[PATCH] x86: log non-responding CPUs in fatal_trap()

2022-07-12 Thread Jan Beulich
This eases recognizing that something odd is going on. Signed-off-by: Jan Beulich --- a/xen/arch/x86/traps.c +++ b/xen/arch/x86/traps.c @@ -845,6 +845,9 @@ void fatal_trap(const struct cpu_user_re msecs = 10; } } +if ( pending ) +

[linux-5.4 test] 171600: regressions - FAIL

2022-07-12 Thread osstest service owner
flight 171600 linux-5.4 real [real] flight 171612 linux-5.4 real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171600/ http://logs.test-lab.xenproject.org/osstest/logs/171612/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: t

Re: [PATCH 2/8] xen/evtchn: modify evtchn_alloc_unbound to allocate specified port

2022-07-12 Thread Jan Beulich
On 12.07.2022 19:28, Julien Grall wrote: > On 11/07/2022 17:08, Rahul Singh wrote: >>> On 22 Jun 2022, at 3:51 pm, Julien Grall wrote: >>> On 22/06/2022 15:37, Rahul Singh wrote: evtchn_alloc_unbound() always allocates the next available port. Static event channel support for dom0less do

Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Jan Beulich
On 13.07.2022 03:36, Chuck Zmudzinski wrote: > v2: *Add force_pat_disabled variable to fix "nopat" on Xen PV (Jan Beulich) > *Add the necessary code to incorporate the "nopat" fix > *void init_cache_modes(void) -> void __init init_cache_modes(void) > *Add Jan Beulich as Co-developer (Ja

Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Jan Beulich
On 12.07.2022 21:48, Chuck Zmudzinski wrote: > I will also re-compile and test the new patch before sending > v2 and unless Jan objects, I should acknowledge Jan as co-author > of the patch since I will be using parts of his proposed patch > to fix the "nopat" issue, so I also need to get his sign-

Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Greg KH
On Tue, Jul 12, 2022 at 03:57:45PM -0400, Chuck Zmudzinski wrote: > On 7/12/22 3:26 PM, Greg KH wrote: > > On Tue, Jul 12, 2022 at 03:16:01PM -0400, Chuck Zmudzinski wrote: > > > On 7/12/22 2:36 PM, Greg KH wrote: > > > > On Tue, Jul 12, 2022 at 02:20:37PM -0400, Chuck Zmudzinski wrote: > > > > > T

[qemu-mainline test] 171597: tolerable FAIL - PUSHED

2022-07-12 Thread osstest service owner
flight 171597 qemu-mainline real [real] flight 171610 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171597/ http://logs.test-lab.xenproject.org/osstest/logs/171610/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-am

Re: [PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Juergen Gross
On 13.07.22 03:36, Chuck Zmudzinski wrote: The commit 99c13b8c8896d7bcb92753bf ("x86/mm/pat: Don't report PAT on CPUs that don't support it") incorrectly failed to account for the case in init_cache_modes() when CPUs do support PAT and falsely reported PAT to be disabled when in fact PAT is enabl

RE: [PATCH v5 1/8] xen/arm: introduce static shared memory

2022-07-12 Thread Penny Zheng
Hi Julien Before submitting the v6 patch series, I would like to double confirm that ... > -Original Message- > From: Julien Grall > Sent: Wednesday, June 29, 2022 6:18 PM > To: Penny Zheng ; xen-devel@lists.xenproject.org > Cc: Wei Chen ; Stefano Stabellini > ; Bertrand Marquis ; > Volo

[PATCH v2] Subject: x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Chuck Zmudzinski
The commit 99c13b8c8896d7bcb92753bf ("x86/mm/pat: Don't report PAT on CPUs that don't support it") incorrectly failed to account for the case in init_cache_modes() when CPUs do support PAT and falsely reported PAT to be disabled when in fact PAT is enabled. In some environments, notably in Xen PV d

Xen Summit Registration is now open!

2022-07-12 Thread George Dunlap
Registration is open! Virtual attendance is open to everyone; due to space constraints, physical attendance will be priority-based: Those not on the "priority list" will be put on a waiting list until 2 September, at which point slots will be first-come-first-served. https://events.linuxfoundat

[xen-4.15-testing test] 171594: tolerable FAIL - PUSHED

2022-07-12 Thread osstest service owner
flight 171594 xen-4.15-testing real [real] flight 171607 xen-4.15-testing real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171594/ http://logs.test-lab.xenproject.org/osstest/logs/171607/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): t

Re: [PATCH V10 1/3] libxl: Add support for Virtio disk configuration

2022-07-12 Thread George Dunlap
> On 30 Jun 2022, at 22:18, Oleksandr wrote: > > > Dear all. > > > On 25.06.22 17:32, Oleksandr wrote: >> >> On 24.06.22 15:59, George Dunlap wrote: >> >> Hello George >> >>> On 17 Jun 2022, at 17:14, Oleksandr Tyshchenko wrote: From: Oleksandr Tyshchenko Thi

[xen-4.16-testing test] 171595: tolerable FAIL - PUSHED

2022-07-12 Thread osstest service owner
flight 171595 xen-4.16-testing real [real] flight 171606 xen-4.16-testing real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171595/ http://logs.test-lab.xenproject.org/osstest/logs/171606/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): t

Re: Build warnings in Xen 5.15.y and 5.10.y with retbleed backports

2022-07-12 Thread Boris Ostrovsky
On 7/12/22 3:31 PM, Greg KH wrote: On Tue, Jul 12, 2022 at 03:19:39PM -0400, Boris Ostrovsky wrote: On 7/12/22 12:38 PM, Greg KH wrote: Hi all, I'm seeing the following build warning: arch/x86/kernel/head_64.o: warning: objtool: xen_hypercall_mmu_update(): can't find starting inst

Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Chuck Zmudzinski
On 7/12/22 3:26 PM, Greg KH wrote: > On Tue, Jul 12, 2022 at 03:16:01PM -0400, Chuck Zmudzinski wrote: > > On 7/12/22 2:36 PM, Greg KH wrote: > > > On Tue, Jul 12, 2022 at 02:20:37PM -0400, Chuck Zmudzinski wrote: > > > > The commit 99c13b8c8896d7bcb92753bf > > > > ("x86/mm/pat: Don't report PAT on

Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Chuck Zmudzinski
On 7/12/22 3:18 PM, Chuck Zmudzinski wrote: > On 7/12/22 2:27 PM, Juergen Gross wrote: > > On 12.07.22 20:20, Chuck Zmudzinski wrote: > > > The commit 99c13b8c8896d7bcb92753bf > > > ("x86/mm/pat: Don't report PAT on CPUs that don't support it") > > > incorrectly failed to account for the case in

[xen-unstable-smoke test] 171602: tolerable all pass - PUSHED

2022-07-12 Thread osstest service owner
flight 171602 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/171602/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [oss-security] Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

2022-07-12 Thread Salvatore Bonaccorso
Hi, On Tue, Jul 12, 2022 at 09:27:07PM +0200, Salvatore Bonaccorso wrote: > Hi, > > On Tue, Jul 12, 2022 at 04:36:10PM +, Xen.org security team wrote: > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > Xen Security Advisory CVE-2022-23816,CVE-2022-23825,CVE-2022-29900 / > > XS

Re: Build warnings in Xen 5.15.y and 5.10.y with retbleed backports

2022-07-12 Thread Greg KH
On Tue, Jul 12, 2022 at 03:19:39PM -0400, Boris Ostrovsky wrote: > > On 7/12/22 12:38 PM, Greg KH wrote: > > Hi all, > > > > I'm seeing the following build warning: > > arch/x86/kernel/head_64.o: warning: objtool: > > xen_hypercall_mmu_update(): can't find starting instruction > > in the 5.1

Re: [oss-security] Xen Security Advisory 407 v1 (CVE-2022-23816,CVE-2022-23825,CVE-2022-29900) - Retbleed - arbitrary speculative code execution with return instructions

2022-07-12 Thread Salvatore Bonaccorso
Hi, On Tue, Jul 12, 2022 at 04:36:10PM +, Xen.org security team wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Xen Security Advisory CVE-2022-23816,CVE-2022-23825,CVE-2022-29900 / XSA-407 > >Retbleed - arbitrary speculative code execution with return instructions > > IS

Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Greg KH
On Tue, Jul 12, 2022 at 03:16:01PM -0400, Chuck Zmudzinski wrote: > On 7/12/22 2:36 PM, Greg KH wrote: > > On Tue, Jul 12, 2022 at 02:20:37PM -0400, Chuck Zmudzinski wrote: > > > The commit 99c13b8c8896d7bcb92753bf > > > ("x86/mm/pat: Don't report PAT on CPUs that don't support it") > > > incorrect

Re: Build warnings in Xen 5.15.y and 5.10.y with retbleed backports

2022-07-12 Thread Boris Ostrovsky
On 7/12/22 12:38 PM, Greg KH wrote: Hi all, I'm seeing the following build warning: arch/x86/kernel/head_64.o: warning: objtool: xen_hypercall_mmu_update(): can't find starting instruction in the 5.15.y and 5.10.y retbleed backports. I don't know why just this one hypercall is being

Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Chuck Zmudzinski
On 7/12/22 2:27 PM, Juergen Gross wrote: > On 12.07.22 20:20, Chuck Zmudzinski wrote: > > The commit 99c13b8c8896d7bcb92753bf > > ("x86/mm/pat: Don't report PAT on CPUs that don't support it") > > incorrectly failed to account for the case in init_cache_modes() when > > CPUs do support PAT and fals

Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Chuck Zmudzinski
On 7/12/22 2:36 PM, Greg KH wrote: > On Tue, Jul 12, 2022 at 02:20:37PM -0400, Chuck Zmudzinski wrote: > > The commit 99c13b8c8896d7bcb92753bf > > ("x86/mm/pat: Don't report PAT on CPUs that don't support it") > > incorrectly failed to account for the case in init_cache_modes() when > > CPUs do sup

Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Greg KH
On Tue, Jul 12, 2022 at 02:20:37PM -0400, Chuck Zmudzinski wrote: > The commit 99c13b8c8896d7bcb92753bf > ("x86/mm/pat: Don't report PAT on CPUs that don't support it") > incorrectly failed to account for the case in init_cache_modes() when > CPUs do support PAT and falsely reported PAT to be disab

Re: [PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Juergen Gross
On 12.07.22 20:20, Chuck Zmudzinski wrote: The commit 99c13b8c8896d7bcb92753bf ("x86/mm/pat: Don't report PAT on CPUs that don't support it") incorrectly failed to account for the case in init_cache_modes() when CPUs do support PAT and falsely reported PAT to be disabled when in fact PAT is enabl

[PATCH] x86/PAT: Report PAT on CPUs that support PAT without MTRR

2022-07-12 Thread Chuck Zmudzinski
The commit 99c13b8c8896d7bcb92753bf ("x86/mm/pat: Don't report PAT on CPUs that don't support it") incorrectly failed to account for the case in init_cache_modes() when CPUs do support PAT and falsely reported PAT to be disabled when in fact PAT is enabled. In some environments, notably in Xen PV d

[xen-unstable test] 171593: tolerable FAIL

2022-07-12 Thread osstest service owner
flight 171593 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/171593/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 171586 test-armhf-armhf-libvirt 16 save

Re: [PATCH 2/8] xen/evtchn: modify evtchn_alloc_unbound to allocate specified port

2022-07-12 Thread Julien Grall
On 11/07/2022 17:08, Rahul Singh wrote: Hi Julien, Hi Rahul, On 22 Jun 2022, at 3:51 pm, Julien Grall wrote: Hi, On 22/06/2022 15:37, Rahul Singh wrote: evtchn_alloc_unbound() always allocates the next available port. Static event channel support for dom0less domains requires allocating a

Re: Xen on rk3399

2022-07-12 Thread Brad Churchwell
Sorry for all of the emails, but here is /proc/device-tree with XEN and without XEN: with Xen: With XEN qos@ffa60080 interrupt-parent qos@ffa9 qos@ffaa8080 pmu-clock-controller@ff75 watchdog@ff848000 pwm@ff420030 serial@ff1b vcc5

[xen-unstable-smoke test] 171599: tolerable all pass - PUSHED

2022-07-12 Thread osstest service owner
flight 171599 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/171599/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Build warnings in Xen 5.15.y and 5.10.y with retbleed backports

2022-07-12 Thread Greg KH
Hi all, I'm seeing the following build warning: arch/x86/kernel/head_64.o: warning: objtool: xen_hypercall_mmu_update(): can't find starting instruction in the 5.15.y and 5.10.y retbleed backports. I don't know why just this one hypercall is being called out by objtool, and this warning

Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen

2022-07-12 Thread Chuck Zmudzinski
On 7/12/22 11:30 AM, Juergen Gross wrote: > On 12.07.22 17:09, Chuck Zmudzinski wrote: > > On 7/12/2022 9:32 AM, Juergen Gross wrote: > >> On 12.07.22 15:22, Chuck Zmudzinski wrote: > >>> On 7/12/2022 2:04 AM, Jan Beulich wrote: > On 11.07.2022 19:41, Chuck Zmudzinski wrote: > > Moreove

Re: Xen on rk3399

2022-07-12 Thread Brad Churchwell
Hi Bertrand, I believe I understand, but just to clarify, should I leave the ppi-partitions block in rk3399.dtsi as is and disable the little cores, or should I also modify that block? Brad On Tue, Jul 12, 2022 at 11:11 AM Bertrand Marquis wrote: > Hi Brad, > > > On 12 Jul 2022, at 16:59, Brad

Re: Xen on rk3399

2022-07-12 Thread Bertrand Marquis
Hi Brad, > On 12 Jul 2022, at 16:59, Brad Churchwell wrote: > > Hi Bertrand, > > Thanks so much for the quick response! > > I should have mentioned previously that this device tree and kernel Image > (5.15.16) does boot properly with the rootfs without XEN. The interrupt > errors are only prese

Re: [PATCH v2 1/9] drivers/char: Add support for Xue USB3 debugger

2022-07-12 Thread Jan Beulich
On 06.07.2022 17:32, Marek Marczykowski-Górecki wrote: > From: Connor Davis > > [Connor] > Xue is a cross-platform USB 3 debugger that drives the Debug > Capability (DbC) of xHCI-compliant host controllers. This patch > implements the operations needed for xue to initialize the host > controller'

Re: [PATCH v2 1/9] drivers/char: Add support for Xue USB3 debugger

2022-07-12 Thread Jan Beulich
On 06.07.2022 17:32, Marek Marczykowski-Górecki wrote: > --- a/docs/misc/xen-command-line.pandoc > +++ b/docs/misc/xen-command-line.pandoc > @@ -721,10 +721,15 @@ Available alternatives, with their meaning, are: > > ### dbgp > > `= ehci[ | @pci:. ]` > +> `= xue` > > Specify the USB controll

Re: Xen on rk3399

2022-07-12 Thread Brad Churchwell
Hi Bertrand, Thanks so much for the quick response! I should have mentioned previously that this device tree and kernel Image (5.15.16) does boot properly with the rootfs without XEN. The interrupt errors are only present when booting with XEN. These are custom boards and they do have usb c, how

Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen

2022-07-12 Thread Juergen Gross
On 12.07.22 17:09, Chuck Zmudzinski wrote: On 7/12/2022 9:32 AM, Juergen Gross wrote: On 12.07.22 15:22, Chuck Zmudzinski wrote: On 7/12/2022 2:04 AM, Jan Beulich wrote: On 11.07.2022 19:41, Chuck Zmudzinski wrote: Moreover... (please move to the bottom of the code snippet for more informatio

Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen

2022-07-12 Thread Chuck Zmudzinski
On 7/12/2022 9:32 AM, Juergen Gross wrote: > On 12.07.22 15:22, Chuck Zmudzinski wrote: > > On 7/12/2022 2:04 AM, Jan Beulich wrote: > >> On 11.07.2022 19:41, Chuck Zmudzinski wrote: > >>> Moreover... (please move to the bottom of the code snippet > >>> for more information about my tests in the Xe

Re: Xen on rk3399

2022-07-12 Thread Bertrand Marquis
Hi Brad, > On 11 Jul 2022, at 19:38, Brad Churchwell wrote: > > Hello, > > I've been trying to get Xen to boot dom0 with my kernel for weeks on an > rk3399 based board and thought I'd reach out for help. It looks like either > Xen is not properly recreating the device tree or the interrupt cont

[PATCH] automation: Remove build-* from gitignore

2022-07-12 Thread Bertrand Marquis
...because there are some scripts in automation corresponding to the entry (build-test.sh and build-each-commit.sh) Signed-off-by: Bertrand Marquis --- .gitignore | 1 - 1 file changed, 1 deletion(-) diff --git a/.gitignore b/.gitignore index 4729911c51..f731975713 100644 --- a/.gitignore +++ b

Re: [PATCH v2 9/9] xen: introduce a Kconfig option to configure NUMA nodes number

2022-07-12 Thread Jan Beulich
On 08.07.2022 16:54, Wei Chen wrote: > --- a/xen/arch/Kconfig > +++ b/xen/arch/Kconfig > @@ -17,3 +17,14 @@ config NR_CPUS > For CPU cores which support Simultaneous Multi-Threading or similar > technologies, this the number of logical threads which Xen will > support. > + >

Re: [PATCH v2 8/9] xen: rename acpi_scan_nodes to numa_scan_nodes

2022-07-12 Thread Jan Beulich
On 08.07.2022 16:54, Wei Chen wrote: > We have moved acpi_scan_nodes from x86 to common. Because of > of our previous work, this function no longer has many ACPI > characteristics, except some "SRAT" words in print messages. > So we rename acpi_scan_nodes to a more generic name > numa_scan_nodes, a

Re: [PATCH v2 7/9] xen/x86: rename bad_srat to numa_bad

2022-07-12 Thread Jan Beulich
On 08.07.2022 16:54, Wei Chen wrote: > When NUMA initialization code is failed in scanning SRAT. It will > call bad_srat to set disable NUMA and clear relate data. But this > name is ACPI specific, we have moved generically usable NUMA codes > to common, bad_srat has came with these codes to common

Re: [PATCH v2 6/9] xen/x86: move NUMA scan nodes codes from x86 to common

2022-07-12 Thread Jan Beulich
On 08.07.2022 16:54, Wei Chen wrote: > x86 has implemented a set of codes to scan NUMA nodes. These > codes will parse NUMA memory and processor information from > ACPI SRAT table. But except some ACPI specific codes, most > of the scan codes like memory blocks validation, node memory > range updat

[PATCH] xl: move freemem()'s "credit expired" loop exit

2022-07-12 Thread Jan Beulich
Move the "credit expired" loop exit to the middle of the loop, immediately after "return true". This way having reached the goal on the last iteration would be reported as success to the caller, rather than as "timed out". Signed-off-by: Jan Beulich --- a/tools/xl/xl_vmcontrol.c +++ b/tools/xl/x

Re: [PATCH v2 5/9] xen/x86: use arch_get_memory_map to get information from E820 map

2022-07-12 Thread Jan Beulich
On 08.07.2022 16:54, Wei Chen wrote: > @@ -82,3 +83,25 @@ unsigned int __init arch_get_dma_bitsize(void) > flsl(node_start_pfn(node) + node_spanned_pages(node) / 4 - > 1) > + PAGE_SHIFT, 32); > } > + > +/* > + * This function provides the ability for caller to

Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen

2022-07-12 Thread Juergen Gross
On 12.07.22 15:22, Chuck Zmudzinski wrote: On 7/12/2022 2:04 AM, Jan Beulich wrote: On 11.07.2022 19:41, Chuck Zmudzinski wrote: Moreover... (please move to the bottom of the code snippet for more information about my tests in the Xen PV environment...) void init_cache_modes(void) {     u64 p

Re: [PATCH] x86/PAT: have pat_enabled() properly reflect state when running on e.g. Xen

2022-07-12 Thread Chuck Zmudzinski
On 7/12/2022 2:04 AM, Jan Beulich wrote: > On 11.07.2022 19:41, Chuck Zmudzinski wrote: > > Moreover... (please move to the bottom of the code snippet > > for more information about my tests in the Xen PV environment...) > > > > void init_cache_modes(void) > > { > >     u64 pat = 0; > > > >     i

Re: [PATCH v2 3/9] xen/x86: move generically usable NUMA code from x86 to common

2022-07-12 Thread Jan Beulich
On 08.07.2022 16:54, Wei Chen wrote: > --- /dev/null > +++ b/xen/common/numa.c > @@ -0,0 +1,439 @@ > +/* > + * Generic VM initialization for NUMA setups. > + * Copyright 2002,2003 Andi Kleen, SuSE Labs. > + * Adapted for Xen: Ryan Harper > + */ > + > +#include > +#include > +#include > +#includ

[qemu-mainline test] 171588: regressions - FAIL

2022-07-12 Thread osstest service owner
flight 171588 qemu-mainline real [real] flight 171596 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171588/ http://logs.test-lab.xenproject.org/osstest/logs/171596/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be

Re: [PATCH] xl: relax freemem()'s retry calculation

2022-07-12 Thread Anthony PERARD
On Tue, Jul 12, 2022 at 09:01:48AM +0200, Jan Beulich wrote: > On 11.07.2022 18:21, Anthony PERARD wrote: > > On Fri, Jul 08, 2022 at 03:39:38PM +0200, Jan Beulich wrote: > >> While in principle possible also under other conditions as long as other > >> parallel operations potentially consuming mem

Re: [PATCH v2] tools/init-xenstore-domain: fix memory map for PVH stubdom

2022-07-12 Thread Anthony PERARD
On Tue, Jul 12, 2022 at 08:18:30AM +0200, Juergen Gross wrote: > In case of maxmem != memsize the E820 map of the PVH stubdom is wrong, > as it is missing the RAM above memsize. > > Additionally the memory map should only specify the Xen special pages > as reserved. > > Signed-off-by: Juergen Gro

Re: [PATCH v2 2/9] xen/x86: Use enumerations to indicate NUMA status

2022-07-12 Thread Jan Beulich
On 08.07.2022 16:54, Wei Chen wrote: > In current code, x86 is using two variables, numa_off and acpi_numa, > to indicate the NUMA status. This is because NUMA is not coupled with > ACPI, and ACPI still can work without NUMA on x86. With these two > variables' combinations, x86 can have several NUM

Re: [PATCH v2] xen/build: remove unneeded enumeration in clean-files of xen/include/Makefile

2022-07-12 Thread Anthony PERARD
On Tue, Jul 12, 2022 at 11:10:07AM +0200, Juergen Gross wrote: > Enumerating a file from $(targets) in $(clean-files) isn't needed. > > Remove hypercall-defs.h and headers*.chk from $(clean-files) in > xen/include/Makefile. > > Reported-by: Jan Beulich > Fixes: eca1f00d0227 ("xen: generate hyper

[xen-unstable-smoke test] 171590: tolerable all pass - PUSHED

2022-07-12 Thread osstest service owner
flight 171590 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/171590/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[libvirt test] 171589: regressions - FAIL

2022-07-12 Thread osstest service owner
flight 171589 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/171589/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 151777 build-arm64-libvirt

Re: [PATCH v2 1/9] xen/x86: introduce a helper to update memory hotplug end

2022-07-12 Thread Jan Beulich
On 08.07.2022 16:54, Wei Chen wrote: > x86 provides a mem_hotplug variable to maintain the memory hotplug > end address. We want to move some codes from x86 to common, so that > it can be reused by other architectures. But not all architectures > have supported memory hotplug. So in this patch, we

[PATCH v2] xen/build: remove unneeded enumeration in clean-files of xen/include/Makefile

2022-07-12 Thread Juergen Gross
Enumerating a file from $(targets) in $(clean-files) isn't needed. Remove hypercall-defs.h and headers*.chk from $(clean-files) in xen/include/Makefile. Reported-by: Jan Beulich Fixes: eca1f00d0227 ("xen: generate hypercall interface related code") Signed-off-by: Juergen Gross --- V2: - remove

[linux-linus test] 171587: tolerable FAIL - PUSHED

2022-07-12 Thread osstest service owner
flight 171587 linux-linus real [real] flight 171592 linux-linus real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171587/ http://logs.test-lab.xenproject.org/osstest/logs/171592/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-

[xen-unstable test] 171586: tolerable FAIL - PUSHED

2022-07-12 Thread osstest service owner
flight 171586 xen-unstable real [real] flight 171591 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/171586/ http://logs.test-lab.xenproject.org/osstest/logs/171591/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd6

Re: [PATCH v2 4/9] xen/x86: Use ASSERT instead of VIRTUAL_BUG_ON for phys_to_nid

2022-07-12 Thread Jan Beulich
On 12.07.2022 09:20, Wei Chen wrote: > Hi Jan, > >> -Original Message- >> From: Jan Beulich >> Sent: 2022年7月11日 14:32 >> To: Wei Chen >> Cc: nd ; Andrew Cooper ; George >> Dunlap ; Julien Grall ; Stefano >> Stabellini ; Wei Liu ; Jiamei Xie >> ; xen-devel@lists.xenproject.org >> Subject:

RE: [PATCH v2 4/9] xen/x86: Use ASSERT instead of VIRTUAL_BUG_ON for phys_to_nid

2022-07-12 Thread Wei Chen
Hi Jan, > -Original Message- > From: Jan Beulich > Sent: 2022年7月11日 14:32 > To: Wei Chen > Cc: nd ; Andrew Cooper ; George > Dunlap ; Julien Grall ; Stefano > Stabellini ; Wei Liu ; Jiamei Xie > ; xen-devel@lists.xenproject.org > Subject: Re: [PATCH v2 4/9] xen/x86: Use ASSERT instead of

Re: [PATCH] xl: relax freemem()'s retry calculation

2022-07-12 Thread Jan Beulich
On 12.07.2022 09:01, Jan Beulich wrote: > On 11.07.2022 18:21, Anthony PERARD wrote: >> On Fri, Jul 08, 2022 at 03:39:38PM +0200, Jan Beulich wrote: >>> While in principle possible also under other conditions as long as other >>> parallel operations potentially consuming memory aren't "locked out",

Re: [PATCH] xl: relax freemem()'s retry calculation

2022-07-12 Thread Jan Beulich
On 11.07.2022 18:21, Anthony PERARD wrote: > On Fri, Jul 08, 2022 at 03:39:38PM +0200, Jan Beulich wrote: >> While in principle possible also under other conditions as long as other >> parallel operations potentially consuming memory aren't "locked out", in >> particular with IOMMU large page mappi