On 11.07.22 01:05, Demi Marie Obenour wrote:
The error paths of gntdev_mmap() can call unmap_grant_pages() even
though not all of the pages have been successfully mapped. This will
trigger the WARN_ON()s in __unmap_grant_pages_done(). The number of
warnings can be very large; I have observed th
On 12.07.2022 01:14, Demi Marie Obenour wrote:
> The EFI System Resource Table (ESRT) is necessary for fwupd to identify
> firmware updates to install. According to the UEFI specification §23.4,
> the ESRT shall be stored in memory of type EfiBootServicesData. However,
> memory of type EfiBootSer
In case of maxmem != memsize the E820 map of the PVH stubdom is wrong,
as it is missing the RAM above memsize.
Additionally the memory map should only specify the Xen special pages
as reserved.
Signed-off-by: Juergen Gross
---
V2:
- don't change mmio area settings (Anthony Perard)
---
tools/hel
On 11.07.2022 19:41, Chuck Zmudzinski wrote:
> Moreover... (please move to the bottom of the code snippet
> for more information about my tests in the Xen PV environment...)
>
> void init_cache_modes(void)
> {
> u64 pat = 0;
>
> if (pat_cm_initialized)
> return;
>
> if (boot_
On 11.07.22 19:41, Chuck Zmudzinski wrote:
On 7/11/2022 10:31 AM, Juergen Gross wrote:
On 11.07.22 16:18, Chuck Zmudzinski wrote:
On 7/5/22 12:14 PM, Borislav Petkov wrote:
On Tue, Jul 05, 2022 at 05:56:36PM +0200, Jan Beulich wrote:
Re-using pat_disabled like you do in your suggestion below
Hello,
I've been trying to get Xen to boot dom0 with my kernel for weeks on an
rk3399 based board and thought I'd reach out for help. It looks like either
Xen is not properly recreating the device tree or the interrupt controller
is just failing. The hypervisor boots but falls to initramfs because
Hi Xenia
> -Original Message-
> From: Xenia Ragiadakou
> Sent: Monday, July 11, 2022 11:29 PM
> To: Penny Zheng ; Stefano Stabellini
> ; Julien Grall
> Cc: xen-devel@lists.xenproject.org; Doug Goldstein
> Subject: Re: [PATCH 2/2] automation: arm64: Create a test job for testing
> static
Hi Anthony,
> -Original Message-
> Subject: [XEN PATCH v3 20/25] tools: Introduce $(xenlibs-ldflags, ) macro
>
> This avoid the need to open-coding the list of flags needed to link
> with an in-tree Xen library when using -lxen*.
>
> Signed-off-by: Anthony PERARD
Reviewed-by: Henry Wan
Hi Anthony,
> -Original Message-
> Subject: [XEN PATCH v3 23/25] tools/helpers: Fix build of xen-init-dom0 with
> -Werror
>
> Missing prototype of asprintf() without _GNU_SOURCE.
>
> Signed-off-by: Anthony PERARD
Reviewed-by: Henry Wang
Kind regards,
Henry
> ---
> tools/helpers/xen
Hi Anthony,
> -Original Message-
> Subject: [XEN PATCH v3 14/25] tools/flask/utils: list build targets in
> $(TARGETS)
>
> Signed-off-by: Anthony PERARD
Reviewed-by: Henry Wang
Kind regards,
Henry
> ---
> tools/flask/utils/Makefile | 10 +-
> 1 file changed, 5 insertions(+),
flight 171585 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171585/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 171577
test-armhf-armhf-libvirt 16 saver
flight 171583 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171583/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-rtds 20 guest-localmigrate/x10 fail REGR. vs. 171578
Tests which did not succeed
The EFI System Resource Table (ESRT) is necessary for fwupd to identify
firmware updates to install. According to the UEFI specification §23.4,
the ESRT shall be stored in memory of type EfiBootServicesData. However,
memory of type EfiBootServicesData is considered general-purpose memory
by Xen,
flight 171584 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171584/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 7/11/2022 10:31 AM, Juergen Gross wrote:
> On 11.07.22 16:18, Chuck Zmudzinski wrote:
> > On 7/5/22 12:14 PM, Borislav Petkov wrote:
> >> On Tue, Jul 05, 2022 at 05:56:36PM +0200, Jan Beulich wrote:
> >>> Re-using pat_disabled like you do in your suggestion below won't
> >>> work, because mtrr_b
On Mon, Jul 11, 2022 at 03:52:52PM +0200, Jan Beulich wrote:
> On 24.06.2022 18:04, Anthony PERARD wrote:
> > Setup proper dependencies with libacpi so we don't need to run "make
> > hvmloader" in the "all" target. ("build.o" new prerequisite isn't
> > exactly proper but a side effect of building t
On Mon, Jul 11, 2022 at 12:58:40PM +0200, Juergen Gross wrote:
> Enumerating a file from $(targets) in $(clean-files) isn't needed.
>
> Remove xen/include/xen/hypercall-defs.h from $(clean-files).
>
> Reported-by: Jan Beulich
> Fixes: eca1f00d0227 ("xen: generate hypercall interface related code
On Fri, Jul 08, 2022 at 03:39:38PM +0200, Jan Beulich wrote:
> While in principle possible also under other conditions as long as other
> parallel operations potentially consuming memory aren't "locked out", in
> particular with IOMMU large page mappings used in Dom0 (for PV when in
> strict mode;
Hi Julien,
> On 22 Jun 2022, at 3:51 pm, Julien Grall wrote:
>
> Hi,
>
> On 22/06/2022 15:37, Rahul Singh wrote:
>> evtchn_alloc_unbound() always allocates the next available port. Static
>> event channel support for dom0less domains requires allocating a
>> specified port.
>> Modify the evtchn
With debug info retained, xen.efi can be quite large. Unlike for xen.gz
there's no intermediate step (mkelf32 there) involved which would strip
debug info kind of as a side effect. While the installing of xen.efi on
the EFI partition is an optional step (intended to be a courtesy to the
developer),
On 11.07.2022 17:35, G.R. wrote:
> On Mon, Jul 11, 2022 at 7:03 PM Juergen Gross wrote:
>>
>> On 11.07.22 12:38, Anthony PERARD wrote:
>>> libxl__xs_directory() can potentially return NULL without setting `n`.
>>> As `n` isn't initialised, we need to check libxl__xs_directory()
>>> return value be
On Mon, Jul 11, 2022 at 7:03 PM Juergen Gross wrote:
>
> On 11.07.22 12:38, Anthony PERARD wrote:
> > libxl__xs_directory() can potentially return NULL without setting `n`.
> > As `n` isn't initialised, we need to check libxl__xs_directory()
> > return value before checking `n`. Otherwise, `n` mig
Hi Penny,
On 11/7/22 12:02, Penny Zheng wrote:
Hi Xenia
-Original Message-
From: Xen-devel On Behalf Of
Xenia Ragiadakou
Sent: Friday, July 8, 2022 5:54 PM
To: Stefano Stabellini ; Julien Grall
Cc: xen-devel@lists.xenproject.org; Doug Goldstein
Subject: Re: [PATCH 2/2] automation: a
Implement support for the HVMOP_set_evtchn_upcall_vector hypercall in
order to set the per-vCPU event channel vector callback on Linux and
use it in preference of HVM_PARAM_CALLBACK_IRQ.
If the per-VCPU vector setup is successful on BSP, use this method
for the APs. If not, fallback to the global
On 11.07.22 16:26, Anthony PERARD wrote:
On Thu, Jul 07, 2022 at 05:01:38PM +0200, Juergen Gross wrote:
On 07.07.22 16:45, Anthony PERARD wrote:
On Fri, Jun 24, 2022 at 11:28:06AM +0200, Juergen Gross wrote:
In case of maxmem != memsize the E820 map of the PVH stubdom is wrong,
as it is missin
Hello,
the other day I wanted to look at the basic structure of xen.efi. First
I used my own dumping tool, which didn't work. Then I used objdump,
which appeared to work. I decided that I should look into what they do
different, and whether I could make mine work as well, or whether
instead objdum
On 11.07.22 16:18, Chuck Zmudzinski wrote:
On 7/5/22 12:14 PM, Borislav Petkov wrote:
On Tue, Jul 05, 2022 at 05:56:36PM +0200, Jan Beulich wrote:
Re-using pat_disabled like you do in your suggestion below won't
work, because mtrr_bp_init() calls pat_disable() when MTRRs
appear to be disabled (
On Thu, Jul 07, 2022 at 05:01:38PM +0200, Juergen Gross wrote:
> On 07.07.22 16:45, Anthony PERARD wrote:
> > On Fri, Jun 24, 2022 at 11:28:06AM +0200, Juergen Gross wrote:
> > > In case of maxmem != memsize the E820 map of the PVH stubdom is wrong,
> > > as it is missing the RAM above memsize.
> >
flight 171582 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171582/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 7/5/22 12:14 PM, Borislav Petkov wrote:
> On Tue, Jul 05, 2022 at 05:56:36PM +0200, Jan Beulich wrote:
> > Re-using pat_disabled like you do in your suggestion below won't
> > work, because mtrr_bp_init() calls pat_disable() when MTRRs
> > appear to be disabled (from the kernel's view). The goal
On 24.06.2022 18:04, Anthony PERARD wrote:
> --- a/tools/fuzz/x86_instruction_emulator/Makefile
> +++ b/tools/fuzz/x86_instruction_emulator/Makefile
> @@ -8,33 +8,27 @@ else
> x86-insn-fuzz-all:
> endif
>
> -# Add libx86 to the build
> -vpath %.c $(XEN_ROOT)/xen/lib/x86
> +cpuid.c: %: $(XEN_ROO
On 24.06.2022 18:04, Anthony PERARD wrote:
> Setup proper dependencies with libacpi so we don't need to run "make
> hvmloader" in the "all" target. ("build.o" new prerequisite isn't
> exactly proper but a side effect of building the $(DSDT_FILES) is to
> generate the "ssdt_*.h" needed by "build.o".
On 08.07.2022 17:39, Luca Fancellu wrote:
>> On 24 Jun 2022, at 17:04, Anthony PERARD wrote:
>> @@ -87,21 +89,21 @@ roms.inc: $(ROMS)
>>
>> ifneq ($(ROMBIOS_ROM),)
>> echo "#ifdef ROM_INCLUDE_ROMBIOS" >> $@.new
>> -sh ../../misc/mkhex rombios $(ROMBIOS_ROM) >> $@.new
>> +$(SHELL) $(XE
> On 11 Jul 2022, at 14:38, Anthony PERARD wrote:
>
> On Fri, Jul 08, 2022 at 03:39:00PM +, Luca Fancellu wrote:
>>> On 24 Jun 2022, at 17:04, Anthony PERARD wrote:
> [...]
>>> For "roms.inc" target, use "$(SHELL)" instead of plain "sh". And use
>>> full path to "mkhex" instead of a relati
On Fri, Jul 08, 2022 at 03:39:00PM +, Luca Fancellu wrote:
> > On 24 Jun 2022, at 17:04, Anthony PERARD wrote:
[...]
> > For "roms.inc" target, use "$(SHELL)" instead of plain "sh". And use
> > full path to "mkhex" instead of a relative one. Lastly, add "-f" flag
> > to "mv", in case the targe
> On 24 Jun 2022, at 17:04, Anthony PERARD wrote:
>
> Rework dependencies of all objects. We don't need to add dependencies
> for headers that $(CC) is capable of generating, we only need to
> include $(DEPS_INCLUDE). Some dependencies are still needed so make
> knows to generate symlinks for t
On 11/07/2022 09:26, Jan Beulich wrote:
> On 11.07.2022 10:00, Jane Malalane wrote:
>> On 30/06/2022 07:03, Jan Beulich wrote:
>>> On 30.06.2022 05:25, Tian, Kevin wrote:
> From: Jane Malalane
> Sent: Wednesday, June 29, 2022 9:56 PM
>
> Introduce a new per-domain creation x86 spec
Introduce a new per-domain creation x86 specific flag to
select whether hardware assisted virtualization should be used for
x{2}APIC.
A per-domain option is added to xl in order to select the usage of
x{2}APIC hardware assisted virtualization, as well as a global
configuration option.
Having all
On 7/5/22 12:14 PM, Borislav Petkov wrote:
> On Tue, Jul 05, 2022 at 05:56:36PM +0200, Jan Beulich wrote:
> > Re-using pat_disabled like you do in your suggestion below won't
> > work, because mtrr_bp_init() calls pat_disable() when MTRRs
> > appear to be disabled (from the kernel's view). The goal
On 11.07.22 14:23, Dmytro Semenets wrote:
Hello Juergen,
пн, 11 июл. 2022 г. в 10:24, Juergen Gross :
On 09.07.22 12:10, dmitry.semen...@gmail.com wrote:
From: Oleksandr Andrushchenko
Current vchan implementation, while dealing with XenStore paths,
allocates 64 bytes buffer on the stack whic
Hello Juergen,
пн, 11 июл. 2022 г. в 10:24, Juergen Gross :
>
> On 09.07.22 12:10, dmitry.semen...@gmail.com wrote:
> > From: Oleksandr Andrushchenko
> >
> > Current vchan implementation, while dealing with XenStore paths,
> > allocates 64 bytes buffer on the stack which may not be enough for
> >
On 11.07.22 14:12, Dmytro Semenets wrote:
пн, 11 июл. 2022 г. в 10:09, Juergen Gross :
On 09.07.22 12:10, dmitry.semen...@gmail.com wrote:
From: Oleksandr Andrushchenko
vchan server creates XenStore entries to advertise its event channel and
ring, but those are not removed after the server q
пн, 11 июл. 2022 г. в 10:09, Juergen Gross :
>
> On 09.07.22 12:10, dmitry.semen...@gmail.com wrote:
> > From: Oleksandr Andrushchenko
> >
> > vchan server creates XenStore entries to advertise its event channel and
> > ring, but those are not removed after the server quits.
> > Add additional cle
On 7/5/22 12:14 PM, Borislav Petkov wrote:
> On Tue, Jul 05, 2022 at 05:56:36PM +0200, Jan Beulich wrote:
> > Re-using pat_disabled like you do in your suggestion below won't
> > work, because mtrr_bp_init() calls pat_disable() when MTRRs
> > appear to be disabled (from the kernel's view). The goal
> On 24 Jun 2022, at 17:04, Anthony PERARD wrote:
>
> Rename ELF_LIB_OBJS to LIBELF_OBJS as to have the same name as in
> libs/guest/.
>
> Replace "-I" by "-iquote".
>
> Remove the use of "vpath". It will not works when we will convert this
> makefile to subdirmk. Instead, we create symlinks
Enumerating a file from $(targets) in $(clean-files) isn't needed.
Remove xen/include/xen/hypercall-defs.h from $(clean-files).
Reported-by: Jan Beulich
Fixes: eca1f00d0227 ("xen: generate hypercall interface related code")
Signed-off-by: Juergen Gross
---
xen/include/Makefile | 2 +-
1 file c
On 11.07.22 12:18, Jan Beulich wrote:
On 24.03.2022 15:01, Juergen Gross wrote:
--- a/xen/include/Makefile
+++ b/xen/include/Makefile
@@ -77,6 +77,18 @@ $(obj)/compat/xlat.h: $(addprefix
$(obj)/compat/.xlat/,$(xlat-y)) $(obj)/config/
cat $(filter %.h,$^) >$@.new
mv -f $@.new $@
On 11.07.22 12:38, Anthony PERARD wrote:
libxl__xs_directory() can potentially return NULL without setting `n`.
As `n` isn't initialised, we need to check libxl__xs_directory()
return value before checking `n`. Otherwise, `n` might be non-zero
with `bdfs` NULL which would lead to a segv.
Reporte
On Thu, Jul 07, 2022 at 08:38:44AM +0200, Jan Beulich wrote:
> Well, right now the pvops hook for Xen swallows #GP anyway (wrongly
> so imo, but any of my earlier pointing out of that has been left
> unheard, despite even the code comments there saying "It may be worth
> changing that").
Oh great.
libxl__xs_directory() can potentially return NULL without setting `n`.
As `n` isn't initialised, we need to check libxl__xs_directory()
return value before checking `n`. Otherwise, `n` might be non-zero
with `bdfs` NULL which would lead to a segv.
Reported-by: "G.R."
Fixes: 57bff091f4 ("libxl: ad
On 24.03.2022 15:01, Juergen Gross wrote:
> --- a/xen/include/Makefile
> +++ b/xen/include/Makefile
> @@ -77,6 +77,18 @@ $(obj)/compat/xlat.h: $(addprefix
> $(obj)/compat/.xlat/,$(xlat-y)) $(obj)/config/
> cat $(filter %.h,$^) >$@.new
> mv -f $@.new $@
>
> +quiet_cmd_genhyp = GEN
flight 171581 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171581/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 12dd064a1804536518eb12229836fa572c232502
baseline version:
ovmf f6f3cc7eadcfb20898b8d
> On 8 Jul 2022, at 22:34, Demi Marie Obenour
> wrote:
>
> The EFI System Resource Table (ESRT) is necessary for fwupd to identify
> firmware updates to install. According to the UEFI specification §23.4,
> the ESRT shall be stored in memory of type EfiBootServicesData. However,
> memory of
Hi Xenia
> -Original Message-
> From: Xen-devel On Behalf Of
> Xenia Ragiadakou
> Sent: Friday, July 8, 2022 5:54 PM
> To: Stefano Stabellini ; Julien Grall
> Cc: xen-devel@lists.xenproject.org; Doug Goldstein
> Subject: Re: [PATCH 2/2] automation: arm64: Create a test job for testing
>
On 11.07.2022 10:30, Demi Marie Obenour wrote:
> On Mon, Jul 11, 2022 at 08:41:59AM +0200, Jan Beulich wrote:
>> On 08.07.2022 23:34, Demi Marie Obenour wrote:
>>> @@ -1051,6 +1110,70 @@ static void __init
>>> efi_set_gop_mode(EFI_GRAPHICS_OUTPUT_PROTOCOL *gop, UINTN gop
>>> #define INVALID_VIRTU
On Mon, Jul 11, 2022 at 08:41:59AM +0200, Jan Beulich wrote:
> On 08.07.2022 23:34, Demi Marie Obenour wrote:
> > The EFI System Resource Table (ESRT) is necessary for fwupd to identify
> > firmware updates to install. According to the UEFI specification §23.4,
> > the ESRT shall be stored in memo
On 11.07.2022 10:00, Jane Malalane wrote:
> On 30/06/2022 07:03, Jan Beulich wrote:
>> On 30.06.2022 05:25, Tian, Kevin wrote:
From: Jane Malalane
Sent: Wednesday, June 29, 2022 9:56 PM
Introduce a new per-domain creation x86 specific flag to
select whether hardware assist
On 30/06/2022 07:03, Jan Beulich wrote:
> On 30.06.2022 05:25, Tian, Kevin wrote:
>>> From: Jane Malalane
>>> Sent: Wednesday, June 29, 2022 9:56 PM
>>>
>>> Introduce a new per-domain creation x86 specific flag to
>>> select whether hardware assisted virtualization should be used for
>>> x{2}APIC.
Hi Stefano
> -Original Message-
> From: Stefano Stabellini
> Sent: Saturday, July 9, 2022 12:41 AM
> To: Penny Zheng
> Cc: Stefano Stabellini ; jul...@xen.org; xen-
> de...@lists.xenproject.org; Wei Chen ; Bertrand
> Marquis ; Volodymyr Babchuk
>
> Subject: RE: [PATCH v5 7/8] xen/arm: c
flight 171578 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/171578/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 171572
test-armhf-armhf-libvirt 16 save
On 09.07.22 12:10, dmitry.semen...@gmail.com wrote:
From: Oleksandr Andrushchenko
Current vchan implementation, while dealing with XenStore paths,
allocates 64 bytes buffer on the stack which may not be enough for
some use-cases. Make the buffer longer to respect maximum allowed
XenStore path o
On 09.07.22 12:10, dmitry.semen...@gmail.com wrote:
From: Oleksandr Andrushchenko
vchan server creates XenStore entries to advertise its event channel and
ring, but those are not removed after the server quits.
Add additional cleanup step, so those are removed, so clients do not try
to connect
62 matches
Mail list logo