flight 114667 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114667/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3866 xen-buildfail REGR. vs. 114507
build-amd64-xsm
Hi,
This is great!
I don’t know if the protocol requires it, but if so then
Acked-by: David Scott mailto:d...@recoil.org>>
Cheers,
Dave
> On 17 Oct 2017, at 18:44, Ian Jackson wrote:
>
> oxenstored is our default implementation of xenstore, for platforms
> that have ocaml support. We need i
Hi Andre,
I verified this patch on qualcomm platform. It is working fine.
On 18 October 2017 at 19:11, Andre Przywara wrote:
> Instead of asserting the receive interrupt (RXI) on the first character
> in the FIFO, lets (ab)use the receive timeout interrupt (RTI) for that
> purpose. That seems to
This run is configured for baseline tests only.
flight 72328 xen-4.9-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72328/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stop
---
tools/xl/xl_migrate.c | 11 ---
1 file changed, 11 deletions(-)
diff --git a/tools/xl/xl_migrate.c b/tools/xl/xl_migrate.c
index fee726f..9f43d96 100644
--- a/tools/xl/xl_migrate.c
+++ b/tools/xl/xl_migrate.c
@@ -427,17 +427,6 @@ static void migrate_receive(int debug, int daemonize, i
---
tools/libxc/xc_sr_save.c | 1 -
tools/libxl/libxl_create.c | 15 ---
tools/libxl/libxl_dom_save.c | 2 +-
tools/libxl/libxl_domain.c | 2 +-
tools/libxl/libxl_internal.h | 2 +-
tools/libxl/libxl_save_callout.c | 5 +++--
tools/libxl/libxl_stream_wr
---
tools/libxl/libxl_internal.h | 18 +++
tools/libxl/libxl_qmp.c | 125 ++-
2 files changed, 142 insertions(+), 1 deletion(-)
diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
index 7247509..1349a8f 100644
--- a/tools/libx
---
tools/libxl/libxl_dom_save.c | 71
tools/libxl/libxl_qmp.c | 150 +--
2 files changed, 170 insertions(+), 51 deletions(-)
diff --git a/tools/libxl/libxl_dom_save.c b/tools/libxl/libxl_dom_save.c
index ddfe2f8..d188dd2 100644
-
I am reviving this thread about the migration of VMs with local storage. I have
worked on a solution to be able to migrate VMs that use QEMU as the backend
disk driver. I have adapted the migration flow and piggybacked on the
“drive-mirroring” capability already provided by QEMU.
Overview
1. Th
---
tools/libxl/libxl_create.c | 5 +++--
tools/libxl/libxl_dm.c | 10 +-
tools/libxl/libxl_internal.h | 4 ++--
tools/libxl/libxl_save_callout.c | 41 +---
tools/libxl/libxl_save_helper.c | 15 ++-
tools/libxl/libxl_ty
---
tools/libxc/include/xenguest.h| 6 +-
tools/libxc/xc_nomigrate.c| 6 +-
tools/libxc/xc_sr_common.h| 3 +
tools/libxc/xc_sr_restore.c | 14 +++--
tools/libxc/xc_sr_save.c | 118 +-
tools/libxc/xc_sr_save_x86_hvm.c |
---
tools/libxl/libxl.h | 11 ++-
tools/libxl/libxl_create.c | 191 ---
tools/libxl/libxl_dm.c | 26 --
tools/libxl/libxl_dom_save.c | 85 -
tools/libxl/libxl_domain.c | 4 +-
tools/libxl/libxl_inte
---
tools/ocaml/libs/xl/xenlight_stubs.c | 4 +--
tools/xl/xl.h| 1 +
tools/xl/xl_migrate.c| 47 +---
tools/xl/xl_saverestore.c| 2 +-
tools/xl/xl_vmcontrol.c | 5 ++--
5 files changed, 45 insertio
flight 114669 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114669/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 114531
test-armhf-armhf-libvirt 14 saveresto
On 10/18/17 4:50 AM, Jan Beulich wrote:
On 17.10.17 at 23:41, wrote:
>> From: David Esler
>>
>> In 9180f5365524 a change was made to the send_chr function to take in
>> C-strings and print out a character at a time until a NULL was
>> encountered. However there is no code to increment the cu
Xen uses non-secure group1 interrupts, however it doesn't configure the
GICv3 accordingly. Xen needs to set GICD_IGROUPR for SPIs and
GICR_IGROUPR0 for local interrupt to "1" to specify that interrupts
belong to group1. This is particularly important if the system has
GICD_CTLR.DS set, also see com
This run is configured for baseline tests only.
flight 72329 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72329/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-examine 10 examine-serial/
On Thu, Oct 12, 2017 at 1:02 PM, Luis R. Rodriguez wrote:
> On Wed, Oct 11, 2017 at 01:30:15PM -0700, Thomas Garnier wrote:
>> Provide an option to default visibility to hidden except for key
>> symbols. This option is disabled by default and will be used by x86_64
>> PIE support to remove errors
On Thu, Oct 12, 2017 at 9:28 AM, Tom Lendacky wrote:
> On 10/12/2017 10:34 AM, Thomas Garnier wrote:
>>
>> On Wed, Oct 11, 2017 at 2:34 PM, Tom Lendacky
>> wrote:
>>>
>>> On 10/11/2017 3:30 PM, Thomas Garnier wrote:
Changes:
- patch v1:
- Simplify ftrace implementation
This patch renames PSR sysctl/domctl interfaces and related xsm policy to
make them be general for all resource allocation features but not only
for CAT. Then, we can resuse the interfaces for all allocation features.
Basically, it changes 'psr_cat_op' to 'psr_alloc', and remove 'CAT_' from some
m
Hi Roger:
Thanks for review.
On 2017年10月18日 21:26, Roger Pau Monné wrote:
> On Thu, Sep 21, 2017 at 11:01:42PM -0400, Lan Tianyu wrote:
>> This patch is to add Xen virtual IOMMU doc to introduce motivation,
>> framework, vIOMMU hypercall and xl configuration.
>>
>> Signed-off-by: Lan Tianyu
The original dummy xsm_map_gmfn_foregin checks if source domain has the proper
privileges over the target domain. Under this policy, it's not allowed if a Dom0
wants to map pages from one DomU to another, which restricts some useful yet not
dangerous use cases of the API, such as sharing pages amon
Add a new structure to the IDL familiy to represent static shared memory regions
as proposed in the proposal "Allow setting up shared memory areas between VMs
from xl config file" (see [1]).
[1] https://lists.xen.org/archives/html/xen-devel/2017-08/msg03242.html
Signed-off-by: Zhongze Liu
Review
This is for the proposal "Allow setting up shared memory areas between VMs
from xl config file". See:
https://lists.xen.org/archives/html/xen-devel/2017-08/msg03242.html
Then plan is to use XENMEM_add_to_physmap_batch to map the shared pages from
one domU to another and use XENMEM_remove_from_p
Add libxl__sshm_add to map shared pages from one DomU to another, The mapping
process involves the follwing steps:
* Set defaults and check for further errors in the static_shm configs:
overlapping areas, invalid ranges, duplicated master domain,
no master domain etc.
* Write infomatio
Add docs to document the motivation, usage, use cases and other
relavant infomation about the static shared memory feature.
This is for the proposal "Allow setting up shared memory areas between VMs
from xl config file". See:
https://lists.xen.org/archives/html/xen-devel/2017-08/msg03242.html
This series implements the new xl config entry proposed in [1]. Users can use
the new config entry to statically setup shared memory areas among VMs that
don't have grant table support so that they could communicate with each other
through the static shared memory areas.
[1] Proposla to allow sett
Add libxl__sshm_del to unmap static shared memory areas mapped by
libxl__sshm_add during domain creation. The unmapping process is:
* For a master: decrease the refcount of the sshm region, if the refcount
reaches 0, cleanup the whole sshm path.
* For a slave: unmap the shared pages, and cleanup
Add the parsing utils for the newly introduced libxl_static_sshm struct
to the libxl/libxlu_* family. And add realated parsing code in xl to
parse the struct from xl config files. This is for the proposal "Allow
setting up shared memory areas between VMs from xl config file" (see [1]).
[1] https:/
On 2017年10月18日 22:05, Roger Pau Monné wrote:
> On Thu, Sep 21, 2017 at 11:01:43PM -0400, Lan Tianyu wrote:
>> +int viommu_destroy_domain(struct domain *d)
>> +{
>> +int ret;
>> +
>> +if ( !d->viommu )
>> +return -EINVAL;
>
> ENODEV would be better.
OK. Will update.
>
>> +
>> +
On 2017年10月18日 22:18, Roger Pau Monné wrote:
> On Thu, Sep 21, 2017 at 11:01:44PM -0400, Lan Tianyu wrote:
>> This patch is to introduce create, destroy and query capabilities
>> command for vIOMMU. vIOMMU layer will deal with requests and call
>> arch vIOMMU ops.
>>
>> Signed-off-by: Lan Tianyu
>
On 2017年10月18日 22:36, Roger Pau Monné wrote:
> On Thu, Sep 21, 2017 at 11:01:45PM -0400, Lan Tianyu wrote:
>> From: Chao Gao
>>
>> Add dmar table structure according Chapter 8 "BIOS Considerations" of
>> VTd spec Rev. 2.4.
>>
>> VTd
>> spec:http://www.intel.com/content/dam/www/public/us/en/docume
flight 114665 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114665/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-rtds 7 xen-boot fail in 114646 pass in 114665
test-armhf-armhf-xl-vhd 6 xen
101 - 133 of 133 matches
Mail list logo