On 12/2/2014 7:40 PM, Tim Deegan wrote:
At 15:38 +0800 on 02 Dec (1417531126), Yu, Zhang wrote:
On 12/1/2014 8:13 PM, Tim Deegan wrote:
At 11:17 + on 01 Dec (1417429027), Jan Beulich wrote:
On 01.12.14 at 11:30, wrote:
During this bit of archaeology I realised that either this new type
>>> On 11/28/2014 at 11:43 PM, in message
>>> <1417189409.23604.62.ca...@citrix.com>,
Ian Campbell wrote:
> On Tue, 2014-11-25 at 02:08 -0700, Chun Yan Liu wrote:
> > Hi, Ian,
> >
> > According to previous discussion, snapshot delete and revert are
> > inclined to be done by high level ap
>>> On 11/28/2014 at 11:43 PM, in message
>>> <1417189409.23604.62.ca...@citrix.com>,
Ian Campbell wrote:
> On Tue, 2014-11-25 at 02:08 -0700, Chun Yan Liu wrote:
> > Hi, Ian,
> >
> > According to previous discussion, snapshot delete and revert are
> > inclined to be done by high level ap
Hope all would be fine.
I request you to guide my two issues for live migraiton:
1) Set up: I would like to migrate my existing system from xen4.1 to xen4.2+. I
have been working with xen4.1.4+ DRBD for live migration.
I have modified kernel by comping linux and installed xen4.1.4 but now i
On 12/03/2014 03:28 AM, Luis R. Rodriguez wrote:
On Tue, Dec 02, 2014 at 11:11:18AM +, David Vrabel wrote:
On 01/12/14 22:36, Luis R. Rodriguez wrote:
Then I do agree its a fair analogy (and find this obviously odd that how
widespread cond_resched() is), we just don't have an equivalent fo
From: Seth Forshee
Date: Tue, 25 Nov 2014 20:28:24 -0600
> These BUGs can be erroneously triggered by frags which refer to
> tail pages within a compound page. The data in these pages may
> overrun the hardware page while still being contained within the
> compound page, but since compound_order(
flight 32005 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32005/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 9 guest-start fail never pass
test-amd64-i386-libvirt 9 guest-start
On Tue, Dec 02, 2014 at 11:11:18AM +, David Vrabel wrote:
> On 01/12/14 22:36, Luis R. Rodriguez wrote:
> >
> > Then I do agree its a fair analogy (and find this obviously odd that how
> > widespread cond_resched() is), we just don't have an equivalent for IRQ
> > context, why not avoid the sp
flight 32006 rumpuserxen real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32006/
Perfect :-)
All tests in this flight passed
version targeted for testing:
rumpuserxen f302fca6c18c1ccdefe3d0d5f583e2d0970c2e2d
baseline version:
rumpuserxen 6dac8499151377c6e5eb57b5bf1f
On Wed, 29 Oct 2014, Waiman Long wrote:
> AIM7 XFS Disk Test (no overcommit)
> kernel JPMReal Time Sys TimeUsr Time
> - ----
> PV ticketlock 25423737.08 98.95 5.44
> PV
On 02/12/2014 20:48, Konrad Rzeszutek Wilk wrote:
> On Tue, Dec 02, 2014 at 03:19:11PM -0500, Boris Ostrovsky wrote:
>> Changes in v4:
>> * Added comment describing what we check for in pci_xen_init()
>>
> Reviewed-by: Konrad Rzeszutek Wilk
Reviewed-by: Andrew Cooper
>
>> Changes in v3:
>> * Ex
flight 31993 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31993/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 5 kernel-build fail REGR. vs. 26303
build-armhf
On 11/21/2014 05:17 PM, Konrad Rzeszutek Wilk wrote:
The commit "xen/pciback: Don't deadlock when unbinding." was using
the version of pci_reset_function which would lock the device lock.
That is no good as we can dead-lock. As such we swapped to using
the lock-less version and requiring that the
flight 31991 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31991/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 31781
Tests which are f
Make XEN_SYSCTL_topologyinfo more generic so that it can return both
CPU and IO topology (support for returning the latter is added in the
subsequent patch)
To do so move (and rename) previously used cpu_to_core/cpu_to_socket/
cpu_to_node into struct xen_sysctl_cputopo and move it, together with
n
Add support to XEN_SYSCTL_topologyinfo to return IO topology data.
Modify libxl_get_topology() to request this data, provide OS-dependent
helper functions that determine which devices we are inquiring about
(Linux only).
Signed-off-by: Boris Ostrovsky
---
tools/libxl/libxl.c | 28 +
Make current users of libxl_get_cpu_topology() call
libxl_get_topology() instead.
Signed-off-by: Boris Ostrovsky
---
tools/libxl/libxl.c | 25 -
tools/libxl/libxl_numa.c | 14 +++---
tools/libxl/libxl_utils.c | 24
tools/libxl/xl_cm
If ACPI provides PXM data for IO devices then dom0 will pass it to
hypervisor during PHYSDEVOP_pci_device_add call. This information,
however, is currently ignored.
We should remember it (in the form of nodeID). We will also print it
when user requests device information dump.
Signed-off-by: Bori
4 patches that add interface for querying hypervisor about device
topology and allow 'xl info -n' display this information if PXM object
is provided by ACPI.
The patches are:
* Store PXM data (nodeID) in pci_dev during PHYSDEVOP_pci_device_add
hypercall
* Modify XEN_SYSCTL_topologyinfo so that
On Fri, Nov 28, 2014 at 11:50:43AM +, Ian Campbell wrote:
> On Fri, 2014-11-28 at 18:52 +0800, Liang Li wrote:
> > If hardware support the 1GB pages, expose the feature to guest by
> > default. Users don't have to use a 'cpuid= ' option in config fil
> > e to turn it on.
> >
> > If guest use s
On Tue, Dec 02, 2014 at 03:19:11PM -0500, Boris Ostrovsky wrote:
> Changes in v4:
> * Added comment describing what we check for in pci_xen_init()
>
Reviewed-by: Konrad Rzeszutek Wilk
> Changes in v3:
> * Explicitly include asm/apic.h in arch/x86/pci/xen.c for !CONFIG_SMP.
>
> Changes in v2:
>
On Tue, Dec 02, 2014 at 06:51:50PM +, M A Young wrote:
> On Tue, 2 Dec 2014, Konrad Rzeszutek Wilk wrote:
>
> >On Tue, Dec 02, 2014 at 03:44:55PM +, Ian Campbell wrote:
> >>On Tue, 2014-12-02 at 16:39 +0100, Olaf Hering wrote:
> >>>Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("to
On Mon, Dec 01, 2014 at 05:24:34PM +0800, Tiejun Chen wrote:
> Sometimes different devices may share RMRR range so in this
s/Sometimes//
s/range/ranges/
> case we shouldn't assign these devices into different VMs
> since they may have potential leakage even damage between VMs.
s/potential leak..
On Mon, Dec 01, 2014 at 05:24:33PM +0800, Tiejun Chen wrote:
> intel_iommu_map_page() does nothing if VT-d shares EPT page table.
> So rmrr_identity_mapping() never create RMRR mapping but in some
s/So//
s/create/creates/
> cases like some GFX drivers it still need to access RMRR.
s/drivers .../
On Mon, Dec 01, 2014 at 05:24:32PM +0800, Tiejun Chen wrote:
> We will create RMRR mapping as follows:
>
> If gfn space unoccupied, we just set that. If
> space already occupy by 1:1 RMRR mapping do thing. Others
What is 'do thing'?
It looks as if we do nothing. Is that what you meant?
> should
On Mon, Dec 01, 2014 at 05:24:31PM +0800, Tiejun Chen wrote:
> We can't expost those reserved device memory in case of mem_access
s/expost/expose/
> since any access may corrupt device usage.
Could you explain this in more details please?
>
> Signed-off-by: Tiejun Chen
> ---
> xen/common/mem
On Mon, Dec 01, 2014 at 05:24:30PM +0800, Tiejun Chen wrote:
> We always reserve these ranges since we never allow any stuff to
> poke them.
s/any stuff to poke them/guest to access them./
>
> But in theory some untrusted VM can maliciously access them. So we
> need to intercept this approach. Bu
On 12/02/14 07:26, Stefano Stabellini wrote:
On Mon, 1 Dec 2014, Don Slutz wrote:
On 12/01/14 10:37, Stefano Stabellini wrote:
On Mon, 1 Dec 2014, Don Slutz wrote:
On 11/27/14 05:48, Stefano Stabellini wrote:
[...]
Works fine in both claim modes and with PoD used (maxmem > memory). Do
not
On Mon, Dec 01, 2014 at 05:24:28PM +0800, Tiejun Chen wrote:
> In some cases like igd_opregion_pgbase, guest will use mem_hole_alloc
> to allocate some memory to use in runtime cycle, so we alsoe need to
s/cycle//
s/alsoe/also
> make sure all reserved device memory don't overlap such a region.
flight 31986 xen-unstable real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31986/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-qemuu-rhel6hvm-intel 5 xen-bootfail pass in 31963
test-amd64-i386-xl-win7-amd64 5 x
Changes in v4:
* Added comment describing what we check for in pci_xen_init()
Changes in v3:
* Explicitly include asm/apic.h in arch/x86/pci/xen.c for !CONFIG_SMP.
Changes in v2:
* New version of cpuid.h file from Xen tree (with a couple of style adjustments)
* Whitespace cleanup
Currently HVM g
When hardware supports APIC/x2APIC virtualization we don't need to use pirqs
for MSI handling and instead use APIC since most APIC accesses (MMIO or MSR)
will now be processed without VMEXITs.
As an example, netperf on the original code produces this profile
(collected wih 'xentrace -e 0x0008
If the hardware supports APIC virtualization we may decide not to use pirqs
and instead use APIC/x2APIC directly, meaning that we don't want to set
x86_msi.setup_msi_irqs and x86_msi.teardown_msi_irq to Xen-specific routines.
However, x2APIC is not set up by the time pci_xen_hvm_init() is called so
On Mon, Dec 01, 2014 at 05:24:27PM +0800, Tiejun Chen wrote:
> We need to check to reserve all reserved device memory maps in e820
> to avoid any potential guest memory conflict.
>
> Currently, if we can't insert RDM entries directly, we may need to handle
> several ranges as follows:
s/several/t
On Mon, Dec 01, 2014 at 05:24:25PM +0800, Tiejun Chen wrote:
> We need to use reserved device memory maps with multiple times, so
> provide just one common function should be friend.
We need to call reserved device memory maps hypercall
(XENMEM_reserved_device_memory_map) many times, hence provide
On Mon, Dec 01, 2014 at 05:24:24PM +0800, Tiejun Chen wrote:
> In case of reserved device memory overlapping with ram, it also probably
s/also//
> overlap with modules space so we need to check these reserved device
s/overlap/overlaps/
What is 'modules space'?
> memory as well.
s/reserved devic
On Mon, Dec 01, 2014 at 05:24:23PM +0800, Tiejun Chen wrote:
> We will introduce that hypercall xc_reserved_device_memory_map
> approach to libxc.
>
> Signed-off-by: Tiejun Chen
> ---
> tools/libxc/include/xenctrl.h | 5 +
> tools/libxc/xc_domain.c | 30 ++
On Mon, Dec 01, 2014 at 05:24:21PM +0800, Tiejun Chen wrote:
> From: Jan Beulich
>
> This is a prerequisite for punching holes into HVM and PVH guests' P2M
> to allow passing through devices that are associated with (on VT-d)
> RMRRs.
>
> Signed-off-by: Jan Beulich
> Acked-by: Kevin Tian
> ---
On Mon, Dec 01, 2014 at 05:24:20PM +0800, Tiejun Chen wrote:
> This should be based on a new parameter globally, 'pci_rdmforce'.
>
> pci_rdmforce = 1 => Of course this should be 0 by default.
>
> '1' means we should force check to reserve all ranges. If failed
> VM wouldn't be created successfull
> How to reproduce this issu:
>
> * In shared-ept case with Xen.
> * Target owns RMRR.
How do you verify/check for that?
> * Do IGD passthrough with Windows guest OS: gfx_passthru=1 pci=["00:02.0"]
> * Please use qemu-xen-traditional.
>
> My test machine is BDW with Windows 7.
___
On Wed, Oct 29, 2014 at 04:19:10PM -0400, Waiman Long wrote:
> This patch adds the necessary KVM specific code to allow KVM to
> support the CPU halting and kicking operations needed by the queue
> spinlock PV code.
>
> Two KVM guests of 20 CPU cores (2 nodes) were created for performance
> testin
On Mon, Dec 01, 2014 at 01:54:11PM +0100, Juergen Gross wrote:
> On 12/01/2014 12:31 PM, David Vrabel wrote:
> >On 28/11/14 10:53, Juergen Gross wrote:
> >>Paravirtualized kernels running on Xen use a three level tree for
> >>translation of guest specific physical addresses to machine global
> >>ad
On Tue, 2 Dec 2014, Konrad Rzeszutek Wilk wrote:
On Tue, Dec 02, 2014 at 03:44:55PM +, Ian Campbell wrote:
On Tue, 2014-12-02 at 16:39 +0100, Olaf Hering wrote:
Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("tools/hotplug:
systemd xenstored dependencies") all service files use the
On Tue, Dec 02, 2014 at 01:50:37PM +, Ian Campbell wrote:
> On Mon, 2014-12-01 at 16:14 -0500, Konrad Rzeszutek Wilk wrote:
> > On Fri, Nov 28, 2014 at 11:38:52AM +, Ian Campbell wrote:
> > > On Thu, 2014-11-27 at 12:34 +, Andrew Cooper wrote:
> > > > Don't leak a 16k allocation if PyAr
On 01/12/14 11:31, Wei Liu wrote:
> The string returned is malloc'ed but marked as "const".
>
> Signed-off-by: Wei Liu
> Cc: Ian Campbell
> Cc: Ian Jackson
> ---
> tools/libxl/libxl.h | 10 ++
> tools/libxl/libxl_utils.c |5 -
> tools/libxl/libxl_utils.h |6 +-
>
On Tue, Dec 02, 2014 at 03:44:55PM +, Ian Campbell wrote:
> On Tue, 2014-12-02 at 16:39 +0100, Olaf Hering wrote:
> > Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("tools/hotplug:
> > systemd xenstored dependencies") all service files use the .socket unit
> > as startup dependency. Whi
On Tue, Dec 02, 2014 at 04:04:44PM +, Wei Liu wrote:
> On Tue, Dec 02, 2014 at 04:18:08PM +0100, Vitaly Kuznetsov wrote:
> > XEN_DOMCTL_getdomaininfo, which is being used by xc_domain_getinfo(), has
> > strange interface: it reports first domain which has domid >= requested
> > domid
> > so al
On Mon, Dec 01, 2014 at 11:15:41AM +, Ian Campbell wrote:
> On Mon, 2014-12-01 at 10:47 +, Euan Harris wrote:
> > Signed-off-by: Euan Harris
>
> Acked-by: Ian Campbell
>
> This is so trivial as to not need a release ack IMHO, I'll apply next
> time I'm doing such things unless someone
On Tue, Dec 02, 2014 at 04:46:52PM +0100, Olaf Hering wrote:
> On Mon, Dec 01, Konrad Rzeszutek Wilk wrote:
>
> > That is odd - I see any device 'hot-plugged' being added at 00:05 and
> > further.
>
> Does this by any chance depend on the guest?! I mean, how is the guest
I doubt it.
> notified
On Tue, Dec 02, 2014 at 03:11:30PM +, Wei Liu wrote:
> AC_CHECK_LIB fails on Debian Jessie since the ld flag it generates is
> incorrect, even in the event systemd library is available. Use
> PKG_CHECK_MODULES instead.
>
> Tested on Debian Jessie and Arch Linux.
And Fedora and SuSE? CC-ing t
On Tue, Dec 02, 2014 at 04:16:28PM +0100, Daniel Kiper wrote:
> Signed-off-by: Daniel Kiper
This usage scenario which I can see this being useful (and
I've tripped over this) is when you rebuild a new version
from the same repo. As in, this affects developers, but
not end-users and not distros. B
Hey Julien,
Have you rebased your patch train after Andrew’s commits?
Warner
> On Dec 2, 2014, at 8:31 AM, Julien Grall wrote:
>
> Hello Andrew,
>
> On 28/11/2014 13:57, Andrew Turner wrote:
>> On Sun, 23 Nov 2014 22:35:36 +
>> Julien Grall wrote:
>>> Major changes in this new version:
>
On Tue, Dec 02, 2014 at 01:47:16PM +, Ian Campbell wrote:
> On Mon, 2014-12-01 at 12:19 +, Wei Liu wrote:
> > On Mon, Dec 01, 2014 at 09:42:13AM +, Ian Campbell wrote:
> > > On Sat, 2014-11-29 at 21:23 -0800, Ed Swierk wrote:
> > > > - Use %lex-param instead of obsolete YYLEX_PARAM to o
flight 31985 xen-4.3-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31985/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 31811
Tests which are f
On Tue, Dec 2, 2014 at 6:00 AM, Andrew Cooper wrote:
> The automatically generating doesn't actually work. Depending on the
> relative timestamps caused by a SCM checkout, or a tarball extraction,
> the files will be attempted to be regenerated.
>
> These files are regenerated in the XenServer bu
On 02/12/14 11:53, Zhangleiqiang (Trump) wrote:
-Original Message-
From: xen-devel-boun...@lists.xen.org
[mailto:xen-devel-boun...@lists.xen.org] On Behalf Of David Vrabel
Sent: Tuesday, December 02, 2014 6:57 PM
To: zhangleiqiang; xen-devel@lists.xen.org
Subject: Re: [Xen-devel] Poor n
On Tue, Dec 02, 2014 at 03:12:40PM +, Ian Campbell wrote:
> On Tue, 2014-12-02 at 15:10 +, George Dunlap wrote:
> > On Thu, Nov 27, 2014 at 3:11 PM, Konrad Rzeszutek Wilk
> > wrote:
> > >
> > > On Nov 27, 2014 6:59 AM, Tim Deegan wrote:
> > >>
> > >> At 11:39 + on 27 Nov (1417084797),
On Tue, Dec 02, 2014 at 03:13:28PM +, Ian Campbell wrote:
> On Tue, 2014-12-02 at 10:11 -0500, Konrad Rzeszutek Wilk wrote:
> > > [0] The default i386 Debian installer falls into this camp, but you can
> > > use the special PV Xen variant to install as PVHVM too so it's not so
> > > critical.
>
virsh does not include a --wait option to shutdown as xl and xm do, so
we implement it by hand.
Needs new guest_await_destroy helper. Note the guest_await_shutdown
requires on_shutdown='preserve'
Signed-off-by: Ian Campbell
---
Osstest/TestSupport.pm | 7 ++-
Osstest/Toolstack/libvirt
Note that this remains stubbed out, since making it actually work
requires more work (i.e. I need to figure out what is involved, seem
to need TLS and a CA etc...)
Appears to need gnutls enabling for migration, even to localhost.
NB haven't managed to get this actually working. With GNUtls enable
Still stubbed out for libvirt.
Signed-off-by: Ian Campbell
---
Osstest/Toolstack/libvirt.pm | 8
Osstest/Toolstack/xend.pm| 2 ++
Osstest/Toolstack/xl.pm | 18 ++
ts-guest-saverestore | 12 ++--
4 files changed, 30 insertions(+), 10 deletions(-
Currently we rely on all apt-get invocations being in a single
ts-xen-build-prep job which can't run on a shared host.
That is a bit inflexible so instead use our own lock. We wait indefinitely and
rely on osstest's existing command timeout infrastructure to catch problems.
target_install_package
Nothing in generic code uses this now, so remove.
xl+xend retain as _Command for internal use only.
Signed-off-by: Ian Campbell
---
Osstest/Toolstack/libvirt.pm | 1 -
Osstest/Toolstack/xend.pm| 2 +-
Osstest/Toolstack/xl.pm | 18 +-
3 files changed, 10 insertions(+),
This patch introduces the interface to allow user-space applications
execute grant-copy operations. This is done by sending an ioctl to the
grant device.
Signed-off-by: Thanos Makatos
---
drivers/xen/gntdev.c | 171 +
include/uapi/xen/gntdev.h |
Note that since the previous patch arranges for
ts-migration-support-check to continue to fail for libvirt the libvirt
code is not actually called yet (and will die if it is). This patch is
mainly included to reduce the number of users of
toolstack()->{Command} closer to zero.
Signed-off-by: Ian C
And looks up the toolstack from it.
This is now consistent with guest_destroy.
Signed-off-by: Ian Campbell
---
Osstest/TestSupport.pm | 5 +++--
ts-debian-hvm-install | 7 ++-
ts-redhat-install | 7 ++-
ts-rumpuserxen-demo-xenstorels | 2 +-
4 files changed
Signed-off-by: Ian Campbell
---
ts-libvirt-build | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/ts-libvirt-build b/ts-libvirt-build
index 940c034..878d4e2 100755
--- a/ts-libvirt-build
+++ b/ts-libvirt-build
@@ -140,8 +140,10 @@ case "$1" in
[ "$VERBOSE" != no ]
This allows us to abolish CfgPathVar which was inconsistently used,
appears redundant with $gho->{CfgPath} and in any case never set to
anything other than 'cfgpath'.
I suppose it was intended to deal with toolstacks with a cfg format
completely dissimilar to xm/xl's. I think if this arises in a f
On Tue, Dec 02, 2014 at 02:46:36PM +, Zhangleiqiang (Trump) wrote:
> Thanks for your reply, Wei.
>
> I do the following testing just now and found the results as follows:
>
> There are three DomUs (4U4G) are running on Host A (6U6G) and one DomU (4U4G)
> is running on Host B (6U6G), I send p
Implement destory/create as per toolstack methods, including implementing the
libvirt version which previously didn't work. To do this we use the virsh
capability to convert an xl/xm style config file into the correct XML.
xend basically calls into the xl helper since they are compatible.
xl/x, u
Unless the toolstack is xend (for compatibility with pre-xl Xen versions), when
we use xm.
For several operations in TestSupport.pm the actual toolstack isn't really
relevant, since we want info straight from Xen. For simplicity just use xl (or
xm) in these cases, to avoid needing to implement the
Signed-off-by: Ian Campbell
---
Osstest/Toolstack/libvirt.pm | 6 ++
Osstest/Toolstack/xend.pm| 1 +
Osstest/Toolstack/xl.pm | 6 ++
ts-logs-capture | 2 +-
4 files changed, 14 insertions(+), 1 deletion(-)
diff --git a/Osstest/Toolstack/libvirt.pm b/Osstest/Toolstac
On Tue, Dec 02, Ian Campbell wrote:
> On Tue, 2014-12-02 at 16:17 +0100, Olaf Hering wrote:
> > On Tue, Dec 02, Ian Campbell wrote:
> >
> > > On Mon, 2014-12-01 at 23:41 +, Mark Pryor wrote:
> > > > list,
> > >
> > > Thanks. If you've identified a buggy changeset then it is fine to post
> >
On 02/12/14 15:18, Vitaly Kuznetsov wrote:
> XEN_DOMCTL_getdomaininfo, which is being used by xc_domain_getinfo(), has
> strange interface: it reports first domain which has domid >= requested domid
> so all callers are supposed to check that the proper domain(s) was queried
> by checking domid. xc
The following series switches osstest to implement the toolstack via
get_host_method_object()->method rather than toolstack()->{Command}."
method" etc.
This is needed because virsh differs from xm/xl in a few commands.
It also implements partial virsh support (simple lifecycle stuff, but
not e.g.
Not implemented for libvirt (the check itself that is, the hook is present).
Signed-off-by: Ian Campbell
---
Osstest/Toolstack/libvirt.pm | 5 +
Osstest/Toolstack/xend.pm| 3 +++
Osstest/Toolstack/xl.pm | 9 +
ts-migrate-support-check | 10 +-
4 files changed,
Specifically guest_create and guest_find_domid.
Signed-off-by: Ian Campbell
---
ts-rumpuserxen-demo-xenstorels | 6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/ts-rumpuserxen-demo-xenstorels b/ts-rumpuserxen-demo-xenstorels
index a2a6a77..6698848 100755
--- a/ts-rumpuser
On Tue, Dec 02, 2014 at 04:18:08PM +0100, Vitaly Kuznetsov wrote:
> XEN_DOMCTL_getdomaininfo, which is being used by xc_domain_getinfo(), has
> strange interface: it reports first domain which has domid >= requested domid
> so all callers are supposed to check that the proper domain(s) was queried
Signed-off-by: Ian Campbell
---
ts-logs-capture | 4
1 file changed, 4 insertions(+)
diff --git a/ts-logs-capture b/ts-logs-capture
index 21974a9..6cf51c1 100755
--- a/ts-logs-capture
+++ b/ts-logs-capture
@@ -117,6 +117,9 @@ sub fetch_logs_host_guests () {
/var/log/xen/o
Signed-off-by: Ian Campbell
---
Osstest/Toolstack/libvirt.pm | 6 ++
Osstest/Toolstack/xend.pm| 1 +
Osstest/Toolstack/xl.pm | 7 +++
ts-guest-stop| 5 +
4 files changed, 15 insertions(+), 4 deletions(-)
diff --git a/Osstest/Toolstack/libvirt.pm b/Osstest/Too
This will be needed in a future patch.
Everywhere already has a $ho in hand. Also cache the answer as
$ho->{Toolstack}.
I scanned the source with:
find -name \*.pm -exec perl -c {} \;
for i in ts-* ; do perl -c $i; done
which reported "Not enough arguments for Osstest::TestSupport::toolst
This will allow us to more easily have per-toolstack methods etc.
The previous hash of toolstack parameters is now a blessed object. For
now the callers don't need to change but over the following patches we
will refactor things to use method calls. In particular we will be
aiming to remove Comman
On Tue, 2014-12-02 at 16:39 +0100, Olaf Hering wrote:
> Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("tools/hotplug:
> systemd xenstored dependencies") all service files use the .socket unit
> as startup dependency. While this happens to work for boot it fails for
> shutdown because a .so
On Mon, 2014-12-01 at 11:15 +, Ian Campbell wrote:
> On Mon, 2014-12-01 at 10:47 +, Euan Harris wrote:
> > Signed-off-by: Euan Harris
>
> Acked-by: Ian Campbell
>
> This is so trivial as to not need a release ack IMHO, I'll apply next
> time I'm doing such things unless someone beats me
On Mon, 2014-12-01 at 17:02 -0500, Konrad Rzeszutek Wilk wrote:
> On Mon, Dec 01, 2014 at 02:50:56PM +, Ian Campbell wrote:
> > On Mon, 2014-12-01 at 14:27 +, Euan Harris wrote:
> > > libxl__domain_rename() unconditionally dereferences its new_name
> > > parameter, to check whether it is an
On Tue, 2014-12-02 at 16:17 +0100, Olaf Hering wrote:
> On Tue, Dec 02, Ian Campbell wrote:
>
> > On Mon, 2014-12-01 at 23:41 +, Mark Pryor wrote:
> > > list,
> >
> > Thanks. If you've identified a buggy changeset then it is fine to post
> > to the devel lists. I've added a CC. I've also CCd
>>> Daniel Kiper 12/02/14 3:58 PM >>>
>In general initial conring size is sufficient. However, if log
>level is increased on platforms which have e.g. huge number
>of memory regions (I have an IBM System x3550 M2 with 8 GiB RAM
>which has more than 200 entries in EFI memory map) then some
>of earl
On Mon, 2014-12-01 at 15:25 -0500, Konrad Rzeszutek Wilk wrote:
> On Fri, Nov 28, 2014 at 11:52:26AM +, Ian Jackson wrote:
> > Ian Campbell writes ("Re: [PATCH v2] fix migration failure with xl migrate
> > --debug"):
> > > Acked-by: Ian Campbell
> >
> > Thanks for reviewing it :-).
> >
> >
On Mon, 2014-12-01 at 16:51 -0500, Konrad Rzeszutek Wilk wrote:
> On Mon, Dec 01, 2014 at 09:21:24AM +, Ian Campbell wrote:
> > On Mon, 2014-12-01 at 01:21 -0700, Chun Yan Liu wrote:
> > >
> > > >>> Ian Campbell 2014-11-28 下午 20:01 >>>
> > > On Fri, 2014-11-28 at 13:55 +0800, Chunyan Liu wro
On Mon, 2014-12-01 at 16:16 -0500, Konrad Rzeszutek Wilk wrote:
> On Fri, Nov 28, 2014 at 12:31:34PM +, Ian Jackson wrote:
> > Razvan Cojocaru writes ("[PATCH] xenstore: Clarify xs_open() semantics"):
> > > Added to the xs_open() comments in xenstore.h. The text has been
> > > taken almost verb
On Mon, 2014-12-01 at 16:54 -0500, Konrad Rzeszutek Wilk wrote:
> On Mon, Dec 01, 2014 at 11:31:11AM +, Wei Liu wrote:
> > Return value of libxl_basename was erroneously marked as "const". This
> > series removes that "const" and fixes two memory leaks in xl.
> >
> > I think these fixes should
On Fri, Nov 28, Olaf Hering wrote:
> I wonder if the missing disable of the tap device is intentional, or
> just an oversight, or if its just to complicated to get from a
> "PCIDevice *" to the other end and call the ->cleanup function.
qemu-traditional did just close all tap devices. With qemu-u
On Mon, Dec 01, Konrad Rzeszutek Wilk wrote:
> That is odd - I see any device 'hot-plugged' being added at 00:05 and further.
Does this by any chance depend on the guest?! I mean, how is the guest
notified that a PCI device is gone (by unplug)? Maybe the pvops case
just happens to work because th
On Mon, Dec 01, Sander Eikelenboom wrote:
> Monday, December 1, 2014, 3:34:09 PM, you wrote:
> > actually be a workaround for the double pci-attach bug.
> Don't know about that bug.
You just replied to it. ;-)
Olaf
___
Xen-devel mailing list
Xen-devel
- Original Message -
> On 01/12/14 14:22, David Vrabel wrote:
> > On 28/11/14 15:19, Anthony Wright wrote:
> > The guest's frontend driver isn't putting valid requests onto the
> > ring
> > (it crosses a page boundary) so this is a frontend bug.
>
> This VIF protocol is weird. The first
Since commit 4542ae340d75bd6319e3fcd94e6c9336e210aeef ("tools/hotplug:
systemd xenstored dependencies") all service files use the .socket unit
as startup dependency. While this happens to work for boot it fails for
shutdown because a .socket does not seem to enforce ordering. When
xendomains.servic
On Tue, 2014-12-02 at 15:11 +, Wei Liu wrote:
> AC_CHECK_LIB fails on Debian Jessie since the ld flag it generates is
> incorrect, even in the event systemd library is available. Use
> PKG_CHECK_MODULES instead.
>
> Tested on Debian Jessie and Arch Linux.
>
> Please rerun autogen.sh after ap
On Tue, 2014-12-02 at 10:11 -0500, Konrad Rzeszutek Wilk wrote:
> > [0] The default i386 Debian installer falls into this camp, but you can
> > use the special PV Xen variant to install as PVHVM too so it's not so
> > critical.
>
> And the Fedora 21 LiveISO (32-bit) does too.
Interesting, I thoug
On Tue, 2014-12-02 at 15:10 +, George Dunlap wrote:
> On Thu, Nov 27, 2014 at 3:11 PM, Konrad Rzeszutek Wilk
> wrote:
> >
> > On Nov 27, 2014 6:59 AM, Tim Deegan wrote:
> >>
> >> At 11:39 + on 27 Nov (1417084797), George Dunlap wrote:
> >> > -BEGIN PGP SIGNED MESSAGE-
> >> > Hash:
On 12/02/14 10:18, Vitaly Kuznetsov wrote:
XEN_DOMCTL_getdomaininfo, which is being used by xc_domain_getinfo(), has
strange interface: it reports first domain which has domid >= requested domid
so all callers are supposed to check that the proper domain(s) was queried
by checking domid. xc_get_t
1 - 100 of 196 matches
Mail list logo