This run is configured for baseline tests only.
flight 68297 seabios real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68297/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop
Hi Methuku,
On Fri, Dec 30, 2016 at 4:38 PM, Methuku Karthik wrote:
> Hello Everyone,
>
> I am trying to run Xen on Jetson TX1.
>
> I have compiled uboot and changed the mode to nonsec. but I am not seeing
> any message about cpu mode in dmesg.
>
> how to check which mode the cpus have started ?
Hook up virtual_intr_delivery_enabled and deliver_posted_intr functions
when AVIC is enabled.
Signed-off-by: Suravee Suthikulpanit
Cc: Konrad Rzeszutek Wilk
Cc: Jan Beulich
Cc: Boris Ostrovsky
---
xen/arch/x86/hvm/svm/svm.c | 26 +-
xen/include/asm-x86/hvm/svm/
Enabling AVIC implicitly disables the V_IRQ, V_INTR_PRIO, V_IGN_TPR,
and V_INTR_VECTOR fields in the VMCB Control Word. Therefore, this patch
introduces new interrupt injection code via AVIC backing page.
Signed-off-by: Suravee Suthikulpanit
Cc: Konrad Rzeszutek Wilk
Cc: Jan Beulich
Cc: Boris O
Adding new key-handler "j" for dumping AVIC-related information.
Here is an example of per-domain statistics being dumped.
*** SVM AVIC Statistics **
>>> Domain 1 <<<
VCPU 0
* incomp_ipi = 3110
* noaccel= 236475
* post_intr = 116176
* door
Expose vlapic_read_aligned and vlapic_reg_write() to be used by AVIC.
Signed-off-by: Suravee Suthikulpanit
Reviewed-by: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
---
xen/arch/x86/hvm/vlapic.c| 5 ++---
xen/include/asm-x86/hvm/vlapic.h | 4
2 files changed, 6 insertions(+), 3 delet
CHANGES FROM RFC PATCH (v1):
=
https://lists.xenproject.org/archives/html/xen-devel/2016-09/msg01815.html
* Rebased to Xen-4.8
* Miscellaneous styling changes based on review comments from Konrad, Jan.
* Add key handle for dumping AVIC-related statistics.
* Add a new
Add hooks to manage AVIC data structure during vcpu scheduling.
Signed-off-by: Suravee Suthikulpanit
Cc: Konrad Rzeszutek Wilk
Cc: Jan Beulich
Cc: Boris Ostrovsky
---
xen/arch/x86/hvm/svm/avic.c | 78 +
xen/arch/x86/hvm/svm/svm.c | 10 ++
2 fil
AVIC introduces two new #vmexit handlers:
VMEXIT_INCOMP_IPI:
This occurs when an IPI could not be delivered to all targeted guest
virtual processors because at least one guest virtual processor
was not allocated to a physical core at the time. In this case,
Xen would try to emulate IPI.
VMEXIT_DO
Since vlapic_init() is called before vcpu_initialise().
We should call the destroy functions in the the reverse order here.
Signed-off-by: Suravee Suthikulpanit
Reviewed-by: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
Cc: Jun Nakajima
Cc: Kevin Tian
---
xen/arch/x86/hvm/hvm.c | 4 ++--
1 file
The current function pointers for managing hvm posted interrupt
can be used also by SVM AVIC. Therefore, this patch introduces the
struct hvm_pi_ops in the struct hvm_domain to hold them.
Signed-off-by: Suravee Suthikulpanit
Reviewed-by: Konrad Rzeszutek Wilk
Cc: Boris Ostrovsky
Cc: Jun Nakajim
Introduce AVIC-related VMCB fields.
Signed-off-by: Suravee Suthikulpanit
Reviewed-by: Konrad Rzeszutek Wilk
Cc: Konrad Rzeszutek Wilk
Cc: Jan Beulich
Cc: Boris Ostrovsky
---
xen/include/asm-x86/hvm/svm/vmcb.h | 23 +++
1 file changed, 15 insertions(+), 8 deletions(-)
dif
Introduce AVIC base initialization code. This includes:
* Setting up per-VM data structures.
* Setting up per-vCPU data structure.
* Initializing AVIC-related VMCB bit fields.
This patch also introduces a new Xen parameter (svm-avic),
which can be used to enable/disable AVIC support.
C
Hello,
Thanks for your reply. DRBD isn't part of the kernel ? I was thinking it
has been included since 2.6.3x ?
I've just tested without DRBD, the issue seems to remain. Can't see the
"BUG", but the kernel crashed also. (A little bit later)
I don't have full dump since I lost my network conn
MasterPrenium writes:
> Hello Guys,
>
> I've having some trouble on a new system I'm setting up. I'm getting a
> kernel BUG message, seems to be related with the use of Xen (when I
> boot the system _without_ Xen, I don't get any crash).
> Here is configuration :
> - 3x Hard Drives running on RAID
flight 104000 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/104000/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop fail like 102858
test-amd64-amd64-xl-qemuu-win7-a
Hello,
we have tried some more tests with the system. It seems the CPU speed ist the
problem in this case.
I have installed the Tool unixbench. When the Hypervisor Kernel is bootet,
Unixbench make 2.900 Benchmark Points. When we boot the same Kernel without
Hypervisor, it generates 7.900 Bench
[Cc-ing someone which have done disk benchmark in somewhat recent time]
On Tue, 2016-12-27 at 14:26 +, Michael Schinzel wrote:
> We have searched in the last days more and more for the cause of this
> performance issue.
>
> In cooperation with the datacenter, we change some hardware to check
On Thu, 2016-12-22 at 10:52 +0530, George John wrote:
> hi,
>
> Can anybody give a list of intel based boards for automotive
> embedded use case in which xen could be installed?.
>
I personally can't.
I tend to think that you may have more probability of getting an useful
answer if you turn th
flight 68295 distros-debian-jessie real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68295/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-armhf-jessie-netboot-pygrub 11 migrate-support-check fail
never pass
test-armhf-armhf-
flight 103999 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/103999/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-credit2 15 guest-start/debian.repeatfail like 103982
test-armhf-armhf-libvirt-xs
21 matches
Mail list logo