Hi Stefano,
On 13/08/2024 04:21, Stefano Stabellini wrote:
>
>
> Use expect to invoke QEMU so that we can terminate the test as soon as
> we get the right string in the output instead of waiting until the
> final timeout.
>
> For timeout, instead of an hardcoding the value, use a Gitlab CI
> va
flight 187222 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/187222/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf b158dad150bf02879668f72ce306445250838201
baseline version:
ovmf b0f43dd3fdec2363e3548
flight 187218 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/187218/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-examine 8 reboot fail REGR. vs. 186827
test-arm64-arm64-xl
flight 187219 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/187219/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
Use expect to invoke QEMU so that we can terminate the test as soon as
we get the right string in the output instead of waiting until the
final timeout.
For timeout, instead of an hardcoding the value, use a Gitlab CI
variable "QEMU_TIMEOUT" that can be changed depending on the latest
status of th
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> This adds a Xen PVH x86 machine based on the PVH Common
> module used by the ARM PVH machine.
>
> Signed-off-by: Edgar E. Iglesias
> ---
> hw/i386/xen/meson.build | 1 +
> hw/i386/xen/xen-pvh.c | 196
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> Signed-off-by: Edgar E. Iglesias
Reviewed-by: Stefano Stabellini
> ---
> MAINTAINERS | 1 +
> docs/system/i386/xenpvh.rst | 49 +
> docs/system/target-i386.rst
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> Add support for optionally creating a PCIe/GPEX controller.
>
> Signed-off-by: Edgar E. Iglesias
> ---
> hw/xen/xen-pvh-common.c | 66 +
> include/hw/xen/xen-pvh-common.h | 10
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> We've been creating the virtio-mmio devices in forwards order
> but since the qbus lists prepend (rather than append) entries,
> the virtio busses end up with decreasing base address order.
>
> Xen enables virtio-mmio
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> Break out a common Xen PVH module in preparation for
> adding a x86 Xen PVH Machine.
>
> Signed-off-by: Edgar E. Iglesias
> ---
> hw/arm/trace-events | 5 -
> hw/arm/xen_arm.c| 154 +
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> Rename xen_arm.c -> xen-pvh.c to better express that this
> is a PVH machine and to align with x86 HVM and future PVH
> machine filenames:
> hw/i386/xen/xen-hvm.c
> hw/i386/xen/xen-pvh.c (in preparation)
>
> No functio
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> Add SMP support for Xen PVH ARM guests. Create max_cpus ioreq
> servers to handle hotplug.
>
> Signed-off-by: Edgar E. Iglesias
> ---
> hw/arm/xen_arm.c | 5 +++--
> 1 file changed, 3 insertions(+), 2 deletions(-)
>
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> Update file header to use SPDX and remove stray empty
> comment line.
>
> No functional changes.
>
> Signed-off-by: Edgar E. Iglesias
Acked-by: Stefano Stabellini
> ---
> hw/arm/xen_arm.c | 19 +-
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> Tweak machine description to better express that this is
> a Xen PVH machine for ARM.
>
> Signed-off-by: Edgar E. Iglesias
Reviewed-by: Stefano Stabellini
> ---
> hw/arm/xen_arm.c | 2 +-
> 1 file changed, 1 inse
On Mon, 12 Aug 2024, Edgar E. Iglesias wrote:
> From: "Edgar E. Iglesias"
>
> Signed-off-by: Edgar E. Iglesias
Acked-by: Stefano Stabellini
> ---
> MAINTAINERS | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/MAINTAINERS b/MAINTAINERS
> index 10af212632..a24c2e14d9 100644
> --- a/M
On Tue, Jul 09, 2024 at 11:37:07AM +0200, Jürgen Groß wrote:
>
> In both directories you can see the number of spurious events by looking
> into the spurious_events file.
>
> In the end the question is why so many spurious events are happening. Finding
> the reason might be hard, though.
Hopeful
On 08/08/2024 9:49 am, Jan Beulich wrote:
> --- a/xen/arch/x86/boot/head.S
> +++ b/xen/arch/x86/boot/head.S
> @@ -233,13 +233,11 @@ __efi64_mb2_start:
>
> /* Check for Multiboot2 bootloader. */
> cmp $MULTIBOOT2_BOOTLOADER_MAGIC,%eax
> -je .Lefi_multiboot2_proto
flight 187217 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/187217/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-examine 8 reboot fail REGR. vs. 186827
test-arm64-arm64-xl
In commit 4f78438b45e2 ("vpci: use per-domain PCI lock to protect vpci
structure") a lock moved from allocate_and_map_msi_pirq() to the caller
and changed from pcidevs_lock() to read_lock(&d->pci_lock). However, one
call path wasn't updated to reflect the change, leading to a failed
assertion obser
Hi,
On Mon Aug 12, 2024 at 3:43 PM BST, Jan Beulich wrote:
> On 12.08.2024 16:34, Alejandro Vallejo wrote:
> > On Thu Aug 8, 2024 at 9:49 AM BST, Jan Beulich wrote:
> >> A few dozen lines down from here we repeatedly use a pattern involving
> >> just a single (conditional) branch. Do so also when
On 09/08/2024 13:15, Michal Orzel wrote:
Hi Ayan,
Hi Michal,
On 08/08/2024 14:09, Ayan Kumar Halder wrote:
All the EL2 MMU specific registers are enclosed within CONFIG_MMU.
Signed-off-by: Ayan Kumar Halder
---
Changes from v1 :-
1. 'vttbr_el2' field is enclosed with ifdef.
2. No movement
Hi Jan,
On 09/08/2024 10:34, Jan Beulich wrote:
On 08.08.2024 17:50, Ayan Kumar Halder wrote:
On 08/08/2024 13:49, Jan Beulich wrote:
On 08.08.2024 14:09, Ayan Kumar Halder wrote:
@@ -58,9 +58,13 @@ config PADDR_BITS
default 40 if ARM_PA_BITS_40
default 48 if ARM_64
+confi
On 09/08/2024 13:01, Michal Orzel wrote:
Hi Ayan,
Hi Michal,
On 08/08/2024 14:09, Ayan Kumar Halder wrote:
update_boot_mapping() invokes update_identity_mapping() for the MMU specific
code.
Later when the MPU code is added, update_boot_mapping() would invoke the
equivalent.
The common code
On 09/08/24 21:25, Stefano Stabellini wrote:
Adding Roberto
Does MISRA have a view on this? I seem to remember this is discouraged?
As far as I know, there is nothing in MISRA C against or in favor of
mixing declaration with statements. The only (slightly) relevant
guideline is advisory Rule
On 08.08.2024 15:41, Alejandro Vallejo wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -1164,10 +1164,25 @@ static int cf_check hvm_load_cpu_ctxt(struct domain
> *d, hvm_domain_context_t *h)
> seg.attr = ctxt.ldtr_arbytes;
> hvm_set_segment_register(v, x86_seg_l
On 08.08.2024 15:41, Alejandro Vallejo wrote:
> --- a/xen/arch/x86/domctl.c
> +++ b/xen/arch/x86/domctl.c
> @@ -1344,7 +1344,10 @@ void arch_get_info_guest(struct vcpu *v,
> vcpu_guest_context_u c)
> #define c(fld) (c.nat->fld)
> #endif
>
> -memcpy(&c.nat->fpu_ctxt, v->arch.fpu_ctxt, sizeo
flight 187216 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/187216/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-arm64-arm64-examine 8 reboot fail REGR. vs. 186827
test-arm64-arm64-xl
On 12.08.2024 16:34, Alejandro Vallejo wrote:
> On Thu Aug 8, 2024 at 9:49 AM BST, Jan Beulich wrote:
>> A few dozen lines down from here we repeatedly use a pattern involving
>> just a single (conditional) branch. Do so also when checking for the
>> boot loader magic value.
>>
>> Signed-off-by: Ja
Hi,
On Thu Aug 8, 2024 at 9:49 AM BST, Jan Beulich wrote:
> A few dozen lines down from here we repeatedly use a pattern involving
> just a single (conditional) branch. Do so also when checking for the
> boot loader magic value.
>
> Signed-off-by: Jan Beulich
> ---
> I further question the placem
12.08.24 15:24, Alejandro Vallejo:
On Mon Aug 12, 2024 at 10:58 AM BST, Jan Beulich wrote:
On 12.08.2024 11:40, Sergiy Kibrik wrote:
09.08.24 13:36, Alejandro Vallejo:
On Fri Aug 9, 2024 at 11:09 AM BST, Sergiy Kibrik wrote:
--- a/xen/arch/x86/cpu/Makefile
+++ b/xen/arch/x86/cpu/Makefile
@@ -
On 12.08.2024 15:04, Andrew Cooper wrote:
> On 05/08/2024 2:26 pm, Jan Beulich wrote:
>> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
>> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
>> @@ -839,7 +839,8 @@ protmode_load_seg(
>> case x86_seg_tr:
>> goto raise_exn;
>> }
On Fri Aug 9, 2024 at 8:25 PM BST, Stefano Stabellini wrote:
> Adding Roberto
>
> Does MISRA have a view on this? I seem to remember this is discouraged?
>
I'd be surprised if MISRA didn't promote declaring close to first use to avoid
use-before-init, but you very clearly have a lot more exposure
From: "Edgar E. Iglesias"
Signed-off-by: Edgar E. Iglesias
---
MAINTAINERS | 1 +
docs/system/i386/xenpvh.rst | 49 +
docs/system/target-i386.rst | 1 +
3 files changed, 51 insertions(+)
create mode 100644 docs/system/i386/xenpvh.rst
diff
From: "Edgar E. Iglesias"
Add support for optionally creating a PCIe/GPEX controller.
Signed-off-by: Edgar E. Iglesias
---
hw/xen/xen-pvh-common.c | 66 +
include/hw/xen/xen-pvh-common.h | 10 -
2 files changed, 75 insertions(+), 1 deletion(-)
diff
From: "Edgar E. Iglesias"
Add SMP support for Xen PVH ARM guests. Create max_cpus ioreq
servers to handle hotplug.
Signed-off-by: Edgar E. Iglesias
---
hw/arm/xen_arm.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/hw/arm/xen_arm.c b/hw/arm/xen_arm.c
index 5f75cc3779
From: "Edgar E. Iglesias"
Update file header to use SPDX and remove stray empty
comment line.
No functional changes.
Signed-off-by: Edgar E. Iglesias
---
hw/arm/xen_arm.c | 19 +--
1 file changed, 1 insertion(+), 18 deletions(-)
diff --git a/hw/arm/xen_arm.c b/hw/arm/xen_arm.
From: "Edgar E. Iglesias"
Rename xen_arm.c -> xen-pvh.c to better express that this
is a PVH machine and to align with x86 HVM and future PVH
machine filenames:
hw/i386/xen/xen-hvm.c
hw/i386/xen/xen-pvh.c (in preparation)
No functional changes.
Signed-off-by: Edgar E. Iglesias
---
hw/arm/meso
From: "Edgar E. Iglesias"
This adds a Xen PVH x86 machine based on the PVH Common
module used by the ARM PVH machine.
Signed-off-by: Edgar E. Iglesias
---
hw/i386/xen/meson.build | 1 +
hw/i386/xen/xen-pvh.c | 196
2 files changed, 197 insertions(+)
From: "Edgar E. Iglesias"
We've been creating the virtio-mmio devices in forwards order
but since the qbus lists prepend (rather than append) entries,
the virtio busses end up with decreasing base address order.
Xen enables virtio-mmio nodes in forwards order so there's been
a missmatch. So far,
From: "Edgar E. Iglesias"
This series breaks-out parts of the ARM PVH support into a reusable
QOM module. There's a bit of refactoring and some bug-fixes along
the way.
Finally we add a new x86 xen-pvh machine using the new xen-pvh-common
module.
The corresponding changes Xen for PVH x86 are wo
From: "Edgar E. Iglesias"
Break out a common Xen PVH module in preparation for
adding a x86 Xen PVH Machine.
Signed-off-by: Edgar E. Iglesias
---
hw/arm/trace-events | 5 -
hw/arm/xen_arm.c| 154 ++
hw/xen/meson.build | 1 +
From: "Edgar E. Iglesias"
Tweak machine description to better express that this is
a Xen PVH machine for ARM.
Signed-off-by: Edgar E. Iglesias
---
hw/arm/xen_arm.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/hw/arm/xen_arm.c b/hw/arm/xen_arm.c
index 766a194fa1..5f75cc37
From: "Edgar E. Iglesias"
Signed-off-by: Edgar E. Iglesias
---
MAINTAINERS | 1 +
1 file changed, 1 insertion(+)
diff --git a/MAINTAINERS b/MAINTAINERS
index 10af212632..a24c2e14d9 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -559,6 +559,7 @@ F: include/hw/xen/
F: include/sysemu/xen.h
F: in
On 05/08/2024 2:26 pm, Jan Beulich wrote:
> LAR, LSL, VERR, and VERW emulation involve calling protmode_load_seg()
> with x86_seg_none. The fuzzer's read_segment() hook function has an
> assertion which triggers in this case. Calling the hook function,
> however, makes little sense for those insns,
On Mon, Aug 12, 2024 at 9:41 AM Jan Beulich wrote:
>
> On 09.08.2024 16:34, Frediano Ziglio wrote:
> > On Fri, Aug 9, 2024 at 3:02 PM Jan Beulich wrote:
> >>
> >> On 09.08.2024 15:50, Frediano Ziglio wrote:
> >>> On Fri, Aug 9, 2024 at 1:59 PM Jan Beulich wrote:
>
> On 09.08.2024 14:48
On Mon Aug 12, 2024 at 10:58 AM BST, Jan Beulich wrote:
> On 12.08.2024 11:40, Sergiy Kibrik wrote:
> > 09.08.24 13:36, Alejandro Vallejo:
> >> On Fri Aug 9, 2024 at 11:09 AM BST, Sergiy Kibrik wrote:
> >>> --- a/xen/arch/x86/cpu/Makefile
> >>> +++ b/xen/arch/x86/cpu/Makefile
> >>> @@ -6,10 +6,10 @
flight 187215 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/187215/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 187209
test-amd64-amd64-xl-qemuu-ws16-amd64
On 12.08.2024 11:40, Sergiy Kibrik wrote:
> 09.08.24 13:36, Alejandro Vallejo:
>> On Fri Aug 9, 2024 at 11:09 AM BST, Sergiy Kibrik wrote:
>>> --- a/xen/arch/x86/cpu/Makefile
>>> +++ b/xen/arch/x86/cpu/Makefile
>>> @@ -6,10 +6,10 @@ obj-y += amd.o
>>> obj-y += centaur.o
>>> obj-y += common.o
>>
09.08.24 13:36, Alejandro Vallejo:
On Fri Aug 9, 2024 at 11:09 AM BST, Sergiy Kibrik wrote:
With specific config option INTEL in place and most of the code that depends
on intel.c now can be optionally enabled/disabled it's now possible to put
the whole intel.c under INTEL option as well. This w
On 09.08.2024 16:34, Frediano Ziglio wrote:
> On Fri, Aug 9, 2024 at 3:02 PM Jan Beulich wrote:
>>
>> On 09.08.2024 15:50, Frediano Ziglio wrote:
>>> On Fri, Aug 9, 2024 at 1:59 PM Jan Beulich wrote:
On 09.08.2024 14:48, Frediano Ziglio wrote:
> On Thu, Aug 8, 2024 at 9:25 AM Jan Be
On 09.08.2024 17:02, Stewart Hildebrand wrote:
> On 8/9/24 09:05, Jan Beulich wrote:
>> On 09.08.2024 06:09, Stewart Hildebrand wrote:
>>> On 8/7/24 11:21, Jan Beulich wrote:
On 07.08.2024 07:20, Stewart Hildebrand wrote:
> --- a/xen/arch/x86/msi.c
> +++ b/xen/arch/x86/msi.c
> @@ -
Hi Stefano,
On 10/08/2024 08:59, Stefano Stabellini wrote:
> Use expect to invoke QEMU so that we can terminate the test as soon as
> we get the right string in the output instead of waiting until the
> final timeout.
This is a great improvement.
>
> For timeout, instead of an hardcoding the val
Hi Stefano,
On 10/08/2024 08:59, Stefano Stabellini wrote:
> It will be used for QEMU tests.
>
> Signed-off-by: Stefano Stabellini
Reviewed-by: Michal Orzel
~Michal
Hi Stefano,
On 10/08/2024 08:59, Stefano Stabellini wrote:
> The Yocto jobs take a long time to run. We are changing Gitlab ARM64
> runners and the new runners might not be able to finish the Yocto jobs
> in a reasonable time.
>
> For now, disable the Yocto jobs by turning them into "manual" trig
54 matches
Mail list logo