapshots.
* remove
Hi Jan,
On 17/12/14 10:46, Jan Beulich wrote:
On 17.12.14 at 11:30, julien.gr...@linaro.org wrote:
On 17/12/2014 10:16, Jan Beulich wrote:
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote:
--- a/xen/common/Makefile
+++ b/xen/common/Makefile
@@ -2,6 +2,7 @@ obj-y += bitmap.o
obj-y +=
On 10/12/14 14:12, David Vrabel wrote:
On 10/12/14 13:42, John wrote:
David,
This patch you put into 3.18.0 appears to break the latest version of
stubdomains. I found this out today when I tried to update a machine to
3.18.0 and all of the domUs crashed on start with the dmesg output like
On Tue, Dec 16, 2014 at 02:32:57PM +0800, Chunyan Liu wrote:
Changes to V8:
* remove libxl_domain_snapshot_create/delete/revert API
* export disk snapshot functionality for both xl and libvirt usage
===
Libxl/libxlu
On Tue, Dec 16, 2014 at 01:47:35PM +, Alex Bligh wrote:
I am running Ubuntu's xen 4.4 (4.4.1-0ubuntu0.14.04.2), but creating VMs
with libxl.
When I do a 'shutdown -r' or similar with no VMs running, dom0 reboots
fine. When I do this with one or more VMs running, I get:
INFO: task
On 15/12/14 16:07, Julien Grall wrote:
On 15/12/14 15:32, Stefano Stabellini wrote:
On Fri, 12 Dec 2014, Julien Grall wrote:
+spin_lock_init(d-arch.vgic.lock);
you should probably explain in the commit message the reason why you are
making changes to the vgic lock
Actually the domain
The domain vgic lock is used uninitialized.
Signed-off-by: Julien Grall julien.gr...@linaro.org
---
This is a bug fix for Xen 4.5 and Xen 4.4. The vgic lock is used
unitialized. Luckily we only use the field raw which is reset to 0
during the domain allocation.
There is no harm
flight 32424 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32424/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 32392
Regressions which
Version 16 of PV(H) PMU patches.
* Many changes in VPMU mode patch (#13):
* Replaced arguments to some vpmu routines (vcpu - vpmu). New patch (#12)
* Added vpmu_unload vpmu op to completely unload vpmu data (e.g clear
MSR bitmaps). This routine may be called in context switch
vmx_add_host_load_msr() and vmx_add_guest_msr() share fair amount of code. Merge
them to simplify code maintenance.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Kevin Tian kevin.t...@intel.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Reviewed-by: Dietmar
vpmu structure will be used for both HVM and PV guests. Move it from
hvm_vcpu to arch_vcpu.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Kevin Tian kevin.t...@intel.com
Reviewed-by: Dietmar Hahn dietmar.h...@ts.fujitsu.com
Remove struct pmumsr and core2_pmu_enable. Replace static MSR structures with
fields in core2_vpmu_context.
Call core2_get_pmc_count() once, during initialization.
Properly clean up when core2_vpmu_alloc_resource() fails.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Kevin
Don't have the hypervisor update APIC_LVTPC when _it_ thinks the vector should
be updated. Instead, handle guest's APIC_LVTPC accesses and write what the guest
explicitly wanted.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Kevin Tian kevin.t...@intel.com
Reviewed-by:
Save VPMU state during context switch for both HVM and PV(H) guests.
A subsequent patch (x86/VPMU: NMI-based VPMU support) will make it possible
for vpmu_switch_to() to call vmx_vmcs_try_enter()-vcpu_pause() which needs
is_running to be correctly set/cleared. To prepare for that, call
Export Xen's symbols as {addresstypename} triplet via new XENPF_get_symbol
hypercall
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Daniel De Graaf dgde...@tycho.nsa.gov
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Reviewed-by: Dietmar Hahn
MSR_CORE_PERF_GLOBAL_CTRL register should be set zero initially. It is up to
the guest to set it so that counters are enabled.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Kevin Tian kevin.t...@intel.com
Reviewed-by: Dietmar Hahn dietmar.h...@ts.fujitsu.com
Tested-by:
Add runtime interface for setting PMU mode and flags. Three main modes are
provided:
* XENPMU_MODE_OFF: PMU is not virtualized
* XENPMU_MODE_SELF: Guests can access PMU MSRs and receive PMU interrupts.
* XENPMU_MODE_HV: Same as XENPMU_MODE_SELF for non-proviledged guests, dom0
can profile
Intercept accesses to PMU MSRs and process them in VPMU module. If vpmu ops
for VCPU are not initialized (which is the case, for example, for PV guests that
are not VPMU-enlightened) access to MSRs will return failure.
Dump VPMU state for all domains (HVM and PV) when requested.
Signed-off-by:
Code for initializing/tearing down PMU for PV guests
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Kevin Tian kevin.t...@intel.com
Acked-by: Jan Beulich jbeul...@suse.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Reviewed-by: Dietmar Hahn
With this patch return value of 1 of vpmu_do_msr() will now indicate whether an
error was encountered during MSR processing (instead of stating that the access
was to a VPMU register).
As part of this patch we also check for validity of certain MSR accesses right
when we determine which register
There is a possibility that we set VPMU_CONTEXT_SAVE on VPMU context in
vpmu_load() and never clear it (because vpmu_save_force() will see
VPMU_CONTEXT_LOADED bit clear, which is possible on AMD processors)
The problem is that amd_vpmu_save() assumes that if VPMU_CONTEXT_SAVE is set
then (1) we
Add pmu.h header files, move various macros and structures that will be
shared between hypervisor and PV guests to it.
Move MSR banks out of architectural PMU structures to allow for larger sizes
in the future. The banks are allocated immediately after the context and
PMU structures store offsets
The failure to initialize VPMU may be temporary so we shouldn'd disable VMPU
forever.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
---
xen/arch/x86/hvm/vpmu.c | 15 ---
1 file changed, 8 insertions(+), 7 deletions(-)
diff --git a/xen/arch/x86/hvm/vpmu.c
Introduce vpmu_are_all_set that allows testing multiple bits at once. Convert
macros
into inlines for better compiler checking.
Signed-off-by: Boris Ostrovsky boris.ostrov...@oracle.com
Acked-by: Kevin Tian kevin.t...@intel.com
Reviewed-by: Konrad Rzeszutek Wilk konrad.w...@oracle.com
Add support for handling PMU interrupts for PV guests.
VPMU for the interrupted VCPU is unloaded until the guest issues XENPMU_flush
hypercall. This allows the guest to access PMU MSR values that are stored in
VPMU context which is shared between hypervisor and domain, thus avoiding
traps to
Since PMU is now not HVM specific we can move VPMU-related files up from
arch/x86/hvm/ directory.
Specifically:
arch/x86/hvm/vpmu.c - arch/x86/cpu/vpmu.c
arch/x86/hvm/svm/vpmu.c - arch/x86/cpu/vpmu_amd.c
arch/x86/hvm/vmx/vpmu_core2.c - arch/x86/cpu/vpmu_intel.c
Add support for using NMIs as PMU interrupts to allow profiling hypervisor
when interrupts are disabled.
Most of processing is still performed by vpmu_do_interrupt(). However, since
certain operations are not NMI-safe we defer them to a softint that
vpmu_do_interrupt()
will schedule:
* For PV
A subsequent patch will add an inline routine to vpmu.h that will call
vpmu_load().
This inline will try to access vcpu-vpmu which is not possible since struct
vcpu may not be fully defined at that point. So we will have that inline pass
vpmu pointer to vpmu_load() instead.
This change slightly
This series of patch enable the virtual Trusted Platform Module (vTPM)
subsystem for Xen on TPM 2.0.
Noted, functionality for a virtual guest operating system (a DomU) is still
TPM 1.2. The main modifcation is on vtpmmgr-stubdom. The challenge is that
TPM 2.0 is not backward compatible with TPM
Accept commands from the vtpm-stubdom domains via the mini-os TPM
backend driver. The vTPM manager communicates directly with hardware
TPM 2.0 using the mini-os tpm2_tis driver.
Signed-off-by: Quan Xu quan...@intel.com
---
stubdom/vtpmmgr/init.c| 109
TPM2_Create is used to create an object that can be loaded into a
TPM using TPM2_Load(). If the command completes successfully, the
TPM will create the new object and return the object’s creation.
data (creationData), its public area (outPublic), and its encrypted
sensitive area (outPrivate).
Make vtpm-stubdom domain compatible to launch on TPM 1.x / TPM 2.0.
Add:
..
extra=tpm2
..
to launch vtpm-stubdom domain on TPM 2.0, ignore it on TPM 1.x. for
example,
vtpm-stubdom domain configuration on TPM 2.0:
kernel=/usr/lib/xen/boot/vtpmmgr-stubdom.gz
memory=16
Add TPM 2.0 data structure marshal for packing and unpacking TPM
2.0 data structures.
Signed-off-by: Quan Xu quan...@intel.com
---
stubdom/vtpmmgr/tpm2_marshal.h | 673 +
1 file changed, 673 insertions(+)
create mode 100644 stubdom/vtpmmgr/tpm2_marshal.h
TPM2_CreatePrimary is used to create a Primary Object under one of
the Primary Seeds or a Temporary Object under TPM_RH_NULL. The command
uses a TPM2B_PUBLIC as a template for the object to be created. The
command will create and load a Primary Object. The sensitive area is
not returned. Any type
Signed-off-by: Quan Xu quan...@intel.com
---
stubdom/vtpmmgr/init.c | 34 ++
stubdom/vtpmmgr/tpm2_types.h | 2 ++
stubdom/vtpmmgr/vtpmmgr.h| 1 +
3 files changed, 37 insertions(+)
diff --git a/stubdom/vtpmmgr/init.c b/stubdom/vtpmmgr/init.c
index
Bind data with TPM2_RSA_Encrypt, which performs RSA encryption using
the indicated padding scheme according to PKCS#1v2.1(PKCS#1). If the
scheme of keyHandle is TPM_ALG_NULL, then the caller may use inScheme
to specify the padding scheme.
Unbind data with TPM2_RSA_Decrypt, which performs RSA
Signed-off-by: Quan Xu quan...@intel.com
---
stubdom/vtpmmgr/disk_write.c | 13 +++--
1 file changed, 11 insertions(+), 2 deletions(-)
diff --git a/stubdom/vtpmmgr/disk_write.c b/stubdom/vtpmmgr/disk_write.c
index 4c825c5..ab15a9a 100644
--- a/stubdom/vtpmmgr/disk_write.c
+++
'vtpmmgr on TPM 2.0'
Signed-off-by: Quan Xu quan...@intel.com
---
docs/misc/vtpmmgr.txt | 150 +-
1 file changed, 149 insertions(+), 1 deletion(-)
diff --git a/docs/misc/vtpmmgr.txt b/docs/misc/vtpmmgr.txt
index 026c52b..1f1af4d 100644
---
These TPM 2.0 Exposed APIs for the Mini-os to access TPM 2.0
hardware.
Signed-off-by: Quan Xu quan...@intel.com
---
stubdom/vtpmmgr/Makefile | 2 +-
stubdom/vtpmmgr/tpm2.c | 455 +++
stubdom/vtpmmgr/tpm2.h | 104 +++
3 files changed, 560
call the TPM 2.0 various registers that allow communication between
the TPM 2.0 and platform hardware and software. TPM2_SelfTest causes
the TPM 2.0 to perform a test of its capabilities.
Signed-off-by: Quan Xu quan...@intel.com
---
extras/mini-os/include/tpm_tis.h | 1 +
Signed-off-by: Quan Xu quan...@intel.com
---
stubdom/vtpmmgr/disk_read.c | 16 ++--
1 file changed, 14 insertions(+), 2 deletions(-)
diff --git a/stubdom/vtpmmgr/disk_read.c b/stubdom/vtpmmgr/disk_read.c
index 33aacdd..e147e90 100644
--- a/stubdom/vtpmmgr/disk_read.c
+++
On Wed, Dec 17, 2014 at 04:18:58PM +0800, Bob Liu wrote:
On 12/16/2014 06:32 PM, Roger Pau Monné wrote:
El 16/12/14 a les 11.11, Bob Liu ha escrit:
The default maximum value of segments in indirect requests was 32, IO
operations with bigger block size(32*4k) would be split and performance
On Wed, Dec 17, 2014 at 10:35:47AM -0500, Boris Ostrovsky wrote:
We need to make sure that last_vcpu is not pointing to VCPU whose
VPMU is being destroyed. Otherwise we may try to dereference it in
the future, when VCPU is gone.
We have to do this atomically since otherwise there is a
On 17/12/14 16:13, Konrad Rzeszutek Wilk wrote:
On Wed, Dec 17, 2014 at 04:18:58PM +0800, Bob Liu wrote:
On 12/16/2014 06:32 PM, Roger Pau Monné wrote:
El 16/12/14 a les 11.11, Bob Liu ha escrit:
The default maximum value of segments in indirect requests was 32, IO
operations with bigger
On Wed, Dec 17, 2014 at 04:34:41PM +, David Vrabel wrote:
On 17/12/14 16:13, Konrad Rzeszutek Wilk wrote:
On Wed, Dec 17, 2014 at 04:18:58PM +0800, Bob Liu wrote:
On 12/16/2014 06:32 PM, Roger Pau Monné wrote:
El 16/12/14 a les 11.11, Bob Liu ha escrit:
The default maximum value of
Julien Grall julien.gr...@linaro.org 12/17/14 1:55 PM
On 17/12/14 10:05, Jan Beulich wrote:
On 16.12.14 at 21:08, julien.gr...@linaro.org wrote:
+#define ACCESS_ONCE(x) (*(volatile typeof(x) *)(x))
Any reason not to simply use {read,write}_atomic() instead, which we
already have?
To avoid
On Wed, Dec 17, 2014 at 11:53:41AM -0500, Boris Ostrovsky wrote:
On 12/17/2014 11:21 AM, Konrad Rzeszutek Wilk wrote:
On Wed, Dec 17, 2014 at 10:35:47AM -0500, Boris Ostrovsky wrote:
We need to make sure that last_vcpu is not pointing to VCPU whose
VPMU is being destroyed. Otherwise we may try
Julien Grall julien.gr...@linaro.org 12/17/14 2:04 PM
On 17/12/14 10:46, Jan Beulich wrote:
On 17.12.14 at 11:30, julien.gr...@linaro.org wrote:
Having a generic way to describe device will really help ARM code (see
IOMMU).
If we don't have a such thing, we may need to duplicate quite a
flight 32423 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32423/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303
Tests which are
Boris Ostrovsky boris.ostrov...@oracle.com 12/17/14 4:10 PM
+/* Need to clear last_vcpu in case it points to v */
+(void)cmpxchg(last, v, NULL);
In a (later) reply to v2 I had indicated that it doesn't seem safe to so here
but
rely on an IPI in the other path altering that value. Can
2014-12-17 9:02 GMT+01:00 Olaf Hering o...@aepfle.de:
See the INSTALL file in the toplevel directory.
I can't believe I didn't see that file, makes me feel rather dumb. Thank you so
much for the pointer, it clears up a lot of things.
Julian Sivertsen
On 12/17/2014 12:28 PM, Jan Beulich wrote:
Boris Ostrovsky boris.ostrov...@oracle.com 12/17/14 4:10 PM
+/* Need to clear last_vcpu in case it points to v */
+(void)cmpxchg(last, v, NULL);
In a (later) reply to v2 I had indicated that it doesn't seem safe to so here but
rely on an
flight 32425 linux-3.14 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32425/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64 5 xen-boot fail REGR. vs. 32149
Regressions which are
On Wed, Dec 17, 2014 at 08:55:10AM +0100, Olaf Hering wrote:
On Tue, Dec 16, Konrad Rzeszutek Wilk wrote:
On Tue, Dec 16, 2014 at 05:34:51PM +0100, Olaf Hering wrote:
On Tue, Dec 16, konrad.w...@oracle.com wrote:
In terms of bugs, we have:
... systemd SELinux, but its not
On Tue, Sep 2, 2014 at 12:06 PM, David Vrabel david.vra...@citrix.com
wrote:
From: Suresh Siddha sbsid...@gmail.com
For non-eager fpu mode, thread's fpu state is allocated during the first
fpu usage (in the context of device not available exception). This can be
a blocking call and hence we
On Sat, Dec 13, 2014 at 09:23:48AM +, Juergen Schinker wrote:
Subject: [TESTDAY] Test report Xen 4.5.0-RC3
* Hardware:
Intel(R) Xeon(R) CPU E3-1220L V2 @ 2.30GHz (4cores -1 socket)
32G Ram
* Software:
Debian Jessie
* Guest operating systems:
Debian Jessie
* Functionality
On Mon, Dec 15, 2014 at 11:13:06AM +, Stefano Stabellini wrote:
On Fri, 12 Dec 2014, Konrad Rzeszutek Wilk wrote:
On Fri, Dec 12, 2014 at 04:13:52PM +0100, Sander Eikelenboom wrote:
Hi Konrad,
This doesn't seem to be applied yet, nor does it seem to have a
release-(N)ACK
On Wed, Dec 17, 2014 at 02:41:50PM -0500, Konrad Rzeszutek Wilk wrote:
On Wed, Dec 17, 2014 at 08:55:10AM +0100, Olaf Hering wrote:
On Tue, Dec 16, Konrad Rzeszutek Wilk wrote:
On Tue, Dec 16, 2014 at 05:34:51PM +0100, Olaf Hering wrote:
On Tue, Dec 16, konrad.w...@oracle.com wrote:
== Hardware ==
HP DL380 G5 (2x Intel Xeon 5130)
== Dom0 ==
Arch Linux 64-bit
== Functionality tested ==
Building xen 4.5 RC4 from the tarball, installing it and booting it up
with Arch Linux as the Dom0.
== Comments ==
Xen support on Arch Linux needs a bit of love. Nummerous problems
getting
flight 32432 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32432/
Perfect :-)
All tests in this flight passed
version targeted for testing:
rumpuserxen 0a0e61c12101ca4fe48da63f09971bccd331819c
baseline version:
rumpuserxen
Julien Grall wrote on 2014-12-17:
diff --git a/xen/include/xen/pci.h b/xen/include/xen/pci.h index
5f295f3..6ace79d 100644
--- a/xen/include/xen/pci.h
+++ b/xen/include/xen/pci.h
@@ -13,6 +13,7 @@
#include xen/irq.h #include xen/pci_regs.h #include xen/pfn.h
+#include xen/device.h
flight 32429 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32429/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 32418
Tests which did not
On 12/11/14 07:08, Ian Campbell wrote:
On Tue, 2014-12-09 at 17:34 +, Jan Beulich wrote:
... when conring_size= was specified on the command line. We can't
really do this as early as we would want to when the option was not
specified, as the default depends on knowing the system CPU count.
Hi,
I built and installed Xen from latest upstream Xen source code, but XL
always failed to work. Do you know what's going on here? My
environment is Lubuntu 14.04. Thanks in advance.
I always got Permission denied error.
root@kai-haswell:~# xl list
libxl: error: libxl.c:561:libxl_list_domain:
On 12/17/2014 at 08:28 PM, in message
20141217122817.gg1...@zion.uk.xensource.com, Wei Liu wei.l...@citrix.com
wrote:
On Tue, Dec 16, 2014 at 02:32:56PM +0800, Chunyan Liu wrote:
Changes to V8:
* xl won't manage snapshots, that means it won't maintain json files,
won't maintain
On 12/17/2014 at 08:17 PM, in message
20141217121750.gf1...@zion.uk.xensource.com, Wei Liu wei.l...@citrix.com
wrote:
On Tue, Dec 16, 2014 at 02:32:55PM +0800, Chunyan Liu wrote:
Changes to V8:
* add an overview document, so that one can has a overall look
about the whole
86 matches
Mail list logo