Re: [PATCH v2 0/4] Support xen-driven USB3 debug capability

2021-05-13 Thread Greg Kroah-Hartman
On Thu, May 13, 2021 at 06:56:47PM -0600, Connor Davis wrote: > Hi all, > > This goal of this series is to allow the USB3 debug capability (DbC) to be > safely used by xen while linux runs as dom0. Patch 2/4 does not seem to be showing up anywhere, did it get lost? thanks, greg k-h

[xen-unstable test] 161939: regressions - trouble: broken/fail/pass

2021-05-13 Thread osstest service owner
flight 161939 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/161939/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl broken test-armhf-armhf-xl 5 host-inst

Re: [PATCH v2 1/5] xen/char: Default HAS_NS16550 to y only for X86 and ARM

2021-05-13 Thread Elliott Mitchell
On Thu, May 13, 2021 at 10:17:08PM -0600, Connor Davis wrote: > Defaulting to yes only for X86 and ARM reduces the requirements > for a minimal build when porting new architectures. > > Signed-off-by: Connor Davis > --- > xen/drivers/char/Kconfig | 2 +- > 1 file changed, 1 insertion(+), 1 delet

Re: [PATCH v2 0/5] Minimal build for RISCV

2021-05-13 Thread Alistair Francis
On Fri, May 14, 2021 at 2:18 PM Connor Davis wrote: > > Hi all, > > This series introduces a minimal build for RISCV. It is based on Bobby's > previous work from last year[0]. I have worked to rebase onto current Xen, > as well as update the various header files borrowed from Linux. > > This serie

RE: Discussion of Xenheap problems on AArch64

2021-05-13 Thread Henry Wang
> From: Julien Grall Hi Julien, > > On 11/05/2021 02:11, Henry Wang wrote: > > Hi Julien, > Hi Henry, > > > >> From: Julien Grall > >> Hi Henry, > >> > >> On 07/05/2021 05:06, Henry Wang wrote: > From: Julien Grall > On 28/04/2021 10:28, Henry Wang wrote: > >> [...] > >> > >>> when I

[PATCH v2 5/5] automation: add container for riscv64 builds

2021-05-13 Thread Connor Davis
Add a container for cross-compiling xen to riscv64. This just includes the cross-compiler and necessary packages for building xen itself (packages for tools, stubdoms, etc., can be added later). To build xen in the container run the following: $ make XEN_TARGET_ARCH=riscv64 SUBSYSTEMS=xen Signed

[PATCH v2 3/5] xen: Fix build when !CONFIG_GRANT_TABLE

2021-05-13 Thread Connor Davis
Move struct grant_table; in grant_table.h above ifdef CONFIG_GRANT_TABLE. This fixes the following: /build/xen/include/xen/grant_table.h:84:50: error: 'struct grant_table' declared inside parameter list will not be visible outside of this definition or declaration [-Werror] 84 | static inline i

[PATCH v2 2/5] xen/common: Guard iommu symbols with CONFIG_HAS_PASSTHROUGH

2021-05-13 Thread Connor Davis
The variables iommu_enabled and iommu_dont_flush_iotlb are defined in drivers/passthrough/iommu.c and are referenced in common code, which causes the link to fail when !CONFIG_HAS_PASSTHROUGH. Guard references to these variables in common code so that xen builds when !CONFIG_HAS_PASSTHROUGH. Sign

[PATCH v2 0/5] Minimal build for RISCV

2021-05-13 Thread Connor Davis
Hi all, This series introduces a minimal build for RISCV. It is based on Bobby's previous work from last year[0]. I have worked to rebase onto current Xen, as well as update the various header files borrowed from Linux. This series provides the patches necessary to get a minimal build working. Th

[PATCH v2 1/5] xen/char: Default HAS_NS16550 to y only for X86 and ARM

2021-05-13 Thread Connor Davis
Defaulting to yes only for X86 and ARM reduces the requirements for a minimal build when porting new architectures. Signed-off-by: Connor Davis --- xen/drivers/char/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/drivers/char/Kconfig b/xen/drivers/char/Kconfig ind

[PATCH v4 1/2] docs/designs/launch: Hyperlaunch design document

2021-05-13 Thread Christopher Clark
From: "Daniel P. Smith" Adds a design document for Hyperlaunch, formerly DomB mode of dom0less. Signed-off-by: Christopher Clark Signed-off by: Daniel P. Smith Reviewed-by: Rich Persaud --- Changes since v3: * Rename the Landscape table * Changed Crash Domain to Recovery Domain * amended t

[PATCH v4 2/2] docs/designs/launch: Hyperlaunch device tree

2021-05-13 Thread Christopher Clark
From: "Daniel P. Smith" Adds a design document for Hyperlaunch device tree structure. Signed-off-by: Christopher Clark Signed-off by: Daniel P. Smith --- .../designs/launch/hyperlaunch-devicetree.rst | 343 ++ 1 file changed, 343 insertions(+) create mode 100644 docs/designs/

[PATCH v4 0/2] Introducing Hyperlaunch capability design (formerly: DomB mode of dom0less)

2021-05-13 Thread Christopher Clark
We are submitting for inclusion in the Xen documentation: - the Hyperlaunch design document, and - the Hyperlaunch device tree design document to describe a new method for launching the Xen hypervisor. The Hyperlaunch feature builds upon prior dom0less work, to bring a flexible and security-mind

Re: [PATCH for-next 5/6] xen: Add files needed for minimal riscv build

2021-05-13 Thread Connor Davis
On 3/12/21 10:09 AM, Jan Beulich wrote: On 25.02.2021 16:24, Connor Davis wrote: --- a/xen/include/public/hvm/save.h +++ b/xen/include/public/hvm/save.h @@ -106,6 +106,8 @@ DECLARE_HVM_SAVE_TYPE(END, 0, struct hvm_save_end); #include "../arch-x86/hvm/save.h" #elif defined(__arm__) || defin

Uses of /hypervisor memory range (was: FreeBSD/Xen/ARM issues)

2021-05-13 Thread Elliott Mitchell
Upon thinking about it, this seems appropriate to bring to the attention of the Xen development list since it seems to have wider implications. On Wed, May 12, 2021 at 11:08:39AM +0100, Julien Grall wrote: > On 12/05/2021 03:37, Elliott Mitchell wrote: > > > > What about the approach to the gran

[qemu-mainline test] 161938: regressions - FAIL

2021-05-13 Thread osstest service owner
flight 161938 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/161938/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs. 152631 test-amd64-am

Re: [PATCH RFCv2 08/15] xen/arm32: mm: Check if the virtual address is shared before updating it

2021-05-13 Thread Stefano Stabellini
On Thu, 13 May 2021, Julien Grall wrote: > On Thu, 13 May 2021, 23:32 Stefano Stabellini, wrote: > On Wed, 12 May 2021, Julien Grall wrote: > > Hi Stefano, > > > > On 12/05/2021 23:00, Stefano Stabellini wrote: > > > On Sun, 25 Apr 2021, Julien Grall wrote: > >

[PATCH v2 3/4] usb: dbgp: Fix return values for reset prep and startup

2021-05-13 Thread Connor Davis
Callers of dbgp_reset_prep treat a 0 return value as "stop using the debug port", which means they don't make any subsequent calls to dbgp_reset_prep or dbgp_external_startup. To ensure the callers' interpretation is correct, first return -EPERM from xen_dbgp_op if !xen_initial_domain(). This ensu

[PATCH v2 2/4] xen: Export dbgp functions when CONFIG_XEN_DOM0 is enabled

2021-05-13 Thread Connor Davis
Export xen_dbgp_reset_prep and xen_dbgp_external_startup when CONFIG_XEN_DOM0 is defined. This allows use of these symbols even if CONFIG_EARLY_PRINK_DBGP is defined. Signed-off-by: Connor Davis Acked-by: Juergen Gross --- drivers/xen/dbgp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)

[PATCH v2 1/4] usb: early: Avoid using DbC if already enabled

2021-05-13 Thread Connor Davis
Check if the debug capability is enabled in early_xdbc_parse_parameter, and if it is, return with an error. This avoids collisions with whatever enabled the DbC prior to linux starting. Signed-off-by: Connor Davis --- drivers/usb/early/xhci-dbc.c | 10 ++ 1 file changed, 10 insertions(+)

[PATCH v2 0/4] Support xen-driven USB3 debug capability

2021-05-13 Thread Connor Davis
Hi all, This goal of this series is to allow the USB3 debug capability (DbC) to be safely used by xen while linux runs as dom0. The first patch prevents the early DbC driver from using an already-running DbC. The second exports xen_dbgp_reset_prep and xen_dbgp_external_startup functions when CON

Re: [PATCH RFCv2 08/15] xen/arm32: mm: Check if the virtual address is shared before updating it

2021-05-13 Thread Julien Grall
On Thu, 13 May 2021, 23:32 Stefano Stabellini, wrote: > On Wed, 12 May 2021, Julien Grall wrote: > > Hi Stefano, > > > > On 12/05/2021 23:00, Stefano Stabellini wrote: > > > On Sun, 25 Apr 2021, Julien Grall wrote: > > > > From: Julien Grall > > > > > > > > Only the first 2GB of the virtual addr

Re: [PATCH RFCv2 11/15] xen/arm: mm: Allow page-table allocation from the boot allocator

2021-05-13 Thread Stefano Stabellini
On Sun, 25 Apr 2021, Julien Grall wrote: > From: Julien Grall > > At the moment, page-table can only be allocated from domheap. This means > it is not possible to create mapping in the page-tables via > map_pages_to_xen() if page-table needs to be allocated. > > In order to avoid open-coding pag

Re: [PATCH RFCv2 02/15] xen/arm: lpae: Use the generic helpers to defined the Xen PT helpers

2021-05-13 Thread Stefano Stabellini
On Wed, 12 May 2021, Julien Grall wrote: > Hi Stefano, > > On 12/05/2021 22:30, Stefano Stabellini wrote: > > On Wed, 12 May 2021, Julien Grall wrote: > > > > > +#define LPAE_SHIFT LPAE_SHIFT_GS(PAGE_SHIFT) > > > > > +#define LPAE_ENTRIESLPAE_ENTRIES_GS(PAGE_SHIFT) > > > > > +#def

Re: [PATCH RFCv2 08/15] xen/arm32: mm: Check if the virtual address is shared before updating it

2021-05-13 Thread Stefano Stabellini
On Wed, 12 May 2021, Julien Grall wrote: > Hi Stefano, > > On 12/05/2021 23:00, Stefano Stabellini wrote: > > On Sun, 25 Apr 2021, Julien Grall wrote: > > > From: Julien Grall > > > > > > Only the first 2GB of the virtual address space is shared between all > > > the page-tables on Arm32. > > >

Re: [PATCH RFCv2 10/15] xen/arm: mm: Allocate xen page tables in domheap rather than xenheap

2021-05-13 Thread Stefano Stabellini
On Thu, 13 May 2021, Julien Grall wrote: > Hi Stefano, > > On 12/05/2021 23:44, Stefano Stabellini wrote: > > On Sun, 25 Apr 2021, Julien Grall wrote: > > > From: Julien Grall > > > > > > xen_{un,}map_table() already uses the helper to map/unmap pages > > > on-demand (note this is currently a NO

[linux-linus test] 161936: regressions - FAIL

2021-05-13 Thread osstest service owner
flight 161936 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/161936/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

[xen-unstable-smoke test] 161937: tolerable all pass - PUSHED

2021-05-13 Thread osstest service owner
flight 161937 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/161937/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Regressed XSA-286, was [xen-unstable test] 161917: regressions - FAIL

2021-05-13 Thread Andrew Cooper
On 13/05/2021 04:56, osstest service owner wrote: > flight 161917 xen-unstable real [real] > http://logs.test-lab.xenproject.org/osstest/logs/161917/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > test-arm64-arm64-examine 8 re

[qemu-mainline test] 161924: regressions - FAIL

2021-05-13 Thread osstest service owner
flight 161924 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/161924/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs. 152631 test-amd64-am

Re: Discussion of Xenheap problems on AArch64

2021-05-13 Thread Julien Grall
On 11/05/2021 02:11, Henry Wang wrote: Hi Julien, Hi Henry, From: Julien Grall Hi Henry, On 07/05/2021 05:06, Henry Wang wrote: From: Julien Grall On 28/04/2021 10:28, Henry Wang wrote: [...] when I continue booting Xen, I got following error log: (XEN) CPU:0 (XEN) PC: 00

Re: [PATCH RFCv2 10/15] xen/arm: mm: Allocate xen page tables in domheap rather than xenheap

2021-05-13 Thread Julien Grall
Hi Stefano, On 12/05/2021 23:44, Stefano Stabellini wrote: On Sun, 25 Apr 2021, Julien Grall wrote: From: Julien Grall xen_{un,}map_table() already uses the helper to map/unmap pages on-demand (note this is currently a NOP on arm64). So switching to domheap don't have any disavantage. But th

Re: [PATCH RFCv2 09/15] xen/arm32: mm: Re-implement setup_xenheap_mappings() using map_pages_to_xen()

2021-05-13 Thread Julien Grall
Hi Stefano, On 12/05/2021 23:07, Stefano Stabellini wrote: On Sun, 25 Apr 2021, Julien Grall wrote: From: Julien Grall Now that map_pages_to_xen() has been extended to support 2MB mappings, we can replace the create_mappings() call by map_pages_to_xen() call. Signed-off-by: Julien Grall --

[linux-linus test] 161922: regressions - FAIL

2021-05-13 Thread osstest service owner
flight 161922 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/161922/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

[xen-unstable test] 161926: tolerable trouble: fail/pass/starved - PUSHED

2021-05-13 Thread osstest service owner
flight 161926 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/161926/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 161898 test-armhf-armhf-libvirt 16 save

Re: regression in recent pvops kernels, dom0 crashes early

2021-05-13 Thread Andrew Cooper
On 13/05/2021 14:00, Olaf Hering wrote: > Am Thu, 13 May 2021 13:29:32 +0100 > schrieb Andrew Cooper : > >> Warning: NX (Execute Disable) protection not active > There was a knob in the BIOS, it was set to "Disabled" for some reason. > Once enabled, the flag is seen and the dom0 starts fine. > > If

Re: regression in recent pvops kernels, dom0 crashes early

2021-05-13 Thread Olaf Hering
Am Thu, 13 May 2021 13:29:32 +0100 schrieb Andrew Cooper : > Warning: NX (Execute Disable) protection not active There was a knob in the BIOS, it was set to "Disabled" for some reason. Once enabled, the flag is seen and the dom0 starts fine. If Xen is booted with 'cpuid=no-nx', the dom0 crashes

Re: regression in recent pvops kernels, dom0 crashes early

2021-05-13 Thread Olaf Hering
Am Thu, 13 May 2021 13:29:32 +0100 schrieb Andrew Cooper : > Can we first establish whether this box really does, or does not, have NX ? According to lscpu of a native boot: no. Architecture: x86_64 CPU op-mode(s):32-bit, 64-bit Byte Order:Little Endian CPU(s):

Re: regression in recent pvops kernels, dom0 crashes early

2021-05-13 Thread Olaf Hering
Am Thu, 13 May 2021 13:11:10 +0100 schrieb Andrew Cooper : > If I'm counting bits correctly, that is Xen rejecting the use of the NX > bit, which is suspicious. I tried 'dom0=pvh,debug': ... (XEN) mcheck_poll: Machine check polling timer started. (XEN) Running stub recovery selftests... (XEN) Fi

Re: regression in recent pvops kernels, dom0 crashes early

2021-05-13 Thread Andrew Cooper
On 13/05/2021 13:22, Olaf Hering wrote: > Am Thu, 13 May 2021 13:11:10 +0100 > schrieb Andrew Cooper : > >> If I'm counting bits correctly, that is Xen rejecting the use of the NX >> bit, which is suspicious.  Do you have the full Xen boot log on this >> box?  I wonder if we've some problem clobbin

Re: regression in recent pvops kernels, dom0 crashes early

2021-05-13 Thread Olaf Hering
Am Thu, 13 May 2021 13:11:10 +0100 schrieb Andrew Cooper : > If I'm counting bits correctly, that is Xen rejecting the use of the NX > bit, which is suspicious.  Do you have the full Xen boot log on this > box?  I wonder if we've some problem clobbing the XD-disable bit. Yes, it was attached. Is

Re: regression in recent pvops kernels, dom0 crashes early

2021-05-13 Thread Andrew Cooper
On 13/05/2021 11:24, Olaf Hering wrote: > Recent pvops dom0 kernels fail to boot on this particular ProLiant BL465c G5 > box. > It happens to work with every Xen and a 4.4 based sle12sp3 kernel, but fails > with every Xen and a 4.12 based sle12sp4 (and every newer) kernel. > > Any idea what is go

Re: [PATCH 8/8] xen/hvc: replace BUG_ON() with negative return value

2021-05-13 Thread Christophe Leroy
Le 13/05/2021 à 12:03, Juergen Gross a écrit : Xen frontends shouldn't BUG() in case of illegal data received from their backends. So replace the BUG_ON()s when reading illegal data from the ring page with negative return values. Signed-off-by: Juergen Gross --- drivers/tty/hvc/hvc_xen.c |

Re: [PATCH 8/8] xen/hvc: replace BUG_ON() with negative return value

2021-05-13 Thread Juergen Gross
On 13.05.21 12:25, Greg Kroah-Hartman wrote: On Thu, May 13, 2021 at 12:03:02PM +0200, Juergen Gross wrote: Xen frontends shouldn't BUG() in case of illegal data received from their backends. So replace the BUG_ON()s when reading illegal data from the ring page with negative return values. Sign

Re: [PATCH 8/8] xen/hvc: replace BUG_ON() with negative return value

2021-05-13 Thread Greg Kroah-Hartman
On Thu, May 13, 2021 at 12:03:02PM +0200, Juergen Gross wrote: > Xen frontends shouldn't BUG() in case of illegal data received from > their backends. So replace the BUG_ON()s when reading illegal data from > the ring page with negative return values. > > Signed-off-by: Juergen Gross > --- > dri

regression in recent pvops kernels, dom0 crashes early

2021-05-13 Thread Olaf Hering
Recent pvops dom0 kernels fail to boot on this particular ProLiant BL465c G5 box. It happens to work with every Xen and a 4.4 based sle12sp3 kernel, but fails with every Xen and a 4.12 based sle12sp4 (and every newer) kernel. Any idea what is going on? (XEN) Freed 256kB init memory. (XEN)

Re: [PATCH 8/8] xen/hvc: replace BUG_ON() with negative return value

2021-05-13 Thread Juergen Gross
On 13.05.21 12:16, Christophe Leroy wrote: Le 13/05/2021 à 12:03, Juergen Gross a écrit : Xen frontends shouldn't BUG() in case of illegal data received from their backends. So replace the BUG_ON()s when reading illegal data from the ring page with negative return values. Signed-off-by: Juerg

[PATCH 8/8] xen/hvc: replace BUG_ON() with negative return value

2021-05-13 Thread Juergen Gross
Xen frontends shouldn't BUG() in case of illegal data received from their backends. So replace the BUG_ON()s when reading illegal data from the ring page with negative return values. Signed-off-by: Juergen Gross --- drivers/tty/hvc/hvc_xen.c | 15 +-- 1 file changed, 13 insertions(+)

[PATCH 5/8] xen/netfront: read response from backend only once

2021-05-13 Thread Juergen Gross
In order to avoid problems in case the backend is modifying a response on the ring page while the frontend has already seen it, just read the response into a local buffer in one go and then operate on that buffer only. Signed-off-by: Juergen Gross --- drivers/net/xen-netfront.c | 38

[PATCH 4/8] xen/blkfront: don't trust the backend response data blindly

2021-05-13 Thread Juergen Gross
Today blkfront will trust the backend to send only sane response data. In order to avoid privilege escalations or crashes in case of malicious backends verify the data to be within expected limits. Especially make sure that the response always references an outstanding request. Introduce a new sta

[PATCH 7/8] xen/netfront: don't trust the backend response data blindly

2021-05-13 Thread Juergen Gross
Today netfront will trust the backend to send only sane response data. In order to avoid privilege escalations or crashes in case of malicious backends verify the data to be within expected limits. Especially make sure that the response always references an outstanding request. Note that only the

[PATCH 3/8] xen/blkfront: don't take local copy of a request from the ring page

2021-05-13 Thread Juergen Gross
In order to avoid a malicious backend being able to influence the local copy of a request build the request locally first and then copy it to the ring page instead of doing it the other way round as today. Signed-off-by: Juergen Gross --- drivers/block/xen-blkfront.c | 25 +++

[PATCH 1/8] xen: sync include/xen/interface/io/ring.h with Xen's newest version

2021-05-13 Thread Juergen Gross
Sync include/xen/interface/io/ring.h with Xen's newest version in order to get the RING_COPY_RESPONSE() and RING_RESPONSE_PROD_OVERFLOW() macros. Note that this will correct the wrong license info by adding the missing original copyright notice. Signed-off-by: Juergen Gross --- include/xen/inte

[PATCH 2/8] xen/blkfront: read response from backend only once

2021-05-13 Thread Juergen Gross
In order to avoid problems in case the backend is modifying a response on the ring page while the frontend has already seen it, just read the response into a local buffer in one go and then operate on that buffer only. Signed-off-by: Juergen Gross --- drivers/block/xen-blkfront.c | 35 ++

[PATCH 0/8] xen: harden frontends against malicious backends

2021-05-13 Thread Juergen Gross
Xen backends of para-virtualized devices can live in dom0 kernel, dom0 user land, or in a driver domain. This means that a backend might reside in a less trusted environment than the Xen core components, so a backend should not be able to do harm to a Xen guest (it can still mess up I/O data, but i

[PATCH 6/8] xen/netfront: don't read data from request on the ring page

2021-05-13 Thread Juergen Gross
In order to avoid a malicious backend being able to influence the local processing of a request build the request locally first and then copy it to the ring page. Any reading from the request needs to be done on the local instance. Signed-off-by: Juergen Gross --- drivers/net/xen-netfront.c | 75

Re: regression in Xen 4.15, unable to boot xenlinux dom0

2021-05-13 Thread Olaf Hering
Am Thu, 13 May 2021 11:49:58 +0200 schrieb Roger Pau Monné : > Can you boot with dom0=msr-relaxed on the Xen command line? Yes, that helps - I just discovered this cmdline option. Olaf pgprxX69rpcQm.pgp Description: Digitale Signatur von OpenPGP

Re: regression in Xen 4.15, unable to boot xenlinux dom0

2021-05-13 Thread Roger Pau Monné
On Thu, May 13, 2021 at 11:21:36AM +0200, Olaf Hering wrote: > I have access to a ProLiant BL465c G5, which can boot a xenlinux based dom0 > kernel, like the one included in SLE11SP4. But it fails to do that with > staging-4.15 and staging: > > ... > [0.197199] node 0 link 0: io port [1000,

regression in Xen 4.15, unable to boot xenlinux dom0

2021-05-13 Thread Olaf Hering
I have access to a ProLiant BL465c G5, which can boot a xenlinux based dom0 kernel, like the one included in SLE11SP4. But it fails to do that with staging-4.15 and staging: ... [0.197199] node 0 link 0: io port [1000, 3fff] [0.197199] node 0 link 2: io port [4000, ] (XEN) emul-priv-

Re: Hand over of the Xen shared info page

2021-05-13 Thread Julien Grall
On 13/05/2021 09:03, Anastasiia Lukianenko wrote: Hi all, Hi, The problem described below concerns cases when a shared info page needs to be handed over from one entity in the system to another, for example, there is a bootloader or any other code that may run before the guest OS' kernel.

Re: Hand over of the Xen shared info page

2021-05-13 Thread Olaf Hering
Am Thu, 13 May 2021 08:03:48 + schrieb Anastasiia Lukianenko : > shared info page needs to be handed over from one entity in the system to > another The same issue exists with kexec. Not sure why it was not addressed as you proposed, "soft_reset" was implemented instead. Good luck. Olaf

[linux-5.4 test] 161918: tolerable FAIL - PUSHED

2021-05-13 Thread osstest service owner
flight 161918 linux-5.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/161918/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stopfail like 161832 test-amd64-i386-xl-qemut-win7-amd64 19

Hand over of the Xen shared info page

2021-05-13 Thread Anastasiia Lukianenko
Hi all, The problem described below concerns cases when a shared info page needs to be handed over from one entity in the system to another, for example, there is a bootloader or any other code that may run before the guest OS' kernel. Normally, to map the shared info page guests allocate a memory

[libvirt test] 161927: regressions - FAIL

2021-05-13 Thread osstest service owner
flight 161927 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/161927/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-amd64-libvirt