flight 106412 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106412/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemut-win7-amd64 16 guest-stopfail like 106351
This run is configured for baseline tests only.
flight 68629 xen-4.4-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68629/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-winxpsp3 6
flight 106415 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106415/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
flight 106410 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106410/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-stopfail like 106395
This run is configured for baseline tests only.
flight 68631 qemu-mainline real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/68631/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-midway 16 guest-start.2
flight 106419 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106419/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5
flight 106406 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106406/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-pvh-intel 11 guest-start fail REGR. vs. 59254
On Tue, Feb 21, 2017 at 04:56:01PM +0530, Bhupinder Thakur wrote:
> Based on one of the domain creation flags, the vpl011 emulation will be
> enabled for
> the domain.
>
> This flag is currently set always but finally it needs to be controlled by
> the user
> through some configuration option.
On Tue, Feb 21, 2017 at 04:56:06PM +0530, Bhupinder Thakur wrote:
> Modfication in domain_create_ring():
> - Bind to the vpl011 event channel obtained from the xen store as a new
> parameter
> - Map the PFN to its address space to be used as IN/OUT ring buffers. It
> obtains
> the
On Tue, Feb 21, 2017 at 04:56:08PM +0530, Bhupinder Thakur wrote:
> Modification in handle_tty_read to write the user data to the vpl011 IN ring
> buffer.
>
> Finally this needs to be modified to allow user input for both PV and vpl011
> consoles.
>
> Signed-off-by: Bhupinder Thakur
On Fri, Mar 03, 2017 at 03:23:31PM -0500, Konrad Rzeszutek Wilk wrote:
> > The following changes were done:
>
> .. snip..
>
> Thank you for this great writeup. I took a stab at it and stopped at patch
> #2 b/c Julien said he would look in it deeper. But based on a brief
> look I would say:
Run
On Tue, Feb 21, 2017 at 04:56:00PM +0530, Bhupinder Thakur wrote:
> Breakup evtchn_send() to allow sending events for a Xen bound channel.
> Currently,
> there is a check in evtchn_send() i.e. is_consumer_xen() that if the event
> channel
> is bound to a xen consumer then event generation is not
On Tue, Feb 21, 2017 at 04:56:07PM +0530, Bhupinder Thakur wrote:
> MOdifications in the following functions:
s/MO/Mo
>
> - handle_ring_read() - to allow reading data from both PV or vpl011 OUT
> ring buffers
> based on which port received the event
> - buffer_append() - append
On Tue, Feb 21, 2017 at 04:56:03PM +0530, Bhupinder Thakur wrote:
> Add a new pl011 uart node
> - Get the pl011 spi virq from Xen using a hvm call
> - Add a new device tree node in the guest DT for SBSA pl011 uart
> containing the IRQ
> (read above) and the MMIO address range to be
On Tue, Feb 21, 2017 at 04:56:04PM +0530, Bhupinder Thakur wrote:
> Add two new parameters to the xen store:
> - newly allocated PFN to be used as IN/OUT ring buffer by xenconsoled
> - a new event channel read from Xen using a hvm call to be used by
> xenconsoled
> for eventing
flight 106417 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106417/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5
On Tue, Feb 21, 2017 at 04:56:05PM +0530, Bhupinder Thakur wrote:
> Allocates a new pfn, initializes it and passes on to Xen using a hvm call.
s/passes/pass/
>
> Another changes is in xc_hvm_param_deprecated_check () to allow new vpl011
> HVM params,
> which have been defined to some deprecated
On Tue, Feb 21, 2017 at 04:56:02PM +0530, Bhupinder Thakur wrote:
> Ensure that nr_spis intialized in in vgic_init is atleast 1 to allow
> allocation of
s/atleast/at least/
> pl011 spi virq.
>
> Signed-off-by: Bhupinder Thakur
> ---
> xen/arch/arm/vgic.c | 5
On Fri, 3 Mar 2017, Stefano Stabellini wrote:
> On Fri, 3 Mar 2017, Paul Durrant wrote:
> > > -Original Message-
> > > From: Stefano Stabellini [mailto:sstabell...@kernel.org]
> > > Sent: 02 March 2017 22:50
> > > To: Paul Durrant
> > > Cc:
On Fri, 3 Mar 2017, Paul Durrant wrote:
> > -Original Message-
> > From: Stefano Stabellini [mailto:sstabell...@kernel.org]
> > Sent: 02 March 2017 22:50
> > To: Paul Durrant
> > Cc: xen-de...@lists.xenproject.org; qemu-de...@nongnu.org; Stefano
> > Stabellini
> The following changes were done:
.. snip..
Thank you for this great writeup. I took a stab at it and stopped at patch
#2 b/c Julien said he would look in it deeper. But based on a brief
look I would say:
- Please do remove most of the comments. They really do not add
much context besides
In some cases during XenBus disconnect event handling and subsequent
queue resource release there may be some TX handlers active on
other processors. Use RCU in order to synchronize with them.
Signed-off-by: Igor Druzhinin
---
v2:
* Add protection for
> @@ -933,9 +974,11 @@ int libxl__arch_domain_init_hw_description(libxl__gc *gc,
> val |= GUEST_EVTCHN_PPI;
> rc = xc_hvm_param_set(dom->xch, dom->guest_domid, HVM_PARAM_CALLBACK_IRQ,
>val);
> +
> if (rc)
> return rc;
>
> +
Please do be
branch xen-unstable
xenbranch xen-unstable
job test-armhf-armhf-xl-multivcpu
testid guest-start
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
flight 106400 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106400/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-win7-amd64 15 guest-localmigrate/x10 fail REGR. vs.
106375
On Tue, Feb 21, 2017 at 04:55:59PM +0530, Bhupinder Thakur wrote:
> Three new HVM param handlers added for:
> - allocating a new VIRQ and return to the toolstack
> - allocating a new event channel for sending/receiving events from Xen
> and return
> to the toolstack
> - mapping
.snip..
> +case VPL011_UARTCR_OFFSET:
> +*r = v->domain->arch.vpl011.control;
> +break;
Pls add a new newline after each break.
> +case VPL011_UARTDR_OFFSET:
> +vpl011_read_data(v->domain, );
> +*r = ch;
> +break;
> +
Hi Stefano,
On 03/03/17 19:34, Stefano Stabellini wrote:
On Fri, 3 Mar 2017, Julien Grall wrote:
On 01/03/17 23:24, Julien Grall wrote:
On 01/03/2017 22:15, Stefano Stabellini wrote:
This patch fixes a potential race that could happen when
gic_update_one_lr and vgic_vcpu_inject_irq run
On Fri, 3 Mar 2017, Julien Grall wrote:
> On 01/03/17 23:24, Julien Grall wrote:
> > On 01/03/2017 22:15, Stefano Stabellini wrote:
> > > This patch fixes a potential race that could happen when
> > > gic_update_one_lr and vgic_vcpu_inject_irq run simultaneously.
> > >
> > > When
On Fri, Mar 03, 2017 at 03:15:51PM +, George Dunlap wrote:
> On 02/03/17 16:07, Ronald Rojas wrote:
> > Add calls for the following host-related functionality:
> > - libxl_domain_info
> > - libxl_domain_unpause
> >
> > Include Golang version for the libxl_domain_info as
> > DomainInfo.
> >
>
On Sat, 4 Mar 2017, Sky Liu wrote:
> 2017-03-02 3:36 GMT+08:00 Stefano Stabellini :
> >
> > Thank you for your interest in this project and Xen!
> >
> > Firstly, I would recommend to install Xen from source on your test
> > machine. If you don't have a test machine, you
Hi Bhupinder,
On 26/02/17 21:37, Julien Grall wrote:
On 02/21/2017 11:25 AM, Bhupinder Thakur wrote:
[...]
+{
+case VPL011_UARTCR_OFFSET:
Coding style: the case should be aligned to {. E.g
{
case ...
Also, I would prefer if you don't include _OFFSET in all the name.
On 03/03/17 11:48, Andrew Cooper wrote:
> On 03/03/17 10:47, Sander Eikelenboom wrote:
>> On 03/03/17 11:40, Andrew Cooper wrote:
>>> On 02/03/17 20:02, Andrew Cooper wrote:
c/s 5cecf60f4 "x86/cpuid: Handle leaf 0x1 in guest_cpuid()" causes Linux
4.10
to crash during boot.
On Fri, Mar 03, 2017 at 02:54:56PM +, George Dunlap wrote:
> On 02/03/17 16:07, Ronald Rojas wrote:
> > Add calls for the following host-related functionality:
> > - libxl_get_max_cpus
> > - libxl_get_online_cpus
> > - libxl_get_max_nodes
> > - libxl_get_free_memory
> > - libxl_get_physinfo
>
Hi Stefano,
On 20/02/17 18:13, Julien Grall wrote:
On 20/02/17 18:12, Stefano Stabellini wrote:
On Mon, 20 Feb 2017, Julien Grall wrote:
Hi Stefano,
On 02/16/2017 01:41 AM, Stefano Stabellini wrote:
On Fri, 3 Feb 2017, Julien Grall wrote:
On ARM, when the user put 'acpi=force' Xen will use
Hi Stefano,
On 16/02/17 01:49, Stefano Stabellini wrote:
On Wed, 15 Feb 2017, Stefano Stabellini wrote:
On Fri, 3 Feb 2017, Julien Grall wrote:
The code to add a new bank is duplicated twice. Add a new helper that
checks if the maximum of bank has not reached and adds the bank.
flight 106413 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106413/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5
On March 1, 2017 2:27:54 AM PST, Ingo Molnar wrote:
>
>* Thomas Gleixner wrote:
>
>> On Wed, 1 Mar 2017, Ingo Molnar wrote:
>> >
>> > * Jiri Slaby wrote:
>> >
>> > > This is a start of series to unify use of ENTRY, ENDPROC, GLOBAL,
>END,
flight 106403 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106403/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ovmf-amd64 9 debian-hvm-install fail REGR. vs. 105963
On March 1, 2017 2:27:54 AM PST, Ingo Molnar wrote:
>
>* Thomas Gleixner wrote:
>
>> On Wed, 1 Mar 2017, Ingo Molnar wrote:
>> >
>> > * Jiri Slaby wrote:
>> >
>> > > This is a start of series to unify use of ENTRY, ENDPROC, GLOBAL,
>END,
Hi Stefano,
On 01/03/17 22:15, Stefano Stabellini wrote:
A potential race condition occurs when vgic_migrate_irq is called a
second time, while GIC_IRQ_GUEST_MIGRATING is already set. In that case,
vgic_migrate_irq takes a different vgic lock from gic_update_one_lr.
Hmmm, vgic_migrate_irq
On Fri, 3 Mar 2017 09:27:23 +0100
Michal Hocko wrote:
> On Thu 02-03-17 18:03:15, Igor Mammedov wrote:
> > On Thu, 2 Mar 2017 15:28:16 +0100
> > Michal Hocko wrote:
> >
> > > On Thu 02-03-17 14:53:48, Igor Mammedov wrote:
> > > [...]
> > > > When
Hi Stefano,
On 01/03/17 22:15, Stefano Stabellini wrote:
Move the atomic write of rank->vcpu, which sets the new vcpu target, to
vgic_migrate_irq, at the beginning of the lock protected area (protected
by the vgic lock).
This code movement reduces race conditions between vgic_migrate_irq and
From: Paul Durrant
Date: Thu, 2 Mar 2017 12:54:24 +
> Commit 9a6cdf52b85e "xen-netback: fix memory leaks on XenBus disconnect"
> added missing code to fix a memory leak by calling vfree() in the
> appropriate place.
> Unfortunately subsequent commit f16f1df65f1c
On Fri, Mar 03, 2017 at 08:49:35AM -0800, Elena Ufimtseva wrote:
> On Fri, Mar 03, 2017 at 12:25:07PM +, Roger Pau Monne wrote:
> > It is now useless since PVHv1 is removed and PVHv2 is a HVM domain from
> > Xen's
> > point of view.
> >
> > Signed-off-by: Roger Pau Monné
2017-03-02 3:36 GMT+08:00 Stefano Stabellini :
>
> Thank you for your interest in this project and Xen!
>
> Firstly, I would recommend to install Xen from source on your test
> machine. If you don't have a test machine, you could install it on your
> laptop. Alternatively,
On Fri, Mar 03, 2017 at 02:49:29PM +, Andrew Cooper wrote:
> On 03/03/17 14:45, Wei Liu wrote:
> > On Fri, Mar 03, 2017 at 07:33:35AM -0700, Jan Beulich wrote:
> > On 03.03.17 at 14:35, wrote:
> >>> On Fri, Mar 03, 2017 at 04:15:19AM -0700, Jan Beulich wrote:
>
>>> On 23.02.17 at 12:52, wrote:
> +struct hvm_hw_vioapic *gsi_vioapic(struct domain *d, unsigned int gsi,
const struct domain *d ?
> +static unsigned int pin_gsi(struct domain *d, struct hvm_hw_vioapic *vioapic,
const for both?
> +unsigned
Hi,
On 01/03/17 23:24, Julien Grall wrote:
On 01/03/2017 22:15, Stefano Stabellini wrote:
This patch fixes a potential race that could happen when
gic_update_one_lr and vgic_vcpu_inject_irq run simultaneously.
When GIC_IRQ_GUEST_MIGRATING is set, we must make sure that the irq has
been
flight 106408 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106408/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64 5
> -Original Message-
> From: Praveen Kumar [mailto:kpraveen.l...@gmail.com]
> Sent: 03 March 2017 16:48
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org
> Subject: Re: [Xen-devel] Linking issue with latest git pull
>
> On Fri, Mar 03, 2017 at 11:55:17AM
On Fri, Mar 03, 2017 at 12:25:07PM +, Roger Pau Monne wrote:
> It is now useless since PVHv1 is removed and PVHv2 is a HVM domain from Xen's
> point of view.
>
> Signed-off-by: Roger Pau Monné
> Reviewed-by: Andrew Cooper
> Acked-by: Tim
On Fri, Mar 03, 2017 at 11:55:17AM +, Paul Durrant wrote:
> Please don't post HTML...
>
> ---
> From: Xen-devel [mailto:xen-devel-boun...@lists.xen.org] On Behalf Of Praveen
> Kumar
> Sent: 03 March 2017 11:23
> To: xen-de...@lists.xenproject.org
> Subject: [Xen-devel] Linking issue with
Hi Stefano,
On 01/03/17 19:43, Stefano Stabellini wrote:
Introduce new Xen command line parameter called "vwfi", which stands for
virtual wfi. The default is "trap": Xen traps guest wfi and wfe
instructions. In the case of wfi, Xen calls vcpu_block on the guest
vcpu; in the case of guest wfe,
On Fri, Mar 03, 2017 at 12:25:06PM +, Roger Pau Monne wrote:
> This removal applies to both the hypervisor and the toolstack side of PVHv1.
>
> Note that on the toolstack side a new PVH domain type is introduced to libxl.
> The "none" device model version is removed, together with the "pvh"
flight 106398 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/106398/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 3 host-install(3) broken REGR.
vs. 106351
>>> On 03.03.17 at 10:41, wrote:
> @@ -258,66 +260,7 @@ string_param("dom0_ioports_disable",
> opt_dom0_ioports_disable);
> static bool_t __initdata ro_hpet = 1;
> boolean_param("ro-hpet", ro_hpet);
>
> -/* Allow ring-3 access in long mode as guest cannot use ring 1 ...
On 02/03/17 16:07, Ronald Rojas wrote:
> Create tests for the following functions:
> - GetVersionInfo
> - GetPhysinfo
> - GetDominfo
> - GetMaxCpus
> - GetOnlineCpus
> - GetMaxNodes
> - GetFreeMemory
>
> Signed-off-by: Ronald Rojas
> Signed-off-by: George Dunlap
Hi Stefano,
On 03/03/17 00:53, Stefano Stabellini wrote:
On Thu, 2 Mar 2017, Julien Grall wrote:
On 02/03/2017 22:39, Stefano Stabellini wrote:
On Thu, 2 Mar 2017, Julien Grall wrote:
Hi Stefano,
On 02/03/17 19:12, Stefano Stabellini wrote:
On Thu, 2 Mar 2017, Julien Grall wrote:
On
>>> On 03.03.17 at 10:41, wrote:
> Long term we want to be able to disentangle PV and HVM code. Move the
> PVH domain builder to a dedicated file. It will later depends on
> CONFIG_HVM or CONFIG_PVH.
>
> This in turn requires exposing a few functions and variables via
>
>>> On 03.03.17 at 10:41, wrote:
> Remove the ones that are no longer needed and sort them.
>
> Signed-off-by: Wei Liu
Acked-by: Jan Beulich
___
Xen-devel mailing list
On Fri, Mar 03, 2017 at 10:52:43AM -0500, Konrad Rzeszutek Wilk wrote:
> On Fri, Mar 03, 2017 at 12:25:07PM +, Roger Pau Monne wrote:
> > It is now useless since PVHv1 is removed and PVHv2 is a HVM domain from
> > Xen's
> > point of view.
> >
> > Signed-off-by: Roger Pau Monné
On 03/03/17 15:53, Jan Beulich wrote:
> The very few uses can easily be replaced by more standard ones.
>
> Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
___
Xen-devel mailing list
>>> On 03.03.17 at 16:30, wrote:
> On Fri, Mar 03, 2017 at 06:02:58AM -0700, Jan Beulich wrote:
>> >>> On 03.03.17 at 13:53, wrote:
>> > On Fri, Mar 03, 2017 at 04:56:20AM -0700, Jan Beulich wrote:
>> >> >>> On 23.02.17 at 12:52,
On 01/03/17 19:42, Shanker Donthineni wrote:
Hi Julien,
Hi Shanker,
On 02/28/2017 12:29 PM, Julien Grall wrote:
On 27/02/17 17:20, Andre Przywara wrote:
Direct VLPI injection feature is included in GICv4 architecture. A new
set of VLPI commands are introduced to map ITS vpend/vprop tables,
The very few uses can easily be replaced by more standard ones.
Signed-off-by: Jan Beulich
--- a/xen/common/lib.c
+++ b/xen/common/lib.c
@@ -110,7 +110,8 @@ union uu {
/*
* Extract high and low shortwords from longword, and move low shortword of
* longword to upper half
On Fri, Mar 03, 2017 at 12:25:07PM +, Roger Pau Monne wrote:
> It is now useless since PVHv1 is removed and PVHv2 is a HVM domain from Xen's
> point of view.
>
> Signed-off-by: Roger Pau Monné
> Reviewed-by: Andrew Cooper
> Acked-by: Tim
George Dunlap writes ("Re: [PATCH v2 5/5] golang/xenlight: Add tests host
related functionality functions"):
> Yes, the plan was to have it off by default at very least until we got
> configure to detect the presence of a go compiler. Ronald has already
> spent a decent chunk of his time doing
On Fri, Mar 03, 2017 at 01:39:24PM +, Wei Liu wrote:
> On Fri, Mar 03, 2017 at 11:16:39AM +, Roger Pau Monné wrote:
> > On Fri, Mar 03, 2017 at 09:41:10AM +, Wei Liu wrote:
> > > +++ b/xen/arch/x86/domain_build_pvh.c
> > > @@ -0,0 +1,1097 @@
> > >
On Fri, Mar 03, 2017 at 06:02:58AM -0700, Jan Beulich wrote:
> >>> On 03.03.17 at 13:53, wrote:
> > On Fri, Mar 03, 2017 at 04:56:20AM -0700, Jan Beulich wrote:
> >> >>> On 23.02.17 at 12:52, wrote:
> >> > @@ -424,40 +424,141 @@ void
On Fri, Mar 03, 2017 at 10:27:49AM -0500, Konrad Rzeszutek Wilk wrote:
> On Thu, Mar 02, 2017 at 09:11:03PM +0300, Dmitry Rockosov wrote:
> > Konrad,
> >
> > Thank you for great help!
> >
> > I will try xen_nopv, looks like it's what I need.
> > But I have one question about below lines of your
On Fri, Mar 3, 2017 at 8:22 PM, Julien Grall wrote:
>
>
> On 03/03/17 14:45, Vijay Kilari wrote:
>>
>> On Fri, Mar 3, 2017 at 7:22 PM, Julien Grall wrote:
>>>
>>>
>>>
>>> On 03/03/17 13:50, Vijay Kilari wrote:
On Fri, Mar 3, 2017 at 7:14
>>> On 03.03.17 at 16:16, wrote:
> On Fri, Mar 3, 2017 at 8:22 PM, Julien Grall wrote:
>> int __init acpi_numa_init(void)
>> {
>> if (!acpi_parse_table()) {
>> acpi_table_parse_srat(TYPE_CPU_AFFINITY);
>
> This is not
On 03/03/17 15:02, Ian Jackson wrote:
> George Dunlap writes ("Re: [PATCH v2 5/5] golang/xenlight: Add tests host
> related functionality functions"):
>> Right. The purpose of hand-crafting the code was to get a feel for what
>> a good Go-like output would look like before investing in the IDL.
On 02/03/17 16:07, Ronald Rojas wrote:
> Add calls for the following host-related functionality:
> - libxl_domain_info
> - libxl_domain_unpause
>
> Include Golang version for the libxl_domain_info as
> DomainInfo.
>
> Signed-off-by: George Dunlap
> Signed-off-by:
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
---
v5: Re-base.
v3: New.
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -373,6 +373,7 @@ static const struct {
[0x37 ... 0x3f] = { .simd_size =
>>> On 03.03.17 at 15:49, wrote:
> On a related tangent, I'd like to clean up our include hierachy, in the
> same way Linux has.
>
> I.e.
>
> move include/asm-x86/ to arch/x86/include/asm
>
> and include/asm-arm/ to arch/arm/include/asm
>
> which allows for the
... and its AVX equivalent.
Signed-off-by: Jan Beulich
---
v3: New.
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -398,6 +398,7 @@ static const struct {
[0x22] = { .simd_size = simd_none },
[0x40 ... 0x41] = {
... and their AVX equivalents.
Signed-off-by: Jan Beulich
---
v5: Re-base.
v3: New.
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -373,6 +373,8 @@ static const struct {
[0x37 ... 0x3f] = { .simd_size = simd_packed_int },
... and their AVX equivalents. Note that a few instructions aren't
covered (yet), but those all fall into common pattern groups, so I
would hope that for now we can do with what is there.
Just like for SSE/SSE2, MMX insns aren't being covered at all, as
they're not easy to deal with: The compiler
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
---
v5: Change approach for dealing with differing prefix byte counts in
VEX/non-VEX shared code. _eax -> eax, _edx -> edx.
v3: New.
--- a/tools/tests/x86_emulator/test_x86_emulator.c
+++
... and their AVX equivalents.
Signed-off-by: Jan Beulich
---
v5: to_memory -> to_mem. Change approach for dealing with differing
prefix byte counts in VEX/non-VEX shared code.
v4: Or in ByteOp for {,v}pinsrb instead of assigning it (in
x86_decode_0f3a()). Correct case
Convert the few existing opcodes so far supported.
Signed-off-by: Jan Beulich
---
v5: Add comment explaining the precise meaning of "two_op" and
"four_op". to_memory -> to_mem.
v3: New.
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++
... and their AVX equivalents.
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
---
v5: Re-base.
v3: New.
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -353,6 +353,8 @@ static const struct {
This being a strict (MMX register only) subset of SSE, we can simply
adjust the respective checks while making the new predicate look at
both flags.
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
George Dunlap writes ("Re: [PATCH v2 5/5] golang/xenlight: Add tests host
related functionality functions"):
> Right. The purpose of hand-crafting the code was to get a feel for what
> a good Go-like output would look like before investing in the IDL.
That makes sense.
> It sounds like you're
... and their AVX equivalents. Note that a few instructions aren't
covered (yet), but those all fall into common pattern groups, so I
would hope that for now we can do with what is there.
MMX insns aren't being covered at all, as they're not easy to deal
with: The compiler refuses to emit such
... as the only post-SSE2 move insn.
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
---
v3: Re-base.
v2: Re-base.
--- a/tools/tests/x86_emulator/test_x86_emulator.c
+++ b/tools/tests/x86_emulator/test_x86_emulator.c
@@ -2398,6 +2398,74 @@
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
---
v5: Re-base.
v4: Drop the host_and_ part from the AVX checks.
v3: Re-base.
--- a/tools/fuzz/x86_instruction_emulator/x86-insn-emulator-fuzzer.c
+++
Signed-off-by: Jan Beulich
Reviewed-by: Andrew Cooper
---
v5: ASSERT(!state->simd_size) since we've executed the stub already.
Use distinct dummy variable for ignored asm() output. Split off
decoding fix to a separate patch.
v4: Add missing
Signed-off-by: Jan Beulich
---
v5: ASSERT(!state->simd_size) since we've executed the stub already.
Use distinct dummy variable for ignored asm() output. _eflags ->
eflags.
v4: Add missing copy_REX_VEX().
v3: Ignore VEX.l. Add fic.exn_raised constraint to invoke_stub()
Note that other than most scalar instructions, vcvt{,t}s{s,d}2si do #UD
when VEX.l is set on at least some Intel models. To be on the safe
side, implement the most restrictive mode here for now when emulating
an Intel CPU, and simply clear the bit when emulating an AMD one.
Signed-off-by: Jan
Previously supported insns are being converted to the new model, and
several new ones are being added.
To keep the stub handling reasonably simple, integrate SET_SSE_PREFIX()
into copy_REX_VEX(), at once switching the stubs to use an empty REX
prefix instead of a double DS: one (no byte registers
This aims at covering most MMX/SSEn/AVX instructions in the 0x0f-escape
space with memory operands. Not covered here are irregular moves,
converts, and {,U}COMIS{S,D} (modifying EFLAGS).
Note that the distinction between simd_*_fp isn't strictly needed, but
I've kept them as separate entries
This aims at covering most MMX/SSEn/AVX instructions in the 0x0f-escape
space with memory operands. Not covered here are irregular moves,
converts, and {,U}COMIS{S,D} (modifying EFLAGS).
Note that the distinction between simd_*_fp isn't strictly needed, but
I've kept them as separate entries
Hi Jan,
On 03/03/17 07:58, Jan Beulich wrote:
On 02.03.17 at 21:56, wrote:
Ping? I'd like the question to be sorted out before Andre is sending a
new version.
On 02/15/2017 09:25 PM, Stefano Stabellini wrote:
On Wed, 15 Feb 2017, Julien Grall wrote:
Hi Stefano,
On
On 03/03/17 14:45, Vijay Kilari wrote:
On Fri, Mar 3, 2017 at 7:22 PM, Julien Grall wrote:
On 03/03/17 13:50, Vijay Kilari wrote:
On Fri, Mar 3, 2017 at 7:14 PM, Julien Grall wrote:
This is quite disgusting. We should avoid any #ifdef
On 03/03/17 14:45, Wei Liu wrote:
> On Fri, Mar 03, 2017 at 07:33:35AM -0700, Jan Beulich wrote:
> On 03.03.17 at 14:35, wrote:
>>> On Fri, Mar 03, 2017 at 04:15:19AM -0700, Jan Beulich wrote:
>>> On 03.03.17 at 12:06, wrote:
> On Fri, Mar
This includes support for AVX counterparts of them as well as a few
later SSE additions (basically covering the entire 0f-prefixed opcode
space, but not the 0f38 and 0f3a ones, nor 3dnow).
1: support most memory accessing MMX/SSE{,2,3} insns
2: support MMX/SSE{,2,3} moves
3: support
On 02/03/17 16:07, Ronald Rojas wrote:
> Create error type Errorxl for throwing proper xenlight
> errors.
>
> Update Ctx functions to throw Errorxl errors.
>
> Signed-off-by: Ronald Rojas
There are a couple of `go fmt` changes which should be in the previous
patch
1 - 100 of 197 matches
Mail list logo