23.08.2017 18:27, Liang Yan wrote:
> It may be better to add a trace event to monitor the last moment of
> a key event from QEMU to guest VM
The patch looks okay, hopefully it is also useful - I haven't dealt with
xen and with keys it sends to a guest :)
Applied to -trivial, thanks!
/mjt
__
This run is configured for baseline tests only.
flight 72103 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72103/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) bloc
On 13/09/17 18:20, Boris Ostrovsky wrote:
> On 09/13/2017 10:45 AM, Juergen Gross wrote:
>> On 13/09/17 15:50, Boris Ostrovsky wrote:
>>> On 09/13/2017 09:38 AM, Juergen Gross wrote:
On 13/09/17 15:22, Boris Ostrovsky wrote:
> On 09/12/2017 02:18 PM, Juergen Gross wrote:
>> On 12/09/17
Hi, Alexey,
Have you submitted the patches? If yes, could you please share the link?
Thanks,
Sun Yi
On 17-06-30 06:03:51, Alexey G wrote:
> Hi,
>
> > I saw Anthony's patch, but your extension patch seems still in
> > development. Do you have plan to upstream it? I'm also interested in
> > this
flight 113438 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113438/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 15 guest-saverestore.2 fail REGR. vs.
113384
Test
The recent changes to their handling introduced a few false warnings,
due to checks looking at the wrong string slot. While going through all
those commits and looking for patterns similar to the "dom0_mem=" I've
noticed this with, I also realized that there were other issues with
"dom0_nodes=" and
On Thu, Sep 14, 2017 at 09:45:37AM +0800, Kangjie Xi wrote:
> 2017-09-13 17:24 GMT+08:00 Wei Liu :
> > On Wed, Sep 13, 2017 at 04:25:17PM +0800, Kangjie Xi wrote:
> >> Hi,
> >>
> >> I created a Ubuntu-17.04-x64 PVHVM DomU, so I can use "xl
> >> network-attach/detach" to add/delete network interface
On Wed, Sep 13, 2017 at 6:10 PM, George Dunlap wrote:
> On Wed, Jun 21, 2017 at 1:01 PM, Jan Beulich wrote:
>> Note that this avoids emulating the behavior of VCVTPS2PH found on at
>> least some Intel CPUs, which update MXCSR even when the memory write
>> faults.
>>
>> Signed-off-by: Jan Beulich
On 14/09/17 10:57, Jan Beulich wrote:
> The recent changes to their handling introduced a few false warnings,
> due to checks looking at the wrong string slot. While going through all
> those commits and looking for patterns similar to the "dom0_mem=" I've
> noticed this with, I also realized that
>>> On 13.09.17 at 17:55, wrote:
> On Tue, Sep 05, 2017 at 08:57:54AM -0600, Jan Beulich wrote:
>> >>> On 14.08.17 at 16:28, wrote:
>> > --- a/xen/arch/x86/physdev.c
>> > +++ b/xen/arch/x86/physdev.c
>> > @@ -559,6 +559,15 @@ ret_t do_physdev_op(int cmd,
>> > XEN_GUEST_HANDLE_PARAM(void) arg)
>>
>>> On 12.09.17 at 02:45, wrote:
> --- a/xen/include/public/sysctl.h
> +++ b/xen/include/public/sysctl.h
> @@ -538,7 +538,34 @@ struct xen_sysctl_numainfo {
> typedef struct xen_sysctl_numainfo xen_sysctl_numainfo_t;
> DEFINE_XEN_GUEST_HANDLE(xen_sysctl_numainfo_t);
>
> +struct xen_sysctl_cred
Hi,
CC Anthony. It sounds like the latest ovmf build is broken.
Cheers,
On 11/09/17 08:21, osstest service owner wrote:
branch xen-unstable
xenbranch xen-unstable
job build-amd64-xsm
testid xen-build
Tree: ovmf https://github.com/tianocore/edk2.git
Tree: qemu git://xenbits.xen.org/qemu-xen-tr
On Thu, Sep 07, 2017 at 09:29:41AM -0600, Jan Beulich wrote:
> >>> On 14.08.17 at 16:28, wrote:
> > +int vpci_msi_arch_enable(struct vpci_arch_msi *arch, struct pci_dev *pdev,
> > + uint64_t address, uint32_t data, unsigned int
> > vectors)
> > +{
> > +struct msi_info
>>> On 14.09.17 at 10:49, wrote:
> flight 113438 xen-unstable-smoke real [real]
> http://logs.test-lab.xenproject.org/osstest/logs/113438/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> test-amd64-amd64-xl-qemuu-debianhvm-i386
On Thu, Sep 14, 2017 at 04:14:29AM -0600, Jan Beulich wrote:
> >>> On 14.09.17 at 10:49, wrote:
> > flight 113438 xen-unstable-smoke real [real]
> > http://logs.test-lab.xenproject.org/osstest/logs/113438/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are blocking,
> > includi
On Thu, Sep 14, 2017 at 11:17:23AM +0100, Wei Liu wrote:
> On Thu, Sep 14, 2017 at 04:14:29AM -0600, Jan Beulich wrote:
> > >>> On 14.09.17 at 10:49, wrote:
> > > flight 113438 xen-unstable-smoke real [real]
> > > http://logs.test-lab.xenproject.org/osstest/logs/113438/
> > >
> > > Regressions :
>>> On 14.09.17 at 12:08, wrote:
> On Thu, Sep 07, 2017 at 09:29:41AM -0600, Jan Beulich wrote:
>> >>> On 14.08.17 at 16:28, wrote:
>> > +int vpci_msi_arch_enable(struct vpci_arch_msi *arch, struct pci_dev *pdev,
>> > + uint64_t address, uint32_t data, unsigned int
>> > v
flight 113405 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113405/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qcow2 19 guest-start/debian.repeat fail REGR. vs. 113353
build-armhf-pvops
>>> On 14.09.17 at 11:13, wrote:
> I see now -- you're using a construct that is common all over the code.
>
> I think the construct could probably use changing, but currently for
> readability it's probably better to follow suit.
Perhaps, though at the time I couldn't think of anything that wou
>>> On 14.09.17 at 12:19, wrote:
> On Thu, Sep 14, 2017 at 11:17:23AM +0100, Wei Liu wrote:
>> On Thu, Sep 14, 2017 at 04:14:29AM -0600, Jan Beulich wrote:
>> > >>> On 14.09.17 at 10:49, wrote:
>> > > flight 113438 xen-unstable-smoke real [real]
>> > > http://logs.test-lab.xenproject.org/osstest/
On Thu, Sep 14, 2017 at 04:29:14AM -0600, Jan Beulich wrote:
> >>> On 14.09.17 at 12:19, wrote:
> > On Thu, Sep 14, 2017 at 11:17:23AM +0100, Wei Liu wrote:
> >> On Thu, Sep 14, 2017 at 04:14:29AM -0600, Jan Beulich wrote:
> >> > >>> On 14.09.17 at 10:49, wrote:
> >> > > flight 113438 xen-unstabl
Hi,
CC Juergen, Boris and Stefano.
On 08/09/17 18:24, Tycho Andersen wrote:
On Fri, Sep 08, 2017 at 12:53:47AM -0700, Christoph Hellwig wrote:
+/*
+ * Lookup the page table entry for a virtual address and return a pointer to
+ * the entry. Based on x86 tree.
+ */
+static pte_t *lookup_address(
On Thu, Sep 14, 2017 at 04:19:44AM -0600, Jan Beulich wrote:
> >>> On 14.09.17 at 12:08, wrote:
> > On Thu, Sep 07, 2017 at 09:29:41AM -0600, Jan Beulich wrote:
> >> >>> On 14.08.17 at 16:28, wrote:
> >> > +int vpci_msi_arch_enable(struct vpci_arch_msi *arch, struct pci_dev
> >> > *pdev,
> >> >
Hi all,
A quick reminder, the last posting date for Xen 4.10 is tomorrow
(September 15).
Cheers,
On 07/09/17 09:22, Wei Liu wrote:
Hi all,
The last posting date for Xen 4.10 is September 15. If you want your
features to be included for the release, please make sure they are
posted for the f
Hi Paul,
On 13/09/17 19:26, Paul Durrant wrote:
-Original Message-
From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of
Julien Grall
Sent: 13 September 2017 10:52
To: Ian Jackson ; Jan Beuli ch
Cc: Juergen Gross ; Wei Liu ;
ross.philip...@gmail.com; lars.kurth@gmail
>>> On 14.09.17 at 12:42, wrote:
> On Thu, Sep 14, 2017 at 04:19:44AM -0600, Jan Beulich wrote:
>> >>> On 14.09.17 at 12:08, wrote:
>> > On Thu, Sep 07, 2017 at 09:29:41AM -0600, Jan Beulich wrote:
>> >> >>> On 14.08.17 at 16:28, wrote:
>> >> > +int vpci_msi_arch_enable(struct vpci_arch_msi *arc
flight 113440 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113440/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 15 guest-saverestore.2 fail REGR. vs.
113384
Test
Hi Manish,
On 05/09/17 18:14, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
add_to_host_its_list will update the host_its_list. This common
function to be invoked from gicv3_its_dt_init and gic_v3_its_acpi_probe.
Signed-off-by: Manish Jaggi
---
xen/arch/arm/gic-v3-its.c | 32
On 07/09/17 17:56, Andre Przywara wrote:
Hi,
Hi Andre,
On 05/09/17 18:14, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Added gicv3_its_acpi_init to update host_its_list from MADT table.
For ACPI, host_its structure stores dt_node as NULL.
Signed-off-by: Manish Jaggi
---
xen/a
Hi Manish,
On 05/09/17 18:14, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
Added gicv3_its_acpi_init to update host_its_list from MADT table.
For ACPI, host_its structure stores dt_node as NULL.
Signed-off-by: Manish Jaggi
---
xen/arch/arm/gic-v3-its.c| 26 +
On 07/09/17 17:57, Andre Przywara wrote:
Hi,
Hi,
On 05/09/17 18:14, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
This patch extends the gicv3_iomem_deny_access functionality by adding
support for ITS region as well. Add function gicv3_its_deny_access.
Signed-off-by: Manish Jaggi
-
flight 113418 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113418/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-xsm6 xen-buildfail REGR. vs. 113143
build-amd64-xsm
On Thu, Sep 14, 2017 at 11:04:26AM +0100, Julien Grall wrote:
> Hi,
>
> CC Anthony. It sounds like the latest ovmf build is broken.
Thanks,
This is probably fixed by 5afa5b815936e2b45a375b6521764195bed68680, not
yet tested. At least, it build on my machine.
Regards,
--
Anthony PERARD
___
Hi,
On 05/09/17 18:14, mja...@caviumnetworks.com wrote:
From: Manish Jaggi
estimate_acpi_efi_size needs to be updated to provide correct size of
hardware domains MADT, which now adds ITS information as well.
Introducing gic_get_hwdom_madt_size.
Signed-off-by: Manish Jaggi
---
xen/arch/arm
On 14/09/17 12:41, Julien Grall wrote:
> Hi,
>
> CC Juergen, Boris and Stefano.
>
> On 08/09/17 18:24, Tycho Andersen wrote:
>> On Fri, Sep 08, 2017 at 12:53:47AM -0700, Christoph Hellwig wrote:
+/*
+ * Lookup the page table entry for a virtual address and return a
pointer to
Hi Konrad,
On 12/09/17 01:37, Konrad Rzeszutek Wilk wrote:
The ARM 32&64 ELF specification says "sections containing ARM
code must be at least 32-bit aligned." This patch adds the
check for that. We also make sure that this check is done
when doing relocations for the types that are considered
A
On Thu, Sep 14, 2017 at 04:50:10AM -0600, Jan Beulich wrote:
> >>> On 14.09.17 at 12:42, wrote:
> > On Thu, Sep 14, 2017 at 04:19:44AM -0600, Jan Beulich wrote:
> >> >>> On 14.09.17 at 12:08, wrote:
> >> > On Thu, Sep 07, 2017 at 09:29:41AM -0600, Jan Beulich wrote:
> >> >> >>> On 14.08.17 at 16:
>>> On 14.09.17 at 13:35, wrote:
> On Thu, Sep 14, 2017 at 04:50:10AM -0600, Jan Beulich wrote:
>> >>> On 14.09.17 at 12:42, wrote:
>> > On Thu, Sep 14, 2017 at 04:19:44AM -0600, Jan Beulich wrote:
>> >> >>> On 14.09.17 at 12:08, wrote:
>> >> > On Thu, Sep 07, 2017 at 09:29:41AM -0600, Jan Beuli
Hi Konrad,
On 12/09/17 01:37, Konrad Rzeszutek Wilk wrote:
By default when using objcopy we lose the alignment when we copy it from
xen-syms -
with the result that alignment (on ARM32 for example) can be 1:
[Nr] Name TypeAddr OffSize ES Flg Lk Inf
Al
..
xenbus_client.c contains some functions specific for pv guests.
Enclose them with #ifdef CONFIG_XEN_PV to avoid compiling them when
they are not needed (e.g. on ARM).
Signed-off-by: Juergen Gross
---
drivers/xen/xenbus/xenbus_client.c | 130 +++--
1 file changed,
This series is rather different from v4 because of two things:
1. The staging branch has changed a lot.
2. Try to export stuff via local header where appropriate.
The end result is x86/mm.c goes from 6341 lines to 2930 lines, which means more
than half of the files is moved.
This series can be f
Move the code to pv/grant_table.c. Nothing needs to be done with
regard to headers.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 283
xen/arch/x86/pv/Makefile | 1 +
xen/arch/x86/pv/grant_table.c | 327
Mkae it static inline. It well be used by map_ldt_shadow_page and ro
page fault emulation code later.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 18 +-
xen/arch/x86/pv/mm.h | 21 +
2 files changed, 22 insertions(+), 17 deletions(-)
create mode 100644 x
It will be used later in multiple files.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 16
xen/include/asm-x86/mm.h | 14 ++
2 files changed, 14 insertions(+), 16 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 8d2a4682c9..faa161b767 10
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 1 -
1 file changed, 1 deletion(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index cc0a7cab41..e77abb015b 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -126,7 +126,6 @@
#include
#include
-#include "pv/emulate.h"
#include
Unfortunately they can't stay local to PV code because domain.c still
needs them. Change their names and fix up call sites. The code will be
moved later together with other descriptor table manipulation code.
Also move the declarations to pv/mm.h and provide stubs.
Signed-off-by: Wei Liu
---
xe
And export the function via pv/mm.h.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 29
xen/arch/x86/pv/Makefile | 1 +
xen/arch/x86/pv/mm.c | 69
xen/arch/x86/pv/mm.h | 2 ++
4 files changed, 72 insertions(+)
Move the code to pv/ro-page-fault.c. Create a new header file
asm-x86/pv/mm.h and move the declaration of pv_ro_page_fault there.
Include the new header file in traps.c.
Fix some coding style issues. The prefixes (ptwr and mmio) are
retained because there are two sets of emulation code in the sam
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 57 ---
xen/arch/x86/pv/mm.h | 62
2 files changed, 62 insertions(+), 57 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 504a0a
On Thu, 2017-09-14 at 08:42 +0200, Juergen Gross wrote:
> > --- a/tools/libxc/include/xenctrl.h
> > +++ b/tools/libxc/include/xenctrl.h
> > @@ -1077,17 +1077,21 @@ typedef struct xc_cpupoolinfo {
> >
> > #define XC_CPUPOOL_POOLID_ANY 0x
> >
> > +typedef xen_sysctl_sched_param_t xc_sche
While at it, change the type of preserve_ad to bool. Also move
UPDATE_ENTRY there.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 65
xen/arch/x86/pv/mm.h | 65
2 files changed, 65 inser
Hi Konrad,
On 12/09/17 01:37, Konrad Rzeszutek Wilk wrote:
This was found when porting livepatch-build-tools to ARM64/32.
When livepatch-build-tools are built (and test-case thanks to:
livepatch/tests: Make sure all .livepatch.funcs sections are read-only)
the .livepatch.funcs are in read-only
Hi Konrad,
On 12/09/17 01:37, Konrad Rzeszutek Wilk wrote:
diff --git a/xen/include/xen/livepatch.h b/xen/include/xen/livepatch.h
index 1659ffcdf0..065c1a323a 100644
--- a/xen/include/xen/livepatch.h
+++ b/xen/include/xen/livepatch.h
@@ -117,11 +117,10 @@ extern struct livepatch_vmap_stash livep
flight 113408 xen-4.5-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113408/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-winxpsp3 16 guest-localmigrate/x10 fail REGR. vs.
112854
Tests which
It is only used by PV. The code can only be moved together with other
PV mm code.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/emul-priv-op.c | 1 +
xen/arch/x86/pv/mm.h | 2 ++
xen/include/asm-x86/mm.h | 1 -
3 files changed, 3 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x
Also move new_guest_cr3 there so that we don't have to export
mod_l1_entry.
Fix coding style issues. Change v to curr, d to currd and u64 to
uint64_t where appropriate.
Signed-off-by: Wei Liu
---
I can't convince git diff to produce sensible diff for donate_page and
steal_page. Those functions a
Move the code to pv/mm.c. Export pv_arch_init_memory via global
pv/mm.h and init_guest_l4_table via local pv/mm.h.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 82 +---
xen/arch/x86/pv/dom0_build.c | 2 ++
xen/arch/x86/pv/domain.c | 5 ++
It is going to be needed by common x86 mm code and pv mm code.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 2 +-
xen/include/asm-x86/mm.h | 1 +
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index f9cc5a0f6f..c3a26fe03d 100644
--- a
A load of functions are moved:
1. {get,put}_page_from_l{2,3,4}e
2. pv_{alloc,free}_page_type
3. all helpers for the above
The l1e functions can't be moved because they are needed by shadow
code as well.
Fix coding style issues while moving.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 79
Move the code to pv/descriptor-tables.c. Change u64 to uint64_t while
moving. Use currd in do_update_descriptor.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 155 -
xen/arch/x86/pv/Makefile| 1 +
xen/arch/x86/pv/descriptor-tables.c |
And move the declarations to pv/mm.h. The code will be moved later.
The stubs contain BUG() because they aren't supposed to be called when
PV is disabled.
Signed-off-by: Wei Liu
---
xen/arch/x86/domain.c | 2 +-
xen/arch/x86/mm.c | 14 +++---
xen/include/asm-x86/mm.h
The l1 mask needs to stay in x86/mm.c while l{2,3,4} masks are only
needed by PV code. Both x86 common mm code and PV mm code use
base_disallow_mask and l1 maks.
Export base_disallow_mask and l1 mask in asm-x86/mm.h.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 12 +---
xen/inc
It is needed by common mm code and pv code. Move it to pv/mm.c. Export
it via asm-x86/pv/mm.h. Use bool for flush parameter while moving.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 44
xen/arch/x86/pv/mm.c| 35 +++
[Trimming the Cc-list a bit]
On Tue, 2017-09-12 at 01:45 +0100, anshulmakkar wrote:
> libxc receives scheduler specific configuration parametes from
> libxl.
>
> Signed-off-by: Anshul Makkar
>
Apart from what Juergen said (including the thing that the series won't
compile with this patch at the
They will be used by PV mm code and mm hypercall code, which is going
to be split into two files.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c| 30 +++---
xen/arch/x86/pv/mm.h | 21 +
2 files changed, 32 insertions(+), 19 deletions(-)
diff --git a
Move the split l4 setup code into the new function. It can then be
moved to pv/ in a later patch.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 73 ++-
1 file changed, 40 insertions(+), 33 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arc
Move them alongside the non-compat variants.
Change u{32,64} to uint{32,64}_t while moving.
Signed-off-by: Wei Liu
---
xen/arch/x86/pv/descriptor-tables.c | 40 +
xen/arch/x86/x86_64/compat/mm.c | 39
2 files changed,
Add pv prefix to it. Move it to pv/mm.c. Fix call sites.
Take the chance to change v to curr and d to currd.
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 73 ---
xen/arch/x86/pv/mm.c| 75 +
x
Signed-off-by: Wei Liu
---
xen/arch/x86/mm.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index 2ffcc53c6c..de66a5272c 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -127,8 +127,6 @@
#include
#include
-#include "pv/mm.h"
-
/* Overrid
flight 113442 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/113442/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 15 guest-saverestore.2 fail REGR. vs.
113384
Test
flight 72105 distros-debian-wheezy real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72105/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
build-arm64 2 hosts-allocate broken like 72071
build-arm64-pvops
Hi Konrad,
On 12/09/17 01:37, Konrad Rzeszutek Wilk wrote:
Under ARM64 the vmap calls were all done with IRQs disabled which
didn't trip the spinlock debug check (as seen on x86):
Well, I think it does not happen because spin_debug_enable() is never
called on ARM at boot. So atomic_read(&spin
Hi Konrad,
On 12/09/17 01:37, Konrad Rzeszutek Wilk wrote:
With this change we can use _do_page_walk() to implement
arch_livepatch_lookup_mfn() which can be used to find out
vmap virtual addresses (as under x86 virt_to_mfn won't work
for vmap, but it does for arm!).
The reason is on ARM, virt_
This run is configured for baseline tests only.
flight 72104 xen-4.6-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/72104/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-xtf-amd64-amd64-521 xtf/test-hvm32-
On 09/14/2017 08:38 AM, Juergen Gross wrote:
> xenbus_client.c contains some functions specific for pv guests.
> Enclose them with #ifdef CONFIG_XEN_PV to avoid compiling them when
> they are not needed (e.g. on ARM).
>
> Signed-off-by: Juergen Gross
> ---
> drivers/xen/xenbus/xenbus_client.c | 1
On 14/09/17 16:00, Boris Ostrovsky wrote:
> On 09/14/2017 08:38 AM, Juergen Gross wrote:
>> xenbus_client.c contains some functions specific for pv guests.
>> Enclose them with #ifdef CONFIG_XEN_PV to avoid compiling them when
>> they are not needed (e.g. on ARM).
>>
>> Signed-off-by: Juergen Gross
>> Did you make any changes in xenbus_map_ring_valloc_pv()? I don't see any
>> but the diff looks pretty big --- I'd expect only the preprocessor
>> directives to show up.
> I moved the functions to require only one #ifdef (plus 1 for setting
> the pv variants).
Oh, OK, I didn't notice that.
Rev
On Tue, 2017-09-12 at 01:45 +0100, anshulmakkar wrote:
> --- a/xen/common/cpupool.c
> +++ b/xen/common/cpupool.c
> @@ -129,12 +129,13 @@ void cpupool_put(struct cpupool *pool)
> * - unknown scheduler
> */
> static struct cpupool *cpupool_create(
> -int poolid, unsigned int sched_id, int *p
On Wed, Aug 02, 2017 at 04:36:34PM +0100, Anthony PERARD wrote:
> Hi,
>
> I've just pushed QEMU v2.9.0 to our qemu-xen tree.
And now, v2.10 is in our tree.
--
Anthony PERARD
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen
On Wed, Sep 13, 2017 at 4:44 PM, Wei Liu wrote:
> The two functions, unlike a lot others, were hand-coded. They were
> deleted by accident while the device framework was reworked. Add them
> back.
>
> Reported-by: Andrew Cooper
> Signed-off-by: Wei Liu
> ---
> Cc: Ian Jackson
> Cc: Oleksandr Gr
On Thu, Sep 14, 2017 at 05:27:07PM +0300, Oleksandr Grytsov wrote:
>
> I've removed these functions as they weren't used. For proper removing
> they should be removed from header as well.
> If they are required by some extern application could they use generic
> async function to add vkb and vfb a
> -Original Message-
> From: Julien Grall [mailto:julien.gr...@arm.com]
> Sent: 14 September 2017 03:49
> To: Paul Durrant ; Ian Jackson
> ; Jan Beuli ch
> Cc: Juergen Gross ; Wei Liu ;
> ross.philip...@gmail.com; lars.kurth@gmail.com; xen-
> de...@lists.xen.org; committ...@xenproject.
On 13 Sep 2017, at 17:13, Samuel Thibault wrote:
>
> Hello,
>
> Anil Madhavapeddy, on mer. 13 sept. 2017 11:11:03 +0100, wrote:
>> Maintaining a forked MiniOS has been a multi-year source of a maintenance
>> burden for MirageOS,
>
> I'm just wondering why this happened?
>
> The mini-os reposi
Hello,
Anil Madhavapeddy, on jeu. 14 sept. 2017 15:38:54 +0100, wrote:
> On 13 Sep 2017, at 17:13, Samuel Thibault
> wrote:
> > Anil Madhavapeddy, on mer. 13 sept. 2017 11:11:03 +0100, wrote:
> >> Maintaining a forked MiniOS has been a multi-year source of a maintenance
> >> burden for MirageOS
01: support remaining AVX insns
02: re-order cases of main switch statement
03: build SIMD tests with -Os
04: support F16C insns
05: support FMA4 insns
06: support FMA insns
07: support most remaining AVX2 insns
08: fold/eliminate some local variables
09: support AVX2 gather insns
10: add tables fo
On gcc 4.4.4:
mm.c: In function ‘create_grant_pv_mapping’:
mm.c:3839: error: ‘ol1e.l1’ may be used uninitialized in this function
While ol1e would not be used uninitialized (because rc needs to be properly
set) we have to accommodate these older compliers.
Signed-off-by: Boris Ostrovsky
---
xe
>>> On 14.09.17 at 16:59, wrote:
> On gcc 4.4.4:
>
> mm.c: In function ‘create_grant_pv_mapping’:
> mm.c:3839: error: ‘ol1e.l1’ may be used uninitialized in this function
>
> While ol1e would not be used uninitialized (because rc needs to be properly
> set) we have to accommodate these older com
I.e. those not being equivalents of SSEn ones.
There's one necessary change to generic code: Faulting behavior of
VMASKMOVP{S,D} requires us to do partial reads/writes.
Signed-off-by: Jan Beulich
---
v2: Move vpmaskmov{d,q} handling to AVX2 patch.
--- a/.gitignore
+++ b/.gitignore
@@ -224,7 +22
Specifically in the context of putting together subsequent patches I've
noticed that together with the touch() macro using -Os further
increases the chances of the compiler using memory operands for the
instructions we actually care to test.
Signed-off-by: Jan Beulich
Reviewed-by: George Dunlap
Re-store intended numerical ordering, which has become "violated"
mostly by incremental additions where moving around bigger chunks did
not seem advisable. One exception though at the very top of the
switch(): Keeping the arithmetic ops together seems preferable over
entirely strict ordering.
Addi
On 09/14/2017 11:11 AM, Jan Beulich wrote:
On 14.09.17 at 16:59, wrote:
>> On gcc 4.4.4:
>>
>> mm.c: In function ‘create_grant_pv_mapping’:
>> mm.c:3839: error: ‘ol1e.l1’ may be used uninitialized in this function
>>
>> While ol1e would not be used uninitialized (because rc needs to be proper
Note that this avoids emulating the behavior of VCVTPS2PH found on at
least some Intel CPUs, which update MXCSR even when the memory write
faults.
Signed-off-by: Jan Beulich
--- a/tools/tests/x86_emulator/test_x86_emulator.c
+++ b/tools/tests/x86_emulator/test_x86_emulator.c
@@ -3053,6 +3053,47
Signed-off-by: Jan Beulich
--- a/tools/tests/x86_emulator/Makefile
+++ b/tools/tests/x86_emulator/Makefile
@@ -12,7 +12,7 @@ run: $(TARGET)
./$(TARGET)
SIMD := sse sse2 sse4 avx
-FMA := fma4
+FMA := fma4 fma
TESTCASES := blowfish $(SIMD) sse2-avx sse4-avx $(FMA)
blowfish-cflags :=
Signed-off-by: Jan Beulich
--- a/.gitignore
+++ b/.gitignore
@@ -226,6 +226,7 @@
tools/tests/x86_emulator/asm
tools/tests/x86_emulator/avx*.[ch]
tools/tests/x86_emulator/blowfish.h
+tools/tests/x86_emulator/fma*.[ch]
tools/tests/x86_emulator/sse*.[ch]
tools/tests/x86_emulator/test_x86_emulat
I.e. those not being equivalents of SSEn ones, but with the exception
of the various gather operations.
Signed-off-by: Jan Beulich
---
v2: Add all vpmaskmov{d,q} handling here.
--- a/tools/tests/x86_emulator/Makefile
+++ b/tools/tests/x86_emulator/Makefile
@@ -11,9 +11,9 @@ all: $(TARGET)
run:
Make i switch-wide (at once making it unsigned, as it should have been)
and introduce n (for immediate use in enter and aam/aad handling).
Eliminate on-stack arrays in pusha/popa handling. Use ea.val instead of
a custom variable in bound handling.
No (intended) functional change.
Signed-off-by: J
Convert the few existing opcodes so far supported.
Also adjust two vex_* case labels to better be ext_* (the values are
identical).
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -458,6 +458,20 @@ static const opcode_desc_
Signed-off-by: Jan Beulich
--- a/tools/tests/x86_emulator/Makefile
+++ b/tools/tests/x86_emulator/Makefile
@@ -13,7 +13,8 @@ run: $(TARGET)
SIMD := sse sse2 sse4 avx avx2
FMA := fma4 fma
-TESTCASES := blowfish $(SIMD) $(FMA)
+SG := avx2-sg
+TESTCASES := blowfish $(SIMD) $(FMA) $(SG)
blowfi
Signed-off-by: Jan Beulich
--- a/.gitignore
+++ b/.gitignore
@@ -230,6 +230,7 @@
tools/tests/x86_emulator/sse*.[ch]
tools/tests/x86_emulator/test_x86_emulator
tools/tests/x86_emulator/x86_emulate
+tools/tests/x86_emulator/xop*.[ch]
tools/tests/xen-access/xen-access
tools/tests/xenstore/xs-te
Yes, recent AMD CPUs don't support them anymore, but I think we should
nevertheless cope.
Signed-off-by: Jan Beulich
--- a/.gitignore
+++ b/.gitignore
@@ -223,6 +223,7 @@
tools/security/xensec_tool
tools/tests/x86_emulator/*.bin
tools/tests/x86_emulator/*.tmp
+tools/tests/x86_emulator/3dnow*.
1 - 100 of 168 matches
Mail list logo