[libvirt test] 161944: regressions - FAIL

2021-05-14 Thread osstest service owner
flight 161944 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/161944/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-amd64-libvirt

Re: Uses of /hypervisor memory range (was: FreeBSD/Xen/ARM issues)

2021-05-14 Thread Julien Grall
Hi Elliott, On 14/05/2021 03:42, Elliott Mitchell wrote: Upon thinking about it, this seems appropriate to bring to the attention of the Xen development list since it seems to have wider implications. On Wed, May 12, 2021 at 11:08:39AM +0100, Julien Grall wrote: On 12/05/2021 03:37, Elliott M

[PATCH] tools/xenstore: simplify xenstored main loop

2021-05-14 Thread Juergen Gross
The main loop of xenstored is rather complicated due to different handling of socket and ring-page interfaces. Unify that handling by introducing interface type specific functions can_read() and can_write(). Put the interface type specific functions in an own structure and let struct connection co

[PATCH] tools/xenstore: claim resources when running as daemon

2021-05-14 Thread Juergen Gross
Xenstored is absolutely mandatory for a Xen host and it can't be restarted, so being killed by OOM-killer in case of memory shortage is to be avoided. Set /proc/$pid/oom_score_adj (if available) to -500 in order to allow xenstored to use large amounts of memory without being killed. In order to s

[PATCH] tools/xenstore: cleanup Makefile and gitignore

2021-05-14 Thread Juergen Gross
The Makefile of xenstore and related to that the global .gitignore file contain some leftovers from ancient times. Remove those. While at it sort the tools/xenstore/* entries in .gitignore. Signed-off-by: Juergen Gross --- .gitignore | 7 +++ tools/xenstore/Makefile | 2 +- 2 f

Re: [PATCH] tools/xenstore: simplify xenstored main loop

2021-05-14 Thread Julien Grall
Hi, On 14/05/2021 09:39, Juergen Gross wrote: The main loop of xenstored is rather complicated due to different handling of socket and ring-page interfaces. Unify that handling by introducing interface type specific functions can_read() and can_write(). Put the interface type specific functions

Re: [PATCH v4 09/10] libs/{light,guest}: implement xc_cpuid_apply_policy in libxl

2021-05-14 Thread Roger Pau Monné
On Fri, May 07, 2021 at 01:04:21PM +0200, Roger Pau Monne wrote: > diff --git a/tools/libs/light/libxl_cpuid.c b/tools/libs/light/libxl_cpuid.c > index eb6feaa96d1..6d17e89191f 100644 > --- a/tools/libs/light/libxl_cpuid.c > +++ b/tools/libs/light/libxl_cpuid.c > @@ -430,9 +430,11 @@ int libxl__cpu

[ovmf test] 161943: all pass - PUSHED

2021-05-14 Thread osstest service owner
flight 161943 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/161943/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 22ac5cc9d9db34056f7c97e994fd9def683ebb2e baseline version: ovmf 5531fd48ded1271b87757

[linux-linus test] 161940: regressions - FAIL

2021-05-14 Thread osstest service owner
flight 161940 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/161940/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

Re: [PATCH] tools/xenstore: simplify xenstored main loop

2021-05-14 Thread Juergen Gross
On 14.05.21 11:35, Julien Grall wrote: Hi, On 14/05/2021 09:39, Juergen Gross wrote: The main loop of xenstored is rather complicated due to different handling of socket and ring-page interfaces. Unify that handling by introducing interface type specific functions can_read() and can_write(). P

Re: [PATCH v2 4/5] xen: Add files needed for minimal riscv build

2021-05-14 Thread Julien Grall
Hi Connor, On 14/05/2021 05:17, Connor Davis wrote: Add the minimum code required to get xen to build with XEN_TARGET_ARCH=riscv64. It is minimal in the sense that every file and function added is required for a successful build, given the .config generated from riscv64_defconfig. The function i

Re: Hand over of the Xen shared info page

2021-05-14 Thread Anastasiia Lukianenko
Hi Julien! On Thu, 2021-05-13 at 09:37 +0100, Julien Grall wrote: > > On 13/05/2021 09:03, Anastasiia Lukianenko wrote: > > Hi all, > > Hi, > > > The problem described below concerns cases when a shared info page > > needs to be handed over from one entity in the system to another, > > for > >

Re: [PATCH v2 1/3] xen/arm: move xen_swiotlb_detect to arm/swiotlb-xen.h

2021-05-14 Thread Juergen Gross
On 12.05.21 22:18, Stefano Stabellini wrote: From: Stefano Stabellini Move xen_swiotlb_detect to a static inline function to make it available to !CONFIG_XEN builds. CC: boris.ostrov...@oracle.com CC: jgr...@suse.com Signed-off-by: Stefano Stabellini Reviewed-by: Juergen Gross Juergen

Re: [PATCH v2 2/3] arm64: do not set SWIOTLB_NO_FORCE when swiotlb is required

2021-05-14 Thread Juergen Gross
On 12.05.21 22:18, Stefano Stabellini wrote: From: Christoph Hellwig Although SWIOTLB_NO_FORCE is meant to allow later calls to swiotlb_init, today dma_direct_map_page returns error if SWIOTLB_NO_FORCE. For now, without a larger overhaul of SWIOTLB_NO_FORCE, the best we can do is to avoid sett

Re: Uses of /hypervisor memory range (was: FreeBSD/Xen/ARM issues)

2021-05-14 Thread Roger Pau Monné
On Fri, May 14, 2021 at 09:32:10AM +0100, Julien Grall wrote: > Hi Elliott, > > On 14/05/2021 03:42, Elliott Mitchell wrote: > > Was it intended for the /hypervisor range to dynamically scale with the > > size of the domain? > As per above, this doesn't depend on the size of the domain. Instead, t

Re: [PATCH v2 2/3] arm64: do not set SWIOTLB_NO_FORCE when swiotlb is required

2021-05-14 Thread Catalin Marinas
On Wed, May 12, 2021 at 01:18:22PM -0700, Stefano Stabellini wrote: > From: Christoph Hellwig > > Although SWIOTLB_NO_FORCE is meant to allow later calls to swiotlb_init, > today dma_direct_map_page returns error if SWIOTLB_NO_FORCE. > > For now, without a larger overhaul of SWIOTLB_NO_FORCE, th

[PATCH v2 2/2] tools/xenstore: simplify xenstored main loop

2021-05-14 Thread Juergen Gross
The main loop of xenstored is rather complicated due to different handling of socket and ring-page interfaces. Unify that handling by introducing interface type specific functions can_read() and can_write(). Signed-off-by: Juergen Gross --- V2: - split off function vector introduction (Julien Gra

[PATCH v2 1/2] tools/xenstore: move per connection read and write func hooks into a struct

2021-05-14 Thread Juergen Gross
Put the interface type specific functions into an own structure and let struct connection contain only a pointer to that new function vector. Don't even define the socket based functions in case of NO_SOCKETS (Mini-OS). Signed-off-by: Juergen Gross --- V2: - split off from V1 patch (Julien Grall

[PATCH v2 0/2] tools/xenstore: simplify xenstored main loop

2021-05-14 Thread Juergen Gross
Small series to make the main loop of xenstored more readable. Changes in V2: - split into two patches - use const - NO_SOCKETS handling Juergen Gross (2): tools/xenstore: move per connection read and write func hooks into a struct tools/xenstore: simplify xenstored main loop tools/xens

[qemu-mainline test] 161941: regressions - FAIL

2021-05-14 Thread osstest service owner
flight 161941 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/161941/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs. 152631 test-amd64-i3

[PATCH] libelf: improve PVH elfnote parsing

2021-05-14 Thread Roger Pau Monne
Pass an hvm boolean parameter to the elf note parsing and checking routines, so that better checking can be done in case libelf is dealing with an hvm container. elf_xen_note_check shouldn't return early unless PHYS32_ENTRY is set and the container is of type HVM, or else the loader and version ch

Re: [PATCH v2 0/3] swiotlb-xen init fixes

2021-05-14 Thread Juergen Gross
On 12.05.21 22:18, Stefano Stabellini wrote: Hi all, This short patch series comes with a preparation patch and 2 unrelated fixes to swiotlb-xen initialization. Christoph Hellwig (1): arm64: do not set SWIOTLB_NO_FORCE when swiotlb is required Stefano Stabellini (2): xen/arm: mo

Re: [PATCH v2 4/5] xen: Add files needed for minimal riscv build

2021-05-14 Thread Connor Davis
On 5/14/21 3:46 AM, Julien Grall wrote: Hi Connor, On 14/05/2021 05:17, Connor Davis wrote: Add the minimum code required to get xen to build with XEN_TARGET_ARCH=riscv64. It is minimal in the sense that every file and function added is required for a successful build, given the .config gener

Re: [PATCH v2 0/5] Minimal build for RISCV

2021-05-14 Thread Connor Davis
On 5/13/21 10:43 PM, Alistair Francis wrote: On Fri, May 14, 2021 at 2:18 PM Connor Davis wrote: Hi all, This series introduces a minimal build for RISCV. It is based on Bobby's previous work from last year[0]. I have worked to rebase onto current Xen, as well as update the various header fi

Re: [PATCH v2 2/4] xen: Export dbgp functions when CONFIG_XEN_DOM0 is enabled

2021-05-14 Thread Connor Davis
Adding Greg and linux-usb On 5/13/21 6:56 PM, Connor Davis wrote: Export xen_dbgp_reset_prep and xen_dbgp_external_startup when CONFIG_XEN_DOM0 is defined. This allows use of these symbols even if CONFIG_EARLY_PRINK_DBGP is defined. Signed-off-by: Connor Davis Acked-by: Juergen Gross --- dr

Re: [PATCH v2 0/4] Support xen-driven USB3 debug capability

2021-05-14 Thread Connor Davis
On 5/14/21 12:46 AM, Greg Kroah-Hartman wrote: On Thu, May 13, 2021 at 06:56:47PM -0600, Connor Davis wrote: Hi all, This goal of this series is to allow the USB3 debug capability (DbC) to be safely used by xen while linux runs as dom0. Patch 2/4 does not seem to be showing up anywhere, did

Re: [PATCH v2 1/5] xen/char: Default HAS_NS16550 to y only for X86 and ARM

2021-05-14 Thread Connor Davis
On 5/13/21 11:34 PM, Elliott Mitchell wrote: On Thu, May 13, 2021 at 10:17:08PM -0600, Connor Davis wrote: Defaulting to yes only for X86 and ARM reduces the requirements for a minimal build when porting new architectures. Signed-off-by: Connor Davis --- xen/drivers/char/Kconfig | 2 +- 1

Re: [PATCH] libelf: improve PVH elfnote parsing

2021-05-14 Thread Jason Andryuk
On Fri, May 14, 2021 at 9:50 AM Roger Pau Monne wrote: > > Pass an hvm boolean parameter to the elf note parsing and checking > routines, so that better checking can be done in case libelf is > dealing with an hvm container. > > elf_xen_note_check shouldn't return early unless PHYS32_ENTRY is set

[RFC PATCH 1/3] libelf: Introduce phys_kstart/end

2021-05-14 Thread Jason Andryuk
The physical start and end matter for PVH. These are only used by a PVH dom0, but will help when separating the PV and PVH ELF checking in the next patch. Signed-off-by: Jason Andryuk --- xen/arch/x86/hvm/dom0_build.c | 4 ++-- xen/common/libelf/libelf-dominfo.c | 3 +++ xen/include/xen/li

[RFC PATCH 2/3] libelf: Use flags to check pv or pvh in elf_xen_parse

2021-05-14 Thread Jason Andryuk
Certain checks are only applicable to PV vs. PVH, so split them and run only the appropriate checks for each. This fixes loading a PVH kernel that has a PHYS32_ENTRY but not an ENTRY ELF note. Such a kernel would fail the virt_entry check which is not applicable for PVH. This re-instatates loade

[RFC PATCH 3/3] libelf: PVH: only allow elf_paddr_offset of 0

2021-05-14 Thread Jason Andryuk
Modern Linux and FreeBSD hardcode it to 0. Just drop its use for PVH. Signed-off-by: Jason Andryuk --- xen/arch/x86/hvm/dom0_build.c | 2 +- xen/common/libelf/libelf-dominfo.c | 6 ++ 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/xen/arch/x86/hvm/dom0_build.c b/xen/arch

Re: Ping: [PATCH v5 0/6] evtchn: (not so) recent XSAs follow-on

2021-05-14 Thread Roger Pau Monné
On Thu, Apr 22, 2021 at 10:53:05AM +0200, Jan Beulich wrote: > On 21.04.2021 17:56, Julien Grall wrote: > > > > > > On 21/04/2021 16:23, Jan Beulich wrote: > >> On 27.01.2021 09:13, Jan Beulich wrote: > >>> These are grouped into a series largely because of their origin, > >>> not so much because

Re: [PATCH v2 3/4] usb: dbgp: Fix return values for reset prep and startup

2021-05-14 Thread Boris Ostrovsky
On 5/13/21 8:56 PM, Connor Davis wrote: > Callers of dbgp_reset_prep treat a 0 return value as "stop using > the debug port", which means they don't make any subsequent calls to > dbgp_reset_prep or dbgp_external_startup. > > To ensure the callers' interpretation is correct, first return -EPERM >

Re: [PATCH v2 1/2] tools/xenstore: move per connection read and write func hooks into a struct

2021-05-14 Thread Julien Grall
Hi Juergen, On 14/05/2021 12:56, Juergen Gross wrote: -struct connection *new_connection(connwritefn_t *write, connreadfn_t *read); +struct connection *new_connection(const struct interface_funcs *funcs); struct connection *get_connection_by_id(unsigned int conn_id); void check_store(void);

Re: [PATCH v2 2/2] tools/xenstore: simplify xenstored main loop

2021-05-14 Thread Julien Grall
Hi Juergen, On 14/05/2021 12:56, Juergen Gross wrote: The main loop of xenstored is rather complicated due to different handling of socket and ring-page interfaces. Unify that handling by introducing interface type specific functions can_read() and can_write(). Signed-off-by: Juergen Gross ---

Re: [PATCH] tools/xenstore: cleanup Makefile and gitignore

2021-05-14 Thread Julien Grall
Hi Juergen, On 14/05/2021 10:01, Juergen Gross wrote: The Makefile of xenstore and related to that the global .gitignore file contain some leftovers from ancient times. Remove those. While at it sort the tools/xenstore/* entries in .gitignore. Signed-off-by: Juergen Gross Acked-by: Julien G

[xen-unstable test] 161946: tolerable FAIL - PUSHED

2021-05-14 Thread osstest service owner
flight 161946 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/161946/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 161926 test-armhf-armhf-libvirt 16 save

[PATCH v3 0/5] Minimal build for RISCV

2021-05-14 Thread Connor Davis
Hi all, This series introduces a minimal build for RISCV. It is based on Bobby's previous work from last year[0] rebased onto current Xen. This series provides the patches necessary to get a minimal build working. The build is "minimal" in the sense that it only supports building TARGET=head.o. T

[PATCH v3 1/5] xen/char: Default HAS_NS16550 to y only for X86 and ARM

2021-05-14 Thread Connor Davis
Defaulting to yes only for X86 and ARM reduces the requirements for a minimal build when porting new architectures. Signed-off-by: Connor Davis --- xen/drivers/char/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/drivers/char/Kconfig b/xen/drivers/char/Kconfig ind

[PATCH v3 2/5] xen/common: Guard iommu symbols with CONFIG_HAS_PASSTHROUGH

2021-05-14 Thread Connor Davis
The variables iommu_enabled and iommu_dont_flush_iotlb are defined in drivers/passthrough/iommu.c and are referenced in common code, which causes the link to fail when !CONFIG_HAS_PASSTHROUGH. Guard references to these variables in common code so that xen builds when !CONFIG_HAS_PASSTHROUGH. Sign

[PATCH v3 3/5] xen: Fix build when !CONFIG_GRANT_TABLE

2021-05-14 Thread Connor Davis
Move struct grant_table; in grant_table.h above ifdef CONFIG_GRANT_TABLE. This fixes the following: /build/xen/include/xen/grant_table.h:84:50: error: 'struct grant_table' declared inside parameter list will not be visible outside of this definition or declaration [-Werror] 84 | static inline i

[PATCH v3 4/5] xen: Add files needed for minimal riscv build

2021-05-14 Thread Connor Davis
Add arch-specific makefiles and configs needed to build for riscv64. Also add a minimal head.S that is a simple infinite loop. head.o can be built with $ make XEN_TARGET_ARCH=riscv64 SUBSYSTEMS=xen -C xen TARGET=head.o No other TARGET is supported at the moment. Signed-off-by: Connor Davis ---

[PATCH v3 5/5] automation: Add container for riscv64 builds

2021-05-14 Thread Connor Davis
Add a container for cross-compiling xen to riscv64. This just includes the cross-compiler and necessary packages for building xen itself (packages for tools, stubdoms, etc., can be added later). Signed-off-by: Connor Davis --- automation/build/archlinux/riscv64.dockerfile | 33 ++

Re: [PATCH] tools/xenstore: claim resources when running as daemon

2021-05-14 Thread Julien Grall
Hi Juergen, On 14/05/2021 09:41, Juergen Gross wrote: Xenstored is absolutely mandatory for a Xen host and it can't be restarted, so being killed by OOM-killer in case of memory shortage is to be avoided. Set /proc/$pid/oom_score_adj (if available) to -500 in order to allow xenstored to use lar

[RFC PATCH 00/10] xsm: introducing domain roles

2021-05-14 Thread Daniel P. Smith
During the hyperlaunch design sessions a request was made to come up with a formal definition of the roles a domain was allowed to take on. In particular the primary focus was to answer what is the control domain and what is the hardware domain. Another comment came up during the discussion on PCI

[RFC PATCH 01/10] headers: introduce new default privilege model

2021-05-14 Thread Daniel P. Smith
This defines the new privilege roles that a domain may be assigned. Signed-off-by: Daniel P. Smith --- xen/include/xen/sched.h | 18 ++ 1 file changed, 18 insertions(+) diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h index cc633fdc07..9b2c277ede 100644 --- a/xen/i

[RFC PATCH 02/10] control domain: refactor is_control_domain

2021-05-14 Thread Daniel P. Smith
Move to using the new Domain Control role as the backing to the is_control_domain check. Signed-off-by: Daniel P. Smith --- xen/common/domain.c | 3 +++ xen/include/xen/sched.h | 4 +++- 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/xen/common/domain.c b/xen/common/domain.c i

[RFC PATCH 03/10] xenstore: migrate to default privilege model

2021-05-14 Thread Daniel P. Smith
Move to using a check for the Xenstore Domain role for the is_xenstore_domain check. Signed-off-by: Daniel P. Smith --- xen/common/domain.c | 3 +++ xen/include/xen/sched.h | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/xen/common/domain.c b/xen/common/domain.c index 2

[RFC PATCH 04/10] xsm: convert rewrite privilege check function

2021-05-14 Thread Daniel P. Smith
This converts the previous XSM hook dummy checks over to using equivalent domain role privileges. Signed-off-by: Daniel P. Smith --- xen/arch/arm/dm.c | 2 +- xen/arch/arm/domctl.c | 6 +- xen/arch/arm/hvm.c| 2 +- xen/arch/arm/mm.c

[RFC PATCH 05/10] hardware domain: convert to domain roles

2021-05-14 Thread Daniel P. Smith
This refactors the hardware_domain so that it is works within the new domain roles construct. Signed-off-by: Daniel P. Smith --- xen/arch/x86/acpi/cpu_idle.c| 3 +- xen/arch/x86/cpu/mcheck/vmce.h | 3 +- xen/arch/x86/cpu/vpmu.c | 7 +- xen/arch/x86/crash.c

[RFC PATCH 06/10] xsm-roles: covert the dummy system to roles

2021-05-14 Thread Daniel P. Smith
The difference between XSM and non-XSM was whether the "dummy" policy was invoked via direct calls or through function pointers. The "dummy" policy enforced a set of rules that effictively defined a loosely set of roles that a domain may have. This builds on the work of replacing those rules with w

[RFC PATCH 07/10] xsm-roles: adjusting core xsm

2021-05-14 Thread Daniel P. Smith
This is adjustments and clean ups to the core of xsm for adoption of the domain roles. Signed-off-by: Daniel P. Smith --- xen/include/xen/sched.h | 2 +- xen/include/xsm/xsm.h | 26 --- xen/xsm/Makefile| 3 +- xen/xsm/dummy.c | 160 -

[RFC PATCH 08/10] xsm-silo: convert silo over to domain roles

2021-05-14 Thread Daniel P. Smith
This converts the SILO XSM module to function as an extension to the domain roles system to implement an extended enforcement policy. Signed-off-by: Daniel P. Smith --- xen/xsm/silo.c | 22 +- 1 file changed, 13 insertions(+), 9 deletions(-) diff --git a/xen/xsm/silo.c b/xen

[RFC PATCH 09/10] xsm-flask: clean up for domain roles conversion

2021-05-14 Thread Daniel P. Smith
The domain roles approach changed the idea of how the default XSM policy module is configured. This makes the minor adjustment for that change. Signed-off-by: Daniel P. Smith --- xen/xsm/flask/flask_op.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/xsm/flask/flask_op.c

[RFC PATCH 10/10] common/Kconfig: updating Kconfig for domain roles

2021-05-14 Thread Daniel P. Smith
This adjusts the Kconfig system for the reorganizing of XSM by the introduction of domain roles. Signed-off-by: Daniel P. Smith --- xen/common/Kconfig | 14 -- 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/xen/common/Kconfig b/xen/common/Kconfig index 3064bf6b89..560a

Re: [PATCH v3 5/5] automation: Add container for riscv64 builds

2021-05-14 Thread Bob Eshleman
On 5/14/21 11:53 AM, Connor Davis wrote: > + > +# There is a regression in GDB that causes an assertion error > +# when setting breakpoints, use this commit until it is fixed! > +RUN git clone --recursive -j$(nproc) --progress > https://github.com/riscv/riscv-gnu-toolchain && \ > +cd riscv-gnu

[ovmf test] 161949: all pass - PUSHED

2021-05-14 Thread osstest service owner
flight 161949 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/161949/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf d82c4693f8d5c6b05f40ccf351c84645201067c1 baseline version: ovmf 22ac5cc9d9db34056f7c9

Re: [PATCH v3 4/5] xen: Add files needed for minimal riscv build

2021-05-14 Thread Bob Eshleman
On 5/14/21 11:53 AM, Connor Davis wrote: > Add arch-specific makefiles and configs needed to build for > riscv64. Also add a minimal head.S that is a simple infinite loop. > head.o can be built with > > $ make XEN_TARGET_ARCH=riscv64 SUBSYSTEMS=xen -C xen TARGET=head.o > I recently realized that

[linux-5.4 test] 161947: tolerable FAIL - PUSHED

2021-05-14 Thread osstest service owner
flight 161947 linux-5.4 real [real] flight 161951 linux-5.4 real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/161947/ http://logs.test-lab.xenproject.org/osstest/logs/161951/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd6

[linux-linus test] 161948: regressions - FAIL

2021-05-14 Thread osstest service owner
flight 161948 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/161948/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332 test-amd64-i386-xl-

Re: [PATCH RFCv2 12/15] xen/arm: add Persistent Map (PMAP) infrastructure

2021-05-14 Thread Stefano Stabellini
On Sun, 25 Apr 2021, Julien Grall wrote: > From: Wei Liu > > The basic idea is like Persistent Kernel Map (PKMAP) in Linux. We > pre-populate all the relevant page tables before the system is fully > set up. > > We will need it on Arm in order to rework the arm64 version of > xenheap_setup_mappi

Re: [PATCH RFCv2 13/15] xen/arm: mm: Use the PMAP helpers in xen_{,un}map_table()

2021-05-14 Thread Stefano Stabellini
On Sun, 25 Apr 2021, Julien Grall wrote: > From: Julien Grall > > During early boot, it is not possible to use xen_{,un}map_table() > if the page tables are not residing the Xen binary. > > This is a blocker to switch some of the helpers to use xen_pt_update() > as we may need to allocate extra

Re: [PATCH v3 4/5] xen: Add files needed for minimal riscv build

2021-05-14 Thread Connor Davis
On 5/14/21 3:53 PM, Bob Eshleman wrote: On 5/14/21 11:53 AM, Connor Davis wrote: Add arch-specific makefiles and configs needed to build for riscv64. Also add a minimal head.S that is a simple infinite loop. head.o can be built with $ make XEN_TARGET_ARCH=riscv64 SUBSYSTEMS=xen -C xen TARGET=

Re: [PATCH RFCv2 14/15] xen/arm: mm: Rework setup_xenheap_mappings()

2021-05-14 Thread Stefano Stabellini
On Sun, 25 Apr 2021, Julien Grall wrote: > From: Julien Grall > > A few issues have been reported with setup_xenheap_mappings() over the > last couple of years. The main ones are: > - It will break on platform supporting more than 512GB of RAM > because the memory allocated by the boot

Re: [PATCH v3 5/5] automation: Add container for riscv64 builds

2021-05-14 Thread Connor Davis
On 5/14/21 3:01 PM, Bob Eshleman wrote: On 5/14/21 11:53 AM, Connor Davis wrote: + +# There is a regression in GDB that causes an assertion error +# when setting breakpoints, use this commit until it is fixed! +RUN git clone --recursive -j$(nproc) --progress https://github.com/riscv/riscv-gnu

Re: [PATCH RFCv2 15/15] xen/arm: mm: Re-implement setup_frame_table_mappings() with map_pages_to_xen()

2021-05-14 Thread Stefano Stabellini
On Sun, 25 Apr 2021, Julien Grall wrote: > From: Julien Grall > > Now that map_pages_to_xen() has been extended to support 2MB mappings, > we can replace the create_mappings() call by map_pages_to_xen() call. > > This has the advantage to remove the different between 32-bit and 64-bit > code. >

Re: Uses of /hypervisor memory range (was: FreeBSD/Xen/ARM issues)

2021-05-14 Thread Elliott Mitchell
On Fri, May 14, 2021 at 09:32:10AM +0100, Julien Grall wrote: > On 14/05/2021 03:42, Elliott Mitchell wrote: > > > > Issue is what is the intended use of the memory range allocated to > > /hypervisor in the device-tree on ARM? What do the Xen developers plan > > for? What is expected? > > From

[ovmf test] 161952: all pass - PUSHED

2021-05-14 Thread osstest service owner
flight 161952 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/161952/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 32928415e36b3e234efb5c24143e06060a68fba3 baseline version: ovmf d82c4693f8d5c6b05f40c

[qemu-mainline test] 161950: regressions - FAIL

2021-05-14 Thread osstest service owner
flight 161950 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/161950/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs. 152631 test-amd64-i3