Re: Working Group for Secure Boot

2021-03-12 Thread Jan Beulich
On 11.03.2021 19:34, Bob Eshleman wrote: > We would like to start a working group for secure boot support in Xen > to coordinate the various interested parties and set out a plan for > the feature and its implications for the whole Xen system. > > The end goal is a full implementation that restric

[GIT PULL] xen: branch for v5.12-rc3

2021-03-12 Thread Juergen Gross
Linus, Please git pull the following tag: git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git for-linus-5.12b-rc3-tag xen: branch for v5.12-rc3 It contains two patch series and a single patch: - a small cleanup patch to remove unneeded symbol exports - a series to cleanup Xen grant han

Re: [PATCH v2 1/2][4.15] tools/x86: don't rebuild cpuid-autogen.h every time

2021-03-12 Thread Jan Beulich
On 11.03.2021 16:29, Roger Pau Monné wrote: > On Thu, Mar 11, 2021 at 03:40:05PM +0100, Jan Beulich wrote: >> The first thing the "xen-dir" rule does is delete the entire xen/ >> subtree. Obviously this includes deleting xen/lib/x86/*autogen.h. As a >> result there's no original version for $(move-

Re: [PATCH v3 1/2][4.15] x86/PV: conditionally avoid raising #GP for early guest MSR reads

2021-03-12 Thread Roger Pau Monné
On Fri, Mar 12, 2021 at 08:54:46AM +0100, Jan Beulich wrote: > Prior to 4.15 Linux, when running in PV mode, did not install a #GP > handler early enough to cover for example the rdmsrl_safe() of > MSR_K8_TSEG_ADDR in bsp_init_amd() (not to speak of the unguarded read > of MSR_K7_HWCR later in the

Re: [PATCH v2 1/2][4.15] tools/x86: don't rebuild cpuid-autogen.h every time

2021-03-12 Thread Roger Pau Monné
On Fri, Mar 12, 2021 at 09:45:35AM +0100, Jan Beulich wrote: > On 11.03.2021 16:29, Roger Pau Monné wrote: > > On Thu, Mar 11, 2021 at 03:40:05PM +0100, Jan Beulich wrote: > >> The first thing the "xen-dir" rule does is delete the entire xen/ > >> subtree. Obviously this includes deleting xen/lib/x

Re: [PATCH v2 1/2][4.15] tools/x86: don't rebuild cpuid-autogen.h every time

2021-03-12 Thread Jan Beulich
On 12.03.2021 10:17, Roger Pau Monné wrote: > On Fri, Mar 12, 2021 at 09:45:35AM +0100, Jan Beulich wrote: >> On 11.03.2021 16:29, Roger Pau Monné wrote: >>> On Thu, Mar 11, 2021 at 03:40:05PM +0100, Jan Beulich wrote: The first thing the "xen-dir" rule does is delete the entire xen/ subt

Re: [PATCH v3 1/2][4.15] x86/PV: conditionally avoid raising #GP for early guest MSR reads

2021-03-12 Thread Jan Beulich
On 12.03.2021 10:08, Roger Pau Monné wrote: > On Fri, Mar 12, 2021 at 08:54:46AM +0100, Jan Beulich wrote: >> Prior to 4.15 Linux, when running in PV mode, did not install a #GP >> handler early enough to cover for example the rdmsrl_safe() of >> MSR_K8_TSEG_ADDR in bsp_init_amd() (not to speak of

Re: [PATCH] xen/arm: Prevent Dom0 to be loaded when using dom0less

2021-03-12 Thread Luca Fancellu
Hi all, > On 8 Mar 2021, at 14:12, Julien Grall wrote: > > Hi Luca, > > On 08/03/2021 11:56, Luca Fancellu wrote: >> This patch prevents the dom0 to be loaded skipping its >> building and going forward to build domUs when the dom0 >> kernel is not found and at least one domU is present. > > As

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Ian Jackson
Julien Grall writes ("Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning"): > This is pretty much what we are already doing slowly by initializing > values to shut up older compilers. I agree this is more limited, but we > also waive off diagnostics from every single compi

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Jan Beulich
On 12.03.2021 11:04, Ian Jackson wrote: > Julien Grall writes ("Re: [PATCH][4.15] gnttab: work around "may be used > uninitialized" warning"): >> This is pretty much what we are already doing slowly by initializing >> values to shut up older compilers. I agree this is more limited, but we >> als

Re: [PATCH v2 1/2][4.15] tools/x86: don't rebuild cpuid-autogen.h every time

2021-03-12 Thread Ian Jackson
Jan Beulich writes ("[PATCH v2 1/2][4.15] tools/x86: don't rebuild cpuid-autogen.h every time"): > Ian did suggest to pass -0r to xargs (and -print0 to find), but I > couldn't convince myself that these are standard compliant options. We > don't use any special characters in file names, so -print0

Re: [PATCH v2 2/2] tools/x86: move arch-specific include/xen/ population into arch-specific rule

2021-03-12 Thread Ian Jackson
Jan Beulich writes ("[PATCH v2 2/2] tools/x86: move arch-specific include/xen/ population into arch-specific rule"): > There's no need for the common "xen-dir" rule to have an arch-specific > part when there already is a arch-specific rule where this can be taken > care of (arguably instead of all

Re: [PATCH v7 0/5] Introducing QMP query-netdev command

2021-03-12 Thread Alexey Kirillov
ping Patchew page: https://patchew.org/QEMU/20210303095910.78277-1-lekir...@yandex-team.ru 03.03.2021, 13:01, "Alexey Kirillov" : > This patch series introduces a new QMP command "query-netdev" to get > information about currently attached backend network devices (netdevs). > > Also, since the "

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Ian Jackson
Jan Beulich writes ("Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning"): > On 12.03.2021 11:04, Ian Jackson wrote: > > Julien Grall writes ("Re: [PATCH][4.15] gnttab: work around "may be used > > uninitialized" warning"): > >> This is pretty much what we are already doing

[PATCH 00/11] Rid W=1 warnings from Block

2021-03-12 Thread Lee Jones
This set is part of a larger effort attempting to clean-up W=1 kernel builds, which are currently overwhelmingly riddled with niggly little warnings. Lee Jones (11): block: rsxx: core: Remove superfluous const qualifier block: drbd: drbd_interval: Demote some kernel-doc abuses and fix anot

[PATCH 10/11] block: xen-blkfront: Demote kernel-doc abuses

2021-03-12 Thread Lee Jones
Fixes the following W=1 kernel build warning(s): drivers/block/xen-blkfront.c:1960: warning: Function parameter or member 'dev' not described in 'blkfront_probe' drivers/block/xen-blkfront.c:1960: warning: Function parameter or member 'id' not described in 'blkfront_probe' drivers/block/xen-b

[qemu-mainline test] 159947: regressions - FAIL

2021-03-12 Thread osstest service owner
flight 159947 qemu-mainline real [real] flight 159995 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/159947/ http://logs.test-lab.xenproject.org/osstest/logs/159995/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be

[PATCH v4 0/2][4.15] x86: guest MSR access handling tweaks

2021-03-12 Thread Jan Beulich
Largely to re-base patch 1. 1: PV: conditionally avoid raising #GP for early guest MSR reads 2: AMD: expose HWCR.TscFreqSel to guests Jan

[PATCH v4 1/2][4.15] x86/PV: conditionally avoid raising #GP for early guest MSR reads

2021-03-12 Thread Jan Beulich
Prior to 4.15 Linux, when running in PV mode, did not install a #GP handler early enough to cover for example the rdmsrl_safe() of MSR_K8_TSEG_ADDR in bsp_init_amd() (not to speak of the unguarded read of MSR_K7_HWCR later in the same function). The respective change (42b3a4cb5609 "x86/xen: Support

[PATCH v4 2/2][4.15] x86/AMD: expose HWCR.TscFreqSel to guests

2021-03-12 Thread Jan Beulich
Linux has been warning ("firmware bug") about this bit being clear for a long time. While writable in older hardware it has been readonly on more than just most recent hardware. For simplicitly report it always set (if anything we may want to log the issue ourselves if it turns out to be clear on o

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Jan Beulich
On 12.03.2021 11:29, Ian Jackson wrote: > I am sympathetic to Julien's desire to try to limit the set of > supported compilers. Yes, and I agree we're long overdue with raising the baseline. It's just that it's not straightforward to establish a good new one. Jan

[xen-unstable-smoke test] 159991: tolerable all pass - PUSHED

2021-03-12 Thread osstest service owner
flight 159991 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/159991/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [PATCH v3 1/2][4.15] x86/PV: conditionally avoid raising #GP for early guest MSR reads

2021-03-12 Thread Andrew Cooper
On 12/03/2021 07:54, Jan Beulich wrote: > Prior to 4.15 Linux, when running in PV mode, did not install a #GP > handler early enough to cover for example the rdmsrl_safe() of > MSR_K8_TSEG_ADDR in bsp_init_amd() (not to speak of the unguarded read > of MSR_K7_HWCR later in the same function). The r

TLA files for XSA-287 and XSA-299

2021-03-12 Thread George Dunlap
I don’t think I wrote this up anywhere yet, but I used TLA+ to verify the fixes for XSA-299 several years ago. I’d always intended to post them once the embargo was up, but never got around to it. TLA came up in an online discussion board recently, so I spent a bit of time to clean things up

Re: [PATCH] xen/arm: Prevent Dom0 to be loaded when using dom0less

2021-03-12 Thread Julien Grall
Hi Luca, On 12/03/2021 09:38, Luca Fancellu wrote: + size_t __read_mostly dcache_line_bytes; /* C entry point for boot CPU */ @@ -804,7 +833,7 @@ void __init start_xen(unsigned long boot_phys_offset, int cpus, i; const char *cmdline; struct bootmodule *xen_bootmodule; -

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Andrew Cooper
On 10/03/2021 10:13, Jan Beulich wrote: > Sadly I was wrong to suggest dropping vaddrs' initializer during review > of v2 of the patch introducing this code. gcc 4.3 can't cope. > > Fixes: 52531c734ea1 ("xen/gnttab: Rework resource acquisition") > Signed-off-by: Jan Beulich > > --- a/xen/common/gr

[linux-linus test] 159950: regressions - FAIL

2021-03-12 Thread osstest service owner
flight 159950 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/159950/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ws16-amd64 7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Jan Beulich
On 12.03.2021 12:32, Andrew Cooper wrote: > On 10/03/2021 10:13, Jan Beulich wrote: >> Sadly I was wrong to suggest dropping vaddrs' initializer during review >> of v2 of the patch introducing this code. gcc 4.3 can't cope. >> >> Fixes: 52531c734ea1 ("xen/gnttab: Rework resource acquisition") >> Si

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Jan Beulich
On 12.03.2021 14:08, Jan Beulich wrote: > On 12.03.2021 12:32, Andrew Cooper wrote: >> --- a/xen/common/grant_table.c >> +++ b/xen/common/grant_table.c >> @@ -4059,6 +4059,16 @@ int gnttab_acquire_resource( >> if ( rc ) >> goto out; >>   >> +    /* >> + * Some older toolchains can

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Andrew Cooper
On 12/03/2021 13:18, Jan Beulich wrote: > On 12.03.2021 14:08, Jan Beulich wrote: >> On 12.03.2021 12:32, Andrew Cooper wrote: >>> --- a/xen/common/grant_table.c >>> +++ b/xen/common/grant_table.c >>> @@ -4059,6 +4059,16 @@ int gnttab_acquire_resource( >>> if ( rc ) >>> goto out; >>>

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Andrew Cooper
On 12/03/2021 13:08, Jan Beulich wrote: > On 12.03.2021 12:32, Andrew Cooper wrote: >> On 10/03/2021 10:13, Jan Beulich wrote: >>> Sadly I was wrong to suggest dropping vaddrs' initializer during review >>> of v2 of the patch introducing this code. gcc 4.3 can't cope. >>> >>> Fixes: 52531c734ea1 ("

[PATCH v2][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Jan Beulich
Sadly I was wrong to suggest dropping vaddrs' initializer during review of v2 of the patch introducing this code. gcc 4.3 can't cope. Fixes: 52531c734ea1 ("xen/gnttab: Rework resource acquisition") Signed-off-by: Jan Beulich Acked-by: Andrew Cooper --- v2: Re-insert the other half of what Andrew

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Jan Beulich
On 12.03.2021 14:25, Andrew Cooper wrote: > On 12/03/2021 13:08, Jan Beulich wrote: >> On 12.03.2021 12:32, Andrew Cooper wrote: >>> On 10/03/2021 10:13, Jan Beulich wrote: Sadly I was wrong to suggest dropping vaddrs' initializer during review of v2 of the patch introducing this code. gc

Re: [PATCH v3 1/2][4.15] x86/PV: conditionally avoid raising #GP for early guest MSR reads

2021-03-12 Thread Jan Beulich
On 12.03.2021 12:19, Andrew Cooper wrote: > On 12/03/2021 07:54, Jan Beulich wrote: >> Prior to 4.15 Linux, when running in PV mode, did not install a #GP >> handler early enough to cover for example the rdmsrl_safe() of >> MSR_K8_TSEG_ADDR in bsp_init_amd() (not to speak of the unguarded read >> o

Re: [PATCH v4 0/2][4.15] x86: guest MSR access handling tweaks [and 1 more messages]

2021-03-12 Thread Ian Jackson
Jan Beulich writes ("[PATCH v4 0/2][4.15] x86: guest MSR access handling tweaks"): > Largely to re-base patch 1. > > 1: PV: conditionally avoid raising #GP for early guest MSR reads > 2: AMD: expose HWCR.TscFreqSel to guests Jan, thanks for the v4. Roger, thanks for your reviews and for your ma

Re: [PATCH] xen: fix for_each_cpu when NR_CPUS=1

2021-03-12 Thread Ian Jackson
Dario Faggioli writes ("[PATCH] xen: fix for_each_cpu when NR_CPUS=1"): > When running an hypervisor build with NR_CPUS=1 for_each_cpu does not > take into account whether the bit of the CPU is set or not in the > provided mask. > > This means that whatever we have in the bodies of these loops is

Re: [PATCH for-4.15 v2] xen/dmop: Strip __XEN_TOOLS__ header guard from public API

2021-03-12 Thread Ian Jackson
Andrew Cooper writes ("Re: [PATCH for-4.15 v2] xen/dmop: Strip __XEN_TOOLS__ header guard from public API"): > On 11/03/2021 14:18, Roger Pau Monné wrote: > > I think using __XEN_UNSTABLE_ABI__ would be way clearer than > > __XEN_TOOLS__, or even placing those in a separate directory as you > > me

Re: [PATCH for-4.15] vtd: make sure QI/IR are disabled before initialisation

2021-03-12 Thread Ian Jackson
Igor Druzhinin writes ("[PATCH for-4.15] vtd: make sure QI/IR are disabled before initialisation"): > BIOS might pass control to Xen leaving QI and/or IR in enabled and/or > partially configured state. In case of x2APIC code path where EIM is > enabled early in boot - those are correctly disabled

Re: [PATCH DO NOT APPLY] docs: Document allocator properties and the rubric for using them

2021-03-12 Thread George Dunlap
> On Feb 16, 2021, at 3:29 PM, Jan Beulich wrote: > > On 16.02.2021 11:28, George Dunlap wrote: >> --- /dev/null >> +++ b/docs/hypervisor-guide/memory-allocation-functions.rst >> @@ -0,0 +1,118 @@ >> +.. SPDX-License-Identifier: CC-BY-4.0 >> + >> +Xenheap memory allocation functions >> +===

Re: [net-next 1/2] xen-netback: add module parameter to disable ctrl-ring

2021-03-12 Thread Andrew Lunn
On Thu, Mar 11, 2021 at 10:59:44PM +, ChiaHao Hsu wrote: > In order to support live migration of guests between kernels > that do and do not support 'feature-ctrl-ring', we add a > module parameter that allows the feature to be disabled > at run time, instead of using hardcode value. > The defa

Re: Working Group for Secure Boot

2021-03-12 Thread Andrew Cooper
On 11/03/2021 18:34, Bob Eshleman wrote: > Hey all, > > We would like to start a working group for secure boot support in Xen > to coordinate the various interested parties and set out a plan for > the feature and its implications for the whole Xen system. > > The end goal is a full implementation

Re: [net-next 1/2] xen-netback: add module parameter to disable ctrl-ring

2021-03-12 Thread Hsu, Chiahao
Andrew Lunn 於 2021/3/12 15:52 寫道: CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe. On Thu, Mar 11, 2021 at 10:59:44PM +, ChiaHao Hsu wrote: In order to support live m

Re: [PATCH DO NOT APPLY] docs: Document allocator properties and the rubric for using them

2021-03-12 Thread George Dunlap
> On Mar 12, 2021, at 2:32 PM, George Dunlap wrote: > > > >> On Feb 16, 2021, at 3:29 PM, Jan Beulich wrote: >> >> On 16.02.2021 11:28, George Dunlap wrote: >>> --- /dev/null >>> +++ b/docs/hypervisor-guide/memory-allocation-functions.rst >>> @@ -0,0 +1,118 @@ >>> +.. SPDX-License-Identifie

Re: Working Group for Secure Boot

2021-03-12 Thread Marek Marczykowski-Górecki
On Thu, Mar 11, 2021 at 10:34:02AM -0800, Bob Eshleman wrote: > Hey all, > > We would like to start a working group for secure boot support in Xen > to coordinate the various interested parties and set out a plan for > the feature and its implications for the whole Xen system. > > The end goal is

[libvirt test] 159969: regressions - FAIL

2021-03-12 Thread osstest service owner
flight 159969 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/159969/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-amd64-libvirt

Re: Working Group for Secure Boot

2021-03-12 Thread Daniel P. Smith
On 3/11/21 1:34 PM, Bob Eshleman wrote: > Hey all, > > We would like to start a working group for secure boot support in Xen > to coordinate the various interested parties and set out a plan for > the feature and its implications for the whole Xen system. > > The end goal is a full implementation

Re: [PATCH] xen: fix for_each_cpu when NR_CPUS=1

2021-03-12 Thread Jan Beulich
On 12.03.2021 15:03, Ian Jackson wrote: > Dario Faggioli writes ("[PATCH] xen: fix for_each_cpu when NR_CPUS=1"): >> -#if NR_CPUS > 1 >> #define for_each_cpu(cpu, mask) \ >> for ((cpu) = cpumask_first(mask); \ > > Just a thought: does cpumask_first work on an empty

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Jan Beulich
On 12.03.2021 11:04, Ian Jackson wrote: > Julien Grall writes ("Re: [PATCH][4.15] gnttab: work around "may be used > uninitialized" warning"): >> This is pretty much what we are already doing slowly by initializing >> values to shut up older compilers. I agree this is more limited, but we >> als

Re: [PATCH] automation: add arm32 cross-build tests for Xen

2021-03-12 Thread Wei Liu
On Fri, Feb 12, 2021 at 05:38:13PM -0800, Stefano Stabellini wrote: > Add a debian build container with cross-gcc for arm32 installed. > Add build jobs to cross-compile Xen-only for arm32. > > Signed-off-by: Stefano Stabellini Acked-by: Wei Liu Cc Ian. The risk is small: Gitlab CI doesn't gat

Re: [PATCH DO NOT APPLY] docs: Document allocator properties and the rubric for using them

2021-03-12 Thread Jan Beulich
On 12.03.2021 15:32, George Dunlap wrote: >> On Feb 16, 2021, at 3:29 PM, Jan Beulich wrote: >> On 16.02.2021 11:28, George Dunlap wrote: >>> --- /dev/null >>> +++ b/docs/hypervisor-guide/memory-allocation-functions.rst >>> @@ -0,0 +1,118 @@ >>> +.. SPDX-License-Identifier: CC-BY-4.0 >>> + >>> +Xe

Re: Working Group for Secure Boot

2021-03-12 Thread Trammell Hudson
On Fri, Mar 12, 2021 at 04:24:53PM +0100, Marek Marczykowski-G??recki wrote: > On Thu, Mar 11, 2021 at 10:34:02AM -0800, Bob Eshleman wrote: > > We would like to start a working group for secure boot support in Xen > > to coordinate the various interested parties and set out a plan for > > the feat

Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning

2021-03-12 Thread Ian Jackson
Jan Beulich writes ("Re: [PATCH][4.15] gnttab: work around "may be used uninitialized" warning"): > On 12.03.2021 11:04, Ian Jackson wrote: > > But this is outside my usual area so I won't nack it either. > > But would you be willing to release-ack v2? Good question. I don't think my code quali

[PATCH v3][4.15] tools/x86: don't rebuild cpuid-autogen.h every time

2021-03-12 Thread Jan Beulich
The first thing the "xen-dir" rule does is delete the entire xen/ subtree. Obviously this includes deleting xen/lib/x86/*autogen.h. As a result there's no original version for $(move-if-changed ...) to compare against, and hence the file and all its consumers would get rebuilt every time. Instead o

Re: [PATCH v3][4.15] tools/x86: don't rebuild cpuid-autogen.h every time

2021-03-12 Thread Ian Jackson
Jan Beulich writes ("[PATCH v3][4.15] tools/x86: don't rebuild cpuid-autogen.h every time"): > The first thing the "xen-dir" rule does is delete the entire xen/ > subtree. Obviously this includes deleting xen/lib/x86/*autogen.h. As a > result there's no original version for $(move-if-changed ...)

Re: [PATCH for-next 5/6] xen: Add files needed for minimal riscv build

2021-03-12 Thread Jan Beulich
On 25.02.2021 16:24, Connor Davis wrote: > --- a/xen/drivers/char/serial.c > +++ b/xen/drivers/char/serial.c > @@ -12,6 +12,7 @@ > #include > #include > #include > +#include Btw - changes like this one would better be split off, so they would come with a justification / description. A file

Re: Working Group for Secure Boot

2021-03-12 Thread Andrew Cooper
On 11/03/2021 18:34, Bob Eshleman wrote: > Hey all, > > We would like to start a working group for secure boot support in Xen > to coordinate the various interested parties and set out a plan for > the feature and its implications for the whole Xen system. > > The end goal is a full implementation

Re: [PATCH for-next 5/6] xen: Add files needed for minimal riscv build

2021-03-12 Thread Jan Beulich
On 25.02.2021 16:24, Connor Davis wrote: > --- /dev/null > +++ b/xen/include/public/arch-riscv.h > @@ -0,0 +1,183 @@ > +/** > + * arch-riscv.h > + * > + * Guest OS interface to RISC-V Xen. > + * Initially based on the ARM i

Re: [PATCH for-4.15] arm: replace typeof() with __typeof__()

2021-03-12 Thread Elliott Mitchell
On Wed, Mar 10, 2021 at 09:54:57AM +0100, Jan Beulich wrote: > On 09.03.2021 22:27, Andrew Cooper wrote: > > > > I wonder why our header checks don't pick this up.?? Do we need to throw > > a -pedantic around? > > That's a long-standing issue with the checking: For issues to be > found in macros,

Re: Working Group for Secure Boot

2021-03-12 Thread Bob Eshleman
Awesome, it's great to see this interest. I'll wait until early next week to give more people a chance to pitch in, then start bugging everybody about availability to schedule a meeting. I'll put together a small agenda then to get the ball rolling. Thanks all.

[xen-unstable-smoke test] 160031: tolerable all pass - PUSHED

2021-03-12 Thread osstest service owner
flight 160031 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/160031/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [GIT PULL] xen: branch for v5.12-rc3

2021-03-12 Thread pr-tracker-bot
The pull request you sent on Fri, 12 Mar 2021 09:34:00 +0100: > git://git.kernel.org/pub/scm/linux/kernel/git/xen/tip.git > for-linus-5.12b-rc3-tag has been merged into torvalds/linux.git: https://git.kernel.org/torvalds/c/6bf8819fede1fef9805e1d803261c0d3bb62f239 Thank you! -- Deet-doot-dot,

[xen-unstable test] 159953: tolerable FAIL - PUSHED

2021-03-12 Thread osstest service owner
flight 159953 xen-unstable real [real] flight 160042 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/159953/ http://logs.test-lab.xenproject.org/osstest/logs/160042/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd6

Re: [net-next 1/2] xen-netback: add module parameter to disable ctrl-ring

2021-03-12 Thread Andrew Lunn
On Fri, Mar 12, 2021 at 04:18:02PM +0100, Hsu, Chiahao wrote: > > Andrew Lunn 於 2021/3/12 15:52 寫道: > > CAUTION: This email originated from outside of the organization. Do not > > click links or open attachments unless you can confirm the sender and know > > the content is safe. > > > > > > >

Re: Working Group for Secure Boot

2021-03-12 Thread Roman Shaposhnik
Would love to participate! What are the next steps? Thanks, Roman. On Fri, Mar 12, 2021 at 11:06 AM Bob Eshleman wrote: > > Awesome, it's great to see this interest. > > I'll wait until early next week to give more > people a chance to pitch in, then start > bugging everybody about availability

patchew - gitlab-ci notifications during the Xen 4.16 cycle

2021-03-12 Thread Stefano Stabellini
Hi all, During the last 6 months we have been working on improving the Xen Project gitlab-ci and patchew infrastructure. You can see the results from gitlab-ci tests on the staging branch here: https://gitlab.com/xen-project/xen/-/pipelines https://gitlab.com/xen-project/xen/-/pipelines/26967867

[PATCH] automation: remove allow_failure from Alpine Linux jobs

2021-03-12 Thread Stefano Stabellini
Now that the Alpine Linux build jobs complete successfully on staging we can remove the "allow_failure: true" tag. Signed-off-by: Stefano Stabellini --- automation/gitlab-ci/build.yaml | 4 1 file changed, 4 deletions(-) diff --git a/automation/gitlab-ci/build.yaml b/automation/gitlab-ci/b

Re: Linux DomU freezes and dies under heavy memory shuffling

2021-03-12 Thread Roman Shaposhnik
Hi Jürgen, just wanted to give you (and everyone who may be keeping an eye on this) an update. Somehow, after applying your kernel patch -- the VM is now running 10 days+ without a problem. I'll keep experimenting (A/B-testing style) but at this point I'm actually pretty perplexed as to why this

[xen-unstable-smoke test] 160044: tolerable all pass - PUSHED

2021-03-12 Thread osstest service owner
flight 160044 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/160044/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[PATCH v3] xen: introduce XENFEAT_direct_mapped and XENFEAT_not_direct_mapped

2021-03-12 Thread Stefano Stabellini
Introduce two feature flags to tell the domain whether it is direct-mapped or not. It allows the guest kernel to make informed decisions on things such as swiotlb-xen enablement. The introduction of both flags (XENFEAT_direct_mapped and XENFEAT_not_direct_mapped) allows the guest kernel to avoid a

[qemu-mainline test] 160002: regressions - FAIL

2021-03-12 Thread osstest service owner
flight 160002 qemu-mainline real [real] flight 160047 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/160002/ http://logs.test-lab.xenproject.org/osstest/logs/160047/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be

[linux-linus test] 160010: regressions - FAIL

2021-03-12 Thread osstest service owner
flight 160010 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/160010/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ws16-amd64 7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

[qemu-mainline test] 160048: regressions - FAIL

2021-03-12 Thread osstest service owner
flight 160048 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/160048/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 152631 build-amd64-xsm

[qemu-mainline test] 160050: regressions - FAIL

2021-03-12 Thread osstest service owner
flight 160050 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/160050/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 152631 build-amd64-xsm

[libvirt test] 160053: regressions - FAIL

2021-03-12 Thread osstest service owner
flight 160053 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/160053/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-amd64-libvirt

[qemu-mainline test] 160057: regressions - FAIL

2021-03-12 Thread osstest service owner
flight 160057 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/160057/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 152631 build-amd64-xsm

Re: Linux DomU freezes and dies under heavy memory shuffling

2021-03-12 Thread Jürgen Groß
On 12.03.21 22:33, Roman Shaposhnik wrote: Hi Jürgen, just wanted to give you (and everyone who may be keeping an eye on this) an update. Somehow, after applying your kernel patch -- the VM is now running 10 days+ without a problem. Can you check the kernel console messages, please? There are

[xen-unstable test] 160045: tolerable FAIL - PUSHED

2021-03-12 Thread osstest service owner
flight 160045 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/160045/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 159953 test-amd64-amd64-xl-qemuu-ws16-amd64