This run is configured for baseline tests only.
flight 74952 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74952/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf e4e314b1b6b74c46da3c0493e7a807df28cb9aed
baseline v
On Tue, Jul 10, 2018 at 05:58:58PM -0500, Doug Goldstein wrote:
> a75703b2f0f585a2fc6a7bcdb7d16a61bcf5e6b0 unconditionally enabled
> building of rombios and stubdoms but unfortunately these two pieces do
> not build successfully with clang. rombios unconditionally depends on
> the build of iPXE and
>>> On 10.07.18 at 17:35, wrote:
> On Tue, Jul 10, 2018 at 08:09:06AM -0600, Jan Beulich wrote:
>> >>> On 10.07.18 at 15:49, wrote:
>> > On Tue, Jul 10, 2018 at 05:47:19AM -0600, Jan Beulich wrote:
>> >> >>> On 10.07.18 at 13:00, wrote:
>> >> > On Mon, Jul 09, 2018 at 06:45:16PM +0200, Roger Pau
On Tue, 2018-07-10 at 11:34 -0400, Boris Ostrovsky wrote:
> On 07/10/2018 11:15 AM, Jan Beulich wrote:
> > > > > On 10.07.18 at 16:49, wrote:
> > >
> > > Currently it's possible to hit an assertion in alloc_heap_pages():
> > >
> > > Assertion 'first_dirty != INVALID_DIRTY_IDX || !(pg[i].count_in
>>> On 10.07.18 at 18:18, wrote:
>> From: George Dunlap [mailto:george.dun...@citrix.com]
>> Sent: 10 July 2018 17:13
>> On 07/07/2018 12:05 PM, Paul Durrant wrote:
>> > @@ -1144,14 +1146,13 @@ map_grant_ref(
>> > !(old_pin & (GNTPIN_hstw_mask|GNTPIN_devw_mask)) )
>> > {
>>
> -Original Message-
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: 11 July 2018 08:57
> To: Paul Durrant
> Cc: Julien Grall ; Andrew Cooper
> ; George Dunlap
> ; Ian Jackson ; Wei Liu
> ; Jun Nakajima ; Kevin Tian
> ; Stefano Stabellini ; xen-
> devel ; Konrad Rzeszutek Wilk
> ; T
flight 74953 distros-debian-squeeze real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74953/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-i386-squeeze-netboot-pygrub 10 debian-di-install fail like
74934
test-amd64-amd64-amd
On Wed, Jul 11, 2018 at 01:09:30AM -0600, Jan Beulich wrote:
> >>> On 10.07.18 at 17:35, wrote:
> > On Tue, Jul 10, 2018 at 08:09:06AM -0600, Jan Beulich wrote:
> >> >>> On 10.07.18 at 15:49, wrote:
> >> > On Tue, Jul 10, 2018 at 05:47:19AM -0600, Jan Beulich wrote:
> >> >> >>> On 10.07.18 at 13:
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 10 July 2018 14:20
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Andrew Cooper ; George Dunlap
> ; Ian Jackson ; Jan
> Beulich ; Julien Grall ; Konrad
> Rzeszutek Wilk ; Stefano Stabellini
> ; T
>>> On 11.07.18 at 10:29, wrote:
> On Wed, Jul 11, 2018 at 01:09:30AM -0600, Jan Beulich wrote:
>> Another possible thing to try might be to make the extern declaration
>> of the symbol weak, and drop the offending line altogether.
>
> Oh, that didn't occur to me, and does seem to work. Below is
On Wed, Jul 11, 2018 at 02:48:25AM -0600, Jan Beulich wrote:
> >>> On 11.07.18 at 10:29, wrote:
> > On Wed, Jul 11, 2018 at 01:09:30AM -0600, Jan Beulich wrote:
> >> Another possible thing to try might be to make the extern declaration
> >> of the symbol weak, and drop the offending line altogethe
On Wed, Jul 11, 2018 at 10:55:56AM +0200, Daniel Kiper wrote:
> On Wed, Jul 11, 2018 at 02:48:25AM -0600, Jan Beulich wrote:
> > >>> On 11.07.18 at 10:29, wrote:
> > > On Wed, Jul 11, 2018 at 01:09:30AM -0600, Jan Beulich wrote:
> > >> Another possible thing to try might be to make the extern decl
On Wed, Jul 11, 2018 at 02:48:25AM -0600, Jan Beulich wrote:
> >>> On 11.07.18 at 10:29, wrote:
> > On Wed, Jul 11, 2018 at 01:09:30AM -0600, Jan Beulich wrote:
> >> Another possible thing to try might be to make the extern declaration
> >> of the symbol weak, and drop the offending line altogethe
On Tue 10-07-18 19:20:20, Leon Romanovsky wrote:
> On Tue, Jul 10, 2018 at 04:14:10PM +0200, Michal Hocko wrote:
> > On Tue 10-07-18 16:40:40, Leon Romanovsky wrote:
> > > On Mon, Jul 09, 2018 at 02:29:08PM +0200, Michal Hocko wrote:
> > > > On Wed 27-06-18 09:44:21, Michal Hocko wrote:
> > > > > T
On 07/07/2018 12:05 PM, Paul Durrant wrote:
> +long do_iommu_op(unsigned int nr_bufs,
> + XEN_GUEST_HANDLE_PARAM(xen_iommu_op_buf_t) bufs)
> +{
> +unsigned int i;
> +long rc;
> +
> +rc = xsm_iommu_op(XSM_PRIV, current->domain);
My only comment here is, doesn't this mean
On Wed, Jul 11, 2018 at 10:59:20AM +0200, Roger Pau Monné wrote:
> On Wed, Jul 11, 2018 at 10:55:56AM +0200, Daniel Kiper wrote:
> > On Wed, Jul 11, 2018 at 02:48:25AM -0600, Jan Beulich wrote:
> > > >>> On 11.07.18 at 10:29, wrote:
> > > > On Wed, Jul 11, 2018 at 01:09:30AM -0600, Jan Beulich wro
On Wed, 2018-05-30 at 13:09 +0200, Juergen Gross wrote:
> There is no need to set the same capabilities for each cpu
> individually. This can easily be done for all cpus when starting the
> kernel.
>
> Upstream commit: 0808e80cb760de2733c0527d2090ed2205a1eef8 ("xen: set
> cpu capabilities from xen
On Sat, Jul 7, 2018 at 12:05 PM, Paul Durrant wrote:
> Ranges that should be considered reserved in the IOMMU are not necessarily
> limited to RMRRs. If iommu_inclusive_mapping is set then any frame number
> falling within an E820 reserved region should also be considered as
> reserved in the IOMM
flight 125100 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125100/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 99fd30431d565412707f7a1e1a23461d10d07e85
baseline version:
ovmf e4e314b1b6b74c46da3c0
>>> On 11.07.18 at 11:02, wrote:
> On Wed, Jul 11, 2018 at 02:48:25AM -0600, Jan Beulich wrote:
>> >>> On 11.07.18 at 10:29, wrote:
>> > On Wed, Jul 11, 2018 at 01:09:30AM -0600, Jan Beulich wrote:
>> >> Another possible thing to try might be to make the extern declaration
>> >> of the symbol wea
On Wed, Jul 11, 2018 at 11:11:05AM +0200, Daniel Kiper wrote:
> On Wed, Jul 11, 2018 at 10:59:20AM +0200, Roger Pau Monné wrote:
> > On Wed, Jul 11, 2018 at 10:55:56AM +0200, Daniel Kiper wrote:
> > > If this works in all cases (build with tools with and without PE support,
> > > xen.efi and xen.gz
On 11/07/18 11:15, Woodhouse, David wrote:
> On Wed, 2018-05-30 at 13:09 +0200, Juergen Gross wrote:
>> There is no need to set the same capabilities for each cpu
>> individually. This can easily be done for all cpus when starting the
>> kernel.
>>
>> Upstream commit: 0808e80cb760de2733c0527d2090ed
On Wed, Jul 11, 2018 at 11:36:40AM +0200, Roger Pau Monné wrote:
> On Wed, Jul 11, 2018 at 11:11:05AM +0200, Daniel Kiper wrote:
> > On Wed, Jul 11, 2018 at 10:59:20AM +0200, Roger Pau Monné wrote:
> > > On Wed, Jul 11, 2018 at 10:55:56AM +0200, Daniel Kiper wrote:
> > > > If this works in all case
On Wed, 2018-07-11 at 11:46 +0200, Juergen Gross wrote:
> On 11/07/18 11:15, Woodhouse, David wrote:
> >
> > On Wed, 2018-05-30 at 13:09 +0200, Juergen Gross wrote:
> > >
> > > There is no need to set the same capabilities for each cpu
> > > individually. This can easily be done for all cpus wh
Dear xen expert:
From the blocked information, we found that the CPU 14 and CPU 19 is
blocked, and the call trace is mainly about:
[68915.792526] [] on_each_cpu+0x28/0x60
[68915.792540] [] decrease_reservation+0x261/0x2f0
[68915.792555] [] alloc_xenballooned_pages+0xe6/0x180
[68915.7925
On Wed, Jul 11, 2018 at 11:03:53AM +0200, Michal Hocko wrote:
> On Tue 10-07-18 19:20:20, Leon Romanovsky wrote:
> > On Tue, Jul 10, 2018 at 04:14:10PM +0200, Michal Hocko wrote:
> > > On Tue 10-07-18 16:40:40, Leon Romanovsky wrote:
> > > > On Mon, Jul 09, 2018 at 02:29:08PM +0200, Michal Hocko wr
lld (the llvm linker) has some issues with Xen linker script. It
doesn't understand '||' in assert expressions:
ld-melf_x86_64_fbsd -T xen.lds -N prelink.o --build-id=sha1 \
/root/src/xen/xen/common/symbols-dummy.o -o /root/src/xen/xen/.xen-syms.0
ld: error: xen.lds:260: malformed number:
flight 125101 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125101/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 07/07/2018 12:05 PM, Paul Durrant wrote:
> @@ -35,17 +93,33 @@ static void iommu_op(xen_iommu_op_t *op)
>
> int do_one_iommu_op(xen_iommu_op_buf_t *buf)
> {
> -xen_iommu_op_t op;
> +xen_iommu_op_t op = {};
> +size_t offset;
> +static const size_t op_size[] = {
> +[XEN
flight 125103 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125103/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen f5d10dc2909c84e4ffc7240e542c513ed480aa04
baseline version:
xen 2ddf
On Wed, Jul 11, 2018 at 12:25:21PM +0200, Roger Pau Monne wrote:
> lld (the llvm linker) has some issues with Xen linker script. It
> doesn't understand '||' in assert expressions:
>
> ld-melf_x86_64_fbsd -T xen.lds -N prelink.o --build-id=sha1 \
> /root/src/xen/xen/common/symbols-dummy.o
On Sat, Jul 7, 2018 at 12:05 PM, Paul Durrant wrote:
> This patch adds a new method to the VT-d IOMMU implementation to find the
> MFN currently mapped by the specified BFN along with a wrapper function in
> generic IOMMU code to call the implementation if it exists.
>
> This functionality will be
flight 125057 xen-4.7-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125057/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-xtf-amd64-amd64-1 50 xtf/test-hvm64-lbr-tsx-vmentry fail like 124880
test-xtf-amd64-amd64-2 50 xt
On Wed 11-07-18 13:14:47, Leon Romanovsky wrote:
> On Wed, Jul 11, 2018 at 11:03:53AM +0200, Michal Hocko wrote:
> > On Tue 10-07-18 19:20:20, Leon Romanovsky wrote:
> > > On Tue, Jul 10, 2018 at 04:14:10PM +0200, Michal Hocko wrote:
> > > > On Tue 10-07-18 16:40:40, Leon Romanovsky wrote:
> > > >
On 07/07/2018 12:05 PM, Paul Durrant wrote:
> ...for some uses of get_page_from_gfn().
>
> There are many occurences of the following pattern in the code:
>
> q = ? P2M_ALLOC : P2M_UNSHARE;
> page = get_page_from_gfn(d, gfn, &p2mt, q);
>
> if ( p2m_is_paging(p2mt) )
> {
>
On Tue, Jul 10, 2018 at 07:54:51AM -0600, Jan Beulich wrote:
> >>> On 10.07.18 at 12:48, wrote:
> > On Fri, Jul 06, 2018 at 09:08:29AM -0600, Jan Beulich wrote:
> >> >>> On 06.07.18 at 16:02, wrote:
> >> > On Thu, Jul 05, 2018 at 02:18:03AM -0600, Jan Beulich wrote:
> >> >> >>> On 04.07.18 at 18:
This run is configured for baseline tests only.
flight 74954 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74954/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt6 libvirt-build
On 07/07/2018 12:05 PM, Paul Durrant wrote:
> This patch adds iommu_ops to add (map) or remove (unmap) frames in the
> domain's IOMMU mappings, and an iommu_op to synchronize (flush) those
> manipulations with the hardware.
>
> Mappings added by the map operation are tracked and only those mapping
On Wed, Jul 11, 2018 at 12:42:48PM +0200, Daniel Kiper wrote:
> On Wed, Jul 11, 2018 at 12:25:21PM +0200, Roger Pau Monne wrote:
> > lld (the llvm linker) has some issues with Xen linker script. It
> > doesn't understand '||' in assert expressions:
> >
> > ld-melf_x86_64_fbsd -T xen.lds -N pre
flight 125105 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125105/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf c6a14de3ef30291918f3b15436cf6a75db413eea
baseline version:
ovmf 99fd30431d565412707f7
I've been considering to add a respective command line option for
quite a long time, but never got around to. Now that the TLBleed
information is public[1], we're at point where we not only want,
but need this, and where perhaps it needs to be the default on
affected systems. The first 5 patches ar
On Tue, Jul 10, 2018 at 08:05:56AM -0600, Jan Beulich wrote:
> >>> On 10.07.18 at 13:35, wrote:
> > On Fri, Jul 06, 2018 at 09:16:38AM -0600, Jan Beulich wrote:
> >> >>> On 06.07.18 at 16:46, wrote:
> >> > OK, xen.mb.efi does not need relocs because:
> >> > - we generate PE file from xen-syms f
On Wed, Jul 11, 2018 at 01:46:56PM +0200, Roger Pau Monné wrote:
> On Wed, Jul 11, 2018 at 12:42:48PM +0200, Daniel Kiper wrote:
> > On Wed, Jul 11, 2018 at 12:25:21PM +0200, Roger Pau Monne wrote:
> > > lld (the llvm linker) has some issues with Xen linker script. It
> > > doesn't understand '||'
While I've run into the issue with further patches in place which no
longer guarantee the per-CPU area to start out as all zeros, the
CPU_DOWN_FAILED processing looks to have the same issue: By not zapping
the per-CPU cpupool pointer, cpupool_cpu_add()'s (indirect) invocation
of schedule_cpu_switch
In order to be able to service #MC on offlined CPUs, GDT, IDT, stack,
and per-CPU data (which includes the TSS) need to be kept allocated.
They should only be freed upon CPU removal (which we currently don't
support, so some code is becoming effectively dead for the moment).
Signed-off-by: Jan Beu
The function's use of the stop-machine logic has so far prevented its
use ahead of the processing of the "ordinary" initcalls. Since at this
early time we're in a controlled environment anyway, there's no need for
such a heavy tool. Additionally this ought to have less of a performance
impact espec
Fam17 replaces CUs by HTs, which we should reflect accordingly, even if
the difference is not very big. The most relevant change (requiring some
code restructuring) is that the topoext feature no longer means there is
a valid CU ID.
Take the opportunity and convert wrongly plain int variables in
s
On Wed, Jul 11, 2018 at 01:13:18PM +0200, Michal Hocko wrote:
> On Wed 11-07-18 13:14:47, Leon Romanovsky wrote:
> > On Wed, Jul 11, 2018 at 11:03:53AM +0200, Michal Hocko wrote:
> > > On Tue 10-07-18 19:20:20, Leon Romanovsky wrote:
> > > > On Tue, Jul 10, 2018 at 04:14:10PM +0200, Michal Hocko wr
Reportedly Intel CPUs which can't broadcast #MC to all targeted
cores/threads because some have CR4.MCE clear will shut down. Therefore
we want to keep CR4.MCE enabled when offlining a CPU, and we need to
bring up all CPUs in order to be able to set CR4.MCE in the first place.
The use of clear_in_
Shared resources (L1 cache and TLB in particular) present a risk of
information leak via side channels. Don't use hyperthreads in such
cases, but allow independent control of their use at the same time.
Signed-off-by: Jan Beulich
---
An option to avoid the up/down cycle would be to avoid clearing
In the shim case, the number of CPUs should be solely controlled by the
guest configuration file. Make sure the command line options are fully
(and not just partially) ignored.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/setup.c
+++ b/xen/arch/x86/setup.c
@@ -1498,6 +1498,15 @@ void __init nor
Drop unnecessary casts and use bool in favor of bool_t.
Signed-off-by: Jan Beulich
--- a/xen/include/xen/cpumask.h
+++ b/xen/include/xen/cpumask.h
@@ -345,9 +345,9 @@ static inline int cpulist_scnprintf(char
typedef cpumask_t *cpumask_var_t;
-static inline bool_t alloc_cpumask_var(cpumask_v
On 11/07/18 13:12, Jan Beulich wrote:
> Drop unnecessary casts and use bool in favor of bool_t.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/li
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 11 July 2018 11:34
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; Andrew Cooper
> ; George Dunlap
> ; Ian Jackson ; Konrad
> Rzeszutek Wilk ; Stefano Stabellini
> ; Tim (Xen.org) ;
On 11/07/18 13:11, Jan Beulich wrote:
> In the shim case, the number of CPUs should be solely controlled by the
> guest configuration file. Make sure the command line options are fully
> (and not just partially) ignored.
>
> Signed-off-by: Jan Beulich
Ideally with "This option is ignored in **pv-
> -Original Message-
> From: dunl...@gmail.com [mailto:dunl...@gmail.com] On Behalf Of
> George Dunlap
> Sent: 11 July 2018 11:52
> To: Paul Durrant
> Cc: xen-devel ; Kevin Tian
> ; Jan Beulich
> Subject: Re: [Xen-devel] [PATCH v2 09/13] vtd: add lookup_page method to
> iommu_ops
>
> On
>>> On 11.07.18 at 13:41, wrote:
> On Tue, Jul 10, 2018 at 07:54:51AM -0600, Jan Beulich wrote:
>> >>> On 10.07.18 at 12:48, wrote:
>> > On Fri, Jul 06, 2018 at 09:08:29AM -0600, Jan Beulich wrote:
>> >> >>> On 06.07.18 at 16:02, wrote:
>> >> > On Thu, Jul 05, 2018 at 02:18:03AM -0600, Jan Beuli
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 11 July 2018 12:24
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; Andrew Cooper
> ; George Dunlap
> ; Ian Jackson ; Julien
> Grall ; Konrad Rzeszutek Wilk
> ; Stefano Stabellini ; T
>>> On 11.07.18 at 13:57, wrote:
> On Tue, Jul 10, 2018 at 08:05:56AM -0600, Jan Beulich wrote:
>> >>> On 10.07.18 at 13:35, wrote:
>> > On Fri, Jul 06, 2018 at 09:16:38AM -0600, Jan Beulich wrote:
>> >> >>> On 06.07.18 at 16:46, wrote:
>> >> > OK, xen.mb.efi does not need relocs because:
>> >>
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 11 July 2018 12:46
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; Andrew Cooper
> ; George Dunlap
> ; Ian Jackson ; Julien
> Grall ; Konrad Rzeszutek Wilk
> ; Stefano Stabellini ; T
flight 125059 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125059/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64 16 guest-localmigrate/x10 fail REGR.
vs. 124994
Regressi
Ian Jackson writes ("[PATCH] xen/Makefile: Bump version to 4.11.1-pre for
ongoing 4.11 stable branch"):
> I will push this change on Wednesday, after 4.11 is released, and then
> 4.11 can be handed over to the stable maintainers.
Now done. staging-4.11 is open for business.
Ian.
__
On 07/11/2018 01:31 PM, Paul Durrant wrote:
>>> diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c
>>> index c6b99c4116..510f37f100 100644
>>> --- a/xen/common/grant_table.c
>>> +++ b/xen/common/grant_table.c
>>> @@ -375,39 +375,23 @@ static int get_paged_frame(unsigned long gfn,
>> m
> -Original Message-
> From: George Dunlap [mailto:george.dun...@citrix.com]
> Sent: 11 July 2018 14:05
> To: Paul Durrant ; xen-devel@lists.xenproject.org
> Cc: Jan Beulich ; Andrew Cooper
> ; Ian Jackson ;
> Julien Grall ; Konrad Rzeszutek Wilk
> ; Stefano Stabellini ; Tim
> (Xen.org) ; W
Install nasm and build ovmf with gcc on x86.
Signed-off-by: Wei Liu
---
I have tested stretch 64 bit and 32 bit containers.
I haven't tested the build script itself.
---
automation/build/centos/7.2.dockerfile | 1 +
automation/build/debian/jessie.dockerfile | 1 +
automation/buil
While indirect calls have always been more expensive than direct ones,
their cost has further increased with the Spectre v2 mitigations. In a
number of cases we simply pointlessly use them in the first place. In
many other cases the indirection solely exists to abstract from e.g.
vendor specific ha
flight 125104 freebsd-master real [real]
http://logs.test-lab.xenproject.org/osstest/logs/125104/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
freebsd 784d607328d1205ced136be9f87c76ee51bcac5e
baseline version:
freebsd 22dad49e0cc
Three of the four hooks are not exposed outside of vmx.c, and all of
them have only a single possible non-NULL value. So there's no reason to
use hooks here - a simple set of flag indicators is sufficient (and we
don't even need a flag for the VM entry one, as it's always
(de-)activated together th
Instead of checking hvm_tsc_scaling_supported inside the hook function,
install the hook only when setting state such that said predicate
becomes true.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -1283,7 +1283,7 @@ static void vmx_handle_cd(str
From: Suravee Suthikulpanit
This patch modifies the hvm_funcs.virtual_intr_delivery_enabled()
to become a bool variable as VMX does and SVM will simply return a
static value.
Signed-off-by: Suravee Suthikulpanit
Signed-off-by: Jan Beulich
---
Extracted from an SVM/AVIC series patch.
--- a/xen
Commit a1b1572833 ("VMX: add VMFUNC leaf 0 (EPTP switching) to
emulator") needlessly introduced it, and no user has appeared since.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/vmx/vmx.c
+++ b/xen/arch/x86/hvm/vmx/vmx.c
@@ -76,7 +76,6 @@ static void vmx_fpu_dirty_intercept(void
static int
It's used in quite a few places, and hence doing so eases subsequent
adjustment to how these (indirect) calls are carried out.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/domain.c
+++ b/xen/arch/x86/hvm/domain.c
@@ -317,9 +317,9 @@ int arch_set_info_hvm_guest(struct vcpu
/* Sync AP'
Since the generic pattern rules don't match those, explicit rules need
to be put in place for this to work.
Signed-off-by: Jan Beulich
--- a/xen/Makefile
+++ b/xen/Makefile
@@ -249,6 +249,17 @@ FORCE:
%/: FORCE
$(MAKE) -f $(BASEDIR)/Rules.mk -C $* built_in.o built_in_bin.o
+build-inte
This isn't as much of an optimization than to avoid triggering a gcc bug
affecting 5.x ... 7.x, triggered by any asm() put inside the ad hoc
"rewalk" loop and taking as an (output?) operand a register variable
tied to %rdx (an "rdx" clobber is fine). The issue is due to an apparent
collision in reg
As was validly pointed out as motivation for similar Linux side changes
(https://lkml.org/lkml/2018/6/22/677), using long sequences of
directives and auxiliary instructions, like is commonly the case when
setting up an alternative patch site, gcc can be mislead into believing
an asm() to be more he
In a number of cases the targets of indirect calls get determined once
at boot time. In such cases we can replace those calls with direct ones
via our alternative instruction patching mechanism.
Some of the targets (in particular the hvm_funcs ones) get established
only in pre-SMP initcalls, makin
On 11/07/18 14:29, Jan Beulich wrote:
> This isn't as much of an optimization than to avoid triggering a gcc bug
> affecting 5.x ... 7.x, triggered by any asm() put inside the ad hoc
> "rewalk" loop and taking as an (output?) operand a register variable
> tied to %rdx (an "rdx" clobber is fine). Th
This is intentionally not touching hooks used rarely (or not at all)
during the lifetime of a VM, like {domain,vcpu}_initialise or cpu_up,
as well as nested, VM event, and altp2m ones (they can all be done
later, if so desired). Virtual Interrupt delivery ones will be dealt
with in a subsequent pat
While not strictly necessary, change the VMX initialization logic to
update the function table in start_vmx() from NULL rather than to NULL,
to make more obvious that we won't ever change an already (explictly)
initialized function pointer.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/vlapi
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/cpu/common.c
+++ b/xen/arch/x86/cpu/common.c
@@ -196,7 +196,7 @@ void ctxt_switch_levelling(const struct
}
if (ctxt_switch_masking)
- ctxt_switch_masking(next);
+ alternative_vcall1(ctxt_switch_masking, ne
All flavors specify target_cpus_all() anyway - replace use of the hook
by &cpu_online_map.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/genapic/delivery.c
+++ b/xen/arch/x86/genapic/delivery.c
@@ -5,12 +5,6 @@
#include
#include
-
-const cpumask_t *target_cpus_all(void)
-{
- return &
Instead of loading a pointer at each use site, have a single runtime
instance of struct genapic, copying into it from the individual
instances. The individual instances can this way also be moved to .init
(also adjust apic_probe[] at this occasion).
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/
For (I hope) obvious reasons only the ones used at runtime get
converted.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/smp.c
+++ b/xen/arch/x86/smp.c
@@ -29,12 +29,12 @@
void send_IPI_mask(const cpumask_t *mask, int vector)
{
-genapic.send_IPI_mask(mask, vector);
+alternative_vcall2
For now only the ones used during entering/exiting of idle states are
converted. Additionally pm_idle{,_save} and lapic_timer_{on,off} can't
be converted, as they may get established rather late (when Dom0 is
already active).
Note that for patching to be deferred until after the pre-SMP initcalls
At 07:29 -0600 on 11 Jul (1531294179), Jan Beulich wrote:
> This isn't as much of an optimization than to avoid triggering a gcc bug
> affecting 5.x ... 7.x, triggered by any asm() put inside the ad hoc
> "rewalk" loop and taking as an (output?) operand a register variable
> tied to %rdx (an "rdx"
>>> On 11.07.18 at 15:42, wrote:
> This is intentionally not touching hooks used rarely (or not at all)
> during the lifetime of a VM, like {domain,vcpu}_initialise or cpu_up,
> as well as nested, VM event, and altp2m ones (they can all be done
> later, if so desired). Virtual Interrupt delivery o
>>> On 11.07.18 at 15:46, wrote:
> At 07:29 -0600 on 11 Jul (1531294179), Jan Beulich wrote:
>> This isn't as much of an optimization than to avoid triggering a gcc bug
>> affecting 5.x ... 7.x, triggered by any asm() put inside the ad hoc
>> "rewalk" loop and taking as an (output?) operand a regi
On Jul 5, 2018, at 22:54, Tamas K Lengyel wrote:
>
>> On Thu, Jul 5, 2018 at 12:52 PM George Dunlap
>> wrote:
>>
>>>
Again, there was a sense that some of the issues we are seeing could be
solved if we had better
CI capability: in other words, some of the issues we were seeing
Have it take $cfgbase and $subdir instead. This allows us to lift the
config test into it. And it will be even more useful in a moment.
No functional change.
Signed-off-by: Ian Jackson
---
cr-publish-flight-logs | 10 ++
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a/cr
Signed-off-by: Ian Jackson
---
production-config-cambridge | 3 +++
1 file changed, 3 insertions(+)
diff --git a/production-config-cambridge b/production-config-cambridge
index f557614..b1360ba 100644
--- a/production-config-cambridge
+++ b/production-config-cambridge
@@ -41,6 +41,9 @@ OverlayLo
Signed-off-by: Ian Jackson
---
cr-ensure-disk-space | 5 -
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/cr-ensure-disk-space b/cr-ensure-disk-space
index 7091314..3e0288f 100755
--- a/cr-ensure-disk-space
+++ b/cr-ensure-disk-space
@@ -25,6 +25,7 @@ BEGIN { unshift @INC, qw(.)
Signed-off-by: Ian Jackson
---
Osstest.pm| 1 +
Osstest/Management.pm | 2 +-
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/Osstest.pm b/Osstest.pm
index 738ed4f..85a6e78 100644
--- a/Osstest.pm
+++ b/Osstest.pm
@@ -257,6 +257,7 @@ END
my $u = ucfirst $l;
We need to pass it $cfgbase because this will soon be configurable.
No functional change right now.
Signed-off-by: Ian Jackson
---
Osstest/Management.pm | 10 --
cr-publish-flight-logs | 3 ++-
2 files changed, 10 insertions(+), 3 deletions(-)
diff --git a/Osstest/Management.pm b/Oss
From: Ian Jackson
We finally have a VM host for publishing the test logs from the Citrix
instance of osstest. It needs an ssh bounce to get to the actual
public webserver, so we add support for that.
With this, and appropriate ssh keys, osst...@osstest.xs can run
cr-publish-flight-logs, cr-ensu
This URL is now accessible, although there are some webserver tweaks
remaining to do.
Signed-off-by: Ian Jackson
---
production-config-cambridge | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/production-config-cambridge b/production-config-cambridge
index b1360ba..8647feb 10
And delete the explicit settings from production-config.
No functional change.
Signed-off-by: Ian Jackson
---
Osstest.pm| 4 ++--
production-config | 3 ---
2 files changed, 2 insertions(+), 5 deletions(-)
diff --git a/Osstest.pm b/Osstest.pm
index 3377ea3..738ed4f 100644
--- a/Osstest
Previously this was hardcoded. Now we make a variable @ssh, and use
rsync's quoting scheme to transform it into a value suitable for -e.
No overall functional change, although now the rsync command contains
additional quotes in the -e option.
Signed-off-by: Ian Jackson
---
cr-publish-flight-lo
For debugging.
Signed-off-by: Ian Jackson
---
Osstest/PDU/pause.pm | 1 +
1 file changed, 1 insertion(+)
diff --git a/Osstest/PDU/pause.pm b/Osstest/PDU/pause.pm
index 9e839c6..b5f0322 100644
--- a/Osstest/PDU/pause.pm
+++ b/Osstest/PDU/pause.pm
@@ -46,6 +46,7 @@ sub new {
sub pdu_power_stat
This allows arguments with spaces, etc.
No functional change with the existing configurations I know about.
It would be good to fix this before any configurations are created
where this would make a difference...
Signed-off-by: Ian Jackson
---
Osstest/PDU/ipmi.pm | 14 ++
1 file cha
This is useful, for example, for passing `-I lanplus'.
Signed-off-by: Ian Jackson
---
Osstest/PDU/ipmi.pm | 2 ++
1 file changed, 2 insertions(+)
diff --git a/Osstest/PDU/ipmi.pm b/Osstest/PDU/ipmi.pm
index b6621db..d411d97 100644
--- a/Osstest/PDU/ipmi.pm
+++ b/Osstest/PDU/ipmi.pm
@@ -50,6 +50
1 - 100 of 128 matches
Mail list logo