flight 161944 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/161944/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777
build-amd64-libvirt
Hi Elliott,
On 14/05/2021 03:42, Elliott Mitchell wrote:
Upon thinking about it, this seems appropriate to bring to the attention
of the Xen development list since it seems to have wider implications.
On Wed, May 12, 2021 at 11:08:39AM +0100, Julien Grall wrote:
On 12/05/2021 03:37, Elliott M
The main loop of xenstored is rather complicated due to different
handling of socket and ring-page interfaces. Unify that handling by
introducing interface type specific functions can_read() and
can_write().
Put the interface type specific functions in an own structure and let
struct connection co
Xenstored is absolutely mandatory for a Xen host and it can't be
restarted, so being killed by OOM-killer in case of memory shortage is
to be avoided.
Set /proc/$pid/oom_score_adj (if available) to -500 in order to allow
xenstored to use large amounts of memory without being killed.
In order to s
The Makefile of xenstore and related to that the global .gitignore
file contain some leftovers from ancient times. Remove those.
While at it sort the tools/xenstore/* entries in .gitignore.
Signed-off-by: Juergen Gross
---
.gitignore | 7 +++
tools/xenstore/Makefile | 2 +-
2 f
Hi,
On 14/05/2021 09:39, Juergen Gross wrote:
The main loop of xenstored is rather complicated due to different
handling of socket and ring-page interfaces. Unify that handling by
introducing interface type specific functions can_read() and
can_write().
Put the interface type specific functions
On Fri, May 07, 2021 at 01:04:21PM +0200, Roger Pau Monne wrote:
> diff --git a/tools/libs/light/libxl_cpuid.c b/tools/libs/light/libxl_cpuid.c
> index eb6feaa96d1..6d17e89191f 100644
> --- a/tools/libs/light/libxl_cpuid.c
> +++ b/tools/libs/light/libxl_cpuid.c
> @@ -430,9 +430,11 @@ int libxl__cpu
flight 161943 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/161943/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 22ac5cc9d9db34056f7c97e994fd9def683ebb2e
baseline version:
ovmf 5531fd48ded1271b87757
flight 161940 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/161940/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332
test-amd64-i386-xl-
On 14.05.21 11:35, Julien Grall wrote:
Hi,
On 14/05/2021 09:39, Juergen Gross wrote:
The main loop of xenstored is rather complicated due to different
handling of socket and ring-page interfaces. Unify that handling by
introducing interface type specific functions can_read() and
can_write().
P
Hi Connor,
On 14/05/2021 05:17, Connor Davis wrote:
Add the minimum code required to get xen to build with
XEN_TARGET_ARCH=riscv64. It is minimal in the sense that every file and
function added is required for a successful build, given the .config
generated from riscv64_defconfig. The function i
Hi Julien!
On Thu, 2021-05-13 at 09:37 +0100, Julien Grall wrote:
>
> On 13/05/2021 09:03, Anastasiia Lukianenko wrote:
> > Hi all,
>
> Hi,
>
> > The problem described below concerns cases when a shared info page
> > needs to be handed over from one entity in the system to another,
> > for
> >
On 12.05.21 22:18, Stefano Stabellini wrote:
From: Stefano Stabellini
Move xen_swiotlb_detect to a static inline function to make it available
to !CONFIG_XEN builds.
CC: boris.ostrov...@oracle.com
CC: jgr...@suse.com
Signed-off-by: Stefano Stabellini
Reviewed-by: Juergen Gross
Juergen
On 12.05.21 22:18, Stefano Stabellini wrote:
From: Christoph Hellwig
Although SWIOTLB_NO_FORCE is meant to allow later calls to swiotlb_init,
today dma_direct_map_page returns error if SWIOTLB_NO_FORCE.
For now, without a larger overhaul of SWIOTLB_NO_FORCE, the best we can
do is to avoid sett
On Fri, May 14, 2021 at 09:32:10AM +0100, Julien Grall wrote:
> Hi Elliott,
>
> On 14/05/2021 03:42, Elliott Mitchell wrote:
> > Was it intended for the /hypervisor range to dynamically scale with the
> > size of the domain?
> As per above, this doesn't depend on the size of the domain. Instead, t
On Wed, May 12, 2021 at 01:18:22PM -0700, Stefano Stabellini wrote:
> From: Christoph Hellwig
>
> Although SWIOTLB_NO_FORCE is meant to allow later calls to swiotlb_init,
> today dma_direct_map_page returns error if SWIOTLB_NO_FORCE.
>
> For now, without a larger overhaul of SWIOTLB_NO_FORCE, th
The main loop of xenstored is rather complicated due to different
handling of socket and ring-page interfaces. Unify that handling by
introducing interface type specific functions can_read() and
can_write().
Signed-off-by: Juergen Gross
---
V2:
- split off function vector introduction (Julien Gra
Put the interface type specific functions into an own structure and let
struct connection contain only a pointer to that new function vector.
Don't even define the socket based functions in case of NO_SOCKETS
(Mini-OS).
Signed-off-by: Juergen Gross
---
V2:
- split off from V1 patch (Julien Grall
Small series to make the main loop of xenstored more readable.
Changes in V2:
- split into two patches
- use const
- NO_SOCKETS handling
Juergen Gross (2):
tools/xenstore: move per connection read and write func hooks into a
struct
tools/xenstore: simplify xenstored main loop
tools/xens
flight 161941 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/161941/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs.
152631
test-amd64-i3
Pass an hvm boolean parameter to the elf note parsing and checking
routines, so that better checking can be done in case libelf is
dealing with an hvm container.
elf_xen_note_check shouldn't return early unless PHYS32_ENTRY is set
and the container is of type HVM, or else the loader and version
ch
On 12.05.21 22:18, Stefano Stabellini wrote:
Hi all,
This short patch series comes with a preparation patch and 2 unrelated
fixes to swiotlb-xen initialization.
Christoph Hellwig (1):
arm64: do not set SWIOTLB_NO_FORCE when swiotlb is required
Stefano Stabellini (2):
xen/arm: mo
On 5/14/21 3:46 AM, Julien Grall wrote:
Hi Connor,
On 14/05/2021 05:17, Connor Davis wrote:
Add the minimum code required to get xen to build with
XEN_TARGET_ARCH=riscv64. It is minimal in the sense that every file and
function added is required for a successful build, given the .config
gener
On 5/13/21 10:43 PM, Alistair Francis wrote:
On Fri, May 14, 2021 at 2:18 PM Connor Davis wrote:
Hi all,
This series introduces a minimal build for RISCV. It is based on Bobby's
previous work from last year[0]. I have worked to rebase onto current Xen,
as well as update the various header fi
Adding Greg and linux-usb
On 5/13/21 6:56 PM, Connor Davis wrote:
Export xen_dbgp_reset_prep and xen_dbgp_external_startup
when CONFIG_XEN_DOM0 is defined. This allows use of these symbols
even if CONFIG_EARLY_PRINK_DBGP is defined.
Signed-off-by: Connor Davis
Acked-by: Juergen Gross
---
dr
On 5/14/21 12:46 AM, Greg Kroah-Hartman wrote:
On Thu, May 13, 2021 at 06:56:47PM -0600, Connor Davis wrote:
Hi all,
This goal of this series is to allow the USB3 debug capability (DbC) to be
safely used by xen while linux runs as dom0.
Patch 2/4 does not seem to be showing up anywhere, did
On 5/13/21 11:34 PM, Elliott Mitchell wrote:
On Thu, May 13, 2021 at 10:17:08PM -0600, Connor Davis wrote:
Defaulting to yes only for X86 and ARM reduces the requirements
for a minimal build when porting new architectures.
Signed-off-by: Connor Davis
---
xen/drivers/char/Kconfig | 2 +-
1
On Fri, May 14, 2021 at 9:50 AM Roger Pau Monne wrote:
>
> Pass an hvm boolean parameter to the elf note parsing and checking
> routines, so that better checking can be done in case libelf is
> dealing with an hvm container.
>
> elf_xen_note_check shouldn't return early unless PHYS32_ENTRY is set
The physical start and end matter for PVH. These are only used by a PVH
dom0, but will help when separating the PV and PVH ELF checking in the
next patch.
Signed-off-by: Jason Andryuk
---
xen/arch/x86/hvm/dom0_build.c | 4 ++--
xen/common/libelf/libelf-dominfo.c | 3 +++
xen/include/xen/li
Certain checks are only applicable to PV vs. PVH, so split them and run
only the appropriate checks for each.
This fixes loading a PVH kernel that has a PHYS32_ENTRY but not an ENTRY
ELF note. Such a kernel would fail the virt_entry check which is not
applicable for PVH.
This re-instatates loade
Modern Linux and FreeBSD hardcode it to 0. Just drop its use for PVH.
Signed-off-by: Jason Andryuk
---
xen/arch/x86/hvm/dom0_build.c | 2 +-
xen/common/libelf/libelf-dominfo.c | 6 ++
2 files changed, 7 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/dom0_build.c b/xen/arch
On Thu, Apr 22, 2021 at 10:53:05AM +0200, Jan Beulich wrote:
> On 21.04.2021 17:56, Julien Grall wrote:
> >
> >
> > On 21/04/2021 16:23, Jan Beulich wrote:
> >> On 27.01.2021 09:13, Jan Beulich wrote:
> >>> These are grouped into a series largely because of their origin,
> >>> not so much because
On 5/13/21 8:56 PM, Connor Davis wrote:
> Callers of dbgp_reset_prep treat a 0 return value as "stop using
> the debug port", which means they don't make any subsequent calls to
> dbgp_reset_prep or dbgp_external_startup.
>
> To ensure the callers' interpretation is correct, first return -EPERM
>
Hi Juergen,
On 14/05/2021 12:56, Juergen Gross wrote:
-struct connection *new_connection(connwritefn_t *write, connreadfn_t *read);
+struct connection *new_connection(const struct interface_funcs *funcs);
struct connection *get_connection_by_id(unsigned int conn_id);
void check_store(void);
Hi Juergen,
On 14/05/2021 12:56, Juergen Gross wrote:
The main loop of xenstored is rather complicated due to different
handling of socket and ring-page interfaces. Unify that handling by
introducing interface type specific functions can_read() and
can_write().
Signed-off-by: Juergen Gross
---
Hi Juergen,
On 14/05/2021 10:01, Juergen Gross wrote:
The Makefile of xenstore and related to that the global .gitignore
file contain some leftovers from ancient times. Remove those.
While at it sort the tools/xenstore/* entries in .gitignore.
Signed-off-by: Juergen Gross
Acked-by: Julien G
flight 161946 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/161946/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 161926
test-armhf-armhf-libvirt 16 save
Hi all,
This series introduces a minimal build for RISCV. It is based on Bobby's
previous work from last year[0] rebased onto current Xen.
This series provides the patches necessary to get a minimal build
working. The build is "minimal" in the sense that it only supports
building TARGET=head.o. T
Defaulting to yes only for X86 and ARM reduces the requirements
for a minimal build when porting new architectures.
Signed-off-by: Connor Davis
---
xen/drivers/char/Kconfig | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/drivers/char/Kconfig b/xen/drivers/char/Kconfig
ind
The variables iommu_enabled and iommu_dont_flush_iotlb are defined in
drivers/passthrough/iommu.c and are referenced in common code, which
causes the link to fail when !CONFIG_HAS_PASSTHROUGH.
Guard references to these variables in common code so that xen
builds when !CONFIG_HAS_PASSTHROUGH.
Sign
Move struct grant_table; in grant_table.h above
ifdef CONFIG_GRANT_TABLE. This fixes the following:
/build/xen/include/xen/grant_table.h:84:50: error: 'struct grant_table'
declared inside parameter list will not be visible outside of this
definition or declaration [-Werror]
84 | static inline i
Add arch-specific makefiles and configs needed to build for
riscv64. Also add a minimal head.S that is a simple infinite loop.
head.o can be built with
$ make XEN_TARGET_ARCH=riscv64 SUBSYSTEMS=xen -C xen TARGET=head.o
No other TARGET is supported at the moment.
Signed-off-by: Connor Davis
---
Add a container for cross-compiling xen to riscv64.
This just includes the cross-compiler and necessary packages for
building xen itself (packages for tools, stubdoms, etc., can be
added later).
Signed-off-by: Connor Davis
---
automation/build/archlinux/riscv64.dockerfile | 33 ++
Hi Juergen,
On 14/05/2021 09:41, Juergen Gross wrote:
Xenstored is absolutely mandatory for a Xen host and it can't be
restarted, so being killed by OOM-killer in case of memory shortage is
to be avoided.
Set /proc/$pid/oom_score_adj (if available) to -500 in order to allow
xenstored to use lar
During the hyperlaunch design sessions a request was made to come up with a
formal definition of the roles a domain was allowed to take on. In particular
the primary focus was to answer what is the control domain and what is the
hardware domain. Another comment came up during the discussion on PCI
This defines the new privilege roles that a domain may be assigned.
Signed-off-by: Daniel P. Smith
---
xen/include/xen/sched.h | 18 ++
1 file changed, 18 insertions(+)
diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h
index cc633fdc07..9b2c277ede 100644
--- a/xen/i
Move to using the new Domain Control role as the backing to the
is_control_domain check.
Signed-off-by: Daniel P. Smith
---
xen/common/domain.c | 3 +++
xen/include/xen/sched.h | 4 +++-
2 files changed, 6 insertions(+), 1 deletion(-)
diff --git a/xen/common/domain.c b/xen/common/domain.c
i
Move to using a check for the Xenstore Domain role for the is_xenstore_domain
check.
Signed-off-by: Daniel P. Smith
---
xen/common/domain.c | 3 +++
xen/include/xen/sched.h | 2 +-
2 files changed, 4 insertions(+), 1 deletion(-)
diff --git a/xen/common/domain.c b/xen/common/domain.c
index 2
This converts the previous XSM hook dummy checks over to using equivalent
domain role privileges.
Signed-off-by: Daniel P. Smith
---
xen/arch/arm/dm.c | 2 +-
xen/arch/arm/domctl.c | 6 +-
xen/arch/arm/hvm.c| 2 +-
xen/arch/arm/mm.c
This refactors the hardware_domain so that it is works within the
new domain roles construct.
Signed-off-by: Daniel P. Smith
---
xen/arch/x86/acpi/cpu_idle.c| 3 +-
xen/arch/x86/cpu/mcheck/vmce.h | 3 +-
xen/arch/x86/cpu/vpmu.c | 7 +-
xen/arch/x86/crash.c
The difference between XSM and non-XSM was whether the "dummy" policy was
invoked via direct calls or through function pointers. The "dummy" policy
enforced a set of rules that effictively defined a loosely set of roles that a
domain may have. This builds on the work of replacing those rules with w
This is adjustments and clean ups to the core of xsm for adoption of the domain
roles.
Signed-off-by: Daniel P. Smith
---
xen/include/xen/sched.h | 2 +-
xen/include/xsm/xsm.h | 26 ---
xen/xsm/Makefile| 3 +-
xen/xsm/dummy.c | 160 -
This converts the SILO XSM module to function as an extension to the domain
roles system to implement an extended enforcement policy.
Signed-off-by: Daniel P. Smith
---
xen/xsm/silo.c | 22 +-
1 file changed, 13 insertions(+), 9 deletions(-)
diff --git a/xen/xsm/silo.c b/xen
The domain roles approach changed the idea of how the default XSM policy module
is configured. This makes the minor adjustment for that change.
Signed-off-by: Daniel P. Smith
---
xen/xsm/flask/flask_op.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/xsm/flask/flask_op.c
This adjusts the Kconfig system for the reorganizing of XSM by the introduction
of domain roles.
Signed-off-by: Daniel P. Smith
---
xen/common/Kconfig | 14 --
1 file changed, 8 insertions(+), 6 deletions(-)
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index 3064bf6b89..560a
On 5/14/21 11:53 AM, Connor Davis wrote:
> +
> +# There is a regression in GDB that causes an assertion error
> +# when setting breakpoints, use this commit until it is fixed!
> +RUN git clone --recursive -j$(nproc) --progress
> https://github.com/riscv/riscv-gnu-toolchain && \
> +cd riscv-gnu
flight 161949 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/161949/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d82c4693f8d5c6b05f40ccf351c84645201067c1
baseline version:
ovmf 22ac5cc9d9db34056f7c9
On 5/14/21 11:53 AM, Connor Davis wrote:
> Add arch-specific makefiles and configs needed to build for
> riscv64. Also add a minimal head.S that is a simple infinite loop.
> head.o can be built with
>
> $ make XEN_TARGET_ARCH=riscv64 SUBSYSTEMS=xen -C xen TARGET=head.o
>
I recently realized that
flight 161947 linux-5.4 real [real]
flight 161951 linux-5.4 real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/161947/
http://logs.test-lab.xenproject.org/osstest/logs/161951/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd6
flight 161948 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/161948/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-debianhvm-amd64 7 xen-install fail REGR. vs. 152332
test-amd64-i386-xl-
On Sun, 25 Apr 2021, Julien Grall wrote:
> From: Wei Liu
>
> The basic idea is like Persistent Kernel Map (PKMAP) in Linux. We
> pre-populate all the relevant page tables before the system is fully
> set up.
>
> We will need it on Arm in order to rework the arm64 version of
> xenheap_setup_mappi
On Sun, 25 Apr 2021, Julien Grall wrote:
> From: Julien Grall
>
> During early boot, it is not possible to use xen_{,un}map_table()
> if the page tables are not residing the Xen binary.
>
> This is a blocker to switch some of the helpers to use xen_pt_update()
> as we may need to allocate extra
On 5/14/21 3:53 PM, Bob Eshleman wrote:
On 5/14/21 11:53 AM, Connor Davis wrote:
Add arch-specific makefiles and configs needed to build for
riscv64. Also add a minimal head.S that is a simple infinite loop.
head.o can be built with
$ make XEN_TARGET_ARCH=riscv64 SUBSYSTEMS=xen -C xen TARGET=
On Sun, 25 Apr 2021, Julien Grall wrote:
> From: Julien Grall
>
> A few issues have been reported with setup_xenheap_mappings() over the
> last couple of years. The main ones are:
> - It will break on platform supporting more than 512GB of RAM
> because the memory allocated by the boot
On 5/14/21 3:01 PM, Bob Eshleman wrote:
On 5/14/21 11:53 AM, Connor Davis wrote:
+
+# There is a regression in GDB that causes an assertion error
+# when setting breakpoints, use this commit until it is fixed!
+RUN git clone --recursive -j$(nproc) --progress
https://github.com/riscv/riscv-gnu
On Sun, 25 Apr 2021, Julien Grall wrote:
> From: Julien Grall
>
> Now that map_pages_to_xen() has been extended to support 2MB mappings,
> we can replace the create_mappings() call by map_pages_to_xen() call.
>
> This has the advantage to remove the different between 32-bit and 64-bit
> code.
>
On Fri, May 14, 2021 at 09:32:10AM +0100, Julien Grall wrote:
> On 14/05/2021 03:42, Elliott Mitchell wrote:
> >
> > Issue is what is the intended use of the memory range allocated to
> > /hypervisor in the device-tree on ARM? What do the Xen developers plan
> > for? What is expected?
>
> From
flight 161952 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/161952/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 32928415e36b3e234efb5c24143e06060a68fba3
baseline version:
ovmf d82c4693f8d5c6b05f40c
flight 161950 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/161950/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-qemuu-freebsd11-amd64 16 guest-saverestore fail REGR. vs.
152631
test-amd64-i3
69 matches
Mail list logo