flight 158293 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158293/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
flight 158284 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158284/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-xsm7 xen-install fail REGR. vs. 152332
test-amd64-i386-xl-
flight 158288 xen-unstable-smoke real [real]
flight 158289 xen-unstable-smoke real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/158288/
http://logs.test-lab.xenproject.org/osstest/logs/158289/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which co
flight 158283 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158283/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-credit2 broken
test-arm64-arm64-libvirt-xsm
On Fri, 8 Jan 2021, Rahul Singh wrote:
> Add support for ARM architected SMMUv3 implementation. It is based on
> the Linux SMMUv3 driver.
>
> Driver is currently supported as Tech Preview.
>
> Major differences with regard to Linux driver are as follows:
> 2. Only Stage-2 translation is supported
On Fri, 8 Jan 2021, Rahul Singh wrote:
> Replace all Linux device tree handling function with the XEN
> functions.
>
> Replace all Linux ktime function with the XEN time functions.
>
> Signed-off-by: Rahul Singh
Reviewed-by: Stefano Stabellini
> ---
> Changes in v3:
> - This patch is introd
On Fri, 8 Jan 2021, Rahul Singh wrote:
> Merge the patch from linux to use fallthrough pseudo-keyword.
>
> Replace the existing /* fall through */ comments and its variants with
> the new pseudo-keyword macro fallthrough[1]. Also, remove unnecessary
> fall-through markings when it is the case.
>
On Fri, 8 Jan 2021, Rahul Singh wrote:
> Implement the ffsll based on built-in function "__builtin_ffsll()"
>
> ffsll will return one plus the index of the least significant 1-bit in
> doublewords or if doublewords is zero, returns zero.
>
> Signed-off-by: Rahul Singh
> ---
> Changes in V4:
> -
On Fri, 8 Jan 2021, Rahul Singh wrote:
> -Wimplicit-fallthrough warns when a switch case falls through. Warning
> can be suppress by either adding a /* fallthrough */ comment, or by
> using a null statement: __attribute__ ((fallthrough))
>
> Define the pseudo keyword 'fallthrough' for the ability
On 08/01/2021 08:32, Paul Durrant wrote:
>> -Original Message-
>> From: Igor Druzhinin
>> Sent: 08 January 2021 00:47
>> To: xen-devel@lists.xenproject.org
>> Cc: p...@xen.org; w...@xen.org; i...@xenproject.org;
>> anthony.per...@citrix.com;
>> andrew.coop...@citrix.com; george.dun...@cit
flight 158286 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158286/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 9783767fcfc253c74fe3ad87abf74d17e1fe6399
baseline version:
ovmf fabeffb09e3bbf38748c4
On Fri, 8 Jan 2021, Rahul Singh wrote:
> Import the Linux helper of_property_match_string. This function searches
> a string list property and returns the index of a specific string value.
>
> Signed-off-by: Rahul Singh
Reviewed-by: Stefano Stabellini
> ---
> Changes in V3:
> - This patch is
On Fri, 8 Jan 2021, Rahul Singh wrote:
> Remove code that is related to below functionality :
> 1. struct io_pgtable_ops
> 2. struct io_pgtable_cfg
> 3. struct iommu_flush_ops,
> 4. struct iommu_ops
> 5. module_param_named, MODULE_PARM_DESC, module_platform_driver,
> MODULE_*
> 6. IOMMU d
On Fri, 8 Jan 2021, Rahul Singh wrote:
> Linux SMMUv3 driver supports both Stage-1 and Stage-2 translations.
> As of now only Stage-2 translation support has been tested.
>
> Once Stage-1 translation support is tested this patch can be added.
>
> Signed-off-by: Rahul Singh
Acked-by: Stefano Sta
On Fri, 8 Jan 2021, Rahul Singh wrote:
> XArray is not implemented in XEN revert the patch that introduce the
> XArray code in SMMUv3 driver.
>
> XArray is added in preparation for sharing some ASIDs with the CPU,
>
> As XEN support only Stage-2 translation, ASID is used for Stage-1
> translation
On Fri, 8 Jan 2021, Rahul Singh wrote:
> Linux SMMUv3 code implements the commands-queue insertion based on
> atomic operations implemented in Linux. Atomic functions used by the
> commands-queue insertion are not implemented in XEN therefore revert the
> patch that implemented the commands-queue i
On Fri, 8 Jan 2021, Rahul Singh wrote:
> Based on tag Linux 5.8.18 commit ab435ce49bd1d02e33dfec24f76955dc1196970b
>
> Directory structure change for the SMMUv3 driver starting from
> Linux 5.9, to revert the patches smoothly using the "git revert" command
> we decided to choose Linux 5.8.18.
>
>
flight 158285 xen-unstable-smoke real [real]
flight 158287 xen-unstable-smoke real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/158285/
http://logs.test-lab.xenproject.org/osstest/logs/158287/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which co
flight 158280 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158280/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf fabeffb09e3bbf38748c4c073fb7fc6b7e64c20c
baseline version:
ovmf 1d3d5e3256018476e37ed
On 1/8/21 10:18 AM, Jan Beulich wrote:
> On 07.01.2021 21:34, Boris Ostrovsky wrote:
>> Starting with commit 84e848fd7a16 ("x86/hvm: disallow access to unknown
>> MSRs")
>> accesses to unhandled MSRs result in #GP sent to the guest. This caused a
>> regression for Solaris who tries to acccess MS
Hi Jan,
On 05/01/2021 13:09, Jan Beulich wrote:
Neither evtchn_status() nor domain_dump_evtchn_info() nor
flask_get_peer_sid() need to hold the per-domain lock - they all only
read a single channel's state (at a time, in the dump case).
Signed-off-by: Jan Beulich
---
v4: New.
--- a/xen/common
On 1/8/21 9:55 AM, Jan Beulich wrote:
> On 07.01.2021 21:34, Boris Ostrovsky wrote:
>> --- a/xen/include/xen/lib/x86/msr.h
>> +++ b/xen/include/xen/lib/x86/msr.h
>> @@ -2,8 +2,21 @@
>> #ifndef XEN_LIB_X86_MSR_H
>> #define XEN_LIB_X86_MSR_H
>>
>> +/*
>> + * Behavior on accesses to MSRs that ar
On Fri, 8 Jan 2021, Julien Grall wrote:
> Hi Stefano,
>
> On 08/01/2021 19:22, Stefano Stabellini wrote:
> > MVFR2 is not available on ARMv7. It is available on ARMv8 aarch32 and
> > aarch64. If Xen reads MVFR2 on ARMv7 it could crash.
> >
> > Avoid the issue by doing the following:
> >
> > - de
Hi Stefano,
On 08/01/2021 19:22, Stefano Stabellini wrote:
MVFR2 is not available on ARMv7. It is available on ARMv8 aarch32 and
aarch64. If Xen reads MVFR2 on ARMv7 it could crash.
Avoid the issue by doing the following:
- define MVFR2_MAYBE_UNDEFINED on arm32
- if MVFR2_MAYBE_UNDEFINED, do n
flight 158282 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158282/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-xsm broken
test-arm64-arm64-xl-xsm 5 hos
MVFR2 is not available on ARMv7. It is available on ARMv8 aarch32 and
aarch64. If Xen reads MVFR2 on ARMv7 it could crash.
Avoid the issue by doing the following:
- define MVFR2_MAYBE_UNDEFINED on arm32
- if MVFR2_MAYBE_UNDEFINED, do not attempt to read MVFR2 in Xen
- keep the 3rd register_t in s
flight 158276 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158276/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-xsm7 xen-install fail REGR. vs. 152332
test-amd64-i386-xl-
On 22/09/2020 19:24, Andrew Cooper wrote:
> diff --git a/tools/libs/foreignmemory/linux.c
> b/tools/libs/foreignmemory/linux.c
> index fe73d5ab72..eec089e232 100644
> --- a/tools/libs/foreignmemory/linux.c
> +++ b/tools/libs/foreignmemory/linux.c
> @@ -339,6 +342,39 @@ int osdep_xenforeignmemory_m
On 08.01.21 19:01, Jan Beulich wrote:
Hi Jan
On 08.01.2021 17:38, Oleksandr wrote:
On 05.01.21 10:48, Jan Beulich wrote:
On 04.01.2021 17:57, Oleksandr Tyshchenko wrote:
Hello all.
[Sorry for the possible format issues]
On Tue, Dec 22, 2020 at 12:41 PM Andrew Cooper
wrote:
On 21/12/20
On 08.01.2021 17:38, Oleksandr wrote:
> On 05.01.21 10:48, Jan Beulich wrote:
>> On 04.01.2021 17:57, Oleksandr Tyshchenko wrote:
>>> Hello all.
>>>
>>> [Sorry for the possible format issues]
>>>
>>> On Tue, Dec 22, 2020 at 12:41 PM Andrew Cooper
>>> wrote:
>>>
On 21/12/2020 08:10, Jan Beulic
On Tue, Nov 03, 2020 at 11:56:16AM +0100, Jan Beulich wrote:
> Commit 8a74707a7c ("x86/nospec: Use always_inline to fix code gen for
> evaluate_nospec") converted inline to always_inline for
> adjust_guest_l[134]e(), but left adjust_guest_l2e() and
> unadjust_guest_l3e() alone without saying why th
flight 158272 qemu-mainline real [real]
flight 158281 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/158272/
http://logs.test-lab.xenproject.org/osstest/logs/158281/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be
On 05.01.21 10:48, Jan Beulich wrote:
Hi Jan
On 04.01.2021 17:57, Oleksandr Tyshchenko wrote:
Hello all.
[Sorry for the possible format issues]
On Tue, Dec 22, 2020 at 12:41 PM Andrew Cooper
wrote:
On 21/12/2020 08:10, Jan Beulich wrote:
On 17.12.2020 20:18, Andrew Cooper wrote:
On 1
flight 158279 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158279/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-xsm broken
test-arm64-arm64-xl-xsm 5 hos
On 08.01.2021 16:42, Roger Pau Monne wrote:
> A pvshim build doesn't require the grant table functionality built in,
> but it does require knowing the number of arguments the hypercall has
> so the hypercall parameter clobbering works properly.
>
> Instead of also setting the argument count for th
On 09.12.2020 17:16, Juergen Gross wrote:
> This small series is meant as an example how to add further dynamical
> directories to hypfs. It can be used to replace Paul's current approach
> to specify ABI-features via domain create flags and replace those by
> hypfs nodes.
Actually, before I look
A pvshim build doesn't require the grant table functionality built in,
but it does require knowing the number of arguments the hypercall has
so the hypercall parameter clobbering works properly.
Instead of also setting the argument count for the gnttab case if PV
shim functionality is enabled, jus
On Fri, Nov 06, 2020 at 10:37:35AM +0100, Jan Beulich wrote:
> When shattering a large page, we first construct the new page table page
> and only then hook it up. The "pre" hook in this case does nothing, for
> the page starting out all blank. Avoid 512 calls into shadow code in
> this case by pas
On 09.12.2020 17:16, Juergen Gross wrote:
> --- a/xen/common/hypfs.c
> +++ b/xen/common/hypfs.c
> @@ -501,17 +501,26 @@ int hypfs_read_dir(const struct hypfs_entry *entry,
> return 0;
> }
>
> -int hypfs_read_leaf(const struct hypfs_entry *entry,
> -XEN_GUEST_HANDLE_PARAM
On Fri, Jan 08, 2021 at 04:24:01PM +0100, Jan Beulich wrote:
> On 08.01.2021 16:11, Roger Pau Monné wrote:
> > On Fri, Jan 08, 2021 at 04:01:52PM +0100, Jan Beulich wrote:
> >> On 08.01.2021 15:41, Roger Pau Monne wrote:
> >>> --- a/xen/arch/x86/hypercall.c
> >>> +++ b/xen/arch/x86/hypercall.c
> >>
On 08.01.2021 16:24, Jan Beulich wrote:
> On 08.01.2021 16:11, Roger Pau Monné wrote:
>> On Fri, Jan 08, 2021 at 04:01:52PM +0100, Jan Beulich wrote:
>>> On 08.01.2021 15:41, Roger Pau Monne wrote:
--- a/xen/arch/x86/hypercall.c
+++ b/xen/arch/x86/hypercall.c
@@ -47,7 +47,7 @@ const
On 08.01.2021 16:11, Roger Pau Monné wrote:
> On Fri, Jan 08, 2021 at 04:01:52PM +0100, Jan Beulich wrote:
>> On 08.01.2021 15:41, Roger Pau Monne wrote:
>>> --- a/xen/arch/x86/hypercall.c
>>> +++ b/xen/arch/x86/hypercall.c
>>> @@ -47,7 +47,7 @@ const hypercall_args_t
>>> hypercall_args_table[NR_h
On 07.01.2021 21:34, Boris Ostrovsky wrote:
> Starting with commit 84e848fd7a16 ("x86/hvm: disallow access to unknown MSRs")
> accesses to unhandled MSRs result in #GP sent to the guest. This caused a
> regression for Solaris who tries to acccess MSR_RAPL_POWER_UNIT and (unlike,
Nit: One c too man
On Fri, Jan 08, 2021 at 04:01:52PM +0100, Jan Beulich wrote:
> On 08.01.2021 15:41, Roger Pau Monne wrote:
> > --- a/xen/arch/x86/hypercall.c
> > +++ b/xen/arch/x86/hypercall.c
> > @@ -47,7 +47,7 @@ const hypercall_args_t
> > hypercall_args_table[NR_hypercalls] =
> > ARGS(xen_version, 2),
> >
On 08.01.2021 15:41, Roger Pau Monne wrote:
> --- a/xen/arch/x86/hypercall.c
> +++ b/xen/arch/x86/hypercall.c
> @@ -47,7 +47,7 @@ const hypercall_args_t hypercall_args_table[NR_hypercalls] =
> ARGS(xen_version, 2),
> ARGS(console_io, 3),
> ARGS(physdev_op_compat, 1),
> -#ifdef CONFIG
On 07.01.2021 21:34, Boris Ostrovsky wrote:
> --- a/xen/include/xen/lib/x86/msr.h
> +++ b/xen/include/xen/lib/x86/msr.h
> @@ -2,8 +2,21 @@
> #ifndef XEN_LIB_X86_MSR_H
> #define XEN_LIB_X86_MSR_H
>
> +/*
> + * Behavior on accesses to MSRs that are not handled by emulation:
What about ones handl
Add support for ARM architected SMMUv3 implementation. It is based on
the Linux SMMUv3 driver.
Driver is currently supported as Tech Preview.
Major differences with regard to Linux driver are as follows:
2. Only Stage-2 translation is supported as compared to the Linux driver
that supports bot
Replace all Linux device tree handling function with the XEN
functions.
Replace all Linux ktime function with the XEN time functions.
Signed-off-by: Rahul Singh
---
Changes in v3:
- This patch is introduce in this version.
Changes in V4:
- Move this patch one patch earlier so that there is no
Merge the patch from linux to use fallthrough pseudo-keyword.
Replace the existing /* fall through */ comments and its variants with
the new pseudo-keyword macro fallthrough[1]. Also, remove unnecessary
fall-through markings when it is the case.
Signed-off-by: Rahul Singh
---
Changes in V4:
- T
Signed-off-by: Olaf Hering
---
tools/libs/light/libxl_save_msgs_gen.pl | 20 ++--
1 file changed, 10 insertions(+), 10 deletions(-)
diff --git a/tools/libs/light/libxl_save_msgs_gen.pl
b/tools/libs/light/libxl_save_msgs_gen.pl
index 5bfbd4fd10..9d425b1dee 100755
--- a/tools/libs
-Wimplicit-fallthrough warns when a switch case falls through. Warning
can be suppress by either adding a /* fallthrough */ comment, or by
using a null statement: __attribute__ ((fallthrough))
Define the pseudo keyword 'fallthrough' for the ability to convert the
various case block /* fallthrough
Implement the ffsll based on built-in function "__builtin_ffsll()"
ffsll will return one plus the index of the least significant 1-bit in
doublewords or if doublewords is zero, returns zero.
Signed-off-by: Rahul Singh
---
Changes in V4:
- This patch is introduce in this verison.
---
xen/includ
Import the Linux helper of_property_match_string. This function searches
a string list property and returns the index of a specific string value.
Signed-off-by: Rahul Singh
---
Changes in V3:
- This patch is introduce in this verison.
Changes in V4: Rebase
---
xen/common/device_tree.c | 27
Remove code that is related to below functionality :
1. struct io_pgtable_ops
2. struct io_pgtable_cfg
3. struct iommu_flush_ops,
4. struct iommu_ops
5. module_param_named, MODULE_PARM_DESC, module_platform_driver,
MODULE_*
6. IOMMU domain-types
7. arm_smmu_set_bus_ops
8. iommu_device_s
Linux SMMUv3 driver supports both Stage-1 and Stage-2 translations.
As of now only Stage-2 translation support has been tested.
Once Stage-1 translation support is tested this patch can be added.
Signed-off-by: Rahul Singh
---
Changes in V3: Rebase
Changes in V4: Rebase
---
xen/drivers/passthro
XArray is not implemented in XEN revert the patch that introduce the
XArray code in SMMUv3 driver.
XArray is added in preparation for sharing some ASIDs with the CPU,
As XEN support only Stage-2 translation, ASID is used for Stage-1
translation there is no consequences of reverting this patch for
Linux SMMUv3 code implements the commands-queue insertion based on
atomic operations implemented in Linux. Atomic functions used by the
commands-queue insertion are not implemented in XEN therefore revert the
patch that implemented the commands-queue insertion based on atomic
operations.
Reverted
Based on tag Linux 5.8.18 commit ab435ce49bd1d02e33dfec24f76955dc1196970b
Directory structure change for the SMMUv3 driver starting from
Linux 5.9, to revert the patches smoothly using the "git revert" command
we decided to choose Linux 5.8.18.
Only difference between latest stable Linux 5.9.12 a
This patch series is V4 of the work to add support for the SMMUv3 driver.
Approach taken is to first merge the Linux copy of the SMMUv3 driver
(tag v5.8.18) and then modify the driver to build on XEN.
MSI and PCI ATS functionality are not supported. Code is not tested and
compiled. Code is guarde
A pvshim build doesn't require the grant table functionality built in,
but it does require knowing the number of arguments the hypercall has
so the hypercall parameter clobbering works properly.
Note this hasn't been detected by osstest because the tools pvshim
build is done without debug enabled,
On Wed, Jan 6, 2021 at 8:06 PM Andrew Cooper wrote:
>
> Recent Intel client devices have disabled the legacy PIT for powersaving
> reasons, breaking compatibility with a traditional IBM PC. Xen depends on a
> legacy timer interrupt to check that the IO-APIC/PIC routing is configured
> correctly,
flight 158273 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158273/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 1d3d5e3256018476e37ed6621fecbdbcfb2da58e
baseline version:
ovmf 85b8eac59b8c5bd9c7eb9
flight 158278 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158278/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-xl-xsm broken
test-arm64-arm64-xl-xsm 5 hos
I don't think we mean to ever make them real Kconfig options, so let's
just do away with them.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/acpi/boot.c
+++ b/xen/arch/x86/acpi/boot.c
@@ -37,9 +37,7 @@
#include
#include
#include
-#ifdef CONFIG_HPET_TIMER
#include /* for hpet_address */
-
The latter is slightly more type-safe. Also add const where possible,
including without need to touch further code. Additionally replace an
adjacent unnecessary use of u16.
Signed-off-by: Jan Beulich
---
Intentionally not paying attention to line length in acpi/tables.c, as
adjacent code violates
When marking fields invalid for our own purposes, we should do so in our
local copy (so we will notice later on), not in the firmware provided
one (which another entity may want to look at again, e.g. after kexec).
Also mark the function parameter const to notice such issues right away.
Instead us
While they're KERN_INFO messages and hence not visible by default, we
still have had reports that the amount of output is too large, not the
least because
- the command line controlled resizing of the console ring buffer
happens only after SRAT parsing (which may alone produce more than 16k
of
1: ACPI: reduce verbosity by default
2: x86/ACPI: don't overwrite FADT
3: ACPI: replace casts by container_of()
4: x86: drop fake CONFIG_{HPET,X86_PM}_TIMER
Jan
On 08/01/2021 13:17, Jan Beulich wrote:
> On 08.01.2021 12:27, Igor Druzhinin wrote:
>> On 08/01/2021 09:19, Jan Beulich wrote:
>>> On 08.01.2021 01:46, Igor Druzhinin wrote:
--- a/tools/libs/light/libxl_x86.c
+++ b/tools/libs/light/libxl_x86.c
@@ -336,7 +336,7 @@ static int hvm_set_
On 08.01.2021 12:27, Igor Druzhinin wrote:
> On 08/01/2021 09:19, Jan Beulich wrote:
>> On 08.01.2021 01:46, Igor Druzhinin wrote:
>>> --- a/tools/libs/light/libxl_x86.c
>>> +++ b/tools/libs/light/libxl_x86.c
>>> @@ -336,7 +336,7 @@ static int hvm_set_viridian_features(libxl__gc *gc,
>>> uint32_t
Hi Wei,
On 08/01/2021 06:21, Wei Chen wrote:
Per the discussion [1] on the mailing list, we'd better to
have a barrier after reading CNTPCT in get_cycles. If there
is not any barrier there. When get_cycles being used in some
seqlock critical context in the future, the seqlock can be
speculated p
Hi Julien
> -Original Message-
> From: Julien Grall
> Sent: 2021年1月8日 19:46
> To: Wei Chen ; xen-devel@lists.xenproject.org;
> sstabell...@kernel.org
> Cc: Bertrand Marquis ; Penny Zheng
> ; Jiamei Xie ; nd
>
> Subject: Re: [PATCH v2] xen/arm: Using unsigned long for arm64 MPIDR mask
>
On 08/01/2021 08:32, Paul Durrant wrote:
>> -Original Message-
>> From: Igor Druzhinin
>> Sent: 08 January 2021 00:47
>> To: xen-devel@lists.xenproject.org
>> Cc: p...@xen.org; w...@xen.org; i...@xenproject.org;
>> anthony.per...@citrix.com;
>> andrew.coop...@citrix.com; george.dun...@cit
Hi Wei,
How about the following title:
"xen/arm: Don't ignore the affinity level 3 in the MPIDR"
On 08/01/2021 06:29, Wei Chen wrote:
Currently, Xen is using UINT32 for MPIDR mask to retrieve
affinity[0,1,2,3] values for MPIDR_EL1 register. The value
of MPIDR_EL1 is 64-bit unsigned long. > The
On 08/01/2021 11:40, Paul Durrant wrote:
>> -Original Message-
>> From: Igor Druzhinin
>> Sent: 08 January 2021 11:36
>> To: p...@xen.org; xen-devel@lists.xenproject.org
>> Cc: w...@xen.org; i...@xenproject.org; anthony.per...@citrix.com;
>> andrew.coop...@citrix.com;
>> george.dun...@cit
> -Original Message-
> From: Igor Druzhinin
> Sent: 08 January 2021 11:36
> To: p...@xen.org; xen-devel@lists.xenproject.org
> Cc: w...@xen.org; i...@xenproject.org; anthony.per...@citrix.com;
> andrew.coop...@citrix.com;
> george.dun...@citrix.com; jbeul...@suse.com; jul...@xen.org;
> s
On 08/01/2021 11:33, Paul Durrant wrote:
>> -Original Message-
>> From: Igor Druzhinin
>> Sent: 08 January 2021 11:30
>> To: p...@xen.org; xen-devel@lists.xenproject.org
>> Cc: w...@xen.org; i...@xenproject.org; anthony.per...@citrix.com;
>> andrew.coop...@citrix.com;
>> george.dun...@cit
> -Original Message-
> From: Igor Druzhinin
> Sent: 08 January 2021 11:30
> To: p...@xen.org; xen-devel@lists.xenproject.org
> Cc: w...@xen.org; i...@xenproject.org; anthony.per...@citrix.com;
> andrew.coop...@citrix.com;
> george.dun...@citrix.com; jbeul...@suse.com; jul...@xen.org;
> s
On 08/01/2021 08:38, Paul Durrant wrote:
>> -Original Message-
>> From: Igor Druzhinin
>> Sent: 08 January 2021 00:47
>> To: xen-devel@lists.xenproject.org
>> Cc: p...@xen.org; w...@xen.org; i...@xenproject.org;
>> anthony.per...@citrix.com;
>> andrew.coop...@citrix.com; george.dun...@cit
On 08/01/2021 09:19, Jan Beulich wrote:
> On 08.01.2021 01:46, Igor Druzhinin wrote:
>> --- a/tools/libs/light/libxl_x86.c
>> +++ b/tools/libs/light/libxl_x86.c
>> @@ -336,7 +336,7 @@ static int hvm_set_viridian_features(libxl__gc *gc,
>> uint32_t domid,
>> LOG(DETAIL, "%s group enabled",
On 06/01/2021 20:55, Stefano Stabellini wrote:
On Wed, 6 Jan 2021, Julien Grall wrote:
On 05/01/2021 22:43, Stefano Stabellini wrote:
On Tue, 5 Jan 2021, Julien Grall wrote:
Hi Stefano,
On 05/01/2021 18:44, Stefano Stabellini wrote:
On Tue, 5 Jan 2021, André Przywara wrote:
On 05/01/2021
On 08.01.2021 11:17, Julien Grall wrote:
> Hi Andrew and Jan,
>
> On 04/01/2021 15:41, Andrew Cooper wrote:
>> On 04/01/2021 15:22, Jan Beulich wrote:
>>> On 04.01.2021 16:04, Andrew Cooper wrote:
On 23/12/2020 15:13, Jan Beulich wrote:
> This array can be large when many grant frames are
On 06/01/2021 23:22, Volodymyr Babchuk wrote:
Hi Julien,
Julien Grall writes:
Hi Roman,
On 06/01/2021 11:26, Roman Skakun wrote:
This patch added additional sanity and increases an understanding for
getting proper value from the first argument for SMC call on aarch64
according to SMCC Co
Hi Andrew and Jan,
On 04/01/2021 15:41, Andrew Cooper wrote:
On 04/01/2021 15:22, Jan Beulich wrote:
On 04.01.2021 16:04, Andrew Cooper wrote:
On 23/12/2020 15:13, Jan Beulich wrote:
This array can be large when many grant frames are permitted; avoid
allocating it when it's not going to be us
flight 158275 xen-unstable-smoke real [real]
flight 158277 xen-unstable-smoke real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/158275/
http://logs.test-lab.xenproject.org/osstest/logs/158277/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which co
(Sorry for webmail).
The forthcoming hotfix on Win10/Server2019 (Build 20270) is in serious
problems without these two fixes, and never starts secondary processors.
~Andrew
-Original Message-
From: Paul Durrant
Sent: Friday, January 8, 2021 8:32 AM
To: Igor Druzhinin ; xen-devel@list
On 07.01.2021 03:17, Igor Druzhinin wrote:
> On 06/01/2021 11:04, Jan Beulich wrote:
>> On 23.12.2020 21:32, Igor Druzhinin wrote:
>>> LBR, C-state MSRs should correspond to Ice Lake desktop according to
>>> External Design Specification vol.2 for both models.
>>>
>>> Ice Lake-X is known to expose
flight 158269 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158269/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd64-amd64-xl-rtds 20 guest-localmigrate/x10 fail in 158231 pass in
158269
test-amd64-amd64-examine4
flight 158274 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/158274/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 151777
build-arm64-libvirt
On 08.01.2021 01:46, Igor Druzhinin wrote:
> --- a/tools/libs/light/libxl_x86.c
> +++ b/tools/libs/light/libxl_x86.c
> @@ -336,7 +336,7 @@ static int hvm_set_viridian_features(libxl__gc *gc,
> uint32_t domid,
> LOG(DETAIL, "%s group enabled",
> libxl_viridian_enlightenment_to_string(v));
> -Original Message-
> From: Igor Druzhinin
> Sent: 08 January 2021 00:47
> To: xen-devel@lists.xenproject.org
> Cc: p...@xen.org; w...@xen.org; i...@xenproject.org;
> anthony.per...@citrix.com;
> andrew.coop...@citrix.com; george.dun...@citrix.com; jbeul...@suse.com;
> jul...@xen.org;
>
> -Original Message-
> From: Igor Druzhinin
> Sent: 08 January 2021 00:47
> To: xen-devel@lists.xenproject.org
> Cc: p...@xen.org; w...@xen.org; i...@xenproject.org;
> anthony.per...@citrix.com;
> andrew.coop...@citrix.com; george.dun...@citrix.com; jbeul...@suse.com;
> jul...@xen.org;
>
> That comment is indeed now obsolete. I can squash something like so:
>
> diff --git a/tools/objtool/check.c b/tools/objtool/check.c
> index 81d56fdef1c3..ce67437aaf3f 100644
> --- a/tools/objtool/check.c
> +++ b/tools/objtool/check.c
> @@ -958,21 +958,8 @@ static int add_call_destinations(struc
93 matches
Mail list logo