flight 101951 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101951/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 92983
test-amd64-amd64-libv
flight 101954 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101954/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 11 guest-start fail REGR. vs. 101909
test-amd64-i386-l
flight 101966 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101966/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 3ebe9a1a826e8d569bef6045777cc01a5699933d
baseline version:
xen 4966
Hi all,
We are pleased to announce another update of Intel GVT-g for Xen.
Intel GVT-g is a full GPU virtualization solution with mediated pass-through,
starting from 4th generation Intel Core(TM) processors with Intel Graphics
processors. A virtual GPU instance is maintained for each VM, with p
flight 101961 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101961/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-credit2 5 xen-installfail pass in 101952
test-armhf-armhf-libvirt-raw 14
flight 101958 linux-3.10 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101958/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-amd64-pvgrub 6 xen-bootfail REGR. vs. 100648
test-amd64-amd64-xl
Signed-off-by: Boris Ostrovsky
---
CC: Paul Durrant
---
xen/arch/x86/hvm/ioreq.c | 66
1 file changed, 66 insertions(+)
diff --git a/xen/arch/x86/hvm/ioreq.c b/xen/arch/x86/hvm/ioreq.c
index 171ea82..ced7c92 100644
--- a/xen/arch/x86/hvm/ioreq.c
This domctl is called when a VCPU is hot-(un)plugged to a guest (via
'xl vcpu-set'). While this currently is only intended to be needed by
PVH guests we will call this domctl for all (x86) guests for consistency.
Signed-off-by: Boris Ostrovsky
---
CC: Daniel De Graaf
---
tools/flask/policy/modu
ACPI hotplug-related IO accesses (to GPE0 block) are handled
by qemu for HVM guests. Since PVH guests don't have qemu these
accesses will need to be procesed by the hypervisor.
Because ACPI event model expects pm1a block to be present we
need to have the hypervisor emulate it as well.
Signed-off-
.. and update GPE0 registers.
Signed-off-by: Boris Ostrovsky
---
xen/arch/x86/domctl.c | 12
1 file changed, 12 insertions(+)
diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c
index 78b7d4b..8151fd7 100644
--- a/xen/arch/x86/domctl.c
+++ b/xen/arch/x86/domctl.c
@@ -1439,6
This series adds support for ACPI-based VCPU hotplug for unprivileged
PVH guests.
New XEN_DOMCTL_set_avail_vcpus is introduced and is called during
guest creation and in response to 'xl vcpu-set' command. This domctl
updates GPE0's status and enable registers and sends an SCI to the
guest using (n
.. for PVH guests. However, since emulating them for HVM guests
also doesn't seem useful we can have FADT disable those buttons
for both types of guests.
Signed-off-by: Boris Ostrovsky
---
tools/libacpi/static_tables.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/tools/l
PM timer is not supported by PVH guests.
Signed-off-by: Boris Ostrovsky
---
tools/firmware/hvmloader/util.c | 3 ++-
tools/libacpi/build.c | 5 +
tools/libacpi/libacpi.h | 1 +
3 files changed, 8 insertions(+), 1 deletion(-)
diff --git a/tools/firmware/hvmloader/util.c b/t
PVH guests do not have IOAPIC which typically generates an SCI. For
those guests SCI will be provided as a virtual interrupt.
We also move VIRQ_MCA definition out of xen-mca.h to
keep all x86-specific VIRQ_ARCH_* in one place.
Signed-off-by: Boris Ostrovsky
---
xen/include/asm-x86/event.h
This is the method that will get invoked on an SCI.
Signed-off-by: Boris Ostrovsky
---
tools/libacpi/mk_dsdt.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/tools/libacpi/mk_dsdt.c b/tools/libacpi/mk_dsdt.c
index 4ae68bc..407386a 100644
--- a/tools/libacpi/mk_dsd
ACPI builder marks VCPUS set in vcpu_online map as enabled in MADT.
With ACPI-based CPU hotplug we only want VCPUs that are started by
the guest to be marked as such. Remaining VCPUs will be set to
"enable" by ACPI code during hotplug.
Signed-off-by: Boris Ostrovsky
---
tools/libxl/libxl_x86_acp
No IOREQ server installed for an HVM guest (as indicated
by HVM_PARAM_NR_IOREQ_SERVER_PAGES being set to zero) implies
a PVH guest. These guests need to handle ACPI-related IO
accesses.
Logic for the handler will be provided by a later patch.
Signed-off-by: Boris Ostrovsky
---
CC: Paul Durrant
flight 101964 linux-3.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101964/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl 6 xen-boot fail REGR. vs. 92983
test-amd64-amd64-libv
flight 101965 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/101965/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 11 guest-start fail REGR. vs. 101909
test-amd64-i386-l
On Fri, Nov 04, 2016 at 11:35:20AM -0400, Daniel De Graaf wrote:
> Add two missing allow rules:
>
> 1. Device model domain construction uses getvcpucontext, discovered by
> Andrew Cooper in an (apparently) unrelated bisection.
>
> 2. When a domain is destroyed with a device passthrough active, th
On Sat, Nov 05, 2016 at 02:09:22PM +0100, Dario Faggioli wrote:
> On Fri, 2016-11-04 at 14:36 -0400, Kevin O'Connor wrote:
> > On Fri, Nov 04, 2016 at 07:06:07PM +0100, Dario Faggioli wrote:
> > > And even more to this:
> > > https://lists.debian.org/debian-gcc/2016/10/msg00147.html
> > >
> > > A
21 matches
Mail list logo