[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [xen-unstable baseline-only test] 44208: regressions - FAIL



This run is configured for baseline tests only.

flight 44208 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/44208/

Regressions :-(

Tests which did not succeed and are blocking,
including tests which could not be run:
 test-armhf-armhf-xl-xsm      15 guest-start/debian.repeat fail REGR. vs. 44200
 test-armhf-armhf-libvirt-qcow2  9 debian-di-install       fail REGR. vs. 44200

Regressions which are regarded as allowable (not blocking):
 build-amd64-rumpuserxen       6 xen-build                fail blocked in 44200
 build-i386-rumpuserxen        6 xen-build                fail blocked in 44200
 test-amd64-amd64-xl-credit2 19 guest-start/debian.repeat fail blocked in 44200
 test-amd64-amd64-xl-xsm     19 guest-start/debian.repeat fail blocked in 44200
 test-amd64-i386-xl-qemuu-win7-amd64 16 guest-stop        fail blocked in 44200
 test-amd64-amd64-qemuu-nested-intel 16 debian-hvm-install/l1/l2 fail blocked 
in 44200

Tests which did not succeed, but are not blocking:
 test-amd64-amd64-rumpuserxen-amd64  1 build-check(1)               blocked n/a
 test-amd64-i386-rumpuserxen-i386  1 build-check(1)               blocked  n/a
 test-armhf-armhf-libvirt-xsm 12 migrate-support-check        fail   never pass
 test-armhf-armhf-libvirt-xsm 14 guest-saverestore            fail   never pass
 test-armhf-armhf-libvirt     14 guest-saverestore            fail   never pass
 test-armhf-armhf-libvirt     12 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pvh-intel 11 guest-start                  fail  never pass
 test-armhf-armhf-xl-credit2  13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-credit2  12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-xsm      13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-xsm      12 migrate-support-check        fail   never pass
 test-amd64-amd64-xl-pvh-amd  11 guest-start                  fail   never pass
 test-armhf-armhf-xl          12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl          13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-midway   13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-midway   12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-multivcpu 13 saverestore-support-check    fail  never pass
 test-armhf-armhf-xl-multivcpu 12 migrate-support-check        fail  never pass
 test-armhf-armhf-xl-rtds     13 saverestore-support-check    fail   never pass
 test-armhf-armhf-xl-rtds     12 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt      12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-xsm 12 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt     12 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      11 migrate-support-check        fail   never pass
 test-armhf-armhf-xl-vhd      12 saverestore-support-check    fail   never pass
 test-amd64-i386-libvirt-xsm  12 migrate-support-check        fail   never pass
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stop             fail never pass
 test-armhf-armhf-libvirt-raw 13 guest-saverestore            fail   never pass
 test-armhf-armhf-libvirt-raw 11 migrate-support-check        fail   never pass
 test-amd64-amd64-qemuu-nested-amd 16 debian-hvm-install/l1/l2  fail never pass
 test-amd64-i386-xl-qemut-win7-amd64 16 guest-stop              fail never pass
 test-amd64-amd64-libvirt-vhd 11 migrate-support-check        fail   never pass
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm 10 migrate-support-check 
fail never pass
 test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stop             fail never pass

version targeted for testing:
 xen                  986d9fc3bbf8a6d9d088ca22d1422bd5de249396
baseline version:
 xen                  42391c613d42248d82f1b04c523d48bf141b75dc

Last test of basis    44200  2016-03-01 03:57:40 Z    1 days
Testing same since    44208  2016-03-02 13:50:31 Z    0 days    1 attempts

------------------------------------------------------------
People who touched revisions under test:
  Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  Corneliu ZUZU <czuzu@xxxxxxxxxxxxxxx>
  Dario Faggioli <dario.faggioli@xxxxxxxxxx>
  Doug Goldstein <cardoe@xxxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxx>
  George Dunlap <george.dunlap@xxxxxxxxxxxxx>
  Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
  Ian Campbell <ian.campbell@xxxxxxxxxx>
  Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
  Jan Beulich <jbeulich@xxxxxxxx>
  Parth Dixit <parth.dixit@xxxxxxxxxx>
  Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  Shannon Zhao <shannon.zhao@xxxxxxxxxx>
  Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
  Tamas K Lengyel <tamas@xxxxxxxxxxxxx>
  Wei Liu <wei.liu2@xxxxxxxxxx>

jobs:
 build-amd64-xsm                                              pass    
 build-armhf-xsm                                              pass    
 build-i386-xsm                                               pass    
 build-amd64                                                  pass    
 build-armhf                                                  pass    
 build-i386                                                   pass    
 build-amd64-libvirt                                          pass    
 build-armhf-libvirt                                          pass    
 build-i386-libvirt                                           pass    
 build-amd64-oldkern                                          pass    
 build-i386-oldkern                                           pass    
 build-amd64-prev                                             pass    
 build-i386-prev                                              pass    
 build-amd64-pvops                                            pass    
 build-armhf-pvops                                            pass    
 build-i386-pvops                                             pass    
 build-amd64-rumpuserxen                                      fail    
 build-i386-rumpuserxen                                       fail    
 test-amd64-amd64-xl                                          pass    
 test-armhf-armhf-xl                                          pass    
 test-amd64-i386-xl                                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-libvirt-qemuu-debianhvm-amd64-xsm           pass    
 test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm            pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm                pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64-xsm                 pass    
 test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm        pass    
 test-amd64-i386-xl-qemut-stubdom-debianhvm-amd64-xsm         pass    
 test-amd64-amd64-libvirt-xsm                                 pass    
 test-armhf-armhf-libvirt-xsm                                 fail    
 test-amd64-i386-libvirt-xsm                                  pass    
 test-amd64-amd64-xl-xsm                                      fail    
 test-armhf-armhf-xl-xsm                                      fail    
 test-amd64-i386-xl-xsm                                       pass    
 test-amd64-amd64-qemuu-nested-amd                            fail    
 test-amd64-amd64-xl-pvh-amd                                  fail    
 test-amd64-i386-qemut-rhel6hvm-amd                           pass    
 test-amd64-i386-qemuu-rhel6hvm-amd                           pass    
 test-amd64-amd64-xl-qemut-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemut-debianhvm-amd64                     pass    
 test-amd64-amd64-xl-qemuu-debianhvm-amd64                    pass    
 test-amd64-i386-xl-qemuu-debianhvm-amd64                     pass    
 test-amd64-i386-freebsd10-amd64                              pass    
 test-amd64-amd64-xl-qemuu-ovmf-amd64                         pass    
 test-amd64-i386-xl-qemuu-ovmf-amd64                          pass    
 test-amd64-amd64-rumpuserxen-amd64                           blocked 
 test-amd64-amd64-xl-qemut-win7-amd64                         fail    
 test-amd64-i386-xl-qemut-win7-amd64                          fail    
 test-amd64-amd64-xl-qemuu-win7-amd64                         fail    
 test-amd64-i386-xl-qemuu-win7-amd64                          fail    
 test-amd64-amd64-xl-credit2                                  fail    
 test-armhf-armhf-xl-credit2                                  pass    
 test-amd64-i386-freebsd10-i386                               pass    
 test-amd64-i386-rumpuserxen-i386                             blocked 
 test-amd64-amd64-qemuu-nested-intel                          fail    
 test-amd64-amd64-xl-pvh-intel                                fail    
 test-amd64-i386-qemut-rhel6hvm-intel                         pass    
 test-amd64-i386-qemuu-rhel6hvm-intel                         pass    
 test-amd64-amd64-libvirt                                     pass    
 test-armhf-armhf-libvirt                                     fail    
 test-amd64-i386-libvirt                                      pass    
 test-armhf-armhf-xl-midway                                   pass    
 test-amd64-amd64-migrupgrade                                 pass    
 test-amd64-i386-migrupgrade                                  pass    
 test-amd64-amd64-xl-multivcpu                                pass    
 test-armhf-armhf-xl-multivcpu                                pass    
 test-amd64-amd64-pair                                        pass    
 test-amd64-i386-pair                                         pass    
 test-amd64-amd64-libvirt-pair                                pass    
 test-amd64-i386-libvirt-pair                                 pass    
 test-amd64-amd64-amd64-pvgrub                                pass    
 test-amd64-amd64-i386-pvgrub                                 pass    
 test-amd64-amd64-pygrub                                      pass    
 test-armhf-armhf-libvirt-qcow2                               fail    
 test-amd64-amd64-xl-qcow2                                    pass    
 test-armhf-armhf-libvirt-raw                                 fail    
 test-amd64-i386-xl-raw                                       pass    
 test-amd64-amd64-xl-rtds                                     pass    
 test-armhf-armhf-xl-rtds                                     pass    
 test-amd64-i386-xl-qemut-winxpsp3-vcpus1                     pass    
 test-amd64-i386-xl-qemuu-winxpsp3-vcpus1                     pass    
 test-amd64-amd64-libvirt-vhd                                 pass    
 test-armhf-armhf-xl-vhd                                      pass    
 test-amd64-amd64-xl-qemut-winxpsp3                           pass    
 test-amd64-i386-xl-qemut-winxpsp3                            pass    
 test-amd64-amd64-xl-qemuu-winxpsp3                           pass    
 test-amd64-i386-xl-qemuu-winxpsp3                            pass    


------------------------------------------------------------
sg-report-flight on osstest.xs.citrite.net
logs: /home/osstest/logs
images: /home/osstest/images

Logs, config files, etc. are available at
    http://osstest.xs.citrite.net/~osstest/testlogs/logs

Test harness code can be found at
    http://xenbits.xensource.com/gitweb?p=osstest.git;a=summary


Push not applicable.

------------------------------------------------------------
commit 986d9fc3bbf8a6d9d088ca22d1422bd5de249396
Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
Date:   Thu Feb 25 14:49:03 2016 +0000

    tools/xenalyze: Actually handle case where number of ipi vectors exceeds 
static max
    
    find_vec() is supposed to find the vector in the list if it exists,
    choose an empty slot if it doesn't exist, and return null if all slots
    are full.
    
    However, coverity noticed that although the callers of find_vec() handle
    the last condition, find_vec() itself didn't.
    
    Check to see if we actually found an empty slot before attempting to
    initialize it.
    
    CID 1306864
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 1065622448c1cc5a10425914f02708750046b17e
Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
Date:   Thu Feb 25 14:49:00 2016 +0000

    tools/xenalyze: Fix check for error return value
    
    fdopen returns NULL on failure, not a negative integer.
    
    CID 1306863
    CID 1306858
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 794beca91840fb8519113d40887459d20ec63f68
Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
Date:   Thu Feb 25 14:48:57 2016 +0000

    tools/xenalyze: Avoid redundant check
    
    Coverity notices that if !head is true, that !N can never be true.
    
    Don't bother checking N, since we know it has to be at least one.
    
    CID 1354243
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit fb579942018fafcf8c6cec04d116b9a4c5e990cd
Author: George Dunlap <george.dunlap@xxxxxxxxxxxxx>
Date:   Thu Feb 25 14:48:56 2016 +0000

    tools/xenalyze: Close symbol_file after reading it
    
    ...to avoid leaking the FD and associated memory.
    
    CID 1306872
    
    Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 95cb4bac96e95b4df2e63d5ee5ae5f080090e31e
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Feb 10 16:32:39 2016 +0000

    loadpolicy: only close polFd if it is valid
    
    It can be -1 at this point.
    
    CID 1055562
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit 1c3639323c270cbdbde1d7d4add582d8f8d2d5f2
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Mon Feb 29 16:11:31 2016 +0100

    MAINTAINERS: remove myself from ARM (incl DT), seabios, tools and The Rest
    
    Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
    Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>

commit b07408ec75260a626b10beae8bd1c7e240c0e8c2
Author: Doug Goldstein <cardoe@xxxxxxxxxx>
Date:   Mon Feb 29 16:09:09 2016 +0100

    build: consolidate CONFIG_HAS_VIDEO and CONFIG_VIDEO
    
    No real advantage to keeping these separate. The use case of this from
    Linux is when the platform or target board has support for something but
    the user wants to be given the option to disable it.
    
    Signed-off-by: Doug Goldstein <cardoe@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit ff2f342d0a64a7a59bbf195f68b862156fdb6b11
Author: Doug Goldstein <cardoe@xxxxxxxxxx>
Date:   Mon Feb 29 16:08:43 2016 +0100

    build: consolidate CONFIG_HAS_VGA and CONFIG_VGA
    
    No real advantage to keeping these separate. The use case of this from
    Linux is when the platform or target board has support for something but
    the user wants to be given the option to disable it.
    
    Signed-off-by: Doug Goldstein <cardoe@xxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>

commit f471e98862f05242ae487153adc36283127d0e10
Author: Corneliu ZUZU <czuzu@xxxxxxxxxxxxxxx>
Date:   Mon Feb 29 16:07:49 2016 +0100

    arm/monitor vm-events: implement guest-request support
    
    This patch adds ARM support for guest-request monitor vm-events.
    Note: on ARM hypercall instruction skipping must be done manually
    by the caller. This will probably be changed in a future patch.
    
    Summary of changes:
    == Moved to common-side:
      * XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST handling (moved from X86
          arch_monitor_domctl_event to common monitor_domctl)
      * hvm_event_guest_request->vm_event_monitor_guest_request
      * hvm_event_traps->vm_event_monitor_traps (also added target vcpu as 
param)
      * guest-request bits from X86 'struct arch_domain' (to common 'struct 
domain')
    == ARM implementations:
      * do_hvm_op now handling of HVMOP_guest_request_vm_event => calls
          vm_event_monitor_guest_request (as on X86)
      * arch_monitor_get_capabilities->vm_event_monitor_get_capabilities,
        updated to reflect support for XEN_DOMCTL_MONITOR_EVENT_GUEST_REQUEST
      * vm_event_init_domain (does nothing), vm_event_cleanup_domain
    == Misc:
      * vm_event_fill_regs, no longer X86-specific. ARM-side implementation of 
this
          function currently does nothing, that will be added in a separate 
patch.
    
    Signed-off-by: Corneliu ZUZU <czuzu@xxxxxxxxxxxxxxx>
    Acked-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Tamas K Lengyel <tamas@xxxxxxxxxxxxx>

commit ef1b111beecf96abd9608a35b7498c590e3d078c
Author: Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
Date:   Mon Feb 29 16:06:40 2016 +0100

    x86/hvm: setup TSC scaling ratio
    
    This patch adds a field tsc_scaling_ratio in struct hvm_domain to record
    the per-domain TSC scaling ratio, and sets it in tsc_set_info().
    
    Before setting the per-domain TSC scaling ratio, we check its validity
    in tsc_set_info(). If an invalid ratio is given, we will leave the
    default value in tsc_scaling_ratio (i.e. ratio = 1) and setup guest TSC
    as if no TSC scaling is used:
    * For TSC_MODE_DEFAULT,
      - if a user-specified TSC frequency is given, we will set the guest
        TSC frequency to it; otherwise, we set it to the host TSC frequency.
      - if guest TSC frequency does not equal to host TSC frequency, we will
        emulate guest TSC (i.e. d->arch.vtsc is set to 1). In both cases,
        guest TSC runs in the guest TSC frequency.
    * For TSC_MODE_PVRDTSCP,
      - we set the guest TSC frequency to the host TSC frequency.
      - guest rdtsc is executed natively in the host TSC frequency as
        before.
      - if rdtscp is not available to guest, it will be emulated; otherwise,
        it will be executed natively. In both cases, guest rdtscp gets TSC
        in the host TSC frequency as before.
    
    Signed-off-by: Haozhong Zhang <haozhong.zhang@xxxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    Acked-by: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>

commit 1bb9a1e356a139628df261197cbc2ba5a4516f2b
Author: Parth Dixit <parth.dixit@xxxxxxxxxx>
Date:   Mon Feb 29 16:06:07 2016 +0100

    arm/acpi: read acpi memory info from uefi
    
    ACPI memory is seperate from conventional memory and should be marked
    as reserved while passing to DOM0. Create a new meminfo structure to
    store all the acpi tables listed in uefi.
    
    Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx>
    Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit db5fd8c3e46b379df9dd94a3730736682e42292d
Author: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
Date:   Mon Feb 29 16:05:32 2016 +0100

    arm/acpi: add placeholder for efi and acpi load address
    
    We will create EFI table, memory description table and some of acpi
    tables and we're going to map them to kinfo->gnttab_start of Dom0.
    Add placeholder for the starting address for loading in DOM0 and the
    size of new added tables. Also add a placeholder to store the new
    created tables.
    
    Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx>
    Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit 5ed0a0e2e2e26527915871f9c8bbd3d6af3e5403
Author: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
Date:   Mon Feb 29 16:04:41 2016 +0100

    arm/acpi: define a enum for reserved tables
    
    It needs to copy and change the contents of some ACPI and EFI tables for
    Dom0. Here define a enum for those tables.
    
    Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx>
    Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit f2c9f13eae80c57df6b0df8c87a2eb2e86135ac0
Author: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
Date:   Mon Feb 29 16:02:57 2016 +0100

    arm/acpi: add arm specific acpi header file
    
    From: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
    
    Add architecture specific definitions and calls required for acpi in new
    header file.
    
    Signed-off-by: Parth Dixit <parth.dixit@xxxxxxxxxx>
    Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
    Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit b7ae6ce2c54453cfb468006aa52e4908291f65a6
Author: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
Date:   Mon Feb 29 16:01:21 2016 +0100

    arm/acpi: emulate io ports for arm
    
    Add macros to emulate x86 style ports for arm. This avoids modification in
    common code for acpi. Here just print a warning on ARM.
    
    Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
    Reviewed-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>

commit e7e84b2edc027a49efcf5e2be3560b58e805aaff
Author: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
Date:   Mon Feb 29 16:00:48 2016 +0100

    docs: spell out limits of security support for qemu-xen
    
    Write down what emulated hardware is supported in qemu-xen. Add a way
    for users to ask for a change in the list.
    
    Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
    Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>

commit 66c7449a4daee7a36f31635fd95c37d8f381c529
Author: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
Date:   Mon Feb 29 15:58:49 2016 +0100

    credit1: avoid boosting vCPUs being "just" migrated
    
    Moving a vCPU to a different pCPU means offlining it and
    then waking it up, on the new pCPU. Credit1 grants BOOST
    priority to vCPUs that wakes up, with the aim of improving
    I/O latency. The net effect of this all is that vCPUs get
    boosted when migrating, which shouldn't happen.
    
    For instance, this causes scheduling anomalies and,
    potentially, performance problems, as reported here:
      http://lists.xen.org/archives/html/xen-devel/2015-10/msg02851.html
    
    This patch fixes this by noting down (by means of a flag)
    the fact that the vCPU is about to undergo a migration.
    This way we can tell, later, during a wakeup, whether the
    vCPU is migrating or unblocking, and decide whether or
    not to apply the boosting.
    
    Note that it is important that atomic-safe bit operations
    are used when manipulating vCPUs' flags. Take the chance
    and add a comment about this.
    
    Signed-off-by: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
    Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx>
(qemu changes not included)

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.