flight 184997 linux-linus real [real]
flight 184999 linux-linus real-retest [real]
http://logs.test-lab.xenproject.org/osstest/logs/184997/
http://logs.test-lab.xenproject.org/osstest/logs/184999/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-
Hi Jan,
On 3/12/2024 1:07 AM, Jan Beulich wrote:
I'm afraid the title doesn't really say what the patch actually means
to achieve.
On 08.03.2024 02:54, Henry Wang wrote:
Previous commits enable the toolstack to get the domain memory map,
therefore instead of hardcoding the guest magic pages re
Hi Michal,
On 3/11/2024 9:46 PM, Michal Orzel wrote:
Hi Henry,
diff --git a/xen/arch/arm/dom0less-build.c b/xen/arch/arm/dom0less-build.c
index 1e1c8d83ae..99447bfb0c 100644
--- a/xen/arch/arm/dom0less-build.c
+++ b/xen/arch/arm/dom0less-build.c
@@ -682,6 +682,49 @@ static int __init prepare_dt
Hi Jan,
On 3/12/2024 12:58 AM, Jan Beulich wrote:
On 08.03.2024 02:54, Henry Wang wrote:
--- a/xen/include/public/domctl.h
+++ b/xen/include/public/domctl.h
@@ -946,6 +946,25 @@ struct xen_domctl_paging_mempool {
uint64_aligned_t size; /* Size in bytes. */
};
+#define XEN_MAX_MEM_REG
Hi,
The key used to sign release tarballs and git tags still uses SHA1 for
its self-signature. Is updated key somewhere already?
SHA1 is starting to be rejected by some tools already, for example
sequoia-sq:
$ sq inspect xen.pub
xen.pub: OpenPGP Certificate.
Fingerprint: 23E
Hi,
https://xenproject.org/xen-project-archives/ doesn't include 4.17.3.
--
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
signature.asc
Description: PGP signature
flight 184996 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184996/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemuu-win7-amd64 19 guest-stop fail blocked in 184927
test-amd64-amd64-xl-qemut-win7-amd64
The IOMMU driver checks if RMRR/IVMD are marked as reserved in memory
map. This should be true for addresses coming from the firmware, but
when extra pages used by Xen itself are included in the mapping, those
are taken from usable RAM used. Mark those pages as reserved too.
Not marking the pages
On 2024-03-11 12:53, Jan Beulich wrote:
On 06.03.2024 19:50, Jason Andryuk wrote:
--- a/xen/arch/x86/hvm/dom0_build.c
+++ b/xen/arch/x86/hvm/dom0_build.c
@@ -537,6 +537,109 @@ static paddr_t __init find_memory(
return INVALID_PADDR;
}
+static bool __init check_load_address(
+cons
Hi Henry,
On 3/7/24 7:54 PM, Henry Wang wrote:
> Currently direct mapped domain is only supported by the Arm
> architecture at the domain creation time by setting the CDF_directmap
> flag. There is not a need for every non-Arm architecture, i.e. x86,
> RISC-V and PPC, to define a stub is_domain_di
flight 184992 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184992/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-livepatch 13 livepatch-runfail REGR. vs. 184927
test-amd64-i386-li
On Wed, Mar 06, 2024 at 11:47:41AM +, Anthony PERARD wrote:
> linux-4.19 branch in xenbits is outdated, it haven't been updated and
> tested since 2020 as it has been disabled in osstest. Also, this 4.19
> branch doesn't build on Bookworm.
>
> So we will start to use a newer version of Linux.
On Wed, Mar 06, 2024 at 11:47:41AM +, Anthony PERARD wrote:
> linux-4.19 branch in xenbits is outdated, it haven't been updated and
> tested since 2020 as it has been disabled in osstest. Also, this 4.19
> branch doesn't build on Bookworm.
>
> So we will start to use a newer version of Linux.
I'm afraid the title doesn't really say what the patch actually means
to achieve.
On 08.03.2024 02:54, Henry Wang wrote:
> Previous commits enable the toolstack to get the domain memory map,
> therefore instead of hardcoding the guest magic pages region, use
> the XEN_DOMCTL_get_mem_map domctl to
On 08.03.2024 02:54, Henry Wang wrote:
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -946,6 +946,25 @@ struct xen_domctl_paging_mempool {
> uint64_aligned_t size; /* Size in bytes. */
> };
>
> +#define XEN_MAX_MEM_REGIONS 1
> +
> +struct xen_mem_region {
> +
On 06.03.2024 19:50, Jason Andryuk wrote:
> --- a/xen/arch/x86/hvm/dom0_build.c
> +++ b/xen/arch/x86/hvm/dom0_build.c
> @@ -537,6 +537,109 @@ static paddr_t __init find_memory(
> return INVALID_PADDR;
> }
>
> +static bool __init check_load_address(
> +const struct domain *d, const struc
flight 184995 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184995/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 11.03.2024 16:48, Nicola Vetrini wrote:
> On 2024-03-11 08:32, Jan Beulich wrote:
>> On 08.03.2024 09:10, Nicola Vetrini wrote:
>>> --- a/docs/misra/safe.json
>>> +++ b/docs/misra/safe.json
>>> @@ -28,6 +28,14 @@
>>> },
>>> {
>>> "id": "SAF-3-safe",
>>> +
On Tue, Jan 4, 2022 at 10:58 AM Jan Beulich wrote:
> When not holding the PoD lock across the entire region covering P2M
> update and stats update, the entry count should indicate too large a
> value in preference to a too small one, to avoid functions bailing early
> when they find the count is
On 2024-03-11 08:32, Jan Beulich wrote:
On 08.03.2024 09:10, Nicola Vetrini wrote:
Rule 20.4 states: "A macro shall not be defined with the same name
as a keyword".
Defining this macro with the same name as the inline keyword
allows for additionally checking that out-of-lined static inline
func
On 11/03/24 14:56, Jan Beulich wrote:
On 11.03.2024 13:00, Simone Ballarin wrote:
On 11/03/24 11:08, Jan Beulich wrote:
On 11.03.2024 09:59, Simone Ballarin wrote:
--- a/xen/arch/arm/include/asm/hypercall.h
+++ b/xen/arch/arm/include/asm/hypercall.h
@@ -1,3 +1,4 @@
+/* SAF-5-safe direct inclus
On 11.03.2024 13:07, Simone Ballarin wrote:
> On 11/03/24 11:10, Jan Beulich wrote:
>> On 11.03.2024 09:59, Simone Ballarin wrote:
>>> --- a/xen/arch/arm/efi/efi-boot.h
>>> +++ b/xen/arch/arm/efi/efi-boot.h
>>> @@ -3,6 +3,10 @@
>>>* is intended to be included by common/efi/boot.c _only_, and
>>
On 11.03.2024 13:00, Simone Ballarin wrote:
> On 11/03/24 11:08, Jan Beulich wrote:
>> On 11.03.2024 09:59, Simone Ballarin wrote:
>>> --- a/xen/arch/arm/include/asm/hypercall.h
>>> +++ b/xen/arch/arm/include/asm/hypercall.h
>>> @@ -1,3 +1,4 @@
>>> +/* SAF-5-safe direct inclusion guard before */
>>
On 11/03/2024 14:46, Michal Orzel wrote:
>
>
> Hi Henry,
>
> On 08/03/2024 02:54, Henry Wang wrote:
>> For 1:1 direct-mapped dom0less DomUs, the magic pages should not clash
>> with any RAM region. To find a proper region for guest magic pages,
>> we can reuse the logic of finding domain exte
Hi Henry,
On 08/03/2024 02:54, Henry Wang wrote:
> For 1:1 direct-mapped dom0less DomUs, the magic pages should not clash
> with any RAM region. To find a proper region for guest magic pages,
> we can reuse the logic of finding domain extended regions.
>
> Extract the logic of finding domain exte
flight 184991 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184991/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 184987
test-amd64-amd64-xl-qemut-win7-amd64
On 11.03.2024 12:41, Simone Ballarin wrote:
> On 11/03/24 10:59, Jan Beulich wrote:
>> On 11.03.2024 09:59, Simone Ballarin wrote:
>>> The Xen sources contain violations of MISRA C:2012 Directive 4.10 whose
>>> headline states:
>>> "Precautions shall be taken in order to prevent the contents of a
While sev and sev_es bits are not yet enabled in xen,
including their status in the VMCB dump could be
informational.Therefore, print it via svmdebug.
Signed-off-by: Vaishali Thakkar
---
Changes since v1:
- Pretty printing
---
xen/arch/x86/hvm/svm/svmdebug.c | 7 +--
1 file changed,
The suffix is redundant for np/sev/sev-es bits. Drop it
to avoid adding extra code volume. While we're here, drop
the double negations in one of the instances of _np bit
and replace 0/1 with false/true in the use cases of _np.
Suggested-by: Andrew Cooper
Signed-off-by: Vaishali Thakkar
Reviewed-
The suffix _guest is redundant for asid bit. Drop it
to avoid adding extra code volume.
Suggested-by: Andrew Cooper
Signed-off-by: Vaishali Thakkar
---
Changes since v1:
- This patch wasn't part of v1. It's been added to
address Andrew's suggestion.
---
xen/arch/x86/hvm/svm/as
Hi,
In this patchset, first & second patch removes the unnecessary
suffix from a bunch of vmcb bits. Third patch is about printing
the status of sev and sev-es bits while dumping VMCB.
Changes since v1:
- Address comments from Andrew and Jan
- Add extrapatch to drop the suffix _guest as per
On 09/03/2024 06:44, Henry Wang wrote:
Hi Julien,
Hi Julien/Henry,
On 3/9/2024 6:30 AM, Julien Grall wrote:
(+ Ayan + Henry)
(- my old email address + the new one)
Hi Carlo,
On 29/01/2024 17:18, Carlo Nonato wrote:
Cache coloring must physically relocate Xen in order to color the
hype
flight 184993 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/184993/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
On 11/03/24 11:10, Jan Beulich wrote:
On 11.03.2024 09:59, Simone Ballarin wrote:
--- a/xen/arch/arm/efi/efi-boot.h
+++ b/xen/arch/arm/efi/efi-boot.h
@@ -3,6 +3,10 @@
* is intended to be included by common/efi/boot.c _only_, and
* therefore can define arch specific global variables.
*/
On 11/03/24 11:08, Jan Beulich wrote:
On 11.03.2024 09:59, Simone Ballarin wrote:
Add deviation comments to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
to prevent the contents of a header file being included more than
once").
Inclusion guards must app
Hi,
On 11/03/2024 11:32, George Dunlap wrote:
On Sat, Mar 9, 2024 at 1:59 AM Stefano Stabellini
wrote:
I would like to resurrect this thread and ask other opinions.
On Thu, 23 Nov 2023, Jan Beulich wrote:
On 22.11.2023 22:46, Stefano Stabellini wrote:
Two out of three do_multicall definit
On 11/03/24 10:59, Jan Beulich wrote:
On 11.03.2024 09:59, Simone Ballarin wrote:
The Xen sources contain violations of MISRA C:2012 Directive 4.10 whose
headline states:
"Precautions shall be taken in order to prevent the contents of a header file
being included more than once".
As stated in
On Sat, Mar 9, 2024 at 1:59 AM Stefano Stabellini
wrote:
>
> I would like to resurrect this thread and ask other opinions.
>
>
> On Thu, 23 Nov 2023, Jan Beulich wrote:
> > On 22.11.2023 22:46, Stefano Stabellini wrote:
> > > Two out of three do_multicall definitions/declarations use uint32_t as
>
On 11.03.2024 11:54, Roger Pau Monne wrote:
> The current logic to detect when to switch to the next L1 table is incorrectly
> using l2_table_offset() in order to notice when the last entry on the current
> L1 table has been reached.
>
> It should instead use l1_table_offset() to check whether the
On 11/03/2024 11:01, Andrew Cooper wrote:
> On 11/03/2024 10:54 am, Roger Pau Monne wrote:
>> The current logic to detect when to switch to the next L1 table is
>> incorrectly
>> using l2_table_offset() in order to notice when the last entry on the current
>> L1 table has been reached.
>>
>> It sh
On 11/03/2024 10:15 am, Jan Beulich wrote:
> On 11.03.2024 11:00, GitLab wrote:
>>
>> Pipeline #1208433952 has failed!
>>
>> Project: xen ( https://gitlab.com/xen-project/hardware/xen )
>> Branch: staging (
>> https://gitlab.com/xen-project/hardware/xen/-/commits/staging )
>>
>> Commit: e90089db (
On 11/03/2024 10:54 am, Roger Pau Monne wrote:
> The current logic to detect when to switch to the next L1 table is incorrectly
> using l2_table_offset() in order to notice when the last entry on the current
> L1 table has been reached.
>
> It should instead use l1_table_offset() to check whether t
On 11/03/2024 10:20 am, Jan Beulich wrote:
> On 11.03.2024 11:09, GitLab wrote:
>>
>> Pipeline #1208444169 has failed!
>>
>> Project: xen ( https://gitlab.com/xen-project/hardware/xen )
>> Branch: staging (
>> https://gitlab.com/xen-project/hardware/xen/-/commits/staging )
>>
>> Commit: 1396892d (
The current logic to detect when to switch to the next L1 table is incorrectly
using l2_table_offset() in order to notice when the last entry on the current
L1 table has been reached.
It should instead use l1_table_offset() to check whether the index has wrapped
to point to the first entry, and so
On 11/03/24 10:51, Jan Beulich wrote:
On 11.03.2024 10:02, Federico Serafini wrote:
On 11/03/24 08:40, Jan Beulich wrote:
On 08.03.2024 12:51, Federico Serafini wrote:
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -130,9 +130,12 @@ static bool virq_is_global(unsigned int
On 11.03.2024 11:09, GitLab wrote:
>
>
> Pipeline #1208444169 has failed!
>
> Project: xen ( https://gitlab.com/xen-project/hardware/xen )
> Branch: staging (
> https://gitlab.com/xen-project/hardware/xen/-/commits/staging )
>
> Commit: 1396892d (
> https://gitlab.com/xen-project/hardware/xen
On 11.03.2024 11:00, GitLab wrote:
>
>
> Pipeline #1208433952 has failed!
>
> Project: xen ( https://gitlab.com/xen-project/hardware/xen )
> Branch: staging (
> https://gitlab.com/xen-project/hardware/xen/-/commits/staging )
>
> Commit: e90089db (
> https://gitlab.com/xen-project/hardware/xen
On 11.03.2024 09:59, Simone Ballarin wrote:
> --- a/xen/arch/arm/efi/efi-boot.h
> +++ b/xen/arch/arm/efi/efi-boot.h
> @@ -3,6 +3,10 @@
> * is intended to be included by common/efi/boot.c _only_, and
> * therefore can define arch specific global variables.
> */
> +
> +#ifndef XEN_ARCH_ARM_EFI_
On 11.03.2024 09:59, Simone Ballarin wrote:
> Add deviation comments to address violations of
> MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
> to prevent the contents of a header file being included more than
> once").
>
> Inclusion guards must appear at the beginning of the h
On 11.03.2024 09:59, Simone Ballarin wrote:
> Some headers, under specific circumstances (documented in a comment at
> the beginning of the file), explicitly avoid inclusion guards: the caller
> is responsible for including them correctly.
>
> These files are not supposed to comply with Directive
On 11.03.2024 09:59, Simone Ballarin wrote:
> The Xen sources contain violations of MISRA C:2012 Directive 4.10 whose
> headline states:
> "Precautions shall be taken in order to prevent the contents of a header file
> being included more than once".
>
> As stated in v2, the following naming conv
On 11.03.2024 10:02, Federico Serafini wrote:
> On 11/03/24 08:40, Jan Beulich wrote:
>> On 08.03.2024 12:51, Federico Serafini wrote:
>>> --- a/xen/common/event_channel.c
>>> +++ b/xen/common/event_channel.c
>>> @@ -130,9 +130,12 @@ static bool virq_is_global(unsigned int virq)
>>>
>>> ca
Hi Michal,
On 3/11/2024 5:10 PM, Michal Orzel wrote:
Hi Henry,
diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 5e7a7f3e7e..54f3601ab0 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -696,6 +696,7 @@ int arch_domain_create(struct domain *d,
{
unsigned i
Hi Henry,
On 08/03/2024 02:54, Henry Wang wrote:
> There are some use cases where the toolstack needs to know the guest
> memory map. For example, the toolstack helper application
> "init-dom0less" needs to know the guest magic page regions for 1:1
> direct-mapped dom0less DomUs to allocate magic
On 11/03/24 08:40, Jan Beulich wrote:
On 08.03.2024 12:51, Federico Serafini wrote:
--- a/xen/common/event_channel.c
+++ b/xen/common/event_channel.c
@@ -130,9 +130,12 @@ static bool virq_is_global(unsigned int virq)
case VIRQ_ARCH_0 ... VIRQ_ARCH_7:
return arch_virq_is_globa
From: Maria Celeste Cesario
Add inclusion guard to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order to
prevent the contents of a header file being included more than once").
Mechanical change.
---
Commit introduced in v3
Signed-off-by: Maria Celeste Cesario
From: Maria Celeste Cesario
Modify creation rule for asm-offsets.h to conform to
the new standard and to not generate conflicting guards
between architectures (which is a violation of the directive).
Modify generic-y creation rule to generate code without violations
and to conform to the new stan
Amend inclusion guards to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
to prevent the contents of a header file being included more than
once").
Inclusion guards must appear at the beginning of the headers
(comments are permitted anywhere) and the #if dir
From: Maria Celeste Cesario
Add or modify inclusion guards to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order to
prevent the contents of a header file being included more than once").
Mechanical change.
---
Commit introduced in v3
Signed-off-by: Maria Cele
Add inclusion guards to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
to prevent the contents of a header file being included more than
once").
Mechanical change.
Signed-off-by: Simone Ballarin
Signed-off-by: Maria Celeste Cesario
---
Changes in v3:
-
Add deviation comments to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
to prevent the contents of a header file being included more than
once").
Inclusion guards must appear at the beginning of the headers
(comments are permitted anywhere).
This patch ad
Add or move inclusion guards to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
to prevent the contents of a header file being included more than
once").
Inclusion guards must appear at the beginning of the headers
(comments are permitted anywhere).
Mechani
This patch modifies deviations for Directive 4.10:
"Precautions shall be taken in order to prevent the contents of
a header file being included more than once"
This patch avoids the file-based deviation for empty headers, and
replaces it with a comment-based one using the format specified in
docs/
From: Maria Celeste Cesario
Edit inclusion guards to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order to
prevent the contents of a header file being included more than once").
Mechanical change.
---
Commit introduced in v3
Signed-off-by: Maria Celeste Ce
From: Maria Celeste Cesario
Add inclusion guard to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order to
prevent the contents of a header file being included more than once").
Mechanical change.
---
Commit introduced in v3
Signed-off-by: Maria Celeste Cesario
From: Maria Celeste Cesario
Add safe deviation for *.c files, as estabilished in past discussion.
Add SAF deviation for files that need an #include directive before guard.
Signed-off-by: Maria Celeste Cesario
Signed-off-by: Simone Ballarin
---
Commit introduced in v3
Link to the discussion
Amend generation script, add inclusion guards to address violations
of MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
to prevent the contents of a header file being included more than
once").
This patch amends the Makefile adding the required inclusion guards
for xlat.h.
Add de
Add inclusion guard to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
to prevent the contents of a header file being included more than
once").
Mechanical change.
Signed-off-by: Simone Ballarin
Signed-off-by: Maria Celeste Cesario
---
Changes in v3:
- r
Some headers, under specific circumstances (documented in a comment at
the beginning of the file), explicitly avoid inclusion guards: the caller
is responsible for including them correctly.
These files are not supposed to comply with Directive 4.10:
"Precautions shall be taken in order to prevent
The Xen sources contain violations of MISRA C:2012 Directive 4.10 whose
headline states:
"Precautions shall be taken in order to prevent the contents of a header file
being included more than once".
As stated in v2, the following naming convention has been estabilished:
- arch/.../include/asm/ he
Add inclusion guards to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
to prevent the contents of a header file being included more than
once").
Mechanical change.
Signed-off-by: Simone Ballarin
Signed-off-by: Maria Celeste Cesario
---
Changes in v3:
-
Add inclusion guard to address violations of
MISRA C:2012 Directive 4.10 ("Precautions shall be taken in order
to prevent the contents of a header file being included more than
once").
Mechanical change.
Signed-off-by: Simone Ballarin
Signed-off-by: Maria Celeste Cesario
---
Changes in v3:
-
Hi Julien,
On 3/8/24 15:04, Julien Grall wrote:
> Hi John,
>
> Thank you for the reply.
>
> On 08/03/2024 13:40, John Ernberg wrote:
>> On 3/7/24 00:07, Julien Grall wrote:
>>> > Ping on the watchdog discussion bits.
>>>
>>> Sorry for the late reply.
>>>
>>> On 06/03/2024 13:13, John Ernberg w
On 2024-03-11 08:48, Jan Beulich wrote:
On 08.03.2024 12:21, Nicola Vetrini wrote:
--- a/xen/include/xen/list.h
+++ b/xen/include/xen/list.h
@@ -479,9 +479,9 @@ static inline void list_splice_init(struct
list_head *list,
* @n: another &struct list_head to use as temporary storage
* @h
On 11.03.2024 03:18, Marek Marczykowski-Górecki wrote:
> On Thu, Feb 01, 2024 at 06:01:56PM +0100, Roger Pau Monne wrote:
>> The current code that parses the IVMD blocks is relaxed with regard to the
>> restriction that such unity regions should always fall into memory ranges
>> marked as reserved
On 09.03.2024 02:54, Stefano Stabellini wrote:
> On Fri, 8 Mar 2024, Nicola Vetrini wrote:
>> These constants are parenthesized to avoid them from
>> possibly influencing the semantics of the constructs where it is used,
>> especially inside macros invocations.
>>
>> This also resolves some violati
On 08.03.2024 12:21, Nicola Vetrini wrote:
> --- a/xen/include/xen/list.h
> +++ b/xen/include/xen/list.h
> @@ -479,9 +479,9 @@ static inline void list_splice_init(struct list_head
> *list,
> * @n: another &struct list_head to use as temporary storage
> * @head: the head for your list.
>
On 08.03.2024 12:51, Federico Serafini wrote:
> --- a/xen/common/event_channel.c
> +++ b/xen/common/event_channel.c
> @@ -130,9 +130,12 @@ static bool virq_is_global(unsigned int virq)
>
> case VIRQ_ARCH_0 ... VIRQ_ARCH_7:
> return arch_virq_is_global(virq);
> +
> +default:
> +
On 08.03.2024 09:10, Nicola Vetrini wrote:
> Rule 20.4 states: "A macro shall not be defined with the same name
> as a keyword".
>
> Defining this macro with the same name as the inline keyword
> allows for additionally checking that out-of-lined static inline
> functions end up in the correct sec
79 matches
Mail list logo