Re: [PATCH v5 2/6] xen/x86: move generically usable NUMA code from x86 to common

2022-09-29 Thread Wei Chen
Hi Jan, On 2022/9/27 16:19, Jan Beulich wrote: On 20.09.2022 11:12, Wei Chen wrote: There are some codes in x86/numa.c can be shared by common architectures to implememnt NUMA support. Just like some variables and functions to check and store NUMA memory map. And some variables and functions to

Re: [PATCH v5 2/6] xen/x86: move generically usable NUMA code from x86 to common

2022-09-29 Thread Wei Chen
Hi Jan, On 2022/9/27 17:39, Jan Beulich wrote: It's the comment which is wrong - it wasn't updated in Linux commit 54413927f022 ("x86-64: x86_64-make-the-numa-hash-function-nodemap-allocation fix fix"). Our code was cloned from Linux'es. In fact when memory is not contiguous, too small a shift v

Re: Proposal for physical address based hypercalls

2022-09-29 Thread Jan Beulich
On 28.09.2022 15:32, dpsmith.dev wrote: > On 9/28/22 06:38, Jan Beulich wrote: >> For quite some time we've been talking about replacing the present virtual >> address based hypercall interface with one using physical addresses. This >> is in >> particular a prerequisite to being able to support

Re: [PATCH RFC] rangeset: mark a few functions pure

2022-09-29 Thread Jan Beulich
On 28.09.2022 16:27, Roger Pau Monné wrote: > On Wed, Sep 28, 2022 at 02:12:30PM +0200, Jan Beulich wrote: >> While for some of the functions there's locking involved, the acquiring >> and releasing of a lock doesn't alter program state when comparing >> "before" and "after" the function invocation

Re: [PATCH v5 5/6] xen/x86: move NUMA scan nodes codes from x86 to common

2022-09-29 Thread Wei Chen
Hi Jan, On 2022/9/27 23:48, Jan Beulich wrote: On 20.09.2022 11:12, Wei Chen wrote: +static bool __init nodes_cover_memory(void) +{ +unsigned int i; + +for ( i = 0; ; i++ ) +{ +int err; +bool found; +unsigned int j; +paddr_t start, end; + +/*

Re: [PATCH v3 08/10] x86/mtrr: let cache_aps_delayed_init replace mtrr_aps_delayed_init

2022-09-29 Thread Juergen Gross
On 28.09.22 18:32, Juergen Gross wrote: On 28.09.22 18:12, Borislav Petkov wrote: On Wed, Sep 28, 2022 at 03:43:56PM +0200, Juergen Gross wrote: Would you feel better with adding a new enum member CPUHP_AP_CACHECTRL_ONLINE? This would avoid a possible source of failure during resume in case no

[xen-unstable test] 173361: tolerable FAIL

2022-09-29 Thread osstest service owner
flight 173361 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/173361/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-rtds 20 guest-localmigrate/x10 fail like 173358 test-amd64-amd64-xl-qemut-win7-amd64

Re: [PATCH v2] x86/PCI: Prefer MMIO over PIO on all hypervisor

2022-09-29 Thread Alexander Graf
On 29.09.22 07:36, Ajay Kaher wrote: On 13/09/22, 7:05 PM, "Vitaly Kuznetsov" wrote: Thanks Vitaly for your response. 1. we have multiple objects of struct pci_raw_ops, 2. adding 'priority' field to struct pci_raw_ops doesn't seems to be appropriate as need to take decision which object of

[PATCH 0/2][4.17] x86: (re-)wire two VCPUOP_* for 32-bit guests

2022-09-29 Thread Jan Beulich
1: re-connect VCPUOP_send_nmi for 32-bit guests 2: wire up VCPUOP_register_vcpu_time_memory_area for 32-bit guests As to 4.17: Patch 1 addresses a recently introduced regression, while the issue patch 2 addresses has been there effectively forever (so cannot really be viewed as a regression). Jan

[PATCH 1/2][4.17] x86: re-connect VCPUOP_send_nmi for 32-bit guests

2022-09-29 Thread Jan Beulich
With the "inversion" of VCPUOP handling, processing arch-specific ones first, the forwarding of this sub-op from the (common) compat handler to (common) non-compat one did no longer have the intended effect. It now needs forwarding between the arch-specific handlers. Fixes: 8a96c0ea7999 ("xen: mov

[PATCH 2/2][4.17?] x86: wire up VCPUOP_register_vcpu_time_memory_area for 32-bit guests

2022-09-29 Thread Jan Beulich
Forever sinced its introduction VCPUOP_register_vcpu_time_memory_area was available only to native domains. Linux, for example, would attempt to use it irrespective of guest bitness (including in its so called PVHVM mode) as long as it finds XEN_PVCLOCK_TSC_STABLE_BIT set (which we set only for clo

[XEN PATCH v2] automation: Information about running containers for a different arch

2022-09-29 Thread Anthony PERARD
Adding pointer to 'qemu-user-static'. Signed-off-by: Anthony PERARD --- Notes: v2: - reword to point out that it's an x86 thing automation/build/README.md | 13 + 1 file changed, 13 insertions(+) diff --git a/automation/build/README.md b/automation/build/README.md index 00

[PATCH 0/2][XTF] build: suppress GNU ld 2.39 warnings

2022-09-29 Thread Jan Beulich
Like done previously for the hypervisor and elsewhere. 1: suppress GNU ld 2.39 warning about RWX load segments 2: silence GNU ld 2.39 warning about executable stacks Jan

[PATCH 1/2][XTF] build: suppress GNU ld 2.39 warning about RWX load segments

2022-09-29 Thread Jan Beulich
We cannot really avoid such and we're also not really at risk because of them, as we control page table permissions ourselves rather than relying on a loader of some sort. Signed-off-by: Jan Beulich --- a/build/common.mk +++ b/build/common.mk @@ -20,9 +20,15 @@ COMMON_FLAGS := -pipe -I$(ROOT)/in

[PATCH 2/2][XTF] build: silence GNU ld 2.39 warning about executable stacks

2022-09-29 Thread Jan Beulich
While for C files the compiler is supposed to arrange for emitting respective information, for assembly sources we're responsible ourselves. For the new use of cc-option to work we cannot pass -S to the compiler anymore. We need the compiler to actually invoke the assembler, so switch to using -c.

Re: [PATCH for-4.17] Build: Drop -no-pie from EMBEDDED_EXTRA_CFLAGS

2022-09-29 Thread Jan Beulich
On 27.09.2022 17:47, Andrew Cooper wrote: > This breaks all Clang builds, as demostrated by Gitlab CI. > > Contrary to the description in ecd6b9759919, -no-pie is not even an option > passed to the linker. GCC's actual behaviour is to inhibit the passing of > -pie to the linker, as well as select

Re: [PATCH v3 2/2] x86/ept: limit calls to memory_type_changed()

2022-09-29 Thread Jan Beulich
On 28.09.2022 16:11, Roger Pau Monne wrote: > memory_type_changed() is currently only implemented for Intel EPT, and > results in the invalidation of EMT attributes on all the entries in > the EPT page tables. Such invalidation causes EPT_MISCONFIG vmexits > when the guest tries to access any gfns

Re: [PATCH v3 0/2] Move calls to memory_type_changed()

2022-09-29 Thread Jan Beulich
On 28.09.2022 16:11, Roger Pau Monne wrote: > The current calls to memory_type_changed() are wider than strictly > necessary. Move them inside the iocap handlers and also limit to only > issue them when required. > > I would really like to get some feedback on the Arm change, since this > is now

Re: Proposal for physical address based hypercalls

2022-09-29 Thread Wei Chen
Hi Juergen, On 2022/9/28 21:03, Juergen Gross wrote: On 28.09.22 14:06, Jan Beulich wrote: On 28.09.2022 12:58, Andrew Cooper wrote: On 28/09/2022 11:38, Jan Beulich wrote: What about an alternative model allowing to use most of the current hypercalls unmodified? We could add a new hyperc

Re: Design session "MSI-X support with Linux stubdomain" notes

2022-09-29 Thread Marek Marczykowski-Górecki
On Mon, Sep 26, 2022 at 02:47:55PM +0200, Jan Beulich wrote: > On 26.09.2022 14:43, Marek Marczykowski-Górecki wrote: > > On Thu, Sep 22, 2022 at 08:00:00PM +0200, Jan Beulich wrote: > >> On 22.09.2022 18:05, Anthony PERARD wrote: > >>> WARNING: Notes missing at the beginning of the meeting. > >>>

For 4.17 (was: Re: [PATCH v3 0/2] Move calls to memory_type_changed())

2022-09-29 Thread Roger Pau Monné
On Thu, Sep 29, 2022 at 12:14:10PM +0200, Jan Beulich wrote: > On 28.09.2022 16:11, Roger Pau Monne wrote: > > The current calls to memory_type_changed() are wider than strictly > > necessary. Move them inside the iocap handlers and also limit to only > > issue them when required. > > > > I would

RE: For 4.17 (was: Re: [PATCH v3 0/2] Move calls to memory_type_changed())

2022-09-29 Thread Henry Wang
Hi Roger and Jan, > -Original Message- > From: Roger Pau Monné > Subject: For 4.17 (was: Re: [PATCH v3 0/2] Move calls to > memory_type_changed()) > > On Thu, Sep 29, 2022 at 12:14:10PM +0200, Jan Beulich wrote: > > On 28.09.2022 16:11, Roger Pau Monne wrote: > > > The current calls to m

Re: [PATCH 1/2][4.17] x86: re-connect VCPUOP_send_nmi for 32-bit guests

2022-09-29 Thread Roger Pau Monné
On Thu, Sep 29, 2022 at 11:51:03AM +0200, Jan Beulich wrote: > With the "inversion" of VCPUOP handling, processing arch-specific ones > first, the forwarding of this sub-op from the (common) compat handler to > (common) non-compat one did no longer have the intended effect. It now > needs forwardin

RE: [XEN PATCH v2] automation: Information about running containers for a different arch

2022-09-29 Thread Henry Wang
Hi Anthony, > -Original Message- > From: Anthony PERARD > Subject: [XEN PATCH v2] automation: Information about running containers > for a different arch > > Adding pointer to 'qemu-user-static'. > > Signed-off-by: Anthony PERARD I didn't see the for-4.17 tag in the title but I assume

RE: [PATCH 1/2][4.17] x86: re-connect VCPUOP_send_nmi for 32-bit guests

2022-09-29 Thread Henry Wang
Hi Jan, > -Original Message- > From: Jan Beulich > Subject: [PATCH 1/2][4.17] x86: re-connect VCPUOP_send_nmi for 32-bit > guests > > With the "inversion" of VCPUOP handling, processing arch-specific ones > first, the forwarding of this sub-op from the (common) compat handler to > (commo

RE: [PATCH 2/2][4.17?] x86: wire up VCPUOP_register_vcpu_time_memory_area for 32-bit guests

2022-09-29 Thread Henry Wang
Hi Jan, > -Original Message- > From: Jan Beulich > Subject: [PATCH 2/2][4.17?] x86: wire up > VCPUOP_register_vcpu_time_memory_area for 32-bit guests > > Forever sinced its introduction VCPUOP_register_vcpu_time_memory_area > was available only to native domains. Linux, for example, woul

Re: Proposal for physical address based hypercalls

2022-09-29 Thread Jan Beulich
On 28.09.2022 15:03, Juergen Gross wrote: > On 28.09.22 14:06, Jan Beulich wrote: >> On 28.09.2022 12:58, Andrew Cooper wrote: >>> On 28/09/2022 11:38, Jan Beulich wrote: As an alternative I'd like to propose the introduction of a bit (or multiple ones, see below) augmenting the hyp

Re: For 4.17 (was: Re: [PATCH v3 0/2] Move calls to memory_type_changed())

2022-09-29 Thread Jan Beulich
On 29.09.2022 13:10, Henry Wang wrote: >> -Original Message- >> From: Roger Pau Monné >> >> On Thu, Sep 29, 2022 at 12:14:10PM +0200, Jan Beulich wrote: >>> On 28.09.2022 16:11, Roger Pau Monne wrote: The current calls to memory_type_changed() are wider than strictly necessary.

Re: [PATCH 2/2][4.17?] x86: wire up VCPUOP_register_vcpu_time_memory_area for 32-bit guests

2022-09-29 Thread Roger Pau Monné
On Thu, Sep 29, 2022 at 11:51:40AM +0200, Jan Beulich wrote: > Forever sinced its introduction VCPUOP_register_vcpu_time_memory_area > was available only to native domains. Linux, for example, would attempt > to use it irrespective of guest bitness (including in its so called > PVHVM mode) as long

Re: Design session "MSI-X support with Linux stubdomain" notes

2022-09-29 Thread Jan Beulich
On 29.09.2022 12:57, Marek Marczykowski-Górecki wrote: > On Mon, Sep 26, 2022 at 02:47:55PM +0200, Jan Beulich wrote: >> On 26.09.2022 14:43, Marek Marczykowski-Górecki wrote: >>> On Thu, Sep 22, 2022 at 08:00:00PM +0200, Jan Beulich wrote: On 22.09.2022 18:05, Anthony PERARD wrote: > WARN

Re: [PATCH 1/2][4.17] x86: re-connect VCPUOP_send_nmi for 32-bit guests

2022-09-29 Thread Jan Beulich
On 29.09.2022 13:11, Roger Pau Monné wrote: > On Thu, Sep 29, 2022 at 11:51:03AM +0200, Jan Beulich wrote: >> With the "inversion" of VCPUOP handling, processing arch-specific ones >> first, the forwarding of this sub-op from the (common) compat handler to >> (common) non-compat one did no longer h

Re: Design session "MSI-X support with Linux stubdomain" notes

2022-09-29 Thread Roger Pau Monné
On Thu, Sep 29, 2022 at 01:44:28PM +0200, Jan Beulich wrote: > On 29.09.2022 12:57, Marek Marczykowski-Górecki wrote: > > On Mon, Sep 26, 2022 at 02:47:55PM +0200, Jan Beulich wrote: > >> On 26.09.2022 14:43, Marek Marczykowski-Górecki wrote: > >>> On Thu, Sep 22, 2022 at 08:00:00PM +0200, Jan Beul

Re: [PATCH 2/2][4.17?] x86: wire up VCPUOP_register_vcpu_time_memory_area for 32-bit guests

2022-09-29 Thread Jan Beulich
On 29.09.2022 13:37, Roger Pau Monné wrote: > On Thu, Sep 29, 2022 at 11:51:40AM +0200, Jan Beulich wrote: >> Forever sinced its introduction VCPUOP_register_vcpu_time_memory_area >> was available only to native domains. Linux, for example, would attempt >> to use it irrespective of guest bitness (

Re: [PATCH v3 2/2] x86/ept: limit calls to memory_type_changed()

2022-09-29 Thread Bertrand Marquis
Hi Han, > On 29 Sep 2022, at 12:13, Jan Beulich wrote: > > On 28.09.2022 16:11, Roger Pau Monne wrote: >> memory_type_changed() is currently only implemented for Intel EPT, and >> results in the invalidation of EMT attributes on all the entries in >> the EPT page tables. Such invalidation cause

Re: [PATCH v5 2/6] xen/x86: move generically usable NUMA code from x86 to common

2022-09-29 Thread Jan Beulich
On 29.09.2022 09:43, Wei Chen wrote: > On 2022/9/27 16:19, Jan Beulich wrote: >> On 20.09.2022 11:12, Wei Chen wrote: >>> +nodes_used++; >>> +if ( epdx > memtop ) >>> +memtop = epdx; >>> +} >>> + >>> +if ( nodes_used <= 1 ) >>> +i = BITS_PER_LONG - 1; >>

Re: [PATCH v5 5/6] xen/x86: move NUMA scan nodes codes from x86 to common

2022-09-29 Thread Jan Beulich
On 29.09.2022 10:21, Wei Chen wrote: > On 2022/9/27 23:48, Jan Beulich wrote: >> On 20.09.2022 11:12, Wei Chen wrote: >>> --- a/xen/drivers/acpi/Kconfig >>> +++ b/xen/drivers/acpi/Kconfig >>> @@ -7,4 +7,5 @@ config ACPI_LEGACY_TABLES_LOOKUP >>> >>> config ACPI_NUMA >>> bool >>> + select

Re: Proposal for physical address based hypercalls

2022-09-29 Thread Juergen Gross
On 29.09.22 13:32, Jan Beulich wrote: On 28.09.2022 15:03, Juergen Gross wrote: On 28.09.22 14:06, Jan Beulich wrote: On 28.09.2022 12:58, Andrew Cooper wrote: On 28/09/2022 11:38, Jan Beulich wrote: As an alternative I'd like to propose the introduction of a bit (or multiple ones, see below)

Re: Design session "MSI-X support with Linux stubdomain" notes

2022-09-29 Thread Juergen Gross
On 29.09.22 13:52, Roger Pau Monné wrote: On Thu, Sep 29, 2022 at 01:44:28PM +0200, Jan Beulich wrote: On 29.09.2022 12:57, Marek Marczykowski-Górecki wrote: On Mon, Sep 26, 2022 at 02:47:55PM +0200, Jan Beulich wrote: On 26.09.2022 14:43, Marek Marczykowski-Górecki wrote: On Thu, Sep 22, 202

Re: Proposal for physical address based hypercalls

2022-09-29 Thread Daniel P. Smith
On 9/29/22 04:16, Jan Beulich wrote: On 28.09.2022 15:32, dpsmith.dev wrote: On 9/28/22 06:38, Jan Beulich wrote: For quite some time we've been talking about replacing the present virtual address based hypercall interface with one using physical addresses. This is in particular a prerequisite

Re: Proposal for physical address based hypercalls

2022-09-29 Thread Jan Beulich
On 29.09.2022 14:26, Juergen Gross wrote: > On 29.09.22 13:32, Jan Beulich wrote: >> Finally - in how far are we concerned of PV guests using linear >> addresses for hypercall buffers? I ask because I don't think the model >> lends itself to use also for the PV guest interfaces. > > Good question.

Re: Proposal for physical address based hypercalls

2022-09-29 Thread Juergen Gross
On 29.09.22 14:58, Jan Beulich wrote: On 29.09.2022 14:26, Juergen Gross wrote: On 29.09.22 13:32, Jan Beulich wrote: Finally - in how far are we concerned of PV guests using linear addresses for hypercall buffers? I ask because I don't think the model lends itself to use also for the PV guest

Re: [PATCH v2] x86/vpmu: Fix race-condition in vpmu_load

2022-09-29 Thread Jan Beulich
On 26.09.2022 16:22, Tamas K Lengyel wrote: > On Mon, Sep 26, 2022 at 10:12 AM Jan Beulich wrote: >> On 22.09.2022 22:48, Tamas K Lengyel wrote: >>> --- a/xen/arch/x86/cpu/vpmu.c >>> +++ b/xen/arch/x86/cpu/vpmu.c >>> @@ -376,57 +376,24 @@ void vpmu_save(struct vcpu *v) >>> vpmu->last_pcpu = p

Re: [PATCH 0/7] Fix MISRA C 2012 Rule 20.7 violations

2022-09-29 Thread Xenia Ragiadakou
Hi Roberto, On 9/28/22 17:11, Roberto Bagnara wrote: On 9/26/22 10:50, Xenia Ragiadakou wrote: On 9/18/22 16:02, Roberto Bagnara wrote: The question is on the interpretation of Rule 20.7. Are parenthesis required by Rule 20.7 in the following cases: - macro parameters used as function argumen

Proposal for consistent Kconfig usage by the hypervisor build system

2022-09-29 Thread Jan Beulich
At present we use a mix of Makefile and Kconfig driven capability checks for tool chain components involved in the building of the hypervisor. What approach is used where is in some part a result of the relatively late introduction of Kconfig into the build system, but in other places also simply

Re: [XEN PATCH v2] automation: Information about running containers for a different arch

2022-09-29 Thread Michal Orzel
Hi Anthony, On 29/09/2022 11:51, Anthony PERARD wrote: > > > Adding pointer to 'qemu-user-static'. > > Signed-off-by: Anthony PERARD Reviewed-by: Michal Orzel ~Michal

[PATCH v8 0/2] Add Xue - console over USB 3 Debug Capability

2022-09-29 Thread Marek Marczykowski-Górecki
This is integration of https://github.com/connojd/xue into mainline Xen. This patch series includes several patches that I made in the process, some are very loosely related. The driver developed by Connor supports console via USB3 debug capability. The capability is designed to operate mostly ind

[PATCH v8 1/2] IOMMU/VT-d: wire common device reserved memory API

2022-09-29 Thread Marek Marczykowski-Górecki
Re-use rmrr= parameter handling code to handle common device reserved memory. Move MAX_USER_RMRR_PAGES limit enforcement to apply only to user-configured ranges, but not those from internal callers. Signed-off-by: Marek Marczykowski-Górecki Reviewed-by: Kevin Tian --- Changes in v8: - move add_

[PATCH v8 2/2] drivers/char: suspend handling in XHCI console driver

2022-09-29 Thread Marek Marczykowski-Górecki
Similar to the EHCI driver - save/restore relevant BAR and command register, re-configure DbC on resume and stop/start timer. On resume trigger sending anything that was queued in the meantime. Save full BAR value, instead of just the address part, to ease restoring on resume. Signed-off-by: Marek

Re: [PATCH v2] x86/vpmu: Fix race-condition in vpmu_load

2022-09-29 Thread Tamas K Lengyel
On Thu, Sep 29, 2022 at 9:07 AM Jan Beulich wrote: > On 26.09.2022 16:22, Tamas K Lengyel wrote: > > On Mon, Sep 26, 2022 at 10:12 AM Jan Beulich wrote: > >> On 22.09.2022 22:48, Tamas K Lengyel wrote: > >>> --- a/xen/arch/x86/cpu/vpmu.c > >>> +++ b/xen/arch/x86/cpu/vpmu.c > >>> @@ -376,57 +376,

Re: [PATCH v2] x86/vpmu: Fix race-condition in vpmu_load

2022-09-29 Thread Jan Beulich
On 29.09.2022 16:28, Tamas K Lengyel wrote: > On Thu, Sep 29, 2022 at 9:07 AM Jan Beulich wrote: > >> On 26.09.2022 16:22, Tamas K Lengyel wrote: >>> On Mon, Sep 26, 2022 at 10:12 AM Jan Beulich wrote: On 22.09.2022 22:48, Tamas K Lengyel wrote: > --- a/xen/arch/x86/cpu/vpmu.c > +++

Re: [PATCH] x86/NUMA: correct off-by-1 in node map size calculation

2022-09-29 Thread Roger Pau Monné
On Tue, Sep 27, 2022 at 04:14:21PM +0200, Jan Beulich wrote: > extract_lsb_from_nodes() accumulates "memtop" from all PDXes one past > the covered ranges. Hence the maximum address which can validly by used > to index the node map is one below this value, and we may currently set > up a node map wi

Re: [for-4.17 v2] xen/arm: domain_build: Always print the static shared memory region

2022-09-29 Thread Stefano Stabellini
On Mon, 19 Sep 2022, Michal Orzel wrote: > At the moment, the information about allocating static shared memory > region is only printed during the debug build. This information can also > be helpful for the end user (which may not be the same as the person > building the package), so switch to pri

Re: [XEN PATCH v2] automation: Information about running containers for a different arch

2022-09-29 Thread Stefano Stabellini
On Thu, 29 Sep 2022, Michal Orzel wrote: > Hi Anthony, > > On 29/09/2022 11:51, Anthony PERARD wrote: > > > > > > Adding pointer to 'qemu-user-static'. > > > > Signed-off-by: Anthony PERARD > > Reviewed-by: Michal Orzel Acked-by: Stefano Stabellini

Re: [RFC PATCH v1 0/2] Add a new acquire resource to query vcpu statistics

2022-09-29 Thread Jan Beulich
On 24.08.2022 15:27, Matias Ezequiel Vara Larsen wrote: > The purpose of this RFC is to get feedback about a new acquire resource that > exposes vcpu statistics for a given domain. The current mechanism to get those > statistics is by querying the hypervisor. This mechanism relies on a hypercall >

Re: How to do display sharing between guests or bring up guests display

2022-09-29 Thread Vipul Suneja
Hi Elliott, Thanks! Any input from your side on this issue will be really helpful. Looking forward to hearing from you asap. Regards, Vipul Kumar On Tue, Sep 27, 2022 at 11:47 PM Vipul Suneja wrote: > Hi Elliott, > > Thanks! > > As per the link you shared, VNC & SDL are two ways to get GUI di

[xen-unstable-smoke test] 173362: regressions - FAIL

2022-09-29 Thread osstest service owner
flight 173362 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/173362/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 173347 Tests which

Re: [xen-unstable-smoke test] 173362: regressions - FAIL

2022-09-29 Thread Andrew Cooper
On 29/09/2022 17:22, osstest service owner wrote: > flight 173362 xen-unstable-smoke real [real] > http://logs.test-lab.xenproject.org/osstest/logs/173362/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: > build-arm64-xsm

[xen-unstable-smoke test] 173367: regressions - FAIL

2022-09-29 Thread osstest service owner
flight 173367 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/173367/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 173347 Tests which

[qemu-mainline test] 173363: tolerable FAIL - PUSHED

2022-09-29 Thread osstest service owner
flight 173363 qemu-mainline real [real] flight 173371 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/173363/ http://logs.test-lab.xenproject.org/osstest/logs/173371/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-ar

[xen-unstable-smoke test] 173370: regressions - FAIL

2022-09-29 Thread osstest service owner
flight 173370 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/173370/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 173347 Tests which

[PATCH v4 0/2] EFI improvements for Xen dom0

2022-09-29 Thread Demi Marie Obenour
This fixes EFI table processing in Xen dom0 and adds ESRT support in that configuration. Changes since v3: - Check location of all configuration tables, not just the ESRT. - Move most Xen-specific code to drivers/xen/. - Allow configuration tables to be in EFI_ACPI_RECLAIM_MEMORY. Demi Marie Obe

[PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered

2022-09-29 Thread Demi Marie Obenour
Memory of type EFI_CONVENTIONAL_MEMORY, EFI_LOADER_CODE, EFI_LOADER_DATA, EFI_BOOT_SERVICES_CODE, and EFI_BOOT_SERVICES_DATA may be clobbered by Xen before Linux gets to start using it. Therefore, Linux under Xen must not use EFI tables from such memory. Most of the remaining EFI memory types are

[PATCH v4 2/2] Support ESRT in Xen dom0

2022-09-29 Thread Demi Marie Obenour
fwupd requires access to the EFI System Resource Table (ESRT) to discover which firmware can be updated by the OS. Currently, Linux does not expose the ESRT when running as a Xen dom0. Therefore, it is not possible to use fwupd in a Xen dom0, which is a serious problem for e.g. Qubes OS. Before

[xen-unstable-smoke bisection] complete build-arm64-xsm

2022-09-29 Thread osstest service owner
branch xen-unstable-smoke xenbranch xen-unstable-smoke job build-arm64-xsm testid xen-build Tree: qemuu git://xenbits.xen.org/qemu-xen.git Tree: xen git://xenbits.xen.org/xen.git *** Found and reproduced problem changeset *** Bug is in tree: xen git://xenbits.xen.org/xen.git Bug introduced:

[linux-linus test] 173364: tolerable FAIL - PUSHED

2022-09-29 Thread osstest service owner
flight 173364 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/173364/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 173360 test-armhf-armhf-libvirt 16 saver

RE: [PATCH v5 5/6] xen/x86: move NUMA scan nodes codes from x86 to common

2022-09-29 Thread Wei Chen
Hi Jan, > -Original Message- > From: Jan Beulich > Sent: 2022年9月29日 20:21 > To: Wei Chen > Cc: nd ; Andrew Cooper ; Roger Pau > Monné ; Wei Liu ; George Dunlap > ; Julien Grall ; Stefano > Stabellini ; xen-devel@lists.xenproject.org > Subject: Re: [PATCH v5 5/6] xen/x86: move NUMA scan n

RE: [PATCH v5 2/6] xen/x86: move generically usable NUMA code from x86 to common

2022-09-29 Thread Wei Chen
Hi Jan, > -Original Message- > From: Jan Beulich > Sent: 2022年9月29日 20:14 > To: Wei Chen > Cc: nd ; Andrew Cooper ; Roger Pau > Monné ; Wei Liu ; George Dunlap > ; Julien Grall ; Stefano > Stabellini ; xen-devel@lists.xenproject.org > Subject: Re: [PATCH v5 2/6] xen/x86: move generically

RE: [PATCH] x86/NUMA: correct off-by-1 in node map size calculation

2022-09-29 Thread Wei Chen
Hi Jan, > -Original Message- > From: Xen-devel On Behalf Of Jan > Beulich > Sent: 2022年9月27日 22:14 > To: xen-devel@lists.xenproject.org > Cc: Andrew Cooper ; Wei Liu ; Roger > Pau Monné > Subject: [PATCH] x86/NUMA: correct off-by-1 in node map size calculation > > extract_lsb_from_nodes

[xen-unstable-smoke test] 173375: regressions - FAIL

2022-09-29 Thread osstest service owner
flight 173375 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/173375/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 173347 Tests which

[xen-unstable-smoke test] 173380: regressions - FAIL

2022-09-29 Thread osstest service owner
flight 173380 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/173380/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 173347 Tests which

Re: [PATCH v5 5/6] xen/x86: move NUMA scan nodes codes from x86 to common

2022-09-29 Thread Jan Beulich
On 30.09.2022 03:40, Wei Chen wrote: >> -Original Message- >> From: Jan Beulich >> Sent: 2022年9月29日 20:21 >> >> On 29.09.2022 10:21, Wei Chen wrote: >>> On 2022/9/27 23:48, Jan Beulich wrote: On 20.09.2022 11:12, Wei Chen wrote: > --- a/xen/drivers/acpi/Kconfig > +++ b/xen/dri

[PATCH] Arm/vGIC: adjust gicv3_its_deny_access() to fit other gic*_iomem_deny_access(

2022-09-29 Thread Jan Beulich
While an oversight in 9982fe275ba4 ("arm/vgic: drop const attribute from gic_iomem_deny_access()"), the issue really became apparent only when iomem_deny_access() was switched to have a non-const first parameter. Fixes: c4e5cc2ccc5b ("x86/ept: limit calls to memory_type_changed()") Reported-by: An

Re: [xen-unstable-smoke test] 173362: regressions - FAIL

2022-09-29 Thread Jan Beulich
On 29.09.2022 18:25, Andrew Cooper wrote: > On 29/09/2022 17:22, osstest service owner wrote: >> flight 173362 xen-unstable-smoke real [real] >> http://logs.test-lab.xenproject.org/osstest/logs/173362/ >> >> Regressions :-( >> >> Tests which did not succeed and are blocking, >> including tests whic

Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered

2022-09-29 Thread Jan Beulich
On 30.09.2022 01:02, Demi Marie Obenour wrote: > Memory of type EFI_CONVENTIONAL_MEMORY, EFI_LOADER_CODE, EFI_LOADER_DATA, > EFI_BOOT_SERVICES_CODE, and EFI_BOOT_SERVICES_DATA may be clobbered by > Xen before Linux gets to start using it. Therefore, Linux under Xen > must not use EFI tables from s