flight 175592 xen-unstable real [real]
flight 175600 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/175592/
http://logs.test-lab.xenproject.org/osstest/logs/175600/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd6
flight 175595 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175595/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 175590
test-amd64-amd64-xl-qemuu-win7-amd6
As common isn't built for RISC-V architecture now, accordingly,
common/coverage (where __gconv_* function are defined) isn't built either
but randconfig may decide to enable CONFIG_COVERAGE which will lead to
the following compilation error:
riscv64-linux-gnu-ld: prelink.o: in function `.L0 ':
arc
flight 175597 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175597/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 175577
test-armhf-armhf-libvirt-qcow2 15 saveres
On 06/01/2023 10:28 am, Oleksii Kurochko wrote:
> As common isn't built for RISC-V architecture now, accordingly,
> common/coverage (where __gconv_* function are defined) isn't built either
> but randconfig may decide to enable CONFIG_COVERAGE which will lead to
> the following compilation error:
>
Patch #2 was the original patch. It has been expended to a series in v6.
Paul Durrant (2):
KVM: x86/cpuid: generalize kvm_update_kvm_cpuid_base() and also
capture limit
KVM: x86/xen: update Xen CPUID Leaf 4 (tsc info) sub-leaves, if
present
arch/x86/include/asm/kvm_host.h | 8
A subsequent patch will need to acquire the CPUID leaf range for emulated
Xen so explicitly pass the signature of the hypervisor we're interested in
to the new function. Also introduce a new kvm_hypervisor_cpuid structure
so we can neatly store both the base and limit leaf indices.
Signed-off-by:
The scaling information in subleaf 1 should match the values set by KVM in
the 'vcpu_info' sub-structure 'time_info' (a.k.a. pvclock_vcpu_time_info)
which is shared with the guest, but is not directly available to the VMM.
The offset values are not set since a TSC offset is already applied.
The TSC
Add parameter to skip the passed MISRA rules during the cppcheck
analysis, the rules are specified as a list of comma separated
rules with the MISRA number notation (e.g. 1.1,1.3,...).
Modify convert_misra_doc.py script to take an extra parameter
giving a list of MISRA rule to be skipped, comma se
This serie is adding a way to skip the check for some rules that the Xen project
has agreed to follow, this is because cppcheck reports too many false-positive
on some rules and it would be easier in a first phase to skip the check on them
and allow the tool to be mature enough before using it on t
Sort alphabetically cppcheck report entries when producing the text
report, this will help comparing different reports and will group
together findings from the same file.
Signed-off-by: Luca Fancellu
---
xen/scripts/xen_analysis/cppcheck_report_utils.py | 2 ++
1 file changed, 2 insertions(+)
On 05/01/2023 13:15, Andrew Cooper wrote:
>
>
> On 05/01/2023 11:19 am, Julien Grall wrote:
>> On 05/01/2023 09:59, Ayan Kumar Halder wrote:
>>> Hi Julien,
>>
>> Hi,
>>
>>> I have a clarification.
>>>
>>> On 05/01/2023 09:26, Julien Grall wrote:
CAUTION: This message has originated from a
On Tue, Jan 03, 2023 at 05:58:01PM -0500, Chuck Zmudzinski wrote:
> Hello Anthony and Paul,
Hi Chuck,
> I am requesting your feedback to Alex Williamson's suggestion that this
> problem with assigning the correct slot address to the igd on xen should
> be fixed in libxl instead of in qemu.
>
> I
Am 4. Januar 2023 15:35:33 UTC schrieb "Philippe Mathieu-Daudé"
:
>+Markus/Thomas
>
>On 4/1/23 15:44, Bernhard Beschow wrote:
>> During the last patches, TYPE_PIIX3_XEN_DEVICE turned into a clone of
>> TYPE_PIIX3_DEVICE. Remove this redundancy.
>>
>> Signed-off-by: Bernhard Beschow
>> ---
>>
On 06/01/2023 7:54 am, Jan Beulich wrote:
> On 05.01.2023 23:17, Andrew Cooper wrote:
>> On 05/01/2023 7:57 am, Jan Beulich wrote:
>>> On 04.01.2023 20:55, Andrew Cooper wrote:
On 04/01/2023 4:40 pm, Jan Beulich wrote:
> On 03.01.2023 21:09, Andrew Cooper wrote:
>> A split in virtual a
On 6/1/23 12:57, Bernhard Beschow wrote:
Am 4. Januar 2023 15:35:33 UTC schrieb "Philippe Mathieu-Daudé"
:
+Markus/Thomas
On 4/1/23 15:44, Bernhard Beschow wrote:
During the last patches, TYPE_PIIX3_XEN_DEVICE turned into a clone of
TYPE_PIIX3_DEVICE. Remove this redundancy.
Signed-off-by:
flight 175602 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175602/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 0aca5901e34489573c4e9558729704f76869e3d0
baseline version:
ovmf 8c2357809e2c352c8ba7c
On 05.01.2023 21:48, Andrew Cooper wrote:
> There are two paths in the trampoline, and Xen's PAT needs setting up in both,
> not just the boot path.
>
> Fixes: 4304ff420e51 ("x86/S3: Drop {save,restore}_rest_processor_state()
> completely")
> Signed-off-by: Andrew Cooper
Reviewed-by: Jan Beulic
On Sun, Jan 01, 2023 at 06:52:03PM -0500, Chuck Zmudzinski wrote:
> Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus,
> as noted in docs/igd-assign.txt in the Qemu source code.
>
> Currently, when the xl toolstack is used to configure a Xen HVM guest with
> Intel IGD passthroug
Signed-off-by: Oleksii Kurochko
---
xen/arch/riscv/include/asm/init.h | 12
1 file changed, 12 insertions(+)
create mode 100644 xen/arch/riscv/include/asm/init.h
diff --git a/xen/arch/riscv/include/asm/init.h
b/xen/arch/riscv/include/asm/init.h
new file mode 100644
index 0
Signed-off-by: Oleksii Kurochko
---
xen/arch/riscv/include/asm/types.h | 73 ++
1 file changed, 73 insertions(+)
create mode 100644 xen/arch/riscv/include/asm/types.h
diff --git a/xen/arch/riscv/include/asm/types.h
b/xen/arch/riscv/include/asm/types.h
new file mode
The patch introduce sbi_putchar() SBI call which is necessary
to implement initial early_printk
Signed-off-by: Oleksii Kurochko
---
xen/arch/riscv/Makefile | 1 +
xen/arch/riscv/include/asm/sbi.h | 34
xen/arch/riscv/sbi.c | 44 +
should be included because second argument of
early_puts has type 'size_t' which is defined in
Signed-off-by: Oleksii Kurochko
---
xen/include/xen/early_printk.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/xen/early_printk.h b/xen/include/xen/early_printk.h
index 0f76c3a7
The patch series introduces the following:
- the minimal set of headers and changes inside them.
- SBI (RISC-V Supervisor Binary Interface) things necessary for basic
early_printk implementation.
- things needed to set up the stack.
- early_printk() function to print only strings.
- RISC-V smoke
Signed-off-by: Oleksii Kurochko
---
xen/arch/riscv/riscv64/head.S | 4 +---
xen/arch/riscv/setup.c| 12
2 files changed, 13 insertions(+), 3 deletions(-)
diff --git a/xen/arch/riscv/riscv64/head.S b/xen/arch/riscv/riscv64/head.S
index ddc7104701..4e399016e9 100644
--- a/xen
The patch introduces a basic stuff of early_printk functionality
which will be enough to print 'hello from C environment"
Signed-off-by: Oleksii Kurochko
---
xen/arch/riscv/Kconfig.debug | 7 ++
xen/arch/riscv/Makefile | 1 +
xen/arch/riscv/early_printk.c
The patch introduces and sets up a stack in order to go to C environment
Signed-off-by: Oleksii Kurochko
---
xen/arch/riscv/Makefile | 1 +
xen/arch/riscv/riscv64/head.S | 8 +++-
xen/arch/riscv/setup.c| 6 ++
3 files changed, 14 insertions(+), 1 deletion(-)
create mode 10
Add check if there is a message 'Hello from C env' presents
in log file to be sure that stack is set and C part of early printk
is working.
Also qemu-system-riscv was added to riscv64.dockerfile as it is
required for RISC-V smoke test.
Signed-off-by: Oleksii Kurochko
---
automation/build/archli
Hi,
On 06/01/2023 13:14, Oleksii Kurochko wrote:
The patch introduce sbi_putchar() SBI call which is necessary
to implement initial early_printk
Signed-off-by: Oleksii Kurochko
---
xen/arch/riscv/Makefile | 1 +
xen/arch/riscv/include/asm/sbi.h | 34
xen/
On 06/01/2023 13:14, Oleksii Kurochko wrote:
I am guessing this is necessary because you will use will
be used later on.
If so, then I think it would be useful for mention it in the commit message.
Signed-off-by: Oleksii Kurochko
Reviewed-by: Julien Grall
Cheers,
--
Julien Grall
On 06/01/2023 13:14, Oleksii Kurochko wrote:
should be included because second argument of
early_puts has type 'size_t' which is defined in
Signed-off-by: Oleksii Kurochko
Acked-by: Julien Grall
Cheers,
---
xen/include/xen/early_printk.h | 2 ++
1 file changed, 2 insertions(+)
di
Hi,
On 06/01/2023 13:14, Oleksii Kurochko wrote:
The patch introduces a basic stuff of early_printk functionality
which will be enough to print 'hello from C environment"
Signed-off-by: Oleksii Kurochko
---
xen/arch/riscv/Kconfig.debug | 7 ++
xen/arch/riscv/Makefile
On 06/01/2023 1:14 pm, Oleksii Kurochko wrote:
> The patch series introduces the following:
> - the minimal set of headers and changes inside them.
> - SBI (RISC-V Supervisor Binary Interface) things necessary for basic
> early_printk implementation.
> - things needed to set up the stack.
> - ear
Hi,
On 06/01/2023 13:14, Oleksii Kurochko wrote:
The patch introduces and sets up a stack in order to go to C environment
Signed-off-by: Oleksii Kurochko
---
xen/arch/riscv/Makefile | 1 +
xen/arch/riscv/riscv64/head.S | 8 +++-
xen/arch/riscv/setup.c| 6 ++
3 files
On 1/6/23 5:52 AM, Anthony PERARD wrote:
> On Tue, Jan 03, 2023 at 05:58:01PM -0500, Chuck Zmudzinski wrote:
>> Hello Anthony and Paul,
>
> Hi Chuck,
>
>> I am requesting your feedback to Alex Williamson's suggestion that this
>> problem with assigning the correct slot address to the igd on xen s
On Sun, Jan 01, 2023 at 06:52:03PM -0500, Chuck Zmudzinski wrote:
> Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus,
> as noted in docs/igd-assign.txt in the Qemu source code.
>
> Currently, when the xl toolstack is used to configure a Xen HVM guest with
> Intel IGD passthroug
On 1/6/23 9:03 AM, Anthony PERARD wrote:
> On Sun, Jan 01, 2023 at 06:52:03PM -0500, Chuck Zmudzinski wrote:
>> Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus,
>> as noted in docs/igd-assign.txt in the Qemu source code.
>>
>> Currently, when the xl toolstack is used to config
On 06.01.2023 14:14, Oleksii Kurochko wrote:
> Signed-off-by: Oleksii Kurochko
> ---
> xen/arch/riscv/include/asm/types.h | 73 ++
> 1 file changed, 73 insertions(+)
> create mode 100644 xen/arch/riscv/include/asm/types.h
>
> diff --git a/xen/arch/riscv/include/asm/t
On 06.01.2023 14:14, Oleksii Kurochko wrote:
> --- a/xen/arch/riscv/riscv64/head.S
> +++ b/xen/arch/riscv/riscv64/head.S
> @@ -1,4 +1,10 @@
> .section .text.header, "ax", %progbits
>
> ENTRY(start)
> -j start
> +la sp, cpu0_boot_stack
> +li t0, PAGE_SI
On 1/6/23 9:10 AM, Chuck Zmudzinski wrote:
> On 1/6/23 9:03 AM, Anthony PERARD wrote:
>> On Sun, Jan 01, 2023 at 06:52:03PM -0500, Chuck Zmudzinski wrote:
>>> Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus,
>>> as noted in docs/igd-assign.txt in the Qemu source code.
>>>
>>>
On Fri, Jan 06, 2023 at 09:10:55AM -0500, Chuck Zmudzinski wrote:
> Well, our messages almost collided! I just proposed a v7 that adds
> a check to prevent the extra processing for cases when machine is
> not xenfv and the slot does not need to be cleared because it was
> never reserved. The propos
Hi Julien,
> -Original Message-
> Subject: [PATCH 19/22] xen/arm32: mm: Rename 'first' to 'root' in
> init_secondary_pagetables()
>
> From: Julien Grall
>
> The arm32 version of init_secondary_pagetables() will soon be re-used
> for arm64 as well where the root table start at level 0 ra
Hi Julien,
> -Original Message-
> Subject: [PATCH 12/22] xen/arm: fixmap: Rename the fixmap slots to follow
> the x86 convention
>
> From: Julien Grall
>
> At the moment the fixmap slots are prefixed differently between arm and
> x86.
>
> Some of them (e.g. the PMAP slots) are used in
Hi Julien,
> -Original Message-
> Subject: [PATCH 20/22] xen/arm64: mm: Use per-pCPU page-tables
>
> From: Julien Grall
>
> At the moment, on Arm64, every pCPU are sharing the same page-tables.
Nit: s/every pCPU are/ every pCPU is/
>
> /*
> diff --git a/xen/arch/arm/include/asm/doma
Hi Julien,
> -Original Message-
> Subject: [PATCH 21/22] xen/arm64: Implement a mapcache for arm64
>
> From: Julien Grall
>
> At the moment, on arm64, map_domain_page() is implemented using
> virt_to_mfn(). Therefore it is relying on the directmap.
>
> In a follow-up patch, we will all
Hi Julien,
> -Original Message-
> Subject: [PATCH 22/22] xen/arm64: Allow the admin to enable/disable the
> directmap
>
> From: Julien Grall
>
> Implement the same command line option as x86 to enable/disable the
> directmap. By default this is kept enabled.
>
> Also modify setup_direc
On 1/6/23 9:31 AM, Chuck Zmudzinski wrote:
> On 1/6/23 9:10 AM, Chuck Zmudzinski wrote:
>> On 1/6/23 9:03 AM, Anthony PERARD wrote:
>>> On Sun, Jan 01, 2023 at 06:52:03PM -0500, Chuck Zmudzinski wrote:
Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus,
as noted in docs/
On 06/01/2023 1:14 pm, Oleksii Kurochko wrote:
> diff --git a/xen/arch/riscv/riscv64/head.S b/xen/arch/riscv/riscv64/head.S
> index 990edb70a0..ddc7104701 100644
> --- a/xen/arch/riscv/riscv64/head.S
> +++ b/xen/arch/riscv/riscv64/head.S
> @@ -1,4 +1,10 @@
> .section .text.header, "ax", %p
On 06/01/2023 1:14 pm, Oleksii Kurochko wrote:
> Add check if there is a message 'Hello from C env' presents
> in log file to be sure that stack is set and C part of early printk
> is working.
>
> Also qemu-system-riscv was added to riscv64.dockerfile as it is
> required for RISC-V smoke test.
>
>
On 06/01/2023 1:40 pm, Julien Grall wrote:
> Hi,
>
> On 06/01/2023 13:14, Oleksii Kurochko wrote:
>> The patch introduce sbi_putchar() SBI call which is necessary
>> to implement initial early_printk
>>
>> Signed-off-by: Oleksii Kurochko
>> ---
>> xen/arch/riscv/Makefile | 1 +
>> xen
Hi Oleksii,
On 06/01/2023 14:14, Oleksii Kurochko wrote:
>
>
> The patch introduce sbi_putchar() SBI call which is necessary
> to implement initial early_printk
>
> Signed-off-by: Oleksii Kurochko
> ---
> xen/arch/riscv/Makefile | 1 +
> xen/arch/riscv/include/asm/sbi.h | 34 +++
Hi Andrew,
On 06/01/2023 15:19, Andrew Cooper wrote:
On 06/01/2023 1:40 pm, Julien Grall wrote:
Hi,
On 06/01/2023 13:14, Oleksii Kurochko wrote:
The patch introduce sbi_putchar() SBI call which is necessary
to implement initial early_printk
Signed-off-by: Oleksii Kurochko
---
xen/arch/ri
Hi Henry,
On 06/01/2023 14:54, Henry Wang wrote:
-Original Message-
Subject: [PATCH 20/22] xen/arm64: mm: Use per-pCPU page-tables
From: Julien Grall
At the moment, on Arm64, every pCPU are sharing the same page-tables.
Nit: s/every pCPU are/ every pCPU is/
I will fix it.
/
flight 175599 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175599/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-xsm 8 xen-boot fail REGR. vs. 173462
test-amd64-amd64-li
flight 175604 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175604/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5386c9e6dab2f6a555e679aff9f6a59f60c8e029
baseline version:
ovmf 0aca5901e34489573c4e9
On Thu, Dec 22, 2022 at 04:28:56PM +0100, Carlo Nonato wrote:
> > Could you invent a name that is more specific? Maybe "cache_colors" or
> > something, or "vcpu_cache_colors".
>
> What about llc_colors? LLC stands for Last Level Cache and I'm trying to use
> it everywhere else since it's what is r
On Fri, Jan 06, 2023 at 03:14:25PM +0200, Oleksii Kurochko wrote:
> The patch introduce sbi_putchar() SBI call which is necessary
> to implement initial early_printk
>
I think that it might be wise to start off with an alternative to
sbi_putchar() since it is already planned for deprecation. I re
On 20/12/2022 6:23 am, Bobby Eshleman wrote:
> On Fri, Jan 06, 2023 at 03:14:25PM +0200, Oleksii Kurochko wrote:
>> The patch introduce sbi_putchar() SBI call which is necessary
>> to implement initial early_printk
>>
> I think that it might be wise to start off with an alternative to
> sbi_putchar
On Fri, Jan 06, 2023 at 05:16:31PM +, Andrew Cooper wrote:
> On 20/12/2022 6:23 am, Bobby Eshleman wrote:
> > On Fri, Jan 06, 2023 at 03:14:25PM +0200, Oleksii Kurochko wrote:
> >> The patch introduce sbi_putchar() SBI call which is necessary
> >> to implement initial early_printk
> >>
> > I th
On Wed, 2023-01-04 at 15:44 +0100, Bernhard Beschow wrote:
> + if (xen_enabled()) {
Could this perhaps be if (xen_mode != XEN_DISABLED) once we merge the
Xen-on-KVM series?
smime.p7s
Description: S/MIME cryptographic signature
On 1/6/23 12:35 PM, David Woodhouse wrote:
> On Wed, 2023-01-04 at 15:44 +0100, Bernhard Beschow wrote:
>> + if (xen_enabled()) {
>
> Could this perhaps be if (xen_mode != XEN_DISABLED) once we merge the
> Xen-on-KVM series?
I am not an expert and just on here as a user/tester, but I think
flight 175601 xen-unstable real [real]
flight 175607 xen-unstable real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/175601/
http://logs.test-lab.xenproject.org/osstest/logs/175607/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-amd6
Hello,
Testing has identified that VMs on SPR still crash when trying to turn
on LBR, and this is imminently going to cease being a "future" problem.
There is a series out about this, but there is some general confusion
creating mistakes, so I want to try and lay things out coherently here
in one
On 1/6/23 12:46 PM, Chuck Zmudzinski wrote:
> On 1/6/23 12:35 PM, David Woodhouse wrote:
>> On Wed, 2023-01-04 at 15:44 +0100, Bernhard Beschow wrote:
>>> + if (xen_enabled()) {
>>
>> Could this perhaps be if (xen_mode != XEN_DISABLED) once we merge the
>> Xen-on-KVM series?
>
> I am not a
flight 175606 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175606/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d8d829b89dababf763ab33b8cdd852b2830db3cf
baseline version:
ovmf 5386c9e6dab2f6a555e67
On 1/6/23 7:25 AM, Philippe Mathieu-Daudé wrote:
> On 6/1/23 12:57, Bernhard Beschow wrote:
>>
>>
>> Am 4. Januar 2023 15:35:33 UTC schrieb "Philippe Mathieu-Daudé"
>> :
>>> +Markus/Thomas
>>>
>>> On 4/1/23 15:44, Bernhard Beschow wrote:
During the last patches, TYPE_PIIX3_XEN_DEVICE turned
flight 175603 qemu-mainline real [real]
flight 175608 qemu-mainline real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/175603/
http://logs.test-lab.xenproject.org/osstest/logs/175608/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be
On 1/6/23 2:08 PM, Chuck Zmudzinski wrote:
> On 1/6/23 7:25 AM, Philippe Mathieu-Daudé wrote:
>> On 6/1/23 12:57, Bernhard Beschow wrote:
>>>
>>>
>>> Am 4. Januar 2023 15:35:33 UTC schrieb "Philippe Mathieu-Daudé"
>>> :
+Markus/Thomas
On 4/1/23 15:44, Bernhard Beschow wrote:
>
On 1/6/23 6:04 PM, Chuck Zmudzinski wrote:
> On 1/6/23 2:08 PM, Chuck Zmudzinski wrote:
>> On 1/6/23 7:25 AM, Philippe Mathieu-Daudé wrote:
>>> On 6/1/23 12:57, Bernhard Beschow wrote:
Am 4. Januar 2023 15:35:33 UTC schrieb "Philippe Mathieu-Daudé"
:
> +Markus/Thomas
flight 175605 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175605/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-libvirt-xsm 8 xen-boot fail REGR. vs. 173462
test-amd64-amd64-li
Hi Julien,
> -Original Message-
> Subject: Re: [PATCH 20/22] xen/arm64: mm: Use per-pCPU page-tables
>
> Hi Henry,
>
> >> Subject: [PATCH 20/22] xen/arm64: mm: Use per-pCPU page-tables
> >>
> >> From: Julien Grall
> >>
> >> At the moment, on Arm64, every pCPU are sharing the same page-t
flight 175610 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/175610/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-pairbroken
test-amd64-amd64-pair 6 host-insta
72 matches
Mail list logo