[xen-unstable-smoke test] 163627: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163627 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/163627/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 163474 Tests which

[xen-unstable test] 163610: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163610 xen-unstable real [real] flight 163626 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/163610/ http://logs.test-lab.xenproject.org/osstest/logs/163626/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be

DMA restriction and NUMA node number

2021-07-12 Thread Wei Chen
Hi, I am doing some NUMA testing on Xen. And I find the DMA restriction is based on NUMA node number [1]. if ( !dma_bitsize && (num_online_nodes() > 1) ) dma_bitsize = arch_get_dma_bitsize(); On Arm64, we will set dma_bitsize [2] to 0, that means we don't need to reserve DMA memory.

[xen-unstable-smoke test] 163619: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163619 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/163619/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 163474 Tests which

[PATCH] vl: Parse legacy default_machine_opts

2021-07-12 Thread Jason Andryuk
qemu can't start a xen vm after commit d8fb7d0969d5 "vl: switch -M parsing to keyval" with: $ ./qemu-system-i386 -M xenfv Unexpected error in object_property_find_err() at ../qom/object.c:1298: qemu-system-i386: Property 'xenfv-3.1-machine.accel' not found Aborted (core dumped) The

[PATCH 4/4] x86/debug: move domain_pause_for_debugger to debugger.c

2021-07-12 Thread Bobby Eshleman
The function domain_pause_for_debugger() is conditionally compiled if CONFIG_CRASH_DEBUG=y. Instead of placing an extra #ifdef inside domain.c, this commit moves domain_pause_for_debugger() into x86/debugger.c which is only built by Kbuild given CONFIG_CRASH_DEBUG=y. Signed-off-by: Bobby

[PATCH 3/4] x86/debug: move debugger_trap_entry into debugger.c not inlined

2021-07-12 Thread Bobby Eshleman
The function debugger_trap_entry() is rather large for an inlined function. This commit moves debugger_trap_entry() into debugger.c and makes it not inlined. Signed-off-by: Bobby Eshleman --- xen/arch/x86/Makefile | 1 + xen/arch/x86/debugger.c| 41

[PATCH 2/4] arm/traps: remove debugger_trap_fatal() calls

2021-07-12 Thread Bobby Eshleman
ARM doesn't actually use debugger_trap_* anything, and is stubbed out. Simply remove the calls. This also renders TRAP_invalid_op unused in any common code, so remove that definition too. Signed-off-by: Bobby Eshleman --- xen/arch/arm/traps.c | 6 -- xen/include/xen/debugger.h | 5

[PATCH 1/4] build: use common stubs for debugger_trap_* functions if !CONFIG_CRASH_DEBUG

2021-07-12 Thread Bobby Eshleman
Previously Xen required all architectures implement the debugger_trap_* functions whether or not it actually needs them. This commit makes debugger_trap* functions resolve to arch-specific function definitions if CONFIG_CRASH_DEBUG=y, but resolves to a set of common no-op stubs if

[PATCH 0/4] Remove unconditional arch dependency on asm/debugger.h

2021-07-12 Thread Bobby Eshleman
Currently, any architecture wishing to use common/ is likely to be required to implement the functions found in "asm/debugger.h". Some architectures, however, do not have an actual use for these functions and so are forced to implement stubs. This patch does the following: * Supplies common

[ovmf test] 163612: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163612 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/163612/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 12 debian-hvm-install fail REGR. vs. 162359

[PATCH v2] tools/libxc: use uint32_t for pirq in xc_domain_irq_permission

2021-07-12 Thread Igor Druzhinin
Current unit8_t for pirq argument in this interface is too restrictive causing failures on modern hardware with lots of GSIs. That extends down to XEN_DOMCTL_irq_permission ABI structure where it needs to be fixed up as well. Internal Xen structures appear to be fine. Existing users of the

Re: [PATCH v2 07/10] xsm: drop generic event channel labeling

2021-07-12 Thread Andrew Cooper
On 12/07/2021 21:32, Daniel P. Smith wrote: > The generic event channel labeling has not been used by any XSM module since > its introduction. This commit removes the capability leaving FLASK labeling > field always present. In the future if a new XSM module needs to have its own > channel label,

Re: [PATCH v2 01/10] xen: Implement xen/alternative-call.h for use in common code

2021-07-12 Thread Andrew Cooper
On 12/07/2021 21:32, Daniel P. Smith wrote: > diff --git a/xen/include/xen/alternative-call.h > b/xen/include/xen/alternative-call.h > new file mode 100644 > index 00..11d1c26068 > --- /dev/null > +++ b/xen/include/xen/alternative-call.h > @@ -0,0 +1,65 @@ > +/* SPDX-License-Identifier:

Re: [PATCH v2 04/10] xsm: convert xsm_ops hook calls to alternative call

2021-07-12 Thread Andrew Cooper
On 12/07/2021 21:32, Daniel P. Smith wrote: > To reduce retpolines convert all the pointer function calls of the > xsm_ops hooks over to the alternative_call infrastructure. > > Signed-off-by: Daniel P. Smith > --- > xen/include/xsm/xsm.h | 195 +- > 1

Re: [PATCH v2 02/10] xsm: refactor xsm_ops handling

2021-07-12 Thread Andrew Cooper
On 12/07/2021 21:32, Daniel P. Smith wrote: > diff --git a/xen/include/xsm/xsm.h b/xen/include/xsm/xsm.h > index ad3cddbf7d..a8805f514b 100644 > --- a/xen/include/xsm/xsm.h > +++ b/xen/include/xsm/xsm.h > @@ -747,16 +747,14 @@ extern int xsm_dt_policy_init(void **policy_buffer, > size_t

Re: [PATCH v2 03/10] xsm: remove the ability to disable flask

2021-07-12 Thread Andrew Cooper
On 12/07/2021 21:32, Daniel P. Smith wrote: > The flask XSM module provided the ability to switch from flask back to > the dummy XSM module during runtime. With this removal the only way to > switch between XSM modules is at boot time. > > Signed-off-by: Daniel P. Smith This patch wants

[qemu-mainline test] 163600: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163600 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/163600/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 13 guest-startfail REGR. vs. 163321

Re: [PATCH v2 00/10] xsm: refactoring xsm hooks

2021-07-12 Thread Andrew Cooper
On 12/07/2021 21:32, Daniel P. Smith wrote: > Based on feedback from 2021 Xen Developers Summit the xsm-roles RFC > patch set is being split into two separate patch sets. This is the first > patch set and is focused purely on the clean up and refactoring of the > XSM hooks. > > This patch set

[linux-linus test] 163597: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163597 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/163597/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-xsm7 xen-install fail REGR. vs. 152332

[xen-unstable-smoke test] 163614: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163614 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/163614/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 163474 Tests which

Re: [Kvmtool] Some thoughts on using kvmtool Virtio for Xen

2021-07-12 Thread Stefano Stabellini
On Fri, 9 Jul 2021, Andre Przywara wrote: > On Tue, 15 Jun 2021 07:12:08 +0100 > Wei Chen wrote: > > Hi Wei, > > > I have some thoughts of using kvmtool Virtio implementation > > for Xen. I copied my markdown file to this email. If you have > > time, could you please help me review it? > > > >

[PATCH v2 10/10] xsm: removing the XSM_ASSERT_ACTION macro

2021-07-12 Thread Daniel P. Smith
With the eliminations of default priv from all the XSM hook call sites, this renders the XSM_ASSERT_ACTION macro unneeded. This commit cleans up all the dummy hooks, removing the macro. Signed-off-by: Daniel P. Smith --- xen/xsm/dummy.h | 253 +++- 1

[PATCH v2 09/10] xsm: expand the function related macros in dummy.h

2021-07-12 Thread Daniel P. Smith
With the elimination of switching how dummy.h gets included, the function declaration macros are no longer necessary. This commit expands them out to the only value for which they will ever be set. This results in function declaration lengths changing and since some definitions did not even follow

[PATCH v2 08/10] xsm: remove xsm_default_t from hook definitions

2021-07-12 Thread Daniel P. Smith
The passing of an xsm_default_t at each of the xsm hook call sites served different functions depending on whether XSM was enabled or not. When XSM was not enabled it attempted to function as a link-time check that declared default action at the call site matched the default declared action for

[PATCH v2 07/10] xsm: drop generic event channel labeling

2021-07-12 Thread Daniel P. Smith
The generic event channel labeling has not been used by any XSM module since its introduction. This commit removes the capability leaving FLASK labeling field always present. In the future if a new XSM module needs to have its own channel label, this or a new form can be introduced. ---

[PATCH v2 06/10] xsm: enable xsm to always be included

2021-07-12 Thread Daniel P. Smith
The only difference between !CONFIG_XSM and CONFIG_XSM when SILO and FLASK are not enabled is whether the XSM hooks in dummy.h are called as static inline functions or as function pointers to static functions. As such this commit, * eliminates CONFIG_XSM * introduces CONFIG_XSM_EVTCHN_LABELING

[PATCH v2 05/10] xsm: decouple xsm header inclusion selection

2021-07-12 Thread Daniel P. Smith
Multiple preprocessor defines were used as a mechanism to selective include parts of the xsm.h header file. This makes it difficult to know which portion is being included at anyone time. This commit works to simplify this by separating the core structure and functions of XSM into xsm-core.h away

[PATCH v2 04/10] xsm: convert xsm_ops hook calls to alternative call

2021-07-12 Thread Daniel P. Smith
To reduce retpolines convert all the pointer function calls of the xsm_ops hooks over to the alternative_call infrastructure. Signed-off-by: Daniel P. Smith --- xen/include/xsm/xsm.h | 195 +- 1 file changed, 99 insertions(+), 96 deletions(-) diff --git

[PATCH v2 03/10] xsm: remove the ability to disable flask

2021-07-12 Thread Daniel P. Smith
The flask XSM module provided the ability to switch from flask back to the dummy XSM module during runtime. With this removal the only way to switch between XSM modules is at boot time. Signed-off-by: Daniel P. Smith --- xen/xsm/flask/flask_op.c | 32 1 file

[PATCH v2 02/10] xsm: refactor xsm_ops handling

2021-07-12 Thread Daniel P. Smith
This converts the global xsm_ops from being a pointer to a struct xsm_ops to being an explicit instance. It then reworks the XSM modules init function to return their xsm_ops struct which is copied in to the global xsm_ops. Signed-off-by: Daniel P. Smith --- xen/include/xsm/xsm.h| 215

[PATCH v2 00/10] xsm: refactoring xsm hooks

2021-07-12 Thread Daniel P. Smith
Based on feedback from 2021 Xen Developers Summit the xsm-roles RFC patch set is being split into two separate patch sets. This is the first patch set and is focused purely on the clean up and refactoring of the XSM hooks. This patch set refactors the xsm_ops wrapper hooks to use the

[PATCH v2 01/10] xen: Implement xen/alternative-call.h for use in common code

2021-07-12 Thread Daniel P. Smith
From: Andrew Cooper The alternative call infrastructure is x86-only for now, but the common iommu code has a variant and more common code wants to use the infrastructure. Introduce CONFIG_ALTERNATIVE_CALL and a conditional implemetnation so common code can use the optimisation when available,

Re: [RFC PATCH 2/4] xen/arm: Import ID features sanitize from linux

2021-07-12 Thread Julien Grall
Hi Bertrand, On 12/07/2021 11:50, Bertrand Marquis wrote: +#define __ARM64_FTR_BITS(SIGNED, VISIBLE, STRICT, TYPE, SHIFT, WIDTH, SAFE_VAL) \ + { \ + .sign = SIGNED, \ + .visible = VISIBLE,

Re: [RFC PATCH 3/4] xen/arm: Sanitize cpuinfo ID registers fields

2021-07-12 Thread Julien Grall
Hi Bertrand, On 12/07/2021 17:29, Bertrand Marquis wrote: On 12 Jul 2021, at 12:13, Julien Grall wrote: On 12/07/2021 12:03, Bertrand Marquis wrote: Hi Julien, Hi Bertrand, On 12 Jul 2021, at 11:16, Julien Grall wrote: Hi Bertrand, On 29/06/2021 18:08, Bertrand Marquis wrote:

[xen-unstable-smoke test] 163607: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163607 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/163607/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 163474 Tests which

Re: [PATCH 2/2] CHANGELOG: record changed PCI device quarantining default

2021-07-12 Thread Paul Durrant
On 07/07/2021 14:22, Jan Beulich wrote: This amends commit 980d6acf1517 ("IOMMU: make DMA containment of quarantined devices optional"). Signed-off-by: Jan Beulich Reviewed-by: Paul Durrant --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -10,6 +10,13 @@ The format is based on [Keep a Changelog

Re: [PATCH 1/2] IOMMU: correct parsing of "quarantine=scratch-page"

2021-07-12 Thread Paul Durrant
On 07/07/2021 14:21, Jan Beulich wrote: During the multiple renames of the sub-option I apparently forgot to update the left side of the &&, and this pretty consistently. Fixes: 980d6acf1517 ("IOMMU: make DMA containment of quarantined devices optional") Reported-by: Andrew Cooper

Re: gitlab merge request -> list patchbomb workflows

2021-07-12 Thread Stefano Stabellini
On Fri, 9 Jul 2021, Ian Jackson wrote: > Julien Grall writes ("Re: gitlab merge request -> list patchbomb workflows"): > > I have recently started to use b4 [1] to fetch patches and collect tags > > from the mailing list. I am wondering if the tools could be extended to > > also allow a quick

[ovmf test] 163598: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163598 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/163598/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 12 debian-hvm-install fail REGR. vs. 162359

Re: [XEN PATCH v6 17/31] build: convert binfile use to if_changed

2021-07-12 Thread Anthony PERARD
On Wed, Jul 07, 2021 at 05:48:57PM +0200, Jan Beulich wrote: > On 01.07.2021 16:09, Anthony PERARD wrote: > > --- a/xen/common/Makefile > > +++ b/xen/common/Makefile > > @@ -80,8 +80,12 @@ config.gz: $(CONF_FILE) > > > > config_data.o: config.gz > > > > -config_data.S:

Re: [RFC PATCH 3/4] xen/arm: Sanitize cpuinfo ID registers fields

2021-07-12 Thread Bertrand Marquis
Hi Julien, > On 12 Jul 2021, at 12:13, Julien Grall wrote: > > > > On 12/07/2021 12:03, Bertrand Marquis wrote: >> Hi Julien, > > Hi Bertrand, > >>> On 12 Jul 2021, at 11:16, Julien Grall wrote: >>> >>> Hi Bertrand, >>> >>> On 29/06/2021 18:08, Bertrand Marquis wrote: Define a

Re: [XEN PATCH v6 15/31] build: move make option changes check earlier

2021-07-12 Thread Anthony PERARD
On Wed, Jul 07, 2021 at 05:40:02PM +0200, Jan Beulich wrote: > On 01.07.2021 16:09, Anthony PERARD wrote: > > And thus avoiding checking for those variable over and over again. > > > > Signed-off-by: Anthony PERARD > > Acked-by: Jan Beulich > in its present shape since all you do is move

[xen-unstable test] 163594: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163594 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/163594/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-nested-amd 16 xen-boot/l1 fail REGR. vs. 163458 Tests which are

Re: [XEN PATCH v6 12/31] build: use subdir-y in test/Makefile

2021-07-12 Thread Anthony PERARD
On Wed, Jul 07, 2021 at 05:26:13PM +0200, Jan Beulich wrote: > On 01.07.2021 16:09, Anthony PERARD wrote: > > --- a/xen/test/Makefile > > +++ b/xen/test/Makefile > > @@ -4,15 +4,10 @@ tests all: build > > > > ifneq ($(XEN_TARGET_ARCH),x86_32) > > # Xen 32-bit x86 hypervisor no longer

Re: [XEN PATCH v6 11/31] build: fix clean targets when subdir-y is used

2021-07-12 Thread Anthony PERARD
On Wed, Jul 07, 2021 at 05:15:44PM +0200, Jan Beulich wrote: > On 01.07.2021 16:09, Anthony PERARD wrote: > > The make variable $(subdir-y) isn't used yet but will be in a > > following patch. Anything in $(subdir-y) doesn't to have a '/' as > > suffix as we already now it's a directory. > > > >

Re: [XEN PATCH v6 09/31] build: clean "lib.a"

2021-07-12 Thread Anthony PERARD
On Wed, Jul 07, 2021 at 05:03:12PM +0200, Jan Beulich wrote: > On 01.07.2021 16:09, Anthony PERARD wrote: > > Signed-off-by: Anthony PERARD > > Hmm, I was clearly under the impression (or at least assuming) > that $(targets) would be included in what gets cleaned by the > general rule.

Re: [XEN PATCH v6 07/31] build,include: rework compat-build-source.py

2021-07-12 Thread Anthony PERARD
On Wed, Jul 07, 2021 at 04:58:29PM +0200, Jan Beulich wrote: > On 01.07.2021 16:09, Anthony PERARD wrote: > > Improvement are: > > - give the path to xlat.lst as argument > > - include `grep -v` in compat-build-source.py script, we don't need to > > write this in several scripted language. > >

[xen-unstable-smoke test] 163602: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163602 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/163602/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 163474 Tests which

Re: [PATCH v15 06/12] swiotlb: Use is_swiotlb_force_bounce for swiotlb data bouncing

2021-07-12 Thread Will Deacon
On Tue, Jul 06, 2021 at 12:59:57PM -0400, Konrad Rzeszutek Wilk wrote: > On Tue, Jul 06, 2021 at 05:57:21PM +0100, Will Deacon wrote: > > On Tue, Jul 06, 2021 at 10:46:07AM -0400, Konrad Rzeszutek Wilk wrote: > > > On Tue, Jul 06, 2021 at 04:05:13PM +0200, Christoph Hellwig wrote: > > > > On Tue,

Re: [XEN PATCH v6 06/31] x86/mm: avoid building multiple .o from a single .c file

2021-07-12 Thread Anthony PERARD
On Wed, Jul 07, 2021 at 04:45:11PM +0200, Jan Beulich wrote: > On 01.07.2021 16:09, Anthony PERARD wrote: > > xen/Makefile| 11 --- > > xen/Rules.mk| 2 +- > > xen/arch/x86/mm/Makefile| 9 - > >

[PATCH 0.5/6] xen: Implement xen/alternative-call.h for use in common code

2021-07-12 Thread Andrew Cooper
The alternative call infrastructure is x86-only for now, but the common iommu code has a variant and more common code wants to use the infrastructure. Introduce CONFIG_ALTERNATIVE_CALL and a conditional implemetnation so common code can use the optimisation when available, without requiring all

Re: [RFC PATCH 3/4] xen/arm: Sanitize cpuinfo ID registers fields

2021-07-12 Thread Julien Grall
On 12/07/2021 12:03, Bertrand Marquis wrote: Hi Julien, Hi Bertrand, On 12 Jul 2021, at 11:16, Julien Grall wrote: Hi Bertrand, On 29/06/2021 18:08, Bertrand Marquis wrote: Define a sanitize_cpu function to be called on secondary cores to sanitize the cpuinfo structure from the boot

Re: [XEN PATCH v6 03/31] build: use if_changed on built_in.o

2021-07-12 Thread Anthony PERARD
On Thu, Jul 08, 2021 at 01:03:46PM +0100, Andrew Cooper wrote: > On 01/07/2021 15:09, Anthony PERARD wrote: > > diff --git a/xen/Rules.mk b/xen/Rules.mk > > index f778058f80a6..6a0cdfde2eed 100644 > > --- a/xen/Rules.mk > > +++ b/xen/Rules.mk > > @@ -147,17 +147,22 @@ include

Re: [RFC PATCH 3/4] xen/arm: Sanitize cpuinfo ID registers fields

2021-07-12 Thread Bertrand Marquis
Hi Julien, > On 12 Jul 2021, at 11:16, Julien Grall wrote: > > Hi Bertrand, > > On 29/06/2021 18:08, Bertrand Marquis wrote: >> Define a sanitize_cpu function to be called on secondary cores to >> sanitize the cpuinfo structure from the boot CPU. >> The safest value is taken when possible and

Re: [XEN PATCH v6 05/31] build: factorise generation of the linker scripts

2021-07-12 Thread Anthony PERARD
On Wed, Jul 07, 2021 at 04:25:33PM +0200, Jan Beulich wrote: > On 01.07.2021 16:09, Anthony PERARD wrote: > > In Arm and X86 makefile, generating the linker script is the same, so > > we can simply have both call the same macro. > > > > We need to add *.lds files into extra-y so that Rules.mk can

Re: [XEN PATCH v6 02/31] build: introduce cpp_flags macro

2021-07-12 Thread Anthony PERARD
On Wed, Jul 07, 2021 at 04:18:18PM +0200, Jan Beulich wrote: > On 01.07.2021 16:09, Anthony PERARD wrote: > > xen/Rules.mk| 7 +-- > > xen/arch/x86/mm/Makefile| 2 +- > > xen/arch/x86/mm/hap/Makefile| 2 +- > > xen/arch/x86/mm/shadow/Makefile | 2 +- > > 4

Re: [RFC PATCH 2/4] xen/arm: Import ID features sanitize from linux

2021-07-12 Thread Bertrand Marquis
Hi Julien, > On 12 Jul 2021, at 10:36, Julien Grall wrote: > > > > On 29/06/2021 18:08, Bertrand Marquis wrote: >> Import structures declared in Linux file arch/arm64/kernel/cpufeature.c >> and import the required types. >> Current code has been imported from Linux 5.13-rc5 (Commit ID >>

Re: [RFC PATCH 3/4] xen/arm: Sanitize cpuinfo ID registers fields

2021-07-12 Thread Julien Grall
Hi Bertrand, On 29/06/2021 18:08, Bertrand Marquis wrote: Define a sanitize_cpu function to be called on secondary cores to sanitize the cpuinfo structure from the boot CPU. The safest value is taken when possible and the system is marked tainted if we encounter values which are incompatible

[xen-unstable-smoke test] 163595: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163595 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/163595/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 163474 Tests which

Re: [RFC PATCH V3 08/11] swiotlb: Add bounce buffer remap address setting function

2021-07-12 Thread Tianyu Lan
Hi Christoph and Robin: I introduced new interface set_memory_decrypted_map() to hide all the hypervisor code behind it in the latest version. In current generic code, only swiotlb bounce buffer needs to be decrypted and remapped in the same time and so keep set_memory_decrypted(). If there

Re: [RFC PATCH 2/4] xen/arm: Import ID features sanitize from linux

2021-07-12 Thread Julien Grall
On 29/06/2021 18:08, Bertrand Marquis wrote: Import structures declared in Linux file arch/arm64/kernel/cpufeature.c and import the required types. Current code has been imported from Linux 5.13-rc5 (Commit ID cd1245d75ce93b8fd206f4b34eb58bcfe156d5e9) Those structure will be used to sanitize

[qemu-mainline test] 163577: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163577 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/163577/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-qemuu-freebsd11-amd64 13 guest-startfail REGR. vs. 163321

Re: [PATCH] tools/libxc: use uint32_t for pirq in xc_domain_irq_permission

2021-07-12 Thread Julien Grall
Hi Igor, On 08/07/2021 03:06, Igor Druzhinin wrote: On 07/07/2021 14:21, Julien Grall wrote: On 07/07/2021 14:14, Jan Beulich wrote: On 07.07.2021 14:59, Julien Grall wrote: On 07/07/2021 13:54, Jan Beulich wrote: On 07.07.2021 14:51, Julien Grall wrote: On 07/07/2021 02:02, Igor Druzhinin

[PATCH v3] xen/arm64: Remove READ/WRITE_SYSREG32 helper macros

2021-07-12 Thread Michal Orzel
AArch64 system registers are 64bit whereas AArch32 ones are 32bit or 64bit. MSR/MRS are expecting 64bit values thus we should get rid of helpers READ/WRITE_SYSREG32 in favour of using READ/WRITE_SYSREG. The last place in code making use of READ/WRITE_SYSREG32 on arm64 is in TVM_REG macro defining

[ovmf test] 163585: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163585 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/163585/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 12 debian-hvm-install fail REGR. vs. 162359

Re: [PATCH v2] xen/arm64: Remove READ/WRITE_SYSREG32 helper macros

2021-07-12 Thread Michal Orzel
On 12.07.2021 10:33, Julien Grall wrote: > > > On 12/07/2021 07:26, Michal Orzel wrote: >> Hi Julien, > > Hi Michal, > >> On 09.07.2021 17:21, Julien Grall wrote: >>> Hi Michal, >>> >>> On 09/07/2021 13:40, Michal Orzel wrote: AArch64 system registers are 64bit whereas AArch32 ones

Re: [PATCH v2 1/2] tools/xenstore: set oom score for xenstore daemon on Linux

2021-07-12 Thread Julien Grall
Hi Juergen, On 09/07/2021 13:34, Juergen Gross wrote: On 08.07.21 19:40, Julien Grall wrote: Hi Juergen, On 08/06/2021 06:58, Juergen Gross wrote: Xenstored is absolutely mandatory for a Xen host and it can't be restarted, so being killed by OOM-killer in case of memory shortage is to be

Re: [PATCH v2] xen/arm64: Remove READ/WRITE_SYSREG32 helper macros

2021-07-12 Thread Julien Grall
On 12/07/2021 07:26, Michal Orzel wrote: Hi Julien, Hi Michal, On 09.07.2021 17:21, Julien Grall wrote: Hi Michal, On 09/07/2021 13:40, Michal Orzel wrote: AArch64 system registers are 64bit whereas AArch32 ones are 32bit or 64bit. MSR/MRS are expecting 64bit values thus we should get

[linux-linus test] 163573: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163573 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/163573/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-xsm7 xen-install fail REGR. vs. 152332

[libvirt test] 163588: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163588 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/163588/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-armhf-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-amd64-libvirt

[xen-unstable test] 163568: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163568 xen-unstable real [real] flight 163591 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/163568/ http://logs.test-lab.xenproject.org/osstest/logs/163591/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be

Re: [PATCH v2] xen/arm64: Remove READ/WRITE_SYSREG32 helper macros

2021-07-12 Thread Michal Orzel
Hi Julien, On 09.07.2021 17:21, Julien Grall wrote: > Hi Michal, > > On 09/07/2021 13:40, Michal Orzel wrote: >> AArch64 system registers are 64bit whereas AArch32 ones >> are 32bit or 64bit. MSR/MRS are expecting 64bit values thus >> we should get rid of helpers READ/WRITE_SYSREG32 >> in favour

[xen-unstable-smoke test] 163586: regressions - FAIL

2021-07-12 Thread osstest service owner
flight 163586 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/163586/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64 6 xen-buildfail REGR. vs. 163474 Tests which