[Xen-devel] [libvirt test] 146616: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146616 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/146616/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 146182 build-i386-libvirt

[Xen-devel] [qemu-mainline test] 146613: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146613 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/146613/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 144861 build-arm64

[Xen-devel] [ovmf test] 146610: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146610 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/146610/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 145767

[Xen-devel] [linux-5.4 test] 146603: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146603 linux-5.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/146603/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 146121

Re: [Xen-devel] Xen clocksource and PV shim

2020-01-30 Thread Igor Druzhinin
On 30/01/2020 23:14, Igor Druzhinin wrote: > I was debugging constant freezes of PV shim on AMD hardware > after going out of a long suspend. As it turned out the root cause > of this is platform time jumping forward to the amount of time > spent in suspended state. On Intel this issue is papered

[Xen-devel] [qemu-mainline test] 146608: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146608 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/146608/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 144861 build-arm64

[Xen-devel] [xen-unstable test] 146600: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146600 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/146600/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-pvhv2-amd 7 xen-bootfail REGR. vs. 146563

[Xen-devel] [ovmf test] 146601: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146601 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/146601/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 145767

[Xen-devel] Xen clocksource and PV shim

2020-01-30 Thread Igor Druzhinin
I was debugging constant freezes of PV shim on AMD hardware after going out of a long suspend. As it turned out the root cause of this is platform time jumping forward to the amount of time spent in suspended state. On Intel this issue is papered over by CONSTANT_TSC being set which avoids CPU

[Xen-devel] [qemu-mainline test] 146602: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146602 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/146602/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 144861 build-arm64

[Xen-devel] [xen-unstable-smoke test] 146604: tolerable all pass - PUSHED

2020-01-30 Thread osstest service owner
flight 146604 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/146604/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: [Xen-devel] [XEN PATCH v2 05/12] xen/include: remove include of Config.mk

2020-01-30 Thread Anthony PERARD
On Wed, Jan 29, 2020 at 04:33:02PM +0100, Jan Beulich wrote: > On 29.01.2020 16:28, Jan Beulich wrote: > > On 17.01.2020 11:53, Anthony PERARD wrote: > >> It isn't necessary to include Config.mk here because this Makefile is > >> only used by xen/Rules.mk which already includes Config.mk. > > > >

Re: [Xen-devel] [PATCH v4 7/7] xl: allow domid to be preserved on save/restore or migrate

2020-01-30 Thread Andrew Cooper
On 30/01/2020 17:42, Durrant, Paul wrote: >> -Original Message- >> From: Ian Jackson >> Sent: 30 January 2020 17:29 >> To: Durrant, Paul >> Cc: xen-devel@lists.xenproject.org; Wei Liu ; Anthony Perard >> >> Subject: Re: [PATCH v4 7/7] xl: allow domid to be preserved on >> save/restore

Re: [Xen-devel] [XEN PATCH v2 04/12] xen/build: extract clean target from Rules.mk

2020-01-30 Thread Anthony PERARD
On Wed, Jan 29, 2020 at 03:30:19PM +0100, Jan Beulich wrote: > On 17.01.2020 11:53, Anthony PERARD wrote: > > From: Anthony PERARD > > > > Most of the code executed by Rules.mk isn't necessary for the clean > > target, especially not the CFLAGS. This make running make clean much > > faster. > >

Re: [Xen-devel] [PATCH v4 1/7] libxl: add definition of INVALID_DOMID to the API

2020-01-30 Thread Ian Jackson
> > Hi. (I'm replying to the 1/ here because I don't seem to have any 0/ > > in my inbox...) > > Oh, I must have forgot to copy the combined cc list onto the cover letter. > Sorry about that. There's a bug in git-send-email in this area. > Don't worry, your feedback is fine... certainly not

Re: [Xen-devel] [PATCH] x86/HVM: avoid truncation of PM timer I/O port range version

2020-01-30 Thread Andrew Cooper
On 30/01/2020 16:56, Wei Liu wrote: > On Thu, Jan 30, 2020 at 05:47:03PM +0100, Jan Beulich wrote: >> Don't silently ignore the upper 32 bits. >> >> Signed-off-by: Jan Beulich > Reviewed-by: Wei Liu Acked-by: Andrew Cooper ___ Xen-devel mailing list

Re: [Xen-devel] [PATCH v4 7/7] xl: allow domid to be preserved on save/restore or migrate

2020-01-30 Thread Durrant, Paul
> -Original Message- > From: Ian Jackson > Sent: 30 January 2020 17:29 > To: Durrant, Paul > Cc: xen-devel@lists.xenproject.org; Wei Liu ; Anthony Perard > > Subject: Re: [PATCH v4 7/7] xl: allow domid to be preserved on > save/restore or migrate > > Paul Durrant writes ("[PATCH v4

Re: [Xen-devel] [PATCH v4 1/7] libxl: add definition of INVALID_DOMID to the API

2020-01-30 Thread Durrant, Paul
> -Original Message- > From: Xen-devel On Behalf Of Ian > Jackson > Sent: 30 January 2020 17:32 > To: Durrant, Paul > Cc: Anthony Perard ; xen- > de...@lists.xenproject.org; Wei Liu > Subject: Re: [Xen-devel] [PATCH v4 1/7] libxl: add definition of > INVALID_DOMID to the API > > Paul

Re: [Xen-devel] [PATCH v4 5/7] libxl: allow creation of domains with a specified or random domid

2020-01-30 Thread Durrant, Paul
> -Original Message- > From: Ian Jackson > Sent: 30 January 2020 17:26 > To: Durrant, Paul > Cc: xen-devel@lists.xenproject.org; Wei Liu ; Anthony Perard > ; Andrew Cooper ; > George Dunlap ; Jan Beulich ; > Julien Grall ; Konrad Rzeszutek Wilk > ; Stefano Stabellini ; > Jason Andryuk >

Re: [Xen-devel] [PATCH v4 1/7] libxl: add definition of INVALID_DOMID to the API

2020-01-30 Thread Ian Jackson
Paul Durrant writes ("[PATCH v4 1/7] libxl: add definition of INVALID_DOMID to the API"): > Currently both xl and libxl have internal definitions of INVALID_DOMID > which happen to be identical. However, for the purposes of describing the > behaviour of libxl_domain_create_new/restore() it is

Re: [Xen-devel] [PATCH v4 7/7] xl: allow domid to be preserved on save/restore or migrate

2020-01-30 Thread Ian Jackson
Paul Durrant writes ("[PATCH v4 7/7] xl: allow domid to be preserved on save/restore or migrate"): > This patch adds a '-D' command line option to save and migrate to allow > the domain id to be incorporated into the saved domain configuration and > hence be preserved. Thanks. In response to v3

Re: [Xen-devel] [PATCH v4 5/7] libxl: allow creation of domains with a specified or random domid

2020-01-30 Thread Ian Jackson
Paul Durrant writes ("[PATCH v4 5/7] libxl: allow creation of domains with a specified or random domid"): > This patch adds a 'domid' field to libxl_domain_create_info and then > modifies libxl__domain_make() to have Xen use that value if it is valid. > If the domid value is invalid then Xen will

Re: [Xen-devel] [PATCH v4 4/7] libxl: add infrastructure to track and query 'recent' domids

2020-01-30 Thread Ian Jackson
Paul Durrant writes ("[PATCH v4 4/7] libxl: add infrastructure to track and query 'recent' domids"): > A domid is considered recent if the domain it represents was destroyed > less than a specified number of seconds ago. The number can be set using > the environment variable

Re: [Xen-devel] [PATCH v4 3/7] libxl: generalise libxl__domain_userdata_lock()

2020-01-30 Thread Ian Jackson
Paul Durrant writes ("[PATCH v4 3/7] libxl: generalise libxl__domain_userdata_lock()"): > This function implements a file-based lock with a file name generated > from a domid. > > This patch splits it into two, generalising the core of the locking code > into a new libxl__lock_file() function

Re: [Xen-devel] [PATCH] x86/HVM: avoid truncation of PM timer I/O port range version

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 05:47:03PM +0100, Jan Beulich wrote: > Don't silently ignore the upper 32 bits. > > Signed-off-by: Jan Beulich Reviewed-by: Wei Liu ___ Xen-devel mailing list Xen-devel@lists.xenproject.org

Re: [Xen-devel] [XEN PATCH v2 02/12] xen/build: Use obj-y += subdir/ instead of subdir-y

2020-01-30 Thread Anthony PERARD
On Wed, Jan 29, 2020 at 03:19:05PM +0100, Jan Beulich wrote: > On 17.01.2020 11:53, Anthony PERARD wrote: > > +# Handle objects in subdirs > > +# > > --- > > +# o if we encounter foo/ in $(obj-y), replace it by foo/built_in.o

Re: [Xen-devel] FAILED/MISSING cstate/cpufreq/cpupower support with Xen 4.13 + kernel 5.4.14; withOUT xen/hypervisor, WORKS. bug or config?

2020-01-30 Thread Jan Beulich
On 30.01.2020 17:45, PGNet Dev wrote: >> I'd like to request you adding the dom0 kernel boot parameters, too: >> debug initcall_debug > > added > > with current config, > > [config.1] > options=dom0_max_vcpus=4 dom0_mem=4016M,max:4096M console_to_ring > conring_size=20480k

Re: [Xen-devel] [PATCH v6 00/11] error: auto propagated local_err part I

2020-01-30 Thread Markus Armbruster
Vladimir Sementsov-Ogievskiy writes: > Markus, what about this? Should I respin? I still haven't looked at this, must be frustrating for you, sorry! I've been under water ever since my Christmas vacation... If you rather want me to look at a v7 that addresses the review comments from others,

[Xen-devel] [PATCH] x86/HVM: avoid truncation of PM timer I/O port range version

2020-01-30 Thread Jan Beulich
Don't silently ignore the upper 32 bits. Signed-off-by: Jan Beulich --- a/xen/arch/x86/hvm/pmtimer.c +++ b/xen/arch/x86/hvm/pmtimer.c @@ -313,9 +313,9 @@ static int acpi_load(struct domain *d, h HVM_REGISTER_SAVE_RESTORE(PMTIMER, acpi_save, acpi_load, 1,

Re: [Xen-devel] [PATCH] x86: fold linker script pre-processing rules

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 03:44:53PM +0100, Jan Beulich wrote: > There's no need to have twice almost the same rule. Simply add the extra > -DEFI to AFLAGS for the EFI variant, and specify both targets for the > then single rule. > > Signed-off-by: Jan Beulich Reviewed-by: Wei Liu

Re: [Xen-devel] HVM Driver Domain

2020-01-30 Thread tosher 1
> 'xl devd' should add the backend interfaces (vifX.Y) to the bridge if > properly configured, as it should be calling the hotplug scripts to do that. Yes, running ' xl devd' in the driver domain before launching the DomU, solved the bridge issue. Thanks a lot. So, for the people who end up

Re: [Xen-devel] [PATCH v8 2/4] add a domain_tot_pages() helper function

2020-01-30 Thread Jan Beulich
On 30.01.2020 17:32, Durrant, Paul wrote: >> -Original Message- >> From: Jan Beulich >> Sent: 30 January 2020 16:29 >> To: Durrant, Paul >> Cc: xen-devel@lists.xenproject.org; Andrew Cooper >> ; Wei Liu ; Roger Pau Monné >> ; George Dunlap ; Ian >> Jackson ; Julien Grall ; Konrad >>

Re: [Xen-devel] [PATCH v8 2/4] add a domain_tot_pages() helper function

2020-01-30 Thread Durrant, Paul
> -Original Message- > From: Jan Beulich > Sent: 30 January 2020 16:29 > To: Durrant, Paul > Cc: xen-devel@lists.xenproject.org; Andrew Cooper > ; Wei Liu ; Roger Pau Monné > ; George Dunlap ; Ian > Jackson ; Julien Grall ; Konrad > Rzeszutek Wilk ; Stefano Stabellini > ; Tim Deegan >

Re: [Xen-devel] [PATCH v8 2/4] add a domain_tot_pages() helper function

2020-01-30 Thread Jan Beulich
On 30.01.2020 15:57, Paul Durrant wrote: > --- a/xen/arch/x86/domain.c > +++ b/xen/arch/x86/domain.c > @@ -218,7 +218,7 @@ void dump_pageframe_info(struct domain *d) > > printk("Memory pages belonging to domain %u:\n", d->domain_id); > > -if ( d->tot_pages >= 10 && d->is_dying <

[Xen-devel] [qemu-mainline test] 146598: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146598 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/146598/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 144861 build-arm64

Re: [Xen-devel] [PATCH v8 3/4] mm: make pages allocated with MEMF_no_refcount safe to assign

2020-01-30 Thread Jan Beulich
On 30.01.2020 15:57, Paul Durrant wrote: > Currently it is unsafe to assign a domheap page allocated with > MEMF_no_refcount to a domain because the domain't 'tot_pages' will not > be incremented, but will be decrement when the page is freed (since > free_domheap_pages() has no way of telling that

[Xen-devel] [RFC PATCH v3 02/22] x86/boot: Reserve live update boot memory

2020-01-30 Thread David Woodhouse
From: David Woodhouse For live update to work, it will need a region of memory that can be given to the boot allocator while it parses the state information from the previous Xen and works out which of the other pages of memory it can consume. Reserve that like the crashdump region, and accept

[Xen-devel] [RFC PATCH v3 20/22] x86/setup: lift dom0 creation out into create_dom0 function

2020-01-30 Thread David Woodhouse
From: David Woodhouse It's about to become optional as __start_xen() grows a different path for live update, so move it out of the way. Signed-off-by: David Woodhouse --- xen/arch/x86/setup.c | 173 +++ 1 file changed, 94 insertions(+), 79 deletions(-)

[Xen-devel] [RFC PATCH v3 11/22] xen/vmap: allow vm_init_type to be called during early_boot

2020-01-30 Thread David Woodhouse
From: Wei Liu We want to move vm_init, which calls vm_init_type under the hood, to early boot stage. Add a path to get page from boot allocator instead. Add an emacs block to that file while I was there. Signed-off-by: Wei Liu --- xen/common/vmap.c | 22 +++--- 1 file

[Xen-devel] [RFC PATCH v3 17/22] Add lu_stream_{open, close, append}_record()

2020-01-30 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- xen/common/lu/stream.c | 50 ++ xen/include/xen/lu.h | 5 + 2 files changed, 55 insertions(+) diff --git a/xen/common/lu/stream.c b/xen/common/lu/stream.c index 8c44a4eb37..2ee870e80a

[Xen-devel] [RFC PATCH v3 16/22] Migrate migration stream definitions into Xen public headers

2020-01-30 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- tools/libxc/xc_sr_common.c| 20 ++-- tools/libxc/xc_sr_common_x86.c| 4 +- tools/libxc/xc_sr_restore.c | 2 +- tools/libxc/xc_sr_restore_x86_hvm.c | 4 +- tools/libxc/xc_sr_restore_x86_pv.c| 8

[Xen-devel] [RFC PATCH v3 08/22] Add kimage_add_live_update_data()

2020-01-30 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- xen/common/kimage.c | 34 ++ xen/include/xen/kimage.h | 3 +++ xen/include/xen/lu.h | 3 +++ 3 files changed, 40 insertions(+) diff --git a/xen/common/kimage.c b/xen/common/kimage.c index

[Xen-devel] [RFC PATCH v3 05/22] Add KEXEC_TYPE_LIVE_UPDATE

2020-01-30 Thread David Woodhouse
From: David Woodhouse This is identical to the default case... for now. Signed-off-by: David Woodhouse --- xen/common/kexec.c | 18 ++ xen/include/public/kexec.h | 12 2 files changed, 26 insertions(+), 4 deletions(-) diff --git a/xen/common/kexec.c

[Xen-devel] [RFC PATCH v3 19/22] Add shell of lu_reserve_pages()

2020-01-30 Thread David Woodhouse
From: David Woodhouse This currently only iterates over the records and prints the version of Xen that we're live updating from. In the fullness of time, it will also reserve the pages passed over as M2P as well as the pages belonging to preserved domains. Signed-off-by: David Woodhouse ---

[Xen-devel] [RFC PATCH v3 09/22] Add basic lu_save_all() shell

2020-01-30 Thread David Woodhouse
From: David Woodhouse --- xen/common/kexec.c | 6 + xen/common/lu/Makefile | 2 +- xen/common/lu/save.c | 56 ++ xen/include/xen/lu.h | 3 +++ 4 files changed, 66 insertions(+), 1 deletion(-) create mode 100644 xen/common/lu/save.c diff

[Xen-devel] [RFC PATCH v3 21/22] x86/setup: finish plumbing in live update path through __start_xen()

2020-01-30 Thread David Woodhouse
From: David Woodhouse With this we are fairly much done hacking up __start_xen() to support live update. The live update functions themselves are still stubs, but now we can start populating those with actual save/restore of domain information. Signed-off-by: David Woodhouse ---

[Xen-devel] [RFC PATCH v3 07/22] Add basic live update stream creation

2020-01-30 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- xen/common/Makefile| 1 + xen/common/lu/Makefile | 1 + xen/common/lu/stream.c | 135 + xen/include/xen/lu.h | 29 + 4 files changed, 166 insertions(+) create mode 100644

[Xen-devel] [RFC PATCH v3 12/22] xen/vmap: allow vmap() to be called during early boot

2020-01-30 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- xen/common/vmap.c | 23 +-- 1 file changed, 17 insertions(+), 6 deletions(-) diff --git a/xen/common/vmap.c b/xen/common/vmap.c index 37922f735b..8343460794 100644 --- a/xen/common/vmap.c +++ b/xen/common/vmap.c @@

[Xen-devel] [RFC PATCH v3 13/22] x86/setup: move vm_init() before end_boot_allocator()

2020-01-30 Thread David Woodhouse
From: David Woodhouse We would like to be able to use vmap() to map the live update data, and we need to do a first pass of the live update data before we prime the heap because we need to know which pages need to be preserved. Signed-off-by: David Woodhouse --- xen/arch/x86/setup.c | 8

[Xen-devel] [RFC PATCH v3 06/22] Add IND_WRITE64 primitive to kexec kimage

2020-01-30 Thread David Woodhouse
From: David Woodhouse This allows a single page-aligned physical address to be written to the current destination, intended to pass the location of the live update data stream from one Xen to the next. Signed-off-by: David Woodhouse --- xen/arch/x86/x86_64/kexec_reloc.S | 9 -

[Xen-devel] [RFC PATCH v3 18/22] Add LU_VERSION and LU_END records to live update stream

2020-01-30 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- xen/common/lu/save.c | 13 - xen/include/public/migration_stream.h | 9 + 2 files changed, 21 insertions(+), 1 deletion(-) diff --git a/xen/common/lu/save.c b/xen/common/lu/save.c index

[Xen-devel] [RFC PATCH v3 10/22] Don't add bad pages above HYPERVISOR_VIRT_END to the domheap

2020-01-30 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- xen/common/page_alloc.c | 83 +++-- 1 file changed, 80 insertions(+), 3 deletions(-) diff --git a/xen/common/page_alloc.c b/xen/common/page_alloc.c index a74bf02559..4ada4412dd 100644 ---

[Xen-devel] [RFC PATCH v3 04/22] Add KEXEC_RANGE_MA_LIVEUPDATE

2020-01-30 Thread David Woodhouse
From: David Woodhouse This allows kexec userspace to tell the next Xen where the range is, on its command line. Signed-off-by: David Woodhouse --- xen/arch/x86/machine_kexec.c | 13 ++--- xen/include/public/kexec.h | 1 + 2 files changed, 11 insertions(+), 3 deletions(-) diff

[Xen-devel] [RFC PATCH v3 01/22] x86/setup: Don't skip 2MiB underneath relocated Xen image

2020-01-30 Thread David Woodhouse
From: David Woodhouse Set 'e' correctly to reflect the location that Xen is actually relocated to from its default 2MiB location. Not 2MiB below that. This is only vaguely a bug fix. The "missing" 2MiB would have been used in the end, and fed to the allocator. It's just that other things don't

[Xen-devel] [RFC PATCH v3 22/22] x86/setup: simplify handling of initrdidx when no initrd present

2020-01-30 Thread David Woodhouse
From: David Woodhouse Remove a ternary operator that made my brain hurt and replace it with something simpler that makes it clearer that the >= mbi->mods_count is because of what find_first_bit() returns when it doesn't find anything. Just have a simple condition to set initrdidx to zero in that

[Xen-devel] [RFC PATCH v3 14/22] Detect live update breadcrumb at boot and map data stream

2020-01-30 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- xen/arch/x86/setup.c | 35 +-- xen/common/lu/stream.c | 34 ++ xen/include/xen/lu.h | 2 ++ 3 files changed, 69 insertions(+), 2 deletions(-) diff --git

[Xen-devel] [RFC PATCH v3 15/22] Start documenting the live update handover

2020-01-30 Thread David Woodhouse
From: David Woodhouse Signed-off-by: David Woodhouse --- docs/specs/libxc-migration-stream.pandoc | 19 +- docs/specs/live-update-handover.pandoc | 371 +++ 2 files changed, 388 insertions(+), 2 deletions(-) create mode 100644 docs/specs/live-update-handover.pandoc

[Xen-devel] [linux-5.4 test] 146588: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146588 linux-5.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/146588/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 146121

[Xen-devel] [RFC PATCH v3 03/22] Reserve live update memory regions

2020-01-30 Thread David Woodhouse
From: David Woodhouse The live update handover requires that a region of memory be reserved for the new Xen to use in its boot allocator. The original Xen may use that memory but not for any pages which are mapped to domains, or which would need to be preserved across the live update for any

[Xen-devel] [RFC PATCH v3 0/22] Live update: boot memory management, data stream handling, record format

2020-01-30 Thread David Woodhouse
Now with added documentation: http://david.woodhou.se/live-update-handover.pdf v1: Reserve a contiguous region of memory which can be safely used by the boot allocator in the new Xen, before the live update data stream has been processed and thus before the locations of all the other pages

Re: [Xen-devel] [PATCH v5 08/12] x86/hyperv: provide Hyper-V hypercall functions

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 04:25:44PM +0100, Roger Pau Monné wrote: > On Thu, Jan 30, 2020 at 03:03:03PM +, Wei Liu wrote: > > On Thu, Jan 30, 2020 at 03:47:04PM +0100, Roger Pau Monné wrote: > > > On Thu, Jan 30, 2020 at 02:25:26PM +, Wei Liu wrote: > > > > On Thu, Jan 30, 2020 at 03:22:01PM

Re: [Xen-devel] [Minios-devel] Lars Kurth

2020-01-30 Thread Simon Kuenzer
I am deeply shocked by the news. I would like to express my deepest condolences to Lars' family and friends. Lars has always been a very open-minded and supportive person. He was definitely a big win for the Xen Project and its community. I feel honored to have had the chance to work with him.

Re: [Xen-devel] [xen-unstable test] 146578: regressions - FAIL

2020-01-30 Thread Jan Beulich
On 30.01.2020 10:18, Roger Pau Monné wrote: > On Thu, Jan 30, 2020 at 10:12:39AM +0100, Jan Beulich wrote: >> On 30.01.2020 04:56, osstest service owner wrote: >>> flight 146578 xen-unstable real [real] >>> http://logs.test-lab.xenproject.org/osstest/logs/146578/ >>> >>> Regressions :-( >>> >>>

Re: [Xen-devel] [PATCH v5 08/12] x86/hyperv: provide Hyper-V hypercall functions

2020-01-30 Thread Roger Pau Monné
On Thu, Jan 30, 2020 at 03:03:03PM +, Wei Liu wrote: > On Thu, Jan 30, 2020 at 03:47:04PM +0100, Roger Pau Monné wrote: > > On Thu, Jan 30, 2020 at 02:25:26PM +, Wei Liu wrote: > > > On Thu, Jan 30, 2020 at 03:22:01PM +0100, Roger Pau Monné wrote: > > > > On Thu, Jan 30, 2020 at 12:39:20PM

[Xen-devel] [ovmf test] 146589: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146589 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/146589/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-xl-qemuu-ovmf-amd64 10 debian-hvm-install fail REGR. vs. 145767

Re: [Xen-devel] [PATCH] x86: fold linker script pre-processing rules

2020-01-30 Thread Jan Beulich
On 30.01.2020 15:47, Andrew Cooper wrote: > On 30/01/2020 14:44, Jan Beulich wrote: >> There's no need to have twice almost the same rule. Simply add the extra >> -DEFI to AFLAGS for the EFI variant, and specify both targets for the >> then single rule. >> >> Signed-off-by: Jan Beulich >> >> ---

[Xen-devel] [xen-unstable test] 146584: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146584 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/146584/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-i386-libvirt-qemuu-debianhvm-amd64-xsm 17 guest-start.2 fail REGR. vs. 146563

Re: [Xen-devel] [PATCH] iommu/arm: Don't allow the same micro-TLB to be shared between domains

2020-01-30 Thread Volodymyr Babchuk
Volodymyr Babchuk writes: Oleksandr, [...] >> diff --git a/xen/drivers/passthrough/arm/ipmmu-vmsa.c >> b/xen/drivers/passthrough/arm/ipmmu-vmsa.c >> index c21d2d7..411fc0f 100644 >> --- a/xen/drivers/passthrough/arm/ipmmu-vmsa.c >> +++ b/xen/drivers/passthrough/arm/ipmmu-vmsa.c >> @@ -702,7

[Xen-devel] [xen-unstable-smoke test] 146597: tolerable all pass - PUSHED

2020-01-30 Thread osstest service owner
flight 146597 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/146597/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: [Xen-devel] [PATCH] iommu/arm: Don't allow the same micro-TLB to be shared between domains

2020-01-30 Thread Volodymyr Babchuk
Hi Oleksandr, Oleksandr writes: [...] >>> + >>> +/* >>> + * We need to prevent the use cases where devices which use the same >>> + * micro-TLB are assigned to different Xen domains (micro-TLB cannot be >>> + * shared between multiple Xen domains, since it points to the context

Re: [Xen-devel] [PATCH v5 08/12] x86/hyperv: provide Hyper-V hypercall functions

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 03:47:04PM +0100, Roger Pau Monné wrote: > On Thu, Jan 30, 2020 at 02:25:26PM +, Wei Liu wrote: > > On Thu, Jan 30, 2020 at 03:22:01PM +0100, Roger Pau Monné wrote: > > > On Thu, Jan 30, 2020 at 12:39:20PM +, Wei Liu wrote: > > > > On Thu, Jan 30, 2020 at 01:32:26PM

[Xen-devel] [PATCH v8 0/4] purge free_shared_domheap_page()

2020-01-30 Thread Paul Durrant
Paul Durrant (4): x86 / vmx: move teardown from domain_destroy()... add a domain_tot_pages() helper function mm: make pages allocated with MEMF_no_refcount safe to assign x86 / vmx: use a MEMF_no_refcount domheap page for APIC_DEFAULT_PHYS_BASE xen/arch/x86/domain.c | 2 +-

[Xen-devel] [PATCH v8 4/4] x86 / vmx: use a MEMF_no_refcount domheap page for APIC_DEFAULT_PHYS_BASE

2020-01-30 Thread Paul Durrant
vmx_alloc_vlapic_mapping() currently contains some very odd looking code that allocates a MEMF_no_owner domheap page and then shares with the guest as if it were a xenheap page. This then requires vmx_free_vlapic_mapping() to call a special function in the mm code: free_shared_domheap_page(). By

[Xen-devel] [PATCH v8 3/4] mm: make pages allocated with MEMF_no_refcount safe to assign

2020-01-30 Thread Paul Durrant
Currently it is unsafe to assign a domheap page allocated with MEMF_no_refcount to a domain because the domain't 'tot_pages' will not be incremented, but will be decrement when the page is freed (since free_domheap_pages() has no way of telling that the increment was skipped). This patch

[Xen-devel] [PATCH v8 1/4] x86 / vmx: move teardown from domain_destroy()...

2020-01-30 Thread Paul Durrant
... to domain_relinquish_resources(). The teardown code frees the APICv page. This does not need to be done late so do it in domain_relinquish_resources() rather than domain_destroy(). Signed-off-by: Paul Durrant --- Cc: Jun Nakajima Cc: Kevin Tian Cc: Jan Beulich Cc: Andrew Cooper Cc: Wei

[Xen-devel] [PATCH v8 2/4] add a domain_tot_pages() helper function

2020-01-30 Thread Paul Durrant
This patch adds a new domain_tot_pages() inline helper function into sched.h, which will be needed by a subsequent patch. No functional change. NOTE: While modifying the comment for 'tot_pages' in sched.h this patch makes some cosmetic fixes to surrounding comments. Suggested-by: Jan

[Xen-devel] Lars Kurth

2020-01-30 Thread Ian Jackson
I'm very sad to inform you that Lars Kurth passed away earlier this week. Many of us regarded Lars as a personal friend, and his loss is a great loss to the Xen Project. We plan to have a tribute to Lars on the XenProject blog in the near future. Those who are attending FOSDEM may wish to

[Xen-devel] [qemu-mainline test] 146595: regressions - FAIL

2020-01-30 Thread osstest service owner
flight 146595 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/146595/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-arm64-xsm 6 xen-buildfail REGR. vs. 144861 build-arm64

Re: [Xen-devel] [PATCH] x86: fold linker script pre-processing rules

2020-01-30 Thread Andrew Cooper
On 30/01/2020 14:44, Jan Beulich wrote: > There's no need to have twice almost the same rule. Simply add the extra > -DEFI to AFLAGS for the EFI variant, and specify both targets for the > then single rule. > > Signed-off-by: Jan Beulich > > --- a/xen/arch/x86/Makefile > +++

Re: [Xen-devel] [PATCH v5 08/12] x86/hyperv: provide Hyper-V hypercall functions

2020-01-30 Thread Roger Pau Monné
On Thu, Jan 30, 2020 at 02:25:26PM +, Wei Liu wrote: > On Thu, Jan 30, 2020 at 03:22:01PM +0100, Roger Pau Monné wrote: > > On Thu, Jan 30, 2020 at 12:39:20PM +, Wei Liu wrote: > > > On Thu, Jan 30, 2020 at 01:32:26PM +0100, Roger Pau Monné wrote: > > > > On Thu, Jan 30, 2020 at 12:28:36PM

[Xen-devel] [PATCH] x86: fold linker script pre-processing rules

2020-01-30 Thread Jan Beulich
There's no need to have twice almost the same rule. Simply add the extra -DEFI to AFLAGS for the EFI variant, and specify both targets for the then single rule. Signed-off-by: Jan Beulich --- a/xen/arch/x86/Makefile +++ b/xen/arch/x86/Makefile @@ -241,15 +241,12 @@

Re: [Xen-devel] [PATCH] iommu/arm: Don't allow the same micro-TLB to be shared between domains

2020-01-30 Thread Oleksandr
Hi Oleksandr, Hi Volodymyr @@ -434,19 +435,45 @@ static void ipmmu_tlb_invalidate(struct ipmmu_vmsa_domain *domain) } /* Enable MMU translation for the micro-TLB. */ -static void ipmmu_utlb_enable(struct ipmmu_vmsa_domain *domain, - unsigned int utlb)

Re: [Xen-devel] [XEN PATCH v2 12/12] xen/build: have the root Makefile generates the CFLAGS

2020-01-30 Thread Jan Beulich
On 17.01.2020 11:53, Anthony PERARD wrote: > Instead of generating the CFLAGS in Rules.mk everytime we enter a new > subdirectory, we are going to generate most of them a single time, and > export the result in the environment so that Rules.mk can use it. The > only flags left to generates are

Re: [Xen-devel] [PATCH v5 08/12] x86/hyperv: provide Hyper-V hypercall functions

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 03:22:01PM +0100, Roger Pau Monné wrote: > On Thu, Jan 30, 2020 at 12:39:20PM +, Wei Liu wrote: > > On Thu, Jan 30, 2020 at 01:32:26PM +0100, Roger Pau Monné wrote: > > > On Thu, Jan 30, 2020 at 12:28:36PM +, Wei Liu wrote: > > > > On Thu, Jan 30, 2020 at 01:08:07PM

Re: [Xen-devel] [PATCH v5 08/12] x86/hyperv: provide Hyper-V hypercall functions

2020-01-30 Thread Roger Pau Monné
On Thu, Jan 30, 2020 at 12:39:20PM +, Wei Liu wrote: > On Thu, Jan 30, 2020 at 01:32:26PM +0100, Roger Pau Monné wrote: > > On Thu, Jan 30, 2020 at 12:28:36PM +, Wei Liu wrote: > > > On Thu, Jan 30, 2020 at 01:08:07PM +0100, Roger Pau Monné wrote: > > > > > > > > > +} > > > > > + > > > >

Re: [Xen-devel] [PATCH v5 10/12] x86/hyperv: provide percpu hypercall input page

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 01:26:55PM +0100, Roger Pau Monné wrote: > On Wed, Jan 29, 2020 at 08:20:32PM +, Wei Liu wrote: > > Hyper-V's input / output argument must be 8 bytes aligned an not cross > > page boundary. One way to satisfy those requirements is to use percpu > > page. > > > > For

Re: [Xen-devel] [PATCH v5 12/12] x86/hyperv: setup VP assist page

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 01:42:29PM +0100, Roger Pau Monné wrote: > On Wed, Jan 29, 2020 at 08:20:34PM +, Wei Liu wrote: > > VP assist page is rather important as we need to toggle some bits in it > > for efficient nested virtualisation. > > > > Signed-off-by: Wei Liu > > --- > > v5: > > 1.

Re: [Xen-devel] [PATCH v5 12/12] x86/hyperv: setup VP assist page

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 10:34:29AM +, Durrant, Paul wrote: > > + > > +val = (virt_to_mfn(mapping) << HV_HYP_PAGE_SHIFT) > > +| HV_X64_MSR_VP_ASSIST_PAGE_ENABLE; > > Perhaps it would be neater to put the viridian_page_msr union into > hyperv-tlfs.h and then use that. Done. Now

Re: [Xen-devel] [XEN PATCH v2 11/12] xen/build: introduce ccflags-y and CFLAGS_$@

2020-01-30 Thread Jan Beulich
On 17.01.2020 11:53, Anthony PERARD wrote: > We are going to want $(CFLAGS) to be static and never change during > the build, so introduce new variables that can be use to change the > flags of a single target or of a whole directory. I'm again struggling with the "why": What problem is there

Re: [Xen-devel] [XEN PATCH v2.1 15/12] squash! xen/build: have the root Makefile generates the CFLAGS

2020-01-30 Thread Jan Beulich
On 21.01.2020 14:59, Anthony PERARD wrote: > The XEN_BUILD_EFI tests in arch/x86/Makefile was filtering out > CFLAGS-y, but according to dd40177c1bc8 ("x86-64/EFI: add CFLAGS to > check compile"), it was done to filter out -MF. XEN_CFLAGS doesn't > have those flags anymore, so no filtering is

Re: [Xen-devel] [XEN PATCH v2 10/12] xen/build: use new $(c_flags) and $(a_flags) instead of $(CFLAGS)

2020-01-30 Thread Jan Beulich
On 17.01.2020 11:53, Anthony PERARD wrote: > We would like to calculate CFLAGS once and before calling Rules.mk, > so the variable CFLAGS needs to have the same value across the whole > build. Thus we need a new variable where some flags can change > depending on the target name. > > Both the

Re: [Xen-devel] [PATCH v5 02/12] x86/hypervisor: make hypervisor_ap_setup return an error code

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 11:01:29AM +0100, Roger Pau Monné wrote: > On Wed, Jan 29, 2020 at 08:20:24PM +, Wei Liu wrote: > > We want to be able to handle AP setup error in the upper layer. > > Thanks, some comments below. > > > > > Signed-off-by: Wei Liu > > --- > >

Re: [Xen-devel] [PATCH v14 0/5] xenbus/backend: Add memory pressure handler callback

2020-01-30 Thread Boris Ostrovsky
On 1/27/20 3:18 AM, sjp...@amazon.com wrote: > From: SeongJae Park > > Granting pages consumes backend system memory. In systems configured > with insufficient spare memory for those pages, it can cause a memory > pressure situation. However, finding the optimal amount of the spare > memory

Re: [Xen-devel] [PATCH 4/5] OvmfPkg/XenPlatformPei: Calibrate APIC timer frequency

2020-01-30 Thread Andrew Cooper
On 30/01/2020 12:44, Anthony PERARD wrote: > On Thu, Jan 30, 2020 at 10:12:51AM +0100, Roger Pau Monné wrote: >> On Wed, Jan 29, 2020 at 12:12:34PM +, Anthony PERARD wrote: >>> + Parameters.domid = DOMID_SELF; >>> + Parameters.gpfn = (UINTN) PagePtr >> EFI_PAGE_SHIFT; >>> + ReturnCode =

[Xen-devel] [PATCH V2] x86/altp2m: Hypercall to set altp2m view visibility

2020-01-30 Thread Alexandru Stefan ISAILA
At this moment a guest can call vmfunc to change the altp2m view. This should be limited in order to avoid any unwanted view switch. The new xc_altp2m_set_visibility() solves this by making views invisible to vmfunc. This is done by having a separate arch.altp2m_working_eptp that is populated and

Re: [Xen-devel] [XEN PATCH v2 09/12] xen/build: include include/config/auto.conf in main Makefile

2020-01-30 Thread Jan Beulich
On 17.01.2020 11:53, Anthony PERARD wrote: > --- a/xen/Makefile > +++ b/xen/Makefile > @@ -49,7 +49,71 @@ default: build > .PHONY: dist > dist: install > > -build install:: include/config/auto.conf > + > +ifndef root-make-done > +# section to run before calling Rules.mk, but only once. > +# >

[Xen-devel] Kdump doesn't work when running with xen on newer hardware

2020-01-30 Thread Dietmar Hahn
Hi, we use SLES12 with kernel-default-4.12.14-95.45.1.x86_64 and xen-4.11.3_02-2.20.1.x86_64 The dump kernel doesn't start after "echo c > /proc/sysrq_trigger". Last messages on console are: [ 385.717532] Kernel panic - not syncing: Fatal exception [ 385.734565] Kernel Offset: disabled (XEN)

Re: [Xen-devel] [PATCH 4/5] OvmfPkg/XenPlatformPei: Calibrate APIC timer frequency

2020-01-30 Thread Anthony PERARD
On Thu, Jan 30, 2020 at 10:12:51AM +0100, Roger Pau Monné wrote: > On Wed, Jan 29, 2020 at 12:12:34PM +, Anthony PERARD wrote: > > + Parameters.domid = DOMID_SELF; > > + Parameters.gpfn = (UINTN) PagePtr >> EFI_PAGE_SHIFT; > > + ReturnCode = XenHypercallMemoryOp (XENMEM_remove_from_physmap,

Re: [Xen-devel] [PATCH v5 12/12] x86/hyperv: setup VP assist page

2020-01-30 Thread Roger Pau Monné
On Wed, Jan 29, 2020 at 08:20:34PM +, Wei Liu wrote: > VP assist page is rather important as we need to toggle some bits in it > for efficient nested virtualisation. > > Signed-off-by: Wei Liu > --- > v5: > 1. Deal with error properly instead of always panicking > 2. Swap percpu variables

Re: [Xen-devel] [PATCH v5 08/12] x86/hyperv: provide Hyper-V hypercall functions

2020-01-30 Thread Wei Liu
On Thu, Jan 30, 2020 at 01:32:26PM +0100, Roger Pau Monné wrote: > On Thu, Jan 30, 2020 at 12:28:36PM +, Wei Liu wrote: > > On Thu, Jan 30, 2020 at 01:08:07PM +0100, Roger Pau Monné wrote: > > > > > > > +} > > > > + > > > > /* > > > > * Local variables: > > > > * mode: C > > > > diff

  1   2   >