Re: [XEN PATCH v2 3/3] automation/eclair: build docs/misra to address MISRA C:2012 Dir 4.1

2023-09-27 Thread Nicola Vetrini
On 27/09/2023 15:29, Nicola Vetrini wrote: On 27/09/2023 11:52, Nicola Vetrini wrote: The documentation pertaining Directive 4.1 is contained in docs/misra. The build script driving the analysis is amended to allow ECLAIR to analyze such file. Signed-off-by: Nicola Vetrini --- Changes in v2: -

Re: [XEN PATCH] x86/domain_page: address violations of MISRA C:2012 Rule 8.3

2023-09-27 Thread Jan Beulich
On 27.09.2023 17:09, Federico Serafini wrote: > Make function declarations and definitions consistent. > No functional change. > > Signed-off-by: Federico Serafini > --- > xen/arch/x86/domain_page.c | 36 ++-- > 1 file changed, 18 insertions(+), 18 deletions(-) >

[ovmf test] 183200: all pass - PUSHED

2023-09-27 Thread osstest service owner
flight 183200 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/183200/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf f36e1ec1f0a5fd3be84913e09181d7813444b620 baseline version: ovmf ad1c0394b1770315099e5

[xen-unstable-smoke test] 183197: tolerable all pass - PUSHED

2023-09-27 Thread osstest service owner
flight 183197 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/183197/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

[linux-5.4 test] 183192: regressions - FAIL

2023-09-27 Thread osstest service owner
flight 183192 linux-5.4 real [real] flight 183198 linux-5.4 real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/183192/ http://logs.test-lab.xenproject.org/osstest/logs/183198/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: t

Re: [XEN PATCH v2 1/3] docs/misra: add documentation skeleton for MISRA C:2012 Dir 4.1

2023-09-27 Thread Stefano Stabellini
On Wed, 27 Sep 2023, Nicola Vetrini wrote: > The aforementioned directive requires the project to supply documentation > on the measures taken towards the minimization of run-time failures. > > The actual content of the documentation still needs feedback from the > community. > > The 'rules.rst'

Re: [XEN PATCH v2 2/3] docs: make the docs for MISRA C:2012 Dir 4.1 visible to ECLAIR

2023-09-27 Thread Henry Wang
> On Sep 28, 2023, at 08:49, Stefano Stabellini wrote: > > On Wed, 27 Sep 2023, Nicola Vetrini wrote: >> To be able to check for the existence of the necessary subsections in >> the documentation for MISRA C:2012 Dir 4.1, ECLAIR needs to have a source >> file that is built. >> >> This file is

Re: [XEN PATCH v2 2/3] docs: make the docs for MISRA C:2012 Dir 4.1 visible to ECLAIR

2023-09-27 Thread Stefano Stabellini
On Wed, 27 Sep 2023, Nicola Vetrini wrote: > To be able to check for the existence of the necessary subsections in > the documentation for MISRA C:2012 Dir 4.1, ECLAIR needs to have a source > file that is built. > > This file is generated from 'C-runtime-failures.rst' in docs/misra > and the conf

Re: [PATCH v3] docs/misra: add rule 2.1 exceptions

2023-09-27 Thread Stefano Stabellini
On Wed, 27 Sep 2023, Bertrand Marquis wrote: > > On 27 Sep 2023, at 09:53, Nicola Vetrini wrote: > > > >>> > diff --git a/xen/arch/arm/psci.c b/xen/arch/arm/psci.c > >>> > index 695d2fa1f1..2a8527cacc 100644 > >>> > --- a/xen/arch/arm/psci.c > >>> > +++ b/xen/arch/arm/psci.c > >>> > @@ -59,6 +59,

Re: [PATCH] docs/misra: add rule 11.9

2023-09-27 Thread Henry Wang
Hi Stefano, > On Sep 28, 2023, at 08:22, Stefano Stabellini wrote: > > Hi Henry, since we are doing doc changes, would you also agree on this > one? > Yes, same as the last patch that I just release acked. Kind regards, Henry > > On Wed, 27 Sep 2023, Bertrand Marquis wrote: >> Hi Stefano,

Re: [PATCH] docs/misra: add rule 11.9

2023-09-27 Thread Stefano Stabellini
Hi Henry, since we are doing doc changes, would you also agree on this one? On Wed, 27 Sep 2023, Bertrand Marquis wrote: > Hi Stefano, > > > On 27 Sep 2023, at 03:05, Stefano Stabellini wrote: > > > > From: Stefano Stabellini > > > > Following up from the MISRA C group discussion, add Rule 1

Re: Xen 4.18 release: Reminder about code freeze

2023-09-27 Thread Stefano Stabellini
On Thu, 28 Sep 2023, Andrew Cooper wrote: > On 28/09/2023 12:04 am, Stefano Stabellini wrote: > > On Mon, 25 Sep 2023, Henry Wang wrote: > >> 3. dom0less vs xenstored setup race Was: xen | Failed pipeline for staging > >> | 6a47ba2f > >> > >> https://marc.info/?l=xen-devel&m=168312468808977 > >> >

Re: [PATCH v3] docs/misra: add 14.3

2023-09-27 Thread Henry Wang
Hi Stefano, > On Sep 28, 2023, at 07:53, Stefano Stabellini wrote: > > Actually adding Henry > > On Wed, 27 Sep 2023, Stefano Stabellini wrote: >> Hi Henry, >> >> This patch is now acked. Should it go in 4.18? Sure, a doc change should be harmless so: Release-acked-by: Henry Wang Kind rega

Re: [PATCH v3] docs/misra: add 14.3

2023-09-27 Thread Stefano Stabellini
Actually adding Henry On Wed, 27 Sep 2023, Stefano Stabellini wrote: > Hi Henry, > > This patch is now acked. Should it go in 4.18? > > In terms of risk of breaking, it is zero as nothing builds or runs based > on this document. > > At the same time, the benefit is also low because the main val

Re: [PATCH v3] docs/misra: add 14.3

2023-09-27 Thread Stefano Stabellini
Hi Henry, This patch is now acked. Should it go in 4.18? In terms of risk of breaking, it is zero as nothing builds or runs based on this document. At the same time, the benefit is also low because the main value of this document is for future coding changes that would be too late now for 4.18.

Re: Xen 4.18 release: Reminder about code freeze

2023-09-27 Thread Andrew Cooper
On 28/09/2023 12:04 am, Stefano Stabellini wrote: > On Mon, 25 Sep 2023, Henry Wang wrote: >> 3. dom0less vs xenstored setup race Was: xen | Failed pipeline for staging | >> 6a47ba2f >> >> https://marc.info/?l=xen-devel&m=168312468808977 >> >> https://marc.info/?l=xen-devel&m=168312687610283 > For

Re: [PATCH v3] SUPPORT: downgrade Physical CPU Hotplug to Experimental

2023-09-27 Thread Henry Wang
Hi Stefano, > On Sep 28, 2023, at 07:20, Stefano Stabellini wrote: > > From: Stefano Stabellini > > The feature is not commonly used, and we don't have hardware to test it, > not in OSSTest, not in Gitlab, and not even ad-hoc manually by community > members. We could use QEMU to test it, but e

[PATCH v3] SUPPORT: downgrade Physical CPU Hotplug to Experimental

2023-09-27 Thread Stefano Stabellini
From: Stefano Stabellini The feature is not commonly used, and we don't have hardware to test it, not in OSSTest, not in Gitlab, and not even ad-hoc manually by community members. We could use QEMU to test it, but even that it is known not to work. Also take the opportunity to rename the feature

Re: Xen 4.18 release: Reminder about code freeze

2023-09-27 Thread Stefano Stabellini
On Mon, 25 Sep 2023, Henry Wang wrote: > 3. dom0less vs xenstored setup race Was: xen | Failed pipeline for staging | > 6a47ba2f > > https://marc.info/?l=xen-devel&m=168312468808977 > > https://marc.info/?l=xen-devel&m=168312687610283 For this issue I suggest to go with this fix unless someone

[linux-linus test] 183189: tolerable FAIL - PUSHED

2023-09-27 Thread osstest service owner
flight 183189 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/183189/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 183181 test-amd64-amd64-xl-qemut-win7-amd64

Re: [PATCH v9 08/16] vpci/header: handle p2m range sets per BAR

2023-09-27 Thread Stewart Hildebrand
On 8/29/23 19:19, Volodymyr Babchuk wrote: > diff --git a/xen/drivers/vpci/header.c b/xen/drivers/vpci/header.c > index e96d7b2b37..3cc6a96849 100644 > --- a/xen/drivers/vpci/header.c > +++ b/xen/drivers/vpci/header.c > @@ -161,63 +161,101 @@ static void modify_decoding(const struct pci_dev > *pde

Re: [PATCH v9 15/16] xen/arm: vpci: check guest range

2023-09-27 Thread Stewart Hildebrand
On 9/26/23 11:48, Roger Pau Monné wrote: > On Tue, Sep 26, 2023 at 11:27:48AM -0400, Stewart Hildebrand wrote: >> On 9/26/23 04:07, Roger Pau Monné wrote: >>> On Mon, Sep 25, 2023 at 05:49:00PM -0400, Stewart Hildebrand wrote: On 9/22/23 04:44, Roger Pau Monné wrote: > On Tue, Aug 29, 2023

[libvirt test] 183188: tolerable FAIL - PUSHED

2023-09-27 Thread osstest service owner
flight 183188 libvirt real [real] flight 183195 libvirt real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/183188/ http://logs.test-lab.xenproject.org/osstest/logs/183195/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-lib

Re: [PATCH v4 0/29] block: Make blkdev_get_by_*() return handle

2023-09-27 Thread Christian Brauner
On Wed, 27 Sep 2023 11:34:07 +0200, Jan Kara wrote: > Create struct bdev_handle that contains all parameters that need to be > passed to blkdev_put() and provide bdev_open_* functions that return > this structure instead of plain bdev pointer. This will eventually allow > us to pass one more argume

Re: [PATCH v3 7/8] x86: introduce GADDR based secondary time area registration alternative

2023-09-27 Thread Jan Beulich
On 27.09.2023 17:50, Roger Pau Monné wrote: > On Wed, May 03, 2023 at 05:58:01PM +0200, Jan Beulich wrote: >> The registration by virtual/linear address has downsides: The access is >> expensive for HVM/PVH domains. Furthermore for 64-bit PV domains the area >> is inaccessible (and hence cannot be

Re: [XEN PATCH v2 2/3] docs: make the docs for MISRA C:2012 Dir 4.1 visible to ECLAIR

2023-09-27 Thread Anthony PERARD
On Wed, Sep 27, 2023 at 11:52:31AM +0200, Nicola Vetrini wrote: > To be able to check for the existence of the necessary subsections in > the documentation for MISRA C:2012 Dir 4.1, ECLAIR needs to have a source > file that is built. > > This file is generated from 'C-runtime-failures.rst' in docs

Re: [PATCH v3 7/8] x86: introduce GADDR based secondary time area registration alternative

2023-09-27 Thread Roger Pau Monné
On Wed, May 03, 2023 at 05:58:01PM +0200, Jan Beulich wrote: > The registration by virtual/linear address has downsides: The access is > expensive for HVM/PVH domains. Furthermore for 64-bit PV domains the area > is inaccessible (and hence cannot be updated by Xen) when in guest-user > mode. > > I

Re: [PATCH v3 6/8] domain: introduce GADDR based runstate area registration alternative

2023-09-27 Thread Jan Beulich
On 27.09.2023 17:24, Roger Pau Monné wrote: > On Wed, May 03, 2023 at 05:57:40PM +0200, Jan Beulich wrote: >> The registration by virtual/linear address has downsides: At least on >> x86 the access is expensive for HVM/PVH domains. Furthermore for 64-bit >> PV domains the area is inaccessible (and

Re: [PATCH v3 5/8] domain: map/unmap GADDR based shared guest areas

2023-09-27 Thread Jan Beulich
On 27.09.2023 16:53, Roger Pau Monné wrote: > On Wed, May 03, 2023 at 05:57:09PM +0200, Jan Beulich wrote: >> RFC: In map_guest_area() I'm not checking the P2M type, instead - just >> like map_vcpu_info() - solely relying on the type ref acquisition. >> Checking for p2m_ram_rw alone would

Re: [PATCH v3 6/8] domain: introduce GADDR based runstate area registration alternative

2023-09-27 Thread Roger Pau Monné
On Wed, May 03, 2023 at 05:57:40PM +0200, Jan Beulich wrote: > The registration by virtual/linear address has downsides: At least on > x86 the access is expensive for HVM/PVH domains. Furthermore for 64-bit > PV domains the area is inaccessible (and hence cannot be updated by Xen) > when in guest-u

Re: [PATCH v3 4/8] x86/mem-sharing: copy GADDR based shared guest areas

2023-09-27 Thread Jan Beulich
On 27.09.2023 16:05, Roger Pau Monné wrote: > On Wed, Sep 27, 2023 at 02:06:47PM +0200, Jan Beulich wrote: >> On 27.09.2023 13:08, Roger Pau Monné wrote: >>> On Wed, May 03, 2023 at 05:56:46PM +0200, Jan Beulich wrote: --- a/xen/arch/x86/mm/mem_sharing.c +++ b/xen/arch/x86/mm/mem_sharing.

[XEN PATCH] x86/domain_page: address violations of MISRA C:2012 Rule 8.3

2023-09-27 Thread Federico Serafini
Make function declarations and definitions consistent. No functional change. Signed-off-by: Federico Serafini --- xen/arch/x86/domain_page.c | 36 ++-- 1 file changed, 18 insertions(+), 18 deletions(-) diff --git a/xen/arch/x86/domain_page.c b/xen/arch/x86/domain

Re: [PATCH v3 5/8] domain: map/unmap GADDR based shared guest areas

2023-09-27 Thread Roger Pau Monné
On Wed, May 03, 2023 at 05:57:09PM +0200, Jan Beulich wrote: > The registration by virtual/linear address has downsides: At least on > x86 the access is expensive for HVM/PVH domains. Furthermore for 64-bit > PV domains the areas are inaccessible (and hence cannot be updated by > Xen) when in guest

Re: [PATCH v11 05/37] x86/trapnr: Add event type macros to

2023-09-27 Thread H. Peter Anvin
On September 26, 2023 1:10:51 AM PDT, Nikolay Borisov wrote: > > >On 23.09.23 г. 12:41 ч., Xin Li wrote: >> Intel VT-x classifies events into eight different types, which is >> inherited by FRED for event identification. As such, event type >> becomes a common x86 concept, and should be defined i

[xen-unstable test] 183185: tolerable FAIL - PUSHED

2023-09-27 Thread osstest service owner
flight 183185 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/183185/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 183175 test-amd64-i386-xl-qemuu-win7-amd64

Re: [PATCH v2] SUPPORT: downgrade Physical CPU Hotplug to Experimental

2023-09-27 Thread George Dunlap
On Wed, Sep 27, 2023 at 1:29 AM Stefano Stabellini wrote: > > From: Stefano Stabellini > > The feature is not commonly used, and we don't have hardware to test it, > not in OSSTest, not in Gitlab, and not even ad-hoc manually by community > members. We could use QEMU to test it, but even that it

[xen-unstable-smoke test] 183193: tolerable all pass - PUSHED

2023-09-27 Thread osstest service owner
flight 183193 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/183193/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [PATCH v4 0/29] block: Make blkdev_get_by_*() return handle

2023-09-27 Thread Jens Axboe
On Wed, Sep 27, 2023 at 3:34?AM Jan Kara wrote: > > Hello, > > this is a v3 of the patch series which implements the idea of > blkdev_get_by_*() v4? > calls returning bdev_handle which is then passed to blkdev_put() [1]. This > makes the get and put calls for bdevs more obviously matching and a

Re: [PATCH v3 4/8] x86/mem-sharing: copy GADDR based shared guest areas

2023-09-27 Thread Roger Pau Monné
On Wed, Sep 27, 2023 at 02:06:47PM +0200, Jan Beulich wrote: > On 27.09.2023 13:08, Roger Pau Monné wrote: > > On Wed, May 03, 2023 at 05:56:46PM +0200, Jan Beulich wrote: > >> In preparation of the introduction of new vCPU operations allowing to > >> register the respective areas (one of the two i

[PATCH v2 0/5] Fine granular configuration

2023-09-27 Thread Luca Fancellu
This serie aims to add more modularity to some feature that can be excluded without issues from the build. The first patch is already reviewed. v2 update: So I've tried to see how to put the dom0less code in the common code, but the amount of modifications are not trivial, even putting only the c

[PATCH v2 4/5] xen/arm: Move static memory build code in separate modules

2023-09-27 Thread Luca Fancellu
Move static memory and static shared memory code in separate modules so that they are included only when the corresponding feature is enabled, doing that we modularise the features and we remove some ifdefs from the code to improve readability. Move process_shm_node function from bootfdt module an

[PATCH v2 2/5] xen/arm: Add asm/domain.h include to kernel.h

2023-09-27 Thread Luca Fancellu
The 'enum domain_type' is defined by 'asm/domain.h' which is not included (directly or indirectly) by 'asm/kernel.h'. This currently doesn't break the compilation because asm/domain.h will included by the user of 'kernel.h'. But it would be better to avoid relying on it. So add the include in 'asm

[PATCH v2 5/5] arm/dom0less: introduce Kconfig for dom0less feature

2023-09-27 Thread Luca Fancellu
Introduce a Kconfig for the dom0less feature, enabled by default, to be able to choose if the feature should be compiled or not. Provide static inline stubs when the option is disabled for the functions externally visible. Use the new Kconfig to remove dom0less DT binding from the efi-boot.h code

[PATCH v2 1/5] arm/gicv2: make GICv2 driver and vGICv2 optional

2023-09-27 Thread Luca Fancellu
Introduce Kconfig GICV2 to be able to compile the GICv2 driver only when needed, the option is active by default. Introduce Kconfig VGICV2 that compiles the Generic Interrupt Controller v2 emulation for domains, it is required only when using GICv2 driver, otherwise using the GICv3 driver it is op

[PATCH v2 3/5] arm/dom0less: put dom0less feature code in a separate module

2023-09-27 Thread Luca Fancellu
Currently the dom0less feature code is mostly inside domain_build.c and setup.c, it is a feature that may not be useful to everyone so put the code in a different compilation module in order to make it easier to disable the feature in the future. Move gic_interrupt_t in domain_build.h to use it wi

Re: [PATCH v3 4/8] x86/mem-sharing: copy GADDR based shared guest areas

2023-09-27 Thread Roger Pau Monné
On Wed, Sep 27, 2023 at 07:43:26AM -0400, Tamas K Lengyel wrote: > On Wed, Sep 27, 2023 at 7:08 AM Roger Pau Monné wrote: > > > > On Wed, May 03, 2023 at 05:56:46PM +0200, Jan Beulich wrote: > > > In preparation of the introduction of new vCPU operations allowing to > > > register the respective a

Re: [XEN PATCH v2 3/3] automation/eclair: build docs/misra to address MISRA C:2012 Dir 4.1

2023-09-27 Thread Nicola Vetrini
On 27/09/2023 11:52, Nicola Vetrini wrote: The documentation pertaining Directive 4.1 is contained in docs/misra. The build script driving the analysis is amended to allow ECLAIR to analyze such file. Signed-off-by: Nicola Vetrini --- Changes in v2: - removed useless make flags --- automation/

Re: Xen on AWS EC2 Graviton 2 metal instances (c6g.metal)

2023-09-27 Thread Julien Grall
Hi Dan, Thanks for the report. On 26/09/2023 20:41, Driscoll, Dan wrote: First off - sorry for the very long email, but there are a lot of details related to this topic and I figured more details might be better than less but I could be wrong here Within Siemens Embedded,

Re: [PATCH] xen/arm: Skip memory nodes if not enabled

2023-09-27 Thread Michal Orzel
Hi Julien, On 27/09/2023 13:01, Julien Grall wrote: > > > Hi Michal, > > On 26/09/2023 09:36, Michal Orzel wrote: >> On 26/09/2023 07:33, Leo Yan wrote: >>> >>> >>> During the Linux kernel booting, an error is reported by the Xen >>> hypervisor: >>> >>>(XEN) arch/arm/p2m.c:2202: d0v0: Faili

Re: [PATCH v3 4/8] x86/mem-sharing: copy GADDR based shared guest areas

2023-09-27 Thread Jan Beulich
On 27.09.2023 13:08, Roger Pau Monné wrote: > On Wed, May 03, 2023 at 05:56:46PM +0200, Jan Beulich wrote: >> In preparation of the introduction of new vCPU operations allowing to >> register the respective areas (one of the two is x86-specific) by >> guest-physical address, add the necessary fork

Re: [PATCH v3 1/8] domain: GADDR based shared guest area registration alternative - teardown

2023-09-27 Thread Jan Beulich
On 27.09.2023 12:50, Roger Pau Monné wrote: > On Wed, Sep 27, 2023 at 12:46:07PM +0200, Jan Beulich wrote: >> On 27.09.2023 12:42, Roger Pau Monné wrote: >>> On Wed, Sep 27, 2023 at 11:55:19AM +0200, Jan Beulich wrote: On 27.09.2023 10:51, Roger Pau Monné wrote: > On Wed, May 03, 2023 at 0

Re: [PATCH v3] docs/misra: add rule 2.1 exceptions

2023-09-27 Thread Luca Fancellu
> On 27 Sep 2023, at 09:35, Bertrand Marquis wrote: > > Hi Jan, > >> On 27 Sep 2023, at 10:23, Jan Beulich wrote: >> >> On 27.09.2023 10:14, Bertrand Marquis wrote: On 27 Sep 2023, at 09:53, Nicola Vetrini wrote: My opinion is that it's far easier for this to be an eclair co

Re: [PATCH v3 4/8] x86/mem-sharing: copy GADDR based shared guest areas

2023-09-27 Thread Roger Pau Monné
On Wed, May 03, 2023 at 05:56:46PM +0200, Jan Beulich wrote: > In preparation of the introduction of new vCPU operations allowing to > register the respective areas (one of the two is x86-specific) by > guest-physical address, add the necessary fork handling (with the > backing function yet to be f

Re: [PATCH] xen/arm: Skip memory nodes if not enabled

2023-09-27 Thread Julien Grall
Hi Michal, On 26/09/2023 09:36, Michal Orzel wrote: On 26/09/2023 07:33, Leo Yan wrote: During the Linux kernel booting, an error is reported by the Xen hypervisor: (XEN) arch/arm/p2m.c:2202: d0v0: Failing to acquire the MFN 0x1a02dc The kernel attempts to use an invalid memory frame num

Re: [PATCH v3 1/8] domain: GADDR based shared guest area registration alternative - teardown

2023-09-27 Thread Roger Pau Monné
On Wed, Sep 27, 2023 at 12:46:07PM +0200, Jan Beulich wrote: > On 27.09.2023 12:42, Roger Pau Monné wrote: > > On Wed, Sep 27, 2023 at 11:55:19AM +0200, Jan Beulich wrote: > >> On 27.09.2023 10:51, Roger Pau Monné wrote: > >>> On Wed, May 03, 2023 at 05:54:47PM +0200, Jan Beulich wrote: > +{ >

Re: [PATCH] xen/arm: Skip memory nodes if not enabled

2023-09-27 Thread Julien Grall
Hi Leo, Adding some comments on top of what already said. On 26/09/2023 06:33, Leo Yan wrote: +static bool __init memory_node_is_available(const void *fdt, unsigned long node) +{ +const char *status = fdt_getprop(fdt, node, "status", NULL); + +if (!status) +return true; + We

Re: [PATCH v3 1/8] domain: GADDR based shared guest area registration alternative - teardown

2023-09-27 Thread Jan Beulich
On 27.09.2023 12:42, Roger Pau Monné wrote: > On Wed, Sep 27, 2023 at 11:55:19AM +0200, Jan Beulich wrote: >> On 27.09.2023 10:51, Roger Pau Monné wrote: >>> On Wed, May 03, 2023 at 05:54:47PM +0200, Jan Beulich wrote: >>> I guess we should also zap the runstate handlers, or else we might >>> corru

[PATCH v3 for-4.18?] x86: support data operand independent timing mode

2023-09-27 Thread Jan Beulich
[1] specifies a long list of instructions which are intended to exhibit timing behavior independent of the data they operate on. On certain hardware this independence is optional, controlled by a bit in a new MSR. Provide a command line option to control the mode Xen and its guests are to operate i

Re: [PATCH v3 1/8] domain: GADDR based shared guest area registration alternative - teardown

2023-09-27 Thread Roger Pau Monné
On Wed, Sep 27, 2023 at 11:55:19AM +0200, Jan Beulich wrote: > On 27.09.2023 10:51, Roger Pau Monné wrote: > > On Wed, May 03, 2023 at 05:54:47PM +0200, Jan Beulich wrote: > > I guess we should also zap the runstate handlers, or else we might > > corrupt guest state. > > So you think the guest mig

Re: [for-4.18] [PATCH v2] ARM: GICv3 ITS: flush caches for newly allocated ITT

2023-09-27 Thread Julien Grall
On 25/09/2023 23:19, Henry Wang wrote: Hi Julien, Hi Henry, Yes, I was about to ask the same question but somehow forgot it. This is a quite low risk patch and I think it is fine to have this in 4.18, so if the "Fixes” tag can be added on commit, please also add: Release-acked-by: Henry

Re: [PATCH v3] xen-pciback: Consider INTx disabled when MSI/MSI-X is enabled

2023-09-27 Thread Marek Marczykowski-Górecki
On Fri, Nov 18, 2022 at 04:49:23PM +0100, Marek Marczykowski-Górecki wrote: > Linux enables MSI-X before disabling INTx, but keeps MSI-X masked until > the table is filled. Then it disables INTx just before clearing MASKALL > bit. Currently this approach is rejected by xen-pciback. > According to t

Re: [PATCH v3 2/8] domain: update GADDR based runstate guest area

2023-09-27 Thread Jan Beulich
On 27.09.2023 11:44, Roger Pau Monné wrote: > On Wed, May 03, 2023 at 05:55:11PM +0200, Jan Beulich wrote: >> Before adding a new vCPU operation to register the runstate area by >> guest-physical address, add code to actually keep such areas up-to-date. >> >> Note that updating of the area will be

Re: [PATCH v3 3/8] x86: update GADDR based secondary time area

2023-09-27 Thread Roger Pau Monné
On Wed, May 03, 2023 at 05:55:52PM +0200, Jan Beulich wrote: > Before adding a new vCPU operation to register the secondary time area > by guest-physical address, add code to actually keep such areas up-to- > date. > > Note that pages aren't marked dirty when written to (matching the > handling of

changing Dom0 data during smc call inside of xen during cache coloring

2023-09-27 Thread Oleg Nikitenko
Hello, It is necessary to change some structure contents from xen. I have access to the registers. One of them keeps the physical address of the structure. But this physical address is valid for Dom0 only. Dom0 kernel gets it by the call dma_alloc_coherent A lower mentioned scheme does not work.

Re: [XEN PATCH v2 0/3] docs/misra: add documentation skeleton to address MISRA C:2012 Dir 4.1

2023-09-27 Thread Henry Wang
Hi Nicola, > On Sep 27, 2023, at 17:52, Nicola Vetrini wrote: > > The headline of Directive 4.1 states: "Run-time failures shall be minimized". > Thus, it requires the project to supply documentation that pertains the > measures > and techinques used to prevent run-time failures from happening.

Re: [PATCH v3 1/8] domain: GADDR based shared guest area registration alternative - teardown

2023-09-27 Thread Jan Beulich
On 27.09.2023 10:51, Roger Pau Monné wrote: > On Wed, May 03, 2023 at 05:54:47PM +0200, Jan Beulich wrote: >> In preparation of the introduction of new vCPU operations allowing to >> register the respective areas (one of the two is x86-specific) by >> guest-physical address, add the necessary domai

[XEN PATCH v2 2/3] docs: make the docs for MISRA C:2012 Dir 4.1 visible to ECLAIR

2023-09-27 Thread Nicola Vetrini
To be able to check for the existence of the necessary subsections in the documentation for MISRA C:2012 Dir 4.1, ECLAIR needs to have a source file that is built. This file is generated from 'C-runtime-failures.rst' in docs/misra and the configuration is updated accordingly. Signed-off-by: Nicol

[XEN PATCH v2 1/3] docs/misra: add documentation skeleton for MISRA C:2012 Dir 4.1

2023-09-27 Thread Nicola Vetrini
The aforementioned directive requires the project to supply documentation on the measures taken towards the minimization of run-time failures. The actual content of the documentation still needs feedback from the community. The 'rules.rst' file is updated accordingly to mention the newly added do

[XEN PATCH v2 0/3] docs/misra: add documentation skeleton to address MISRA C:2012 Dir 4.1

2023-09-27 Thread Nicola Vetrini
The headline of Directive 4.1 states: "Run-time failures shall be minimized". Thus, it requires the project to supply documentation that pertains the measures and techinques used to prevent run-time failures from happening. For ease of reading, the documentation is in RST format, but since ECLAIR n

[XEN PATCH v2 3/3] automation/eclair: build docs/misra to address MISRA C:2012 Dir 4.1

2023-09-27 Thread Nicola Vetrini
The documentation pertaining Directive 4.1 is contained in docs/misra. The build script driving the analysis is amended to allow ECLAIR to analyze such file. Signed-off-by: Nicola Vetrini --- Changes in v2: - removed useless make flags --- automation/eclair_analysis/build.sh | 6 +++--- automa

Re: [PATCH v3 2/8] domain: update GADDR based runstate guest area

2023-09-27 Thread Roger Pau Monné
On Wed, May 03, 2023 at 05:55:11PM +0200, Jan Beulich wrote: > Before adding a new vCPU operation to register the runstate area by > guest-physical address, add code to actually keep such areas up-to-date. > > Note that updating of the area will be done exclusively following the > model enabled by

Re: [PATCH] net/xen-netback: Break build if netback slots > max_skbs + 1

2023-09-27 Thread Paul Durrant
On 27/09/2023 09:29, David Kahurani wrote: If XEN_NETBK_LEGACY_SLOTS_MAX and MAX_SKB_FRAGS have a difference of more than 1, with MAX_SKB_FRAGS being the lesser value, it opens up a path for null-dereference. It was also noted that some distributions were modifying upstream behaviour in that dire

[ovmf test] 183190: all pass - PUSHED

2023-09-27 Thread osstest service owner
flight 183190 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/183190/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf ad1c0394b1770315099e511de7c88a04d7af76f2 baseline version: ovmf be971fc302cbef8f47e26

[PATCH 07/29] xen/blkback: Convert to bdev_open_by_dev()

2023-09-27 Thread Jan Kara
Convert xen/blkback to use bdev_open_by_dev() and pass the handle around. CC: xen-devel@lists.xenproject.org Acked-by: Christoph Hellwig Acked-by: Christian Brauner Signed-off-by: Jan Kara --- drivers/block/xen-blkback/blkback.c | 4 +-- drivers/block/xen-blkback/common.h | 4 +-- drivers/b

Re: [PATCH v3 1/8] domain: GADDR based shared guest area registration alternative - teardown

2023-09-27 Thread Roger Pau Monné
On Wed, May 03, 2023 at 05:54:47PM +0200, Jan Beulich wrote: > In preparation of the introduction of new vCPU operations allowing to > register the respective areas (one of the two is x86-specific) by > guest-physical address, add the necessary domain cleanup hooks. > > Signed-off-by: Jan Beulich

[linux-5.4 test] 183183: regressions - FAIL

2023-09-27 Thread osstest service owner
flight 183183 linux-5.4 real [real] flight 183191 linux-5.4 real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/183183/ http://logs.test-lab.xenproject.org/osstest/logs/183191/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: t

Re: [XEN PATCH] x86/mem_access: address violations of MISRA C:2012 Rule 8.3

2023-09-27 Thread Henry Wang
Hi Federico, > On Sep 27, 2023, at 16:41, Federico Serafini > wrote: > > Make function declarations and definitions consistent. > No functional change. > > Signed-off-by: Federico Serafini This looks like a harmless change so with proper review: Release-acked-by: Henry Wang Kind regards,

[XEN PATCH] x86/mem_access: address violations of MISRA C:2012 Rule 8.3

2023-09-27 Thread Federico Serafini
Make function declarations and definitions consistent. No functional change. Signed-off-by: Federico Serafini --- xen/arch/x86/include/asm/mem_access.h | 2 +- xen/arch/x86/mm/mem_access.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/xen/arch/x86/include/asm/

Re: [PATCH v3] docs/misra: add rule 2.1 exceptions

2023-09-27 Thread Bertrand Marquis
Hi Jan, > On 27 Sep 2023, at 10:23, Jan Beulich wrote: > > On 27.09.2023 10:14, Bertrand Marquis wrote: >>> On 27 Sep 2023, at 09:53, Nicola Vetrini wrote: >>> My opinion is that it's far easier for this to be an eclair configuration >>> (which has the >>> advantage not to depend on the exact

[PATCH] net/xen-netback: Break build if netback slots > max_skbs + 1

2023-09-27 Thread David Kahurani
If XEN_NETBK_LEGACY_SLOTS_MAX and MAX_SKB_FRAGS have a difference of more than 1, with MAX_SKB_FRAGS being the lesser value, it opens up a path for null-dereference. It was also noted that some distributions were modifying upstream behaviour in that direction which necessitates this patch. Signed-

Re: [PATCH v3] docs/misra: add rule 2.1 exceptions

2023-09-27 Thread Jan Beulich
On 27.09.2023 10:14, Bertrand Marquis wrote: >> On 27 Sep 2023, at 09:53, Nicola Vetrini wrote: >> My opinion is that it's far easier for this to be an eclair configuration >> (which has the >> advantage not to depend on the exact definition of unreachable) and then >> perhaps a comment >> above

Re: [PATCH v2] x86/shutdown: change default reboot method preference

2023-09-27 Thread Jan Beulich
On 15.09.2023 09:43, Roger Pau Monne wrote: > The current logic to chose the preferred reboot method is based on the mode > Xen > has been booted into, so if the box is booted from UEFI, the preferred reboot > method will be to use the ResetSystem() run time service call. > > However, that method

Re: [PATCH] docs/misra: add rule 11.9

2023-09-27 Thread Bertrand Marquis
Hi Stefano, > On 27 Sep 2023, at 03:05, Stefano Stabellini wrote: > > From: Stefano Stabellini > > Following up from the MISRA C group discussion, add Rule 11.9 to > docs/misra/rules.rst. > > Signed-off-by: Stefano Stabellini I agree with Jan on dropping the "integer" word here. With that

Re: [PATCH v3] docs/misra: add rule 2.1 exceptions

2023-09-27 Thread Bertrand Marquis
Hi, > On 27 Sep 2023, at 09:53, Nicola Vetrini wrote: > >>> > diff --git a/xen/arch/arm/psci.c b/xen/arch/arm/psci.c >>> > index 695d2fa1f1..2a8527cacc 100644 >>> > --- a/xen/arch/arm/psci.c >>> > +++ b/xen/arch/arm/psci.c >>> > @@ -59,6 +59,7 @@ void call_psci_cpu_off(void) >>> > } >>> >

Re: [PATCH v3] docs/misra: add 14.3

2023-09-27 Thread Bertrand Marquis
Hi Stefano, > On 8 Sep 2023, at 22:27, Stefano Stabellini wrote: > > From: Stefano Stabellini > > Add 14.3, with project-wide deviations. > > Also take the opportunity to clarify that parameters of function pointer > types are expected to have names (Rule 8.2). > > Signed-off-by: Stefano Sta

Re: [PATCH v3] docs/misra: add rule 2.1 exceptions

2023-09-27 Thread Nicola Vetrini
> diff --git a/xen/arch/arm/psci.c b/xen/arch/arm/psci.c > index 695d2fa1f1..2a8527cacc 100644 > --- a/xen/arch/arm/psci.c > +++ b/xen/arch/arm/psci.c > @@ -59,6 +59,7 @@ void call_psci_cpu_off(void) > } > } > +/* SAF-2-safe */ I think any use of SAF-2-safe should be accompanied with an

Re: [PATCH v3] docs/misra: add 14.3

2023-09-27 Thread Jan Beulich
On 08.09.2023 22:27, Stefano Stabellini wrote: > From: Stefano Stabellini > > Add 14.3, with project-wide deviations. > > Also take the opportunity to clarify that parameters of function pointer > types are expected to have names (Rule 8.2). > > Signed-off-by: Stefano Stabellini I'm not overl

Re: [PATCH v3 2/2] xen/common: Add NUMA node id bounds check to page_alloc.c/node_to_scrub

2023-09-27 Thread Jan Beulich
On 27.09.2023 08:32, Jan Beulich wrote: > On 27.09.2023 00:37, Shawn Anastasio wrote: >> --- a/xen/common/page_alloc.c >> +++ b/xen/common/page_alloc.c >> @@ -1211,6 +1211,14 @@ static unsigned int node_to_scrub(bool get_node) >> } while ( !cpumask_empty(&node_to_cpumask(node)) && >>