flight 184267 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184267/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-vhd 17 guest-start/debian.repeat fail pass in 184264
Tests which did not succeed, but
From: Oleksandr Tyshchenko
DO NOT access the underlying struct page of an sg table exported
by DMA-buf in dmabuf_imp_to_refs(), this is not allowed.
Please see drivers/dma-buf/dma-buf.c:mangle_sg_table() for details.
Fortunately, here (for special Xen device) we can avoid using
pages and calcula
Pipeline #1129775950 has passed!
Project: xen ( https://gitlab.com/xen-project/xen )
Branch: staging ( https://gitlab.com/xen-project/xen/-/commits/staging )
Commit: 5a3ace21 (
https://gitlab.com/xen-project/xen/-/commit/5a3ace21f3d779b291a2d305824b2820d88de7f1
)
Commit Message: xen/arm: smmu
flight 184268 linux-linus real [real]
flight 184269 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/184268/
http://logs.test-lab.xenproject.org/osstest/logs/184269/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-
This is a follow-up on commit 89965db43cce "hw/isa/piix3: Avoid Xen-specific
variant of piix3_write_config()" which introduced
piix_intx_routing_notifier_xen(). This function is implemented in board code but
accesses the PCI configuration space of the PIIX ISA function to determine the
PCI interrup
Hi All,
When enabling virtio disk and virtio net on Xen, I could see qemu blk assert
and being killed sometimes, This is not 100% reproducible. I am using
qemu master branch
7425b6277f12e82952cede1f531bfc689bf77fb1 (HEAD -> dummy, origin/staging,
origin/master, origin/HEAD, master) Merge tag 't
On 2024/1/6 09:08, Stefano Stabellini wrote:
> On Fri, 5 Jan 2024, Jiqian Chen wrote:
>> Some type of domain don't have PIRQ, like PVH, current
>> implementation is not suitable for those domain.
>>
>> When passthrough a device to guest on PVH dom0, this
>> pci_add_dm_done->XEN_DOMCTL_irq_permissio
flight 184270 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184270/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-raw 15 saverestore-support-check fail blocked in
184268
test-amd64-amd64-xl-qemut-win7-amd
On 2024/1/6 09:11, Stefano Stabellini wrote:
> On Fri, 5 Jan 2024, Jiqian Chen wrote:
>> In PVH dom0, it uses the linux local interrupt mechanism,
>> when it allocs irq for a gsi, it is dynamic, and follow
>> the principle of applying first, distributing first. And
>> the irq number is alloced from
flight 184272 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184272/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf ff1305c9fb171ad51bfc149c544e3ab5a0edf521
baseline version:
ovmf 9cf1d03ebe076b3e3825d
Hi Ayan,
On 05/01/2024 12:21, Ayan Kumar Halder wrote:
>
>
> There can be situations when the registers cannot be emulated to their full
> functionality. This can be due to the complexity involved. In such cases, one
> can emulate those registers as RAZ/WI. We call them as partial emulation.
I r
Hi Ayan,
On 05/01/2024 12:21, Ayan Kumar Halder wrote:
> From: Michal Orzel
>
> Currently if user enables HVC_DCC config option in Linux, it invokes access
> to debug data transfer registers (ie DBGDTRTX_EL0 on arm64, DBGDTRTXINT on
> arm32). As these registers are not emulated, Xen injects an u
Hi Ayan,
On 05/01/2024 12:21, Ayan Kumar Halder wrote:
> DBGOSLSR is emulated in the same way as its AArch64 variant (ie OSLSR_EL1).
> This is to ensure that DBGOSLSR.OSLK is 0, thus MDSCR_EL1.TXfull is treated
> as UNK/SBZP.
No need for this dot and yet another thus (it reads difficult).
You expl
13 matches
Mail list logo