flight 171742 linux-linus real [real]
flight 171756 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/171742/
http://logs.test-lab.xenproject.org/osstest/logs/171756/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-
flight 171747 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171747/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
branch xen-unstable
xenbranch xen-unstable
job build-amd64-libvirt
testid libvirt-build
Tree: libvirt git://libvirt.org/libvirt.git
Tree: libvirt_keycodemapdb https://gitlab.com/keycodemap/keycodemapdb.git
Tree: ovmf git://xenbits.xen.org/osstest/ovmf.git
Tree: qemu git://xenbits.xen.org/qemu-xen-
flight 171734 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171734/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stopfail like 171715
test-armhf-armhf-libvirt 16 sav
flight 171718 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171718/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-libvirt 8 xen-boot fail pass in 171712
Tests which did not succeed, but
On 21.07.2022 16:28, Daniel P. Smith wrote:
> On 7/19/22 09:11, Jan Beulich wrote:
>> On 06.07.2022 23:04, Daniel P. Smith wrote:
>>> --- /dev/null
>>> +++ b/xen/arch/x86/include/asm/bootinfo.h
>>> @@ -0,0 +1,48 @@
>>> +#ifndef __ARCH_X86_BOOTINFO_H__
>>> +#define __ARCH_X86_BOOTINFO_H__
>>> +
>>>
On 21.07.2022 16:28, Daniel P. Smith wrote:
> On 7/19/22 09:11, Jan Beulich wrote:
>> On 06.07.2022 23:04, Daniel P. Smith wrote:
>>> --- /dev/null
>>> +++ b/xen/arch/x86/include/asm/bootinfo.h
>>> @@ -0,0 +1,48 @@
>>> +#ifndef __ARCH_X86_BOOTINFO_H__
>>> +#define __ARCH_X86_BOOTINFO_H__
>>> +
>>>
Hi ,
> On 28 Jun 2022, at 6:23 pm, Mykyta Poturai wrote:
>
>> Hi Mykyta,
>>
>>> On 21 Jun 2022, at 10:38 am, Mykyta Poturai
>>> wrote:
>>>
Thanks for testing the patch.
> But not fixed the "Unexpected Global fault" that occasionally happens
> when destroying
> the domain wi
flight 171715 qemu-mainline real [real]
flight 171731 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/171715/
http://logs.test-lab.xenproject.org/osstest/logs/171731/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-ar
Hi Julien,
> On 21 Jul 2022, at 2:29 pm, Julien Grall wrote:
>
> On 21/07/2022 13:50, Rahul Singh wrote:
>> Hi Julien,
>
> Hi Rahul,
>
>>> On 20 Jul 2022, at 12:16 pm, Julien Grall wrote:
>>>
>>> Hi Rahul,
>>>
>>> On 20/07/2022 10:59, Rahul Singh wrote:
> On 13 Jul 2022, at 1:29 pm, Jul
Currently the vPMU state from a parent isn't copied to VM forks. To enable the
vPMU state to be copied to a fork VM we export certain vPMU functions. First,
the vPMU context needs to be allocated for the fork if the parent has one. For
this we introduce vpmu->allocate_context, which has previously
On 7/19/22 09:11, Jan Beulich wrote:
> On 06.07.2022 23:04, Daniel P. Smith wrote:
>> --- /dev/null
>> +++ b/xen/arch/x86/include/asm/bootinfo.h
>> @@ -0,0 +1,48 @@
>> +#ifndef __ARCH_X86_BOOTINFO_H__
>> +#define __ARCH_X86_BOOTINFO_H__
>> +
>> +/* unused for x86 */
>> +struct arch_bootstring { };
On Thu, Jul 21, 2022 at 01:14:41PM +, Andrew Cooper wrote:
> On 21/07/2022 14:09, Anthony PERARD wrote:
> > On Thu, Jul 21, 2022 at 01:03:41PM +, Andrew Cooper wrote:
> >> On 21/07/2022 13:45, Anthony Perard wrote:
> >>> Patch series available in this git branch:
> >>> https://xenbits.xen.o
On 21/07/2022 13:50, Rahul Singh wrote:
Hi Julien,
Hi Rahul,
On 20 Jul 2022, at 12:16 pm, Julien Grall wrote:
Hi Rahul,
On 20/07/2022 10:59, Rahul Singh wrote:
On 13 Jul 2022, at 1:29 pm, Julien Grall wrote:
On 13/07/2022 13:12, Bertrand Marquis wrote:
On 13 Jul 2022, at 12:31, Julie
on ARM, static memory sharing is tech preview, which shall be documented
in SUPPORT.md
Signed-off-by: Penny Zheng
---
v6 change:
- new commit
---
SUPPORT.md | 6 ++
1 file changed, 6 insertions(+)
diff --git a/SUPPORT.md b/SUPPORT.md
index 8e040d1c1e..3dfe6d2fbe 100644
--- a/SUPPORT.md
+++
From: Penny Zheng
To add statically shared memory nodes in Dom0, user shall put according
static shared memory configuration under /chosen node.
This commit adds shm-processing function process_shm in construct_dom0
to enable statically shared memory on Dom0.
Signed-off-by: Penny Zheng
Reviewe
We expose the shared memory to the domU using the "xen,shared-memory-v1"
reserved-memory binding. See
Documentation/devicetree/bindings/reserved-memory/xen,shared-memory.txt
in Linux for the corresponding device tree binding.
To save the cost of re-parsing shared memory device tree configuration w
This commit sets up shared memory foreign mapping for borrower domain.
If owner domain is the default dom_io, all shared domain are treated as
borrower domain.
Signed-off-by: Penny Zheng
Reviewed-by: Stefano Stabellini
---
v6 change:
- no change
---
v5 change:
- no change
---
v4 changes:
- no c
If owner property is defined, then owner domain of a static shared memory
region is not the default dom_io anymore, but a specific domain.
This commit implements allocating static shared memory to a specific domain
when owner property is defined.
Coding flow for dealing borrower domain will be in
Borrower domain will fail to get a page ref using the owner domain
during allocation, when the owner is created after borrower.
So here, we decide to get and add the right amount of reference, which
is the number of borrowers, when the owner is allocated.
Signed-off-by: Penny Zheng
Reviewed-by:
Later, we need to add the right amount of references, which should be
the number of borrower domains, to the owner domain. Since we only have
get_page() to increment the page reference by 1, a loop is needed per
page, which is inefficient and time-consuming.
To save the loop time, this commit intr
From: Penny Zheng
This commit introduces process_shm to cope with static shared memory in
domain construction.
DOMID_IO will be the default owner of memory pre-shared among multiple domains
at boot time, when no explicit owner is specified.
This commit only considers allocating static shared me
From: Penny Zheng
This patch series introduces a new feature: setting up static
shared memory on a dom0less system, through device tree configuration.
This commit parses shared memory node at boot-time, and reserve it in
bootinfo.reserved_mem to avoid other use.
This commits proposes a new Kcon
In safety-critical environment, it is not considered safe to
dynamically change important configurations at runtime. Everything
should be statically defined and statically verified.
In this case, if the system configuration knows a priori that there are
only 2 VMs and they need to communicate over
On 21/07/2022 14:09, Anthony PERARD wrote:
> On Thu, Jul 21, 2022 at 01:03:41PM +, Andrew Cooper wrote:
>> On 21/07/2022 13:45, Anthony Perard wrote:
>>> Patch series available in this git branch:
>>> https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git
>>> br.gitlab-ci-improvement
On Thu, Jul 21, 2022 at 01:03:41PM +, Andrew Cooper wrote:
> On 21/07/2022 13:45, Anthony Perard wrote:
> > Patch series available in this git branch:
> > https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git
> > br.gitlab-ci-improvement-v2
> >
> > v2:
> > - rebased
> >
> > Allow bu
On 21/07/2022 13:45, Anthony Perard wrote:
> Patch series available in this git branch:
> https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git
> br.gitlab-ci-improvement-v2
>
> v2:
> - rebased
>
> Allow build and test jobs to run concurently.
>
> Avoid running "test artifact" jobs on b
Hi Julien,
> On 20 Jul 2022, at 12:16 pm, Julien Grall wrote:
>
> Hi Rahul,
>
> On 20/07/2022 10:59, Rahul Singh wrote:
>>> On 13 Jul 2022, at 1:29 pm, Julien Grall wrote:
>>>
>>>
>>>
>>> On 13/07/2022 13:12, Bertrand Marquis wrote:
> On 13 Jul 2022, at 12:31, Julien Grall wrote:
>
Share the same "except" as the one used for tests.
Signed-off-by: Anthony PERARD
---
Notes:
v2:
- rebased, to include "qemu-system-aarch64-6.0.0-arm32-export".
automation/gitlab-ci/build.yaml | 18 --
1 file changed, 12 insertions(+), 6 deletions(-)
diff --git a/automa
Like with "dependencies", the jobs will get artifacts from the jobs
listed in "needs". But the test jobs can run as soon as the build jobs
listed have finished.
Signed-off-by: Anthony PERARD
---
Notes:
v2:
- rebased, to include "qemu-smoke-arm32-gcc".
automation/gitlab-ci/test.yaml | 1
The name of the field doesn't matter because it's use as a YAML achor,
but it's nicer to have the proper spelling.
Signed-off-by: Anthony PERARD
---
automation/gitlab-ci/build.yaml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/automation/gitlab-ci/build.yaml b/automation/gi
Allow to set common configuration from a single place for all tests
jobs.
Signed-off-by: Anthony PERARD
---
Notes:
v2:
- rebased, to include "qemu-smoke-arm32-gcc".
automation/gitlab-ci/test.yaml | 81 --
1 file changed, 18 insertions(+), 63 deletions(-)
Patch series available in this git branch:
https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git
br.gitlab-ci-improvement-v2
v2:
- rebased
Allow build and test jobs to run concurently.
Avoid running "test artifact" jobs on branch "master" and other, when test jobs
aren't runned.
Ant
On Thu, Jul 21, 2022 at 8:03 AM Andrew Cooper wrote:
>
> On 20/07/2022 19:47, Tamas K Lengyel wrote:
> > diff --git a/xen/arch/x86/cpu/vpmu_amd.c b/xen/arch/x86/cpu/vpmu_amd.c
> > index 9bacc02ec1..4c76e24551 100644
> > --- a/xen/arch/x86/cpu/vpmu_amd.c
> > +++ b/xen/arch/x86/cpu/vpmu_amd.c
> > @@
On Thu, Jul 21, 2022 at 6:19 AM Jan Beulich wrote:
>
> On 20.07.2022 20:47, Tamas K Lengyel wrote:
> > --- a/xen/arch/x86/mm/mem_sharing.c
> > +++ b/xen/arch/x86/mm/mem_sharing.c
> > @@ -1653,6 +1653,46 @@ static void copy_vcpu_nonreg_state(struct vcpu
> > *d_vcpu, struct vcpu *cd_vcpu)
> >
Hi Julien,
> On 20 Jul 2022, at 19:44, Julien Grall wrote:
>
> From: Julien Grall
>
> At the moment, xen_second is used to cover the first 2GB of the
> virtual address space. With the recent rework of the page-tables,
> only the first 1GB region (where Xen resides) is effectively used.
>
> In
flight 171717 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171717/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 7ef91af84c04b1e5a17631bd1811c9bc1945dfdc
baseline version:
ovmf 3b8cee1781c4149c7a762
Hi Julien,
> On 20 Jul 2022, at 19:44, Julien Grall wrote:
>
> From: Julien Grall
>
> The file xen/arch/mm.c has been growing quite a lot. It now contains
> various independent part of the MM subsytem.
>
> One of them is the helpers to map/unmap a page which is only used
> by arm32 and protec
On 20.07.2022 22:17, Marek Marczykowski-Górecki wrote:
> On Thu, Jul 14, 2022 at 01:51:06PM +0200, Jan Beulich wrote:
>> On 06.07.2022 17:32, Marek Marczykowski-Górecki wrote:
>>> +/*
>>> + * Don't place anything else on this page - it will be
>>> + * DMA-reachable by the USB controller
On 20.07.2022 22:12, Marek Marczykowski-Górecki wrote:
> On Thu, Jul 14, 2022 at 01:58:25PM +0200, Jan Beulich wrote:
>> On 06.07.2022 17:32, Marek Marczykowski-Górecki wrote:
>>> +static int xue_init_dbc(struct xue *xue)
>>> +{
>>> +uint64_t erdp = 0;
>>> +uint64_t out = 0;
>>> +uint64
On 20.07.2022 20:47, Tamas K Lengyel wrote:
> --- a/xen/arch/x86/mm/mem_sharing.c
> +++ b/xen/arch/x86/mm/mem_sharing.c
> @@ -1653,6 +1653,46 @@ static void copy_vcpu_nonreg_state(struct vcpu
> *d_vcpu, struct vcpu *cd_vcpu)
> hvm_set_nonreg_state(cd_vcpu, &nrs);
> }
>
> +static int copy_v
Hi,
On 21/07/2022 11:07, Jan Beulich wrote:
On 20.07.2022 20:44, Julien Grall wrote:
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -11,6 +11,9 @@ config COMPAT
config CORE_PARKING
bool
+config DOMAIN_PAGE
+ bool
+
config GRANT_TABLE
bool "Grant table support
On 20.07.2022 20:44, Julien Grall wrote:
> --- a/xen/common/Kconfig
> +++ b/xen/common/Kconfig
> @@ -11,6 +11,9 @@ config COMPAT
> config CORE_PARKING
> bool
>
> +config DOMAIN_PAGE
> + bool
> +
> config GRANT_TABLE
> bool "Grant table support" if EXPERT
> default y
Is th
> On 20 Jul 2022, at 19:44, Julien Grall wrote:
>
> From: Julien Grall
>
> At the moment, the domheap mappings initialization is done separately for
> the boot CPU and secondary CPUs. The main difference is for the former
> the pages are part of Xen binary whilst for the latter they are
> dyn
flight 171713 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171713/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-arm64-libvirt 6 libvirt-buildfail REGR. vs. 151777
build-amd64-libvirt
Hi Julien,
> On 20 Jul 2022, at 19:44, Julien Grall wrote:
>
> From: Julien Grall
>
> Hi all,
>
> This series is a collection of patches to clean-up the MM subsystem
> I have done in preparation for the next revision of "xen/arm: Don't
> switch TTBR while the MMU is on" [1].
>
> Cheers,
>
>
Hi Julien,
> On 20 Jul 2022, at 19:44, Julien Grall wrote:
>
> From: Julien Grall
>
> move it to Kconfig.
>
> The define CONFIG_DOMAIN_PAGE indicates whether the architecture provide
> helpers to map/unmap a domain page. Rename it to the define to
Maybe “the define to” can be removed in thi
Hi Julien,
> On 20 Jul 2022, at 19:44, Julien Grall wrote:
>
> From: Julien Grall
>
> At the moment, the domheap mappings initialization is done separately for
> the boot CPU and secondary CPUs. The main difference is for the former
> the pages are part of Xen binary whilst for the latter they
> On 20 Jul 2022, at 19:44, Julien Grall wrote:
>
> From: Julien Grall
>
> At the moment, *_VIRT_END may either point to the address after the end
> or the last address of the region.
>
> The lack of consistency make quite difficult to reason with them.
>
> Furthermore, there is a risk of o
HI Julien,
> On 20 Jul 2022, at 19:44, Julien Grall wrote:
>
> From: Julien Grall
>
> At the moment, *_VIRT_END may either point to the address after the end
> or the last address of the region.
>
> The lack of consistency make quite difficult to reason with them.
>
> Furthermore, there is a
flight 171712 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171712/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 171706
test-armhf-armhf-libvirt 16 save
51 matches
Mail list logo