From: Paul Durrant
Date: Thu, 6 Oct 2016 15:47:10 +0100
> In the case when a frontend only negotiates a single queue with xen-
> netback it is possible for a skbuff with a s/w hash to result in a
> hash extra_info segment being sent to the frontend even when no hash
> algorithm has been configure
This run is configured for baseline tests only.
flight 67834 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67834/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl 11 guest-start
flight 101317 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101317/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 6 xen-boot fail REGR. vs. 101309
test-amd64-amd64-xl-qemuu-
From: Paul Durrant
Date: Tue, 4 Oct 2016 10:29:11 +0100
> This series refactors the guest rx side of xen-netback:
>
> - The code is moved into its own source module.
>
> - The prefix variant of GSO handling is retired (since it is no longer
> in common use, and alternatives exist).
>
> - The
flight 101310 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101310/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-xl-raw 9 debian-di-install fail in 101300 pass in 101310
test-amd64-amd64-libvirt-qemuu-d
On Thu, Oct 06, 2016 at 07:41:45PM +0100, Ian Jackson wrote:
> If make-flight is run with a $buildflight argument, it does not create
> any build jobs. The test jobs are supposed to refer to the build jobs.
>
> This was not done correctly for the XTF tests. Add the missing ${bfi}.
>
> Signed-of
flight 101309 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101309/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail like 101269
test-amd64-i386-xl-qemuu-w
If make-flight is run with a $buildflight argument, it does not create
any build jobs. The test jobs are supposed to refer to the build jobs.
This was not done correctly for the XTF tests. Add the missing ${bfi}.
Signed-off-by: Ian Jackson
CC: Wei Liu
---
make-flight | 2 +-
1 file changed,
The main Xen Project osstest instance is still using Linux 3.14 which
is ancient. It would be nice to update to something newer. 4.1 was
suggested.
However, I went to look at the most recent test results for the Linux
4.1 branch. It can't start guests reliably:
osstest service owner writes ("[
On Thu, Oct 6, 2016 at 11:10 AM, Julien Grall wrote:
>
>
> On 06/10/2016 09:39, Tamas K Lengyel wrote:
>
>>
>>
>> On Thu, Oct 6, 2016 at 3:59 AM, Razvan Cojocaru
>> mailto:rcojoc...@bitdefender.com>> wrote:
>>
>> On 10/05/2016 11:54 PM, Julien Grall wrote:
>> >
>> >
>> > On 05/10/
On 06/10/2016 09:39, Tamas K Lengyel wrote:
On Thu, Oct 6, 2016 at 3:59 AM, Razvan Cojocaru
mailto:rcojoc...@bitdefender.com>> wrote:
On 10/05/2016 11:54 PM, Julien Grall wrote:
>
>
> On 05/10/2016 13:23, Tamas K Lengyel wrote:
>> Hi Julien,
>> It is expected that cer
Martin Kletzander writes ("Re: [OSSTEST PATCH 2/2] libvirt: Do not attempt
save/restore when migration not advertised"):
> Well then, unfortunately you do.
>
> Also, looking at how the code is structured, if you have live migration
> but don't have save/restore, you won't have there
> at all.
R
On Thu, Oct 6, 2016 at 3:59 AM, Razvan Cojocaru
wrote:
> On 10/05/2016 11:54 PM, Julien Grall wrote:
> >
> >
> > On 05/10/2016 13:23, Tamas K Lengyel wrote:
> >> Hi Julien,
> >> It is expected that certain combinations of mem_access flags will put
> >> the domain into unstable condition, resultin
From: "Edgar E. Iglesias"
Disable the Cortex-a53-edac. Xen currently does not yet
handle reads/writes to the implementation defined CPUMERRSR
register.
Signed-off-by: Edgar E. Iglesias
---
xen/arch/arm/domain_build.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/arch/arm/domain_build
From: "Edgar E. Iglesias"
The Cortex-A53 EDAC (Error Detection And Correction) Linux driver
uses the implementation defined CPUMERRSR register.
Xen traps but does not yet handle accesses to this reg so dom0 panics
on an undefined instruction at boot.
For Xen-4.8, this patchs disables the A53 EDA
Signed-off-by: Ian Jackson
---
Osstest/Executive.pm | 25 +
1 file changed, 17 insertions(+), 8 deletions(-)
diff --git a/Osstest/Executive.pm b/Osstest/Executive.pm
index 137eb44..14f75b3 100644
--- a/Osstest/Executive.pm
+++ b/Osstest/Executive.pm
@@ -45,7 +45,7 @@ BEGI
Freely shareable resources don't appear in the plan, and the plan is
not always immediately updated, and is generally not always a
convenient interface. Provide a command line way to list allocated
resources.
Signed-off-by: Ian Jackson
---
mg-allocate | 92 ++
Hello Lars,
I have checked the eligibility for Outreachy program and I meet all the
requirements. I am a 25 year-old African American male whom is a newcomer to
the free and open source community and a resident of United States. I am not
enrolled in school full-time and I don’t have a full time
On Mon, Oct 03, 2016 at 11:57:13AM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> > Roger Pau Monne
> > Sent: 27 September 2016 16:57
> > To: xen-de...@lists.xenproject.org
> > Cc: boris.ostrov...@oracle.com; Rog
On Mon, Oct 03, 2016 at 11:46:25AM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Roger Pau Monne [mailto:roger@citrix.com]
> > Sent: 27 September 2016 16:57
> > To: xen-de...@lists.xenproject.org
> > Cc: konrad.w...@oracle.com; boris.ostrov...@oracle.com; Roger Pau Monne
>
On 06/10/2016 17:08, "Roger Pau Monne" wrote:
>On Mon, Oct 03, 2016 at 10:54:54AM +0100, Paul Durrant wrote:
>> > -Original Message-
>> > From: Roger Pau Monne [mailto:roger@citrix.com]
>> > Sent: 27 September 2016 16:57
>> > To: xen-de...@lists.xenproject.org
>> > Cc: konrad.w...@o
On 06/10/16 16:40, Jan Beulich wrote:
On 27.09.16 at 17:57, wrote:
>> FWIW, I think that the current approach that I've used in order to craft the
>> MADT is not the best one, IMHO it would be better to place the MADT at the
>> end of the E820_ACPI region (expanding it's size one page), and m
>>> On 27.09.16 at 17:57, wrote:
> Because it's also going to be used by other code.
If you want to make use of this for general purpose sizing, simply
moving the existing code is not enough. For one I/O port BARs
don't get handled (as SR-IOV devices aren't allowed to have such).
And then I'm afr
>>> On 27.09.16 at 17:57, wrote:
> Most of this code has been picked up from QEMU and modified so it can be
> plugged into the internal Xen IO handlers. The structure of the handlers has
> been keep quite similar to QEMU, so existing handlers can be imported
> without a lot of effort.
Without loo
>>> On 27.09.16 at 17:57, wrote:
> --- a/xen/arch/x86/traps.c
> +++ b/xen/arch/x86/traps.c
> @@ -2076,45 +2076,6 @@ static bool_t admin_io_okay(unsigned int port,
> unsigned int bytes,
> return ioports_access_permitted(d, port, port + bytes - 1);
> }
>
> -static bool_t pci_cfg_ok(struct d
On Mon, Oct 03, 2016 at 11:10:44AM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Roger Pau Monne [mailto:roger@citrix.com]
> > Sent: 27 September 2016 16:57
> > To: xen-de...@lists.xenproject.org
> > Cc: konrad.w...@oracle.com; boris.ostrov...@oracle.com; Roger Pau Monne
>
>>> On 27.09.16 at 17:57, wrote:
> FWIW, I think that the current approach that I've used in order to craft the
> MADT is not the best one, IMHO it would be better to place the MADT at the
> end of the E820_ACPI region (expanding it's size one page), and modify the
> XSDT/RSDT in order to point to
>>> On 27.09.16 at 17:57, wrote:
> The logic used to setup the CPUID leaves is extremely simplistic (and
> probably wrong for hardware different than mine). I'm not sure what's the
> best way to deal with this, the code that currently sets the CPUID leaves
> for HVM guests lives in libxc, maybe mo
On 06/10/16 15:26, Ronald Rojas wrote:
> On Wed, Oct 05, 2016 at 06:44:08PM +0100, George Dunlap wrote:
>> On Tue, Oct 4, 2016 at 3:23 PM, George Dunlap
>> wrote:
>>> Thanks for this -- if you're up for it, let me see what kinds of next
>>> steps you can do (obviously when you have the opportunit
>>> On 27.09.16 at 17:57, wrote:
> +start_info.modlist_paddr = last_addr;
> +start_info.nr_modules = 1;
> +last_addr += sizeof(mod);
How can this be unconditionally 1? It is certainly possible to boot
without initrd.
Jan
___
Xen-devel mai
On Mon, Oct 03, 2016 at 10:54:54AM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Roger Pau Monne [mailto:roger@citrix.com]
> > Sent: 27 September 2016 16:57
> > To: xen-de...@lists.xenproject.org
> > Cc: konrad.w...@oracle.com; boris.ostrov...@oracle.com; Roger Pau Monne
>
In the case when a frontend only negotiates a single queue with xen-
netback it is possible for a skbuff with a s/w hash to result in a
hash extra_info segment being sent to the frontend even when no hash
algorithm has been configured. (The ndo_select_queue() entry point makes
sure the hash is not
On 06/10/16 15:37, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> Cc: Andrew Cooper
> Cc: George Dunlap
> Cc: Ian Jackson
> Cc: Jan Beulich
> Cc: Konrad Rzeszutek Wilk
> Cc: Stefano Stabellini
> Cc: Tim Deegan
> Cc: Wei Liu
> ---
> xen/Makefile | 1 +
> 1 file changed, 1 insertion(+)
>
>
On Thu, Oct 06, 2016 at 03:55:25PM +0100, Andrew Cooper wrote:
> On 06/10/16 15:37, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > Cc: Andrew Cooper
> > Cc: George Dunlap
> > Cc: Ian Jackson
> > Cc: Jan Beulich
> > Cc: Konrad Rzeszutek Wilk
> > Cc: Stefano Stabellini
> > Cc: Tim Deega
Used to hide feature that is completely broken.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
Cc: Doug Goldstein
---
xen/Kconfig | 3 +++
1 file changed, 3 insert
Provide two tools: a small C program to extract data from hypervisor and
a python script to split data into multiple files.
The file xencov.c is salvaged and modified from the original xencov.c.
Signed-off-by: Wei Liu
---
Cc: Ian Jackson
---
tools/misc/Makefile | 6 ++
tools/misc/xencov.
And make it the default in Kconfig.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
xen/Kconfig.debug| 9 -
xen/common/gcov/Makefile | 2 ++
2 fi
It returns different string depending on compiler version.
No user yet.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
Config.mk | 5 +
1 file changed, 5 i
A new sysctl interface for passing gcov data back to userspace. The new
interface uses a customised record file format. The new sysctl reuses
original sysctl number but renames the op to gcov_op.
Both gcc 3.4 and 4.7 format are supported. The code is rewritten so that
a new format can be easily ad
The original implementation of gcov support in Xen has several
limitations:
1. The internal data structures are tied to gcc 3.4 format.
2. The sysctl interface is tied to gcc 3.4 format.
3. The gcov type definition is wrong, doesn't work with 32 bit
hypervisor, which means arm32 wouldn't work.
The internal data structure and code are tied to an old gcov format.
It's easier to just redo everything from scratch.
Salvage the reusable parts: leave xen/common/gcov and an empty Makefile
there, leave gcov support in Kconfig but mark that as broken. Also
reserve the sysctl number for later use
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
xen/Makefile | 1 +
1 file changed, 1 insertion(+)
diff --git a/xen/Makefile b/xen/Makefile
index c511330..80fff6
... so that we can do other comparisons as well.
No functional change.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
Config.mk | 8
1 file changed, 4
On Mon, Oct 03, 2016 at 10:02:27AM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Roger Pau Monne [mailto:roger@citrix.com]
> > Sent: 27 September 2016 16:57
> > To: xen-de...@lists.xenproject.org
> > Cc: konrad.w...@oracle.com; boris.ostrov...@oracle.com; Roger Pau Monne
>
On Wed, Oct 05, 2016 at 06:44:08PM +0100, George Dunlap wrote:
> On Tue, Oct 4, 2016 at 3:23 PM, George Dunlap
> wrote:
> > Thanks for this -- if you're up for it, let me see what kinds of next
> > steps you can do (obviously when you have the opportunity).
>
> So there are a couple of things we
On 05/10/16 18:09, Boris Ostrovsky wrote:
> Early during boot topology_update_package_map() computes
> logical_pkg_ids for all present processors.
>
> Later, when processors are brought up, identify_cpu() updates
> these values based on phys_pkg_id which is a function of
> initial_apicid. On PV gu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-4.9-rc0-tag
xen: features and fixes for 4.9-rc0
- - Switch to new CPU hotplug mechanism.
- - Support driver_override in pciback.
- - Re
On Thu, Oct 06, 2016 at 02:58:57PM +0200, bla...@riseup.net wrote:
[...]
> multiboot /xen.gz
> echo'Loading Xen with linux-grsec...'
> module /vmlinuz-linux root=/dev/mapper/leonovo-rootvol rw
> cryptdevice=UUID=02bbde36-5fda-478f-a54f-b6f495e24961:leonovo
> root=/dev/ma
>>> On 06.10.16 at 14:39, wrote:
> I'm amazed at and grateful for your interest in my issue. It is an efi
> system
In this case please retry using xen.efi instead of indirecting via
grub.efi. See http://xenbits.xen.org/docs/unstable/misc/efi.html
for what you may need to set up. If that works we
bla...@riseup.net:
bla...@riseup.net:
Konrad Rzeszutek Wilk:
On Thu, Oct 06, 2016 at 12:59:13PM +0200, Blallo wrote:
I'm using grub2. After the lunch break I can post the full grub menu entry and
the exact version of grub2.
Cc-ing Daniel (who is now an GRUB2 maintainer).
Is this by chance
bla...@riseup.net:
Konrad Rzeszutek Wilk:
On Thu, Oct 06, 2016 at 12:59:13PM +0200, Blallo wrote:
I'm using grub2. After the lunch break I can post the full grub menu entry and
the exact version of grub2.
Cc-ing Daniel (who is now an GRUB2 maintainer).
Is this by chance an EFI box?And you a
Konrad Rzeszutek Wilk:
On Thu, Oct 06, 2016 at 12:59:13PM +0200, Blallo wrote:
I'm using grub2. After the lunch break I can post the full grub menu entry and
the exact version of grub2.
Cc-ing Daniel (who is now an GRUB2 maintainer).
Is this by chance an EFI box?And you are booting using EFI
>>> On 30.09.16 at 04:19, wrote:
> --- a/xen/common/timer.c
> +++ b/xen/common/timer.c
> @@ -530,6 +530,7 @@ static void dump_timerq(unsigned char key)
> {
> ts = &per_cpu(timers, i);
>
> +process_pending_softirqs();
> printk("CPU%02d:\n", i);
> spin_lock_
>>> On 30.09.16 at 04:19, wrote:
> @@ -87,10 +89,10 @@ void handle_keypress(unsigned char key, struct
> cpu_user_regs *regs)
> if ( key >= ARRAY_SIZE(key_table) || !(h = &key_table[key])->fn )
> return;
>
> -if ( !in_irq() || h->irq_callback )
> +if ( h->irq_callback )
Pl
>>> On 04.10.16 at 20:13, wrote:
> v8 of this patch.
> No change since v4 since we've just focused on patch #1 in this series.
Well, not exactly: I did repeatedly mention that comments made
there should be applied to the other parts of the original series.
Anyway...
> @@ -66,6 +67,62 @@ altp2m_v
Konrad Rzeszutek Wilk:
On Thu, Oct 06, 2016 at 12:59:13PM +0200, Blallo wrote:
I'm using grub2. After the lunch break I can post the full grub menu entry and
the exact version of grub2.
Cc-ing Daniel (who is now an GRUB2 maintainer).
Is this by chance an EFI box?And you are booting using EFI
Following on from commits 5602e74c60 ("x86emul: correct loading of
%ss") and bdb860d01c ("x86/HVM: correct segment register loading during
task switch") the point of the non-.present checks needs to be refined:
#NP (and its #SS companion), other than suggested by the various
instruction pages in In
>>> On 05.10.16 at 20:30, wrote:
> On 30/09/2016 02:46, Jan Beulich wrote:
> On 29.09.16 at 23:42, wrote:
>>> +#else
>>> +static void __init free_ebmalloc_unused_mem(void)
>>> +{
>>> +}
>>> +#endif
>>
>> Did you build test this for ARM? The function ought to be unused,
>> as ...
>>
>>> @@ -12
>>> On 05.10.16 at 18:17, wrote:
> On Wed, Oct 05, 2016 at 09:51:06AM -0600, Jan Beulich wrote:
>> >>> On 05.10.16 at 17:11, wrote:
>> > +/*
>> > + * Load the section headers.
>> > + *
>> > + * NB: this _must_ be done one by one, and taking the bitness into
>> > account,
>> > +
This run is configured for baseline tests only.
flight 67814 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67814/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-xsm 3 host-install(3) broken bas
Resource shares with no resource_sharing entry are freely shareable
and do not need the planning system. Indeed, they currently break the
planner.
Signed-off-by: Ian Jackson
---
ms-planner | 6 ++
1 file changed, 6 insertions(+)
diff --git a/ms-planner b/ms-planner
index bce6e13..8106544 1
If no steps in a job are executed, there can be a failure with a
synthetic step row, containing a stepno of ''. This causes a perl
warning when compared with <=>:
Argument "" isn't numeric in numeric comparison (<=>) at ./sg-report-flight
line 774.
Fix this by replacing falseish values with 0.
Signed-off-by: Ian Jackson
---
ms-planner | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ms-planner b/ms-planner
index 8106544..22f9806 100755
--- a/ms-planner
+++ b/ms-planner
@@ -331,7 +331,7 @@ END
my ($reso, $shareix) = ($`, $1);
my $share= $currentshare
>>> On 05.10.16 at 19:09, wrote:
> Early during boot topology_update_package_map() computes
> logical_pkg_ids for all present processors.
>
> Later, when processors are brought up, identify_cpu() updates
> these values based on phys_pkg_id which is a function of
> initial_apicid. On PV guests the
On Thu, Oct 06, 2016 at 12:59:13PM +0200, Blallo wrote:
> I'm using grub2. After the lunch break I can post the full grub menu entry
> and the exact version of grub2.
Cc-ing Daniel (who is now an GRUB2 maintainer).
Is this by chance an EFI box?And you are booting using EFI GRUB2?
>
>
> On 6 Oc
On Mon, Oct 03, 2016 at 09:05:43AM +0100, Paul Durrant wrote:
> > -Original Message-
> > From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> > Roger Pau Monne
> > Sent: 27 September 2016 16:57
> > To: xen-de...@lists.xenproject.org
> > Cc: George Dunlap ; Andrew Cooper
>
flight 67812 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67812/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 2 hosts-allocate broken REG
Hello Jesus!
Thank you for taking the time out of your busy schedule to responded. I would
love a summary of the small contribution over email, as this will allow me to
get started on the project sooner. I am located in Florida USA, on Eastern
Daylight Time and available anytime on October 6th
Hello Xen Project Team!
My name is Tevin Mallory, I am graduate student with a knack for data analytics
and a deep interest in coding. I wish to take a moment to introduce myself to
you by email to say hello. I´m enthusiastic about applying to join this team as
an Outreachy intern and look forwa
Hi Jesus,
10:30am EST on Friday the 7th sounds great. I’ll get started on my task and
bring any questions I may have to the IRC meeting. I’ll keep Friday clear just
incase we need to adjust our meeting time to included Lars as well.
Thank you for your time.
-Tevin K. Mallory
Sent from Ma
Andrew Cooper:
On 05/10/16 14:02, George Dunlap wrote:
On 05/10/16 13:52, bla...@riseup.net wrote:
George Dunlap:
On Wed, Oct 5, 2016 at 11:16 AM, wrote:
Hi all,
I have been wondering if I could manage to make Xen function on my
laptop, using as dom0 my Arch Linux installation. As far as I
I'm using grub2. After the lunch break I can post the full grub menu entry and
the exact version of grub2.
On 6 October 2016 12:55:16 CEST, George Dunlap wrote:
>On Wed, Oct 5, 2016 at 3:01 PM, Jan Beulich wrote:
> On 05.10.16 at 15:32, wrote:
>>> Here it comes xl dmesg with Xen booted wi
On Wed, Oct 5, 2016 at 3:01 PM, Jan Beulich wrote:
On 05.10.16 at 15:32, wrote:
>> Here it comes xl dmesg with Xen booted with e820-verbose=true
>
> I have to admit that the only way I can see
>
> (XEN) Initial Xen-e820 RAM map:
> (XEN) - 0009ec00 (usable)
> (XEN)
On Thu, Oct 06, 2016 at 10:59:06AM +0100, Ian Jackson wrote:
Martin Kletzander writes ("Re: [OSSTEST PATCH 2/2] libvirt: Do not attempt
save/restore when migration not advertised"):
Since offline migration (as in migrating a domain between hosts without
being running) is not that used in the co
flight 101301 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101301/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 12 migrate-support-checkfail never pass
test-armhf-armhf-libvirt-xsm 14 guest-sav
This run is configured for baseline tests only.
flight 67811 xen-4.5-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67811/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops
Julien Grall writes ("Re: [OSSTEST PATCH 1/2] libvirt: Check migration
capabilities using proper XML parser"):
> On 04/10/2016 10:05, Ian Jackson wrote:
> > Missing _. I didn't test this again before sending it. I'd still
> > like a review from libvirt (and Xen/ARM) folks.
>
> I am not sure wha
Martin Kletzander writes ("Re: [OSSTEST PATCH 2/2] libvirt: Do not attempt
save/restore when migration not advertised"):
> Since offline migration (as in migrating a domain between hosts without
> being running) is not that used in the code and talked about, I'm
> guessing offline means save resto
On 10/05/2016 11:54 PM, Julien Grall wrote:
>
>
> On 05/10/2016 13:23, Tamas K Lengyel wrote:
>> Hi Julien,
>> It is expected that certain combinations of mem_access flags will put
>> the domain into unstable condition, resulting in a crash or a hang. As
>> Razvan mentioned, on x86 we can end up
flight 101300 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101300/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 101250
te
On Wed, Oct 05, 2016 at 06:06:29PM -0600, Jim Fehlig wrote:
On 10/04/2016 11:02 AM, Ian Jackson wrote:
Currently, osstest wrongly thinks that ARM can do save/restore,
because `virsh help' does mention the save command (on all
architectures).
Additionally, check the virth capabilities xpath
/
Kevin,
I just wanted to make sure that you checked you are eligible for Outreachy
Lars
> On 6 Oct 2016, at 02:08, tevin.k.mall...@gmail.com wrote:
>
> Hi Jesus,
>
> 10:30am EST on Friday the 7th sounds great. I’ll get started on my task and
> bring any questions I may have to the IRC meeting.
This run is configured for baseline tests only.
flight 67810 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67810/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-xsm 2 ho
flight 101303 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101303/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf e8a70885d8f34533b6dd69878fe95a249e9af086
baseline version:
ovmf 2cf9ecd2262e4098171fa
84 matches
Mail list logo