flight 150170 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150170/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 146182
build-i386-libvirt
flight 150164 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150164/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-armhf-armhf-xl-rtds16 guest-start/debian.repeat fail REGR. vs. 150150
Tests which did not succeed
Bonjour, Bertrand,
Thank you for your reply. I am a newbie to Xen but I’ve used Bhyve, Vmware and
MSFT Hyper-V before so I am somewhat familiar with how type-1 hypervisors work.
Still. 🤔
I've enclosed:
1. The script I used to try to set up Dom0. It’s basically the script I
found here
The systemd may be configured to mask ctrl-alt-del via "systemctl mask
ctrl-alt-del.target". As a result, the pv reboot would not work as signal
is ignored.
This patch always enables C_A_D before the call of ctrl_alt_del() in order
to force the reboot.
Reported-by: Rose Wang
Cc: Joe Jin
Cc: Bor
flight 150168 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150168/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
flight 150159 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150159/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 16 guest-localmigrate fail REGR. vs. 150148
Tests which did not succeed,
flight 150166 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150166/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Wed, 13 May 2020, Julien Grall wrote:
> On 13/05/2020 19:19, Julien Grall wrote:
> > Hi,
> >
> > On 13/05/2020 16:11, Stefano Stabellini wrote:
> > > On Wed, 13 May 2020, Julien Grall wrote:
> > > > Hi,
> > > >
> > > > On 13/05/2020 01:33, Stefano Stabellini wrote:
> > > > > I worked with Roma
On Wed, 13 May 2020, Julien Grall wrote:
> On 13/05/2020 16:11, Stefano Stabellini wrote:
> > On Wed, 13 May 2020, Julien Grall wrote:
> > > Hi,
> > >
> > > On 13/05/2020 01:33, Stefano Stabellini wrote:
> > > > I worked with Roman to do several more tests and here is an update on
> > > > the situ
On 13/05/2020 16:15, Jan Beulich wrote:
>>> But it would be really nice if we had a way to
>>> flag the need to play with the linker script. Hence perhaps
>>> on new enough tool chains we indeed may want to make use of
>>> --orphan-handling= ? And then discard just .note and .note.*
>>> here?
>> Th
On Wed, May 13, 2020 at 11:20 AM Julien Grall wrote:
>
> Hi,
>
> On 13/05/2020 16:11, Stefano Stabellini wrote:
> > On Wed, 13 May 2020, Julien Grall wrote:
> >> Hi,
> >>
> >> On 13/05/2020 01:33, Stefano Stabellini wrote:
> >>> I worked with Roman to do several more tests and here is an update on
On 13/05/2020 19:19, Julien Grall wrote:
Hi,
On 13/05/2020 16:11, Stefano Stabellini wrote:
On Wed, 13 May 2020, Julien Grall wrote:
Hi,
On 13/05/2020 01:33, Stefano Stabellini wrote:
I worked with Roman to do several more tests and here is an update on
the situation. We don't know why my pa
Hi,
On 13/05/2020 16:11, Stefano Stabellini wrote:
On Wed, 13 May 2020, Julien Grall wrote:
Hi,
On 13/05/2020 01:33, Stefano Stabellini wrote:
I worked with Roman to do several more tests and here is an update on
the situation. We don't know why my patch didn't work when Boris' patch
[1] work
flight 150163 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150163/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 6 xen-buildfail REGR. vs. 150162
Tests which
flight 150154 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150154/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-rtds 17 guest-saverestore.2 fail in 150150 pass in 150154
test-armhf-armhf-xl-rtds 12
Just wanted to give an update to this:
After considering recommendations at the previous community call, consulting
with Linux Foundation staff, and running it past the Advisory Board, it has
been decided to move the event to JULY 6-9.
Time zone still to be decided.
Thanks to everyone who gave
flight 150160 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150160/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf ceacd9e992cd12f3c07ae1a28a75a6b8750718aa
baseline version:
ovmf 88899a372cfc44f861231
flight 150162 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150162/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
> On May 13, 2020, at 3:18 PM, Nick Rosbrook wrote:
>
> Add a README and package comment giving a brief overview of the package.
> These also help pkg.go.dev generate better documentation.
>
> Also, add a copy of the LGPL (the same license used by libxl) to
> tools/golang/xenlight. This is re
From: Hongyan Xia
The macro version UNMAP_DOMAIN_PAGE() does both NULL checking and
variable clearing. Move NULL checking into the function itself so that
the semantics is consistent with other similar constructs like XFREE().
This also eases the use unmap_domain_page() in error handling paths,
w
> -Original Message-
> From: Jan Beulich
> Sent: 29 April 2020 16:04
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Paul Durrant ; Ian
> Jackson
> ; Wei Liu
> Subject: Re: [PATCH v2 3/5] tools/misc: add xen-domctx to present domain
> context
>
> On 07.04.2020 19:38, Paul Dur
On 11.05.2020 12:21, Roger Pau Monne wrote:
> Remove the eax and cstate local variables, the same can be directly
> fetched from acpi_processor_cx without any transformations.
>
> No functional change.
>
> Signed-off-by: Roger Pau Monné
Reviewed-by: Jan Beulich
First patch for the 4.15 folder
On 13.05.2020 17:00, Andrew Cooper wrote:
> On 13/05/2020 10:13, Jan Beulich wrote:
>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
>> unless you have verified the sender and know the content is safe.
>>
>> On 12.05.2020 21:11, Andrew Cooper wrote:
>>> @@ -47,6 +47,14
On Wed, 13 May 2020, Julien Grall wrote:
> Hi,
>
> On 13/05/2020 01:33, Stefano Stabellini wrote:
> > I worked with Roman to do several more tests and here is an update on
> > the situation. We don't know why my patch didn't work when Boris' patch
> > [1] worked. Both of them should have worked t
> -Original Message-
> From: Jan Beulich
> Sent: 29 April 2020 15:51
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Paul Durrant ;
> Daniel De Graaf
> ; Ian Jackson ; Wei Liu
> ; Andrew Cooper
> ; George Dunlap ; Julien
> Grall ;
> Stefano Stabellini
> Subject: Re: [PATCH v2
On 13/05/2020 10:13, Jan Beulich wrote:
> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
> unless you have verified the sender and know the content is safe.
>
> On 12.05.2020 21:11, Andrew Cooper wrote:
>> @@ -47,6 +47,14 @@ SECTIONS
>> *
>> * Please
On Wed, May 13, 2020 at 9:56 AM Andrew Cooper wrote:
>
> Xen doesn't support CET-IBT yet. At a minimum, logic is required to enable it
> for supervisor use, but the livepatch functionality needs to learn not to
> overwrite ENDBR64 instructions.
>
> Furthermore, Ubuntu enables -fcf-protection by d
On 13/05/2020 15:13, Jan Beulich wrote:
> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
> unless you have verified the sender and know the content is safe.
>
> On 13.05.2020 15:55, Andrew Cooper wrote:
>> Xen doesn't support CET-IBT yet. At a minimum, logic is required
On 12.05.2020 18:28, Andrew Cooper wrote:
> --- a/xen/arch/x86/guest/xen/hypercall_page.S
> +++ b/xen/arch/x86/guest/xen/hypercall_page.S
> @@ -8,7 +8,6 @@
> GLOBAL(hypercall_page)
> /* Poisoned with `ret` for safety before hypercalls are set up. */
> .fill PAGE_SIZE, 1, 0xc3
>
These patches setup an initial Go module for the xenlight package. The
go code is tracked again, since the module is defined in xen.git as
xenbits.xenproject.org/git-http/xen.git/tools/golang/xenlight. The final patch
adds a README and LICENSE to tools/golang/xenlight so that the package
will show
Add a README and package comment giving a brief overview of the package.
These also help pkg.go.dev generate better documentation.
Also, add a copy of the LGPL (the same license used by libxl) to
tools/golang/xenlight. This is required for the package to be shown
on pkg.go.dev and added to the def
Hello,
Jan Beulich, le mer. 13 mai 2020 16:11:00 +0200, a ecrit:
> On 13.05.2020 15:55, Andrew Cooper wrote:
> > Users of EMBEDDED_EXTRA_CFLAGS already use -fno-asynchronous-unwind-tables,
> > or
> > ought to.
>
> It's not really well defined what they're supposed to be used for
> (and where it'
On 13.05.2020 15:55, Andrew Cooper wrote:
> Xen doesn't support CET-IBT yet. At a minimum, logic is required to enable it
> for supervisor use, but the livepatch functionality needs to learn not to
> overwrite ENDBR64 instructions.
>
> Furthermore, Ubuntu enables -fcf-protection by default, along
On 13.05.2020 15:55, Andrew Cooper wrote:
> Users of EMBEDDED_EXTRA_CFLAGS already use -fno-asynchronous-unwind-tables, or
> ought to.
It's not really well defined what they're supposed to be used for
(and where it's not supposed to be used). I notice in particular
a use in stubdom/Makefile which
This supercedes "x86/build: Unilaterally disable -fcf-protection"
Andrew Cooper (2):
x86/build: move -fno-asynchronous-unwind-tables into EMBEDDED_EXTRA_CFLAGS
x86/build: Unilaterally disable -fcf-protection
Config.mk| 3 ++-
tools/tests/x86_emulator/testcase.mk |
Users of EMBEDDED_EXTRA_CFLAGS already use -fno-asynchronous-unwind-tables, or
ought to. This shrinks the size of the rombios 32bit stubs in guest memory.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Roger Pau Monné
CC: George Dunlap
CC: Ian Jackson
CC: Stefano Stabellin
Xen doesn't support CET-IBT yet. At a minimum, logic is required to enable it
for supervisor use, but the livepatch functionality needs to learn not to
overwrite ENDBR64 instructions.
Furthermore, Ubuntu enables -fcf-protection by default, along with a buggy
version of GCC-9 which objects to it i
On 08.05.2020 23:04, Andrew Cooper wrote:
> On 05/05/2020 09:20, Jan Beulich wrote:
>> If the hardware can handle accesses, we should allow it to do so. This
>> way we can expose EFRO to HVM guests,
>
> I'm reminded now of the conversation I'm sure we've had before, although
> I have a feeling it
The Documentation/DMA-API-HOWTO.txt states that the dma_map_sg() function
returns the number of the created entries in the DMA address space.
However the subsequent calls to the dma_sync_sg_for_{device,cpu}() and
dma_unmap_sg must be called with the original number of the entries
passed to the dma_
> OK, so didn’t notice this at first. It looks like you read the comments at
> the top of libxl.c, noticed the comment about “...the special exception on
> linking described in file LICENSE”, looked around for such a file, and found
> it in tools/ocaml, and copied that one?
>
> I had a chat wit
On 08.05.2020 21:31, Andrew Cooper wrote:
> On 05/05/2020 09:16, Jan Beulich wrote:
>> @@ -8125,6 +8154,47 @@ x86_emulate(
>> case X86EMUL_OPC(0x0f, 0xae): case X86EMUL_OPC_66(0x0f, 0xae): /* Grp15
>> */
>> switch ( modrm_reg & 7 )
>> {
>> +#if !defined(X86EMUL_NO_FPU) || !d
On Tue, Mar 03, 2020 at 06:23:26PM +, Andrew Cooper wrote:
> xc_cpuid_apply_policy() is gaining extra parameters to untangle CPUID
> complexity in Xen. While an improvement in general, it does have the
> unfortunate side effect of duplicating some settings across muliple
> parameters.
>
> Rea
> On May 13, 2020, at 1:58 AM, Nick Rosbrook wrote:
>
> Add a README and package comment giving a brief overview of the package.
> These also help pkg.go.dev generate better documentation.
>
> Also, add a copy of the LGPL (the same license used by libxl) to
> tools/golang/xenlight. This is requ
> One thing I forgot to mention about the README is the long lines — do you
> mind if I wrap those before checking it in?
I don't mind at all.
> > Also, add a copy of the LGPL (the same license used by libxl) to
> > tools/golang/xenlight. This is required for the package to be shown
> > on pkg.g
On 13/05/2020 13:15, Andrew Cooper wrote:
This prevents syntax highlighting from believing the rest of the file is a
string.
Signed-off-by: Andrew Cooper
Acked-by: Julien Grall
Cheers,
---
CC: George Dunlap
CC: Ian Jackson
CC: Jan Beulich
CC: Stefano Stabellini
CC: Wei Liu
CC: Jul
This prevents syntax highlighting from believing the rest of the file is a
string.
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Ian Jackson
CC: Jan Beulich
CC: Stefano Stabellini
CC: Wei Liu
CC: Julien Grall
---
stubdom/Makefile | 2 +-
1 file changed, 1 insertion(+), 1 deletion(
On Wed, May 13, 2020 at 7:01 AM Andrew Cooper wrote:
>
> On 13/05/2020 03:35, Jason Andryuk wrote:
> > [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
> > unless you have verified the sender and know the content is safe.
> >
> > On Tue, May 12, 2020 at 3:11 PM Andrew Coo
On 08.05.2020 19:58, Andrew Cooper wrote:
> On 05/05/2020 09:15, Jan Beulich wrote:
>> To avoid introducing another boolean into emulator state, the
>> rex_prefix field gets (ab)used to convey the real/VM86 vs protected mode
>> info (affecting structure layout, albeit not size) to x86_emul_blk().
>
flight 150153 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150153/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 4 memdisk-try-append fail REGR. vs. 150148
test-armhf-armhf-xl
flight 150156 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150156/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 150152
version targeted for testi
> On May 13, 2020, at 1:58 AM, Nick Rosbrook wrote:
>
> Add a README and package comment giving a brief overview of the package.
> These also help pkg.go.dev generate better documentation.
One thing I forgot to mention about the README is the long lines — do you mind
if I wrap those before ch
On 13/05/2020 03:35, Jason Andryuk wrote:
> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
> unless you have verified the sender and know the content is safe.
>
> On Tue, May 12, 2020 at 3:11 PM Andrew Cooper
> wrote:
>> See comment for details. Works around a GCC-9 b
> On May 13, 2020, at 1:58 AM, Nick Rosbrook wrote:
>
> Initialize the xenlight Go module using the xenbits git-http URL,
> xenbits.xenproject.org/git-http/xen.git/tools/golang/xenlight.
>
> Also simplify the build Make target by using `go build` instead of `go
> install`, and do not set GOPA
> On May 13, 2020, at 1:55 AM, Nick Rosbrook wrote:
>
> Many exported functions in xenlight require a domid as an argument. Make
> it easier for package users to use these functions by adding wrappers
> for the libxl utility functions libxl_name_to_domid and
> libxl_domid_to_name.
>
> Signed-
Hi,
On 13/05/2020 01:33, Stefano Stabellini wrote:
I worked with Roman to do several more tests and here is an update on
the situation. We don't know why my patch didn't work when Boris' patch
[1] worked. Both of them should have worked the same way.
Anyway, we continued with Boris patch to de
flight 150157 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150157/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen a82582b1af6a4a57ca53bcfad9f71428cb5f9a54
baseline version:
xen e0d9
On 12.05.2020 18:14, Andrew Cooper wrote:
> On 12/05/2020 15:31, Jan Beulich wrote:
>> On 11.05.2020 23:09, Andrew Cooper wrote:
>>> On 07/05/2020 14:35, Jan Beulich wrote:
On 02.05.2020 00:58, Andrew Cooper wrote:
> --- a/xen/arch/x86/traps.c
> +++ b/xen/arch/x86/traps.c
> @@ -778
On 12.05.2020 21:11, Andrew Cooper wrote:
> See comment for details. Works around a GCC-9 bug which breaks the build on
> Ubuntu.
>
> Reported-by: Jason Andryuk
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulich
On 12.05.2020 21:11, Andrew Cooper wrote:
> @@ -47,6 +47,14 @@ SECTIONS
> *
> * Please check build32.mk for more details.
> */
> -/* *(.got.plt) */
> +*(.got.plt)
> + }
> +
> + /DISCARD/ : {
> +/*
> + * Discard everything else, to prev
On 13.05.2020 07:41, Stefan Bader wrote:
> On 12.05.20 20:47, Andrew Cooper wrote:
>> On 12/05/2020 08:17, Stefan Bader wrote:
>>> Not sure it was already hit but that additional .note section breaks the
>>> build
>>> of the emulator as generated headers become gigantic:
>>>
>>> https://git.launch
flight 150155 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150155/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 146182
build-i386-libvirt
61 matches
Mail list logo