Re: [PATCH 4/4] GPL License Boilerplate: Switch from HTTP to HTTPS

2023-02-08 Thread Jan Beulich
On 08.02.2023 20:19, Demi Marie Obenour wrote: > On Wed, Feb 08, 2023 at 08:26:37AM +, Julien Grall wrote: >> On 08/02/2023 07:40, Jan Beulich wrote: >>> On 08.02.2023 05:51, Demi Marie Obenour wrote: --- a/xen/drivers/passthrough/pci.c +++ b/xen/drivers/passthrough/pci.c @@ -11,

Re: [XEN v3 3/9] xen/drivers: ns16550: Use paddr_t for io_base/io_size

2023-02-08 Thread Jan Beulich
On 08.02.2023 18:07, Ayan Kumar Halder wrote: > Hi Jan, > > On 08/02/2023 13:52, Jan Beulich wrote: >> On 08.02.2023 13:05, Ayan Kumar Halder wrote: >>> @@ -1166,8 +1166,9 @@ static const struct ns16550_config __initconst >>> uart_config[] = >>> static int __init >>> pci_uart_config(struct ns

Re: [XEN v3 2/9] xen/arm: Typecast the DT values into paddr_t

2023-02-08 Thread Jan Beulich
On 08.02.2023 16:51, Ayan Kumar Halder wrote: > On 08/02/2023 13:33, Jan Beulich wrote: >> On 08.02.2023 13:05, Ayan Kumar Halder wrote: >>> In future, we wish to support 32 bit physical address. >>> However, the current dt and fdt functions can only read u64 values. >>> We wish to make the DT func

[PATCH v2 4/8] x86/xen: set MTRR state when running as Xen PV initial domain

2023-02-08 Thread Juergen Gross
When running as Xen PV initial domain (aka dom0), MTRRs are disabled by the hypervisor, but the system should nevertheless use correct cache memory types. This has always kind of worked, as disabled MTRRs resulted in disabled PAT, too, so that the kernel avoided code paths resulting in inconsistenc

[PATCH v2 0/8] x86/mtrr: fix handling with PAT but without MTRR

2023-02-08 Thread Juergen Gross
This series tries to fix the rather special case of PAT being available without having MTRRs (either due to CONFIG_MTRR being not set, or because the feature has been disabled e.g. by a hypervisor). The main use cases are Xen PV guests and SEV-SNP guests running under Hyper-V. Instead of trying t

Re: [PATCH] xen/grant-dma-iommu: Implement a dummy probe_device() callback

2023-02-08 Thread Viresh Kumar
On 08-02-23, 17:36, Oleksandr Tyshchenko wrote: > From: Oleksandr Tyshchenko > > Update stub IOMMU driver (which main purpose is to reuse generic > IOMMU device-tree bindings by Xen grant DMA-mapping layer on Arm) > according to the recent changes done in the following > commit 57365a04c921 ("iom

[ovmf test] 176694: all pass - PUSHED

2023-02-08 Thread osstest service owner
flight 176694 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/176694/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf f6ce1a5cd8932844ec24701d158254ccf75b6159 baseline version: ovmf b59e6fdae2545b45c36c8

[libvirt test] 176598: tolerable trouble: pass/starved - PUSHED

2023-02-08 Thread osstest service owner
flight 176598 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/176598/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt-xsm 15 migrate-support-checkfail never pass test-amd64-amd64-libvirt 15 migrate-s

[xen-unstable test] 176591: tolerable trouble: fail/pass/starved - PUSHED

2023-02-08 Thread osstest service owner
flight 176591 xen-unstable real [real] flight 176689 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/176591/ http://logs.test-lab.xenproject.org/osstest/logs/176689/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd6

Re: [PATCH v10 1/2] xen/riscv: introduce early_printk basic stuff

2023-02-08 Thread Alistair Francis
On Tue, Feb 7, 2023 at 10:49 PM Oleksii Kurochko wrote: > > Because printk() relies on a serial driver (like the ns16550 driver) > and drivers require working virtual memory (ioremap()) there is not > print functionality early in Xen boot. > > The patch introduces the basic stuff of early_printk f

Re: [PATCH v3 07/14] xen/riscv: introduce exception context

2023-02-08 Thread Alistair Francis
On Wed, Feb 8, 2023 at 12:47 AM Oleksii Kurochko wrote: > > The patch introduces a set of registers which should be saved to and > restored from a stack after an exception occurs and a set of defines > which will be used during exception context saving/restoring. > > Originally header was introdu

Re: [PATCH v3 13/14] xen/riscv: test basic handling stuff

2023-02-08 Thread Alistair Francis
On Wed, Feb 8, 2023 at 12:47 AM Oleksii Kurochko wrote: > > Signed-off-by: Oleksii Kurochko Acked-by: Alistair Francis Alistair > --- > Changes in V3: > - Nothing changed > --- > Changes in V2: > - Nothing changed > --- > xen/arch/riscv/setup.c | 16 > 1 file changed, 16

Re: [PATCH v3 14/14] automation: modify RISC-V smoke test

2023-02-08 Thread Alistair Francis
On Wed, Feb 8, 2023 at 12:47 AM Oleksii Kurochko wrote: > > The patch modifies the grep pattern to reflect the usage of WARN. > > Signed-off-by: Oleksii Kurochko Reviewed-by: Alistair Francis Alistair > --- > Changes in V3: > - Update commit message > --- > Changes in V2: > - Leave only the

Re: [PATCH v3 04/14] xen/riscv: add header

2023-02-08 Thread Alistair Francis
On Wed, Feb 8, 2023 at 12:47 AM Oleksii Kurochko wrote: > > The following changes were made in comparison with from > Linux: > * remove all defines as they are defined in riscv_encoding.h > * leave only csr_* macros > > Origin: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.gi

Re: [PATCH v3 02/14] xen/riscv: add header

2023-02-08 Thread Alistair Francis
On Wed, Feb 8, 2023 at 12:47 AM Oleksii Kurochko wrote: > > Signed-off-by: Oleksii Kurochko Reviewed-by: Alistair Francis Alistair > --- > Changes in V3: > - Nothing changed > --- > Changes in V2: > - Nothing changed > --- > xen/arch/riscv/include/asm/asm.h | 54 +

[ovmf test] 176670: all pass - PUSHED

2023-02-08 Thread osstest service owner
flight 176670 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/176670/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf b59e6fdae2545b45c36c8c5373f4b858fb83c8cd baseline version: ovmf 5db84c85c3544b92fa236

Re: [PATCH v2 4/4] GPL License Boilerplate: Switch from HTTP to HTTPS

2023-02-08 Thread Demi Marie Obenour
On Wed, Feb 08, 2023 at 02:58:38PM -0800, Stefano Stabellini wrote: > On Wed, 8 Feb 2023, Demi Marie Obenour wrote: > > Obtaining code over an insecure transport is a terrible idea for > > blatently obvious reasons. Even for non-executable data, insecure > > transports are considered deprecated. >

Re: [PATCH v3 14/14] automation: modify RISC-V smoke test

2023-02-08 Thread Stefano Stabellini
On Tue, 7 Feb 2023, Oleksii Kurochko wrote: > The patch modifies the grep pattern to reflect the usage of WARN. > > Signed-off-by: Oleksii Kurochko Acked-by: Stefano Stabellini > --- > Changes in V3: > - Update commit message > --- > Changes in V2: > - Leave only the latest "grep ..." > ---

[PATCH v2 3/4] Miscellaneous and documentation: Only use TLS-protected transports

2023-02-08 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. This patch changes miscellaneous links that are not used by any automated tool. Some of these links are dead anyway. Signed-of

[PATCH v2 2/4] Automation and CI: Replace git:// and http:// with https://

2023-02-08 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. This patch enforces the use of secure transports in automation and CI. Signed-off-by: Demi Marie Obenour --- README

[PATCH v2 1/4] Build system: Replace git:// and http:// with https://

2023-02-08 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. This patch enforces the use of secure transports in the build system. Signed-off-by: Demi Marie Obenour --- Config.mk

[PATCH v2 0/4] Stop using insecure transports

2023-02-08 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. Demi Marie Obenour (4): Build system: Replace git:// and http:// with https:// Automation and CI: Replace git:// and http://

[linux-linus test] 176498: tolerable trouble: fail/pass/starved - PUSHED

2023-02-08 Thread osstest service owner
flight 176498 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/176498/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 176434 test-amd64-amd64-xl-qemuu-win7-amd64

Re: [PATCH 4/4] GPL License Boilerplate: Switch from HTTP to HTTPS

2023-02-08 Thread Demi Marie Obenour
On Wed, Feb 08, 2023 at 08:26:37AM +, Julien Grall wrote: > Hi, > > On 08/02/2023 07:40, Jan Beulich wrote: > > On 08.02.2023 05:51, Demi Marie Obenour wrote: > > > --- a/xen/drivers/passthrough/pci.c > > > +++ b/xen/drivers/passthrough/pci.c > > > @@ -11,7 +11,7 @@ > > >* more details. >

Re: [XEN PATCH] tools: Have flex and bison mandatory

2023-02-08 Thread Elliott Mitchell
On Wed, Feb 08, 2023 at 09:02:35AM +0100, Jan Beulich wrote: > On 07.02.2023 19:02, Anthony PERARD wrote: > > > > I think the issue that Andrew saw in the CI with "libxlu_cfg_y.o" > > failing to build while "libxlu_cfg_l.[ch]" are been regenerated is > > probably because make doesn't consider "lib

[PATCH] create-diff-object: Handle missing secsym for debug sections

2023-02-08 Thread Ross Lagerwall
Certain debug sections like ".debug_aranges" when built with GCC 11.2.1 are missing section symbols (presumably because they're not needed). Instead, of segfaulting, simply don't include them if they're missing. Signed-off-by: Ross Lagerwall --- create-diff-object.c | 2 +- 1 file changed, 1 ins

Re: [PATCH v1 1/4] common.h: Flush stdout before writing to stderr

2023-02-08 Thread Ross Lagerwall
> From: Xen-devel on behalf of Mihails > Strasuns > Sent: Thursday, January 19, 2023 10:13 AM > To: xen-devel@lists.xenproject.org > Cc: mstra...@amazon.com ; Michael Kurth > Subject: [PATCH v1 1/4] common.h: Flush stdout before writing to stderr >   > Flush existing debug messages before wri

[PATCH] build: Make FILE symbol paths consistent

2023-02-08 Thread Ross Lagerwall
The FILE symbols in out-of-tree builds may be either a relative path to the object dir or an absolute path depending on how the build is invoked. Fix the paths for C files so that they are consistent with in-tree builds - the path is relative to the "xen" directory (e.g. common/irq.c). This fixes

Re: [XEN v3 3/9] xen/drivers: ns16550: Use paddr_t for io_base/io_size

2023-02-08 Thread Ayan Kumar Halder
Hi Jan, On 08/02/2023 13:52, Jan Beulich wrote: On 08.02.2023 13:05, Ayan Kumar Halder wrote: @@ -1166,8 +1166,9 @@ static const struct ns16550_config __initconst uart_config[] = static int __init pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx) { -u64 orig_ba

[linux-5.4 test] 176460: regressions - trouble: broken/fail/pass/starved

2023-02-08 Thread osstest service owner
flight 176460 linux-5.4 real [real] http://logs.test-lab.xenproject.org/osstest/logs/176460/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-pairbroken build-arm64-pvops 6 kernel-build

[XEN PATCH v6.1 5/5] tools: Rework $(xenlibs-ldlibs, ) to provide library flags only.

2023-02-08 Thread Anthony PERARD
LDLIBS is usually only the library flags (that is the `-l` flags), as proposed in GNU make manual, while LDFLAGS would be extra flags such as `-L`. Rework the make macro $(xenlibs-ldlibs, ) to only provide the library flags. $(xenlibs-ldflags, ) already only provide the extra flags like the -rpath

Re: [XEN v3 2/9] xen/arm: Typecast the DT values into paddr_t

2023-02-08 Thread Ayan Kumar Halder
Hi Jan, On 08/02/2023 13:33, Jan Beulich wrote: On 08.02.2023 13:05, Ayan Kumar Halder wrote: In future, we wish to support 32 bit physical address. However, the current dt and fdt functions can only read u64 values. We wish to make the DT functions read u64 as well u32 values (depending on the

[xen-unstable-smoke test] 176640: tolerable trouble: pass/starved - PUSHED

2023-02-08 Thread osstest service owner
flight 176640 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/176640/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[PATCH] xen/grant-dma-iommu: Implement a dummy probe_device() callback

2023-02-08 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko Update stub IOMMU driver (which main purpose is to reuse generic IOMMU device-tree bindings by Xen grant DMA-mapping layer on Arm) according to the recent changes done in the following commit 57365a04c921 ("iommu: Move bus setup to IOMMU device registration"). With pro

Re: [XEN PATCH for-4.17 v6 5/5] tools: Rework $(xenlibs-ldlibs, ) to provide library flags only.

2023-02-08 Thread Juergen Gross
On 08.02.23 16:10, Anthony PERARD wrote: On Wed, Feb 08, 2023 at 08:48:33AM +0100, Juergen Gross wrote: On 20.01.23 20:44, Anthony PERARD wrote: LDLIBS is usually only the library flags (that is the `-l` flags), as proposed in GNU make manual, while LDFLAGS would be extra flags such as `-L`. R

Re: [XEN PATCH for-4.17 v6 5/5] tools: Rework $(xenlibs-ldlibs, ) to provide library flags only.

2023-02-08 Thread Anthony PERARD
On Wed, Feb 08, 2023 at 08:48:33AM +0100, Juergen Gross wrote: > On 20.01.23 20:44, Anthony PERARD wrote: > > LDLIBS is usually only the library flags (that is the `-l` flags), as > > proposed in GNU make manual, while LDFLAGS would be extra flags such > > as `-L`. > > > > Rework the make macro $(

[PATCH v3 4/4] x86/shadow: re-work 4-level SHADOW_FOREACH_L2E()

2023-02-08 Thread Jan Beulich
First of all move the almost loop-invariant condition out of the loop; transform it into an altered loop boundary, noting that the updating of _gl2p is relevant only at one use site, and then also only inside the _code blob it provides. Then drop the shadow_mode_external() part of the condition as

[PATCH] x86/p2m: tighten old-MFN check in p2m_add_page()

2023-02-08 Thread Jan Beulich
Just ahead of the logic in question we've translated the subject MFN to a valid original GFN, in order to then translate that GFN back to an MFN. Restricting the call to p2m_remove_page() to the case where these two MFNs match is too weak. Instead refuse the operation altogether when there's a mism

[PATCH v3 3/4] x86/shadow: rename hash_domain_foreach()

2023-02-08 Thread Jan Beulich
The "domain" in there has become meaningless; drop it. Signed-off-by: Jan Beulich Acked-by: Andrew Cooper --- a/xen/arch/x86/mm/shadow/common.c +++ b/xen/arch/x86/mm/shadow/common.c @@ -1680,15 +1680,15 @@ bool shadow_hash_delete(struct domain *d return true; } -typedef int (*hash_domai

[PATCH v3 2/4] x86/shadow: drop hash_vcpu_foreach()

2023-02-08 Thread Jan Beulich
The domain based variant is easily usable by shadow_audit_tables(); all that's needed is conversion of the callback functions. Signed-off-by: Jan Beulich Acked-by: Andrew Cooper --- v3: Re-base. --- a/xen/arch/x86/mm/shadow/common.c +++ b/xen/arch/x86/mm/shadow/common.c @@ -1680,59 +1680,11 @@

[PATCH v3 1/4] x86/shadow: replace sh_reset_l3_up_pointers()

2023-02-08 Thread Jan Beulich
Rather than doing a separate hash walk (and then even using the vCPU variant, which is to go away), do the up-pointer-clearing right in sh_unpin(), as an alternative to the (now further limited) enlisting on a "free floating" list fragment. This utilizes the fact that such list fragments are traver

[PATCH v3 0/4] x86/shadow: misc tidying

2023-02-08 Thread Jan Beulich
... or so I hope. The main observation was that we still have both hash_vcpu_for_each() and hash_domain_for_each(), where the latter was introduced in 2014/15 to replace the former. Only some eight years later we can now complete this conversion. Everything else addresses other things noticed along

Missing Libraries (.h) of xenstore, libxl and xenapi

2023-02-08 Thread El Mesdadi Youssef ESK UILD7
>Hello together, >im trying to write C code to monitor the CPU usage in and memory allocation in >a very short time (in microsecond / if possible also nano second). For this I >need to use the functions provided by the following libraries, libxl.h / >xenstore.h or the libraries provided by xen

Re: [PATCH v3 12/14] xen/riscv: introduce an implementation of macros from

2023-02-08 Thread Jan Beulich
On 08.02.2023 13:00, Oleksii wrote: > On Tue, 2023-02-07 at 16:07 +0100, Jan Beulich wrote: >> On 07.02.2023 15:46, Oleksii Kurochko wrote: >>> --- /dev/null >>> +++ b/xen/arch/riscv/include/asm/bug.h >>> @@ -0,0 +1,38 @@ >>> +/* SPDX-License-Identifier: GPL-2.0 */ >>> +/* >>> + * Copyright (C) 201

Re: [PATCH v2 2/2] xen/arm: Add support for booting gzip compressed uImages

2023-02-08 Thread Julien Grall
On 02/02/2023 11:36, Michal Orzel wrote: Hi Julien, Hi, On 02/02/2023 12:23, Julien Grall wrote: On 02/02/2023 11:12, Michal Orzel wrote: Hi Julien, Hi Michal, On 02/02/2023 12:01, Julien Grall wrote: Hi Michal, On 02/02/2023 08:49, Michal Orzel wrote: @@ -265,11 +284,14 @@ s

Re: [XEN v3 3/9] xen/drivers: ns16550: Use paddr_t for io_base/io_size

2023-02-08 Thread Jan Beulich
On 08.02.2023 13:05, Ayan Kumar Halder wrote: > @@ -1166,8 +1166,9 @@ static const struct ns16550_config __initconst > uart_config[] = > static int __init > pci_uart_config(struct ns16550 *uart, bool_t skip_amt, unsigned int idx) > { > -u64 orig_base = uart->io_base; > +paddr_t orig_bas

Re: [PATCH v3 12/14] xen/riscv: introduce an implementation of macros from

2023-02-08 Thread Julien Grall
Hi, On 08/02/2023 12:00, Oleksii wrote: On Tue, 2023-02-07 at 16:07 +0100, Jan Beulich wrote: On 07.02.2023 15:46, Oleksii Kurochko wrote: --- /dev/null +++ b/xen/arch/riscv/include/asm/bug.h @@ -0,0 +1,38 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* + * Copyright (C) 2012 Regents of the Uni

Re: [XEN v3 2/9] xen/arm: Typecast the DT values into paddr_t

2023-02-08 Thread Jan Beulich
On 08.02.2023 13:05, Ayan Kumar Halder wrote: > In future, we wish to support 32 bit physical address. > However, the current dt and fdt functions can only read u64 values. > We wish to make the DT functions read u64 as well u32 values (depending > on the width of physical address). Also, we wish t

[XEN v3 7/9] xen/arm: guest_walk: LPAE specific bits should be enclosed within "ifndef CONFIG_ARM_PA_32"

2023-02-08 Thread Ayan Kumar Halder
In the subsequent patch, we introduce "CONFIG_ARM_PA_32" to support 32 bit physical addresses. Thus, the code specific to "Large Physical Address Extension" (ie LPAE) should be enclosed within "ifndef CONFIG_ARM_PA_32". Refer xen/arch/arm/include/asm/short-desc.h, "short_desc_l1_supersec_t" unsign

[XEN v3 6/9] xen/arm: Introduce choice to enable 64/32 bit physical addressing

2023-02-08 Thread Ayan Kumar Halder
Some Arm based hardware platforms which does not support LPAE (eg Cortex-R52), uses 32 bit physical addresses. Also, users may choose to use 32 bits to represent physical addresses for optimization. To support the above use cases, we have introduced arch independent configs to choose if the physic

[XEN v3 9/9] xen/arm: p2m: Enable support for 32bit IPA

2023-02-08 Thread Ayan Kumar Halder
VTCR.T0SZ should be set as 0x20 to support 32bit IPA. Refer ARM DDI 0487I.a ID081822, G8-9824, G8.2.171, VTCR, "Virtualization Translation Control Register" for the bit descriptions. Signed-off-by: Ayan Kumar Halder Acked-by: Stefano Stabellini --- Changes from - v1 - New patch. v2 - 1. Added

[XEN v3 8/9] xen/arm: Restrict zeroeth_table_offset for ARM_64

2023-02-08 Thread Ayan Kumar Halder
When 32 bit physical addresses are used (ie ARM_PA_32=y), "va >> ZEROETH_SHIFT" causes an overflow. Also, there is no zeroeth level page table on Arm 32-bit. Also took the opportunity to clean up dump_pt_walk(). One could use DECLARE_OFFSETS() macro instead of declaring the declaring an array of p

[XEN v3 5/9] xen/arm: smmu: Use writeq_relaxed_non_atomic() for writing to SMMU_CBn_TTBR0

2023-02-08 Thread Ayan Kumar Halder
Refer ARM IHI 0062D.c ID070116 (SMMU 2.0 spec), 17-360, 17.3.9, SMMU_CBn_TTBR0 is a 64 bit register. Thus, one can use writeq_relaxed_non_atomic() to write to it instead of invoking writel_relaxed() twice for lower half and upper half of the register. This also helps us as p2maddr is 'paddr_t' (wh

[XEN v3 1/9] xen/ns16550: Remove unneeded truncation check in the DT init code

2023-02-08 Thread Ayan Kumar Halder
In an earlier commit (7c1de0038895), "ns16550.io_size" was u32 and "io_size" was u64. Thus, the ASSERT() was needed to check if the values are the same. However, in a later commit (c9f8e0aee507), "ns16550.io_size" was changed to u64. Thus, the ASSERT() became redundant. So, now as "io_size" and "u

[XEN v3 3/9] xen/drivers: ns16550: Use paddr_t for io_base/io_size

2023-02-08 Thread Ayan Kumar Halder
io_base and io_size represent physical addresses. So they should use paddr_t (instead of u64). However in future, paddr_t may be defined as u32. So when typecasting values from u64 to paddr_t, one should always check for any possible truncation. If any truncation is discovered, Xen needs to raise

[XEN v3 4/9] xen/arm: Introduce a wrapper for dt_device_get_address() to handle paddr_t

2023-02-08 Thread Ayan Kumar Halder
dt_device_get_address() can accept u64 only for address and size. However, the address/size denotes physical addresses. Thus, they should be represented by 'paddr_t'. Consequently, we introduce a wrapper for dt_device_get_address() ie dt_device_get_paddr() which accepts address/size as paddr_t and

[XEN v3 2/9] xen/arm: Typecast the DT values into paddr_t

2023-02-08 Thread Ayan Kumar Halder
In future, we wish to support 32 bit physical address. However, the current dt and fdt functions can only read u64 values. We wish to make the DT functions read u64 as well u32 values (depending on the width of physical address). Also, we wish to detect if any truncation has occurred (ie while read

[XEN v3 0/9] Add support for 32 bit physical address

2023-02-08 Thread Ayan Kumar Halder
Hi All, Please have a look at https://lists.xenproject.org/archives/html/xen-devel/2022-11/msg01465.html for the context. The benefits of using 32 bit physical addresses are as follows :- 1. It helps to use Xen on platforms (for eg R52) which supports 32 bit physical addresses and has no suppor

Re: [PATCH v3 12/14] xen/riscv: introduce an implementation of macros from

2023-02-08 Thread Oleksii
Hello Jan, Thanks for the comments! On Tue, 2023-02-07 at 16:07 +0100, Jan Beulich wrote: > On 07.02.2023 15:46, Oleksii Kurochko wrote: > > --- /dev/null > > +++ b/xen/arch/riscv/include/asm/bug.h > > @@ -0,0 +1,38 @@ > > +/* SPDX-License-Identifier: GPL-2.0 */ > > +/* > > + * Copyright (C) 2012

[xen-4.16-testing test] 176458: tolerable trouble: fail/pass/starved - PUSHED

2023-02-08 Thread osstest service owner
flight 176458 xen-4.16-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/176458/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemut-win7-amd64 19 guest-stop fail like 175454 test-amd64-amd64-xl-qemut-win7-a

[xen-unstable-smoke test] 176618: tolerable trouble: pass/starved - PUSHED

2023-02-08 Thread osstest service owner
flight 176618 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/176618/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-arm64-arm64-xl-xsm 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[xen-4.17-testing test] 176459: tolerable trouble: fail/pass/starved - PUSHED

2023-02-08 Thread osstest service owner
flight 176459 xen-4.17-testing real [real] flight 176621 xen-4.17-testing real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/176459/ http://logs.test-lab.xenproject.org/osstest/logs/176621/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): t

Re: [PATCH v3 1/2] xen/device_tree: fix Eclair findings for MISRA C 2012 Rule 20.7

2023-02-08 Thread Xenia Ragiadakou
On 2/8/23 10:38, Julien Grall wrote: On 07/02/2023 13:59, Xenia Ragiadakou wrote: Hi Julien, Hi Xenia, On 2/7/23 15:01, Julien Grall wrote: Hi, On 07/02/2023 12:46, Xenia Ragiadakou wrote: On 2/7/23 14:25, Julien Grall wrote: On 07/02/2023 10:46, Xenia Ragiadakou wrote: On 2/7/2

Re: [PATCH 0/4] Stop using insecure transports

2023-02-08 Thread Christian Lindig
> On 8 Feb 2023, at 04:51, Demi Marie Obenour > wrote: > > Obtaining code over an insecure transport is a terrible idea for > blatently obvious reasons. Even for non-executable data, insecure > transports are considered deprecated. > > Demi Marie Obenour (4): > Build system: Replace git://

Re: [PATCH v3 1/2] xen/device_tree: fix Eclair findings for MISRA C 2012 Rule 20.7

2023-02-08 Thread Julien Grall
On 07/02/2023 13:59, Xenia Ragiadakou wrote: Hi Julien, Hi Xenia, On 2/7/23 15:01, Julien Grall wrote: Hi, On 07/02/2023 12:46, Xenia Ragiadakou wrote: On 2/7/23 14:25, Julien Grall wrote: On 07/02/2023 10:46, Xenia Ragiadakou wrote: On 2/7/23 12:39, Julien Grall wrote: Hi, On 0

Re: [PATCH 4/4] GPL License Boilerplate: Switch from HTTP to HTTPS

2023-02-08 Thread Julien Grall
Hi, On 08/02/2023 07:40, Jan Beulich wrote: On 08.02.2023 05:51, Demi Marie Obenour wrote: --- a/xen/drivers/passthrough/pci.c +++ b/xen/drivers/passthrough/pci.c @@ -11,7 +11,7 @@ * more details. * * You should have received a copy of the GNU General Public License along with - * thi

Re: [XEN PATCH] tools: Have flex and bison mandatory

2023-02-08 Thread Jan Beulich
On 07.02.2023 19:02, Anthony PERARD wrote: > On Tue, Feb 07, 2023 at 06:03:12PM +0100, Jan Beulich wrote: >> On 07.02.2023 17:09, Anthony PERARD wrote: >>> Both are already mandatory to build the hypervisor. >> >> I'm not sure this is sufficient as a justification. From all we can >> tell even pret