[linux-linus test] 183273: tolerable FAIL - PUSHED

2023-10-05 Thread osstest service owner
flight 183273 linux-linus real [real] flight 183280 linux-linus real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/183273/ http://logs.test-lab.xenproject.org/osstest/logs/183280/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-

[xen-unstable-smoke test] 183276: regressions - FAIL

2023-10-05 Thread osstest service owner
flight 183276 xen-unstable-smoke real [real] flight 183279 xen-unstable-smoke real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/183276/ http://logs.test-lab.xenproject.org/osstest/logs/183279/ Regressions :-( Tests which did not succeed and are blocking, including tests which co

[PATCH 0/5] automation: cleanup hardware based tests

2023-10-05 Thread Marek Marczykowski-Górecki
While working on tests for MSI-X, I did few cleanups of hw-based gitlab tests, greatly reducing false positive messages in the test output. After applying this series, the tests-artifacts/alpine/3.18 container needs to be rebuilt. Test run with container rebuilt (on my repo): https://gitlab.com/xe

[PATCH 4/5] automation: improve checking for MSI/MSI-X in PCI passthrough tests

2023-10-05 Thread Marek Marczykowski-Górecki
Checking /proc/interrupts is unreliable because different drivers set different names there. Install pciutils and use lspci instead. In fact, the /proc/interrupts content was confusing enough that adl-pci-hvm had it wrong (MSI-X is in use there). Fix this too. Signed-off-by: Marek Marczykowski-Gór

[PATCH 2/5] automation: hide timeout countdown in log

2023-10-05 Thread Marek Marczykowski-Górecki
grep+sleep message every 1s makes job log unnecessary hard to read. Signed-off-by: Marek Marczykowski-Górecki --- I know I can download serial log file, but that's 3 more clicks... --- automation/scripts/qubes-x86-64.sh | 2 ++ 1 file changed, 2 insertions(+) diff --git a/automation/scripts/qub

[PATCH 3/5] automation: cleanup test alpine install

2023-10-05 Thread Marek Marczykowski-Górecki
Remove parts of initramfs for the test system (domU, and in few tests dom0 too) that are not not working and are not really needed in this simple system. This makes the test log much lighter on misleading error messages. Signed-off-by: Marek Marczykowski-Górecki --- automation/tests-artifacts/a

[PATCH 5/5] automation: extract QEMU log in relevant hardware tests

2023-10-05 Thread Marek Marczykowski-Górecki
Let it be printed to the console too. QEMU and Linux messages have different enough format that it should be possible to distinguish them. Signed-off-by: Marek Marczykowski-Górecki --- automation/scripts/qubes-x86-64.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/automation/scripts/qubes

[PATCH 1/5] automation: include real-time view of the domU console log too

2023-10-05 Thread Marek Marczykowski-Górecki
Passthrough domU console log to the serial console in real time, not only after the test. First of all, this gives domU console also in case of test failure. But also, allows correlation between domU and dom0 or Xen messages. To avoid ambiguity, add log prefix with 'sed'. Signed-off-by: Marek Mar

Re: [XEN PATCH] xen/sched: address violations of MISRA C:2012 Rule 8.2

2023-10-05 Thread Stefano Stabellini
On Thu, 5 Oct 2023, Federico Serafini wrote: > Add missing parameter names. No functional change. > > Signed-off-by: Federico Serafini > --- > xen/common/sched/private.h | 93 -- > 1 file changed, 49 insertions(+), 44 deletions(-) > > diff --git a/xen/common/

Re: [XEN PATCH][for-4.19 2/2] xen/spinlock: fix use of 0 as a null pointer constant

2023-10-05 Thread Stefano Stabellini
On Thu, 5 Oct 2023, Nicola Vetrini wrote: > The constant 0 is used as a null pointer constant, in > violation of MISRA C:2012 Rule 11.9, in builds with > CONFIG_DEBUG_LOCK_PROFILE defined. > > Signed-off-by: Nicola Vetrini Reviewed-by: Stefano Stabellini > --- > Release builds should not be i

Re: [XEN PATCH][for-4.19 1/2] xen: introduce a deviation for Rule 11.9

2023-10-05 Thread Stefano Stabellini
On Thu, 5 Oct 2023, Nicola Vetrini wrote: > The constant 0 is used instead of NULL in '__ACCESS_ONCE' as a > compile-time check to detect non-scalar types; its usage for this > purpose is documented in rules.rst as an exception. > > Furthermore, the 'access_field' and 'typeof_field' macros are > i

Re: [XEN PATCH] xen: Add SAF deviations for MISRA C:2012 Rule 7.1

2023-10-05 Thread Stefano Stabellini
On Thu, 5 Oct 2023, Luca Fancellu wrote: > > On 5 Oct 2023, at 00:32, Stefano Stabellini wrote: > > > > On Wed, 4 Oct 2023, Luca Fancellu wrote: > >>> On 4 Oct 2023, at 11:29, Nicola Vetrini > >>> wrote: > >>> On 04/10/2023 12:06, Luca Fancellu wrote: > Hi Nicola, > > On 4 Oct 2023, at

Re: [PATCH] xen/arm: vtimer: Don't read/use the secure physical timer interrupt for ACPI

2023-10-05 Thread Henry Wang
Hi, > On Oct 6, 2023, at 06:53, Stefano Stabellini wrote: > > On Thu, 5 Oct 2023, Julien Grall wrote: >> From: Julien Grall >> >> Per ACPI 6.5 section 5.2.25 ("Generic Timer Description Table (GTDT)"), >> the fields "Secure EL1 Timer GSIV/Flags" are optional and an OS running >> in non-secure

[xen-unstable test] 183271: tolerable FAIL - PUSHED

2023-10-05 Thread osstest service owner
flight 183271 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/183271/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 183266 test-amd64-amd64-xl-qemut-win7-amd64

Re: [PATCH] xen/arm: vtimer: Don't read/use the secure physical timer interrupt for ACPI

2023-10-05 Thread Stefano Stabellini
On Thu, 5 Oct 2023, Julien Grall wrote: > From: Julien Grall > > Per ACPI 6.5 section 5.2.25 ("Generic Timer Description Table (GTDT)"), > the fields "Secure EL1 Timer GSIV/Flags" are optional and an OS running > in non-secure world is meant to ignore the values. > > However, Xen is trying to re

Re: [CRITICAL for 4.18] Re: [PATCH v5 00/10] runstate/time area registration by (guest) physical address

2023-10-05 Thread Julien Grall
On 05/10/2023 23:40, Julien Grall wrote: Hi Andrew, On 05/10/2023 19:58, Andrew Cooper wrote: I see this series has been committed.  But it's broken in a really fundamental way. Thanks for pointing out. But I'd like to understand how I come to only hear about those concerns on the series

Re: [CRITICAL for 4.18] Re: [PATCH v5 00/10] runstate/time area registration by (guest) physical address

2023-10-05 Thread Julien Grall
Hi Andrew, On 05/10/2023 19:58, Andrew Cooper wrote: I see this series has been committed.  But it's broken in a really fundamental way. Thanks for pointing out. But I'd like to understand how I come to only hear about those concerns on the series after committing. Did I miss any thread? Eve

Re: SAF-x-safe rename

2023-10-05 Thread Andrew Cooper
On 05/10/2023 10:38 pm, andrew.coop...@citrix.com wrote: > On 05/10/2023 8:43 am, Luca Fancellu wrote: >>> On 5 Oct 2023, at 00:46, Stefano Stabellini wrote: >>> >>> Hi MISRA C working group (Jan, Roger, Andrew, Julien, Bertrand, George) >>> >>> in a recent thread Andrew pointed out that the SAF-2

[xen-unstable-smoke test] 183272: regressions - FAIL

2023-10-05 Thread osstest service owner
flight 183272 xen-unstable-smoke real [real] flight 183274 xen-unstable-smoke real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/183272/ http://logs.test-lab.xenproject.org/osstest/logs/183274/ Regressions :-( Tests which did not succeed and are blocking, including tests which co

Re: SAF-x-safe rename

2023-10-05 Thread andrew.coop...@citrix.com
On 05/10/2023 8:43 am, Luca Fancellu wrote: >> On 5 Oct 2023, at 00:46, Stefano Stabellini wrote: >> >> Hi MISRA C working group (Jan, Roger, Andrew, Julien, Bertrand, George) >> >> in a recent thread Andrew pointed out that the SAF-2-safe tag is >> confusing and requested a rename: >> https://mar

Re: SAF-x-safe rename

2023-10-05 Thread Stefano Stabellini
On Thu, 5 Oct 2023, Luca Fancellu wrote: > > On 5 Oct 2023, at 00:46, Stefano Stabellini wrote: > > > > Hi MISRA C working group (Jan, Roger, Andrew, Julien, Bertrand, George) > > > > in a recent thread Andrew pointed out that the SAF-2-safe tag is > > confusing and requested a rename: > > https

Re: Issue with shared information page on Xen/ARM 4.17

2023-10-05 Thread Stefano Stabellini
On Thu, 5 Oct 2023, Roger Pau Monné wrote: > On Wed, Oct 04, 2023 at 03:52:54PM -0700, Stefano Stabellini wrote: > > On Wed, 4 Oct 2023, Julien Grall wrote: > > > > > If we want to handle such firmware, I think it would be better if we > > > > > provide > > > > > an hypercall that would return the

Re: [PATCH] xen/arm: vtimer: Don't read/use the secure physical timer interrupt for ACPI

2023-10-05 Thread Michal Orzel
Hi Julien, On 05/10/2023 18:54, Julien Grall wrote: > > > From: Julien Grall > > Per ACPI 6.5 section 5.2.25 ("Generic Timer Description Table (GTDT)"), > the fields "Secure EL1 Timer GSIV/Flags" are optional and an OS running > in non-secure world is meant to ignore the values. > > However,

[CRITICAL for 4.18] Re: [PATCH v5 00/10] runstate/time area registration by (guest) physical address

2023-10-05 Thread Andrew Cooper
I see this series has been committed.  But it's broken in a really fundamental way. This is a new extension with persistent side effects to an existing part of the guest ABI. Yet there doesn't appear to be any enumeration that the interface is available to begin with.  Requiring the guest to pro

[QEMU][PATCH v1 4/7] xen: let xen_ram_addr_from_mapcache() return -1 in case of not found entry

2023-10-05 Thread Vikram Garhwal
From: Juergen Gross Today xen_ram_addr_from_mapcache() will either abort() or return 0 in case it can't find a matching entry for a pointer value. Both cases are bad, so change that to return an invalid address instead. Signed-off-by: Juergen Gross --- hw/xen/xen-mapcache.c | 12 +++-

[QEMU][PATCH v1 2/7] xen: add pseudo RAM region for grant mappings

2023-10-05 Thread Vikram Garhwal
From: Juergen Gross Add a memory region which can be used to automatically map granted memory. It is starting at 0x8000ULL in order to be able to distinguish it from normal RAM. For this reason the xen.ram memory region is expanded, which has no further impact as it is used just as a

[QEMU][PATCH v1 6/7] xen: add map and unmap callbacks for grant region

2023-10-05 Thread Vikram Garhwal
From: Juergen Gross Add the callbacks for mapping/unmapping guest memory via grants to the special grant memory region. Signed-off-by: Juergen Gross Signed-off-by: Vikram Garhwal --- hw/xen/xen-mapcache.c | 167 +- softmmu/physmem.c | 11 ++- 2 fil

[QEMU][PATCH v1 1/7] xen: when unplugging emulated devices skip virtio devices

2023-10-05 Thread Vikram Garhwal
From: Juergen Gross Virtio devices should never be unplugged at boot time, as they are similar to pci passthrough devices. Signed-off-by: Juergen Gross Signed-off-by: Vikram Garhwal --- hw/i386/xen/xen_platform.c | 8 +++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/hw/i3

Re: Xen on AWS EC2 Graviton 2 metal instances (c6g.metal)

2023-10-05 Thread Julien Grall
On 03/10/2023 00:03, Stefano Stabellini wrote: On Mon, 2 Oct 2023, Julien Grall wrote: On 29/09/2023 21:29, Stefano Stabellini wrote: Now regarding whether the PPI is used. AFAICT, the secure timer PPI is still present in the firmware tables (ACPI and DT) passed to dom0. So strictly speaking

[PATCH] xen/arm: vtimer: Don't read/use the secure physical timer interrupt for ACPI

2023-10-05 Thread Julien Grall
From: Julien Grall Per ACPI 6.5 section 5.2.25 ("Generic Timer Description Table (GTDT)"), the fields "Secure EL1 Timer GSIV/Flags" are optional and an OS running in non-secure world is meant to ignore the values. However, Xen is trying to reserve the value. When booting on Graviton 2 metal inst

Re: [PATCH] net/xen-netback: Break build if netback slots > max_skbs + 1

2023-10-05 Thread David Kahurani
On Thu, Oct 5, 2023 at 7:03 PM Jakub Kicinski wrote: > > On Thu, 5 Oct 2023 18:39:51 +0300 David Kahurani wrote: > > > MAX_SKB_FRAGS can now be set via Kconfig, this allows us to create > > > larger super-packets. Can XEN_NETBK_LEGACY_SLOTS_MAX be made relative > > > to MAX_SKB_FRAGS, or does the

[libvirt test] 183269: tolerable all pass - PUSHED

2023-10-05 Thread osstest service owner
flight 183269 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/183269/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 183260 test-armhf-armhf-libvirt-qcow2 15 saveres

Re: [PATCH] net/xen-netback: Break build if netback slots > max_skbs + 1

2023-10-05 Thread Jakub Kicinski
On Thu, 5 Oct 2023 18:39:51 +0300 David Kahurani wrote: > > MAX_SKB_FRAGS can now be set via Kconfig, this allows us to create > > larger super-packets. Can XEN_NETBK_LEGACY_SLOTS_MAX be made relative > > to MAX_SKB_FRAGS, or does the number have to match between guest and > > host? > > Historic

Re: Issue with shared information page on Xen/ARM 4.17

2023-10-05 Thread Elliott Mitchell
On Thu, Oct 05, 2023 at 09:54:26AM +0100, Julien Grall wrote: > On 04/10/2023 22:13, Elliott Mitchell wrote: > >>> I understand the situation is different on Arm vs x86, so if > >>> edk2 is not supported on arm I guess it doesn't matter much whether > >>> it's broken. It would be a much worse issu

Re: [PATCH] net/xen-netback: Break build if netback slots > max_skbs + 1

2023-10-05 Thread David Kahurani
This change was suggested by Juergen and looked okay and straightforward to me. On Wed, Oct 4, 2023 at 9:48 PM Jakub Kicinski wrote: > > On Wed, 27 Sep 2023 11:29:18 +0300 David Kahurani wrote: > > If XEN_NETBK_LEGACY_SLOTS_MAX and MAX_SKB_FRAGS have a difference of > > more than 1, with MAX_SKB_

[xen-unstable-smoke test] 183270: tolerable all pass - PUSHED

2023-10-05 Thread osstest service owner
flight 183270 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/183270/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-libvirt 15 migrate-support-checkfail never pass test-arm64-arm64-xl-xsm 1

Re: [PATCH v3] arm/ioreq: guard interaction data on read/write operations

2023-10-05 Thread Julien Grall
Hi Andrii, On 05/10/2023 14:30, Andrii Chepurnyi wrote: For read operations, there's a potential issue when the data field of the ioreq struct is partially updated in the response. To address this, zero data field during read operations. This modification serves as a safeguard against implementa

[PATCH] xen-netback: use default TX queue size for vifs

2023-10-05 Thread Roger Pau Monne
Do not set netback interfaces (vifs) default TX queue size to the ring size. The TX queue size is not related to the ring size, and using the ring size (32) as the queue size can lead to packet drops. Note the TX side of the vif interface in the netback domain is the one receiving packets to be in

[linux-linus test] 183268: tolerable FAIL - PUSHED

2023-10-05 Thread osstest service owner
flight 183268 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/183268/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 183265 test-amd64-amd64-xl-qemuu-win7-amd64

[PATCH v3] arm/ioreq: guard interaction data on read/write operations

2023-10-05 Thread Andrii Chepurnyi
For read operations, there's a potential issue when the data field of the ioreq struct is partially updated in the response. To address this, zero data field during read operations. This modification serves as a safeguard against implementations that may inadvertently partially update the data fiel

Re: [PATCH v5 01/10] mem_sharing/fork: do not attempt to populate vcpu_info page

2023-10-05 Thread Tamas K Lengyel
On Mon, Oct 2, 2023 at 11:12 AM Roger Pau Monne wrote: > > Instead let map_vcpu_info() and it's call to get_page_from_gfn() > populate the page in the child as needed. Also remove the bogus > copy_domain_page(): should be placed before the call to map_vcpu_info(), > as the later can update the co

Re: [PATCH for-4.18] MAINTAINERS: Make Bob Eschleman a reviewer

2023-10-05 Thread Julien Grall
Hi George, On 05/10/2023 10:07, George Dunlap wrote: Following a conversation with Bob Eschleman, it was agreed that Bobby would prefer to return to being a Reviewer. Ideally, we would want Bobby confirm on the ML (this could be a simpler Acked-by). In any case... Signed-off-by: George Du

Re: [PATCH v5 00/10] runstate/time area registration by (guest) physical address

2023-10-05 Thread Julien Grall
Hi, On 05/10/2023 02:27, Henry Wang wrote: Hi Roger, On Oct 2, 2023, at 23:11, Roger Pau Monne wrote: Since it was indicated that introducing specific new vCPU ops may be beneficial independent of the introduction of a fully physical- address-based ABI flavor, here we go. There continue to b

Re: [PATCH v5 01/10] mem_sharing/fork: do not attempt to populate vcpu_info page

2023-10-05 Thread Julien Grall
Hi George, On 05/10/2023 13:42, George Dunlap wrote: On Thu, Oct 5, 2023 at 1:11 PM Julien Grall wrote: Hi, While preparing to commit this series, I have noticed that there are no Acked-by/Reviewed-by from Tamas (or at least not present in my inbox). @Tamas, can you provide one? I see an

Re: [PATCH v5 01/10] mem_sharing/fork: do not attempt to populate vcpu_info page

2023-10-05 Thread George Dunlap
On Thu, Oct 5, 2023 at 1:11 PM Julien Grall wrote: > > Hi, > > While preparing to commit this series, I have noticed that there are no > Acked-by/Reviewed-by from Tamas (or at least not present in my inbox). > > @Tamas, can you provide one? I see an "Acked-by" from Tamas two days ago. -George

Re: [PATCH v5 01/10] mem_sharing/fork: do not attempt to populate vcpu_info page

2023-10-05 Thread Roger Pau Monné
On Tue, Oct 03, 2023 at 09:46:13AM -0400, Tamas K Lengyel wrote: > On Mon, Oct 2, 2023 at 11:12 AM Roger Pau Monne wrote: > > > > Instead let map_vcpu_info() and it's call to get_page_from_gfn() > > populate the page in the child as needed. Also remove the bogus > > copy_domain_page(): should be

Re: [for-4.18] [PATCH v2] arm/ioreq: guard interaction data on read/write operations

2023-10-05 Thread Henry Wang
Hi Julien, > On Oct 5, 2023, at 20:30, Julien Grall wrote: > > (+ Henry) Thanks. > > Hi Andrii, > > @Henry, this patch is a candidate for Xen 4.18. The fix is self-contained in > the IOREQ code which is in tech preview. So I think the risk is limited. Sure, with your comments below properl

[for-4.18] Re: [PATCH v2] arm/ioreq: guard interaction data on read/write operations

2023-10-05 Thread Julien Grall
(+ Henry) Hi Andrii, @Henry, this patch is a candidate for Xen 4.18. The fix is self-contained in the IOREQ code which is in tech preview. So I think the risk is limited. On 05/10/2023 10:21, Andrii Chepurnyi wrote: For read operations, there's a potential issue when the data field of the i

Re: [PATCH v5 01/10] mem_sharing/fork: do not attempt to populate vcpu_info page

2023-10-05 Thread Julien Grall
Hi, While preparing to commit this series, I have noticed that there are no Acked-by/Reviewed-by from Tamas (or at least not present in my inbox). @Tamas, can you provide one? Cheers, On 02/10/2023 16:11, Roger Pau Monne wrote: Instead let map_vcpu_info() and it's call to get_page_from_gfn(

[PATCH V2 1/2] xen: evtchn: Allow shared registration of IRQ handers

2023-10-05 Thread Viresh Kumar
Currently the handling of events is supported either in the kernel or userspace, but not both. In order to support fast delivery of interrupts from the guest to the backend, we need to handle the Queue notify part of Virtio protocol in kernel and the rest in userspace. Update the interrupt handle

[PATCH V2 2/2] xen: privcmd: Add support for ioeventfd

2023-10-05 Thread Viresh Kumar
Virtio guests send VIRTIO_MMIO_QUEUE_NOTIFY notification when they need to notify the backend of an update to the status of the virtqueue. The backend or another entity, polls the MMIO address for updates to know when the notification is sent. It works well if the backend does this polling by itse

[PATCH V2 0/2] xen: privcmd: Add ioeventfd support

2023-10-05 Thread Viresh Kumar
Hello, Now that irqfd support (backend to guest interrupt) is already merged, this series solves the other part of the problem, i.e. ioeventfd (guest to backend interrupt). More details inside the commits. -- Viresh V1->V2: - Increment irq_info refcnt only for valid info. - Use u64 type for add

Re: [PATCH 2/2] xen: privcmd: Add support for ioeventfd

2023-10-05 Thread Viresh Kumar
On 29-09-23, 07:46, Juergen Gross wrote: > This is populated from a __u64 field. Maybe make it uint64_t? Checkpatch warns about this, will use u64 instead. CHECK: Prefer kernel type 'u64' over 'uint64_t' #124: FILE: drivers/xen/privcmd.c:1097: + uint64_t addr; -- viresh

[xen-unstable test] 183266: tolerable FAIL

2023-10-05 Thread osstest service owner
flight 183266 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/183266/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-amd64-i386-qemuu-rhel6hvm-amd 7 xen-install fail in 183258 pass in 183266 test-amd64-amd64-xl-qemut-debian

[XEN PATCH] xen/sched: address violations of MISRA C:2012 Rule 8.2

2023-10-05 Thread Federico Serafini
Add missing parameter names. No functional change. Signed-off-by: Federico Serafini --- xen/common/sched/private.h | 93 -- 1 file changed, 49 insertions(+), 44 deletions(-) diff --git a/xen/common/sched/private.h b/xen/common/sched/private.h index c516976c37

Re: Issue with shared information page on Xen/ARM 4.17

2023-10-05 Thread Roger Pau Monné
On Wed, Oct 04, 2023 at 03:52:54PM -0700, Stefano Stabellini wrote: > On Wed, 4 Oct 2023, Julien Grall wrote: > > > > If we want to handle such firmware, I think it would be better if we > > > > provide > > > > an hypercall that would return the GFN where it is currently mapped. > > > > > > Sure,

[PATCH v2] arm/ioreq: guard interaction data on read/write operations

2023-10-05 Thread Andrii Chepurnyi
For read operations, there's a potential issue when the data field of the ioreq struct is partially updated in the response. To address this, zero data field during read operations. This modification serves as a safeguard against implementations that may inadvertently partially update the data fiel

Re: [PATCH for-4.18] MAINTAINERS: Make Bob Eschleman a reviewer

2023-10-05 Thread Henry Wang
Hi George, > On Oct 5, 2023, at 17:07, George Dunlap wrote: > > Following a conversation with Bob Eschleman, it was agreed that > Bobby would prefer to return to being a Reviewer. > > Signed-off-by: George Dunlap > --- > Freeze exception justification: Only documentation change. Of course. So

[PATCH for-4.18] MAINTAINERS: Make Bob Eschleman a reviewer

2023-10-05 Thread George Dunlap
Following a conversation with Bob Eschleman, it was agreed that Bobby would prefer to return to being a Reviewer. Signed-off-by: George Dunlap --- Freeze exception justification: Only documentation change. CC: Bob Eshleman CC: Wei Liu CC: Andrew Cooper CC: Jan Beulich CC: Stefano Stabellini

Re: Issue with shared information page on Xen/ARM 4.17

2023-10-05 Thread Julien Grall
On 04/10/2023 22:13, Elliott Mitchell wrote: I understand the situation is different on Arm vs x86, so if edk2 is not supported on arm I guess it doesn't matter much whether it's broken. It would be a much worse issue on x86 where edk2 is supported. AFAIK, we have CI for x86 on EDK2 but we don

[XEN PATCH][for-4.19 1/2] xen: introduce a deviation for Rule 11.9

2023-10-05 Thread Nicola Vetrini
The constant 0 is used instead of NULL in '__ACCESS_ONCE' as a compile-time check to detect non-scalar types; its usage for this purpose is documented in rules.rst as an exception. Furthermore, the 'access_field' and 'typeof_field' macros are introduced as a general way to deal with accesses to st

[XEN PATCH][for-4.19 0/2] address violations of MISRA C:2012 Rule 11.9

2023-10-05 Thread Nicola Vetrini
Rule 11.9 forbids the usage of '0' as a null pointer constant, therefore uses of this pattern have been amended. One exception, recorded in rules.rst, is in __ACCESS_ONCE to do a scalar type check. The series only touches common headers, therefore it should be safe to include in the for-4.19 branc

[XEN PATCH][for-4.19 2/2] xen/spinlock: fix use of 0 as a null pointer constant

2023-10-05 Thread Nicola Vetrini
The constant 0 is used as a null pointer constant, in violation of MISRA C:2012 Rule 11.9, in builds with CONFIG_DEBUG_LOCK_PROFILE defined. Signed-off-by: Nicola Vetrini --- Release builds should not be impacted by this --- xen/include/xen/spinlock.h | 2 +- 1 file changed, 1 insertion(+), 1 de

Re: [PATCH] arm/ioreq: clean data field in ioreq struct on read operations

2023-10-05 Thread Andrii Chepurnyi
Hello, On 10/4/23 18:41, Julien Grall wrote: > I was asking a pointer to the code in the Device Emulator (QEMU in your > case). I am confident the code is correct in U-boot, because when using > 'w0', the unused bits are meant to be set to zero (per the Arm Arm). But > I am curious to know why

RE: [PATCH v12 06/37] Documentation/x86/64: Add a documentation for FRED

2023-10-05 Thread Li, Xin3
> > diff --git a/Documentation/arch/x86/x86_64/fred.rst > > b/Documentation/arch/x86/x86_64/fred.rst > > new file mode 100644 > > index ..9f57e7b91f7e > > --- /dev/null > > +++ b/Documentation/arch/x86/x86_64/fred.rst > > @@ -0,0 +1,96 @@ > > +.. SPDX-License-Identifier: GPL-2.0 > > + >

Re: SAF-x-safe rename

2023-10-05 Thread Luca Fancellu
> On 5 Oct 2023, at 00:46, Stefano Stabellini wrote: > > Hi MISRA C working group (Jan, Roger, Andrew, Julien, Bertrand, George) > > in a recent thread Andrew pointed out that the SAF-2-safe tag is > confusing and requested a rename: > https://marc.info/?l=xen-devel&m=169634970821202 > > As d

Re: [XEN PATCH] xen: Add SAF deviations for MISRA C:2012 Rule 7.1

2023-10-05 Thread Luca Fancellu
> On 5 Oct 2023, at 00:32, Stefano Stabellini wrote: > > On Wed, 4 Oct 2023, Luca Fancellu wrote: >>> On 4 Oct 2023, at 11:29, Nicola Vetrini wrote: >>> On 04/10/2023 12:06, Luca Fancellu wrote: Hi Nicola, > On 4 Oct 2023, at 10:56, andrew.coop...@citrix.com wrote: > On 03/10/2023

RE: [PATCH v12 00/37] x86: enable FRED for x86-64

2023-10-05 Thread Li, Xin3
> > This patch set enables the Intel flexible return and event delivery > > (FRED) architecture for x86-64. > > > > > Which tree is this based on now? > It was based on the tip master on the day I sent the v12 patch set, i.e., Monday night in the US west coast. > I tried running 'b4 diff' but i