On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> This patch finally adds the support for vuart console.
>
> Signed-off-by: Bhupinder Thakur
>
> ---
> CC: ij
> CC: wl
> CC: ss
> CC: jg
>
> Changes since v3:
> - The changes in xenconsole have been split into four
On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> Xenconsole uses a domain structure which contains console specific fields.
> This
> patch defines a new console structure, which would be used by the xenconsole
> functions to perform console specific operations like reading/writing data
> from/to
>
flight 110057 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110057/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-buildfail REGR. vs. 110043
Tests which
flight 110062 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110062/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-buildfail REGR. vs. 110043
Tests which
On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> Xenconsole functions take domain structure as input. These functions shall be
> modified to take console structure as input since these functions typically
> perform
> console specific operations.
>
> Also the console specific functions starting with
flight 110038 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110038/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 14 guest-saverestore.2 fail REGR. vs.
109994
>>> On 02.06.17 at 09:26, wrote:
> On 17-05-31 03:37:48, Jan Beulich wrote:
>> >>> On 03.05.17 at 10:44, wrote:
>> > +/* Cut half of cos_max when CDP is enabled. */
>> > +feat->cos_max >>= 1;
>> > +
>> > +/* We only
On 17-06-06 01:45:11, Jan Beulich wrote:
> >>> On 02.06.17 at 09:26, wrote:
> > On 17-05-31 03:37:48, Jan Beulich wrote:
> >> >>> On 03.05.17 at 10:44, wrote:
> >> > +/* Cut half of cos_max when CDP is enabled. */
> >> > +
flight 110023 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110023/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7b5d848dbfc3abe8b8c6066168bf10eca39d5891
baseline version:
ovmf
>>> On 02.06.17 at 22:33, wrote:
> On 02/06/17 21:02, Andrew Cooper wrote:
>> On 01/06/17 13:11, Jan Beulich wrote:
>>> Reported-by: Andrew Cooper
>>> Signed-off-by: Jan Beulich
>> I have finally managed to reproduce the
>>> On 05.06.17 at 10:41, wrote:
> --- a/arch/x86/include/asm/xen/hypercall.h
> +++ b/arch/x86/include/asm/xen/hypercall.h
> @@ -49,6 +49,7 @@
> #include
> #include
> #include
> +#include
Why?
> @@ -474,7 +475,7 @@ HYPERVISOR_xenpmu_op(unsigned int op, void
>>> On 02.06.17 at 09:31, wrote:
> On 06/02/2017 08:10 AM, Lan Tianyu wrote:
>> On 2017年05月30日 23:42, Jan Beulich wrote:
>> On 30.05.17 at 17:36, wrote:
On Thu, May 18, 2017 at 01:34:31AM -0400, Lan Tianyu wrote:
> --- a/xen/common/Kconfig
flight 110018 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110018/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemut-win7-amd64 15 guest-localmigrate/x10 fail in 110009
pass in 110018
>>> On 02.06.17 at 13:01, wrote:
> On Wed, May 31, 2017 at 05:45:14AM -0600, Jan Beulich wrote:
>> >>> On 31.05.17 at 13:14, wrote:
>> > On Tue, May 30, 2017 at 11:59:31PM -0600, Jan Beulich wrote:
>> >> >>> On 30.05.17 at 19:40,
>>> On 05.06.17 at 19:08, wrote:
> On Mon, May 29, 2017 at 09:55:14AM -0600, Jan Beulich wrote:
>> >>> On 18.05.17 at 19:09, wrote:
>>
>> As said on patch 10(?), this shouldn't be moved alone. And whether
>> we want to move it in the first place depends
>>> On 02.06.17 at 04:49, wrote:
> On 17-06-01 04:45:58, Jan Beulich wrote:
>> >>> On 01.06.17 at 12:00, wrote:
>> > On 17-05-30 08:32:59, Jan Beulich wrote:
>> >> >>> On 03.05.17 at 10:44, wrote:
>> >> > ---
>>> On 02.06.17 at 09:59, wrote:
> On 17-05-31 03:44:31, Jan Beulich wrote:
>> >>> On 03.05.17 at 10:44, wrote:
>> > @@ -765,7 +777,8 @@ static int insert_val_into_array(uint32_t val[],
>> >
>> > /* Value setting position is same as
>>> On 05.06.17 at 15:06, wrote:
> On 01/06/17 13:11, Jan Beulich wrote:
>> Commit aac1df3d03 ("x86/HVM: introduce hvm_get_cpl() and respective
>> hook") went too far in one aspect: When emulating a task switch we
>> really shouldn't be looking at what hvm_get_cpl()
flight 110019 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110019/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 6 xen-boot fail REGR. vs. 107358
>>> On 02.06.17 at 12:57, wrote:
> And in this case, dom0 also prints:
>
> [ 49.155606] pciback :00:14.0: Driver tried to write to a
> read-only configuration space field at offset 0x82, size 2. This may be
> harmless, but if you have problems with
>>> On 05.06.17 at 14:08, wrote:
> On 05/06/17 11:55, George Dunlap wrote:
>> On Fri, Jun 2, 2017 at 10:58 AM, Roger Pau Monné
>> wrote:
>>> On Fri, Jun 02, 2017 at 11:33:50AM +0200, Marek Marczykowski-Górecki wrote:
Hi,
Is there
On 17-06-06 01:48:13, Jan Beulich wrote:
> >>> On 02.06.17 at 09:59, wrote:
> > On 17-05-31 03:44:31, Jan Beulich wrote:
> >> >>> On 03.05.17 at 10:44, wrote:
> >> > @@ -765,7 +777,8 @@ static int insert_val_into_array(uint32_t val[],
> >> >
>>> On 31.05.17 at 09:14, wrote:
> There's no reason to burn 4 bits on page type when we only have 7 types
> (plus "none") at present. This requires changing one use of
> PGT_shared_page, which so far assumed that the type is both a power of
> 2 and the only type with the high
On 17-06-06 01:43:00, Jan Beulich wrote:
> >>> On 02.06.17 at 04:49, wrote:
> > On 17-06-01 04:45:58, Jan Beulich wrote:
> >> >>> On 01.06.17 at 12:00, wrote:
> >> > On 17-05-30 08:32:59, Jan Beulich wrote:
> >> >> >>> On 03.05.17 at 10:44,
>>> On 06.06.17 at 10:22, wrote:
> On 17-06-06 01:48:13, Jan Beulich wrote:
>> >>> On 02.06.17 at 09:59, wrote:
>> > On 17-05-31 03:44:31, Jan Beulich wrote:
>> >> >>> On 03.05.17 at 10:44, wrote:
>> >> > @@ -765,7
On Tue, 2017-06-06 at 02:03 -0600, Jan Beulich wrote:
> > > > On 05.06.17 at 10:41, wrote:
> >
> > --- a/arch/x86/include/asm/xen/hypercall.h
> > +++ b/arch/x86/include/asm/xen/hypercall.h
> > @@ -49,6 +49,7 @@
> > #include
> > #include
> > #include
> > +#include
An option is provided in libxl to enable/disable pl011 vuart while
creating a guest domain.
Libxl now suppots a generic vuart console and pl011 is a specific type.
In future support can be added for multiple vuart of different types.
User can enable pl011 vuart by adding the following line in
This patch finally adds the support for vuart console.
Signed-off-by: Bhupinder Thakur
---
Changes since v3:
- The changes in xenconsole have been split into four patches. This is the
fourth patch.
- The vuart console support is added under CONFIG_VUART_CONSOLE
Xenconsole uses a domain structure which contains console specific fields. This
patch defines a new console structure, which would be used by the xenconsole
functions to perform console specific operations like reading/writing data
from/to
the console ring buffer or reading/writing data from/to
Add a new domctl API to initialize vpl011. It takes the GFN and console
backend domid as input and returns an event channel to be used for
sending and receiving events from Xen.
Xen will communicate with xenconsole using GFN as the ring buffer and
the event channel to transmit and receive pl011
This patch adds the support for multiple consoles and introduces the iterator
functions to operate on multiple consoles.
This patch is in preparation to support a new vuart console.
Signed-off-by: Bhupinder Thakur
---
Changes since v3:
- The changes in xenconsole
Add a new vuart console node to xenstore. This node is added at
/local/domain/$DOMID/vuart/0.
The node contains information such as the ring-ref, event channel,
buffer limit and type of console.
Xenconsole reads the node information to setup the ring buffer and
event channel for
Allocate a new gfn to be used as a ring buffer between xenconsole
and Xen for sending/receiving pl011 console data.
Signed-off-by: Bhupinder Thakur
---
Changes since v3:
- Added a new helper function xc_get_vuart_gfn() to return the GFN allocated for
vpl011.
-
Xenconsole functions take domain structure as input. These functions shall be
modified to take console structure as input since these functions typically
perform
console specific operations.
Also the console specific functions starting with prefix "domain_" shall be
modified
to "console_" to
On 06/06/17 08:06, Jan Beulich wrote:
On 02.06.17 at 22:33, wrote:
>> On 02/06/17 21:02, Andrew Cooper wrote:
>>> On 01/06/17 13:11, Jan Beulich wrote:
Reported-by: Andrew Cooper
Signed-off-by: Jan Beulich
>>> On 06.06.17 at 10:18, wrote:
> On 17-06-06 01:43:00, Jan Beulich wrote:
>> >>> On 02.06.17 at 04:49, wrote:
>> > On 17-06-01 04:45:58, Jan Beulich wrote:
>> >> >>> On 01.06.17 at 12:00, wrote:
>> >> > On 17-05-30
>>> On 06.06.17 at 10:13, wrote:
> On 17-06-06 01:45:11, Jan Beulich wrote:
>> >>> On 02.06.17 at 09:26, wrote:
>> > On 17-05-31 03:37:48, Jan Beulich wrote:
>> >> >>> On 03.05.17 at 10:44, wrote:
>> >> > +/*
>>> On 06.06.17 at 12:41, wrote:
> [root@dom0 ~]# lspci -s 00:14.0 -vvv
> 00:14.0 USB controller: Intel Corporation Wildcat Point-LP USB xHCI
> Controller (rev 03) (prog-if 30 [XHCI])
> Subsystem: Intel Corporation Device 7270
> Control: I/O- Mem+
A HVM domian booting generates around 200K (evtchn:qemu-dm xen-dyn)
interrupts,in a short period of time. All these evtchn:qemu-dm are bound
to VCPU 0, until irqbalance sees these IRQ and moves it to a different VCPU.
In one configuration, irqbalance runs every 10 seconds, which means
irqbalance
Hi Andre,
On 06/06/17 11:19, Andre Przywara wrote:
Sorry, I forgot to send a reply on Friday.
So I am not convinced that a *potential* debug output justifies breaking
the abstraction here. The host LPI is of no concern for the guest side
of the emulation code. If someone is in dire need for
Ian Jackson writes ("Re: Nested virt broken in Linux 4.9 (was Re: [OSSTEST
PATCH 2/3] ap-common: Switch to Linux 4.9 by default [and 1 more messages])"):
> But osstest does not want to update its linux-4.9 branch to include
> those x86 nested fixes, because doing so would introduce an ARM
>
flight 110035 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110035/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
test-amd64-amd64-libvirt 12
Hi Thomas,
there is a problem booting recent kernels on some Xen domUs hosted by
provider JiffyBox.
The kernel seems to crash just after logging
[0.038700] SMP alternatives: switching to SMP code
We started seeing this with 4.9.2 and bisecting the 4.9 stable
>>> On 06.06.17 at 16:00, wrote:
> Looking at the serial logs for that and comparing them with 10009,
> it's not terribly easy to see what's going on because the kernel
> versions are different and so produce different messages about xenbr0
> (and I think may have a
On 26/05/17 21:01, Stefano Stabellini wrote:
> On Fri, 26 May 2017, Juergen Gross wrote:
>> On 26/05/17 18:19, Ian Jackson wrote:
>>> Juergen Gross writes ("HVM guest performance regression"):
Looking for the reason of a performance regression of HVM guests under
Xen 4.7 against 4.5 I
Jan Beulich writes ("Re: [Xen-devel] [xen-unstable test] 110009: regressions -
FAIL"):
> So finally we have some output from the debugging code added by
> 933f966bcd ("x86/mm: add temporary debugging code to
> get_page_from_gfn_p2m()"), i.e. the migration heisenbug we hope
> to hunt down:
>
>
>>> On 06.06.17 at 15:20, wrote:
> So actually it looks like reboot might have been going on, which also
> explains why the guest was booting as domain 9 while domain 7 was having
> problems during migrate.
Hmm, so far I was assuming the guest reboot to have been a
I've been having fun setting up a new test rig...
I have a skull canyon NUC and I put debian stretch (rc4) on it (so that's a 4.9
kernel) and then tried building and installing the latest Xen staging-4.9 code.
The system failed to boot... basically it got stuck before even managing to get
Hello,
On Mon, May 29, 2017 at 08:38:33AM -0600, Jan Beulich wrote:
> >>> On 18.05.17 at 17:07, wrote:
> > --- a/xen/arch/x86/mm/mem_access.c
> > +++ b/xen/arch/x86/mm/mem_access.c
> > @@ -466,6 +466,54 @@ int p2m_get_mem_access(struct domain *d, gfn_t gfn,
> >
>>> On 06.06.17 at 15:00, wrote:
> On Mon, May 29, 2017 at 08:38:33AM -0600, Jan Beulich wrote:
>> >>> On 18.05.17 at 17:07, wrote:
>> > +
>> > +if ( !cpu_has_vmx )
>> > +return -EOPNOTSUPP;
>>
>> Is this enough? Wouldn't it be better to
This run is configured for baseline tests only.
flight 71516 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71516/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
build-amd64-libvirt 5 libvirt-build
>>> On 01.06.17 at 16:51, wrote:
> CONFIG_X86_GOOD_APIC is unconditionally selected for 64bit builds. Drop the
> related infrastructure including apic_{read,write}_around(), the former of
> which had no effect, and the latter which was an alias of apic_write().
>
> No
flight 110025 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110025/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-pvops 4 host-build-prep fail REGR. vs. 109994
>>> On 06.06.17 at 16:32, wrote:
> I've been having fun setting up a new test rig...
>
> I have a skull canyon NUC and I put debian stretch (rc4) on it (so that's a
> 4.9 kernel) and then tried building and installing the latest Xen staging-4.9
> code. The system
>>> On 02.06.17 at 22:07, wrote:
> Add name=value parsing options for com1 and com2 to add flexibility
> in setting register values for MMIO UART devices.
>
> Maintain backward compatibility with previous positional parameter
> specfications.
>
> eg.
>>> On 01.06.17 at 18:00, wrote:
> From the context calling pi_desc_init(), we can conclude the current
> implementation of VT-d PI depends on CPU-side PI. If we disable APICv
> but enable VT-d PI explicitly in xen boot command line, we would get
> an assertion failure.
>
>
>>> On 31.05.17 at 09:19, wrote:
> 1: sanitize DOMCTL_gethvmcontext_partial handling
> 2: clean up hvm_save_one()
>
> Signed-off-by: Jan Beulich
>
>
> ___
> Xen-devel mailing list
> Xen-devel@lists.xen.org
>
>>> On 29.05.17 at 14:37, wrote:
> hap_teardown() unconditionally releases the paging lock and is always
> being called without the lock held: Lock acquire should then be
> unconditional too.
>
> Signed-off-by: Jan Beulich
> ---
> While this is only a
Hi Ian,
On 06/06/17 12:16, Ian Jackson wrote:
Ian Jackson writes ("Re: Nested virt broken in Linux 4.9 (was Re: [OSSTEST PATCH
2/3] ap-common: Switch to Linux 4.9 by default [and 1 more messages])"):
But osstest does not want to update its linux-4.9 branch to include
those x86 nested fixes,
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 06 June 2017 16:11
> To: Paul Durrant
> Cc: xen-devel (xen-de...@lists.xenproject.org) de...@lists.xenproject.org>
> Subject: Re: [Xen-devel] debian stretch dom0 + xen 4.9 fails to boot
>
Hi Stefano,
On 23/05/17 19:26, Stefano Stabellini wrote:
On Tue, 23 May 2017, Julien Grall wrote:
Both helpers access_ok and array_access_ok are not used on ARM. Remove
them.
Signed-off-by: Julien Grall
Reviewed-by: Stefano Stabellini
I
Hi George,
On 05/06/17 12:03, George Dunlap wrote:
Forgot to cc' the release manager.
On Mon, Jun 5, 2017 at 11:02 AM, George Dunlap wrote:
iptables has a system-wide lock on the xtables. Strangely though, in
the case of two concurrent invocations, the default is
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Paul Durrant
> Sent: 06 June 2017 16:52
> To: 'Jan Beulich'
> Cc: xen-devel (xen-de...@lists.xenproject.org) de...@lists.xenproject.org>
> Subject: Re: [Xen-devel] debian
>>> On 06.06.17 at 18:32, wrote:
> On 26/05/17 12:14, Punit Agrawal wrote:
> It looks like this patch series has been fully acked. Can someone apply it?
Well, for a series mostly affecting ARM I was expecting Stefano to
do so.
Jan
Xenconsole functions take domain structure as input. These functions shall be
modified to take console structure as input since these functions typically
perform
console specific operations.
Also the console specific functions starting with prefix "domain_" shall be
modified
to "console_" to
Add a new vuart console node to xenstore. This node is added at
/local/domain/$DOMID/vuart/0.
The node contains information such as the ring-ref, event channel,
buffer limit and type of console.
Xenconsole reads the node information to setup the ring buffer and
event channel for
PL011 emulation for guests in Xen
===
Linaro has published VM System specification for ARM Processors, which
provides a set of guidelines for both guest OS and hypervisor implementations,
such that building OS images according to these guidelines guarantees
that
Allocate a new gfn to be used as a ring buffer between xenconsole
and Xen for sending/receiving pl011 console data.
Signed-off-by: Bhupinder Thakur
---
CC: ij
CC: wl
CC: ss
CC: jg
Changes since v3:
- Added a new helper function xc_get_vuart_gfn() to return the GFN
Add a new domctl API to initialize vpl011. It takes the GFN and console
backend domid as input and returns an event channel to be used for
sending and receiving events from Xen.
Xen will communicate with xenconsole using GFN as the ring buffer and
the event channel to transmit and receive pl011
This patch adds the support for multiple consoles and introduces the iterator
functions to operate on multiple consoles.
This patch is in preparation to support a new vuart console.
Signed-off-by: Bhupinder Thakur
---
CC: ij
CC: wl
CC: ss
CC: jg
Changes since v3:
-
Add a new console type VUART to connect to guest's emualated vuart
console.
Signed-off-by: Bhupinder Thakur
---
CC: ij
CC: wl
CC: ss
CC: jg
Changes since v3:
- The vuart console support is under CONFIG_VUART_CONSOLE option.
- Since there is a change from last
The SBSA uart node format is as specified in
Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
ARM SBSA defined generic UART
--
This UART uses a subset of the PL011 registers and consequently lives
in the PL011 driver. It's baudrate and other
1. Update documentation for a new vuart option added.
2. Update documentation about SPI irq reserved for vpl011.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: ij
CC: wl
CC: ss
flight 110032 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110032/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qcow210 guest-start fail REGR. vs. 109975
On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> Add emulation code to emulate read/write access to pl011 registers
> and pl011 interrupts:
>
> - Emulate DR read/write by reading and writing from/to the IN
> and OUT ring buffers and raising an event to the backend when
> there is
On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> An option is provided in libxl to enable/disable pl011 vuart while
> creating a guest domain.
>
> Libxl now suppots a generic vuart console and pl011 is a specific type.
> In future support can be added for multiple vuart of different types.
>
> User
On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> Allocate a new gfn to be used as a ring buffer between xenconsole
> and Xen for sending/receiving pl011 console data.
>
> Signed-off-by: Bhupinder Thakur
> ---
> CC: ij
> CC: wl
> CC: ss
> CC: jg
>
> Changes since v3:
>
On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> This patch adds the support for multiple consoles and introduces the iterator
> functions to operate on multiple consoles.
>
> This patch is in preparation to support a new vuart console.
>
> Signed-off-by: Bhupinder Thakur
On 17-06-06 02:38:27, Jan Beulich wrote:
> >>> On 06.06.17 at 10:13, wrote:
> > On 17-06-06 01:45:11, Jan Beulich wrote:
> >> >>> On 02.06.17 at 09:26, wrote:
> >> > On 17-05-31 03:37:48, Jan Beulich wrote:
> >> >> >>> On 03.05.17 at 10:44,
flight 110044 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110044/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-xsm 3 host-install(3)broken REGR. vs. 110008
Hi Stefano,
Thanks for your comments.
>> diff --git a/tools/console/daemon/io.c b/tools/console/daemon/io.c
>> index c5dd08d..db73e10 100644
>> --- a/tools/console/daemon/io.c
>> +++ b/tools/console/daemon/io.c
>> @@ -90,12 +90,15 @@ struct buffer {
>> };
>>
>> struct console {
>> + char
On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> Add a new domctl API to initialize vpl011. It takes the GFN and console
> backend domid as input and returns an event channel to be used for
> sending and receiving events from Xen.
>
> Xen will communicate with xenconsole using GFN as the ring buffer
On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> Add a new vuart console node to xenstore. This node is added at
>
> /local/domain/$DOMID/vuart/0.
>
> The node contains information such as the ring-ref, event channel,
> buffer limit and type of console.
>
> Xenconsole reads the node information to
On Tue, 6 Jun 2017, Bhupinder Thakur wrote:
> Add a new console type VUART to connect to guest's emualated vuart
> console.
>
> Signed-off-by: Bhupinder Thakur
> ---
> CC: ij
> CC: wl
> CC: ss
> CC: jg
>
> Changes since v3:
> - The vuart console support is under
flight 110052 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110052/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64 5 xen-buildfail REGR. vs. 110043
Tests which
On 06/06/2017 09:39 AM, Max Vozeler wrote:
Hi Thomas,
there is a problem booting recent kernels on some Xen domUs hosted by
provider JiffyBox.
The kernel seems to crash just after logging
[0.038700] SMP alternatives: switching to SMP code
Do you have the crash splat? Stack trace and
>>> On 01.06.17 at 19:57, wrote:
> Hi,
>
> On 26/05/17 07:02, Jan Beulich wrote:
> On 25.05.17 at 20:00, wrote:
>>> On 05/25/2017 01:46 PM, Julien Grall wrote:
On 25/05/17 18:08, Boris Ostrovsky wrote:
> Is this:
>
>
>>> On 05.06.17 at 18:55, wrote:
> flight 110009 xen-unstable real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/110009/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
>
PL011 emulation for guests in Xen
===
Linaro has published VM System specification for ARM Processors, which
provides a set of guidelines for both guest OS and hypervisor implementations,
such that building OS images according to these guidelines guarantees
that
Hi Bhupinder,
Your patch series is not correctly threaded, every patches came in its
own thread. Can you please resend a new version correctly threaded?
Cheers,
On 06/06/17 11:01, Bhupinder Thakur wrote:
PL011 emulation for guests in Xen
===
Linaro has
On 06/06/17 07:42, Jan Beulich wrote:
On 05.06.17 at 15:06, wrote:
>> On 01/06/17 13:11, Jan Beulich wrote:
>>> Commit aac1df3d03 ("x86/HVM: introduce hvm_get_cpl() and respective
>>> hook") went too far in one aspect: When emulating a task switch we
>>> really
On 17-06-06 02:43:42, Jan Beulich wrote:
> >>> On 06.06.17 at 10:22, wrote:
> > On 17-06-06 01:48:13, Jan Beulich wrote:
> >> >>> On 02.06.17 at 09:59, wrote:
> >> > On 17-05-31 03:44:31, Jan Beulich wrote:
> >> >> >>> On 03.05.17 at 10:44,
On Tue, Jun 06, 2017 at 02:37:01AM -0600, Jan Beulich wrote:
> >>> On 02.06.17 at 12:57, wrote:
> > And in this case, dom0 also prints:
> >
> > [ 49.155606] pciback :00:14.0: Driver tried to write to a
> > read-only configuration space field at offset
>>> On 06.06.17 at 12:43, wrote:
> Ok, I should think more. :)
>
> Then, please check below solution.
>
> This case only happens in CDP mode that the input cbm_type corresponds to L3
> CAT but current feat_type is CDP. In all other modes, the input cbm_type
>
flight 110026 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/110026/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 13 saverestore-support-checkfail like 109962
test-armhf-armhf-libvirt-xsm 13
This patch redefines the vgic_reg* access functions to vreg_reg* functions.
These are generic functions, which will be used by the vgic emulation code
to access the vgic registers.
PL011 emulation code will also use vreg_reg* access functions.
Signed-off-by: Bhupinder Thakur
These functions are generic in nature and can be reused by other emulation
code in Xen. One recent example is pl011 emulation, which needs similar
functions to read/write the registers.
This patch moves the register access function definitions from vgic.h to
vreg.h.
Signed-off-by: Bhupinder
Add emulation code to emulate read/write access to pl011 registers
and pl011 interrupts:
- Emulate DR read/write by reading and writing from/to the IN
and OUT ring buffers and raising an event to the backend when
there is data in the OUT ring buffer and injecting an interrupt
The SBSA uart node format is as specified in
Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
ARM SBSA defined generic UART
--
This UART uses a subset of the PL011 registers and consequently lives
in the PL011 driver. It's baudrate and other
Add a new console type VUART to connect to guest's emualated vuart
console.
Signed-off-by: Bhupinder Thakur
---
Changes since v3:
- The vuart console support is under CONFIG_VUART_CONSOLE option.
- Since there is a change from last review, I have not included
1 - 100 of 149 matches
Mail list logo