flight 59932 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59932/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 12 guest-saverestore fail REGR. vs. 59059
flight 59834 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59834/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-amd64-amd64-libvirt-xsm 12
On Fri, Jul 24, 2015 at 11:44:52PM -0700, Andy Lutomirski wrote:
I'm all for it, but I think it should be hard-disablable in config,
too, for the -tiny people.
I totally agree.
If we add a runtime disable, let's do a
separate patch, and you and Kees can fight over how general it should
be.
flight 59898 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59898/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-pvops 5 kernel-build fail REGR. vs. 59254
build-i386-pvops
flight 59877 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59877/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 12 guest-saverestore fail REGR. vs. 59059
flight 59833 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59833/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 12 guest-localmigrate
fail REGR. vs. 59817
As well as CC-ing the correct people. I just saw such a request on
xen-users and thought this was worth clarifying here too.
Signed-off-by: Ian Campbell ian.campb...@citrix.com
---
MAINTAINERS | 7 ---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/MAINTAINERS b/MAINTAINERS
On Fri, Jul 24, 2015 at 09:52:01PM -0700, Andy Lutomirski wrote:
I see your wide terminal and raise you a complete rewrite of that
function. Sigh, why did I assume the old code was the right way to do
it?
That's a mostly wrong assumption, as experience proves.
Hah¸ we both missed it. This
On Fri, Jul 24, 2015 at 10:36:44PM -0700, Andy Lutomirski wrote:
modify_ldt has questionable locking and does not synchronize
threads. Improve it: redesign the locking and synchronize all
threads' LDTs using an IPI on all modifications.
This will dramatically slow down modify_ldt in
On Fri, Jul 24, 2015 at 10:36:45PM -0700, Andy Lutomirski wrote:
The modify_ldt syscall exposes a large attack surface and is
unnecessary for modern userspace. Make it optional.
Signed-off-by: Andy Lutomirski l...@kernel.org
---
arch/x86/Kconfig | 17 +
flight 59837 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59837/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-xsm 13 guest-saverestore fail REGR. vs. 59393
test-amd64-i386-pair
Ian Campbell 於 西元2015年07月24日 16:57 寫道:
On Fri, 2015-07-24 at 01:38 +0800, Ting-Wei Lan wrote:
Ian Campbell 於 西元2015年07月21日 23:10 寫道:
On Fri, 2015-07-17 at 00:15 +0800, Ting-Wei Lan wrote:
This all looks pretty good. One comment:
+if test x$qemu_xen_path = x || test x$qemu_xen_path =
xqemu;
On Sat, Jul 25, 2015 at 9:33 AM, Willy Tarreau w...@1wt.eu wrote:
On Sat, Jul 25, 2015 at 09:08:39AM -0700, Andy Lutomirski wrote:
There's one thing that I think is incomplete here. Currently, espfix
triggers if SS points to the LDT. It's possible for SS to point to
the LDT even with
On Sat, Jul 25, 2015 at 2:15 AM, Borislav Petkov b...@alien8.de wrote:
On Fri, Jul 24, 2015 at 10:36:45PM -0700, Andy Lutomirski wrote:
The modify_ldt syscall exposes a large attack surface and is
unnecessary for modern userspace. Make it optional.
Signed-off-by: Andy Lutomirski
Currently, the event channel rebind code is gated with the presence of
the vector callback.
The virtual interrupt controller on ARM has the concept of per-CPU
interrupt (PPI) which allow us to support per-VCPU event channel.
Therefore there is no need of vector callback for ARM.
Xen is already
The commit 6f6c15ef912465b3aaafe709f39bd6026a8b3e72 xen/pvhvm: Remove
the xen_platform_pci int. makes the x86 version of
xen_pci_platform_unplug static.
Therefore we don't need anymore to define a dummy xen_pci_platform_unplug
for ARM.
Signed-off-by: Julien Grall julien.gr...@citrix.com
Cc:
flight 59908 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59908/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 12 guest-saverestore fail REGR. vs. 59059
On Sat, 2015-07-25 at 16:15 +, osstest service owner wrote:
flight 59908 qemu-mainline real [real]
On Sat, Jul 25, 2015 at 09:08:39AM -0700, Andy Lutomirski wrote:
There's one thing that I think is incomplete here. Currently, espfix
triggers if SS points to the LDT. It's possible for SS to point to
the LDT even with modify_ldt disabled, and there's a decent amount of
attack surface there.
On Sat, Jul 25, 2015 at 09:03:54AM -0700, Andy Lutomirski wrote:
On Sat, Jul 25, 2015 at 2:15 AM, Borislav Petkov b...@alien8.de wrote:
Is that default y going to turn into a default n after a grace
period?
Let's see how Willy's default-off sysctl plays out. In the long run,
maybe we'll
On Sat, Jul 25, 2015 at 6:03 AM, Willy Tarreau w...@1wt.eu wrote:
On Sat, Jul 25, 2015 at 09:50:52AM +0200, Willy Tarreau wrote:
On Fri, Jul 24, 2015 at 11:44:52PM -0700, Andy Lutomirski wrote:
I'm all for it, but I think it should be hard-disablable in config,
too, for the -tiny people.
I
When using Linux = 3.19 (commit 47591df) as dom0 on some Intel Ironlake
devices, It is possible to encounter graphics issues that make screen
unreadable or crash the system. It was reported in freedesktop bugzilla:
https://bugs.freedesktop.org/show_bug.cgi?id=90037
As we still cannot find a
On Fri, Jul 24, 2015 at 10:36:45PM -0700, Andy Lutomirski wrote:
The modify_ldt syscall exposes a large attack surface and is
unnecessary for modern userspace. Make it optional.
Andy, you didn't respond whether you think it wouldn't be better to make
it runtime-configurable instead. The goal
On Fri, Jul 24, 2015 at 10:36:43PM -0700, Andy Lutomirski wrote:
Willy and Kees: I left the config option alone. The -tiny people will
like it, and we can always add a sysctl of some sort later.
OK, please ignore my other e-mail I missed this part. I'll see if I
can propose the sysctl
On Fri, Jul 24, 2015 at 11:23 PM, Willy Tarreau w...@1wt.eu wrote:
On Fri, Jul 24, 2015 at 10:36:45PM -0700, Andy Lutomirski wrote:
The modify_ldt syscall exposes a large attack surface and is
unnecessary for modern userspace. Make it optional.
Andy, you didn't respond whether you think it
flight 59875 seabios real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59875/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail REGR. vs. 59567
Tests which did not succeed, but
flight 59907 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59907/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 12 migrate-support-checkfail never pass
test-amd64-amd64-libvirt-xsm 12
flight 59922 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59922/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-freebsd10-i386 12 guest-saverestore fail REGR. vs. 59059
On Sat, Jul 25, 2015 at 10:42:14AM -0700, Andy Lutomirski wrote:
On Sat, Jul 25, 2015 at 9:33 AM, Willy Tarreau w...@1wt.eu wrote:
On Sat, Jul 25, 2015 at 09:08:39AM -0700, Andy Lutomirski wrote:
There's one thing that I think is incomplete here. Currently, espfix
triggers if SS points to
flight 59840 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/59840/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 58581
branch xen-unstable
xen branch xen-unstable
job test-amd64-i386-xl-xsm
test guest-saverestore
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu
On Sat, Jul 25, 2015 at 09:50:52AM +0200, Willy Tarreau wrote:
On Fri, Jul 24, 2015 at 11:44:52PM -0700, Andy Lutomirski wrote:
I'm all for it, but I think it should be hard-disablable in config,
too, for the -tiny people.
I totally agree.
If we add a runtime disable, let's do a
32 matches
Mail list logo