Re: [PATCH v2 1/2] xen/events: access last_priority and last_vcpu_id together

2020-10-15 Thread Jürgen Groß
On 15.10.20 14:07, Jan Beulich wrote: On 14.10.2020 13:40, Julien Grall wrote: Hi Jan, On 13/10/2020 15:26, Jan Beulich wrote: On 13.10.2020 16:20, Jürgen Groß wrote: On 13.10.20 15:58, Jan Beulich wrote: On 12.10.2020 11:27, Juergen Gross wrote: The queue for a fifo event is depending on

[linux-linus test] 155863: regressions - FAIL

2020-10-15 Thread osstest service owner
flight 155863 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/155863/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ws16-amd64 7 xen-install fail REGR. vs. 152332

[xen-unstable test] 155861: regressions - FAIL

2020-10-15 Thread osstest service owner
flight 155861 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/155861/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 155788 build-amd64-xsm

[PATCH v2] hvmloader: flip "ACPI data" to "ACPI NVS" type for ACPI table region

2020-10-15 Thread Igor Druzhinin
ACPI specification contains statements describing memory marked with regular "ACPI data" type as reclaimable by the guest. Although the guest shouldn't really do it if it wants kexec or similar functionality to work, there could still be ambiguities in treating these regions as potentially regular

Re: Getting rid of (many) dynamic link creations in the xen build

2020-10-15 Thread Andrew Cooper
On 15/10/2020 11:41, Jürgen Groß wrote: > On 15.10.20 12:09, Jan Beulich wrote: >> On 15.10.2020 09:58, Jürgen Groß wrote: >>> After a short discussion on IRC yesterday I promised to send a mail >>> how I think we could get rid of creating dynamic links especially >>> for header files in the Xen

[qemu-mainline test] 155841: regressions - FAIL

2020-10-15 Thread osstest service owner
flight 155841 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/155841/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 13 guest-startfail REGR. vs. 152631

[xen-unstable-smoke test] 155869: tolerable FAIL - PUSHED

2020-10-15 Thread osstest service owner
flight 155869 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/155869/ Failures :-/ but no regressions. Regressions which are regarded as allowable (not blocking): test-amd64-amd64-xl-qemuu-debianhvm-amd64 16 guest-localmigrate fail REGR. vs. 155850 Tests which

Re: [PATCH] xen/arm: Warn user on cpu errata 832075

2020-10-15 Thread Stefano Stabellini
On Thu, 15 Oct 2020, Bertrand Marquis wrote: > > On 14 Oct 2020, at 22:15, Stefano Stabellini wrote: > > > > On Wed, 14 Oct 2020, Julien Grall wrote: > >> On 14/10/2020 17:03, Bertrand Marquis wrote: > On 14 Oct 2020, at 12:35, Andrew Cooper > wrote: > > On 14/10/2020

Re: [PATCH 0/4] xen/arm: Unbreak ACPI

2020-10-15 Thread Stefano Stabellini
On Wed, 14 Oct 2020, Julien Grall wrote: > Hi Elliot, > > On 14/10/2020 02:37, Elliott Mitchell wrote: > > On Tue, Oct 13, 2020 at 06:06:26PM -0700, Stefano Stabellini wrote: > > > On Mon, 12 Oct 2020, Elliott Mitchell wrote: > > > > I'm on different hardware, but some folks have setup Tianocore

Re: [PATCH v4 05/10] drm/ttm: Add vmap/vunmap to TTM and TTM GEM helpers

2020-10-15 Thread Thomas Zimmermann
Hi On Thu, 15 Oct 2020 16:08:13 +0200 Christian König wrote: > Am 15.10.20 um 14:38 schrieb Thomas Zimmermann: > > The new functions ttm_bo_{vmap,vunmap}() map and unmap a TTM BO in kernel > > address space. The mapping's address is returned as struct dma_buf_map. > > Each function is a

Re: [PATCH v4 05/10] drm/ttm: Add vmap/vunmap to TTM and TTM GEM helpers

2020-10-15 Thread Thomas Zimmermann
Hi On Thu, 15 Oct 2020 18:49:09 +0200 Daniel Vetter wrote: > On Thu, Oct 15, 2020 at 04:08:13PM +0200, Christian König wrote: > > Am 15.10.20 um 14:38 schrieb Thomas Zimmermann: > > > The new functions ttm_bo_{vmap,vunmap}() map and unmap a TTM BO in > > > kernel address space. The mapping's

[xen-unstable-smoke test] 155850: tolerable all pass - PUSHED

2020-10-15 Thread osstest service owner
flight 155850 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/155850/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: [PATCH] libelf: Handle PVH kernels lacking ENTRY elfnote

2020-10-15 Thread Andrew Cooper
On 15/10/2020 16:14, Jan Beulich wrote: > On 15.10.2020 16:50, Jason Andryuk wrote: >> On Thu, Oct 15, 2020 at 3:00 AM Jan Beulich wrote: >>> And why is there no bounds check of ->phys_entry paralleling the >>> ->virt_entry one? >> What is the purpose of this checking? It's sanity checking which

Re: i915 dma faults on Xen

2020-10-15 Thread Jason Andryuk
On Thu, Oct 15, 2020 at 12:39 PM Tamas K Lengyel wrote: > > > > Can you paste the memory map as printed by Xen when booting, and what > > > command line are you using to boot Xen. > > > > So this is OpenXT, and it's booting EFI -> xen -> tboot -> xen > > Unrelated comment: since tboot now has a

[PATCH V2 11/23] xen/ioreq: Move x86's io_completion/io_req fields to struct vcpu

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The IOREQ is a common feature now and these fields will be used on Arm as is. Move them to common struct vcpu as a part of new struct vcpu_io. Also move enum hvm_io_completion to xen/sched.h and remove "hvm" prefixes. This patch completely removes layering violation

[PATCH V2 23/23] [RFC] libxl: Add support for virtio-disk configuration

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko This patch adds basic support for configuring and assisting virtio-disk backend (emualator) which is intended to run out of Qemu and could be run in any domain. Xenstore was chosen as a communication interface for the emulator running in non-toolstack domain to be

[PATCH V2 14/23] arm/ioreq: Introduce arch specific bits for IOREQ/DM features

2020-10-15 Thread Oleksandr Tyshchenko
From: Julien Grall This patch adds basic IOREQ/DM support on Arm. The subsequent patches will improve functionality and add remaining bits. The IOREQ/DM features are supposed to be built with IOREQ_SERVER option enabled, which is disabled by default on Arm for now. Please note, the "PIO

[PATCH V2 15/23] xen/arm: Stick around in leave_hypervisor_to_guest until I/O has completed

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko This patch adds proper handling of return value of handle_io_completion() which involves using a loop in leave_hypervisor_to_guest(). The reason to use an unbounded loop here is the fact that vCPU shouldn't continue until an I/O has completed. In Xen case, if an I/O

[PATCH V2 17/23] xen/ioreq: Introduce domain_has_ioreq_server()

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko This patch introduces a helper the main purpose of which is to check if a domain is using IOREQ server(s). On Arm the current benefit is to avoid calling handle_io_completion() (which implies iterating over all possible IOREQ servers anyway) on every return in

[PATCH V2 19/23] xen/arm: io: Abstract sign-extension

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko In order to avoid code duplication (both handle_read() and handle_ioserv() contain the same code for the sign-extension) put this code to a common helper to be used for both. Signed-off-by: Oleksandr Tyshchenko CC: Julien Grall --- Please note, this is a

[PATCH V2 21/23] xen/arm: Add mapcache invalidation handling

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko We need to send mapcache invalidation request to qemu/demu everytime the page gets removed from a guest. At the moment, the Arm code doesn't explicitely remove the existing mapping before inserting the new mapping. Instead, this is done implicitely by

[PATCH V2 20/23] xen/ioreq: Make x86's send_invalidate_req() common

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko As the IOREQ is a common feature now and we also need to invalidate qemu/demu mapcache on Arm when the required condition occurs this patch moves this function to the common code (and remames it to send_invalidate_ioreq). This patch also moves per-domain

[PATCH V2 18/23] xen/dm: Introduce xendevicemodel_set_irq_level DM op

2020-10-15 Thread Oleksandr Tyshchenko
From: Julien Grall This patch adds ability to the device emulator to notify otherend (some entity running in the guest) using a SPI and implements Arm specific bits for it. Proposed interface allows emulator to set the logical level of a one of a domain's IRQ lines. We can't reuse the existing

[PATCH V2 16/23] xen/mm: Handle properly reference in set_foreign_p2m_entry() on Arm

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko This patch implements reference counting of foreign entries in in set_foreign_p2m_entry() on Arm. This is a mandatory action if we want to run emulator (IOREQ server) in other than dom0 domain, as we can't trust it to do the right thing if it is not running in dom0. So

[PATCH V2 12/23] xen/ioreq: Remove "hvm" prefixes from involved function names

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko This patch removes "hvm" prefixes and infixes from IOREQ related function names in the common code. Signed-off-by: Oleksandr Tyshchenko CC: Julien Grall --- Please note, this is a split/cleanup/hardening of Julien's PoC: "Add support for Guest IO forwarding to a

[PATCH V2 22/23] libxl: Introduce basic virtio-mmio support on Arm

2020-10-15 Thread Oleksandr Tyshchenko
From: Julien Grall This patch creates specific device node in the Guest device-tree with allocated MMIO range and SPI interrupt if specific 'virtio' property is present in domain config. Signed-off-by: Julien Grall Signed-off-by: Oleksandr Tyshchenko --- Please note, this is a

[PATCH V2 13/23] xen/ioreq: Use guest_cmpxchg64() instead of cmpxchg()

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The cmpxchg() in hvm_send_buffered_ioreq() operates on memory shared with the emulator domain (and the target domain if the legacy interface is used). In order to be on the safe side we need to switch to guest_cmpxchg64() to prevent a domain to DoS Xen on Arm. As

[PATCH V2 09/23] xen/dm: Make x86's DM feature common

2020-10-15 Thread Oleksandr Tyshchenko
From: Julien Grall As a lot of x86 code can be re-used on Arm later on, this patch splits devicemodel support into common and arch specific parts. The common DM feature is supposed to be built with IOREQ_SERVER option enabled (as well as the IOREQ feature), which is selected for x86's config

Re: [PATCH v4 05/10] drm/ttm: Add vmap/vunmap to TTM and TTM GEM helpers

2020-10-15 Thread Daniel Vetter
On Thu, Oct 15, 2020 at 04:08:13PM +0200, Christian König wrote: > Am 15.10.20 um 14:38 schrieb Thomas Zimmermann: > > The new functions ttm_bo_{vmap,vunmap}() map and unmap a TTM BO in kernel > > address space. The mapping's address is returned as struct dma_buf_map. > > Each function is a

[PATCH V2 06/23] xen/ioreq: Make x86's hvm_ioreq_(page/vcpu/server) structs common

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The IOREQ is a common feature now and these structs will be used on Arm as is. Move them to xen/ioreq.h and remove "hvm" prefixes. Signed-off-by: Oleksandr Tyshchenko CC: Julien Grall --- Please note, this is a split/cleanup/hardening of Julien's PoC: "Add support

[PATCH V2 08/23] xen/ioreq: Introduce ioreq_params to abstract accesses to arch.hvm.params

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko We don't want to move HVM params field out of *arch.hvm* in this particular case as although it stores a few IOREQ params, it is not a (completely) IOREQ stuff and is specific to the architecture. Instead, abstract accesses by the proposed macro. This is a follow up

[PATCH V2 07/23] xen/ioreq: Move x86's ioreq_gfn(server) to struct domain

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The IOREQ is a common feature now and these structs will be used on Arm as is. Move them to common struct domain. This also significantly reduces the layering violation in the common code (*arch.hvm* usage). Signed-off-by: Oleksandr Tyshchenko CC: Julien Grall ---

[PATCH V2 02/23] xen/ioreq: Make x86's IOREQ feature common

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko As a lot of x86 code can be re-used on Arm later on, this patch moves previously prepared x86/hvm/ioreq.c to the common code. The common IOREQ feature is supposed to be built with IOREQ_SERVER option enabled, which is selected for x86's config HVM for now. In order

[PATCH V2 10/23] xen/mm: Make x86's XENMEM_resource_ioreq_server handling common

2020-10-15 Thread Oleksandr Tyshchenko
From: Julien Grall As x86 implementation of XENMEM_resource_ioreq_server can be re-used on Arm later on, this patch makes it common and removes arch_acquire_resource as unneeded. This support is going to be used on Arm to be able run device emulator outside of Xen hypervisor. Signed-off-by:

[PATCH V2 04/23] xen/ioreq: Provide alias for the handle_mmio()

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The IOREQ is a common feature now and Arm will have its own implementation. But the name of the function is pretty generic and can be confusing on Arm (we already have a try_handle_mmio()). In order not to rename the function (which is used for a varying set of

[PATCH V2 03/23] xen/ioreq: Make x86's hvm_ioreq_needs_completion() common

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The IOREQ is a common feature now and this helper will be used on Arm as is. Move it to xen/ioreq.h and remove "hvm" prefix. Although PIO handling on Arm is not introduced with the current series (it will be implemented when we add support for vPCI), technically the

[PATCH V2 05/23] xen/ioreq: Make x86's hvm_mmio_first(last)_byte() common

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The IOREQ is a common feature now and these helpers will be used on Arm as is. Move them to xen/ioreq.h and replace "hvm" prefixes with "ioreq". Signed-off-by: Oleksandr Tyshchenko CC: Julien Grall --- Please note, this is a split/cleanup/hardening of Julien's PoC:

[PATCH V2 01/23] x86/ioreq: Prepare IOREQ feature for making it common

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko As a lot of x86 code can be re-used on Arm later on, this patch makes some preparation to x86/hvm/ioreq.c before moving to the common code. This way we will get a verbatim copy for a code movement in subsequent patch (arch/x86/hvm/ioreq.c will be *just* renamed to

[PATCH V2 00/23] IOREQ feature (+ virtio-mmio) on Arm

2020-10-15 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Hello all. The purpose of this patch series is to add IOREQ/DM support to Xen on Arm. You can find an initial discussion at [1] and RFC/V1 series at [2]/[3]. Xen on Arm requires some implementation to forward guest MMIO access to a device model in order to implement

Re: i915 dma faults on Xen

2020-10-15 Thread Tamas K Lengyel
> > Can you paste the memory map as printed by Xen when booting, and what > > command line are you using to boot Xen. > > So this is OpenXT, and it's booting EFI -> xen -> tboot -> xen Unrelated comment: since tboot now has a PE build (http://hg.code.sf.net/p/tboot/code/rev/5c68f0963a78) I think

Re: [PATCH v2] x86/smpboot: Don't unconditionally call memguard_guard_stack() in cpu_smpboot_alloc()

2020-10-15 Thread Andrew Cooper
On 15/10/2020 16:16, Jan Beulich wrote: > On 15.10.2020 16:02, Andrew Cooper wrote: >> On 15/10/2020 09:50, Jan Beulich wrote: >>> On 14.10.2020 20:47, Andrew Cooper wrote: cpu_smpboot_alloc() is designed to be idempotent with respect to partially initialised state. This occurs for S3

[OSSTEST PATCH v2 16/17] sg-report-flight: Include count of blockers, and of jobs, in mro

2020-10-15 Thread Ian Jackson
The mro will now contain exactly one of "blockers" or "tolerable". Nothing uses this yet. Signed-off-by: Ian Jackson --- sg-report-flight | 5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/sg-report-flight b/sg-report-flight index 51a409ed..fd266586 100755 ---

[OSSTEST PATCH v2 15/17] cr-daily-branch: Do not do immediate retry of failing xtf flights

2020-10-15 Thread Ian Jackson
CC: Andrew Cooper Signed-off-by: Ian Jackson --- cr-daily-branch | 1 + 1 file changed, 1 insertion(+) diff --git a/cr-daily-branch b/cr-daily-branch index 3e58d465..9b1961bd 100755 --- a/cr-daily-branch +++ b/cr-daily-branch @@ -484,6 +484,7 @@ default_immediate_retry=$wantpush case

[OSSTEST PATCH v2 17/17] cr-daily-branch: Heuristics for when to do immediate retest flight

2020-10-15 Thread Ian Jackson
Do not do a retest if it would involve retesting more than 10% of the original flight, or if it wouldn't get a push even if the retests pass. Signed-off-by: Ian Jackson --- cr-daily-branch | 15 +++ 1 file changed, 15 insertions(+) diff --git a/cr-daily-branch b/cr-daily-branch

[OSSTEST PATCH v2 13/17] cr-daily-branch: Immediately retry failing tests

2020-10-15 Thread Ian Jackson
From: Ian Jackson We exclude the self-tests because we don't want to miss breakage, and the Xen smoke tests because they will be run again RSN anyway. Signed-off-by: Ian Jackson --- cr-daily-branch | 48 +++- 1 file changed, 47 insertions(+), 1

[OSSTEST PATCH v2 14/17] Honour OSSTEST_SIMULATE_FAIL_RETRY for immediate retries

2020-10-15 Thread Ian Jackson
This is primarily useful for debugging the immediate-retry logic, but it seems churlish to delete it again. Signed-off-by: Ian Jackson --- cr-daily-branch | 4 1 file changed, 4 insertions(+) diff --git a/cr-daily-branch b/cr-daily-branch index bea8734e..3e58d465 100755 ---

[OSSTEST PATCH v2 12/17] cri-args-hostlists: Move flight_html_dir variable

2020-10-15 Thread Ian Jackson
This is only used in report_flight. We are going to want to call report_flight from outside start_email, without having to set that variable ourselves. The variable isn't actually used in start_email. Signed-off-by: Ian Jackson --- cri-args-hostlists | 2 +- 1 file changed, 1 insertion(+), 1

[OSSTEST PATCH v2 10/17] sg-report-flight: Nicer output for --refer-to-flight option

2020-10-15 Thread Ian Jackson
Sort the flight summary lines together, before the URLs. This makes it considerably easier to read. Signed-off-by: Ian Jackson --- sg-report-flight | 18 +- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/sg-report-flight b/sg-report-flight index

[OSSTEST PATCH v2 11/17] Introduce real-retry blessing

2020-10-15 Thread Ian Jackson
From: Ian Jackson Nothing produces this yet. (There's play-retry as well of course but we don't need to document that really.) Signed-off-by: Ian Jackson --- README.dev | 9 + cr-daily-branch | 3 ++- cr-disk-report | 2 +- cr-try-bisect | 4 ++--

[OSSTEST PATCH v2 03/17] sg-report-flight: Consider all blessings for "never pass"

2020-10-15 Thread Ian Jackson
$anypassq is used for the "never pass" check; the distinction between this and simply "fail" is cosmetic (although it can be informative). On non-"real" flights, it can easily happen that the flight never passed *on this branch with this blessing* but has passed on real. So the steps subquery

[OSSTEST PATCH v2 05/17] sg-report-job-history: eval $DAILY_BRANCH_PREEXEC_HOOK

2020-10-15 Thread Ian Jackson
From: Ian Jackson Put the call to this debugging/testing variable inside an eval. This allows a wider variety of stunts. The one in-tree reference is already compatible with this new semantics. Signed-off-by: Ian Jackson --- cr-daily-branch | 2 +- 1 file changed, 1 insertion(+), 1

[OSSTEST PATCH v2 02/17] Honour OSSTEST_SIMULATE_FAIL in sg-run-job

2020-10-15 Thread Ian Jackson
This is a Tcl list of globs for ., and allows for simulating particular test failures. Signed-off-by: Ian Jackson --- sg-run-job | 9 - 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/sg-run-job b/sg-run-job index dd76d4f2..c64ae026 100755 --- a/sg-run-job +++ b/sg-run-job

[OSSTEST PATCH v2 06/17] cri-args-hostlists: New debug var $OSSTEST_REPORT_JOB_HISTORY_RUN

2020-10-15 Thread Ian Jackson
From: Ian Jackson No effect if this is empty. Signed-off-by: Ian Jackson --- cri-args-hostlists | 1 + 1 file changed, 1 insertion(+) diff --git a/cri-args-hostlists b/cri-args-hostlists index 6cdff53f..7019c0c7 100644 --- a/cri-args-hostlists +++ b/cri-args-hostlists @@ -121,6 +121,7 @@

[OSSTEST PATCH v2 01/17] Honour OSSTEST_SIMULATE=2 to actually run dummy flight

2020-10-15 Thread Ian Jackson
Signed-off-by: Ian Jackson --- cri-args-hostlists | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/cri-args-hostlists b/cri-args-hostlists index 994e00c0..6cdff53f 100644 --- a/cri-args-hostlists +++ b/cri-args-hostlists @@ -68,8 +68,8 @@ fi execute_flight () {

[OSSTEST PATCH v2 09/17] sg-report-flight: Provide --refer-to-flight option

2020-10-15 Thread Ian Jackson
From: Ian Jackson This just generates an extra heading and URL at the top of the output. In particular, it doesn't affect the algorithms which calculate regressions. Signed-off-by: Ian Jackson --- sg-report-flight | 18 ++ 1 file changed, 18 insertions(+) diff --git

[OSSTEST PATCH v2 00/13] Immediately retry failing tests

2020-10-15 Thread Ian Jackson
We discussed this at the Xen Summit. What I do here is immediate retry the jobs with regressions, and then reanalyse the original full flight. If the retries showed the failures were heisenbugs, this will let them though. This should reduce the negative impact on development, of heisenbugs, but

[OSSTEST PATCH v2 08/17] sg-report-flight: Break out printout_flightheader

2020-10-15 Thread Ian Jackson
From: Ian Jackson No functional change. Signed-off-by: Ian Jackson --- sg-report-flight | 15 +++ 1 file changed, 11 insertions(+), 4 deletions(-) diff --git a/sg-report-flight b/sg-report-flight index 15631001..2ab1637f 100755 --- a/sg-report-flight +++ b/sg-report-flight @@

[OSSTEST PATCH v2 07/17] cri-args-hostlists: Break out report_flight and publish_logs

2020-10-15 Thread Ian Jackson
From: Ian Jackson NFC. Signed-off-by: Ian Jackson --- cri-args-hostlists | 21 +++-- 1 file changed, 15 insertions(+), 6 deletions(-) diff --git a/cri-args-hostlists b/cri-args-hostlists index 7019c0c7..52e39f33 100644 --- a/cri-args-hostlists +++ b/cri-args-hostlists @@

[OSSTEST PATCH v2 04/17] mg-execute-flight: Do not include the transcript in reports

2020-10-15 Thread Ian Jackson
These are large and not very useful. A copy is in the tree if needed. Signed-off-by: Ian Jackson --- mg-execute-flight | 3 --- 1 file changed, 3 deletions(-) diff --git a/mg-execute-flight b/mg-execute-flight index 391f4810..bef8dab6 100755 --- a/mg-execute-flight +++ b/mg-execute-flight @@

Re: [linux-linus test] 155829: regressions - FAIL

2020-10-15 Thread Roger Pau Monné
On Thu, Oct 15, 2020 at 03:24:34PM +, osstest service owner wrote: > flight 155829 linux-linus real [real] > http://logs.test-lab.xenproject.org/osstest/logs/155829/ > > Regressions :-( > > Tests which did not succeed and are blocking, > including tests which could not be run: >

[xen-unstable test] 155832: regressions - FAIL

2020-10-15 Thread osstest service owner
flight 155832 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/155832/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvshim 12 debian-install fail REGR. vs. 155788 build-amd64-xsm

[linux-linus test] 155829: regressions - FAIL

2020-10-15 Thread osstest service owner
flight 155829 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/155829/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ws16-amd64 7 xen-install fail REGR. vs. 152332

Re: i915 dma faults on Xen

2020-10-15 Thread Jason Andryuk
On Thu, Oct 15, 2020 at 7:31 AM Roger Pau Monné wrote: > > On Wed, Oct 14, 2020 at 08:37:06PM +0100, Andrew Cooper wrote: > > On 14/10/2020 20:28, Jason Andryuk wrote: > > > Hi, > > > > > > Bug opened at https://gitlab.freedesktop.org/drm/intel/-/issues/2576 > > > > > > I'm seeing DMA faults for

Re: [PATCH v2] x86/smpboot: Don't unconditionally call memguard_guard_stack() in cpu_smpboot_alloc()

2020-10-15 Thread Jan Beulich
On 15.10.2020 16:02, Andrew Cooper wrote: > On 15/10/2020 09:50, Jan Beulich wrote: >> On 14.10.2020 20:47, Andrew Cooper wrote: >>> cpu_smpboot_alloc() is designed to be idempotent with respect to partially >>> initialised state. This occurs for S3 and CPU parking, where enough state >>> to >>>

Re: [PATCH] libelf: Handle PVH kernels lacking ENTRY elfnote

2020-10-15 Thread Jan Beulich
On 15.10.2020 16:50, Jason Andryuk wrote: > On Thu, Oct 15, 2020 at 3:00 AM Jan Beulich wrote: >> And why is there no bounds check of ->phys_entry paralleling the >> ->virt_entry one? > > What is the purpose of this checking? It's sanity checking which is > generally good, but what is the harm

Re: [PATCH 1/2] xen/blkback: turn the cache purge LRU interval into a parameter

2020-10-15 Thread SeongJae Park
On Thu, 15 Oct 2020 16:24:15 +0200 Roger Pau Monne wrote: > Assume that reads and writes to the variable will be atomic. The worse > that could happen is that one of the LRU intervals is not calculated > properly if a partially written value is read, but that would only be > a transient issue. >

Re: [PATCH 1/2] xen: Remove Xen PVH/PVHVM dependency on PCI

2020-10-15 Thread Roger Pau Monné
On Thu, Oct 15, 2020 at 05:02:21PM +0200, Jan Beulich wrote: > On 15.10.2020 16:59, Jason Andryuk wrote: > > On Thu, Oct 15, 2020 at 4:10 AM Jan Beulich wrote: > >> > >> On 14.10.2020 19:53, Jason Andryuk wrote: > >>> @@ -76,7 +80,9 @@ config XEN_DEBUG_FS > >>> Enabling this option may

Re: [PATCH] libelf: Handle PVH kernels lacking ENTRY elfnote

2020-10-15 Thread Roger Pau Monné
On Thu, Oct 15, 2020 at 09:00:09AM +0200, Jan Beulich wrote: > On 14.10.2020 18:27, Jason Andryuk wrote: > > On Wed, Oct 14, 2020 at 12:02 PM Jan Beulich wrote: > >> > >> On 14.10.2020 17:31, Jason Andryuk wrote: > >>> Linux kernels only have an ENTRY elfnote when built with CONFIG_PV. A > >>>

Re: [PATCH 1/2] xen: Remove Xen PVH/PVHVM dependency on PCI

2020-10-15 Thread Jan Beulich
On 15.10.2020 16:59, Jason Andryuk wrote: > On Thu, Oct 15, 2020 at 4:10 AM Jan Beulich wrote: >> >> On 14.10.2020 19:53, Jason Andryuk wrote: >>> @@ -76,7 +80,9 @@ config XEN_DEBUG_FS >>> Enabling this option may incur a significant performance overhead. >>> >>> config XEN_PVH >>> -

[seabios test] 155839: tolerable FAIL - PUSHED

2020-10-15 Thread osstest service owner
flight 155839 seabios real [real] http://logs.test-lab.xenproject.org/osstest/logs/155839/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stopfail like 155770 test-amd64-amd64-xl-qemuu-ws16-amd64 19

Re: [PATCH 1/2] xen: Remove Xen PVH/PVHVM dependency on PCI

2020-10-15 Thread Jason Andryuk
On Thu, Oct 15, 2020 at 4:10 AM Jan Beulich wrote: > > On 14.10.2020 19:53, Jason Andryuk wrote: > > @@ -76,7 +80,9 @@ config XEN_DEBUG_FS > > Enabling this option may incur a significant performance overhead. > > > > config XEN_PVH > > - bool "Support for running as a Xen PVH guest"

Re: [PATCH 2/2] xen: Kconfig: nest Xen guest options

2020-10-15 Thread Jason Andryuk
On Thu, Oct 15, 2020 at 5:42 AM Jürgen Groß wrote: > > On 14.10.20 19:53, Jason Andryuk wrote: > > Moving XEN_512GB allows it to nest under XEN_PV. That also allows > > XEN_PVH to nest under XEN as a sibling to XEN_PV and XEN_PVHVM giving: > > > > [*] Xen guest support > > [*] Xen PV guest

Re: [PATCH 2/2] xen: Kconfig: nest Xen guest options

2020-10-15 Thread Jason Andryuk
On Thu, Oct 15, 2020 at 9:17 AM wrote: > > > On 10/15/20 9:10 AM, Andrew Cooper wrote: > > On 15/10/2020 13:37, boris.ostrov...@oracle.com wrote: > >> On 10/14/20 1:53 PM, Jason Andryuk wrote: > >>> +config XEN_512GB > >>> + bool "Limit Xen pv-domain memory to 512GB" > >>> + depends on XEN_PV

Re: [PATCH] libelf: Handle PVH kernels lacking ENTRY elfnote

2020-10-15 Thread Jason Andryuk
On Thu, Oct 15, 2020 at 3:00 AM Jan Beulich wrote: > > On 14.10.2020 18:27, Jason Andryuk wrote: > > On Wed, Oct 14, 2020 at 12:02 PM Jan Beulich wrote: > >> > >> On 14.10.2020 17:31, Jason Andryuk wrote: > >>> Linux kernels only have an ENTRY elfnote when built with CONFIG_PV. A > >>> kernel

Re: [PATCH 2/2] xen/blkback: turn the cache purge percent into a parameter

2020-10-15 Thread Roger Pau Monné
On Thu, Oct 15, 2020 at 04:37:52PM +0200, Jürgen Groß wrote: > On 15.10.20 16:24, Roger Pau Monne wrote: > > Assume that reads and writes to the variable will be atomic. The worse > > that could happen is that one of the purges removes a partially > > written percentage of grants, but the cache

Re: [PATCH 2/2] xen/blkback: turn the cache purge percent into a parameter

2020-10-15 Thread Jürgen Groß
On 15.10.20 16:24, Roger Pau Monne wrote: Assume that reads and writes to the variable will be atomic. The worse that could happen is that one of the purges removes a partially written percentage of grants, but the cache itself will recover. Signed-off-by: Roger Pau Monné --- Cc: Konrad

[ovmf test] 155837: all pass - PUSHED

2020-10-15 Thread osstest service owner
flight 155837 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/155837/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 19c87b7d446c3273e84b238cb02cd1c0ae69c43e baseline version: ovmf

Re: [PATCH 1/2] xen/blkback: turn the cache purge LRU interval into a parameter

2020-10-15 Thread Jürgen Groß
On 15.10.20 16:24, Roger Pau Monne wrote: Assume that reads and writes to the variable will be atomic. The worse that could happen is that one of the LRU intervals is not calculated properly if a partially written value is read, but that would only be a transient issue. Signed-off-by: Roger Pau

[PATCH 1/2] xen/blkback: turn the cache purge LRU interval into a parameter

2020-10-15 Thread Roger Pau Monne
Assume that reads and writes to the variable will be atomic. The worse that could happen is that one of the LRU intervals is not calculated properly if a partially written value is read, but that would only be a transient issue. Signed-off-by: Roger Pau Monné --- Cc: Konrad Rzeszutek Wilk Cc:

[PATCH 0/2] xen/blkback: add LRU purge parameters

2020-10-15 Thread Roger Pau Monne
Add the LRU parameters as tunables. Roger Pau Monne (2): xen/blkback: turn the cache purge LRU interval into a parameter xen/blkback: turn the cache purge percent into a parameter .../ABI/testing/sysfs-driver-xen-blkback | 19 +++ drivers/block/xen-blkback/blkback.c

[PATCH 2/2] xen/blkback: turn the cache purge percent into a parameter

2020-10-15 Thread Roger Pau Monne
Assume that reads and writes to the variable will be atomic. The worse that could happen is that one of the purges removes a partially written percentage of grants, but the cache itself will recover. Signed-off-by: Roger Pau Monné --- Cc: Konrad Rzeszutek Wilk Cc: Jens Axboe Cc: Boris

Re: [PATCH v4 06/10] drm/gem: Use struct dma_buf_map in GEM vmap ops and convert GEM backends

2020-10-15 Thread Christian König
Am 15.10.20 um 14:38 schrieb Thomas Zimmermann: This patch replaces the vmap/vunmap's use of raw pointers in GEM object functions with instances of struct dma_buf_map. GEM backends are converted as well. For most of them, this simply changes the returned type. TTM-based drivers now return

Re: [PATCH v4 05/10] drm/ttm: Add vmap/vunmap to TTM and TTM GEM helpers

2020-10-15 Thread Christian König
Am 15.10.20 um 14:38 schrieb Thomas Zimmermann: The new functions ttm_bo_{vmap,vunmap}() map and unmap a TTM BO in kernel address space. The mapping's address is returned as struct dma_buf_map. Each function is a simplified version of TTM's existing kmap code. Both functions respect the memory's

Re: [PATCH v2] x86/smpboot: Don't unconditionally call memguard_guard_stack() in cpu_smpboot_alloc()

2020-10-15 Thread Andrew Cooper
On 15/10/2020 09:50, Jan Beulich wrote: > On 14.10.2020 20:47, Andrew Cooper wrote: >> cpu_smpboot_alloc() is designed to be idempotent with respect to partially >> initialised state. This occurs for S3 and CPU parking, where enough state to >> handle NMIs/#MCs needs to remain valid for the

Re: [PATCH v4 04/10] drm/exynos: Remove empty exynos_drm_gem_prime_{vmap,vunmap}()

2020-10-15 Thread Christian König
Am 15.10.20 um 14:38 schrieb Thomas Zimmermann: The functions exynos_drm_gem_prime_{vmap,vunmap}() are empty. Remove them before changing the interface to use struct drm_buf_map. As a side effect of removing drm_gem_prime_vmap(), the error code changes from ENOMEM to EOPNOTSUPP. Signed-off-by:

Re: [PATCH v4 03/10] drm/etnaviv: Remove empty etnaviv_gem_prime_vunmap()

2020-10-15 Thread Christian König
Am 15.10.20 um 14:37 schrieb Thomas Zimmermann: The function etnaviv_gem_prime_vunmap() is empty. Remove it before changing the interface to use struct drm_buf_map. Signed-off-by: Thomas Zimmermann Acked-by: Christian König --- drivers/gpu/drm/etnaviv/etnaviv_drv.h | 1 -

Re: [PATCH v4 02/10] drm/cma-helper: Remove empty drm_gem_cma_prime_vunmap()

2020-10-15 Thread Christian König
Am 15.10.20 um 14:37 schrieb Thomas Zimmermann: The function drm_gem_cma_prime_vunmap() is empty. Remove it before changing the interface to use struct drm_buf_map. Signed-off-by: Thomas Zimmermann Reviewed-by: Christian König --- drivers/gpu/drm/drm_gem_cma_helper.c | 17

Re: [PATCH v4 01/10] drm/vram-helper: Remove invariant parameters from internal kmap function

2020-10-15 Thread Christian König
Am 15.10.20 um 14:37 schrieb Thomas Zimmermann: The parameters map and is_iomem are always of the same value. Removed them to prepares the function for conversion to struct dma_buf_map. v4: * don't check for !kmap->virtual; will always be false Signed-off-by: Thomas Zimmermann

[xen-unstable-smoke test] 155842: regressions - FAIL

2020-10-15 Thread osstest service owner
flight 155842 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/155842/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 155828 Tests which

Re: [PATCH] x86/msr: fix handling of MSR_IA32_PERF_{STATUS/CTL}

2020-10-15 Thread Roger Pau Monné
On Wed, Oct 07, 2020 at 06:41:17PM +0200, Roger Pau Monné wrote: > On Wed, Oct 07, 2020 at 01:06:08PM +0100, Andrew Cooper wrote: > > On 06/10/2020 17:23, Roger Pau Monne wrote: > > > Currently a PV hardware domain can also be given control over the CPU > > > frequency, and such guest is allowed

Re: [PATCH 2/2] xen: Kconfig: nest Xen guest options

2020-10-15 Thread boris . ostrovsky
On 10/15/20 9:10 AM, Andrew Cooper wrote: > On 15/10/2020 13:37, boris.ostrov...@oracle.com wrote: >> On 10/14/20 1:53 PM, Jason Andryuk wrote: >>> +config XEN_512GB >>> + bool "Limit Xen pv-domain memory to 512GB" >>> + depends on XEN_PV && X86_64 >> Why is X86_64 needed here? >> 512G

Re: [PATCH] tools/gdbsx: drop stray recursion into tools/include/

2020-10-15 Thread Ian Jackson
Jan Beulich writes ("[PATCH] tools/gdbsx: drop stray recursion into tools/include/"): > Doing so isn't appropriate here - this gets done very early in the build > process. If the directory is mean to to be buildable on its own, > different arrangements would be needed. > > The issue has become

Re: [PATCH 2/2] xen: Kconfig: nest Xen guest options

2020-10-15 Thread Andrew Cooper
On 15/10/2020 13:37, boris.ostrov...@oracle.com wrote: > On 10/14/20 1:53 PM, Jason Andryuk wrote: >> +config XEN_512GB >> +bool "Limit Xen pv-domain memory to 512GB" >> +depends on XEN_PV && X86_64 > > Why is X86_64 needed here? >512G support was implemented using a direct-mapped P2M,

Re: xen-blkback: Scheduled work from previous purge is still busy, cannot purge list

2020-10-15 Thread Roger Pau Monné
On Thu, Oct 15, 2020 at 02:53:34PM +0200, J. Roeleveld wrote: > On Thursday, October 15, 2020 2:00:46 PM CEST Roger Pau Monné wrote: > > Please don't drop xen-devel mailing list when replying. > > My apologies, most mailing lists I am active on have a working "reply" > button. > Here I need to

[libvirt test] 155831: regressions - FAIL

2020-10-15 Thread osstest service owner
flight 155831 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/155831/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-i386-libvirt

Re: xen-blkback: Scheduled work from previous purge is still busy, cannot purge list

2020-10-15 Thread J. Roeleveld
On Thursday, October 15, 2020 2:00:46 PM CEST Roger Pau Monné wrote: > Please don't drop xen-devel mailing list when replying. My apologies, most mailing lists I am active on have a working "reply" button. Here I need to use "reply-all". > On Thu, Oct 15, 2020 at 01:28:49PM +0200, J. Roeleveld

[PATCH v4 08/10] drm/gem: Store client buffer mappings as struct dma_buf_map

2020-10-15 Thread Thomas Zimmermann
Kernel DRM clients now store their framebuffer address in an instance of struct dma_buf_map. Depending on the buffer's location, the address refers to system or I/O memory. Callers of drm_client_buffer_vmap() receive a copy of the value in the call's supplied arguments. It can be accessed and

[PATCH v4 09/10] dma-buf-map: Add memcpy and pointer-increment interfaces

2020-10-15 Thread Thomas Zimmermann
To do framebuffer updates, one needs memcpy from system memory and a pointer-increment function. Add both interfaces with documentation. Signed-off-by: Thomas Zimmermann --- include/linux/dma-buf-map.h | 72 +++-- 1 file changed, 62 insertions(+), 10 deletions(-)

Re: [PATCH 2/2] xen: Kconfig: nest Xen guest options

2020-10-15 Thread boris . ostrovsky
On 10/14/20 1:53 PM, Jason Andryuk wrote: > +config XEN_512GB > + bool "Limit Xen pv-domain memory to 512GB" > + depends on XEN_PV && X86_64 Why is X86_64 needed here? -boris

[PATCH v4 03/10] drm/etnaviv: Remove empty etnaviv_gem_prime_vunmap()

2020-10-15 Thread Thomas Zimmermann
The function etnaviv_gem_prime_vunmap() is empty. Remove it before changing the interface to use struct drm_buf_map. Signed-off-by: Thomas Zimmermann --- drivers/gpu/drm/etnaviv/etnaviv_drv.h | 1 - drivers/gpu/drm/etnaviv/etnaviv_gem.c | 1 -

  1   2   >