flight 175148 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175148/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-examine 6 xen-install fail in 175144 pass in 175148
test-amd64-i386-xl-qemuu-dmrestr
Currently, p2m for a domain will be teardown from two paths:
(1) The normal path when a domain is destroyed.
(2) The arch_domain_destroy() in the failure path of domain creation.
When tearing down p2m from (1), the part to clear and clean the root
is only needed to do once rather than for every ca
flight 175149 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175149/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a6542894391bae58b7704b2624b541a2b8b9ed93
baseline version:
ovmf 4cb94f20b002c99dd2b4b
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-6.2-rc1-tag
xen: branch for v6.2-rc1
It contains:
- 2 small minor fixes
- a small series fixing memory leaks in error paths
- a small series adding support for virtio PCI-devices in X
flight 175147 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175147/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-examine 8 reboot fail REGR. vs. 173462
test-arm64-arm64-xl
On 12.12.22 05:55, Demi Marie Obenour wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sun, Dec 11, 2022 at 11:50:39PM +0100, Marco Elver wrote:
On Sun, 11 Dec 2022 at 22:34, Demi Marie Obenour
wrote:
On Sun, Dec 11, 2022 at 01:15:06
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- - -BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sun, Dec 11, 2022 at 11:50:39PM +0100, Marco Elver wrote:
> On Sun, 11 Dec 2022 at 22:34, Demi Marie Obenour
> wrote:
> > On Sun, Dec 11, 2022
On Sun, 11 Dec 2022 at 22:34, Demi Marie Obenour
wrote:
> On Sun, Dec 11, 2022 at 01:15:06PM +0100, Juergen Gross wrote:
> > During tests with QubesOS a problem was found which seemed to be related
> > to kfence_protect_page() writing a L1TF vulnerable page table entry [1].
> >
> > Looking into th
flight 175146 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175146/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-examine 8 reboot fail REGR. vs. 173462
test-arm64-arm64-xl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
On Sun, Dec 11, 2022 at 01:15:06PM +0100, Juergen Gross wrote:
> During tests with QubesOS a problem was found which seemed to be related
> to kfence_protect_page() writing a L1TF vulnerable page table entry [1].
>
> Looking into the function I'm se
Use abort() instead of just _exit() in libxl__alloc_failed(). This
is more friendly for debugging, as it will trap into debugger,
systemd-coredump will collect coredump/backtrace etc. It's much more
useful than just "libxl: FATAL ERROR: memory allocation failure (...)"
message without context where
Hi Andrew,
On 23/12/2020 16:34, Andrew Cooper wrote:
Wrappers for xmalloc() and friends, which track allocations tied to a specific
domain.
Check for any leaked memory at domain destruction time.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Roger Pau Monné
CC: Wei Liu
CC: Stefano S
Hi Andrew,
On 23/12/2020 16:34, Andrew Cooper wrote:
This was not the christmas hacking project that I was planning to do, but it
has had some exciting results.
After some discussion on an earlier thread, Tamas has successfully got fuzzing
of Xen working via kfx, and this series is a prototype
flight 175145 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175145/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-examine 8 reboot fail REGR. vs. 173462
test-arm64-arm64-xl
During tests with QubesOS a problem was found which seemed to be related
to kfence_protect_page() writing a L1TF vulnerable page table entry [1].
Looking into the function I'm seeing:
set_pte(pte, __pte(pte_val(*pte) & ~_PAGE_PRESENT));
I don't think this can be correct, as keeping the
Hi Stefano,
On 09/12/2022 22:25, Stefano Stabellini wrote:
We have 3 violations of MISRA C Rule 4.1 ("Octal and hexadecimal escape
sequences shall be terminated") in xen/arch/arm/efi/efi-boot.h. Fix them
and take the opportunity to declare them as static const __initconst and
improve the style.
flight 175144 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175144/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-i386-examine 6 xen-installfail pass in 175141
test-amd64-i386-xl-qemuu-dmrestr
17 matches
Mail list logo