Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-5.8b-rc4-tag
xen: branch for v5.8-rc4
It contains only 1 small cleanup patch for ARM and two patches for the
xenbus driver fixinf latent problems (large stack allocations and bad
retu
flight 151586 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151586/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 151506
test-amd64-amd64-xl-qemuu-ws16-amd64
flight 151590 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151590/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 627d1d6693b0594d257dbe1a3363a8d4bd4d8307
baseline version:
ovmf f43a14e3cff3fa45c30ff
flight 151577 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151577/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 10 debian-hvm-install
fail REGR. vs. 15106
Andrew Cooper writes:
> On 03/07/2020 18:10, Andy Lutomirski wrote:
>> If you can't get this fixed in upstream Xen reasonably quickly, we may
>> need to disable FSGSBASE in a Xen PV guest in Linux.
>
> This has come up several times before, but if its actually breaking
> userspace then Xen needs t
flight 151565 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151565/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-libvirt-xsm 16 guest-start/debian.repeat fail REGR. vs. 151214
test-armhf-armhf-x
At 20:10 + on 03 Jul (1593807001), Wei Liu wrote:
> Restore Tim's patch. The one that was committed was recreated by me
> because git didn't accept my saved copy. I made some mistakes while
> recreating that patch and here we are.
>
> Fixes: 3471cafbdda3 ("kdd: stop using [0] arrays to access
Restore Tim's patch. The one that was committed was recreated by me
because git didn't accept my saved copy. I made some mistakes while
recreating that patch and here we are.
Fixes: 3471cafbdda3 ("kdd: stop using [0] arrays to access packet contents")
Reported-by: Michael Young
Signed-off-by: Wei
On Fri, Jul 03, 2020 at 02:55:33PM +0100, Anthony PERARD wrote:
> Backport 2 commits to fix building QEMU without PCI passthrough
> support.
>
> Signed-off-by: Anthony PERARD
FWIW:
Acked-by: Wei Liu
On Fri, Jul 03, 2020 at 07:54:57PM +0100, Tim Deegan wrote:
> Hi Michael,
>
> Thanks for ther report!
>
> At 23:21 +0100 on 30 Jun (1593559296), Michael Young wrote:
> > I get the following errors when trying to build xen-4.14.0-rc4
> >
> > kdd.c: In function 'kdd_tx':
> > kdd.c:754:15: error: a
Hi Michael,
Thanks for ther report!
At 23:21 +0100 on 30 Jun (1593559296), Michael Young wrote:
> I get the following errors when trying to build xen-4.14.0-rc4
>
> kdd.c: In function 'kdd_tx':
> kdd.c:754:15: error: array subscript 16 is above array bounds of
> 'uint8_t[16]' {aka 'unsigned cha
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict
testid debian-hvm-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Tr
On 03/07/2020 18:10, Andy Lutomirski wrote:
> Hi Xen folks-
>
> I did some testing of the upcoming Linux FSGSBASE support on Xen PV,
> and I found what appears to be some significant bugs in the Xen
> context switching code. These bugs are causing Linux selftest
> failures, and they could easily c
Hi Xen folks-
I did some testing of the upcoming Linux FSGSBASE support on Xen PV,
and I found what appears to be some significant bugs in the Xen
context switching code. These bugs are causing Linux selftest
failures, and they could easily cause random and hard-to-debug
failures of user programs
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-libvirt-pair
testid guest-migrate/src_host/dst_host
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_keycodemapdb https://gitlab.com/keycodemap/keycodemapdb.git
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfir
flight 151570 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151570/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf f43a14e3cff3fa45c30ff152c4172204a4458341
baseline version:
ovmf 0622a7b1b203ad4ab1675
flight 151554 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151554/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 10 debian-hvm-install fail REGR.
vs. 151506
Tests w
On 03/07/2020 15:50, Jan Beulich wrote:
> On 01.07.2020 11:02, Roger Pau Monné wrote:
>> It's my understanding that the purpose of pt_update_irq and
>> pt_intr_post is to attempt to implement the "delay for missed ticks"
>> mode, where Xen will accumulate timer interrupts if they cannot be
>> injec
On 01.07.2020 11:02, Roger Pau Monné wrote:
> It's my understanding that the purpose of pt_update_irq and
> pt_intr_post is to attempt to implement the "delay for missed ticks"
> mode, where Xen will accumulate timer interrupts if they cannot be
> injected. As shown by the patch above, this is all
On 6/30/20 10:49 PM, Andrew Cooper wrote:
> On 19/06/2020 15:19, Hubert Jasudowicz wrote:
>> On 6/18/20 6:51 PM, Andrew Cooper wrote:
>>> On 18/06/2020 17:22, Hubert Jasudowicz wrote:
When running under KVM (or presumably other hypervisors) we enable
the CPUID.1.EDX.HTT flag, thus indicat
flight 151564 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151564/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-pair 22 guest-migrate/src_host/dst_host fail REGR.
vs. 151496
test-amd64-i38
Backport 2 commits to fix building QEMU without PCI passthrough
support.
Signed-off-by: Anthony PERARD
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index f7d10b7c4cc6..478928c178b7 100644
--- a/Config.mk
+++ b/Config.mk
@@ -245,7 +245,7
Am Fri, 3 Jul 2020 14:23:14 +0100
schrieb Paul Durrant :
> That doesn't look quite right.
That might be true. I do not debug windows, and it makes gcc happy...
Olaf
pgp2PK2BM9w6V.pgp
Description: Digitale Signatur von OpenPGP
> -Original Message-
> From: Xen-devel On Behalf Of Olaf
> Hering
> Sent: 02 July 2020 19:38
> To: Michael Young
> Cc: xen-devel@lists.xenproject.org; Tim Deegan
> Subject: Re: Build problems in kdd.c with xen-4.14.0-rc4
>
> On Tue, Jun 30, Michael Young wrote:
>
> > I get the followi
On 03.07.2020 13:36, Julien Grall wrote:
> On 03/07/2020 12:22, Jan Beulich wrote:
>> On 03.07.2020 13:17, Julien Grall wrote:
>>> In the current implementation, we tell the guest how many frames it can
>>> request in a batch. This number may be much smaller that the maximum
>>> number of frames of
> -Original Message-
> From: Julien Grall
> Sent: 03 July 2020 12:18
> To: p...@xen.org; 'Michał Leszczyński' ;
> xen-devel@lists.xenproject.org
> Cc: luwei.k...@intel.com; tamas.leng...@intel.com; 'Andrew Cooper'
> ;
> 'George Dunlap' ; 'Ian Jackson'
> ; 'Jan Beulich'
> ; 'Stefano Stab
Hi,
On 03/07/2020 12:22, Jan Beulich wrote:
On 03.07.2020 13:17, Julien Grall wrote:
On 03/07/2020 11:52, Paul Durrant wrote:
-Original Message-
From: Julien Grall
Sent: 03 July 2020 11:36
To: Michał Leszczyński ;
xen-devel@lists.xenproject.org
Cc: luwei.k...@intel.com; tamas.leng...
On 03.07.2020 13:17, Julien Grall wrote:
> Hi,
>
> On 03/07/2020 11:52, Paul Durrant wrote:
>>> -Original Message-
>>> From: Julien Grall
>>> Sent: 03 July 2020 11:36
>>> To: Michał Leszczyński ;
>>> xen-devel@lists.xenproject.org
>>> Cc: luwei.k...@intel.com; tamas.leng...@intel.com; An
Hi,
On 03/07/2020 11:52, Paul Durrant wrote:
-Original Message-
From: Julien Grall
Sent: 03 July 2020 11:36
To: Michał Leszczyński ;
xen-devel@lists.xenproject.org
Cc: luwei.k...@intel.com; tamas.leng...@intel.com; Andrew Cooper
; George
Dunlap ; Ian Jackson ; Jan
Beulich
; Stefano S
> -Original Message-
> From: Julien Grall
> Sent: 03 July 2020 11:36
> To: Michał Leszczyński ;
> xen-devel@lists.xenproject.org
> Cc: luwei.k...@intel.com; tamas.leng...@intel.com; Andrew Cooper
> ; George
> Dunlap ; Ian Jackson ;
> Jan Beulich
> ; Stefano Stabellini ; Wei Liu
> ; p..
(+ Paul as the author XENMEM_acquire_resource)
Hi,
On 30/06/2020 13:33, Michał Leszczyński wrote:
From: Michal Leszczynski
Allow to acquire large resources by allowing acquire_resource()
to process items in batches, using hypercall continuation.
Signed-off-by: Michal Leszczynski
---
xen/c
> -Original Message-
> From: Michael Young
> Sent: 03 July 2020 10:49
> To: p...@xen.org
> Cc: xen-devel@lists.xenproject.org; 'Tim Deegan'
> Subject: RE: Build problems in kdd.c with xen-4.14.0-rc4
>
> On Fri, 3 Jul 2020, Paul Durrant wrote:
>
> >> -Original Message-
> >> From:
On 7/1/20 8:16 AM, Juergen Gross wrote:
> Avoid allocating large amount of data on the stack in
> xenbus_map_ring_valloc() and some related return value cleanups.
>
> Juergen Gross (2):
> xen/xenbus: avoid large structs and arrays on the stack
> xen/xenbus: let xenbus_map_ring_valloc() return e
On Fri, Jul 03, 2020 at 11:56:38AM +0200, Jan Beulich wrote:
> On 03.07.2020 11:44, Roger Pau Monné wrote:
> > On Thu, Jul 02, 2020 at 06:23:28PM +0200, Michał Leszczyński wrote:
> >> - 2 lip 2020 o 11:00, Roger Pau Monné roger@citrix.com napisał(a):
> >>
> >>> On Tue, Jun 30, 2020 at 02:33
flight 151547 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/151547/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 10 debian-hvm-install
fail REGR. vs. 15106
On 03.07.2020 11:44, Roger Pau Monné wrote:
> On Thu, Jul 02, 2020 at 06:23:28PM +0200, Michał Leszczyński wrote:
>> - 2 lip 2020 o 11:00, Roger Pau Monné roger@citrix.com napisał(a):
>>
>>> On Tue, Jun 30, 2020 at 02:33:46PM +0200, Michał Leszczyński wrote:
diff --git a/xen/include/pu
On Fri, 3 Jul 2020, Paul Durrant wrote:
-Original Message-
From: Xen-devel On Behalf Of Michael
Young
Sent: 30 June 2020 23:22
To: xen-devel@lists.xenproject.org
Cc: Tim Deegan
Subject: Build problems in kdd.c with xen-4.14.0-rc4
I get the following errors when trying to build xen-4.
On Thu, Jul 02, 2020 at 06:23:28PM +0200, Michał Leszczyński wrote:
> - 2 lip 2020 o 11:00, Roger Pau Monné roger@citrix.com napisał(a):
>
> > On Tue, Jun 30, 2020 at 02:33:46PM +0200, Michał Leszczyński wrote:
> >> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
> >
> -Original Message-
> From: Xen-devel On Behalf Of Michael
> Young
> Sent: 30 June 2020 23:22
> To: xen-devel@lists.xenproject.org
> Cc: Tim Deegan
> Subject: Build problems in kdd.c with xen-4.14.0-rc4
>
> I get the following errors when trying to build xen-4.14.0-rc4
>
> kdd.c: In f
Introduce a new ERRP_AUTO_PROPAGATE macro, to be used at start of
functions with an errp OUT parameter.
It has three goals:
1. Fix issue with error_fatal and error_prepend/error_append_hint: user
can't see this additional information, because exit() happens in
error_setg earlier than information
Script adds ERRP_AUTO_PROPAGATE macro invocation where appropriate and
does corresponding changes in code (look for details in
include/qapi/error.h)
Usage example:
spatch --sp-file scripts/coccinelle/auto-propagated-errp.cocci \
--macro-file scripts/cocci-macro-file.h --in-place --no-show-diff \
Based-on: <20200702155000.3455325-1-arm...@redhat.com>
v11: (based-on "[PATCH v2 00/44] Less clumsy error checking")
01: minor rebase of documentation, keep r-bs
02: - minor comment tweaks [Markus]
- use explicit file name in MAINTAINERS instead of pattern
- add Markus's r-b
03,07,08: raba
If we want to add some info to errp (by error_prepend() or
error_append_hint()), we must use the ERRP_AUTO_PROPAGATE macro.
Otherwise, this info will not be added when errp == &error_fatal
(the program will exit prior to the error_append_hint() or
error_prepend() call). Fix such cases.
If we want
Hi,
On 02/07/2020 21:28, Michał Leszczyński wrote:
- 2 lip 2020 o 16:31, Julien Grall jul...@xen.org napisał(a):
On 02/07/2020 15:17, Jan Beulich wrote:
On 02.07.2020 16:14, Julien Grall wrote:
On 02/07/2020 14:30, Jan Beulich wrote:
On 02.07.2020 11:57, Julien Grall wrote:
On 02/07/20
44 matches
Mail list logo