>>> On 31.10.16 at 06:38, wrote:
> --- a/drivers/net/xen-netfront.c
> +++ b/drivers/net/xen-netfront.c
> @@ -304,7 +304,7 @@ static void xennet_alloc_rx_buffers(struct netfront_queue
> *queue)
> queue->rx_skbs[id] = skb;
>
> ref = gnttab_claim_grant_reference(&queue-
>>> On 28.10.16 at 17:10, wrote:
> stubdom-vtpm needs gmp and expects it under
> stubdom/cross-root-x86_64/x86_64-xen-elf/lib while gmp seems to install
> it under stubdom/cross-root-x86_64/x86_64-xen-elf/lib64
Are you sure this is universal, rather dependent upon some
(possibly even host) config
flight 101818 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101818/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 101673
This run is configured for baseline tests only.
flight 67966 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67966/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 92ec8772df33f3c758763adcaf42fd42c8da812c
baseline v
On 31/10/16 08:55, Jan Beulich wrote:
On 28.10.16 at 17:10, wrote:
>> stubdom-vtpm needs gmp and expects it under
>> stubdom/cross-root-x86_64/x86_64-xen-elf/lib while gmp seems to install
>> it under stubdom/cross-root-x86_64/x86_64-xen-elf/lib64
>
> Are you sure this is universal, rather d
> > ref = gnttab_claim_grant_reference(&queue->gref_rx_head);
> > -BUG_ON((signed short)ref < 0);
> > +WARN_ON_ONCE(IS_ERR_VALUE((unsigned long)ref));
> You really need to cast to plain (or signed) long here - casting to
> unsigned long will work on
>>> On 31.10.16 at 09:28, wrote:
>> > ref = gnttab_claim_grant_reference(&queue->gref_rx_head);
>> > -BUG_ON((signed short)ref < 0);
>> > +WARN_ON_ONCE(IS_ERR_VALUE((unsigned long)ref));
>
>> You really need to cast to plain (or signed) long here -
>>> On 29.10.16 at 19:22, wrote:
> Append --build and --host flags to GMP's configure script so that it
> knows it is being compiled for another architecture.
Why --host and --build? Aiui,
- host is where the configure runs,
- build is where tool chain components being built are supposed to run,
stubdom-vtpm needs gmp and expects it under
stubdom/cross-root-x86_64/x86_64-xen-elf/lib while gmp seems to install
it under stubdom/cross-root-x86_64/x86_64-xen-elf/lib64 at least in an
openSUSE environment.
Modify gmp configure parameters to explicitly specify --libdir.
Signed-off-by: Juergen G
On 29/10/16 19:22, Wei Liu wrote:
> Append --build and --host flags to GMP's configure script so that it
> knows it is being compiled for another architecture.
>
> This should fix the issue that GMP doesn't compile with gcc 6, because
> configure script won't try to test the host environment anymo
On Fri, Oct 28, 2016 at 10:28:38PM -0500, Lee Naroah wrote:
> Hi Mr. Monné,
>
> My name is Haoran Li. I am a second year Ph. D student in Computer
> Science. My research interest is Real-Time Virtualization. I wonder to
> know some more details of the project, "*QEMU xen-blkback performanc
flight 101824 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101824/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Current usage of sed in the libacpi Makefile make uses of non-POSIX options,
that are not available on all the OSes supported by the Xen tools.
The '-i' option has slightly different semantics between GNU and BSD sed
implementations, while on the GNU version the suffix is optional, on the BSD
one
On Mon, Oct 31, 2016 at 02:57:54AM -0600, Jan Beulich wrote:
> >>> On 29.10.16 at 19:22, wrote:
> > Append --build and --host flags to GMP's configure script so that it
> > knows it is being compiled for another architecture.
>
> Why --host and --build? Aiui,
> - host is where the configure runs,
Wei Liu writes ("[PATCH for-4.8] stubdom: make GMP aware that it's being
cross-compiled"):
> Append --build and --host flags to GMP's configure script so that it
> knows it is being compiled for another architecture.
>
> This should fix the issue that GMP doesn't compile with gcc 6, because
> con
Ian Jackson, on Mon 31 Oct 2016 10:21:04 +, wrote:
> Wei Liu writes ("[PATCH for-4.8] stubdom: make GMP aware that it's being
> cross-compiled"):
> > Append --build and --host flags to GMP's configure script so that it
> > knows it is being compiled for another architecture.
> >
> > This shou
On Mon, Oct 31, 2016 at 10:04:18AM +0100, Juergen Gross wrote:
> stubdom-vtpm needs gmp and expects it under
> stubdom/cross-root-x86_64/x86_64-xen-elf/lib while gmp seems to install
> it under stubdom/cross-root-x86_64/x86_64-xen-elf/lib64 at least in an
> openSUSE environment.
>
> Modify gmp con
On Mon, Oct 31, 2016 at 11:05:20AM +0100, Roger Pau Monne wrote:
> Current usage of sed in the libacpi Makefile make uses of non-POSIX options,
> that are not available on all the OSes supported by the Xen tools.
>
> The '-i' option has slightly different semantics between GNU and BSD sed
> implem
Andrew Cooper writes ("Re: [Xen-devel] [xen-unstable bisection] complete
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm"):
> On 30/10/16 04:29, osstest service owner wrote:
> > Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/101803/
...
> Where can I find the build logs f
George Dunlap writes ("Re:"):
> On 07/07/16 12:03, Dario Faggioli wrote:
> > So, you're saying I should change both Xen, xentrace_format and
> > xenalyze.c all at once, in the same patch, right?
...
> I think it often does make sense to check things out by component. And
> of course before xenalyz
On 31/10/16 10:31, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [Xen-devel] [xen-unstable bisection] complete
> test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm"):
>> On 30/10/16 04:29, osstest service owner wrote:
>>> Last fail repro: http://logs.test-lab.xenproject.org/osstest/logs/1018
>>> On 31.10.16 at 11:14, wrote:
> On Mon, Oct 31, 2016 at 02:57:54AM -0600, Jan Beulich wrote:
>> >>> On 29.10.16 at 19:22, wrote:
>> > Append --build and --host flags to GMP's configure script so that it
>> > knows it is being compiled for another architecture.
>>
>> Why --host and --build? Ai
On Mon, Oct 31, 2016 at 10:29:14AM +, Wei Liu wrote:
> On Mon, Oct 31, 2016 at 11:05:20AM +0100, Roger Pau Monne wrote:
> > Current usage of sed in the libacpi Makefile make uses of non-POSIX options,
> > that are not available on all the OSes supported by the Xen tools.
> >
> > The '-i' optio
On Mon, Oct 31, 2016 at 10:27:55AM +, Wei Liu wrote:
> On Mon, Oct 31, 2016 at 10:04:18AM +0100, Juergen Gross wrote:
> > stubdom-vtpm needs gmp and expects it under
> > stubdom/cross-root-x86_64/x86_64-xen-elf/lib while gmp seems to install
> > it under stubdom/cross-root-x86_64/x86_64-xen-elf
On Thu, Oct 27, 2016 at 11:15:24AM +0100, Wei Liu wrote:
> On Thu, Oct 27, 2016 at 11:55:52AM +0200, Juergen Gross wrote:
> > add_change_node() in xenstored is used to add a modified node to the
> > list of changed nodes of one transaction. It is being called with the
> > recurse parameter set to t
On Mon, Oct 31, 2016 at 11:22:02AM +0100, Samuel Thibault wrote:
> Ian Jackson, on Mon 31 Oct 2016 10:21:04 +, wrote:
> > Wei Liu writes ("[PATCH for-4.8] stubdom: make GMP aware that it's being
> > cross-compiled"):
> > > Append --build and --host flags to GMP's configure script so that it
>
On Wed, Oct 19, 2016 at 12:59:45PM -0700, Stefano Stabellini wrote:
> On Mon, 10 Oct 2016, Jun Sun wrote:
> > Currently function p2m_restore_state() would clear HCR_VM bit, i.e.,
> > disabling stage2 translation, before updating VTTBR register. After
> > some research and talking to ARM support, I
Roger Pau Monne writes ("[PATCH v2 for-4.8] tools/libacpi: fix sed usage"):
> Current usage of sed in the libacpi Makefile make uses of non-POSIX options,
> that are not available on all the OSes supported by the Xen tools.
>
> The '-i' option has slightly different semantics between GNU and BSD s
Wei Liu writes ("Re: [Xen-devel] [PATCH for-4.8] stubdom: make GMP aware that
it's being cross-compiled"):
> On Mon, Oct 31, 2016 at 02:57:54AM -0600, Jan Beulich wrote:
> > >>> On 29.10.16 at 19:22, wrote:
> > > Append --build and --host flags to GMP's configure script so that it
> > > knows it
Processing commands for x...@bugs.xenproject.org:
> close 53
Closing bug #53
>
> thanks
Finished processing.
Modified/created Bugs:
- 53: http://bugs.xenproject.org/xen/bug/53
---
Xen Hypervisor Bug Tracker
See http://wiki.xen.org/wiki/Reporting_Bugs_against_Xen for information on
reporting b
On 10/14/2016 02:05 PM, Boris Ostrovsky wrote:
From: Matt Fleming
The new Xen PVH entry point requires page tables to be setup by the
kernel since it is entered with paging disabled.
Pull the common code out of head_32.S and into pgtable_32.S so that
setup_pgtable_32 can be invoked from both
flight 101820 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101820/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 6 xen-bootfail REGR. vs. 100648
test-amd64-i386-xl-x
flight 101827 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101827/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
On 29 October 2016 at 02:10, Stefano Stabellini wrote:
> The following changes since commit 5b2ecabaeabc17f032197246c4846b9ba95ba8a6:
>
> Merge remote-tracking branch 'remotes/kraxel/tags/pull-ui-20161028-1' into
> staging (2016-10-28 17:59:04 +0100)
>
> are available in the git repository at:
In a 32bit build, the ocaml code 'proposed_id >= 0x7fff' compiles to:
8055eac: 83 fb ffcmp$0x,%ebx
8055eaf: 7d 0f jge8055ec0 <...+0x20>
which in C is 'proposed_id >= INT_MIN', or in other words, tautologically
true. As a resul
Hi Jan,
On 12/10/16 13:59, Jan Beulich wrote:
On 12.10.16 at 14:51, wrote:
Hello Jan,
On 12/10/2016 12:45, Jan Beulich wrote:
On 11.10.16 at 15:39, wrote:
On 06/10/16 13:21, Jan Beulich wrote:
On 05.10.16 at 20:30, wrote:
On 30/09/2016 02:46, Jan Beulich wrote:
On 29.09.16 at 23:42, w
This makes it more succinct and easier to read.
Before:
(XEN) H_CR3 = 0x00042a0ec000 CleanBits = 0
(XEN) CS: sel=0x0008, attr=0x029b, limit=0x, base=0x
(XEN) DS: sel=0x0033, attr=0x0cf3, limit=0x, base=0x
(XEN) SS: sel=0x0018, attr=0x0c93
Hi Stefano,
On 26/10/16 23:12, Stefano Stabellini wrote:
On Wed, 26 Oct 2016, Julien Grall wrote:
Hi,
Apologize for not respecting the netiquette.
On Tue, 25 Oct 2016, 5:49 p.m. Stefano Stabellini,
wrote:
Hi all,
the following commit:
commit 21550029f709072aacf3b90edd574e
>>> On 31.10.16 at 14:48, wrote:
> --- a/xen/arch/x86/hvm/svm/svmdebug.c
> +++ b/xen/arch/x86/hvm/svm/svmdebug.c
> @@ -20,11 +20,10 @@
> #include
> #include
>
> -static void svm_dump_sel(const char *name, svm_segment_register_t *s)
> +static void svm_dump_sel(const char *name, const svm_segm
On 31/10/16 14:12, Jan Beulich wrote:
On 31.10.16 at 14:48, wrote:
>> --- a/xen/arch/x86/hvm/svm/svmdebug.c
>> +++ b/xen/arch/x86/hvm/svm/svmdebug.c
>> @@ -20,11 +20,10 @@
>> #include
>> #include
>>
>> -static void svm_dump_sel(const char *name, svm_segment_register_t *s)
>> +static voi
On Mon, Oct 31, 2016 at 01:21:56PM +, Andrew Cooper wrote:
> In a 32bit build, the ocaml code 'proposed_id >= 0x7fff' compiles to:
>
> 8055eac: 83 fb ffcmp$0x,%ebx
> 8055eaf: 7d 0f jge8055ec0 <...+0x20>
>
> which in C is 'p
>>> On 31.10.16 at 15:13, wrote:
> On 31/10/16 14:12, Jan Beulich wrote:
> On 31.10.16 at 14:48, wrote:
>>> --- a/xen/arch/x86/hvm/svm/svmdebug.c
>>> +++ b/xen/arch/x86/hvm/svm/svmdebug.c
>>> @@ -20,11 +20,10 @@
>>> #include
>>> #include
>>>
>>> -static void svm_dump_sel(const char *nam
flight 101825 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101825/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf b3400560603bcfaadc08e82a846933446b5afed3
baseline version:
ovmf 92ec8772df33f3c758763
On 10/29/2016 04:59 AM, Roger Pau Monne wrote:
(resending as v3.1, it seems like I need to figure out how to properly use
msmtp with git send-email because on the last try only the cover letter
was actually sent).
Hello,
This is the first batch of the PVH Dom0 support eries, that includes
eve
On 31/10/16 14:35, Boris Ostrovsky wrote:
>
>
> On 10/29/2016 04:59 AM, Roger Pau Monne wrote:
>> (resending as v3.1, it seems like I need to figure out how to
>> properly use
>> msmtp with git send-email because on the last try only the cover letter
>> was actually sent).
>>
>> Hello,
>>
>> This i
>>> On 28.10.16 at 04:37, wrote:
> v6:
> - Make pi_can_suppress_irte_update() a check-only function
> - Introduce another function pi_get_new_irte() to update the 'new_ire' if
> needed
I don't see what you need this function for. My earlier comments
were not meant to make you split the function,
>>> On 28.10.16 at 04:37, wrote:
> @@ -643,7 +643,8 @@ static int msi_msg_to_remap_entry(
> GET_IREMAP_ENTRY(ir_ctrl->iremap_maddr, index,
> iremap_entries, iremap_entry);
>
> -memcpy(&new_ire, iremap_entry, sizeof(struct iremap_entry));
> +if ( iremap_entry->r
On Sun, Oct 30, 2016 at 04:53:33PM +, Andrew Cooper wrote:
> On 30/10/16 04:29, osstest service owner wrote:
> > branch xen-unstable
> > xenbranch xen-unstable
> > job test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm
> > testid debian-hvm-install
> >
> > Tree: linux git://xenbits.xen.org/li
On 31/10/16 14:59, Suresh Kanzariya wrote:
Hi Julien,
Hi,
It seems that I forgot to add xen-devel on CC in my answer. Sorry for that.
Thanks for the information.
Just wanted to understand that Qualcomm boot itself contains a
Hypervisor and also Xen is also a hypervisor, so I am not sure X
>>> On 28.10.16 at 04:37, wrote:
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -203,6 +203,76 @@ static void vmx_pi_do_resume(struct vcpu *v)
> vmx_pi_unblock_vcpu(v);
> }
>
> +void vmx_pi_desc_fixup(int cpu)
unsigned int
With that fixed,
Reviewed-by: Jan Beu
Juergen Gross, on Fri 28 Oct 2016 16:53:20 +0200, wrote:
> make distclean tries to remove stubdom/gmp-4.3.2.tar.gz, while the
> downloaded file is stubdom/gmp-4.3.2.tar.bz2
>
> Signed-off-by: Juergen Gross
Acked-by: Samuel Thibault
> ---
> stubdom/Makefile | 2 +-
> 1 file changed, 1 insertio
>>> On 29.10.16 at 10:59, wrote:
> PVHv2 guests, unlike HVM guests, won't have the option to route interrupts
> from physical or emulated devices over event channels using PIRQs. This
> applies to both DomU and Dom0 PVHv2 guests.
>
> Introduce a new XEN_X86_EMU_USE_PIRQ to notify Xen whether a HV
>>> On 29.10.16 at 10:59, wrote:
> ... and using the "preempted" parameter. The solution relies on just calling
> softirq_pending if the current domain is the idle domain. If such preemption
> happens, the caller should then call process_pending_softirqs in order to
> drain the pending softirqs, a
On Mon, Oct 31, 2016 at 02:43:08PM +, Andrew Cooper wrote:
> On 31/10/16 14:35, Boris Ostrovsky wrote:
> >
> >
> > On 10/29/2016 04:59 AM, Roger Pau Monne wrote:
> >> (resending as v3.1, it seems like I need to figure out how to
> >> properly use
> >> msmtp with git send-email because on the la
>>> On 29.10.16 at 10:59, wrote:
> It doesn't make sense since the idle domain doesn't receive any events. This
> is relevant in order to be sure that hypercall_preempt_check is not called
> by the idle domain, which would happen previously when calling
> {hap/sh}_set_allocation during domain 0 cr
flight 101822 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101822/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 92983
test-amd64-i386-qemut
>>> On 29.10.16 at 10:59, wrote:
> --- a/xen/arch/x86/mm/shadow/common.c
> +++ b/xen/arch/x86/mm/shadow/common.c
> @@ -1609,13 +1609,7 @@ shadow_free_p2m_page(struct domain *d, struct
> page_info *pg)
> paging_unlock(d);
> }
>
> -/* Set the pool of shadow pages to the required number of p
>>> On 29.10.16 at 10:59, wrote:
> So that it can also be used by the PVH-specific domain builder. This is just
> code motion, it should not introduce any functional change.
>
> Signed-off-by: Roger Pau Monné
Acked-by: Jan Beulich
___
Xen-devel mail
>>> On 29.10.16 at 10:59, wrote:
> --- a/xen/arch/x86/setup.c
> +++ b/xen/arch/x86/setup.c
> @@ -1491,6 +1491,8 @@ void __init noreturn __start_xen(unsigned long mbi_p)
>
> early_msi_init();
>
> +scan_pci_devices();
> +
> iommu_setup();/* setup iommu if available */
>
>
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of the read from int to unsigned,
but this case has been wrong before: negative values are not allowed
for the modified case.
Signed-off-by: Juergen Gross
---
drivers/xen/xen-pciback/xenbus.c | 8
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of the read from int to unsigned,
but this case has been wrong before: negative values are not allowed
for the modified case.
Cc: bhelg...@google.com
Cc: linux-...@vger.kernel.org
Signed-off-by: J
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of one read from int to unsigned,
but this case has been wrong before: negative values are not allowed
for the modified case.
Cc: peterhu...@gmx.de
Cc: tp...@selhorst.net
Cc: jarkko.sakki...@linux.
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of the reads from int to unsigned,
but these cases have been wrong before: negative values are not allowed
for the modified cases.
Signed-off-by: Juergen Gross
---
drivers/xen/xenbus/xenbus_probe
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of the reads from int to unsigned,
but these cases have been wrong before: negative values are not allowed
for the modified cases.
Cc: tomi.valkei...@ti.com
Cc: linux-fb...@vger.kernel.org
Signed-
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of the reads from int to unsigned,
but these cases have been wrong before: negative values are not allowed
for the modified cases.
Cc: dmitry.torok...@gmail.com
Cc: linux-in...@vger.kernel.org
Sig
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
Signed-off-by: Juergen Gross
---
drivers/scsi/xen-scsifront.c | 6 +-
1 file changed, 1 insertion(+), 5 deletions(-)
diff --git a/drivers/scsi/xen-scsifront.c b/drivers/scsi/xen-scsifront.c
index 9dc8687..7e817c6 100644
---
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of one read from int to unsigned,
but this case has been wrong before: negative values are not allowed
for the modified case.
Cc: konrad.w...@oracle.com
Cc: roger@citrix.com
Signed-off-by: Jue
There are multiple instances of code reading an optional unsigned
parameter from Xenstore via xenbus_scanf(). Instead of repeating the
same code over and over add a service function doing the job.
Signed-off-by: Juergen Gross
---
drivers/xen/xenbus/xenbus_xs.c | 15 +++
include/xen/x
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of some reads from int to unsigned,
but these cases have been wrong before: negative values are not allowed
for the modified cases.
Cc: net...@vger.kernel.org
Signed-off-by: Juergen Gross
---
dr
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of some reads from int to unsigned,
but these cases have been wrong before: negative values are not allowed
for the modified cases.
Cc: konrad.w...@oracle.com
Cc: roger@citrix.com
Signed-off-b
There are multiple instances of code reading an optional unsigned
parameter from Xenstore via xenbus_scanf(). Instead of repeating the
same code over and over add a service function doing the job and
replace the call of xenbus_scanf() with the call of the new function
where appropriate.
Juergen Gr
Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
This requires to change the type of some reads from int to unsigned,
but these cases have been wrong before: negative values are not allowed
for the modified cases.
Cc: wei.l...@citrix.com
Cc: paul.durr...@citrix.com
Cc: net...@vg
From: Juergen Gross
Date: Mon, 31 Oct 2016 17:48:18 +0100
> There are multiple instances of code reading an optional unsigned
> parameter from Xenstore via xenbus_scanf(). Instead of repeating the
> same code over and over add a service function doing the job and
> replace the call of xenbus_scan
I think this is new in this release. Please check if this is the correct
approach.
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Xen debug build is controlled by Kconfig.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
xen/Kconfig.debug | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
---
Config.mk | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index ebbd9c
On 31/10/16 17:09, Wei Liu wrote:
> I think this is new in this release.
I believe so.
> Please check if this is the correct
> approach.
>
> Cc: Andrew Cooper
>
> Cc: George Dunlap
>
> Cc: Ian Jackson
>>> On 31.10.16 at 18:11, wrote:
> On 31/10/16 17:09, Wei Liu wrote:
>> I think this is new in this release.
>
> I believe so.
Perhaps an adjustment to the release check list is needed?
Jan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://l
On Mon, Oct 31, 2016 at 05:11:19PM +, Andrew Cooper wrote:
> On 31/10/16 17:09, Wei Liu wrote:
> > I think this is new in this release.
>
> I believe so.
>
> > Please check if this is the correct
> > approach.
> >
> > Cc: Andrew Cooper
> >
> > Cc: Geor
This script installs any necessary packages and clones all of the OpenStack
trees which are used by devstack to deploy OpenStack.
Signed-off-by: Anthony PERARD
---
Changes in V6:
- rebased
- fix issues due to new debian and newer devstack:
- add missing libvirt group
- switch back to old nov
This patch should create a flight "openstack-nova", with those jobs:
build-amd64
build-amd64-xsm
build-amd64-pvops
build-amd64-libvirt
test-amd64-amd64-devstack
test-amd64-amd64-devstack-xsm
About the runvars revision_* of test-*-*-devstack:
only REVISION_OPENSTACK_NOVA is set, the o
Hi,
I have looked into getting OpenStack been tested on the latest Xen via
osstest.
The ts-openstack-deploy script does prepare a bit more the host, clone
devstack and other OpenStack trees, then run ./stack.sh, which is a bit
like raisin and deploy OpenStack on the host. Once the machine is read
This script runs the OpenStack integration test suite, Tempest.
Signed-off-by: Anthony PERARD
Acked-by: Ian Campbell
---
No change in V5
Change in V4:
- use \Q\E for tests names
- write the full name of the tests to skip
- use push @ignored_test then join()
- use variables to store common pref
On Mon, Oct 31, 2016 at 05:48:26PM +0100, Juergen Gross wrote:
> Use xenbus_read_unsigned() instead of xenbus_scanf() when possible.
> This requires to change the type of the read from int to unsigned,
> but this case has been wrong before: negative values are not allowed
> for the modified case.
>
This run is configured for baseline tests only.
flight 67964 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67964/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-insta
flight 101829 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101829/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 15 guest-localmigrate/x10 fail REGR. vs.
101825
version targeted for
flight 101823 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101823/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm 9 debian-hvm-install fail
REGR. vs. 101673
> Thankyou for the design doc. An immediate +1 from me, simply for the
> doc existing :)
Thank you for you interest and comments.
> Forgive my ignorance (I am an x86 person, and given the CC list, I guess
> this is talking about ARM systems), but what are coprocessors and what
> might I do with
This run is configured for baseline tests only.
flight 67969 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67969/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 6 xen-boot
From: Dongli Zhang
Date: Mon, 31 Oct 2016 13:38:29 +0800
> While grant reference is of type uint32_t, xen-netfront erroneously casts
> it to signed short in BUG_ON().
>
> This would lead to the xen domU panic during boot-up or migration when it
> is attached with lots of paravirtual devices.
>
flight 67967 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/67967/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-amd64-sid-netboot-pygrub 9 debian-di-install fail like 67925
test-armhf-armhf-ar
> On 31 Oct 2016, at 14:19, Wei Liu wrote:
>
> On Mon, Oct 31, 2016 at 01:21:56PM +, Andrew Cooper wrote:
>> In a 32bit build, the ocaml code 'proposed_id >= 0x7fff' compiles to:
>>
>> 8055eac: 83 fb ffcmp$0x,%ebx
>> 8055eaf: 7d 0f
On Mon, Oct 31, 2016 at 08:51:07PM +, David Scott wrote:
>
> > On 31 Oct 2016, at 14:19, Wei Liu wrote:
> >
> > On Mon, Oct 31, 2016 at 01:21:56PM +, Andrew Cooper wrote:
> >> In a 32bit build, the ocaml code 'proposed_id >= 0x7fff' compiles to:
> >>
> >> 8055eac: 83 fb ff
flight 101826 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101826/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds15 guest-start/debian.repeat fail REGR. vs. 101796
test-amd64-i386-xl-qemuu-w
On Mon, 31 Oct 2016, Steve Capper wrote:
> On Wed, Oct 19, 2016 at 12:59:45PM -0700, Stefano Stabellini wrote:
> > On Mon, 10 Oct 2016, Jun Sun wrote:
> > > Currently function p2m_restore_state() would clear HCR_VM bit, i.e.,
> > > disabling stage2 translation, before updating VTTBR register. After
flight 101834 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101834/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
flight 101828 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101828/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 6 xen-bootfail REGR. vs. 100648
test-amd64-i386-xl-x
flight 101832 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101832/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf ac55b925548f3b33f2bc93e603ecffe4a6cb191a
baseline version:
ovmf b3400560603bcfaadc08e
On 31/10/16 18:08, David Miller wrote:
> From: Juergen Gross
> Date: Mon, 31 Oct 2016 17:48:18 +0100
>
>> There are multiple instances of code reading an optional unsigned
>> parameter from Xenstore via xenbus_scanf(). Instead of repeating the
>> same code over and over add a service function doi
Hi David and Jan,
I did more testing on the code. Casting to either (long) or (unsigned long)
would be fine.
However, there is still an issue that ref is of type uint32_t and
IS_ERR_VALUE((unsigned long)ref) would not return true when ref=-ENOSPC (or
other error code).
IS_ERR_VALUE((long)ref) wo
1 - 100 of 105 matches
Mail list logo