From: "longtao.pang"
This patch is used for preparing and installing L1 guest VM inside L0 system
on testhost machine.
---
Osstest/Debian.pm | 27 ++-
Osstest/TestSupport.pm | 31 ++-
sg-run-job |5 +
ts-debian-hvm
Commit 545607eb3c ("x86: fix various issues with handling guest IRQs")
wasn't really consistent in one respect: The granting of access to an
IRQ shouldn't assume the pIRQ->IRQ translation to be the same in both
domains. In fact it is wrong to assume that a translation is already/
still in place at
We updated these patchs(version_3) again about adding Nested test job into
OSSTest.
Nested virtualization is the function of running a hypervisor inside a virtual
machine.
The hypervisor that runs on the real hardware is called a level 0 or L0;
The hypervisor that runs as a guest inside L0 is cal
From: "longtao.pang"
This patch is used for building XEN and HVM Dom0 kernel for L1 guest VM,
and then reboot L1 guest into xen kernel.
---
sg-run-job |1 +
ts-xen-install | 149 +---
2 files changed, 111 insertions(+), 39 deletions(-
From: "longtao.pang"
This patch is used for installing L2 guest VM inside L1 guest VM.
---
sg-run-job|2 +
ts-debian-install | 166 +
2 files changed, 132 insertions(+), 36 deletions(-)
diff --git a/sg-run-job b/sg-run-job
index
From: "longtao.pang"
This patch is used for inserting nested test job name and runvars into
standalone.db database after execute command './standalone-reset'.
---
make-flight | 19 +++
mfi-common |8
2 files changed, 27 insertions(+)
diff --git a/make-flight b/m
>>> On 09.12.14 at 19:05, wrote:
> Tuesday, December 9, 2014, 6:29:08 PM, you wrote:
>> I see these too when Dom0 shuts down,
>> at least for certain drivers. For HVM arguably qemu might know
>> better and tear things down properly, but in no event are these
>> messages - when occurring in connect
>>> On 09.12.14 at 18:52, wrote:
> On Tue, Dec 09, 2014 at 04:46:22PM +, Jan Beulich wrote:
>> >>> On 01.12.14 at 16:33, wrote:
>> > + */
>> > +
>> > +#ifndef __HVMLOADER_VNUMA_H__
>> > +#define __HVMLOADER_VNUMA_H__
>> > +
>> > +#include
>> > +
>> > +#define MAX_VNODES 64
>> > +#define
>>> On 09.12.14 at 19:06, wrote:
> On Tue, Dec 09, 2014 at 04:53:40PM +, Jan Beulich wrote:
>> >>> On 01.12.14 at 16:33, wrote:
>> > +memset(memory, 0, sizeof(*memory));
>> > +memory->type = ACPI_MEMORY_AFFINITY;
>> > +memory->length= sizeof(*memory);
>>> On 10.12.14 at 02:07, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Tuesday, December 09, 2014 6:50 PM
>>
>> >>> On 09.12.14 at 11:37, wrote:
>> > On 12/9/2014 6:19 PM, Paul Durrant wrote:
>> >> I think use of an raw mfn value currently works only because dom0 is using
>>
flight 32162 xen-4.2-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32162/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemut-rhel6hvm-intel 3 host-install(3) broken REGR. vs. 31897
build-amd64-rumpu
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, December 10, 2014 4:39 PM
>
> >>> On 10.12.14 at 02:07, wrote:
> >> From: Jan Beulich [mailto:jbeul...@suse.com]
> >> Sent: Tuesday, December 09, 2014 6:50 PM
> >>
> >> >>> On 09.12.14 at 11:37, wrote:
> >> > On 12/9/2014 6:19 PM
> From: Tian, Kevin
> Sent: Wednesday, December 10, 2014 4:48 PM
>
> > From: Jan Beulich [mailto:jbeul...@suse.com]
> > Sent: Wednesday, December 10, 2014 4:39 PM
> >
> > >>> On 10.12.14 at 02:07, wrote:
> > >> From: Jan Beulich [mailto:jbeul...@suse.com]
> > >> Sent: Tuesday, December 09, 2014
>>> On 10.12.14 at 04:39, wrote:
> 1. It's more efficient for new people to start from a small, well-defined
> task
> in one area, and then spanning to adjacent areas gradually. Patience must
> be given by the community to help them grow;
Yes. But if a large item like the RMRR one is being pick
>>> On 09.12.14 at 18:49, wrote:
> El 09/12/14 a les 18.19, Jan Beulich ha escrit:
> On 09.12.14 at 18:01, wrote:
>>> For 4.6 I think we need to start using a different hvm_io_bitmap for PVH
>>> Dom0 that allows direct access to the IO ports, bypassing the vmexit and
>>> simplifying the code
On Tue, Dec 09, Ian Jackson wrote:
> Bottom line: as relevant maintainer, I'm afraid I'm going to insist
> that this script be in /etc.
I dont agree with the reasoning, but to get this done:
Which place would that be, XEN_SCRIPT_DIR?
> > > I don't think this script wants to contain an option par
>>> On 10.12.14 at 09:47, wrote:
> two translation paths in assigned case:
>
> 1. [direct CPU access from VM], with partitioned PCI aperture
> resource, every VM can access a portion of PCI aperture directly.
>
> - CPU page table/EPT: CPU virtual address->PCI aperture
> - PCI aperture - bar base
On Tue, 2014-12-09 at 22:11 +, xen.org wrote:
> flight 32180 libvirt real [real]
> http://www.chiark.greenend.org.uk/~xensrcts/logs/32180/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-i386-libvirt5 libvirt
Please don't top post.
On Wed, 2014-12-10 at 07:09 +, Mao Mingya wrote:
> From the the arch arm, since the stubdom is not supported now. Does the
> device to be shared between doms have to be pv front/backend structure.
Yes.
There is no equivalent to the x86 "hvm" type guest, i.e. one which
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, December 10, 2014 5:17 PM
>
> >>> On 10.12.14 at 09:47, wrote:
> > two translation paths in assigned case:
> >
> > 1. [direct CPU access from VM], with partitioned PCI aperture
> > resource, every VM can access a portion of PCI ape
On Wed, 2014-12-10 at 08:07 +, Jan Beulich wrote:
> Commit 545607eb3c ("x86: fix various issues with handling guest IRQs")
> wasn't really consistent in one respect: The granting of access to an
> IRQ shouldn't assume the pIRQ->IRQ translation to be the same in both
> domains. In fact it is wro
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Wednesday, December 10, 2014 5:01 PM
>
> >>> On 10.12.14 at 04:39, wrote:
> > 1. It's more efficient for new people to start from a small, well-defined
> > task
> > in one area, and then spanning to adjacent areas gradually. Patience must
> >
>>> On 10.12.14 at 10:53, wrote:
> On Wed, 2014-12-10 at 08:07 +, Jan Beulich wrote:
>> Commit 545607eb3c ("x86: fix various issues with handling guest IRQs")
>> wasn't really consistent in one respect: The granting of access to an
>> IRQ shouldn't assume the pIRQ->IRQ translation to be the sa
On Wed, 2014-12-10 at 10:15 +0100, Olaf Hering wrote:
> > I was imagining a "named parameter" as SuS calls them. One or both
> > the sites which run this wrapper script would pass an environment
> > variable. Something like this in the script:
> >
> > $xenstored_do_exec $XENSTORED "$@" $XENSTO
>>> On 10.12.14 at 10:51, wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Wednesday, December 10, 2014 5:17 PM
>>
>> >>> On 10.12.14 at 09:47, wrote:
>> > two translation paths in assigned case:
>> >
>> > 1. [direct CPU access from VM], with partitioned PCI aperture
>> > resourc
On Wed, Dec 10, Ian Campbell wrote:
> I'm not sure why we don't want to exec in both cases, making this whole
> problem moot.
Good point!
That will probably work because sysv lets xenstored do the fork, so the
script will return to its caller. In systemd case --no-fork is passed so
the started p
On Wed, 2014-12-10 at 10:00 +, Jan Beulich wrote:
> >>> On 10.12.14 at 10:53, wrote:
> > On Wed, 2014-12-10 at 08:07 +, Jan Beulich wrote:
> >> Commit 545607eb3c ("x86: fix various issues with handling guest IRQs")
> >> wasn't really consistent in one respect: The granting of access to an
On Wed, 2014-12-10 at 01:48 +, Tian, Kevin wrote:
> I'm not familiar with Arm architecture, but based on a brief reading it's
> for the assigned case where the MMU is exclusive owned by a VM, so
> some type of MMU virtualization is required and it's straightforward.
> However XenGT is a shared
Hi Jan,
On 10/12/2014 08:07, Jan Beulich wrote:
Commit 545607eb3c ("x86: fix various issues with handling guest IRQs")
wasn't really consistent in one respect: The granting of access to an
IRQ shouldn't assume the pIRQ->IRQ translation to be the same in both
domains. In fact it is wrong to assum
>>> On 10.12.14 at 07:00, wrote:
> On Thu, Nov 06, 2014 at 09:27:59PM +, Andrew Cooper wrote:
>> On 06/11/2014 19:32, Konrad Rzeszutek Wilk wrote:
>> > On Thu, Nov 06, 2014 at 03:07:10PM +, Paul Durrant wrote:
>> >> To perform certain hypercalls HVM guests need to use Xen's idea of
>> > Wh
>>> On 10.12.14 at 02:14, wrote:
>> From: Tim Deegan [mailto:t...@xen.org]
>> It's been suggested before that we should revive this hypercall, and I
>> don't think it's a good idea. Whenever a domain needs to know the
>> actual MFN of another domain's memory it's usually because the
>> security
On 10/12/14 06:00, Matt Wilson wrote:
> On Thu, Nov 06, 2014 at 09:27:59PM +, Andrew Cooper wrote:
>> On 06/11/2014 19:32, Konrad Rzeszutek Wilk wrote:
>>> On Thu, Nov 06, 2014 at 03:07:10PM +, Paul Durrant wrote:
To perform certain hypercalls HVM guests need to use Xen's idea of
>>> W
>>> On 10.12.14 at 11:19, wrote:
> Hi Jan,
>
> On 10/12/2014 08:07, Jan Beulich wrote:
>> Commit 545607eb3c ("x86: fix various issues with handling guest IRQs")
>> wasn't really consistent in one respect: The granting of access to an
>> IRQ shouldn't assume the pIRQ->IRQ translation to be the sam
On Tue, 2014-12-09 at 15:54 +, Ian Jackson wrote:
> Version 1 had:
> Tested-by: Ian Campbell
> but that does not apply any more from patch 5 onwards since patch 5
> has changed.
>
> Ian C, do you still have the setup you used to test v1 ?
Yes, and I've just rerun with this new version of th
At 01:14 + on 10 Dec (1418170461), Tian, Kevin wrote:
> > From: Tim Deegan [mailto:t...@xen.org]
> > Sent: Tuesday, December 09, 2014 6:47 PM
> >
> > At 18:10 +0800 on 09 Dec (1418145055), Yu, Zhang wrote:
> > > Hi all,
> > >
> > >As you can see, we are pushing our XenGT patches to the ups
On Wed, Dec 10, 2014 at 08:20:38AM +, Jan Beulich wrote:
> >>> On 09.12.14 at 19:06, wrote:
> > On Tue, Dec 09, 2014 at 04:53:40PM +, Jan Beulich wrote:
> >> >>> On 01.12.14 at 16:33, wrote:
> >> > +memset(memory, 0, sizeof(*memory));
> >> > +memory->type = ACPI_M
On 10/12/14 09:51, Tian, Kevin wrote:
>> From: Jan Beulich [mailto:jbeul...@suse.com]
>> Sent: Wednesday, December 10, 2014 5:17 PM
>>
> On 10.12.14 at 09:47, wrote:
>>> two translation paths in assigned case:
>>>
>>> 1. [direct CPU access from VM], with partitioned PCI aperture
>>> resource,
>>> On 10.12.14 at 11:54, wrote:
> On Wed, Dec 10, 2014 at 08:20:38AM +, Jan Beulich wrote:
>> >>> On 09.12.14 at 19:06, wrote:
>> > On Tue, Dec 09, 2014 at 04:53:40PM +, Jan Beulich wrote:
>> >> >>> On 01.12.14 at 16:33, wrote:
>> >> > +memset(memory, 0, sizeof(*memory));
>> >>
On Wed, Dec 10, 2014 at 11:06:20AM +, Jan Beulich wrote:
> >>> On 10.12.14 at 11:54, wrote:
> > On Wed, Dec 10, 2014 at 08:20:38AM +, Jan Beulich wrote:
> >> >>> On 09.12.14 at 19:06, wrote:
> >> > On Tue, Dec 09, 2014 at 04:53:40PM +, Jan Beulich wrote:
> >> >> >>> On 01.12.14 at 16:
flight 32164 xen-4.4-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32164/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-sedf 7 debian-installfail REGR. vs. 32095
test-amd64-i386-pair
Hi Kevin,
Thanks for taking the time to work through this.
At 03:39 + on 10 Dec (1418179184), Tian, Kevin wrote:
> 1. It's more efficient for new people to start from a small, well-defined task
> in one area, and then spanning to adjacent areas gradually. Patience must
> be given by the comm
Implemented xmem_pool_check(), xmem_pool_check_locked() and
xmem_pool_check_unlocked() to verity the integrity of the TLSF matrix.
Signed-off-by: Mihai Donțu
---
Changes since v2:
- print the name of the corrupted pool
- adjusted the messages to better fit within 80 columns
- minor style chan
flight 32194 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32194/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-pair17 guest-migrate/src_host/dst_host fail like 32117
Tests which did not succeed,
Both __warn() and __bug() take as first parameter the file name of the
current compilation unit (__FILE__). Mark that parameter as constant to
better reflect that.
Signed-off-by: Mihai Donțu
Reviewed-by: Andrew Cooper
---
xen/drivers/char/console.c | 4 ++--
xen/include/xen/lib.h | 4 ++--
On Wed, 10 Dec 2014 14:13:58 +0200 Mihai Donțu wrote:
> Implemented xmem_pool_check(), xmem_pool_check_locked() and
> xmem_pool_check_unlocked() to verity the integrity of the TLSF matrix.
>
> Signed-off-by: Mihai Donțu
>
> ---
> Changes since v2:
> - print the name of the corrupted pool
> - a
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> ... as this config file is just a config file in general, not strictly a
> Xend format config file.
>
> Signed-off-by: Wei Liu
Acked-by: Ian Campbell
___
Xen-devel mailing list
Xen-devel@lists.xen
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> This file was created to work around Debian bug #633127.
>
> According to Debian bug tracker [0], this bug is fixed in Wheezy. As
> we're now using Wheezy in OSSTest we can safely remove this overlay
> file.
>
> Also add a note to reference #633
>>> On 10.12.14 at 13:13, wrote:
> +#define xmem_pool_check_locked(pool) __xmem_pool_check_locked(__FILE__,
> __LINE__, pool)
> +static bool_t __xmem_pool_check_locked(const char *file, int line, const
> struct xmem_pool *pool)
Long lines.
> +{
> +int i;
unsigned int
> +static bool_t
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
Looks like Ian J acked v2 in
<21559.64364.468553.506...@mariner.uk.xensource.com>.
> ---
> ts-xen-build | 12
> 1 file changed, 12 insertions(+)
>
> diff --git a/ts-xen-build b/ts-xen-build
> index 661f1
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> mfi-common | 23 ++-
> 1 file changed, 22 insertions(+), 1 deletion(-)
>
> diff --git a/mfi-common b/mfi-common
> index 5c4f5d5..e772086 100644
> --- a/mfi-common
> +++ b/mfi-common
> @@ -41,
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> Signed-off-by: Wei Liu
> ---
> ts-xen-install |4 +++-
> 1 file changed, 3 insertions(+), 1 deletion(-)
>
> diff --git a/ts-xen-install b/ts-xen-install
> index 4d34d1f..2e2fcbc 100755
> --- a/ts-xen-install
> +++ b/ts-xen-install
> @@ -46,
On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> +test_matrix_do_one () {
> +
> + test_xsm=$(xenbranch_wants_xsm_tests)
> +
> + # Basic PV Linux test with xl
> + for xsm in $test_xsm ; do
> +do_pv_linux_xl_test_one $xsm
> + done
Perhaps push this down into do_pv_debian_tests which conta
On Wed, Dec 10, 2014 at 01:12:23PM +, Ian Campbell wrote:
> On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > mfi-common | 23 ++-
> > 1 file changed, 22 insertions(+), 1 deletion(-)
> >
> > diff --git a/mfi-common b/mfi-common
> >
On Wed, Dec 10, 2014 at 01:15:13PM +, Ian Campbell wrote:
> On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> > Signed-off-by: Wei Liu
> > ---
> > ts-xen-install |4 +++-
> > 1 file changed, 3 insertions(+), 1 deletion(-)
> >
> > diff --git a/ts-xen-install b/ts-xen-install
> > index 4
On Wed, Dec 10, 2014 at 12:54:05PM +, Ian Campbell wrote:
> On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> > This file was created to work around Debian bug #633127.
> >
> > According to Debian bug tracker [0], this bug is fixed in Wheezy. As
> > we're now using Wheezy in OSSTest we can s
On Wed, 2014-12-10 at 13:41 +, Wei Liu wrote:
> On Wed, Dec 10, 2014 at 12:54:05PM +, Ian Campbell wrote:
> > #690538 relates to providing an option to remove the submenus. Please
> > can the changelog explain why that is relevant to us.
> >
>
> Because somebody else thought not making su
On Wed, Dec 10, 2014 at 01:05:22PM +, Ian Campbell wrote:
> On Tue, 2014-10-14 at 22:50 +0100, Wei Liu wrote:
> > Signed-off-by: Wei Liu
>
> Looks like Ian J acked v2 in
> <21559.64364.468553.506...@mariner.uk.xensource.com>.
>
>
> > ---
> > ts-xen-build | 12
> > 1 file cha
On Wed, Dec 10, 2014 at 01:47:06PM +, Ian Campbell wrote:
> On Wed, 2014-12-10 at 13:41 +, Wei Liu wrote:
> > On Wed, Dec 10, 2014 at 12:54:05PM +, Ian Campbell wrote:
> > > #690538 relates to providing an option to remove the submenus. Please
> > > can the changelog explain why that is
On Wed, 2014-12-10 at 13:50 +, Wei Liu wrote:
> On Wed, Dec 10, 2014 at 01:47:06PM +, Ian Campbell wrote:
> > On Wed, 2014-12-10 at 13:41 +, Wei Liu wrote:
> > > On Wed, Dec 10, 2014 at 12:54:05PM +, Ian Campbell wrote:
> > > > #690538 relates to providing an option to remove the su
I've been facing an issue on my Ubuntu box (acting as dom0) with
xen-4.5 (HEAD). I am running dom0 3.13.0.19-generic (ubuntu). When I
try and xl command I see the command hangs, after a while I see the
guest kernel complain. I've tried a similar setup on another setup and
I see the same issue. Any
On Wed, 2014-12-10 at 19:24 +0530, Balbir Singh wrote:
> I've been facing an issue on my Ubuntu box (acting as dom0) with
> xen-4.5 (HEAD). I am running dom0 3.13.0.19-generic (ubuntu). When I
> try and xl command I see the command hangs, after a while I see the
> guest kernel complain. I've tried
Ian Campbell writes ("[PATCH OSSTEST] Add basic PVH flights."):
> These are the usual PV debian flights with pvh=1 added to the
> configuration file.
>
> A job is created for each of Intel and AMD, although obviously AMD is
> expected to fail at the moment.
...
> Beyond that I've not tested this a
On Wed, 2014-12-10 at 13:56 +, Ian Jackson wrote:
> Ian Campbell writes ("[PATCH OSSTEST] Add basic PVH flights."):
> > These are the usual PV debian flights with pvh=1 added to the
> > configuration file.
> >
> > A job is created for each of Intel and AMD, although obviously AMD is
> > expect
Ian Campbell writes ("Re: [PATCH OSSTEST] Add basic PVH flights."):
> On Wed, 2014-12-10 at 13:56 +, Ian Jackson wrote:
> > This should probably be
> >
> > + $cfg =~ s/^pvh\b.*//mg;
> >
> > unless you deliberately intend to strip out any other phv-related
> > settings which xen-create-image
On 10/12/14 13:42, John wrote:
> David,
>
> This patch you put into 3.18.0 appears to break the latest version of
> stubdomains. I found this out today when I tried to update a machine to
> 3.18.0 and all of the domUs crashed on start with the dmesg output like
> this:
Cc'ing the lists and releva
On Wed, 2014-12-10 at 14:03 +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [PATCH OSSTEST] Add basic PVH flights."):
> > On Wed, 2014-12-10 at 13:56 +, Ian Jackson wrote:
> > > This should probably be
> > >
> > > + $cfg =~ s/^pvh\b.*//mg;
> > >
> > > unless you deliberately int
On Tue, Dec 09, 2014 at 09:02:49AM +, Jan Beulich wrote:
> >>> On 08.12.14 at 22:27, wrote:
> > [8.761336] [ cut here ]
> > [8.761342] kernel BUG at arch/x86/xen/smp.c:438!
>
> if (HYPERVISOR_vcpu_op(VCPUOP_initialise, cpu, ctxt))
> BUG();
>
On Wed, 2014-12-10 at 14:12 +, David Vrabel wrote:
> On 10/12/14 13:42, John wrote:
> > David,
> >
> > This patch you put into 3.18.0 appears to break the latest version of
> > stubdomains. I found this out today when I tried to update a machine to
> > 3.18.0 and all of the domUs crashed on st
On 10/12/14 15:07, Ian Campbell wrote:
> On Wed, 2014-12-10 at 14:12 +, David Vrabel wrote:
>> On 10/12/14 13:42, John wrote:
>>> David,
>>>
>>> This patch you put into 3.18.0 appears to break the latest version of
>>> stubdomains. I found this out today when I tried to update a machine to
>>>
flight 32192 linux-next real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/32192/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl5 xen-boot fail REGR. vs. 32141
test-amd64-i386-libvir
With the virtual mapped linear p2m list the post-init mmu operations
must be used for setting up the p2m mappings, as in case of
CONFIG_FLATMEM the init routines may trigger BUGs.
Reported-by: Boris Ostrovsky
Signed-off-by: Juergen Gross
---
arch/x86/xen/mmu.c | 2 +-
1 file changed, 1 insertio
On Wed, Dec 10, 2014 at 04:56:03PM +0100, Juergen Gross wrote:
> With the virtual mapped linear p2m list the post-init mmu operations
> must be used for setting up the p2m mappings, as in case of
> CONFIG_FLATMEM the init routines may trigger BUGs.
Um, could you explain a bit more of why the CONFI
On Wed, 2014-12-10 at 15:29 +, David Vrabel wrote:
> On 10/12/14 15:07, Ian Campbell wrote:
> > On Wed, 2014-12-10 at 14:12 +, David Vrabel wrote:
> >> On 10/12/14 13:42, John wrote:
> >>> David,
> >>>
> >>> This patch you put into 3.18.0 appears to break the latest version of
> >>> stubdom
On Tue, Dec 09, 2014 at 02:48:21PM +, Ian Campbell wrote:
> On Tue, 2014-12-09 at 14:04 +, George Dunlap wrote:
> > At the moment libxl unconditinally passes the underlying file format
> > to qemu in the device string. However, when tapdisk is in use,
> > tapdisk handles the underlying for
On Tue, Dec 09, 2014 at 03:25:29PM +, Ian Jackson wrote:
> Ian Campbell writes ("Re: [Xen-devel] [PATCH] libxl: Fix building
> libxlu_cfg_y.y with bison 3.0"):
> > There was a point in time where the prevailing version of bison (or
> > maybe flex) in stable distro releases had a bug which mean
On Wed, 2014-12-10 at 11:41 -0500, Konrad Rzeszutek Wilk wrote:
> On Tue, Dec 09, 2014 at 03:25:29PM +, Ian Jackson wrote:
> > Ian Campbell writes ("Re: [Xen-devel] [PATCH] libxl: Fix building
> > libxlu_cfg_y.y with bison 3.0"):
> > > There was a point in time where the prevailing version of
On Wed, Dec 10, 2014 at 04:44:00PM +, Ian Campbell wrote:
> On Wed, 2014-12-10 at 11:41 -0500, Konrad Rzeszutek Wilk wrote:
> > On Tue, Dec 09, 2014 at 03:25:29PM +, Ian Jackson wrote:
> > > Ian Campbell writes ("Re: [Xen-devel] [PATCH] libxl: Fix building
> > > libxlu_cfg_y.y with bison 3
On Tue, Dec 09, 2014 at 06:01:54PM +0100, Roger Pau Monné wrote:
> El 08/12/14 a les 10.12, Jan Beulich ha escrit:
> > PVH guests accessing I/O ports via string ops is not supported yet.
> >
> > Reported-by: Roger Pau Monné
> > Signed-off-by: Jan Beulich
>
> This looks fine to me (at least it do
On Tue, Dec 09, 2014 at 04:43:22PM +, Andrew Cooper wrote:
> The error handling from a failed memory allocation should return
> PyErr_SetFromErrno(xc_error_obj); rather than simply calling it and continuing
> to the memcpy() below, with the dest pointer being NULL.
>
> Coverity also complains
On Tue, Dec 09, 2014 at 03:56:46PM -0500, Boris Ostrovsky wrote:
> On 12/09/2014 09:25 AM, Vitaly Kuznetsov wrote:
> >flush_op is unambiguously defined by feature_flush:
> > REQ_FUA | REQ_FLUSH -> BLKIF_OP_WRITE_BARRIER
> > REQ_FLUSH -> BLKIF_OP_FLUSH_DISKCACHE
> > 0 -> 0
> >and thus ca
This is a note to let you know that I have just added a patch titled
xen-netfront: Fix handling packets on compound pages with skb_linearize
to the linux-3.16.y-queue branch of the 3.16.y-ckt extended stable tree
which can be found at:
http://kernel.ubuntu.com/git?p=ubuntu/linux.git;a=sho
On Wed, Dec 10, Ian Campbell wrote:
> That results in a wrapper which unconditionally execs, the systemd unit
> just calls that while the sysv script runs the wrapper and then does the
> xenstore-read -s loop.
Since systemd handles the socket there is already a listener.
http://lists.freedesktop
On Wed, Dec 10, 2014 at 05:26:28PM +, Luis Henriques wrote:
> This is a note to let you know that I have just added a patch titled
>
> xen-netfront: Fix handling packets on compound pages with skb_linearize
>
> to the linux-3.16.y-queue branch of the 3.16.y-ckt extended stable tree
> whi
On Wed, Dec 10, Ian Campbell wrote:
> Separately from the above I wonder if it might be worth moving the
> xenstore readiness check into the xen-init-dom0 helper and having most
> things which currently depend on xenstore actually depend on the
> "dom0-is-ready" unit, which itself depends on xenst
On 10/12/14 15:56, Juergen Gross wrote:
> With the virtual mapped linear p2m list the post-init mmu operations
> must be used for setting up the p2m mappings, as in case of
> CONFIG_FLATMEM the init routines may trigger BUGs.
>
> Reported-by: Boris Ostrovsky
> Signed-off-by: Juergen Gross
> ---
Hello everyone,
This is a highly reworked and much more mature version of this old RFC series:
http://lists.xen.org/archives/html/xen-devel/2014-06/msg03429.html
It is about integrating benchmarking capabilities into OSSTest. The series is a
lot bigger, because it is now capable of doing a lot
by installing some dependencies, shipping the archive, untaring
and building the sources.
This accepts two parametrs, in the form 'host=somehost someguest',
as most of the ts-guest-xxx scripts. If only the first one is
provided, it must be 'host=somehost', and the script will prep
the host.
As th
From: Dario Faggioli
As an analogue to target_putfilecontents_[root_]stash().
(While at it, fix one whitespace damaged line.)
Signed-off-by: Dario Faggioli
Cc: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
Changes from RFCv1:
* adding this was requested during review.
---
Osstest/TestSuppo
The script fetches it, and saves it in c{Images}/benchs.
Default values for the repo URL and actual filename are embedded
in the script itself, and can be overridden as usual (e.g., via
standalone.config).
Signed-off-by: Dario Faggioli
Cc: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
Changes
in sources.list, so installing packages in the guest with
apt-get does not stall waiting for the install CD to be
inserted.
Signed-off-by: Dario Faggioli
Cc: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
ts-debian-hvm-install |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --g
From: Dario Faggioli
In fact, in setupboot_grub2(), if we are interested
in a Linux baremetal entry, there is no point in
asking for the entry to contain an hypervisor line
("Hv").
Also, in such entry, Linux kernel and initrd are to be
found in "linux" and "initrd" lines, rather than in
"multibo
and store them in $c{Stash}, in a file named according
to the following convention:
$hostname--$benchname-$benchparams
i.e., something like this:
debian--unixbench-i3-c2
Signed-off-by: Dario Faggioli
Cc: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
Changes from RFCv1:
* use target_getfil
There is a runvar called 'unixbench_params', for specifying
the benchmark's runtime arguments.
The commit also adds a couple of generic functions in
TestSupport.pm, for `cat'-ing the content of a file on
the target into a corresponding file in the stash area.
Signed-off-by: Dario Faggioli
Cc: We
by shipping the benchmark (it's just a script) and the linux
kernel sources to the target. The dependences installed are
the ones required to build a linux kernel, plus a few more
packages required by the kernbench script.
As for the unixbench equivalent, this accepts two parametrs,
in the form 'h
in a file named according to the following convention:
$hostname--$benchname-$benchparams
i.e., something like this:
debian--kernbench-n2
Signed-off-by: Dario Faggioli
Cc: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
ts-kernbench-reslts | 60
It downloads the benchmark (it's just a script) and a linux
kernel archive, necessary for running the benchmark itself,
and store them in c{Images}/benchs.
Default values for the repo URL and actual filename are embedded
in the script itself, and can be overridden as usual (e.g., via
standalone.co
From: Dario Faggioli
Mangle the results of a run of unixbench a bit, so that
they can be plotted. This also produces a (gnu)plot script
and the plot itself. All is saved in $stash, for the
running flight and job.
This is done in a new Osstest/Benchmarking.pm module, as
the functions introduced
Recipes are defined for prepping and running
the unixbench benchmark on the host and on
Debian PV and HVM guests.
Signed-off-by: Dario Faggioli
Cc: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
sg-run-job | 31 +++
1 file changed, 31 insertions(+)
diff --git a/sg
There is a runvar called 'kernbench_params', for specifying
the benchmark's runtime arguments.
Signed-off-by: Dario Faggioli
Cc: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
ts-kernbench-run | 63 ++
1 file changed, 63 insertions(+)
creat
From: Dario Faggioli
Extract the data from the output of kernbench and produce
the tables, the gnuplot script and the plots.
All is saved in $stash, for the running flight and job.
Signed-off-by: Dario Faggioli
Cc: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
---
Osstest/Benchmarking.pm | 88
1 - 100 of 152 matches
Mail list logo