[xen-unstable test] 178355: tolerable trouble: fail/pass/starved

2023-02-24 Thread osstest service owner
flight 178355 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/178355/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-xl-shadow 7 xen-install fail in 178260 pass in 178355 test-amd64-i386-xl-vhd 21

[linux-linus test] 178320: regressions - trouble: fail/pass/starved

2023-02-24 Thread osstest service owner
flight 178320 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/178320/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-ws16-amd64 8 xen-boot fail REGR. vs. 178042

Re: [PATCH v3 00/14] x86/hvm: {svm,vmx} {c,h} cleanup

2023-02-24 Thread Xenia Ragiadakou
On 2/24/23 23:33, Andrew Cooper wrote: On 24/02/2023 8:08 pm, Xenia Ragiadakou wrote: On 2/24/23 21:29, Andrew Cooper wrote: On 24/02/2023 6:49 pm, Xenia Ragiadakou wrote: There are more detailed per-patch changesets. Xenia Ragiadakou (14):    x86/svm: move declarations used only by svm

[xen-unstable-smoke test] 178391: tolerable trouble: pass/starved - PUSHED

2023-02-24 Thread osstest service owner
flight 178391 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/178391/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: [PATCH v4 2/3] Build system: Replace git:// and http:// with https://

2023-02-24 Thread Demi Marie Obenour
On Tue, Feb 21, 2023 at 11:07:58AM +0100, Jan Beulich wrote: > On 19.02.2023 03:46, Demi Marie Obenour wrote: > > --- a/stubdom/configure > > +++ b/stubdom/configure > > @@ -3535,7 +3535,7 @@ if test "x$ZLIB_URL" = "x"; then : > > if test "x$extfiles" = "xy"; then : > >

[libvirt test] 178315: tolerable trouble: fail/pass/starved - PUSHED

2023-02-24 Thread osstest service owner
flight 178315 libvirt real [real] flight 178389 libvirt real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/178315/ http://logs.test-lab.xenproject.org/osstest/logs/178389/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking):

Re: [PATCH v3 00/14] x86/hvm: {svm,vmx} {c,h} cleanup

2023-02-24 Thread Andrew Cooper
On 24/02/2023 8:08 pm, Xenia Ragiadakou wrote: > > On 2/24/23 21:29, Andrew Cooper wrote: >> On 24/02/2023 6:49 pm, Xenia Ragiadakou wrote: >>> There are more detailed per-patch changesets. >>> >>> Xenia Ragiadakou (14): >>>    x86/svm: move declarations used only by svm code from svm.h to >>>

[PATCH v3 05.5/14] x86/svm: Decouple types in struct nestedsvm

2023-02-24 Thread Andrew Cooper
struct nestedvm uses mostly plain integer types, except for virt_ext_t which is a union wrapping two bitfield names. But the nested virt logic only ever deals with it as full opaque register. Switch it to being a plain uint64_t, allowing us to hide even more of the SVM internal infrastructure.

Re: [PATCH v3 05/12] x86/xen: set MTRR state when running as Xen PV initial domain

2023-02-24 Thread Boris Ostrovsky
On 2/23/23 4:32 AM, Juergen Gross wrote: + + for (reg = 0; reg < MTRR_MAX_VAR_RANGES; reg++) { + op.u.read_memtype.reg = reg; + if (HYPERVISOR_platform_op()) + break; If we fail on the first iteration, do we still want to mark MTRRs are

Re: [PATCH v3 05/14] x86/svm: move nestedsvm declarations used only by svm code to private header

2023-02-24 Thread Andrew Cooper
On 24/02/2023 8:28 pm, Xenia Ragiadakou wrote: > > On 2/24/23 22:12, Andrew Cooper wrote: >> On 24/02/2023 6:50 pm, Xenia Ragiadakou wrote: >>> diff --git a/xen/arch/x86/hvm/svm/nestedhvm.h >>> b/xen/arch/x86/hvm/svm/nestedhvm.h >>> new file mode 100644 >>> index 00..43245e13de >>> ---

Re: [PATCH v3 05/14] x86/svm: move nestedsvm declarations used only by svm code to private header

2023-02-24 Thread Xenia Ragiadakou
On 2/24/23 22:12, Andrew Cooper wrote: On 24/02/2023 6:50 pm, Xenia Ragiadakou wrote: diff --git a/xen/arch/x86/hvm/svm/nestedhvm.h b/xen/arch/x86/hvm/svm/nestedhvm.h new file mode 100644 index 00..43245e13de --- /dev/null +++ b/xen/arch/x86/hvm/svm/nestedhvm.h @@ -0,0 +1,77 @@ +/*

[xen-unstable-smoke test] 178376: tolerable trouble: pass/starved - PUSHED

2023-02-24 Thread osstest service owner
flight 178376 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/178376/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm

Re: [PATCH v3 05/14] x86/svm: move nestedsvm declarations used only by svm code to private header

2023-02-24 Thread Andrew Cooper
On 24/02/2023 6:50 pm, Xenia Ragiadakou wrote: > diff --git a/xen/arch/x86/hvm/svm/nestedhvm.h > b/xen/arch/x86/hvm/svm/nestedhvm.h > new file mode 100644 > index 00..43245e13de > --- /dev/null > +++ b/xen/arch/x86/hvm/svm/nestedhvm.h > @@ -0,0 +1,77 @@ > +/* SPDX-License-Identifier:

Re: [PATCH v3 00/14] x86/hvm: {svm,vmx} {c,h} cleanup

2023-02-24 Thread Xenia Ragiadakou
On 2/24/23 21:29, Andrew Cooper wrote: On 24/02/2023 6:49 pm, Xenia Ragiadakou wrote: There are more detailed per-patch changesets. Xenia Ragiadakou (14): x86/svm: move declarations used only by svm code from svm.h to private header x86/svm: make asid.h private x86/svm: delete

Re: [PATCH v3 04/14 - ALT] x86/svm: Remove the asm/hvm/svm/emulate.h header

2023-02-24 Thread Xenia Ragiadakou
On 2/24/23 21:58, Andrew Cooper wrote: These days, this is just two length helpers. Move into the private svm.h No functional change intended. Signed-off-by: Andrew Cooper Reviewed-by: Xenia Ragiadakou -- Xenia

Re: [PATCH v3 02/14 - ALT] x86/svm: Remove the asm/hvm/svm/asid.h header

2023-02-24 Thread Xenia Ragiadakou
On 2/24/23 21:42, Andrew Cooper wrote: Fold svm_asid_g_invlpg() into its single caller, deleting the #if 0 which has been present for the entire 16 years this helper has existed: c/s 322a078ab140 "[HVM][SVM] Reintroduce ASIDs." Move the two remaining prototypes into the private svm.h, forward

[PATCH v3 04/14 - ALT] x86/svm: Remove the asm/hvm/svm/emulate.h header

2023-02-24 Thread Andrew Cooper
These days, this is just two length helpers. Move into the private svm.h No functional change intended. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Xenia Ragiadakou --- xen/arch/x86/hvm/svm/emulate.c | 3 +- xen/arch/x86/hvm/svm/nestedsvm.c | 1 -

Re: [PATCH v3 04/14] x86/svm: make emulate.h private

2023-02-24 Thread Andrew Cooper
On 24/02/2023 6:50 pm, Xenia Ragiadakou wrote: > The header asm/hvm/svm/emulate.h is used only internally by the SVM code, > so it can be changed into a private header. > > Take the opportunity to use an SPDX tag for the licence. > > No functional change intended. > > Signed-off-by: Xenia

[PATCH v3 02/14 - ALT] x86/svm: Remove the asm/hvm/svm/asid.h header

2023-02-24 Thread Andrew Cooper
Fold svm_asid_g_invlpg() into its single caller, deleting the #if 0 which has been present for the entire 16 years this helper has existed: c/s 322a078ab140 "[HVM][SVM] Reintroduce ASIDs." Move the two remaining prototypes into the private svm.h, forward declaring cpuinfo_x86 in preference to

Re: [PATCH v3 00/14] x86/hvm: {svm,vmx} {c,h} cleanup

2023-02-24 Thread Andrew Cooper
On 24/02/2023 6:49 pm, Xenia Ragiadakou wrote: > There are more detailed per-patch changesets. > > Xenia Ragiadakou (14): > x86/svm: move declarations used only by svm code from svm.h to private > header > x86/svm: make asid.h private > x86/svm: delete header asm/hvm/svm/intr.h Thankyou

[PATCH v3 11/14] x86/vmx: remove unused included headers from vmx.c

2023-02-24 Thread Xenia Ragiadakou
Do not include the headers: asm/hvm/vpic.h asm/hvm/vpt.h asm/io.h asm/mce.h asm/mem_sharing.h asm/regs.h public/arch-x86/cpuid.h public/hvm/save.h because none of the declarations and macro definitions in them is used. Sort the rest of the headers alphabetically. No functional

[PATCH v3 14/14] x86/vmx: move vmcs declarations used only by vmx code to private header

2023-02-24 Thread Xenia Ragiadakou
Create a new private header in arch/x86/hvm/vmx called vmcs.h and move there all definitions and declarations that are used only by vmx code and don't need to reside in an external header. Take the opportunity to replace u* with uint*_t, bool_t with bool and to re-arrange the header as follows,

[PATCH v3 13/14] x86/vmx: move vvmx declarations used only by vmx code to private header

2023-02-24 Thread Xenia Ragiadakou
Create a new private header in arch/x86/hvm/vmx called vvmx.h and move there all definitions and declarations that are used only by vmx code and don't need to reside in an external header. Take the opportunity to replace u* with uint*_t, bool_t with bool and to re-arrange the header as follows,

[PATCH v3 10/14] x86/vmx: move declarations used only by vmx code from vmx.h to private headers

2023-02-24 Thread Xenia Ragiadakou
Create two new private headers in arch/x86/hvm/vmx called vmx.h and pi.h. Move all the definitions and declarations that are used solely by vmx code into the private vmx.h, apart from the ones related to posted interrupts that are moved into pi.h. EPT related declarations and definitions stay in

[PATCH v3 06/14] x86/svm: move vmcb declarations used only by svm code to private header

2023-02-24 Thread Xenia Ragiadakou
Create a new private header in arch/x86/hvm/svm called vmcb.h and move there all definitions and declarations that are used only by svm code and don't need to reside in an external header. Take the opportunity to replace u* with uint*_t and remove redundant blank lines. No functional change

[PATCH v3 12/14] x86/vmx: declare nvmx_enqueue_n2_exceptions() static

2023-02-24 Thread Xenia Ragiadakou
Reduce the scope of nvmx_enqueue_n2_exceptions() to static because it is used only in this file. Take the opportunity to remove a trailing space. Signed-off-by: Xenia Ragiadakou Reviewed-by: Jan Beulich --- Changes in v3: - add Jan's R-b tag xen/arch/x86/hvm/vmx/vmx.c | 2 +- 1 file

[PATCH v3 09/14] x86/vmx: remove unused included headers from vmx.h

2023-02-24 Thread Xenia Ragiadakou
Do not include the headers: asm/i387.h asm/hvm/trace.h asm/processor.h asm/regs.h because none of the declarations and macro definitions in them is used in this file. Sort the rest of the headers alphabetically. Include asm/i387.h in vmx.c, needed for vcpu_restore_fpu_lazy(). Take the

[PATCH v3 08/14] x86/vmx: move vmx_update_debug_state() in vmcs.c and declare it static

2023-02-24 Thread Xenia Ragiadakou
Move vmx_update_debug_state() in vmcs.c because it is used only in this file and limit its scope to this file by declaring it static and removing its declaration from vmx.h. No functional change intended. Signed-off-by: Xenia Ragiadakou --- Changes in v3: - apply the change before moving the

[PATCH v3 05/14] x86/svm: move nestedsvm declarations used only by svm code to private header

2023-02-24 Thread Xenia Ragiadakou
Create a new private header in arch/x86/hvm/svm called nestedsvm.h and move there all definitions and declarations that are used only by svm code and don't need to reside in an external header. No functional change intended. Signed-off-by: Xenia Ragiadakou --- Changes in v3: - new patch

[PATCH v3 07/14] x86/svm: move svmdebug.h declarations to private vmcb.h and delete it

2023-02-24 Thread Xenia Ragiadakou
Move the declarations in svmdebug.h to private vmcb.h because are vmcb specific and are used only by internal svm code, and delete svmdebug.h. No functional change intended. Signed-off-by: Xenia Ragiadakou --- Changes in v3: - new patch, suggested by Andrew xen/arch/x86/hvm/svm/nestedsvm.c

[PATCH v3 03/14] x86/svm: delete header asm/hvm/svm/intr.h

2023-02-24 Thread Xenia Ragiadakou
Delete asm/hvm/svm/intr.h because it contains only the declaration of svm_intr_assist() which is referenced only by assembly. No functional change intended. Signed-off-by: Xenia Ragiadakou --- Changes in v3: - new patch, suggested by Andrew xen/arch/x86/hvm/svm/intr.c | 1 -

[PATCH v3 04/14] x86/svm: make emulate.h private

2023-02-24 Thread Xenia Ragiadakou
The header asm/hvm/svm/emulate.h is used only internally by the SVM code, so it can be changed into a private header. Take the opportunity to use an SPDX tag for the licence. No functional change intended. Signed-off-by: Xenia Ragiadakou --- Changes in v3: - new patch

[PATCH v3 02/14] x86/svm: make asid.h private

2023-02-24 Thread Xenia Ragiadakou
The asm/hvm/svm/asid.h is used only internally by the SVM code, so it can be changed into a private header. Take the opportunity to use an SPDX tag for the licence and remove included but unused xen/types.h. No functional change intended. Signed-off-by: Xenia Ragiadakou --- Changes in v3: -

[PATCH v3 01/14] x86/svm: move declarations used only by svm code from svm.h to private header

2023-02-24 Thread Xenia Ragiadakou
Create a new private header in arch/x86/hvm/svm called svm.h and move there all definitions and declarations that are used solely by svm code. Take the opportunity to remove the forward declaration of struct vcpu, that is a leftover since the removal of svm_update_guest_cr()'s declaration. Take

[PATCH v3 00/14] x86/hvm: {svm,vmx} {c,h} cleanup

2023-02-24 Thread Xenia Ragiadakou
This patch series attempts a cleanup of files {svm,vmx} files and headers by removing redundant headers and sorting the rest, reducing the scope of declarations and definitions, moving functions used only by internal {svm,vmx} code to private headers, fix coding style, replace u* with uint*_t

Re: [XEN PATCH v3 0/4] automation: Update containers to allow HTTPS access to xenbits

2023-02-24 Thread Andrew Cooper
On 24/02/2023 6:12 pm, Anthony PERARD wrote: > On Fri, Feb 24, 2023 at 05:37:44PM +, Andrew Cooper wrote: >> On 24/02/2023 5:29 pm, Anthony PERARD wrote: >>> Patch series available in this git branch: >>> https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git >>>

Re: [RFC QEMU] docs: vhost-user: Add custom memory mapping support

2023-02-24 Thread Alex Bennée
Viresh Kumar writes: > The current model of memory mapping at the back-end works fine with > Qemu, where a standard call to mmap() for the respective file > descriptor, passed from front-end, is generally all we need to do before > the front-end can start accessing the guest memory. > > There

Re: [XEN PATCH v3 0/4] automation: Update containers to allow HTTPS access to xenbits

2023-02-24 Thread Anthony PERARD
On Fri, Feb 24, 2023 at 05:37:44PM +, Andrew Cooper wrote: > On 24/02/2023 5:29 pm, Anthony PERARD wrote: > > Patch series available in this git branch: > > https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git > > br.gitlab-containers-update-v3 > > > > v3: > > - new patch which

[xen-4.16-testing test] 178275: regressions - trouble: blocked/broken/fail/pass/starved

2023-02-24 Thread osstest service owner
flight 178275 xen-4.16-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/178275/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-i386-xsmbroken build-arm64

[xen-4.14-testing test] 178273: tolerable trouble: fail/pass/starved - PUSHED

2023-02-24 Thread osstest service owner
flight 178273 xen-4.14-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/178273/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-i386-xl-qemuu-win7-amd64 19 guest-stop fail like 174677

Re: [XEN PATCH v3 0/4] automation: Update containers to allow HTTPS access to xenbits

2023-02-24 Thread Andrew Cooper
On 24/02/2023 5:29 pm, Anthony PERARD wrote: > Patch series available in this git branch: > https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git > br.gitlab-containers-update-v3 > > v3: > - new patch which remove non-debug x86_32 builds > - don't fix root certificates in jessie

[XEN PATCH v3 4/4] automation: Remove non-debug x86_32 build jobs

2023-02-24 Thread Anthony PERARD
In the interest of having less jobs, we remove the x86_32 build jobs that do release build. Debug build is very likely to be enough to find 32bit build issues. Signed-off-by: Anthony PERARD --- Notes: v3: - new patch Proposed here:

[XEN PATCH v3 3/4] automation: Remove expired root certificates used to be used by let's encrypt

2023-02-24 Thread Anthony PERARD
While the Let's Encrypt root certificate ISRG_Root_X1.crt is already present, openssl seems to still check for the root certificate DST_Root_CA_X3.crt which has expired. This prevent https connections. Removing DST_Root_CA_X3 fix the issue. Signed-off-by: Anthony PERARD --- Notes: v3:

[XEN PATCH v3 0/4] automation: Update containers to allow HTTPS access to xenbits

2023-02-24 Thread Anthony PERARD
Patch series available in this git branch: https://xenbits.xen.org/git-http/people/aperard/xen-unstable.git br.gitlab-containers-update-v3 v3: - new patch which remove non-debug x86_32 builds - don't fix root certificates in jessie containers as those won't be used anymore on the main branch.

[XEN PATCH v3 1/4] automation: Use EOL tag for Jessie container

2023-02-24 Thread Anthony PERARD
As Jessie is EOL, the official tag isn't supported anymore. Also, the GPG key for the packages on the repository on the official image are expired and it isn't possible to update or install packages. But we can use the image from "debian/eol" tag which use repositories from archive.debian.org and

[XEN PATCH v3 2/4] automation: Remove testing on Debian Jessie

2023-02-24 Thread Anthony PERARD
Jessie as rearch EOL in 2020. Even if we update the containers, we would still not be able to reach HTTPS webside with Let's Encrypt certificates and thus would need more change to the container. Signed-off-by: Anthony PERARD --- Notes: While we remove some x86_32 testing, there's still

RE : Weekly meeting - Xen Gitlab Issues Review

2023-02-24 Thread Marc Ungeschikts
 2023-02-24 Report minutes Xen Gitlab Issues review meeting: https://cryptpad.fr/pad/#/2/pad/edit/PhI0GK3pNtbm80GI+mqUDXs9/  For next Week 2023-03-03 14 :00 UTC : https://cryptpad.fr/pad/#/2/pad/edit/GBcZpfFD5WELm7mdE2C-anKD/ and https://meet.jit.si/XenIssuesReview Marc Ungeschikts

Re: [PATCH] xen/riscv: init bss section

2023-02-24 Thread Andrew Cooper
On 24/02/2023 2:48 pm, Oleksii Kurochko wrote: > Signed-off-by: Oleksii Kurochko > --- > xen/arch/riscv/setup.c | 14 ++ > 1 file changed, 14 insertions(+) > > diff --git a/xen/arch/riscv/setup.c b/xen/arch/riscv/setup.c > index 154bf3a0bc..593bb471a4 100644 > ---

Re: [PATCH] CI: Simplify RISCV smoke testing

2023-02-24 Thread Oleksii
Looks good to me. Thanks. Reviewed-by: Oleksii Kurochko ~ Oleksii On Fri, 2023-02-24 at 15:37 +, Andrew Cooper wrote: > Use a single fairly generic string as the "all done" message to look > for, > which avoids the need to patch qemu-smoke-riscv64.sh each time a new > feature > is added.

Re: [PATCH v1 3/3] automation: update RISC-V smoke test

2023-02-24 Thread Oleksii
On Fri, 2023-02-24 at 15:27 +, Andrew Cooper wrote: > On 24/02/2023 3:06 pm, Oleksii Kurochko wrote: > > The smoke test was updated to verify that MMU has been enabled. > > > > Signed-off-by: Oleksii Kurochko > > --- > >  automation/scripts/qemu-smoke-riscv64.sh | 2 +- > >  1 file changed, 1

Re: [PATCH] xen/riscv: init bss section

2023-02-24 Thread Oleksii
On Fri, 2023-02-24 at 15:56 +0100, Jan Beulich wrote: > On 24.02.2023 15:48, Oleksii Kurochko wrote: > > --- a/xen/arch/riscv/setup.c > > +++ b/xen/arch/riscv/setup.c > > @@ -24,6 +24,18 @@ static void test_macros_from_bug_h(void) > > early_printk("WARN is most likely working\n"); > >  } > >  

Re: [PATCH v2 3/3] x86/shadow: drop dead code from HVM-only sh_page_fault() pieces

2023-02-24 Thread Andrew Cooper
On 23/01/2023 2:27 pm, Jan Beulich wrote: > The shadow_mode_refcounts() check immediately ahead of the "emulate" > label renders redundant two subsequent is_hvm_domain() checks (the > latter of which was already redundant with the former). > > Also guest_mode() checks are pointless when we already

Re: [PATCH v2 2/3] x86/shadow: mark more of sh_page_fault() HVM-only

2023-02-24 Thread Andrew Cooper
On 23/01/2023 2:27 pm, Jan Beulich wrote: > The types p2m_is_readonly() checks for aren't applicable to PV; > specifically get_gfn() won't ever return any such type for PV domains. > Extend the HVM-conditional block of code, also past the subsequent HVM- > only if(). This way the

Re: [PATCH v2 1/3] x86/shadow: move dm-mmio handling code in sh_page_fault()

2023-02-24 Thread Andrew Cooper
On 23/01/2023 3:08 pm, Jan Beulich wrote: > On 23.01.2023 15:26, Jan Beulich wrote: >> Do away with the partly mis-named "mmio" label there, which really is >> only about emulated MMIO. Move the code to the place where the sole >> "goto" was. Re-order steps slightly: Assertion first, perfc

Re: [PATCH] xen/riscv: read hart_id and dtb_base passed by bootloader

2023-02-24 Thread Oleksii
On Fri, 2023-02-24 at 16:04 +0100, Jan Beulich wrote: > On 24.02.2023 15:48, Oleksii Kurochko wrote: > > Signed-off-by: Oleksii Kurochko > > --- > >  xen/arch/riscv/setup.c | 12 > >  1 file changed, 12 insertions(+) > > > > diff --git a/xen/arch/riscv/setup.c

Re: [PATCH] x86/asm: ELF metadata for simple cases

2023-02-24 Thread Andrew Cooper
On 20/02/2023 11:51 am, Ross Lagerwall wrote: >> From: Andrew Cooper >> Sent: Monday, February 20, 2023 11:04 AM >> To: Xen-devel >> Cc: Andrew Cooper ; Jan Beulich >> ; Roger Pau Monne ; Wei Liu >> ; Konrad Rzeszutek Wilk ; Ross >> Lagerwall >> Subject: [PATCH] x86/asm: ELF metadata for

Re: xenstored: Interaction bettwen SET_PERMS and transaction

2023-02-24 Thread Juergen Gross
On 24.02.23 17:01, Julien Grall wrote: Hi Juergen, On 24/02/2023 16:00, Juergen Gross wrote: On 24.02.23 16:00, Julien Grall wrote: Hi Juergen, For some internal purpose, I need to write a script that would do the following:    1) Start a transaction    2) Call GET_PERMS    3) Call

Re: xenstored: Interaction bettwen SET_PERMS and transaction

2023-02-24 Thread Julien Grall
Hi Juergen, On 24/02/2023 16:00, Juergen Gross wrote: On 24.02.23 16:00, Julien Grall wrote: Hi Juergen, For some internal purpose, I need to write a script that would do the following:    1) Start a transaction    2) Call GET_PERMS    3) Call SET_PERMS with the permission just retrieved   

Re: xenstored: Interaction bettwen SET_PERMS and transaction

2023-02-24 Thread Juergen Gross
On 24.02.23 16:00, Julien Grall wrote: Hi Juergen, For some internal purpose, I need to write a script that would do the following:   1) Start a transaction   2) Call GET_PERMS   3) Call SET_PERMS with the permission just retrieved   4) Commit the transaction (Don't ask why :)) This was

[PATCH] tools/xenstore: fix quota check in acc_fix_domains()

2023-02-24 Thread Juergen Gross
Today when finalizing a transaction the number of node quota is checked to not being exceeded after the transaction. This check is always done, even if the transaction is being performed by a privileged connection, or if there were no nodes created in the transaction. Correct that by checking

Re: [XEN PATCH v2 6/7] automation: Remove testing on Debian Jessie

2023-02-24 Thread Anthony PERARD
On Tue, Feb 21, 2023 at 06:01:19PM +, Andrew Cooper wrote: > On 21/02/2023 5:59 pm, Andrew Cooper wrote: > > On 21/02/2023 4:55 pm, Anthony PERARD wrote: > >> Jessie as rearch EOL in 2020. > >> > >> Even if we update the containers, we would still not be able to reach > >> HTTPS webside with

[PATCH] CI: Simplify RISCV smoke testing

2023-02-24 Thread Andrew Cooper
Use a single fairly generic string as the "all done" message to look for, which avoids the need to patch qemu-smoke-riscv64.sh each time a new feature is added. Signed-off-by: Andrew Cooper --- CC: Oleksii Kurochko CC: Bob Eshleman CC: Alistair Francis CC: Connor Davis CC: Anthony PERARD

[PATCH] drm/virtio: Pass correct device to dma_sync_sgtable_for_device()

2023-02-24 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko The "vdev->dev.parent" should be used instead of "vdev->dev" as a device for which to perform the DMA operation in both virtio_gpu_cmd_transfer_to_host_2d(3d). Because the virtio-gpu device "vdev->dev" doesn't really have DMA OPS assigned to it, but parent (virtio-pci

Re: [RFC PATCH v2 2/2] tools/misc: Add xen-vcpus-stats tool

2023-02-24 Thread Matias Ezequiel Vara Larsen
Hello Andrew and thanks for the comments, On Thu, Feb 23, 2023 at 04:01:09PM +, Andrew Cooper wrote: > On 07/10/2022 1:39 pm, Matias Ezequiel Vara Larsen wrote: > > A couple of observations, all unrelated to the stats themselves. > > Although overall, I'm not entirely certain that a tool

Re: [PATCH v1 3/3] automation: update RISC-V smoke test

2023-02-24 Thread Andrew Cooper
On 24/02/2023 3:06 pm, Oleksii Kurochko wrote: > The smoke test was updated to verify that MMU has been enabled. > > Signed-off-by: Oleksii Kurochko > --- > automation/scripts/qemu-smoke-riscv64.sh | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git

Re: [XEN PATCH v7 08/20] xen/arm: ffa: note dependency on 4k pages

2023-02-24 Thread Bertrand Marquis
HI Jens, > On 22 Feb 2023, at 16:33, Jens Wiklander wrote: > > Adds a BUILD_BUG_ON() to assert the dependency on 4k pages in the FF-A > mediator. > > Signed-off-by: Jens Wiklander NIT: I would s/note/enforce/ in the title: xen/arm: ffa: enforce 4k pages Reviewed-by: Bertrand Marquis

Re: [PATCH v1 1/3] xen/riscv: introduce setup_initial_pages

2023-02-24 Thread Andrew Cooper
On 24/02/2023 3:06 pm, Oleksii Kurochko wrote: > diff --git a/xen/arch/riscv/include/asm/page.h > b/xen/arch/riscv/include/asm/page.h > new file mode 100644 > index 00..fabbe1305f > --- /dev/null > +++ b/xen/arch/riscv/include/asm/page.h > @@ -0,0 +1,90 @@ > +#ifndef _ASM_RISCV_PAGE_H >

Re: [PATCH v1 0/3] enable MMU for RISC-V

2023-02-24 Thread Oleksii
On Fri, 2023-02-24 at 17:06 +0200, Oleksii Kurochko wrote: > The patch series introduces the following things: > 1. Functionality to build the page tables for Xen that map the >    following: > * The physical location of Xen (where the bootloader loaded it) > * The link-time location of

Re: xenstored: Interaction bettwen SET_PERMS and transaction

2023-02-24 Thread Juergen Gross
On 24.02.23 16:00, Julien Grall wrote: Hi Juergen, For some internal purpose, I need to write a script that would do the following:   1) Start a transaction   2) Call GET_PERMS   3) Call SET_PERMS with the permission just retrieved   4) Commit the transaction (Don't ask why :)) This was

Re: [PATCH] xen/riscv: disable fpu

2023-02-24 Thread Jan Beulich
On 24.02.2023 15:48, Oleksii Kurochko wrote: > Disable FPU to detect illegal usage of floating point in kernel > space. > > Signed-off-by: Oleksii Kurochko > --- > xen/arch/riscv/setup.c | 7 +++ > 1 file changed, 7 insertions(+) This looks to contextually depend on earlier individually

[PATCH v1 2/3] xen/riscv: setup initial pagetables

2023-02-24 Thread Oleksii Kurochko
Calculate load and linker linker image addresses and setup initial pagetables. Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/setup.c | 11 +++ 1 file changed, 11 insertions(+) diff --git a/xen/arch/riscv/setup.c b/xen/arch/riscv/setup.c index b7cd438a1d..f69bc278bb 100644 ---

[PATCH v1 1/3] xen/riscv: introduce setup_initial_pages

2023-02-24 Thread Oleksii Kurochko
Mostly the code for setup_initial_pages was taken from Bobby's repo except for the following changes: * Use only a minimal part of the code enough to enable MMU * rename {_}setup_initial_pagetables functions * add writable argument for _setup_initial_pagetables to have an opportunity to make

[PATCH v1 0/3] enable MMU for RISC-V

2023-02-24 Thread Oleksii Kurochko
The patch series introduces the following things: 1. Functionality to build the page tables for Xen that map the following: * The physical location of Xen (where the bootloader loaded it) * The link-time location of Xen (where the linker expected Xen's addresses to be. 2. Load

[PATCH v1 3/3] automation: update RISC-V smoke test

2023-02-24 Thread Oleksii Kurochko
The smoke test was updated to verify that MMU has been enabled. Signed-off-by: Oleksii Kurochko --- automation/scripts/qemu-smoke-riscv64.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/automation/scripts/qemu-smoke-riscv64.sh b/automation/scripts/qemu-smoke-riscv64.sh

Re: [PATCH] xen/riscv: read hart_id and dtb_base passed by bootloader

2023-02-24 Thread Jan Beulich
On 24.02.2023 15:48, Oleksii Kurochko wrote: > Signed-off-by: Oleksii Kurochko > --- > xen/arch/riscv/setup.c | 12 > 1 file changed, 12 insertions(+) > > diff --git a/xen/arch/riscv/setup.c b/xen/arch/riscv/setup.c > index b3f8b10f71..154bf3a0bc 100644 > ---

Re: [PATCH v1 2/2] backup_ptes: fix leak on realloc failure

2023-02-24 Thread Andrew Cooper
On 24/02/2023 1:36 pm, Edwin Török wrote: > From: Edwin Török > > From `man 2 realloc`: > `If realloc() fails, the original block is left untouched; it is not freed or > moved.` > > Found using GCC -fanalyzer: > ``` > | 184 | backup->entries = realloc(backup->entries, > | |

xenstored: Interaction bettwen SET_PERMS and transaction

2023-02-24 Thread Julien Grall
Hi Juergen, For some internal purpose, I need to write a script that would do the following: 1) Start a transaction 2) Call GET_PERMS 3) Call SET_PERMS with the permission just retrieved 4) Commit the transaction (Don't ask why :)) This was executed from dom0 on every nodes. In some

Re: [PATCH] xen/riscv: init bss section

2023-02-24 Thread Jan Beulich
On 24.02.2023 15:56, Jan Beulich wrote: > On 24.02.2023 15:48, Oleksii Kurochko wrote: >> +char *bss = &__bss_start; >> + >> +while ( bss < &__bss_end ) { >> +*bss = 0; >> +bss++; >> +} >> +} > > If you're sure you can defer this until being in C code, why not use >

Re: [PATCH v1 1/2] xc_core_arch_map_p2m_tree_rw: fix memory leak

2023-02-24 Thread Andrew Cooper
On 24/02/2023 1:36 pm, Edwin Török wrote: > From: Edwin Török > > Prior to bd7a29c3d0 'out' would've always been executed and memory > freed, but that commit changed it such that it returns early and leaks. > > Found using gcc 12.2.1 `-fanalyzer`: > ``` > xg_core_x86.c: In function

Re: [PATCH] xen/riscv: init bss section

2023-02-24 Thread Jan Beulich
On 24.02.2023 15:48, Oleksii Kurochko wrote: > --- a/xen/arch/riscv/setup.c > +++ b/xen/arch/riscv/setup.c > @@ -24,6 +24,18 @@ static void test_macros_from_bug_h(void) > early_printk("WARN is most likely working\n"); > } > > +static void __init init_bss(void) > +{ > +extern char

[PATCH] xen/riscv: disable fpu

2023-02-24 Thread Oleksii Kurochko
Disable FPU to detect illegal usage of floating point in kernel space. Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/setup.c | 7 +++ 1 file changed, 7 insertions(+) diff --git a/xen/arch/riscv/setup.c b/xen/arch/riscv/setup.c index 593bb471a4..b7cd438a1d 100644 ---

[PATCH] xen/riscv: init bss section

2023-02-24 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/setup.c | 14 ++ 1 file changed, 14 insertions(+) diff --git a/xen/arch/riscv/setup.c b/xen/arch/riscv/setup.c index 154bf3a0bc..593bb471a4 100644 --- a/xen/arch/riscv/setup.c +++ b/xen/arch/riscv/setup.c @@ -24,6 +24,18 @@ static

[PATCH] xen/riscv: read hart_id and dtb_base passed by bootloader

2023-02-24 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko --- xen/arch/riscv/setup.c | 12 1 file changed, 12 insertions(+) diff --git a/xen/arch/riscv/setup.c b/xen/arch/riscv/setup.c index b3f8b10f71..154bf3a0bc 100644 --- a/xen/arch/riscv/setup.c +++ b/xen/arch/riscv/setup.c @@ -26,6 +26,18 @@ static

[PATCH v1 0/2] fix memory leaks reported by GCC -fanalyzer

2023-02-24 Thread Edwin Török
From: Edwin Török Using GCC 12.2.1 with -fanalyzer it has shown some memory leaks: This is how I enabled -fanalyzer (adding it to CFLAGS for toplevel configure didn't seem to work): ``` CFLAGS += $(call cc-option,$(CC),-fanalyzer) ``` Note that there are more errors shown than fixed here, but

[PATCH v1 1/2] xc_core_arch_map_p2m_tree_rw: fix memory leak

2023-02-24 Thread Edwin Török
From: Edwin Török Prior to bd7a29c3d0 'out' would've always been executed and memory freed, but that commit changed it such that it returns early and leaks. Found using gcc 12.2.1 `-fanalyzer`: ``` xg_core_x86.c: In function ‘xc_core_arch_map_p2m_tree_rw’: xg_core_x86.c:300:5: error: leak of

[PATCH v1 2/2] backup_ptes: fix leak on realloc failure

2023-02-24 Thread Edwin Török
From: Edwin Török >From `man 2 realloc`: `If realloc() fails, the original block is left untouched; it is not freed or moved.` Found using GCC -fanalyzer: ``` | 184 | backup->entries = realloc(backup->entries, | | ~~ | |

Re: [XEN PATCH v7 06/20] xen/arm: ffa: add flags for FFA_PARTITION_INFO_GET

2023-02-24 Thread Jens Wiklander
Hi Bertrand, On Fri, Feb 24, 2023 at 10:30 AM Bertrand Marquis wrote: > > Hi Jens, > > > On 22 Feb 2023, at 16:33, Jens Wiklander wrote: > > > > Defines flags used for the function FFA_PARTITION_INFO_GET. > > > > Signed-off-by: Jens Wiklander > > --- > > xen/arch/arm/tee/ffa.c | 26

[xen-unstable test] 178260: tolerable trouble: fail/pass/starved - PUSHED

2023-02-24 Thread osstest service owner
flight 178260 xen-unstable real [real] flight 178348 xen-unstable real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/178260/ http://logs.test-lab.xenproject.org/osstest/logs/178348/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking):

Re: [PATCH v2] xen: Work around Clang-IAS macro \@ expansion bug

2023-02-24 Thread Andrew Cooper
On 24/02/2023 7:14 am, Jan Beulich wrote: > On 23.02.2023 21:36, Andrew Cooper wrote: >> https://github.com/llvm/llvm-project/issues/60792 >> >> It turns out that Clang-IAS does not expand \@ uniquely in a translaition >> unit, and the XSA-426 change tickles this bug: >> >> :4:1: error: invalid

Re: [PATCH 2/2] xen/misra: add entries to exclude-list.json

2023-02-24 Thread Luca Fancellu
Hi Stefano, >> Hi Jan, >> >> my personal opinion is that we can’t handle them for files that needs to be >> kept >> in sync from an external source, because we can’t justify findings or tag >> false >> positives, if we are lucky we might fix the non compliances but even in that >> case >>

[PATCH v4 5/5] automation: modify RISC-V smoke test

2023-02-24 Thread Oleksii Kurochko
The patch modifies the grep pattern to reflect the usage of WARN. Signed-off-by: Oleksii Kurochko Reviewed-by: Alistair Francis Acked-by: Stefano Stabellini --- Changes in V4: - Add Reviewed-by: Alistair Francis and Acked-by: Stefano Stabellini --- Changes in V3: - Update commit message

[PATCH v4 3/5] xen/riscv: introduce an implementation of macros from

2023-02-24 Thread Oleksii Kurochko
The patch introduces macros: BUG(), WARN(), run_in_exception(), assert_failed. The implementation uses "ebreak" instruction in combination with diffrent bug frame tables (for each type) which contains useful information. Signed-off-by: Oleksii Kurochko --- Changes in V4: - Updates in RISC-V's

[PATCH v4 1/5] xen/riscv: introduce decode_cause() stuff

2023-02-24 Thread Oleksii Kurochko
The patch introduces stuff needed to decode a reason of an exception. Signed-off-by: Oleksii Kurochko --- Changes in V4: - fix string in decode_reserved_interrupt_cause() --- Changes in V3: - Nothing changed --- Changes in V2: - Make decode_trap_cause() more optimization friendly. -

[PATCH v4 4/5] xen/riscv: test basic handling stuff

2023-02-24 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko Acked-by: Alistair Francis --- Changes in V4: - Add Acked-by: Alistair Francis --- Changes in V3: - Nothing changed --- Changes in V2: - Nothing changed --- xen/arch/riscv/setup.c | 16 1 file changed, 16 insertions(+) diff --git

[PATCH v4 2/5] xen/riscv: introduce trap_init()

2023-02-24 Thread Oleksii Kurochko
Signed-off-by: Oleksii Kurochko Reviewed-by: Alistair Francis --- Changes in V4: - Nothing changed --- Changes in V3: - Nothing changed --- Changes in V2: - Rename setup_trap_handler() to trap_init(). - Add Reviewed-by to the commit message. --- xen/arch/riscv/include/asm/traps.h | 1 +

[PATCH v4 0/5] RISCV basic exception handling implementation

2023-02-24 Thread Oleksii Kurochko
The patch series is based on [introduce generic implementation of macros from bug.h] which hasn't been commited yet. The patch series provides a basic implementation of exception handling. It can do only basic things such as decode a cause of an exception, save/restore registers and execute "wfi"

[PATCH v3 2/4] xen: change to

2023-02-24 Thread Oleksii Kurochko
Since the generic version of bug.h stuff was introduced use instead of unnecessary Signed-off-by: Oleksii Kurochko --- Changes in V3: * Update patch 2 not to break compilation: move some parts from patches 3 and 4 to patch 2: * move some generic parts from to * add define

[PATCH v3 4/4] xen/x86: switch x86 to use generic implemetation of bug.h

2023-02-24 Thread Oleksii Kurochko
The following changes were made: * Make GENERIC_BUG_FRAME mandatory for X86 * Update asm/bug.h using generic implementation in * Change prototype of debugger_trap_fatal() in asm/debugger.h to align it with generic prototype in . * Update do_invalid_op using generic do_bug_frame()

[PATCH v3 1/4] xen: introduce CONFIG_GENERIC_BUG_FRAME

2023-02-24 Thread Oleksii Kurochko
A large part of the content of the bug.h is repeated among all architectures, so it was decided to create a new config CONFIG_GENERIC_BUG_FRAME. The version of from x86 was taken as the base version. The patch introduces the following stuff: * common bug.h header * generic implementation of

[PATCH v3 3/4] xen/arm: switch ARM to use generic implementation of bug.h

2023-02-24 Thread Oleksii Kurochko
The following changes were made: * make GENERIC_BUG_FRAME mandatory for ARM * As do_bug_frame() returns -EINVAL in case something goes wrong otherwise id of bug frame. Thereby 'if' cases where do_bug_frame() was updated to check if the returned value is less than 0 * Change macros bug_file()

  1   2   >