>>> On 23.05.19 at 18:15, wrote:
> On 15/03/2019 10:55, Jan Beulich wrote:
>> Also include the only other AVX512ER insn pair, VEXP2P{D,S}.
>>
>> Note that despite the replacement of the SHA insns' table slots there's
>> no need to special case their decoding: Their insn-specific code already
>> se
>>> On 24.05.19 at 07:41, wrote:
> On 22/05/2019 12:10, Jan Beulich wrote:
> On 22.05.19 at 11:45, wrote:
>>> --- a/xen/arch/x86/hvm/hvm.c
>>> +++ b/xen/arch/x86/hvm/hvm.c
>>> @@ -3185,22 +3185,6 @@ static enum hvm_translation_result __hvm_copy(
>>>
>>> ASSERT(is_hvm_vcpu(v));
>>>
>>
flight 136739 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/136739/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl 7 xen-boot fail REGR. vs. 136249
Tests which did not s
On 22/05/2019 12:10, Jan Beulich wrote:
On 22.05.19 at 11:45, wrote:
>> --- a/xen/arch/x86/hvm/hvm.c
>> +++ b/xen/arch/x86/hvm/hvm.c
>> @@ -3185,22 +3185,6 @@ static enum hvm_translation_result __hvm_copy(
>>
>> ASSERT(is_hvm_vcpu(v));
>>
>> -/*
>> - * XXX Disable for 4.1.0:
Hi,
I met some python related issues when building Xen on RedHat8.0.
On RedHat8.0, the default python version is python3, and I found Xen has some
python2 codes, so I tried to build xen using python2.
On RedHat8.0, no "python", just "python2" and "python3":
ls /usr/bin/python*
/usr/bin/python2
flight 136726 linux-3.18 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/136726/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-credit2 7 xen-boot fail REGR. vs. 128858
test-amd64-i386-xl-q
flight 136728 xen-4.12-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/136728/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qcow217 guest-localmigrate/x10 fail like 136233
test-amd64-amd64-libvirt 13
flight 136732 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/136732/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-prev 6 xen-buildfail REGR. vs. 130965
build-i386-prev
Following the recent discussion, we had on IRC and the action I had in
the March community call, this file provides a file format that
enables writing an automated test to check whether files are out of sync.
Once the file format is agree, I will write a test or script.
I also need some more c
Instead of ignoring xen.lds and asm-offsets.s for every specific arch,
let's instead just use gitignore's wildcard feature to ignore them for
all archs.
Signed-off-by: Alistair Francis
---
.gitignore | 6 ++
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/.gitignore b/.gitignor
flight 136859 examine real [real]
http://logs.test-lab.xenproject.org/osstest/logs/136859/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
examine-rimava1 2 hosts-allocate starved n/a
examine-rochester02 hosts-allocate
flight 136860 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/136860/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 15/03/2019 10:55, Jan Beulich wrote:
> Also include the only other AVX512ER insn pair, VEXP2P{D,S}.
>
> Note that despite the replacement of the SHA insns' table slots there's
> no need to special case their decoding: Their insn-specific code already
> sets op_bytes (as was required due to simd_
On 15/03/2019 10:54, Jan Beulich wrote:
> Signed-off-by: Jan Beulich
With the identified issue fixed, Acked-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On 21/05/2019 16:46, Jan Beulich wrote:
On 21.05.19 at 13:33, wrote:
>> On 15/03/2019 10:47, Jan Beulich wrote:
>>> @@ -9312,7 +9386,8 @@ x86_emulate(
>>>
>>> if ( ea.type == OP_MEM )
>>> {
>>> -rc = ops->write(ea.mem.seg, ea.mem.off, mmvalp, 8 << vex.l,
>>> c
flight 136703 linux-4.14 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/136703/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-examine11 examine-serial/bootloader fail REGR. vs. 136503
Tests which did not
>>> On 10.05.19 at 18:10, wrote:
> --- a/xen/arch/x86/hvm/vmsi.c
> +++ b/xen/arch/x86/hvm/vmsi.c
> @@ -688,8 +688,8 @@ static int vpci_msi_update(const struct pci_dev *pdev,
> uint32_t data,
> {
> gdprintk(XENLOG_ERR,
> "%04x:%02x:%02x.%u: failed to bin
>>> On 23.05.19 at 17:20, wrote:
> On Thu, May 23, 2019 at 02:57:49AM -0600, Jan Beulich wrote:
>> >>> On 22.05.19 at 20:10, wrote:
>> > DSDT for qemu-xen lacks _STA method of PCI slot object. If _STA method
>> > doesn't exist then the slot is assumed to be always present and active
>> > which in
On Thu, May 23, 2019 at 02:57:49AM -0600, Jan Beulich wrote:
> >>> On 22.05.19 at 20:10, wrote:
> > DSDT for qemu-xen lacks _STA method of PCI slot object. If _STA method
> > doesn't exist then the slot is assumed to be always present and active
> > which in conjunction with _EJ0 method makes ever
>>> On 21.05.19 at 09:45, wrote:
> Guests can issue grant table operations and provide guest controlled
> data to them. This data is used as index for memory loads after bound
> checks have been done. Depending on the grant table version, the
> size of elements in containers differ. As the base da
On Thu, May 23, 2019 at 03:35:01PM +0100, Andrew Cooper wrote:
> On 23/05/2019 15:20, Wei Liu wrote:
> > On Thu, May 23, 2019 at 07:54:10AM -0600, Jan Beulich wrote:
> >> There are a number of pointless __packed attributes which cause gcc 9 to
> >> legitimately warn:
> >>
> >> utils.c: In function
On 23/05/2019 15:20, Wei Liu wrote:
> On Thu, May 23, 2019 at 07:54:10AM -0600, Jan Beulich wrote:
>> There are a number of pointless __packed attributes which cause gcc 9 to
>> legitimately warn:
>>
>> utils.c: In function 'vtd_dump_iommu_info':
>> utils.c:287:33: error: converting a packed 'struc
On Thu, May 23, 2019 at 07:54:10AM -0600, Jan Beulich wrote:
> There are a number of pointless __packed attributes which cause gcc 9 to
> legitimately warn:
>
> utils.c: In function 'vtd_dump_iommu_info':
> utils.c:287:33: error: converting a packed 'struct IO_APIC_route_entry'
> pointer (alignme
>>> On 21.05.19 at 09:45, wrote:
> Guests can issue grant table operations and provide guest controlled
> data to them. This data is used as index for memory loads after bound
> checks have been done. To avoid speculative out-of-bound accesses, we
> use the array_index_nospec macro where applicabl
>>> On 21.05.19 at 09:45, wrote:
> Guests can issue grant table operations and provide guest controlled
> data to them. This data is used for memory loads in helper functions
> and macros. To avoid speculative out-of-bound accesses, we use the
> array_index_nospec macro where applicable, or the bl
There are a number of pointless __packed attributes which cause gcc 9 to
legitimately warn:
utils.c: In function 'vtd_dump_iommu_info':
utils.c:287:33: error: converting a packed 'struct IO_APIC_route_entry' pointer
(alignment 1) to a 'struct IO_APIC_route_remap_entry' pointer (alignment 8) may
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl-qcow2
testid debian-di-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/qemu-xen-traditional.git
Tree: qemuu git://xenbi
>>> On 20.05.19 at 12:18, wrote:
> We currently have an asymmetric setup where CONFIG_VERBOSE_DEBUG controls
> extra diagnostics for a PV dom0, and opt_dom0_verbose controls extra
> diagnostics for a PVH dom0.
>
> Default opt_dom0_verbose to CONFIG_VERBOSE_DEBUG and use opt_dom0_verbose
> consist
flight 136692 xen-4.10-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/136692/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qcow217 guest-localmigrate/x10 fail like 135813
test-amd64-amd64-qemuu-nested-am
>>> On 20.05.19 at 12:18, wrote:
> --- a/docs/misc/xen-command-line.pandoc
> +++ b/docs/misc/xen-command-line.pandoc
> @@ -675,12 +675,16 @@ Controls for how dom0 is constructed on x86 systems.
> selected mode.
> * For a PVH dom0, the hardware must have VT-x/SVM extensions
> avail
>>> On 20.05.19 at 12:18, wrote:
> For consistency with other command line options.
>
> No functional change.
>
> Signed-off-by: Andrew Cooper
Acked-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenprojec
>>> On 20.05.19 at 12:18, wrote:
> One path in dom0_construct_pv() returns -1 unlike all other error paths.
> Switch it to returning -EINVAL.
>
> This was last modified by c/s c84481fb XSA-55, but the bug predates that
> series. However, this patch did (for no obvious reason) introduce a
> bifur
From: Ross Lagerwall
Signed-off-by: Ross Lagerwall
Make handling in do_pm_op() more homogeneous: Before interpreting
op->cpuid as such, handle all operations not acting on a particular
CPU. Also expose the setting via xenpm.
Signed-off-by: Jan Beulich
--- a/tools/libxc/xc_pm.c
+++ b/tools/li
From: Ross Lagerwall
Allow limiting the max C-state sub-state by appending to the max_cstate
command-line parameter. E.g. max_cstate=1,0
The limit only applies to the highest legal C-state. For example:
max_cstate = 1, max_csubstate = 0 ==> C0, C1 okay, but not C1E
max_cstate = 1, max_csubstate
At least for more recent CPUs, following what BKDG / PPR suggest for the
BIOS to surface via ACPI we can make ourselves independent of Dom0
uploading respective data.
Signed-off-by: Jan Beulich
---
TBD: Can we set local_apic_timer_c2_ok to true? I can't seem to find any
statement in the BKDG
For one on recent AMD CPUs entering C1 (if available at all) requires
use of MWAIT, while HLT (i.e. default_idle()) would put the processor
into as deep as CC6. And then even on other vendors' CPUs we should
avoid entering default_idle() when the intended state can be reached
by using the active id
While the MWAIT idle driver already takes it to mean an actual C state,
the ACPI idle driver so far used it as a list index. The list index,
however, is an implementation detail of Xen and affected by firmware
settings (i.e. not necessarily uniform for a particular system).
While touching this cod
>>> On 23.05.19 at 14:02, wrote:
> On 23/05/2019 12:41, Jan Beulich wrote:
> On 23.05.19 at 13:01, wrote:
>>> On 23/05/2019 11:56, Jan Beulich wrote:
>>> On 23.05.19 at 12:20, wrote:
> This also introduced the top-level Guest Documentation section.
>
> Signed-off-by: Andrew C
>>> On 23.05.19 at 13:59, wrote:
> On 23/05/2019 12:52, Jan Beulich wrote:
> On 23.05.19 at 12:27, wrote:
>>> --- a/xen/include/xen/lib/x86/cpuid.h
>>> +++ b/xen/include/xen/lib/x86/cpuid.h
>>> @@ -308,6 +308,18 @@ static inline void cpuid_featureset_to_policy(
>>> p->feat._7a1 = fs[FEA
The first patch is something I had meant to do forever since the introduction
of mwait-idle. The 2nd patch addresses a latent problem (becoming an active
one with patch 3) in C-state selection when actually entering an idle state.
The 3rd patch is my counterproposal to Brian's intended abuse (as I
On 23/05/2019 12:41, Jan Beulich wrote:
On 23.05.19 at 13:01, wrote:
>> On 23/05/2019 11:56, Jan Beulich wrote:
>> On 23.05.19 at 12:20, wrote:
This also introduced the top-level Guest Documentation section.
Signed-off-by: Andrew Cooper
>>> Large parts of this are entirel
On 23/05/2019 12:52, Jan Beulich wrote:
On 23.05.19 at 12:27, wrote:
>> --- a/xen/arch/x86/xstate.c
>> +++ b/xen/arch/x86/xstate.c
>> @@ -660,9 +660,7 @@ static bool valid_xcr0(u64 xcr0)
>> int validate_xstate(const struct domain *d, uint64_t xcr0, uint64_t
>> xcr0_accum,
>>
>>> On 23.05.19 at 12:27, wrote:
> --- a/xen/arch/x86/xstate.c
> +++ b/xen/arch/x86/xstate.c
> @@ -660,9 +660,7 @@ static bool valid_xcr0(u64 xcr0)
> int validate_xstate(const struct domain *d, uint64_t xcr0, uint64_t
> xcr0_accum,
> const struct xsave_hdr *hdr)
> {
> -
>>> On 23.05.19 at 13:01, wrote:
> On 23/05/2019 11:56, Jan Beulich wrote:
> On 23.05.19 at 12:20, wrote:
>>> This also introduced the top-level Guest Documentation section.
>>>
>>> Signed-off-by: Andrew Cooper
>> Large parts of this are entirely x86-centric, yet hypercalls exist
>> for Arm
Roger Pau Monne writes ("[Xen-devel] [PATCH 6/6] osstest: use a locally built
pkg repository for FreeBSD"):
> This removes the dependency on the official pkg repository, which is
> dangerous when not testing stable branches, since the ABI of the
> development branch is not stable, and thus it's ea
On 23/05/2019 11:56, Jan Beulich wrote:
On 23.05.19 at 12:20, wrote:
>> This also introduced the top-level Guest Documentation section.
>>
>> Signed-off-by: Andrew Cooper
> Large parts of this are entirely x86-centric, yet hypercalls exist
> for Arm as well. If this is intentional, then I th
>>> On 23.05.19 at 12:20, wrote:
> This also introduced the top-level Guest Documentation section.
>
> Signed-off-by: Andrew Cooper
Large parts of this are entirely x86-centric, yet hypercalls exist
for Arm as well. If this is intentional, then I think you should say
so above.
Jan
_
>>> On 23.05.19 at 12:23, wrote:
> On Thu, May 23, 2019 at 11:20:15AM +0100, Andrew Cooper wrote:
>> The various pieces of the hypercall page infrastructure have grown
>> organically over time and ended up in a bit of a mess.
>>
>> * Rename all functions to be of the form *_init_hypercall_page()
Roger Pau Monne writes ("[Xen-devel] [PATCH 5/6] osstest: introduce a script to
build a FreeBSD package repository"):
> diff --git a/make-freebsd-flight b/make-freebsd-flight
> index d3c413b5..fc3d2d83 100755
> --- a/make-freebsd-flight
> +++ b/make-freebsd-flight
> @@ -38,13 +38,15 @@ job_create_
On 23/05/2019 09:33, Jan Beulich wrote:
On 22.05.19 at 17:50, wrote:
>> x86_cpuid_copy_to_buffer() currently serialises the full content of the
>> various subleaf unions. While leaves 4, 0xb and 0xd don't have a concrete
>> max_subleaf field, they do have well defined upper bounds.
>>
>> Dif
This avoids opencoding the slightly-awkward logic. More uses of these
wrappers will be introduced shortly.
Signed-off-by: Andrew Cooper
---
CC: Jan Beulich
CC: Wei Liu
CC: Roger Pau Monné
I've decided to introduce this patch ahead of "[PATCH] libx86: Elide more
empty CPUID leaves when serial
On Thu, May 23, 2019 at 11:20:15AM +0100, Andrew Cooper wrote:
> The various pieces of the hypercall page infrastructure have grown
> organically over time and ended up in a bit of a mess.
>
> * Rename all functions to be of the form *_init_hypercall_page(). This
>makes them somewhat shorter
On Thu, May 23, 2019 at 11:20:16AM +0100, Andrew Cooper wrote:
> This also introduced the top-level Guest Documentation section.
>
> Signed-off-by: Andrew Cooper
Acked-by: Wei Liu
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://list
This also introduced the top-level Guest Documentation section.
Signed-off-by: Andrew Cooper
---
CC: George Dunlap
CC: Ian Jackson
CC: Jan Beulich
CC: Konrad Rzeszutek Wilk
CC: Stefano Stabellini
CC: Tim Deegan
CC: Wei Liu
CC: Julien Grall
The rendered version can be viewed at:
https://
The various pieces of the hypercall page infrastructure have grown
organically over time and ended up in a bit of a mess.
* Rename all functions to be of the form *_init_hypercall_page(). This
makes them somewhat shorter, and means they can actually be grepped
for in one go.
* Move init_h
For the rendered result (along with some other in-progress documentation),
see:
https://andrewcoop-xen.readthedocs.io/en/docs-devel/guest-guide/hypercall-abi.html
Andrew Cooper (2):
x86: init_hypercall_page() cleanup
docs: Introduce some hypercall page documentation
docs/guest-guide/hyperca
Roger Pau Monne writes ("[Xen-devel] [PATCH 5/6] osstest: introduce a script to
build a FreeBSD package repository"):
> The building of the binary packages itself is done with the poudriere
> tool, that given a set of port names generates a binary package
> repository with the requested packages a
Roger Pau Monne writes ("[Xen-devel] [PATCH 4/6] osstest: introduce a helper to
get the svn revision of a git commit"):
> This only works when the svn revision is stored as a git note
> with the format 'revision='.
Wow. This is pretty ugly.
> Such conversion is required in order to bootstrap a
Roger Pau Monne writes ("[Xen-devel] [PATCH 3/6] osstest: allow to perform
multiple anoints in the same transaction"):
> Note that most of the changes in this patch is code movement in order
> to place the database accessors inside of a loop that iterates over
> the input parameters.
Sorry to be
Roger Pau Monne writes ("[Xen-devel] [PATCH 2/6] osstest: introduce a helper to
create a weblink to a directory"):
> +sub create_weblink ($$$) {
> +my ($ho, $tail, $target) = @_;
> +my $wf_rhs= hostnamepath($ho)."_".$tail;
> +my $wf_common= $c{WebspaceCommon}.$wf_rhs;
> +my $wf_url
Roger Pau Monne writes ("[Xen-devel] [PATCH 1/6] osstest: introduce a helper to
stash a whole directory"):
> Without compressing it.
You've open-coded a recursive directory copy. Is rsync available on
$ho at this point ? I think maybe it could be ...
Ian.
_
>>> On 22.05.19 at 18:45, wrote:
> alternative_callN using inline assembly to generate the alternative
> patch sites should be using the ALTERNATIVE C preprocessor macro
> rather than the ALTERNATIVE assembly macro,
Why? See INDIRECT_{CALL,JMP}. My goal, as said on irc, would be
to eventually eli
On Wed, May 22, 2019 at 07:54:42PM +0200, Olaf Hering wrote:
> Am Wed, 22 May 2019 15:51:40 +0100
> schrieb Anthony PERARD :
>
> > Can you give it a try with one of the affected qemu? (qemu-xen-4.10 or
> > qemu-xen-4.11)
>
> Thanks for the patch. Unfortunately there is no easy way to trigger the
Hi Jan,
Thank you for the feedback.
On 5/23/19 9:27 AM, Jan Beulich wrote:
On 24.04.19 at 12:47, wrote:
On 24/04/2019 01:20, Stefano Stabellini wrote:
On Mon, 22 Apr 2019, Julien Grall wrote:
This code is pretty nasty, but I haven't found a better way for avoiding
to check if CONFIG_DEBUG i
>>> On 22.05.19 at 20:10, wrote:
> DSDT for qemu-xen lacks _STA method of PCI slot object. If _STA method
> doesn't exist then the slot is assumed to be always present and active
> which in conjunction with _EJ0 method makes every device ejectable for
> an OS even if it's not the case.
>
> qemu-k
Hi,
On 23/05/2019 00:26, Stefano Stabellini wrote:
From: Stefano Stabellini
On arm64 swiotlb is already initialized by mem_init. We don't want to
Arm64 will not always initialize the swiotlb. It will only be done if the user
force it or there are memory above the DMA limit.
initialize it
flight 136640 xen-4.9-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/136640/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-prev 6 xen-buildfail REGR. vs. 132889
build-amd64-pre
>>> On 22.05.19 at 18:42, wrote:
> On Mon, May 20, 2019 at 09:26:37AM -0600, Jan Beulich wrote:
>> >>> On 20.05.19 at 16:04, wrote:
>> > On Fri, May 17, 2019 at 04:52:32AM -0600, Jan Beulich wrote:
>> >> @@ -452,15 +452,18 @@ static vmask_t *irq_get_used_vector_mask
>> >> int vector;
>>> On 22.05.19 at 17:50, wrote:
> x86_cpuid_copy_to_buffer() currently serialises the full content of the
> various subleaf unions. While leaves 4, 0xb and 0xd don't have a concrete
> max_subleaf field, they do have well defined upper bounds.
>
> Diffing the results of `xen-cpuid -p` shows the
>>> On 24.04.19 at 12:47, wrote:
> On 24/04/2019 01:20, Stefano Stabellini wrote:
>> On Mon, 22 Apr 2019, Julien Grall wrote:
>>> This code is pretty nasty, but I haven't found a better way for avoiding
>>> to check if CONFIG_DEBUG is enabled when the target clean is called.
>>>
>>> Ideally we wil
70 matches
Mail list logo