flight 114793 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114793/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt-xsm 14 saverestore-support-checkfail like 114713
test-armhf-armhf-libvirt 14 saveresto
flight 114790 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114790/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-xtf-amd64-amd64-4 49 xtf/test-hvm64-lbr-tsx-vmentry fail in 114698 pass
in 114790
test-amd64-i386-libv
flight 114781 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114781/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken
build-armhf-pvops 5 host-build
flight 114766 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114766/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvopsbroken in 114676
build-armhf-
flight 114786 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114786/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i3866 xen-buildfail REGR. vs. 114507
build-i386-xsm
Hi,
Sorry for the formatting.
On 20 Oct 2017 19:06, "Stefano Stabellini" wrote:
CC'ing Julien
On Fri, 20 Oct 2017, Ian Jackson wrote:
> Stefano Stabellini writes ("Re: [Xen-devel] linux-arm-xen branch, commit
access, etc."):
> > On Fri, 20 Oct 2017, Konrad Rzeszutek Wilk wrote:
> > > 3. Use up
CC'ing Julien
On Fri, 20 Oct 2017, Ian Jackson wrote:
> Stefano Stabellini writes ("Re: [Xen-devel] linux-arm-xen branch, commit
> access, etc."):
> > On Fri, 20 Oct 2017, Konrad Rzeszutek Wilk wrote:
> > > 3. Use upstream released kernels. Follow them when they are released.
> >
> > I agree wit
> On Oct 20, 2017, at 5:20 PM, Ingo Molnar wrote:
>
>
> * Thomas Garnier wrote:
>
*/
- cmpq$.Lentry_SYSCALL_64_after_fastpath_call, (%rsp)
+ leaq.Lentry_SYSCALL_64_after_fastpath_call(%rip), %r11
+ cmpq%r11, (%rsp)
jne 1f
>
>>>
On 20/10/17 08:12, Jan Beulich wrote:
On 19.10.17 at 18:22, wrote:
>> DMA-ing to the stack is generally considered bad practice. In this case, if
>> a
>> timeout occurs because of a sluggish device which is processing the request,
>> the completion notification will corrupt the stack of a s
On 20.10.17 19:57, Tamas K Lengyel wrote:
Hello Tamas,
In previous discussion we considered only two variants: in XEN or outside
XEN. Stubdomain approach looks more secure, but I'm not sure that it is
true.
Such stubdomain will need access to all guests memory. If you managed to
gain control on
Stefano Stabellini writes ("Re: [Xen-devel] linux-arm-xen branch, commit
access, etc."):
> On Fri, 20 Oct 2017, Konrad Rzeszutek Wilk wrote:
> > 3. Use upstream released kernels. Follow them when they are released.
>
> I agree with Konrad. The reason why that branch is there is that
> initially w
On Fri, Oct 20, 2017 at 02:11:14PM +0100, Julien Grall wrote:
> Hi Volodymyr,
Hi Julien,
> On 17/10/17 16:59, Volodymyr Babchuk wrote:
> >On Mon, Oct 16, 2017 at 01:00:21PM +0100, Julien Grall wrote:
> >>
> >>
> >>On 11/10/17 20:01, Volodymyr Babchuk wrote:
> >>>Hello all,
> >>
> >>Hi Volodymyr,
>
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
Cc: Julien Grall
The risk for this is zero, hence the for-4.10 tag.
---
scripts/build-test.sh | 40 +
On 10/20/2017 07:39 PM, Wei Liu wrote:
> On Fri, Oct 20, 2017 at 07:32:50PM +0300, Razvan Cojocaru wrote:
>> On 10/20/2017 07:15 PM, Wei Liu wrote:
>>> On Mon, Oct 16, 2017 at 08:07:41PM +0300, Petre Pircalabu wrote:
From: Razvan Cojocaru
For the default EPT view we have xc_set_mem_
On Fri, 20 Oct 2017, Konrad Rzeszutek Wilk wrote:
> On Fri, Oct 20, 2017 at 03:34:40PM +0100, Ian Jackson wrote:
> > Currently we are running our ARM tests in osstest off a branch in
> > Stefano's personal Linux tree. This is a bit unsatisfactory.
> >
> > We would like to switch to a branch that
On Fri, Oct 20, 2017 at 05:30:41PM +0100, Wei Liu wrote:
> The coverage support in hypervisor is redone. Update the document.
>
> Signed-off-by: Wei Liu
Adding Julien, although I'm not sure if doc changes also need a
release-ack.
Reviewed-by: Roger Pau Monné
Thanks!
_
>> In previous discussion we considered only two variants: in XEN or outside
>> XEN. Stubdomain approach looks more secure, but I'm not sure that it is
>> true.
>> Such stubdomain will need access to all guests memory. If you managed to
>> gain control on mediator stubdomain, you can do anything yo
Wei Liu writes ("[PATCH for-4.10] docs: update coverage.markdown"):
> The coverage support in hypervisor is redone. Update the document.
Acked-by: Ian Jackson
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
On Fri, Oct 20, 2017 at 07:32:50PM +0300, Razvan Cojocaru wrote:
> On 10/20/2017 07:15 PM, Wei Liu wrote:
> > On Mon, Oct 16, 2017 at 08:07:41PM +0300, Petre Pircalabu wrote:
> >> From: Razvan Cojocaru
> >>
> >> For the default EPT view we have xc_set_mem_access_multi(), which
> >> is able to set
On Fri, Oct 20, 2017 at 07:32:50PM +0300, Razvan Cojocaru wrote:
> On 10/20/2017 07:15 PM, Wei Liu wrote:
> > On Mon, Oct 16, 2017 at 08:07:41PM +0300, Petre Pircalabu wrote:
> >> From: Razvan Cojocaru
> >>
> >> For the default EPT view we have xc_set_mem_access_multi(), which
> >> is able to set
On 10/20/2017 07:15 PM, Wei Liu wrote:
> On Mon, Oct 16, 2017 at 08:07:41PM +0300, Petre Pircalabu wrote:
>> From: Razvan Cojocaru
>>
>> For the default EPT view we have xc_set_mem_access_multi(), which
>> is able to set an array of pages to an array of access rights with
>> a single hypercall. Ho
The coverage support in hypervisor is redone. Update the document.
Signed-off-by: Wei Liu
---
Cc: Andrew Cooper
Cc: George Dunlap
Cc: Ian Jackson
Cc: Jan Beulich
Cc: Konrad Rzeszutek Wilk
Cc: Stefano Stabellini
Cc: Tim Deegan
Cc: Wei Liu
Cc: roger@citrix.com
---
docs/misc/coverage.ma
> On Oct 20, 2017, at 5:20 PM, Ingo Molnar wrote:
>
>
> * Thomas Garnier wrote:
>
*/
- cmpq$.Lentry_SYSCALL_64_after_fastpath_call, (%rsp)
+ leaq.Lentry_SYSCALL_64_after_fastpath_call(%rip), %r11
+ cmpq%r11, (%rsp)
jne 1f
>
>>>
On Mon, Oct 16, 2017 at 05:29:38PM -0700, Kees Cook wrote:
> In preparation for unconditionally passing the struct timer_list pointer to
> all timer callbacks, switch to using the new timer_setup() and from_timer()
> to pass the timer pointer explicitly.
>
> Cc: Wei Liu
> Cc: Paul Durrant
> Cc:
On Mon, Oct 16, 2017 at 08:07:41PM +0300, Petre Pircalabu wrote:
> From: Razvan Cojocaru
>
> For the default EPT view we have xc_set_mem_access_multi(), which
> is able to set an array of pages to an array of access rights with
> a single hypercall. However, this functionality was lacking for the
On Fri, Oct 20, 2017 at 03:34:40PM +0100, Ian Jackson wrote:
> Currently we are running our ARM tests in osstest off a branch in
> Stefano's personal Linux tree. This is a bit unsatisfactory.
>
> We would like to switch to a branch that Julien can push to too, and
> that is in a more official pla
On Fri, Oct 20, 2017 at 03:01:30PM +0100, Andrew Cooper wrote:
> These are compile-time constants, and don't need to be read back from
> hardware.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.or
> -Original Message-
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
> Boris Ostrovsky
> Sent: 20 October 2017 16:09
> To: Paul Durrant ; x...@kernel.org; xen-
> de...@lists.xenproject.org; linux-ker...@vger.kernel.org
> Cc: Juergen Gross ; Thomas Gleixner
> ; Ingo M
>>> On 20.10.17 at 16:56, wrote:
> On 20/10/17 15:23, Jan Beulich wrote:
>> Their state may be important to figure the reason for a crash. To not
>> further grow duplicate code, break out a helper function.
>>
>> I realize that (ab)using the control register array here may not be
>> considered the
>>> On 19.10.17 at 17:06, wrote:
> Jan Beulich writes ("Re: [PATCH] libxc: don't fail domain creation when
> unpacking initrd fails"):
>> On 16.10.17 at 18:43, wrote:
>> > I'm afraid I still find the patch less clear than it could be.
>> > The new semantics of xc_dom_ramdisk_check_size are awkwa
On Fri, Oct 20, 2017 at 04:10:16PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct
> resume device"):
> > On Fri, Oct 20, 2017 at 02:42:53PM +0100, Ian Jackson wrote:
> > > Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct
We have decided:
We will push the anoint and examine parts of this series to osstest
pretest. (You're going to give me a suitable branch on Monday.)
This should work because we have anointed FreeBSD builds already.
If this works (passes pretest) we will then run a special invocation
of the
Hi,
On 20/10/17 15:51, osstest service owner wrote:
flight 114747 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114747/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 7 xen-boot
* Thomas Garnier wrote:
> >>*/
> >> - cmpq$.Lentry_SYSCALL_64_after_fastpath_call, (%rsp)
> >> + leaq.Lentry_SYSCALL_64_after_fastpath_call(%rip), %r11
> >> + cmpq%r11, (%rsp)
> >> jne 1f
> > This patch seems to add extra overhead to the syscall fast-pa
On 20/10/17 15:24, Jan Beulich wrote:
> They're being zeroed a few lines down when non-null selectors are being
> found in the respective registers.
>
> Signed-off-by: Jan Beulich
Given that this is within an cpu_has_fsgsbase conditional, there is a
moderate chance that the conditional is more ov
Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct resume
device"):
> On Fri, Oct 20, 2017 at 02:42:53PM +0100, Ian Jackson wrote:
> > Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct
> > resume device"):
> > I'm not sure what you mean here. We are usi
On 10/20/2017 04:35 AM, Paul Durrant wrote:
>> -Original Message-
>> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
>> Boris Ostrovsky
>> Sent: 19 October 2017 18:45
>> To: Paul Durrant ; x...@kernel.org; xen-
>> de...@lists.xenproject.org; linux-ker...@vger.kernel.or
Roger Pau Monne writes ("[PATCH v12 31/33] ts-examine-hostprops-save: introduce
a script to save properties"):
> This script turns the properties stored in the runvars using the
> format hostprop/$ident/$prop=$val into host properties stored in the
> database.
Acked-by: Ian Jackson
Although,
>
Roger Pau Monne writes ("[PATCH v12 33/33] sg-run-job: hook the memdisk test
into examine"):
> Hook the memdisk parameter detection and the saving of the host
> properties into the examine jobs.
>
> Signed-off-by: Roger Pau Monné
> ---
> Changes since v2:
> - Do not pass a host ident to ts-exam
On 20/10/17 15:23, Jan Beulich wrote:
> Their state may be important to figure the reason for a crash. To not
> further grow duplicate code, break out a helper function.
>
> I realize that (ab)using the control register array here may not be
> considered the nicest solution, but it seems easier (an
On Fri, Oct 20, 2017 at 02:42:53PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct
> resume device"):
> > On Fri, Oct 20, 2017 at 02:20:29PM +0100, Ian Jackson wrote:
> > > I don't think the guest booting "eventually" after some timeout is
> > >
flight 114747 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114747/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt 7 xen-boot fail REGR. vs. 114644
test-amd64-amd64-x
On 20/10/17 15:22, Jan Beulich wrote:
> load_segments() writes the two MSRs in their "canonical" positions
> (GS_BASE for the user base, SHADOW_GS_BASE for the kernel one) and uses
> SWAPGS to switch them around if the incoming vCPU is in kernel mode. In
> order to not leave a stale kernel address
On Fri, Oct 20, 2017 at 1:28 AM, Ard Biesheuvel
wrote:
> On 20 October 2017 at 09:24, Ingo Molnar wrote:
>>
>> * Thomas Garnier wrote:
>>
>>> Change the assembly code to use only relative references of symbols for the
>>> kernel to be PIE compatible.
>>>
>>> Position Independent Executable (PIE)
On Fri, Oct 20, 2017 at 1:26 AM, Ingo Molnar wrote:
>
> * Thomas Garnier wrote:
>
>> Change the assembly code to use only relative references of symbols for the
>> kernel to be PIE compatible.
>>
>> Position Independent Executable (PIE) support will allow to extended the
>> KASLR randomization ra
Hi Jim
I discovered that libvirt's native config file to xml converter for
libxl only pick up the first occurrence of an option.
For example in a xl cfg file:
extra = "abc"
...
extra = "def"
xl will pick up "def" because that shows up later and takes precedence,
while the converter picks up "ab
On 10/19/2017 09:31 PM, Stefano Stabellini wrote:
> On Tue, 17 Oct 2017, Boris Ostrovsky wrote:
>> On 10/06/2017 08:30 PM, Stefano Stabellini wrote:
>>> +int pvcalls_front_bind(struct socket *sock, struct sockaddr *addr, int
>>> addr_len)
>>> +{
>>> + struct pvcalls_bedata *bedata;
>>> + struc
Roger Pau Monne writes ("[PATCH v12 29/33] ts-freebsd-host-install: add
arguments to test memdisk append options"):
> This is needed in order to figure out which memdisk options should be
> used to boot the images on each specific box.
>
> Note that when passed the --recordappend argument upon su
>>> On 20.10.17 at 16:01, wrote:
> These are compile-time constants, and don't need to be read back from
> hardware.
>
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org
On 10/19/2017 09:41 PM, Stefano Stabellini wrote:
> On Tue, 17 Oct 2017, Boris Ostrovsky wrote:
>>> +static int __write_ring(struct pvcalls_data_intf *intf,
>>> + struct pvcalls_data *data,
>>> + struct iov_iter *msg_iter,
>>> + int len)
>>> +{
On 10/19/2017 09:38 PM, Stefano Stabellini wrote:
> On Tue, 17 Oct 2017, Boris Ostrovsky wrote:
>>> +
>>> +int pvcalls_front_recvmsg(struct socket *sock, struct msghdr *msg, size_t
>>> len,
>>> +int flags)
>>> +{
>>> + struct pvcalls_bedata *bedata;
>>> + int ret;
>>> + struc
Roger Pau Monne writes ("[PATCH v12 26/33] HostDB: introduce set_property"):
> And provide a helper in TestSupport to use it. This allows osstest to
> set host properties from test script themselves (instead of using
> the mg-hosts clu).
>
> Note that the setting of host properties is limited to f
Currently we are running our ARM tests in osstest off a branch in
Stefano's personal Linux tree. This is a bit unsatisfactory.
We would like to switch to a branch that Julien can push to too, and
that is in a more official place.
There are two options:
1. Create an ARM-specific Xen tree. Curr
2017-10-19 14:39+0100, Joao Martins:
> In the event of moving pvclock_pvti_cpu0_va() definition to common
> pvclock code, this function could return a value on non KVM guests.
> If user tried to load the module (or have it builtin) it would fail
> with a GPF on ptp_kvm_init when running on a Xen gu
They're being zeroed a few lines down when non-null selectors are being
found in the respective registers.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -1449,10 +1449,11 @@ static void save_segments(struct vcpu *v
if ( cpu_has_fsgsbase && !is_pv_32
Their state may be important to figure the reason for a crash. To not
further grow duplicate code, break out a helper function.
I realize that (ab)using the control register array here may not be
considered the nicest solution, but it seems easier (and less overall
overhead) to do so compared to t
load_segments() writes the two MSRs in their "canonical" positions
(GS_BASE for the user base, SHADOW_GS_BASE for the kernel one) and uses
SWAPGS to switch them around if the incoming vCPU is in kernel mode. In
order to not leave a stale kernel address in GS_BASE when the incoming
guest is in user
On 10/19/2017 09:26 PM, Stefano Stabellini wrote:
> On Tue, 17 Oct 2017, Boris Ostrovsky wrote:
>> On 10/06/2017 08:30 PM, Stefano Stabellini wrote:
>> with one question:
>>
>>> + /*
>>> +* PVCalls only supports domain AF_INET,
>>> +* type SOCK_STREAM and protocol 0 sockets for now.
>>>
On 10/20/2017 01:37 AM, Dongli Zhang wrote:
> Hi Boris,
>
> - boris.ostrov...@oracle.com wrote:
>
>> On 10/19/2017 04:02 AM, Dongli Zhang wrote:
>>> After guest live migration on xen, steal time in /proc/stat
>>> (cpustat[CPUTIME_STEAL]) might decrease because steal returned by
>>> xen_steal_lo
>>> On 20.10.17 at 12:08, wrote:
> On Fri, Oct 20, 2017 at 01:54:15PM +0800, Chao Gao wrote:
>> On Thu, Oct 19, 2017 at 05:31:37PM +0100, Roger Pau Monné wrote:
>> >On Thu, Sep 21, 2017 at 11:02:07PM -0400, Lan Tianyu wrote:
>> >> +static int vvtd_alloc_frcd(struct vvtd *vvtd)
>> >> +{
>> >> +
>>> On 20.10.17 at 15:23, wrote:
> On 20/10/17 12:42, Jan Beulich wrote:
> On 20.10.17 at 02:35, wrote:
>>> pt_update_irq() is expected to return the vector number of periodic
>>> timer interrupt, which should be set in vIRR of vlapic or in PIR.
>>> Otherwise it would trigger the assertion in
1: fix GS-base-dirty determination
2: also show FS/GS base addresses when dumping registers
3: avoid FS/GS base reads
Patch 1 is a bug fix which should be strongly considered for 4.10.
Patch 2 has proven helpful in analyzing the original problem, so
would be nice to have upstream rather sooner tha
These are compile-time constants, and don't need to be read back from
hardware.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Jun Nakajima
CC: Kevin Tian
---
xen/arch/x86/hvm/vmx/vmcs.c | 8 ++--
1 file changed, 2 insertions(+), 6 deletions(-)
diff --git a/xen/arch/x8
This script turns the properties stored in the runvars using the
format hostprop/$ident/$prop=$val into host properties stored in the
database.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
- Call selecthost based on the idents passed in the putative
hostprops runvar.
- Fix commit mes
Hello,
These are the remainig (not acked) patches of the FreeBSD host install
series.
The full branch can be found at:
git://xenbits.xen.org/people/royger/osstest.git freebsd_v12
Note that before attempting to run a FreeBSD flight an examine flight
with blessing real must be executed, so that t
And provide a helper in TestSupport to use it. This allows osstest to
set host properties from test script themselves (instead of using
the mg-hosts clu).
Note that the setting of host properties is limited to flights with
intended blessing real, and it will fail for any other blessing.
Signed-of
This is needed in order to figure out which memdisk options should be
used to boot the images on each specific box.
Note that when passed the --recordappend argument upon success the
script stores the tentative host property in the runvars.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
-
Hook the memdisk parameter detection and the saving of the host
properties into the examine jobs.
Signed-off-by: Roger Pau Monné
---
Changes since v2:
- Do not pass a host ident to ts-examine-hostprops-save.
- Use .- for ts-memdisk-try-append so that the rest of the job will
run even if this
Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct resume
device"):
> On Fri, Oct 20, 2017 at 02:20:29PM +0100, Ian Jackson wrote:
> > I don't think the guest booting "eventually" after some timeout is
> > correct.
>
> The OS is honoring whatever is written in the resume file
From: Anthony PERARD
Xen libraries in 4.10 include a new xentoolcore library. This
contains the xentoolcore_restrict_all function which we are about to
want to use.
Signed-off-by: Ian Jackson
---
v5: More truthful commit message.
---
configure | 8 +---
1 file changed, 5 insertions(+), 3
We need to restrict *all* the control fds that qemu opens. Looking in
/proc/PID/fd shows there are many; their allocation seems scattered
throughout Xen support code in qemu.
We must postpone the restrict call until roughly the same time as qemu
changes its uid, chroots (if applicable), and so on
We are going to want to use the dummy xendevicemodel_handle type in
new stub functions in the CONFIG_XEN_CTRL_INTERFACE_VERSION < 41000
section. So we need to provide that definition, or (as applicable)
include the appropriate header, earlier in the file.
(Ideally the newer compatibility layers w
We are going to want to reuse this.
No functional change.
Signed-off-by: Ian Jackson
Reviewed-by: Anthony PERARD
---
hw/i386/xen/xen-hvm.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/hw/i386/xen/xen-hvm.c b/hw/i386/xen/xen-hvm.c
index 7b60ec6..83420cd 100644
--- a/
This makes it much easier to find a particular thing in config.log.
The information may be lacking in other shells, resulting in harmless
empty output. (This is why we don't use the proper ${FUNCNAME[*]}
array syntax - other shells will choke on that.)
The extra output is only printed if configu
And insist that it works.
Drop individual use of xendevicemodel_restrict and
xenforeignmemory_restrict. These are not actually effective in this
version of qemu, because qemu has a large number of fds open onto
various Xen control devices.
The restriction arrangements are still not right, becaus
xc_interface_open etc. is not going to work if we have dropped
privilege, but xendevicemodel_shutdown will if everything is new
enough.
xendevicemodel_shutdown is only availabe in Xen 4.10 and later, so
provide a stub for earlier versions.
Signed-off-by: Ian Jackson
Reviewed-by: Anthony PERARD
This allows the caller to specify a uid and gid to use, even if there
is no corresponding password entry. This will be useful in certain
Xen configurations.
We don't support just -runas because: (i) deprivileging without
calling setgroups would be ineffective (ii) given only a uid we don't
know
Anthony PERARD writes ("Re: [PATCH v5 0/8] xen: xen-domid-restrict
improvements"):
> The patches in this v5 appear to be the same the one from the patch
> series v4.
Erk, so they are.
I'll post a v5.1 in reply to this email.
Ian.
___
Xen-devel mailin
On Fri, Oct 20, 2017 at 02:20:29PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct
> resume device"):
> > I wouldn't call this behaviour a bug. Most people won't notice it
> > because the guest will boot eventually. It is not like this will caus
On 10/20/2017 02:14 AM, Jan Beulich wrote:
On 19.10.17 at 19:36, wrote:
On 10/19/2017 07:58 AM, Jan Beulich wrote:
On 19.10.17 at 04:36, wrote:
--- a/xen/include/xsm/dummy.h
+++ b/xen/include/xsm/dummy.h
@@ -516,7 +516,8 @@ static XSM_INLINE int
xsm_remove_from_physmap(XSM_DEFAULT_ARG struc
Hi Ian,
The patches in this v5 appear to be the same the one from the patch
series v4.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi Jan,
On 20/10/17 12:42, Jan Beulich wrote:
On 20.10.17 at 02:35, wrote:
pt_update_irq() is expected to return the vector number of periodic
timer interrupt, which should be set in vIRR of vlapic or in PIR.
Otherwise it would trigger the assertion in vmx_intr_assist(), please
seeing
https://
flight 114800 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/114800/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct resume
device"):
> I wouldn't call this behaviour a bug. Most people won't notice it
> because the guest will boot eventually. It is not like this will cause
> the guest to crash.
I don't think the guest booting "eventually"
On Fri, Oct 20, 2017 at 01:35:41PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct
> resume device"):
> > On Fri, Oct 20, 2017 at 12:05:55PM +0100, Ian Jackson wrote:
> > > Wei Liu writes ("[OSSTEST PATCH 11/16] ts-debian-fixup: use correct
> >
Hi Volodymyr,
On 17/10/17 16:59, Volodymyr Babchuk wrote:
On Mon, Oct 16, 2017 at 01:00:21PM +0100, Julien Grall wrote:
On 11/10/17 20:01, Volodymyr Babchuk wrote:
Hello all,
Hi Volodymyr,
Hi Julien
I want to present TEE mediator, that was discussed earlier ([1]).
I selected design w
On Fri, Oct 20, 2017 at 01:52:50PM +0100, Ian Jackson wrote:
> Wei Liu writes ("Re: [OSSTEST PATCH 10/16] ts-debian-fixup: remove extra=
> before appending our own"):
> > On Fri, Oct 20, 2017 at 12:03:24PM +0100, Ian Jackson wrote:
> > > Wei Liu writes ("[OSSTEST PATCH 10/16] ts-debian-fixup: remo
On 10/19/2017 08:55 PM, Zhongze Liu wrote:
2017-10-20 8:34 GMT+08:00 Zhongze Liu :
Hi Daniel,
2017-10-20 1:36 GMT+08:00 Daniel De Graaf :
On 10/18/2017 10:36 PM, Zhongze Liu wrote:
The original dummy xsm_map_gmfn_foregin checks if source domain has the
proper
privileges over the target domai
Wei Liu writes ("Re: [OSSTEST PATCH 10/16] ts-debian-fixup: remove extra=
before appending our own"):
> On Fri, Oct 20, 2017 at 12:03:24PM +0100, Ian Jackson wrote:
> > Wei Liu writes ("[OSSTEST PATCH 10/16] ts-debian-fixup: remove extra=
> > before appending our own"):
> > > The original extra=
Wei Liu writes ("Re: [OSSTEST PATCH 11/16] ts-debian-fixup: use correct resume
device"):
> On Fri, Oct 20, 2017 at 12:05:55PM +0100, Ian Jackson wrote:
> > Wei Liu writes ("[OSSTEST PATCH 11/16] ts-debian-fixup: use correct resume
> > device"):
> > > See code comment for explanation.
> > ...
> >
>>> On 20.10.17 at 02:35, wrote:
> pt_update_irq() is expected to return the vector number of periodic
> timer interrupt, which should be set in vIRR of vlapic or in PIR.
> Otherwise it would trigger the assertion in vmx_intr_assist(), please
> seeing
> https://lists.xenproject.org/archives/html/
This run is configured for baseline tests only.
flight 72333 xen-4.8-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72333/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-livepatch5 host-ping-ch
On Fri, Oct 20, 2017 at 11:50:11AM +0100, Ian Jackson wrote:
> Wei Liu writes ("[OSSTEST PATCH 03/16] ts-xen-build-prep: don't install
> w3c-dtd-xhtml for Stretch onward"):
> > It is not included in Stretch.
> >
> > That package was installed because libvirt build needed it. However
> > libvirt b
On Thu, Sep 21, 2017 at 11:01:41PM -0400, Lan Tianyu wrote:
> Change since v2:
>1) Remove vIOMMU hypercall of query capabilities and introduce when
> necessary.
>2) Remove length field of vIOMMU create parameter of vIOMMU hypercall
>3) Introduce irq remapping mode callback
On Fri, Oct 20, 2017 at 12:24:43PM +0100, Wei Liu wrote:
> On Fri, Oct 20, 2017 at 12:09:35PM +0100, Ian Jackson wrote:
> > Wei Liu writes ("[OSSTEST PATCH 16/16] ts-guests-nbd-mirror: make it work
> > with stretch"):
> > > On the server side, only add oldstyle= and port= on jessie. Stretch
> > >
On Thu, Sep 21, 2017 at 11:02:10PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Provide a save-restore pair to save/restore registers and non-register
> status.
>
> Signed-off-by: Chao Gao
> Signed-off-by: Lan Tianyu
> ---
> v3:
> - use one entry to save both vvtd registers and other interme
On Fri, Oct 20, 2017 at 12:09:35PM +0100, Ian Jackson wrote:
> Wei Liu writes ("[OSSTEST PATCH 16/16] ts-guests-nbd-mirror: make it work
> with stretch"):
> > On the server side, only add oldstyle= and port= on jessie. Stretch
> > doesn't support or need those anymore.
>
> See my earlier comments
On Thu, Sep 21, 2017 at 11:02:09PM -0400, Lan Tianyu wrote:
> From: Chao Gao
>
> Queued Invalidation Interface is an expanded invalidation interface with
> extended capabilities. Hardware implementations report support for queued
> invalidation interface through the Extended Capability Register.
On Fri, Oct 20, 2017 at 11:54:44AM +0100, Ian Jackson wrote:
> Wei Liu writes ("[OSSTEST PATCH 01/16] XXX add a stretch config based on
> production-config"):
> > diff -ub production-config production-config-stretch
>
> The changes LGTM but obviously this ought to go straight into
> `production-c
On Fri, Oct 20, 2017 at 12:03:24PM +0100, Ian Jackson wrote:
> Wei Liu writes ("[OSSTEST PATCH 10/16] ts-debian-fixup: remove extra= before
> appending our own"):
> > The original extra= was not removed, so there were two extra= in the
> > resulting config file.
>
> What is the original extra= ?
1 - 100 of 201 matches
Mail list logo