Re: [Xen-devel] [PATCH V2 1/2] x86/altp2m: Add hypercall to set a range of sve bits

2019-11-06 Thread Alexandru Stefan ISAILA
On 06.11.2019 23:06, Tamas K Lengyel wrote: > On Wed, Nov 6, 2019 at 7:35 AM Alexandru Stefan ISAILA > wrote: >> >> By default the sve bits are not set. >> This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(), >> to set a range of sve bits. >> The core function, p2m_set_suppress_ve_

Re: [Xen-devel] [PATCH 0/3] AMD/IOMMU: re-work mode updating

2019-11-06 Thread Jan Beulich
On 06.11.2019 18:31, Andrew Cooper wrote: > On 06/11/2019 15:16, Jan Beulich wrote: >> update_paging_mode() in the AMD IOMMU code expects to be invoked with >> the PCI devices lock held. The check occurring only when the mode >> actually needs updating, the violation of this rule by the majority >>

Re: [Xen-devel] [PATCH 0/3] AMD/IOMMU: re-work mode updating

2019-11-06 Thread Jan Beulich
On 06.11.2019 19:29, Sander Eikelenboom wrote: > On 06/11/2019 16:16, Jan Beulich wrote: >> update_paging_mode() in the AMD IOMMU code expects to be invoked with >> the PCI devices lock held. The check occurring only when the mode >> actually needs updating, the violation of this rule by the majori

Re: [Xen-devel] [RFC 2/7] WIP: Compilation with ARM DS-6 compiler

2019-11-06 Thread Jan Beulich
On 06.11.2019 23:08, Artem Mygaiev wrote: > On Wed, Nov 6, 2019 at 4:28 PM Jan Beulich wrote: >> On 06.11.2019 10:19, Andrii Anisov wrote: >>> --- a/Config.mk >>> +++ b/Config.mk >>> @@ -221,7 +221,9 @@ CFLAGS += -Wall -Wstrict-prototypes >>> >>> $(call cc-option-add,HOSTCFLAGS,HOSTCC,-Wdeclarati

[Xen-devel] Ping: [PATCH] build: provide option to disambiguate symbol names

2019-11-06 Thread Jan Beulich
On 24.10.2019 15:31, Jan Beulich wrote: > The .file assembler directives generated by the compiler do not include > any path components (gcc) or just the ones specified on the command line > (clang, at least version 5), and hence multiple identically named source > files (in different directories)

[Xen-devel] [PATCH] arch: arm: vgic-v3: fix GICD_ISACTIVER range

2019-11-06 Thread Peng Fan
The end should be GICD_ISACTIVERN not GICD_ISACTIVER. Signed-off-by: Peng Fan --- xen/arch/arm/vgic-v3.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/arm/vgic-v3.c b/xen/arch/arm/vgic-v3.c index 422b94f902..e802f2055a 100644 --- a/xen/arch/arm/vgic-v3.c +++ b/xen/

Re: [Xen-devel] [PATCH v2 02/15] mm/mmu_notifier: add an interval tree notifier

2019-11-06 Thread Jerome Glisse
On Wed, Nov 06, 2019 at 04:23:21PM -0800, John Hubbard wrote: > On 10/28/19 1:10 PM, Jason Gunthorpe wrote: [...] > > /** > > * enum mmu_notifier_event - reason for the mmu notifier callback > > @@ -32,6 +34,9 @@ struct mmu_notifier_range; > > * access flags). User should soft dirty the page

Re: [Xen-devel] [PATCH v2 02/15] mm/mmu_notifier: add an interval tree notifier

2019-11-06 Thread John Hubbard
On 10/28/19 1:10 PM, Jason Gunthorpe wrote: ... > include/linux/mmu_notifier.h | 98 +++ > mm/Kconfig | 1 + > mm/mmu_notifier.c| 533 +-- > 3 files changed, 607 insertions(+), 25 deletions(-) > > diff --git a/include/linux/mmu_

Re: [Xen-devel] Ryzen 3xxx plans for 4.13

2019-11-06 Thread Andreas Kinzler
On 06.11.2019 18:50, George Dunlap wrote: Modern Windows guests (at least Windows 10 and Windows Server 2016) crash when running under Xen on AMD Ryzen 3xxx desktop-class cpus (but not the corresponding server cpus). I my tests the second generation EPYC CPUs (codename "Rome") fail exactly the

Re: [Xen-devel] [RFC 2/7] WIP: Compilation with ARM DS-6 compiler

2019-11-06 Thread Artem Mygaiev
Hello Jan On Wed, Nov 6, 2019 at 4:28 PM Jan Beulich wrote: > > On 06.11.2019 10:19, Andrii Anisov wrote: > > From: Artem Mygaiev > > > > Still have linker issues > > This may be acceptable for an RFC series, but doesn't justify there > not being any other description. Just to give an example,I'

Re: [Xen-devel] [PATCH V2 1/2] x86/altp2m: Add hypercall to set a range of sve bits

2019-11-06 Thread Tamas K Lengyel
On Wed, Nov 6, 2019 at 7:35 AM Alexandru Stefan ISAILA wrote: > > By default the sve bits are not set. > This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(), > to set a range of sve bits. > The core function, p2m_set_suppress_ve_multi(), does not brake in case > of a error and it is

Re: [Xen-devel] [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes

2019-11-06 Thread Borislav Petkov
On Wed, Nov 06, 2019 at 09:56:48AM -0800, h...@zytor.com wrote: > For one thing, we already have people asking for more than 4 GiB > worth of initramfs, and especially with initramfs that huge it would > make a *lot* of sense to allow loading it in chunks without having to > concatenate them. Yeah

Re: [Xen-devel] [PATCH 0/3] AMD/IOMMU: re-work mode updating

2019-11-06 Thread Sander Eikelenboom
On 06/11/2019 16:16, Jan Beulich wrote: > update_paging_mode() in the AMD IOMMU code expects to be invoked with > the PCI devices lock held. The check occurring only when the mode > actually needs updating, the violation of this rule by the majority > of callers did go unnoticed until per-domain IO

Re: [Xen-devel] [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes

2019-11-06 Thread hpa
On November 6, 2019 9:03:33 AM PST, Borislav Petkov wrote: >On Mon, Nov 04, 2019 at 04:13:51PM +0100, Daniel Kiper wrote: >> Hi, >> >> Due to very limited space in the setup_header this patch series >introduces new >> kernel_info struct which will be used to convey information from the >kernel to

[Xen-devel] Ryzen 3xxx plans for 4.13

2019-11-06 Thread George Dunlap
Trying to pick this thread up from the discussion "Debugging Windows HVM crashes on Ryzen 3xxx series CPUs." I'm trying to summarize what I see claimed, and my understanding of things, and am not necessarily speaking as an authority, so please correct me where I'm wrong. Modern Windows guests (at

Re: [Xen-devel] [PATCH 0/3] AMD/IOMMU: re-work mode updating

2019-11-06 Thread Andrew Cooper
On 06/11/2019 15:16, Jan Beulich wrote: > update_paging_mode() in the AMD IOMMU code expects to be invoked with > the PCI devices lock held. The check occurring only when the mode > actually needs updating, the violation of this rule by the majority > of callers did go unnoticed until per-domain IO

Re: [Xen-devel] [PATCH STABLE 4.9] x86, mm, gup: prevent get_page() race with munmap in paravirt guest

2019-11-06 Thread Vlastimil Babka
On 9/19/19 8:26 PM, Ben Hutchings wrote: > On Mon, 2019-08-19 at 18:58 +0100, Vlastimil Babka wrote: > [...] >> Hi, I'm sending this stable-only patch for consideration because it's >> probably >> unrealistic to backport the 4.13 switch to generic GUP. I can look at 4.4 and >> 3.16 if accepted. Th

Re: [Xen-devel] [PATCH 1/3] AMD/IOMMU: don't needlessly trigger errors/crashes when unmapping a page

2019-11-06 Thread Andrew Cooper
On 06/11/2019 15:18, Jan Beulich wrote: > Unmapping a page which has never been mapped should be a no-op (note how > it already is in case there was no root page table allocated). Which function are you talking about here?  iommu_pde_from_dfn() will BUG() if no root was set up. > There's > in par

Re: [Xen-devel] [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes

2019-11-06 Thread Borislav Petkov
On Mon, Nov 04, 2019 at 04:13:51PM +0100, Daniel Kiper wrote: > Hi, > > Due to very limited space in the setup_header this patch series introduces new > kernel_info struct which will be used to convey information from the kernel to > the bootloader. This way the boot protocol can be extended regar

[Xen-devel] [xen-unstable test] 143715: regressions - FAIL

2019-11-06 Thread osstest service owner
flight 143715 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/143715/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow2 19 guest-start/debian.repeat fail REGR. vs. 142750 test-amd64-i386-xl

[Xen-devel] [OSSTEST PATCH] sg-report-host-history: Reduce limit from 2000 to 200

2019-11-06 Thread Ian Jackson
Currently the "sg-report-host-history" part of most flights is taking an inordinate amount of time. Hours. These are serialised and this is a big problem, seriously impeding throughput. Reducing this limit by a factor of 10 will reduce the available history when we are looking at host-specific p

Re: [Xen-devel] Urgent for 4.13, Was dom0less + sched=null => broken in staging (fwd)

2019-11-06 Thread Dario Faggioli
On Wed, 2019-11-06 at 13:14 +0100, Jürgen Groß wrote: > On 06.11.19 13:11, George Dunlap wrote: > > On Tue, Nov 5, 2019 at 11:58 PM Stefano Stabellini > > wrote: > > > Hi Dario, > > > > > > I just checked and the patch is not in staging yet. Can we please > > > make > > > sure the patch goes in a

Re: [Xen-devel] [PULL v2 0/3] Trivial branch patches

2019-11-06 Thread Laurent Vivier
Le 06/11/2019 à 17:05, Peter Maydell a écrit : > On Tue, 5 Nov 2019 at 20:06, Laurent Vivier wrote: >> >> Le 05/11/2019 à 20:20, no-re...@patchew.org a écrit : >>> Patchew URL: >>> https://patchew.org/QEMU/20191105175010.2591-1-laur...@vivier.eu/ >>> >>> >>> >>> Hi, >>> >>> This series seems to h

Re: [Xen-devel] [PATCH] tools: pygrub actually cross-compiles just fine

2019-11-06 Thread Stefano Stabellini
On Wed, 6 Nov 2019, Wei Liu wrote: > On Tue, Nov 05, 2019 at 03:51:13PM -0800, Stefano Stabellini wrote: > > Actually, pygrub cross-compiles without issues. The cross-compilation > > work-around goes back to 2005 and it probably referred to PowerPC. > > > > Remove the work-around now. > > > > Sig

Re: [Xen-devel] [PATCH v1 03/10] KVM: Prepare kvm_is_reserved_pfn() for PG_reserved changes

2019-11-06 Thread Sean Christopherson
On Wed, Nov 06, 2019 at 07:56:34AM +0100, David Hildenbrand wrote: > On 06.11.19 01:08, Dan Williams wrote: > >On Tue, Nov 5, 2019 at 4:03 PM Sean Christopherson > >>But David's proposed fix for the above refcount bug is to omit the patch > >>so that KVM no longer treats ZONE_DEVICE pages as reserv

Re: [Xen-devel] [PULL v2 0/3] Trivial branch patches

2019-11-06 Thread Peter Maydell
On Tue, 5 Nov 2019 at 20:06, Laurent Vivier wrote: > > Le 05/11/2019 à 20:20, no-re...@patchew.org a écrit : > > Patchew URL: > > https://patchew.org/QEMU/20191105175010.2591-1-laur...@vivier.eu/ > > > > > > > > Hi, > > > > This series seems to have some coding style problems. See output below fo

[Xen-devel] [BUGFIX PATCH for-4.13] sched: fix dom0less boot with the null scheduler

2019-11-06 Thread Dario Faggioli
In a dom0less configuration, if the null scheduler is used, the system may fail to boot, because the loop in null_unit_wake() never exits. Bisection showed that this behavior occurs since commit d545f1d6 ("xen: sched: deal with vCPUs being or becoming online or offline") but the real problem is th

[Xen-devel] [PATCH V2 2/2] x86/mm: Make use of the default access param from xc_altp2m_create_view

2019-11-06 Thread Alexandru Stefan ISAILA
At this moment the default_access param from xc_altp2m_create_view is not used. This patch assigns default_access to p2m->default_access at the time of initializing a new altp2m view. Signed-off-by: Alexandru Isaila Reviewed-by: Tamas K Lengyel Acked-by: George Dunlap --- xen/arch/x86/hvm/hvm

[Xen-devel] [PATCH V2 1/2] x86/altp2m: Add hypercall to set a range of sve bits

2019-11-06 Thread Alexandru Stefan ISAILA
By default the sve bits are not set. This patch adds a new hypercall, xc_altp2m_set_supress_ve_multi(), to set a range of sve bits. The core function, p2m_set_suppress_ve_multi(), does not brake in case of a error and it is doing a best effort for setting the bits in the given range. A check for co

Re: [Xen-devel] [RFC 3/7] arm64:armds: ARM Compiler 6.6 does not accept `rx` registers naming for AArch64

2019-11-06 Thread Jan Beulich
On 06.11.2019 10:19, Andrii Anisov wrote: > --- a/xen/include/asm-arm/smccc.h > +++ b/xen/include/asm-arm/smccc.h > @@ -120,6 +120,8 @@ struct arm_smccc_res { > #define __constraint_read_6 __constraint_read_5, "r" (r6) > #define __constraint_read_7 __constraint_read_6, "r" (r7) > > +#ifdef CONF

[Xen-devel] Virtualization videos from Platform Security Summit 2019

2019-11-06 Thread Rich Persaud
Xen, OpenXT, QubesOS and embedded developers may be interested in these videos. The first (IBM ppc Ultravisor with extended Q&A) is related to past discussions of minimal L0 Xen in firmware, similar to HP/Bromium nesting-optimized hypervisor. The second is related to kexec and TrenchBoot, w

Re: [Xen-devel] [RFC 2/7] WIP: Compilation with ARM DS-6 compiler

2019-11-06 Thread Jan Beulich
On 06.11.2019 10:19, Andrii Anisov wrote: > From: Artem Mygaiev > > Still have linker issues This may be acceptable for an RFC series, but doesn't justify there not being any other description. Just to give an example,I'd like to understand why ... > --- a/Config.mk > +++ b/Config.mk > @@ -221,

Re: [Xen-devel] [RFC 1/7] xen: clang: Support correctly cross-compile

2019-11-06 Thread Jan Beulich
On 06.11.2019 10:19, Andrii Anisov wrote: > --- a/config/StdGNU.mk > +++ b/config/StdGNU.mk > @@ -1,8 +1,13 @@ > AS = $(CROSS_COMPILE)as > LD = $(CROSS_COMPILE)ld > ifeq ($(clang),y) > -CC = $(CROSS_COMPILE)clang > -CXX= $(CROSS_COMPILE)clang++ > +ifneq ($(CROSS_C

[Xen-devel] [PATCH 3/3] AMD/IOMMU: use notify_dfn() hook to update paging mode

2019-11-06 Thread Jan Beulich
update_paging_mode() expects to be invoked with the PCI devices lock held. The check occurring only when the mode actually needs updating, the violation of this rule by the majority of callers did go unnoticed until per-domain IOMMU setup was changed to do away with on-demand creation of IOMMU page

[Xen-devel] [PATCH 2/3] introduce GFN notification for translated domains

2019-11-06 Thread Jan Beulich
In order for individual IOMMU drivers (and from an abstract pov also architectures) to be able to adjust their data structures ahead of time when they might cover only a sub-range of all possible GFNs, introduce a notification call used by various code paths potentially installing a fresh mapping o

[Xen-devel] [PATCH 1/3] AMD/IOMMU: don't needlessly trigger errors/crashes when unmapping a page

2019-11-06 Thread Jan Beulich
Unmapping a page which has never been mapped should be a no-op (note how it already is in case there was no root page table allocated). There's in particular no need to grow the number of page table levels in use, and there's also no need to allocate intermediate page tables except when needing to

[Xen-devel] [PATCH 0/3] AMD/IOMMU: re-work mode updating

2019-11-06 Thread Jan Beulich
update_paging_mode() in the AMD IOMMU code expects to be invoked with the PCI devices lock held. The check occurring only when the mode actually needs updating, the violation of this rule by the majority of callers did go unnoticed until per-domain IOMMU setup was changed to do away with on-demand

Re: [Xen-devel] [PATCH 1/2] xen/livepatch: Add a return value to load hooks

2019-11-06 Thread Jan Beulich
On 05.11.2019 20:43, Andrew Cooper wrote: > --- a/xen/common/livepatch.c > +++ b/xen/common/livepatch.c > @@ -1076,25 +1076,33 @@ static int apply_payload(struct payload *data) > * temporarily disable the spin locks IRQ state checks. > */ > spin_debug_disable(); > -for ( i = 0;

Re: [Xen-devel] [PATCH 2/2] x86/livepatch: Prevent patching with active waitqueues

2019-11-06 Thread Konrad Rzeszutek Wilk
On Tue, Nov 05, 2019 at 07:43:17PM +, Andrew Cooper wrote: > The safety of livepatching depends on every stack having been unwound, but > there is one corner case where this is not true. The Sharing/Paging/Monitor > infrastructure may use waitqueues, which copy the stack frame sideways and > l

Re: [Xen-devel] [PATCH 1/2] xen/livepatch: Add a return value to load hooks

2019-11-06 Thread Konrad Rzeszutek Wilk
On Tue, Nov 05, 2019 at 07:43:16PM +, Andrew Cooper wrote: > One use of load hooks is to perform a safety check of the system in its > quiesced state. Any non-zero return value from a load hook will abort the > apply attempt. > Shouldn't you also update the documentation (design doc?) Thank

Re: [Xen-devel] [PATCH v2 01/15] mm/mmu_notifier: define the header pre-processor parts even if disabled

2019-11-06 Thread Jason Gunthorpe
On Tue, Nov 05, 2019 at 01:23:46PM -0800, John Hubbard wrote: > On 10/28/19 1:10 PM, Jason Gunthorpe wrote: > > From: Jason Gunthorpe > > > > Now that we have KERNEL_HEADER_TEST all headers are generally compile > > tested, so relying on makefile tricks to avoid compiling code that depends > > on

[Xen-devel] [xen-4.9-testing test] 143735: regressions - trouble: fail/pass/starved

2019-11-06 Thread osstest service owner
flight 143735 xen-4.9-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/143735/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qcow2 19 guest-start/debian.repeat fail REGR. vs. 139047 test-amd64-amd6

Re: [Xen-devel] Urgent for 4.13, Was dom0less + sched=null => broken in staging (fwd)

2019-11-06 Thread Jürgen Groß
On 06.11.19 13:11, George Dunlap wrote: On Tue, Nov 5, 2019 at 11:58 PM Stefano Stabellini wrote: Hi Dario, I just checked and the patch is not in staging yet. Can we please make sure the patch goes in as soon as possible, given the looming release? I think either a fix or a revert of the o

Re: [Xen-devel] Urgent for 4.13, Was dom0less + sched=null => broken in staging (fwd)

2019-11-06 Thread George Dunlap
On Tue, Nov 5, 2019 at 11:58 PM Stefano Stabellini wrote: > > Hi Dario, > > I just checked and the patch is not in staging yet. Can we please make > sure the patch goes in as soon as possible, given the looming release? I think either a fix or a revert of the original patch needs to be a release

Re: [Xen-devel] [RFC 4/9] arm64: utilize time accounting

2019-11-06 Thread Andrii Anisov
On 28.10.19 16:47, Julien Grall wrote: (+ George and Dario) Hi, On 11/09/2019 11:32, Andrii Anisov wrote: From: Andrii Anisov Call time accounting hooks from appropriate transition points of the ARM64 code. Signed-off-by: Andrii Anisov ---   xen/arch/arm/arm64/entry.S | 39 ++

Re: [Xen-devel] [RFC 2/9] sysctl: extend XEN_SYSCTL_getcpuinfo interface

2019-11-06 Thread Andrii Anisov
Hello Julien On 28.10.19 16:52, Julien Grall wrote: Hi, On 11/09/2019 11:32, Andrii Anisov wrote: From: Andrii Anisov Extend XEN_SYSCTL_getcpuinfo interface with timing information provided by introduced time accounting infrastructure. Signed-off-by: Andrii Anisov ---   xen/common/schedule

Re: [Xen-devel] [RFC 1/9] schedule: Introduce per-pcpu time accounting

2019-11-06 Thread Andrii Anisov
Hello Julien, On 28.10.19 16:28, Julien Grall wrote: It would be good to get a review from the scheduler maintainers (Dario, George) to make sure they are happy with the suggested states here. I would not say I'm completely happy with this set of states. I'd like to have a discussion on this

Re: [Xen-devel] [RFC 1/7] xen: clang: Support correctly cross-compile

2019-11-06 Thread Wei Liu
On Wed, Nov 06, 2019 at 11:19:07AM +0200, Andrii Anisov wrote: > From: Julien Grall > > Clang uses "-target" option for cross-compilation. > > Signed-off-by: Julien Grall > --- > config/StdGNU.mk | 9 +++-- > 1 file changed, 7 insertions(+), 2 deletions(-) > > diff --git a/config/StdGNU.m

Re: [Xen-devel] [PATCH 1/1] kdd.c: Add support for initial handshake in KD protocol for Win 7, 8 and 10 (64 bit)

2019-11-06 Thread Wei Liu
Hi Julian Thanks for your patch. On Tue, Nov 05, 2019 at 09:24:27PM -0500, Julian Tuminaro wrote: [...] > > +#if 0 > +/** > + * @brief Temporary function for printing memory dump while debugging > + * Dumps in the format of QWORD type > + * > + * @param s Pointer to the kdd_state structure > +

Re: [Xen-devel] [PATCH] tools: pygrub actually cross-compiles just fine

2019-11-06 Thread Wei Liu
Cc xen-devel On Tue, Nov 05, 2019 at 03:51:13PM -0800, Stefano Stabellini wrote: > Actually, pygrub cross-compiles without issues. The cross-compilation > work-around goes back to 2005 and it probably referred to PowerPC. > > Remove the work-around now. > > Signed-off-by: Stefano Stabellini > C

[Xen-devel] [RFC 1/7] xen: clang: Support correctly cross-compile

2019-11-06 Thread Andrii Anisov
From: Julien Grall Clang uses "-target" option for cross-compilation. Signed-off-by: Julien Grall --- config/StdGNU.mk | 9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/config/StdGNU.mk b/config/StdGNU.mk index 039274e..48c50b5 100644 --- a/config/StdGNU.mk +++ b/con

[Xen-devel] [RFC 0/7] Build XEN with ARM Compiler 6.6.3

2019-11-06 Thread Andrii Anisov
From: Andrii Anisov Dear All, Here are patches to make XEN (hypervisor only) being able to be compiled for ARMv8 with ARM Compiler 6.6.3 Long Term Maintenance. ARM compiler of that version is safety certified, that is the reason for the choice. The chosen compiler has a number of bugs and deviat

[Xen-devel] [RFC 2/7] WIP: Compilation with ARM DS-6 compiler

2019-11-06 Thread Andrii Anisov
From: Artem Mygaiev Still have linker issues --- Config.mk | 8 +++- config/StdGNU.mk | 11 ++- config/arm32.mk | 10 ++ config/arm64.mk | 6 +- xen/Rules.mk | 2 ++ xen/arch/arm/Rules.mk | 8 6 files changed, 38 insertio

[Xen-devel] [RFC 5/7] WIP:arm64:armds: Build XEN with ARM Compiler 6.6

2019-11-06 Thread Andrii Anisov
From: Andrii Anisov Here several ARM Compiler 6.6 issues are solved or provided a work-around: - Scatter file is pretty primitive, it has no feature to define symbols - ARM linker defined symbols are not counted as referred if only mentioned in a steering file for rename or resolve, so a he

[Xen-devel] [RFC 7/7] arm/gic-v3: add GIC version suffix to iomem range variables

2019-11-06 Thread Andrii Anisov
From: Andrii Anisov ARM Compiler 6.6 has a proven bug: static data symbols, moved to an init section, becomes global. Thus these symbols clash with ones defined in gic-v2.c. The straight forward way to resolve the issue is to add the GIC version suffix, at least for one of the conflicting side.

[Xen-devel] [RFC 3/7] arm64:armds: ARM Compiler 6.6 does not accept `rx` registers naming for AArch64

2019-11-06 Thread Andrii Anisov
From: Andrii Anisov So get the code duplication with `x`-es. Signed-off-by: Andrii Anisov --- xen/include/asm-arm/smccc.h | 60 + 1 file changed, 60 insertions(+) diff --git a/xen/include/asm-arm/smccc.h b/xen/include/asm-arm/smccc.h index 126399d..

[Xen-devel] [RFC 6/7] arm: Introduce dummy empty functions for data only C files

2019-11-06 Thread Andrii Anisov
From: Andrii Anisov ARM Compiler 6 has a proven bug: it compiles data only C files with SoftVFP attributes. This leads to a failed linkage afterwards with an error: Error: L6242E: Cannot link object built_in.o as its attributes are incompatible with the image attributes. ... A64 clashes with So

[Xen-devel] [RFC 4/7] arm/gic: Drop pointless assertions

2019-11-06 Thread Andrii Anisov
From: Andrii Anisov Also armclang complains about the condition always true, because `sgi` is of type enum with all its values under 16. Signed-off-by: Andrii Anisov --- xen/arch/arm/gic.c | 6 -- 1 file changed, 6 deletions(-) diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c index 11

Re: [Xen-devel] [PULL 0/4] Trivial branch patches

2019-11-06 Thread Greg Kurz
On Tue, 5 Nov 2019 16:56:11 +0100 Laurent Vivier wrote: > Greg, Dave, > > could you fix that? > > Thanks, > Laurent > > Le 05/11/2019 à 16:48, no-re...@patchew.org a écrit : > > Patchew URL: > > https://patchew.org/QEMU/20191105144247.10301-1-laur...@vivier.eu/ > > > > > > > > Hi, > > > >