flight 176322 seabios real [real]
flight 176329 seabios real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/176322/
http://logs.test-lab.xenproject.org/osstest/logs/176329/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-qe
flight 176327 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176327/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
flight 176323 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176323/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d375273c899bfa279c2732c509caf455af285006
baseline version:
ovmf bda715bf6d7cf565ccd4e
flight 176311 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176311/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-amd64-shadow broken
build-armhf
flight 176324 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176324/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
> From: Jan Beulich
> Sent: Wednesday, February 1, 2023 5:30 PM
>
> On 01.02.2023 06:07, Tian, Kevin wrote:
> >> From: Xenia Ragiadakou
> >> Sent: Tuesday, January 24, 2023 8:42 PM
> >>
> >> The variable untrusted_msi indicates whether the system is vulnerable to
> >> CVE-2011-1898 due to the ab
flight 176320 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176320/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
On Fri, Jan 20, 2023 at 11:33:19AM +, David Woodhouse wrote:
> From: David Woodhouse
>
> When running under Xen, hvmloader places a table at 0x1000 with the e820
> information and BIOS tables. If this isn't present, SeaBIOS will
> currently panic.
>
> We now have support for running Xen gue
Hi George,
> From: George Dunlap
> Subject: Re: [PATCH] Changelog: Add details about new features for SPR
>
> One approach would be to have someone / something (either the release
> manager, or an automated script)
An automated script would be best if possible IMHO, as the email
content would b
flight 176317 xen-4.17-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176317/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win7-amd64 broken
build-arm
flight 176319 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176319/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
flight 176318 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176318/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
On 01/02/2023 17:40, Oleksii wrote:
Hi Julien,
Hi Oleksii,
On Mon, 2023-01-30 at 22:28 +, Julien Grall wrote:
Hi Oleksii,
On 30/01/2023 11:35, Oleksii wrote:
Hi Julien,
On Fri, 2023-01-27 at 16:02 +, Julien Grall wrote:
Hi Oleksii,
On 27/01/2023 13:59, Oleksii Kurochko wrote:
flight 176309 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176309/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
flight 176316 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176316/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
On 01/02/2023 05:36, Penny Zheng wrote:
Hi Julien
Hi Penny,
-Original Message-
From: Julien Grall
Sent: Tuesday, January 31, 2023 5:42 PM
To: Penny Zheng ; xen-devel@lists.xenproject.org
Cc: Wei Chen ; Stefano Stabellini
; Bertrand Marquis ;
Volodymyr Babchuk
Subject: Re: [PATC
Hi Penny,
On 01/02/2023 05:39, Penny Zheng wrote:
If we are adding MPU regions in sequence as you suggested, while using
bitmap at the same time to record used entry.
TBH, this is how I designed at the very beginning internally. We found
that if we don't do reorg late-boot to keep fixed in front
On 01/02/2023 12:56, Michal Orzel wrote:
Hi Julien,
Hi Michal,
On 01/02/2023 12:20, Julien Grall wrote:
On 01/02/2023 11:01, Michal Orzel wrote:
I would prefer not to do this in this series as the goals are different. This
series is to remove
the known Xen limitation.
The reason I a
Hi Paul,
Thanks for reviewing this and other patches in series.
Please see my reply below.
On 2/1/23 12:30 AM, Paul Durrant wrote:
On 31/01/2023 22:51, Vikram Garhwal wrote:
Add a new machine xenpvh which creates a IOREQ server to
register/connect with
Xen Hypervisor.
Is this really the r
flight 176307 xen-4.17-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176307/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-qemuu-rhel6hvm-intel broken
test-amd
Hi Julien,
On Mon, 2023-01-30 at 22:28 +, Julien Grall wrote:
> Hi Oleksii,
>
> On 30/01/2023 11:35, Oleksii wrote:
> > Hi Julien,
> > On Fri, 2023-01-27 at 16:02 +, Julien Grall wrote:
> > > Hi Oleksii,
> > >
> > > On 27/01/2023 13:59, Oleksii Kurochko wrote:
> > > > The patch introduce
On Wed, Feb 01, 2023 at 09:06:21AM +, Julien Grall wrote:
> Hi Andrew,
>
> On 01/02/2023 00:21, Andrew Cooper wrote:
> > On 31/01/2023 11:17 pm, Alistair Francis wrote:
> > > On Tue, Jan 31, 2023 at 10:03 PM Julien Grall wrote:
> > > > On 31/01/2023 11:44, Alistair Francis wrote:
> > > > > On
Hi Anthony,
On 12/9/22 9:55 AM, Anthony PERARD wrote:
On Tue, Dec 06, 2022 at 10:18:15PM -0800, Vikram Garhwal wrote:
diff --git a/tools/xl/xl_cmdtable.c b/tools/xl/xl_cmdtable.c
index 35182ca196..868364c58d 100644
--- a/tools/xl/xl_cmdtable.c
+++ b/tools/xl/xl_cmdtable.c
@@ -630,6 +630,12 @@ c
Hi Anthony,
On 12/9/22 8:59 AM, Anthony PERARD wrote:
On Tue, Dec 06, 2022 at 10:18:14PM -0800, Vikram Garhwal wrote:
diff --git a/tools/include/libxl.h b/tools/include/libxl.h
index 2321a648a5..82fc7ce6b9 100644
--- a/tools/include/libxl.h
+++ b/tools/include/libxl.h
@@ -245,6 +245,11 @@
*/
flight 176315 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176315/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
Hi Jan,
On 12/7/22 12:41 AM, Jan Beulich wrote:
On 07.12.2022 07:18, Vikram Garhwal wrote:
--- a/xen/include/public/sysctl.h
+++ b/xen/include/public/sysctl.h
@@ -1079,6 +1079,23 @@ typedef struct xen_sysctl_cpu_policy
xen_sysctl_cpu_policy_t;
DEFINE_XEN_GUEST_HANDLE(xen_sysctl_cpu_policy_t)
Hi Julien,
On 12/7/22 8:31 AM, Julien Grall wrote:
Hi Vikram,
On 07/12/2022 06:18, Vikram Garhwal wrote:
Dynamic programming ops will modify the dt_host and there might be
other
function which are browsing the dt_host at the same time. To avoid
the race
conditions, adding rwlock for br
> On 1 Feb 2023, at 13:29, Andrew Cooper wrote:
>
> All caml_alloc_*() functions can throw exceptions, and longjump out of
> context. If this happens, we leak the xch/xce handle.
>
> Reorder the logic to allocate the the Ocaml object first.
>
> Fixes: 8b3c06a3e545 ("tools/ocaml/xenctrl: OCa
flight 176313 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176313/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
All caml_alloc_*() functions can throw exceptions, and longjump out of
context. If this happens, we leak the xch/xce handle.
Reorder the logic to allocate the the Ocaml object first.
Fixes: 8b3c06a3e545 ("tools/ocaml/xenctrl: OCaml 5 support, fix use-after-free")
Fixes: 22d5affdf0ce ("tools/ocam
flight 176304 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176304/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
test-amd64-amd64-xl-pvhv2-intel
Hi Julien,
On 01/02/2023 12:20, Julien Grall wrote:
>
>
> On 01/02/2023 11:01, Michal Orzel wrote:
>> I would prefer not to do this in this series as the goals are different.
>> This series is to remove
>> the known Xen limitation.
>
> The reason I am asking is it effectively change the way yo
flight 176312 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176312/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
On 01/02/2023 11:01, Michal Orzel wrote:
I would prefer not to do this in this series as the goals are different. This
series is to remove
the known Xen limitation.
The reason I am asking is it effectively change the way you would
implement. If we were going to support zImage/Image within
On Mon, Jan 30, 2023 at 3:54 PM Andrew Cooper wrote:
> On 27/01/2023 11:40 am, Henry Wang wrote:
> > Hi Andrew,
> >
> >> -Original Message-
> >> From: Andrew Cooper
> >> Subject: [PATCH] Changelog: Add details about new features for SPR
> >>
> >> Signed-off-by: Andrew Cooper
> > Thanks
Hi Julien,
On 01/02/2023 11:13, Julien Grall wrote:
>
>
> On 01/02/2023 09:48, Michal Orzel wrote:
>> Hi Julien,
>
> Hi Michal,
>
>>
>> On 31/01/2023 21:20, Julien Grall wrote:
>>>
>>>
>>> Hi,
>>>
>>> On 31/01/2023 15:13, Michal Orzel wrote:
At the moment, Xen does not support booting gzi
On 01/02/2023 09:48, Michal Orzel wrote:
Hi Julien,
Hi Michal,
On 31/01/2023 21:20, Julien Grall wrote:
Hi,
On 31/01/2023 15:13, Michal Orzel wrote:
At the moment, Xen does not support booting gzip compressed uImages.
This is because we are trying to decompress the kernel before prob
Hi Julien,
On 31/01/2023 21:20, Julien Grall wrote:
>
>
> Hi,
>
> On 31/01/2023 15:13, Michal Orzel wrote:
>> At the moment, Xen does not support booting gzip compressed uImages.
>> This is because we are trying to decompress the kernel before probing
>> the u-boot header. This leads to a failu
flight 176310 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/176310/
Failures and problems with tests :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf broken
build-armhf
On 01.02.2023 06:07, Tian, Kevin wrote:
>> From: Xenia Ragiadakou
>> Sent: Tuesday, January 24, 2023 8:42 PM
>>
>> The variable untrusted_msi indicates whether the system is vulnerable to
>> CVE-2011-1898 due to the absence of interrupt remapping support.
>> Although AMD iommus with interrupt rema
> On 31 Jan 2023, at 21:29, Andrew Cooper wrote:
>
> It turns out there have been some latent memory corruption bugs and other
> errors in the bindings since they were first introduced.
>
> These were discovered after realising that we'd introduced other memory
> corruption bugs as part of th
On 01/02/2023 09:06, Julien Grall wrote:
Hi Andrew,
On 01/02/2023 00:21, Andrew Cooper wrote:
On 31/01/2023 11:17 pm, Alistair Francis wrote:
On Tue, Jan 31, 2023 at 10:03 PM Julien Grall wrote:
On 31/01/2023 11:44, Alistair Francis wrote:
On Sat, Jan 28, 2023 at 12:15 AM Oleksii
wrote:
Hi Andrew,
On 01/02/2023 00:21, Andrew Cooper wrote:
On 31/01/2023 11:17 pm, Alistair Francis wrote:
On Tue, Jan 31, 2023 at 10:03 PM Julien Grall wrote:
On 31/01/2023 11:44, Alistair Francis wrote:
On Sat, Jan 28, 2023 at 12:15 AM Oleksii wrote:
From my understanding, on RISC-V, the us
On 31/01/2023 22:51, Vikram Garhwal wrote:
Add a new machine xenpvh which creates a IOREQ server to register/connect with
Xen Hypervisor.
Is this really the right way? Is it not possible to do the Xen
initialization (including ioreq server registration) off the back of the
accelerator init (
On 31/01/2023 22:51, Vikram Garhwal wrote:
Replace g_malloc with g_new and perror with error_report.
Signed-off-by: Vikram Garhwal
Reviewed-by: Stefano Stabellini
---
hw/xen/xen-hvm-common.c | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
Reviewed-by: Paul Durrant
On 31/01/2023 22:51, Vikram Garhwal wrote:
From: Stefano Stabellini
On ARM it is possible to have a functioning xenpv machine with only the
PV backends and no IOREQ server. If the IOREQ server creation fails continue
to the PV backends initialization.
Also, moved the IOREQ registration and map
Am 24. Januar 2023 17:07:30 UTC schrieb Bernhard Beschow :
>
>
>Am 24. Januar 2023 16:11:47 UTC schrieb Anthony PERARD
>:
>>On Wed, Jan 18, 2023 at 05:13:03AM -0500, Michael S. Tsirkin wrote:
>>> On Wed, Jan 04, 2023 at 03:44:31PM +0100, Bernhard Beschow wrote:
>>> > This series first renders T
On 31/01/2023 22:51, Vikram Garhwal wrote:
From: Stefano Stabellini
This is done to prepare for enabling xenpv support for ARM architecture.
On ARM it is possible to have a functioning xenpv machine with only the
PV backends and no IOREQ server. If the IOREQ server creation fails,
continue to t
On 31/01/2023 22:51, Vikram Garhwal wrote:
From: Stefano Stabellini
This patch does following:
1. creates arch_handle_ioreq() and arch_xen_set_memory(). This is done in
preparation for moving most of xen-hvm code to an arch-neutral location,
move the x86-specific portion of xen_set_me
49 matches
Mail list logo