flight 150260 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150260/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-libvirt-raw 7 xen-boot fail REGR. vs. 150243
Regressions which
On 19.05.20 23:21, Stefano Stabellini wrote:
Hi Juergen, Boris,
I am trying to increase the size of the rings used for Xen 9pfs
connections for performance reasons and also to reduce the likehood of
the backend having to wait on the frontend to free up space from the
ring.
FYI I realized that w
Hi Anchal,
Thank you for the patch! Yet something to improve:
[auto build test ERROR on linus/master]
[also build test ERROR on v5.7-rc6]
[cannot apply to xen-tip/linux-next tip/irq/core tip/auto-latest next-20200519]
[if your patch is applied to the wrong git tree, please drop us a note to help
Hi Anchal,
Thank you for the patch! Yet something to improve:
[auto build test ERROR on linus/master]
[also build test ERROR on v5.7-rc6]
[cannot apply to xen-tip/linux-next tip/irq/core tip/auto-latest next-20200519]
[if your patch is applied to the wrong git tree, please drop us a note to help
flight 150247 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150247/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 7 xen-boot fail REGR. vs. 150227
Tests which did no
On 5/19/20 5:21 PM, Stefano Stabellini wrote:
> Hi Juergen, Boris,
>
> I am trying to increase the size of the rings used for Xen 9pfs
> connections for performance reasons and also to reduce the likehood of
> the backend having to wait on the frontend to free up space from the
> ring.
>
> FYI I re
On Tue, May 19, 2020 at 8:28 PM Roman Shaposhnik wrote:
>
> On Tue, May 19, 2020, 7:15 PM Tamas K Lengyel
> wrote:
>>
>> On Tue, May 19, 2020 at 5:50 PM Roman Shaposhnik wrote:
>> >
>> > On Tue, May 19, 2020 at 4:44 PM Tamas K Lengyel
>> > wrote:
>> > >
>> > > On Tue, May 19, 2020 at 11:23 AM
On Tue, May 19, 2020, 7:15 PM Tamas K Lengyel
wrote:
> On Tue, May 19, 2020 at 5:50 PM Roman Shaposhnik wrote:
> >
> > On Tue, May 19, 2020 at 4:44 PM Tamas K Lengyel
> > wrote:
> > >
> > > On Tue, May 19, 2020 at 11:23 AM Julien Grall wrote:
> > > >
> > > >
> > > >
> > > > On 19/05/2020 04:08
On Tue, May 19, 2020 at 5:50 PM Roman Shaposhnik wrote:
>
> On Tue, May 19, 2020 at 4:44 PM Tamas K Lengyel
> wrote:
> >
> > On Tue, May 19, 2020 at 11:23 AM Julien Grall wrote:
> > >
> > >
> > >
> > > On 19/05/2020 04:08, Tamas K Lengyel wrote:
> > > > On Mon, May 18, 2020 at 5:32 AM Julien Gra
flight 150244 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150244/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-vhd 11 guest-start fail in 150236 pass in 150244
test-armhf-armhf-xl-rtds 16 g
flight 150265 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150265/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Tue, 19 May 2020, Tamas K Lengyel wrote:
> On Tue, May 19, 2020 at 11:23 AM Julien Grall wrote:
> >
> >
> >
> > On 19/05/2020 04:08, Tamas K Lengyel wrote:
> > > On Mon, May 18, 2020 at 5:32 AM Julien Grall wrote:
> > >>
> > >> From: Julien Grall
> > >>
> > >> Hi all,
> > >>
> > >> At the mom
On Tue, May 19, 2020 at 4:44 PM Tamas K Lengyel
wrote:
>
> On Tue, May 19, 2020 at 11:23 AM Julien Grall wrote:
> >
> >
> >
> > On 19/05/2020 04:08, Tamas K Lengyel wrote:
> > > On Mon, May 18, 2020 at 5:32 AM Julien Grall wrote:
> > >>
> > >> From: Julien Grall
> > >>
> > >> Hi all,
> > >>
> >
On Tue, May 19, 2020 at 11:23 AM Julien Grall wrote:
>
>
>
> On 19/05/2020 04:08, Tamas K Lengyel wrote:
> > On Mon, May 18, 2020 at 5:32 AM Julien Grall wrote:
> >>
> >> From: Julien Grall
> >>
> >> Hi all,
> >>
> >> At the moment, a user who wants to boot Xen on the Raspberry Pi 4 can
> >> onl
On Wed, Apr 29, 2020 at 05:51:08PM -0500, Bobby Eshleman wrote:
>
> # Option #1: PE/COFF and Shim
>
... snip ...
>
> # Option #3: Lean on Grub2's LoadFile2() Verification
>
... snip ...
It's safe to say that the options boiled down to #1 and #3. Seeing as how we
may not be able to start pl
Thanks. Looks like send an old one without fix. Did resend the patch again.
On Tue, 2020-05-19 at 23:26 +, Anchal Agarwal wrote:
> Signed-off--by: Thomas Gleixner
The Signed-off-by line needs to be fixed (hint: you have --)
Balbir Singh
From: Aleksei Besogonov
The SNAPSHOT_SET_SWAP_AREA is supposed to be used to set the hibernation
offset on a running kernel to enable hibernating to a swap file.
However, it doesn't actually update the swsusp_resume_block variable. As
a result, the hibernation fails at the last step (after all th
On Tue, 2020-05-19 at 23:26 +, Anchal Agarwal wrote:
> Signed-off--by: Thomas Gleixner
The Signed-off-by line needs to be fixed (hint: you have --)
Balbir Singh
From: Munehisa Kamata
Add freeze, thaw and restore callbacks for PM suspend and hibernation
support. The freeze handler simply disconnects the frotnend from the
backend and frees resources associated with queues after disabling the
net_device from the system. The restore handler just changes the
Many legacy device drivers do not implement power management (PM)
functions which means that interrupts requested by these drivers stay
in active state when the kernel is hibernated.
This does not matter on bare metal and on most hypervisors because the
interrupt is restored on resume without any
From: Munehisa Kamata
Add Xen PVHVM specific system core callbacks for PM suspend and
hibernation support. The callbacks suspend and resume Xen
primitives,like shared_info, pvclock and grant table. Note that
Xen suspend can handle them in a different manner, but system
core callbacks are called f
From: Munehisa Kamata
Guest hibernation is different from xen suspend/resume/live migration.
Xen save/restore does not use pm_ops as is needed by guest hibernation.
Hibernation in guest follows ACPI path and is guest inititated , the
hibernation image is saved within guest as compared to later mo
Hi Juergen, Boris,
I am trying to increase the size of the rings used for Xen 9pfs
connections for performance reasons and also to reduce the likehood of
the backend having to wait on the frontend to free up space from the
ring.
FYI I realized that we cannot choose order 11 or greater in Linux
be
flight 150249 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150249/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
This file is a template that various build-time variables get
substituted into. Make thos substitutions by hand (actually, by
copying the values our file for stretch). And rename the file.
So now we are using our file instead of the grub package's. But it is
the same...
Signed-off-by: Ian Jack
CC: Julien Grall
CC: Stefano Stabellini
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 6fed0b75..77508d19 100644
--- a/Osstest/Debian.pm
+++ b/Osstest/Debian.pm
@@ -1064,7 +1064,7 @
Signed-off-by: Ian Jackson
---
make-hosts-flight | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/make-hosts-flight b/make-hosts-flight
index 92da1c7c..e2c3776a 100755
--- a/make-hosts-flight
+++ b/make-hosts-flight
@@ -26,7 +26,7 @@ blessing=$4
buildflight=$5
: ${ALL_ARCHE
This lets us specify the whole filename, not just a version.
This is needed because for buster we are going to use
debian-10.2.0-ARCH-xfce-CD-1.iso
Signed-off-by: Ian Jackson
---
mfi-common | 9 +
1 file changed, 9 insertions(+)
diff --git a/mfi-common b/mfi-common
index b40f057e..64
"file_is_not_sym" currently only checks for xen-syms. Extend it to
disregard xenpolicy (XSM policy files) and files ending .config (which
are built by the Xen upstream build system in some configurations and
can therefore end up in /boot).
Rename the function accordingly, to "file_is_not_xen_garb
This bug affects us. Cherry pick the changes to the relevant file
from the commit in the upstream debian-installer repo:
https://salsa.debian.org/installer-team/rootskel/commit/0ee43d05b83f8ef5a856f3282e002a111809cef9
Signed-off-by: Ian Jackson
---
overlay-initrd-buster/sbin/reopen-console
Signed-off-by: Ian Jackson
---
production-config | 1 +
1 file changed, 1 insertion(+)
diff --git a/production-config b/production-config
index e3870d47..6372ac9a 100644
--- a/production-config
+++ b/production-config
@@ -91,6 +91,7 @@ TftpNetbootGroup osstest
TftpDiVersion_wheezy 2016-06-08
T
src:grub2 is RFH in Debian, which is a contributory factor to these
patches in #789798 and #792547 languishing.
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 8380c428..0958d080 1006
XSM is enabled by adding "flask=enforcing" as a Xen command line
argument, and providing the policy file as a grub module.
We make entries for both with and without XSM. If XSM is not compiled
into Xen, then there are no policy files, so no change to the boot
options.
Signed-off-by: Ian Jackson
Debian #778564 remains open.
Signed-off-by: Ian Jackson
---
ts-host-install | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-host-install b/ts-host-install
index fe26f70f..253dbb5d 100755
--- a/ts-host-install
+++ b/ts-host-install
@@ -152,7 +152,7 @@ END
my $do
buster cannot boot in so little because its initramfs and kernel are
too large. Bump it to 2G.
However, our armhf test nodes have very little RAM. And the Debian
armhf does fit in them as a guest still, so use a smaller value there.
Keying this off the architecture rather than the available hos
This is from 41e42571ebc50fa351cd63ce40044946652c5c72 in Debian's grub
package.
We are going to want to modify this to support XSM/FLASK and cope with
upstream build outputs.
In this commit we dump the exact file contents across. It's not
effective right now because of the ".in" extension. In f
Signed-off-by: Ian Jackson
---
production-config | 3 +++
1 file changed, 3 insertions(+)
diff --git a/production-config b/production-config
index 103b8915..f0ddc132 100644
--- a/production-config
+++ b/production-config
@@ -98,6 +98,9 @@ DebianSnapshotBackports_jessie
http://snapshot.debian.or
This marginally reduces command line clobber. This alias has been
supported approximately forever. (And this code is currently only
used when DebconfPriority is set, which it generally isn't.)
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-
This works like LinuxSerialConsole.
I originally wrote this to try to work around #940028, where multiple
d-i autoinstalls run in parallel leading to hard-to-debug lossage!
Explicitly specing the console causes it to run only on that one.
However, it turns out that explicitly specifying the conso
In buster, it appears that specifying locale on the command line is
not sufficient. Rather than adding more things to the command line,
instead, just say `priority=critical', by defaulting $debconf_priority
to 'critical'.
I think this change should be fine for earlier suites too.
Signed-off-by:
This involves a new ts-debian-di-fixup script, which runs after
xen-tools.
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 14 ++
sg-run-job | 1 +
ts-debian-di-fixup | 29 +
ts-debian-fixup| 1 +
4 files changed, 45 insertions(+)
create
Signed-off-by: Ian Jackson
---
Osstest.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest.pm b/Osstest.pm
index 1e381d8f..6395 100644
--- a/Osstest.pm
+++ b/Osstest.pm
@@ -87,7 +87,7 @@ our %c = qw(
Images images
-DebianSuite stretch
+DebianSuite b
This installs a pam rule which causes logins to hang. It also seems
to cause some kind of udev wedge.
We are using sysvinit so this package is not desirable. Empirically,
removing it makes the system work.
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 1 +
1 file changed, 1 insertion(+)
This is a complex interaction between update-grub and the Xen build
system on ARM64. Not sure exactly who to blame but since we have our
own 20_linux_xen bodge, let's wait until we don't.
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 12 +++-
1 file changed, 11 insertions(+), 1 del
Otherwise we get this question:
| You may use the whole volume group for guided partitioning, or part
| of it. [...]
| Amount of volume group to use for guided partitioning:
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 1 +
1 file changed, 1 insertion(+)
diff --git a/Osstest/Debia
We are going to patch this file to work around a bug, using the new
overlay mechanism.
The first step is to include the file in our overlay so we overwrite
it. Currently, this is a no-op, so no functional change.
Signed-off-by: Ian Jackson
---
overlay-initrd-buster/sbin/reopen-console | 94 +++
Really we should fix this by making a .deb in Debian that we could
install. But this is a longer-term project.
Signed-off-by: Ian Jackson
---
ts-host-install | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-host-install b/ts-host-install
index 7a72a867..fe26f70f 100755
---
This lets us patch the installer more easily.
No uses yet.
Signed-off-by: Ian Jackson
---
mg-debian-installer-update | 20
1 file changed, 20 insertions(+)
diff --git a/mg-debian-installer-update b/mg-debian-installer-update
index f1e682f9..fb4fe2ab 100755
--- a/mg-debian-
CC: Julien Grall
CC: Stefano Stabellini
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index bec72788..6fed0b75 100644
--- a/Osstest/Debian.pm
+++ b/Osstest/Debian.pm
@@ -248,7 +248,7 @@
We need various fixes that are not in buster, sadly.
Signed-off-by: Ian Jackson
---
production-config | 1 +
1 file changed, 1 insertion(+)
diff --git a/production-config b/production-config
index f0ddc132..e3870d47 100644
--- a/production-config
+++ b/production-config
@@ -107,6 +107,7 @@ Tftp
multiboot[2] isn't supported.
Also link to the bug report.
CC: Julien Grall
CC: Stefano Stabellini
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 77508d19..151677ed 100644
--- a
Nothing uses this yet.
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 5 +
1 file changed, 5 insertions(+)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 151677ed..c0b669c9 100644
--- a/Osstest/Debian.pm
+++ b/Osstest/Debian.pm
@@ -448,6 +448,11 @@ sub setupboot_grub2 () {
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Osstest/Debian.pm b/Osstest/Debian.pm
index 6c289cc7..e1ce757e 100644
--- a/Osstest/Debian.pm
+++ b/Osstest/Debian.pm
@@ -1617,7 +1617,7 @@ sub debian_dhcp_rofs_fix ($$) {
# /
systemd does not regard the contents of the random seed file as useful
for the purposes of placating the kernel's entropy tracker. As a
result, the system hangs at boot waiting for entropy.
Fix this by providing a small program which can be used to load a seed
file into /dev/random and also call
Empirically some of these operations can take longer than 30s,
especially with a cold cache.
Note that because of host sharing and our on-host apt lock, the
timeout needs to be the same for every apt operation: a fast operation
could be blocked behind a slow one.
Signed-off-by: Ian Jackson
---
We really only used this to check how many levels deep in { we are.
That can be done by checking $#offsets, which is >0 if we are in a
submenu and not otherwise. We lose the ability to report the start
line of the submenu, but that's OK.
But as a bonus, we no longer bomb out on nested submenus: p
osstest uses this for transferring configuration, build artefacts, and
so on.
In Debian stretch and earlier, rsync happened to be pulled in by
something else.
Signed-off-by: Ian Jackson
---
ts-xen-build-prep | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/ts-xen-build-prep b
In buster, d-i wants when setting up the network, ie before the
preseed is loaded.
We leave it in the preseed too because why not.
I think this change should be fine for older versions of Debian.
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 3 ++-
1 file changed, 2 insertions(+), 1 delet
Because systemd did something obnoxious, the kernel retaliated in the
game of Core Wars by hiding all arguments before `--' from userspace.
So use `---' instead so that all the arguments remain visible.
This in some sense now applies to host installs a change we had
already made to Debian HVM gues
For reasons I don't propose to investigate, on buster udevd shows up
like this:
2019-11-26 18:13:48 Z LEAKED [process 2633 /lib/systemd/systemd-udevd]
process: root 2633 1555 0 18:10 ?00:00:00
/lib/systemd/systemd-udevd
This does not match our suppression. Add an additional su
The documentation seesm to think this is the default but empirically
it isn't. In our environment --yes is fine.
I have reported this to Debian as #953183. Also vaguely related (and
discovered by me at the same time) is #953185.
This came up while trying to get things work on buster. I don't k
buster is Debian stable right now. We don't want to be using
oldstable because Debian have a history of breaking it.
Paul: we should have a conversation about whether this should be
pushed soon, or deferred until after the Xen 4.14 release.
I have yet to do a final full formal retest of this ser
This seems mostly to affect buster but it could in principle affect
earlier releases too I think.
In principle it would be nice to fix this bug, and to have a proper
test for it, but a reliable test is hard and an unreliable one is not
useful. So I guess we are going to have this workaround
indef
flight 150243 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150243/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail like 150235
test-amd64-amd64-xl-qemuu-win7-amd6
On 19/05/2020 17:09, Jan Beulich wrote:
> On 19.05.2020 17:33, Andrew Cooper wrote:
>> On 19/05/2020 15:48, Jan Beulich wrote:
>>> On 19.05.2020 16:11, Andrew Cooper wrote:
Given that shadow frames are limited to 44 bits anyway (and not yet
levelled safely in the migration stream), my sug
On Tue, May 19, 2020 at 04:52:58PM +0100, Anthony PERARD wrote:
> On Tue, May 19, 2020 at 04:31:01PM +0200, Roger Pau Monne wrote:
> > has_igd_gfx_passthru is only available when QEMU is built with
> > CONFIG_XEN_PCI_PASSTHROUGH, and hence shouldn't be used in common
> > code without checking if it
On 19/05/2020 04:08, Tamas K Lengyel wrote:
On Mon, May 18, 2020 at 5:32 AM Julien Grall wrote:
From: Julien Grall
Hi all,
At the moment, a user who wants to boot Xen on the Raspberry Pi 4 can
only use the first GB of memory.
This is because several devices cannot DMA above 1GB but Xen
From: Julien Grall
The raspberry PI 4 has devices that can only DMA into the first GB of
the RAM. Therefore we want allocate as much as possible memory below 1GB
for dom0.
Use the recently introduced dma_bitsize field to specify the DMA width
supported.
Signed-off-by: Julien Grall
Reported-by:
From: Julien Grall
At the moment, Xen is assuming that all the devices are at least 32-bit
DMA capable. However, some SoCs have devices that may be able to access
a much restricted range. For instance, the Raspberry PI 4 has devices
that can only access the first GB of RAM.
The function arch_get
From: Julien Grall
At the moment, Xen is assuming that all the devices are at least 32-bit
DMA capable. However, some SoC have devices that may be able to access
a much restricted range. For instance, the RPI has devices that can
only access the first 1GB of RAM.
The structure platform_desc is n
From: Julien Grall
Hi all,
At the moment, a user who wants to boot Xen on the Raspberry Pi 4 can
only use the first GB of memory.
This is because several devices cannot DMA above 1GB but Xen doesn't
necessarily allocate memory for Dom0 below 1GB.
This small series is trying to address the prob
Hi Corey,
On 19/05/2020 01:02, Corey Minyard wrote:
On Mon, May 18, 2020 at 08:36:08PM +, Volodymyr Babchuk wrote:
Hi Julien,
On Mon, 2020-05-18 at 12:30 +0100, Julien Grall wrote:
From: Julien Grall
The raspberry PI 4 has devices that can only DMA into the first GB of
the RAM. Therefor
On 18/05/2020 21:36, Volodymyr Babchuk wrote:
Hi Julien,
Hi,
On Mon, 2020-05-18 at 12:30 +0100, Julien Grall wrote:
From: Julien Grall
The raspberry PI 4 has devices that can only DMA into the first GB of
the RAM. Therefore we want allocate as much as possible memory below 1GB
for dom0
On 18/05/2020 21:34, Volodymyr Babchuk wrote:
Hi Julien,
Hi Volodymyr,
Thank you for the review.
On Mon, 2020-05-18 at 12:30 +0100, Julien Grall wrote:
From: Julien Grall
At the moment, Xen is assuming that all the devices are at least 32-bit
DMA capable. However, some SoCs have devic
flight 150245 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150245/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 19.05.2020 17:33, Andrew Cooper wrote:
> On 19/05/2020 15:48, Jan Beulich wrote:
>> On 19.05.2020 16:11, Andrew Cooper wrote:
>>> Given that shadow frames are limited to 44 bits anyway (and not yet
>>> levelled safely in the migration stream), my suggestion for fixing this
>>> was just to use on
On 19/05/2020 15:55, Jan Beulich wrote:
> On 19.05.2020 16:29, Andrew Cooper wrote:
>> On 19/05/2020 09:14, Jan Beulich wrote:
>>> On 18.05.2020 17:38, Andrew Cooper wrote:
The reserved_bit_page_fault() paths effectively turn reserved bit faults
into
a warning, but in the light of L
On Tue, May 19, 2020 at 04:31:01PM +0200, Roger Pau Monne wrote:
> has_igd_gfx_passthru is only available when QEMU is built with
> CONFIG_XEN_PCI_PASSTHROUGH, and hence shouldn't be used in common
> code without checking if it's available.
>
> Fixes: 46472d82322d0 ('xen: convert "-machine igd-pas
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 16:37
> To: p...@xen.org
> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
> 'Andrew Cooper'
> ; 'George Dunlap' ; 'Ian
> Jackson'
> ; 'Julien Grall' ; 'Stefano
> Stabellini'
> ; 'Wei Liu' ; 'Volodymyr Babchuk'
> ;
> 'Ro
flight 150238 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150238/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 4 memdisk-try-append fail REGR. vs. 150227
Tests which did no
On 19.05.2020 17:32, Paul Durrant wrote:
>> -Original Message-
>> From: Jan Beulich
>> Sent: 19 May 2020 16:18
>> To: p...@xen.org
>> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
>> 'Andrew Cooper'
>> ; 'George Dunlap' ;
>> 'Ian Jackson'
>> ; 'Julien Grall' ; 'Stefano
>> Stabell
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 16:34
> To: p...@xen.org
> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
> 'Ian Jackson'
> ; 'Wei Liu' ; 'Andrew Cooper'
> ;
> 'George Dunlap' ; 'Julien Grall' ;
> 'Stefano Stabellini'
>
> Subject: Re: [PATCH v3 4/5] c
On Tue, May 19, 2020 at 11:21 AM Wei Liu wrote:
>
> On Tue, May 19, 2020 at 04:10:09PM +0100, Ian Jackson wrote:
> > Jason Andryuk writes ("[PATCH v7 07/19] libxl: write qemu arguments into
> > separate xenstore keys"):
> > > From: Marek Marczykowski-Górecki
> > >
> > > This allows using argumen
On 19.05.2020 17:21, Paul Durrant wrote:
>> From: Jan Beulich
>> Sent: 19 May 2020 15:08
>>
>> On 14.05.2020 12:44, Paul Durrant wrote:
>>> --- a/xen/include/public/save.h
>>> +++ b/xen/include/public/save.h
>>> @@ -73,7 +73,16 @@ struct domain_save_header {
>>> };
>>> DECLARE_DOMAIN_SAVE_TYPE(H
On 19/05/2020 15:48, Jan Beulich wrote:
> On 19.05.2020 16:11, Andrew Cooper wrote:
>> On 19/05/2020 09:34, Jan Beulich wrote:
>>> On 18.05.2020 17:38, Andrew Cooper wrote:
@@ -1439,6 +1418,18 @@ void do_page_fault(struct cpu_user_regs *regs)
if ( unlikely(fixup_page_fault(addr, regs
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 16:18
> To: p...@xen.org
> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
> 'Andrew Cooper'
> ; 'George Dunlap' ; 'Ian
> Jackson'
> ; 'Julien Grall' ; 'Stefano
> Stabellini'
> ; 'Wei Liu' ; 'Volodymyr Babchuk'
> ;
> 'Ro
On 19/05/2020 16:28, Jan Beulich wrote:
> Address late comments on ecb913be4aaa ("x86/mem-paging: correct
> p2m_mem_paging_prep()'s error handling"):
> - insert a gprintk() ahead of domain_crash(),
> - add a comment.
>
> Requested-by: Andrew Cooper
> Signed-off-by: Jan Beulich
Reviewed-by: Andre
Address late comments on ecb913be4aaa ("x86/mem-paging: correct
p2m_mem_paging_prep()'s error handling"):
- insert a gprintk() ahead of domain_crash(),
- add a comment.
Requested-by: Andrew Cooper
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/mm/mem_paging.c
+++ b/xen/arch/x86/mm/mem_paging.c
@
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 15:08
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Paul Durrant ; Ian
> Jackson
> ; Wei Liu ; Andrew Cooper
> ; George
> Dunlap ; Julien Grall ; Stefano
> Stabellini
>
> Subject: Re: [PATCH v3 4/5] common/domain:
On Tue, May 19, 2020 at 04:10:09PM +0100, Ian Jackson wrote:
> Jason Andryuk writes ("[PATCH v7 07/19] libxl: write qemu arguments into
> separate xenstore keys"):
> > From: Marek Marczykowski-Górecki
> >
> > This allows using arguments with spaces, like -append, without
> > nominating any speci
On 19.05.2020 17:10, Paul Durrant wrote:
>> From: Jan Beulich
>> Sent: 19 May 2020 15:24
>>
>> On 19.05.2020 16:04, Paul Durrant wrote:
From: Jan Beulich
Sent: 19 May 2020 14:04
On 14.05.2020 12:44, Paul Durrant wrote:
> +/*
> + * Register save and restore handlers. Sa
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 14:49
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Paul Durrant ;
> Daniel De Graaf
> ; Ian Jackson ; Wei Liu
> ; Andrew Cooper
> ; George Dunlap ; Julien
> Grall ;
> Stefano Stabellini
> Subject: Re: [PATCH v3 2
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 15:24
> To: p...@xen.org
> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
> 'Andrew Cooper'
> ; 'George Dunlap' ; 'Ian
> Jackson'
> ; 'Julien Grall' ; 'Stefano
> Stabellini'
> ; 'Wei Liu' ; 'Volodymyr Babchuk'
> ;
> 'Ro
Jason Andryuk writes ("[PATCH v7 07/19] libxl: write qemu arguments into
separate xenstore keys"):
> From: Marek Marczykowski-Górecki
>
> This allows using arguments with spaces, like -append, without
> nominating any special "separator" character.
>
> Signed-off-by: Marek Marczykowski-Górecki
Jason Andryuk writes ("[PATCH v7 06/19] libxl: Use libxl__xs_* in
libxl__write_stub_dmargs"):
> Re-work libxl__write_stub_dmargs to use libxl_xs_* functions in a loop.
Cool, thank you!
Acked-by: Ian Jackson
Hi. My attention was drawn to this thread.
As I understand it, everyone is agreed that deduplicating the
implementation is good (I also agree). The debate is only between:
1. Put it in xen/ until an arch comes along that needs something
different, at which point maybe introduce an asm-generic
On 19.05.2020 16:29, Andrew Cooper wrote:
> On 19/05/2020 09:14, Jan Beulich wrote:
>> On 18.05.2020 17:38, Andrew Cooper wrote:
>>> The reserved_bit_page_fault() paths effectively turn reserved bit faults
>>> into
>>> a warning, but in the light of L1TF, the real impact is far more serious.
>>>
>
On 19.05.2020 16:11, Andrew Cooper wrote:
> On 19/05/2020 09:34, Jan Beulich wrote:
>> On 18.05.2020 17:38, Andrew Cooper wrote:
>>> @@ -1439,6 +1418,18 @@ void do_page_fault(struct cpu_user_regs *regs)
>>> if ( unlikely(fixup_page_fault(addr, regs) != 0) )
>>> return;
>>>
>>> +
has_igd_gfx_passthru is only available when QEMU is built with
CONFIG_XEN_PCI_PASSTHROUGH, and hence shouldn't be used in common
code without checking if it's available.
Fixes: 46472d82322d0 ('xen: convert "-machine igd-passthru" to an accelerator
property')
Signed-off-by: Roger Pau Monné
---
Cc
On 19/05/2020 09:14, Jan Beulich wrote:
> On 18.05.2020 17:38, Andrew Cooper wrote:
>> The reserved_bit_page_fault() paths effectively turn reserved bit faults into
>> a warning, but in the light of L1TF, the real impact is far more serious.
>>
>> Xen does not have any reserved bits set in its page
1 - 100 of 157 matches
Mail list logo