So sorry for that.
On 2015年08月21日 18:09, Jan Beulich wrote:
On 21.08.15 at 09:07, wrote:
First of all - please don't cross post; removing xen-users.
I want to read memory in Xen interval will the guest OS run
normally. I didn't find sleep function in xen source and the delay
function wi
On 21/08/2015 16:02, Vijay Kilari wrote:
On Mon, Aug 17, 2015 at 12:41 PM, Julien Grall wrote:
On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
From: Vijaya Kumar K
Parse host dt and generate ITS node for Dom0.
ITS node resides inside GIC node so when GIC node
is encountered look for
On 21/08/2015 12:47, Chris (Christopher) Brand wrote:
Hi Andrew,
On 21/08/15 00:33, Chris Brand wrote:
Ensure that every bit has a specific value.
Reported-by: Julien Grall
Signed-off-by: Chris Brand
---
v2 adds comments on pxn and avail.
This is no functional change, if the compiler is
On Mon, Aug 17, 2015 at 12:41 PM, Julien Grall wrote:
>
>
> On 27/07/2015 04:12, vijay.kil...@gmail.com wrote:
>>
>> From: Vijaya Kumar K
>>
>> Parse host dt and generate ITS node for Dom0.
>> ITS node resides inside GIC node so when GIC node
>> is encountered look for ITS node.
>>
>> Signed-off-
On Fri, 21 Aug 2015, Konrad Rzeszutek Wilk wrote:
> Hey Stefano,
>
> I get this when I try to compile the tree:
>
>CC
> hw/usb/host-stub.o
> CChw/virtio/v
setup_frametable_mappings() rounds frametable_size up to a multiple
of 32MB. This is wasteful on systems with less than 4GB of RAM,
although it does allow the "contig" bit to be set in the PTEs.
Where the frametable is less than 32MB in size, instead round up
to a multiple of 2MB, not setting the
On 21/08/15 17:53, Roger Pau Monne wrote:
> This structure contains the physical address of the command line, as well as
> the physical address of the list of loaded modules. The physical address of
> this structure is passed to the guest at boot time in the %ebx register.
>
> Signed-off-by: Roger
On 21/08/15 17:53, Roger Pau Monne wrote:
> Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and
> VCPUOP_is_up hypercalls from HVM guests.
>
> This patch introduces a new structure (vcpu_hvm_context) that should be used
> in conjuction with the VCPUOP_initialise hypercall in order
Hi Andrew,
> On 21/08/15 00:33, Chris Brand wrote:
> > Ensure that every bit has a specific value.
> >
> > Reported-by: Julien Grall
> > Signed-off-by: Chris Brand
> > ---
> > v2 adds comments on pxn and avail.
>
> This is no functional change, if the compiler is conforming to the C spec.
>
>
Hey Stefano,
I get this when I try to compile the tree:
CChw/usb/host-stub.o
CChw/virtio/virtio-rng.o
hw/virtio/virtio-rng.c: In function ‘virtio_rng_devi
On 21/08/15 18:55, Konrad Rzeszutek Wilk wrote:
> On Fri, Aug 21, 2015 at 06:51:46PM +0100, Andrew Cooper wrote:
>> This essentially reverts c/s 2037f2adb "x86: introduce
>> alloc_vcpu_guest_context()", including the newer arm bits, but achieves
>> the same end goal by using the newer vmalloc() inf
On Fri, Aug 21, 2015 at 06:51:46PM +0100, Andrew Cooper wrote:
> This essentially reverts c/s 2037f2adb "x86: introduce
> alloc_vcpu_guest_context()", including the newer arm bits, but achieves
> the same end goal by using the newer vmalloc() infrastructure.
Could you explain what this fixes? Or p
This essentially reverts c/s 2037f2adb "x86: introduce
alloc_vcpu_guest_context()", including the newer arm bits, but achieves
the same end goal by using the newer vmalloc() infrastructure.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Tim Deegan
CC: Ian Campbell
CC: Stefano Stabellini
Hey,
I am running Fedora Core 22 which has a recent GCC:
gcc (GCC) 5.1.1 20150618 (Red Hat 5.1.1-4)
and I end up with bunch of compilation errors in ipxe:
LD] bin/ath9k_ar9003_phy.o
drivers/net/ath/ath9k/ath9k_ar9003_phy.c: In function ‘ar9003_hw_ani_control’:
drivers/net/ath/ath9k/ath9k_ar9003_
On 21/08/15 17:53, Roger Pau Monne wrote:
> Introduce a new flag in xc_dom_image that turns on and off the emulated
> devices. This prevents creating the VGA hole, the hvm_info page and the
> ioreq server pages. libxl unconditionally sets it to true for all HVM
> domains at the moment.
>
> Signed-o
flight 60785 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60785/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-qemut-debianhvm-amd64-xsm 19 guest-start/debianhvm.repeat
fail in 60746 pass in 60785
test-amd64
On 21/08/15 17:53, Roger Pau Monne wrote:
> Only allow enabling or disabling all the emulated devices inside of Xen,
> right now Xen doesn't support enabling specific emulated devices only.
>
> Signed-off-by: Roger Pau Monné
> Cc: Jan Beulich
> Cc: Andrew Cooper
Reviewed-by: Andrew Cooper
___
Remove xc_hvm_build_x86.c and xc_hvm_build_arm.c since xc_hvm_build is not
longer used in order to create HVM guests.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
Reviewed-by: Andrew Cooper
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Changes since v4:
- Add
This structure contains the physical address of the command line, as well as
the physical address of the list of loaded modules. The physical address of
this structure is passed to the guest at boot time in the %ebx register.
Signed-off-by: Roger Pau Monné
Cc: Ian Jackson
Cc: Stefano Stabellini
This new elfnote contains the 32bit entry point into the kernel. Xen will
use this entry point in order to launch the guest kernel in 32bit protected
mode with paging disabled.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
Reviewed-by: Andrew Cooper
Cc: Ian Jackson
Cc: Stefano Stabellini
C
Allow the usage of the VCPUOP_initialise, VCPUOP_up, VCPUOP_down and
VCPUOP_is_up hypercalls from HVM guests.
This patch introduces a new structure (vcpu_hvm_context) that should be used
in conjuction with the VCPUOP_initialise hypercall in order to initialize
vCPUs for HVM guests.
Signed-off-by:
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/arch/x86/hvm/stdvga.c | 6 ++
1 file changed, 6 insertions(+)
diff --git a/xen/arch/x86/hvm/stdvga.c b/xen/arch/x86/hvm/stdvga.c
index f50b
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Suravee Suthikulpanit
Cc: Aravind Gopalakrishnan
---
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/drivers/passthrough/amd/iommu_guest.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/passt
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/arch/x86/hvm/pmtimer.c | 13 +
1 file changed, 13 insertions(+)
diff --git a/xen/arch/x86/hvm/pmtimer.c b/xen/arch/x86/hvm/pmtimer.
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/arch/x86/hvm/vioapic.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/xen/arch/x86/hvm/vioapic.c b/xen/arch/x86/hvm/vioapic
Introduce a bitmap in x86 xen_arch_domainconfig that allows enabling or
disabling specific devices emulated inside of Xen for HVM guests.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Jan Beulich
Cc: Andrew
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Boris Ostrovsky
Cc: Suravee Suthikulpanit
Cc: Aravind Gopalakrishnan
Cc: Jan Beulich
Cc: Andrew Cooper
Cc: Jun Nakajima
Cc: Eddie Dong
Cc: Kevin Tian
---
Changes since v4:
- Split the is_pvh_domain check into two, so part of the
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes in v4:
- Add Andrew Cooper Acked-by.
---
xen/arch/x86/hvm/hpet.c | 13 +
xen/arch/x86/hvm/hvm.c | 1 -
2 files changed, 13 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86
Allow xc_dom_elfloader to report a guest type as hvm-3.0-x86_32 if it's
running inside of a HVM container and has the PHYS32_ENTRY elfnote set.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Only xc_dom_elfloa
Replace the firmware loaded into HVM guests with an OS kernel. Since the HVM
builder now uses the PV xc_dom_* set of functions this kernel will be parsed
and loaded inside the guest like on PV, but the container is a pure HVM
guest.
Also, if device_model_version is set to none or a device model fo
HVM guests have always used the emulated serial console by default, but if
the emulated serial pty cannot be fetched from xenstore try to use the PV
console instead.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Chang
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/arch/x86/hvm/rtc.c | 16
1 file changed, 16 insertions(+)
diff --git a/xen/arch/x86/hvm/rtc.c b/xen/arch/x86/hvm/rtc.c
index a
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/arch/x86/cpu/vpmu.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/arch/x86/cpu/vpmu.c b/xen/arch/x86/cpu/vpmu.c
index 8af3df1..d5bb
Only allow enabling or disabling all the emulated devices inside of Xen,
right now Xen doesn't support enabling specific emulated devices only.
Signed-off-by: Roger Pau Monné
Cc: Jan Beulich
Cc: Andrew Cooper
---
xen/arch/x86/domain.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
di
Introduce a new flag in xc_dom_image that turns on and off the emulated
devices. This prevents creating the VGA hole, the hvm_info page and the
ioreq server pages. libxl unconditionally sets it to true for all HVM
domains at the moment.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
Cc: Ian Ja
Signed-off-by: Roger Pau Monné
Acked-by: Andrew Cooper
Cc: Jan Beulich
Cc: Andrew Cooper
---
Changes since v4:
- Add Andrew Cooper Acked-by.
---
xen/arch/x86/hvm/vpic.c | 11 ++-
1 file changed, 10 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/vpic.c b/xen/arch/x86/hvm/v
On Fri, Aug 21, 2015 at 05:08:35PM +0100, David Vrabel wrote:
> On 21/08/15 17:05, Konrad Rzeszutek Wilk wrote:
> >
> > I have to concur with that. We can't mandate that ARM 64k page MUST use
> > indirect descriptors.
>
> Then it has to be fixed in the block layer to allow < PAGE_SIZE segments
>
This allows having different arch_setup_meminit implementations based on the
guest type. It should not introduce any functional changes.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Change
This xc_dom_arch will be used in order to build HVM domains. The code is
based on the existing xc_hvm_populate_memory and xc_hvm_populate_params
functions.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Change
Introduce a very simple (and dummy) domain loader to be used to load the
firmware (hvmloader) into HVM guests. Since hmvloader is just a 32bit elf
executable the loader is fairly simple.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Sta
This series is split in the following order:
- Patches from 1 to 10 switch HVM domain contruction to use the xc_dom_*
family of functions, like they are used to build PV domains. This batch
of patches can go in regardless of the status of the rest of the series
IMHO, and in fact would he
Now that we have all the code in place HVM domain building in libxl can be
switched to use the xc_dom_* family of functions, just like they are used in
order to build PV guests.
Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Li
Introduce the notion of a container type into xc_dom_image. This will be
needed by later changes that will also use xc_dom_image in order to build
HVM guests.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
C
Place the calls to xc_vcpu_setcontext and the allocation of the hypercall
buffer into the arch-specific vcpu hooks. This is needed for the next patch,
so x86 HVM guests can initialize the BSP using XEN_DOMCTL_sethvmcontext
instead of XEN_DOMCTL_setvcpucontext.
This patch should not introduce any f
This should not introduce any functional change.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Changes since v3:
- Add Andrew Cooper Reviewed-by.
- Add Wei Acked-by.
---
tools/libxc/incl
This is just a preparatory change to clean up the code in setup_guest.
Should not introduce any functional changes.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
---
Changes since v3:
- Add An
Unify both functions into xc_dom_p2m. Should not introduce any functional
change.
Signed-off-by: Roger Pau Monné
Reviewed-by: Andrew Cooper
Acked-by: Wei Liu
Cc: Ian Jackson
Cc: Stefano Stabellini
Cc: Ian Campbell
Cc: Wei Liu
Cc: Samuel Thibault
---
Changes since v3:
- Add Andrew Cooper R
On Fri, 21 Aug 2015, David Vrabel wrote:
> On 21/08/15 17:05, Konrad Rzeszutek Wilk wrote:
> >
> > I have to concur with that. We can't mandate that ARM 64k page MUST use
> > indirect descriptors.
>
> Then it has to be fixed in the block layer to allow < PAGE_SIZE segments
> and to get the block
On 21/08/15 16:35, Jan Beulich wrote:
On 21.08.15 at 16:58, wrote:
>> On 21/08/15 09:41, Jan Beulich wrote:
>>> In the course of this I also found that the respective message isn't
>>> really useful without also printing the pre-existing mapping. And I
>>> noticed that map_domain_pirq() allow
On Thu, Aug 20, 2015 at 06:30:17PM -0700, Julien Grall wrote:
>
>
> On 20/08/2015 10:42, David Vrabel wrote:
> >>When using 64KB page, a Linux block request (struct *request) may
> >>contain up to 64KB of data. This is because the block segment size
> >>must at least be the size of a Linux page.
On 21/08/15 17:05, Konrad Rzeszutek Wilk wrote:
>
> I have to concur with that. We can't mandate that ARM 64k page MUST use
> indirect descriptors.
Then it has to be fixed in the block layer to allow < PAGE_SIZE segments
and to get the block layer to split requests for blkfront.
David
_
On Thu, Aug 20, 2015 at 06:23:16PM +0100, Stefano Stabellini wrote:
> On Thu, 20 Aug 2015, David Vrabel wrote:
> > On 20/08/15 09:31, Roger Pau Monné wrote:
> > > El 20/08/15 a les 1.44, Stefano Stabellini ha escrit:
> > >> On Wed, 19 Aug 2015, Roger Pau Monné wrote:
> > >>> My opinion is that we h
>>> On 21.08.15 at 16:58, wrote:
> On 21/08/15 09:41, Jan Beulich wrote:
>> In the course of this I also found that the respective message isn't
>> really useful without also printing the pre-existing mapping. And I
>> noticed that map_domain_pirq() allowed IRQ0 to get through, despite us
>> never
On 21/08/15 09:41, Jan Beulich wrote:
> While moving our XenoLinux patches to 4.2-rc I noticed bogus "already
> mapped" messages resulting from Linux (legitimately) writing RTEs with
> only the mask bit set. Clearly we shouldn't even attempt to create a
> pIRQ <-> IRQ mapping from such RTEs.
Oops.
On Fri, Aug 21, 2015 at 09:05:30AM +0100, Ian Campbell wrote:
> On Wed, 2015-08-19 at 00:18 +, osstest service owner wrote:
> > flight 60719 osstest real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/60719/
> >
> > Failures :-/ but no regressions.
> >
> > Tests which did not suc
On 21/08/15 00:33, Chris Brand wrote:
> Ensure that every bit has a specific value.
>
> Reported-by: Julien Grall
> Signed-off-by: Chris Brand
> ---
> v2 adds comments on pxn and avail.
This is no functional change, if the compiler is conforming to the C spec.
The spec guarantees that structure
flight 60781 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60781/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
Tests which are failin
Our next Xen Project Document Day is this Wednesday, August 26!
Our THEME OF THE MONTH: "User Requests"
This month, we will focus on requests which have appeared in our IRC
channel and UserVoice for additional documentation. Recent requests
include the following:
- Development Documentation: An
The commit 091208a676dfdabb2b8fe86ee155c6fc80081b69 "xen/tmem: Use
xen_page_to_gfn rather than pfn_to_gfn" left behind a call to
xen_tmem_get_page() receiving pfn instead of page.
This change also fixes the following build warning:
drivers/xen/tmem.c: In function ‘tmem_cleancache_get_page’:
drive
Zen Project Q&A suggest I try the Mailing List venue.
Brief background: Conducting a research project for employer,
to replace ESX Hypervisor (with RHEL 5.5, & Windows 7 VM's),
on 32-bit blades, in an ATCA cabinet. End product (for the Army)
is widely deployed. Goal is a less expensive solution,
I have seen some hangs in recent versions of the xen-netfront driver.
If I unload or unbind the driver immediately befor bringing up the
interface, I get a hang as show in the traceback here.
...
[ 194.037351] [] ? msleep+0x27/0x30
[ 194.037358] [] ? xennet_disconnect_backend+0xfa/0x390
[xen
On 8/21/2015 2:35 PM, Tian, Kevin wrote:
From: Yu Zhang [mailto:yu.c.zh...@linux.intel.com]
Sent: Friday, August 21, 2015 11:31 AM
Currently in ioreq server, guest write-protected ram pages are
tracked in the same rangeset with device mmio resources. Yet
unlike device mmio, which can be in big
>>> On 21.08.15 at 09:07, wrote:
First of all - please don't cross post; removing xen-users.
> I want to read memory in Xen interval will the guest OS run
> normally. I didn't find sleep function in xen source and the delay
> function will crack the system. And I think the delay function
>>> On 21.08.15 at 04:25, wrote:
> I'm ok with placing them in the memory not owned by Dom0. Is there some
> ways to find that kind of memory space in Xen?
Who do you need to be able to find such memory? Or maybe I'm not
getting what or why you're asking...
Jan
flight 37840 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/37840/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-build fail REGR. vs. 37834
Tests whic
On Thu, 2015-08-13 at 19:06 +0100, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH OSSTEST v2] Disable proxy for all
> preseeded wget"):
> > At least in some contexts scripts can be run with http_proxy
> > pointing
> > to the apt proxy (I noticed it in /usr/lib/base-installer.d/ hook
> > used
On Thu, 2015-08-13 at 17:52 +0100, Ian Campbell wrote:
> This is under the same conditional as the nobootloader confirmation
> one, since they effectively both stem from the lack of a boot loader
> and the consequential use of the pv-grub-menu package.
>
> Signed-off-by: Ian Campbell
I resent th
On 19/08/15 12:12, Bob Liu wrote:
> Hi Jens & Christoph,
>
> Rafal reported an issue about this patch, that's after this patch no more
> merges happen and the performance dropped if "modprobe null_blk irqmode=2
> completion_nsec=100",
> but works fine if "modprobe null_blk".
>
> I'm not sure
While moving our XenoLinux patches to 4.2-rc I noticed bogus "already
mapped" messages resulting from Linux (legitimately) writing RTEs with
only the mask bit set. Clearly we shouldn't even attempt to create a
pIRQ <-> IRQ mapping from such RTEs.
In the course of this I also found that the respect
From: Shannon Zhao
Hanjun Guo (1):
ACPI / table: Replace '1' with specific error return values
Len Brown (1):
ACPI: disable ACPI cleanly when bad RSDP found
Tomasz Nowicki (1):
ACPI/table: Always count matched and successfully parsed entries
xen/drivers/acpi/tables.c | 14 +++---
From: Len Brown
When ACPI is disabled in the BIOS of this VIA C3 box,
it invalidates the RSDP, which Linux notices:
ACPI Error (tbxfroot-0218): A valid RSDP was not found [20080926]
Bug Linux neglected to disable ACPI at that stage,
and later scribbled on smp_found_config:
ACPI: No APIC-table,
From: Tomasz Nowicki
acpi_parse_entries() allows to traverse all available table entries (aka
subtables) by passing max_entries parameter equal to 0, but since its count
variable is only incremented if max_entries is not 0, the function always
returns 0 for max_entries equal to 0. It would be mo
From: Hanjun Guo
After commit 7f8f97c3cc (ACPI: acpi_table_parse() now returns
success/fail, not count), acpi_table_parse() returns '1' when it is
unable to find the table, but it should return a negative error code
in that case. Make it return -ENODEV instead.
Fix the same problem in acpi_tabl
On Mon, 2015-08-17 at 19:56 +0100, Wei Liu wrote:
> Wei Liu (3):
> xl: fix vNUMA vdistance parsing
> xl: error out if vNUMA specifies more vcpus than pcpus
> libxc: fix vNUMA memory allocation
>
All applied, thanks.
___
Xen-devel mailing list
Xe
On Wed, 2015-08-19 at 00:18 +, osstest service owner wrote:
> flight 60719 osstest real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/60719/
>
> Failures :-/ but no regressions.
>
> Tests which did not succeed, but are not blocking:
> [...]
> test-amd64-i386-libvirt-pair 21 guest
flight 60779 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/60779/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 16
guest-start/debianhvm.repeat fail REGR. vs. 60681
Hi all,
I want to read memory in Xen interval will the guest OS run
normally. I didn't find sleep function in xen source and the delay
function will crack the system. And I think the delay function will also
stop the guest OS. Does anyone have any idea of which function I should
use ?
T
77 matches
Mail list logo