Am 22.11.2017 um 18:27 schrieb Boris Ostrovsky:
On 11/22/2017 11:54 AM, Christian König wrote:
Am 22.11.2017 um 17:24 schrieb Boris Ostrovsky:
On 11/22/2017 05:09 AM, Christian König wrote:
Am 21.11.2017 um 23:26 schrieb Boris Ostrovsky:
On 11/21/2017 08:34 AM, Christian König wrote:
Hi Bori
flight 116440 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116440/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 6 xen-install fail REGR. vs. 116190
test-amd64-i386-x
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 22 November 2017 19:20
> To: xen-devel@lists.xenproject.org
> Cc: George Dunlap ; Ian Jackson
> ; Wei Liu ; Andrew Cooper
> ; Jan Beulich ; Stefano
> Stabellini ; Konrad Wilk ;
> Tim (Xen.org) ; Roger Pau M
flight 72484 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72484/
Perfect :-)
All tests in this flight passed as required
baseline version:
flight 72456
jobs:
build-amd64 pass
build-armh
On 22/11/17 15:48, Jan Beulich wrote:
On 22.11.17 at 15:40, wrote:
>> On 22/11/17 15:05, Jan Beulich wrote:
>>> Jürgen, Boris,
>>>
>>> am I trying something that's not allowed, but selectable via Kconfig?
>>> On system with multiple IO-APICs (I assume that's what triggers the
>>> problem) I g
>>> On 22.11.17 at 18:13, wrote:
> On 11/21/2017 08:52 AM, Jan Beulich wrote:
> On 13.11.17 at 16:41, wrote:
>>> With the exception of driver domains, which depend on PCI passthrough,
>>> and will be introduced later.
>>>
>>> Signed-off-by: George Dunlap
>>
>> Shouldn't we also explicitly e
>>> On 22.11.17 at 19:01, wrote:
>
>> On Nov 21, 2017, at 9:26 AM, Jan Beulich wrote:
>>
> On 13.11.17 at 16:41, wrote:
>>> +### Virtual CPUs
>>> +
>>> +Limit, x86 PV: 8192
>>> +Limit-security, x86 PV: 32
>>> +Limit, x86 HVM: 128
>>> +Limit-security, x86 HVM: 32
>>
>> Perso
>>> On 22.11.17 at 18:15, wrote:
> On 11/21/2017 07:55 PM, Andrew Cooper wrote:
>> On 13/11/17 15:41, George Dunlap wrote:
>>> Signed-off-by: George Dunlap
>>> ---
>>> CC: Ian Jackson
>>> CC: Wei Liu
>>> CC: Andrew Cooper
>>> CC: Jan Beulich
>>> CC: Stefano Stabellini
>>> CC: Konrad Wilk
>>
>>> On 22.11.17 at 20:20, wrote:
> Core memory management and scheduling.
>
> Signed-off-by: George Dunlap
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On Thu, Nov 23, Jan Beulich wrote:
> Olaf, are you still playing with it every now and then?
No, I have not tried it since I last touched it.
The last thing I know was that integrating it into libxl was difficult
because it was not straight forward to describe "memory usage" properly.
Olaf
si
>>> On 22.11.17 at 20:20, wrote:
> Including host architecture support and guest types.
>
> Signed-off-by: George Dunlap
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/
>>> On 22.11.17 at 20:20, wrote:
> Superpage support and PVHVM.
>
> Signed-off-by: George Dunlap
Acked-by: Jan Beulich
with one remark:
> +## Scalability
> +
> +### Super page support
> +
> +Status, x86 HVM/PVH, HAP: Supported
> +Status, x86 HVM/PVH, Shadow, 2MiB: Supported
> +Sta
>>> On 22.11.17 at 20:20, wrote:
> Mostly PV protocols.
>
> Signed-off-by: George Dunlap
Acked-by: Jan Beulich
with a couple of remarks.
> @@ -223,6 +227,152 @@ which add paravirtualized functionality to HVM guests
> for improved performance and scalability.
> This includes exposing event c
>>> On 22.11.17 at 20:20, wrote:
> x86-specific virtual hardware provided by the hypervisor, toolstack,
> or QEMU.
>
> Signed-off-by: George Dunlap
Non-QEMU parts
Acked-by: Jan Beulich
with one typo preferably corrected:
> +### x86/Nested HVM
> +
> +Status, x86 HVM: Experimental
> +
> +Th
Hi George,
On 22/11/17 19:20, George Dunlap wrote:
Hardware support and guest type.
Signed-off-by: George Dunlap
---
Changes since v2:
- Moved SMMUv* into generic IOMMU section
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim D
Hi George,
On 22/11/17 19:20, George Dunlap wrote:
Superpage support and PVHVM.
Signed-off-by: George Dunlap
---
Changes since v2:
- Reworked superpage section
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
CC: Julien
On 11/23/2017 11:11 AM, Julien Grall wrote:
> Hi George,
>
> On 22/11/17 19:20, George Dunlap wrote:
>> Hardware support and guest type.
>>
>> Signed-off-by: George Dunlap
>> ---
>> Changes since v2:
>> - Moved SMMUv* into generic IOMMU section
>>
>> CC: Ian Jackson
>> CC: Wei Liu
>> CC: Andrew
Hi George,
On 22/11/17 19:20, George Dunlap wrote:
Signed-off-by: George Dunlap
---
Changes since v2:
- Update "non-pci passthrough" section
- Add DT / ACPI sections
CC: Ian Jackson
CC: Wei Liu
CC: Andrew Cooper
CC: Jan Beulich
CC: Stefano Stabellini
CC: Konrad Wilk
CC: Tim Deegan
CC: J
>>> On 22.11.17 at 20:20, wrote:
> +## Debugging, analysis, and crash post-mortem
> +
> +### Host serial console
> +
> +Status, NS16550: Supported
> + Status, EHCI: Supported
Inconsistent indentation.
> + Status, Cadence UART (ARM): Supported
> + Status, PL011 UART (ARM): Support
flight 116438 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116438/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt-qcow2 broken
test-amd64-amd64-xl-qemuu-ws16-amd64
On 23/11/17 11:13, George Dunlap wrote:
On 11/23/2017 11:11 AM, Julien Grall wrote:
The rest looks good.
Thanks. With that moved, can it have your Ack?
Sure
Acked-by: Julien Grall
Cheers,
--
Julien Grall
___
Xen-devel mailing list
Xen-devel@
>>> On 22.11.17 at 20:20, wrote:
> +### Live Patching
> +
> +Status, x86: Supported
> +Status, ARM: Experimental
> +
> +Compile time disabled for ARM
"... by default"?
> +### XSM & FLASK
> +
> +Status: Experimental
> +
> +Compile time disabled.
Same here.
Jan
>>> On 22.11.17 at 20:20, wrote:
> Signed-off-by: George Dunlap
With the XXX suitably addressed
Acked-by: Jan Beulich
Jan
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
>>> On 22.11.17 at 20:20, wrote:
> +XXX Need to check the following:
> +
> + * Guest serial console
> + * Crash kernels
> + * Transcendent Memory
> + * Alternative p2m
> + * vMCE
vMCE has provisions for migration (albeit there has been breakage
here more than once in the past, iirc).
Jan
_
>>> On 22.11.17 at 20:20, wrote:
> +### Virtual RAM
> +
> +Limit-security, x86 PV 64-bit: 2047GiB
> +Limit-security, x86 PV 32-bit: 168GiB (see below)
> +Limit-security, x86 HVM: 1.5TiB
> +Limit, ARM32: 16GiB
> +Limit, ARM64: 1TiB
> +
> +Note that there are no theoretical limit
On Thu, Nov 23, Olaf Hering wrote:
> On Thu, Nov 23, Jan Beulich wrote:
> > Olaf, are you still playing with it every now and then?
> No, I have not tried it since I last touched it.
I just tried it, and it failed:
root@stein-schneider:~ # /usr/lib/xen/bin/xenpaging -d 7 -f /dev/shm/p -v
xc: det
On 11/23/2017 11:55 AM, Olaf Hering wrote:
> On Thu, Nov 23, Olaf Hering wrote:
>
>> On Thu, Nov 23, Jan Beulich wrote:
>>> Olaf, are you still playing with it every now and then?
>> No, I have not tried it since I last touched it.
>
> I just tried it, and it failed:
>
> root@stein-schneider:~ #
flight 116445 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116445/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-rumprun-amd64 17 rumprun-demo-xenstorels/xenstorels.repeat
fail like 116199
test-amd64-amd64-xl-q
On 23/11/17 12:00, George Dunlap wrote:
> On 11/23/2017 11:55 AM, Olaf Hering wrote:
>> On Thu, Nov 23, Olaf Hering wrote:
>>
>>> On Thu, Nov 23, Jan Beulich wrote:
Olaf, are you still playing with it every now and then?
>>> No, I have not tried it since I last touched it.
>> I just tried it,
On Thu, Nov 23, Andrew Cooper wrote:
> Its not that. This failure comes from the ring living inside the p2m,
> and has already been found with introspection.
In my case it was just a wrong domid. Now I use 'xl domid domU' and
xenpaging does something. It seems paging out and in works still to so
flight 116448 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116448/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 broken
test-amd64-i38
On 23/11/17 12:45, Olaf Hering wrote:
> On Thu, Nov 23, Andrew Cooper wrote:
>
>> Its not that. This failure comes from the ring living inside the p2m,
>> and has already been found with introspection.
> In my case it was just a wrong domid. Now I use 'xl domid domU' and
> xenpaging does something
flight 116472 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116472/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On 11/23/2017 03:11 AM, Christian König wrote:
Am 22.11.2017 um 18:27 schrieb Boris Ostrovsky:
On 11/22/2017 11:54 AM, Christian König wrote:
Am 22.11.2017 um 17:24 schrieb Boris Ostrovsky:
On 11/22/2017 05:09 AM, Christian König wrote:
Am 21.11.2017 um 23:26 schrieb Boris Ostrovsky:
On 11
v2:
* Replace busy wait with wait_event()/wake_up_all()
* Cannot garantee that at the time xennet_remove is called, the
xen_netback state will not be XenbusStateClosed, so added a
condition for that
* There's a small chance for the xen_netback state is
XenbusStateUnknown by the time the
There were two issues with this function: Its use of
hvmemul_do_pio_buffer() was wrong (the function deals only with
individual port accesses, not repeated ones, i.e. passing it
"*reps * bytes_per_rep" does not have the intended effect). And it
could have processed a larger set of operations in one
On 11/23/2017 05:09 PM, Jan Beulich wrote:
> There were two issues with this function: Its use of
> hvmemul_do_pio_buffer() was wrong (the function deals only with
> individual port accesses, not repeated ones, i.e. passing it
> "*reps * bytes_per_rep" does not have the intended effect). And it
> c
flight 116452 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116452/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-amdbroken in 116426
test-armhf-a
flight 116451 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116451/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 17 guest-stop fail REGR. vs. 115539
Tests which did not suc
>>> On 30.10.17 at 18:48, wrote:
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -965,6 +965,94 @@ static long xatp_permission_check(struct domain *d,
> unsigned int space)
> return xsm_add_to_physmap(XSM_TARGET, current->domain, d);
> }
>
> +static int acquire_resource(
> +
On 11/23/2017 10:50 AM, Jan Beulich wrote:
On 22.11.17 at 20:20, wrote:
>> Superpage support and PVHVM.
>>
>> Signed-off-by: George Dunlap
>
> Acked-by: Jan Beulich
> with one remark:
>
>> +## Scalability
>> +
>> +### Super page support
>> +
>> +Status, x86 HVM/PVH, HAP: Supported
>>
On 11/23/2017 10:59 AM, Jan Beulich wrote:
On 22.11.17 at 20:20, wrote:
>> Mostly PV protocols.
>>
>> Signed-off-by: George Dunlap
>
> Acked-by: Jan Beulich
> with a couple of remarks.
>
>> @@ -223,6 +227,152 @@ which add paravirtualized functionality to HVM guests
>> for improved perfor
On 11/23/2017 11:15 AM, Jan Beulich wrote:
On 22.11.17 at 20:20, wrote:
>> +## Debugging, analysis, and crash post-mortem
>> +
>> +### Host serial console
>> +
>> +Status, NS16550: Supported
>> +Status, EHCI: Supported
>
> Inconsistent indentation.
And I was so sure I'd checked all
On 11/23/2017 11:16 AM, Jan Beulich wrote:
On 22.11.17 at 20:20, wrote:
>> +### Live Patching
>> +
>> +Status, x86: Supported
>> +Status, ARM: Experimental
>> +
>> +Compile time disabled for ARM
>
> "... by default"?
>
>> +### XSM & FLASK
>> +
>> +Status: Experimental
>> +
>> +C
Signed-off-by: Jonathan Davies
---
tools/include/xen-sys/Linux/evtchn.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/include/xen-sys/Linux/evtchn.h
b/tools/include/xen-sys/Linux/evtchn.h
index 08ee0b7..002be5b 100644
--- a/tools/include/xen-sys/Linux/evtchn.h
+++ b/t
On 11/23/2017 11:21 AM, Jan Beulich wrote:
On 22.11.17 at 20:20, wrote:
>> +### Virtual RAM
>> +
>> +Limit-security, x86 PV 64-bit: 2047GiB
>> +Limit-security, x86 PV 32-bit: 168GiB (see below)
>> +Limit-security, x86 HVM: 1.5TiB
>> +Limit, ARM32: 16GiB
>> +Limit, ARM64: 1
On 11/23/2017 12:58 PM, Andrew Cooper wrote:
> On 23/11/17 12:45, Olaf Hering wrote:
>> On Thu, Nov 23, Andrew Cooper wrote:
>>
>>> Its not that. This failure comes from the ring living inside the p2m,
>>> and has already been found with introspection.
>> In my case it was just a wrong domid. Now
Hi all,
Xen 4.10 RC6 is tagged. You can check that out from xen.git:
git://xenbits.xen.org/xen.git 4.10.0-rc6
For your convenience there is also a tarball at:
https://downloads.xenproject.org/release/xen/4.10.0-rc6/xen-4.10.0-rc6.tar.gz
And the signature is at:
https://downloads.xenp
flight 116455 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116455/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 broken in 116432
build-amd64
branch xen-unstable
xenbranch xen-unstable
job test-amd64-i386-freebsd10-i386
testid xen-boot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.
Rename p2m_flush_tlb and p2m_flush_tlb_sync to respectively
p2m_tlb_flush and p2m_force_tlb_flush_sync.
At first glance, inverting 'flush' and 'tlb' might seem pointless but
would be helpful in the future in order to get more easily some code ported
from x86 P2M or even to shared with.
For p2m_f
Currently, guest_copy assumes the copy will only be done for the current
vCPU. A follow-up patch will require to use a different vCPU.
So extend the prototype to pass the vCPU.
Signed-off-by: Julien Grall
---
xen/arch/arm/guestcopy.c | 13 +++--
1 file changed, 7 insertions(+), 6 deleti
p2m_tlb_flush is called in 2 places: p2m_alloc_table and
p2m_force_tlb_flush_sync.
p2m_alloc_table is called when the domain is initialized and could be
replace by a call to p2m_force_tlb_flush_sync with the P2M write locked.
This seems a bit pointless but would allow to have a single API for
flu
The only differences between copy_to_guest and access_guest_memory_by_ipa are:
- The latter does not support copying data crossing page boundary
- The former is copying from/to guest VA whilst the latter from
guest PA
copy_to_guest can easily be extended to support copying from/to gues
The only differences between copy_to_guest (formerly called
raw_copy_to_guest_helper) and raw_copy_from_guest is:
- The direction of the memcpy
- The permission use for translating the address
Extend copy_to_guest to support copying from guest VA by adding using a
bit in the flags to tell
All the helpers within arch/arm/guestcopy.c are doing the same things:
copy data from/to the guest.
At the moment, the logic is duplicated in each helpers making more
difficult to implement new variant.
The first step for the consolidation is to get a common prototype and a
base. For convenience
In a follow-up patch, it will be necessary to pass more flags to the
function.
Rename flush_dcache to flags and introduce a define to tell whether the
cache needs to be flushed after the copy.
Signed-off-by: Julien Grall
---
xen/arch/arm/guestcopy.c | 8 +---
1 file changed, 5 insertions(+)
The function initrd_load is dealing with IPA but uses gvirt_to_maddr to
do the translation. This is currently working fine because the stage-1 MMU
is disabled.
Furthermore, the function is implementing its own copy to guest resulting
in code duplication and making more difficult to update the logi
The function dtb_load is dealing with IPA but uses gvirt_to_maddr to do
the translation. This is currently working fine because the stage-1 MMU
is disabled.
Rather than relying on such assumption, use the new
copy_to_guest_phys_flush_dcache. This also result to a slightly more
comprehensible code.
Multiple places in the code requires to flush the TLBs wonly when
p2m->need_flush is set.
Rather than open-coding it, introduce a new helper p2m_tlb_flush_sync to
do it.
Note that p2m_tlb_flush_sync is exported as it might be used by other
part of Xen.
Signed-off-by: Julien Grall
---
xen/arch/
This new function will be used in a follow-up patch to copy data to the guest
using the IPA (aka guest physical address) and then clean the cache.
Signed-off-by: Julien Grall
---
xen/arch/arm/guestcopy.c | 10 ++
xen/include/asm-arm/guest_access.h | 6 ++
2 files changed,
Hi all,
This patch series is a collection of cleanup around stage-2 handling. They
are consolidating different pieces of the hypervisor. This will make easier
to maintain and update stage-2 change in the future.
Cheers,
Julien Grall (16):
xen/arm: raw_copy_to_guest_helper: Rename flush_dcache
mmio_info_t is currently filled by do_trap_data_guest_abort but only
important when emulation an MMIO region.
A follow-up patch will merge stage-2 prefetch abort and stage-2 data abort
in a single helper. To prepare that, mmio_info_t is now filled by
try_handle_mmio.
Signed-off-by: Julien Grall
The function copy_to_guest can easily be extended to support zeroing
guest VA. To avoid using a new bit, it is considered that a NULL buffer
(i.e buf == NULL) means the guest memory will be zeroed.
Lastly, reimplement raw_clear_guest using copy_to_guest.
Signed-off-by: Julien Grall
---
xen/arch
The function kernel_zimage is dealing with IPA but uses gvirt_to_maddr to
do the translation. This is currently working fine because the stage-1 MMU
is disabled.
Furthermore, the function is implementing its own copy to guest resulting
in code duplication and making more difficult to update the lo
The two helpers do_trap_instr_abort_guest and do_trap_data_abort_guest
are used trap stage-2 abort. While the former is only handling prefetch
abort and the latter data abort, they are very similarly and does not
warrant to have separate helpers.
For instance, merging the both will make easier to
mmio_info_t is used to gather information in order do emulation a
region. Guest virtual address is unlikely to be a useful information and
not currently used. So remove the field gva from mmio_info_t and replace
by a local variable.
Signed-off-by: Julien Grall
---
xen/arch/arm/traps.c | 13
On 23/11/17 15:09, Jan Beulich wrote:
> There were two issues with this function: Its use of
> hvmemul_do_pio_buffer() was wrong (the function deals only with
> individual port accesses, not repeated ones, i.e. passing it
> "*reps * bytes_per_rep" does not have the intended effect). And it
> could
On 23/11/17 18:32, Julien Grall wrote:
> This new function will be used in a follow-up patch to copy data to the guest
> using the IPA (aka guest physical address) and then clean the cache.
>
> Signed-off-by: Julien Grall
> ---
> xen/arch/arm/guestcopy.c | 10 ++
> xen/include/a
Hi Andrew,
On 23/11/17 18:49, Andrew Cooper wrote:
On 23/11/17 18:32, Julien Grall wrote:
This new function will be used in a follow-up patch to copy data to the guest
using the IPA (aka guest physical address) and then clean the cache.
Signed-off-by: Julien Grall
---
xen/arch/arm/guestcopy
If a custom precopy_policy, called by
tools/libxc/xc_sr_save.c:send_memory_live, returns XGS_POLICY_ABORT then
the migration is not aborted as expected. Instead the domU is suspended
and transfered. How is the caller supposed to stop the migration and
cleanup?
Olaf
signature.asc
Description: PGP
flight 116480 examine real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116480/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
examine-pinot02 hosts-allocate broken REGR. vs. 115400
ex
flight 116483 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116483/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
This run is configured for baseline tests only.
flight 72485 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72485/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvhv2-amd 7 xen-boot
flight 116463 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116463/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-ws16-amd64 16 guest-localmigrate/x10 fail blocked in
116234
test-amd64-amd64-xl-qemuu
On Thu, Nov 23, 2017 at 05:16:51PM +, Jonathan Davies wrote:
> Signed-off-by: Jonathan Davies
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
flight 116465 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116465/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 116430
test-armhf-armhf-libvirt-xsm 14 saveresto
flight 116461 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116461/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pygrub 7 xen-boot fail REGR. vs. 115643
test-amd64-amd64-li
flight 116471 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116471/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-xsm 6 xen-install fail in 116440 pass in 116471
test-amd64-i386-xl-qemuu-win7-a
flight 116474 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/116474/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 116445
test-amd64-amd64-xl-qemuu-win7-amd64
This run is configured for baseline tests only.
flight 72487 xen-4.9-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72487/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-xsm 7 xen-boot
(shrinking Cc list)
>>> On 23.11.17 at 19:37, wrote:
> On 23/11/17 15:09, Jan Beulich wrote:
>> There were two issues with this function: Its use of
>> hvmemul_do_pio_buffer() was wrong (the function deals only with
>> individual port accesses, not repeated ones, i.e. passing it
>> "*reps * bytes
82 matches
Mail list logo