[xen-unstable-smoke test] 186895: regressions - FAIL

2024-07-18 Thread osstest service owner
flight 186895 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/186895/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 7 xen-install fail REGR. vs. 186826 test-amd64-a

[xen-4.19-testing baseline test] 186878: tolerable FAIL

2024-07-18 Thread osstest service owner
"Old" tested version had not actually been tested; therefore in this flight we test it, rather than a new candidate. The baseline, if any, is the most recent actually tested revision. flight 186878 xen-4.19-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/186878/ Failures :-/

[xen-unstable-smoke test] 186892: regressions - FAIL

2024-07-18 Thread osstest service owner
flight 186892 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/186892/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 7 xen-install fail REGR. vs. 186826 test-amd64-a

[PATCH v5 0/3] Add API for making parts of a MMIO page R/O and use it in XHCI console

2024-07-18 Thread Marek Marczykowski-Górecki
On older systems, XHCI xcap had a layout that no other (interesting) registers were placed on the same page as the debug capability, so Linux was fine with making the whole page R/O. But at least on Tiger Lake and Alder Lake, Linux needs to write to some other registers on the same page too. Add a

[PATCH v5 2/3] x86/mm: add API for marking only part of a MMIO page read only

2024-07-18 Thread Marek Marczykowski-Górecki
In some cases, only few registers on a page needs to be write-protected. Examples include USB3 console (64 bytes worth of registers) or MSI-X's PBA table (which doesn't need to span the whole table either), although in the latter case the spec forbids placing other registers on the same page. Curre

[PATCH v5 3/3] drivers/char: Use sub-page ro API to make just xhci dbc cap RO

2024-07-18 Thread Marek Marczykowski-Górecki
Not the whole page, which may contain other registers too. The XHCI specification describes DbC as designed to be controlled by a different driver, but does not mandate placing registers on a separate page. In fact on Tiger Lake and newer (at least), this page do contain other registers that Linux

[PATCH v5 1/3] xen/list: add LIST_HEAD_RO_AFTER_INIT

2024-07-18 Thread Marek Marczykowski-Górecki
Similar to LIST_HEAD_READ_MOSTLY. Signed-off-by: Marek Marczykowski-Górecki --- New in v5 --- xen/include/xen/list.h | 3 +++ 1 file changed, 3 insertions(+) diff --git a/xen/include/xen/list.h b/xen/include/xen/list.h index 6506ac40893b..62169f46742e 100644 --- a/xen/include/xen/list.h +++ b/x

[xen-unstable-smoke test] 186885: regressions - FAIL

2024-07-18 Thread osstest service owner
flight 186885 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/186885/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 7 xen-install fail REGR. vs. 186826 test-amd64-a

[linux-6.1 test] 186877: tolerable FAIL - PUSHED

2024-07-18 Thread osstest service owner
flight 186877 linux-6.1 real [real] http://logs.test-lab.xenproject.org/osstest/logs/186877/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 186804 test-amd64-amd64-xl-qemuu-win7-amd64 19

[xen-unstable-smoke test] 186883: regressions - FAIL

2024-07-18 Thread osstest service owner
flight 186883 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/186883/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 7 xen-install fail REGR. vs. 186826 test-amd64-a

Re: [RFC PATCH 17/17] CODING_STYLE: Add a section on header guards naming conventions

2024-07-18 Thread Stefano Stabellini
On Thu, 18 Jul 2024, Jan Beulich wrote: > On 18.07.2024 01:02, Stefano Stabellini wrote: > > On Wed, 17 Jul 2024, Jan Beulich wrote: > >> On 17.07.2024 02:20, Stefano Stabellini wrote: > >>> On Tue, 16 Jul 2024, Jan Beulich wrote: > On 16.07.2024 02:43, Stefano Stabellini wrote: > > On Mon

[PATCH 2/4] x86/domain: Implement arch_init_idle_domain()

2024-07-18 Thread Andrew Cooper
The idle domain needs d->arch.ctxt_switch initialised on x86. Implement the new arch_init_idle_domain() in order to do this. Right now this double-initalises the ctxt_switch pointer, but it's safe and will stop happening when domain_create() is cleaned up as a consequence. No practical change.

[PATCH 4/4] arch/domain: Clean up the idle domain remnants in arch_domain_create()

2024-07-18 Thread Andrew Cooper
With arch_domain_create() no longer being called with the idle domain, drop the last remaining logic. No functional change. Signed-off-by: Andrew Cooper --- CC: Jan Beulich CC: Roger Pau Monné CC: Stefano Stabellini CC: Julien Grall CC: Volodymyr Babchuk CC: Bertrand Marquis CC: Michal Orz

[PATCH 0/4] xen/domain: Idle domain creation improvements

2024-07-18 Thread Andrew Cooper
domain_create() has some unnecessary complexity for constructing the idle domain. Rearrange x86's needs, to simplify the common logic. https://cirrus-ci.com/build/5234584097390592 https://gitlab.com/xen-project/people/andyhhp/xen/-/pipelines/1379531597 Andrew Cooper (4): xen/domain: Introduce

[PATCH 3/4] xen/domain: Simpliy domain_create() now the idle domain is complete earlier

2024-07-18 Thread Andrew Cooper
With x86 implementing arch_init_idle_domain(), there is no longer any need to call arch_domain_create() with the idle domain. Have the idle domain exit early with all other system domains. Move the static-analysis ASSERT() earlier. Then, remove the !is_idle_domain() protections around the majori

[PATCH 1/4] xen/domain: Introduce arch_init_idle_domain()

2024-07-18 Thread Andrew Cooper
The idle domain causes a large amount of complexity in domain_create() because of x86's need to initialise d->arch.ctxt_switch in arch_domain_create(). In order to address this, introduce an optional hook to perform extra initialisation of the idle domain. No functional change. Signed-off-by: An

Re: [PATCH] xen: fix multicall debug data referencing

2024-07-18 Thread boris . ostrovsky
On 7/18/24 2:21 AM, Juergen Gross wrote: The recent adding of multicall debug mixed up the referencing of the debug data. A __percpu tagged pointer can't be initialized with a plain pointer, so use another percpu variable for the pointer and set it on each new cpu via a function. Fixes: 942d91

[ovmf test] 186881: all pass - PUSHED

2024-07-18 Thread osstest service owner
flight 186881 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/186881/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 489e4a60ea88326a07a7cee8086227c3df2bf93d baseline version: ovmf 62bf2aefc7d58288bb9e3

[xen-unstable-smoke test] 186880: regressions - FAIL

2024-07-18 Thread osstest service owner
flight 186880 xen-unstable-smoke real [real] http://logs.test-lab.xenproject.org/osstest/logs/186880/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-amd64-amd64-xl-qemuu-debianhvm-amd64 7 xen-install fail REGR. vs. 186826 test-amd64-a

[xen-4.16-testing test] 186876: tolerable FAIL - PUSHED

2024-07-18 Thread osstest service owner
flight 186876 xen-4.16-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/186876/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl 8 xen-boot fail in 186850 pass in 186876 test-armhf-armhf-xl-credit2

Re: [PATCH for-4.19?] x86/IOMMU: Move allocation in iommu_identity_mapping

2024-07-18 Thread Alejandro Vallejo
On Wed Jul 17, 2024 at 4:51 PM BST, Teddy Astie wrote: > If for some reason, xmalloc fails after having mapped the > reserved regions, a error is reported, but the regions are > actually mapped in p2m. > > Move the allocation before trying to map the regions, in > case the allocation fails, no mapp

Re: [PATCH v2 2/2] Add scripts/oss-fuzz/build.sh

2024-07-18 Thread Alejandro Vallejo
On Tue Jun 25, 2024 at 11:47 PM BST, Tamas K Lengyel wrote: > The build integration script for oss-fuzz targets. Future fuzzing targets can > be added to this script and those targets will be automatically picked up by > oss-fuzz without having to open separate PRs on the oss-fuzz repo. > > Signed-

Re: [PATCH for-4.20 4/4] x86/fpu: Split fpu_setup_fpu() in two

2024-07-18 Thread Alejandro Vallejo
On Thu Jul 18, 2024 at 1:19 PM BST, Jan Beulich wrote: > On 09.07.2024 17:52, Alejandro Vallejo wrote: > > It's doing too many things at once and there's no clear way of defining what > > it's meant to do. This patch splits the function in two. > > > > 1. A reset function, parameterized by the F

Re: [PATCH] x86/HVM: get_pat_flags() is needed only by shadow code

2024-07-18 Thread Andrew Cooper
On 18/07/2024 11:10 am, Jan Beulich wrote: > Therefore with SHADOW_PAGING=n this is better compiled out, to avoid > leaving around unreachable/dead code. > > Signed-off-by: Jan Beulich > > --- a/xen/arch/x86/hvm/mtrr.c > +++ b/xen/arch/x86/hvm/mtrr.c > @@ -271,6 +271,8 @@ int mtrr_get_type(const s

Re: [PATCH for-4.20 3/4] x86/fpu: Combine fpu_ctxt and xsave_area in arch_vcpu

2024-07-18 Thread Alejandro Vallejo
On Thu Jul 18, 2024 at 12:49 PM BST, Jan Beulich wrote: > On 09.07.2024 17:52, Alejandro Vallejo wrote: > > --- a/xen/arch/x86/domctl.c > > +++ b/xen/arch/x86/domctl.c > > @@ -1343,7 +1343,8 @@ void arch_get_info_guest(struct vcpu *v, > > vcpu_guest_context_u c) > > #define c(fld) (c.nat->fld) >

[PATCH 5/6] tools/libxs: Use writev()/sendmsg() instead of write()

2024-07-18 Thread Andrew Cooper
With the input data now conveniently arranged, use writev()/sendmsg() instead of decomposing it into write() calls. This causes all requests to be submitted with a single system call, rather than at least two. While in principle short writes can occur, the chances of it happening are slim given t

[PATCH 2/6] tools/libxs: Rework xs_talkv() to take xsd_sockmsg within the iovec

2024-07-18 Thread Andrew Cooper
We would like to writev() the whole outgoing message, which is hard given the current need to prepend the locally-constructed xsd_sockmsg. Instead, have the caller provide xsd_sockmsg in iovec[0]. This in turn drops the t and type parameters from xs_talkv(). Note that xs_talkv() may alter the io

[PATCH 0/6] tools/libxs: Fix SIGPIPE handling issues

2024-07-18 Thread Andrew Cooper
While the purpose of this series is patch 6, it has a side effect of reducing the number of system calls substantally. Using a strace of test-xenstore as an example, we go from this: rt_sigaction(SIGPIPE, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=SA_RESTORER, sa_restorer=0x7fda8278e2f0}, {sa_h

[PATCH 4/6] tools/libxs: Track whether we're using a socket or file

2024-07-18 Thread Andrew Cooper
It will determine whether to use writev() or sendmsg(). Signed-off-by: Andrew Cooper --- CC: Anthony PERARD CC: Juergen Gross --- tools/libs/store/xs.c | 5 + 1 file changed, 5 insertions(+) diff --git a/tools/libs/store/xs.c b/tools/libs/store/xs.c index 96ea2b192924..f4edeb05f03b 100644

[PATCH 6/6] tools/libxs: Stop playing with SIGPIPE

2024-07-18 Thread Andrew Cooper
It's very rude for a library to play with signals behind the back of the application, no matter ones views on the default behaviour of SIGPIPE under POSIX. Even if the application doesn't care about the xenstored socket, it my care about others. This logic has existed since xenstore/xenstored was

[PATCH 3/6] tools/libxs: Rationalise the definition of struct xs_handle

2024-07-18 Thread Andrew Cooper
Right now there are two completely different struct xs_handle definitions, depend on #ifdef USE_PTHREAD. One is especially well hidden, and often escapes updates. Rework struct xs_handle using some interior ifdefary. It's slightly longer, but much easier to follow. Importanly, this makes it muc

[PATCH 1/6] tools/libxs: Fix length check in xs_talkv()

2024-07-18 Thread Andrew Cooper
If the sum of iov element lengths overflows, the XENSTORE_PAYLOAD_MAX can pass, after which we'll write 4G of data with a good-looking length field, and the remainder of the payload will be interpreted as subsequent commands. Check each iov element length for XENSTORE_PAYLOAD_MAX before accmulatin

Re: [PATCH] x86/HVM: get_pat_flags() is needed only by shadow code

2024-07-18 Thread Roger Pau Monné
On Thu, Jul 18, 2024 at 12:10:00PM +0200, Jan Beulich wrote: > Therefore with SHADOW_PAGING=n this is better compiled out, to avoid > leaving around unreachable/dead code. > > Signed-off-by: Jan Beulich Reviewed-by: Roger Pau Monné I was going to suggest moving this to shadow specific code, bu

Re: [PATCH for-4.20 2/4] x86/fpu: Create a typedef for the x87/SSE area inside "struct xsave_struct"

2024-07-18 Thread Alejandro Vallejo
On Thu Jul 18, 2024 at 12:23 PM BST, Jan Beulich wrote: > On 09.07.2024 17:52, Alejandro Vallejo wrote: > > Making the union non-anonymous causes a lot of headaches, > > Maybe better "would cause", as that's not what you're doing here? Yes, sounds better. > > > because a lot of code > > relies on

Re: [PATCH] MAINTAINERS: drop CPU POOLS section

2024-07-18 Thread Andrew Cooper
On 18/07/2024 1:52 pm, Juergen Gross wrote: > The CPU POOLS sections in MAINTAINERS can be dropped, as the SCHEDULING > section has the same maintainers and it is covering the CPU POOLS files > as well. > > Signed-off-by: Juergen Gross Acked-by: Andrew Cooper

Re: [PATCH] x86/HVM: get_pat_flags() is needed only by shadow code

2024-07-18 Thread Jason Andryuk
On 2024-07-18 06:10, Jan Beulich wrote: Therefore with SHADOW_PAGING=n this is better compiled out, to avoid leaving around unreachable/dead code. Signed-off-by: Jan Beulich Reviewed-by: Jason Andryuk

[libvirt test] 186857: tolerable all pass - PUSHED

2024-07-18 Thread osstest service owner
flight 186857 libvirt real [real] http://logs.test-lab.xenproject.org/osstest/logs/186857/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt 16 saverestore-support-checkfail like 186833 test-amd64-amd64-libvirt-xsm 15 migrate-s

Re: [PATCH v2 2/2] Add scripts/oss-fuzz/build.sh

2024-07-18 Thread Tamas K Lengyel
On Thu, Jul 18, 2024 at 9:03 AM Jan Beulich wrote: > > On 18.07.2024 14:54, Tamas K Lengyel wrote: > > On Thu, Jul 18, 2024 at 7:17 AM Jan Beulich wrote: > >> On 26.06.2024 00:47, Tamas K Lengyel wrote: > >>> +cd xen > >> > >> This looks to suggest that the expectation is for the script to be inv

Re: Pre-register now for the Xen Project Winter Meetup 2024!

2024-07-18 Thread Kelly Choi
Thank you, Olivier, this will be a great trial for the Xen Project and we are grateful for Vates' support. *Some FAQs for the community:* - Will there be a virtual element? - For this specific event, we will not have a virtual element so that the meetup can focus on in-person colla

Re: [PATCH v2 2/2] Add scripts/oss-fuzz/build.sh

2024-07-18 Thread Jan Beulich
On 18.07.2024 14:54, Tamas K Lengyel wrote: > On Thu, Jul 18, 2024 at 7:17 AM Jan Beulich wrote: >> On 26.06.2024 00:47, Tamas K Lengyel wrote: >>> +cd xen >> >> This looks to suggest that the expectation is for the script to be invoked >> from the root of a xen.git clone. Imo something like >> >>

Re: [PATCH] MAINTAINERS: drop CPU POOLS section

2024-07-18 Thread Jan Beulich
On 18.07.2024 14:52, Juergen Gross wrote: > The CPU POOLS sections in MAINTAINERS can be dropped, as the SCHEDULING > section has the same maintainers and it is covering the CPU POOLS files > as well. > > Signed-off-by: Juergen Gross Acked-by: Jan Beulich

Re: [PATCH v2 2/2] Add scripts/oss-fuzz/build.sh

2024-07-18 Thread Tamas K Lengyel
On Thu, Jul 18, 2024 at 7:17 AM Jan Beulich wrote: > > On 26.06.2024 00:47, Tamas K Lengyel wrote: > > --- /dev/null > > +++ b/scripts/oss-fuzz/build.sh > > @@ -0,0 +1,23 @@ > > +#!/bin/bash -eu > > +# SPDX-License-Identifier: Apache-2.0 > > Hmm. Aiui this line is supposed to make unnecessary ...

[PATCH] MAINTAINERS: drop CPU POOLS section

2024-07-18 Thread Juergen Gross
The CPU POOLS sections in MAINTAINERS can be dropped, as the SCHEDULING section has the same maintainers and it is covering the CPU POOLS files as well. Signed-off-by: Juergen Gross --- MAINTAINERS | 6 -- 1 file changed, 6 deletions(-) diff --git a/MAINTAINERS b/MAINTAINERS index 2b0c89452

Re: [PATCH v2 1/2] Add libfuzzer target to fuzz/x86_instruction_emulator

2024-07-18 Thread Tamas K Lengyel
On Thu, Jul 18, 2024 at 7:03 AM Jan Beulich wrote: > > On 26.06.2024 00:47, Tamas K Lengyel wrote: > > This target enables integration into oss-fuzz. Changing invalid input return > > to -1 as values other then 0/-1 are reserved by libfuzzer. > > And existing behavior (for afl) is unaffected becau

Re: [PATCH] MAINTAINERS: drop separate x86/mm section

2024-07-18 Thread Roger Pau Monné
On Thu, Jul 18, 2024 at 12:30:10PM +0200, Jan Beulich wrote: > Let the subtree fall under general x86 maintainership instead, then also > properly reflecting Roger's role there. > > Signed-off-by: Jan Beulich Acked-by: Roger Pau Monné

Re: [XEN PATCH v3 2/2] x86/cpufreq: separate powernow/hwp/acpi cpufreq code

2024-07-18 Thread Jan Beulich
On 15.07.2024 20:32, Jason Andryuk wrote: > On 2024-07-10 04:30, Sergiy Kibrik wrote: >> Build AMD Architectural P-state driver when CONFIG_AMD is on, and >> Intel Hardware P-States driver together with ACPI Processor P-States driver >> when CONFIG_INTEL is on respectively, allowing for a platform-

Re: [PATCH for-4.20 4/4] x86/fpu: Split fpu_setup_fpu() in two

2024-07-18 Thread Jan Beulich
On 09.07.2024 17:52, Alejandro Vallejo wrote: > It's doing too many things at once and there's no clear way of defining what > it's meant to do. This patch splits the function in two. > > 1. A reset function, parameterized by the FCW value. FCW_RESET means to > reset > the state to power-o

Re: [PATCH for-4.20 3/4] x86/fpu: Combine fpu_ctxt and xsave_area in arch_vcpu

2024-07-18 Thread Jan Beulich
On 09.07.2024 17:52, Alejandro Vallejo wrote: > --- a/xen/arch/x86/domctl.c > +++ b/xen/arch/x86/domctl.c > @@ -1343,7 +1343,8 @@ void arch_get_info_guest(struct vcpu *v, > vcpu_guest_context_u c) > #define c(fld) (c.nat->fld) > #endif > > -memcpy(&c.nat->fpu_ctxt, v->arch.fpu_ctxt, sizeof

[xen-unstable test] 186854: tolerable FAIL

2024-07-18 Thread osstest service owner
flight 186854 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/186854/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl 8 xen-boot fail in 186844 pass in 186854 test-armhf-armhf-libvirt 8

Re: [PATCH for-4.20 2/4] x86/fpu: Create a typedef for the x87/SSE area inside "struct xsave_struct"

2024-07-18 Thread Jan Beulich
On 09.07.2024 17:52, Alejandro Vallejo wrote: > Making the union non-anonymous causes a lot of headaches, Maybe better "would cause", as that's not what you're doing here? > because a lot of code > relies on it being so, but it's possible to make a typedef of the anonymous > union so all callsite

Re: [PATCH for-4.20 1/4] x86/xstate: Use compression check helper in xstate_all()

2024-07-18 Thread Jan Beulich
On 09.07.2024 17:52, Alejandro Vallejo wrote: > Minor refactor to make xstate_all() use a helper rather than poking directly > into the XSAVE header. > > No functional change > > Signed-off-by: Alejandro Vallejo Acked-by: Jan Beulich

Re: [PATCH v2 2/2] Add scripts/oss-fuzz/build.sh

2024-07-18 Thread Jan Beulich
On 26.06.2024 00:47, Tamas K Lengyel wrote: > --- /dev/null > +++ b/scripts/oss-fuzz/build.sh > @@ -0,0 +1,23 @@ > +#!/bin/bash -eu > +# SPDX-License-Identifier: Apache-2.0 Hmm. Aiui this line is supposed to make unnecessary ... > +# Copyright 2024 Google LLC > +# > +# Licensed under the Apache L

Re: [PATCH] MAINTAINERS: drop separate x86/mm section

2024-07-18 Thread Andrew Cooper
On 18/07/2024 11:30 am, Jan Beulich wrote: > Let the subtree fall under general x86 maintainership instead, then also > properly reflecting Roger's role there. > > Signed-off-by: Jan Beulich Acked-by: Andrew Cooper

Re: [PATCH v2 1/2] Add libfuzzer target to fuzz/x86_instruction_emulator

2024-07-18 Thread Jan Beulich
On 26.06.2024 00:47, Tamas K Lengyel wrote: > This target enables integration into oss-fuzz. Changing invalid input return > to -1 as values other then 0/-1 are reserved by libfuzzer. And existing behavior (for afl) is unaffected because there we (wrongly) ignore the return value altogether. > @@

[PATCH] MAINTAINERS: drop separate x86/mm section

2024-07-18 Thread Jan Beulich
Let the subtree fall under general x86 maintainership instead, then also properly reflecting Roger's role there. Signed-off-by: Jan Beulich --- a/MAINTAINERS +++ b/MAINTAINERS @@ -594,12 +594,6 @@ F: tools/misc/xen-cpuid.c F: tools/tests/cpu-policy/ F: tools/tests/x86_emulator/ -X86

Re: [PATCH] x86: don't open-code [gm]fn_to_[gm]addr()

2024-07-18 Thread Andrew Cooper
On 18/07/2024 11:11 am, Jan Beulich wrote: > At least in pure address calculation use the intended basic construct > instead of opend-coded left-shifting by PAGE_SHIFT. Leave alone page > table entry calculations for now, as those aren't really calculating > addresses. > > No functional change. > >

[PATCH] x86: don't open-code [gm]fn_to_[gm]addr()

2024-07-18 Thread Jan Beulich
At least in pure address calculation use the intended basic construct instead of opend-coded left-shifting by PAGE_SHIFT. Leave alone page table entry calculations for now, as those aren't really calculating addresses. No functional change. Signed-off-by: Jan Beulich --- a/xen/arch/x86/guest/xe

Re: [PATCH] x86/mm: drop gfn_to_paddr()

2024-07-18 Thread Andrew Cooper
On 18/07/2024 11:09 am, Jan Beulich wrote: > This really is gfn_to_gaddr() in disguise; no need to have two variants > of the same logic. > > Signed-off-by: Jan Beulich Reviewed-by: Andrew Cooper

[PATCH] x86/HVM: get_pat_flags() is needed only by shadow code

2024-07-18 Thread Jan Beulich
Therefore with SHADOW_PAGING=n this is better compiled out, to avoid leaving around unreachable/dead code. Signed-off-by: Jan Beulich --- a/xen/arch/x86/hvm/mtrr.c +++ b/xen/arch/x86/hvm/mtrr.c @@ -271,6 +271,8 @@ int mtrr_get_type(const struct mtrr_stat return overlap_mtrr_pos; } +#ifdef

[PATCH] x86/mm: drop gfn_to_paddr()

2024-07-18 Thread Jan Beulich
This really is gfn_to_gaddr() in disguise; no need to have two variants of the same logic. Signed-off-by: Jan Beulich --- a/xen/arch/x86/include/asm/guest_pt.h +++ b/xen/arch/x86/include/asm/guest_pt.h @@ -20,12 +20,6 @@ #error GUEST_PAGING_LEVELS not defined #endif -static inline paddr_t -g

Re: [PATCH RFC 3/3] x86/mm: Simplify/correct l1_disallow_mask()

2024-07-18 Thread Jan Beulich
On 17.07.2024 18:14, Andrew Cooper wrote: > l1_disallow_mask() yields L1_DISALLOW_MASK with PAGE_CACHE_ATTRS conditionally > permitted. First, rewrite it as a plain function. > > Next, correct some dubious behaviours. > > The use of is_pv_domain() is tautological; l1_disallow_mask() is only used

Re: [PATCH 2/3] x86/mm: Move base_disallow_mask into __ro_after_init

2024-07-18 Thread Jan Beulich
On 17.07.2024 18:14, Andrew Cooper wrote: > base_disallow_mask is calculated once in arch_init_memory() and never changes > thereafter. Write-protect it at runtime. > > Signed-off-by: Andrew Cooper Reviewed-by: Jan Beulich

Re: [PATCH 1/3] x86/mm: Drop duplicate l1_disallow_mask() calls

2024-07-18 Thread Jan Beulich
On 17.07.2024 18:14, Andrew Cooper wrote: > Even in release builds, gdprintk() evalues its parameters for side effects, > and l1_disallow_mask() is full of them. > > Calculate the disallow mask once and reuse the variable. This improves code > generation in release builds: > > add/remove: 0/0

Re: [RFC PATCH 17/17] CODING_STYLE: Add a section on header guards naming conventions

2024-07-18 Thread Jan Beulich
On 18.07.2024 01:02, Stefano Stabellini wrote: > On Wed, 17 Jul 2024, Jan Beulich wrote: >> On 17.07.2024 02:20, Stefano Stabellini wrote: >>> On Tue, 16 Jul 2024, Jan Beulich wrote: On 16.07.2024 02:43, Stefano Stabellini wrote: > On Mon, 15 Jul 2024, Jan Beulich wrote: >> On 13.07.20

[xen-4.16-testing test] 186850: regressions - FAIL

2024-07-18 Thread osstest service owner
flight 186850 xen-4.16-testing real [real] http://logs.test-lab.xenproject.org/osstest/logs/186850/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: build-amd64-prev 6 xen-build fail in 186838 REGR. vs. 185867 build-i386-pre