[xen-unstable test] 176003: regressions - FAIL

2023-01-20 Thread osstest service owner
flight 176003 xen-unstable real [real] flight 176010 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/176003/ http://logs.test-lab.xenproject.org/osstest/logs/176010/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be r

[xen-unstable-smoke test] 176006: tolerable all pass - PUSHED

2023-01-20 Thread osstest service owner
flight 176006 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/176006/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-armhf-armhf-xl 1

[qemu-mainline test] 175998: tolerable FAIL - PUSHED

2023-01-20 Thread osstest service owner
flight 175998 qemu-mainline real [real] http://logs.test-lab.xenproject.org/osstest/logs/175998/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-amd64-xl-qcow2 21 guest-start/debian.repeat fail in 175991 pass in 175998 test-armhf-armhf-xl-rtds

[linux-linus test] 176002: regressions - FAIL

2023-01-20 Thread osstest service owner
flight 176002 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/176002/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-examine 8 reboot fail REGR. vs. 173462 test-arm64-arm64-xl

Re: [PATCH v9] xen/pt: reserve PCI slot 2 for Intel igd-passthru

2023-01-20 Thread Chuck Zmudzinski
On 1/20/23 4:34 PM, Stefano Stabellini wrote: > On Sat, 14 Jan 2023, Chuck Zmudzinski wrote: > > Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus, > > as noted in docs/igd-assign.txt in the Qemu source code. > > > > Currently, when the xl toolstack is used to configure a Xen HV

Re: [PATCH 2/2] xen/cppcheck: add parameter to skip given MISRA rules

2023-01-20 Thread Stefano Stabellini
On Fri, 6 Jan 2023, Luca Fancellu wrote: > Add parameter to skip the passed MISRA rules during the cppcheck > analysis, the rules are specified as a list of comma separated > rules with the MISRA number notation (e.g. 1.1,1.3,...). > > Modify convert_misra_doc.py script to take an extra parameter

Re: Porting Xen in raspberry pi4B

2023-01-20 Thread Stefano Stabellini
Hi Vipul, Sorry for the late reply. Unfortunately I don't have a simple answer for you. If I were you, I would add printf's everywhere in QEMU (or use gdb) until I figure out exactly why the graphics events and pixels don't propagate from ./hw/display/xenfb.c to ui/console.c and to ui/vnc.c. You

[xen-unstable-smoke test] 176005: tolerable all pass - PUSHED

2023-01-20 Thread osstest service owner
flight 176005 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/176005/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [XEN v2 02/11] xen/arm: Use the correct format specifier

2023-01-20 Thread Stefano Stabellini
On Fri, 20 Jan 2023, Ayan Kumar Halder wrote: > Hi Julien/Michal, > > On 20/01/2023 17:49, Julien Grall wrote: > > > > > > On 20/01/2023 16:03, Michal Orzel wrote: > > > Hi Julien, > > > > Hi Michal, > > > > > > > > On 20/01/2023 16:09, Julien Grall wrote: > > > > > > > > > > > > On 20/01/2

Re: [XEN v5] xen/arm: Probe the load/entry point address of an uImage correctly

2023-01-20 Thread Stefano Stabellini
On Thu, 19 Jan 2023, Michal Orzel wrote: > Hello all, > > On 13/01/2023 13:24, Ayan Kumar Halder wrote: > > Currently, kernel_uimage_probe() does not read the load/entry point address > > set in the uImge header. Thus, info->zimage.start is 0 (default value). This > > causes, kernel_zimage_place()

Re: [XEN v5] xen/arm: Probe the load/entry point address of an uImage correctly

2023-01-20 Thread Stefano Stabellini
On Fri, 13 Jan 2023, Ayan Kumar Halder wrote: > Currently, kernel_uimage_probe() does not read the load/entry point address > set in the uImge header. Thus, info->zimage.start is 0 (default value). This > causes, kernel_zimage_place() to treat the binary (contained within uImage) > as position inde

[PATCH] Changelog: Add details about new features for SPR

2023-01-20 Thread Andrew Cooper
Signed-off-by: Andrew Cooper --- CC: George Dunlap CC: Jan Beulich CC: Stefano Stabellini CC: Wei Liu CC: Julien Grall CC: Henry Wang A reminder to everyone, write the changelog as it happens, rather than scrambling to remember 8 months of development just as the release is happening. ---

[ovmf test] 176004: all pass - PUSHED

2023-01-20 Thread osstest service owner
flight 176004 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/176004/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 7afef31b2b17d1a8d5248eb562352c6d3505ea14 baseline version: ovmf bf5678b5802685e07583e

Re: [PATCH v9] xen/pt: reserve PCI slot 2 for Intel igd-passthru

2023-01-20 Thread Stefano Stabellini
On Sat, 14 Jan 2023, Chuck Zmudzinski wrote: > Intel specifies that the Intel IGD must occupy slot 2 on the PCI bus, > as noted in docs/igd-assign.txt in the Qemu source code. > > Currently, when the xl toolstack is used to configure a Xen HVM guest with > Intel IGD passthrough to the guest with t

[xen-unstable-smoke test] 176001: tolerable all pass - PUSHED

2023-01-20 Thread osstest service owner
flight 176001 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/176001/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [PATCH v2 4/7] x86/power: Inline write_cr[04]()

2023-01-20 Thread Borislav Petkov
On Mon, Jan 16, 2023 at 03:25:37PM +0100, Peter Zijlstra wrote: > Since we can't do CALL/RET until GS is restored and CR[04] pinning is ^^ Ditto like for the previous one. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette

Re: [PATCH v2 3/7] x86/power: De-paravirt restore_processor_state()

2023-01-20 Thread Borislav Petkov
On Mon, Jan 16, 2023 at 03:25:36PM +0100, Peter Zijlstra wrote: > Since Xen PV doesn't use restore_processor_state(), and we're going to > have to avoid CALL/RET until at least GS is restored, Drop the "we": "..., and CALL/RET cannot happen before GS has been restored, ..." -- Regards/Gruss,

Re: [XEN PATCH v6 0/5] Toolstack build system improvement, toward non-recursive makefiles

2023-01-20 Thread Anthony PERARD
The "for-4.17" in the subject is a mistake, the series is for staging. It is just left over from the last time I've sent the series. Cheers, -- Anthony PERARD

Re: [PATCH v8] xen/pt: reserve PCI slot 2 for Intel igd-passthru

2023-01-20 Thread Chuck Zmudzinski
On 1/20/2023 11:01 AM, Igor Mammedov wrote: > On Tue, 17 Jan 2023 09:50:23 -0500 > Chuck Zmudzinski wrote: > > > On 1/17/2023 5:35 AM, Igor Mammedov wrote: > > > On Mon, 16 Jan 2023 13:00:53 -0500 > > > Chuck Zmudzinski wrote: > > > > > > > On 1/16/23 10:33, Igor Mammedov wrote: > > > > > On

[XEN PATCH for-4.17 v6 5/5] tools: Rework $(xenlibs-ldlibs, ) to provide library flags only.

2023-01-20 Thread Anthony PERARD
LDLIBS is usually only the library flags (that is the `-l` flags), as proposed in GNU make manual, while LDFLAGS would be extra flags such as `-L`. Rework the make macro $(xenlibs-ldlibs, ) to only provide the library flags. $(xenlibs-ldflags, ) already only provide the extra flags like the -rpath

[XEN PATCH for-4.17 v6 4/5] tools: Introduce macro $(xenlibs-cflags,) and introduce $(USELIBS) in subdirs

2023-01-20 Thread Anthony PERARD
Introduce $(xenlibs-cflags,) to get the CFLAGS needed to build with the xen library listed as argument. This mainly give the ability to use the same list of xen libs as we can use with the other macro $(xenlibs-ldlibs,). Also, we can avoid listing $(CFLAGS_xeninclude) more than once. We will use $

[XEN PATCH for-4.17 v6 3/5] libs/light: Makefile cleanup

2023-01-20 Thread Anthony PERARD
Rework "libacpi.h" include in "libxl_x86_acpi.c" as to be more selective about the include path and only add "tools/libacpi/". Also "libxl_dom.c" don't use "libacpi.h" anymore. Use "-iquote" for libacpi headers. Get rid of the weird "$(eval stem =" in the middle of a recipe and use a make automati

[XEN PATCH for-4.17 v6 2/5] libs/light: Rework targets prerequisites

2023-01-20 Thread Anthony PERARD
No need for $(AUTOSRCS), GNU make can generate them as needed when trying to build them as needed when trying to build the object. Also, those two AUTOSRCS don't need to be a prerequisite of "all". As for the "clean" target, those two files are already removed via "_*.c". We don't need $(AUTOINCS)

[XEN PATCH for-4.17 v6 0/5] Toolstack build system improvement, toward non-recursive makefiles

2023-01-20 Thread Anthony PERARD
Patch series available in this git branch: https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git br.toolstack-build-system-v6 Changes in v6: - For unstable libs, use --default-symver instead of a generated version-script. - Two new patches to deal with $(xenlibs-*,) macros. - Second

[XEN PATCH for-4.17 v6 1/5] libs: Fix auto-generation of version-script for unstable libs

2023-01-20 Thread Anthony PERARD
When there isn't a version-script for a shared library (like for unstable libs), we create one based on the current Xen version. But that version-script became out-of-date as soon as Xen's version changes and make as no way to regenerate the version-script on rebuild. For unstable libs, we only ne

Re: [PATCH v8] xen/pt: reserve PCI slot 2 for Intel igd-passthru

2023-01-20 Thread Chuck Zmudzinski
On 1/20/2023 11:57 AM, Stefano Stabellini wrote: > On Tue, 17 Jan 2023, Chuck Zmudzinski wrote: > > On 1/17/2023 6:04 AM, Igor Mammedov wrote: > > > On Mon, 16 Jan 2023 13:00:53 -0500 > > > Chuck Zmudzinski wrote: > > > > > > > On 1/16/23 10:33, Igor Mammedov wrote: > > > > > On Fri, 13 Jan 2023 1

Re: [PATCH v2] x86/hotplug: Do not put offline vCPUs in mwait idle state

2023-01-20 Thread Sean Christopherson
On Fri, Jan 20, 2023, Igor Mammedov wrote: > On Fri, 20 Jan 2023 05:55:11 -0800 > "Srivatsa S. Bhat" wrote: > > > Hi Igor and Thomas, > > > > Thank you for your review! > > > > On 1/19/23 1:12 PM, Thomas Gleixner wrote: > > > On Mon, Jan 16 2023 at 15:55, Igor Mammedov wrote: > > >> "Srivatsa

Re: [XEN PATCH v4 3/3] build: compat-xlat-header.py: optimisation to search for just '{' instead of [{}]

2023-01-20 Thread Andrew Cooper
On 19/01/2023 3:22 pm, Anthony PERARD wrote: > `fields` and `extrafields` always all the parts of a sub-struct, so > when there is '}', there is always a '{' before it. Also, both are > lists. > > Signed-off-by: Anthony PERARD > --- > xen/tools/compat-xlat-header.py | 4 ++-- > 1 file changed, 2

Re: [XEN PATCH v4 2/3] build: replace get-fields.sh by a python script

2023-01-20 Thread Andrew Cooper
On 19/01/2023 3:22 pm, Anthony PERARD wrote: > The get-fields.sh which generate all the include/compat/.xlat/*.h > headers is quite slow. It takes for example nearly 3 seconds to > generate platform.h on a recent machine, or 2.3 seconds for memory.h. > > Rewriting the mix of shell/sed/python into a

Re: [XEN PATCH v4 1/3] build: include/compat, remove typedefs handling

2023-01-20 Thread Andrew Cooper
On 19/01/2023 3:22 pm, Anthony PERARD wrote: > Partial revert of c93bd0e6ea2a ("tmem: fix 32-on-64 support") > Since c492e19fdd05 ("xen: remove tmem from hypervisor"), this code > isn't used anymore. > > Signed-off-by: Anthony PERARD Acked-by: Andrew Cooper

Re: [PATCH RFC 07/10] domain: map/unmap GADDR based shared guest areas

2023-01-20 Thread Andrew Cooper
On 18/01/2023 9:55 am, Jan Beulich wrote: > On 17.01.2023 23:04, Andrew Cooper wrote: >> On 19/10/2022 8:43 am, Jan Beulich wrote: >>> The registration by virtual/linear address has downsides: At least on >>> x86 the access is expensive for HVM/PVH domains. Furthermore for 64-bit >>> PV domains the

Re: [XEN v2 02/11] xen/arm: Use the correct format specifier

2023-01-20 Thread Ayan Kumar Halder
Hi Julien/Michal, On 20/01/2023 17:49, Julien Grall wrote: On 20/01/2023 16:03, Michal Orzel wrote: Hi Julien, Hi Michal, On 20/01/2023 16:09, Julien Grall wrote: On 20/01/2023 14:40, Michal Orzel wrote: Hello, Hi, On 20/01/2023 10:32, Julien Grall wrote: Hi, On 19/01/2023 2

Re: [XEN v2 02/11] xen/arm: Use the correct format specifier

2023-01-20 Thread Julien Grall
On 20/01/2023 16:03, Michal Orzel wrote: Hi Julien, Hi Michal, On 20/01/2023 16:09, Julien Grall wrote: On 20/01/2023 14:40, Michal Orzel wrote: Hello, Hi, On 20/01/2023 10:32, Julien Grall wrote: Hi, On 19/01/2023 22:54, Stefano Stabellini wrote: On Tue, 17 Jan 2023, Ayan K

Re: [PATCH RFC 07/10] domain: map/unmap GADDR based shared guest areas

2023-01-20 Thread Andrew Cooper
On 18/01/2023 9:59 am, Jan Beulich wrote: > On 17.01.2023 23:20, Andrew Cooper wrote: >> On 24/11/2022 9:29 pm, Julien Grall wrote: >>> On 19/10/2022 09:43, Jan Beulich wrote: The registration by virtual/linear address has downsides: At least on x86 the access is expensive for HVM/PVH dom

Re: [PATCH v2 9/9] x86/shadow: harden shadow_size()

2023-01-20 Thread Andrew Cooper
On 18/01/2023 2:13 pm, Jan Beulich wrote: > On 17.01.2023 20:13, Andrew Cooper wrote: >> On 12/01/2023 10:42 am, Jan Beulich wrote: >>> On 12.01.2023 11:31, Andrew Cooper wrote: On 12/01/2023 9:47 am, Jan Beulich wrote: > On 12.01.2023 00:15, Andrew Cooper wrote: >> On 11/01/2023 1:57

[xen-unstable test] 175994: tolerable FAIL

2023-01-20 Thread osstest service owner
flight 175994 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/175994/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-libvirt 8 xen-boot fail pass in 175987 test-amd64-amd64-xl-qemuu-debian

[ovmf test] 176000: all pass - PUSHED

2023-01-20 Thread osstest service owner
flight 176000 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/176000/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf bf5678b5802685e07583e3c7ec56d883cbdd5da3 baseline version: ovmf 51411435d559c55eaf38c

Re: [PATCH v2 1/9] x86/shadow: replace sh_reset_l3_up_pointers()

2023-01-20 Thread George Dunlap
On Wed, Jan 11, 2023 at 1:52 PM Jan Beulich wrote: > Rather than doing a separate hash walk (and then even using the vCPU > variant, which is to go away), do the up-pointer-clearing right in > sh_unpin(), as an alternative to the (now further limited) enlisting on > a "free floating" list fragmen

Re: [PATCH v8] xen/pt: reserve PCI slot 2 for Intel igd-passthru

2023-01-20 Thread Stefano Stabellini
On Tue, 17 Jan 2023, Chuck Zmudzinski wrote: > On 1/17/2023 6:04 AM, Igor Mammedov wrote: > > On Mon, 16 Jan 2023 13:00:53 -0500 > > Chuck Zmudzinski wrote: > > > > > On 1/16/23 10:33, Igor Mammedov wrote: > > > > On Fri, 13 Jan 2023 16:31:26 -0500 > > > > Chuck Zmudzinski wrote: > > > > > > >

Re: [XEN v2 10/11] xen/arm: Restrict zeroeth_table_offset for ARM_64

2023-01-20 Thread Stefano Stabellini
On Fri, 20 Jan 2023, Julien Grall wrote: > > > #define zeroeth_table_offset(va) > > > TABLE_OFFSET(zeroeth_linear_offset(va)) > > > +#else > > > +#define zeroeth_table_offset(va) 0 > > > > Rather than 0 it might be better to have 32, hence zeroing the input > > address > I don't understand why

Re: [XEN v2 02/11] xen/arm: Use the correct format specifier

2023-01-20 Thread Michal Orzel
Hi Julien, On 20/01/2023 16:09, Julien Grall wrote: > > > On 20/01/2023 14:40, Michal Orzel wrote: >> Hello, > > Hi, > >> >> On 20/01/2023 10:32, Julien Grall wrote: >>> >>> >>> Hi, >>> >>> On 19/01/2023 22:54, Stefano Stabellini wrote: On Tue, 17 Jan 2023, Ayan Kumar Halder wrote: >

Re: [PATCH v8] xen/pt: reserve PCI slot 2 for Intel igd-passthru

2023-01-20 Thread Igor Mammedov
On Tue, 17 Jan 2023 09:50:23 -0500 Chuck Zmudzinski wrote: > On 1/17/2023 5:35 AM, Igor Mammedov wrote: > > On Mon, 16 Jan 2023 13:00:53 -0500 > > Chuck Zmudzinski wrote: > > > > > On 1/16/23 10:33, Igor Mammedov wrote: > > > > On Fri, 13 Jan 2023 16:31:26 -0500 > > > > Chuck Zmudzinski wro

[linux-linus test] 175992: regressions - FAIL

2023-01-20 Thread osstest service owner
flight 175992 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/175992/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-arm64-arm64-examine 8 reboot fail REGR. vs. 173462 test-arm64-arm64-xl

Re: [PATCH v1 06/14] xen/riscv: introduce exception context

2023-01-20 Thread Andrew Cooper
On 20/01/2023 2:59 pm, Oleksii Kurochko wrote: > diff --git a/xen/arch/riscv/include/asm/processor.h > b/xen/arch/riscv/include/asm/processor.h > new file mode 100644 > index 00..5898a09ce6 > --- /dev/null > +++ b/xen/arch/riscv/include/asm/processor.h > @@ -0,0 +1,114 @@ > +/* SPDX-Licens

Re: [PATCH v8] xen/pt: reserve PCI slot 2 for Intel igd-passthru

2023-01-20 Thread Igor Mammedov
On Tue, 17 Jan 2023 09:43:52 -0500 Chuck Zmudzinski wrote: > On 1/17/2023 5:35 AM, Igor Mammedov wrote: > > On Mon, 16 Jan 2023 13:00:53 -0500 > > Chuck Zmudzinski wrote: > > > > > On 1/16/23 10:33, Igor Mammedov wrote: > > > > On Fri, 13 Jan 2023 16:31:26 -0500 > > > > Chuck Zmudzinski wro

[xen-unstable-smoke test] 175997: tolerable all pass - PUSHED

2023-01-20 Thread osstest service owner
flight 175997 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/175997/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [PATCH v1 05/14] xen/riscv: add early_printk_hnum() function

2023-01-20 Thread Andrew Cooper
On 20/01/2023 2:59 pm, Oleksii Kurochko wrote: > Add ability to print hex number. > It might be useful to print register value as debug information > in BUG(), WARN(), etc... > > Signed-off-by: Oleksii Kurochko I think it would be better to get s(n)printf() working than to take these.  We're goin

Re: [PATCH v2] x86/hotplug: Do not put offline vCPUs in mwait idle state

2023-01-20 Thread Igor Mammedov
On Fri, 20 Jan 2023 05:55:11 -0800 "Srivatsa S. Bhat" wrote: > Hi Igor and Thomas, > > Thank you for your review! > > On 1/19/23 1:12 PM, Thomas Gleixner wrote: > > On Mon, Jan 16 2023 at 15:55, Igor Mammedov wrote: > >> "Srivatsa S. Bhat" wrote: > >>> Fix this by preventing the use of mwa

Re: [PATCH v1 02/14] xen/riscv: add header

2023-01-20 Thread Andrew Cooper
On 20/01/2023 2:59 pm, Oleksii Kurochko wrote: > Signed-off-by: Oleksii Kurochko There's some stuff in here which is not RISCV-specific.  We really want to dedup with the other architectures and move into common. ~Andrew

Re: [PATCH v1 01/14] xen/riscv: add _zicsr to CFLAGS

2023-01-20 Thread Andrew Cooper
On 20/01/2023 2:59 pm, Oleksii Kurochko wrote: > Work with some registers requires csr command which is part of > Zicsr. > > Signed-off-by: Oleksii Kurochko > --- > xen/arch/riscv/arch.mk | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/xen/arch/riscv/arch.mk b/xen/arch/ri

Re: [PATCH 2/2] x86/shadow: mark more of sh_page_fault() HVM-only

2023-01-20 Thread Andrew Cooper
On 19/01/2023 1:19 pm, Jan Beulich wrote: > Neither p2m_mmio_dm nor the types p2m_is_readonly() checks for are > applicable to PV; specifically get_gfn() won't ever return such a type > for PV domains. Adjacent to those checks is yet another is_hvm_...() > one. With that block made conditional, ano

Re: [XEN v2 02/11] xen/arm: Use the correct format specifier

2023-01-20 Thread Julien Grall
On 20/01/2023 14:40, Michal Orzel wrote: Hello, Hi, On 20/01/2023 10:32, Julien Grall wrote: Hi, On 19/01/2023 22:54, Stefano Stabellini wrote: On Tue, 17 Jan 2023, Ayan Kumar Halder wrote: 1. One should use 'PRIpaddr' to display 'paddr_t' variables. 2. One should use 'PRIx64' to di

[PATCH v1 11/14] xen/riscv: introduce setup_trap_handler()

2023-01-20 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/setup.c | 11 +++ 1 file changed, 11 insertions(+) diff --git a/xen/arch/riscv/setup.c b/xen/arch/riscv/setup.c index d09ffe1454..174e134c93 100644 --- a/xen/arch/riscv/setup.c +++ b/xen/arch/riscv/setup.c @@ -1,16 +1,27 @@ #include #

[PATCH v1 14/14] automation: add smoke test to verify macros from bug.h

2023-01-20 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko --- automation/scripts/qemu-smoke-riscv64.sh | 2 ++ 1 file changed, 2 insertions(+) diff --git a/automation/scripts/qemu-smoke-riscv64.sh b/automation/scripts/qemu-smoke-riscv64.sh index e0f06360bc..e7cc7f1442 100755 --- a/automation/scripts/qemu-smoke-riscv64.s

[PATCH v1 10/14] xen/riscv: mask all interrupts

2023-01-20 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/riscv64/head.S | 5 + 1 file changed, 5 insertions(+) diff --git a/xen/arch/riscv/riscv64/head.S b/xen/arch/riscv/riscv64/head.S index d444dd8aad..ffd95f9f89 100644 --- a/xen/arch/riscv/riscv64/head.S +++ b/xen/arch/riscv/riscv64/head.S @@ -

[PATCH v1 12/14] xen/riscv: introduce an implementation of macros from

2023-01-20 Thread Oleksii Kurochko
The patch introduces macros: BUG(), WARN(), run_in_exception(), assert_failed. The implementation uses "ebreak" instruction in combination with diffrent bug frame tables (for each type) which contains useful information. Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/include/asm/bug.h | 120

[PATCH v1 07/14] xen/riscv: introduce exception handlers implementation

2023-01-20 Thread Oleksii Kurochko
The patch introduces an implementation of basic exception handlers: - to save/restore context - to handle an exception itself. The handler calls wait_for_interrupt now, nothing more. Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/Makefile| 2 + xen/arch/riscv/entry.S

[PATCH v1 04/14] xen/riscv: add header

2023-01-20 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/include/asm/csr.h | 82 1 file changed, 82 insertions(+) create mode 100644 xen/arch/riscv/include/asm/csr.h diff --git a/xen/arch/riscv/include/asm/csr.h b/xen/arch/riscv/include/asm/csr.h new file mode 100644

[PATCH v1 09/14] xen/riscv: introduce do_unexpected_trap()

2023-01-20 Thread Oleksii Kurochko
The patch introduces the function the purpose of which is to print a cause of an exception and call "wfi" instruction. Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/traps.c | 14 +- 1 file changed, 13 insertions(+), 1 deletion(-) diff --git a/xen/arch/riscv/traps.c b/xen/arch/r

[PATCH v1 06/14] xen/riscv: introduce exception context

2023-01-20 Thread Oleksii Kurochko
The patch introduces a set of registers which should be saved to and restored from a stack after an exception occurs and a set of defines which will be used during exception context saving/restoring. Originally header was introduced in the patch series from Bobby so mostly it was re-used and remo

[PATCH v1 01/14] xen/riscv: add _zicsr to CFLAGS

2023-01-20 Thread Oleksii Kurochko
Work with some registers requires csr command which is part of Zicsr. Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/arch.mk | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/riscv/arch.mk b/xen/arch/riscv/arch.mk index 012dc677c3..95b41d9f3e 100644 --- a/xen/arch/

[PATCH v1 05/14] xen/riscv: add early_printk_hnum() function

2023-01-20 Thread Oleksii Kurochko
Add ability to print hex number. It might be useful to print register value as debug information in BUG(), WARN(), etc... Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/early_printk.c | 39 +++ xen/arch/riscv/include/asm/early_printk.h | 2 ++ 2 files changed

[PATCH v1 13/14] xen/riscv: test basic handling stuff

2023-01-20 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/setup.c | 18 +- 1 file changed, 17 insertions(+), 1 deletion(-) diff --git a/xen/arch/riscv/setup.c b/xen/arch/riscv/setup.c index 174e134c93..35ab9d25c6 100644 --- a/xen/arch/riscv/setup.c +++ b/xen/arch/riscv/setup.c @@ -1,6 +

[PATCH v1 03/14] xen/riscv: add

2023-01-20 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/include/asm/riscv_encoding.h | 945 1 file changed, 945 insertions(+) create mode 100644 xen/arch/riscv/include/asm/riscv_encoding.h diff --git a/xen/arch/riscv/include/asm/riscv_encoding.h b/xen/arch/riscv/include/asm/ris

[PATCH v1 08/14] xen/riscv: introduce decode_cause() stuff

2023-01-20 Thread Oleksii Kurochko
The patch introduces stuff needed to decode a reason of an exception. Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/traps.c | 88 ++ 1 file changed, 88 insertions(+) diff --git a/xen/arch/riscv/traps.c b/xen/arch/riscv/traps.c index 3201b851ef..dd64f

[PATCH v1 00/14] RISCV basic exception handling implementation

2023-01-20 Thread Oleksii Kurochko
The patch series is based on another one [Basic early_printk and smoke test implementation] which hasn't been commited yet. The patch series provides a basic implementation of exception handling. It can do only basic things such as decode a cause of an exception, save/restore registers and execute

[PATCH v1 02/14] xen/riscv: add header

2023-01-20 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/include/asm/asm.h | 54 1 file changed, 54 insertions(+) create mode 100644 xen/arch/riscv/include/asm/asm.h diff --git a/xen/arch/riscv/include/asm/asm.h b/xen/arch/riscv/include/asm/asm.h new file mode 100644

Re: [PATCH] x86/shadow: Drop dubious lastpage diagnostic

2023-01-20 Thread Andrew Cooper
On 20/01/2023 2:39 pm, Andrew Cooper wrote: > On 20/01/2023 2:20 pm, Jan Beulich wrote: >> On 20.01.2023 15:10, Andrew Cooper wrote: >>> On 20/01/2023 1:10 pm, Jan Beulich wrote: On 20.01.2023 12:45, Andrew Cooper wrote: > This is a global variable (actually 3, one per GUEST_PAGING_LEVEL),

Re: [XEN v2 02/11] xen/arm: Use the correct format specifier

2023-01-20 Thread Michal Orzel
Hello, On 20/01/2023 10:32, Julien Grall wrote: > > > Hi, > > On 19/01/2023 22:54, Stefano Stabellini wrote: >> On Tue, 17 Jan 2023, Ayan Kumar Halder wrote: >>> 1. One should use 'PRIpaddr' to display 'paddr_t' variables. >>> 2. One should use 'PRIx64' to display 'u64' in hex format. The curre

Re: [PATCH] x86/shadow: Drop dubious lastpage diagnostic

2023-01-20 Thread Andrew Cooper
On 20/01/2023 2:20 pm, Jan Beulich wrote: > On 20.01.2023 15:10, Andrew Cooper wrote: >> On 20/01/2023 1:10 pm, Jan Beulich wrote: >>> On 20.01.2023 12:45, Andrew Cooper wrote: This is a global variable (actually 3, one per GUEST_PAGING_LEVEL), operated on using atomics only (with n

Re: [XEN PATCH] build: fix building flask headers before descending in flask/ss/

2023-01-20 Thread Anthony PERARD
On Fri, Jan 20, 2023 at 03:16:51PM +0100, Jan Beulich wrote: > On 20.01.2023 14:36, Anthony PERARD wrote: > > Unfortunatly, adding prerequisite to "$(obj)/ss/built_in.o" doesn't > > work because we have "$(obj)/%/built_in.o: $(obj)/% ;" in Rules.mk. > > So, make is allow to try to build objects in

Re: [PATCH] x86/shadow: Drop dubious lastpage diagnostic

2023-01-20 Thread Jan Beulich
On 20.01.2023 15:10, Andrew Cooper wrote: > On 20/01/2023 1:10 pm, Jan Beulich wrote: >> On 20.01.2023 12:45, Andrew Cooper wrote: >>> This is a global variable (actually 3, one per GUEST_PAGING_LEVEL), operated >>> on using atomics only (with no regard to what else shares the same >>> cacheline),

Re: [XEN PATCH] build: fix building flask headers before descending in flask/ss/

2023-01-20 Thread Jan Beulich
On 20.01.2023 14:36, Anthony PERARD wrote: > Unfortunatly, adding prerequisite to "$(obj)/ss/built_in.o" doesn't > work because we have "$(obj)/%/built_in.o: $(obj)/% ;" in Rules.mk. > So, make is allow to try to build objects in "xsm/flask/ss/" before > generating the headers. > > Adding a prereq

Re: [XEN PATCH] build: fix building flask headers before descending in flask/ss/

2023-01-20 Thread Daniel P. Smith
On 1/20/23 08:36, Anthony PERARD wrote: Unfortunatly, adding prerequisite to "$(obj)/ss/built_in.o" doesn't work because we have "$(obj)/%/built_in.o: $(obj)/% ;" in Rules.mk. So, make is allow to try to build objects in "xsm/flask/ss/" before generating the headers. Adding a prerequisite on "$(

Re: [PATCH] x86/shadow: Drop dubious lastpage diagnostic

2023-01-20 Thread Andrew Cooper
On 20/01/2023 1:10 pm, Jan Beulich wrote: > On 20.01.2023 12:45, Andrew Cooper wrote: >> This is a global variable (actually 3, one per GUEST_PAGING_LEVEL), operated >> on using atomics only (with no regard to what else shares the same >> cacheline), >> which emits a diagnostic (in debug builds on

Re: [PATCH v2] x86/hotplug: Do not put offline vCPUs in mwait idle state

2023-01-20 Thread Srivatsa S. Bhat
Hi Igor and Thomas, Thank you for your review! On 1/19/23 1:12 PM, Thomas Gleixner wrote: > On Mon, Jan 16 2023 at 15:55, Igor Mammedov wrote: >> "Srivatsa S. Bhat" wrote: >>> Fix this by preventing the use of mwait idle state in the vCPU offline >>> play_dead() path for any hypervisor, even i

Re: [PATCH v2 0/3] xen/arm: Frametable hardening and config.h cleanup

2023-01-20 Thread Julien Grall
Hi, On 17/01/2023 11:43, Michal Orzel wrote: The first patch fixes a bug due to incorrect DIRECTMAP_SIZE calculation. The second patch removes unused macro FRAMETABLE_VIRT_END. The third patch hardens the setup_frametable_mappings by adding a sanity check for the size of struct page_info and c

Re: [PATCH] tools/symbols: drop asm/types.h inclusion

2023-01-20 Thread Julien Grall
On 20/01/2023 13:19, Jan Beulich wrote: On 20.01.2023 12:24, Julien Grall wrote: On 20/01/2023 08:40, Jan Beulich wrote: While this has been there forever, it's not clear to me what it was (thought to be) needed for. asm/types.h used to be directly included in assembly x86 file. This was d

[XEN PATCH] build: fix building flask headers before descending in flask/ss/

2023-01-20 Thread Anthony PERARD
Unfortunatly, adding prerequisite to "$(obj)/ss/built_in.o" doesn't work because we have "$(obj)/%/built_in.o: $(obj)/% ;" in Rules.mk. So, make is allow to try to build objects in "xsm/flask/ss/" before generating the headers. Adding a prerequisite on "$(obj)/ss" instead will fix the issue has th

[qemu-mainline test] 175991: regressions - FAIL

2023-01-20 Thread osstest service owner
flight 175991 qemu-mainline real [real] flight 175996 qemu-mainline real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/175991/ http://logs.test-lab.xenproject.org/osstest/logs/175996/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be

Re: [PATCH v2 2/7] x86/boot: Delay sev_verify_cbit() a bit

2023-01-20 Thread Jörg Rödel
On Thu, Jan 19, 2023 at 02:18:47PM +0100, Borislav Petkov wrote: > So, can we do that C-bit verification once on the BSP, *in C* which would be a > lot easier, and be done with it? > > Once it is verified there, the bit is the same on all APs so all good. Yes, I think this is safe to do. The page

Re: [PATCH] tools/symbols: drop asm/types.h inclusion

2023-01-20 Thread Jan Beulich
On 20.01.2023 12:24, Julien Grall wrote: > On 20/01/2023 08:40, Jan Beulich wrote: >> While this has been there forever, it's not clear to me what it was >> (thought to be) needed for. > > asm/types.h used to be directly included in assembly x86 file. This was > dropped by commit 3f76e83c4cf6 "x8

Re: [PATCH] x86/shadow: Drop dubious lastpage diagnostic

2023-01-20 Thread Jan Beulich
On 20.01.2023 12:45, Andrew Cooper wrote: > This is a global variable (actually 3, one per GUEST_PAGING_LEVEL), operated > on using atomics only (with no regard to what else shares the same cacheline), > which emits a diagnostic (in debug builds only) without changing any program > behaviour. > >

Re: [XEN][RFC PATCH v4 05/16] xen/device-tree: Add _dt_find_node_by_path() to find nodes in device tree

2023-01-20 Thread Michal Orzel
Hi Vikram, On 07/12/2022 07:15, Vikram Garhwal wrote: > > > Add _dt_find_by_path() to find a matching node with path for a dt_device_node. Here and in commit title you say _dt_find_by_path but you introduce device_tree_find_node_by_path. Also, it would be beneficial to state why such change is

Re: [XEN][RFC PATCH v4 04/16] libfdt: overlay: change overlay_get_target()

2023-01-20 Thread Michal Orzel
Hi Vikram, On 07/12/2022 07:15, Vikram Garhwal wrote: > > > Rename overlay_get_target() to fdt_overlay_target_offset() and remove static > function type. > > This is done to get the target path for the overlay nodes which is very useful > in many cases. For example, Xen hypervisor needs it when

Re: [XEN][RFC PATCH v4 02/16] xen/arm: Add CONFIG_OVERLAY_DTB

2023-01-20 Thread Michal Orzel
Hi Vikram, On 07/12/2022 07:15, Vikram Garhwal wrote: > > > Introduce a config option where the user can enable support for > adding/removing > device tree nodes using a device tree binary overlay. > > Signed-off-by: Vikram Garhwal > --- > xen/arch/arm/Kconfig | 5 + > 1 file changed, 5

Re: [XEN][RFC PATCH v4 01/16] xen/arm/device: Remove __init from function type

2023-01-20 Thread Michal Orzel
Hi Vikram, On 07/12/2022 07:15, Vikram Garhwal wrote: > > > Change function type of following function to access during runtime: > 1. map_irq_to_domain() > 2. handle_device_interrupt() > 3. map_range_to_domain() > 4. unflatten_dt_node() > 5. unflatten_device_tree() If you do

[xen-unstable-smoke test] 175995: tolerable all pass - PUSHED

2023-01-20 Thread osstest service owner
flight 175995 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/175995/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-armhf-armhf-xl 1

Re: [PATCH 0/6] tools: Switch to non-truncating XENVER_* ops

2023-01-20 Thread Andrew Cooper
On 19/01/2023 6:20 am, Juergen Gross wrote: > On 17.01.23 14:53, Andrew Cooper wrote: >> This is the tools side of the Xen series posted previously. >> >> With this, a Xen built with long strings can be retrieved: >> >>    # xl info >>    ... >>    xen_version    : 4.18-unstable+REALLY LONG

Re: [PATCH v5 1/5] xen/include: Change to

2023-01-20 Thread Oleksii
On Thu, 2023-01-19 at 16:43 +0100, Jan Beulich wrote: > On 19.01.2023 15:29, Jan Beulich wrote: > > On 19.01.2023 15:07, Oleksii Kurochko wrote: > > > In the patch "include/types: move stddef.h-kind types to common > > > header" [1] size_t was moved from to > > > so early_printk should be updated

[PATCH] x86/shadow: Drop dubious lastpage diagnostic

2023-01-20 Thread Andrew Cooper
This is a global variable (actually 3, one per GUEST_PAGING_LEVEL), operated on using atomics only (with no regard to what else shares the same cacheline), which emits a diagnostic (in debug builds only) without changing any program behaviour. Based on read-only p2m types including logdirty, this

[SeaBIOS PATCH] xen: require Xen info structure at 0x1000 to detect Xen

2023-01-20 Thread David Woodhouse
From: David Woodhouse When running under Xen, hvmloader places a table at 0x1000 with the e820 information and BIOS tables. If this isn't present, SeaBIOS will currently panic. We now have support for running Xen guests natively in QEMU/KVM, which boots SeaBIOS directly instead of via hvmloader

Re: [PATCH] tools/symbols: drop asm/types.h inclusion

2023-01-20 Thread Julien Grall
Hi Jan, On 20/01/2023 08:40, Jan Beulich wrote: While this has been there forever, it's not clear to me what it was (thought to be) needed for. asm/types.h used to be directly included in assembly x86 file. This was dropped by commit 3f76e83c4cf6 "x86/entry: drop unused header inclusions".

Re: [PATCH] tools/symbols: drop asm/types.h inclusion

2023-01-20 Thread Andrew Cooper
On 20/01/2023 8:40 am, Jan Beulich wrote: > While this has been there forever, it's not clear to me what it was > (thought to be) needed for. In fact, all three instances of the header > already exclude their entire bodies when __ASSEMBLY__ was defined. > Hence, with no other assembly files includi

Re: [XEN v2 02/11] xen/arm: Use the correct format specifier

2023-01-20 Thread Ayan Kumar Halder
On 20/01/2023 09:32, Julien Grall wrote: Hi, Hi Julien, On 19/01/2023 22:54, Stefano Stabellini wrote: On Tue, 17 Jan 2023, Ayan Kumar Halder wrote: 1. One should use 'PRIpaddr' to display 'paddr_t' variables. 2. One should use 'PRIx64' to display 'u64' in hex format. The current use of 'P

Re: [XEN v2 11/11] xen/arm: p2m: Enable support for 32bit IPA

2023-01-20 Thread Julien Grall
Hi Ayan, On 17/01/2023 17:43, Ayan Kumar Halder wrote: VTCR.T0SZ should be set as 0x20 to support 32bit IPA. Refer ARM DDI 0487I.a ID081822, G8-9824, G8.2.171, VTCR, "Virtualization Translation Control Register" for the bit descriptions. Signed-off-by: Ayan Kumar Halder --- Changes from - v1

Re: [XEN v2 10/11] xen/arm: Restrict zeroeth_table_offset for ARM_64

2023-01-20 Thread Julien Grall
Hi, Title: For me "restrict" means that the code macro cannot be used if !ARM_64. But this is not the case here. On 20/01/2023 00:19, Stefano Stabellini wrote: On Tue, 17 Jan 2023, Ayan Kumar Halder wrote: zeroeth_table_offset is not accessed by ARM_32. I don't quite understand this senten

Re: [XEN v2 08/11] xen/arm: guest_walk: LPAE specific bits should be enclosed within "ifndef CONFIG_ARM_PA_32"

2023-01-20 Thread Julien Grall
Hi Stefano, On 19/01/2023 23:43, Stefano Stabellini wrote: On Tue, 17 Jan 2023, Ayan Kumar Halder wrote: In the subsequent patch, we introduce "CONFIG_ARM_PA_32" to support 32 bit physical addresses. Thus, the code specific to "Large Page Address Extension" (ie LPAE) should be enclosed within "

Re: [XEN v2 05/11] xen/arm: Use paddr_t instead of u64 for address/size

2023-01-20 Thread Julien Grall
Hi, On 17/01/2023 17:43, Ayan Kumar Halder wrote: One should now be able to use 'paddr_t' to represent address and size. Consequently, one should use 'PRIpaddr' as a format specifier for paddr_t. Signed-off-by: Ayan Kumar Halder --- Changes from - v1 - 1. Rebased the patch. xen/arch/arm/d

Re: [PATCH 3/3] xen/arm: Clean-up in p2m_init() and p2m_final_teardown()

2023-01-20 Thread Michal Orzel
Hi Henry, On 16/01/2023 02:58, Henry Wang wrote: > > > With the change in previous patch, the initial 16 pages in the P2M > pool is not necessary anymore. Drop them for code simplification. > > Also the call to p2m_teardown() from arch_domain_destroy() is not > necessary anymore since the movem

  1   2   >