flight 159417 xen-4.11-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/159417/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-dmrestrict-amd64-dmrestrict 12 debian-hvm-install
fail like 159274
test-amd64-i386-x
On 17.02.21 06:12, Marek Marczykowski-Górecki wrote:
Hi,
I'm observing Linux PV/PVH guest crash when I resume it from sleep. I do
this with:
virsh -c xen dompmsuspend mem
virsh -c xen dompmwakeup
But it's possible to trigger it with plain xl too:
xl save -c
The same on HVM
On 16.02.21 21:34, Stefano Stabellini wrote:
+ x86 maintainers
It looks like the tlbflush is getting stuck?
I have seen this case multiple times on customer systems now, but
reproducing it reliably seems to be very hard.
I suspected fifo events to be blamed, but just yesterday I've been
infor
flight 159413 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/159413/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332
test-amd64-i386-xl-
branch xen-unstable
xenbranch xen-unstable
job test-armhf-armhf-xl-multivcpu
testid guest-start
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Hi,
I'm observing Linux PV/PVH guest crash when I resume it from sleep. I do
this with:
virsh -c xen dompmsuspend mem
virsh -c xen dompmwakeup
But it's possible to trigger it with plain xl too:
xl save -c
The same on HVM works fine.
This is on Xen 4.14.1, and with guest kerne
Hi all,
Today Linux uses the swiotlb-xen driver (drivers/xen/swiotlb-xen.c) to
translate addresses for DMA operations in Dom0. Specifically,
swiotlb-xen is used to translate the address of a foreign page (a page
belonging to a domU) mapped into Dom0 before using it for DMA.
This is important beca
On 16/02/2021 07.48, M. Vefa Bicakci wrote:
On 16/02/2021 04.20, Roger Pau Monné wrote:
On Mon, Feb 15, 2021 at 06:46:19PM -0500, M. Vefa Bicakci wrote:
[snipped by Vefa]
>> In any case I think this is too much change, so I would go for a
smaller fix like my proposal below. Can you please t
On Thu, Feb 11, 2021 at 05:19:41PM +, Alex Bennée wrote:
> A string array in device tree is simply a series of \0 terminated
> strings next to each other. As libfdt doesn't support that directly
> we need to build it ourselves.
Hm, that might not make a bad extension to libfdt...
>
> Signed-
flight 159408 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/159408/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-vhd 19 guest-start/debian.repeat fail REGR. vs. 152631
test-amd64-amd64
flight 159399 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/159399/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-credit1 14 guest-start fail REGR. vs. 158387
test-arm64-arm64-xl-c
+ x86 maintainers
It looks like the tlbflush is getting stuck?
On Sat, 6 Feb 2021, Roman Shaposhnik wrote:
> Hi!
>
> all of a sudden (but only after a few days of running normally), on a stock
> Ubuntu 18.04 (Bionic with 4.15.0 kernel) DomU I'm seeing Microsoft's .net
> runtime go into a heave
tree: https://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git linux-next
head: 871997bc9e423f05c7da7c9178e62dde5df2a7f8
commit: 3194a1746e8aabe86075fd3c5e7cf1f4632d7f16 [7/9] xen-netback: don't
"handle" error by BUG()
config: arm64-allyesconfig (attached as .config)
compiler: aarch64-linux
> On Feb 16, 2021, at 4:10 AM, Peter Zijlstra wrote:
>
> On Tue, Feb 09, 2021 at 02:16:49PM -0800, Nadav Amit wrote:
>> @@ -816,8 +821,8 @@ STATIC_NOPV void native_flush_tlb_others(const struct
>> cpumask *cpumask,
>> * doing a speculative memory access.
>> */
>> if (info->freed
Hello Julien,
> On 14 Feb 2021, at 2:35 pm, Julien Grall wrote:
>
> From: Julien Grall
>
> ... are the same.
>
> When the IOMMU is enabled and the domain is direct mapped (e.g. Dom0),
> Xen will insert a 1:1 mapping for each grant mapping in the P2M to
> allow DMA.
>
> This works quite well
On Mon, 15 Feb 2021, Jan Beulich wrote:
> On 14.02.2021 15:35, Julien Grall wrote:
> > From: Julien Grall
> >
> > ... are the same.
> >
> > When the IOMMU is enabled and the domain is direct mapped (e.g. Dom0),
> > Xen will insert a 1:1 mapping for each grant mapping in the P2M to
> > allow DMA.
On Mon, 15 Feb 2021, Jan Beulich wrote:
> On 13.02.2021 14:50, Marek Marczykowski-Górecki wrote:
> > On Fri, Feb 12, 2021 at 06:05:40PM -0800, Stefano Stabellini wrote:
> >> If rombios, seabios and ovmf are all disabled, don't attempt to build
> >> hvmloader.
> >
> > What if you choose to not buil
Ian Jackson writes ("Re: [PATCH v2 04/10] tools/libxl: Fix uninitialised
variable in libxl__domain_get_device_model_uid()"):
> Uh. I think this and the other one seem to be stray hunks which
> each introduce a new uninitialised variable bug ?
I now think (following irc discussion) that I was
Andrew Cooper writes ("[PATCH v2 04/10] tools/libxl: Fix uninitialised variable
in libxl__domain_get_device_model_uid()"):
> Various version of gcc, when compiling with -Og, complain:
>
> libxl_dm.c: In function 'libxl__domain_get_device_model_uid':
> libxl_dm.c:256:12: error: 'kill_by_uid' m
Various version of gcc, when compiling with -Og, complain:
libxl_dm.c: In function 'libxl__domain_get_device_model_uid':
libxl_dm.c:256:12: error: 'kill_by_uid' may be used uninitialized in this
function [-Werror=maybe-uninitialized]
256 | if (kill_by_uid)
|^
With libxl having gotten a lot more constant, now printf_info_sexp() and
printf_info_one_json() can add consts. May not be particularly
important, but it is best to mark things constant when they are known to
be so.
Signed-off-by: Elliott Mitchell
---
tools/xl/xl.h | 2 +-
tools/xl/xl_info
Anything *_is_empty(), *_is_default(), or *_gen_json() is going to be
examining the pointed to thing, not modifying it. This potentially
results in higher-performance output. This also allows spreading
constants further, allowing more checking and security.
Signed-off-by: Elliott Mitchell
---
The rest of the series seems hopeless for stable, so right now I'm merely
resending the 2 which are simpler. During the full series I came across
a bunch of xl and then libxl functions which could have arguments
declared const.
These are the input arguments of *_is_empty() and *_is_default(), whi
Andrew Cooper writes ("[PATCH v2 09/10] tools/libs: Add rule to generate
headers.lst"):
> abi-dumper needs a list of the public header files for shared objects, and
> only accepts this in the form of a file.
>
> No functional change.
>
> Signed-off-by: Andrew Cooper
> Release-Acked-by: Ian Jack
flight 159416 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/159416/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-armhf-armhf-xl 1
abi-dumper needs a list of the public header files for shared objects, and
only accepts this in the form of a file.
No functional change.
Signed-off-by: Andrew Cooper
Release-Acked-by: Ian Jackson
---
CC: Ian Jackson
CC: Wei Liu
CC: Juergen Gross
v2:
* Use set -e to avoid truncated content
Andrew Cooper writes ("[PATCH 10/10] tools/libs: Write out an ABI analysis when
abi-dumper is available"):
> Signed-off-by: Andrew Cooper
...
> +# If abi-dumper is available, write out the ABI analysis
> +ifneq ($(ABI_DUMPER),)
> +libs: $(PKG_ABI)
> +$(PKG_ABI): lib$(LIB_FILE_NAME).so.$(MAJOR).$(
Hi Andrew,
On 12/02/2021 20:01, Andrew Cooper wrote:
Various version of gcc, when compiling with -Og, complain:
xg_dom_arm.c: In function 'meminit':
xg_dom_arm.c:420:19: error: 'p2m_size' may be used uninitialized in this
function [-Werror=maybe-uninitialized]
420 | dom->p2m_siz
Andrew Cooper writes ("[PATCH 08/10] tools: Check for abi-dumper in
./configure"):
> This will be optional. No functional change.
Reviewed-by: Ian Jackson
Jan Beulich writes ("Re: [PATCH 07/10] tools: Use -Og for debug builds when
available"):
> On 12.02.2021 16:39, Andrew Cooper wrote:
> > The recommended optimisation level for debugging is -Og, and is what tools
> > such as gdb prefer. In practice, it equates to -01 with a few specific
> > optimi
Andrew Cooper writes ("[PATCH 05/10] tools/libxl: Fix uninitialised variable in
libxl__write_stub_dmargs()"):
> Various version of gcc, when compiling with -Og, complain:
>
> libxl_dm.c: In function ‘libxl__write_stub_dmargs’:
> libxl_dm.c:2166:16: error: ‘dmargs’ may be used uninitialized in
Andrew Cooper writes ("[PATCH 01/10] tools/xl: Fix exit code for `xl
vkbattach`"):
> Various version of gcc, when compiling with -Og, complain:
>
> xl_vkb.c: In function 'main_vkbattach':
> xl_vkb.c:79:12: error: 'rc' may be used uninitialized in this function
> [-Werror=maybe-uninitialized]
flight 159396 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/159396/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-qemut-debianhvm-i386-xsm 12 debian-hvm-install fail in
159362 pass in 159396
test-amd64-am
Andrew Cooper writes ("[PATCH 10/10] tools/libs: Write out an ABI analysis when
abi-dumper is available"):
> Signed-off-by: Andrew Cooper
Release-Acked-by: Ian Jackson
Andrew Cooper writes ("[PATCH 09/10] tools/libs: Add rule to generate
headers.lst"):
> abi-dumper needs a list of the public header files for shared objects, and
> only accepts this in the form of a file.
Release-Acked-by: Ian Jackson
because it's not run by default, but...
> +headers.lst: FOR
Andrew Cooper writes ("[PATCH 08/10] tools: Check for abi-dumper in
./configure"):
> This will be optional. No functional change.
Release-Acked-by: Ian Jackson
Andrew Cooper writes ("[PATCH 07/10] tools: Use -Og for debug builds when
available"):
> The recommended optimisation level for debugging is -Og, and is what tools
> such as gdb prefer. In practice, it equates to -01 with a few specific
> optimisations turned off.
>
> abi-dumper in particular wa
Andrew Cooper writes ("[PATCH 06/10] stubdom/xenstored: Fix uninitialised
variables in lu_read_state()"):
> Various version of gcc, when compiling with -Og, complain:
>
> xenstored_control.c: In function ‘lu_read_state’:
> xenstored_control.c:540:11: error: ‘state.size’ is used uninitialized
Andrew Cooper writes ("[PATCH 05/10] tools/libxl: Fix uninitialised variable in
libxl__write_stub_dmargs()"):
> Various version of gcc, when compiling with -Og, complain:
>
> libxl_dm.c: In function ‘libxl__write_stub_dmargs’:
> libxl_dm.c:2166:16: error: ‘dmargs’ may be used uninitialized in
Andrew Cooper writes ("[PATCH 04/10] tools/libxl: Fix uninitialised variable in
libxl__domain_get_device_model_uid()"):
> The logic is sufficiently complicated I can't figure out if the complain is
> legitimate or not. There is exactly one path wanting kill_by_uid set to true,
> so default it to
Andrew Cooper writes ("[PATCH v1.1 03/10] tools/libxg: Drop stale p2m logic
from ARM's meminit()"):
> Various version of gcc, when compiling with -Og, complain:
>
> xg_dom_arm.c: In function 'meminit':
> xg_dom_arm.c:420:19: error: 'p2m_size' may be used uninitialized in this
> function [-We
Andrew Cooper writes ("[PATCH 02/10] tools/libxg: Fix uninitialised variable in
write_x86_cpu_policy_records()"):
> Fixes: f6b2b8ec53d ("libxc/save: Write X86_{CPUID,MSR}_DATA records")
> Signed-off-by: Andrew Cooper
Release-Acked-by: Ian Jackson
Andrew Cooper writes ("[PATCH 01/10] tools/xl: Fix exit code for `xl
vkbattach`"):
> Various version of gcc, when compiling with -Og, complain:
>
> xl_vkb.c: In function 'main_vkbattach':
> xl_vkb.c:79:12: error: 'rc' may be used uninitialized in this function
> [-Werror=maybe-uninitialized]
On 16.02.2021 11:28, George Dunlap wrote:
> --- /dev/null
> +++ b/docs/hypervisor-guide/memory-allocation-functions.rst
> @@ -0,0 +1,118 @@
> +.. SPDX-License-Identifier: CC-BY-4.0
> +
> +Xenheap memory allocation functions
> +===
> +
> +In general Xen contains two p
On 05.02.2021 12:13, Jan Beulich wrote:
> On 05.02.2021 11:33, Andrew Cooper wrote:
>> On 05/02/2021 08:11, Jan Beulich wrote:
>>> On 04.02.2021 14:38, Jan Beulich wrote:
Our linker capability check fails with the recent binutils release's ld:
.../check.o:(.debug_aranges+0x6): reloca
branch xen-unstable
xenbranch xen-unstable
job test-arm64-arm64-xl-thunderx
testid guest-start
Tree: linux
git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
T
Linus,
Please git pull the following tag:
git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git
for-linus-5.12-rc1-tag
xen: branch for v5.12-rc1
This batch contains a series of Xen related security fixes, all related
to limited error handling in Xen backend drivers.
Thanks.
Juergen
a
On 16/02/2021 04.20, Roger Pau Monné wrote:
On Mon, Feb 15, 2021 at 06:46:19PM -0500, M. Vefa Bicakci wrote:
This commit aims to fix commit a852040fe3ab ("x86/ept: flush cache when
modifying PTEs and sharing page tables"). The aforementioned commit is
for the stable-4.9 branch of Xen and is a ba
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26931 / XSA-362
version 3
Linux: backends treating grant mapping errors as bugs
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26932 / XSA-361
version 4
Linux: grant mapping error handling issues
UPDATES IN VERSION 4
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26933 / XSA-364
version 3
arm: The cache may not be cleaned for newly allocated scrubbed pages
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26934 / XSA-363
version 3
Linux: display frontend "be-alloc" mode is unsupported
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
===
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Xen Security Advisory CVE-2021-26930 / XSA-365
version 3
Linux: error handling issues in blkback's grant mapping
UPDATES IN VERSION 3
Public release.
ISSUE DESCRIPTION
==
On Tue, Feb 09, 2021 at 02:16:49PM -0800, Nadav Amit wrote:
> @@ -816,8 +821,8 @@ STATIC_NOPV void native_flush_tlb_others(const struct
> cpumask *cpumask,
>* doing a speculative memory access.
>*/
> if (info->freed_tables) {
> - smp_call_function_many(cpumask, fl
On Fri, Feb 12, 2021 at 10:45:32AM -0500, Mike Snitzer wrote:
> On Mon, Nov 16, 2020 at 10:05 AM Christoph Hellwig wrote:
> >
> > Use set_capacity_and_notify to set the size of both the disk and block
> > device. This also gets the uevent notifications for the resize for free.
> >
> > Signed-off-
flight 159391 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/159391/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332
test-amd64-i386-xl-
> On Feb 16, 2021, at 11:16 AM, George Dunlap wrote:
>
>
>
>> On Feb 16, 2021, at 10:55 AM, Julien Grall wrote:
>>
>> Hi George,
>>
>> On 16/02/2021 10:28, George Dunlap wrote:
>>> Document the properties of the various allocators and lay out a clear
>>> rubric for when to use each.
>>> Si
> On Feb 16, 2021, at 10:55 AM, Julien Grall wrote:
>
> Hi George,
>
> On 16/02/2021 10:28, George Dunlap wrote:
>> Document the properties of the various allocators and lay out a clear
>> rubric for when to use each.
>> Signed-off-by: George Dunlap
>> ---
>> This doc is my understanding of t
> On Feb 16, 2021, at 10:28 AM, George Dunlap wrote:
>
> Document the properties of the various allocators and lay out a clear
> rubric for when to use each.
>
> Signed-off-by: George Dunlap
> ---
>
> This doc is my understanding of the properties of the current
> allocators (alloc_xenheap_p
Hi George,
On 16/02/2021 10:28, George Dunlap wrote:
Document the properties of the various allocators and lay out a clear
rubric for when to use each.
Signed-off-by: George Dunlap
---
This doc is my understanding of the properties of the current
allocators (alloc_xenheap_pages, xmalloc, and
Document the properties of the various allocators and lay out a clear
rubric for when to use each.
Signed-off-by: George Dunlap
---
This doc is my understanding of the properties of the current
allocators (alloc_xenheap_pages, xmalloc, and vmalloc), and of Jan's
proposed new wrapper, xvmalloc.
flight 159401 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/159401/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777
build-amd64-libvirt
On Mon, Feb 15, 2021 at 06:46:19PM -0500, M. Vefa Bicakci wrote:
> This commit aims to fix commit a852040fe3ab ("x86/ept: flush cache when
> modifying PTEs and sharing page tables"). The aforementioned commit is
> for the stable-4.9 branch of Xen and is a backported version of commit
> c23274fd0412
flight 159389 qemu-mainline real [real]
flight 159405 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/159389/
http://logs.test-lab.xenproject.org/osstest/logs/159405/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be
flight 159394 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/159394/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 4f4d862c1c7232a18347616d94c343c929657fdb
baseline version:
ovmf 2e1e8c35f3178df95d79d
65 matches
Mail list logo