flight 183663 xen-4.18-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183663/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 183641
test-amd64-amd64-xl-qemuu-win7-a
flight 183658 xen-unstable real [real]
flight 183666 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/183658/
http://logs.test-lab.xenproject.org/osstest/logs/183666/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armh
Hello,
Juergen Gross, le mer. 01 nov. 2023 16:35:51 +0100, a ecrit:
> The symbols in mini-os.map have been obtained via building all defined
> and not failing stubdoms (caml-stubdom doesn't build).
>
> +++ b/mini-os.map
> @@ -0,0 +1,187 @@
> +# Mini-OS symbols being externally visible
> +# entry
flight 183665 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183665/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On Thu, Nov 2, 2023 at 4:23 AM Juergen Gross wrote:
>
> On 01.11.23 20:21, Jason Andryuk wrote:
> > On Wed, Nov 1, 2023 at 5:34 AM Juergen Gross wrote:
> >>
> >> Add the code for connecting to frontends to xenlogd.
> >>
> >> Signed-off-by: Juergen Gross
> >
> >> diff --git a/tools/xenlogd/xenlog
Juergen Gross, le mer. 01 nov. 2023 16:35:50 +0100, a ecrit:
> Add an additional link step with linking all Mini-OS kernel binaries
> into a single object file.
>
> This is done in preparation of hiding Mini-OS internal symbols before
> linking the kernel with libraries and an application.
>
> Si
On 02/11/2023 10:23 pm, Stefano Stabellini wrote:
> On Thu, 2 Nov 2023, Andrew Cooper wrote:
>> On 02/11/2023 10:21 am, Federico Serafini wrote:
>>> Remove the generic implementation of memcpy(), memmove() and
>>> memset() from the x86 build since a version written in asm is present.
>>> This addes
On Thu, 2 Nov 2023, Andrew Cooper wrote:
> On 02/11/2023 10:21 am, Federico Serafini wrote:
> > Remove the generic implementation of memcpy(), memmove() and
> > memset() from the x86 build since a version written in asm is present.
> > This addesses violations of MISRA C:2012 Rule 8.6 ("An identifi
On Thu, 2 Nov 2023, Jan Beulich wrote:
> On 31.10.2023 17:33, Roger Pau Monné wrote:
> > On Tue, Oct 31, 2023 at 03:30:37PM +0200, Xenia Ragiadakou wrote:
> >> Do not use emuirq mappings for MSIs injected by emulated devices.
> >> This kind of pirq shares the same emuirq value and is not remapped.
flight 183654 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183654/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 183651
test-amd64-amd64-xl-qemuu-win7-amd64
flight 183662 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183662/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 8da978bf68535ec9fc41f400f22f09b033dd535a
baseline version:
ovmf fbbbd984998d83cf6b69e
On 02/11/2023 2:23 pm, Jan Beulich wrote:
> do_amd_iommu_irq()'s forward declaration uses a parameter name different
> from what the definition uses, thus vioating Misra C:2012 rule 8.3. We
> can get away without such a forward declaration if instead we forward-
> declare amd_iommu_irq_tasklet, put
Set the vPCI flag in xen_domctl_createdomain to enable vPCI if a pci
device has been specified in the xl domain config file.
Signed-off-by: Stewart Hildebrand
---
Same story as the patch before this regarding the [FUTURE] tag.
v4->v5:
* no change
v3->v4:
* split from ("xen/arm: enable vPCI for
Select HAS_VPCI_GUEST_SUPPORT in Kconfig for enabling vPCI support for
domUs.
Add checks to fail guest creation if the configuration is invalid.
Signed-off-by: Stewart Hildebrand
---
As the tag implies, this patch is not intended to be merged (yet).
Note that CONFIG_HAS_VPCI_GUEST_SUPPORT is no
Set the vPCI flag in xen_domctl_createdomain to enable vPCI for dom0 if
iommu and PCI passthrough are enabled and there exists a PCI host bridge
in the system.
Adjust pci_host_iterate_bridges_and_count() to count the number of host
bridges if no callback is provided.
Signed-off-by: Stewart Hildeb
From: Rahul Singh
Setting CONFIG_PCI_PASSTHROUGH=y will enable PCI passthrough on ARM, even though
the feature is not yet complete in the current upstream codebase. The purpose of
this is to make it easier to enable the necessary configs (HAS_PCI, HAS_VPCI)
for
testing and development of PCI pas
Both x86 and ARM need a way at domain creation time to specify whether
the domain needs vPCI emulation. Move the vPCI flag from x86
xen_domctl_createdomain.arch.emulation_flags to the common
xen_domctl_createdomain.flags.
Move has_vpci() macro to common header.
Bump XEN_DOMCTL_INTERFACE_VERSION s
There are multiple series in development/review [1], [2] that will benefit from
having a Kconfig option for PCI passthrough on ARM. Hence I have sent this
series independent from any other series.
v4->v5:
* add [FUTURE] tag to ("xen/arm: enable vPCI for dom0")
* address feedback in individual patc
Before the MMU is turned on, PC uses physical address. Thus, one can use adr_l
instead of load_paddr to obtain the physical address of a symbol.
The only exception (for this replacement) is create_table_entry() which is
called before and after MMU is turned on.
Also, in lookup_processor_type() "r
On Wed, Nov 1, 2023 at 5:54 AM Juergen Gross wrote:
>
> Add the version request of the 9pfs protocol. For the version use the
> "9P2000.u" variant, as it is supported by Mini-OS and Linux.
>
> For the request parsing add all format items needed even in future in
> order to avoid code churn for tho
On 02/11/2023 7:44 am, Juergen Gross wrote:
> On 01.11.23 19:36, Jason Andryuk wrote:
>> On Wed, Nov 1, 2023 at 10:27 AM Juergen Gross wrote:
>>>
>>> Add "xenlogd", a new logging daemon meant to support infrastructure
>>> domains (e.g. xenstore-stubdom) to write log files in dom0.
>>
>> As I under
On 02/11/2023 8:33 am, Jan Beulich wrote:
> On 01.11.2023 21:37, Andrew Cooper wrote:
>> As reported:
>>
>> (XEN)
>>
>> (XEN) UBSAN: Undefined behaviour in arch/x86/time.c:1542:32
>> (XEN) member access within n
On Wed, Nov 1, 2023 at 6:56 AM Juergen Gross wrote:
>
> Add support for generation a 9pfs protocol response via a format based
> approach.
>
> Strings are stored in a per device string buffer and they are
> referenced via their offset in this buffer. This allows to avoid
> having to dynamically al
On Wed, Nov 1, 2023 at 5:34 AM Juergen Gross wrote:
>
> Add the transport layer of 9pfs. This is basically the infrastructure
> to receive requests from the frontend and to send the related answers
> via the rings.
>
> In order to avoid unaligned accesses e.g. on Arm, add the definition of
> __pac
On 11/1/23 05:25, Christian Lindig wrote:
>> On 30 Oct 2023, at 23:52, Stewart Hildebrand
>> wrote:
>>
>> There are multiple series in development/review [1], [2] that will benefit
>> from
>> having a Kconfig option for PCI passthrough on ARM. Hence I have sent this
>> series independent from an
flight 183653 libvirt real [real]
flight 183659 libvirt real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/183653/
http://logs.test-lab.xenproject.org/osstest/logs/183659/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-li
> On 2 Nov 2023, at 11:53, Jan Beulich wrote:
>
> On 02.11.2023 12:41, Luca Fancellu wrote:
>>> On 2 Nov 2023, at 09:10, Jan Beulich wrote:
>>> On 31.10.2023 14:23, Luca Fancellu wrote:
Add a clang format configuration for the Xen Hypervisor.
Signed-off-by: Luca Fancellu
On 02.11.2023 11:17, Federico Serafini wrote:
> On 30/10/23 16:01, Jan Beulich wrote:
>> On 25.10.2023 15:01, Federico Serafini wrote:
>>> Make function definition and declaration consistent and emphasize that
>>> the formal parameter is deliberately not used.
>>
>> Coming back to my earlier object
do_amd_iommu_irq()'s forward declaration uses a parameter name different
from what the definition uses, thus vioating Misra C:2012 rule 8.3. We
can get away without such a forward declaration if instead we forward-
declare amd_iommu_irq_tasklet, putting its initialization past the
handler function'
On 2023-11-02 14:27, Jan Beulich wrote:
On 02.11.2023 00:10, Stefano Stabellini wrote:
On Wed, 1 Nov 2023, Nicola Vetrini wrote:
As stated in rules.rst, functions used only in asm modules
are allowed to have no prior declaration visible when being
defined, hence these functions are marked with
On 31.10.2023 15:52, Roger Pau Monne wrote:
> --- a/xen/arch/x86/genapic/x2apic.c
> +++ b/xen/arch/x86/genapic/x2apic.c
> @@ -180,6 +180,29 @@ static const struct genapic __initconstrel
> apic_x2apic_cluster = {
> .send_IPI_self = send_IPI_self_x2apic
> };
>
> +/*
> + * Mixed x2APIC mode:
On 31.10.2023 15:52, Roger Pau Monne wrote:
> --- a/xen/arch/x86/genapic/x2apic.c
> +++ b/xen/arch/x86/genapic/x2apic.c
> @@ -180,6 +180,29 @@ static const struct genapic __initconstrel
> apic_x2apic_cluster = {
> .send_IPI_self = send_IPI_self_x2apic
> };
>
> +/*
> + * Mixed x2APIC mode:
On 02.11.2023 00:12, Stefano Stabellini wrote:
> On Wed, 1 Nov 2023, Nicola Vetrini wrote:
>> To avoid a violation of MISRA C:2012 Rule 8.4, as permitted
>> by docs/misra/rules.rst.
>>
>> The current_stack_pointer is a declaration: mark it as such
>> for ECLAIR.
>>
>> Signed-off-by: Nicola Vetrini
On 02.11.2023 00:10, Stefano Stabellini wrote:
> On Wed, 1 Nov 2023, Nicola Vetrini wrote:
>> As stated in rules.rst, functions used only in asm modules
>> are allowed to have no prior declaration visible when being
>> defined, hence these functions are marked with an
>> 'asmlinkage' macro, which i
On Wed, Nov 1, 2023 at 3:21 PM Andrew Cooper wrote:
>
> Right now, vvmx will blindly copy L12's ACTIVITY_STATE into the L02 VMCS and
> enter the vCPU. Luckily for us, nested-virt is explicitly unsupported for
> security bugs.
>
> The inactivity states are HLT, SHUTDOWN and WAIT-FOR-SIPI, and as n
@Marek Marczykowski-Górecki : I've
recompiled the kernel 6.6 on my ARM Chromebook to test if your patch helped
to fix the "black screen" issue. And not,it does not work. Is this expected
or is there something wrong with your patch ?
On Thu, Nov 2, 2023 at 11:00 AM Marek Szyprowski
wrote:
>
> On
flight 183652 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183652/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-vhd 13 guest-start fail in 183645 pass in 183652
test-amd64-amd64-xl-qemuu-win7-a
flight 183655 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183655/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 01.11.23 14:41, Jason Andryuk wrote:
From: Roger Pau Monne
The Processor capability bits notify ACPI of the OS capabilities, and
so ACPI can adjust the return of other Processor methods taking the OS
capabilities into account.
When Linux is running as a Xen dom0, the hypervisor is the entit
On 02.11.2023 12:41, Luca Fancellu wrote:
>> On 2 Nov 2023, at 09:10, Jan Beulich wrote:
>> On 31.10.2023 14:23, Luca Fancellu wrote:
>>> Add a clang format configuration for the Xen Hypervisor.
>>>
>>> Signed-off-by: Luca Fancellu
>>> ---
>>> xen/.clang-format | 693 +
Hi Jan,
> On 2 Nov 2023, at 09:10, Jan Beulich wrote:
>
> On 31.10.2023 14:23, Luca Fancellu wrote:
>> Add a clang format configuration for the Xen Hypervisor.
>>
>> Signed-off-by: Luca Fancellu
>> ---
>> xen/.clang-format | 693 ++
>> 1 file changed,
On 02/11/2023 11:15, Luca Fancellu wrote:
Hi Julien,
diff --git a/xen/arch/arm/dom0less-build.c b/xen/arch/arm/dom0less-build.c
new file mode 100644
index ..dc9c90cf00a7
--- /dev/null
+++ b/xen/arch/arm/dom0less-build.c
@@ -0,0 +1,1087 @@
+/* SPDX-License-Identifier: GPL-2.0-onl
Hi Julien,
>> diff --git a/xen/arch/arm/dom0less-build.c b/xen/arch/arm/dom0less-build.c
>> new file mode 100644
>> index ..dc9c90cf00a7
>> --- /dev/null
>> +++ b/xen/arch/arm/dom0less-build.c
>> @@ -0,0 +1,1087 @@
>> +/* SPDX-License-Identifier: GPL-2.0-only */
>> +/*
>> + * xen/arc
Hi Michal,
On 02/11/2023 09:29, Michal Orzel wrote:
On 02/11/2023 00:30, Julien Grall wrote:
From: Julien Grall
Since commit 5e213f0f4d2c ("xen/arm32: head: Widen the use of the
temporary mapping"), boot_second (used to cover regions like Xen and
the fixmap) will not be mapped if the identi
Hi,
On 02/11/2023 02:29, Henry Wang wrote:
Hi Julien,
On Nov 2, 2023, at 07:30, Julien Grall wrote:
From: Julien Grall
Since commit 5e213f0f4d2c ("xen/arm32: head: Widen the use of the
temporary mapping"), boot_second (used to cover regions like Xen and
the fixmap) will not be mapped if th
On 02/11/2023 10:23, Michal Orzel wrote:
/* Address in the runtime mapping to jump to after the MMU is enabled
*/
mov_w lr, primary_switched
@@ -593,6 +603,21 @@ enable_mmu:
mcr CP32(r0, HSCTLR) /* now paging is enabled */
isb
On 02/11/2023 10:23, Michal Orzel wrote:
Hi Julien,
Hi Michal,
On 02/11/2023 00:30, Julien Grall wrote:
From: Julien Grall
The sequence to enable the MMU on arm32 is quite complex as we may need
to jump to a temporary mapping to map Xen.
Recently, we had one bug in the logic (see f5a
On 02/11/2023 10:21 am, Federico Serafini wrote:
> Remove the generic implementation of memcpy(), memmove() and
> memset() from the x86 build since a version written in asm is present.
> This addesses violations of MISRA C:2012 Rule 8.6 ("An identifier with
> external linkage shall have exactly one
On 02.11.2023 11:21, Federico Serafini wrote:
> Remove the generic implementation of memcpy(), memmove() and
> memset() from the x86 build since a version written in asm is present.
> This addesses violations of MISRA C:2012 Rule 8.6 ("An identifier with
> external linkage shall have exactly one ex
Hi Julien,
On 02/11/2023 00:30, Julien Grall wrote:
>
>
> From: Julien Grall
>
> The sequence to enable the MMU on arm32 is quite complex as we may need
> to jump to a temporary mapping to map Xen.
>
> Recently, we had one bug in the logic (see f5a49eb7f8b3 ("xen/arm32:
> head: Add mising isb
Remove the generic implementation of memcpy(), memmove() and
memset() from the x86 build since a version written in asm is present.
This addesses violations of MISRA C:2012 Rule 8.6 ("An identifier with
external linkage shall have exactly one external definition").
Signed-off-by: Federico Serafini
On 30/10/23 16:01, Jan Beulich wrote:
On 25.10.2023 15:01, Federico Serafini wrote:
Make function definition and declaration consistent and emphasize that
the formal parameter is deliberately not used.
Coming back to my earlier objection: Did you consider alternatives? Best
would of course be
On 01.11.2023 03:50, Chuck Zmudzinski wrote:
> On 10/31/2023 7:45 PM, Stefano Stabellini wrote:
>> Unfortunately there is no easy solution.
>>
>> Do you know the version of the SMMU available on the platform?
> I am trying to discern, but I doubt we have v3 because we are
> working on a very old c
On 02.11.2023 10:24, Oleksii wrote:
> On Thu, 2023-11-02 at 09:39 +0100, Jan Beulich wrote:
>> On 01.11.2023 11:15, Oleksii Kurochko wrote:
>>> --- a/xen/include/xen/pci.h
>>> +++ b/xen/include/xen/pci.h
>>> @@ -68,7 +68,18 @@ typedef union {
>>> };
>>> } pci_sbdf_t;
>>>
>>> +#ifdef CONFIG_
Hi Julien,
On 02/11/2023 00:30, Julien Grall wrote:
>
>
> From: Julien Grall
>
> Since commit 5e213f0f4d2c ("xen/arm32: head: Widen the use of the
> temporary mapping"), boot_second (used to cover regions like Xen and
> the fixmap) will not be mapped if the identity mapping overlap.
>
> So it
On 23.08.2023 10:39, Juergen Gross wrote:
> The extras directory is used only as a download target for Mini-OS
> sources. Instead of special handling extras/mini-os* in .gitignore and
> the clean targets, just use extras for that purpose.
>
> So add "extras" to .gitignore and remove it when doing
On Thu, 2023-11-02 at 09:39 +0100, Jan Beulich wrote:
> On 01.11.2023 11:15, Oleksii Kurochko wrote:
> > Platforms which doesn't have HAS_PCI enabled it is needed to
> > have , which contains only an empty definition of
> > struct arch_pci_dev ( except ARM, it introduces several
> > ARM-specific fu
On 31.10.2023 14:23, Luca Fancellu wrote:
> Add a clang format configuration for the Xen Hypervisor.
>
> Signed-off-by: Luca Fancellu
> ---
> xen/.clang-format | 693 ++
> 1 file changed, 693 insertions(+)
> create mode 100644 xen/.clang-format
I thi
On 01.11.2023 20:20, Andrew Cooper wrote:
> Right now, vvmx will blindly copy L12's ACTIVITY_STATE into the L02 VMCS and
> enter the vCPU. Luckily for us, nested-virt is explicitly unsupported for
> security bugs.
>
> The inactivity states are HLT, SHUTDOWN and WAIT-FOR-SIPI, and as noted by the
On 01.11.2023 20:20, Andrew Cooper wrote:
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -4097,10 +4097,6 @@ void vmx_vmexit_handler(struct cpu_user_regs *regs)
> case EXIT_REASON_MCE_DURING_VMENTRY:
> do_machine_check(regs);
> break;
> -
> -ca
On 31.10.2023 17:33, Roger Pau Monné wrote:
> On Tue, Oct 31, 2023 at 03:30:37PM +0200, Xenia Ragiadakou wrote:
>> Do not use emuirq mappings for MSIs injected by emulated devices.
>> This kind of pirq shares the same emuirq value and is not remapped.
>
> AFAICT adding the extra emuirq mappings is
On 01.11.2023 11:15, Oleksii Kurochko wrote:
> Platforms which doesn't have HAS_PCI enabled it is needed to
> have , which contains only an empty definition of
> struct arch_pci_dev ( except ARM, it introduces several
> ARM-specific functions ).
>
> Also, for architectures ( such as PPC or RISC-V
Hi Julien, Stefano
On 2023-10-31 22:41, Stefano Stabellini wrote:
On Tue, 30 Oct 2023, Julien Grall wrote:
Hi Stefano,
On 30/10/2023 22:49, Stefano Stabellini wrote:
> On Mon, 30 Oct 2023, Julien Grall wrote:
> > Hi Nicola,
> >
> > On 27/10/2023 16:11, Nicola Vetrini wrote:
> > > diff --git a/
On 01.11.2023 21:37, Andrew Cooper wrote:
> As reported:
>
> (XEN)
>
> (XEN) UBSAN: Undefined behaviour in arch/x86/time.c:1542:32
> (XEN) member access within null pointer of type 'union vcpu_info_t'
> (XEN)
On 11/1/2023 2:41 PM, Jason Andryuk wrote:
> From: Roger Pau Monne
>
> The Processor capability bits notify ACPI of the OS capabilities, and
> so ACPI can adjust the return of other Processor methods taking the OS
> capabilities into account.
>
> When Linux is running as a Xen dom0, the hypervi
On 01.11.23 20:21, Jason Andryuk wrote:
On Wed, Nov 1, 2023 at 5:34 AM Juergen Gross wrote:
Add the code for connecting to frontends to xenlogd.
Signed-off-by: Juergen Gross
diff --git a/tools/xenlogd/xenlogd.c b/tools/xenlogd/xenlogd.c
index 792d1026a3..da0a09a122 100644
--- a/tools/xenl
On 01.11.23 19:36, Jason Andryuk wrote:
On Wed, Nov 1, 2023 at 10:27 AM Juergen Gross wrote:
Add "xenlogd", a new logging daemon meant to support infrastructure
domains (e.g. xenstore-stubdom) to write log files in dom0.
As I understand it, your new daemon is a generic 9pfs backend, which
yo
Hi Julien,
On 2023-11-02 00:42, Julien Grall wrote:
Hi Stefano,
On 01/11/2023 23:10, Stefano Stabellini wrote:
On Wed, 1 Nov 2023, Nicola Vetrini wrote:
As stated in rules.rst, functions used only in asm modules
are allowed to have no prior declaration visible when being
defined, hence these
On 01.11.23 19:31, Jason Andryuk wrote:
On Wed, Nov 1, 2023 at 7:24 AM Juergen Gross wrote:
Add some optional additional backend paths for 9pfs PV devices. Those
paths will be supported by the new xenlogd 9pfs backend.
Signed-off-by: Juergen Gross
---
xen/include/public/io/9pfs.h | 34
On 01.11.23 17:57, Andrew Cooper wrote:
On 01/11/2023 4:42 pm, Juergen Gross wrote:
On 01.11.23 17:38, Andrew Cooper wrote:
On 01/11/2023 9:00 am, Juergen Gross wrote:
It might be perfectly fine not to have a control/shutdown Xenstore
node. If this is the case, don't crash, but just terminate
flight 183651 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/183651/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 183617
test-amd64-amd64-xl-qemuu-win7-amd64
71 matches
Mail list logo