On Tue, Dec 03, 2019 at 09:02:18AM +0100, Jan Beulich wrote:
> On 01.12.2019 18:47, Jeremi Piotrowski wrote:
> > On Thu, Oct 24, 2019 at 10:12:19AM +0200, Jan Beulich wrote:
> >> On 23.10.2019 22:33, Pry Mar wrote:
> >>> Hello xen-devel,
> >>>
> >>> https://paste.debian.net/plain/1109374
> >>>
> >>
flight 144509 xen-4.13-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144509/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-pvshim12 guest-start fail never pass
test-amd64-amd64-libvirt 13
If the feature is not present Xen will try to force X86_BUG_FPU_PTRS
feature at CPU identification time. This is especially noticeable in
PV-shim that usually hotplugs its vCPUs. We either need to restrict this
action for boot CPU only or allow secondary CPUs to modify
forced CPU capabilities at ru
flight 144507 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144507/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-amd64 7 xen-boot fail REGR. vs. 144495
Tests which did n
VT-x updates RF before vmexit, so eflags written into the outgoing TSS happens
to be correct. SVM does not update RF before vmexit, and instead provides it
via a bit in exitinfo2.
In practice, needing RF set in the outgoing state occurs when a task gate is
used to handle faults.
Extend hvm_task_
flight 144503 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144503/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail like 144497
test-amd64-amd64-xl-qemut-win7-amd64
flight 144505 xen-4.11-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144505/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 10 debian-hvm-install
fail never pass
test-amd64-i386-xl
> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
> index 959083d8c4..76676ff4c0 100644
> --- a/xen/include/public/vm_event.h
> +++ b/xen/include/public/vm_event.h
> @@ -281,6 +281,7 @@ struct vm_event_debug {
> uint32_t insn_length;
> uint8_t type;/* HV
On Tue, Dec 3, 2019 at 1:23 PM Andrew Cooper wrote:
>
> On 03/12/2019 18:16, Tamas K Lengyel wrote:
> > On Tue, Dec 3, 2019 at 1:09 PM Andrew Cooper
> > wrote:
> >> On 03/12/2019 18:05, Tamas K Lengyel wrote:
> diff --git a/xen/include/public/vm_event.h
> b/xen/include/public/vm_event
On 11/26/19 8:36 AM, SeongJae Park wrote:
From: SeongJae Park
For each I/O request, blkback first maps the foreign pages for the
request to its local pages. If an allocation of a local page for the
mapping fails, it should unmap every mapping already made for the
request.
However, blkback's h
On Tue, Dec 3, 2019 at 1:09 PM Andrew Cooper wrote:
>
> On 03/12/2019 18:05, Tamas K Lengyel wrote:
> >> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
> >> index 959083d8c4..76676ff4c0 100644
> >> --- a/xen/include/public/vm_event.h
> >> +++ b/xen/include/public/vm_eve
On Tue, Dec 3, 2019 at 1:31 PM Andrew Cooper wrote:
>
> On 03/12/2019 18:24, Tamas K Lengyel wrote:
> > On Tue, Dec 3, 2019 at 1:22 PM Tamas K Lengyel wrote:
> >> On Tue, Dec 3, 2019 at 1:18 PM Andrew Cooper
> >> wrote:
> >>> On 03/12/2019 18:09, Tamas K Lengyel wrote:
> On Tue, Dec 3, 201
On Tue, Dec 3, 2019 at 1:18 PM Andrew Cooper wrote:
>
> On 03/12/2019 18:09, Tamas K Lengyel wrote:
> > On Tue, Dec 3, 2019 at 1:05 PM Tamas K Lengyel wrote:
> >>> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
> >>> index 959083d8c4..76676ff4c0 100644
> >>> --- a/xen/
On Tue, Dec 3, 2019 at 1:23 PM Andrew Cooper wrote:
>
> On 03/12/2019 18:16, Tamas K Lengyel wrote:
> > On Tue, Dec 3, 2019 at 1:09 PM Andrew Cooper
> > wrote:
> >> On 03/12/2019 18:05, Tamas K Lengyel wrote:
> diff --git a/xen/include/public/vm_event.h
> b/xen/include/public/vm_event
On 03/12/2019 18:24, Tamas K Lengyel wrote:
> On Tue, Dec 3, 2019 at 1:22 PM Tamas K Lengyel wrote:
>> On Tue, Dec 3, 2019 at 1:18 PM Andrew Cooper
>> wrote:
>>> On 03/12/2019 18:09, Tamas K Lengyel wrote:
On Tue, Dec 3, 2019 at 1:05 PM Tamas K Lengyel wrote:
>> diff --git a/xen/includ
On Tue, Dec 3, 2019 at 1:22 PM Tamas K Lengyel wrote:
>
> On Tue, Dec 3, 2019 at 1:18 PM Andrew Cooper
> wrote:
> >
> > On 03/12/2019 18:09, Tamas K Lengyel wrote:
> > > On Tue, Dec 3, 2019 at 1:05 PM Tamas K Lengyel
> > > wrote:
> > >>> diff --git a/xen/include/public/vm_event.h
> > >>> b/xe
On 03/12/2019 18:16, Tamas K Lengyel wrote:
> On Tue, Dec 3, 2019 at 1:09 PM Andrew Cooper
> wrote:
>> On 03/12/2019 18:05, Tamas K Lengyel wrote:
diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
index 959083d8c4..76676ff4c0 100644
--- a/xen/include/public
On Tue, Dec 3, 2019 at 1:05 PM Tamas K Lengyel wrote:
>
> > diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
> > index 959083d8c4..76676ff4c0 100644
> > --- a/xen/include/public/vm_event.h
> > +++ b/xen/include/public/vm_event.h
> > @@ -281,6 +281,7 @@ struct vm_event_deb
On 03/12/2019 18:09, Tamas K Lengyel wrote:
> On Tue, Dec 3, 2019 at 1:05 PM Tamas K Lengyel wrote:
>>> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
>>> index 959083d8c4..76676ff4c0 100644
>>> --- a/xen/include/public/vm_event.h
>>> +++ b/xen/include/public/vm_event.h
> On Nov 15, 2019, at 7:44 PM, Nick Rosbrook wrote:
>
> From: Nick Rosbrook
>
> Introduce gengotypes.py to generate Go code the from IDL. As a first step,
> implement 'enum' type generation.
>
> As a result of the newly-generated code, remove the existing, and now
> conflicting definitions in
On 03/12/2019 18:05, Tamas K Lengyel wrote:
>> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
>> index 959083d8c4..76676ff4c0 100644
>> --- a/xen/include/public/vm_event.h
>> +++ b/xen/include/public/vm_event.h
>> @@ -281,6 +281,7 @@ struct vm_event_debug {
>> uint3
Hi,
On 26/11/2019 21:13, Jeff Kubascik wrote:
The physical timer traps apply an offset so that time starts at 0 for
the guest. However, this offset is not currently applied to the physical
counter. Per the ARMv8 Reference Manual (ARM DDI 0487E.a), section
D11.2.4 Timers, the "Offset" between the
flight 144511 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144511/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 03/12/2019 09:03, Durrant, Paul wrote:
>> -Original Message-
>> From: Xen-devel On Behalf Of
>> Andrew Cooper
>> Sent: 02 December 2019 19:52
>> To: Xen-devel List
>> Subject: [Xen-devel] Xen 4.14 and future work
>>
>> Hello,
>>
>> Now that 4.13 is on its way out of the door, it is tim
On Tue, Dec 03, 2019 at 05:09:43PM +, Wei Liu wrote:
> On Tue, Dec 03, 2019 at 05:58:28PM +0100, Jan Beulich wrote:
> > On 03.12.2019 17:37, Wei Liu wrote:
> > > On Tue, Dec 03, 2019 at 03:54:35PM +0100, Jan Beulich wrote:
> > >> On 30.11.2019 12:57, Wei Liu wrote:
> > >>> Also replace referenc
Like %cr2 for pagefaults, %dr6 contains ancillary information for debug
exceptions, and needs similar handling.
For xendevicemodel_inject_event(), no ABI change is needed (although an API
one would be ideal). Switch from 'cr2' to 'extra' in variable names which
don't constitute an API change, and
On Tue, Dec 03, 2019 at 05:58:28PM +0100, Jan Beulich wrote:
> On 03.12.2019 17:37, Wei Liu wrote:
> > On Tue, Dec 03, 2019 at 03:54:35PM +0100, Jan Beulich wrote:
> >> On 30.11.2019 12:57, Wei Liu wrote:
> >>> Also replace reference to xen_guest.
> >>>
> >>> Signed-off-by: Wei Liu
> >>
> >> Acked
On 03.12.2019 17:37, Wei Liu wrote:
> On Tue, Dec 03, 2019 at 03:54:35PM +0100, Jan Beulich wrote:
>> On 30.11.2019 12:57, Wei Liu wrote:
>>> Also replace reference to xen_guest.
>>>
>>> Signed-off-by: Wei Liu
>>
>> Acked-by: Jan Beulich
>
> Thanks.
>
>>
>> However, ...
>>
>>> --- a/xen/arch/x8
On Sat, Nov 30, 2019 at 11:57:37AM +, Wei Liu wrote:
[...]
> + */
> +#include
> +
> +#include
> +
> +static const struct hypervisor_ops hyperv_ops = {
Since xg_ops has lost its xg_ prefix, I also take the liberty to drop
the hyperv_ prefix here to make things more consistent.
Wei.
On 03/12/2019 14:38, Andre Przywara wrote:
On Tue, 3 Dec 2019 11:39:58 +
Julien Grall wrote:
Hi,
(+Andre)
Hi,
@Andre, IIRC you originally added the support for sunxi in Xen. Could
you have a look at this patch?
Looks alright, and indeed the H6 needs it. Even though Allwinner totally
On Tue, Dec 03, 2019 at 03:54:35PM +0100, Jan Beulich wrote:
> On 30.11.2019 12:57, Wei Liu wrote:
> > Also replace reference to xen_guest.
> >
> > Signed-off-by: Wei Liu
>
> Acked-by: Jan Beulich
Thanks.
>
> However, ...
>
> > --- a/xen/arch/x86/setup.c
> > +++ b/xen/arch/x86/setup.c
> > @
On Tue, Dec 03, 2019 at 03:52:47PM +0100, Jan Beulich wrote:
> On 30.11.2019 12:57, Wei Liu wrote:
> > Signed-off-by: Wei Liu
>
> Acked-by: Jan Beulich
> again with one more remark:
>
> > @@ -326,6 +310,31 @@ void hypervisor_resume(void)
> > pv_console_init();
> > }
> >
> > +static
On Tue, Dec 03, 2019 at 03:49:33PM +0100, Jan Beulich wrote:
> On 30.11.2019 12:57, Wei Liu wrote:
> > We will soon implement Hyper-V support for Xen. Add a framework for
> > that.
> >
> > This requires moving some of the hypervisor_* functions from xen.h to
> > hypervisor.h.
> >
> > Signed-off-b
On 29.11.2019 12:28, Roger Pau Monne wrote:
> --- a/xen/arch/x86/apic.c
> +++ b/xen/arch/x86/apic.c
> @@ -492,7 +492,8 @@ static void __enable_x2apic(void)
>
> static void resume_x2apic(void)
> {
> -iommu_enable_x2apic();
> +if ( iommu_supports_x2apic() )
> +iommu_enable_x2apic(
On 29.11.2019 12:28, Roger Pau Monne wrote:
> --- a/xen/arch/x86/smpboot.c
> +++ b/xen/arch/x86/smpboot.c
> @@ -1317,6 +1317,13 @@ int __cpu_up(unsigned int cpu)
> if ( (apicid = x86_cpu_to_apicid[cpu]) == BAD_APICID )
> return -ENODEV;
>
> +if ( (!x2apic_enabled || !iommu_intre
On Tue, Dec 03, 2019 at 06:41:56AM +0100, Marek Marczykowski-Górecki wrote:
> QEMU running in a stubdom needs to be able to set INTX_DISABLE, and the
> MSI(-X) enable flags in the PCI config space. This adds an attribute
> 'allow_interrupt_control' which when set for a PCI device allows writes
> to
On 29.11.2019 12:38, Roger Pau Monné wrote:
> On Fri, Nov 29, 2019 at 12:28:49PM +0100, Roger Pau Monne wrote:
>> Cluster mode can only be used with interrupt remapping support, since
>> the top 16bits of the APIC ID are filled with the cluster ID, and
>> hence on systems where the physical ID is
On 29.11.2019 12:28, Roger Pau Monne wrote:
> --- a/xen/arch/x86/io_apic.c
> +++ b/xen/arch/x86/io_apic.c
> @@ -562,7 +562,7 @@ set_ioapic_affinity_irq(struct irq_desc *desc, const
> cpumask_t *mask)
>
> dest = set_desc_affinity(desc, mask);
> if (dest != BAD_APICID) {
> -if (
flight 144508 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144508/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 30.11.2019 12:57, Wei Liu wrote:
> Also replace reference to xen_guest.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
However, ...
> --- a/xen/arch/x86/setup.c
> +++ b/xen/arch/x86/setup.c
> @@ -700,6 +700,7 @@ void __init noreturn __start_xen(unsigned long mbi_p)
> .max_grant_
On 30.11.2019 12:57, Wei Liu wrote:
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
again with one more remark:
> @@ -326,6 +310,31 @@ void hypervisor_resume(void)
> pv_console_init();
> }
>
> +static const struct hypervisor_ops xg_ops = {
Along with other static variable not having
On 30.11.2019 12:57, Wei Liu wrote:
> We will soon implement Hyper-V support for Xen. Add a framework for
> that.
>
> This requires moving some of the hypervisor_* functions from xen.h to
> hypervisor.h.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
with one more adjustment (sorry for notic
On 03.12.2019 15:41, Igor Druzhinin wrote:
> On 03/12/2019 14:28, Jan Beulich wrote:
>> On 03.12.2019 15:21, Igor Druzhinin wrote:
>>> On 03/12/2019 10:08, Jan Beulich wrote:
On 29.11.2019 21:01, Igor Druzhinin wrote:
> --- a/xen/arch/x86/cpu/common.c
> +++ b/xen/arch/x86/cpu/common.c
On 03/12/2019 14:28, Jan Beulich wrote:
> On 03.12.2019 15:21, Igor Druzhinin wrote:
>> On 03/12/2019 10:08, Jan Beulich wrote:
>>> On 29.11.2019 21:01, Igor Druzhinin wrote:
--- a/xen/arch/x86/cpu/common.c
+++ b/xen/arch/x86/cpu/common.c
@@ -54,7 +54,7 @@ static unsigned int forced_
On Tue, 3 Dec 2019 11:39:58 +
Julien Grall wrote:
Hi,
> (+Andre)
>
> Hi,
>
> @Andre, IIRC you originally added the support for sunxi in Xen. Could
> you have a look at this patch?
Looks alright, and indeed the H6 needs it. Even though Allwinner totally
re-arranged the memory map, they m
On 27.11.19 10:13, Roger Pau Monné wrote:
> On Tue, Nov 26, 2019 at 04:36:05PM +0100, SeongJae Park wrote:
>> From: SeongJae Park
>>
>> For each I/O request, blkback first maps the foreign pages for the
>> request to its local pages. If an allocation of a local page for the
>> mapping fails, it s
On 03.12.2019 15:21, Igor Druzhinin wrote:
> On 03/12/2019 10:08, Jan Beulich wrote:
>> On 29.11.2019 21:01, Igor Druzhinin wrote:
>>> --- a/xen/arch/x86/cpu/common.c
>>> +++ b/xen/arch/x86/cpu/common.c
>>> @@ -54,7 +54,7 @@ static unsigned int forced_caps[NCAPINTS];
>>>
>>> DEFINE_PER_CPU(bool,
Hi,
On 15/11/2019 20:10, Stewart Hildebrand wrote:
There are some IRQs that happen to have multiple "interrupts = < ... >;"
properties with the same IRQ in the device tree. For example:
interrupts = <0 123 4>,
<0 123 4>,
<0 123 4>,
<0 123 4>,
On 03/12/2019 10:08, Jan Beulich wrote:
> On 29.11.2019 21:01, Igor Druzhinin wrote:
>> --- a/xen/arch/x86/cpu/common.c
>> +++ b/xen/arch/x86/cpu/common.c
>> @@ -54,7 +54,7 @@ static unsigned int forced_caps[NCAPINTS];
>>
>> DEFINE_PER_CPU(bool, full_gdt_loaded);
>>
>> -void __init setup_clear
On 03.12.2019 15:11, Andrew Cooper wrote:
> On 03/12/2019 10:08, Jan Beulich wrote:
>> On 29.11.2019 21:01, Igor Druzhinin wrote:
>>> --- a/xen/arch/x86/cpu/common.c
>>> +++ b/xen/arch/x86/cpu/common.c
>>> @@ -54,7 +54,7 @@ static unsigned int forced_caps[NCAPINTS];
>>>
>>> DEFINE_PER_CPU(bool,
On 03/12/2019 10:08, Jan Beulich wrote:
> On 29.11.2019 21:01, Igor Druzhinin wrote:
>> --- a/xen/arch/x86/cpu/common.c
>> +++ b/xen/arch/x86/cpu/common.c
>> @@ -54,7 +54,7 @@ static unsigned int forced_caps[NCAPINTS];
>>
>> DEFINE_PER_CPU(bool, full_gdt_loaded);
>>
>> -void __init setup_clear
On 03/12/2019 10:08, Jan Beulich wrote:
> On 29.11.2019 21:01, Igor Druzhinin wrote:
>> --- a/xen/arch/x86/cpu/common.c
>> +++ b/xen/arch/x86/cpu/common.c
>> @@ -54,7 +54,7 @@ static unsigned int forced_caps[NCAPINTS];
>>
>> DEFINE_PER_CPU(bool, full_gdt_loaded);
>>
>> -void __init setup_clear
On 03.12.19 11:33, Roger Pau Monne wrote:
Hello,
Small series to improve the automated tests, first patch enables Xen
console timestamps and the second one increases the test timeout to 30s
since the clang PVH tests already takes ~10s without taking into account
the time to initialize QEMU.
Tha
flight 144501 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144501/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 14 saverestore-support-checkfail like 144408
test-armhf-armhf-libvirt-raw 13 saveresto
All,
I am pleased to announce the release of Xen 4.11.3. This is available
immediately from its git repository
http://xenbits.xen.org/gitweb/?p=xen.git;a=shortlog;h=refs/heads/stable-4.11
(tag RELEASE-4.11.3) or from the XenProject download page
https://xenproject.org/downloads/xen-project-archive
flight 144500 xen-4.13-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144500/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-amd64-i386-xl-pvshim12
Correction: the meeting is this Thursday, the 5th
Apologies for the typo
Lars
On 02/12/2019, 20:05, "Lars Kurth" wrote:
Dear community members,
please send me agenda items for this Friday’s community call (sorry for the
late notice, I was on PTO last week). A draft agenda is at
(+Andre)
Hi,
@Andre, IIRC you originally added the support for sunxi in Xen. Could
you have a look at this patch?
Cheers,
On 02/12/2019 08:49, Yangtao Li wrote:
adding compatible strings for h6 SoCs, Specifically orangepi3.
Signed-off-by: Yangtao Li
--- > xen/arch/arm/platforms/sunxi.c
On 03.12.2019 03:05, Lars Kurth wrote:
> Dear community members,
>
> please send me agenda items for this Friday’s community call (sorry
> for the late notice, I was on PTO last week). A draft agenda is at
> https://cryptpad.fr/pad/#/2/pad/edit/PCtBphoXkCTiXABJ8cdL0KuZ/
I'm confused: The title
On Tue, 3 Dec 2019 at 10:35, Roger Pau Monne wrote:
>
> Enable Xen timestamps in the automated Xen tests, this is helpful in
> order to figure out if Xen is stuck or just slow in the automated
> tests.
>
> Signed-off-by: Roger Pau Monné
Acked-by: Wei Liu
___
On Tue, 3 Dec 2019 at 10:34, Roger Pau Monne wrote:
>
> 10s is too low for the clang tests, this is the output from a clang
> test:
>
> (XEN) [6.512748] ***
> (XEN) [6.513323] SELFTEST FAILURE: CORRECT BEHAVIOR CANNOT BE GUARANTEED
> (XEN) [
On 03.12.2019 12:04, Roger Pau Monné wrote:
> On Tue, Dec 03, 2019 at 11:03:31AM +0100, Jan Beulich wrote:
>> Furthermore I think this moving around of logic (which imo
>> would better remain at the bottom of the file, well out of
>> sight) is only the second best solution to the issue. The
>> reas
On Tue, Dec 03, 2019 at 11:03:31AM +0100, Jan Beulich wrote:
> On 02.12.2019 12:29, Roger Pau Monne wrote:
> > The tests to check whether the integrated assembler is capable of
> > building Xen should be performed before testing any assembler
> > features, or else the feature specific tests would b
On 03.12.2019 06:41, Marek Marczykowski-Górecki wrote:
> @@ -117,6 +118,35 @@ static int command_write(struct pci_dev *dev, int
> offset, u16 value, void *data)
> pci_clear_mwi(dev);
> }
>
> + if (dev_data && dev_data->allow_interrupt_control) {
> + if (!(cmd
On 03/12/2019 10:33, Roger Pau Monne wrote:
> Hello,
>
> Small series to improve the automated tests, first patch enables Xen
> console timestamps and the second one increases the test timeout to 30s
> since the clang PVH tests already takes ~10s without taking into account
> the time to initialize
Enable Xen timestamps in the automated Xen tests, this is helpful in
order to figure out if Xen is stuck or just slow in the automated
tests.
Signed-off-by: Roger Pau Monné
---
automation/scripts/qemu-smoke-x86-64.sh | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/automatio
Hello,
Small series to improve the automated tests, first patch enables Xen
console timestamps and the second one increases the test timeout to 30s
since the clang PVH tests already takes ~10s without taking into account
the time to initialize QEMU.
Thanks, Roger.
Roger Pau Monne (2):
automati
10s is too low for the clang tests, this is the output from a clang
test:
(XEN) [6.512748] ***
(XEN) [6.513323] SELFTEST FAILURE: CORRECT BEHAVIOR CANNOT BE GUARANTEED
(XEN) [6.513891] ***
(
flight 144496 xen-4.11-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144496/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-prev 6 xen-buildfail REGR. vs. 144376
test-armhf-arm
On 29.11.2019 21:01, Igor Druzhinin wrote:
> --- a/xen/arch/x86/cpu/common.c
> +++ b/xen/arch/x86/cpu/common.c
> @@ -54,7 +54,7 @@ static unsigned int forced_caps[NCAPINTS];
>
> DEFINE_PER_CPU(bool, full_gdt_loaded);
>
> -void __init setup_clear_cpu_cap(unsigned int cap)
> +void setup_clear_cp
On 02.12.2019 12:29, Roger Pau Monne wrote:
> The tests to check whether the integrated assembler is capable of
> building Xen should be performed before testing any assembler
> features, or else the feature specific tests would be stale if the
> integrated assembler is disabled afterwards.
>
> Fi
On 02.12.2019 12:41, Paul Durrant wrote:
> To prevent a PV driver module being removed whilst attached to its other
> end, and hence xenbus calling into potentially invalid text, take a
> reference on the module before calling the probe() method (dropping it if
> unsuccessful) and drop the referenc
On 03/12/2019 07:57, Pawel Wieczorkiewicz wrote:
> ... when all symbols have their status and include flags processed.
>
> Processing special sections may include additional symbols. String
> sections (.rodata*) are included iff they are referenced by at least
> one symbol. Thus, in order to decid
On 28.11.2019 12:32, Jürgen Groß wrote:
> On 28.11.19 12:17, Jan Beulich wrote:
>> On 27.11.2019 18:11, Paul Durrant wrote:
>>> This patch introduces a new iommu_op to facilitate a per-implementation
>>> quarantine set up, and then further code for x86 implementations
>>> (amd and vtd) to set up a
> On Dec 2, 2019, at 5:01 PM, Konrad Rzeszutek Wilk
> wrote:
>
> On Mon, Dec 02, 2019 at 03:55:04PM +, Andrew Cooper wrote:
>> On 02/12/2019 15:53, Konrad Rzeszutek Wilk wrote:
> I plan to release ack the patch in case the missing maintainer's acks
> are not coming in too late.
>>>
> -Original Message-
> From: Xen-devel On Behalf Of
> Andrew Cooper
> Sent: 02 December 2019 19:52
> To: Xen-devel List
> Subject: [Xen-devel] Xen 4.14 and future work
>
> Hello,
>
> Now that 4.13 is on its way out of the door, it is time to look to
> ongoing work.
>
> We have a large
flight 144497 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/144497/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail like 144484
test-amd64-amd64-xl-qemut-win7-amd64
On 02.12.2019 13:39, Alexandru Stefan ISAILA wrote:
> On 29.11.2019 13:41, Jan Beulich wrote:
>> On 21.11.2019 16:02, Alexandru Stefan ISAILA wrote:
>>> Changes since V2:
>>> - Drop static from xenmem_access_to_p2m_access() and declare it
>>> in mem_access.h
>>> - Use xenmem_access_to_p2m_a
On 02.12.2019 15:40, Alexandru Stefan ISAILA wrote:
> On 29.11.2019 13:31, Jan Beulich wrote:
>> On 21.11.2019 16:02, Alexandru Stefan ISAILA wrote:
>>> @@ -4711,6 +4712,18 @@ static int do_altp2m_op(
>>> }
>>> break;
>>>
>>> +case HVMOP_altp2m_set_suppress_ve_multi:
>>>
On 01.12.2019 18:47, Jeremi Piotrowski wrote:
> On Thu, Oct 24, 2019 at 10:12:19AM +0200, Jan Beulich wrote:
>> On 23.10.2019 22:33, Pry Mar wrote:
>>> Hello xen-devel,
>>>
>>> https://paste.debian.net/plain/1109374
>>>
>>> shows my traces from a healthy CentOS 8, xen-4.12.1 dom0 when trying
>>> to
80 matches
Mail list logo