[qemu-mainline test] 171711: regressions - FAIL

2022-07-20 Thread osstest service owner
flight 171711 qemu-mainline real [real] flight 171714 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171711/ http://logs.test-lab.xenproject.org/osstest/logs/171714/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be

RE: Re: [Question] Alternative Method for git send-email

2022-07-20 Thread Boyoun Park
I really appreciate your kind reply. I'm still looking for a possible method to send via git send-email. If I cannot find an appropriate method, I will send a patch as an attachment and content in the mail. Thank you so much.   Best Regards, Bo youn Park.   - O

[linux-linus test] 171709: tolerable FAIL - PUSHED

2022-07-20 Thread osstest service owner
flight 171709 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/171709/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 171681 test-armhf-armhf-libvirt 16 saver

[xen-unstable test] 171706: tolerable FAIL - PUSHED

2022-07-20 Thread osstest service owner
flight 171706 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/171706/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-rtds 20 guest-localmigrate/x10 fail REGR. vs. 171702 test-armhf-armhf-xl-rtds

[ovmf test] 171710: all pass - PUSHED

2022-07-20 Thread osstest service owner
flight 171710 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/171710/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 3b8cee1781c4149c7a762b8a1c8115b635cf4cad baseline version: ovmf 48249243777882d7d89ca

[xen-unstable-smoke test] 171708: tolerable all pass - PUSHED

2022-07-20 Thread osstest service owner
flight 171708 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/171708/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [PATCH v2 8/9] xue: mark DMA buffers as reserved for the device

2022-07-20 Thread Marek Marczykowski-Górecki
On Thu, Jul 14, 2022 at 01:51:06PM +0200, Jan Beulich wrote: > On 06.07.2022 17:32, Marek Marczykowski-Górecki wrote: > > +/* > > + * Don't place anything else on this page - it will be > > + * DMA-reachable by the USB controller. > > + */ > > +char _pad[0] __aligned(XUE_PAGE_SI

Re: [PATCH v2 1/9] drivers/char: Add support for Xue USB3 debugger

2022-07-20 Thread Marek Marczykowski-Górecki
On Thu, Jul 14, 2022 at 01:58:25PM +0200, Jan Beulich wrote: > On 06.07.2022 17:32, Marek Marczykowski-Górecki wrote: > > +static int xue_init_dbc(struct xue *xue) > > +{ > > +uint64_t erdp = 0; > > +uint64_t out = 0; > > +uint64_t in = 0; > > +uint64_t mbs = 0; > > +struct xue_

[qemu-mainline test] 171704: tolerable FAIL - PUSHED

2022-07-20 Thread osstest service owner
flight 171704 qemu-mainline real [real] flight 171707 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171704/ http://logs.test-lab.xenproject.org/osstest/logs/171707/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-am

[PATCH v2] x86/mem_sharing: support forks with active vPMU state

2022-07-20 Thread Tamas K Lengyel
Currently the vPMU state from a parent isn't copied to VM forks. To enable the vPMU state to be copied to a fork VM we export certain vPMU functions. First, the vPMU context needs to be allocated for the fork if the parent has one. For this we introduce vpmu->allocate_context, which has previously

[PATCH v2 5/5] xen/arm: mm: Reduce the area that xen_second covers

2022-07-20 Thread Julien Grall
From: Julien Grall At the moment, xen_second is used to cover the first 2GB of the virtual address space. With the recent rework of the page-tables, only the first 1GB region (where Xen resides) is effectively used. In addition to that, I would like to reshuffle the memory layout. So Xen mapping

[PATCH v2 4/5] xen/arm: mm: Move domain_{,un}map_* helpers in a separate file

2022-07-20 Thread Julien Grall
From: Julien Grall The file xen/arch/mm.c has been growing quite a lot. It now contains various independent part of the MM subsytem. One of them is the helpers to map/unmap a page which is only used by arm32 and protected by CONFIG_ARCH_MAP_DOMAIN_PAGE. Move them in a new file xen/arch/arm/domai

[PATCH v2 3/5] xen: Rename CONFIG_DOMAIN_PAGE to CONFIG_ARCH_MAP_DOMAIN_PAGE and...

2022-07-20 Thread Julien Grall
From: Julien Grall move it to Kconfig. The define CONFIG_DOMAIN_PAGE indicates whether the architecture provide helpers to map/unmap a domain page. Rename it to the define to CONFIG_ARCH_MAP_DOMAIN_PAGE so it is clearer that this will not remove support for domain page (this is not a concept tha

[PATCH v2 2/5] xen/arm32: mm: Consolidate the domheap mappings initialization

2022-07-20 Thread Julien Grall
From: Julien Grall At the moment, the domheap mappings initialization is done separately for the boot CPU and secondary CPUs. The main difference is for the former the pages are part of Xen binary whilst for the latter they are dynamically allocated. It would be good to have a single helper so i

[PATCH v2 1/5] xen/arm: Remove most of the *_VIRT_END defines

2022-07-20 Thread Julien Grall
From: Julien Grall At the moment, *_VIRT_END may either point to the address after the end or the last address of the region. The lack of consistency make quite difficult to reason with them. Furthermore, there is a risk of overflow in the case where the address points past to the end. I am not

[PATCH v2 0/5] xen/arm: mm: Bunch of clean-ups

2022-07-20 Thread Julien Grall
From: Julien Grall Hi all, This series is a collection of patches to clean-up the MM subsystem I have done in preparation for the next revision of "xen/arm: Don't switch TTBR while the MMU is on" [1]. Cheers, [1] https://lore.kernel.org/all/20220309112048.17377-1-jul...@xen.org/ Julien Grall

Re: [PATCH v2 1/4] pci: add rwlock to pcidevs_lock machinery

2022-07-20 Thread Volodymyr Babchuk
Hello Wei, Wei Chen writes: > Hi Volodymyr, > > On 2022/7/19 5:15, Volodymyr Babchuk wrote: >> From: Oleksandr Andrushchenko > >> if ( !use_msi ) >> return -EOPNOTSUPP; >> diff --git a/xen/drivers/passthrough/pci.c b/xen/drivers/passthrough/pci.c >> index 938821e593..f93922a

Re: [PATCH v1 02/18] introduction of generalized boot info

2022-07-20 Thread Daniel P. Smith
On 7/15/22 15:25, Julien Grall wrote: > Hi Daniel, > > On 06/07/2022 22:04, Daniel P. Smith wrote: >> The x86 and Arm architectures represent in memory the general boot >> information >> and boot modules differently despite having commonality. The x86 >> representations are bound to the multiboot

Re: Panic on CPU 0: FATAL TRAP: vec 7, #NM[0000]

2022-07-20 Thread Michael Young
On Wed, 20 Jul 2022, Jan Beulich wrote: On 20.07.2022 06:48, ChrisD wrote: So, you think it's a problem with fc36? Just to also state it here - it turns out we need to tell the compiler to avoid MMX insns. A patch for this was already sent and ack-ed. I have done a temporary build of xen fo

Re: [PATCH v2 3/3] xen/heap: pass order to free_heap_pages() in heap init

2022-07-20 Thread Julien Grall
Hi Jan, On 19/07/2022 07:01, Jan Beulich wrote: On 18.07.2022 19:39, Julien Grall wrote: On 18/07/2022 12:02, Jan Beulich wrote: On 18.07.2022 12:24, Julien Grall wrote: 3) unsigned int inc_order = min(MAX_ORDER, flsl(e - s) - 1); if ( s ) inc_order = min(inc

Re: [PATCH V7 1/2] xen/arm: Harden the P2M code in p2m_remove_mapping()

2022-07-20 Thread Julien Grall
Hi Oleksandr, On 16/07/2022 16:29, Oleksandr Tyshchenko wrote: On 16/07/2022 15:56, Oleksandr Tyshchenko wrote: From: Oleksandr Tyshchenko Borrow the x86's check from p2m_remove_page() which was added by the following commit: c65ea16dbcafbe4fe21693b18f8c2a3c5d14600e "x86/p2m: don't assert tha

Re: xen master: xl create hangs

2022-07-20 Thread Elliott Mitchell
On Wed, Jul 20, 2022 at 05:24:22PM +0100, Anthony PERARD wrote: > > I think that this `xl` process just wait for the domain to shutdown > or die. When we run `xl create`, before exiting there's a fork/exec of > xl which handle a few domain events, so it looks like this stack trace > is expected (a

Re: xen master: xl create hangs

2022-07-20 Thread Mathieu Tarral
> I think that this `xl` process just wait for the domain to shutdown > or die. When we run `xl create`, before exiting there's a fork/exec of > xl which handle a few domain events, so it looks like this stack trace > is expected (and look like the one I have). So it don't looks like to be > the xl

[xen-unstable-smoke test] 171705: tolerable all pass - PUSHED

2022-07-20 Thread osstest service owner
flight 171705 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/171705/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: xen master: xl create hangs

2022-07-20 Thread Anthony PERARD
On Wed, Jul 20, 2022 at 03:04:22PM +, Mathieu Tarral wrote: > Hi Anthony > > > > $(debug) controls the level of optimisation of the compilation to make > > it easier to debug. > > > > So, with debug=y, we have libxenstore having issue with killing the > > its reading thread? :-( > > Maybe tha

Re: [PATCH] golang/xenlight: Update generated code

2022-07-20 Thread Anthony PERARD
On Mon, Jul 18, 2022 at 12:21:25PM +0300, Oleksandr Tyshchenko wrote: > From: Oleksandr Tyshchenko > > Re-generate goland bindings to reflect changes to libxl_types.idl > from the following commit: > 54d8f27d0477 tools/libxl: report trusted backend status to frontends > > Signed-off-by: Oleksand

Re: [PATCH V11.1 1/3] libxl: Add support for Virtio disk configuration

2022-07-20 Thread Anthony PERARD
On Sat, Jul 16, 2022 at 07:37:45PM +0300, Oleksandr Tyshchenko wrote: > From: Oleksandr Tyshchenko > > This patch adds basic support for configuring and assisting virtio-mmio > based virtio-disk backend (emulator) which is intended to run out of > Qemu and could be run in any domain. > Although t

Re: xen master: xl create hangs

2022-07-20 Thread Mathieu Tarral
Hi Anthony > $(debug) controls the level of optimisation of the compilation to make > it easier to debug. > > So, with debug=y, we have libxenstore having issue with killing the > its reading thread? :-( > Maybe that reading thread is doing something that can't be stopped, > maybe it's waiting fo

Re: xen master: xl create hangs

2022-07-20 Thread Anthony PERARD
CCing Juergen and xen-devel. On Mon, Jul 18, 2022 at 06:25:54PM +, Mathieu Tarral wrote: > Using gdb to debug the xl process, I get the following stacktrace: > > (gdb) bt > #0 __futex_abstimed_wait_common64 (private=128, cancel=true, abstime=0x0, > op=265, expected=8652, futex_word=0x7f6deb

Re: Panic on CPU 0: FATAL TRAP: vec 7, #NM[0000]

2022-07-20 Thread Jan Beulich
On 20.07.2022 06:48, ChrisD wrote: > So, you think it's a problem with fc36? Just to also state it here - it turns out we need to tell the compiler to avoid MMX insns. A patch for this was already sent and ack-ed. Jan

Re: [PATCH] x86: also suppress use of MMX insns

2022-07-20 Thread Andrew Cooper
On 20/07/2022 14:36, Jan Beulich wrote: > On 20.07.2022 15:33, Andrew Cooper wrote: >> On 20/07/2022 14:30, Jan Beulich wrote: >>> Passing -mno-sse alone is not enough: The compiler may still find >>> (questionable) reasons to use MMX insns. In particular with gcc12 use >>> of MOVD+PUNPCKLDQ+MOVQ w

Re: [PATCH] x86: also suppress use of MMX insns

2022-07-20 Thread Jan Beulich
On 20.07.2022 15:33, Andrew Cooper wrote: > On 20/07/2022 14:30, Jan Beulich wrote: >> Passing -mno-sse alone is not enough: The compiler may still find >> (questionable) reasons to use MMX insns. In particular with gcc12 use >> of MOVD+PUNPCKLDQ+MOVQ was observed in an apparent attempt to auto- >>

Re: [PATCH 2/8] xen/evtchn: modify evtchn_alloc_unbound to allocate specified port

2022-07-20 Thread Jan Beulich
On 20.07.2022 13:16, Julien Grall wrote: > On 20/07/2022 10:59, Rahul Singh wrote: >>> On 13 Jul 2022, at 1:29 pm, Julien Grall wrote: >>> On 13/07/2022 13:12, Bertrand Marquis wrote: > On 13 Jul 2022, at 12:31, Julien Grall wrote: >> I can't >> see why it would be wrong to have a mor

Re: [PATCH] x86: also suppress use of MMX insns

2022-07-20 Thread Andrew Cooper
On 20/07/2022 14:30, Jan Beulich wrote: > Passing -mno-sse alone is not enough: The compiler may still find > (questionable) reasons to use MMX insns. In particular with gcc12 use > of MOVD+PUNPCKLDQ+MOVQ was observed in an apparent attempt to auto- > vectorize the storing of two adjacent zeroes, 3

[PATCH] x86: also suppress use of MMX insns

2022-07-20 Thread Jan Beulich
Passing -mno-sse alone is not enough: The compiler may still find (questionable) reasons to use MMX insns. In particular with gcc12 use of MOVD+PUNPCKLDQ+MOVQ was observed in an apparent attempt to auto- vectorize the storing of two adjacent zeroes, 32 bits each. Reported-by: ChrisD Signed-off-by

Re: Panic on CPU 0: FATAL TRAP: vec 7, #NM[0000]

2022-07-20 Thread Jan Beulich
On 20.07.2022 13:28, Jan Beulich wrote: > On 20.07.2022 12:02, Andrew Cooper wrote: >> On 20/07/2022 09:19, Jan Beulich wrote: >>> On 20.07.2022 06:48, ChrisD wrote: So, you think it's a problem with fc36? >>> Well, if that's where the binary came from, then yes. >> >> So >> https://kojipkgs.f

Re: Panic on CPU 0: FATAL TRAP: vec 7, #NM[0000]

2022-07-20 Thread Jan Beulich
On 20.07.2022 12:02, Andrew Cooper wrote: > One observation though.  We do pass -mno-sse but not -mno-mmx.  I still > can't figure out what makes the compiler think there's any SIMD to be > done in this function. So this looks to be "optimization", done in a few more places. The pattern is always

[xen-unstable test] 171702: tolerable FAIL

2022-07-20 Thread osstest service owner
flight 171702 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/171702/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-pair 11 xen-install/dst_host fail in 171695 pass in 171702 test-amd64-i386-xl-qemuu-dmrestr

Re: [PATCH] x86: Expose more MSR_ARCH_CAPS to hwdom

2022-07-20 Thread Jason Andryuk
On Tue, Jul 19, 2022 at 4:29 PM Andrew Cooper wrote: > > On 19/07/2022 21:08, Jason Andryuk wrote: > > commit e46474278a0e ("x86/intel: Expose MSR_ARCH_CAPS to dom0") started > > exposing MSR_ARCH_CAPS to dom0. More bits in MSR_ARCH_CAPS have since > > been defined, but they haven't been exposed.

Re: Panic on CPU 0: FATAL TRAP: vec 7, #NM[0000]

2022-07-20 Thread Jan Beulich
On 20.07.2022 12:02, Andrew Cooper wrote: > On 20/07/2022 09:19, Jan Beulich wrote: >> On 20.07.2022 06:48, ChrisD wrote: >>> So, you think it's a problem with fc36? >> Well, if that's where the binary came from, then yes. > > So > https://kojipkgs.fedoraproject.org//packages/xen/4.16.1/4.fc36/dat

Re: Panic on CPU 0: FATAL TRAP: vec 7, #NM[0000]

2022-07-20 Thread Jan Beulich
On 20.07.2022 12:02, Andrew Cooper wrote: > On 20/07/2022 09:19, Jan Beulich wrote: >> On 20.07.2022 06:48, ChrisD wrote: >>> So, you think it's a problem with fc36? >> Well, if that's where the binary came from, then yes. > > So > https://kojipkgs.fedoraproject.org//packages/xen/4.16.1/4.fc36/dat

Re: [PATCH 2/8] xen/evtchn: modify evtchn_alloc_unbound to allocate specified port

2022-07-20 Thread Julien Grall
Hi Rahul, On 20/07/2022 10:59, Rahul Singh wrote: On 13 Jul 2022, at 1:29 pm, Julien Grall wrote: On 13/07/2022 13:12, Bertrand Marquis wrote: On 13 Jul 2022, at 12:31, Julien Grall wrote: I can't see why it would be wrong to have a more tight limit on static ports than on traditional ("d

[ovmf test] 171703: all pass - PUSHED

2022-07-20 Thread osstest service owner
flight 171703 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/171703/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 48249243777882d7d89ca0b86c89e355b5f941f3 baseline version: ovmf 24eac4caf31afae48349a

Re: Panic on CPU 0: FATAL TRAP: vec 7, #NM[0000]

2022-07-20 Thread Andrew Cooper
On 20/07/2022 09:19, Jan Beulich wrote: > On 20.07.2022 06:48, ChrisD wrote: >> So, you think it's a problem with fc36? > Well, if that's where the binary came from, then yes. So https://kojipkgs.fedoraproject.org//packages/xen/4.16.1/4.fc36/data/logs/x86_64/build.log is the build log. For iommu_

Re: [PATCH 2/8] xen/evtchn: modify evtchn_alloc_unbound to allocate specified port

2022-07-20 Thread Rahul Singh
Hi , > On 13 Jul 2022, at 1:29 pm, Julien Grall wrote: > > > > On 13/07/2022 13:12, Bertrand Marquis wrote: >>> On 13 Jul 2022, at 12:31, Julien Grall wrote: I can't see why it would be wrong to have a more tight limit on static ports than on traditional ("dynamic") ones. Even

Re: [PATCH] xen/mem_sharing: support forks with active vPMU state

2022-07-20 Thread Jan Beulich
On 19.07.2022 19:18, Tamas K Lengyel wrote: > --- a/xen/arch/x86/include/asm/vpmu.h > +++ b/xen/arch/x86/include/asm/vpmu.h > @@ -40,6 +40,7 @@ > /* Arch specific operations shared by all vpmus */ > struct arch_vpmu_ops { > int (*initialise)(struct vcpu *v); > +int (*allocate_context)(st

Re: Panic on CPU 0: FATAL TRAP: vec 7, #NM[0000]

2022-07-20 Thread Jan Beulich
On 20.07.2022 06:48, ChrisD wrote: > So, you think it's a problem with fc36? Well, if that's where the binary came from, then yes. And btw please don't top-post and please don't send html mail (see the almost unreadable stuff below that was how your mail came through when read as plain-text). Ja

Re: Ryzen 6000 (Mobile)

2022-07-20 Thread Jan Beulich
On 20.07.2022 10:11, Jan Beulich wrote: > On 20.07.2022 02:33, Dylanger Daly wrote: >>> I'd focus on the booting issues first. And I guess you can take a video >>> of that (assuming that a single screenshot likely isn't going to be >>> enough), possibly with "vga=keep" in place (albeit that introdu

Re: Ryzen 6000 (Mobile)

2022-07-20 Thread Jan Beulich
On 20.07.2022 02:33, Dylanger Daly wrote: >> I'd focus on the booting issues first. And I guess you can take a video >> of that (assuming that a single screenshot likely isn't going to be >> enough), possibly with "vga=keep" in place (albeit that introduces >> extra slowness)? >> >> There's also th

Re: [PATCH V11.1 1/3] libxl: Add support for Virtio disk configuration

2022-07-20 Thread Oleksandr Tyshchenko
On 20.07.22 06:29, Jiamei Xie wrote: > Hi Oleksandr, Hello Jiamei > > We have tested it on arm64 with " disk = [ 'phy:/usr/share/guests/disk.img0, > xvda1, backendtype=standalone, specification=virtio']". It works ok. > > Tested-by: Jiamei Xie > Tested-by: Henry Wang Thank you for the test

[ovmf test] 171696: tolerable FAIL - PUSHED

2022-07-20 Thread osstest service owner
flight 171696 ovmf real [real] flight 171699 ovmf real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171696/ http://logs.test-lab.xenproject.org/osstest/logs/171699/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-xl-qemuu-

Re: [PATCH v1 01/18] kconfig: allow configuration of maximum modules

2022-07-20 Thread Jan Beulich
On 19.07.2022 19:02, Daniel P. Smith wrote: > On 7/19/22 05:32, Jan Beulich wrote: >> On 06.07.2022 23:04, Daniel P. Smith wrote: >>> --- a/xen/arch/x86/efi/efi-boot.h >>> +++ b/xen/arch/x86/efi/efi-boot.h >>> @@ -18,7 +18,7 @@ static multiboot_info_t __initdata mbi = { >>> * The array size needs