flight 150237 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150237/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 146182
build-i386-libvirt
In case opt_ept_ad has not been set explicitly by the user via command
line or runtime parameter, it is treated as "no" on Avoton cpus.
Change that handling by setting opt_ept_ad to 0 for this cpu type
explicitly if no user value has been set.
By putting this into the (renamed) boot time initiali
Instead of xc_set_parameters() use xenhypfs_write() for setting
parameters of the hypervisor.
Signed-off-by: Juergen Gross
---
V6:
- new patch
---
tools/Rules.mk | 2 +-
tools/libxl/Makefile | 3 +-
tools/libxl/libxl.c | 53
t
There is no user of xc_set_parameters() left, so remove it.
Signed-off-by: Juergen Gross
---
V6:
- new patch
---
tools/libxc/include/xenctrl.h | 1 -
tools/libxc/xc_misc.c | 21 -
2 files changed, 22 deletions(-)
diff --git a/tools/libxc/include/xenctrl.h b/tools/li
The functionality of XEN_SYSCTL_set_parameter is available via hypfs
now, so it can be removed.
This allows to remove the kernel_param structure for runtime parameters
by putting the now only used structure element into the hypfs node
structure of the runtime parameters.
Signed-off-by: Juergen Gr
Provide version and compile information in /buildinfo/ node of the
Xen hypervisor file system. As this information is accessible by dom0
only no additional security problem arises.
Signed-off-by: Juergen Gross
Reviewed-by: Jan Beulich
---
V3:
- new patch
V4:
- add __read_mostly annotations (Jan
Add a new script xen/tools/binfile for including a binary file at build
time being usable via a pointer and a size variable in the hypervisor.
Make use of that generic tool in xsm.
Signed-off-by: Juergen Gross
Reviewed-by: Jan Beulich
Reviewed-by: Wei Liu
---
V3:
- new patch
V4:
- add alignme
Add the infrastructure for the hypervisor filesystem.
This includes the hypercall interface and the base functions for
entry creation, deletion and modification.
In order not to have to repeat the same pattern multiple times in case
adding a new node should BUG_ON() failure, the helpers for addin
Add the /buildinfo/config entry to the hypervisor filesystem. This
entry contains the .config file used to build the hypervisor.
Signed-off-by: Juergen Gross
Reviewed-by: Jan Beulich
---
V3:
- store data in gzip format
- use binfile mechanism to create data file
- move code to kernel.c
V6:
- ad
Add support to read and modify values of hypervisor runtime parameters
via the hypervisor file system.
As runtime parameters can be modified via a sysctl, too, this path has
to take the hypfs rw_lock as writer.
For custom runtime parameters the connection between the parameter
value and the file
On the 2019 Xen developer summit there was agreement that the Xen
hypervisor should gain support for a hierarchical name-value store
similar to the Linux kernel's sysfs.
In the beginning there should only be basic support: entries can be
added from the hypervisor itself only, there is a simple hyp
Add the new library libxenhypfs for access to the hypervisor filesystem.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
V1:
- rename to libxenhypfs
- add xenhypfs_write()
V3:
- major rework due to new hypervisor interface
- add decompression capability
V4:
- add dependency to libz in pkgco
Add the xenfs tool for accessing the hypervisor filesystem.
Signed-off-by: Juergen Gross
Acked-by: Wei Liu
---
V1:
- rename to xenhypfs
- don't use "--" for subcommands
- add write support
V2:
- escape non-printable characters per default with cat subcommand
(Ian Jackson)
- add -b option to c
On the 2019 Xen developer summit there was agreement that the Xen
hypervisor should gain support for a hierarchical name-value store
similar to the Linux kernel's sysfs.
This is a first implementation of that idea adding the basic
functionality to hypervisor and tools side. The interface to any
us
On 19.05.20 09:20, Juergen Gross wrote:
On the 2019 Xen developer summit there was agreement that the Xen
hypervisor should gain support for a hierarchical name-value store
similar to the Linux kernel's sysfs.
This is a first implementation of that idea adding the basic
functionality to hypervis
On 18.05.2020 19:31, Manuel Bouyer wrote:
> From what I found it seems that all unallocated memory is tagged p2m_mmio_dm,
> is it right ?
Yes. For many years there has been a plan to better separate this from
p2m_invalid ...
Jan
On 19.05.2020 09:30, Jürgen Groß wrote:
> On 19.05.20 09:20, Juergen Gross wrote:
>>
>> Juergen Gross (12):
>>xen/vmx: let opt_ept_ad always reflect the current setting
>>xen: add a generic way to include binary files as variables
>>docs: add feature document for Xen hypervisor sysfs-li
On 19.05.2020 09:20, Juergen Gross wrote:
> --- a/xen/xsm/flask/Makefile
> +++ b/xen/xsm/flask/Makefile
> @@ -39,6 +39,9 @@ $(subst include/,%/,$(AV_H_FILES)): $(AV_H_DEPEND)
> $(mkaccess) FORCE
> obj-bin-$(CONFIG_XSM_FLASK_POLICY) += flask-policy.o
> flask-policy.o: policy.bin
>
> +flask-poli
On 19.05.20 09:47, Jan Beulich wrote:
On 19.05.2020 09:20, Juergen Gross wrote:
--- a/xen/xsm/flask/Makefile
+++ b/xen/xsm/flask/Makefile
@@ -39,6 +39,9 @@ $(subst include/,%/,$(AV_H_FILES)): $(AV_H_DEPEND)
$(mkaccess) FORCE
obj-bin-$(CONFIG_XSM_FLASK_POLICY) += flask-policy.o
flask-policy.
On 18.05.2020 19:09, Roger Pau Monné wrote:
> On Wed, Sep 25, 2019 at 05:23:11PM +0200, Jan Beulich wrote:
>> @@ -310,7 +313,16 @@ int pv_domain_initialise(struct domain *
>> /* 64-bit PV guest by default. */
>> d->arch.is_32bit_pv = d->arch.has_32bit_shinfo = 0;
>>
>> -d->arch.pv.x
On 19.05.2020 09:52, Jürgen Groß wrote:
> On 19.05.20 09:47, Jan Beulich wrote:
>> On 19.05.2020 09:20, Juergen Gross wrote:
>>> --- a/xen/xsm/flask/Makefile
>>> +++ b/xen/xsm/flask/Makefile
>>> @@ -39,6 +39,9 @@ $(subst include/,%/,$(AV_H_FILES)): $(AV_H_DEPEND)
>>> $(mkaccess) FORCE
>>> obj-bi
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 08:45
> To: Jürgen Groß ; Kevin Tian ; Julien
> Grall ;
> Jun Nakajima ; Wei Liu ; Ian Jackson
> ;
> Daniel De Graaf ; Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Stefano Stabellini
> ; Andrew Cooper
> ; George Dunlap
On Tue, May 19, 2020 at 09:21:05AM +0200, Juergen Gross wrote:
> There is no user of xc_set_parameters() left, so remove it.
>
> Signed-off-by: Juergen Gross
Acked-by: Wei Liu
On 19.05.20 09:58, Jan Beulich wrote:
On 19.05.2020 09:52, Jürgen Groß wrote:
On 19.05.20 09:47, Jan Beulich wrote:
On 19.05.2020 09:20, Juergen Gross wrote:
--- a/xen/xsm/flask/Makefile
+++ b/xen/xsm/flask/Makefile
@@ -39,6 +39,9 @@ $(subst include/,%/,$(AV_H_FILES)): $(AV_H_DEPEND)
$(mkacce
On 18.05.2020 17:38, Andrew Cooper wrote:
> The reserved_bit_page_fault() paths effectively turn reserved bit faults into
> a warning, but in the light of L1TF, the real impact is far more serious.
>
> Xen does not have any reserved bits set in its pagetables, nor do we permit PV
> guests to write
On Tue, May 19, 2020 at 09:21:04AM +0200, Juergen Gross wrote:
> Instead of xc_set_parameters() use xenhypfs_write() for setting
> parameters of the hypervisor.
>
> Signed-off-by: Juergen Gross
> ---
> V6:
> - new patch
> ---
> tools/Rules.mk | 2 +-
> tools/libxl/Makefile
I have queued up the first 5 patches for committing today.
Wei.
On 18.05.2020 17:38, Andrew Cooper wrote:
> @@ -1439,6 +1418,18 @@ void do_page_fault(struct cpu_user_regs *regs)
> if ( unlikely(fixup_page_fault(addr, regs) != 0) )
> return;
>
> +/*
> + * Xen have reserved bits in its pagetables, nor do we permit PV guests
> to
> + *
On Fri, Dec 20, 2019 at 02:49:48PM +0100, Jan Beulich wrote:
> It is wrong for us to check frames beyond the guest specified limit
> (in the native case, other than in the compat one).
Wouldn't this result in arch_set_info_guest failing if gdt_ents was
smaller than the maximum? Or all callers alwa
On Tue, May 19, 2020 at 09:34:30AM +0200, Jan Beulich wrote:
> On 18.05.2020 19:31, Manuel Bouyer wrote:
> > From what I found it seems that all unallocated memory is tagged
> > p2m_mmio_dm,
> > is it right ?
>
> Yes. For many years there has been a plan to better separate this from
> p2m_invalid
On 18.05.2020 18:54, Andrew Cooper wrote:
> On 11/05/2020 16:09, Jan Beulich wrote:
>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
>> unless you have verified the sender and know the content is safe.
>>
>> On 11.05.2020 17:01, Andrew Cooper wrote:
>>> On 04/05/2020 14
On 19.05.2020 10:46, Manuel Bouyer wrote:
> Note that I'm using the 4.13.0 release sources, not the top of branch.
> Is it something that could have been fixed after the release ?
I don't recall anything, but switching to 4.13.1 would still seem like
a helpful thing for you to do.
Jan
On Wed, Mar 11, 2020 at 05:59:33PM +, Anthony PERARD wrote:
> Whenever python scripts are install, have the shebang be modified to use
> whatever PYTHON_PATH is. This is useful for system where python isn't
> available, or
> where the package build tools prevent unversioned shebang.
>
> INSTA
On Wed, Mar 11, 2020 at 05:59:32PM +, Anthony PERARD wrote:
> This allows to use install-wrap when the source scripts is in a
> subdirectory.
>
> Signed-off-by: Anthony PERARD
> ---
> tools/python/install-wrap | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/tools/py
On Fri, Dec 20, 2019 at 02:50:06PM +0100, Jan Beulich wrote:
> It is wrong for us to check the base address when there's no LDT in the
> first place. Once we don't do this check anymore we can also set the
> base address to a non-canonical value when the LDT is empty.
>
> Signed-off-by: Jan Beulic
On 19.05.2020 11:02, Roger Pau Monné wrote:
> On Fri, Dec 20, 2019 at 02:50:06PM +0100, Jan Beulich wrote:
>> It is wrong for us to check the base address when there's no LDT in the
>> first place. Once we don't do this check anymore we can also set the
>> base address to a non-canonical value when
On Tue, May 19, 2020 at 09:55:38AM +0200, Jan Beulich wrote:
> On 18.05.2020 19:09, Roger Pau Monné wrote:
> > On Wed, Sep 25, 2019 at 05:23:11PM +0200, Jan Beulich wrote:
> >> @@ -310,7 +313,16 @@ int pv_domain_initialise(struct domain *
> >> /* 64-bit PV guest by default. */
> >> d->arc
On Tue, May 19, 2020 at 11:12:49AM +0200, Jan Beulich wrote:
> On 19.05.2020 11:02, Roger Pau Monné wrote:
> > On Fri, Dec 20, 2019 at 02:50:06PM +0100, Jan Beulich wrote:
> >> It is wrong for us to check the base address when there's no LDT in the
> >> first place. Once we don't do this check anym
On 19.05.2020 10:42, Roger Pau Monné wrote:
> On Fri, Dec 20, 2019 at 02:49:48PM +0100, Jan Beulich wrote:
>> It is wrong for us to check frames beyond the guest specified limit
>> (in the native case, other than in the compat one).
>
> Wouldn't this result in arch_set_info_guest failing if gdt_en
On Tue, May 19, 2020 at 09:58:15AM +0100, Wei Liu wrote:
> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
> unless you have verified the sender and know the content is safe.
>
> On Wed, Mar 11, 2020 at 05:59:32PM +, Anthony PERARD wrote:
> > This allows to use insta
On Mon, May 11, 2020 at 03:10:07PM +0200, Jan Beulich wrote:
> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
> unless you have verified the sender and know the content is safe.
>
> On 11.05.2020 12:31, Roger Pau Monne wrote:
> > Add entries for the relevant changes I'v
On 19.05.2020 11:15, Roger Pau Monné wrote:
> On Tue, May 19, 2020 at 09:55:38AM +0200, Jan Beulich wrote:
>> On 18.05.2020 19:09, Roger Pau Monné wrote:
>>> On Wed, Sep 25, 2019 at 05:23:11PM +0200, Jan Beulich wrote:
@@ -310,7 +313,16 @@ int pv_domain_initialise(struct domain *
/*
On 19.05.2020 11:43, Roger Pau Monné wrote:
> On Mon, May 11, 2020 at 03:10:07PM +0200, Jan Beulich wrote:
>> [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
>> unless you have verified the sender and know the content is safe.
>>
>> On 11.05.2020 12:31, Roger Pau Monne wr
On Sun, May 17, 2020 at 07:56:07PM +0200, Manuel Bouyer wrote:
> On Sun, May 17, 2020 at 07:32:59PM +0200, Manuel Bouyer wrote:
> > I've been looking a bit deeper in the Xen kernel.
> > The mapping is failed in ./arch/x86/mm/p2m.c:p2m_get_page_from_gfn(),
> > /* Error path: not a suitable G
On Tue, May 19, 2020 at 10:42:22AM +0100, Anthony PERARD wrote:
> On Tue, May 19, 2020 at 09:58:15AM +0100, Wei Liu wrote:
> > [CAUTION - EXTERNAL EMAIL] DO NOT reply, click links, or open attachments
> > unless you have verified the sender and know the content is safe.
> >
Haha :-)
> > On Wed,
On Tue, May 19, 2020 at 11:54:07AM +0200, Roger Pau Monné wrote:
> FWIW, FreeBSD doesn't have osdep_xenforeignmemory_map_resource
> implemented and still works fine with 4.13.0 (is able to create HVM
> guests), but that's a PVH dom0, not a PV one.
Yes, FreeBSD is PVH-nnly. This implies different c
On Mon, May 11, 2020 at 02:40:43PM +0100, Anthony PERARD wrote:
> On Mon, May 04, 2020 at 12:14:43PM +0200, Roger Pau Monne wrote:
> > diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h
> > index 179775db7b..660dd8a008 100644
> > --- a/hw/xen/xen_pt.h
> > +++ b/hw/xen/xen_pt.h
> > @@ -1,6 +1,7 @@
> >
flight 150236 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150236/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-vhd 11 guest-start fail REGR. vs. 150230
Tests which did not
On Tue, 19 May 2020 at 12:28, Roger Pau Monné wrote:
>
> On Mon, May 11, 2020 at 02:40:43PM +0100, Anthony PERARD wrote:
> > On Mon, May 04, 2020 at 12:14:43PM +0200, Roger Pau Monne wrote:
> > > diff --git a/hw/xen/xen_pt.h b/hw/xen/xen_pt.h
> > > index 179775db7b..660dd8a008 100644
> > > --- a/h
flight 150242 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150242/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 14.05.2020 12:44, Paul Durrant wrote:
> --- /dev/null
> +++ b/xen/common/save.c
> @@ -0,0 +1,313 @@
> +/*
> + * save.c: Save and restore PV guest state common to all domain types.
> + *
> + * Copyright Amazon.com Inc. or its affiliates.
> + *
> + * This program is free software; you can redistri
On 14.05.2020 12:44, Paul Durrant wrote:
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -1129,6 +1129,43 @@ struct xen_domctl_vuart_op {
> */
> };
>
> +/*
> + * XEN_DOMCTL_getdomaincontext
> + * ---
> + *
> +
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 14:04
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Paul Durrant ;
> Andrew Cooper
> ; George Dunlap ; Ian
> Jackson
> ; Julien Grall ; Stefano Stabellini
> ; Wei Liu ; Volodymyr Babchuk
> ; Roger
> Pau Monné
> Su
On 14.05.2020 12:44, Paul Durrant wrote:
> @@ -61,6 +62,76 @@ static void dump_header(void)
>
> }
>
> +static void print_binary(const char *prefix, void *val, size_t size,
const also for val?
> + const char *suffix)
> +{
> +printf("%s", prefix);
> +
> +while (
On 19/05/2020 09:34, Jan Beulich wrote:
> On 18.05.2020 17:38, Andrew Cooper wrote:
>> @@ -1439,6 +1418,18 @@ void do_page_fault(struct cpu_user_regs *regs)
>> if ( unlikely(fixup_page_fault(addr, regs) != 0) )
>> return;
>>
>> +/*
>> + * Xen have reserved bits in its pageta
On Tue, May 19, 2020 at 01:20:51PM +0100, Peter Maydell wrote:
> On Tue, 19 May 2020 at 12:28, Roger Pau Monné wrote:
> >
> > On Mon, May 11, 2020 at 02:40:43PM +0100, Anthony PERARD wrote:
> > > On Mon, May 04, 2020 at 12:14:43PM +0200, Roger Pau Monne wrote:
> > > > diff --git a/hw/xen/xen_pt.h
On 19.05.2020 16:04, Paul Durrant wrote:
>> From: Jan Beulich
>> Sent: 19 May 2020 14:04
>>
>> On 14.05.2020 12:44, Paul Durrant wrote:
>>> --- /dev/null
>>> +++ b/xen/include/xen/save.h
>>> @@ -0,0 +1,165 @@
>>> +/*
>>> + * save.h: support routines for save/restore
>>> + *
>>> + * Copyright Amazo
On 19/05/2020 09:14, Jan Beulich wrote:
> On 18.05.2020 17:38, Andrew Cooper wrote:
>> The reserved_bit_page_fault() paths effectively turn reserved bit faults into
>> a warning, but in the light of L1TF, the real impact is far more serious.
>>
>> Xen does not have any reserved bits set in its page
has_igd_gfx_passthru is only available when QEMU is built with
CONFIG_XEN_PCI_PASSTHROUGH, and hence shouldn't be used in common
code without checking if it's available.
Fixes: 46472d82322d0 ('xen: convert "-machine igd-passthru" to an accelerator
property')
Signed-off-by: Roger Pau Monné
---
Cc
On 19.05.2020 16:11, Andrew Cooper wrote:
> On 19/05/2020 09:34, Jan Beulich wrote:
>> On 18.05.2020 17:38, Andrew Cooper wrote:
>>> @@ -1439,6 +1418,18 @@ void do_page_fault(struct cpu_user_regs *regs)
>>> if ( unlikely(fixup_page_fault(addr, regs) != 0) )
>>> return;
>>>
>>> +
On 19.05.2020 16:29, Andrew Cooper wrote:
> On 19/05/2020 09:14, Jan Beulich wrote:
>> On 18.05.2020 17:38, Andrew Cooper wrote:
>>> The reserved_bit_page_fault() paths effectively turn reserved bit faults
>>> into
>>> a warning, but in the light of L1TF, the real impact is far more serious.
>>>
>
Hi. My attention was drawn to this thread.
As I understand it, everyone is agreed that deduplicating the
implementation is good (I also agree). The debate is only between:
1. Put it in xen/ until an arch comes along that needs something
different, at which point maybe introduce an asm-generic
Jason Andryuk writes ("[PATCH v7 06/19] libxl: Use libxl__xs_* in
libxl__write_stub_dmargs"):
> Re-work libxl__write_stub_dmargs to use libxl_xs_* functions in a loop.
Cool, thank you!
Acked-by: Ian Jackson
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 15:24
> To: p...@xen.org
> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
> 'Andrew Cooper'
> ; 'George Dunlap' ; 'Ian
> Jackson'
> ; 'Julien Grall' ; 'Stefano
> Stabellini'
> ; 'Wei Liu' ; 'Volodymyr Babchuk'
> ;
> 'Ro
Jason Andryuk writes ("[PATCH v7 07/19] libxl: write qemu arguments into
separate xenstore keys"):
> From: Marek Marczykowski-Górecki
>
> This allows using arguments with spaces, like -append, without
> nominating any special "separator" character.
>
> Signed-off-by: Marek Marczykowski-Górecki
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 14:49
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Paul Durrant ;
> Daniel De Graaf
> ; Ian Jackson ; Wei Liu
> ; Andrew Cooper
> ; George Dunlap ; Julien
> Grall ;
> Stefano Stabellini
> Subject: Re: [PATCH v3 2
On 19.05.2020 17:10, Paul Durrant wrote:
>> From: Jan Beulich
>> Sent: 19 May 2020 15:24
>>
>> On 19.05.2020 16:04, Paul Durrant wrote:
From: Jan Beulich
Sent: 19 May 2020 14:04
On 14.05.2020 12:44, Paul Durrant wrote:
> +/*
> + * Register save and restore handlers. Sa
On Tue, May 19, 2020 at 04:10:09PM +0100, Ian Jackson wrote:
> Jason Andryuk writes ("[PATCH v7 07/19] libxl: write qemu arguments into
> separate xenstore keys"):
> > From: Marek Marczykowski-Górecki
> >
> > This allows using arguments with spaces, like -append, without
> > nominating any speci
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 15:08
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Paul Durrant ; Ian
> Jackson
> ; Wei Liu ; Andrew Cooper
> ; George
> Dunlap ; Julien Grall ; Stefano
> Stabellini
>
> Subject: Re: [PATCH v3 4/5] common/domain:
Address late comments on ecb913be4aaa ("x86/mem-paging: correct
p2m_mem_paging_prep()'s error handling"):
- insert a gprintk() ahead of domain_crash(),
- add a comment.
Requested-by: Andrew Cooper
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/mm/mem_paging.c
+++ b/xen/arch/x86/mm/mem_paging.c
@
On 19/05/2020 16:28, Jan Beulich wrote:
> Address late comments on ecb913be4aaa ("x86/mem-paging: correct
> p2m_mem_paging_prep()'s error handling"):
> - insert a gprintk() ahead of domain_crash(),
> - add a comment.
>
> Requested-by: Andrew Cooper
> Signed-off-by: Jan Beulich
Reviewed-by: Andre
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 16:18
> To: p...@xen.org
> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
> 'Andrew Cooper'
> ; 'George Dunlap' ; 'Ian
> Jackson'
> ; 'Julien Grall' ; 'Stefano
> Stabellini'
> ; 'Wei Liu' ; 'Volodymyr Babchuk'
> ;
> 'Ro
On 19/05/2020 15:48, Jan Beulich wrote:
> On 19.05.2020 16:11, Andrew Cooper wrote:
>> On 19/05/2020 09:34, Jan Beulich wrote:
>>> On 18.05.2020 17:38, Andrew Cooper wrote:
@@ -1439,6 +1418,18 @@ void do_page_fault(struct cpu_user_regs *regs)
if ( unlikely(fixup_page_fault(addr, regs
On 19.05.2020 17:21, Paul Durrant wrote:
>> From: Jan Beulich
>> Sent: 19 May 2020 15:08
>>
>> On 14.05.2020 12:44, Paul Durrant wrote:
>>> --- a/xen/include/public/save.h
>>> +++ b/xen/include/public/save.h
>>> @@ -73,7 +73,16 @@ struct domain_save_header {
>>> };
>>> DECLARE_DOMAIN_SAVE_TYPE(H
On Tue, May 19, 2020 at 11:21 AM Wei Liu wrote:
>
> On Tue, May 19, 2020 at 04:10:09PM +0100, Ian Jackson wrote:
> > Jason Andryuk writes ("[PATCH v7 07/19] libxl: write qemu arguments into
> > separate xenstore keys"):
> > > From: Marek Marczykowski-Górecki
> > >
> > > This allows using argumen
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 16:34
> To: p...@xen.org
> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
> 'Ian Jackson'
> ; 'Wei Liu' ; 'Andrew Cooper'
> ;
> 'George Dunlap' ; 'Julien Grall' ;
> 'Stefano Stabellini'
>
> Subject: Re: [PATCH v3 4/5] c
On 19.05.2020 17:32, Paul Durrant wrote:
>> -Original Message-
>> From: Jan Beulich
>> Sent: 19 May 2020 16:18
>> To: p...@xen.org
>> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
>> 'Andrew Cooper'
>> ; 'George Dunlap' ;
>> 'Ian Jackson'
>> ; 'Julien Grall' ; 'Stefano
>> Stabell
flight 150238 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150238/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 4 memdisk-try-append fail REGR. vs. 150227
Tests which did no
> -Original Message-
> From: Jan Beulich
> Sent: 19 May 2020 16:37
> To: p...@xen.org
> Cc: xen-devel@lists.xenproject.org; 'Paul Durrant' ;
> 'Andrew Cooper'
> ; 'George Dunlap' ; 'Ian
> Jackson'
> ; 'Julien Grall' ; 'Stefano
> Stabellini'
> ; 'Wei Liu' ; 'Volodymyr Babchuk'
> ;
> 'Ro
On Tue, May 19, 2020 at 04:31:01PM +0200, Roger Pau Monne wrote:
> has_igd_gfx_passthru is only available when QEMU is built with
> CONFIG_XEN_PCI_PASSTHROUGH, and hence shouldn't be used in common
> code without checking if it's available.
>
> Fixes: 46472d82322d0 ('xen: convert "-machine igd-pas
On 19/05/2020 15:55, Jan Beulich wrote:
> On 19.05.2020 16:29, Andrew Cooper wrote:
>> On 19/05/2020 09:14, Jan Beulich wrote:
>>> On 18.05.2020 17:38, Andrew Cooper wrote:
The reserved_bit_page_fault() paths effectively turn reserved bit faults
into
a warning, but in the light of L
On 19.05.2020 17:33, Andrew Cooper wrote:
> On 19/05/2020 15:48, Jan Beulich wrote:
>> On 19.05.2020 16:11, Andrew Cooper wrote:
>>> Given that shadow frames are limited to 44 bits anyway (and not yet
>>> levelled safely in the migration stream), my suggestion for fixing this
>>> was just to use on
flight 150245 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150245/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 18/05/2020 21:34, Volodymyr Babchuk wrote:
Hi Julien,
Hi Volodymyr,
Thank you for the review.
On Mon, 2020-05-18 at 12:30 +0100, Julien Grall wrote:
From: Julien Grall
At the moment, Xen is assuming that all the devices are at least 32-bit
DMA capable. However, some SoCs have devic
On 18/05/2020 21:36, Volodymyr Babchuk wrote:
Hi Julien,
Hi,
On Mon, 2020-05-18 at 12:30 +0100, Julien Grall wrote:
From: Julien Grall
The raspberry PI 4 has devices that can only DMA into the first GB of
the RAM. Therefore we want allocate as much as possible memory below 1GB
for dom0
Hi Corey,
On 19/05/2020 01:02, Corey Minyard wrote:
On Mon, May 18, 2020 at 08:36:08PM +, Volodymyr Babchuk wrote:
Hi Julien,
On Mon, 2020-05-18 at 12:30 +0100, Julien Grall wrote:
From: Julien Grall
The raspberry PI 4 has devices that can only DMA into the first GB of
the RAM. Therefor
From: Julien Grall
Hi all,
At the moment, a user who wants to boot Xen on the Raspberry Pi 4 can
only use the first GB of memory.
This is because several devices cannot DMA above 1GB but Xen doesn't
necessarily allocate memory for Dom0 below 1GB.
This small series is trying to address the prob
From: Julien Grall
At the moment, Xen is assuming that all the devices are at least 32-bit
DMA capable. However, some SoCs have devices that may be able to access
a much restricted range. For instance, the Raspberry PI 4 has devices
that can only access the first GB of RAM.
The function arch_get
From: Julien Grall
At the moment, Xen is assuming that all the devices are at least 32-bit
DMA capable. However, some SoC have devices that may be able to access
a much restricted range. For instance, the RPI has devices that can
only access the first 1GB of RAM.
The structure platform_desc is n
From: Julien Grall
The raspberry PI 4 has devices that can only DMA into the first GB of
the RAM. Therefore we want allocate as much as possible memory below 1GB
for dom0.
Use the recently introduced dma_bitsize field to specify the DMA width
supported.
Signed-off-by: Julien Grall
Reported-by:
On 19/05/2020 04:08, Tamas K Lengyel wrote:
On Mon, May 18, 2020 at 5:32 AM Julien Grall wrote:
From: Julien Grall
Hi all,
At the moment, a user who wants to boot Xen on the Raspberry Pi 4 can
only use the first GB of memory.
This is because several devices cannot DMA above 1GB but Xen
On Tue, May 19, 2020 at 04:52:58PM +0100, Anthony PERARD wrote:
> On Tue, May 19, 2020 at 04:31:01PM +0200, Roger Pau Monne wrote:
> > has_igd_gfx_passthru is only available when QEMU is built with
> > CONFIG_XEN_PCI_PASSTHROUGH, and hence shouldn't be used in common
> > code without checking if it
On 19/05/2020 17:09, Jan Beulich wrote:
> On 19.05.2020 17:33, Andrew Cooper wrote:
>> On 19/05/2020 15:48, Jan Beulich wrote:
>>> On 19.05.2020 16:11, Andrew Cooper wrote:
Given that shadow frames are limited to 44 bits anyway (and not yet
levelled safely in the migration stream), my sug
flight 150243 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/150243/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-rtds 18 guest-localmigrate/x10 fail like 150235
test-amd64-amd64-xl-qemuu-win7-amd6
buster is Debian stable right now. We don't want to be using
oldstable because Debian have a history of breaking it.
Paul: we should have a conversation about whether this should be
pushed soon, or deferred until after the Xen 4.14 release.
I have yet to do a final full formal retest of this ser
This seems mostly to affect buster but it could in principle affect
earlier releases too I think.
In principle it would be nice to fix this bug, and to have a proper
test for it, but a reliable test is hard and an unreliable one is not
useful. So I guess we are going to have this workaround
indef
The documentation seesm to think this is the default but empirically
it isn't. In our environment --yes is fine.
I have reported this to Debian as #953183. Also vaguely related (and
discovered by me at the same time) is #953185.
This came up while trying to get things work on buster. I don't k
In buster, d-i wants when setting up the network, ie before the
preseed is loaded.
We leave it in the preseed too because why not.
I think this change should be fine for older versions of Debian.
Signed-off-by: Ian Jackson
---
Osstest/Debian.pm | 3 ++-
1 file changed, 2 insertions(+), 1 delet
Because systemd did something obnoxious, the kernel retaliated in the
game of Core Wars by hiding all arguments before `--' from userspace.
So use `---' instead so that all the arguments remain visible.
This in some sense now applies to host installs a change we had
already made to Debian HVM gues
Empirically some of these operations can take longer than 30s,
especially with a cold cache.
Note that because of host sharing and our on-host apt lock, the
timeout needs to be the same for every apt operation: a fast operation
could be blocked behind a slow one.
Signed-off-by: Ian Jackson
---
1 - 100 of 157 matches
Mail list logo