flight 150631 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150631/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail blocked in 150608
test-amd64-i386-xl-qemuu-win7-amd64
flight 150639 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150639/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 146182
build-i386-libvirt
On Tue, Jun 02, 2020 at 07:10:07AM -0600, Tamas K Lengyel wrote:
> On Tue, Jun 2, 2020 at 7:00 AM Jan Beulich wrote:
> >
> > On 02.06.2020 14:51, Tamas K Lengyel wrote:
> > > On Tue, Jun 2, 2020 at 6:47 AM Jan Beulich wrote:
> > >>
> > >> On 02.06.2020 14:40, Tamas K Lengyel wrote:
> > >>> On Tue
On Tue, Jun 02, 2020 at 07:49:09AM -0600, Tamas K Lengyel wrote:
> For the last couple years we have received numerous reports from users of
> monitor vm_events of spurious guest crashes when using events. In particular,
> it has observed that the problem occurs when vm_events are being disabled. T
flight 150643 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150643/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 150438
Tests which
On 02.06.2020 19:15, Andrew Cooper wrote:
> On 02/06/2020 15:21, Jan Beulich wrote:
>>> OSSTest reports:
>>>
>>> x86_64.S: Assembler messages:
>>> x86_64.S:57: Error: no such instruction: `setssbsy'
>>> /home/osstest/build.150510.build-amd64/xen/xen/Rules.mk:183: recipe for
>>> target 'head.
Roger Pau Monne writes ("[PATCH 0/2] osstest: update FreeBSD guest tests"):
> The following series adds FreeBSD 11 and 12 guests tests to osstest.
> ATM this is only tested on amd64, since the i386 versions had a bug.
>
> The result can be seen at:
>
> http://logs.test-lab.xenproject.org/osstest/
Roger Pau Monne writes ("[PATCH 0/2] osstest: update FreeBSD guest tests"):
> The following series adds FreeBSD 11 and 12 guests tests to osstest.
> ATM this is only tested on amd64, since the i386 versions had a bug.
>
> The result can be seen at:
>
> http://logs.test-lab.xenproject.org/osstest/
On 02.06.2020 18:56, Igor Druzhinin wrote:
> A recalculation NPT fault doesn't always require additional handling
> in hvm_hap_nested_page_fault(), moreover in general case if there is no
> explicit handling done there - the fault is wrongly considered fatal.
>
> This covers a specific case of mig
On 01/06/2020 05:11, Roman Shaposhnik wrote:
Hi Julien!
Hi Roman,
On Sun, May 31, 2020 at 3:24 PM Julien Grall wrote:
On Sun, 31 May 2020 at 23:05, Roman Shaposhnik wrote:
Hi!
with a lot of help from Stefano, we're getting RPi4 support in
Project EVE pretty much on par between KVM a
> -Original Message-
> From: Jan Beulich
> Sent: 03 June 2020 11:03
> To: Igor Druzhinin
> Cc: xen-devel@lists.xenproject.org; andrew.coop...@citrix.com; w...@xen.org;
> roger@citrix.com;
> george.dun...@citrix.com; Paul Durrant
> Subject: Re: [PATCH v2] x86/svm: do not try to handl
On Tue, Jun 02, 2020 at 04:47:45PM +0100, Ian Jackson wrote:
> Prior to 2621d48f005a "gnulib: delete all gnulib integration",
> one could pass ./autogen.sh --no-git to prevent the libvirt build
> system from running git submodule update.
>
> This feature is needed by systems like the Xen Project C
On Wed, Jun 03, 2020 at 12:31:09PM +0200, Pavel Hrdina wrote:
> On Tue, Jun 02, 2020 at 04:47:45PM +0100, Ian Jackson wrote:
> > Prior to 2621d48f005a "gnulib: delete all gnulib integration",
> > one could pass ./autogen.sh --no-git to prevent the libvirt build
> > system from running git submodule
> -Original Message-
> From: Ian Jackson
> Sent: 03 June 2020 10:51
> To: Roger Pau Monne
> Cc: xen-devel@lists.xenproject.org; Paul Durrant
> Subject: Re: [PATCH 0/2] osstest: update FreeBSD guest tests
>
> Roger Pau Monne writes ("[PATCH 0/2] osstest: update FreeBSD guest tests"):
> >
On 03.06.2020 12:26, Paul Durrant wrote:
>> -Original Message-
>> From: Jan Beulich
>> Sent: 03 June 2020 11:03
>> To: Igor Druzhinin
>> Cc: xen-devel@lists.xenproject.org; andrew.coop...@citrix.com; w...@xen.org;
>> roger@citrix.com;
>> george.dun...@citrix.com; Paul Durrant
>> Sub
> -Original Message-
> From: Jan Beulich
> Sent: 03 June 2020 12:22
> To: p...@xen.org
> Cc: 'Igor Druzhinin' ;
> xen-devel@lists.xenproject.org;
> andrew.coop...@citrix.com; w...@xen.org; roger@citrix.com;
> george.dun...@citrix.com
> Subject: Re: [PATCH v2] x86/svm: do not try to h
(+Bertrand and Stefano)
On 01/06/2020 18:38, CodeWiz2280 wrote:
Hi Julien,
Hi Dave,
As requested please see log below from the eval board booting dom0, some
notes are as follows:
Thanks for the logs and the notes. They are useful to understand your issue.
1. The offset that gets applied
On Wed, Jun 03, 2020 at 11:37:08AM +0100, Daniel P. Berrangé wrote:
> On Wed, Jun 03, 2020 at 12:31:09PM +0200, Pavel Hrdina wrote:
> > On Tue, Jun 02, 2020 at 04:47:45PM +0100, Ian Jackson wrote:
> > > Prior to 2621d48f005a "gnulib: delete all gnulib integration",
> > > one could pass ./autogen.sh
On 03/06/2020 10:50, Jan Beulich wrote:
> On 02.06.2020 19:15, Andrew Cooper wrote:
>> On 02/06/2020 15:21, Jan Beulich wrote:
OSSTest reports:
x86_64.S: Assembler messages:
x86_64.S:57: Error: no such instruction: `setssbsy'
/home/osstest/build.150510.build-amd64/xen
On 03/06/2020 12:28, Paul Durrant wrote:
>> -Original Message-
>> From: Jan Beulich
>> Sent: 03 June 2020 12:22
>> To: p...@xen.org
>> Cc: 'Igor Druzhinin' ;
>> xen-devel@lists.xenproject.org;
>> andrew.coop...@citrix.com; w...@xen.org; roger@citrix.com;
>> george.dun...@citrix.com
>
> -Original Message-
> From: Igor Druzhinin
> Sent: 03 June 2020 12:45
> To: p...@xen.org; 'Jan Beulich'
> Cc: xen-devel@lists.xenproject.org; andrew.coop...@citrix.com; w...@xen.org;
> roger@citrix.com;
> george.dun...@citrix.com
> Subject: Re: [PATCH v2] x86/svm: do not try to hand
On 03/06/2020 12:48, Paul Durrant wrote:
>> -Original Message-
>> From: Igor Druzhinin
>> Sent: 03 June 2020 12:45
>> To: p...@xen.org; 'Jan Beulich'
>> Cc: xen-devel@lists.xenproject.org; andrew.coop...@citrix.com; w...@xen.org;
>> roger@citrix.com;
>> george.dun...@citrix.com
>> Su
Currently the xenbus_write() does not handle ring wrapping around
correctly. When ring buffer is almost full and there is not enough
space for next packet (e.g. there is 12 bytes of space left, but the
packet header needs to transmit 16 bytes) the memcpy() goes out of the
ring buffer boundry.
Inste
On Wed, Jun 3, 2020 at 2:28 AM Roger Pau Monné wrote:
>
> On Tue, Jun 02, 2020 at 07:49:09AM -0600, Tamas K Lengyel wrote:
> > For the last couple years we have received numerous reports from users of
> > monitor vm_events of spurious guest crashes when using events. In
> > particular,
> > it has
flight 150635 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150635/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail like 150609
test-amd64-amd64-xl-qemuu-win7-amd64
For the last couple years we have received numerous reports from users of
monitor vm_events of spurious guest crashes when using events. In particular,
it has observed that the problem occurs when vm_events are being disabled. The
nature of the guest crash varied widely and has only occured occasio
Pavel Hrdina writes ("Re: [PATCH] autogen.sh: Restore --no-git (avoid git
submodule update)"):
> There should not be any need to disable this explicitly unless you want
> to build libvirt with different revisions of submodules.
The Xen Project CI has a cross-tree bisector. It is capable of
autom
flight 150646 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150646/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 150438
Tests which
Pavel Hrdina writes ("Re: [PATCH] autogen.sh: Restore --no-git (avoid git
submodule update)"):
> To be honest I don't understand why would anyone want to keep track of
> all submodules of all projects for any CI and update it manually every
> time the upstream project changes these submodules. Sou
On Wed, Jun 03, 2020 at 06:25:31AM -0600, Tamas K Lengyel wrote:
> On Wed, Jun 3, 2020 at 2:28 AM Roger Pau Monné wrote:
> >
> > On Tue, Jun 02, 2020 at 07:49:09AM -0600, Tamas K Lengyel wrote:
> > > diff --git a/xen/arch/x86/hvm/monitor.c b/xen/arch/x86/hvm/monitor.c
> > > index 8aa14137e2..36894
On Wed, Jun 3, 2020 at 7:57 AM Roger Pau Monné wrote:
>
> On Wed, Jun 03, 2020 at 06:25:31AM -0600, Tamas K Lengyel wrote:
> > On Wed, Jun 3, 2020 at 2:28 AM Roger Pau Monné wrote:
> > >
> > > On Tue, Jun 02, 2020 at 07:49:09AM -0600, Tamas K Lengyel wrote:
> > > > diff --git a/xen/arch/x86/hvm/m
On Tue, Jun 02, 2020 at 04:47:45PM +0100, Ian Jackson wrote:
> Prior to 2621d48f005a "gnulib: delete all gnulib integration",
> one could pass ./autogen.sh --no-git to prevent the libvirt build
> system from running git submodule update.
>
> This feature is needed by systems like the Xen Project C
On 03.06.2020 13:44, Andrew Cooper wrote:
> On 03/06/2020 10:50, Jan Beulich wrote:
>> On 02.06.2020 19:15, Andrew Cooper wrote:
>>> On 02/06/2020 15:21, Jan Beulich wrote:
> OSSTest reports:
>
> x86_64.S: Assembler messages:
> x86_64.S:57: Error: no such instruction: `setssbsy'
On Wed, Jun 03, 2020 at 06:52:37AM -0600, Tamas K Lengyel wrote:
> For the last couple years we have received numerous reports from users of
> monitor vm_events of spurious guest crashes when using events. In particular,
> it has observed that the problem occurs when vm_events are being disabled. T
On Tue, 2020-06-02 at 01:12 +, Volodymyr Babchuk wrote:
> On Fri, 2020-05-29 at 10:48 +0200, Dario Faggioli wrote:
> >
> Actually, I tried to not only rebase this patch series to the current
> mainline, but also to add x86 support. This gave me deeper
> unsterstanding of the inner workings. At
Use kstrdup() instead of opencoded alloc and copy. kzalloc() is
excessive here.
Signed-off-by: Denis Efremov
---
drivers/net/xen-netback/xenbus.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/net/xen-netback/xenbus.c b/drivers/net/xen-netback/xenbus.c
index 286054
On Tue, Jun 02, 2020 at 12:24:05PM -0700, Stefano Stabellini wrote:
> On Tue, 2 Jun 2020, Corey Minyard wrote:
> > Snip
> >
> > > > > > > whether
> > > > > > > this was already done:
> > > > > > > 1) Does the kernel boot on baremetal (i.e without Xen)? This
> > > > > > > should
> > > > > > >
Tomas -
On Tue, Jun 2, 2020 at 7:43 PM Tomas Mozes wrote:
>> On Mon, Feb 24, 2020 at 4:55 PM Glen wrote:
>>> I'm now going to bring one of the previously-live guests on its own
>>> host back to credit2 so I can crash it and try to capture debugging
>>> output for xen-devel as requested. But sch
On Wed, 3 Jun 2020, Corey Minyard wrote:
> On Tue, Jun 02, 2020 at 12:24:05PM -0700, Stefano Stabellini wrote:
> > On Tue, 2 Jun 2020, Corey Minyard wrote:
> > > Snip
> > >
> > > > > > > > whether
> > > > > > > > this was already done:
> > > > > > > > 1) Does the kernel boot on baremetal (i.e
Pavel Hrdina writes ("Re: [PATCH] autogen.sh: Restore --no-git (avoid git
submodule update)"):
> On Tue, Jun 02, 2020 at 04:47:45PM +0100, Ian Jackson wrote:
> > -git submodule update --init || exit 1
> > +if [ "x$1" = x--no-git ]; then
> > + shift
> > +else
> > + git submodule update --init |
On Wed, Jun 03, 2020 at 06:26:43PM +0300, Denis Efremov wrote:
> Use kstrdup() instead of opencoded alloc and copy. kzalloc() is
> excessive here.
>
> Signed-off-by: Denis Efremov
Acked-by: Wei Liu
> ---
> drivers/net/xen-netback/xenbus.c | 3 +--
> 1 file changed, 1 insertion(+), 2 deletions
flight 150649 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150649/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 150438
Tests which
From: Roger Pau Monne
Xen PCI passthrough support may not be available and thus the global
variable "has_igd_gfx_passthru" might be compiled out. Common code
should not access it in that case.
Unfortunately, we can't use CONFIG_XEN_PCI_PASSTHROUGH directly in
xen-common.c so this patch instead m
> -Original Message-
> From: Anthony PERARD
> Sent: 03 June 2020 17:05
> To: qemu-de...@nongnu.org
> Cc: Anthony PERARD ; Roger Pau Monne
> ; Michael S.
> Tsirkin ; Marcel Apfelbaum ;
> Paolo Bonzini
> ; Richard Henderson ; Eduardo Habkost
> ;
> Stefano Stabellini ; Paul Durrant ; xen-
flight 150642 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150642/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-libvirt broken
test-amd64-i386-qemuu-r
flight 150653 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150653/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7191dd3c5990416cf473ce36b3fb84ecb2f7b950
baseline version:
ovmf ca407c7246bf405da6d9b
On Wed, Jun 03, 2020 at 05:04:42PM +0100, Anthony PERARD wrote:
> From: Roger Pau Monne
>
> Xen PCI passthrough support may not be available and thus the global
> variable "has_igd_gfx_passthru" might be compiled out. Common code
> should not access it in that case.
>
> Unfortunately, we can't u
On Wed, Jun 3, 2020 at 5:30 PM Glen wrote:
> Tomas -
>
> On Tue, Jun 2, 2020 at 7:43 PM Tomas Mozes wrote:
> >> On Mon, Feb 24, 2020 at 4:55 PM Glen wrote:
> >>> I'm now going to bring one of the previously-live guests on its own
> >>> host back to credit2 so I can crash it and try to capture d
On 03/06/20 18:04, Anthony PERARD wrote:
> From: Roger Pau Monne
>
> Xen PCI passthrough support may not be available and thus the global
> variable "has_igd_gfx_passthru" might be compiled out. Common code
> should not access it in that case.
>
> Unfortunately, we can't use CONFIG_XEN_PCI_PASST
Several options (TBOOT, XENOPROF, Scheduler) depend on EXPERT to be able to
deselect/configure.
Enabling EXPERT now causes the request of the Credit1 scheduler to be honoured
(rather than giving us Credit2), but take this opportunity to switch to Null,
as the previously problematic issues are now
Hi Julien,
The offset is already applied to the memory nodes in the device tree,
meaning a direct Linux boot from uboot would have only the 36-bit addresses
in the device tree (0x8__ and 0x8_8000_). Linux would start
executing from a 32-bit address space however and then switch over t
flight 150641 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150641/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail blocked in 150606
test-amd64-amd64-xl-qemut-win7-amd64
Patchew URL:
https://patchew.org/QEMU/20200603160442.3151170-1-anthony.per...@citrix.com/
Hi,
This series failed the docker-mingw@fedora build test. Please find the testing
commands and
their output below. If you have Docker installed, you can probably reproduce it
locally.
=== TEST SCRIPT B
On 03/06/2020 18:13, CodeWiz2280 wrote:
Hi Julien,
Hello,
In general, we avoid top post on xen-devel, instead we reply inline. I
believe gmail should allow you to do it :).
The offset is already applied to the memory nodes in the device tree,
meaning a direct Linux boot from uboot wou
On Wed, Jun 3, 2020 at 2:09 PM Julien Grall wrote:
>
>
>
> On 03/06/2020 18:13, CodeWiz2280 wrote:
> > Hi Julien,
>
> Hello,
>
> In general, we avoid top post on xen-devel, instead we reply inline. I
> believe gmail should allow you to do it :).
>
I'm sorry about that. Hopefully this looks right
flight 150658 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150658/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 150438
Tests which
On Wed, Jun 03, 2020 at 08:37:09AM -0700, Stefano Stabellini wrote:
> On Wed, 3 Jun 2020, Corey Minyard wrote:
> > On Tue, Jun 02, 2020 at 12:24:05PM -0700, Stefano Stabellini wrote:
> > > On Tue, 2 Jun 2020, Corey Minyard wrote:
> > > > Snip
> > > >
> > > > > > > > > whether
> > > > > > > > > thi
Well it goes without saying, but both Julian's branch and your
patchset can have:
Tested-by: Roman Shaposhnik
Thanks,
Roman.
P.S. For anyone interested I'll be curating the patchset over here:
https://github.com/rvs/eve/tree/rpi4/pkg/xen/arch/aarch64
https://github.com/rvs/eve/tree/rpi4
On 03/06/2020 09:21, Pawel Wieczorkiewicz wrote:
> Currently the xenbus_write() does not handle ring wrapping around
> correctly. When ring buffer is almost full and there is not enough
> space for next packet (e.g. there is 12 bytes of space left, but the
> packet header needs to transmit 16 bytes
flight 150664 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150664/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 150438
Tests which
From: Stefano Stabellini
The parameter is unused in this patch.
No functional changes.
Signed-off-by: Stefano Stabellini
Tested-by: Corey Minyard
Tested-by: Roman Shaposhnik
---
drivers/xen/swiotlb-xen.c | 14 +++---
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/drive
so that their names can better describe their behavior.
No functional changes.
Signed-off-by: Stefano Stabellini
---
drivers/xen/swiotlb-xen.c | 20 ++--
1 file changed, 10 insertions(+), 10 deletions(-)
diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c
index 6
From: Stefano Stabellini
The parameter is unused in this patch.
No functional changes.
Signed-off-by: Stefano Stabellini
Tested-by: Corey Minyard
Tested-by: Roman Shaposhnik
---
drivers/xen/swiotlb-xen.c | 10 +-
1 file changed, 5 insertions(+), 5 deletions(-)
diff --git a/drivers/x
From: Stefano Stabellini
The parameter is unused in this patch.
No functional changes.
Signed-off-by: Stefano Stabellini
Tested-by: Corey Minyard
Tested-by: Roman Shaposhnik
---
arch/arm/xen/mm.c | 5 +++--
drivers/xen/swiotlb-xen.c | 4 ++--
include/xen/swiotlb-xen.h | 5 +++--
3 fi
From: Stefano Stabellini
The parameter is unused in this patch.
No functional changes.
Signed-off-by: Stefano Stabellini
Tested-by: Corey Minyard
Tested-by: Roman Shaposhnik
---
drivers/xen/swiotlb-xen.c | 8
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/drivers/xen/
From: Boris Ostrovsky
xen_alloc_coherent_pages might return pages for which virt_to_phys and
virt_to_page don't work, e.g. ioremap'ed pages.
So in xen_swiotlb_free_coherent we can't assume that virt_to_page works.
Instead add a is_vmalloc_addr check and use vmalloc_to_page on vmalloc
virt addres
From: Stefano Stabellini
The parameter is unused in this patch.
No functional changes.
Signed-off-by: Stefano Stabellini
Tested-by: Corey Minyard
Tested-by: Roman Shaposhnik
---
arch/arm/xen/mm.c | 5 +++--
drivers/xen/swiotlb-xen.c | 4 ++--
include/xen/swiotlb-xen.h | 5 +++--
3 fi
From: Stefano Stabellini
It is not strictly needed. Call virt_to_phys on xen_io_tlb_start
instead. It will be useful not to have a start_dma_addr around with the
next patches.
Note that virt_to_phys is not the same as xen_virt_to_bus but actually
it is used to compared again __pa(xen_io_tlb_star
From: Stefano Stabellini
With some devices physical addresses are different than dma addresses.
To be able to deal with these cases, we need to call phys_to_dma on
physical addresses (including machine addresses in Xen terminology)
before returning them from xen_swiotlb_alloc_coherent and
xen_swi
Hi all,
This series is a collection of fixes to get Linux running on the RPi4 as
dom0.
Conceptually there are only two significant changes:
- make sure not to call virt_to_page on vmalloc virt addresses (patch
#1)
- use phys_to_dma and dma_to_phys to translate phys to/from dma
addresses (all
From: Stefano Stabellini
dma_cache_maint is getting called passing a dma address which could be
different from a physical address.
Add a struct device* parameter to dma_cache_maint.
Translate the dma_addr_t parameter of dma_cache_maint by calling
dma_to_phys. Do it for the first page and all th
From: Stefano Stabellini
xen_dma_sync_for_cpu, xen_dma_sync_for_device, xen_arch_need_swiotlb are
getting called passing dma addresses. On some platforms dma addresses
could be different from physical addresses. Before doing any operations
on these addresses we need to convert them back to physic
Touching the watchdog is required to be able to reboot the board.
The implementation is based on
drivers/watchdog/bcm2835_wdt.c:__bcm2835_restart in Linux.
Signed-off-by: Stefano Stabellini
---
xen/arch/arm/platforms/brcm-raspberry-pi.c | 60 ++
1 file changed, 60 insertions
CAUTION: This email originated from outside of the organization. Do not
click links or open attachments unless you can confirm the sender and know the
content is safe.
On 5/19/20 7:26 PM, Anchal Agarwal wrote:
> From: Munehisa Kamata
>
> Add Xen PVHVM specific system core
A recalculation NPT fault doesn't always require additional handling
in hvm_hap_nested_page_fault(), moreover in general case if there is no
explicit handling done there - the fault is wrongly considered fatal.
This covers a specific case of migration with vGPU assigned which
uses direct MMIO mapp
flight 150661 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150661/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail like 150423
test-amd64-i386-xl-pvshim12 guest-s
On Wed, Jun 3, 2020 at 3:31 PM Stefano Stabellini
wrote:
>
> Touching the watchdog is required to be able to reboot the board.
>
> The implementation is based on
> drivers/watchdog/bcm2835_wdt.c:__bcm2835_restart in Linux.
>
> Signed-off-by: Stefano Stabellini
Tested-by: Roman Shaposhnik
Thank
CAUTION: This email originated from outside of the organization. Do not click
links or open attachments unless you can confirm the sender and know the
content is safe.
On Tue, May 19, 2020 at 11:27:50PM +, Anchal Agarwal wrote:
> From: Munehisa Kamata
>
> S4 power transi
On Wed, Jun 3, 2020 at 4:32 PM Stefano Stabellini
wrote:
>
> Touching the watchdog is required to be able to reboot the board.
>
> The implementation is based on
> drivers/watchdog/bcm2835_wdt.c:__bcm2835_restart in Linux.
>
> Signed-off-by: Stefano Stabellini
Ah, fantastic, it's been very annoy
On Wed, Jun 03, 2020 at 03:31:56PM -0700, Stefano Stabellini wrote:
> Touching the watchdog is required to be able to reboot the board.
>
> The implementation is based on
> drivers/watchdog/bcm2835_wdt.c:__bcm2835_restart in Linux.
Ah, I was looking at this just today, as it had been annoying me
flight 150667 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150667/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf cce0ffab7cc43c810580889a197662d77f2d8ebd
baseline version:
xtf 9d934985adb9eb8290e62d
Hi,
(continuation of a thread from #xendevel)
During system shutdown quite often I hit infinite stream of errors like
this:
(XEN) d3v0 Weird PIO status 1, port 0xb004 read 0x
(XEN) domain_crash called from io.c:178
This is all running on Xen 4.13.0 (I think I've got this with 4.13.1
flight 150668 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150668/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 68d720fd92bbdbbfae5adee02d6d9fd24ca38f30
baseline version:
ovmf 7191dd3c5990416cf473c
Grall ;
> Nataliya Korovkina
> Subject: UEFI support in ARM DomUs
We have made U-Boot run inside XEN DomU, but just only PV console part,
not implement other frontend drivers currently. Would this help for your
case if enable EFI in U-Boot?
Regards,
Peng.
>
> Hi!
>
> with a lot of help from S
flight 150671 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150671/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 150438
Tests which
A recent report on xen-users surfaced a problem we have with driver
domains in medium sized or large configuration: the driver domain can
easily hit the default Xenstore quota (in the report it was a driver
domain for disks which hit the quota when 15 domUs were active at the
same time).
Setting
flight 150663 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150663/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 16 guest-localmigrate fail REGR. vs. 150641
Tests which did not succeed,
flight 150676 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150676/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt 12 guest-start fail REGR. vs. 150438
Tests which
On 03.06.2020 19:09, Andrew Cooper wrote:
> Several options (TBOOT, XENOPROF, Scheduler) depend on EXPERT to be able to
> deselect/configure.
>
> Enabling EXPERT now causes the request of the Credit1 scheduler to be honoured
> (rather than giving us Credit2), but take this opportunity to switch to
89 matches
Mail list logo